This document provides an overview of performance issues to avoid when working with SQL Server. It discusses topics like statistics and table design, avoiding SELECT *, scalar user defined functions, indexing strategies, key lookups, parameter sniffing and more. The presentation aims to educate attendees on best practices for writing efficient queries and managing database performance.
MySQL Infrastructure Testing Automation at GitHubIke Walker
The database team at GitHub is tasked with keeping the data available and with maintaining its integrity. Our infrastructure automates away much of our operation, but automation requires trust, and trust is gained by testing. This session highlights three examples of infrastructure testing automation that helps us sleep better at night:
- Backups: scheduling backups; making backup data accessible to our engineers; auto-restores and backup validation. What metrics and alerts we have in place.
- Failovers: how we continuously test our failover mechanism, orchestrator. How we setup a failover scenario, what defines a successful failover, how we automate away the cleanup. What we do in production.
- Schema migrations: how we ensure that gh-ost, our schema migration tool, which keeps rewriting our (and your!) data, does the right thing. How we test new branches in production without putting production data at risk.
MySQL Infrastructure Testing Automation at GitHubIke Walker
The database team at GitHub is tasked with keeping the data available and with maintaining its integrity. Our infrastructure automates away much of our operation, but automation requires trust, and trust is gained by testing. This session highlights three examples of infrastructure testing automation that helps us sleep better at night:
- Backups: scheduling backups; making backup data accessible to our engineers; auto-restores and backup validation. What metrics and alerts we have in place.
- Failovers: how we continuously test our failover mechanism, orchestrator. How we setup a failover scenario, what defines a successful failover, how we automate away the cleanup. What we do in production.
- Schema migrations: how we ensure that gh-ost, our schema migration tool, which keeps rewriting our (and your!) data, does the right thing. How we test new branches in production without putting production data at risk.
Natural Born Killers, Performance issues to avoid Richard Douglas
SQL Server is now a mature RDBMS platform. In this session Richard Douglas walks through a number of areas of the product that are misused or misunderstood.
The session promotes good table and index design as well as when to use temporary tables and table variables.
Oracle Database Performance Tuning Advanced Features and Best Practices for DBAsZohar Elkayam
Oracle Week 2017 slides.
Agenda:
Basics: How and What To Tune?
Using the Automatic Workload Repository (AWR)
Using AWR-Based Tools: ASH, ADDM
Real-Time Database Operation Monitoring (12c)
Identifying Problem SQL Statements
Using SQL Performance Analyzer
Tuning Memory (SGA and PGA)
Parallel Execution and Compression
Oracle Database 12c Performance New Features
MyHeritage BackEnd group was built to scale to support 77 million users, 27 million family trees containing over 1.6 billion individuals, and over 6 billion historical documents.
With big data comes big challenges and this presentation explains the structure, the methodology and the technologies that support scaling up.
The presentation covers:
• How cross R&D continuous deployment and R&D structure supports scalability
• Sharding techniques
• Cassandra usage at MyHeritage
• Our search engine scaling structure
Data Con LA 2020
Description
Join this session to learn how to build a modern cloud-scale data compute platform with code in just minutes!
Using the industry's first IDE for building data applications, developers can now create data marts and data applications, while working interactively with large datasets. We will explore how easy it is to develop, test and operationalize powerful data compute applications over streaming data using SQL and Python and eager execution in Xcalar with the combination of declarative and visual imperative programming and eager execution
You will see how you can reduce time to market for analyzing large volumes of data and building enterprise-level complex data compute applications.
You will learn how to increase your developer productivity with SQL and Python, and put your complex business logic and ML models into production pipelines with the fastest time to value in industry.
Speaker
Nikita Ogievetsky, Xcalar, VP Product Engineering
50 Shades of Data - how, when and why Big, Fast, Relational, NoSQL, Elastic, ...Lucas Jellema
Data has been and will be the key ingredient to enterprise IT. What is changing is the nature, scope and volume of data and the place of data in the IT architecture. BigData, unstructured data and non-relational data stored on Hadoop, in NoSQL databases and held in Elastic Search, Caches and Message Queues complements data in the enterprise RDBMS. Trends such as microservices that contain their own data, BASE, CQRS and Event Sourcing have changed the way we store, share and govern data. This session introduces patterns, technologies and hypes around storing, processing and retrieving data using products such as Oracle Database, Cassandra, MySQL, Neo4J, Kafka, Redis, Elastic Search and Hadoop/Spark -locally,in containers and on the cloud. Key take away: what an application architect and a developer should know about the various types of data in enterprise IT and how to store/manage/query/manipulate them. What products and technologies are at your disposal. How can you make these work together – for a consistent (enough) overall data presentation.
