When It’s Still Viable
If a technology is still viable, don’t overlook it. Don’t get caught up chasing the “shiny” or the “perfect” solution just because you can.
2024-10-08
9 reads
If a technology is still viable, don’t overlook it. Don’t get caught up chasing the “shiny” or the “perfect” solution just because you can.
2024-10-08
9 reads
I’m sick of meetings and I know many other folks are, too. Every time a knowledge worker (such as IT or cybersecurity but also business) has to go to...
2024-08-23 (first published: 2024-08-09)
358 reads
Just as it's important to take care of our physical health (and I'm guilty of neglecting that), it is important to take care of our mental health, too. Also,...
2024-06-10 (first published: 2024-05-20)
280 reads
Once upon a time, I used to think of difficult technical questions to ask candidates for a DBA position. However, over time I came to understand that in most...
2024-06-07 (first published: 2024-05-14)
406 reads
I did a post last month titled RTO and RPO are myths unless you've tested recovery, but I only briefly covered what RPO and RTO are. This post goes...
2024-05-31 (first published: 2024-05-10)
462 reads
Another security fundamentals topic is authentication versus authorization. For those who have a clear understanding of the difference between the two, like with Recovery Point Objective (RPO) vs. Recovery...
2024-05-24 (first published: 2024-05-03)
281 reads
he rollback plan... what to do when things go wrong to get back to where you were before the deployment or implementation. I've seen too many cases where a...
2024-05-17 (first published: 2024-05-01)
290 reads
In information security (INFOSEC), there several foundational concepts and principles. One of the ones that’s introduced almost immediately is called the CIA triad or the Information Security Triad. While...
2024-05-13 (first published: 2024-04-26)
221 reads
As I look at the state of information technology today, I see one constant: rapid change. We all see it. While this is the type of post I would...
2024-05-08 (first published: 2024-04-22)
168 reads
When I look at a system and think about its security model, the first thing I start poking around at is where I think security is weakest. For instance,...
2024-05-06
44 reads
The Distributed Availability Group Dashboard can be downloaded from our GitHub repo. https://github.com/SQLUndercover/UndercoverToolbox/blob/master/DAG%20Dashboard.pbix. This...
By Steve Jones
A customer asked if they needed to restore a database from backup to compare...
By Brian Kelley
If we aren't having the same conversation, we aren't going to be heard. That's...
Dear All, I am currently working on a Proof of Concept (POC) where I...
Hello, I would like to build a table capturing data starting from 1st day...
Comments posted to this topic are about the item Is GenAI Coming Faster Than...
I'm setting up a SQL Server 2019 instance and we are planning on using SMB storage for our database files. However, the file share isn't ready, so the idea is to use the \127.0.0.1dbfile as the location to start and then move these files to the remote server. Can I do this?
See possible answers