Newsletter Subject

PowerShell Scripting to Replicate Cloud & SaaS Data to SQL Server (SQLServerCentral 6/1/2017)

From

sqlservercentral.com

Email Address

subscriptions@sqlservercentral.com

Sent On

Thu, Jun 1, 2017 11:34 AM

Email Preheader Text

A community of more than 1,600,000 database professionals and growing Featured Contents - - - - The

[SQLServerCentral - www.sqlservercentral.com]( A community of more than 1,600,000 database professionals and growing Featured Contents - [PowerShell Scripting to Replicate Cloud & SaaS Data to SQL Server]( - [Performance Myths : Truncate Can't Be Rolled Back]( - [The language of DevOps ROI]( - [Dump Data From SQL 2005 table to Excel 2016]( (From the SQLServerCentral Blogs) The Voice of the DBA Consider the Downside Technologists are often seen as cynical and disappointed by how poorly much code is written or maybe because an application architecture isn't well designed. I hear no shortage of complaints over other people's code, one of the reasons I think we have so many new projects started on Github (or other pubilc repos). Everyone thinks they can build better software than others. However, we are often quite optimistic when we write our own code. We throw together quick apps or scripts that solve a problem, expecting the best conditions. In general, we don't think widely about the possible issues with our code. We build and test for the happy path. I thought about this as I saw [this post on twitter](. It shows a number of Trello boards that contain passwords. To be fair, as I researched this, most of these items are private boards, though seeing names and passwords in a Google search is worrisome. I suspect most of these boards are places where less than trustworthy individuals are storing data, but I did see no shortage of public Trello boards for various software development teams. No passwords were shown, but plenty of notes, and I didn't spend a lot of time digging through the various cards, something I suspect a hacker would do. I think many cloud services are very useful and they help us work in new ways. The thing we should all keep in mind is that the search engines are always probing data, even if hackers aren't. Perhaps there isn't a concerted effort by anyone to look for our particular set of data, but you never know. Someone may stumble upon our data and if it's publicly visible, that's an issue. Even server names, IPs, and more can provide information that we'd rather not disclose. If for no other reason, consider that employment has changed in the world. More and more of us change jobs often. Today's co-worker might be tomorrow's disgruntled ex-employee that discloses information to anyone, or worse, to specific hackers that might make use of it. I'm not sure how much data from our companies is valuable in a general sense to a large group of hackers, but I know there are plenty of technical vandals that would use the information to cause disruption, because they can. Whenever you look to setup some new process, especially with secure data, please don't treat this lightly. Expect that someone will find a way to cause issues. And if you use any service that is connected to the public Internet, I'd be extremely careful of the data that you store there. You might be surprised how much of it is visible in search engines. Steve Jones from [SQLServerCentral.com]( Join the debate, and [respond to today's editorial on the forums]( --------------------------------------------------------------- The Voice of the DBA Podcast Listen to the [MP3 Audio]( ( 3.5MB) podcast or subscribe to the feed at [iTunes]( and [Libsyn](. [feed]( The Voice of the DBA podcast features music by Everyday Jones. No relation, but I stumbled on to them and really like the music. ADVERTISEMENT [Foundry]( We’re making SQL Server audits easier – can you help? The Redgate Foundry team have just finished researching the problems caused by SQL Server audit and compliance. This blog post shares what they've learnt, and explains how you can get involved with their early access program. [Find out more]( [SQL Source Control]( How to track every change to your SQL Server database See who’s changing your database, alongside affected objects, date, time, and reason for the change with SQL Source Control. Get a full change history in your source control system. [Learn more]( Featured Contents  [] [PowerShell Scripting to Replicate Cloud & SaaS Data to SQL Server]( Jerod Johnson from [SQLServerCentral.com]() Using a CData DataCmdlet and sqlps to replicate data from Google Spreadsheets to a SQL Server database in PowerShell[More »](Server/156151/) ---------------------------------------------------------------  [] [Performance Myths : Truncate Can't Be Rolled Back]( Additional Articles from [SQLPerformance.com]() Derik Hammer sets out to disprove another pervasive performance myth : TRUNCATE is faster than DELETE because it isn't logged and can't be rolled back.[More »]( ---------------------------------------------------------------  [] [The language of DevOps ROI]( Additional Articles from [Redgate]() How do you quantify the value of DevOps? The answer might depend on what value actually means for your organization, which stakeholder you’re talking to, and what type of lens they’re looking through.[More »]( ---------------------------------------------------------------  [] From the SQLServerCentral Blogs - [Dump Data From SQL 2005 table to Excel 2016]( lokesh sharma from [SQLServerCentral Blogs]( By First looking at the topic name, does the task sound simple to you? Well, I thought so but it...