Using Power Shell to script out Replication

Using Power Shell to script out Replication Chris Skorlinski Microsoft SQL Server Escalation Services While troubleshooting customer’s Replication scenarios we often ask for the “script” used to recreate their replication environment.  The BLOG posting below by Chad Miller provides a great example of using Power Shell and Replication Management Objects (RMO) to script out Replication….


So, what’s new in the CLR 4.5 GC?

Last time I posted a “So, what’s new” entry was when we release 4.0 ~3 years ago (can’t believe it’s already been that long..). Now I get to talk about what’s new in the 4.5 GC. Actually I just talked about this with Channel 9 and here’s the link to the video: https://channel9.msdn.com/posts/Maoni-Stephens-CLR-45-Server-Background-GC  Enjoy!


Business Scenarios for the Cloud

Note: This article is updated at Benefits of the Cloud for Business Leaders. While putting together lessons learned from our Enterprise Strategy cloud engagements, we consolidated a set of recurring business scenarios and themes.  You may find these useful if you are thinking about cloud opportunities from a business perspective, and are looking for some…


How to install unsigned drivers

This blog post has moved to https://matthewvaneerde.wordpress.com/2011/09/14/how-to-install-unsigned-drivers/


Integrated Windows Authentication with NTLM

This article has been moved to its new home here: https://benperk.github.io/msdn/2011/2011-08-integrated-windows-authentication-with-ntlm.html IIS provides a number of different authentication techniques.  One of which is Integrated Windows Authentication.  Integrated Windows Authentication utilizes Negotiate/Kerberos or NTLM to authenticate users based on an encrypted ticket/message passed between a browser and a server. The preceding image shows a standard communication…


Integrated Windows Authentication with Negotiate

This article has been moved to its new home here: https://benperk.github.io/msdn/2011/2011-08-integrated-windows-authentication-with-negotiate.html IIS provides a number of different authentication techniques.  One of which is Integrated Windows Authentication.  Integrated Windows Authentication utilizes Negotiate/Kerberos or NTLM to authenticate users based on an encrypted ticket/message passed between a browser and a server. The preceding image shows a standard communication…


NHibernate and Entity Framework

This article has been moved to its new home here: https://benperk.github.io/msdn/2011/2011-08-nhibernate-and-entity-framework.html Prior to getting my job here at Microsoft, I was, and in many aspects still am passionate about NHibernate.  I discovered a particular liking to ORM’s in general.  I liked it so much that I wrote a book called “Working with NHibernate 3.0” which is available on…


Why Some Companies Execute Better

Note: This article is updated at Why Some Companies Execute Better. Execution is king.  That’s what one of my most seasoned mentors taught me, early on at Microsoft. I’m always on the hunt for principles, patterns, and practices that improve execution, whether at the individual, team, or organization level.  Since I’ve joined the Microsoft Enterprise…


Decreased disk space requirement for SAP Unicode systems

This blog has been re-published at https://techcommunity.microsoft.com/t5/Running-SAP-Applications-on-the/Decreased-disk-space-requirement-for-SAP-Unicode-systems/ba-p/367139 This blog post might be outdated by now. The latest documentation regarding SQL Server Columnstore on SAP is available in https://www.sap.com/documents/2019/04/023e5928-487d-0010-87a3-c30de2ffd8ff.html SAP encourages their customers to convert existing non-Unicode systems to Unicode. However, several SQL Server customers hesitated to perform a Unicode Conversion, because of the increased storage…