Skip to main content
Dynamics 365

Microsoft Dynamics 365 Blog

Published
2 min read

Optional Additional Installation Script for Blocking Analysis with DynamicsPerf v2.0 

In relation to the analysis scripts that come with DynamicsPerf (Performance Analyzer) v2.0, (based on the new extended events being used in place of the SQL profiler trace which featured in v1.20), i.e.: … —            BLOCKING_EVENTS — Blocking events sorted by TIME desc —————————————————————- SELECT TOP 100 * FROM (SELECT event_data.value(‘(event/@name)[1]’, ‘varchar(50)’) AS EVENT_NAME, DATEADD(hh, DATEDIFF(hh,

Published
1 min read

SQL Server 2016 and Dynamics NAV 

SQL Server 2016 released in June this year with many new and interesting capabilities. For further information, please take a look at the product information at this location: https://www.microsoft.com/en-us/cloud-platform/sql-server Over the last few months, the Dynamics NAV team has been testing compatibility with this new version of SQL Server, and we are now proud to

Published
3 min read

Clustered SQL Server instance – Example AX TEST environment configuration concepts and points of interest 

Consider a scenario where you are running AX 2012 and your Dynamics AX databases are hosted on a Clustered SQL Server instance. I’ll discuss some concepts and points of interest below which are relevant when running AX 2012 RTM, R2 or R3. The screenshots are from a VM TEST environment with CONTOSO DEMO DATA that is

Published
4 min read

How to configure Bulk items into a Formula for a Packed Item and have MRP generate Planned orders for both 

I’ve recently worked with customers whom are attempting to create Bulk item conversions into the Formula configuration for a Packed Item and have MRP have the capability to generate Planned Orders for both the Pack and the Bulk Item. As a result of this, I’ve documented the overall setup\configuration, as an example, in order to

Published
<1 min read

Design Pattern: Security – Masked Text 

Aliases: Masking out Context: In the user interface (UI) of a software system, the user enters protected information such as a password, an access key, a credit card number etc. Problem: The entered information is visible during data entry and whenever any user (the one who entered the data, or a foreign user) opens the