When It’s No Longer Viable
Sometimes a solution is no longer viable because there isn’t a path forward and sometimes a solution isn’t viable because there are better options out there from the organization’s...
2024-10-09
13 reads
Sometimes a solution is no longer viable because there isn’t a path forward and sometimes a solution isn’t viable because there are better options out there from the organization’s...
2024-10-09
13 reads
If a technology is still viable, don’t overlook it. Don’t get caught up chasing the “shiny” or the “perfect” solution just because you can.
2024-10-08
9 reads
I’m sick of meetings and I know many other folks are, too. Every time a knowledge worker (such as IT or cybersecurity but also business) has to go to...
2024-08-23 (first published: 2024-08-09)
358 reads
Just as it's important to take care of our physical health (and I'm guilty of neglecting that), it is important to take care of our mental health, too. Also,...
2024-06-10 (first published: 2024-05-20)
280 reads
Once upon a time, I used to think of difficult technical questions to ask candidates for a DBA position. However, over time I came to understand that in most...
2024-06-07 (first published: 2024-05-14)
407 reads
I did a post last month titled RTO and RPO are myths unless you've tested recovery, but I only briefly covered what RPO and RTO are. This post goes...
2024-05-31 (first published: 2024-05-10)
470 reads
Another security fundamentals topic is authentication versus authorization. For those who have a clear understanding of the difference between the two, like with Recovery Point Objective (RPO) vs. Recovery...
2024-05-24 (first published: 2024-05-03)
281 reads
he rollback plan... what to do when things go wrong to get back to where you were before the deployment or implementation. I've seen too many cases where a...
2024-05-17 (first published: 2024-05-01)
296 reads
In information security (INFOSEC), there several foundational concepts and principles. One of the ones that’s introduced almost immediately is called the CIA triad or the Information Security Triad. While...
2024-05-13 (first published: 2024-04-26)
222 reads
As I look at the state of information technology today, I see one constant: rapid change. We all see it. While this is the type of post I would...
2024-05-08 (first published: 2024-04-22)
168 reads
By Steve Jones
I heard someone say recently that you can’t change a primary key value in...
By Kevin3NF
Indexes 101: What, Why, and When? “What Is an Index?” I get this question...
By Arun Sirpal
I do believe most people know about the ability to backup your SQL server...
I need to update greatherthan8 (category) record to Missing (status) if the same member...
Quick one I hope in case I'm heading off in entirely the wrong direction!...
Hi everyone I am looking at the size of my db on disk (ie...
How can I check what value I used for TEXTSIZE? I ran this code:
SET TEXTSIZE 8096But then deleted the code and couldn't remember. Is there a way to check this? See possible answers