Prash's Blog

Error 15581 – Please create a master key in the database or open the master key in the session before performing this operation June 19, 2015

Filed under: Uncategorized — prazjain @ 4:16 pm

SQLUNINTERRUPTED

Recently I was working with a client, when a unique issue was brought to my notice. As per the client, when they are tying to restore a TDE enabled database to another server, they cannot perform the restore using SSMS User interface. They were able to restore the database using T-SQL though.

Now this sounded a bit funny, but then the customer showed it to me. Since I did not have any answers at that time, I decided to try it out later and check and see if anything they are doing is wrong or not.

To begin with, I checked their scripts for enabling Transparent Database Encryption on the databases and also their backup scripts for the master key and certificates.

Sample code for the screen provided by the customer is provided below.

   1:USE master;

   2:GO

   3:

   4:CREATE MASTER KEY ENCRYPTION BY PASSWORD = 'MyStrongPassword';

View original post 492 more words

 

SQL SERVER – Fix – Login failed for user ‘username’. The user is not associated with a trusted SQL Server connection. (Microsoft SQL Server, Error: 18452) May 15, 2015

Filed under: Uncategorized — prazjain @ 4:19 pm
 

Sql Server 2012 Could not find the Database Engine startup handle May 12, 2015

Filed under: Uncategorized — prazjain @ 2:34 pm
Tags: ,

I got this error when trying to install Microsoft SQL Server 2012, on Windows 2008 Server Virtual Machine.

This error happened when I unzipped the iso file for SQL Server 2012 and ran Setup.exe manually.

Solution:

http://www.sysnet.pe.kr/2/0/894

The solution as mentioned in above page, is to load the iso file as image in cd/dvd drive on Virtual Machine and do installation.

I hope this will save time for you.

 

In praise of “boring” technology May 11, 2015

Filed under: Uncategorized — prazjain @ 9:14 am

Labs

In this article I will explain how Spotify uses different mature and proven technologies in our backend service eco-system and architecture, and why we do so. In addition, this article will also attempt to explain when Spotify has chosen not to use certain proven technologies, the reasons why and the associated pitfalls associated with each.

More often than not, the right tool for the job is piece of software that has been around for some time, with proven success. One example would be writing a backend service in Java or Python instead of Go or Node.JS. Another example would be storing data in MySQL or PostgreSQL instead of MongoDB or Riak.

View original post 1,850 more words

 

Ten things I learned studying ten of the world’s fastest growing startups

Filed under: Uncategorized — prazjain @ 9:14 am

Quartz

When we launched GrowthHackers.com back in late September, we had a notion of doing “growth teardowns” of the fastest growing startups. We wanted to answer the question that everyone on the outside of these rocketships wanted to know the answer to: “How did they grow so fast?” So we set to work doing deep research dives on companies like Uber, Snapchat, Yelp, LinkedIn, HubSpot, and Evernote.

By scouring the Web for interviews, videos, past profiles, and more, we pulled insight from dozens of sources for each case study. Based on our research we were able to piece together what made these companies so successful—and in the process reverse engineer their growth engine. While we certainly didn’t get everything 100% right, we received overwhelmingly positive feedback: that the case studies were some of the most detailed accounts of these companies’ growth engines ever created.

So now, with ten growth studies under my…

View original post 1,527 more words

 

Apple Watch And The Future Of App Design

Filed under: Uncategorized — prazjain @ 2:14 am

TechCrunch

Editor’s note: AndrewShorten is director of Adobe Creative Cloud Product Management. Formerly, he developed web, kiosk and mobile user interfaces for government and enterprise customers at Fujitsu and has since worked for Macromedia, Microsoft, and Adobe.

The launch of the Apple Watch represents the latest proof point that we’re only going to have more devices to consider when designing mobile apps. Not only does it represent a huge opportunity for more personal experiences, but it presents user interface designers with the increasingly complex challenge of scaling themselves to design for Web, mobile, tablets and wearables.

And there are further indicators that digital screens will become the way we interact with pretty much everything in the future. Take Coca-Cola’s latest vending machines that are operated by selecting from a touch screen. Or consider the Tesla Model S, a high-end car that replaces most of the traditional dashboard controls with a…

View original post 842 more words

 

Sql server row and cell data security April 7, 2015

Filed under: Uncategorized — prazjain @ 4:05 pm

Row level and Cell level security in sql server:

http://www.mssqltips.com/sqlservertip/3030/implementing-sql-server-row-and-cell-level-security/

Encrypting columns in sql server:

http://www.mssqltips.com/sqlservertip/2431/sql-server-column-level-encryption-example-using-symmetric-keys/

Filtering sql server columns using column permissions:

http://www.mssqltips.com/sqlservertip/2124/filtering-sql-server-columns-using-column-level-permissions/

 

 
Follow

Get every new post delivered to your Inbox.

Join 47 other followers