Category: Database




author:

Database DevOps Networks Security Systems

Happy IT Pro Day!


As we all know, lists and their thinly-veiled derivatives, listicles, drive social media. Post the “top 5 kinds of belly button lint” and you’ll probably get at least a few clicks from people with 5 minutes and nothing better to read. One of the …



author:

Database

Seeing the Big Picture: Give Me All of the Data


The collection of operational and and analytics information can be an addictive habit, especially in the case of an interesting and active network. However, this information can quickly and easily overwhelm an aggregation system when the constant fire hose of information begins. Assuming the …



author:

Database Security

Data Protection: Culture, Tools, People, and Roles


In my previous posts about Building a Culture of Data Protection (Overview, Development, Features, Expectations), I covered the background of building a culture.  In this post, I’ll be going over the data protection tools, people, and roles I recommend to successful organizations. Tools Given the volume and …


author:

Database

The Hidden Costs of Backup Software


The focus of data protection has changed. Backups and data recovery used to exist primarily to protect against human error or natural disaster. The focus was on recovering from an accidental deletion or salvaging company data after a data center burned down. Today, data …


author:

Database

Culture of Data Protection: What Your Customers Expect


We’ve talked about building a culture, why it applies to all data environments, and some specific types of data protection features you should be considering.  Today, we’ll be considering the culture of protection the actual owners of the data (customers, employees, vendors, financial partners, etc.) expect from your …