Most Popular

3 Things You Might Not Know About SQL Server TempDB and Performance

SQL Server has four system databases by default and one of them is called TempDB. TempDB is used for many operations, such as user-created temporary objects, internal temporary objects and version stores and certain features like online re-indexing, multiple active record sets (MARS) and others. Since TempDB is shared across all databases and all connections in SQL […]

Read More

What You Should Know About SQL Server 2016 ColumnStore Indexes

One of the exciting features for data warehouse queries in SQL Server 2012 was the columnstore index. These are designed to provide good performance on analytical queries without the need to explicitly specify indexes. There were, however, many restrictions for their use, including: Columnstore indexes had fewer supported datatypes. Columnstore indexes were Non-updatable–once created, the table would become read-only. […]

Read More

Oracle PL/SQL and VARCHAR2 Memory Allocation

The biggest challenge of explaining efficient ways of using the VARCHAR2 data type is the fact that its table storage implementation is often confused with its PL/SQL implementation. VARCHAR2 is named for the VARiable length of CHARacters, which implies dynamic allocation of storage. This mechanism is usually efficient from the perspective of persistent tables because […]

Read More

IT’s a MAAD World

All around me are familiar faces Worn out places, worn out faces Bright and early for the daily races Going nowhere, going nowhere…   And I find it kind of funny I find it kind of sad The dreams in which I’m dying are the best I’ve ever had I find it hard to tell […]

Read More

Windows Guest Licensing: To KMS or Not?

In order to better combat software piracy, Microsoft introduced License Activation with Windows XP/Server 2003; however, activation was pretty much implied and automatic if you had volume license keys. When these keys, generated for individual organizations, inevitably leaked to the general public, Microsoft added activation on volume license keys with the release of Windows Vista […]

Read More

The Challenges of Network Virtualization Technologies

Network virtualization, software defined network (SDN), and network function virtualization (NFV) have taken the communication industry by storm. They are no longer buzzwords; the industry is seriously focusing and converging on them. And why shouldn’t the industry focus on them? They are supposed to bring down OPEX and CAPEX by commoditizing the network elements.  Commodity […]

Read More

How to Prevent the Cost of a Data Breach from SQL Injection Attacks

The average total cost of a data breach right now is $3.79 million, according to the 2015 Cost of Data Breach Study: Global Analysis. Cyber attacks are one of the top reasons for this exorbitant sum. Hackers attack websites to gather commercial information, consumer information, or targeted profiles. Data breach attempts need to be thwarted quickly. […]

Read More

Looking Backward to Look Forward

“Whoever wishes to foresee the future must consult the past” -unspecified “wise men” quoted by Niccolò Machiavelli With so many articles out there telling me how SDN will change the network as we know it, I’ve been thinking about what the future holds for networking. Thus if the wisdom reported by Machiavelli is to be […]

Read More

How to Explain Virtualization to Newbies

In the world of enterprise architecture, many parts of our daily conversations are taken for granted. We talk about virtualization, vMotion®, Storage vMotion, Replication, IOPS, and so very many other jargon-filled statements. We know these things, understand the concepts, and feel that our conversations amongst industry veterans can use these concepts without explanation. Even when […]

Read More

Get These 4 Things Right to Prevent Security Breaches

According to the Verizon 2015 Data Breach Investigations Report, there have been 79,790 security incidents reported. This amounts to around 218 security incidents per day, or, roughly about 10 incidents an hour. Oh, and here’s the best part: 60% of the attackers are able to compromise an organization’s data within minutes. That’s MINUTES! These statistics […]

Read More