|
by: Edwinah63 |
last post by:
Hi Gurus,
i am having problems with restoring a ms sql database.
i have restored the database using veritas to a different location
('g:\datafiles') in no recover mode.
when i view the database through the Enterprise Manager, it shows the
database as silver icon (loading).
|
by: dchow |
last post by:
Our database size is currently 4G and is incrementing at a rate of
45M/day. What is the max size of a SQL database? And what is the
size beyond which the server performance will start to go down?
|
by: John Mullan |
last post by:
Hi
I have a problem creating a backup in SQL Server 6.5. Although, the
backup produced does restore ok, I want to stop this error message
appearing everytime I make a backup. The error message is:
"
Can't allocate space for object 'sysbackupdetail' in
database 'msdb' because the 'default' segment is full. If you ran out
of space in Syslogs, dump the transaction log. Otherwise, use ALTER
DATABASE or sp_extendsegment to increase the size...
|
by: Hallgeir |
last post by:
My msdb database is marked as suspect. This means that my maintenance plan
doesn't work. I'm a novice when it comes to sql server so now I'm wondering
if anyone could give a hint on how to fix the suspect msdb database? Does
this database contain any vital information? What could be the reason that
this database become suspect?
Appreciate any suggestions in this matter.
Thanks!
--
|
by: Andy B |
last post by:
Hello,
Sorry for this newbish question.
Briefly, my problem:
------------------
I expect the database I'm working on to reach something in the order of
12-16 Gigabytes, and I am interested in understanding as much as I can about
how I can make this go as fast as possible on a linux system. I haven't run
such a large database before. The nature of the database is such that
|
|
by: R.A.M. |
last post by:
Hello,
Could you explain me please the following error:
"Database 'DemoDotNET' cannot be opened due to inaccessible files or
insufficient memory or disk space. (Microsoft SQL Server, Error: 945)"
I have checked: free disk space is large enough, I have much enough
memory, other files in the directory are accessible.
Here is tail of ERRORLOG:
|
by: Fausto Guerini |
last post by:
On my Microsoft sql server 2000 i have a database named Lp marked suspect, the last backup il long time ago so i'm trying to recover the current database.
The start up log of sql is:
An error occurred while processing the log for database 'Lp'
I've also tried
dbcc CHECKDB ('lp')
and got the answer:
Server: Msg 945, Level 14, State 2, Line 1
Database 'Lp' cannot be opened due to inaccessible files or insufficient memory or disk space. ...
|
by: Joe Adams |
last post by:
I am attempting to reinstall from a windows gone bad problem.
XP had "died" and unable boot into os, so there was no backup or copy database made.
Have installed new hdd. copied most all of the old hdd to a "backup" folder on new hdd. I know of the program files ms sql data subdir.
System state.
XP professional , not sharing on network, so is like standalone pc.
sql is 8.0 ( the downloaded version that was part of the installation of a...
|
by: raidvvan |
last post by:
Hi there,
We have been looking for some time now for a database system that can
fit a large distributed computing project, but we haven't been able to
find one.
I was hoping that someone can point us in the right direction or give
us some advice.
Here is what we need. Mind you, these are ideal requirements so we do
not expect to find something that fits entirely into what we need
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed.
This is as boiled down as I can make it.
Here is my compilation command:
g++-12 -std=c++20 -Wnarrowing bit_field.cpp
Here is the code in...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth.
The Art of Business Website Design
Your website is...
|
|
by: Hystou |
last post by:
Overview:
Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own....
Now, this would greatly impact the work of software developers. The idea...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules.
He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms.
Adolph will...
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols.
I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
|
by: adsilva |
last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
|
by: 6302768590 |
last post by:
Hai team
i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
|
|
by: bsmnconsultancy |
last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...
|