In information security (INFOSEC), there several foundational concepts and principles. One of the ones that’s introduced almost immediately is called the CIA triad or the Information Security Triad. While...
2024-05-13 (first published: 2024-04-26)
31 reads
Recently I’ve been looking at archiving some data at SQL Saturday. As a start, I needed to read some of the archive data I have in Python. This post...
2024-05-13 (first published: 2024-05-12)
4 reads
Have you ever wanted to filter a visual by selecting a range of values for a measure? You may have found that you cannot populate a slicer with a...
2024-05-13 (first published: 2024-05-01)
15 reads
In a previous blog post we went through how to build a Docker container image from a remote (Github) repository. Here we’re going to expand on that by actually...
2024-05-10 (first published: 2024-04-25)
308 reads
In the expansive landscape of software development, the relationship between Database Administrators (DBAs) and Developers has been a subject of intrigue, debate, and occasional drama. Do they collaborate harmoniously...
2024-05-10 (first published: 2024-04-29)
261 reads
As I look at the state of information technology today, I see one constant: rapid change. We all see it. While this is the type of post I would...
2024-05-08 (first published: 2024-04-22)
151 reads