Viewing 15 posts - 616 through 630 (of 6,026 total)
January 25, 2019 at 6:52 am
In addition to the firewall, you can secure access to your Azure resources using VPN, Azure AD authentication, and access tokens. For hackers, the low hanging fruit are unpatched servers,...
January 24, 2019 at 12:55 pm
January 24, 2019 at 12:25 pm
The database engine chosen for an application needs to match the expected data access patterns. RDMS are excellent for scenarios where you need to query, insert, and update manageable subsets...
January 24, 2019 at 6:56 am
Here you can estimate the costs for compute and storage.
https://azure.microsoft.com/en-us/pricing/details/sql-data-warehouse/gen2/
Also, iIf you're considering a hybrid scenario, where your source systems and applications are on-prem and your...
January 23, 2019 at 1:41 pm
In the past, I've used schemas to isolate different versions of the same object within the same database. I used this typically in development or for parallel testing in QA....
January 23, 2019 at 12:21 pm
Provide some context about how this view fits into the overall data warehouse design, and how it will be used. From a data warehousing perspective, assuming this discussion is in...
January 23, 2019 at 7:06 am
January 22, 2019 at 7:19 am
The article describes the business analyst in question using the past tense, so it makes me wonder if she was a contractor or consultant. If so, then I can see...
January 21, 2019 at 11:57 am
My personal opinion is that she would make a valuable addition most any project. But the problem is that some people may not have had a positive experience with her....
January 21, 2019 at 7:18 am
When it comes to securing ballistic missile systems, maybe keeping them off the internet grid is best. I reject the notion that we must IoT everything.
January 18, 2019 at 11:19 am
Ideally, the DBA doesn't grant access to people, we should only grant access to functional roles. Where I work now, most access is granted using AD domain roles (ie: [SG eComm...
January 18, 2019 at 7:24 am
It's impossible for IT to create a database model that lines up with the organization's business model and user requirements, when the business model and user base are constantly changing...
January 17, 2019 at 9:47 am
For the past year or two, I've been using the Pocket extension for Chrome to archive and tag links to websites. Used in conjunction with the Pocket mobile app, I...
January 17, 2019 at 8:34 am
When it comes to pleasing the customer, it's best to keep the salt and pepper shaker on the table rather than have the chef make assumptions.
January 17, 2019 at 8:22 am
Viewing 15 posts - 616 through 630 (of 6,026 total)