Get flash to fully experience Pearltrees
Use the PowerPivot Add-in for Excel to import data from Microsoft SQL Server rel... Instructions for installing the PowerPivot Add-in for Excel. This video provides an introduction to Relationships in PowerPivot. A relationsh...
Users in a contained database that have the ALTER ANY USER permission, such as members of the db_owner and db_securityadmin fixed database roles, can grant access to the database without the knowledge or permission if the SQL Server administrator. Granting users access to a contained database increases the potential attack surface area against the whole SQL Server instance. Administrators should understand this delegation of access control, and be very careful about granting users in the contained database the ALTER ANY USER permission. All database owners have the ALTER ANY USER permission. SQL Server administrators should periodically audit the users in a contained database.
A contained database is a database that is isolated from other databases and from the instance of SQL Server that hosts the database. SQL Server 2012 helps user to isolate their database from the instance in 4 ways. Much of the metadata that describes a database is maintained in the database. (In addition to, or instead of, maintaining metadata in the master database.) All metadata are defined using the same collation. User authentication can be performed by the database, reducing the databases dependency on the logins of the instance of SQL Server.
1 Enterprise Edition with Server + Client Access License (CAL) based licensing is limited to a maximum of 20 cores per SQL Server instance. For more information, see Compute Capacity Limits by Edition of SQL Server . Top 1 For more information on installing SQL Server 2012 on Server Core, see Install SQL Server 2012 on Server Core . 2 This feature is only available for 64-bit SQL Server. 2 SQL Server Web, SQL Server Express, SQL Server Express with Tools, and SQL Server Express with Advanced Services can be profiled using SQL Server Standard and SQL Server Enterprise editions.
Friends, the final and complete version of Introducing Microsoft SQL Server 2012 , by Ross Mistry ( @RossMistry ) and Stacia Misner ( @StaciaMisner ), is now ready as a free download! You can download the PDF version of this title here (288 pages; 10.8 MB). We will update this post soon with links to EPUB and MOBI files. We expect these files to be available by March 23. UPDATE: The EPUB is here , and the MOBI is here . If you prefer a hard copy of the book, you can order it here for $14.99 .
Want a jump-start on testing the hottest scale-out feature in SQL Server 2012? Kendra Little will tell you why it’s critical that you configure your own lab, and what you need to get your test environment set up. She’ll also detail how to avoid some gotchas that could cost you hours of frustration. She’ll demonstrate the steps you need to enable the Availability Group feature in SQL Server 2012 and how to create and test your first Availability Group. This half-hour session is appropriate for DBAs with one or more years of experience with SQL Server: Links mentioned in the video:
In both of the sessions that I covered in SQL Server Pro’s eLearning event, Practical SQL Server Improvements for Businesses , I made mention of additional context, guidance, and links that could be used to better get a handle on SQL Server 2012 AlwaysOn functionality as well as Contained Databases and Indirect Checkpoints. SQL Server 2012 AlwaysOn One of the key things I tried to iterate in both of my sessions is that while it’s a bit silly for Microsoft to have called improvements/successors to both Clustering (AlwaysOn Failover Cluster Instances) and Mirroring (AlwaysOn Availability Groups) by the same AlwaysOn ‘moniker’, the reality IS that BOTH successors do, indeed, provide some amazing benefits in the sense that they BOTH offer not only HA benefits, but DR benefits as well.
In Part VII of this series on SQL Server Database corruption we touched upon how backups can be used as an additional means of early detection for corruption – by making sure to validate the checksums of all data being backed up. The Importance of Backups In Recovering from Corruption But, did you know that backups are your BEST line of defense in recovering from MOST forms of database corruption?
Advertisement <div><a href="//ad.doubleclick.net/N3834/jump/sql.home/sql_server;pos=180_1;ptype=article;page=/sql-server/confusing-high-availability-disaster-preparedness;sz=180x150;tile=1;ord=123456789?" target="_blank"><img src="//ad.doubleclick.net/N3834/ad/sql.home/sql_server;pos=180_1;ptype=article;page=/sql-server/confusing-high-availability-disaster-preparedness;sz=180x150;tile=1;ord=123456789?" border="0" alt="" /></a></div> When considering a proactive approach to disaster recovery, it’s only natural to look to high availability solutions as a way to cope with system or data-center outages. However, although high availability solutions are a fantastic complement to any disaster recovery plan, substituting high availability solutions for disaster recovery can be fatal.
SQL Server Agent The SQL Server Agent is a separate process, which is tasked with running database jobs (including jobs setup from a database maintenance plan), raising alerts and notifying operators. Alerts
SQL Server Sites