Solved

Partially Contained Databases - Cross Database Queries

Posted on 2016-11-21
3
65 Views
Last Modified: 2016-11-23
Please experts

any example about: Partially Contained Databases - Cross Database Queries
0
Comment
Question by:enrique_aeo
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 28

Expert Comment

by:Pawan Kumar
ID: 41896937
Contained Db's - Feature of SQL 2012.  They are isolated from other databases and also from the instance that host the db.

Try microsoft/blog urls..

https://msdn.microsoft.com/en-us/library/ff929139.aspx
https://msdn.microsoft.com/en-in/library/ff929071.aspx
http://www.sqlcoffee.com/SQLServer2012_0009.htm

If you need something specific , please post ?
0
 

Author Comment

by:enrique_aeo
ID: 41897659
i need example (T-SQL) about  "Cross Database Queries"
0
 
LVL 28

Accepted Solution

by:
Pawan Kumar earned 500 total points
ID: 41898493
Below Microsoft URLs will help you with the cross database queries. <<Note>>

https://msdn.microsoft.com/en-us/library/dn584627.aspx
https://azure.microsoft.com/en-in/blog/querying-remote-databases-in-azure-sql-db/

Hope it helps !!
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Exchnage 2013 Database - Dirty Shutdown 4 105
grouping by date only 6 22
What does "Between" mean? 6 48
SQL Server Reports (SSRS 2014) - Reports Timing Out 11 122
These days, all we hear about hacktivists took down so and so websites and retrieved thousands of user’s data. One of the techniques to get unauthorized access to database is by performing SQL injection. This article is quite lengthy which gives bas…
When it comes to protecting Oracle Database servers and systems, there are a ton of myths out there. Here are the most common.
Video by: Steve
Using examples as well as descriptions, step through each of the common simple join types, explaining differences in syntax, differences in expected outputs and showing how the queries run along with the actual outputs based upon a simple set of dem…
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question