The document discusses a SQL Saturday Night presentation on working with SQL Server Agent. SQL Server Agent allows administrators to automate administrative tasks through the use of jobs, schedules, alerts, and operators. The presentation covers configuring SQL Server Agent, setting security, and using tools to automate SQL Server administration.
This document discusses the career and qualifications of Antonios Chatzipavlis, a database architect and SQL Server evangelist. It notes that he has been working with computers since 1982 and SQL Server since version 6.0 in 1996. It outlines the various Microsoft certifications he has earned, including MCSE, MCDBA, and MCSA. It also mentions that he created the SQL School Greece training organization and has over 20,000 hours of training experience.
Moving Windows Applications to the CloudRightScale
This document summarizes a webinar about moving Windows to the cloud. It discusses:
- Key differences between Windows in the cloud vs on-premises like dynamic IP addresses, ephemeral instances, and bringing your own licenses.
- Challenges of Windows in the cloud like inconsistent images, inflexible pre-installed software, and lack of automation.
- How RightScale addresses these with consistent "RightImages", scriptable and versioned "ServerTemplates", and automation of deployments using "RightLink".
- A demonstration of automating user creation across servers using RightLink tags and remote execution.
- Next steps involve scripting application installation, enabling existing Windows images with Right
Tips to install and manage always on availability groups in sql server 2012 &...Antonios Chatzipavlis
This document provides an overview and agenda for a presentation on AlwaysOn Availability Groups in SQL Server 2012 and 2014. It covers topics such as: understanding AlwaysOn availability groups; availability modes; active secondary replicas; failover options; flexible failover policies; enhancements in SQL Server 2014; prerequisites; installation scenarios; and tips from experience implementing availability groups. The presenter's background and certifications are also listed.
Introduction to SQL Server Analysis services 2008Tobias Koprowski
This is my presentation from 17th Polish SQL server User Group Meeting in Wroclaw. It\'s first part of Quadrology Bussiness Intelligence for ITPros Cycle.
2AM. We sleeping well. And our mobile ringing and ringing. Message: DISASTER! In this session (on slides) we are NOT talk about potential disaster (such BCM); we talk about: What happened NOW? Which tasks should have been finished BEFORE. Is virtual or physical SQL matter? We talk about systems, databases, peoples, encryption, passwords, certificates and users. In this session (on few demos) I'll show which part of our SQL Server Environment are critical and how to be prepared to disaster. In some documents I'll show You how to be BEST prepared.
This document provides an overview and introduction to SQL Server 2012 high availability and disaster recovery features including log shipping, database mirroring, AlwaysOn availability groups, and SQL Server clustering. It begins with background about the author and an outline of the topics to be covered. The document then goes on to explain each high availability technology individually, providing details on how each works, when they should be used, and the configuration process. Business cases and recommendations for when to use each technology are also provided.
SQL Server Source Control for Beginners is a presentation about using source control for SQL Server databases. It discusses:
- Common source control systems like SVN, TFS, and Mercurial that can be used to track database changes.
- How RedGate SQL Source Control allows committing database objects and changes directly from SQL Server Management Studio.
- Key features like rolling back changes, maintaining referential integrity, and locking objects while working.
- Demonstrates setting up a database in source control and committing changes.
- Additional tools that can deploy databases directly from source control like SQL Compare and SQL Data Compare.
Antonios Chatzipavlis is a database architect and SQL Server expert with over 30 years of experience working with SQL Server. The document provides tips for installing and configuring SQL Server correctly, including selecting the appropriate server hardware, installing Windows, configuring disks and storage, installing and configuring SQL Server, and creating user databases. The goal is to optimize performance and reliability based on best practices.
This document summarizes an agenda for an XPages performance masterclass. The agenda covers many factors that affect XPages performance including hardware, network performance, client limitations, and coding practices. It also discusses tools for optimizing performance such as JavaScript/CSS aggregation, scoped variables, data contexts, partial refresh vs partial execution, and XPages preloading. Specific techniques are demonstrated such as reducing unnecessary computations in the JSF lifecycle and using scoped variables to dynamically compute values.
KoprowskiT - SQLBITS X - 2am a disaster just beganTobias Koprowski
A document outlines best practices for surviving a disaster involving SQL Server infrastructure. It recommends being well prepared with regular backups stored offsite, documented restore procedures, clear roles and responsibilities, and service level agreements defining acceptable downtimes. Key aspects of preparation include backups, restore testing, documentation, contact lists, hardware and software inventory, passwords, encryption keys, defined teams, and keeping management informed. The overall message is that with proper planning, a disaster can be survived by following the best practice of being prepared.
SQLite is an embedded SQL database that implements common SQL features. It stores each database in a single file and is open source, free, and used by many applications including Firefox, Safari, and Apple Mail. Some advantages are that it is self-contained, easy to set up, and has no server requirements. It supports ACID transactions and has a small memory footprint. SQLite is generally suitable for simple applications that need local data storage, while larger projects requiring enterprise features may need a different database system.
CQRS (Command Query Responsibility Segregation) is an architectural pattern that separates read and write operations into different models. This improves read performance by allowing queries to be routed to optimized data stores like fast in-memory or denormalized databases. Commands produce events that are asynchronously published to multiple recipients. Event handlers subscribe to events and perform actions like persisting state changes or updating aggregates. The read side may be eventually consistent with the write side to improve write performance without distributed transactions. Messaging systems like RabbitMQ can reliably deliver commands and events. Frameworks like NCQRS help implement the CQRS pattern for .NET applications.
This document provides a checklist for configuring SQL Server that includes recommendations for the Windows OS, patches, page file, antivirus, RAID, disk formatting, power options, network cards, installation directories, SQL Server services accounts, trace flags, server properties, memory settings, TempDB configuration, and database configuration. It offers guidance on topics like Windows version, patch level, page file size, antivirus exclusions, RAID level, disk formatting, power plan, network redundancy, installation directories, services accounts, trace flags, memory allocation, TempDB files, and database growth settings.
