Uncategorized

Mass Data Management

Don’t Miss the Latest SQL Server Show
Posted Friday, the show is a "Best Of" with information about getting started with Reporting Services

> Watch Here

Featured Article(s)
Populating Sparse or Missing Series Data Using Partitioned Outer Joins
This article describes how to populate sparse or missing serial data with Oracle’s partitioned outer join. This tool is essential for correct trending and other statistical analysis

Standby Failover and Recovery
Sometimes, simplicity is the difference between getting the job done right and not being quite sure if you’re all set. With backup and recovery, stand-by systems and failover/recovery operations, it’s never more critical to make sure you have all of your bases covered. With Sonasoft, you can use single-click failover, recovery and "fail-back" operations that will help you keep your systems up and going and available. One-click. Really. Check it out here.

Mass Data Management
I’ve been going back through trade publication articles, whitepapers and such and trying to pull together how and where everyone is seeing data management going. Specifically, as we talk about these massive databases, then how to best actually make use of them, it’s fascinating to see how people think things will play out.

We talked about "corporate tagging" – and how that plays into things. We’ve talked too about having common schemas and even data abstraction layers that help different data sources look less… different. With all of this, we’ll be exposing a lot more about our databases, their structures, the information contained in the systems, etc. This means that those data stores that have information about data stores have to be protected and secured. I’ve seen some early systems in place to allow tagging at a corporate level and the tagging system wasn’t monitored and/or protected at all! It seems odd to think about perhaps, but the tags that people put in are confidential, they can lead to data discovery by some people that have not business discovering anything at all about your business.

So, as you build out these systems and start making different classification systems available, make sure you’re watching over things security-wise, information-wise, access-wise so you know who is seeing what. Protect the data and meta data. It’s a bit like the issues not so long ago with a search engine releasing search data from users. It was quickly shown that the information searched on could be used to build a very convincing profile about the person searching. This went all the way down to actually identifying the person, even though the data was anonymized.

Just be careful about the types of access you’re granting and supporting not only at the data level, but at the metadata level. It could be a really tense situation if people are able to extrapolate personal details, corporate information or other things just by looking at tag pools.

Featured White Paper(s)
Burstek 2005 Internet Usage Study with Focus: Finance and Education Industries
Burstek, a leading developer of Internet security software for global enterprises, conducted a study of US Internet users in … (read more)

Microsoft T-SQL Performance Tuning Part 1: Analyzing and Optimizing T-SQL Query Performance on Microsoft SQL Server using SET and DBCC
This white paper, authored by SQL Server expert Kevin Kline, discusses the basics of indexes, such as density and selectivity… (read more)

Architecting the Infrastructure for SOA and XML
As application systems are developed using SOA principals and implemented using XML and Web Services, the increasing sophisti… (read more)

Minimizing Downtime and Maximizing Performance in Microsoft® SQL Server 64-bit environments
… (read more)

The Database Utility for SQL Server: A Highly Available, Flexible, Simple Approach to SQL Server Consolidation
How to Achieve a 50% Reduction in total Cost of Ownership with Shared Data Clustering…. (read more)