Azure Stretch Database, Part I: Getting Going
With most innovative new technologies, Azure Stretch Database demos make it look completely easy. Here is a step by step to get going, with examples. Part One of a Two-Part series.
2019-08-26
4,957 reads
With most innovative new technologies, Azure Stretch Database demos make it look completely easy. Here is a step by step to get going, with examples. Part One of a Two-Part series.
2019-08-26
4,957 reads
SQL Server Auditing is a powerful out-of-the box toolset that captures auditing information and writes to a file or the Event Log. This article examines the little things that might snag you up.
2019-08-05 (first published: 2017-10-05)
11,206 reads
See how the ITIL Framework's Asset Management standards make the DBA's job easier. Use the CMDB and DML to keep your data assets under tight control.
2019-05-17 (first published: 2017-11-21)
3,616 reads
With exciting products like SQL Clone making their debut, the DBA will need to think through the approach to implementing such powerful tools. Done properly, these tools will provide a massive benefit to both the DBA and developer.
2019-05-10 (first published: 2017-11-28)
4,394 reads
We've gone through the basics of Peer-to-Peer Transactional Replication (PPTR). Now, we will blow it up! We will then fix it and show you how you how to triage and repair PPTR. When you remain calm and take some easy steps, you can stabilize PPTR with ease.
2019-01-04 (first published: 2016-01-07)
2,984 reads
As the Peer-to-Peer series continues, we set up an example topology in Peer-to-Peer Transactional replication and test it.
2018-12-28 (first published: 2015-11-05)
4,128 reads
There are times when you need to share tables between servers, where the table may be updated in both places. Peer-to-Peer Transactional Replication gives you the ability to create a solution. I explain the benefits and the downfalls.
2018-12-21 (first published: 2014-01-13)
6,262 reads
In a previous article, we discussed how to liberate the DBA from SQL Logins with AD Groups. A good point was raised: How can the DBA know who has what access? Here is a solution.
2018-08-03 (first published: 2016-02-18)
12,257 reads
The business decides on a packaged application and buys it. After installation, you look at the schema and realize that is is a nightmare. How do you manage this nightmare?
2018-05-02 (first published: 2015-12-22)
5,448 reads
With HIPAA and GDPR requiring your careful scrubbing of data for lower environments, random word generation promises to be a huge helper. Read here how to do it.
2018-05-01
5,889 reads
By Steve Jones
Superheroes and saints never make art. Only imperfect beings can make art because art...
One feature that I have been waiting for years! The new announcement around optimize...
Following on from my last post about Getting Started With KubeVirt & SQL Server,...
Comments posted to this topic are about the item Think LSNs Are Unique? Think...
Comments posted to this topic are about the item The AI Bubble and the...
In SQL Server 2025, how many columns can be included in a Primary Key constraint?
See possible answers