SQL Server 2014 comes with dozens of improvements in various areas. In this presentation we will discuss and see how the new release can make the life of each and every developer easier and what are the top 5 T-SQL enhancements that we can use in our day-to-day work.
Database Configuration for Maximum SharePoint 2010 PerformanceEdwin M Sarmiento
Database configuration has a direct impact on how SharePoint 2010 performs. This presentation looks at the SQL Server database and what configuration changes can be made to maximize performance for your SharePoint 2010 farms
The document discusses some of the common tensions that exist between database administrators (DBAs) and developers, and provides guidance on how the two groups can work together more effectively as part of the same team. It outlines key responsibilities of DBAs related to security, availability, integrity, recoverability and performance of the database. It also provides tips for developers on interacting with DBAs during planning, design, development, deployment and ongoing support to help ensure projects run smoothly.
This document provides an overview of monitoring SQL Server performance. It discusses key metrics to monitor for CPU, memory, storage, and within SQL Server itself. These include processor time, memory usage, IOPS, page life expectancy, and wait stats. The document emphasizes establishing baselines and understanding normal system behavior to effectively monitor for changes. It also provides SQL Server specific metrics like buffer cache hit ratio, log flush waits, and suspicious events in the SQL Agent log to investigate further.
Top 10 DBA Mistakes on Microsoft SQL ServerKevin Kline
From the noted author of SQL in a Nutshell - Microsoft SQL Server is easier to administrate than any other mainstream relational database on the market. But “easier than everyone else” doesn’t mean it’s easy. And it doesn’t mean that database administration on SQL Server is problem free. Since SQL Server frequently grows up from small, home-grown applications, many IT professionals end up encountering issues that others have tackled and solved years ago. Why not learn from those who first blazed the trails of database administration, so that we don’t make the same mistakes over and over again. In fact, wouldn’t you like to learn about those mistakes before they ever happen?
There is a short list of mistakes that, if you know of them in advance, will make your life much easier. These mistakes are the “low hanging fruit” of application design, development, and administration. Once you apply the lessons learned from this session, you’ll find yourself performing at a higher level of efficiency and effectiveness than before.
No reuse without permission. Follow me on social media at kekline and blog at kevinekline.com.
Presentation which accompanies the article at http://www.sharepointproconnections.com/article/microsoft-products/Database-Maintenance-for-SharePoint-.aspx
SQL Server 2016 New Features and EnhancementsJohn Martin
SQL Server 2016 new features session that I delivered at SQL Relay 2015 at; Reading, London, Cardiff and Birmingham.
Looking at some of the new features currently slated for inclusion in the next version of Microsoft SQL Server 2016.
Demo Code can be found at: http://1drv.ms/1PC5smY
Collaborate 2018: Optimizing Your Robust Oracle EBS Footprint for Radical Eff...Datavail
In this session, we'll present real case studies of Datavail's proven optimization methodology and performance tuning techniques that have enabled Fortune 500 companies to scale Oracle EBS for radical efficiency, meet their most crucial business needs, and increase the lifespan of their investment.
This document provides an overview of Microsoft SQL Server performance tuning. It discusses key concepts like bottlenecks, query optimization, indexing, statistics, and best practices. The presentation aims to help attendees understand performance from different perspectives and demystify common myths. It also highlights new performance features in SQL Server 2017.
SPS Kansas City: What SharePoint Admin need to know about SQLJ.D. Wade
You will learn how SharePoint is optimized for SQL, how to properly manage and maintain the SharePoint databases, how to optimize the SQL configuration for SharePoint, what settings in SharePoint need to be changed or not changed to maintain SQL Server performance, and supported methods for providing high availability and disaster recovery.
Differences between data lakes and datawarehouseamarkayam
The main reason for writing this article is to project the difference between data lakes and data warehouses for helping you to know more about data management.
SharePoint Saturday St. Louis 2014: What SharePoint Admins need to know about...J.D. Wade
You will learn how SharePoint is optimized for SQL, how to properly manage and maintain the SharePoint databases, how to optimize the SQL configuration for SharePoint, what settings in SharePoint need to be changed or not changed to maintain SQL Server performance, and supported methods for providing high availability and disaster recovery.
