Data Recovery Archive

In this article we learn about compressed backups in SQL Server and compare them with Trace Flag

In SQL Server 2008 and all its later editions, users are given access to what is called the compressed backup. Meaning once you backup your database you can also compress it to reduce the amount of space it occupies. But this is something a lot of SQL users or DBAs would already know, in this article we would be discussing how exactly are compressed backups created with a predefined initial size.

One of the most logical answers given to this query is that the compression feature in SQL Server calculates the storage space that is available for the backup on the disk. And on the basis of this calculation, it gives the backup an initial size.  This brings us to the conclusion that compression is actually occurring at Memory, and not on the disk. To get into the details of this logic, continue reading.Compressed Backups In SQL Server And Its Storage Needs

Initial Backup

To start with, we will take our initial backup as the reference. You can also make use of a test backup. Let’s say it is currently of 2.5 GB. Now if you are making use of a SQL Server edition after 2008, your backups would get compressed automatically, as the backup process begins. At this stage you would be able to see an initial size that has been set for the backup. This is usually one-third of the size of the database.

Once the process of backup is complete, you will be able to see exactly how much space is being taken up by the compressed backup. More than often it is lesser than the earlier estimated space. This indicates that SQL has not only used lesser than estimated amount of space, but also freed the extra disk space for the operating system to utilize.

Using Trace Flag

Trace Flag 3042To compare the results derived above, we will now make use of trace flag 3042. This will enable us to incrementally build the SQL Server backup instead of allowing it to pre-determine the size of the file. Through these two separate backup files, we will be able to make a comparison.

When you begin making use of Trace Flag, you will be able to notice a clear increase in the amount of disk space as the backup process continues. This is precisely what the trace flag does, it ensures that the files grow only when they are required to grow. Once this process comes to an end, you will also come to the conclusion that the size of both the backups is actually the same. This explains that SQL Server anyway never allocates a backup size that is equal to the size of the database.

Backup compression for SQL Server databases is one of the crucial features that users make use of. The databases stored in the system are anyway heavy files containing large amounts of data, so the key thing to do is to ensure that data is regularly backed up. For backing up data you can either make use of existing options, or use third party tools that specialize in sql recovery.

Author Introduction:

Victor Simon is a data recovery expert in DataNumen, Inc., which is the world leader in data recovery technologies, including accdb repair and sql recovery software products. For more information visit https://www.datanumen.com/

Be the first to comment

This article talks about the 4 Benefits which make MS Access an Irreplaceable development tool for Enterprises as a thick client.

Microsoft Office Access is among the most used client-server application tool that is commonly used for development in most enterprises today.  It’s easy to understand usability, dynamic departmental applications accessibility, and the ability to grow a business without demanding any dependency from skilled IT programmers make it inevitable. It is used by all types of businesses, big, small or startups as a reporting tool. These are some of the few features which make MS Access a permanent development tool in all enterprises.4 Benefits Which Still Makes MS Access Irreplaceable For Enterprises As A Thick Client

These are some of the latest incarnations made in MS Access:

  • Use wizards to build relational databases for small applications at a faster speed.
  • Adapt a Microsoft Office feel and interface look for all your reports and forms.
  • Automation features for avoiding manual coding
  • Can act as an advanced Information Integration Engine that helps in connecting disparate data sources.

MS Access is popular as a desktop based client application, but the popularity of cloud platforms and their efficiency have forced enterprises to switch to those means. So, here let’s test MS Access compatibility with cloud software.

Microsoft Access in Office 365

Microsoft Access In Office 365MS Access allows the user to transfer their data from an older version of the software in the new version before publishing it on Office 365 Access services so that it can be accessed by everyone wherever they are. It will also help in better organization of your data as it grows.

Now Access 2010 and its Services, including SharePoint, can be used for building web database applications. Access 2010 and MS Access Services offer a platform where the user can create databases on the web. The user just needs to use Access 2010 with SharePoint for designing and publishing a web database and share it with its SharePoint users.

SSMA to Azure

Microsoft SQL Server Migration Assistant (aka SSMA) can be defined as a toolkit which can help in cutting the cost, effort, and risk of transferring or migrating data from Access to SQL Azure.

