T-SQL Programming Part 5 – Using the CASE Function #microsoft, #articles, #microsoft


#

T-SQL Programming Part 5 – Using the CASE Function

Have you ever wanted to replace a column value with a different value based on the original column value? Learn how, with the T-SQL CASE function.

The CASE function is a very useful T-SQL function. With this function you can replace a column value with a different value based on the original column value. An example of where this function might come in handy is where you have a table that contains a column named SexCode, where 0 stands for female, 1 for male, etc. and you want to return the value “female” when the column value is 0, or “male” when the column value is 1, etc. This article will discuss using the CASE function in a T-SQL SELECT statement.

The CASE function allows you to evaluate a column value on a row against multiple criteria, where each criterion might return a different value. The first criterion that evaluates to true will be the value returned by the CASE function. Microsoft SQL Server Books Online documents two different formats for the CASE function. The “Simple Format” looks like this:

And the “Searched Format” looks like this:

Where the “input_expression” is any valid Microsoft SQL Server expression, the “when_expression” is the value in which the input_expression is compared, the “result_expression ” is the value that will be return for the CASE statement if the “when_expression” evaluates to true, ” . n ” represents that multiple WHEN conditions can exist, the “else_result_expression ” is the value that will be returned if no “when_expression” evaluates to true and in the “Searched Format” the “Boolean_expression” is any Boolean express that when it evaluates to true will return the “result_expression”. Let me go through a couple of examples of each format to help you better understand how to use the CASE function in a SELECT statement.

For the first example let me show you how you would use the CASE function to display a description, instead of a column value that contains a code. I am going to use my earlier example that I described at the top of this article where I discussed displaying “female” or “male” instead of the SexCode. Here is my example T-SQL Code:

Here is the output from this T-SQL code:

This example shows the syntax in action for a CASE function using the “Simple Format”. As you can see the CASE function evaluates the PatientSexCode to determine if it is a 0, 1, or 2. If it is a 0, then “female” is displayed in the output for the “Patient Sex” column. If the PatientSexCode is 1, then “male” is display, or if PatientSexCode is 2 then “unknown” is displayed. Now if the PatientSexCode is anything other than a 0, 1 or 2 then the “ELSE” condition of the CASE function will be used and “Invalid PatientSexCode” will be displayed for the “Patient Sex” column.

Now the same logic could be written using a “Searched Format” for the CASE function. Here is what the SELECT statement would look like for the “Searched Format”:

Note the slight differences between the “Simple” and “Searched” formats. In the “Simple” format I specified the column name for which row values will be compared against the “when_expressions” ,where as in the “Searched” format each WHEN condition contains a Boolean expression that compares the PatientSexCode column against a code value.

Now the CASE function can be considerably more complex than the basic examples I have shown. Suppose you want to display a value that is based on two different columns values in a row. Here is an example that determines if a Product in the Northwind database is of type Tins or Bottles, and is not a discontinued item.

The output for the above command on my server displays the following:

As you can see I’m using a “Searched Format” for this CASE function call. Also, each WHEN clause contains two different conditions. One condition to determine the type (tins, or bottles) and another condition to determine if the product has been discontinued. If the QuantityPerUnit contains the string “Tins” and the Discontinue column value is 0 then the “Type of Availability” is set to “Tins”. If the QuantityPerUnit contains the string “Bottles” and the Discontinue column value is 0 then the “Type of Availability” is set to “Bottles”. For all other conditions, the “Type or Availability” is set to “Not Tins , Not Bottles , or is Discontinued.

The WHEN clauses in the CASE function are evaluated in order. The first WHEN clause that evaluates to “True” determines the value that is returned from the CASE function. Basically, multiple WHEN clauses evaluate to “True”, only the THEN value for the first WHEN clause that evaluates to “True” is used as the return value for the CASE function. Here is an example where multiple WHEN clauses are “True.”

The output on my machine for this query looks like this:

If you look at the raw titles table data in the pubs database for the title “You Can Combat Computer Stress!” you will note that the price for this book is $2.99. This price makes both the “price 12.00” and “price 3.00” conditions “True”. Since the conditions are evaluated one at a time, and the “price 12.00” is evaluated prior to the “price 3.00,” the “Price Category” for the title “You Can Combat Computer Stress!” is set to “Cheap”.

The CASE function can appear in different places within the SELECT statement, it does not have to only be in the selection list within the SELECT statement. Here is an example where the CASE function is used in the WHERE clause.

The output for this query looks like this:

Here I only wanted to display books from the titles table in pubs database if the price category is ‘Average’. By placing my CASE function in the WHERE clause I was able to accomplish this.

Conclusion

As you can see the CASE function is an extremely valuable function. It allows you to take a data column and represent it differently depending on one or more conditions identified in the CASE function call. I hope that the next time you need to display or use different values for specific column data you will review the CASE function to see if it might meet your needs.

See All Articles by Columnist Gregory A. Larsen


T-SQL Programming Part 1 – Defining Variables, and logic #articles, #databases, #microsoft


#

T-SQL Programming Part 1 – Defining Variables, and IF. ELSE logic

Whether you are building a stored procedure or writing a small Query Analyzer script you will need to know the basics of T-SQL programming. This is the first of a series discusses defining variables, and using the IF. ELSE logic.

This is the first of a series of articles discussing various aspects of T-SQL programming. Whether you are building a stored procedure or writing a small Query Analyzer script you will need to know the basics of T-SQL programming. This first article will discuss defining variables, and using the IF. ELSE logic.

Local Variables

As with any programming language, T-SQL allows you to define and set variables. A variable holds a single piece of information, similar to a number or a character string. Variables can be used for a number of things. Here is a list of a few common variable uses:

  • To pass parameters to stored procedures, or function
  • To control the processing of a loop
  • To test for a true or false condition in an IF statement
  • To programmatically control conditions in a WHERE statement

More than one variable can be defined with a single DECLARE statement. To define multiple variables, with a single DECLARE statement, you separate each variable definition with a comma, like so:

Here is an example of how to use the SELECT statement to set the value of a local variable.

One of the uses of a variable is to programmatically control the records returned from a SELECT statement. You do this by using a variable in the WHERE clause. Here is an example that returns all the Customers records in the Northwind database where the Customers Country column is equal to ‘Germany’

IF. ELSE

T-SQL has the “IF” statement to help with allowing different code to be executed based on the results of a condition. The “IF” statement allows a T-SQL programmer to selectively execute a single line or block of code based upon a Boolean condition. There are two formats for the “IF” statement, both are shown below:

Format one: IF condition then code to be executed when condition true

Format two: IF condition then code to be executed when condition true ELSE else code to be executed when condition is false

In both of these formats, the condition is a Boolean expression or series of Boolean expressions that evaluate to true or false. If the condition evaluates to true, then the “then code” is executed. For format two, if the condition is false, then the “else code” is executed. If there is a false condition when using format one, then the next line following the IF statement is executed, since no else condition exists. The code to be executed can be a single TSQL statement or a block of code. If a block of code is used then it will need to be enclosed in a BEGIN and END statement.

Let’s review how “Format one” works. This first example will show how the IF statement would look to execute a single statement, if the condition is true. Here I will test whether a variable is set to a specific value. If the variable is set to a specific value, then I print out the appropriate message.

The above code prints out only the phrase “The number is 29”, because the first IF statement evaluates to true. Since the second IF is false the second print statement is not executed.

Now the condition statement can also contain a SELECT statement. The SELECT statement will need to return value or set of values that can be tested. If a SELECT statement is used the statement needs to be enclosed in parentheses.

Here I printed the message “Found A-D Authors” if the SELECT statement found any authors in the pubs.dbo.authors table that had a last name that started with an A, B, C, or D.

So far my two examples only showed how to execute a single T-SQL statement if the condition is true. T-SQL allows you to execute a block of code as well. A code block is created by using a “BEGIN” statement before the first line of code in the code block, and an “END” statement after that last line of code in the code block. Here is any example that executes a code block when the IF statement condition evaluates to true.

Above a series of “PRINT” statements will be executed if this IF statement is run in the context of the master database. If the context is some other database then the print statements are not executed.

Sometimes you want to not only execute some code when you have a true condition, but also want to execute a different set of T-SQL statements when you have a false condition. If this is your requirement then you will need to use the IF. ELSE construct, that I called format two above. With this format, if the condition is true then the statement or block of code following the IF clause is executed, but if the condition evaluates to false then the statement or block of code following the ELSE clause will be executed. Let’s go through a couple of examples.

For the first example let’s say you need to determine whether to update or add a record to the Customers table in the Northwind database. The decision is based on whether the customer exists in the Northwind.dbo.Customers table. Here is the T-SQL code to perform this existence test for two different CustomerId’s.

The first IF. ELSE logic checks to see it CustomerId ‘ALFKI’ exists. If it exists it prints the message “Need to update Customer Record”, if it doesn’t exist the “Need to add Customer Record” is displayed. This logic is repeated for CustomerId = ‘LARS’. When I run this code against my Northwind database I get the following output.

As you can see from the results CustomerId ‘ALFKI’ existed, because the first print statement following the first IF statement was executed. Where as in the second IF statement CustomerId ‘LARSE’ was not found because the ELSE portion of the IF. ELSE statement was executed.

If you have complicated logic that needs to be performed prior to determining what T-SQL statements to execute you can either use multiple conditions on a single IF statement, or nest your IF statements. Here is a script that determines if the scope of the query is in the ‘Northwind’ database and if the “Customers” table exists. I have written this query two different ways, one with multiple conditions on a single IF statement, and the other by having nested IF statements.

As you can see I tested to see if the query was being run from the Northwind database and whether the “Customers” table can be found in sysobjects. If this was true, I printed the message “Table Customers Exists”. In the first example I had multiple conditions in a single IF statement. Since I was not able to determine which parts of the conditions in the IF statement where false the ELSE portion printed the message “Not in Northwind database or Table Customer does not exist”. Now in the second example where I had a nested IF statement I was able to determine whether I was in the wrong database or the object “Customers” did not exist. This allowed me to have two separate print statements to reflect exactly what condition was getting a false value.

I hope that this article has helped you understand how to declare and use local variables, as well as IF. ELSE logic. Local variables are useful to hold the pieces of information related to your programming process. Where as the IF statement helps control the flow of your program so different sections of code can be executed depending on a particular set of conditions. As you can see nesting IF statements and/or having multiple conditions on an IF statement allows you to further refine your logic flow to meet your programming requirements. My next article in this T-SQL programming series will discuss how to build a programming loop.

See All Articles by Columnist Gregory A. Larsen


SCCM Third Party Patch Management #sccm #third #party #patch #management, #sccm #patch,


#

Third Party Patch Management using Microsoft SCCM

Supports patching of 250 + third party applications

Microsoft SCCM has a great infrastructure to manage desktops and their applications. But, one of the limitations of SCCM is its inability to patch non Microsoft applications. This is a source of inconvenience for IT administrators as they have to work with multiple patch management tools in order to update all business applications in the network, making this task highly time consuming.

Patch Connect Plus is a tool that helps deploy patches to over 250 third party applications such as Adobe applications, Java and WinRAR using your existing Microsoft System Center Configuration Manager server. Hence, delivering a solution to the problem by integrating with your existing SCCM patch management infrastructure.

Automate non-Microsoft patch management

Protect your systems from security threats with regular patching. Schedule regular scans and gain vulnerability information of the systems managed. Deploy patches to the vulnerable systems automatically using SCCM patch management infrastructure.

Get the most out of your SCCM investment

Using Patch Connect Plus with your existing SCCM framework will help you patch almost any application. Hence, you overcome the requirement of having yet another IT solution for Patch management of third party applications. Also by using the same SCCM console, you overcome the need of learning about a new console for third party patch management alone.

Patch only required applications

Approve patches only to the required applications which are significant to you. Therefore, gain higher control over the applications which you want to patch.

Notifications

Receive the status reports of the patches available, last database updated time and new products being supported by Patch Connect Plus.

Intelligent patching

Deploy patches to the applications when they are not in use. Hence, providing reliability to the deployment process by adding precision which leads to the success of patching of applications in the right manner.

Great user experience

Patch Connect Plus provides its users with convenience of easy installation and one time setup requirement. Also, the UI is easy to understand with support documents at every step to help users.

Available in 2 editions

Patch Connect Plusfor Microsoft SCUP

Readily available updates to patch via SCUP catalog.

Patch Connect Plusfor Microsoft SCCM

Fully automated patching using SCCM infrastructure.


