Search Results

Search found 11015 results on 441 pages for 'explain plan'.

Page 177/441 | < Previous Page | 173 174 175 176 177 178 179 180 181 182 183 184  | Next Page >

  • How can we recover/restore lost/overwritten data in our MSSQL 2008 table?

    - by TeTe
    I am in serious trouble and I am seeking professional advices here. We are using MSSQL server 2008. We removed primary key, replaced exiting data with new data resulted losing our critical business data in its child tables on MSSQL Server. It was completely human mistake and we didn't have disk failure. 1) The last backup file was a month ago which means it is useless. 2) We created Maintenance Plans to backup our database at 12AM everyday but those files are nohwere to be found 3) A friend of mine said we can recover from Transaction Logs. When I go to TaskRestore Transaction log is dimmed/disabled. 4) I checked ManagementMaintenance Plans. I can't find any restored point there. It seems that our maintenance plan hasn't been working. Is there any third party tool to recover lost/overwritten data from MSSQL table? Thanks a lot.

    Read the article

  • Any Microsoft SQL Server 2008 licensing restrictions on usage?

    - by ryrobes
    Does Microsoft have any problems with HOW I USE SQL Server Standard Edition 2008? I plan on using it to aggregate my clients various data sources and report on them (using the whole stack - SSIS, DB, Analysis Services and Reporting Services) via the web. I don't want to run into any issues with being accused of "re-selling" services / features when I'm not allowed to, etc. In essence, I'm charging people to build them solutions based on / using MY licensed copy and then giving them access to the final products. (reports, etc) It seems straightforward enough - but who knows with MS... (BTW, Licensed by processor / not CAL)

    Read the article

  • Windows Mobile 6 and twitter

    - by dogsblx
    hi, I'm trying to implement Twitter into a mobile game that I'm developing and having difficulty with using the available libraries. Could someone explain how I use a library such as nTwitter on the .net compact framework 3.5 and windows mobile 6 professional SDK Thanks in advance for any help Tom

    Read the article

  • What does this pointer-heavy C code do?

    - by justRadojko
    Could someone explain to me what should two following lines do: s.httpheaderline[s.httpheaderlineptr] = *(char *)uip_appdata; ++((char *)uip_appdata); This is taken from uIP code for microcontrollers. s - structure httpheaderline - http packet presented as a string httpheadrlineptr - integer value uip_appdata - received ethernet packet (string) If some more info is needed please let me know. BTW. Eclipse is reporting an error on the second line with message Invalid lvalue in increment so i'm trying to figure out how to solve this.

    Read the article

  • Why call-by-value evaluation strategy is not Turing complete?

    - by Roman
    I'm reading an article about different evaluation strategies (I linked article in wiki, but I'm reading another one not in English). And it says that unlike to call-by-name and call-by-need strategies, call-by-value strategy is not Turing complete. Can anybody explain, please, why is it so? If it's possible, add an example pls.

    Read the article

  • understanding of FPS and the methods they use

    - by numerical25
    Just looking on resources that break down how frames per second work. I know it has something to do with keeping track of Ticks and figure out how many ticks occured between each frame. But I never ran into any resources on why exactly you have to use the methods you use in order to get a smooth frame work. I am trying to get a thourough understanding of this. Can any explain or provide any good resources ? Thanks

    Read the article

  • Limit exceeded on sitemap submission to Yahoo.

    - by user173457
    I'm getting an error saying, "Limit exceeded" when I am submitting my sitemap to Yahoo. Can anyone explain what the error means? Possible problems: 1. Too many submissions: we certainly don't send the sitemap 5000 times in a day. 2. The sitemap is too big: Our sitemap is a mere 40k file and gzipped. Thanks.

    Read the article

  • How to interpret binary data as an integer?

    - by StackedCrooked
    The codebase at work contains some code that looks roughly like this: #define DATA_LENGTH 64 u_int32 SmartKey::SerialNumber() { unsigned char data[DATA_LENGTH]; // ... initialized data buffer return *(u_int32*)data; } This code works correctly, but GCC gives the following warning: warning: dereferencing pointer ‘serialNumber’ does break strict-aliasing rules Can someone explain this warning? Is this code potentially dangerous? How can it be improved?

    Read the article

  • pls give reason why this java program always comes to the else part

    - by Anbu
    public class Test { public static void main(String[] args){ if (5.0 5) // (5.0<5) for both case it is going to else System.out.println("5.0 is greater than 5"); else System.out.println("else part always comes here"); /another sample/ if (5.0 == 5) System.out.println("equals"); else System.out.println("not equal"); } } can any one explain the first "if statement" why it always come to else part

    Read the article

  • having public computers without joining the domain

    - by MCarter
    Good Morning, I would like to know what is the best arrangement for setting up 24 computers at a facility. We do not want these computers to join our domain because of security concerns. We plan on having these public computers connect to our wifi network. If anyone knows of the best way to approach this, that would be great! We also need to add printers to these public computers. We would also like to lock each computer down. Since we are not connecting by network, I assume we would have to configure each group policy.

    Read the article

  • What problems does Reflection solve?

    - by Praveen
    Hi All, I went through all the posts on Reflection but couldn't find the answer to my question. Can you please tell me what were the problems in programming world before .Net Reflection came and how it solved those problems. Please explain with example.

    Read the article

  • using datatype in php is possible?

    - by fayer
    i have seen this in php (symfony): public function executeShow(sfWebRequest $request) { // logic } i didnt know that you could declare a datatype in php? have i missed something? could someone explain this. thanks

    Read the article

  • How can I disallow a user's scripts from accessing anything above their user folder?

    - by Jaxo
    This is probably an extremely simple question to answer for anybody who knows what they're doing, but I can't find any answers myself. I'm trying to set up a subdirectory for my good friend to test his PHP scripts on my (Apache) hosting plan. I don't want to let him access anything else on my server, however, for obvious reasons. His FTP login already leads him to the proper directory, which does not allow navigating any higher than it's root (mydomain.com/friend/). I would like the same behavior to be applied to any scripts, so he cannot simply <?php print_r(glob("../*")); ?> and view all my files. I'm thinking this can be done with an .htaccess file setting the DocumentRoot somewhere, but I can't have the file available for modification inside the user directory. Is this possible without majorly rewiring the web server? I've tried Googling all sorts of things to describe my problem, but without the proper terminology, all I get is "shared hosting" websites and people trying to sell me security packages.

    Read the article

< Previous Page | 173 174 175 176 177 178 179 180 181 182 183 184  | Next Page >