You've requested...

SQL Server Insider: Tips for the SQL Server Pro Vol. 8

If a new window did not open, click here to view this asset.

Download this next:

Jargon buster guide to database management

Database management roles have long been a rich career seam for IT professionals. However, there has been, in recent years, a “Cambrian explosion” in the previously steady but sleepy world of databases.

The relational database model, breaking the traditional dependency between data storage and applications, held sway in enterprise IT for decades, from the time of its serious commercialisation by Oracle in the mid-7os. Also hegemonic has been the language implementation of the relational model, SQL – Structured Query Language; which is of the same mid-70s vintage.

But, in recent years, with the rise of the big data technologies of the Hadoop stack and the NoSQL databases, the data store and database scene has become more complex.

And when it comes to the Oracle database, its creator announced it to be “autonomous” at Oracle Open World in San Francisco October 2017. What does this mean for database administrators (DBAs)? Does it mean the opening up of new roles of higher intellectual interest and value? Or does it mean redundancy and early retirement?

As always with IT, the technology is only one-third of the story – the others being process and, crucially, people. What are the operational and organisational design problems to be solved in this more heterogenous database management landscape?

This Jargon Buster e-guide to contemporary database management is an aid to stepping back and thinking afresh about an area of enterprise IT that has many decades of heritage. Or, as many sometimes (arguably rudely) put it, legacy.

These are also closely related to: "SQL Server Insider: Tips for the SQL Server Pro Vol. 8"

  • A Computer Weekly buyer's guide to NoSQL

    There’s a lot of data out there, much of which doesn’t

    need to be stored in heavyweight relational databases complete with complex query languages. In this 13-page buyer’s guide, Computer Weekly looks at a new category of NoSQL data stores and how they are being used. 

    Discover more on: 

    - NoSQL offerings from Microsoft and Oracle

    - The suppliers behind the emergence of databases that organise web-scale datasets and the like – and the most recent set of upstarts dubbed NewSQL

    - Enterprise use cases  for NoSQL database technology

  • Enterprise-wide collaboration: Make your case

    As organizations look to take advantage of the potential benefits of enterprise-wide collaboration, many are turning to Microsoft SharePoint 2010 as their collaboration technology platform. But in order for SharePoint deployments to lead to effective use of the collaboration software, companies need to plan carefully and manage their implementations properly.

    In this e-book, intended for IT as well as content and collaboration management professionals, you will find practical advice on building a business case for adoption of SharePoint and planning a SharePoint project from experienced users and industry analysts. You'll also learn about best practices for successful SharePoint deployments, get tips on ongoing management of SharePoint installations and learn about the potential pitfalls and challenges involved in SharePoint implementations.

    Read on and you will:

    • Discover how to make the case for enterprise-wide adoption of SharePoint and get expert tips on getting started on a project  
    • Learn about the key steps to ensure successful SharePoint deployments
    • Get tips for proper SharePoint management to optimize system performance and enterprise-wide use
    • Find out about the common pitfalls and challenges of effective SharePoint implementation and usage

Find more content like what you just read:

  • Top 10 Azure mistakes and how to fix them

    Deploying, managing, and scaling Microsoft Azure Virtual Desktop can be a complex process for technicians at any level of experience. In this white paper, browse the top 10 most common mistakes IT professionals make in Microsoft Azure.

    Download

  • CW APAC: Trend Watch: Database technology

    In this handbook, focused on database technology in the Asia-Pacific region, Computer Weekly looks at the impact of graph databases and the different types of database management systems currently on the market.

    Download

  • Why NoSQL for AI-powered apps: A guide for developers

    Modern NoSQL databases incorporate multiple data access methods and encompass a variety of models including key-value, document, column, time series, graph, text search, and AI vector search. This developer’s guide explains the many advantages that are making multipurpose NoSQL databases the developer’s choice for AI-powered adaptive applications.

    Download

  • Inside the successful projects that rely on NoSQL database applications

    Check out this white paper for a look inside the modern challenges that NoSQL databases address, as well as when to choose NoSQL over relational and why.

    Download

  • A helpful way to map MITRE ATT&CK tactics to Azure actions

    Chasing down Microsoft Defender alerts and combing through Azure Monitor activity logs can be tough if you don’t know what to look for. To give you a jump start on investigations, this handy cheat sheet mapped the Azure services in which these tactics often originate, along with the actions attackers make to execute on these techniques.

    Download

  • FAQ: Hadoop for BI and Analytics

    Because it's a relatively new technology, Hadoop is surrounded by many myths and most IT professionals have little to no experience with the big data platform. This expert E-Guide aims to dispel common Hadoop misconceptions and offers advice for how to utilize it to drive big data analytics success.

    Download

  • E-Guide: Achieve the benefits of virtualized mission-critical applications

    In this expert e-guide, find out about the many benefits of virtualizing your mission critical applications such as improved hardware utilization and efficiency. Also, discover where to virtualize your applications to maximize these benefits.

    Download

  • 5 Steps to Ensure the Success of Your Cloud Data Migration

    How can organizations ensure they create tangible business value with a cloud data warehouse? It all starts with a plan. Business leaders need to map out a strategy and plan what to migrate, how to migrate it, and when to migrate it to maximize their investment in the cloud. Read on to learn 5 steps to leading a successful cloud migration.

