—Introduction
1m 41s
—Why is Some Information Incorrect?
2m 22s
—Why Does Incorrect Information Cause Problems
1m 54s
—Summary
1m 31s
—Course Structure
2m 23s
Performance Myths and Misconceptions
- 51m 34s
—Introduction
1m 1s
—Controlling Instant File Initialization
2m 27s
—Demo: Enabling Instant File Initialization
2m 47s
—Temporary Table Abuse
2m 5s
—Demo: Using Temporary Tables
2m 54s
—Tempdb Sizing
1m 50s
—Data Compression
2m 29s
—Data File Shrinking
2m 40s
—Demo: Effect of Data File Shrinking
2m 22s
—Updating Index Key Columns
2m 7s
—Demo: Updating Index Key Columns
2m 37s
—Snapshot Isolation
2m 41s
—Checkpoints
1m 25s
—NULL Bitmap
2m 40s
—Tempdb Data Files
3m 1s
—Solid State Disk Uses
2m 16s
—Disk Queue Length
1m 24s
—Page Life Expectancy Threshold
2m 24s
—NUMA Effect on Page Life Expectancy
1m 26s
—CXPACKET Waits
2m 36s
—ASYNC_NETWORK_IO Waits
2m 1s
—Demo: Wait Statistics
3m 0s
—Overriding MAXDOP
1m 21s
Transaction Log Myths and Misconceptions
- 41m 34s
—Introduction
0m 58s
—Log Truncation/Clearing
1m 42s
—Transaction Log Analysis
1m 50s
—Demo: Analyzing the Transaction Log
5m 42s
—TRUNCATE TABLE Logging
2m 40s
—Efficient Logging of Index Operations
1m 52s
—Demo: Showing Efficient Logging
2m 43s
—Multiple Log Files
1m 41s
—Instant File Initialization
1m 47s
—Transaction Log Sizing
3m 25s
—Log Record Removal
1m 26s
—Log Record Movement
1m 23s
—Using BULK_LOGGED to Reduce Log Backup Size
2m 21s
—Demo: Log Backup Size Using BULK_LOGGED
2m 25s
—Log Backup Size vs. Log Size
1m 51s
—Disaster Recovery and BULK_LOGGED
1m 37s
—Demo: Disaster Recovery and BULK_LOGGED
6m 11s
Indexing Myths and Misconceptions
- 18m 23s
—Introduction
0m 56s
—FILLFACTOR Usage
1m 57s
—Clustered Index Rebuilds
1m 49s
—Nonclustered Index Choice
2m 11s
—SSDs and Fragmentation
2m 8s
—Removing Heap Fragmentation
1m 37s
—GUIDs as a Cluster Key Choice
2m 7s
—Demo: GUID Cluster Keys
4m 21s
—Rebuilding Indexes and Statistics
1m 17s
Locking Myths and Misconceptions
- 21m 31s
—Introduction
0m 42s
—Online Index Operations and Blocking
2m 4s
—Demo: Locks held by Online Index Rebuild
4m 14s
—Backups and Blocking
2m 0s
—DBCC CHECKDB and Blocking
1m 53s
—Lock Escalation
1m 55s
—Demo: Lock Escalation
5m 32s
—Invalid Blocking and Deadlocks
1m 42s
—NOLOCK and READ UNCOMMITTED
1m 29s
Transact-SQL Myths and Misconceptions
- 19m 8s
—Introduction
0m 44s
—Nested Transactions
2m 12s
—Demo: Nested Transactions
2m 47s
—DDL Triggers
1m 28s
—SELECT COUNT(*)
2m 19s
—Demo: SELECT COUNT (*)
2m 50s
—Physical Record Location
2m 5s
—DEMO: Physical Record Location
2m 54s
—Running DMVs in 80 Compatibility Mode
1m 49s
Backup Myths and Misconceptions
- 18m 44s
—Introduction
0m 45s
—Concurrent Data and Log Backups
1m 21s
—Data Backups and Log Clearing
1m 7s
—Demo: When Does the Log Clear
4m 40s
—Backup Completion Guarantees
2m 14s
—Differential Backups
1m 7s
—Planning a Backup Strategy
1m 39s
—Restarting the Log Backup Chain
1m 11s
—Demo: Log Backup Chain
2m 20s
—Replacing Backups with Database Snapshots
2m 20s
Restore Myths and Misconceptions
- 14m 55s
—Introduction
0m 55s
—Mix-and-Match Filegroups
1m 53s
—Demo: Filegroup Restores
2m 53s
—Using WITH STOPAT for Data Backups
1m 19s
—Restoring to Older Versions of SQL Server
2m 5s
—Demo: Down-level Restore
2m 13s
—Restoring to Non-Enterprise Editions
2m 16s
—32-Bit vs. 64-Bit Compatibility
1m 21s
Corruption Myths and Misconceptions
- 21m 19s
—Introduction
0m 58s
—Detaching and Attaching a SUSPECT Database
1m 55s
—Offloading Consistency Checks
1m 54s
—Causing Corruption Using T-SQL
1m 7s
—Enabling Page Checksums
1m 44s
—DBCC CHECKDB vs. BACKUP ... WITH CHECKSUM
1m 13s
—Restarting SQL Server to Fix Corruption
1m 17s
—Disappearing Corruptions
2m 13s
—Corruption-Free Guarantee
1m 0s
—Repair Can Fix Everything
2m 4s
—Repairing System Databases/Tables
1m 59s
—Transaction Rollbacks
1m 44s
—Demo: Transaction Rollbacks
2m 11s
High-Availability Myths and Misconceptions
- 17m 48s
—Introduction
0m 52s
—Database Snapshot Size
2m 21s
—Database Snapshot Efficiency
1m 58s
—Demo: Database Snapshot Memory Usage
4m 36s
—Database Mirroring Failure Detection
2m 14s
—Database Mirroring Failover Speed
1m 23s
—Failover Clustering is the Best High-Availability Technology
1m 11s
—Multiple Database Mirors
0m 40s
—Transactions After a Failover
1m 3s
—Replication is a Valid High-Availability Choice
1m 30s