Most Popular

A Layman’s Guide to Climbing the SQL Server Index B-tree (Part 2)

Read Part 1 Read Part 3 This is a continuation of Climbing the SQL Server Index B-tree. In Part 1, we dove down into the SQL Server® pages for a Clustered Index in the Sales.SalesOrderDetail table in the AdventrueWorks2012 database. In this paper, we will look at the data pages of the same table/database for unique-nonclustered […]

Read More

A Layman’s Guide to Climbing the SQL Server Index B-tree (Part 1)

Read Part 2 Read Part 3 The term “geek” applies to me because I am always wondering/tinkering with things that I don’t readily understand. Recently, I’ve become intrigued with “what’s under the covers” with SQL Server Indexes. Part 1 of this paper will dive down and look at the important items on each data page […]

Read More

SQL Server Clustered Index Btree Traversal

–Brought to you as a script! Enjoy –� 2017 | ByrdNest Consulting –Index B-Tree Analysis /************************************************************************************ This script explores clustered, unique-nonclustered, and nonclustered indexes at the page level. Most likely the page ids used here will change in your database configuration and setup — mine rarely used same page ids even with repetitive usage. However, […]

Read More

A Tidbit on SQL Server Indexing

Over last 18 months, I’ve given several SQL Saturday (and a PASS Virtual DBA) presentations on indexes.  These presentations have evolved and I find it hard to complete the material I want to address in 60 minutes. But the more I dive into the material, the more I am learning. Several times I have been […]

Read More

Overcoming Customer Support Challenges in Educational Institutions

Overcoming Customer Support Challenges in Educational Institutions   As the school year begins, IT customer support personnel across the country gear up for an intense back-to-school experience as campuses are flooded with students, faculty, staff, and alumni—each bringing multiple devices and each arriving with the expectation of fast and efficient IT support should the need […]

Read More

Helping Students and Faculty Help Themselves

Helping Students and Faculty Help Themselves   When an end user can easily look up, locate, and apply their own resolution, we have what’s called a level 0 self-service. The simplest example of this is a password reset. In an automated password reset, the end-user clicks a link, enters some identifying information, and then changes […]

Read More

Harness the Power of Automated Help Desk Ticketing

Harness the Power of Automated Help Desk Ticketing Most companies don’t start as large, complex organizations with many employees. They grow over time. Virtually every business these days uses computers to some degree, which means you will need an IT help desk. A manual system of calling or emailing IT support staff to request help […]

Read More

Is Syslog Useful?

<syslog_output> <server>192.168.1.1</server> </syslog_output> Many people are familiar with the above commands, which are used for forwarding syslog to the syslog server (192.168.1.1). However, do you know how syslog can be helpful? Read on to find out how and see some different use cases for enabling syslog in your infrastructure. The primary use of syslog is […]

Read More

Hardware Upgrades and Replacements—Accurate Forecasts or Educated Guesses?

Hardware Upgrades and Replacements—Accurate Forecasts or Educated Guesses? All organizations have multiple computers and devices to keep track of these days. Your company is no exception. This equipment might all be in a single office, or for larger businesses, scattered across the globe. Either way, managing this inventory can be difficult, time-consuming, and error-prone. Tracking […]

Read More

Top Five Cyberthreats That Can Kill Your Business Growth

 Top Five Cyberthreats That Can Kill Your Business Growth Neglecting your organization’s cybersecurity can seriously harm your business. Investors quickly lose interest in investing in companies that have been hacked or suffer from other cyberattacks. The revelation of two massive data breaches at Yahoo®, affecting one billion users, threatened to derail the Verizon® offer to […]

Read More