Editorials

Editorials

Is the SP Waiting Game Still a Thing?

Do you still hold a release or update in anticipation of an unknown service pack? I was surprised to hear that some people do indeed still wait to update their systems – they wait for the next service pack after a major release. This was true “way back when” but I’ve not heard of this being a wide-spread approach of […]

Editorials

Where Do I Start?

I really appreciated a recent comment from an editorial on new technology with a candid reply, “I am not sure where to start”. This is so true for many of us. I think it is even more true for those of us who used to program in tools that evolved quite slowly. You could spend a great amount of time […]

Editorials

Has The Cloud Changed Your HA Needs?

As more and more high-availability support and more and more dependability in the cloud comes into play, have your HA requirements changed? I realize the easy answe is “Never! We need HA options to do HA right and make sure our real systems are up and available!” (Feel free to quote this in the comments). But more and more often, […]

Editorials

Make it Work Like the Old System

Make it work like the old system. I have worked on three large projects where this was the stated requirements for a system. Each time I wanted more specific requirements. Each time I relented. Each time there was a huge price to pay as a result. The biggest reason a company will want to use this methodology is because they […]

Editorials

Hype or Help

If the email I am receiving is any indication of what is happening around databases is true, here are some of the hot skills. DevOps Simplified Database Change Management Services in the Cloud On Site and Cloud combined implementations…especially SQL Server BI of any type Machine Learning If you’re like me, you get a lot of Email daily, and it […]

Editorials

Key Management

What is your key management process? When it comes to encryption, encryption key management is probably the most important part. It is more important than what encryption methodology you use. The encryption key is the backbone to all encryption, regardless of using a salt, or anything else. There are a few key aspects of a key management process that you […]

Editorials

Ladies and Gentlemen, Choose Your Weapons

Even one of the comments from yesterday said it – “I don’t know where to start…” – boy, isn’t THAT the truth? Talking about what to learn, what priorities to pay attention to, where to start learning all of it. That’s the problem. The “all of it” part. I can’t tell you how many people I’ve talked to that are […]

Editorials

There’s Monitoring and then There’s Monitoring

I think I need to clarify some terms when it comes to monitoring your systems. I find there may be two different kinds of monitoring. Monitoring for your system is coming down. User activities are very slow, or dropped on the floor Monitoring the continuous operations of your ENTIRE system, from the users perspective There are great tools, as David […]