Life is dirty. So is your data. Get used to it.
The internet provides everyone the ability to access data at any time, for any need. Unfortunately, it does not help guarantee that the data is valid, or clean. In the past year I have earned...
View ArticleNo, You Don’t Need a Blockchain
The hype around blockchain technology is reaching a fever pitch these days. Visit any tech conference and you’ll find more than a handful of vendors offering blockchain. This includes Microsoft, IBM,...
View ArticleUse PWDCOMPARE() to Find SQL Logins With Weak Passwords
Not a day, week, or month goes by without news of yet another data breach. And the breaches aren’t the result of some type of Mission Impossible heist. No, it’s often an unprotected S3 bucket, maybe...
View ArticleSQL Injection Protection
SQL injection is a common form of data theft. I am hopeful we can make SQL injection protection more common. The 2018 TrustWave Global Security Report listed SQL Injection as the second most common...
View ArticleSQL Plan Warnings
There are many methods available for optimizing the performance of SQL Server. One method in particular is examining your plan cache, looking for query plan warnings. Plan warnings include implicit...
View ArticleTune Workloads, Not Queries
Ask three DBAs about their preferred performance tuning methodology and you will get back seven distinct answers. I bet a pound of bacon one of the answers will be “it depends”. Of course, it depends!...
View ArticleYou Can’t Marry Your Database, But You Can Have Relations
There’s something you should know about relational databases. They were designed to store data efficiently, protecting the quality of the data written and stored to disk. I’ve written before about...
View Article