programming4us
programming4us
DATABASE
Change page: < 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 >  |  Displaying page 2 of 16, items 41 to 80 of 625.
SQL Server 2012 : Tuning Queries (part 3) - Using the Database Engine Tuning Advisor
Among the principal methods that SQL Server uses to maintain and control queries are indexes and the statistics on those indexes. Taking direct control over these indexes yourself can take a lot of time and effort and require education and discovery.
SQL Server 2012 : Tuning Queries (part 2) - Gathering Query Information with Extended Events
Extended Events are a mechanism for gathering and viewing detailed information about the queries being executed on your system, among other things. The events provide a means to gather this information in an automated fashion so that you can use them to identify long-running or frequently called procedures.
SQL Server 2012 : Tuning Queries (part 1) - Understanding Execution Plans
There are two types of execution plans in SQL Server: estimated and actual. Queries that manipulate data, also known as Data Manipulation Language (DML) queries, are the only ones that generate execution plans.
SQL Server :ONE-WAY ENCRYPTION - Creating the Interface (part 2) - Setting and Verifying Permissions to the Stored Procedures
The ability to search the data that is in the Borrower_Identification table will be granted to the Sensitive_high and Sensitive_medium database roles, due to our use of the Identification_Value_HT column that contains a hash value of the last four digits of our original plain text.
SQL Server :ONE-WAY ENCRYPTION - Creating the Interface (part 1) - Creating the View, Creating the Stored Procedures
Having earlier restricted direct access to the Borrower_Identification table, the ability to insert, update and search records that are contained within the Borrower_Identification table will be achieved through stored procedures.
SQL Server : Implementing One-Way Encryption (part 1) - Populate the Hash Columns, Verify the Implementation, Drop the Unencrypted Column
To verify that our hash values were successfully generated, we can execute SELECT statements that filter, based upon our newly generated columns, as shown in Listing 5.
SQL Server : Implementing One-Way Encryption (part 1) - Create the Primary Hash Column,Create a Secondary Hash Column for Searching
With our HomeLending database, there is an expectation by the users that the members of the Sensitive_medium database role should be able to search for borrowers based upon the values contained in the Identification_Value column.
Sql Server 2012 : Hierarchical Data and the Relational Database - Hierarchical Table Indexing Strategies
You can create a depth-first index or a breadth-first index (or both) on your hierarchical tables. The two types differ in how SQL Server physically stores node references in the index. Defining depth-first and breadth-first indexes can have a significant impact on performance for accessing data in hierarchical tables.
Sql Server 2012 : Hierarchical Data and the Relational Database - Populating the Hierarchy (part 3) - The GetAncestor Method
The GetAncestor method accepts an integer parameter that specifies how many levels to traverse up from the node it is invoked on to reach one of that node’s ancestors, and then returns the hierarchyid of the ancestor node.
Sql Server 2012 : Hierarchical Data and the Relational Database - Populating the Hierarchy (part 2) - The ToString Method
The preceding output shows the hexadecimal representation of each node’s encoded hierarchyid value, which is hardly useful to you.
Sql Server 2012 : Hierarchical Data and the Relational Database - Populating the Hierarchy (part 1)
In the preceding output, you see Dave’s record as the root node in the hierarchy at level zero. The hierarchyid value of 0x for NodeId positions Dave as the top-level node, set by the GetRoot method when you inserted the row.
Sql Server 2012 : Hierarchical Data and the Relational Database - The hierarchyid Data Type, Creating a Hierarchical Table
The hierarchyid data type enables a robust hierarchical structure over a relational table that can relieve you from much of this maintenance burden. Like the self-joining approach, each row in the table represents a node in the tree.
Personal Cloud WD My Cloud EX2 Review
Sharing many features with its predecessors in the WD My Cloud series of Network Access Storage (NAS) solutions, the WD My Cloud EX2 gives us more than just a 2-bay option to the series. Its performance and simplicity truly makes this NAS stands out from the crowd.