RAID recovery #undelete,unerase,data #recovery,recovery,recover,recovering,software, #file,files,restore,retrieve,deleted,ntfs,utility,utilities,un #delete,partition,memory #card, #hd,hdd,hard #drive,disk,disks,drive,window,windows,2000,nt,xp,cd,cds,pc,tool,tools, #program,programs,download,raid,unformat,microsoft,system,systems,network,email,fix, #repair,bad,erased,how #to,houston,texas,crash,shareware,computer,service,services,


#

How to successfully recover data from a failed RAID

Recovering data from a failed RAID can easily turn into a costly ordeal. Please read this page carefully before proceeding. If you would like to get help from experts, please consider using our fee-based RAID recovery service.

First determine whether the RAID is hardware-based or software-based. The recovery procedures are very different.

Recovering a hardware RAID

First determine if the problem is caused by the underlying RAID mechanism. If it is not, follow the simpler recovery procedures for an ordinary drive. The following causes of problem are not related to the RAID:

  • Virus attacks.
  • The volume being deleted, resized, reformatted or otherwise changed in Disk Manager or other disk management utilities.

If the problem seems to be in the RAID mechanism, determine the operating state of the RAID and take the appropriate actions.

Avoid the most common mistakes that may cause data to become unrecoverable.

Hardware RAID operating states

Current status is normal.
No controller or disk errors.
No recent change in RAID configuration.

RAID is displayed as a single disk.
Volume configuration has not been changed (screenshot ).

Volume is inaccessible or accessible with missing files.

RAID mechanism is operating normally .
Problem may be unrelated to RAID.

RAID is displayed as a single disk.
No drive letter or unformatted volume (screenshot ).

RAID is displayed as a single disk.
Volume has been deleted, reformatted, resized (screenshot ).

RAID is displayed as a single disk.
Disk Manager is not aware of degradation (screenshot ).

Volume is accessible

RAID is degraded due to a disk failure

Current status is normal.
RAID failed and was rebuilt unsuccessfully.

RAID is displayed as a single disk (screenshot ).

Volume is inaccessible or accessible with missing files.

Current status is normal.
RAID settings have been changed.

Current status is normal.
Disks have been reconfigured and disk order may have changed.

Abnormal RAID status such as “offline”, “inactive”, “undefined”, etc.
There may be disk or controller hardware errors.

RAID is not displayed. Sometimes the individual member disks are displayed as unformatted disks (screenshots ).

Volume is inaccessible.

Recovering a software RAID

First determine if the problem is caused by the underlying RAID mechanism. If it is not, follow the simpler recovery procedures for an ordinary drive. The following causes of problem are not related to the RAID:

  • Virus attacks.
  • The volume being reformatted.

If the problem seems to be in the RAID mechanism, determine the operating state of the RAID and take the appropriate actions.

Note that a RAID 0 is also referred to as a striped volume.

Software RAID operating states


FREE Microsoft Dynamics CRM Course #learn #microsoft #dynamics


#

FREE Microsoft Dynamics CRM Course

Microsoft Dynamics CRM is a Customer Relationship Management Business Solution by Microsoft. For any business, Dynamics CRM can be utilized for Sales Force Automation, Marketing Campaigns and complete Customer Service Management as out of the box functionalities.

Microsoft Dynamics CRM is one of the hottest technology in market. A CRM Consultant earns up to $75,000 – $100,000 Per Annum .

In this course of Microsoft Dynamics CRM Free Training, you will learn the basics of Microsoft Dynamics CRM with lot of practicalexamples and practicalapplication demo .

In this course, you will learn:

  1. Microsoft Dynamics CRM introduction from every aspect.
  2. Dynamics CRM Deployment Types
  3. Dynamics CRM Application Navigation
  4. Dynamics CRM Important Terminologies
  5. Dynamics CRM Sales Module Overview
  6. Dynamics CRM Marketing Module Overview
  7. Dynamics CRM Service Module Overview
  8. Dynamics CRM Records and Activities Creation
  9. Dynamics CRM Security Model
  10. Dynamics CRM Reporting Overview
  11. Dynamics CRM Settings and Administration Overview
  12. Course Conclusion Next Steps

The latest version of Microsoft Dynamics CRM is Microsoft Dynamics 365. Microsoft Dynamics 365 is same as Microsoft Dynamics CRM. In addition to Dynamics CRM modules like Sales, Marketing Service, Microsoft has added 2 more additional modules i.e. Microsoft Dynamics 365 Project Service Automation Microsoft Dynamics 365 Field Service.

This training will be soon updated to the latest version of Microsoft Dynamics CRM i.e. Microsoft Dynamics 365.

If you are a Programmer or Business Analyst or Want to be a CRM Consultant. this is the best introduction course to start your learning journey to earn more.

Какова целевая аудитория?

  • This Microsoft Dynamics CRM course is for newbies who are not familiar with Dynamics CRM Technology.
  • This course is probably not for you if you are looking for advanced topics of Microsoft Dynamics CRM.

Abhay Sharma is an Author, Entrepreneur, result oriented Trainer and a Marketing Consultant. He has specialised in training business automation. Also, he has an excellent project management experience (PMP Certified) and he is a Microsoft Certified Trainer (MCT).

Abhay has rich experience in projects implementation, consulting, training delivery Online Training Business Automation.

He has expertise in Microsoft Dynamics products.

Abhay has successfully implemented many mid and large-size projects in various industries like Trading, Automobiles, Pharmaceuticals, Manufacturing, Judiciary, Business Registration, Tourism, Call Centers, NGOs, Government Sector and many more.

He has been training students offline and online and have trained thousands of students in many countries.

Also, he has automated his offline training business to online that generates revenue without him training actively.

Now, he is on the mission to help Trainers, Consultants Coaches build online training business and automation for a consistent income online!


Recovering a database with a missing transaction log #microsoft #sql #server, #sql


#

Recovering a database with a missing transaction log

Question: We had a SAN problem over the weekend and the upshot is that one of our main databases was shut down with open transactions, but we ve lost the log file. The last working backup is two weeks old.

Is there any way to recover the database without having to resort to the old backup?

Answer: Yes, but not without consequences.

Usually when a database has open transactions and the server crashes, crash recovery will run on the affected database and roll back the open transactions. This prevents the partial effects of transactions being present in the database. If the transaction log is not available when SQL Server starts, the database will be in the SUSPECT state.

In this case, the only way to bring the database online (note that I m not saying way to make the database usable ) is to use the emergency mode repair functionality that was added in SQL Server 2005. This basically builds a new transaction log and then runs a DBCC CHECKDB using REPAIR_ALLOW_DATA_LOSS. Read more .

The problem you will have if you decide to go this route is that emergency mode repair cannot roll back any of the active transactions as it has no knowledge of what they were, because the transaction log was destroyed. This means that at best, the resulting database will be transactionally inconsistent i.e. the state of the data in the database is unknown.

For instance, there may have been a transaction that was updating some sales records in a table, and only half of them were updated before the crash and subsequent transaction log loss occurred. You ll find it very difficult to figure out what state the data is in, and how to make the database properly usable again by the application.

Emergency mode repair is supposed to be a real last resort when all other methods of recovering data have failed.

In your case, you ll have to figure out what is the lesser of two evils recovering the database into an inconsistent state, or restoring the two-week old backup. You may end up deciding to do both, and trying to piece together the data, but that will be very time consuming and problematic again, because you don t know what was happening in the database at the time that the crash occurred.

To prevent this situation in future, beef up your backup strategy to use much more frequent backups, and add a high-availability technology that maintains a real-time copy of your database such as database mirroring or SQL Server 2012 Availability Groups.

[Unrelated: this is the last post on this blog, as we re going to focus on our own blogs moving forward. It s been great having this additional outlet to the community and we ve enjoyed writing the weekly posts for the last two years. We hope you ve enjoyed reading and learning from them too!]


Microsoft Office Communicator 2007 – Free download and software reviews – CNET


#

Microsoft Office Communicator 2007

Editors’ Review

Microsoft Office Communicator 2007 is an official add-on from Microsoft that is designed to allow better collaboration and communications between several individuals. At the core, Microsoft Office Communicator 2007 contains an IM and voice call component, with the ability to share desktops and videos between participants. Microsoft Office Communicator 2007 downloads and installs seamlessly.

Microsoft Office Communicator 2007 integrates with Office tightly and adds to the ways you can share documents, spreadsheets, presentations and other files with others. Sharing is configurable down to the individual user level, so not everyone on a call will have the same permissions, for example. Also, there’s a presence indicator that shows you who is available and what their status is. If someone makes a change to a shared file, that status change shows immediately. At its heart are the IM and call modules, which allow for audio or video calls and messaging between any number of people. You can share your desktop easily, which is a very handy feature. We tried Microsoft Office Communicator 2007 with sharing in a smallish group (up to 20 people), but we could not try it in larger Enterprise environments, so we can’t comment on the scalability and stability with hundreds of people participating.

If you are a Microsoft Office user and you share documents with others collaboratively, Microsoft Office Communicator 2007 is a tool you will love. Instead of relying on separate messaging and call tools, a desktop sharing tool, and others apps for collaboration markups, you can now use Office and its familiar interface.

Editors’ note: This is a review of the trial version of Microsoft Office Communicator 2007 2.0.6362.

Publisher’s Description

Microsoft Office Communicator 2007 is a unified communications client that helps people be more productive by enabling them to communicate easily with others using a range of communication options, including instant messaging (IM), voice, and video. Microsoft Office Communicator 2007 introduces a wide range of new features, most notably enhanced presence and enterprise voice capabilities, enabling users to place computer-to-computer calls and to place outbound calls to, and accept incoming calls from, traditional (PBX/PSTN) phone users.

Microsoft Office Communicator 2007 also introduces robust call-forwarding features, support for USB audio devices, automatic setup of audio and video devices, and the ability to add Active Directory Domain Services distribution groups to your Communicator Contact List. This version is the first release on CNET Download.com.

What’s new in this version:

This version is the first release on CNET Download.com.

Microsoft Communicator – Lync – No big deal

2015-01-30 10:40:17 | By wizbang-FL

| Version: Microsoft Office Communicator 2007 2.0.6362

It is integrated with Outlook and if you use exchange it can share you availability as far as meetings, etc.

Microsoft has made their server solutions so cumbersome to implement with existing telephone systems that most organizations choose to simply ignore the built in telephone technology. But, it’s impossible to get Communicator/Lync to just ignore it’s built in telephony so a mis-click causes it to try to dial a number and then pop up 3 error windows saying that feature isn’t configured. Also many of the features that an individual may find useful (like keeping logs of prior IM messages) corporate “powers” may not like individuals to have that ability so many times it’s disabled for the individual but on a corporate level the logs are kept for potential future litigation. In other words it’s used to protect the company, but of no use to an employee attempting to substantiate a IM conversation occurred with say. a manager or supervisor.

Had the potential to be a nice system if it wasn’t so hampered by Microsoft demanding that they be the center of the universe. Also the ability to manipulate the feature set makes useful things disappear and it just becomes another base IM solution (but it can reflect current availability via exchange/outlook if that is your email solution) For a individual it’s only functional with Office Communications Server/ Lync Server so no use to an individual. Some mention that it’s also included with office 365 but the last thing I want to do is subscribe to office suite (or adobe, etc) The last thing I want to worry about during lean times is trying to pay for monthly subscriptions.

does Communicator 2007 R2 have capability of tracking?

2012-02-24 11:29:53 | By johnramirez2

| Version: Microsoft Office Communicator 2007 2.0.6362

Great product when communicating between employee internally.

Tracking of conversation history not available

does Communicator 2007 R2 have capability of tracking conversations? is there a special setup required? can this also be setup to NOT keep track of history?

Read more: Microsoft Office Communicator 2007 – Download.com http://download.cnet.com/Microsoft-Office-Communicator-2007/3000-2150_4-10744610.html?refresh=1330104094012#ixzz1nKSzU4yA

Reply by superfreddy2002 on May 22, 2013

if this application is running on servers, linked to exchange and managed by a server admin, then yes it does. all conversations can be traced back to your outlook account. under the tab “conversations”, all communications you have using this application will be there.

this all depends on what parameters your server admin has in place.

it links to your AD account

I cannot get Office Communicator to Launch.

November 09, 2011 | By JTomey

2011-11-09 07:22:14 | By JTomey

| Version: Microsoft Office Communicator 2007 2.0.6362

It was fast to download!

It is telling me that it is an older version. Also when I go to uninstall it. it never completes the de-installation. Please help!

Reply by superfreddy2002 on May 22, 2013

at the time of your post, Communicator 2012 had been released. 2007 R2 is still supported by Microsoft and can run on Server 2008

2011-02-03 18:37:14 | By Mike Cogswell

| Version: Microsoft Office Communicator 2007 2.0.6362

No too many. It installs OK I guess.

Virtually everything about it.