1. SQL Server forSharePoint geeksA gentle introductionThomas Vochten • Septem...BIWUG
This is the presentation I delivered at the latest BIWUG meeting. I also included a list of links underneath for people that want to know more about SQL Server
Data architecture principles to accelerate your data strategyCloverDX
What are the data architecture principles you should be applying to your project design to ensure a successful outcome?
In this session (see link to full webinar at the bottom) we're walking through some of the basic elements of data architecture and some of the common patterns we’ve seen in projects. And we’ll show you how you can make your projects easier to maintain and improve as your data needs evolve.
Some of the key principles include:
Data validation at the point of data entry – how to ensure your projects aren’t derailed by bad data
Consistency – how and why you should be documenting your architecture and development practices
Avoiding duplication – how you should be thinking about reusing code to improve project maintainability
Watch the full webinar at https://www.cloverdx.com/webinars/data-architecture-principles-to-accelerate-data-strategy
Everybody refers to SharePoint when they are talking about content management, document management, records management, file storage, business intelligence and even business process automation. All of these mean different things to different people. The storage and management of information have changed, not just how to find available information, but also how that information can be stored in IT systems. Find out how Microsoft SharePoint fits into and works with other parts of the information ecosystem and what are the storage options.
Ceph - High Performance Without High CostsJonathan Long
Ceph is a high-performance storage platform that provides storage without high costs. The presentation discusses BlueStore, a redesign of Ceph's object store to improve performance and efficiency. BlueStore preserves wire compatibility but uses an incompatible storage format. It aims to double write performance and match or exceed read performance of the previous FileStore design. BlueStore simplifies the architecture and uses algorithms tailored for different hardware like flash. It was in a tech preview in the Jewel release and aims to be default in the Luminous release next year.
14 Tips for Planning ECM Content Migration to SharePointJoel Oleson
• Is your organization using any Enterprise Content Management systems besides SharePoint?
• Has your current ECM system been deprecated or require an expensive annual maintenance contract?
• Does your firm already use Microsoft SharePoint as an intranet/collaboration portal?
• Would you like to leverage the cutting edge ECM and taxonomy features in SharePoint 2010 or 2013?
If so, it may be time to migrate your scanned and other transactional documents from your legacy ECM system to SharePoint, and take advantage of innovative ECM and taxonomy features available in this powerful platform.
Top industry experts and influencers Joel Oleson and Tom Castiglia from Hershey Technologies will explain best practices to plan and implement a successful ECM content migration to Microsoft SharePoint. Join us on June 4th to learn about:
• Using ECM and taxonomy related features in SharePoint 2010 and 2013
• Reasons to migrate content to SharePoint (as well as reasons not to migrate!)
• Best practices for ECM architecture in SharePoint including security, taxonomy and governance
• 14 specific tips for planning your migration from any ECM system to SharePoint
SQL Server Wait Types Everyone Should KnowDean Richards
Many people use wait types for performance tuning, but do not know what some of the most common ones indicate. This presentation will go into details about the top 8 wait types I see at the customers I work with. It will provide wait descriptions as well as solutions.
Similar to Top 5 T-SQL Improvements in SQL Server 2014 (20)
Have you recently been in a boring presentation? I bet you were. I am also almost sure that one of the reason why you got bored is because of the speaker's slide deck. That is true because 99% of the presenters out there use their presentation software(be that PowerPoint, Prezi or Keynote) in a wrong way. This, of course, leads to missed opportunities for future business, disappointed audiences and probably miscommunicated important information. As presenters we want the opposite!
This document provides an overview of business intelligence. It defines business intelligence as transforming data into knowledge. It discusses data warehouses as single points of truth that store large amounts of differently designed data. It demonstrates extracting information from data warehouses using T-SQL and visualizing data in Excel models and Power BI reports to provide ready analytics to managers in a beautiful way.
Do you think that your data is not secured in the cloud? Is that one of the reasons for you to not migrate at least some workloads there? Things changed in the last few months in terms of Azure security. In this session we will take a closer look at what the features Row Level Security(RLS) and Dynamic Data Masking can do for your business and how they can help you secure your databases.