Learn how to achieve scale with MongoDB. In this presentation, we cover three different ways to scale MongoDB, including optimization, vertical scaling, and horizontal scaling.
This presentation provides a clear overview of how Oracle Database In-Memory optimizes both analytics and mixed workloads, delivering outstanding performance while supporting real-time analytics, business intelligence, and reporting. It provides details on what you can expect from Database In-Memory in both Oracle Database 12.1.0.2 and 12.2.
Oracle in the 2014 edition of its Open World rolled out new database public cloud service with its DBaaS offerings, but this is just a piece in each company's technological architecture. Businesses still have the need to create a Private cloud and discover the driver to create it; Wether it is a measured service,consolidation or rapid provisioning, finding this driver will be the initial building block for it. This presentation will give you an insight on how a Private Cloud is architected, how the service catalog is the most important brick and how get the benefit of this upcoming era of Databases.
Hi I need security-related job points for the software develope.docxfideladallimore
Hi
I need security-related job points for the "software developer" role?
also
I need how my courses (which are bus control plan& disaster recovery and telecom network security ) are related to software developer job?
For the first question I am giving reference points, please check these and give me points that relate to these:
Involve in the complete software development life cycle including Analysis, Design, Implementation, Testing and Maintenance.
• Problem analysis, solution determination, modification and documentation and ensure data standards are reused and enforced across all data-driven initiatives.
• Marinated Oracle Dataguard Databases using OEM l2C GRID CONTROL and DataGurad Broker.
• Clone database systems using RMAN and OEMl2C GRID CONTROL.
• Configured Oracle Memory Modules for better performance.
• Reconfigure Oracle's Parallel Query and Degree of Parallelism for better use of CPU and USER YO.
• Identify and Optimize poor running SQL QUERIES. o Usage of Oracle Utilities - Work And Assets Management Application DBA, Customer Care and Billing Applications DBA, Meter Data Management DBA, Mobile Workforce Management DBA.
• Design, install and maintain complex functions of major database systems including access, allocations, validity checks, security, documentation and tuning.
• Design, implement, and support databases using Oracle RDBMS and develop programs using PL/SQL.
• Conduct complex backup, recovery and query tuning using Data Domain, Legato, Tivoli TSM.
• Build compliant databases, writing scripts in SQL, UNIX commands, and shell scripts.
• Perform complex DBA tasks (e.g.: create databases using complex structures; ensure data security and integrity; perform complex database migrations).
• Usage of AIA FP for integration with Oracle EBS Rl2.
• Monitor and resolve HP Services Manager Tickets.
• Review DB Status and IBM DB2 Databases.
• Review Oracle/DB2 SOX Reports and Oracle Grid Control data.
• Monitor Oracle/DB2 backups using CornmVault.
• Monitor and take action emails in UNIXDBA mailbox.
.
Natural Born Killers, Performance issues to avoid Richard Douglas
SQL Server is now a mature RDBMS platform. In this session Richard Douglas walks through a number of areas of the product that are misused or misunderstood.
The session promotes good table and index design as well as when to use temporary tables and table variables.
Oracle Database Performance Tuning Advanced Features and Best Practices for DBAsZohar Elkayam
Oracle Week 2017 slides.
Agenda:
Basics: How and What To Tune?
Using the Automatic Workload Repository (AWR)
Using AWR-Based Tools: ASH, ADDM
Real-Time Database Operation Monitoring (12c)
Identifying Problem SQL Statements
Using SQL Performance Analyzer
Tuning Memory (SGA and PGA)
Parallel Execution and Compression
Oracle Database 12c Performance New Features
MyHeritage BackEnd group was built to scale to support 77 million users, 27 million family trees containing over 1.6 billion individuals, and over 6 billion historical documents.
With big data comes big challenges and this presentation explains the structure, the methodology and the technologies that support scaling up.
The presentation covers:
• How cross R&D continuous deployment and R&D structure supports scalability
• Sharding techniques
• Cassandra usage at MyHeritage
• Our search engine scaling structure
Data Con LA 2020
Description
Join this session to learn how to build a modern cloud-scale data compute platform with code in just minutes!
Using the industry's first IDE for building data applications, developers can now create data marts and data applications, while working interactively with large datasets. We will explore how easy it is to develop, test and operationalize powerful data compute applications over streaming data using SQL and Python and eager execution in Xcalar with the combination of declarative and visual imperative programming and eager execution
You will see how you can reduce time to market for analyzing large volumes of data and building enterprise-level complex data compute applications.
You will learn how to increase your developer productivity with SQL and Python, and put your complex business logic and ML models into production pipelines with the fastest time to value in industry.