Completely hopeless communication solution. I work in a company with 2,000+ employees and we use Communicator (or we try to) for text messaging, file sharing (small files between users, rather than larger collaborative sharing for which we use our own company’s software; yes we are a large software company ourselves), voice calls, voice conferences, and one on one screen sharing and conference screen sharing. For a program that is called “Communicator” it makes Communicating pretty darned difficult. Text messaging works 90% of the time, but the other 10% you get (usually minutes after the message has been sent) notification that the server rejected the message or the receipient did not receive it. I don’t think I (or anyone else I know in the company) has successful shared a single file using Communicator. When it comes to voice calls it’s hit and miss. Sometimes we can’t get a connection at all, and other times it works perfectly. When it does work, it works well, but it’s so hit and miss it cannot be relied on. I find I often have to revert to land lines or Skype. Finally, for screen sharing it is like voice calls; hit and miss. For example, last night we had a large conference call. We had people from several countries involved in the call (USA, Germany, Australia, Canada, Pakistan) but the video kept disconnecting different people at different times. For a while there it was working great for me since only other people were getting kicked off, but eventually it caught up to me too. I missed probably 45% of the meeting. Other people missed more. We all agreed we can’t keep using this poor software. I strongly recommend you look elsewhere. You’ll regret it otherwise. Lastly, I’m sure the instant rebuttal wil be something along the line of it must be something to do with your internet connection. My answer to that is that this is not just me running into this trouble, it’s everyone I know in my company. Furthermore we do not have these kinds of issues with Skype, LiveMeeting, Outlook or any other communications solution; only Communicator (the software that doesn’t let you Communicate). OK, I’m off to try to sign in to Communicator, but when I right-click the system tray icon and choose “Open”, nothing happens, period. In fact when I right-click and choose “Exit” nothing happens either. This is certainly some truly well engineered software. NOT!

Reply by wizbang-FL on January 30, 2015

Found out the hard way that it’s better to start with the telephony solution and look for the feature set you want from the same organization. (avaya, cisco, etc) Microsoft seems set to make things difficult to configure with regard to Lync/Communicator. I actually had a graphic that I downloaded from MS website on how to get everything working together as they promote like it’s simple. The graphic has over 100 connection points and required 6 different servers (plus lync server) Trying to piece a solution together from different vendors never seems to work out the way they would like to promote.


Microsoft to open UK data centres – BBC News #microsoft #data #centre


#

Microsoft to open UK data centres

Microsoft has announced plans to build two data centres in the UK next year.

The move will allow the tech company to bid for cloud computing contracts involving sensitive government data, which it was restricted from providing before.

Consumers should also benefit from faster-running apps.

The announcement, made by Microsoft chief executive Satya Nadella in London, follows a similar declaration by Amazon last week.

The two companies vie to provide online storage and data crunching tools via their respective platforms Microsoft Azure and Amazon Web Services.

Microsoft’s existing clients include:

Amazon’s corporate customers include:

One expert said the companies’ latest efforts should address highly regulated organisations’ privacy concerns.

In a related development, the firm has also announced plans to offer its Azure and Office 365 cloud services from two German data centres controlled by a third-party, a subsidiary of Deutsche Telekom .

“Microsoft will not be able to access this data without the permission of customers or the data trustee, and if permission is granted by the data trustee, will only do so under its supervision,” it said.

The move will make it even harder for overseas authorities to gain access to the files.

Microsoft is currently engaged in a legal battle with the US Department of Justice, which is trying to make it hand over emails stored on a server in Ireland – the tech firm says the government is trying to exceed its authority.

‘Huge milestone’

Mr Nadella announced the plan to open a data centre near London and another in elsewhere in the UK – whose location has yet to be named – in 2016.

They will bring the company’s tally of regional data centres to 26.

He added Microsoft had also just completed the expansion of existing facilities in Ireland and the Netherlands.

“[It] really marks a huge milestone and a commitment on our part to make sure that we build the most hyperscale public cloud that operates around the world with more regions than anyone else,” he told the Future Decoded conference.

Scott Guthrie, Microsoft’s cloud enterprise group chief, added that the move would address privacy watchdogs’ concerns about “data sovereignty”.

“We’re always very clear that we don’t move data outside of a region that customers put it in,” he told the BBC.

“For some things like healthcare, national defence and public sector workloads, there’s a variety of regulations that says the data has to stay in the UK.

“Having these two local Azure regions means we can say this data will never leave the UK, and will be governed by all of the local regulations and laws.”

Amazon has also committed itself to multiple UK data centres, but has not said how many at this stage. It will make the UK its 15th regional base.

Although that is fewer than Microsoft’s, the company is currently the global leader in this field in terms of market share.

Image copyright Thinkstock Image caption Microsoft and Amazon will compete to provide local cloud computing services to UK-based organisations

Announcing its move, Amazon said an added benefit of having a local data centre was that the public would experience less lag when using net-based services.

“It will provide customers with quick, low-latency access to websites, mobile applications, games, SaaS [software as a service] applications, big data analysis, internet of things (IoT) applications, and more,” wrote Amazon’s chief technology officer, Werner Vogels .

Amazon’s other EU-based data centres are in Ireland and Germany.

Safe Harbour

The recent legal battle over Safe Harbour highlighted the benefits of storing and processing data locally.

Image copyright Thinkstock Image caption Regulations sometimes dictate that sensitive data must not be held outside of the UK

The trade agreement – which used to make it easy to send EU-sourced personal information to the US – was ruled invalid. causing companies to take on additional administrative work if they wanted to continue using US-based cloud services.

One expert said that the latest move should allay many IT chiefs’ concerns.

“Microsoft’s new UK data centre will be a big deal for enterprises here – especially in highly regulated industries,” said Nick McGuire, from the tech research company CCS Insight.

“It unlocks one of the key restraints on those bodies wishing to embrace cloud services.”

Although outsourcing computing work to one of the big tech companies offers the potential for savings – as they do not have to build and maintain their own equipment – there are also risks involved.

A fault with Azure knocked many third-party websites offline last year. and Amazon has experienced glitches of its own.

However, major faults taking clients’ services offline are a relatively rare occurrence.

Media playback is unsupported on your device


Visual Basic Tutorial Lesson 37: Adding Menus for Your Application #free #visual


#

Lesson 37: Creating Menus for Your Applications

The menu bar is the standard feature of most Windows applications. The main purpose of the menus is for easy navigation and control of an application. Some of the most common menu items are File, Edit, View, Tools, Help and more. Each item on the main menu bar also provides a list of options in the form of a pull-down menu. When you create a Visual Basic 6 program, you need not include as many menu items as a full-fledged Windows application. What you need is to include those menu items that can improve the ease of usage by the user. There are two ways to add menus to your application, using the Visual Basic’s Application Wizard and or the menu editor.

37.1 Adding Menu Bar Using Visual Basic’s Application Wizard

The easiest way to add a menu bar to your application is by using Visual Basic’s Application Wizard. This wizard allows the user to insert fully customized standard Windows menu into his or her application. To start using Visual Basic’s Application Wizard, click on the Application Wizard icon at the Visual Basic new project dialog box, as shown in Figure 37.1 below:

Figure 37.1: New Project Window

When you click on the VB Application wizard, the introduction dialog box will appear, as shown in Figure 37.2. As you are not loading any default setting, just click on the Next button.

Figure 37.2

After clicking the Next button, the interface type dialog box will be displayed, as shown in Figure 37.3. There are three choices of interface available for your project. As we currently not creating a Multiple Document Interface (MDI), we choose Single Document Interface (SDI). You can also type the project name in the textbox below, here I am using MyFirstMenu.

Figure 37.3

Clicking the Next button wiill bring up a list of menus and submenus that you can add them to your application. Check to select a menu item and uncheck to unselect a menu item as shown in Figure 37.4. Let say we choose all the menus and click next, then you will get an interface comprises File, Edit, View and Help menus, as shown in Figure 37.5

Figure 37.4

Figure 37.5

When you click on any menu item, a list of drop-down submenu items will be displayed. For example, if you click on the File menu, the list of submenu items such as New, Open, Save, Save As and more will be displayed, as shown in Figure 37.6

Figure 37.6

Clicking on any of the dropped down menu item will show the code associated with it, and this is where you can modify the code to suit your programming needs. For example, clicking on the item Open will reveal the following code:

Figure 37.7

Now, I will show you how to modify the code in order to open a graphic file and display it in an image box. For this program, you have to insert a Image box into the form. Next add the following lines so that the user can open graphic files of different formats.

Filter = Bitmaps(*.BMP)|*.BMP|Metafiles(*.WMF)|*. WMF|Jpeg Files(*.jpg)|*.jpg|GIF Files(*.gif)|*.gif|Icon Files(*.ico)|*.ico|All Files(*.*)|*.* .

Then, you need to load the image into the Image box with the following code:

Also set the Stretch property of the Image box to true so that the image loaded can resize by itself. Please note that each menu item is a special control, so it has a name too. The name for the menu File in this example is mnuFileOpen.

The Code

When you run the program and click on the File menu and then the submenu Open, the following Open dialog box will be displayed, where you can look for graphic files of various formats to load it into the image box.

Figure 37.8

For example, selecting the jpeg file will allow you to choose the images of jpeg format, as shown in Figure 37.9.

Figure 37.9

Clicking on the particular picture will load it into the image box, as shown in Figure 36.10 below

Figure 37.10

37.2: Adding Menu Bar Using Menu Editor

To start adding menu items to your application, open an existing project or start a new project, then click on Tools in the menu bar of the Visual Basic IDE and select Menu Editor. When you click on the Menu Editor, the Menu Editor dialog will appear. In the Menu Editor dialog. key in the first item File in the caption text box. You can use the ampersand ( ) sign in front of F so that F will be underlined when it appears in the menu, and F will become the hot key to initiate the action under this item by pressing the Alt key and the letter F. After typing File in the Caption text box, move to the name textbox to enter the name for this menu item, you can type in mnuFile here. Now, click the Next button and the menu item File will move into the empty space below, as shown in Figure 37.11:

Figure 37.11

You can then add in other menu items on the menu bar by following the same procedure, as shown in Figure 37.12 below:

Figure 37.12

When you click Ok, the menu items will be shown on the menu bar of the form.

Figure 37.13

Now, you may proceed to add the sub menus. In the Menu Editor, click on the Insert button between File and Exit and then click the right arrow key, and the dotted line will appear. This shows the second level of the menu, or the submenu. Now key in the caption and the name. Repeat the same procedure to add other submenu items. Here, we are adding New, Open, Save, Save As and Exit.

Figure 37.14

Now click the OK button and go back to your form. You can see the dropped down submenus when you click on the item File, as shown.

Figure 37.15

Finally, you can enter the code by clicking on any of the submenu items.


Softpedia – Free Downloads Encyclopedia #software, #download, #freeware, #programs, #shareware, #softpedia, #trial,


#

SOFTPEDIA

Unity is going away and GNOME is coming back

Canonical decided to drop Unity in favor of GNOME, which is probably not the best decision. I think that it s probably a mistake, but it was also an unavoidable move for the company.People have to keep in mind that Ubuntu for desktop was never profitable, and it s easy to see why. There are very few ways to monetize a free operating system. The only way to get some money out of it is to provide specialized support for companies, but that s also not a really profitable avenue.It s very likely that Canonical is making some money from its other products, especially the ones built for the.

The new Apple is a company that changes its mind and is not afraid to take a U-turn or even jump off a cliff

So, you think you know Apple? You think you can predict what their next move is and how the design is going to change?Think again. The new Apple is taking big steps towards. something else. Even for old Apple die-hards is hard to predict where the company is going. Yes, Apple has always been the company that brought something new, invented a new gadget or switched to a new connector just when you thought you got a new accessory, but this time. things are a bit different.There are two ways in which Apple has changed and became totally unpredictable. The hardware kinda lacks behind and we still.

And then, your heart stops beating for a few seconds

You watch TV all snuggled up under the super-soft blanket with your phone just next to you on the couch. It s a commercial break, and you snatch at the glass of wine on the coffee table when, suddenly, you hear a noise. It sounds like something just hit the ground. You don t look around, but in that half of second, you know it can t be good.It can be just two things. It s either the remote or the phone. You start praying it s the remote. It s not. It s the phone, and it s laying on the ground face down after what seemed to be like a pretty strong hit. Yo.

Here s a case for iPhone 7s, not iPhone 8

The first quarter of fiscal 2017 is the best ever for iPhone. Apple sold 78.3 million iPhones in the past few months. The revenue from the iPhone business alone topped $54.4 billion. The best model was, rather unexpectedly, the iPhone 7 Plus. But is that enough to make Apple a winner in the long run?Two very low quartersThe market will stagnate for Apple in the next couple of quarters. The first reason is obvious: no Black Friday, no Christmas or any other important holidays will help the iPhone business. Also, keep in mind that every iOS user will quit spending money on an 8-month-old device and wait.

Will Apple dedicate more time and money to the cloud? How about Siri and the Desktop computer line-up?