Synology DS213j Your Own Cloud Entertainment Starts Here
There seem to be several variations of the DS213, with the DS213j being the lowestcost version. It is distinguished by having a lesser processor and lacks such features as hot swapping of disks or the ability to be expanded to additional boxes.
ADATA Premier Pro SP920 256GB
Continuing its assault on the SSD market, ADATA has come out guns blazing with a brand-new lineup of drives. The Premier Pro SP920 family of 6Gbps SATA SSDs has a little something for everyone, in terms of capacity. Maybe you want a fleet-footed boot drive and nothing more.
Netgear ReadyNAS 314 Enterprise Network Storage
The Netgear ReadyNAS would suit someone who wants lots and lots and lots of storage. That’s thanks to its four drive bays (hot swappable, of course) and RAID 5 capabilities. RAID 5 provides performance benefits (thanks to the data being accessible on more than one drive) and security (thanks to redundancy), while still delivering about 75% of the headline capacity.
Budget Portable Hard Drivers Review
The world is a crowded place these days - finding any kind of space is a real luxury, and the same is true in the digital world. Given the amount of files and data for work, or music, photos and videos for entertainment that we all carry around with us, creating space for them all is hard work.
Toshiba Q Series 256GB and 512GB, Toshiba Q Series Pro 256GB
Toshiba’s previous drives had incomprehensible names, but that’s changed with the new Q and Q Pro drives. The former range is designed for mainstream use, and it’s here in its 256GB and 521GB guises.
SanDisk Ultra Plus 256GB And X110 256GB
SanDisk is clearly a fan of Marvell controllers, with the SS889187 chip used in the firm’s Extreme II drive , but for its Ultra Plus and X110 models, the firm has turned to the Marvell SS889175.
SanDisk Extreme II 480GB, Plextor M5 Pro Extreme 256GB and 512GB
Marvell’s name is seen in all the SanDisk and Plextor drives on this page. SanDisk’s Extreme II moves from a SandForce controller to the Marvell 88SS9187, although it’s been given a boost with SanDisk’s own firmware.
Samsung SSD 840 Evo 250GB, 500GB And 1TB
The SSD 840 Evo range is the only one on test to use TLC NAND, which stores 3-bits per cell. Specifically, it’s Samsung’s 19nm Toggle 2 NAND.
PNY XLR8 240GB and XLR8 PRO 240GB
The XLR8 brand is more often seen on PNY’s top-end, overclocked graphics cards, but it also adorns several of the firm’s mainstream and high end SSDs.
OCZ Vector 150 240GB And 480GB, And Vertex 460 240GB
CZ’s enthusiast-aimed Vector 150 and mainstream Vertex 460 drives, despite their different target users, use very similar hardware. The difference is that the Vertex 460’s Barefoot 3 controller I clocked slightly lower.
Intel 530 240GB and Transcend SSD 340 256GB
SandForce has spent years supplying controllers to prominent SSD manufacturers, with its SF-2281 chip leading the way, but it’s more recently come under pressure from firms such as Samsung, Toshiba and OCZ, who have either developed their own controllers or switched allegiances.
Crucial M500 240GB, 480GB and 960GB
Crucial’s M500 drives are handled by Marvell’s 88SS9187 controller, for which Crucial develops its own firmware, while IMFT 128Gb (16GB) 20nm MLC NAND dies are used throughout.
SQL Server : ONE-WAY ENCRYPTION (part 3) - Reducing Vulnerability: Salting a Hash
In culinary circles, salt is used as a preservative and a flavor enhancer. In the days before refrigeration meat was heavily salted for extended storage. The salt slowed the deterioration of the meat and prevented mold and bacteria from contaminating it.
SQL Server : ONE-WAY ENCRYPTION (part 2) - Known Vulnerabilities
The Payment Card Industry Data Security Standard (PCI DSS), through requirement 3.4, does offer one-way encryption as a valid option in storing the primary account number, which is considered sensitive, in a database.