The Nightmare of Locking, Blocking and Isolation Levels!Boris Hristov
I am sure you all know that troubleshooting problems related to locking and blocking (hey, sometimes there are deadlocks too) can be a real nightmare! In this session, you will be able to see and understand why and how locking actually works, what problems it causes and how can we use isolation levels and various other techniques to resolve them!
How to Deliver Technical Presentations: The Right Way!Boris Hristov
Have you been to a bad presentation or is it actually you that want to gain and improve your presentation skills? In this session you will learn what makes of a great presentation and what are the mistakes that sometimes even advanced speakers do! You will see and be presented with the most important concepts and techniques that will help you go to the next level and deliver far better presentations for your audience! We will take a look at both the fundamentals and the specifics of a technical presentation and what makes one great!
Do you think that your data is not secured in the cloud? Is that one of the reasons for you to not migrate at least some workloads there? Things changed in the last few months in terms of Azure security. In this session we will take a closer look at what the features Row Level Security(RLS) and Dynamic Data Masking can do for your business and how they can help you secure your databases.
Have you been to a bad presentation or is it actually you that want to gain and improve your presentation skills? In this session you will learn what makes of a great presentation and what are the mistakes that sometimes even advanced speakers do! You will see and be presented with the most important concepts and techniques that will help you go to the next level and deliver far better presentations for your audience! We will take a look at both the fundamentals and the specifics of a technical presentation and what makes one great!
The Nightmare of Locking, Blocking and Isolation Levels!Boris Hristov
I am sure you all know that troubleshooting problems related to locking and blocking (hey, sometimes there are deadlocks too) can be a real nightmare! In this session, you will be able to see and understand why and how locking actually works, what problems it causes and how can we use isolation levels and various other techniques to resolve them!
The topic of SQL Server concurrency is one that many people want to understand really well, but at the same time is one that doesn't get the needed attention for some reason. In addition, isolation levels can play a huge role in both the performance and the scalability of every application and so the proper choice of isolation level is crucial. In this session we are going to go deep into the world of SQL Server isolation levels and see what is the behaviour of each one of them. We will discuss how we should approach the final decision on which level we should go with and how we can actually effectively troubleshoot concurrency issues. Last, but not at least, we will take a look at what is going on behind the scenes when our applications work and what differentiates one isolation level from the other. The session is suitable for both application developers and DBAs who want to advance their knowledge in the unending world of SQL Server concurrency.
Database Transactions and SQL Server ConcurrencyBoris Hristov
The document discusses database transactions and transaction management. It begins with an overview of transactions, their properties (atomicity, consistency, isolation, durability known as ACID), and how they are implemented using locks in SQL Server. It then covers transaction isolation levels, locking concepts like lock types and escalation, and how to troubleshoot locking problems including deadlocks. The document provides examples of transactions in SQL Server and demonstrations of managing transactions and concurrency.
This document discusses database performance factors for developers. It covers topics like query execution plans, table indexes, table partitioning, and performance troubleshooting. The goal is to help developers understand how to optimize database performance. It provides examples and recommends analyzing execution plans, properly indexing tables, partitioning large tables, and using a structured approach to troubleshooting performance issues.
You want rules? You need Policy-Based Management!Boris Hristov
Have you ever wanted to check, audit or even enforce a specific option or configuration in your environment? What if I tell you that you can accomplish all of these and even report on the results with just a few clicks? Interested? In this session you will learn about the "hidden power" of Policy-Based Management, Centralised Management Server and EPM Framework and how they can help you keep your environment healthy and under control!
The Nightmare of Locking, Blocking and Isolation Levels!Boris Hristov
I am sure you all know that troubleshooting problems related to locking and blocking (hey, sometimes there are deadlocks too) can be a real nightmare! In this session, you will be able to see and understand why and how locking actually works, what problems it causes and how can we use isolation levels and various other techniques to resolve them!
The Nightmare of Locking, Blocking and Isolation Levels!Boris Hristov
I am sure you all know that troubleshooting problems related to locking and blocking (hey, sometimes there are deadlocks too) can be a real nightmare! In this session, you will be able to see and understand why and how locking actually works, what problems it causes and how can we use isolation levels and various other techniques to resolve them!