2016 was all about the MacBook. The computer that is going to change the future of ports and connectors was born. We have also got a phone with a missing headphone jack. For some users, this is a big downer. Others are happy with their AirPods. Next year seems to be a good one for the desktop computer. Will the Mac mini survive? Is the Mac Pro still up for a refresh?Siri on macOSSiri jumped from the iPhone to the Mac in 2016. It was a long-awaited move that failed to amaze users. Sure enough, the implementation is simple and elegant, just as Apple would do it, but the functionality lacks. Siri ca.

Adobe finally brings Linux client in sync with the Windows version, four years after it decided to give up on it

The top companies in the tech world are getting tired of Adobe s Flash Player, and after many years of struggling to deal with its security vulnerabilities, key players like Google, Microsoft, Apple, and Mozilla are finally pushing for the transition to HTML5 in a more aggressive way.Flash Player will be disabled by default in browsers developed by these companies, as HTML5 will be preferred on websites that support it, and users will be given full control over Flash content on websites where it s absolutely mandatory.And while the trend here is to step away from Flash, Adobe is trying exa.

The higher they rise, the harder they fall

LeEco is one of world s largest tech companies, or we should say was considering the circumstances. LeEco s businesses cover a wide range of high-tech sectors including smartphones, TVs, media content, electric bicycles and cars, as well as movies.Founded 12 years ago by Jia Yueting, LeEco is a holding company that owns many businesses all over the world. However, the Chinese giant started its climb in the Mainland, as the first streaming company in China to go public.LeEco is also known as China s Netflix since it s the largest company in the country that provides media co.


Online Course: Excel 2016 – Certificate and CEUs #editing #certificate #online, #excel


#

Online Class: Excel 2016

Course Description

Microsoft Excel is a spreadsheet program that comes packaged with the Microsoft Office family of software products. Just like the other programs by Microsoft, Excel can be used for a wide variety of purposes such as creating an address book, grocery lists, tracking expenses, creating invoices and bills, accounting, balance checkbooks and other financial accounts, as well as any other purpose that requires a spreadsheet or table.

This course will cover the many features of Excel 2016 and will teach you how to use them, starting with the simple and working to the most complicated. The good news is that Excel 2016 makes everything easy. By learning how to navigate the program and where to find each feature, operating Excel can become a breeze.

This course will teach you how to:

Create a spreadsheet

Format cells, rows, columns, and entire worksheets so they fit and match your data

Enter data into a spreadsheet

Use formulas and functions for math, accounting, and totaling.

Create formulas and functions

Calculate data

Create charts and diagrams for your data

Create data lists and forms

Create and use pivot tables and pivot charts.

Work with Excel templates

Share and protect your worksheets and workbooks

Use What-If Analysis to determine possible outcomes. For example, sales goals

And much more

This course was designed to teach you skills you’ll need to successfully use Excel 2016. Each lesson contains instructions and illustrations to show you how to use the features, then walks you through step-by-step so you can see how everything is done. You don’t need previous experience with Excel to be able to complete this course. This course will start with basic skills, then move forward to more advanced features and techniques. Although you do not need access to Excel 2016 for this course; it is highly recommended. A free trial of Excel 2016 is available on the Microsoft website.

7/3/2017 11:39:52 AM

Lesson 1: Introduction to MS Excel 2016

Excel can be used for a wide variety of purposes such as creating an address book, grocery lists, tracking expenses, creating invoices and bills, accounting, balance checkbooks and other financial accounts, as well as any other purpose that requires a spreadsheet or table.

  • Lesson 2: Navigating Excel 2016

    In this lesson, we’re going to focus on the major elements of Excel 2016 and take a few minutes to become familiar with their purpose.

  • Lesson 3: Worksheets and Workbooks

    Worksheets are stored in workbooks, and workbooks are the files that you actually save.

  • Lesson 4: Entering Information into MS Excel 2016

    Starting to enter information is as simple as clicking on a cell in the spreadsheet and typing, but there are some things that are helpful to know – and that you can do – before you ever type that first letter or number.

  • Lesson 5: Introduction to Working with Cells, Rows, and Columns

    If you want to move data from its original location and relocate it somewhere else, you must cut the data, then paste it somewhere else. You can cut or copy cells, rows, columns, or entire worksheets.

  • Lesson 6: Formatting Data and Cells

    Taking the time to format a worksheet can take it from the black and white page of data and gridlines to something that looks professional and attractive.

  • Lesson 7: Formatting Rows and Columns

    In Excel 2016, the width of a column is determined by how many characters that can be displayed within a cell.

  • Lesson 8: Editing Cells, Rows, Columns, and Worksheets

    Excel 2016 makes creating – and editing – spreadsheets a lot easier because correcting errors is easy mess free.

  • Lesson 9: Introduction to Formulas and Calculations

    If you use spreadsheets to do accounting for a business, track totals, invoice customers, or anything that requires mathematics, Excel’s ability to calculate formulas is going to save you errors and headaches.

  • Lesson 10: Working with Formulas and Functions

    In Excel, a function is a predesigned formula that does a certain calculation. This can make it easier because you don’t have to construct every formula yourself.

  • Lesson 11: Maintaining Worksheets

    It’s important to learn how to maintain your worksheets to help you keep on top of all the information.

  • Lesson 12: The What-If Analysis

    A what-if analysis lets you explore possibilities by entering possible values into the same equation so you can see the possible outcomes in the cells of your spreadsheet.

  • Lesson 13: Adding Images and Graphics

    You’ve already learned how to format a worksheet and enter information into Excel. Now we’re going to show you how to add elements such as graphics and images.

  • Lesson 14: Charts and Diagrams

    Charts and diagrams are tools you can use to visually represent the data in a worksheet.

  • Lesson 15: Creating Data Lists

    A data list or a database table are types of worksheets that aren’t used to calculate values, but to store information, such as names and addresses of clients or perhaps a library of books.

  • Lesson 16: Managing Data

    A form is simply a dialog box that lets you display or enter information one record (or row) at a time. It can also make the information more visually appealing and easier to understand.

  • Lesson 17: Pivot Tables and Pivot Charts

    A pivot table sounds more difficult and confusing than it really is. Most people say they don’t like pivot tables, or they don’t understand them. In truth, they’re not that difficult at all.

  • Lesson 18: Printing Worksheets and Workbooks

    Headers appear at the top of a worksheet. Footers appear at the bottom. Both can contain page numbers, and headers often contain the title of the worksheet and perhaps the date.

  • Lesson 19: Templates

    Templates are worksheets that are already designed for you.

  • Lesson 20: Protecting, Saving, and Sharing Workbooks

    Add protection to worksheets so that they can’t be edited by other people. You can lock cells or an entire worksheet.

  • Additional Course Information

    • Document Your Lifelong Learning Achievements
    • Earn an Official Certificate Documenting Course Hours and CEUs
    • Verify Your Certificate with a Unique Serial Number Online
    • View and Share Your Certificate Online or Download/Print as PDF
    • Display Your Certificate on Your Resume and Promote Your Achievements Using Social Media

    Course Title: Excel 2016

    Course Number: 8900368

    Languages: English – United States, Canada and other English speaking countries

    Course Type: Computer Skill

    CE Accreditation: Universal Class, Inc. has been accredited as an Authorized Provider by the International Association for Continuing Education and Training (IACET).

    Grading Policy: Earn a final grade of 70% or higher to receive an online/downloadable CEU Certification documenting CEUs earned.

    Assessment Method: Lesson assignments and review exams

    Instructor: UniversalClass Staff Instructor

    Duration: Continuous: Enroll anytime!


    SQL Server 2012 s Hardware and Software Requirements #sql #hardware #requirements, #microsoft


    #

    SQL Server 2012 s Hardware and Software Requirements

    SQL Server 2012 is designed to run on a wide range of computer systems from laptop and desktop systems to supercomputer class systems so its minimum hardware requirements are surprising low. The minimum processing requirement is a 1.0GHz CPU for a 32-bit x86 implementation and a 1.4GHz CPU for a 64-bit x64 implementation. Microsoft s recommended minimum processor speed is 2.0GHz.

    The minimum memory requirements for SQL Server 2012 are also quite low. The low-end SQL Server 2012 Express edition requires a minimum of 512MB of RAM, whereas the other editions require a minimum of 1GB. Microsoft s recommended minimum RAM for SQL Server is 4GB.

    These days, it s hard to buy even a desktop system with anything lower than a 1GHz processor and 1GB of RAM, so these hardware requirements shouldn t be a problem for most businesses. Of course, most production implementations will require more processing power and greater amounts of memory.

    Each SQL Server 2012 edition has different OS requirements. In addition, the 32-bit x86 versions and the 64-bit x64 versions of the SQL Server 2012 editions have somewhat different OS requirements. The following table lists all the supported Windows OSs for the principal editions of SQL Server 2012.

    Supported Windows OSs for the Principal Editions of SQL Server 2012

    SQL Server Edition

    Windows OSs That Support
    32-Bit SQL Server

    Windows OSs That Support
    64-Bit SQL Server

    SQL Server Enterprise

    Windows Server 2012 64-bit Datacenter, Standard, Essentials, and Foundation editions

    Windows Server 2008 R2 SP1 64-bit Datacenter, Enterprise, Standard, and Web editions

    Windows Server 2008 SP2 64-bit Datacenter, Enterprise, Standard, and Web editions

    Windows Server 2008 SP2 32-bit Datacenter, Enterprise, Standard, and Web editions

    Windows Server 2012 64-bit Datacenter, Standard, Essentials, and Foundation editions

    Windows Server 2008 R2 SP1 64-bit Datacenter, Enterprise, Standard, and Web editions

    Windows Server 2008 SP2 64-bit Datacenter, Enterprise, Standard, and Web editions

    SQL Server Business Intelligence

    Windows Server 2012 64-bit Datacenter, Standard, Essentials, and Foundation editions

    Windows Server 2008 R2 SP1 64-bit Datacenter, Enterprise, Standard, and Web editions

    Windows Server 2008 SP2 64-bit Datacenter, Enterprise, Standard, and Web editions

    Windows Server 2008 SP2 32-bit Datacenter, Enterprise, Standard, and Web editions

    Windows Server 2012 64-bit Datacenter, Standard, Essentials, and Foundation editions

    Windows Server 2008 R2 SP1 64-bit Datacenter, Enterprise, Standard, and Web editions

    Windows Server 2008 SP2 64-bit Datacenter, Enterprise, Standard, and Web editions

    SQL Server Standard

    Windows Server 2012 64-bit Datacenter, Standard, Essentials, and Foundation editions

    Windows Server 2008 R2 SP1 64-bit Datacenter, Enterprise, Standard, Foundation, and Web editions

    Windows 8 32-bit and 64-bit

    Windows 8 Pro 32-bit and 64-bit

    Windows 7 SP1 64-bit Ultimate, Enterprise, and Professional editions

    Windows 7 SP1 32-bit Ultimate, Enterprise, and Professional editions

    Windows Server 2008 SP2 64-bit Datacenter, Enterprise, Standard, Foundation, and Web editions

    Windows Server 2008 SP2 32-bit Datacenter, Enterprise, Standard, and Web editions

    Windows Vista SP2 64-bit Ultimate, Enterprise, and Business editions

    Windows Vista SP2 32-bit Ultimate, Enterprise, and Business editions

    Windows Server 2012 64-bit Datacenter, Standard, Essentials, and Foundation editions

    Windows Server 2008 R2 SP1 64-bit Datacenter, Enterprise, Standard, Foundation, and Web editions

    Windows 8 64-bit

    Windows 8 Pro 64-bit

    Windows 7 SP1 64-bit Ultimate, Enterprise, and Professional editions

    Windows Server 2008 SP2 64-bit Datacenter, Enterprise, Standard, Foundation, and Web editions

    Windows Vista SP2 64-bit Ultimate, Enterprise, and Business editions

    For a more complete discussion of SQL Server 2012, see Migrating to SQL Server 2012 .


    T-SQL Programming Part 5 – Using the CASE Function #microsoft, #articles, #microsoft


    #

    T-SQL Programming Part 5 – Using the CASE Function

    Have you ever wanted to replace a column value with a different value based on the original column value? Learn how, with the T-SQL CASE function.

    The CASE function is a very useful T-SQL function. With this function you can replace a column value with a different value based on the original column value. An example of where this function might come in handy is where you have a table that contains a column named SexCode, where 0 stands for female, 1 for male, etc. and you want to return the value “female” when the column value is 0, or “male” when the column value is 1, etc. This article will discuss using the CASE function in a T-SQL SELECT statement.

