(Pinal Dave) One of my clients contacted me for assistance with whom I worked earlier to perform a Comprehensive Database Performance Health Check. They were trying to upgrade SQL Server 2016 to SQL Server 2017 in a clustered environment. First the upgrade passive nodes, it went fine.
Other News
ASP.NET MVC – jQuery Ajax Datatables with Dynamic Columns
(Asma Khalid) Jquery Datatables free plugin offers many useful features to integrate and customize a table with many web development platforms.
ProxySQL 2.0.9 Introduces Firewall Whitelist Capabilities
(Walter Garcia) In this blog, we will test a new security feature added in ProxySQL 2.0.9. Since a time ago, we have had the ability to block queries using mysql_query_rules table matching a group of queries using reg exp like a blacklist. Check out a previous blog for how to config “ProxySQL Firewa
Creating a CD Player in C#, Part 1: The Windows Functions
(Hannes DuPreez) Well, we’re going to create a simple CD player in C#. Be warned, though, that this is a lot of work. Therefore, this series being divided into three parts.
Debugging Problems Persist in Blazor WebAssembly 3.2 Preview 4
(David Ramel) Debugging functionality is a pesky problem for the Blazor WebAssembly team, with many limitations still persisting in the project scheduled for a prime-time debut next month.
19.6 vs. 20.2 Data Dictionary Changes
(Liron Amitzi) In this post I’ll show what’s new in 20.2 Data Dictionary. To see comparison between other versions, check this post.
Create Azure Infrastructure with Azure DevOps and Azure CLI Powershell scripts
(damienbod) In Azure DevOps, Pipelines can be used to create Azure infrastructure using Azure CLI and Powershell.
Connecting to an Autonomous Database using JDBC Thin client
(Syed Jaffar Hussain) I have discussed in my earlier posts about establishing SQL * Plus and using the SQLcl tool details. Today’s blog post will take you through JDBC Thin client configuration details to be able to successfully connect with an autonomous database service.
#761 OIC – Monitoring API – Getting Activity Stream data
(Niall Commiskey) Simple example here –
Encode credentials and upload to Key Protect
(Henrik Loeser) If you followed my blog or have used IBM Cloud, then you know that Key Protect (and Hyper Protect Crypto Services) is the solution to manage encryption keys on IBM Cloud.