Search for " Ͽ rqk427.top ⸶ǥ λ渶 999 渶衩ð ̰̽ ٿε īŸ渶" returned 413 results.

Search all the documentation for " Ͽ rqk427.top ⸶ǥ λ渶 999 渶衩ð ̰̽ ٿε īŸ渶"

  1. New-SqlClone

    ' -Location $SqlServerInstance -Image $Image -OverrideStorageLocation 'D:\Clones' This example creates a clone in the same way as example

    /clone5/automation/powershell-cmdlet-reference/new-sqlclone

  2. Use-DatabaseReleaseArtifact

    "Production" -Username "AutomationUser" -Password "P@ssw0rd" $build = Import-DatabaseBuildArtifact "C:\Work\buildArtifacts\DatabaseBuildA

    /sca4/reference/powershell-cmdlets/use-databasereleaseartifact

  3. SQL Prompt 5.2 release notes

    for the first time. You can now turn code auto-completion on/off using a new SQL Prompt menu option, or a keyboard shortcut (Ctrl + Shift

    /sp9/release-notes-and-other-versions/sql-prompt-5-2-release-notes

  4. Variables

    database storage. The default value for this variable is the same as the name of the database the script is generated against. DefaultDat

    /sca4/developing-databases/concepts/advanced-concepts/variables

  5. Windows Task Scheduler

    from Purge old images which don't have clones, which has been saved as D:\SQL Clone scripts\RemoveOldImages.ps1 To schedule a task: Start

    /clone5/automation/windows-task-scheduler

  6. SQL Prompt 6.1 release notes

    } NullReferenceException @ CandidateCollectionMultiType`1.Add(…) SP-4849 {SA} NullReferenceException @ DatabaseCandidate2005.CopyMasterObj

    /sp9/release-notes-and-other-versions/sql-prompt-6-1-release-notes

  7. Profiling SharePoint

    . Select Profile unmanaged memory allocations if your application access unmanaged memory through P/Invoke or COM+, and you want to profil

    /amp8/setting-up-a-profiling-session/profiling-a-web-application/profiling-sharepoint

  8. Checking unmanaged memory usage

    a dynamically generated assembly leak. Accessing unmanaged data through P/Invoke or COM+ You can see which modules are being called from

    /amp8/strategies-for-memory-profiling/checking-unmanaged-memory-usage

  9. Example configuration using virtualization software

    and 28 databases Machine C hosting 1 SQL Server instance and 37 databases Machine D hosting 1 SQL Server instance and 16 databases Machin

    /sm7/advanced-operations/example-configuration-using-virtualization-software

  10. SQL Backup errors 500 - 5292

    ..sqbutility 999, 'RWE', '\\testserver\backuplocation' If the SQL Backup Agent service has read (R), write (W), and execute (E) permission

    /sbu7/errors-and-warnings/sql-backup-errors-500-5292

  11. Provisioning

    - The lifetime of the data container. This takes the form of a number optionally followed by a time unit, s, m, h, or d. If no time unit

    /fd/provisioning-231998444.html

  12. Permissions required to monitor SQL Server

    of the account. An example of how this is done is shown below. sc sdset scmanager "D:(A;;CC;;;AU)(A;;CCLCRPRC;;;IU)(A;;CCLCRPRC;;;SU)(A;;

    /monitor14/permissions-required-to-monitor-sql-server-239667634.html

  13. Worked examples

    , then type: p The suggestions box shows all relevant suggestions beginning with p : example1_2.gif SQL Prompt always places the most cont

    /sp6/worked-examples

  14. Obfuscating code with name mangling

    within other classes in the assembly. For example, #a: string, #b: boolean, #c: string, #d: boolean. Obfuscated in the same style as the

    /sa8/obfuscating-your-code-with-smartassembly/obfuscating-code-with-name-mangling

  15. The RESTORE command

    the '*' wildcard. For example: "RESTORE DATABASE [pubs] FROM DISK = 'C:\Backups\sales*.sqb', DISK = 'D:\Backups\sales*.sqb' LATEST_DIFF"

    /sbu6/scripting-sql-backup/the-restore-command

  16. Obfuscating code with name mangling

    within other classes in the assembly. For example, #a: string, #b: boolean, #c: string, #d: boolean. Obfuscated in the same style as the

    /sa7/obfuscating-your-code-with-smartassembly/obfuscating-code-with-name-mangling

  17. Automated deployments

    -DatabaseConnection -ServerInstance "prod01\sql2014" -Database "AdventureWorksProduction" -Username "sa" -Password "p@ssw0rd" $dbRelease =

    /sca4/deploying-database-changes/automated-deployments

  18. Checking unmanaged memory usage

    a dynamically generated assembly leak. Accessing unmanaged data through P/Invoke or COM+ You can see which modules are being called from

    /amp/strategies-for-memory-profiling/checking-unmanaged-memory-usage

  19. Profiling SharePoint

    . Select Profile unmanaged memory allocations if your application access unmanaged memory through P/Invoke or COM+, and you want to profil

    /amp/setting-up-a-profiling-session/profiling-a-web-application/profiling-sharepoint

  20. SQL Backup errors 500 - 5292

    ..sqbutility 999, 'RWE', '\\testserver\backuplocation' If the SQL Backup Agent service has read (R), write (W), and execute (E) permission

    /sbu9/errors-and-warnings/sql-backup-errors-500-5292

  21. Deployment warnings

    , and the default password that will be applied. The default password is p@ssw0rd. Corrupt login SQL Compare displays this warning when th

    /sc12/deploying-data-sources/deployment-warnings

  22. About config files

    > To include multiple operations in a single command, separate them with &&. For example: accurev add -c -d ($Files) && accurev keep -m &&

    /soc6/linking-to-source-control/other-source-control-systems/link-to-a-custom-setup/about-config-files

  23. Profiling SharePoint

    . Select Profile unmanaged memory allocations if your application access unmanaged memory through P/Invoke or COM+, and you want to profil

    /amp10/setting-up-a-profiling-session/profiling-a-web-application/profiling-sharepoint

  24. Checking unmanaged memory usage

    a dynamically generated assembly leak. Accessing unmanaged data through P/Invoke or COM+ You can see which modules are being called from

    /amp10/strategies-for-memory-profiling/checking-unmanaged-memory-usage

  25. SQL Compare 13.2 release notes

    User creation where a login does not exist Previous versions of SQL Compare created logins with a default password of P@ssw0rd, with a wa

    /sc13/release-notes-and-other-versions/sql-compare-13-2-release-notes


Didn't find what you were looking for?