Everything you should know about SQL Server JOINS

Everything you should know about SQL Server JOINS
Rate this post

The focus of this article is going to be on utilizing JOINs. We will start off by talking a bit about how JOINs are going to happen and why you need to JOIN data. Then we will take a look at the JOIN types that we have available to us and how to use them.

JOIN BASICS

JOINs in TSQL are typically going to be done on the FROM line.

JOIN-Starts-Here

Before we are getting to anything else, the real big question becomes — “Why do we have to do JOINs, and how are we actually going to perform our JOINs?” Read More

Creating and Accessing In-Memory OLTP Databases and Tables

Creating and Accessing In-Memory OLTP Databases and Tables
Rate this post

This is the second article in a series of articles about SQL Server In-Memory OLTP.

The introductory article — SQL Server In-Memory OLTP, briefly introduced the basics of the new Hekaton engine. In this part, we will focus on practice. To be more specific, we will see how to create In-Memory optimized databases and tables, and also, how to assess them with help of T-SQL. Read More

SQL Server In-Memory OLTP: The Basics

SQL Server In-Memory OLTP: The Basics
Rate this post

This is the first article in a series of articles about In-Memory OLTP. It helps you to understand how the new Hekaton engine works internally. We will focus on details of in-memory optimized tables and indexes. This is the entry-level article, which means you do not need to be an SQL Server expert, however, you do need to have some basic knowledge about the traditional SQL Server engine. Read More

Deploying Database from Source Control

Deploying Database from Source Control
Rate this post

These days, development teams start new projects from choosing a version control system. There are many benefits of source control systems in coordinating the efforts of the development team. It ensures a complete audit trail of all changes to the code and allows the team to reproduce any specific revision or build. Along with the programming code, databases can and should be placed under source control. In this article, we will have a look at how to deploy a database that is in the remote repository. Read More

Query Performance Insight: Discovering What Consumes Resources of Your Azure SQL Database?

Query Performance Insight: Discovering What Consumes Resources of Your Azure SQL Database?
Rate this post

In this post, I’d like to take a brief look at the Query Performance Insight — SQL Azure tool which will help you to identify the most expensive queries in your database.

Query Performance Insights was announced in early October 2015. To understand what it is, let’s think about how do you usually learn that the database performance got down? Probably, you are receiving emails from your clients or it takes an hour to create a weekly report instead of a several minutes, or maybe, your application starts throwing exceptions. Read More

EFFECTIVE CODE REVIEW: Uprooting Source Code Defects

EFFECTIVE CODE REVIEW: Uprooting Source Code Defects
Rate this post

Preface

In software development, a small coding error can result in a critical vulnerability that may lead to malfunction of an entire system. There are many techniques for detecting software defects such as static code analysis, manual and automated testing, pair programming, continuous integration, and of course, code inspections. However, detecting defects in software product development requires serious effort, so it is important to use the most efficient and effective methods. Read More

SQL Server Database Backup Encryption

SQL Server Database Backup Encryption
Rate this post

To manage the data security that has been backed up by the file system as a database backup files, SQL Server provides the backup encryption feature. In this article, we will talk about encryption options available in SQL Server for database backups. We will have a closer look at the usage details, benefits, and recommended practices for encrypting SQL Server database backup during the backup process. Read More