Info

GroupBy – Free SQL Server Training

GroupBy.org is free technical training by the community, for the community. Volunteer speakers submit abstracts at GroupBy.org and you – the attendee – vote to pick the sessions. Want to present your own session or just vote on others? Join us at GroupBy.org.
RSS Feed
GroupBy – Free SQL Server Training
2018
October
September
July
June
May
April
February
January


2017
December
November
October
September
August
July
June
May
April
March
February
January


All Episodes
Archives
Now displaying: November, 2017
Nov 28, 2017

Once data leaves your SQL Server, do you know what happens, or is the world of networking a black box to you? Would you like to know how data is packaged up and transmitted to other systems, and what to do when things go wrong? Are you tired of being frustrated with the network team?

In this session, we introduce how data moves between systems on networks, then look at TCP/IP internals. We’ll discuss real-world scenarios showing you how your network’s performance impacts the performance of your SQL Server and even your recovery objectives.

Nov 21, 2017

Based on the successful 500 Level talk at PASS 2016, this session will provide an internals view of how In-Memory OLTP works for SQL Server 2016 and 2017. Because this session is Advanced, it is intended for those that understand the basic fundamentals of In-Memory OLTP but want to learn how the “Hekaton” engine works behind the scenes to deliver the amazing 30x performance improvements seen for customers moving to In-Memory OLTP. This session will include a look behind the scenes at threads, data and index design, transactions and concurrency, logging, storage, and natively compiled procedures.

I’m a big believer in visuals and demos so you will see plenty of that as I describe how the Hekaton engine is truly lock-free and latch-free. And of course since this is an advanced talk, the Windows Debugger will definitely make an appearance during the session.

And since this will be an advanced level session, of course, the demonstration of the looking at the Hekaton engine with the debugger is a must.

Nov 14, 2017

Are you faced with complaints from users, poor performing code from developers, and regular requests to build reports? Do you uncover installation and configuration issues on your SQL Server instances? Have you ever thought that in dire times avoiding Worst Practices could be a good starting point? If the answer is “yes”, then this session is for you: together we will discover how not to torture a SQL Server instance and we will see how to avoid making choices that turn out to be not so smart in the long run.

You are probably thinking: “Hey, wait, what about Best Practices?”. Sometimes Best Practices are not enough, especially for beginners, and it is not always clear what happens if we fail to follow them. Worst Practices can show the mistakes to avoid. I have made lots of mistakes throughout my career: come and learn from my mistakes!

Circles in the SQL Server Hell:

Design sins:

  1. Undernormalizers
  2. Generalizers
  3. Shaky Typers
  4. Anarchic Designers
  5. Inconsistent Baptists

Development sins:

  1. Environment Pollutors
  2. Overly Optimistic Testers
  3. Indolent Developers

Installation sins:

  1. Stingy Buyers
  2. Next next finish installers

Maintenance sins:

  1. Careless caretakers
  2. Performance killers
Nov 7, 2017

Microsoft has introduced native capability to the database engine around masking sensitive data and restricting access at the row level. Allowing us new options for building more secure Data Platform solutions. However, it is important to understand the differences from our previous options in order to be able to gain the most benefit from these new technologies.

Join me as we look in more detail at how we can engineer these features into our Data Platform solutions. Starting with identifying the problems they are trying to solve, through their core architecture and on to potential design patterns for their use. As with any security technology solution, there are a number of ways to use these features. However, as with all security features, there are gaps in coverage, using them effectively in a layered approach is vital.

After this session, you will be in a position to start looking at whether your systems can benefit from these features. Along with how you can potentially start building functionality into your applications.

1