+44 (0)20 3051 3595 | info@coeo.com | Client portal login

The Coeo Blog

Get DRY with Power BI

Save yourself time working with Power BI.

BACKUP LOG was unable to log updates for database in SQL Server 2016

If you’re running SQL Server 2016, you may want to install SQL Server Service Pack 1, CU8. I came across an issue recently that effectively caused the transaction log backups to hang. Through our proactive monitoring, we were alerted to the fact that a log backup had not been taken in 4 hours. Upon..

Is this the end of SQL Server Failover Cluster Instances?

One of the common customer queries we get at Coeo is how to provide high availability for SQL Server. I have been advocating the use of SQL Server Failover Cluster Instances (FCI) to provide high availability for over 10 years. However, during a review of our reference architecture the question..

Recovering from Disaster - a five-point plan

Too often, a disaster recovery plan can look a little like it was put together by the underpants gnomes.

Phase 1: Take database backups

Phase 2: ???

Phase 3: Recovered from disaster

Starting with taking backups isn’t the worst idea (can’t say the same for collecting underpants), but this approach..

New vCore purchasing option for Azure SQL Database

Managed Instance is now in public preview and with it is a purchasing option we haven't yet seen with traditional Azure SQL Database offerings, known as the vCore purchasing model.  Earlier this month, Microsoft announced this model is now available in preview for Single Database and Elastic Pool..

Azure Service Endpoints - how do they work?

It’s been a while since my last blog post, but the beauty of time marching forwards is that lovely new features get released in Azure for me to write about.

Something I always remember as a kid is that when we got a cool new bit of technology, I'd use it for a while and then my next port of call..

Simplifying key management in SQL Server by using Azure Key Vault

Implementing Transparent Data Encryption (TDE), Backup Encryption, Always Encrypted, Symmetric key and Asymmetric keys all require that a final secret is stored at some point which protects the encryption key(s) used to secure the data. The main difference between a symmetric and asymmetric key is..

Player harm and technological change – high stakes for operators as well as players?

In 2005, the Gambling Act came into force, designed to set out a legislative structure that included measures for player protection that could cope with modern electronic gambling. However, the increasing pace of technological change has led to concerns that this legislation has fallen behind and..

Working with Technical Debt

As someone who has worked with many clients across many industries one of the common problems I see is companies who are finding it hard to juggle all the adhoc requests that come in to their data team. Report requests, data modifications, minor deployments, fixes or query performance tuning; no..

Using "With (nolock)"? Read this

Anyone that's worked with SQL for any length of time will undoubtedly have seen and heard the following

Back to top