[More »]( Question of the Day Today's Question (by Stanley Kapfunde): The following are SQL Server 2016 storage limitations. (choose 3) Think you know the answer? [Click here](, and find out if you are right. --------------------------------------------------------------- We keep track of your score to give you bragging rights against your peers. This question is worth 1 point in this category: SQL. We'd love to give you credit for your own question and answer. To submit a QOTD, simply log in to the [Contribution Center](. ADVERTISEMENT [Securing SQL Server: DBAs Defending the Database]( tag=redgatsof-20 linkCode=as2 camp=1789 creative=9325 creativeASIN=1484222644) Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy, performing threat analysis, and encrypting sensitive data as a last line of defense against compromise. The multi-layered approach in this book helps ensure that a single breach doesn't lead to loss or compromise of your data that is confidential and important to the business. [Get your copy from Amazon today](. Yesterday's Question of the Day Yesterday's Question (by Steve Jones): How can I determine my current directory in R? Answer: getwd() Explanation: The way to determine your working directory is getwd(). Ref: Getwd() - [click here]( --------------------------------------------------------------- [» Discuss this question and answer on the forums]( Database Pros Who Need Your Help Here's a few of the new posts today on the forums. To see more, [visit the forums](. --------------------------------------------------------------- [SQL Server 2016]( : [SQL Server 2016 - Administration]( [Sleeping connections with CPUtime and DISKio growing continuously?!]( - Good afternoon, I really working on tuning one our production servers. By the counters and logs, I have it doing really... [Primary Key Indexes]( - I have a table in a database (it's a data warehouse) which is populated once a day by a truncate... [Dynamic script to backup many DBs and restore them on different instance]( - Hello All, I need to move about 50 DBs from my instance to anoter instance. Can you please share with me a... --------------------------------------------------------------- [SQL Server 2014]( : [Administration - SQL Server 2014]( [SQL server 2014 is very slow]( - Based on this report(performance monitor)  can any one tell why the Sql server is running slow. many application have slow... [Malicious Mischief - How to identify the perpetrator?]( - Recently, there's been a spate of malicious mischief one of my employer's key servers. > A database created, the owner falsified. >... --------------------------------------------------------------- [SQL Server 2012]( : [SQL 2012 - General]( [Connection Failed:: The target principal name is incorrect. Cannot generate SSPI context]( - Dear MVPs I migrated a database from SQL Server 2008 running on windows 2008 R2 to a new SQL Server... --------------------------------------------------------------- [SQL Server 2012]( : [SQL Server 2012 - T-SQL]( [Stored Procedure history]( - Hi All Is there anyway to get the stats (logical reads, physical reads, elapsed time etc) of the last perhaps 20... --------------------------------------------------------------- [SQL Server 2008]( : [SQL Server 2008 - General]( [Readmission within 30 days from a discharge]( - Hi all, I have a table called  Tbl_Authorized01, and I'm trying to find cases where a patient was readmitted within 30... [Bulk insert statement cannto open file on the share]( - I am trying to execute a bulk insert statement in SQL management studio. BULK INSERT PSStudentAccess FROM '\\servername\pj_sharepoint\external\autosend\myfile.txt" WITH ( FIELDTERMINATOR = ',', ROWTERMINATOR = '' ) Cannot bulk load because... --------------------------------------------------------------- [SQL Server 2008]( : [T-SQL (SS2K8)]( [Help with query]( - Hi all, I'm having a moment, and I can't seem to get the query right. I'm trying to get the actual... --------------------------------------------------------------- [SQL Server 2008]( : [SQL Server Newbies]( [Searching for text]( - High everyone, I've a simple table that holds UK postcodes and I want to do a search on the postcode. The... [Adding Minutes to DATETIME2]( - Hi guys. I'm having some problems compiling a scalar function using the DATETIME2 datatype. CREATE FUNCTION func_IncDatetime2 ( @toIncrease datetime ) RETURNS datetime AS BEGIN DECLARE... --------------------------------------------------------------- [SQL Server 2008]( : [Data Corruption (SS2K8 / SS2K8 R2)]( [Corrupted index - find out what caused it]( - Hi I got this error on a scheduled integrity check. SQL 2005 sp2 Data row does not have a matching index... --------------------------------------------------------------- [Reporting Services]( : [Reporting Services 2008 Development]( [How can I create a report from the supplied table?]( - I need to create a report using this data. The data represents a chest x-ray result on a patient. I created... --------------------------------------------------------------- [Reporting Services]( : [SSRS 2014]( [SSRS setting up reporting data source with AD]( - Hi all, Can I setup a DS with shared AD accounts? So I'm trying to find a way where user can access... --------------------------------------------------------------- [Data Warehousing]( : [Integration Services]( [float to date SSIS]( - Hi new to SSIS in SQL a view I have successfully converted a float date "OrderYearMonth" that looks like 201601 to a date note:... [SSIS - OLEDB Task - TempDB space issues]( - I haven't really worked much on SSIS, i am running into some serious tempdb issues. I know quite a bit... [Time dimension key as HHMM (text) or HMM (int)]( - Hi All Is it worth the extra time to cast my time key from HHMM text to HMM int? I have read... --------------------------------------------------------------- [SQLServerCentral.com]( : [Articles Requested]( [SSIS - Execute Package Task]( - Can someone write a basic article that explains how the Execute Package is used to run a child package or... --------------------------------------------------------------- [SQL Server 2005]( : [T-SQL (SS2K5)]( [GREATEST and LEAST function]( - Hi, I'm looking for a function in T-SQL for getting the biggest or the smallest value between two or more columns... This email has been sent to {EMAIL}. To be removed from this list, please click [here.]( If you have any problems leaving the list, please contact the webmaster@sqlservercentral.com. --------------------------------------------------------------- This newsletter was sent to you because you signed up at [SQLServerCentral.com](. Feel free to forward this to any colleagues that you think might be interested. If you have received this email from a colleague, you can register to receive it [here](. --------------------------------------------------------------- This transmission is ©2017 Redgate Software Ltd, Newnham House, Cambridge Business Park, Cambridge, CB4 0WZ, United Kingdom. All rights reserved. Contact: webmaster@sqlservercentral.com

