Additional Articles


External Article

High Call Volume SQL Server Applications on NUMA Systems

One of the most difficult database operations to scale-up on high-end server systems is the network call. In fact, without special precautions, a high call volume database application can have severe negative scaling on large systems. It is suspected that this problem is more pronounced on NUMA systems than basic SMP systems. A NUMA system with 16 processors can have significantly lower throughput capability than an otherwise comparable 4-way SMP system.

2005-10-25

1,754 reads

Technical Article

VIEWS: The Key to Database Agility

There is an important technique for creating truly agile databases that I haven’t seen in his writings; one which is well-known to DBAs, but little understood in the application development community – the use of database views to create a layer of abstraction between the normalized relational tables and the applications that use the data.

2005-10-21

3,736 reads

Technical Article

The Steps to monitoring greatness

SQL Server Profiler can correlate Microsoft Windows System Monitor (Performance Monitor in Windows NT 4.0) counters with SQL Server or SQL Server 2005 Analysis Services (SSAS) events. Windows System Monitor logs system activity for specified counters in performance logs. The first thing to remember is in order to have correlating information you need to obviously be in sync - in other words you must start the perfmon trace and profiler trace at the same time or else they won't match up.

2005-10-19

2,508 reads

External Article

Database Geek of the Week - Gary Mallow

Database geeks are all around us. I met Gary Mallow on the email list of a cycling group run by a local church. After some conversation, I discovered that he is a director of a group of developers who build applications, sometimes using .NET and often using Oracle as a database. Like me, Gary is not entirely comfortable with his ability as a UI developer, and so finds database work a good fit.

2005-10-18

1,689 reads

External Article

Controlling Transactions and Locks in SQL 2000 and 2005 - Part 3

In the preceding articles of this series, Lock Granularity, Transactions, and ACID were introduced. Common lock types, such as Shared, Exclusive, and Update were explored, as well as using SP_Lock to obtain current system lock information. In this article, the normal internal SQL locking methods will be manipulated using Lock Hints in order to obtain finer lock control.

2005-10-14

4,123 reads

External Article

Automatically Running a Process When SQL Server or SQL Agent Starts

Have you ever had a need to run a query or a process as soon as SQL Server starts? Or run some set of tasks when SQL Server Agent Starts? Possibly you want to run a cleanup routine, a copy process or have some task started each time SQL server or SQL Agent is started. Well if this is the case then this article will discuss a couple of options you might consider using to accomplish automatically running your process.

2005-10-13

2,228 reads

External Article

Database Geek of the Week - Itzik Ben-Gan

Itzik Ben-Gan is a writer and mentor in the development community. He writes a monthly column for SQL Server Magazine and co-authored Advanced Transact-SQL for SQL Server 2000 . He is one of the founders of Solid Quality Learning, a global provider of education and solutions for the Microsoft database platform, and serves as its principal mentor.

2005-10-12

2,399 reads

External Article

Auto Logout Users for DB Maintenance

One thing Access developers love about using SQL Server as the back end is that it is easy to do maintenance. I can't tell you how many times I toured around an office, looking for users who had their client open and connected to the data so I could ask them to log out. Too many times, the offender was at lunch or away from their desks, with their desktops locked.

2005-10-11

3,496 reads

Technical Article

Hacker's-eye view of SQL Server

If a hacker sets sights on your SQL Server, there are four primary methods he can use to take control and carry out unauthorized, malicious activity. I will look at each of these: Password compromise, Account compromise, SQL injection, Buffer overflows

2005-10-07

4,718 reads

Blogs

Free SQL Training: Dive into Databases This December!

By

Want to learn SQL and get some real practice this December? Check out the...

Monday Monitor Tips: CIS Compliant

By

A new feature added to Redgate Monitor Enterprise automatically. CIS compliance is something many...

My 2024 in Data: Music

By

This is my last week of the year working (I guess I come back...

Read the latest Blogs

Forums

Revolutionizing Entertainment with Mobile Game Development

By sophiadaniel

Mobile game development has become a cornerstone of the entertainment industry, transforming creative ideas...

Exploring the Future of Mobile App Development

By sophiadaniel

Mobile app development has become a cornerstone of modern business strategies, enabling companies to...

Events of System_health extended event serious or not

By IT researcher

I have listed the event names present in my system_health extended event report. Based...

Visit the forum

Question of the Day

Superseded Indexes

Which of these indexes is superseded by another?

See possible answers