Once upon a time, I used to think of difficult technical questions to ask candidates for a DBA position. However, over time I came to understand that in most...
2024-06-07 (first published: 2024-05-14)
419 reads
I did a post last month titled RTO and RPO are myths unless you've tested recovery, but I only briefly covered what RPO and RTO are. This post goes...
2024-05-31 (first published: 2024-05-10)
497 reads
I have found that non-functional requirements (NFRs) can be hard to define for a given solution. I’ve seen teams struggle with NFRs. However, to ensure I’m speaking the same...
2025-01-01 (first published: 2024-05-08)
670 reads
Another security fundamentals topic is authentication versus authorization. For those who have a clear understanding of the difference between the two, like with Recovery Point Objective (RPO) vs. Recovery...
2024-05-24 (first published: 2024-05-03)
294 reads
he rollback plan... what to do when things go wrong to get back to where you were before the deployment or implementation. I've seen too many cases where a...
2024-05-17 (first published: 2024-05-01)
353 reads
Microsoft Fabric is the new data offering in Microsoft Azure and there is a great deal of interest in it. How do you get started? Where are the tutorials?
2024-12-23 (first published: 2024-04-29)
808 reads
In information security (INFOSEC), there several foundational concepts and principles. One of the ones that’s introduced almost immediately is called the CIA triad or the Information Security Triad. While...
2024-05-13 (first published: 2024-04-26)
244 reads
As I look at the state of information technology today, I see one constant: rapid change. We all see it. While this is the type of post I would...
2024-05-08 (first published: 2024-04-22)
186 reads