Marketing emails from sqlservercentral.com

View More
Sent On

05/07/2024

Sent On

01/07/2024

Sent On

29/06/2024

Sent On

28/06/2024

Sent On

26/06/2024

Sent On

24/06/2024

Email Content Statistics

Subscribe Now

Subject Line Length

Data shows that subject lines with 6 to 10 words generated 21 percent higher open rate.

Subscribe Now

Average in this category

Subscribe Now

Number of Words

The more words in the content, the more time the user will need to spend reading. Get straight to the point with catchy short phrases and interesting photos and graphics.

Subscribe Now

Average in this category

Subscribe Now

Number of Images

More images or large images might cause the email to load slower. Aim for a balance of words and images.

Subscribe Now

Average in this category

Subscribe Now

Time to Read

Longer reading time requires more attention and patience from users. Aim for short phrases and catchy keywords.

Subscribe Now

Average in this category

Subscribe Now

Predicted open rate

Subscribe Now

Spam Score

Spam score is determined by a large number of checks performed on the content of the email. For the best delivery results, it is advised to lower your spam score as much as possible.

Subscribe Now

Flesch reading score

Flesch reading score measures how complex a text is. The lower the score, the more difficult the text is to read. The Flesch readability score uses the average length of your sentences (measured by the number of words) and the average number of syllables per word in an equation to calculate the reading ease. Text with a very high Flesch reading ease score (about 100) is straightforward and easy to read, with short sentences and no words of more than two syllables. Usually, a reading ease score of 60-70 is considered acceptable/normal for web copy.

Subscribe Now

Technologies

What powers this email? Every email we receive is parsed to determine the sending ESP and any additional email technologies used.

Subscribe Now

Email Size (not include images)

Font Used

No. Font Name
Subscribe Now

Copyright © 2019–2024 SimilarMail.