SQL Server : ONE-WAY ENCRYPTION (part 1) - How One-Way Encryption Works, Benefits and Disadvantages of One-Way Encryption
As noted in the introduction, disclosure of the secret value, encrypted using one-way encryption, is achieved through comparing the stored hash value with a second hash value, or search value.
SQL Server 2012 : Measuring SQL Server Performance (part 7) - Viewing the Data Collector Data - Query Statistics History
The most common source of performance problems in SQL Server is poorly written code. Gathering information on the performance metrics of queries is a vital part of performance monitoring and tuning. Opening the Query Statistics History report will display a window similar to Figure 15.
SQL Server 2012 : Measuring SQL Server Performance (part 6) - Viewing the Data Collector Data - Disk Usage Summary
When you open the Disk Usage Summary report, you see a single graph. The report lists the databases over a period when the data collector was gathered. This allows you to see how the sizes of the databases are changing over time. Figure 13 shows the Disk Usage Summary report.
SQL Server 2012 : Measuring SQL Server Performance (part 5) - Viewing the Data Collector Data - Server Activity History
If you select the first item in the list, Server Activity History, you’ll see a window with a number of charts. All this information represents basic server-level data, showing information such as the amount of CPU or memory used, what processes are waiting when running inside SQL Server, and the aggregated number of activities over time.
SQL Server 2012 : Measuring SQL Server Performance (part 4) - Setting Up the Data Collector
Once the security is set, you’ll need to establish a server as the host to the management data warehouse, where the performance data gathered through the data collector will be stored.
SQL Server 2012 : Measuring SQL Server Performance (part 3) - Dynamic Management Objects, Data Collector
Introduced in SQL Server 2005, dynamic management objects (DMOs) are mechanisms for looking into the underlying structures and processes of the SQL Server 2012 system and, to a lesser degree, into the operating system. Of particular interest for looking at performance counters is the dynamic management view (DMV) sys.dm_os_performance_counters.
SQL Server 2012 : Measuring SQL Server Performance (part 2) - Performance Monitor
The Performance Monitor tool comes installed with all versions of the Windows operating system. This tool provides a graphical interface for accessing the performance counters introduced in the preceding section.
SQL Server 2012 : Measuring SQL Server Performance (part 1) - Understanding Performance Counters
Before getting into the methods to look at performance counters, we’ll discuss which performance counters are most useful to you. When you see the list of available performance counters, you’re likely to be overwhelmed.
SQL Server 2012 Security : How Hackers Attack SQL Server
Exposing any operating system or application directly to the Internet without the use of a firewall is a bad thing—no matter whether you are using Linux, UNIX, Windows, or any other operating system.
SQL Server 2012 Security : Partially Contained Databases
The dependency of database-specific users upon server-based logins poses a challenge when you need to move or restore a database to another server. Although the users move with the database, their associated logins do not, and thus the relocated database will not function properly until you also set up and map the necessary logins on the target server.
SQL Server 2012 : SQL Server Audit (part 3) - Viewing Audited Events,Querying Audit Catalog Views
After you enable your audit objects and audit specifications, SQL Server takes it from there. Audits for each monitored event declared in your audit specifications are recorded automatically to the destinations you’ve specified in your audit objects. After accumulating several audits, you’ll want to view them, of course.
SQL Server 2012 : SQL Server Audit (part 2) - Auditing Server Events, Auditing Database Events
You create a server audit specification to monitor events that occur at the server level, such as failed login attempts or other actions not associated with any particular database.
SQL Server 2012 : SQL Server Audit (part 1) - Creating an Audit Object, Recording Audits to the File System
SQL Server Audit is a powerful security feature that can track virtually any server or database action taken by users, and log those activities to the file system or the Windows event log.
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
REVIEW
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
programming4us programming4us
programming4us
 
 
programming4us