On November 19th, 2020, I delivered a short session about Azure SQL Analytics, as part of the MVP Days Israel 2020 event. MVP Days Israel 2020 was a full-day event driven by the local (Israeli) MVP community to share knowledge on various Microsoft products across the board – Azure, GitHub, DevOps, Power Apps, AI, Data […]
Today I learned that after I published my SQL Vulnerability Assessment Rules Reference List, Microsoft themselves have also published such a list on their Docs page. Well I just had to one-up my version even further!
Following an incident at a customer’s production environment, Nathan Lifshes and I realized that we stumbled upon a yet-unknown bug in SQL Server, causing an access violation error, memory dumps, dropped connections, and even cluster fail-overs.
This month’s #tsql2sday came to us from Rob Volk, who asks us to explain databases using an analogy, as if explaining to a 5 year old. I’m actually a big fan of The Feynman Technique (aka ELI5), so I really wanted to participate. But to be honest, I nearly missed out this time because I couldn’t think of an idea this whole week.
But on the very last day the muse finally hit me. I kid you not, the time is literally 23:59 here in Israel as I hit the publish button!
In this blog post I’ll help you troubleshoot the rare but critical issues of Deadlocked Schedulers and high THREADPOOL waits.
Following my presentation of “How to HADR Your SQL Server Jobs” at the HA/DR PASS Virtual Group yesterday, David Klee (@kleegeek) and I continued chatting for a bit longer after the recording was concluded. During which, the MSX/TSX feature of SQL Server came up, and David suggested that I’d utilize my newly earned MVP status to push a feature request to expand these capabilities.
This month, Elizabeth Noble is hosting #tsql2sday with the topic of automation. This is very similar to previous couple of T-SQL Tuesdays hosted by Ken Fisher (127) and Jess Pomfret (123). I already wrote about the topic of automation extensively in those past posts. So, instead of repeating myself, I’m gonna write about this topic […]
My hard work and public contributions during these past few years continue to pay off in spades, and I’m excited to announce that I have finally received the Microsoft MVP award!
Assume you have some kind of process outside the SQL Server which is supposed to record some kind of database activity. There are many ways to do it, most of which require constant and/or stable connection to the database. But what if that’s not good enough? Let’s consider our options.
In this post, I hope to summarize the various methods that we have, in order to get rid of that annoying authentication prompt. Each method has its own advantages and disadvantages in terms of complexity of implementation, versatility, and the level of security that it provides. More specifically: the more secure and versatile a method is – the more complicated it is to implement.
Something went wrong. Please refresh the page and/or try again.
Follow My Blog
Get new content delivered directly to your inbox.
Other ways to find me:
- November 2020 (2)
- October 2020 (3)
- September 2020 (3)
- August 2020 (2)
- July 2020 (3)
- June 2020 (3)
- May 2020 (3)
- April 2020 (3)
- March 2020 (3)
- February 2020 (2)
- January 2020 (2)
- December 2019 (4)
- November 2019 (1)
- October 2019 (1)
- September 2019 (3)
- May 2019 (3)
- April 2019 (1)
- January 2019 (2)
- November 2018 (6)
- October 2018 (14)