Editorials

Editorials

What If?

Let’s say you just became responsible for the development and management of your companies database systems. Describe your next thirty days. This question came to me from a couple of different directions. One was a white paper for third party database management tools. Another was a web site for performing technical interviews, something I really enjoy participating in. Many of […]

Editorials

Trying on Tuples

I have recently become reacquainted with one of the cool generic techniques found in .Net, tuples. Tuples allow you to pass data in a structured form without fully defining a class or struct to pass complex object. If I had the need to pass an integer identifier, a phone number, and an Email address I could create a class with […]

Editorials

Accidental SysOps Maitnenance Tasks

Do you keep up with your batteries? I usually don’t even think about that. However, a recent power outage got me thinking about batteries which if they are not kept up may result in more than an inconvenience. Laptop batteries are the ones of which I am usually more aware. I use my laptop away from my desk a lot […]

Editorials

Breaking Software Principles

Today I wanted to open a conversation about one of the SOLILD principles, because I have observed that talented software developers do not often practice the Open/Closed principle. Overview of Solid S – Single Responsibility. A class does only one thing. O – Open / Closed. A class is open for modification but closed for changing the interface. L – […]

Editorials

Protocols

How are you with Database Connectivity protocols? There have been quite a few over the years. Banyan Vines and IPX/SPX (Novell) have dropped off the radar as their popularity diminished, and the rise of TCP/IP grew. Even still there are other protocols you can use than TCP/IP. If your database is on the same machine as the client you can […]

Editorials

EBay Attacked – Did They Have a Plan

Do you need an attack plan? I am not sure EBay had one recently. They had intrusion into their database containing user information. They are trying to play down the impact of the breech by saying you only need to change your password. This is something you should do anyway. However, they say your user name, password, name, email addresses, […]

Editorials

SQL Server Agility … and more

SQL Server Agility … and more I’m excited to be hosting the webcast with DH2i – we’ll have a couple of outstanding presenters talking about things you need to think about, points to consider and some solutions when it comes to building out SQL Server solutions that help you support your high availability requirements, even moving beyond clustering, mirroring and […]

Editorials

Windows Server Administration

I recently had a conversation with people managing windows servers and we got to talking about how the environment has really changed in the last 4 years. The GUI version of Windows Server more closely resembles the Windows 8 look and feel. The Server Manger application is there to make things easier for managing multiple servers from a single endpoint. […]

Editorials

Do You Have an Attack Plan?

Have you ever had your computer systems attacked from the outside? I have had this happen twice; both times through SQL Injection. Surprisingly this continues to be an issue for developers. The methods of attack are well known. The techniques to disable SQL Injection are well known. Still, systems are being developed enabling SQL Injection. A couple things to take […]