SQL Server Masters is known to be a reputed consulting firm for SQL SERVER related
Courses with top talented database professionals and software engineers
coming from some of the most established and most successful software developmentand
technology consulting firms around the globe for providing a tailored-made solutions to
their clients at the very best of their knowledge and liable time.
The document discusses SQL Server monitoring and troubleshooting. It provides an overview of SQL Server monitoring, including why it is important and common monitoring tools. It also describes the SQL Server threading model, including threads, schedulers, states, the waiter list, and runnable queue. Methods for using wait statistics like the DMVs sys.dm_os_waiting_tasks and sys.dm_os_wait_stats are presented. Extended Events are introduced as an alternative to SQL Trace. The importance of establishing a performance baseline is also noted.
Microsoft released SQL Azure more than two years ago - that's enough time for testing (I hope!). So, are you ready to move your data to the Cloud? If you’re considering a business (i.e. a production environment) in the Cloud, you need to think about methods for backing up your data, a backup plan for your data and, eventually, restoring with Red Gate Cloud Services. In this session, you’ll see the differences, functionality, restrictions, and opportunities in SQL Azure and On-Premise SQL Server 2008/2008 R2/2012. We’ll consider topics such as how to be prepared for backup and restore, and which parts of a cloud environment are most important: keys, triggers, indexes, prices, security, service level agreements, etc.
A WebLogic domain contains an Administration Server that manages Managed Servers and clusters. It maintains configuration artifacts and distributes them. Managed Servers host applications, and can be grouped into clusters for load balancing and high availability. A Node Manager monitors and controls Managed Servers, enabling automated restart on failure. Clusters provide scalability and reliability by distributing work across multiple server instances with application failover and load balancing.
Presentation by Shree Prasad Khanal, Leader, Himalayan SQL Server User Group, on "Where should I be encrypting my data? " at "Braindigit 9th National ICT Conference 2013" organized by Information Technology Society, Nepal at Alpha House, Kathmandu, Nepal on 26th January, 2013
This document provides an overview of Module 1 which introduces SQL Server 2008 R2 and its toolset. It covers the SQL Server platform architecture, components, instances, and editions. It also discusses tools for working with SQL Server like SQL Server Management Studio, Business Intelligence Development Studio, and Books Online. Finally, it reviews configuring SQL Server services, network ports, server aliases, and tools like SQL Server Profiler. The module includes exercises and a lab scenario to configure a new SQL Server instance for a separate company using an existing server.
The document provides an overview of SQL Server security best practices. It recommends turning off unnecessary services, using Windows authentication over mixed mode if possible, securing the 'sa' account with a strong password, enabling auditing of failed logins, disabling unnecessary features like xp_cmdshell, and using schemas and stored procedures to implement the principle of least privilege for user access. It also discusses topics like encrypting data at the column level using keys and certificates. The goal is to harden SQL Server security without making it inaccessible to legitimate users and applications.
Patterns for building resilient and scalable microservices platform on AWSBoyan Dimitrov
In this talk we explore Hailo's H2 platform under the hood taking a peek into the orchestration layer and introducing various patterns for building scalable and resilient microservices platform. We share insights about our architecture and how it evolved into a cloud agnostic self-managed system.
SQL Server Agent allows users to automate repetitive tasks like database backups, index maintenance, and ETL jobs. It executes jobs on a defined schedule with minimal human intervention. Jobs are made up of steps that can be monitored and restarted if they fail. SQL Server Agent uses schedules, alerts, operators, roles, subsystems, and proxies to automate tasks securely based on permissions.
The document discusses Microsoft workgroups and domain networks. A workgroup has no central authority, with each computer storing its own local user accounts. This requires setting up the same account on each machine. A domain network uses directory services like Active Directory to centrally manage user accounts across multiple servers and client computers, providing a more scalable solution for large organizations. Hash tables and functions are also discussed as a method for mapping user names to account information in a directory service database.
This document provides an overview of WebLogic Server topology, configuration, and administration. It describes key concepts such as domains, servers, clusters, and configuration files. It also discusses administration tools for configuring and managing WebLogic domains including the Configuration Wizard, Administration Console, and WLST scripting tool. The Configuration Wizard is a GUI tool for creating domains from templates, while the Administration Console is a browser-based interface for ongoing domain administration.
This document provides an overview of WebLogic Server topology, configuration, and administration. It describes key concepts such as domains, servers, clusters, and configuration files. It also discusses administration tools for configuring and managing WebLogic domains including the Configuration Wizard, Administration Console, and WLST scripting tool. The Configuration Wizard is a GUI tool for creating domains from templates, while the Administration Console is a browser-based interface for ongoing domain administration.
Microsoft released SQL Azure more than two years ago - that's enough time for testing (I hope!). So, are you ready to move your data to the Cloud? If you’re considering a business (i.e. a production environment) in the Cloud, you need to think about methods for backing up your data, a backup plan for your data and, eventually, restoring with Red Gate Cloud Services (and not only). In this session, you’ll see the differences, functionality, restrictions, and opportunities in SQL Azure and On-Premise SQL Server 2008/2008 R2/2012. We’ll consider topics such as how to be prepared for backup and restore, and which parts of a cloud environment are most important: keys, triggers, indexes, prices, security, service level agreements, etc.
This document provides an introduction to Microsoft SQL Server 2005 and its components. It discusses the history of SQL Server and how it works as a relational database management system. It also summarizes the key components of SQL Server Management Studio, including Object Explorer, Registered Servers, Solution Explorer, and Query Editor. Finally, it provides overviews of SQL Server Agent and how it can automate tasks, as well as how to perform database backup, restore, and import/export functions.
The document discusses SQL Server security and authentication methods when connecting from an application using ADO.NET, including SQL Server authentication with usernames and passwords versus Windows authentication using Windows credentials, as well as ways to control access to databases and objects using roles, permissions, and application roles within SQL Server. It also provides examples of managing authentication and security programmatically using Transact-SQL, SQL-DMO, and ADO.NET code samples.
