Franklin,TN 37067
+1 (888) 412-7376
info@theserogroup.com

Tag: Database Development

wrangling sql server log files

Log-Wrangling 101: 7 Tips for Managing Your SQL Server Transaction Logs

In my last post, I broke down the parts of the anatomy of the SQL Server transaction log. In this post, I will share a few tips for keeping your transaction logs well-maintained and your SQL Server databases happy and healthy. Here are 7 important tips for managing your transaction logs: Now, let’s break these…
Read more

SQL Server log files

Anatomy of a SQL Server Transaction Log

Recently, we discussed the role of the recovery model in establishing how SQL Server manages database transaction logs. But what is the SQL Server log composed of? How does the logging process work? In this post, we will dissect the SQL Server transaction log to uncover its core anatomy. First, what is the transaction log?…
Read more

sql server slow disks in Azure

Analyzing Disk Latency in Azure Virtual Machines – Part 2

“I thought the cloud was supposed to be fast. Why are things moving like a sloth?” Have you heard someone complain about the speed of an application after moving it to the Microsoft Azure? Azure is a good environment, but things are not always fast in the cloud. To illustrate, in this post, we’ll review…
Read more

sql server webinar

Should I Use VM Snapshots to Backup SQL Server? A Webinar

“Should I Use VM Snapshots to Backup SQL Server?” Like so many SQL Server related questions, the answer is “It depends.” However, most often the ultimate answer will be no. And, in this upcoming webinar we’ll share 8 questions you should ask before using VM snapshots as your approach to backing up SQL Server. RTO…
Read more

which sql server recovery model

What is a SQL Server Recovery Model?

When we meet with clients for an initial SQL Server Health Check, we’re sometimes asked what a SQL Server recovery model is. Once explained, the natural follow up question often is: well, then which recovery model should we use? In this post, we will address both of these important questions. What is a SQL Server…
Read more

disk latency in azure

Analyzing Disk Latency in Azure Virtual Machines – Part 1

If you’ve moved your SQL Server workload to Azure Virtual Machines, you’ve noticed there’s no shortage in the number of options available. Virtual machine sizes, disk types, caching vs no caching, support for bursting, etc. When hosting SQL Server on Azure Virtual Machines, choosing the right combination of VM size and disk types is essential…
Read more

SQL Server DBA celebration

Preview Our New SQL Server Daily Health Check in an Upcoming Focus Group

Our team has been hard at work building the new SQL Server Daily Health Check Email and Dashboard. It’s designed to proactively deliver the information needed to keep your SQL Server environment healthy, secure, reliable, and running smoothly. And, we’d like your feedback on it. How the new SQL Server Daily Health Check works Here’s…
Read more

Make data security your new years resolution

New Year Resolution: Recommitting to Data Security and Lessons from the Xfinity Breach

As we ring in 2024, many are reflecting on the past year and making resolutions for the future. For businesses, one resolution should stand out: recommitting to data security. The late-2023 Xfinity breach, where 36 million customers had their personal information compromised, serves as a stark reminder of the ever-present threat of cyberattacks. What happened?…
Read more

archiving data in sql server

Archiving and Deletion Strategy…KonMari for Data Management?

Welcome to the third and final post in our series on Data Lifecycle Management (DLM), where we will talk about archiving and purging company data. In the last post, we talked about applying the Kaizen approach to data management to achieve a culture of continuous improvement on our data teams. In this post, we will…
Read more

DB#JAMMER targets SQL Server

DB#JAMMER is Targeting Poorly Secured SQL Servers

SQL Server is being targeted again. This attack is called DB#JAMMER. And it’s targeting poorly secured SQL Servers. What’s happening? Attackers begin by brute-forcing access into poorly secured SQL Servers. Once they have gained access, the attackers use xp_cmdshell to deploy tools. They manipulate the firewall, if needed, and transfer files to and from the…
Read more