GoorooTHINK

Thought provoking and helpful articles
from the Gooroo community.

Do you have something to say? Contribute or create an article and add it to your Gooroo bio.

  1. Another interesting trick with APPLY operator

    Some years ago, I was reading one book of Itzik Ben-Gan where he explained in depth the use of a new operator: APPLY, I told myself, it just another new feature more. I didn’t understand the relevance and the many versatile applications it had, through time, I have been using APPLY in many scenarios. Saving time and resources it is a fundamental part of each TSQL development, in this short article I would like to explain a simple trick with APPLY operator.The requirement can sound exotic but is...
  2. Creating HSTS and Pre-load with Cloudflare

    Most people are familiar with HTTPS and the concept of secure websites. Securing websites become more and more common, which is a really good thing. Not only do we know that the data sent and received from the website is secure, but we also get a sense of knowing we will be alright. We expect that we get confidentiality, authenticity and integrity from modern websites. After all, we see sites every day with this:This is becoming more and more common, and according to Scott Helme almost 31% of the...
  3. Tips for Read/Write Locks Depending on Transaction Isolation Level in MSSQL

    Hi! I wrote these tips after many hours of some ERP system speed optimization. It was very helpful for me and my team. I hope it will be helpful for you too.So, lets go. Read UncommittedRead Committed + read_committed_snapshot off(alter database xxx set read_committed_snapshot off)Read Committed + read_committed_snapshot on(alter database xxx set read_committed_snapshot on)Repeatable ReadSerializableSnapshot(alter database xxx set allow_snapshot_isolation on)Tested on MSSQL 2014.
  4. Securing your Exchange Online

    If your company its using Exchange Online services and you are responsible for email security, you have many options that you can implement to improve email security. By default every new Exchange Online tenant come with a defaults protections policy such as:Every default policy can be viewed, edited but not deleted. Its so recommended that you review all of this policies.As administrator, you can create additional malware or spam policies and applies it to specific users or groups.The malware filter...
  5. Custom user roles and role-based authorization in ASP.NET core

    I've recently been trying to contribute to the developer community, in more ways than I previously have. One of the areas I decided to delve into, is spending more time on tech forums and resources like StackOverflow.  Well not for asking questions or checking for answers, but more for answering as many questions as I possibly can. The aim is to provide answers primarily to questions budding developers are asking. so Let's hope I do a lot of that as time goes on. Hey, I might...
  6. Visual Studio: Creating and managing digital certificates in C#

    Digital Certificates are used for secure communication between two parties. In digital certification we ensure that the peoples who are using our apps or services are securely communicating with each other and those peoples can be individual consumers or businesses.In Digital Certification we use both Hashing and Asymmetric encryption for creating digital signatures.After encrypting the hash of data we obtain a digital signature later which is used for verification of data.As there are a lot more...
  7. SQL Server - How to extract Storage related Meta Data for Monitoring and Automation

    1. How much Disk Space is my Database currently using on Disk and what is the real Data Volume in the Database files?2. How close is the Data Volume to the Storage Limits?The following article will show you how to extract all relevant information using T-SQL for automation - step by step.If you simply need a quick and dirty solution without going through the details feel free to jump the code block labelled PUTTING IT ALL TOGETHER at the very end of this article.The first table we want to look...
  8. The Power of PowerShell.. And the Shell..

    "What is the one technology I need to learn to get a job like the one you have?" - this is a question I've received from time to time, and my answer would vary, depending on who asked. Or rather; who I perceive the questioner to be - I cannot *know* for a fact what most suits his or her particular ambitions and style.. But in the last few years my answer, more often than not, has been "PowerShell"! Simply because I see it as one of the most important and game-changing technologies to come out of...
  9. Microsoft Business Intelligence approaches

    Time Intelligence is a common issue for every OLAP structure because Time as dimension apperars in every OLAP project, in every Cube you build, despite business model or type. To handle Time Intelligence good in calculations, aggregations and optimization, you need to use Timescale as well. With Timescale I mean: MonthToDate (MTD), YearToDate (YTD), LastYear(LY) etc..., all these very important to everyday use of Business Intelligence solutions.Now, I will take you to the technical steps of implemention...
  10. How to install pfSense onto a CheckPoint Firewall Appliance

    pfSense is an Open Source firewall platform that can also be used for site to site connectivity as well as mobile client connectivity.Having used pfSense in the past and knowing how robust and secure the platform is, I wanted to see if I could port or install pfSense onto a CheckPoint firewall appliance. I figured that the CheckPoint appliances should have more than enough power to run pfSense.I was able to test the installation of pfSense using a few older CheckPoint appliances that were decommissioned...
  11. Edit DRAFT Edit

    • updated

Top Tags

Trending Articles

  1. Another interesting trick with APPLY operator

    Last updated: one year ago by Geovanny Hernandez
  2. Creating HSTS and Pre-load with Cloudflare

    Last updated: one year ago by Lars Klint
  3. Tips for Read/Write Locks Depending on Transaction Isolation Level in MSSQL

    Last updated: 2 years ago by Andrey Poturaev
  4. Securing your Exchange Online

    Last updated: 2 years ago by Jose Beltre
  5. Custom user roles and role-based authorization in ASP.NET core

    Last updated: one year ago by Temi Lajumoke
  6. Visual Studio: Creating and managing digital certificates in C#

    Last updated: 2 years ago by Mobeen Rashid
  7. SQL Server - How to extract Storage related Meta Data for Monitoring and Automation

    Last updated: 2 years ago by Dénes Martinidesz
  8. The Power of PowerShell.. And the Shell..

    Last updated: 2 years ago by Thomas Qvidahl
  9. Microsoft Business Intelligence approaches

    Last updated: 3 years ago by Besim Ismaili
  10. How to install pfSense onto a CheckPoint Firewall Appliance

    Last updated: 3 years ago by Paul Scobie

Publishing guidelines

Gooroo is a professional community interested only in consuming quality content. Here are our pretty simple guidelines for all contributors to follow.