0

SQL Tip-7 | Different ways to enable a Trace Flag

Trace flags are used to temporarily set specific server characteristics or to switch off a particular behavior. There are many documented and undocumented trace flags. For example Trace Flag 1222 that can be used...

0

Best Practice No.29

Apply Password policy on all SQL Server logins (along with password expiration if possible) to avoid any security compromise. Related posts: Best Practice No.18 Best Practice No.6 Best Practice No.9 Best Practice No.3 Best...

0

Best Practice No.28

Understand NOLOCK hint before using this in your transactions\applications – the data you are reading might not be consistent (Dirty Reads) Related posts: Best Practice No-2 Best Practice No.16 Best Practice No.19

0

Best Practice No.27

Always change the Page_Verify Database Option to Checksum after you migrate it to SQL Server 2005 or higher. Checksum is default for databases created on SQL Server 2005+. Related posts: Best Practice No.14 Where...

0

SQL Tip-6 | Use Covering Index to solve key lookup issues

Do you have Key Lookup problem? Key lookup taking most of the query time. then probably this is the best time to know more about covering indexes. Covering Index can solve all key lookup...

1

Using Covering Index

A Non Clustered Index which contains all columns which are referred by a Query (in Select, Where or Join) is called Covering Index. In other words When all columns which are required to satisfy...

0

Best Practice No.26

Make sure Auto_Shrink is disabled for all Databases on your Production Servers. Related posts: Best Practice No.8 Best Practice No.10 Best Practice No.13 Best Practice No.14 Best Practice No.20

0

Best Practice No.25

Keep your TempDB Files & all other database files on separate disks. Related posts: Best Practice No.6 Best Practice No.19 Best Practice No.11 Best Practice No.22 Best Practice No.5