    The CASE function allows you to evaluate a column value on a row against multiple criteria, where each criterion might return a different value. The first criterion that evaluates to true will be the value returned by the CASE function. Microsoft SQL Server Books Online documents two different formats for the CASE function. The “Simple Format” looks like this:

    And the “Searched Format” looks like this:

    Where the “input_expression” is any valid Microsoft SQL Server expression, the “when_expression” is the value in which the input_expression is compared, the “result_expression ” is the value that will be return for the CASE statement if the “when_expression” evaluates to true, ” . n ” represents that multiple WHEN conditions can exist, the “else_result_expression ” is the value that will be returned if no “when_expression” evaluates to true and in the “Searched Format” the “Boolean_expression” is any Boolean express that when it evaluates to true will return the “result_expression”. Let me go through a couple of examples of each format to help you better understand how to use the CASE function in a SELECT statement.

    For the first example let me show you how you would use the CASE function to display a description, instead of a column value that contains a code. I am going to use my earlier example that I described at the top of this article where I discussed displaying “female” or “male” instead of the SexCode. Here is my example T-SQL Code:

    Here is the output from this T-SQL code:

    This example shows the syntax in action for a CASE function using the “Simple Format”. As you can see the CASE function evaluates the PatientSexCode to determine if it is a 0, 1, or 2. If it is a 0, then “female” is displayed in the output for the “Patient Sex” column. If the PatientSexCode is 1, then “male” is display, or if PatientSexCode is 2 then “unknown” is displayed. Now if the PatientSexCode is anything other than a 0, 1 or 2 then the “ELSE” condition of the CASE function will be used and “Invalid PatientSexCode” will be displayed for the “Patient Sex” column.

    Now the same logic could be written using a “Searched Format” for the CASE function. Here is what the SELECT statement would look like for the “Searched Format”:

    Note the slight differences between the “Simple” and “Searched” formats. In the “Simple” format I specified the column name for which row values will be compared against the “when_expressions” ,where as in the “Searched” format each WHEN condition contains a Boolean expression that compares the PatientSexCode column against a code value.

    Now the CASE function can be considerably more complex than the basic examples I have shown. Suppose you want to display a value that is based on two different columns values in a row. Here is an example that determines if a Product in the Northwind database is of type Tins or Bottles, and is not a discontinued item.

    The output for the above command on my server displays the following:

    As you can see I’m using a “Searched Format” for this CASE function call. Also, each WHEN clause contains two different conditions. One condition to determine the type (tins, or bottles) and another condition to determine if the product has been discontinued. If the QuantityPerUnit contains the string “Tins” and the Discontinue column value is 0 then the “Type of Availability” is set to “Tins”. If the QuantityPerUnit contains the string “Bottles” and the Discontinue column value is 0 then the “Type of Availability” is set to “Bottles”. For all other conditions, the “Type or Availability” is set to “Not Tins , Not Bottles , or is Discontinued.

    The WHEN clauses in the CASE function are evaluated in order. The first WHEN clause that evaluates to “True” determines the value that is returned from the CASE function. Basically, multiple WHEN clauses evaluate to “True”, only the THEN value for the first WHEN clause that evaluates to “True” is used as the return value for the CASE function. Here is an example where multiple WHEN clauses are “True.”

    The output on my machine for this query looks like this:

    If you look at the raw titles table data in the pubs database for the title “You Can Combat Computer Stress!” you will note that the price for this book is $2.99. This price makes both the “price 12.00” and “price 3.00” conditions “True”. Since the conditions are evaluated one at a time, and the “price 12.00” is evaluated prior to the “price 3.00,” the “Price Category” for the title “You Can Combat Computer Stress!” is set to “Cheap”.

    The CASE function can appear in different places within the SELECT statement, it does not have to only be in the selection list within the SELECT statement. Here is an example where the CASE function is used in the WHERE clause.

    The output for this query looks like this:

    Here I only wanted to display books from the titles table in pubs database if the price category is ‘Average’. By placing my CASE function in the WHERE clause I was able to accomplish this.

    Conclusion

    As you can see the CASE function is an extremely valuable function. It allows you to take a data column and represent it differently depending on one or more conditions identified in the CASE function call. I hope that the next time you need to display or use different values for specific column data you will review the CASE function to see if it might meet your needs.

    See All Articles by Columnist Gregory A. Larsen


    Cloud Services – Hosting Insights #microsoft #cloud #hosting #services


    #

    Tag: Cloud Services

    If you followed the stream of Twitter updates during the 2017 Microsoft Cloud and Hosting Summit, you likely spotted daily updates from William Toll, VP of Product Management at Navisite. We invited William to share his takeaway on the summit and are thrilled to share his insights with the partner community. Microsoft has always been a

    This month s webcast line-up features something for everyone. Get the latest insights about hosted productivity services and Remote Desktop Services to help you meet the evolving needs of modern businesses. Find out how to transform your online presence and marketing activities to drive more sales. And tune in live to the 2017 Cloud Hosting

    Every month, we round up hosting and cloud service provider news you might have missed. Sign up for our monthly Microsoft Hosting and Cloud Newsletter to get the most current news delivered to your inbox. Watch Live: The Microsoft Cloud Hosting Summit Don’t miss this unique opportunity to be part of the Microsoft Cloud

    Let s face a cold, bitter truth: from a prospective customer s perspective, you re no longer the expert. With an overabundance of information online, more than 70% of customers make their buying decision before they contact you to finalize the sale. So how can you attract, engage and convert customers when they seem to need you only during

    The CSP Cloud Power Up suite of incentives for Resellers (Direct Resellers) and Indirect Providers are available now. CSP Cloud Power Up incentives are designed to help you boost profitability, increase customer adoption of cloud services, sell more premium SKUs, and cross sell new cloud services. Details: Between February 1 and June 30, 2017,

    Land and expand your cloud productivity services with our round-up of essential Office 365 onboarding and marketing tools, plus join us for a special five-part Office 365 sales training series! As the most widely used cloud application among businesses, it s no secret that Office 365 offers enormous revenue and customer growth opportunities for hosting and

    Remote Desktop Services (RDS) supports the steady growth of thousands of service providers, with both desktop and app/ISV RDS business models creating long term customer contracts and repeatable business. At the same time, a growing number of RDS providers are abandoning their data centers and choosing to migrate their RDS implementations to Azure. Here are

    Cloud Elevate is your home for timely, critical resources organized by a monthly theme to help ready teams, go to market, and win hosting business. To kick off the new year, we re sharing resources to build your hosted web and audio conferencing practice with Modern Meetings solutions powered by Microsoft Office 365 and Skype for Business an estimated $47

    Every month, we round up hosting and cloud service provider news you might have missed. Sign up for our monthly Microsoft Hosting and Cloud Newsletter to get the most current news delivered to your inbox. Cloud Channel Network Webcasts Check out upcoming webcasts for cloud and hosting service providers at www.cloudchannelnetwork.com, and be sure to check

    In the past year, we’ve hosted dozens of webcasts to help you grow your cloud hosting business. So many webcasts, in fact, that it became a bit cumbersome to sort through the list to find webcasts of interest. This week, we updated the look and feel of the Cloud Channel Network to make it much easier


    Hybrid Cloud for Microsoft Azure – Accenture #hybrid #cloud, #hybrid #cloud #solution,


    #

    Hybrid Cloud Solution for Microsoft Azure

    Under pressure to become more agile and innovate faster, enterprises want to tap the full potential of the cloud to integrate the capabilities they require to become digital businesses. What’s needed? A cohesive, integrated approach to the hybrid cloud.

    Co-engineered by Accenture, Microsoft and Avanade, the Accenture Hybrid Cloud Solution for Microsoft Azure is a powerful, enterprise-grade hybrid cloud platform designed to unlock a whole new level of cloud capabilities for the enterprise.

    With the Accenture Hybrid Cloud Solution for Microsoft Azure, enterprises have all the cloud tools needed to effectively integrate and deploy cloud into the fabric of their businesses to become markedly more agile and deliver everything “as a service”. And with greater agility, they are well positioned to accelerate business capabilities, capitalize on the new economics of cloud, create new customer value propositions and exploit new markets.

    ACCENTURE HYBRID CLOUD FOR MICROSOFT AZURE

    INNOVATION OPPORTUNITIES OF THE CLOUD

    Pierre Nanterme, Chairman CEO, Accenture talks about the collaboration with Microsoft to bring this powerful hybrid cloud platform to our clients.

    THE POWER TO DELIVER EVERYTHING ‘AS-A-SERVICE’

    The full promise of the digital world is becoming a reality

    Satya Nadella, CEO, Microsoft provides insights on how this solution will help our clients realize the benefits of cloud to become truly digital businesses.

    THE POWER TO DEPLOY, MOVE AND MANAGE APPLICATIONS

    Capitalize on the economics, agility and innovation of the cloud

    JOURNEY TO CLOUD

    Journey to Cloud: Arrive first

    You want a swift, secure and smooth transition. And once you re in the cloud, you ll need to evolve. Join Accenture on your Journey to Cloud and benefit from our tools, capabilities, ecosystem and unparalleled experience. Let us unravel the complexities of cloud migration, optimize assets and help you rapidly achieve your business outcomes.


    Top 10: Remote Desktop Keyboard Shortcuts #microsoft #windows, #remote #desktop, #keyboard #shotrcuts,


    #

    Top 10: Remote Desktop Keyboard Shortcuts

    Have you ever been using one of your RDP sessions to manage a remote system and found that you needed to press Ctrl+Alt+Del on the remote system but you couldn t remember how to do it inside the Remote Desktop window? Just pressing Ctrl+Alt+Del sends the keystrokes to your local desktop, which certainly isn t what you wanted. If you ve ever had this problem, then this Top 10 column is your answer. In this column, I show you 10 handy keyboard shortcuts you can use in your remote desktop sessions.

    10. Ctrl+Alt+plus sign (+) Dealing with capturing screen images from a Remote Desktop session can be a mystery. If you press Print Screen, you get an image of your local desktop not the remote desktop. Pressing the Ctrl+Alt+plus sign (+) keyboard shortcut captures a snapshot of the entire client window area of Remote Desktop and is the same as pressing Print Screen on your local desktop.

    9. Ctrl+Alt+minus sign (-) Sometimes you don t want an image of the entire desktop; sometimes you want just a selected window. Pressing the Ctrl+Alt+minus sign (-) keyboard shortcut captures a snapshot of just the active window within the remote desktop session. This key combination is the same as pressing Alt+Print Screen on your local desktop.

    8. Alt+Home Pressing the Alt+Home keyboard combination with Remote Desktop displays the Start menu on the remote system. The Start menu gives you quick access to the different programs installed on the remote system. This key combination is the same as pressing the Windows key on your local desktop.

    7. Alt+Delete Pressing the Alt+Delete keyboard combination in the Remote Desktop session opens the Windows menu of an application running on the remote system. The Windows menu is typically displayed under the icon in the extreme upper left corner of most Windows applications, and it lets you move and resize the application.

    6. Ctrl+Alt+Break Sometimes you might want the Remote Desktop window to be displayed in full-screen mode just as if you were using your local desktop. If you want to toggle the Remote Desktop session between a window and a full-screen display, you can press the Ctrl+Alt+Break keyboard combination.

    5. Ctrl+Alt+Pause Like the previous item, the Ctrl+Alt+Pause keyboard combination switches between full screen and windowed mode. However, with this keyboard shortcut, the remote desktop window remains at its standard size and doesn t fill the entire local desktop. Instead, it s displayed on a black background.

    4. Alt+Insert Sometimes you want a quick way to switch between the different programs that you have running. Pressing the Alt+Insert keyboard combination lets you cycle through the programs on the remote system in the order that they were opened. This process is the same as using Alt+Tab on your local desktop.

    3. Alt+Page Down Another way to cycle through the running programs on your Remote Desktop session is to use the Alt+Page Down keyboard shortcut. Pressing this key combination lets you switch between programs on the remote desktop session, moving from right to left in the Windows task switcher. This is the same as Alt+Shift+Tab on your standard desktop.

    2. Alt+Page Up Pressing Alt+Page Up lets you switch between programs on the Remote Desktop session, moving from left to right in the Windows task switcher. This is the same as Alt+Tab on your standard desktop.

    1. Ctrl+Alt+End One of the most common yet hard-to-find things that you ll need to do in a Remote Desktop session is to send a Ctrl+Alt+Del signal to the remote system. Press Ctrl+Alt+End if you need to send a Ctrl+Alt+Del keystroke combination to the remote system. This keystroke opens the Microsoft Windows Security dialog box, which lets you lock the computer, log off, change your password, and start Task Manager.