The Nightmare of Locking, Blocking and Isolation Levels!Boris Hristov
This document provides an overview of locking, blocking, and transaction isolation levels in SQL Server. It begins with an introduction to locking and how SQL Server uses locks for concurrency control. It then discusses the different lock types, lock compatibility, and the lock hierarchy. The document demonstrates how to view locking information and troubleshoot locking problems. It also covers lock escalation, deadlocks, and resolving blocking issues. Finally, it concludes with an explanation of the various transaction isolation levels supported by SQL Server and how they differ in terms of concurrency and consistency.
Welcome to the nightmare of locking, blocking and isolation levels!Boris Hristov
I am sure you all know that troubleshooting problems related to locking and blocking (hey, sometimes there are deadlocks too) can be a real nightmare! In this session, you will be able to see and understand why and how locking actually works, what problems it causes and how can we use isolation levels and various other techniques to resolve them!
This document provides an introduction to Microsoft SQL Server. It discusses why data is important for businesses, how SQL Server helps manage data, and an upcoming hands-on session to learn SQL Server 2014. The document outlines the history and components of SQL Server, editions available, how to install and connect to SQL Server instances, and introduces SQL Server Management Studio as the GUI tool. It concludes with a planned Q&A session.
Welcome to the nightmare of locking, blocking and isolation levels!Boris Hristov
I am sure you all know that troubleshooting problems related to locking and blocking (hey, sometimes there are deadlocks too) can be a real nightmare! In this session, you will be able to see and understand why and how locking actually works, what problems it causes and how can we use isolation levels and various other techniques to resolve them!
Top 12 AI Technology Trends For 2024.pdfMarrie Morris
Technology has become an irreplaceable component of our daily lives. The role of AI in technology revolutionizes our lives for the betterment of the future. In this article, we will learn about the top 12 AI technology trends for 2024.
Demystifying Neural Networks And Building Cybersecurity ApplicationsPriyanka Aash
In today's rapidly evolving technological landscape, Artificial Neural Networks (ANNs) have emerged as a cornerstone of artificial intelligence, revolutionizing various fields including cybersecurity. Inspired by the intricacies of the human brain, ANNs have a rich history and a complex structure that enables them to learn and make decisions. This blog aims to unravel the mysteries of neural networks, explore their mathematical foundations, and demonstrate their practical applications, particularly in building robust malware detection systems using Convolutional Neural Networks (CNNs).
"Building Future-Ready Apps with .NET 8 and Azure Serverless Ecosystem", Stan...Fwdays
.NET 8 brought a lot of improvements for developers and maturity to the Azure serverless container ecosystem. So, this talk will cover these changes and explain how you can apply them to your projects. Another reason for this talk is the re-invention of Serverless from a DevOps perspective as a Platform Engineering trend with Backstage and the recent Radius project from Microsoft. So now is the perfect time to look at developer productivity tooling and serverless apps from Microsoft's perspective.
Cracking AI Black Box - Strategies for Customer-centric Enterprise ExcellenceQuentin Reul
The democratization of Generative AI is ushering in a new era of innovation for enterprises. Discover how you can harness this powerful technology to deliver unparalleled customer value and securing a formidable competitive advantage in today's competitive market. In this session, you will learn how to:
- Identify high-impact customer needs with precision
- Harness the power of large language models to address specific customer needs effectively
- Implement AI responsibly to build trust and foster strong customer relationships
Whether you're at the early stages of your AI journey or looking to optimize existing initiatives, this session will provide you with actionable insights and strategies needed to leverage AI as a powerful catalyst for customer-driven enterprise success.
It's your unstructured data: How to get your GenAI app to production (and spe...Zilliz
So you've successfully built a GenAI app POC for your company -- now comes the hard part: bringing it to production. Aparavi addresses the challenges of AI projects while addressing data privacy and PII. Our Service for RAG helps AI developers and data scientists to scale their app to 1000s to millions of users using corporate unstructured data. Aparavi’s AI Data Loader cleans, prepares and then loads only the relevant unstructured data for each AI project/app, enabling you to operationalize the creation of GenAI apps easily and accurately while giving you the time to focus on what you really want to do - building a great AI application with useful and relevant context. All within your environment and never having to share private corporate data with anyone - not even Aparavi.
