You can look for the permission paths used by a login as follows:
EXEC xp_logininfo ‘DOMAINUSER_A’, ‘all’
SQL Server 2012: Kill all processes for a specific database
SELECT 'KILL ' + cast(A.session_id as varchar) FROM sys.dm_exec_sessions A WITH (NOLOCK) INNER JOIN sys.databases B WITH (NOLOCK) ON A.database_id = B.database_id WHERE B.name = 'your.dbname.here'
Why don’t software development methodologies work?
My long standing thesis that you cannot apply assembly line theory to software development, it is the people that make it succeed or fail not the process.
People all too often look to a tool or a process to fix their problem, but what typically happens is that all these things serve to do is divert attention away from the problem and distract people with process and tools.
Kind of like buying gym memberships or exercise equipment expecting them to make you healthy. The thing is, if someone isn’t already exercising on their own (jogging, doing push-ups and sit-ups), then no amount of equipment or tools will solve their problem. Instead, if a person is already in the right mindset and demonstrating the right behavior, then tools can help leverage performance to the next level — basically do the right thing, better.
My experiences and conclusions mirror those of the author of the article linked to below:
Why don’t software development methodologies work?
[Excerpt] It’s common now for me to get involved in a project that seems to have no adult supervision. Surprisingly, left to themselves programmers don’t revert to cowboy coding—they adopt or create methodologies stricter and more filled with ritual than anything I experienced in 1980. In fact programmers today can be much more rigid and religious about their methodologies than they imagine a 1970s-era COBOL shop was. I now routinely get involved with projects developed by one or two people burdened with so much process and “best practices” that almost nothing of real value is produced.
Example PGP encryption and decryption using MuleStudio 3.5
In this case we are using our Secret Key, Secret Alias ID,
and Secret Passphrase to sign the encrypted message. We use
the recipient’s (in this case “Joe Bob”) Public Key and Principal Email.
PGP_PrivateDecrypter
– Global Encryption Element
Global Elements:
<encryption:config name=“PGP_PublicEncrypter”
<jobbob@yahoo.com>”
</encryption:config>
<encryption:config name=“PGP_PrivateDecrypter”
<jobbob@yahoo.com>”
doc:name=“flowEncrypt”>
path=“queueEncrypt”
level=“INFO” category=“### INPUT
LOGGER ###”
using=“PGP_ENCRYPTER” config-ref=“PGP_PublicEncrypter”
level=“INFO” category=“### ENCRYPTED LOGGER
###”
config-ref=“PGP_PrivateDecrypter”
level=“INFO” category=“### DECRYPTED
LOGGER ###”
org.junit.Assert.assertEquals;
org.junit.Assert.assertNotNull;
org.junit.Assert.assertTrue;
java.io.File;
java.io.IOException;
java.util.Collection;
java.util.HashMap;
java.util.Map;
org.apache.commons.io.FileUtils;
org.junit.Test;
org.mule.DefaultMuleMessage;
org.mule.api.MuleException;
org.mule.api.MuleMessage;
org.mule.api.client.MuleClient;
org.mule.api.transport.PropertyScope;
org.mule.tck.junit4.FunctionalTestCase;
EncryptFlowTest extends FunctionalTestCase
MuleException
HashMap<String, Object> propsMap = new HashMap<String,
Object>();
muleContext.getClient();
quick brown fox jumped over the lazy dog”);
(“vm://queueEncrypt”, payloadSend, propsMap, 5000);
String );
(String)reply.getPayload();
“src/main/app/pgpexample.xml”;
——————————————————
per-package here
Availability
for web services
make a lot of noise which can clutter the log.
Adding SQL Server JDBC Connector in Mulesoft
3. In the connections explorer add a new connection global element for data source by selecting MS SQL Data Source
4. Fill in connection information. JDBC urls for SQL Server should be of form:
For default instance on default port 1433
jdbc:sqlserver://servername:1433;databaseName=databasename
For named instance with non-default port:
jdbc:sqlserver://servernameinstancename:port;databaseName=databasename
5. Now create database connection global elment and select the sql server database connection defined in steps
Note that the SQL Server Browser service may need to be active for JDBC to see the server.
Additional info and Mulesoft tutorial:
http://www.mulesoft.org/connectors/microsoft-sql-server-connector
which port is which?
Depending how the SQL Server instance is set up, it may be a named instance and not have a standard port of 1433.
To find out which port, you can run netstat in a command prompt.
Another way is to open SQL Server Configuration Manager and browse to:
SQL Server Network Configuration -> Protocols for <SERVERNAME> -> TCP/IP
Then in the TCP/IP window select the IP Address tab and scroll down to IPAll
Enable Alert system for SQL Server Agent
DatabaseMail on the SQL Server Agent -> Properties -> Alert System (check the checkbox), and then restart SQL Server Agent
Very Cool Tools
Clearing transaction log
--First check for open transactions DBCC OPENTRAN GO ALTER DATABASE [databasename] set recovery simple GO CHECKPOINT GO DBCC SHRINKFILE ([transactionlog],1) GO ALTER DATABASE [databasename] set recovery full GO --Since SQL Server lost the ability to TRUNCATE_ONLY in 2008 --here's an alternative to setting backup mode to SIMPLE, then checkpoint. BACKUP LOG [databasename] TO DISK=’NULL’ GO
fnTitleCase
CREATE FUNCTION [dbo].[fnTitleCase]( @text AS varchar(8000) )
RETURNS varchar(8000)
AS
BEGIN
DECLARE @Reset bit;
DECLARE @Ret varchar(8000);
DECLARE @i int;
DECLARE @c char(1);
SELECT @Reset = 1, @i=1, @Ret = ”;
WHILE (@i <= len(@Text))
BEGIN
SELECT @c= substring(@Text,@i,1),
@Ret = @Ret + case when @Reset=1 then UPPER(@c)
else LOWER(@c) end,
@Reset = case when @c like ‘[a-zA-Z]’ then 0 else 1 end,
@i = @i +1
END
RETURN @Ret
END