Automating SQL Server Installation

By Rohit Khadka, Sr. Database Administrator As a Production DBA, I have had the opportunity to do an upgrade/migration from SQL Server 2012 to SQL Server 2016. During the process, I realized that installing a new SQL Server on 20-30 servers in a short time was going to be challenging and monotonous. Going through the […]

READ MORE
The Usefulness of a Little R in SQL

Work smarter: Little R

By Rohit Khadka, Sr. Database Administrator At some point of our DBA career, we all have had an opportunity to run a set of scripts one by one for each instance until your fingers and mouse gave up. Then, we came back to work next day with a bandage wrapped around our fingers and continue […]

READ MORE
Eliminating Redundant Indexes

Reclaiming Space

Recently I was called into a shop that had a 4 terabyte database, who claimed they didn’t have anywhere near that much data. Upon investigation, they were correct. They had about 100 gig of data, and about 3.9 T of indexes. Is this too much? Well, in order to make that kind of judgement call […]

READ MORE

On-Prem vs Cloud – Where Should You Put Your Data?

For many businesses, it is hard to determine whether online or on-premises storage is the right choice. There are many considerations to take into account, including their benefits and challenges. Let’s analyze both options to help companies decide on the correct option. What is Cloud Software? Cloud solutions allow companies to manage, store and access […]

READ MORE
database management systems durability

What is Durability in Databases Management Systems?

Durability is the property that makes sure that transactions are permanently stored and do not disappear or are erased by accident, even during a database crash. It is accomplished by storing all transactions into a non-volatile storage medium. Durability is part of the ACID acronym, which was popularized by Theo Harder and Andreas Reuter in […]

READ MORE
what-is-data-obfuscation

Data Obfuscation – what is it?

Data obfuscation consists of changing sensitive data or personally identifying information (PII), intending to protect confidential information in non-productive databases. A successful obfuscation is when the data maintains referential integrity, as well as its original characteristics, which guarantees that the development, testing, and installation of the applications are successful. This technique is used in non-productive […]

READ MORE
cyber-security-and-you-how-working-from-home-affects-your-network

Cyber Security and You: How Working from Home Affects Your Network

Cyber Security must keep up. The increasing technology of our time has led to an explosion in different types of work that can be done from the comfort of home. One can write, edit, and proofread articles, curating content in their pajamas if they wish! Some modern technology companies allow employees to work remotely on […]

READ MORE
detecting Data Breach

Data Breach, Types & Detection Learn Before It’s Too Late

Types of Data Breaches Exploit is a kind of data breach attack that benefits from software bugs or vulnerabilities, which cybercriminals use to obtain illegal access to a network and its data. Such vulnerabilities are hidden within the code of the system, and it’s just a matter of time to know who will find them […]

READ MORE