Forum Replies Created

Viewing 15 posts - 166 through 180 (of 3,638 total)

  • Reply To: Trying New Technology

    Whole heartedly agree.  TOGAF used to list a set of architectural principles that included "Controlling the technical complexity".

    Ed's comments remind me of Fred P Brooks paper No...

  • Reply To: How to Delete Large Amounts of Data

    If I knew I needed a regular purge job based on record creation datetime then I would be looking at whether that datetime column should be a candidate for the...

  • Reply To: A Kafka Introduction

    I've used AWS SQS (Simple Queue Service) and GCP Pub-Sub.  My company places an emphasis on consuming services rather than administering them.

    If we were to use Kafka then we would...

  • Reply To: Your Computer Science Education

    For the 1st time in decades I have been asked about my education for a pitch to a client.

    Technically, politically and socially the world is radically different to what it...

  • Reply To: Less Junior Staff

    I worked on a system that used a machine learning algorithm to make product recommendations.

    The person who designed the methodology deliberately introduced a random element to mitigate the problem of...

  • Reply To: Your Computer Science Education

    Mine wasn't a degree, it was a UK HND in Business Information Technology and comprised of 3 modules

    • Business Decisions
    • Business Policy
    • Business Systems

    This was in 1985 so PCs weren't...

  • Reply To: A Lack of Architecture and Planning

    I remember having an external technical audit carried out on a system intended to become legacy.  Some of the questions posed by the auditor were useful and provided us with...

  • Reply To: What Do You Drop?

    • In your 20s, cycle to play squash
    • In your 30s, cycle or play squash
    • In your 40s, cycle
    • In your 50s, occasionally cycle, watch squash on the TV
    • In...
  • Reply To: Relationally Divided over EAV

    I wish the original demonstration had been videoed.

  • Reply To: Prevent SQL Injection

    Some 3rd party libraries and applications are known to be vulnerable to SQL Injection attacks (and other means of attack).

    One of the great things about putting apps in Docker containers...

  • Reply To: Hiring in IT and Relevance of Domain Experience

    I worked for a company that used to hire senior developers because it was easier to hire at that level than go through the bureaucratic hell of hiring a junior...

  • Reply To: A Checklist for Learning

    One of the things I have to do as a principal data engineer is to help those under me put together career development plans and then find ways to give...

  • Reply To: Send Metrics Not Logs

    Doctor Who 2 wrote:

    I've known about observability for a while now, but still struggle to get my head around it. Especially how it is different from monitoring. I look forward to this...

  • Reply To: Send Metrics Not Logs

    At present we use cloud provider specific solutions for logging, metrics and traces.

    Our experience with logging lead us to conclude that a lot more thought needs to go into logging.

      ...
  • Reply To: Relationally Divided over EAV

    Where I have seen EAVs it has been when someone wanted a flexible schema or something that, in 2024, would suggest a use case for a either a document DB...

Viewing 15 posts - 166 through 180 (of 3,638 total)