Integrating SharePoint 2010 and Visual Studio LightswitchRob Windsor
This document discusses integrating SharePoint 2010 and Visual Studio LightSwitch. It provides an overview of LightSwitch, including its motivation as a development tool for business users and developers. It demonstrates LightSwitch's simplification of development through its handling of data, screens, rules and validation. Key LightSwitch concepts are explained such as entities, queries, screens and access control. Deployment options for LightSwitch applications are also reviewed.
Global Azure Bootcamp: Azure service fabric Luis Valencia
This document provides an overview of microservices and Azure Service Fabric. It discusses how Service Fabric is well-suited for microservices architectures and describes some of its key concepts, including services, applications, nodes, and clusters. It also covers developing Service Fabric applications, deploying to Azure, and performing upgrades.
The document provides information about configuring and administering a server. It discusses server specifications, compatibility, configuration and testing. It defines what a server and network operating system are. The document outlines different server types including file, print, application, mail, terminal and remote access servers. It also covers client support, communication, users and groups, Windows server editions, UNIX/Linux servers, network computer groups, and items that need to be configured on a server like services, authentication, and authorization.
Designing SharePoint solutions – Big Decisions for Big SuccessSPC Adriatics
Speaker: Darko Milevski;
Today, many organizations use SharePoint as an ultimate platform for collaboration and consolidation of their business applications. At the same time, most of them find it easy for start-up implementation and almost plug-and-play use by employees. In time, the platform adopts more and more users, data, applications and processes, and if not architected and governed with this considerations, it becomes very tough to maintain and lose it’s performance and usability. Solid SharePoint solutions architecture at the beginning of implementation is crucial for long-term success, performance and usability of the applications on top of Microsoft prime enterprise content management platform. In this presentation, I will cover various aspects and considerations that should be analyzed and later implemented very carefully in a production SharePoint farm. Topics like Farm topology, SQL performance, Backups, Updates and Patching, Storage, Security and Governance will be covered. Form Development perspective, defining and negotiating Requirements, identifying constraints, policies, and selecting right SharePoint features and APIs that will be used in the solutions, is another aspect of the complete solution designing process.
(ATS3-APP13) Tips and Tricks for Monitoring and Managing Symyx Notebook Serve...BIOVIA
Managing Accelrys Vault Server Deployments can be a challenging task, especially when corporate environments are managed by several third-parties, each having a very specific role in ensuring that your Vault deployment is reliable and meet SLAs that are in place to achieve a 99.9% uptime. The intent of this session is to provide you with the following information to help you achieve your Vault deployment and management goals:
• Utilize core Windows features to maintain a healthy system
• Utilize core Windows features to automate maintenance tasks
• Utilize core Windows features to reduce the burden of managing Vault deployments
• General server/Vault management Best Practices
SQL Server Agent enables database administrators to automate tasks by configuring jobs made up of steps that execute on a schedule or in response to events. It allows automating activities like backups, data copying, and index maintenance. Jobs are configured by adding steps for tasks like TSQL scripts or OS commands, then setting a schedule and alerts for notifications. The SQL Server Agent service must be started and configured with appropriate permissions and profile settings to function properly.
Oracle WebLogic Server is a scalable, enterprise-ready Java application server that supports the deployment of distributed applications. It provides a robust, secure, highly available environment for deploying mission-critical applications. WebLogic Server supports Java EE standards and enables enterprises to configure clusters of servers to distribute load and provide failover capabilities. The key components of a WebLogic domain include the administration server, which manages the domain configuration, and multiple managed servers that host applications and services. Clusters group managed servers to provide scalability and reliability. WebLogic Server is managed through the administration console and WLST and can be monitored using Enterprise Manager.
Azure SQL Database is a cloud-based relational database service built on the Microsoft SQL Server engine. It provides predictable performance and scalability with minimal downtime and administration. Key features include elastic pools for cost-effective scaling, built-in backups and disaster recovery, security features like encryption and auditing, and tools for management and monitoring performance. The document provides an overview of Azure SQL Database capabilities and service tiers for databases and elastic pools.
This document provides an overview of using Polybase for data virtualization in SQL Server. It discusses installing and configuring Polybase, connecting external data sources like Azure Blob Storage and SQL Server, using Polybase DMVs for monitoring and troubleshooting, and techniques for optimizing performance like predicate pushdown and creating statistics on external tables. The presentation aims to explain how Polybase can be leveraged to virtually access and query external data using T-SQL without needing to know the physical data locations or move the data.
Antonios Chatzipavlis presented on SQL Server backup and restore. The presentation covered database architecture basics including data files, transaction log files, and the buffer cache. It also discussed backup types like full, differential, transaction log, copy only and partial backups. Backup strategies and restore processes were explained, including restoring to a point in time and restoring system databases. The internals of how SQL Server performs backups using buffers and I/O threads was also summarized.
Antonios Chatzipavlis presented on migrating SQL workloads to Azure. He discussed modernizing data platforms by discovering, assessing, planning, transforming, optimizing, testing and remediating. Key migration considerations include remaining, rehosting, refactoring, rearchitecting, rebuilding or replacing workloads. Tools for migrating data include Microsoft Assessment and Planning Toolkit, Data Migration Assistant, Database Experimentation Assistant, SQL Server Migration Assistant, and Azure Database Migration Service. Workloads can be migrated to Azure VMs, Azure SQL Databases or Azure SQL Managed Instances.
This document summarizes a webinar presentation about workload management in SQL Server 2019. It discusses how SQL Server's Resource Governor feature can be used to provide multitenancy, predictable performance, and isolation for multiple workloads running on a single SQL Server instance. Key concepts covered include resource pools, workload groups, and classification functions to assign sessions to different pools and groups. The presentation also reviews best practices for using lookup tables in classification functions and shows some DMVs for monitoring Resource Governor configuration and statistics.
