Many times when people think about security principles the one that jumps out to them is the principle of least privilege. However, there are other security principles to consider. Let’s look at 8 security principles laid out decades ago that are still relevant today.Read More »
On Saturday April 27th I’ll be speaking at SQL Saturday Raleigh. I am excited to be presenting a lively and practical session about Environmental SQL Server Troubleshooting.
When called in to diagnose a performance issue what are the 1st things you review? Many DBAs and developers make the mistake of diving straight into the code looking for an answer. However, often times the solution is not in the code but rather in the overall environment.
Environmental troubleshooting is often a quick and overlooked method for discovering and configuring SQL Server to perform at a higher level without the need for application change controls.
In this session we will discuss both performance pitfalls and optimizations that can be made to the system outside of code changes. We will diagnose configurations commonly misapplied and review best practices in SQL Server, Windows Server, and VMware!
If you want a preview of the talk and some supplemental info please look at these:
- Environmental Checks – Overview
- SQL Server Environmental Diagnostics Guide
- Windows Server Environmental Diagnostics Guide
- VMware Environmental Diagnostics Guide
These are all available under the Resources menu at the top of the page.
The topic for this months T-SQL Tuesday #113 hosted by Todd Kleinhans (Blog / Twitter) is about “what do YOU use a database for”. We work all day, night, and weekend sometimes on our database craft. Todd asks:
So what do you use databases for in your personal life that you are willing to share?
Read on to hear my story.Read More »
The proliferation of online login accounts has made our lives easier and more convenient to gather information, pay bills, etc. However, it comes at a cost. Our password management hasn’t changed much – and that creates a vulnerability that can really hurt.
Read on to see the pros and cons of password management systems.Read More »