Privacy – not just a problem for the legal and risk management departments anymore. These days, issues of privacy, security, and data ethics are squarely in the DBA’s court. We just added Steve’s session, Data Ethics, Protection, and Privacy, to the PRO library. Want to learn more? Check that out HERE. As data is critical to organizations, the DBA’s job […]
Editorials
Security or Convenience?
According to MorningBrew, the current Smartphone market is a bit of a complicated one. While nearly half of the world relies heavily on these devices, the market for them is unstable right now, as people either hang on to their older models or opt for more affordable ones. Upgrade, Upgrade, Upgrade!Samsung’s newest model, the Samsung 10+ 5G costs a pretty […]
Data is Like Evidence
When you hear about breaches, so many times it’s because someone didn’t do their job protecting their SQL Server, protecting the data, or protecting the pipes that feed and move the data around. It’s a big deal – and with your (likely) cloud environment, the model and approach to all of this is changing. Chain of custody… “that records the […]
Old Guidelines Still Apply
Back in the day… standard advice was to get that SQL Server off the Internet, public-facing access, if at all possible. Sometimes this worked, sometimes it didn’t because of application access and other issues with moving it to a private segment. But the key is to remove those sensitive layers of access to SQL Server – control the surface area […]
A New Variable in the RFQ Process – (Recognizable) Brand Names
Some interesting things happening in the process of RFQs and software platform analysis prior to purchase. More and more we’ve been seeing people inquiring about infrastructure. It’s not like they didn’t care before, certainly they did. But now, it’s about two different “levels” of infrastructure. The first is functionality. We’ll see a lot of questions about how things are set […]
Australian Law Could Easily Impact All Data Professionals
Australia is currently putting into place has passed a law that would make it possible for the government to compel “backdoors” and access to even encrypted and secure systems. The reporting is all over the place on the details about this and what it means (but here’s a link to the actual law), but the basics are that the government will be […]
Catch-22 For Data Use Transparency
As different systems roll out to use different data sets, a trend is emerging – that trend is using data in ways we never thought possible, in seeing trends across data sets and between solutions – things that we never imagined having relationships suddenly start to show relationships. Sounds like a dream come true – our hard-fought battles with SQL […]
Environment normalization and challenges
When you start working in the cloud, you end up making choices, of course, for how you want to implement things. If you look at options for your SQL Server, there are more than a few different ways to approach that type of implementation. From virtual machines and container-oriented configurations to Software and Platform as a service to fully managed […]
Who Decides What’s Good Enough for Data?
We are working with a software solution and setting up the SQL Server and general installation configuration for this environment and I stumbled on something that really caught my attention. They were describing their security (all because SQL Server was involved, not because of their configuration and installation options by the way) and one of the qualifications of their security […]
Multi-Database Solutions
tl;dr There is no easy answer. But it’s important. It can be really challenging to work efficiently in a world where not only is the hosting environment typically a hybrid of on-site, off-site, public and private cloud configurations, managed and self-managed services… but also where you have multiple databases gathering different bits of information and you’re in a position to […]