This document provides an overview of loading data into Azure SQL DW (Synapse Analytics). It discusses extracting source data into text files, landing the data into Azure Data Lake Store Gen2, preparing the data for loading into staging tables using PolyBase or COPY commands, transforming the data, and inserting it into production tables. It also compares ETL vs ELT approaches and SSIS vs Azure Data Factory for data integration. The presenter then demonstrates loading data in Synapse SQL pool and invites any questions.
The document provides an overview of the DAX language. It discusses that DAX is the programming language used in Power BI, Power Pivot, and Analysis Services for data modeling, reporting, and analytics. It describes the basic components of a DAX data model including tables, columns, relationships, measures, and hierarchies. It also covers DAX syntax, functions, operators, and how context and filter context work in DAX calculations and queries.
The document introduces Diagnostic Management Views (DMVs) and Dynamic Management Functions (DMFs) in SQL Server. It discusses that DMVs and DMFs return server state information and can be used to monitor server health, diagnose problems, and tune performance. It provides examples of common DMVs and DMFs used for query execution and the query plan cache. Finally, it notes that the presentation will demonstrate troubleshooting with DMVs and DMFs.
This document summarizes common T-SQL anti-patterns that can negatively impact query performance, including using SELECT *, functions in predicates, OR operators, implicit conversions, unnecessary sorts, correlated subqueries, and dynamic SQL execution. The presentation provides explanations of why each anti-pattern hurts performance and recommendations for more optimized alternatives such as using indexes, temporary tables, parameterization, and execution plan analysis.
This document discusses designing a modern data warehouse in Azure. It provides an overview of traditional vs. self-service data warehouses and their limitations. It also outlines challenges with current data warehouses around timeliness, flexibility, quality and findability. The document then discusses why organizations need a modern data warehouse based on criteria like customer experience, quality assurance and operational efficiency. It covers various approaches to ingesting, storing, preparing and modeling data in Azure. Finally, it discusses architectures like the lambda architecture and common data models.
Modernizing Your Database with SQL Server 2019 discusses SQL Server 2019 features that can help modernize a database, including:
- The Hybrid Buffer Pool which supports persistent memory to improve performance on read-heavy workloads.
- Memory-Optimized TempDB Metadata which stores TempDB metadata in memory-optimized tables to avoid certain blocking issues.
- Intelligent Query Processing features like Adaptive Query Processing, Batch Mode processing on rowstores, and Scalar UDF Inlining which improve query performance.
- Approximate Count Distinct, a new function that provides an estimated count of distinct values in a column faster than a precise count.
- Lightweight profiling, enabled by default, which provides query plan
This document discusses designing a modern data warehouse in Azure. It provides an overview of traditional vs. self-service data warehouses and their limitations. It also outlines challenges with current data warehouses around timeliness, flexibility, quality and findability. The document then discusses why organizations need a modern data warehouse based on criteria like customer experience, quality assurance and operational efficiency. It covers various approaches to ingesting, storing, preparing, modeling and serving data on Azure. Finally, it discusses architectures like the lambda architecture and common data models.
The document provides details about an SQL expert's background and certifications. It summarizes the expert's career starting in 1982 working with computers and 1988 starting in the computer industry. In 1996, they started working with SQL Server 6.0 and have since earned multiple Microsoft certifications. The expert now provides training and consultation services, and created an online school called SQL School Greece to teach SQL Server.
Azure SQL Database for the SQL Server DBA - Azure Bootcamp Athens 2018 Antonios Chatzipavlis
Azure SQL Database is a managed database service hosted in Microsoft's Azure cloud. Some key differences from SQL Server include: the service is paid by the hour based on the selected service tier; users can dynamically scale resources up or down; backups and high availability are managed by the service provider; and common administration tasks are handled by the provider rather than the user. The service offers automatic backups, point-in-time restore, and geo-restore capabilities along with built-in high availability through replication across three copies in the primary region.
The document discusses technologies within the Microsoft SQL family and Azure SQL that can help organizations address requirements of the General Data Protection Regulation (GDPR). It covers features for discovering and classifying personal data, managing access and controlling how data is used, and protecting data through encryption, auditing and other security controls. Built-in technologies like dynamic data masking, row-level security, authentication options, and transparent data encryption are described as ways SQL Server and Azure SQL Database can help organizations comply with GDPR.
The document provides biographical information about Antonios Chatzipavlis, a SQL Server expert and evangelist. It then summarizes his presentation on statistics and index internals in SQL Server, which covers topics like cardinality estimation, inspecting and updating statistics, index structure and types, and identifying missing indexes. The presentation includes demonstrations of analyzing cardinality estimation and picking the right index key.
This document provides an introduction and overview of Azure Data Lake. It describes Azure Data Lake as a single store of all data ranging from raw to processed that can be used for reporting, analytics and machine learning. It discusses key Azure Data Lake components like Data Lake Store, Data Lake Analytics, HDInsight and the U-SQL language. It compares Data Lakes to data warehouses and explains how Azure Data Lake Store, Analytics and U-SQL process and transform data at scale.
This document provides an overview of Azure SQL Data Warehouse. It discusses what Azure SQL Data Warehouse is, how it is provisioned and scaled, best practices for designing tables in Azure SQL DW including distribution keys and data types, and methods for loading and querying data including PolyBase and labeling queries for monitoring. The presentation also covers tuning aspects like statistics, indexing, and resource classes.
This document provides an introduction and overview of Azure DocumentDB. It discusses how DocumentDB is a fully managed NoSQL database service that provides fast and predictable performance for JSON data through SQL querying capabilities. It also describes how DocumentDB offers features like elastic scaling, high availability, global distribution and ease of development. The document then provides information on starting with DocumentDB, writing queries, and programming capabilities within DocumentDB like stored procedures and triggers.
How UiPath Discovery Suite supports identification of Agentic Process Automat...DianaGray10
📚 Understand the basics of the newly persona-based LLM-powered Agentic Process Automation and discover how existing UiPath Discovery Suite products like Communication Mining, Process Mining, and Task Mining can be leveraged to identify APA candidates.
