Steve Jones shows a simple way to provision full size databases for developers, using production like data that has been masked automatically as part of the provisioning process. Read more
Chris Unwin explains the basic approaches to anonymizing email addresses, and shows how Data Masker can generate realistic email addresses, based on faked names, and even retain the correct distribution of email providers. Read more
Gerry Leith explores what’s required for the effective masking of dates and times in your data. Read more
Chris Unwin describes a strategy, using data masking, cloned databases and PowerShell, which will allow you to sanitize data before provisioning test or development environments. Read more
Tony Davis takes a ‘first look’ at cloning databases with SQL Clone, reviewing some of the database provisioning challenges that we seek to overcome, explaining briefly how SQL Clone works, and then walking through a simple example of creating a clone from a live database. Read more
If you guard against database corruption by restoring backups to secondary server, licensed as per production, and then running DBCC CHECKDB integrity checks, then you might save a lot of restore time, and disk space, by offloading this task to a clone. Read more
A step-by-step guide to creating an image from a database full backup, or from a full backup plus differential backup. Read more
Can we use a striped backup as the source for a SQL Clone image? Yes we can! Read more
What if you now do development work on a clone, but you to continue working on you own local clone while ‘disconnected’, such as when travelling? One simple option if the original database contains no private data, or the image has been masked, is to performance a normal backup and restore operations the clone, although you'll now be working with a normal, full-sized database. Read more
Steve Jones proves that SQL Clone can create a clone from a TDE-protected SQL Server database backup. Read more