Author: Ben Taylor

Editorials

Disk Encryption

Disk Encryption Do you need Disk Encryption? Let’s ask a few questions? Do you have a laptop you carry with information you would not like for others to obtain? Do you have complete security on all of your workstations containing protected information? Do you have servers that may be decommissioned without destroying all sensitive information? These are all scenarios we […]

Uncategorized

Online Data SAN Configuration

Online Data SAN Configuration When configuring a SAN for online services such as OLTP or OLAP databases there are so many different options to choose from. Many SAN servers are configured with a large amount of Cache resulting in acceptable performance regardless of disk configuration. On these larger SANs you may find a single RAID 5 or RAID 10 physical […]

Editorials

Online Data SAN Configuration

Online Data SAN Configuration When configuring a SAN for online services such as OLTP or OLAP databases there are so many different options to choose from. Many SAN servers are configured with a large amount of Cache resulting in acceptable performance regardless of disk configuration. On these larger SANs you may find a single RAID 5 or RAID 10 physical […]

Uncategorized

The Devil is in the Details

SSWUGtv With Stephen Wynkoop In this episode: Avoiding surprises with your SQL Server configuration… who is changing what? Raj Sabhlok of ManageEngine on the show to talk about more holistic monitoring of your servers, plus Laura Rose with time management tips. Watch the Show The Devil is in the Details In response to our editorial yesterday I received the following […]

Editorials

The Devil is in the Details

SSWUGtv With Stephen Wynkoop In this episode: Avoiding surprises with your SQL Server configuration… who is changing what? Raj Sabhlok of ManageEngine on the show to talk about more holistic monitoring of your servers, plus Laura Rose with time management tips. Watch the Show The Devil is in the Details In response to our editorial yesterday I received the following […]

Uncategorized

Understanding RAID and SQL Server

SSWUGtv: Avoiding surprises with your SQL Server configuration… who is changing what? Raj Sabhlok of ManageEngine on the show to talk about more holistic monitoring of your servers, plus Laura Rose with time management tips. [Watch the Show] Raid with DB In response to Accidental DBA editorial Adam asks,” Could you please send some article about RAID, main problems of […]

Editorials

Understanding RAID and SQL Server

SSWUGtv: Avoiding surprises with your SQL Server configuration… who is changing what? Raj Sabhlok of ManageEngine on the show to talk about more holistic monitoring of your servers, plus Laura Rose with time management tips. [Watch the Show] Raid with DB In response to Accidental DBA editorial Adam asks,” Could you please send some article about RAID, main problems of […]

Uncategorized

Reader Interaction

Reader Interaction In the editorial today we have interesting responses from our readers on the topics of Cloud Integration and Accidental DBA. Cloud Integration Frank: first thanks for your ongoing insights via SSWUG. Last was about cloud integration. One solution to integrate SQL (and other on premise applications) with the cloud is data replication. What do you think about this […]

Editorials

Reader Interaction

Reader Interaction In the editorial today we have interesting responses from our readers on the topics of Cloud Integration and Accidental DBA. Cloud Integration Frank: first thanks for your ongoing insights via SSWUG. Last was about cloud integration. One solution to integrate SQL (and other on premise applications) with the cloud is data replication. What do you think about this […]

Editorials Encryption/Data Security Townsend Security

Accidental DBA Tip

Accidental DBA Tip One of the most important tasks of an Accidental DBA is to assure that access to your database is set correctly. Developers naturally build applications using the least restrictions possible when connecting and manipulating a database so that they can rapidly develop applications. Often they use an account to connect to the database server having administrative privileges. […]