Trending

Tuesday, May 20, 2014

Developing and Deploying SQL Server ISV Applications

Pluralsight – Developing and Deploying SQL Server ISV Applications
There are many important considerations when creating and deploying an application that uses SQL Server for data storage, whether you work for a large or small ISV, and are creating a complex or simple application. It’s critical that your application performs well under load, keeps the user data secure, and is able to be installed and upgraded easily.
This course explains all these considerations using a layered approach that ties into stages in the development lifecycle. The course begins by examining database design and schema considerations, plus general best practices around security using roles, logins, and users. It then explains and demonstrates numerous aspects of T-SQL coding where choices can be made to make the code and application more efficient, and avoid common performance pitfalls. Application and code testing is then addressed, along with figuring out the hardware, software, and SQL Server requirements that must be communicated to the users. The course ends by walking through the deployment phase, including common SQL Server and database configuration options that must be changed or left as the default value, and explaining how to ensure that application and database upgrades run smoothly. This course is perfect for developers who are involved in the development lifecycle of applications that use SQL Server for data storage. The information in the course applies to all versions from SQL Server 2005 onward.

Table of content

  • Introduction
    • What is an ISV?
    • ISV Examples
    • ISV Examples (2)
    • The Perception of ISVs
    • The Perception of Users
    • Facts
    • Facts (2)
    • Keys for Successful ISVs
    • Course Scope and Summary
  • Schema Considerations
    • Introduction
    • What’s a Database Schema?
    • What’s a Schema in SQL Server?
    • Demo: Exploring the AdventureWorks Schema
    • Schema Recommendations
    • Tables: The Basics
    • Tables: Heaps vs. Clustered Indexes
    • Tables: Clustering Key
    • Demo: Viewing Heaps and Clustered Indexes
    • Tables: Constraints
    • Tables: Primary Keys
    • Tables: Foreign Keys
    • Demo: Constraints
    • Data Type Considerations
    • Indexes: The Basics
    • Indexes: Redundancy
    • Demo: Index Redundancy
    • Indexes: Unused
    • Indexes: Missing
    • Views
    • Indexed Views
    • Demo: Views
    • Triggers
    • Triggers(2)
    • Full-Text Indexing
    • Full-Text Indexing (2)
    • Summary
  • Security
    • Introduction
    • Authentication Levels in SQL Server
    • Roles, Logins, and Users
    • The sa Login
    • The sa Login (2)
    • The sysadmin Role
    • Demo: Roles, Logins, and Users
    • CONTROL SERVER permissions
    • Managing Logins, Roles, and Users
    • Ownership Chaining
    • Demo: Ownership Chaining
    • Auditing
    • Auditing (2)
    • Encryption
    • Encryption (2)
    • Summary
  • Efficient Code Choices
    • Introduction
    • Database Connections
    • Transactions
    • Demo: Transactions
    • Nested Transactions
    • Demo: Nested Transactions
    • Isolation Levels
    • Isolation Levels (2)
    • Demo: Isolation Levels
    • Isolation Levels (3)
    • Accessing Data
    • Stored Procedures
    • Stored Procedures (2)
    • Demo: Stored Procedures
    • Dynamic SQL
    • Dynamic SQL (2)
    • Demo: Dynamic SQL
    • CLR Integration
    • CLR Integration (2)
    • Temporary Tables
    • Temporary Tables (2)
    • Demo: Temporary Tables
    • Implicit Conversions
    • Demo: The Effects of Implicit Conversions
    • Filtering
    • Just in Case
    • Ordering Data
    • Where is the Data?
    • Caching
    • Data Characteristics
    • Cardinality Estimate Issues
    • Demo: Cardinality Estimates
    • Validate Data Consistency and Integrity
    • Code Reviews
    • Summary
  • Application Testing
    • Introduction
    • Test Plans
    • Testing with the Right Configuration
    • Testing with the Right Data and Workload
    • Testing Challenges: Data and Workload
    • Testing Challenges: People
    • Testing Challenges: Time
    • Summary
  • Application Requirements
    • Introduction
    • Hardware Requirements
    • Software Requirements
    • SQL Server Requirements
    • Additional Considerations
    • Supported High-Availability Options
    • A Final Consideration
    • Summary
  • Installation and Configuration
    • Introduction
    • SQL Server Installation
    • Database Installation
    • Instance and Database Configuration
    • SQL Server Instance Settings
    • SQL Server Instance Settings (2)
    • SQL Server Instance Settings (3)
    • SQL Server Instance Settings (4)
    • SQL Server Instance Settings (5)
    • SQL Server Instance Settings (6)
    • SQL Server Instance Settings (7)
    • SQL Server Instance Settings (8)
    • Database Settings
    • Database Settings (2)
    • Database Settings (3)
    • Database Settings (4)
    • Hardware
    • Summary
  • Application Upgrades
    • Introduction
    • Database Changes From an Upgrade
    • Database Changes From an Upgrade (2)
    • Requirements
    • Test, Test, Test
    • Upgrading the Database
    • Summary
  • Summary
    • Development Considerations
    • Testing and Requirements
    • Installation, Configuration, and Upgrades
    • Critical Factors
    • What’s Next?
Rapidgator.net
  1. bit.ly/1tg4gJx
  2. bit.ly/1lD7eBE

No comments:

Post a Comment

About

Contact Form

Name

Email *

Message *

Copyright © 2013 TOTdownload.com
Designed By Blogger Templates