    Dynamics AX: PartnerSource: Microsoft Dynamics ERP – Count Down to the Cloud


    #

    Want to turn you’re data into a true asset. Ready to break free from the report factory.
    Ready to gain true insights that are action focused for truly data informed decisions ?
    Want to do all of this across mutliple companies, instances of Dynamics and your other investments?
    Hillstar Business Intelligence is the answer then! (www.HillstarBI.com )

    Let us prove to you how we can take the complexity out of the schema and truly enable users to answer the needed questions to run your business! Visit Hillstar Business Solutions at: www.HillstarBI.com

    Jobs from Indeed

    • Vacation
    • PartnerSource: Get Ready for Microsoft Dynamics AX.
    • Microsoft Dynamics AX 2012 and the use of Claims B.
    • Dilip Delivers his review of the Latest AX 2009 Ad.
    • The Microsoft Dynamics Community Site Wants to tal.
    • Update on the Connector for Microsoft Dynamics AX.
    • New Community Article: To Upgrade or Not To Upgrad.
    • Out-of-the-box Connector for Dynamics AX and CRM
    • Software Advice Video Interview series about Micro.
    • Highlight: AXUG AX2012 Review by Gary Holsopple

    About Me

    PartnerSource: Microsoft Dynamics ERP – Count Down to the Cloud

    Well as the title of this post states, the Dynamics Ecosystem as a whole is getting ready and counting down to the cloud. This officially kicks off on Tuesday, during Convergence in Atlanta, with Microsoft VP Doug Kennedy, who has been interviewed on this blog several times.

    You do need PartnerSource Access to view this event, and have to be a partner to attend. From the post.:

    “Join us for this exclusive opportunity to hear the latest update on the Microsoft Dynamics cloud business from Doug Kennedy, VP, Microsoft Dynamics Partners, and then network with up to ten selected Microsoft Dynamics Hosting Partners who can help take your business to the cloud.”

    Back in Oct 2010, Microsoft published an online learning course, in the MPN called: Microsoft Dynamics ERP Cloud Strategy

    You need to be a Partner in order to review this course as well, but it helps set the stage for the details in which Doug will be diving into.

    So quick take aways from that published course, is that Microsoft’s ERP Cloud play will be in full steam in 2014, and building up to that full on Microsoft ERP in the Cloud, Microsoft also highlights two ways for Partners to use the cloud with AX today.:

    • Extend Microosft Dynamics ERP with the cloud. Being that on-premise, or partner hosted, through Azure hosted composite apps and services.
    • Partner Hosted Dynamics ERP

    This applies for Microsoft Dynamics AX 2009 and Microsoft Dynamics AX 2012. Microsoft does plan to have a total SaaS offering in the future for Microsoft Dynamics AX, hearing that 2014 timeframe for that. Until then, Microsoft Dynamics AX will exist in the Cloud as sitting on top of IaaS, or in a Hybrid cloud mode were AX lives on-premise, while other LOB, Composite Apps / Services live in the Cloud, on Azure’s PaaS offering to complete a customers overall solution.

    It’s great to continue and see Microsoft addressing the cloud question, with current possibilities and also future plans, and so if you can attend this session it will be worth it.

    That’s all for now, getting back into the swing of things after some vacation. Check back soon as a WHOLE lot more to come. Till next time!

    "Visit the Dynamics AX Community Page today!"


    Classes for business management #sharepoint #classes, #sharepoint #training, #microsoft #sharepoint #classes, #sharepoint


    #

    Choosing from more than 80 classes allows you to put together your own custom SharePoint and Office 365 training experience. Whether you want to learn about the exciting new SharePoint 2016, are still making the most out of SharePoint 2013 or even 2010, or getting started and doing work with Office 365, you will find the SharePoint and Office 365 training you need at SPTechCon.

    Most of our speakers are Microsoft MVP’s and all are SharePoint and Office 365 experts. A rigorous review of the classes after each conference allows us to make sure we’re providing the best learning experience and the most topical classes in the industry. No wonder SPTechCon is the best independent SharePoint training conference.

    OVERVIEW: No previous knowledge of the class’s subject is required, and the session will be a high-level introduction of the topic.

    INTERMEDIATE: These broad technology sessions emphasize capabilities and how things work. As appropriate, the instructor will show examples.

    ADVANCED: These sessions teach attendees how to implement a solution. As appropriate, the instructor will include detailed samples.

    DEVELOPER ESSENTIALS: SPTechCon features technical sessions geared to software developers looking to write custom applications, or extend out-of-the-box functionality. These include: the new Add-in model, branding, JavaScript libraries including JQuery and Angular, Responsive Web Design for mobile apps, Bootstrap, display templates and much, much more.

    IT PRO: SPTechCon will features technical classes and tutorials that cover topics specific to your field.
    These include: setting up and managing SharePoint farms, upgrading to SharePoint 2016, setting up hybrid cloud/on-premises implementations, backup and recovery, integrations, authentication and authorization, storage and virtualization, and more!

    INFORMATION WORKERS / POWER USERS: These sessions are geared to business users who are looking to SharePoint for document storage and management, search, and reporting, as well as working with lists, libraries and forms. SharePoint also enables collaboration through Team Sites, User Profiles and through tools such as Yammer and OneDrive for Business. Also, power users looking to create their own simple SharePoint applications or manipulate metadata and content would benefit from sessions on the new PowerApps and other low-code solutions for creating workflows, dashboards and more!

    ARCHITECTS: Systems architects need to ensure that SharePoint is configured in a way that maximizes its value, whether for business intelligence, video, top performance, or even scaleability. Will your SharePoint be in the cloud, on-premises, or in a hybrid setup? Information architects need to make sure that SharePoint documents are labeled correctly using metadata when stored for efficient discovery and retrieval, to make sure workflows can be created in the most direct way, and much more.

    BUSINESS DECISION MAKERS: If you’re at SPTechCon, you’ve either already made the decision to use SharePoint, or you’re looking for information to see if it’s a fit for your business. SPTechCon offers sessions about how SharePoint can be strategic within your organization, as well as classes that can help you decide if upgrading is right for your company, if you need to be on-premises or in the cloud, and on how to get your employees to use SharePoint now that you’ve adopted it.


    Staged Exchange migration: Exchange Online Help #microsoft #exchange #migration #tool


    #

    Staged Exchange migration

    You can use the Migration dashboard in the Exchange Administration Center (EAC) or the Exchange Management Shell to migrate subsets of on-premises Exchange mailboxes and mailbox data to Exchange Online. This type of migration is called a staged Exchange migration because you migrate mailboxes in batches. You use a staged migration if you plan to eventually migrate all your organization’s mailboxes to Exchange Online. Using a staged migration, you’d migrate batches of on-premises mailboxes to Exchange Online over the course of a few weeks or months. Your goal would be to permanently move your email organization to Office 365.

    Here are a few restrictions and requirements for using a staged migration:

    You can’t use a staged migration to migrate Exchange 2010 or Exchange 2013 mailboxes to Exchange Online. If you have fewer than 2,000 Exchange 2010 or Exchange 2013 mailboxes in your organization, you can use a cutover Exchange migration. To migrate more than 2,000 Exchange 2010 or Exchange 2013 mailboxes, you have to implement an Exchange hybrid deployment. For more information, see:

    You have to replicate user accounts from your on-premises Active Directory to your Office 365 organization. To do this, you have to install and configure the Microsoft Online Services Directory Synchronization tool before you can run a staged migration. After mailboxes are migrated to Exchange Online, user accounts are still managed in your on-premises organization and the Directory Synchronization tool synchronizes your on-premises Active Directory with your Office 365 organization. For more information, see Active Directory synchronization: Roadmap .

    Your on-premises Exchange organization must be an accepted domain of your Office 365 organization.

    You can migrate user mailboxes and resource mailboxes only. Other recipient types, such as distribution groups, contacts, and mail-enabled users are migrated to Office 365 through the process of directory synchronization.

    Out of Office messages aren’t migrated with user mailboxes. If a user turns on the Out of Office feature before the migration, the feature will remain enabled on the migrated mailbox but the Out of Office message will be blank. People who send messages to the mailbox won’t receive an Out of Office notification. To allow Out of Office notifications to be sent, the user will need to recreate their Out of Office message after their mailbox has been migrated.

    To learn about and compare other options for migrating mailboxes to Office 365, see Ways to migrate multiple email accounts to Office 365. Or, use the Cloud Only option in the Exchange 2013 Deployment Assistant to help select the right migration option.

    For additional options for migrating email to Office 365, see Migrate email to Office 365 .

    Here’s a description of a staged migration. It includes steps performed by an administrator and the migration process performed by Exchange Online. For preparation tasks and step-by-step instructions, see Migrate mailboxes to Exchange Online with a staged migration .

    The administrator creates a CSV file that contains a row for each user whose on-premises mailbox will be migrated in the migration batch.

    The administrator creates and starts a staged migration batch using the Migration dashboard in the EAC or using the Exchange Management Shell.

    After the administrator starts the migration batch, Exchange Online does the following:

    Verifies that directory synchronization is enabled.

    Checks that a mail-enabled user exists in the Office 365 organization for each user listed in the CSV file. Mail-enabled users are created in Office 365 as a result of the directory synchronization process.

    Converts the Office 365 mail-enabled user to an Exchange Online mailbox for each user in the migration batch.

    This part of the process is called initial synchronization. Exchange Online processes up to N migration requests at one time, where N is the maximum number of concurrent migrations that the administrator specified when creating the migration endpoint used for the migration batch. By default, initial synchronization is performed on 20 mailboxes at a time until all mailboxes in the migration batch have been migrated.

    Configures mail forwarding by configuring the TargetAddress property on the on-premises mailbox with the email address of the Exchange Online mailbox. This means that mail sent to the on-premises mailbox is forwarded to the corresponding Exchange Online mailbox.

    In Exchange 2010 and Exchange 2013, the TargetAddress property can’t be modified. This is the reason that staged Exchange migration doesn’t support migrating Exchange 2010 and Exchange 2013 mailboxes to Exchange Online.

    After it creates the Exchange Online mailbox and configures mail forwarding for each user in the CSV file, Exchange Online sends a status email message to the administrator. This message lists the number of mailboxes that were successfully migrated and how many couldn’t be migrated. The message also includes links to migration statistics and error reports that contain more detailed information. At this point, users can start using their Exchange Online mailboxes.

    As part of initial synchronization, Exchange Online then migrates email messages, contacts, and calendar items from the on-premises mailboxes to Exchange Online mailboxes. Exchange Online sends a final migration report when the data migration is complete.

    After a migration batch is complete and the administrator verifies that all mailboxes in the batch are successfully migrated, the administrator can convert the on-premises mailboxes in the migration batch to mail-enabled users.

    If a user opens their mailbox with Microsoft Outlook, the Autodiscover service tries to connect to the on-premises mailbox. After you convert on-premises mailboxes to mail-enabled users, the Autodiscover service uses the mail-enabled user to connect Outlook to the Exchange Online mailbox after the user creates a new Outlook profile.

    The administrator creates and starts additional migration batches, submitting a CSV file for each one.

    After the administrator resolves any migration issues, all on-premises mailboxes in a batch have been successfully migrated, and users are using their Exchange Online mailboxes, the administrator deletes the migration batch.

    The administrator performs post-configuration tasks to complete the transition to Exchange Online and Office 365, such as:

    Assign licenses to Office 365 users.

    Configure the MX record to point to your Office 365 organization so that email is delivered directly to Exchange Online mailboxes.

    Create an Autodiscover DNS record for your Office 365 organization.

    Decommission on-premises Exchange servers (optional).


    Guide To VDI: Evaluating Top Vendors #vdi, #amazon, #aws, #citrix, #microsoft, #vmware,


    Guide To VDI: Evaluating Top Vendors

    Desktop virtual infrastructure now includes new cloud-based options, with the potential for improved user experience and lower cost. Fusion PPT compared the leading vendors and their offerings.

    In spite of its many perceived benefits, virtual desktop infrastructure (VDI) has yet to fully gain traction and still remains a niche market. After well over a decade since its early introduction, VDI has faced challenges when it comes to truly duplicating the local desktop and competing on cost.

    The introduction of cloud-based computing models for VDI (known as desktop as a service or DaaS) now offers a combined benefit and challenge to the IT decision maker. Whereas on-premise data center-hosted VDI represented a known model that has been tested and refined over the years, cloud-based VDI is the new kid on the block and has yet to effectively prove itself.

    In this guide, we take look at four of the leading VDI vendors, including their capabilities and differentiators. These include Amazon (AWS), Citrix, Microsoft, and VMware (an EMC company). Read on for the full discussion, or click on the thumbnail at right to jump to the comparison matrix.

    3 main reasons to use VDI
    So why would anyone consider adopting a VDI-based approach to desktop computing? Well, on paper, the expected benefits seem quite compelling. Will they pan out in the long run?

    1. Centralized and simplified IT desktop management
      To begin, take the scenario of patch management. In VDI, patches and software updates can be distributed in a centralized and simplified manner, because IT no longer needs to manage the individual deployment to each unique computer. The deployment can also occur from a centralized management console. Updates need not be solely to desktop PCs, but also can include mobile devices and thin clients.