Increase Quality with User Access Policies - July 2024Peter Caitens
⭐️ Increase Quality with User Access Policies ⭐️, presented by Peter Caitens and Adam Best of Salesforce. View the slides from this session to hear all about “User Access Policies” and how they can help you onboard users faster with greater quality.
Redefining Cybersecurity with AI CapabilitiesPriyanka Aash
In this comprehensive overview of Cisco's latest innovations in cybersecurity, the focus is squarely on resilience and adaptation in the face of evolving threats. The discussion covers the imperative of tackling Mal information, the increasing sophistication of insider attacks, and the expanding attack surfaces in a hybrid work environment. Emphasizing a shift towards integrated platforms over fragmented tools, Cisco introduces its Security Cloud, designed to provide end-to-end visibility and robust protection across user interactions, cloud environments, and breaches. AI emerges as a pivotal tool, from enhancing user experiences to predicting and defending against cyber threats. The blog underscores Cisco's commitment to simplifying security stacks while ensuring efficacy and economic feasibility, making a compelling case for their platform approach in safeguarding digital landscapes.
DefCamp_2016_Chemerkin_Yury-publish.pdf - Presentation by Yury Chemerkin at DefCamp 2016 discussing mobile app vulnerabilities, data protection issues, and analysis of security levels across different types of mobile applications.
Discovery Series - Zero to Hero - Task Mining Session 1DianaGray10
This session is focused on providing you with an introduction to task mining. We will go over different types of task mining and provide you with a real-world demo on each type of task mining in detail.
"Hands-on development experience using wasm Blazor", Furdak Vladyslav.pptxFwdays
I will share my personal experience of full-time development on wasm Blazor
What difficulties our team faced: life hacks with Blazor app routing, whether it is necessary to write JavaScript, which technology stack and architectural patterns we chose
What conclusions we made and what mistakes we committed
Welcome to Cyberbiosecurity. Because regular cybersecurity wasn't complicated...Snarky Security
How wonderful it is that in our modern age, every bit of our biological data can be digitized, stored, and potentially pilfered by cyber thieves! Isn't it just splendid to think that while scientists are busy pushing the boundaries of biotechnology, hackers could be plotting the next big bio-data heist? This delightful scenario is brought to you by the ever-expanding digital landscape of biology and biotechnology, where the integration of computer science, engineering, and data science transforms our understanding and manipulation of biological systems.
While the fusion of technology and biology offers immense benefits, it also necessitates a careful consideration of the ethical, security, and associated social implications. But let's be honest, in the grand scheme of things, what's a little risk compared to potential scientific achievements? After all, progress in biotechnology waits for no one, and we're just along for the ride in this thrilling, slightly terrifying, adventure.
So, as we continue to navigate this complex landscape, let's not forget the importance of robust data protection measures and collaborative international efforts to safeguard sensitive biological information. After all, what could possibly go wrong?
-------------------------
This document provides a comprehensive analysis of the security implications biological data use. The analysis explores various aspects of biological data security, including the vulnerabilities associated with data access, the potential for misuse by state and non-state actors, and the implications for national and transnational security. Key aspects considered include the impact of technological advancements on data security, the role of international policies in data governance, and the strategies for mitigating risks associated with unauthorized data access.
This view offers valuable insights for security professionals, policymakers, and industry leaders across various sectors, highlighting the importance of robust data protection measures and collaborative international efforts to safeguard sensitive biological information. The analysis serves as a crucial resource for understanding the complex dynamics at the intersection of biotechnology and security, providing actionable recommendations to enhance biosecurity in an digital and interconnected world.
The evolving landscape of biology and biotechnology, significantly influenced by advancements in computer science, engineering, and data science, is reshaping our understanding and manipulation of biological systems. The integration of these disciplines has led to the development of fields such as computational biology and synthetic biology, which utilize computational power and engineering principles to solve complex biological problems and innovate new biotechnological applications. This interdisciplinary approach has not only accelerated research and development but also introduced new capabilities such as gene editing and biomanufact
The History of Embeddings & Multimodal EmbeddingsZilliz
Frank Liu will walk through the history of embeddings and how we got to the cool embedding models used today. He'll end with a demo on how multimodal RAG is used.
