Prash's Blog

Error 15581 – Please create a master key in the database or open the master key in the session before performing this operation June 19, 2015

Filed under: Uncategorized — prazjain @ 4:16 pm

Originally posted on SQLUNINTERRUPTED:

Recently I was working with a client, when a unique issue was brought to my notice. As per the client, when they are tying to restore a TDE enabled database to another server, they cannot perform the restore using SSMS User interface. They were able to restore the database using T-SQL though.

Now this sounded a bit funny, but then the customer showed it to me. Since I did not have any answers at that time, I decided to try it out later and check and see if anything they are doing is wrong or not.

To begin with, I checked their scripts for enabling Transparent Database Encryption on the databases and also their backup scripts for the master key and certificates.

Sample code for the screen provided by the customer is provided below.

   1:USE master;

   2:GO

   3:

   4:CREATE MASTER KEY ENCRYPTION BY PASSWORD = 'MyStrongPassword';

View original 492 more words

 

SQL SERVER – Fix – Login failed for user ‘username’. The user is not associated with a trusted SQL Server connection. (Microsoft SQL Server, Error: 18452) May 15, 2015

Filed under: Uncategorized — prazjain @ 4:19 pm

Originally posted on Journey to SQL Authority with Pinal Dave:

Earlier this week, I was on vacation and did not check my emails for three days and when I returned, I found six different emails from 4 different people asking for the same problem.

When they attempted to login using their application to SQL Server they faced following error:

Login failed for user 'username'. The user is not associated with a trusted SQL Server connection. (Microsoft SQL Server, Error: 18452)

This is quite a common error and can happen when incorrect username is communicated to SQL Server. The fix is to provide correct username. This can also happen if you are attempting to login to SQL Server with SQL Username but it is only configured to connect to Windows Login. You can quickly fix this error by following steps listed below.

Solution/Workaround/Fix:

Open SQL Server Management Studio and right click on Server Node and select Properties

Now go to Security…

View original 59 more words

 

Sql Server 2012 Could not find the Database Engine startup handle May 12, 2015

Filed under: Uncategorized — prazjain @ 2:34 pm
Tags: ,

I got this error when trying to install Microsoft SQL Server 2012, on Windows 2008 Server Virtual Machine.

This error happened when I unzipped the iso file for SQL Server 2012 and ran Setup.exe manually.

Solution:

http://www.sysnet.pe.kr/2/0/894

The solution as mentioned in above page, is to load the iso file as image in cd/dvd drive on Virtual Machine and do installation.

I hope this will save time for you.

 

In praise of “boring” technology May 11, 2015

Filed under: Uncategorized — prazjain @ 9:14 am

Originally posted on Spotify Labs:

In this article I will explain how Spotify uses different mature and proven technologies in our backend service eco-system and architecture, and why we do so. In addition, this article will also attempt to explain when Spotify has chosen not to use certain proven technologies, the reasons why and the associated pitfalls associated with each.

More often than not, the right tool for the job is piece of software that has been around for some time, with proven success. One example would be writing a backend service in Java or Python instead of Go or Node.JS. Another example would be storing data in MySQL or PostgreSQL instead of MongoDB or Riak.

View original 1,850 more words

 

Ten things I learned studying ten of the world’s fastest growing startups

Filed under: Uncategorized — prazjain @ 9:14 am

Originally posted on Quartz:

When we launched GrowthHackers.com back in late September, we had a notion of doing “growth teardowns” of the fastest growing startups. We wanted to answer the question that everyone on the outside of these rocketships wanted to know the answer to: “How did they grow so fast?” So we set to work doing deep research dives on companies like Uber, Snapchat, Yelp, LinkedIn, HubSpot, and Evernote.

By scouring the Web for interviews, videos, past profiles, and more, we pulled insight from dozens of sources for each case study. Based on our research we were able to piece together what made these companies so successful—and in the process reverse engineer their growth engine. While we certainly didn’t get everything 100% right, we received overwhelmingly positive feedback: that the case studies were some of the most detailed accounts of these companies’ growth engines ever created.

So now, with ten growth studies under my…

View original 1,527 more words

 

Apple Watch And The Future Of App Design

Filed under: Uncategorized — prazjain @ 2:14 am

Originally posted on TechCrunch:

Editor’s note: AndrewShorten is director of Adobe Creative Cloud Product Management. Formerly, he developed web, kiosk and mobile user interfaces for government and enterprise customers at Fujitsu and has since worked for Macromedia, Microsoft, and Adobe.

The launch of the Apple Watch represents the latest proof point that we’re only going to have more devices to consider when designing mobile apps. Not only does it represent a huge opportunity for more personal experiences, but it presents user interface designers with the increasingly complex challenge of scaling themselves to design for Web, mobile, tablets and wearables.

And there are further indicators that digital screens will become the way we interact with pretty much everything in the future. Take Coca-Cola’s latest vending machines that are operated by selecting from a touch screen. Or consider the Tesla Model S, a high-end car that replaces most of the traditional dashboard controls with a…

View original 842 more words

 

Sql server row and cell data security April 7, 2015

Filed under: Uncategorized — prazjain @ 4:05 pm

Row level and Cell level security in sql server:

http://www.mssqltips.com/sqlservertip/3030/implementing-sql-server-row-and-cell-level-security/

Encrypting columns in sql server:

http://www.mssqltips.com/sqlservertip/2431/sql-server-column-level-encryption-example-using-symmetric-keys/

Filtering sql server columns using column permissions:

http://www.mssqltips.com/sqlservertip/2124/filtering-sql-server-columns-using-column-level-permissions/

 

 
Follow

Get every new post delivered to your Inbox.

Join 45 other followers