Speaker
Nikita Ogievetsky, Xcalar, VP Product Engineering
50 Shades of Data - how, when and why Big, Fast, Relational, NoSQL, Elastic, ...Lucas Jellema
Data has been and will be the key ingredient to enterprise IT. What is changing is the nature, scope and volume of data and the place of data in the IT architecture. BigData, unstructured data and non-relational data stored on Hadoop, in NoSQL databases and held in Elastic Search, Caches and Message Queues complements data in the enterprise RDBMS. Trends such as microservices that contain their own data, BASE, CQRS and Event Sourcing have changed the way we store, share and govern data. This session introduces patterns, technologies and hypes around storing, processing and retrieving data using products such as Oracle Database, Cassandra, MySQL, Neo4J, Kafka, Redis, Elastic Search and Hadoop/Spark -locally,in containers and on the cloud. Key take away: what an application architect and a developer should know about the various types of data in enterprise IT and how to store/manage/query/manipulate them. What products and technologies are at your disposal. How can you make these work together – for a consistent (enough) overall data presentation.
Learn how to achieve scale with MongoDB. In this presentation, we cover three different ways to scale MongoDB, including optimization, vertical scaling, and horizontal scaling.
This presentation provides a clear overview of how Oracle Database In-Memory optimizes both analytics and mixed workloads, delivering outstanding performance while supporting real-time analytics, business intelligence, and reporting. It provides details on what you can expect from Database In-Memory in both Oracle Database 12.1.0.2 and 12.2.
Oracle in the 2014 edition of its Open World rolled out new database public cloud service with its DBaaS offerings, but this is just a piece in each company's technological architecture. Businesses still have the need to create a Private cloud and discover the driver to create it; Wether it is a measured service,consolidation or rapid provisioning, finding this driver will be the initial building block for it. This presentation will give you an insight on how a Private Cloud is architected, how the service catalog is the most important brick and how get the benefit of this upcoming era of Databases.
Hi I need security-related job points for the software develope.docxfideladallimore
Hi
I need security-related job points for the "software developer" role?
also
I need how my courses (which are bus control plan& disaster recovery and telecom network security ) are related to software developer job?
For the first question I am giving reference points, please check these and give me points that relate to these:
Involve in the complete software development life cycle including Analysis, Design, Implementation, Testing and Maintenance.
• Problem analysis, solution determination, modification and documentation and ensure data standards are reused and enforced across all data-driven initiatives.
• Marinated Oracle Dataguard Databases using OEM l2C GRID CONTROL and DataGurad Broker.
• Clone database systems using RMAN and OEMl2C GRID CONTROL.
• Configured Oracle Memory Modules for better performance.
• Reconfigure Oracle's Parallel Query and Degree of Parallelism for better use of CPU and USER YO.
• Identify and Optimize poor running SQL QUERIES. o Usage of Oracle Utilities - Work And Assets Management Application DBA, Customer Care and Billing Applications DBA, Meter Data Management DBA, Mobile Workforce Management DBA.
• Design, install and maintain complex functions of major database systems including access, allocations, validity checks, security, documentation and tuning.
• Design, implement, and support databases using Oracle RDBMS and develop programs using PL/SQL.
• Conduct complex backup, recovery and query tuning using Data Domain, Legato, Tivoli TSM.
• Build compliant databases, writing scripts in SQL, UNIX commands, and shell scripts.
• Perform complex DBA tasks (e.g.: create databases using complex structures; ensure data security and integrity; perform complex database migrations).
• Usage of AIA FP for integration with Oracle EBS Rl2.
• Monitor and resolve HP Services Manager Tickets.
• Review DB Status and IBM DB2 Databases.
• Review Oracle/DB2 SOX Reports and Oracle Grid Control data.
• Monitor Oracle/DB2 backups using CornmVault.
• Monitor and take action emails in UNIXDBA mailbox.
.
Security landscape has been a constantly and rapidly changing scenario in the last decades. Threats have evolved from targeting services' availability to targeting data and data integrity. Therefore, now more than ever, data protection becomes critical and needs an in-depth approach which starts from the databes. Learn more about what MySQL has to offer to help you put in place security best practices to start protecting your data straight from the database!
Just the Job: Employing Solr for Recruitment Search -Charlie Hull lucenerevolution
See conference video - http://www.lucidimagination.com/devzone/events/conferences/ApacheLuceneEurocon2011
Using a case study on a major European executive recruitment company, we will show how we used Apache Lucene/Solr to build powerful, flexible, accurate and scalable search services over tens of millions of CVs and candidate records, allowing the company to completely restructure their IT provision for both local and national offices.