9. Data pages are located in,
or read into, the buffer cache
and then modified
2
Modification is recorded
in transaction log on disk3
Later, checkpoint writes
dirty pages to database
4
Buffer Cache
Transaction’s lifecycle
11. Data pages are located in,
or read into, the buffer cache
and then modified
2
Modification is recorded
in transaction log on disk3
Later, checkpoint writes
dirty pages to database
4
Buffer Cache
Transaction’s lifecycle
19. Why is the CE so important?
Why is the CE so important?
20. The CE
has not been
changed since
SQL Server 7.0
…and at the same time
21. Queries with Multiple
Predicates
Queries Joining Multiple
Tables
New Data Not Presented
in the Stats
Almost everywhere…
(this, oh btw, means you have
to test a lot!)
Where to expect changes?
Standard Edition too
Change tracking and change data captureAll transactions with change tracking are fully durable. A transaction has the change tracking property if it does any write operations to tables that are enabled for either change tracking or change data capture (CDC).
Crash recovery Consistency is guaranteed, but some changes from delayed durable transactions that have committed may be lost.
Cross-database and DTC If a transaction is cross-database or distributed, if is fully durable, regardless of any database or transaction commit setting.
Always On Availability Groups and MirroringDelayed durable transactions do not guarantee any durability on either the primary or any of the secondaries. In addition, they do not guarantee any knowledge about the transaction at the secondary. After commit, control is returned to the client before any acknowledgement is received from any synchronous secondary.
Failover clusteringSome delayed durable transaction writes might be lost.
Transaction ReplicationDelayed durable transactions do not guarantee their replication. Transactions are only replicated after they have been made durable.
Log shippingOnly transactions that have been made durable are included in the log that is shipped.
Log BackupOnly transactions that have been made durable are included in the backup.
When you say to the DBAs it’s slow here is what they see.
Wouldn’t it be interesting if…
60 KB buffer -> flush
Sp_flush_log
Durable transaction – MSDTC or Cross database
How many of you have heard about this improvement? What is – QE assignes costs to each plan and the one with lowest cost is choosen. Those costs are actually how many rows are we going to be proceeded for each operator and that’s the work of the cardinality estimator
Talk about the problem – slow queries in general
Under estimation – disk spills, serial plans, bad indexes chosen or join orders
Over estimation – more memory assigned, parallel plan and not serial
So, what is a cardinality estimator? A cardinality estimator is the component of the query processor whose job is to estimate the number of rows returned by relational operations in a query. This information, along with some other data, is used by the query optimizer to select an efficient execution plan. Cardinality estimation is inherently inexact, as it is a mathematical model which relies on statistical information. It is also based on several assumptions which, although not documented, have been known over the years – some of them include the uniformity, independence, containment and inclusion assumptions. A brief description of these assumptions follows.
Uniformity. Used when the distribution for an attribute is unknown, for example, inside of range rows in a histogram step or when a histogram is not available.
Independence. – сямтаме, че данните в колоните са независими освен ако изрично не е казано, че те са.
Containment. Смятаме че ако нещо се търси значи съществува.
Inclusion. Когато имаме where x = нещо – нещото винаги съществува и стойността му е точно такава, каквато я имаме в хистограмата на статистиките.
Stats: Density – the uniqnes of a column
Histogram – data distribution
Statistics on ascending or descending key columns, such as IDENTITY or real-time timestamp columns, might require more frequent statistics updates than the query optimizer performs. Insert operations append new values to ascending or descending columns. The number of rows added might be too small to trigger a statistics update. If statistics are not up-to-date and queries select from the most recently added rows, the current statistics will not have cardinality estimates for these new values. This can result in inaccurate cardinality estimates and slow query performance. For example, a query that selects from the most recent sales order dates will have inaccurate cardinality estimates if the statistics are not updated to include cardinality estimates for the most recent sales order dates.
Trace flags 2389 + 2390
With one predicate – no difference except if there are no outdated statistics. If they are the new will consider the total number of rows and the old will consider the statistics
With more than one – it considers that they are correlated and calculates it in a different way
In Joins – quite better (with column joining). With more than one column – new CE underestimates a lot!
With joins with multiple tables and multiple columns there could be even changes in the execution plans!
For modulo % - very good! X