(Shaun J Stuart) I don’t spend a lot of my time tuning queries. Many of the databases in my company are used by third party products and we have limited control over the changes we can make to those. However, we do have several databases that are used by home-grown applications and these we have muc
Author: SSWUG Research
Big Data Gets Easier to Handle With IBM i TR7
IBM i shops are struggling to adapt to big data, just like organizations that use other types of servers to store their data. Whether it is email messages, social media posts, or a sequential list of invoices dating back to 1978, you will find it squirreled away inside of some DB2 for i database, so
Using the Deploy Database to SQL Azure Wizard in SQL Server Management Studio to move to the Cloud
(Brady Upton) I’ve introduced my manager to SQL Server’s cloud based platform, SQL Azure and Windows Azure Virtual Machine. He wants to test functionality with some of our applications, which would require me to move my on premise databases to the Azure Virtual Machine. What is the easiest way to ac
Creating custom rules in MySQL Enterprise Monitor
(Todd Farmer) Quite some time ago, I published scripts to implement password policies for MySQL, and promised to show how to expose violations of that policy via MySQL Enterprise Monitor (MEM). That stalled somewhat with other objectives, but I want to revisit it now that MEM 3.0 is GA. If you hav
Improving / simplifying subsystem parameter management: the DSNTXAZP discussion continues…..
(Willie Favero) My plan initially was to start a discussion on DSN8ED7 today to follow up in my October 6, 2013 discussion covering the program DSNTXAZP… See my “Improving / simplifying subsystem parameter (AKA DSNZPARM) management” post.
Custom Validations in SharePoint Form Using JQuery: Part 1
(Ayshwarya Ramakrishnan) There are times when we need to perform custom validations in a SharePoint (New/Edit) list form. This can be done using jQuery. In this article and the next, I will explain a scenario involving such validations and some gotchas.
SignalR and user identity (authentication and authorization)
(Gustavo Armenta Valdez) There are too many authentication types (Basic, Windows, Cookie, OAuth) to explain how to use all of them. In this sample, I focus on using Cookie Authentication to secure a website, a Persistent Connection, and a Hub. Authentication is configured on OWIN, you have to add so
View Data Volume Estimates
(Randolf Geist) When the optimizer has to estimate the data volume (the BYTES column in the plan output), it usually bases this information on the column statistics, if applicable and available (think of complex expressions).
SSWUGtv: Data Points Briefing- Kevin tells about some miscellaneous enhancements that are coming within the SQL Server relational engine!
Video Programming for IT Professionals
Multisets and the Relational Model
(Joe Abbate) In a comment to my previous post, David Fetter challenged me to “find a case for multisets. That we’re stuck with them doesn’t mean they’re useless.” My response was that I couldn’t help him because multisets (or bags) are not part of the relational model (which was the point of my post