When It’s No Longer Viable
Sometimes a solution is no longer viable because there isn’t a path forward and sometimes a solution isn’t viable because there are better options out there from the organization’s...
2024-10-09
13 reads
Sometimes a solution is no longer viable because there isn’t a path forward and sometimes a solution isn’t viable because there are better options out there from the organization’s...
2024-10-09
13 reads
If a technology is still viable, don’t overlook it. Don’t get caught up chasing the “shiny” or the “perfect” solution just because you can.
2024-10-08
9 reads
I’m sick of meetings and I know many other folks are, too. Every time a knowledge worker (such as IT or cybersecurity but also business) has to go to...
2024-08-23 (first published: 2024-08-09)
358 reads
Just as it's important to take care of our physical health (and I'm guilty of neglecting that), it is important to take care of our mental health, too. Also,...
2024-06-10 (first published: 2024-05-20)
280 reads
Once upon a time, I used to think of difficult technical questions to ask candidates for a DBA position. However, over time I came to understand that in most...
2024-06-07 (first published: 2024-05-14)
407 reads
I did a post last month titled RTO and RPO are myths unless you've tested recovery, but I only briefly covered what RPO and RTO are. This post goes...
2024-05-31 (first published: 2024-05-10)
470 reads
Another security fundamentals topic is authentication versus authorization. For those who have a clear understanding of the difference between the two, like with Recovery Point Objective (RPO) vs. Recovery...
2024-05-24 (first published: 2024-05-03)
281 reads
he rollback plan... what to do when things go wrong to get back to where you were before the deployment or implementation. I've seen too many cases where a...
2024-05-17 (first published: 2024-05-01)
297 reads
In information security (INFOSEC), there several foundational concepts and principles. One of the ones that’s introduced almost immediately is called the CIA triad or the Information Security Triad. While...
2024-05-13 (first published: 2024-04-26)
222 reads
As I look at the state of information technology today, I see one constant: rapid change. We all see it. While this is the type of post I would...
2024-05-08 (first published: 2024-04-22)
168 reads
pg_cron is a simple cron-based job scheduler for PostgreSQL that runs inside the database...
By Steve Jones
I heard someone say recently that you can’t change a primary key value in...
By Kevin3NF
Indexes 101: What, Why, and When? “What Is an Index?” I get this question...
Comments posted to this topic are about the item 50 Years of Microsoft
Comments posted to this topic are about the item Multiple Collations
Comments posted to this topic are about the item Retrieving Data Using the REST...
Can I have a collation expression like this in SQL Server 2022?
... WHERE ColumnA = ( 'abc' COLLATE French_CI_AS) COLLATE French_CS_AS ...See possible answers