Topics Covered:
💡 Idea Behind APA: Explore the innovative concept of Agentic Process Automation and its significance in modern workflows.
🔄 How APA is Different from RPA: Learn the key differences between Agentic Process Automation and Robotic Process Automation.
🚀 Discover the Advantages of APA: Uncover the unique benefits of implementing APA in your organization.
🔍 Identifying APA Candidates with UiPath Discovery Products: See how UiPath's Communication Mining, Process Mining, and Task Mining tools can help pinpoint potential APA candidates.
🔮 Discussion on Expected Future Impacts: Engage in a discussion on the potential future impacts of APA on various industries and business processes.
Enhance your knowledge on the forefront of automation technology and stay ahead with Agentic Process Automation. 🧠💼✨
Speakers:
Arun Kumar Asokan, Delivery Director (US) @ qBotica and UiPath MVP
Naveen Chatlapalli, Solution Architect @ Ashling Partners and UiPath MVP
The Challenge of Interpretability in Generative AI Models.pdfSara Kroft
Navigating the intricacies of generative AI models reveals a pressing challenge: interpretability. Our blog delves into the complexities of understanding how these advanced models make decisions, shedding light on the mechanisms behind their outputs. Explore the latest research, practical implications, and ethical considerations, as we unravel the opaque processes that drive generative AI. Join us in this insightful journey to demystify the black box of artificial intelligence.
Dive into the complexities of generative AI with our blog on interpretability. Find out why making AI models understandable is key to trust and ethical use and discover current efforts to tackle this big challenge.
Discovery Series - Zero to Hero - Task Mining Session 1DianaGray10
This session is focused on providing you with an introduction to task mining. We will go over different types of task mining and provide you with a real-world demo on each type of task mining in detail.
Top 12 AI Technology Trends For 2024.pdfMarrie Morris
Technology has become an irreplaceable component of our daily lives. The role of AI in technology revolutionizes our lives for the betterment of the future. In this article, we will learn about the top 12 AI technology trends for 2024.
Redefining Cybersecurity with AI CapabilitiesPriyanka Aash
In this comprehensive overview of Cisco's latest innovations in cybersecurity, the focus is squarely on resilience and adaptation in the face of evolving threats. The discussion covers the imperative of tackling Mal information, the increasing sophistication of insider attacks, and the expanding attack surfaces in a hybrid work environment. Emphasizing a shift towards integrated platforms over fragmented tools, Cisco introduces its Security Cloud, designed to provide end-to-end visibility and robust protection across user interactions, cloud environments, and breaches. AI emerges as a pivotal tool, from enhancing user experiences to predicting and defending against cyber threats. The blog underscores Cisco's commitment to simplifying security stacks while ensuring efficacy and economic feasibility, making a compelling case for their platform approach in safeguarding digital landscapes.
UiPath Community Day Amsterdam: Code, Collaborate, ConnectUiPathCommunity
Welcome to our third live UiPath Community Day Amsterdam! Come join us for a half-day of networking and UiPath Platform deep-dives, for devs and non-devs alike, in the middle of summer ☀.
📕 Agenda:
12:30 Welcome Coffee/Light Lunch ☕
13:00 Event opening speech
Ebert Knol, Managing Partner, Tacstone Technology
Jonathan Smith, UiPath MVP, RPA Lead, Ciphix
Cristina Vidu, Senior Marketing Manager, UiPath Community EMEA
Dion Mes, Principal Sales Engineer, UiPath
13:15 ASML: RPA as Tactical Automation
Tactical robotic process automation for solving short-term challenges, while establishing standard and re-usable interfaces that fit IT's long-term goals and objectives.
Yannic Suurmeijer, System Architect, ASML
13:30 PostNL: an insight into RPA at PostNL
Showcasing the solutions our automations have provided, the challenges we’ve faced, and the best practices we’ve developed to support our logistics operations.
Leonard Renne, RPA Developer, PostNL
13:45 Break (30')
14:15 Breakout Sessions: Round 1
Modern Document Understanding in the cloud platform: AI-driven UiPath Document Understanding
Mike Bos, Senior Automation Developer, Tacstone Technology
Process Orchestration: scale up and have your Robots work in harmony
Jon Smith, UiPath MVP, RPA Lead, Ciphix
UiPath Integration Service: connect applications, leverage prebuilt connectors, and set up customer connectors
Johans Brink, CTO, MvR digital workforce
15:00 Breakout Sessions: Round 2
Automation, and GenAI: practical use cases for value generation
Thomas Janssen, UiPath MVP, Senior Automation Developer, Automation Heroes
Human in the Loop/Action Center
Dion Mes, Principal Sales Engineer @UiPath
Improving development with coded workflows
Idris Janszen, Technical Consultant, Ilionx
15:45 End remarks
16:00 Community fun games, sharing knowledge, drinks, and bites 🍻
4. Working with
SQL Server Agent
SQL Saturday Night #11
Sep 17, 2011
Antonios Chatzipavlis
Solution Architect - Principal Consultant
SQL Server Evangelist & MVP
MCT, MCITP, MCPD, MCSD, MCDBA, MCSA, MCTS, MCAD, MCP, OCA
SQL Saturday Night #11
5. Antonios G. Chatzipavlis
• 1982 – The first contact with computers.
• 1988 – I started my professional carrier in IT, especially in
software development.
• 1998 – I earned my 1st Certification as MCSD (3rd in Greece)
• Since then I certified as MCP, MCSD, MCT, MCDBA, MCAD, MCTS,
MCITP, MCPD, MCSA, and OCA.
