Many times when people think about security principles the one that jumps out to them is the principle of least privilege. However, there are other security principles to consider. Let’s look at 8 security principles laid out decades ago that are still relevant today.Read More »
On Saturday April 27th I’ll be speaking at SQL Saturday Raleigh. I am excited to be presenting a lively and practical session about Environmental SQL Server Troubleshooting.
When called in to diagnose a performance issue what are the 1st things you review? Many DBAs and developers make the mistake of diving straight into the code looking for an answer. However, often times the solution is not in the code but rather in the overall environment.
Environmental troubleshooting is often a quick and overlooked method for discovering and configuring SQL Server to perform at a higher level without the need for application change controls.
In this session we will discuss both performance pitfalls and optimizations that can be made to the system outside of code changes. We will diagnose configurations commonly misapplied and review best practices in SQL Server, Windows Server, and VMware!
If you want a preview of the talk and some supplemental info please look at these:
- Environmental Checks – Overview
- SQL Server Environmental Diagnostics Guide
- Windows Server Environmental Diagnostics Guide
- VMware Environmental Diagnostics Guide
These are all available under the Resources menu at the top of the page.
The topic for this months T-SQL Tuesday #113 hosted by Todd Kleinhans (Blog / Twitter) is about “what do YOU use a database for”. We work all day, night, and weekend sometimes on our database craft. Todd asks:
So what do you use databases for in your personal life that you are willing to share?
Read on to hear my story.Read More »
The proliferation of online login accounts has made our lives easier and more convenient to gather information, pay bills, etc. However, it comes at a cost. Our password management hasn’t changed much – and that creates a vulnerability that can really hurt.
Read on to see the pros and cons of password management systems.Read More »
Using a VPN is critical for protecting yourself online and maintaining a level of privacy. It might sound technical and intimidating but it is as easy as checking email – and the benefits are significant.
Let’s discuss what you can do and why to stay safe online.Read More »
The topic for this months T-SQL Tuesday #112 hosted by Shane O’Neill (Blog / Twitter) is about “dipping into your cookie jar”. This reference means “when times get tough how do you dip into your reserves to keep going”. Shane asks the following:
That is what I want from the contributors of this T-SQL Tuesday, those memories that they can think back on for sustenance. Like the humble cookie, I want a humble brag.
Read on as I share some stories…Read More »
Wait statistic are a fundamental concept of any RDBMS. Let’s review some basics of troubleshooting performance issues with wait statistics.Read More »
Recently there were two huge data breaches of two very large companies. Both organizations collected a ton of information about their clients. The breaches were both spectacular in scope. Furthermore, both were among the largest known data breaches.
I see a large contrast between the Marriott breach and the Equifax breach. The difference between the two massive breaches clearly demonstrates the importance of basic security methods.Read More »
Location services abound in apps everywhere. Your smartphone is constantly tracking your location whether to guage traffic, share with loved ones your whereabouts, or get the weather. However, this can lead to all sorts of abuses which are not immediately obvious to most.
Let’s delve into it and see what’s at stake.
Read More »