Emad Adel Hanna

I am a Cloud Solution Architect

Emad Adel

With over 15 years of experience in IT, I am a seasoned cloud solution architect and a Microsoft Certified Trainer. I currently work at KlayyTech, a leading IT company that provides cloud services and solutions to clients across various industries.
Erat volutpat. Ut wisi enim ad minim veniam, quis nostrud exerci tation ullamcorper.

  • Cairo, Egypt
  • +20-12-4892008, +20-016-3008167
  • me@emadadel.com
  • it.emadadel@hotmail.com
  • www.emadadel.com
Me

My Professional Skills

I have successfully led numerous cloud migration projects, ensuring a smooth transition from on-premises to cloud-based environments. I also have expertise in cloud security and compliance, ensuring data protection and regulatory adherence. .

Microsoft Azure 90%
Microsoft 365 95%
Amazon AWS 70%
Enterprise Architect 60%

Training Services

I give people practical skills and knowledge for the workplace. It can help and improving their skills (Azure ,AWS , Microsoft 365 and SharePoint ).

IT consultant services

Helping businesses use technology to achieve their goals. and offer expertise in areas like cloud computing, cybersecurity, and software selection, and can improve efficiency, reduce risk, and save costs..

Professional Services

As and Azure expert and microsoft 365, I provide the best services, support and advice for all things Microsoft (Microsoft migration, support, and optimisation services).

Enterprise Architect services

help organizations align their IT infrastructure with business strategy. They basically design, evaluate, and build a blueprint for how technology supports the company's goals..

0
Completed project
0
Certifications Award
0
Success Training and Sessions
Completed Consultant projects
  • Make Network Path Visible For SQL Server Backup and Restore in SSMS

     

    Make Network Path Visible For SQL Server Backup and Restore in SSMS



    There are two main approaches to make a network path visible for SQL Server backup and restore operations in SSMS:

    1. Using UNC Path:

    This is the recommended approach and avoids complications with drive mappings. Simply specify the full Universal Naming Convention (UNC) path to the network location in your backup or restore statements.

    Here's an example:

    SQL
    BACKUP DATABASE MyDatabase TO DISK = N'\\Servername\ShareName\MyDatabaseBackup.bak'
    

    2. Mapping Network Drive (with caution):

    If you prefer using a drive letter, you can map the network drive. However, keep in mind that the SQL Server service account needs access to the mapped drive. Here's what to consider:

    • Map the drive permanently: Use the net use command with the /PERSISTENT:YES flag to ensure the drive remains mapped even after a reboot.

    OR

    • Use xp_cmdshell (with caution):

    This method involves enabling the xp_cmdshell extended stored procedure, which can be a security risk if not handled carefully. Only use this approach if necessary and follow these steps:

    1. Enable xp_cmdshell (with caution):
    SQL
    EXEC sp_configure 'show advanced options', 1;
    GO
    RECONFIGURE;
    GO
    EXEC sp_configure 'xp_cmdshell',1
    GO
    RECONFIGURE
    GO
    
    1. Map the drive using xp_cmdshell:
    SQL
    EXEC xp_cmdshell 'net use H: \\Servername\ShareName /USER:Domain\Username'
    

    Replace:

    • H: with your desired drive letter.
    • \\Servername\ShareName with the actual network path.
    • Domain\Username with the credentials that have access to the share (if necessary).
    1. Verify the mapping:
    SQL
    EXEC xp_cmdshell 'Dir H:'
    
    1. Use the mapped drive letter in your backup or restore statements (e.g., H:\MyDatabaseBackup.bak).

    2. Remember to disable xp_cmdshell after use for security reasons:

    SQL
    EXEC sp_configure 'xp_cmdshell', 0
    GO
    RECONFIGURE
    GO
    

    Important points:

    • Mapping a drive might not work if the SQL Server service account doesn't have access to the share.
    • Using xp_cmdshell carries security risks. Enable it only when necessary and disable it afterward.

    Recommendation:

    For better security and consistency, it's generally recommended to use the UNC path directly in your backup and restore statements.


  • About Sorablog

    About Sorablog
    Glimmer is one of the most Elegant, Clean and Creative WordPress blog.

    HI, WE ARE SORA BLOG / THE PLACE WHERE WE WRITE SOME WORDS

    Random Posts

    3/random/post-list

    Tags

    Subscribe Us

    Subscribe Us

    Most Popular

    Visual Studio 2013 Update 1 is available

    Technorati Tags: Visual Studio 2013 Update 1 is available This morning we made available the final version of Update 1 for Visual Studio 2013 .  This is a targeted update, addressing some key areas of customer feedback since the Visual Studio 2013  release. Other useful links include: KB Article: http://go.microsoft.com/fwlink/?LinkId=331377 Release Management update: http://go.microsoft.com/fwlink/?LinkId=386812 Remote Tools update: http://go.microsoft.com/fwlink/?LinkId=386813 The good news (particularly for TFS users) is that Update 2 is very close behind Update 1 and there will be a new version of TFS released for Update 2.  We're just wrapping up feature work on Update 2 this week and will soon be releasing our first CTP.  We’re just beginning the process of polishing, bug fixing, etc. to release a solid Update. In the next couple of weeks I’ll write a post describing the features that we’ve included in TFS 2013.2.  Our two biggest areas of investmen

    SharePoint Interview Questions

        Download PDF Copy 1) What are Web Applications in SharePoint? An IIS Web site created and used by SharePoint 2010. Saying an IIS virtual server is also an acceptable answer. 2) What is an application pool? A group of one or more URLs that are served by a particular worker process or set of worker processes. 3) Why are application pools important? They provide a way for multiple sites to run on the same server but still have their own worker processes and identity. 4) What are zones? Different logical paths (URLs meaning) of gaining access to the same SharePoint Web application. 5) What are Web Application Policies? Enables security policy for users at the Web application level, rather than at the site collection or site level. Importantly, they override all other security settings. 6) What is a site collection? A site collection contains a top-level website and can contain one or more sub-sites web sites that have the same owner and share administrat

    لهذة الأسباب السبعة لن تنجز شيء ذو قيمة بحياتك !

    نعم كما قرأتها، كما سمعتها منى..أنا أتحدث إليك أنت.أصرخ بوجهك الآن، أنظر إلى عينيك مباشرة ( ليس فعلياً ولكن بما أنك تقرأ المقال الآن فاستخدم مخيلتك) أخبرك أنه ليس لديك فرصة فى هذه الحياة لتفعل أى شيئ ذو قيمة. إذا كان بإمكانك إكمال هذا المقال لآخره، وإنكار أن هذه الأسباب هى أسبابك، فيجب عليك ان تقلق قليلاً.. فى الواقع يجب أن تكون أشد قلقاً، أترك كل ما بيدك فى الحال وأسأل عن هدف وجودك على هذه الحياة، توجه لأقرب مرآة وأنظر إلى نفسك إلى عينيك، وأرفع يدك وقم بصفع وجهك. فهمت الآن ماذا ستفعل؟! كرر هذا الأمر حتى تشعر به بكل جوارحك ثم تابع قراءة المقال حالما كنت مستعداً. أنا أحدثك عن مهارات معترك الحياة يابنى! <img class="size-full wp-image-43195 aligncenter" src="http://www.arageek.com/wp-content/uploads/882.jpg" alt="882 لهذة الأسباب السبعة لن تنجز شيء ذو قيمة بحياتك !" width="612" height="480" title="لهذة الأسباب السبعة لن تنجز شيء ذو قيمة بحياتك !" /> لا أحدثك عن الدراسة والمذاكرة بجد،