• 1999 – I started my Trainer carrier as MCT
• Since then I have more than 13.500 hours of training
• 2010 – I became for first time Microsoft MVP on SQL Server.
also
• Leader of MCT Europe Greek Chapter
• Moderator of autoexec.gr
• Member of the dotNETZone.gr
SQL Saturday Night #11
6. Agenda
• What is the SQL Server Agent
• Configuring SQL Server Agent
• Security for SQL Server Administration
• Tools for Automating Administrations
• Monitoring and Responding to Events
• Automating Administration Across an Enterprise
SQL Saturday Night #11
7. What is the SQL Server Agent
• Overview of SQL Server Agent
• Components of Automatic Administration
• Jobs
• Schedules
• Alerts
• Operators
SQL Saturday Night #11
8. Overview of SQL Server Agent
SQL Server Agent is the component of SQL Server
that is responsible for automation
• Run as Windows Service
• Must be running to
• Execute jobs
• Fire alerts
• Contact operators
• Start Mode should be set to Automatic
SQL Saturday Night #11
9. Jobs
A job is a specified series of actions
that SQL Server Agent performs
• You can run jobs in several ways:
• According to one or more schedules
• In response to one or more alerts
• By executing the sp_start_job stored procedure
SQL Saturday Night #11
10. Schedules
A schedule specifies when a job runs.
More than one job can run on the same schedule,
and
more than one schedule can apply to the same job.
• A schedule can define the following conditions for
the time when a job runs:
• Whenever SQL Server Agent starts.
• Whenever CPU utilization of the computer is at a level you
have defined as idle.
• One time, at a specific date and time.
• On a recurring schedule.
SQL Saturday Night #11
11. Alerts
An alert is an automatic response
to a specific event.
• An alert can respond to one of the following
conditions:
• SQL Server events
• SQL Server performance conditions
• WMI events on the computer where SQL Server Agent is
running
• An alert can perform the following actions:
• Notify one or more operators
• Run a job
SQL Saturday Night #11
12. Operators
An operator defines contact information for
an individual responsible for the maintenance
of one or more instances of SQL Server.
• SQL Server can notify operators of alerts through
one or more of the following:
• E-mail
• Pager (through e-mail)
• net send
SQL Saturday Night #11
13. Configuring SQL Server Agent
• Starting, Stopping, and Pausing SQL Server Agent Service
• Selecting an Account for the SQL Server Agent Service
• Service Account Types Supported for SQL Server Agent
• Windows Domain Account Permissions
• Using the SQL Server Agent Error Log
• Managing Services
• Using Performance Objects
SQL Saturday Night #11
14. Starting, Stopping, and Pausing
SQL Server Agent Service
• Using SQL Server Configuration Manager
(preferred)
• net Commands
SQL Saturday Night #11
15. Selecting an Account for the
SQL Server Agent Service
• Built-in accounts
Local System Local Service Network Service
• The name of NT • The SQL Server Agent service The name of NT
•
AUTHORITYSystem windows cannot be run under this account. AUTHORITYNetworkService
account • It is not supported because it windows account
• Has unrestricted access to all local •
accesses network resources as aAll services that run under the
null
system resources session with no credentials Network Service account are
• Member of Windows Administrators authenticated to network resources
group on local computer as the local computer
• Member of SQL Server sysadmin • Because multiple services can use
server role the Network Service account, it is
• Provided for backward compatibility difficult to control which services
• Has permissions that SQL Server have access to network resources
Agent does not require
• This account (Windows Account)
• Recommended option
• Use a Windows user account that is not a member of the
Windows Administrators group
SQL Saturday Night #11
16. Service Account Types Supported for
SQL Server Agent
Domain
Non-clustered Clustered
Service account type controller
Server server
(non-clustered)
Microsoft Windows domain account
Supported Supported Supported
(member of Windows Administrators group)
Windows domain account Supported Supported Supported
(non-administrative) 1 1 1
Network Service account Supported Not Not
(NT AUTHORITYNetworkService) 1, 3, 4 supported supported
Local user account Supported Not Not
(non-administrative) 1 supported applicable
Local System account Supported Not Supported
(NT AUTHORITYSystem) 2 supported 2
Local Service account Not Not Not
(NT AUTHORITYLocalService) supported supported supported
1. Using Non-administrative Accounts for Multiserver Administration
2. Using the Local System Account for Multiserver Administration
3. Using the Network Service Account When It Is a SQL Server User
4. Using the Network Service Account When SQL Server Reporting Services Is Running on the Same Computer
SQL Saturday Night #11
17. Windows Domain Account Permissions
• Log on as a service
• Must be a member of the sysadmin fixed server role.
• To use multiserver job processing, must be:
• a member of the TargetServersRole database role in msdb on
the master server
• Required permissions for SQL Server Agent proxies
support:
• Permission to act as part of the operating system (SeTcbPrivilege) (only
on Windows 2000)
• Permission to bypass traverse checking (SeChangeNotifyPrivilege)
• Permission to replace a process-level token
(SeAssignPrimaryTokenPrivilege)
• Permission to adjust memory quotas for a process
(SeIncreaseQuotaPrivilege)
• Permission to log on using the batch logon type (SeBatchLogonRight).
SQL Saturday Night #11
18. Using the SQL Server Agent Error Log
• Error log records warnings and errors by default.
• Warnings and errors displayed in the log:
• Warning messages that provide information about potential
problems
• Error messages that usually require intervention by a
system administrator
• SQL Server maintains up to nine SQL Agent error
logs
• Execution trace messages are not written to error
log
• Consider carefully what value you obtain by capturing
execution trace messages to the error log
• You can cycle the SQL Server Agent log at any time
SQL Saturday Night #11
19. demo
SQL Server Agent Error Log
SQL Saturday Night #11
20. Managing Services
• The SQL Server Agent service and the SQL Server service
monitor each other.
• After both services have started, if one service fails, the other service
restarts the failed service
• Auto-restart should not be enabled for the SQL Server service
or the SQL Server Agent service on failover cluster instances.
• Jobs that are running at the time of a failover event on a SQL
Server failover cluster instance do not resume after failover to
another failover cluster node.
• Jobs that are running at the time a Hyper-V node is paused
do not resume if the pause causes a failover to another node.
• Jobs that begin but fail to complete because of a failover
event are logged as started,
• Do not show additional log entries for completion or failure.
