Monthly Archives: December 2011

The Data Resolutions

Making a new year’s resolution is an annual tradition for many people on January 1. Breaking those resolutions seems to be another annual tradition that often takes place during the month of January as we struggle to live up to … Continue reading

Posted in Editorial | Tagged , , | 2 Comments

How Many Calls? Part 2

I wrote recently about a report that a friend of mine needed from his Access database. In the first post, I used a CTE and an outer join to cull together some data, however since I wasn’t sure Access would … Continue reading

Posted in Blog | Tagged , ,

The Year in Review – 2011

It’s the end of the year, and I’m taking a look back at 2011 from the data perspective. As we close out the year, it’s apparent that “big data” has been catching on with many companies. It seems that every … Continue reading

Posted in Editorial | Tagged

Data and Privacy

Recently there’s been quite an outcry over Carrier IQ’s software, which is on many smartphones and allows keystroke logging and capture of almost anything you do on your phone and transmit. Google’s Eric Schmidt condemned the use of the software, and … Continue reading

Posted in Editorial | Tagged

Merry Christmas 2011

Merry Christmas and Happy Holidays. The Voice of the DBA Podcasts Enjoy the blooper reel Watch the Windows Media Podcast – 21.3MB WMV  Watch the iPod Video Podcast – 15.2MB MP4 

Posted in Editorial | Tagged ,

Backing up the Service Master Key

Making a backup of your Service Master Key (SMK) should be one of the first things that you do if you are enabling encryption. This key encrypts and secures your other keys, and it will be needed when you have … Continue reading

Posted in Blog | Tagged , , ,

All I want for Christmas

It’s the Christmas holiday, and many of you might be already out celebrating and away from work this week. Today is usually a day off for many companies, with last minute preparations for the celebrations this weekend. Those of us … Continue reading

Posted in Editorial | Tagged

How many calls – A T-SQL Question

I got a call from a friend recently that was looking for some query help. He was actually using Access, which I haven’t used in years. He knew a little T-SQL, so he could convert anything I gave him to … Continue reading

Posted in Blog | Tagged , , | 6 Comments

Pride and Security

The weakest link in most security schemes is the human. We know that there are regular breaches of trust by employees, mistakes made (fat fingers, misconfigurations and more), and supposed favors done by someone with trusted access that send data … Continue reading

Posted in Editorial | Tagged ,

Publishing in the Future

A few interesting ideas and experiments in this piece on 21st century publishing. I especially like the part about most of the money in publishing going to pay for these advances that aren’t earned back. While publishers make a lot … Continue reading

Posted in Blog | Tagged