Azure Stretch Database, Part I: Getting Going
With most innovative new technologies, Azure Stretch Database demos make it look completely easy. Here is a step by step to get going, with examples. Part One of a Two-Part series.
2019-08-26
4,962 reads
With most innovative new technologies, Azure Stretch Database demos make it look completely easy. Here is a step by step to get going, with examples. Part One of a Two-Part series.
2019-08-26
4,962 reads
SQL Server Auditing is a powerful out-of-the box toolset that captures auditing information and writes to a file or the Event Log. This article examines the little things that might snag you up.
2019-08-05 (first published: 2017-10-05)
11,278 reads
See how the ITIL Framework's Asset Management standards make the DBA's job easier. Use the CMDB and DML to keep your data assets under tight control.
2019-05-17 (first published: 2017-11-21)
3,628 reads
With exciting products like SQL Clone making their debut, the DBA will need to think through the approach to implementing such powerful tools. Done properly, these tools will provide a massive benefit to both the DBA and developer.
2019-05-10 (first published: 2017-11-28)
4,403 reads
We've gone through the basics of Peer-to-Peer Transactional Replication (PPTR). Now, we will blow it up! We will then fix it and show you how you how to triage and repair PPTR. When you remain calm and take some easy steps, you can stabilize PPTR with ease.
2019-01-04 (first published: 2016-01-07)
3,007 reads
As the Peer-to-Peer series continues, we set up an example topology in Peer-to-Peer Transactional replication and test it.
2018-12-28 (first published: 2015-11-05)
4,132 reads
There are times when you need to share tables between servers, where the table may be updated in both places. Peer-to-Peer Transactional Replication gives you the ability to create a solution. I explain the benefits and the downfalls.
2018-12-21 (first published: 2014-01-13)
6,265 reads
In a previous article, we discussed how to liberate the DBA from SQL Logins with AD Groups. A good point was raised: How can the DBA know who has what access? Here is a solution.
2018-08-03 (first published: 2016-02-18)
12,472 reads
The business decides on a packaged application and buys it. After installation, you look at the schema and realize that is is a nightmare. How do you manage this nightmare?
2018-05-02 (first published: 2015-12-22)
5,450 reads
With HIPAA and GDPR requiring your careful scrubbing of data for lower environments, random word generation promises to be a huge helper. Read here how to do it.
2018-05-01
5,904 reads
It's time for T-SQL Tuesday #198! This month's topic is change detection. The post T-SQL...
By James Serra
Model Context Protocol, or MCP, is one of those technical ideas that sounds more...
When starting with AWS RDS Aurora for managing relational databases in the cloud, many...
WhatsApp 08388331767 Jl. Raya Pluit Utara. 85 Blok E Kav. No. 11, RT.4/RW.5, Pluit,...
BCA KCP Sentral Cikini Telpon/wa:0821°8168°291.Jl. Pegangsaan Timur No.1, Cikini, Kec. Menteng, Kota Jakarta Pusat,...
WhatsApp 08388331767 Pertokoan Paradise, Jl. Paradise 11 No.23 Blok J-1 No. 6 & 7,...
In honor of May the fourth and Star Wars (may the force be with you), finish this quote:
"Do, or do not. ..."See possible answers