Your SlideShare is downloading. ×
  • Like
IT PRO|DEV CONNECTIONS 2013 - The X-Files of SQL Server
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Now you can save presentations on your phone or tablet

Available for both IPhone and Android

Text the download link to your phone

Standard text messaging rates apply

IT PRO|DEV CONNECTIONS 2013 - The X-Files of SQL Server

  • 213 views
Published

 

Published in Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
213
On SlideShare
0
From Embeds
0
Number of Embeds
3

Actions

Shares
Downloads
8
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. The X-Files of SQL Server 20XX Antonios Chatzipavlis SQL Server Evangelist - MVP MCT • MCSE • MCITP • MCPD • MCSD • MCDBA • MCSA • MCTS • MCAD • MCP • OCA December 7-8, 2013 Athens, Greece the cutting edge event for ITPros and Devs
  • 2. SPEAKER DETAILS Antonios Chatzipavlis Solution Architect – SQL Server Evangelist • • • • I have been started with computers since 1982. In 1988 I started my professional carrier in computers industry. In 1996 I have been started to work with SQL Server version 6.0 In 1998 I earned my first certification at Microsoft as Microsoft Certified Solution Developer (3rd in Greece). • Since then I earned more than 30 certifications (and counting!) • MCT, MCITP MCPD, MCSD, MCDBA, MCSA, MCTS, MCAD, MCP OCA, ITIL-F , , • MCSE : Data Platform, MCSE: Business Intelligence • In 1998 started my carrier as Microsoft Certified Trainer (MCT). • Since then I have more than 20.000 hours of training. • In 2010 I became for first time Microsoft MVP on SQL Server • In 2010 I created the SQL School Greece (www.sqlschool.gr) • I am board member of IAMCT organization and Leader of Greek Chapter of IAMCT organization. • In 2012 I became MCT Regional Lead by Microsoft Learning Program. • I am moderator of autoexec.gr and member of dotnetzone.gr
  • 3. GET IN TOUCH @antoniosch @sqlschool …/sqlschoolgr www.sqlschool.gr help@sqlschool.gr
  • 4. WHAT’S NEW IN SQL SERVER 2014 • Database Engine • In-Memory OLTP (Hekaton) • AlwaysOn Enchancements • Columnstore Indexes • Analysis Services and BI • SSDT for BI • Power View for MD Models • Integration Services • Reporting Services
  • 5. ARM TOOL
  • 6. BUFFER POOL EXTENSION • The buffer pool extension size can be up 32 times of RAM size • Recommend a ratio between the size of the physical memory (max_server_memory) and the size of the buffer pool extension of 1:16 or less. • A lower ratio in the range of 1:4 to 1:8 may be optimal. • Enterprise Edition only 
  • 7. SETTING BUFFER POOL EXTENSION OPTIONS ALTER SERVER CONFIGURATION SET BUFFER POOL EXTENSION ON (FILENAME = 'F:SSDCACHEExample.BPE', SIZE = 50 GB); GO ALTER SERVER CONFIGURATION SET BUFFER POOL EXTENSION OFF; GO
  • 8. BACKUP AND RESTORE ENHANCEMENTS • SQL Server Backup to URL • Encryption for Backups • AES 128, AES 192, AES 256, and Triple DES. • You must use either a certificate or an asymmetric key to perform encryption during backup • Screen Cast on SQLschool.gr http://bit.ly/1coQOM0 • SQL Server Managed Backup to Windows Azure
  • 9. SQL SERVER & WINDOWS AZURE • SQL Server Data Files in Windows Azure • Enables native support for SQL Server database files stored as Windows Azure Blobs. • This feature allows you to create a database in SQL Server running in onpremises or in a virtual machine in Windows Azure with a dedicated storage location for your data in Windows Azure Blob Storage. • Host a SQL Server Database in a Windows Azure Virtual Machine • Use the Deploy a SQL Server Database to a Windows Azure Virtual Machine Wizard to host a database from an instance of SQL Server in a Windows Azure Virtual Machine.
  • 10. DELAYED DURABILITY • Fully durable transaction • commits are synchronous • report a COMMIT as successful and return control to the client only after the log records for the transaction are written to disk. • Delayed durable transaction • commits are asynchronous • report a COMMIT as successful before the log records for the transaction are written to disk. • Delayed durable transactions become durable when the transaction log entries are flushed to disk.
  • 11. USE DELAYED TRANSACTION DURABILITY • You can tolerate some data loss. • for example, where individual records are not critical as long as you have most of the data, then delayed durability may be worth considering • You are experiencing a bottleneck on transaction log writes. • if your performance issues are due to latency in transaction log writes, your application will likely benefit from using delayed transaction durability. • Your workloads have a high contention rate. • if your system has workloads with a high contention level much time is lost waiting for locks to be released. • Delayed transaction durability reduces commit time and thus releases locks faster which results in higher throughput.
  • 12. DELAYED DURABILITY CODE SAMPLE CREATE PROCEDURE <procedureName> … WITH NATIVE_COMPILATION, SCHEMABINDING, EXECUTE AS OWNER AS BEGIN ATOMIC WITH ( DELAYED_DURABILITY = ON, TRANSACTION ISOLATION LEVEL = SNAPSHOT, LANGUAGE = N'English' … ) END
  • 13. SELECT … INTO • The SELECT … INTO statement is improved and can now operate in parallel. • The database compatibility level must be at least 110.
  • 14. SECURITY ENHANCEMENTS • CONNECT ANY DATABASE Permission • Grant it to a login that must connect to all databases that currently exist and to any new databases that might be created in future. • Does not grant any permission in any database beyond connect. • IMPERSONATE ANY LOGIN Permission • When granted, allows a middle-tier process to impersonate the account of clients connecting to it, as it connects to databases. • When denied, a high privileged login can be blocked from impersonating other logins. • SELECT ALL USER SECURABLES Permission • When granted, a login such as an auditor can view data in all databases that the user can connect to
  • 15. Q&A Questions And Answers
  • 16. Thank you