• SQL Server Agent jobs in these scenarios appear to have never ended.
SQL Saturday Night #11
21. Using Performance Objects
• SQLAgent:Jobs
• Performance information about jobs that have been started,
success rates, and current status
• SQLAgent:JobSteps
• Status information about job steps
• SQLAgent:Alerts
• Information about number of alerts and notifications
• SQLAgent:Statistics
• General performance information
SQL Saturday Night #11
22. Security for
SQL Server Administration
• SQL Server Agent Fixed Database Roles
• SQL Server Agent Proxies
• SQL Server Agent Subsystems
SQL Saturday Night #11
23. SQL Server Agent Fixed Database Roles
• SQLAgentUserRole
• Control permission for jobs and schedules that they own
• SQLAgentReaderRole
msdb
• All permissionsSQLAgentUserRole SQLAgentReaderRole SQLAgentReaderRole
of the SQLAgentUserRole plus permission
to view the list of all available jobs and job schedules
(owned schedules
(owned jobs only)
Job schedules
Job schedules
Job schedules
Local jobs
Local jobs
Local jobs
Operators
Operators
Operators
Proxies
Proxies
Proxies
• SQLAgentOperatorRole
only)
Action
• Permission to manage local jobs , view properties for
operators and proxies, and enumerate Y N N proxies
Create/modify/delete N Y Y N N Y N available Y N
and alerts
View list (enumerate) Y Y Y Y Y Y Y Y Y Y Y Y
Enable/disable N Y Y NA N Y N Y N N Y N
View properties N Y Y N N Y Y Y Y Y Y Y
Execute/stop/start NA Y NA NA N Y N Y N N Y N
View job history NA Y NA NA NA Y N NA NA NA Y N
Delete job history NA N NA NA NA Y Y NA NA NA Y Y
Attach/detach NA NA Y NA NA N N NA NA NA Y N
SQL Saturday Night #11
24. SQL Server Agent Proxies
• SQL Server Agent uses proxies to manage security
contexts
• Each proxy corresponds to a security credential.
• Credentials to store information about Windows user
accounts.
• The user specified in the credential must have "Log
on as a batch job" permission on the computer on
which SQL Server is running.
• Each proxy can be associated with a set of
subsystems and a set of logins.
• The proxy can be used only for job steps that use a
subsystem associated with the proxy.
SQL Saturday Night #11
25. SQL Server Agent Subsystems
• Is a predefined object that represents a set of
functionality available to a SQL Server Agent proxy
• Subsystems provide security because they delimit
access to the functionality that is available to a proxy
Subsystem name Description
Microsoft ActiveX Script Run an ActiveX scripting job step. REMOVED IN FUTURE VERSIONS
Operating System (CmdExec) Run an executable program.
PowerShell Run a PowerShell scripting job step.
Because Transact-SQL jobthe replication Distribution Agent.
Replication Distributor Run a job step that activates steps do not use
Replication Merge Run a job step that activates the replication Merge Agent.
proxies, there job step that SQLthe replication Queue Reader Agent.
Replication Queue Reader Run a
is no activates Server Agent
subsystem fora job step that activates the replication Snapshot Agent.
Replication Snapshot Run Transact-SQL job steps.
Replication Transaction Log Reader Run a job step that activates the replication Log Reader Agent.
Analysis Services Command Run an Analysis Services command.
Analysis Services Query Run an Analysis Services query.
SSIS package execution Run an SSIS package.
SQL Saturday Night #11
26. Tools for
Automating Administrations
• Maintenance Plan
• Implementing Jobs
• Monitoring Jobs Activity
SQL Saturday Night #11
27. Maintenance Plan
• Helps you set up the core maintenance tasks to
make sure that your database performs well
• To create or manage maintenance plans, you must
be a member of the sysadmin fixed server role
• You can perform the following tasks:
• Reorganize the data on the data and index pages by
rebuilding indexes
• Compress data files by removing empty database pages
• Update index statistics
• Perform internal consistency checks
• Back up the database and transaction log files
• Run SQL Server Agent jobs
SQL Saturday Night #11
29. Implementing Jobs
• A job is a specified series of operations performed
sequentially.
• A job can perform a wide range of activities
• Jobs can run repetitive or schedulable tasks
• Automatically notify users of job status
• To create a job user must be a member of one of
• SQLAgentUserRole
• SQLAgentReaderRole
• SQLAgentOperatorRole
• or sysadmin fixed server role.
• A job can be edited only by its owner or members of the
sysadmin role
• Jobs can be written to run on the local instance of SQL
Server or on multiple instances across an enterprise
SQL Saturday Night #11
31. Monitoring Jobs Activity
• SQL Server Agent creates a new session each time
the service starts.
• Information about these sessions is stored in the
syssessions table of the msdb database
• When a new session is created, the sysjobactivity
table in the msdb database is populated with all the
existing defined jobs.
• Jobs Activity Monitor
SQL Saturday Night #11
32. demo
Monitoring Jobs Activity
SQL Saturday Night #11
33. Monitoring and Responding
to Events
• Overview of Alerts
• Alert Event Types
• Overview of Operators
• Fail-Safe Operator
SQL Saturday Night #11
34. Overview of Alerts
• Events are generated by SQL Server and entered
into the Microsoft Windows application log.
• SQL Server Agent reads the application log and
compares events written there to alerts that you
have defined.
• When SQL Server Agent finds a match, it fires an
alert, which is an automated response to an event.
SQL Saturday Night #11
35. Alert Event Types
• SQL Server events
• Error number
• Severity level
• Database
• Event text
• SQL Server performance conditions
• Object
• Counter
• Instance
• Alter if counter and Value
• WMI events
• Namespace
• Query
SQL Saturday Night #11
36. Overview of Operators
• Operators are aliases for people or groups that can
receive electronic notification when jobs have
completed or alerts have been raised
• Operators can be notified by
• Email
• DB Mail (SMTP)
• SQL Mail (Extended MAPI)
• Pager
• Paging is implemented by e-mail
• Must install software on the mail server that processes inbound mail
and converts it to a pager message
• net send command
• net send is NOT available in Windows Server 2008 R2
Pager & net send will be removed in a future versions
SQL Saturday Night #11
37. Fail-Safe Operator
• The fail-safe operator receives an alert notification after
all pager notifications to the designated operators have
failed
• The fail-safe operator is notified when:
• The operators responsible for the alert could not be paged.
