Interested in migrating your on-premise Microsoft SQL Server to Azure? One of Guru DBAs, Maninder Singh, has created this detailed presentation on moving SQL Server VMs to Microsoft Azure.
By Rohit Khadka, Sr. Database Administrator As a Production DBA, I have had the opportunity to do an upgrade/migration from SQL Server 2012 to SQL Server 2016. During the process, I realized that installing a new SQL Server on 20-30 servers in a short time was going to be challenging and monotonous. Going through the […]
By Rohit Khadka, Sr. Database Administrator At some point of our DBA career, we all have had an opportunity to run a set of scripts one by one for each instance until your fingers and mouse gave up. Then, we came back to work next day with a bandage wrapped around our fingers and continue […]
Things you are doing wrong in SQL Server (and how to do them right). With our CEO, Jeff Garbus.
Recently I was called into a shop that had a 4 terabyte database, who claimed they didn’t have anywhere near that much data. Upon investigation, they were correct. They had about 100 gig of data, and about 3.9 T of indexes. Is this too much? Well, in order to make that kind of judgement call […]
For many businesses, it is hard to determine whether online or on-premises storage is the right choice. There are many considerations to take into account, including their benefits and challenges. Let’s analyze both options to help companies decide on the correct option. What is Cloud Software? Cloud solutions allow companies to manage, store and access […]
Durability is the property that makes sure that transactions are permanently stored and do not disappear or are erased by accident, even during a database crash. It is accomplished by storing all transactions into a non-volatile storage medium. Durability is part of the ACID acronym, which was popularized by Theo Harder and Andreas Reuter in […]
Data obfuscation consists of changing sensitive data or personally identifying information (PII), intending to protect confidential information in non-productive databases. A successful obfuscation is when the data maintains referential integrity, as well as its original characteristics, which guarantees that the development, testing, and installation of the applications are successful. This technique is used in non-productive […]
Cyber Security must keep up. The increasing technology of our time has led to an explosion in different types of work that can be done from the comfort of home. One can write, edit, and proofread articles, curating content in their pajamas if they wish! Some modern technology companies allow employees to work remotely on […]