Similar to 'Natural born killers, SQL performance issues to avoid' (20)
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
📕 Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
3. Adhering to best practices?
http://www.flickr.com/photos/12693492@N04/1338123903/sizes/m/in/photostream/
3 Natural Born Killers
4. Your host
• Richard Douglas
• Systems Consultant /
Editor in Chief of SQLServerPedia
• SQL Server MCITPro
• Maidenhead SQL User Group Leader
• Blog: http://SQL.RichardDouglas.co.uk
• Twitter: @SQLRich
• Email: Richard.Douglas@Quest.com
Richard_Douglas@Dell.com
4 Natural Born Killers
12. Good table design benefits
• Minimise the CPU overhead.
• Increase the number of records in the buffer cache.
• Reduce the amount of physical disk IO.
• Reduce the amount of network traffic.
• Reduce the data file size(s).
• Reduce the working size of the Transaction Log.
• Reduce Full/Diff /T-Log backup file size.
Thereby increasing your ability to deliver your RTO.
• Keep transaction time to a minimum.
12 Natural Born Killers
14. SELECT *
• Returns all data from one or more tables.
– Pulls unnecessary data into the buffer cache
– Can result in excessive IO
– Increases network activity
– Can hide important data in Missing Index DMV’s
• Adding new attributes
– May break existing code
• Increases code fix time
• SQL Azure
– Paying for data transfer.
14 Natural Born Killers
15. SELECT * - A resolution
15 Natural Born Killers
17. Scalar User Defined Functions
• The Good
– Re-Usable code
• The Bad
– Runs once per record in record set
– They don’t take advantage of parallelism
– They use Nested Loop joins regardless
• The Ugly
– So ugly it’s hidden from IO statistics
17 Natural Born Killers
18. Scalar UDF Solutions and Alternatives
• If you have to use them:
– View the actual IO usage in Profiler
• If you can replace them:
– Look at Table Value Functions
– Look at CLR
18 Natural Born Killers
19. Indexing strategies
It’s all about DWI knowledge:
D W n
a o
I
t r t
a k e
l r
o n
a a
d l
s
19 Natural Born Killers
20. Golden Rules for Clustered Indexes
Bad example; Surname, Firstname, Middle Initial
• Narrow
Impacts nonclustered indexes
• Static
• Progressive Fragmentation
• Unique
• Fixed width Space impact
• Not Null
This example will have 13 bytes of overhead alone;
• 4 byte uniquifier
• 2 byte variable offset + 6 bytes for variable length fields
23
• 1 byte for NULL values and NULL bitmap
Natural Born Killers
21. Golden Rules for NonClustered Indexes
• Have an optimal clustered key
• Not narrow
• Reduce unnecessary overhead
– Fixed Width
– Not null
• Consolidate
• Index foreign keys
24 Natural Born Killers
22. Key Lookups – The silent killer
25 Natural Born Killers
23. Sargability
• SARGable – “Search ARGument able”
• T-SQL functions around a predicate can break
SARGability
• Some caveats to remember
26 Natural Born Killers
24. Table Variables Vs. Temp Tables
Table Variables
• Fast when used with small data sets.
• Have a limited scope
• Use less locking and logging resources than temp tables
– http://sql.richarddouglas.co.uk/archive/2011/06/rollback-gotchas-part-2-2.html
• Estimated statistics always show 1 record
• Cannot be altered after they are declared
• Mythbuster - MAY be memory only, this isn’t guaranteed
• Generally faster with smaller data sets
27 Natural Born Killers
25. Table Variables Vs. Temp Tables
Temp Tables
• Uses statistics
– Stat population will cause recompiles (statement level in 2005 +)
– Can create better plans
• Wider scope
• Can be rolled back
• Can be altered after creation
• Generally faster with larger data sets
28 Natural Born Killers
26. Parameter Sniffing
• What is it?
– It’s all a matter of statistics
• How do I know when it will affect me?
– Monitor the IO and CPU
– This means baselining your environment
• What are my options?
– Rewrite dynamic queries
– Query Hints:
– WITH RECOMPILE
– OPTIMIZE FOR
– Plan Guides
29 Natural Born Killers
28. Free posters, training DVDs, white papers, and more
http://www.quest.com/landing/?id=5700
1. SQL Server Blog Aggregator & Wiki at http://www.sqlserverpedia.com.
2. Product Overviews at http://www.quest.com/sql-server/#c-Performance-
Management. Plus, http://toadworld.com!
3. Discussion forums at
http://sqlserver.quest.com/forumindex.jspa?categoryID=208.
4. Product video tutorials at http://db-
management.com/blog/category/sqlserver/tutorials-sqlserver/.
31 Natural Born Killers