• Reasons for failure to reach primary operators include incorrect pager
addresses and off-duty operators.
• SQL Server Agent cannot access system tables in the msdb
database.
• The sysnotifications system table specifies operator responsibilities for
alerts.
• The fail-safe operator is a security feature.
• You cannot delete the operator assigned to fail-safe duty
without reassigning fail-safe duty to another operator, or
deleting the fail-safe assignment altogether.
SQL Saturday Night #11
38. demo
Alerts & Operators
SQL Saturday Night #11
39. Automating Administration Across
an Enterprise
• Overview of Multiserver Environment
• Choosing the Right SQL Server Agent Service Account for
Multiserver Environments
• Setting Encryption Options on Target Servers
• Polling Intervals
• Event forwarding
SQL Saturday Night #11
40. Overview of Multiserver Environment
• One master server
• At least one target server
• Master server distributes jobs to, and receives
events from, target servers.
• Master server also stores the central copy of job
definitions for jobs that are run on target servers.
• Target servers connect periodically to the master
server to update their schedule of jobs.
• If a new job exists on the master server, the target server
downloads the job.
• After the target server completes the job, it reconnects to
the master server and reports the status of the job
SQL Saturday Night #11
41. Choosing the Right SQL Server Agent Service
Account for Multiserver Environments
• If you run the SQL Server Agent service under an
account that is not a member of the local Windows
Administrators group, enlisting target servers to master
servers may fail
• "The enlistment operation failed."
• Restart the SQL Server and the SQL Server Agent services to resolve
this issue.
• When the SQL Server Agent service is run under the
Local System account, master server-target server
operations are supported only if both the master server
and the target server reside on the same computer
• "Ensure the agent start-up account for
<target_server_computer_name> has rights to log on as
targetServer."
• You can ignore this informational message. The enlistment operation
should complete successfully.
SQL Saturday Night #11
42. Setting Encryption Options on Target
Servers
• If you cannot use a certificate for Secure Sockets
Layer (SSL) encrypted communications between
master servers and some or all of your target
servers, but you want to encrypt the channel
between them
• HKEY_LOCAL_MACHINESOFTWAREMicrosoft
Microsoft SQL Server
<instance_name>SQLServerAgent
MsxEncryptChannelOptions(REG_DWORD)
Value Description
Disables encryption between this target server and the master server. Choose this option only
0 when the channel between the target server and master server is secured by another means.
Enables encryption only between this target server and the master server, but no certificate
1 validation is required.
Enables full SSL encryption and certificate validation between this target server and the master
2 server. This setting is the default. Unless you have specific reason to choose a different value, we
recommend not changing it.
SQL Saturday Night #11
43. Polling Intervals
• The polling interval controls how frequently the
target server connects to the master server to
download instructions and upload the results of job
execution.
• Target server polls the master server and reads the
operations assigned to from the sysdownloadlist
table in the msdb database.
• Operations are posted to the sysdownloadlist table
in either of the following ways:
• Explicitly by using the sp_post_msx_operation stored
procedure.
• Implicitly by using other job stored procedures.
SQL Saturday Night #11
44. Event forwarding
• Advantages Guidelines for Using an Event forwarding
• Centralization
• Avoid running critical or heavily used
• Scalability. applications on the alerts management
• Efficiency. server.
• Carefully plan for the network traffic
• Disadvantages involved in configuring many servers to
• Increased traffic share the same alerts management
server.
• Single point of
failure. • Define alerts on the local instance of
• Server load. SQL Server that require a server-
specific response, instead of forwarding
the alerts to the alerts management
server.
• After configuring your alert system,
periodically check the Microsoft
Windows application log for SQL Server
Agent events.
SQL Saturday Night #11
45. demo
Implementing Multiserver Environment
SQL Saturday Night #11
Selecting an Account for the SQL Server Agent Service
To view SQL Server Agent error logIn Object Explorer, connect to an instance of the SQL Server Database Engine, and then expand that instance.Expand SQL Server Agent, expand Error Logs, right-click the error log you want to view, and then click View Agent Log.In the Select logs pane, click a type of logged item to filter the log contents.Optionally, click the Filter button and enter parameter values in the Filter Settings dialog box to filter the log contents.Check Apply Filter if you have selected filter parameters, and click OK in the Filter Settings dialog box.Under Log file summary, view the log contents.To rename a SQL Server Agent error logIn Object Explorer, connect to an instance of the SQL Server Database Engine, and then expand that instance.Expand SQL Server Agent.Right-click Error Logs and select Configure.In the Error log file box, enter the new path and file name, or find it using the browse (...) button.SQL Server Agent will not write to the new log file until the SQL Server Agent service is restarted.To send SQL Server Agent error messagesIn Object Explorer, connect to an instance of the SQL Server Database Engine, and then expand that instance.Right-click SQL Server Agent, and then click Properties.On the General page, in the Net send recipient box, type the user name or computer name. The Microsoft Windows Messenger service must be running to receive net send events.To write execution trace messages to the SQL Server Agent error logIn Object Explorer, connect to an instance of the SQL Server Database Engine, and then expand that instance.Right-click SQL Server Agent, and then click Properties.On the General page, check Include execution trace messages.Because this option can cause the error log to become large, set it only when investigating a specific SQL Server Agent problem.
Selecting an Account for the SQL Server Agent Service
Selecting an Account for the SQL Server Agent Service
Selecting an Account for the SQL Server Agent Service
select * from msdb.dbo.sysjobactivityselect * from msdb.dbo.syssessionsShow job activity monitor