Data protection is a complicated endeavor. This is largely because IT is a complicated endeavor, and data protection involves backing up all the data from existing IT deployments while maintaining…
The collection of operational and and analytics information can be an addictive habit, especially in the case of an interesting and active network. However, this information can quickly and easily…
If you use ACID transactional databases, you’ve probably heard of lock wait timeouts and deadlocks. What are these? And how are they different? Inevitably, many of us will come across…
In part one of this series, we discussed the different types of databases available on the market today. In part two, we discussed how to choose the right database for…
The focus of data protection has changed. Backups and data recovery used to exist primarily to protect against human error or natural disaster. The focus was on recovering from an…
We’ve talked about building a culture, why it applies to all data environments, and some specific types of data protection features you should be considering. Today, we’ll be considering the culture of protection the…
In my last post, we talked about the different types of databases available on the market for you to choose from. With over 300 options, it is hard to know…
As I explained in previous posts on building a culture of data protection, we in the technology world must embrace data protection by design. To Reward, We Must Measure. How…
If you work in engineering or support, you’ve probably spent a lot of time troubleshooting things. You’ve probably spent just as much time trying to figure out why things were…
IEEE ProComm 2018 Recently, I attended the IEEE ProComm 2018 conference in Toronto. I had the opportunity to hear about research and ideas involving professional communication. This was exciting for…