Australia is currently putting into place has passed a law that would make it possible for the government to compel “backdoors” and access to even encrypted and secure systems. The reporting is all over the place on the details about this and what it means (but here’s a link to the actual law), but the basics are that the government will be […]
Author: Stephen Wynkoop
Catch-22 For Data Use Transparency
As different systems roll out to use different data sets, a trend is emerging – that trend is using data in ways we never thought possible, in seeing trends across data sets and between solutions – things that we never imagined having relationships suddenly start to show relationships. Sounds like a dream come true – our hard-fought battles with SQL […]
Environment normalization and challenges
When you start working in the cloud, you end up making choices, of course, for how you want to implement things. If you look at options for your SQL Server, there are more than a few different ways to approach that type of implementation. From virtual machines and container-oriented configurations to Software and Platform as a service to fully managed […]
Who Decides What’s Good Enough for Data?
We are working with a software solution and setting up the SQL Server and general installation configuration for this environment and I stumbled on something that really caught my attention. They were describing their security (all because SQL Server was involved, not because of their configuration and installation options by the way) and one of the qualifications of their security […]
Multi-Database Solutions
tl;dr There is no easy answer. But it’s important. It can be really challenging to work efficiently in a world where not only is the hosting environment typically a hybrid of on-site, off-site, public and private cloud configurations, managed and self-managed services… but also where you have multiple databases gathering different bits of information and you’re in a position to […]
SQL Injection – More tools…
It’s incredible to me when you sit and watch the injection attempts against your public web properties. I realize that most are bot-oriented attempts, that there aren’t people sitting at the other end of most of those connections (no one types that stuff in, give me a break)… but still, someone felt that was a better use of their time […]
Weird Shift Going on with Data Reputation
There’s an odd thing happening with data. I say “odd” but really it’s expected I suppose with the privacy concerns, privacy mandates and wild-wild-west of managing information that we’re all facing right now. With so many new regulations, so many new expectations, and so much fear about data mis-use, I suppose it’s probably to be expected. Essentially, when I talk […]
Beware the Complacency of “It just works”
For awhile now, things have been getting very stable, very reliable and the workloads of managing data are even beginning to split. Some of the management is being done by outside folks, some by automated processes and, overall, things run extremely well. It’s led to a bit of a strange trend in systems we’ve been reviewing. “Strange” because it seems […]
Cloud Services a Commodity?
We have a number of services that are hosted with cloud providers – from this site’s hosting to our virtual event platform and others, it’s interesting to see cloud evolve and provide some killer support for deploying cool solutions. One of the things that we’ve been seeing more and more though is a “yeah, us too!” type of approach to […]
Interesting: Data Bread Lines
In reading through a post about a book that’s out about managing and living with data, there were some very interesting observations outlined. Things that are pretty apparent as you work through systems at companies with many different sources of information and raw data. The post was a book excerpt, from “Winning With Data” (Wiley). If you think about it, […]