Category Archives: Microsoft SQL Server
-
Pulling data from a non-clustered index
2March 14, 2016 by Kenneth Fisher
This is one of those things that I found very interesting but figured I’d probably never really use. Of course …
Continue reading -
You don’t need to be a sysadmin
29March 10, 2016 by Kenneth Fisher
Hey, I need sysadmin access to ServerA. Ok. Why do you need sysadmin? Well I need to be able to …
Continue reading -
Ever wonder what that goofy query in the header means?
5March 8, 2016 by Kenneth Fisher
It’s T-SQL Tuesday time again (Number 76!) and this month we are hosted by Bob Pusateri (b/t) who has invited …
Continue reading -
How do I grant someone the ability to create a stored procedure?
2March 2, 2016 by Kenneth Fisher
The question of How to grant the ability to create/alter stored procedures and views came up today on dba.stackexchange.com. It’s …
Continue reading -
Powershell script to create multiple SQL Server Connections
2February 24, 2016 by Kenneth Fisher
As with most of these types of things, I had a need. I want to show how using sys.dm_exec_[requests/sessions/connections] is …
Continue reading -
You are not logged on as the database owner or system administrator.
Leave a commentFebruary 22, 2016 by Kenneth Fisher
I had one of my developers ask me why he keeps seeing the following warning when he tries to modify …
Continue reading -
Take caution when altering a column using TSQL
1February 17, 2016 by Kenneth Fisher
When developing in SQL Server you are eventually going to have to modify a column or two (at least). And …
Continue reading -
varchar(1) VS char(1)
5February 15, 2016 by Kenneth Fisher
The other day I made a somewhat flip coment on twitter. (I know, everyone is shocked right?) varchar(1) Really? It’s …
Continue reading -
Changing to simple recovery to clear the log.
6February 10, 2016 by Kenneth Fisher
Clearing out a full transaction log is a common problem. A quick search will find you dozens of forum entries …
Continue reading -
Impersonation can give you the wrong answer
1February 8, 2016 by Kenneth Fisher
I use impersonation all the time to let me see additional permissions information I can only get that way and, …
Continue reading