    Download

  • E-Guide: Keys to Protecting Web Applications from Vulnerable Exploits

    Today’s attackers are stealing substantial amounts of confidential information every day by exploiting vulnerable Web application servers. This expert e-guide highlights the most popular Web application attack methods and offers advice on how to keep your network safe through URL filtering.

    Download

  • A comparison of Azure, AWS, and Google cloud services

    AWS, Azure, and Google are all huge names in the cloud space, offering everything from big data in the cloud to serverless computing options and more. Read on for a vendor-neutral comparison of these three providers to determine which combination – if any – best fits your organization's infrastructure requirements.

    Download

  • E-Guide: Preventing and detecting security vulnerabilities in Web applications

    The extent of fundamental security flaws in most applications often requires a re-architecture, but there are some secondary measures information security teams can take to safeguard faulty applications. This expert tip maps out the steps security professionals should take to lock down their Web applications.

    Download

  • Improve SQL Server performance with transformative database services

    Discover in this product overview why, as enterprises generate and store more and more operational data, they have come to rely on Microsoft SQL Server infrastructure more than ever before.

    Download

  • Data integration to support modern BI and advanced analytics programmes

    In this e-guide we discuss why data integration and preparation are the unsung heroes of modern BI and advanced analytics. More so than ever, it would seem, due to the ever-increasing volume and variety of data.

    Download

  • Toughening up web and mobile application security

    In this e-guide, read more about the best practices for web application security, how to balance app innovation with app security, why API security needs to be part of your defence strategy, and what are the top tools to keep your applications safe, among other trends.

    Download

  • Experience the Benefits of SaaS-Delivered Data Protection with Commvault Cloud

    In this white paper, take a close look at the security services Commvault Cloud can deliver for your organization, and find out how you can tailor your security solution to your cloud’s needs.

    Download

  • Empowering your application teams with database as a service (DBaaS)

    The shift to Database as a Service (DBaaS) marks a significant stride in cloud transformation, offering unmatched scalability, performance, and security for database workloads. Read on to learn how DBaaS can alleviate your in-house teams from the intricacies of database management, empowering them to focus on innovation and strategic initiatives.

    Download

  • A Computer Weekly buyer's guide to application modernisation

    In this 15-page buyer's guide, Computer Weekly investigates how organisations are approaching the modernisation, replatforming and migration of legacy applications. We look at the tools and technologies available, change management, and the use of APIs and containerisation to make legacy functionality to cloud-native applications.

    Download

  • Hadoop Data Management Platforms and Appliances

    This expert Technology Guide provides an introduction to Hadoop and suggests criteria for selecting a Hadoop data management platform. Also included are reviews of leading Hadoop systems from a variety of vendors.

    Download

  • A clear SaaS vision for today’s CIOs: 5 building blocks to hybrid cloud success

    As companies are caught between the realities of cloud and on-premises, the data sprawl that ensues can create complexities that make it hard to mitigate the risk of ransomware. Download this e-book to learn about the 5 building blocks to hybrid cloud success and understand how SaaS-delivered solutions can bridge the resource gap.

    Download

  • A Computer Weekly Buyer's Guide to Enterprise Open Source

    In this 13-page buyer's guide, Computer Weekly looks at open source technology. Discover more about why open source has become the infrastructure choice over commercial software; the due diligence required to reap the rewards of open source and how to choose the best fit for your needs.

    Download

  • Virtual Data Center E-Zine Volume 37: Maximizing Virtual Data Center Consolidation

    Virtualization may be well underway, but it doesn't mean new challenges won't arise as you continue to navigate your initiative. This expert e-zine offers detailed guidance for achieving the right balance in your virtual data center and presents key findings concerning your peers' consolidation objectives for 2012.

    Download

  • Provider shifts 254 servers to Azure, boosts uptime, cuts costs

    Anunta helped a business solutions provider support new clients using Azure Cloud. They migrated servers and VDI, ensuring secure access, cost optimization, disaster recovery, and compliance. Discover how they enhanced performance and agility in this Azure case study.

    Download

  • New wave BI and analytics: turning modern data stores to account

    This e-guide looks at how companies and other organisations are doing BI and analytics on the newer data stores.

    Download

  • Developing the Intelligent Core with Windows Server 2019

    65% of European CEOs are under significant pressure to deliver on their digital transformation (DX) strategies. Creating a digital platform with an intelligent core is key to success. Learn more about digital platforms inside this resource.

    Download

  • How a next-generation firewall prevents application-layer attacks

    The application awareness of next-generation firewalls (NGFW) provides security IT teams with new opportunities and challenges. Read this expert E-Guide to discover how a NGFW prevents application-layer attacks and why they are important to consider as a form of defense for the enterprise.

    Download

  • E-Guide: Database Tools for Auditing and Forensics

    This e-guide presents the best practices for tuning database auditing tools. Continue reading this e-guide to learn more about these best practices which will allow you to audit without forfeiting  database performance.

    Download

  • Application security: More important than ever

    In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.

