When DBAs are troubleshooting issues, solutions are sometimes applied in the heat of a critical incident which solve the problem, which are then walked away from because the issue has been “fixed”. With experience and a better understanding of the broader issue of long-term solutions, you..
In this blog post I will explore the difference between the ‘SELECT … INTO’ and ‘INSERT … SELECT’ statements. I recently moved some data for a customer to a brand-new table due to the bad design of the source table. First, I created the destination table and then I ran the ‘INSERT … SELECT’..
When you have a database which has just been created and is in the FULL recovery model, or you have an existing database you are changing from SIMPLE to FULL, you need to take a full backup before you are able to take log backups, as there needs to be a starting point for the log chain. There is a..
The TempDB database is special in many ways, but an interesting aspect is that when its files automatically grow when they become full, this growth is not persisted and will be undone on the next restart of the SQL Server service. We can see how this works by looking at two system tables:..
Speaking at events isn’t something that comes naturally to me and I think many people who work in the tech industry find computers easier to interact with than humans. Nevertheless, I think public speaking is a really worthwhile skill; whether to small groups or large conferences it’s important..
SQL Bits is a highlight of the year for European data professionals and this February's conference schedule is shaping up to be an exciting one.
A whole series of “speculative execution side-channel attacks” were disclosed in the first week of 2018, as detailed in this Microsoft article: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
Major security events like this highlight the severe risk companies are..
Power BI is free of charge to use. Anyone can download the Power BI Desktop application from the Microsoft Store, import and mashup data from various sources and create beautiful visualisations of business metrics.There comes the point, however, when you wish to share this content with your..
Looking back over 2017, we can see it has been another year highlighting the importance of good cyber security and procedure with the cost of ransomware attacks estimated to cost $5 Billion alone.One particularly critical issue is the recently discovered Meltdown and Spectre bugs affecting CPUs...
Anyone working in or around financial services would have been hiding under a rock if they don’t know that MiFID II came into force on January 3rd. After a shaky start where introduction was delayed by a year due to the inability of organisations to comply, this new regulation is now in place..