Capturing Index Usage Stats
Overview Index usage stats are invaluable for evaluating performance of existing indexes. Every time an index is used by the query-engine, an internal table is updated reflecting that usage. So, every time a scan, seek,…
Hidden tables in SSMS: detect and create them!
Did you know hidden tables may be lurking in your database? SQL Server Management Studio is a world-class database management toolset, and includes some really great features. Arguably the most-used feature is the Object Explorer…
Modify device path for multiple Backup Devices
Backup Devices provide a nice way to permanently configure the backup location, enabling BACKUP DATABASE to look like:
1 |
BACKUP DATABASE [xyz] TO [backup-device-name]; |
When you create a Backup Device, you specify the physical location where backups will actually be…
Common data-type conversions between SQL Server, Oracle, Sybase ASE, and DB2.
SQL Server includes a little-known, but handy, function that can show you common data-type conversions for a target system; useful for ETL between disparate systems. Run this code:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 |
DECLARE @source_dbms sysname = N'%' , @source_version sysname = N'%' , @source_type sysname = N'%' , @destination_dbms sysname = N'%' , @destination_version sysname = N'%' , @destination_type sysname = N'%' , @defaults_only bit = 0; SELECT * FROM sys.fn_helpdatatypemap ( @source_dbms , @source_version , @source_type , @destination_dbms , @destination_version , @destination_type , @defaults_only ); |
The above code returns a result-set…
Data Masking is not enough to protect personal information from prying eyes!
Data Masking is the process of either obfuscating or replacing personally identifying information with meaningless data that cannot be used to identify the items being masked. The data masking process is frequently used to alter…
Enumerating SQL Server instances on a remote Windows host
Programmatically enumerating a list of SQL Server instances from a remote Windows server can be challenging. If you have the Remote Registry activated, and know the name of the target server, you can fairly easily…