    Download

  • Web security: Important but often overlooked

    In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.

    Download

  • A Computer Weekly Buyer's Guide to Application Development and DevOps

    Harnessing the right developer tools offers new advantages for businesses. In this 14-page buyer's guide, Computer Weekly looks at the benefits and limitations of the DevOps approach, what Microsoft is doing with its developer platform and the rise of the holistic application.

    Download

  • Web-facing applications: Security assessment tools and strategies

    Read this expert E-guide to find out how you can properly asses web application threats and the tools your organization can use for protection. Learn how to mitigate likely web application threats and how you can ensure your business is protected.

    Download

  • Simplify your application modernization journey

    The longer you wait to upgrade your apps, the more difficult it becomes to execute. That’s why now is the time to figure out your modernization path so your organization can stay competitive. Read on to discover how you can leverage AI-assisted automation in your modernization efforts to reduce time to market, overall risk and total cost.

    Download

  • Web-Facing Applications: Mitigating Likely Web Application Threats

    In this expert E-Guide, learn how the increased use of business-centric Web applications has spawned alarming new information security threats. Also inside, uncover tips, tricks, and best practices for making your Web apps more secure – read on to get started.

    Download

  • Web Application Firewalls: Patching, SDLC Key for Security, Compliance

    In this expert e-guide, discover how web application firewalls (WAFs), combined with a strong software development lifecycle (SDLC), are playing an essential role in web application security and compliance. See how you can achieve a strategic, defense-in-depth approach to enterprise security by reading on now.

    Download

  • PKI as a service vs. legacy PKI: Understand the differences

    Along with exploring the hidden costs of legacy PKI, this infographic introduces an alternative approach to PKI management: PKI as a service. Continue on to discover six benefits of PKI as a service.

    Download

  • Hadoop Data Management and Use Cases

    In this expert e-guide, hear from pros in the analytics space, including Wayne Eckerson, explore how organizations are beginning to integrate Hadoop deeper into operational workflows, expanding the possible use cases.

    Download

  • AWS Re:Invent 2019: What CIOs need to know from this year's show

    The Amazon Web Services (AWS) Re:Invent user conference saw 65,000 users, developers and business leaders convene in Las Vegas to hear news about the firm's innovation priorities. In this e-guide, we provide a round-up of all the big stories and announcements from this year's Re:Invent, and give readers some clues as to where AWS is heading next.

    Download

  • A Computer Weekly buyer’s guide to hybrid cloud

    Computer Weekly looks at how to find the best hybrid cloud provider for your organisation, the impact of hybrid cloud on the infrastructure manager and how Microsoft is catching up with the cloud market with Azure.

    Download

  • Application security testing: Protecting your application and data

    Application security testing is critical in ensuring your data and applications are safe from security attack. This e-book, written for IT management, including QA and development managers, explains the basics of application security and then delves deeper into common vulnerabilities and performance concerns.

    Download

  • Preparing a database strategy for Big Data

    This e-guide outlines the key database challenges and opportunities introduced by big data, and offers expert advice to help you successfully prepare a big data database strategy.

    Download

  • Application security: best practices and risks

    Security professionals need to anticipate vulnerabilities from all the right perspectives, and that means testing apps for flaws on a regular basis, whether that means monthly, quarterly or following updates. Check out this e-guide, which include application security best practices, threat identification and security testing tips.

    Download

  • With InterSystems Financial Services Suite, data silos are a past relic

    Consider the challenges and barriers (such as silos and time-intensive data validation processes) to effective financial services data management in this InContext Paper by Bloor. You’ll also understand how InterSystems Financial Services Solution Suite resolves these issues with a 360-degree view of enterprise and customer data.

    Download

  • Developer’s guide to secure coding

    This 31-page eBook provides a roadmap to secure coding in practice. Inside, find a deep dive into common software vulnerabilities, how hackers exploit them, what you need to know to prevent a breach, and more.

    Download

  • Storage Buyer's Checklist: Solid-State Storage Arrays

    In this expert Essential Guide, check out solid-state storage array options, purchasing considerations and access a buyer's feature checklist. Make a better decision today!

    Download

  • A Computer Weekly buyer's guide to secure and agile app development

    As apps become increasingly integral to business operations, the importance of keeping them secure can never be overstated. In this 15-page buyer's guide, Computer Weekly looks at how firms can protect apps from ransomware, why app creation needs to happen at pace, and how to get the right balance between security and coding

    Download

  • Mitigate these 3 risks to container & IaC security

    Along with highlighting 3 prevalent risks to container and IaC (infrastructure as code) security, this e-book instructs readers on how to mitigate those risks with a holistic approach to security. Continue on to unlock these insights.

    Download

  • Taking Action to Secure Web Applications

    This expert E-Guide from SearchSecurity.com explores the vulnerabilities of web applications and explores steps you should take to keep them safe.

    Download

  • An inside look at AstraZeneca’s IT

    In an industry where speed is everything, growing technology bottlenecks can hold you back. In this case study, learn how AstraZeneca adopted cloud automation technology, updated their provisioning, and improved compliance with the help of Morpheus Data. Read the study here.

    Download