Schema Compare for SQL Server
Today I'm going to show how to do a schema compare using only SSMS, dacpac files, and the FC (File Compare) command available in Windows. If you need to do a schema compare but are limited in your...
View ArticleAnnouncing the Launch of SQL Server Buzzfeed!
[UPDATED: Happy April Fool’s day folks, there is no such thing as SQL Server Buzzfeed. I do hope you were able to get a laugh or two from the headlines.] After months of work, I am excited to announce...
View ArticleSQL Audit Not Showing Full SQL Statement
I noticed some MSDN forum posts regarding SQL Audit not showing the full SQL statement. To the end user, it appears that SQL Audit is truncating of SQL statements. I decided to write a quick post to...
View ArticleDatabases 101
A short time ago a colleague asked me where he could find a “Databases 101” guide for the non-technical professional. As it turns out, the internet is littered with information, and mis-information,...
View ArticleDesigning a Database: 7 Things You Don’t Want To Do
Your database design is awful. The reason nobody has told you this yet is for one of two reasons: ignorance or apathy. They either don’t know it’s bad, or they don’t care. Well *I* care about bad...
View ArticleThe Cause of Every Deadlock in SQL Server
First, a quick definition and example for those that don’t know what deadlocks are inside of a database. A deadlock happens when two (or more) transactions block each other by holding locks on...
View ArticleLife is dirty. So is your data. Get used to it.
The internet provides everyone the ability to access data at any time, for any need. Unfortunately, it does not help guarantee that the data is valid, or clean. In the past year I have earned...
View ArticleNo, You Don’t Need a Blockchain
The hype around blockchain technology is reaching a fever pitch these days. Visit any tech conference and you’ll find more than a handful of vendors offering blockchain. This includes Microsoft, IBM,...
View ArticleUse PWDCOMPARE() to Find SQL Logins With Weak Passwords
Not a day, week, or month goes by without news of yet another data breach. And the breaches aren’t the result of some type of Mission Impossible heist. No, it’s often an unprotected S3 bucket, maybe...
View ArticleSQL Injection Protection
SQL injection is a common form of data theft. I am hopeful we can make SQL injection protection more common. The 2018 TrustWave Global Security Report listed SQL Injection as the second most common...
View ArticleSQL Plan Warnings
There are many methods available for optimizing the performance of SQL Server. One method in particular is examining your plan cache, looking for query plan warnings. Plan warnings include implicit...
View ArticleTune Workloads, Not Queries
Ask three DBAs about their preferred performance tuning methodology and you will get back seven distinct answers. I bet a pound of bacon one of the answers will be “it depends”. Of course, it depends!...
View ArticleYou Can’t Marry Your Database, But You Can Have Relations
There’s something you should know about relational databases. They were designed to store data efficiently, protecting the quality of the data written and stored to disk. I’ve written before about...
View Article