    A centralized server-hosted virtual desktop (SHVD) infrastructure also provides the benefit of simplified backup operations. With proper infrastructure and bandwidth in place, such an approach will minimize the network congestion of backups that would otherwise occur from a myriad of desktop systems.

    VDI also enables IT to provide higher security control and compliance. Servers can now be locked down and secured in a more manageable manner, with less risk to local desktop vulnerabilities. For example, administrators can provide central security policies that apply to all users and minimize the malware footprint, should there be an infection. The desktop can be re-commissioned from the base image when problems arise.

  • Reduced cost and hardware
    Harnessing the power of server pools that are unseen to the end user, VDI offers the benefit of more effective use of centralized computing capacity. This can translate in real dollars to a diminished need to purchase new hardware and the additional associated software, licensing, and support costs that are seen in capex and opex dollars. As one scenario, older desktop hardware (with sufficient native capacity) can be retained and used as thin client devices for users who are working on general-purpose tasks that do not require high-end client devices.
  • Increased mobility and remote access
    Another important benefit that VDI provides is the ability to access desktop from remote locations, and with different computing devices. This can be a very accommodating feature for remote and mobile workers who do not really have a fixed work location. With many VDI solutions, the active desktop state can be preserved, enabling users to pick up right where they left off.
  • In this guide, we look at four enterprise vendors providing VDI-based products. There are many other mid-market VDI vendors, as well as open-source solutions from StackVDI, QVD, and others.

    VDI delivery methods
    Vendors have chosen different means to implement VDI. Historically, solutions first began with the typical on-premise server-hosted virtual desktop model, focusing on the data center. As VDI and cloud computing have matured, a second software-as-a-service model of desktop computing has been reborn in the form as DaaS.

    In its simplest form, DaaS is VDI in the cloud. However, as with all cloud-based solutions, the customer must rely upon the cloud service provider (CSP) to deliver critical infrastructure that is no longer under the control of the IT organization. DaaS solutions are marketed as being able to handle the challenges of traditional VDI, such as complexity and cost. In DaaS, customers pay a monthly flat fee and are able to obtain a VDI infrastructure without the initial investment.

    The third option consists of a hybrid approach that leverages both the on-premise and cloud-based models.

    It’s also worth noting that various DaaS providers deliver their “desktop” experience via Windows Server (AWS and VMware, for example). This is primarily done as a way around Microsoft’s multi-tenancy licensing, Microsoft’s Service Provider Licensing Agreement (SPLA), which requires the hosting hardware to be dedicated to each individual customer. SPLA also requires customers to own the client OS license.

    Pages

    Re: Guide To VDI: Evaluating Top Vendors

    Zerox, you’re right, this article is not for the faint of heart. It is long and a lot of information to wade through. But for anyone seriously considering VDI, it’s a jackpot of practical considerations and objective insight. We’re thankful that Dean and his firm published it here.

    User Rank: Apprentice

    Fri, 02/20/2015 – 09:35

    Re: Guide To VDI: Evaluating Top Vendors


    Microsoft Enterprise Desktop Virtualization Download #microsoft #enterprise #desktop #virtualization, #download #microsoft #enterprise


    #

    Microsoft Enterprise Desktop Virtualization (MED-V) enhances deployment and management of Virtual PC images on a Windows Desktop, while also providing a seamless user experience of a Virtual PC environment, independent of the local desktop configuration and operating system (OS).

    MED-V leverages Microsoft Virtual PC to provide an enterprise solution for desktop virtualization. With MED-V, you can easily create, deliver and manage corporate Virtual PC images on any Windows desktop.

    Microsoft Enterprise Desktop Virtualization is an integral component of the Microsoft Desktop Optimization Pack (aka MDOP), a dynamic solution available to Software Assurance customers, which will help reduce application deployment costs, enables delivery of applications as services, and helps to better manage and control enterprise desktop environments.

    Enable legacy applications and accelerate upgrades to new operating systems

    Incompatibility of legacy applications with the new version of Microsoft Windows can often delay enterprise upgrades to the latest version of Windows. Testing and migrating applications can take a while, and users are unable to take advantage of the new capabilities and enhancements offered by the new OS.

    By delivering applications in a Virtual PC that runs a previous version of the OS (e.g. Windows XP or Windows 2000), MED-V removes the barriers to OS upgrades, and allows administrators to complete testing and to deal with incompatible applications after the upgrade.

    From the user’s perspective, these applications are accessible from the standard desktop Start menu and appear side-by-side with native applications so there is minimal change to the user experience.

    Known Issues:

    File downloads do not follow web redirection rules.

    If the LAN adapter is disabled when a Workspace configured in bridge mode is started, and the adapter is later enabled, the network will not resume. Restarting the Workspace solves this issue.

    Workspace image download may be delayed if Windows update is running when it is started.

    When the user is required to change his domain password in order to login to Windows inside the Workspace, the client receives a notification about using the wrong username/password, rather than a notification that he should change his domain password.

    When expanding a DOS application (e.g. cmd.exe) window to full screen, the application window disappears.

    When the domain password is changed while the Workspace is running, and the Workspace is restarted, a wrong password notification appears on the client and the user is required to re-enter the new password.

    When installing MED-V using the command line, it is configured by default to launch after installation. This causes problems when installing MED-V in the system context. In this case it is required to use the START_MEDV=0 parameter.

    When working in full desktop mode, manual location changes of icons on the desktop are not saved between Workspace sessions.

    Multiple versions of the same Workspace created on the same machine are always assigned the same unique name. This may cause problems when multiple virtual machines with the same name attempt to join the domain.

    When transferring very large files using the file transfer tool, the transfer may fail.


    BackupAssist – System State backup and restore #backupassist, #backup #assist, #backup, #back


    #

    System State backup and restore

    What’s included in a System State backup?

    The exact system components that make up your machine’s System State depend on the operating system installed and how it is has been configured. A System State backup generally includes a copy of any installed device drivers and related files, most of the Windows directory, the Windows Registry, the Active Directory configuration (where applicable) and system files under Windows File Protection.

    System State backups for Vista and Server 2008 are usually between 7GB and 15 GB and for XP and Server 2003, they are generally much smaller, being between 200MB and 300 MB. Many files in the Windows directory have multiple hard links. If you are backing up the System State using the File Replication Engine or the Rsync Engine and have Single Instance Store enabled, only a single copy of each multiply linked file will be stored on your backup destination. This data does not need to be copied on subsequent backups, which reduces backup times and saves storage space on your destination.

    Why is a System State backup useful?

    From a System State backup you can restore your Windows system settings in the event of a system failure or corruption. A System State backup is therefore particularly important for disaster recovery purpose as it eliminates you having to reconfigure Windows back to its original state before the system failure occurred.

    We recommended that you always have a recent backup of your System State and that you should perform System State backups on a regular basis, even daily, to increase your level of protection. We also recommended that you perform System State backups before and after any major change is made to your server.

    How to back up the System State

    With BackupAssist v6 you can schedule local* ‘System State only’ backups across all modern Windows operating systems, or even back up the System State as part of a larger backup including files and applications, using File Replication, Zip, or Windows Imaging. A System State backup includes important Windows systems settings, such as the Registry, and is crucial for system recovery.

    *BackupAssist cannot be used to back up the System State of a remote machine; you must install BackupAssist on each server of which you require a System State backup.

    Complete the following steps to configure a BackupAssist job to back up the local machine’s System State:

    1. Launch BackupAssist and either edit an existing File Replication, Zip or Imaging job by selecting Edit from the top menu and choosing the appropriate job, or create a new File Replication, Zip or Imaging job by going to File New backup job .
    2. If you are creating a new job check the Backup local system state option during the Files and Folders step of the Job Creation Wizard.
    3. If you are editing an existing job select Files and folders from the left menu, click the Local system selections tab, and then enable the Backup local system state option .

    How to restore the System State

    Complete the following steps to restore the System Stattefrom a BackupAssist backup using the BackupAssist Restore Console:

    • Note. you cannot restore the System State from an Image backup using the BackupAssist Restore Console. You must use the built-in Windows tool, wbadmin. Visit wbadmin.info for instructions.
    1. In BackupAssist, Click Restore in the top navigation bar and choose the BackupAssist Restore Console .
    2. Click Load all known backups to load all backup catalogues located in the BackupAssist settings folder, or use the Browse option to locate the backup set from which you want to restore.
    3. Choose the job that corresponds to the backup from which you want to restore the System State
    4. Use the calendar to select the date of the backup from which you wish to restore.
      • Note. dates for which backups are available are marked in bold on the calendar.
    5. Use the middle pane to expand the loaded backup set and select the System State to restore.
      • Note. files located on the Windows system drive (C: drive in the example above) may be available for restore, even though only the System State was selected for backup. These files are associated with the System State. If you choose to restore individual files from this list and not the System State, the System State will not be restored, and the files themselves may not restore correctly. If you choose to restore these files together with the System State, the System State option will override selections where there is an overlap. If you want to perform a full restore and are unsure which files are included in the System State we recommend selecting both the System State and all other files listed.
    6. Once you have made your selections click the Restore to button on the bottom right of the window.
    7. The restore confirmation screen will then load:
      You can choose to restore the System State either to its original location or to an alternate location of your choosing. If you select an alternate location click [. ] to set an alternate restore path.
    8. Once you have selected where to restore the System State to, click OK to perform the restore.
      • Note. if you are restoring the System State to a machine that hosts Directory Services, you will be prompted to reboot into the Directory Services Restore Mode.
      • Note. During a System State restore the necessary files are copied to a temporary directory and then moved to their correct location after a reboot of the machine. Before the restore starts, the Restore Console will take a VSS snapshot of the volumes to be restored. This allows the user to manually roll back to a pre-restore state, if necessary, using Windows’ previous versions feature.


    IIS Monitoring #iis #server #monitoring,iis #server,iis #monitoring #tools,iis #management,server #monitoring #software,iis #performance


    #

    IIS Server Monitoring from the Cloud (SaaS)

    List of Basic monitors:

    Server (Charged based on servers and not individual metrics)

    • Windows/Linux/FreeBSD/OS X Monitoring (agent based)
    • Microsoft IIS, SQL, Exchange Monitoring.
    • Each VMware VM instance (VMWare monitoring using the On-Premise Poller)
    • VMware ESX/ESXi hosts

    Amazon Web Services

    • Elastic Compute Cloud (EC2) per instance
    • Relational Database Service (RDS) per instance
    • DynamoDB per table
    • Simple Notification Service Topic (SNS)
    • Elastic Load Balancer (ELB) – both Classic and Application type.
    • Website (HTTP/HTTPS)
    • DNS, Ping, FTP Service, SMTP Service
    • SSL Certificate, Domain Expiry Monitoring
    • SOAP, REST API
    • Port, POP Service

    List of Advanced monitors:

    • Advanced Windows Apps – Microsoft SharePoint, BizTalk, Active Directory, Failover Cluster, Hyper-V
    • Synthetic web transaction monitor (monitor multi-step web transactions in your service)
    • Web Page Analyzer
    • Web Page Defacement
    • Mail Server Round Trip Time monitoring
    • FTP upload/download Round Trip Monitoring.

    Network monitoring licensing is purely based on the number of interfaces that are monitored. It is mandatory to have at least one active interface in order to monitor a device. While ten performance counters per device can be monitored for free, every additional ten is counted as one interface.

    Premium support includes email, community, chat and phone.

    Every webpage that is loaded in the browser is considered as a page view, irrespective of the number of resources that are loaded behind. For example, for a single page to load, there are various resource calls for images, css, etc, which are not counted in page views. Only the webpage that the user visits is counted as page views.

    Credits are auto-refilled every month, however left over refilled credits are not carried forward to the next month.


    Cool Things to Do with Netsh #netsh, #microsoft #windows #server #2003, #windows


    #

    Cool Things to Do with Netsh

    The Netsh command is a powerful command-line tool for Windows Server 2003, Windows XP, and Windows 2000. Netsh is available in the Microsoft Windows 2000 Server Resource Kit and is standard in Windows 2003 and XP. Netsh lets you change almost any network configuration setting as well as document network configurations. You can use the command in a batch file or from its own command shell. Netsh has a useful Help system that you can access by adding /? to almost any of its subcommands. Here are 10 cool things that you can use Netsh to do.

    10. Show TCP/IP settings The command

    shows the system s current TCP/IP configuration settings. You can see whether the system is using DHCP or static addressing as well as view the system s current IP address, subnet mask, gateway address, and DNS servers.

    9. Change network configuration Netsh can change the current network configuration. The command

    sets the IP address of the system configuration Local Area Connection to 192.168.0.10, the subnet mask to 255.255.255.0, and the gateway address to 192.168.0.254. This use of Netsh comes in handy for laptops that must switch between static and dynamic addressed networks.