Note: Access’s SSMA 2008 supports data migration to SQL Azure.

SSMA can be used for:

  • Creating a Migration Project on SSMA by setting SQL Azure as its destination
  • Allowing users to select the target schema of the migration
  • Migrating tables and data along with the Load, convert and Migrate command
  • Providing ability for verifying the migration
  • It also offers an amazing solution for migrating Microsoft Access databases directly to the Cloud.

Microsoft Access can be used as a Client Cloud Consumer

If the user data is stored in SQL Azure, then this will prompt MS Access for continuing to act as a thick client and stay connected to the Cloud database with the help of linked table options.

Using MS Access 2010 and above, users can create a data connection with a Web Service. For example, a user can create a Web data Service connection for their enterprise, or Business Data Catalog and instantly get business data. After a user creates a Web data Service connection, he/she needs to connect with its source similarly as they would with any other external data source.

Now if you are planning to use Access as a departmental database, just keep a tool that can recover mdb or accdb database around. While Access is good at many things, it still tends to get corrupted at times and a recovery tool like DataNumen Access Repair can go a long way in protecting your critical data.

Author Introduction:

Vivian Stevens is a data recovery expert in DataNumen, Inc., which is the world leader in data recovery technologies, including mdf repair and excel recovery software products. For more information visit www.datanumen.com

Be the first to comment

To secure data on a hard drive, you can encrypt the drive. Full disk encryption (FDE) is one of the most common encryption methods. In this article, we will expose its 6 pros and cons.

Full disk encryption (FDE) is a drive encryption way at hardware level. Most users are familiar with encryption software but unfamiliar with FDE. FDE is widely-used on laptops in that they’re at risk of theft. If your laptop drive doesn’t use FDE, thief can easily remove the drive and read it even he doesn’t have your laptop password. But, if your laptop drive is configured with FDE, the above case is impossible. In a nutshell, full disk encryption contributes to data protection a lot. But, it also has some drawbacks. Now, in the followings, we will talk about the 6 pros and cons of full disk encryption.

6 Advantages & Disadvantages of Full Disk Encryption (FDE)

Advantages

1. Enhance Data Security

Without any doubts, one of the most critical merits is strengthened data security. Full disk encryption uses strong encryption algorithms to encrypt drives on your PCs, thereby protecting all data stored in the drives. With FDE, even though the drive is removed from the current computer and put into other devices, the drive data is still inaccessible if without a correct key.

2. Auto Encrypt Data

Besides, unlike file or folder-level encryption, full disk encryption (FDE) encrypts the data as soon as it’s stored to the hard drive. In other words, this encryption process is completed automatically. Hence, it’s much more convenient than file or folder encryption, which demands you to manually select which file or folder to be encrypted.

3. Avoid Encryption Errors

On basis of the above point – fully automatic encryption, another virtue of FDE is that it can avoid encryption errors. As we all know, to some extent, user mistakes are inevitable. Hence, if you encrypt drive data manually, perhaps you may make some mistakes. But this can be evaded in case of FDE.

Disadvantages

1. Not Protect Data in Transit

Yet, full disk encryption still has its own drawbacks. The first one is that it cannot protect the data in transit. To be specific, if you are sharing data between devices or sent data through emails, then the data in transmit is not being protected. Hackers can steal it with ease.

2. Slow down Computer

Moreover, in case of full disk encryption, the entire drive is encrypted. Under this circumstance, every time when you try to read the drive data, the authentication key is demanded to decrypt drive data. Apparently, this process will slow down your computer.

3. Complicate Data Recovery

Like other kinds of encryption, a shortcoming of full disk encryption is that it complicates disk data recovery. Just think about this. If encrypted data was able to be recovered with ease, there would be no sense for encryption. So, it is definitely difficult for data recovery, such as single file recovery like PST recovery.

Author Introduction:

Shirley Zhang is a data recovery expert in DataNumen, Inc., which is the world leader in data recovery technologies, including mdf fix and outlook repair software products. For more information visit www.datanumen.com

Be the first to comment