    8. Use a dynamic DHCP assigned address The command

    sets the IP address of the Local Area Connection system configuration to use DHCP addressing.

    7. Change a DNS server address When you change the system s IP address type, you almost always have to change the DNS server s address as well. The command

    configures the Local Area Connection to use a DNS server whose address is 192.168.0.2.

    6. Dynamically assign the DNS server address When you switch to dynamic DHCP addressing, you typically also want the DNS server address to be assigned dynamically. The command

    sets the Local Area Connection interface to use a DHCP-assigned DNS address.

    5. Configure a WINS server Netsh also lets you configure WINS servers. The following command configures a system s Local Area Connection interface to use a WINS server that has the IP address 192.168.100.3.

    4. Work with other interfaces Netsh works with DHCP, Internet Authentication Service (IAS), and RAS interfaces as well as the local network interface. The command

    dumps the local DHCP server s configuration to the dhcpcfg.dat file. You can use this file in conjunction with Netsh to recreate the DHCP server.

    3. Work with remote systems One of Netsh s best hidden features is its ability to work with remote systems. The command

    sets the current computer to a different system on the network.

    2. Save the current configuration The Interface Dump subcommand saves your current network configuration and generates a script that you can use to regenerate the configuration. The command

    redirects the Dump command to the mycfg.dat file.

    1. Restore network configuration The Netsh Exec command runs a Netsh script file. The command

    restores to your system the network configuration data that the preceding sample command saved.

    Anonymous User (not verified)

    I too ran into this problem. Do this: 1. Create a batch file called netsh.bat ( for example ) with the netsh commands you would like to run ( just as they would run locally on your PC ) 2. Copy netsh.bat to C:\ (for example) on all of the nodes that need the change ( you can copy netsh.bat across your LAN via another batch file ). 3. With another batch file, schedule an AT job on each node that needs the change: this at job should run c:\netsh.bat ( that has already been copied to each node that needs the change ). This works becuase the job is running locally on each PC, rather than being pushed from another. Thanks, and good luck. -LP

    ROBERT (not verified)

    To add multiple DNS entries you need to type: netsh interface ip set dns name=”Wireless Network Connection” source=static addr=192.168.1.200 register=PRIMARY netsh interface ip add dns name=”Wireless Network Connection” addr=192.168.1.5 index=2 They need to be entered on a separate line.

    Cameron Fairbairn (not verified)

    In order to add multiple DNS servers, use the following syntax: add dns “Local Area Connection” 10.0.0.1 add dns “Local Area Connection” 10.0.0.3 index=2 index=2 adds the IP as a secondary dns server.

    Anonymous User (not verified)

    Wow, that came out ugly, let me try again: C:\WINNT\system32>netsh netsh>interface interface>show interface Admin State State Type Interface Name ————————————————————————- Enabled Dedicated Local Area Connection Enabled Internal Internal Enabled Loopback Loopback (Note: Look for “Dedicated” connection types with any name other than a GUID) interface>ip interface ip>delete dns “Local Area Connection” all interface ip>set dns “Local Area Connection” static 10.10.10.2 interface ip>add dns “Local Area Connection” 10.10.10.3 index=2

    Would anyone know why I am getting the following error with #3, which is the remote command. When I run “netsh set machine virtual2000” I get the following response “WARNING: Could not obtain host information from machine: [10.1.2.106]. Some commands may not be available. Access is denied” The result is identical when I try “netsh -r virtual2000” I have tried physical servers as well, but I get the same result. I tried to google the error, but I don’t see anything. The netsh interface works fine until you get to the “set IP address” portion”. At that point, the available commands are blank.

    wYc88 (not verified)

    tschreier (not verified)

    Is it possible to use netsh to disable and then enable an interface? Been trying to figure out a way do do that from a cmd line. thx

    Anonymous User (not verified)

    Joseph Davies (not verified)

    The sentence “The Netsh command is a powerful command-line tool for Windows Server 2003, Windows XP, and Windows 2000. Netsh is available in the Microsoft Windows 2000 Server Resource Kit and is standard in Windows 2003 and XP.” should be changed to “The Netsh command is a powerful command-line tool that is installed by default for Windows Server 2003, Windows XP, and Windows 2000.” Netsh is included with Windows 2000, not as part of the Windows 2000 Server Resource Kit. Thanks.

    Anonymous User (not verified)

    Find your interface name & set multiple dns entries like this: C:\WINNT\system32>netsh netsh>interface interface>show interface Admin State State Type Interface Name ————————————————————————- Enabled Dedicated Local Area Connection Enabled Internal Internal Enabled Loopback Loopback (Note: Look for “Dedicated” connection types with any name other than a GUID) interface>ip interface ip>delete dns “Local Area Connection” all interface ip>set dns “Local Area Connection” static 10.10.10.2 interface ip>add dns “Local Area Connection” 10.10.10.3 index=2

    Anonymous User (not verified)

    Is it possible in WIN 2000 to “disable” “Local Area Connection” using NetSh? What are the commands?

    Anonymous User (not verified)

    usage of devcon to disable network adapter use the ‘hwids =net’ to find the compatible id for your adapter c:\devcon hwids =net PCI\VEN_8086 ?>

    IiNet Small Business Phone System #business, #broadband #plans, #high #speed, #broadband #network,


    #

    BizPhone

    • Standard local calls included
    • Standard national calls included
    • Standard mobile calls included
    • International calls from 4c per minute
    • 13/1300 numbers 25.3c once-off connection fee.
    • Group Feature external number diversions from 5c per call.

    Call 13 86 89 to order

    Visit the BizPhone Resources page for Frequently Asked Questions and User Guides.

    The Bizphone service must be used in conjunction with the iiNet provided handset. The Bizphone handset requires direct Ethernet cabling to each phone. The service also requires a fixed broadband connection. BizPhone service is not available for telemarketing, call centre function and similar uses. Don’t worry if you’re unsure, one of our dedicated business specialists can help you out on 13 86 89 or have a look at our Frequently Asked Questions.

    Total minimum cost is $728.75 on a 24 month contract. Includes $9.95 handset delivery fee. Does not include the cost of any optional features. Requires fixed broadband Internet access connection and wired Ethernet port. ^Subject to participating carrier.

    *One Hunt Group included free per customer. Must have a minimum purchase of 3 user plans. Additional Hunt Groups can be purchased at additional cost of $7.95 per month per additional group.

    **One instance of Auto Attendant included free per customer. Additional instances are available at an additional cost of $7.95 per month per instance.


    Email Archiving, Outlook Backup, Email Archiving Solution For Outlook 2003 #email #archive


    #

    Comprehensive Email Archiving Solution for Archiving Outlook Emails

    Email Archiving have become very vital due to implmentation of FRCP since Dec 1, 2006. PCVITA Email Archive Magic provides industry most comprehensive solution for Microsoft Outlook Email Archiving. The Outlook Archiving solution provides archiving Outlook emails with ease of use and without any hassle to the users. Apart from using this as an email archiving or Outlook Archiving solution, users can also use this as a outlook backup solution to backup outlook emails. The advantage of using this compare to other outlook backup solution is that it will allow you to search within the outlook backup without the need to restore it explicitly.

    PCVITA Email Archive Magic is highly intuitive email archiving solution for archiving single or multiple Outlook PST files. It periodically archive emails and remove them(*) from the Outlook PST file. This reduces the size of the Outlook PST file. PCVITA Email Archive Magic can also be used to compress the size of Outlook PST file apart from using it as an email archiving solution.

    FREE Demo Version Try and Check the Product:

    Easy Intuitive user interface for email archiving or Outlook Archiving solution.

    Integrated within Outlook for accessing archive emails.

    Email archiving of multiple Microsoft Outlook PST files.

    Powerful search to search within archived emails.

    Search within email attachments stored in the email archive.

    Reduce the size of Outlook PST file and store in email archive.

    PCVITA Email Archiving Powerful Search :

    • Search on Body of the Email Message within the email archiving data.
    • Unique feature of search within attachments for the email archiving data.
    • Search results based on folder, received time and other attributes of email archiving data.

    The Demo Version of PCVITA Email Archive Magic will work for one month from the time of its installation. After the expiry date, you can only search through the previously archived data but archive feature will not initiate. For using the software for a longer period of time, you would need the Full Version.

    • As you install the product, you will get a screen where you will be asked for a storage path i.e. where you want the archived mails to be stored. You can select the frequency also for archiving and this is applicable only for default PST. When you install the product, the default PST will be archived with the selected frequency.
    • The software add-in will be added to your Outlook application. There will a button named as Email Archive Magic.

    Get Full Version for Long Run Usage

    The Full Version of PCVITA Email Archive Magic software works for a much longer period of time as compared to the Demo Version that works for only one month.


    Compare Symantec Endpoint Protection vs Microsoft Forefront #microsoft #endpoint #protection #review


    #

    Symantec Endpoint Protection vs Microsoft Forefront

    Our agile methodology and our integration expertise brings you the best catalyst to craft solutions of exceptional quality and distinctive success.

    Symantec Endpoint Protection is a powerful endpoint antivirus software solution, which provides multiple layers of protection against all types of known and unknown threats. Powered by SONAR and Symantec Insight, Symantec Endpoint Protection combines all the security tools that you could require into one proactive solution.

    It integrates antivirus, firewall, antispyware, intrusion prevention, application control and device control, and allows you to manage all of these tools centrally from one agent. Upgrades happen automatically, and the software offers seamless migration from previous versions.

    This solution maximizes the security and performance of physical and virtual systems, and is compatible with multiple operating systems, such as Windows, Mac and Linux. Symantec Endpoint Protection is recommended for environments with more than 250 users.

    EUROVIA CS, a. s. King Abdullah Bin Abdulaziz Public Education Devel, Bank Alfalah Ltd. CLEAResult, St. Lucie County Public Schools, Wiltshire Council

    Audio Visual Dynamics, Red Deer Advocate, Asia Pacific Telecom Co. Ltd. Kibbutz Ein Gedi, and AMETEK, Inc.

    Find out what your peers are saying about Symantec, Intel Security, IBM and others in Endpoint Protection.


    SQL Server Monitor #sql #server #monitor, #appmanager, #microsoft


    #

    Microsoft SQL Server

    By monitoring SQL from the AppManager console, you can ensure your SQL database infrastructure is performing and available for end users. This module’s extensive alerting capabilities inform you immediately when incidents arise so you can take action. By responding proactively, you reduce downtime and ensure compliance with Service Level Agreements to better meet the needs of customers and end users.

    AppManager for Microsoft SQL Server

    Features benefits

    Analyzes SQL Server resource usage down to the SQL statement level and stores performance data directly in a SQL database.

    Provides proactive event management with robust fault management, detecting potential problems that could impact the availability of your SQL Servers.

    Allows for easy automation, letting you set up automatic event-driven notifications and corrective actions.

    Lowers support costs by enabling you to view the health and status of distributed SQL Servers from a central location.

    What’s monitored

    AppManager for Microsoft SQL Server includes out-of-the-box Knowledge Scripts that track simple or complex events and collect data for real-time or historical performance analysis. Examples of Knowledge Scripts include:

    Accessibility. Immediately alerts if the SQL Server or any specified database within the server is not accessible.

    BlockedProcesses. Detects when processes are blocked.

    EventLog. Detects when the SQL Server has written critical error messages to the Windows event log. Support is also available for monitoring SQL Server’s own log file.

    TopCPUUsers. Analyzes the CPU being consumed by SQL Server users and correlates CPU usage and SQL statements being executed by users.

    TopLockUsers. Identifies locking activity by user and identifies the SQL statements causing locks.

    TopMemoryUsers. Tracks memory usage by SQL Server users and correlates memory utilization to SQL statement activity.

    DBGrowthRate. Tracks the rate at which databases are growing.

    DBSpace. Tracks trends and raises alerts on the available space your SQL Server databases.

    LogSpace. Detects whether you are running low on SQL Server log space and provides an option to automatically truncate the transaction log file.

    RunSQL. Lets you invoke any SQL statement or stored procedure as a Knowledge Script or corrective action.

    NearMaxContent. Tells you whether available connections are running low.

    NearMaxLocks. Identifies whether SQL Server is almost out of locks.

    ServerThroughput. Measures key I/O statistics, such as transactions per second.

    ProcessingTime. Tracks the amount of time required to process a user-defined SQL statement.

    UserConnections. Tracks who connects into the SQL Server and how many connections each person is using.

    CacheHitRatio. Keeps watch of the SQL Server buffer cache, alerting you if you need to increase the memory allocated to SQL Server.

    Let’s Talk

    Welcome , Want to talk to someone? Call our Sales team or request a call and we’ll get right back to you.

    For support information, please visit Technical Support .

    • Request a Call