Private enterprises and public organizations have sought the expertise of database administration professionals to provide widespread connectivity between mobile devices and central databases. The prevalence of the cloud has fostered interest in integrating tablets and smartphones into the workplace and has given executives the ability to view market changes in real-time.
The role of the chief information officer in the United States health care industry is expected to grow over the next couple of years. In response to the Affordable Care Act, U.S. hospitals, insurance providers and health clinics are transitioning to a value-based care delivery system that will force them to seek more efficient ways to provide services. Hospital CIOs are being viewed as transformative elements. Administrators are seeking ways to change facility operations instead of simply maintaining them.
Do you ever click on a bookmark to find that the website is no longer available? That scenario was the inspiration for my first post. I was posed a question regarding setting up maintenance tasks for SQL Server Express Edition and my bookmark no longer worked. Luckily, I already had a local copy of the script and its usage, but I wanted to ensure that the solution can be easily found by others. You can find an executable of Jasper Smith’s original ExpressMaint utilities for SQL Server 2005/2008/2008 R2 here: http://expressmaint.codeplex.com/. Because there have been no recent updates, I have done so and made some modifications to it. This new script can be downloaded here.
Delivering affordable care to patients remains a daunting task for many in the health care industry. Some hospitals have invested in more advanced technology and insurance companies have assembled packages that look more appealing. All of this looms over the Affordable Care Act and what it means for the industry as a whole. In search for cost efficiency, hospitals and government officials are turning to networking services and remote database support to optimize patient-to-doctor communication.
Perhaps one of the most prohibitive aspects of cloud services is the perception that network security suffers when compared to on-premise IT solutions that keep data within direct owner control. However, industry leaders are now seeing more opportunity than ever with regard to the security capabilities of the cloud, reaffirming the technology as a force to be reckoned with in the coming years. As cloud protection measures become more substantial and reliable, companies that remain skeptical of the movement will find themselves quickly left behind if they don't adapt soon.
Database and operating system administrators are ultimately responsible for guaranteeing the quality of their organization’s information processing environments. From protecting against unauthorized access to providing 24x7 availability – “the buck stops with the support unit.” Although the database infrastructure (DB binaries, O/S, hardware) doesn’t change much, there is one component that usually changes a lot – the application. This blog post provides readers with helpful hints and tips on application change management best practices.
Now that mobile device management is making a name for itself as a primary pillar of enterprise IT, businesses and service providers alike are searching for the best way to prioritize mobility and get the most out of personal devices in the workplace. Approaches have ranged from free-form bring-your-own-device implementation to strict, software-based device management platforms and everything in between, but there is still work to be done before mobile earns its place as a must-have component of any company regardless of sector or trade.
Operating through an on-premise data center is gradually becoming less attractive to company executives constantly bombarded with sentiments praising the operational capabilities of the cloud. As a result, many are considering making the transition to the environment, but lack the resources required to do so.
Business leaders who have dabbled in bring-your-own-device and mobile device management strategies are well aware of the powerful benefits afforded by the technology, but few have taken full advantage of the movement due to shaky employee compliance, a lack of dedicated software and a host of IT security concerns. However, there is no better match for the business world than that of mobile and cloud services, and companies are beginning to realize this as personal devices take the spotlight in many of 2014's cloud-based offerings.
As database administration services have helped maintain business information capacity, the programs necessary for harvesting big data and making sense of it all are growing to be of equal demand. Mapping consumer purchase trends and surpassing competitors is possible with the assistance of data analytics tools.
Harnessing predicative analytics software often necessitates the use of database support services. An incredible amount of information that could be used to charter market events and consumer trends is now flowing into businesses' data centers quicker than ever, requiring a stable environment.
The 21st Century is revolutionizing the way people consume information. It's not uncommon for elementary school students to learn about their surroundings through websites, which are constantly maintained by remote database services. Many constituents often look to government entities, such as the Treasury Department, to provide facts and statistics that are held in complex data centers.
Open-source software is nothing unusual in the world of IT, and its success is beginning to make an impact on the datacenter hardware landscape. A few years ago it would seem highly unlikely that any major database provider would open source its architecture and allow access to a boundless community of users, but according to BusinessCloudNews, Microsoft recently announced that it would be teaming up with Facebook on its Open Compute Project (OCP). Not only is this a significant event for one of the world's leading IT enterprises, but industry analysts are predicting that it will lead to a variety of advancements in cloud and web-scale computing and encourage other major providers to do the same.
Multi-platform database support has been renowned for its ability to provide businesses with the infrastructure necessary to maintain vast amounts of information and operate applications that improve day-to-day office functions. Now, the United States federal government has expressed interest in harnessing database capabilities to maintain records.
With concern for IT security comes assumptions of on-premise databases, cloud computing and the "Big Brother" syndrome that has possessed United States enterprises and citizens. Because data is collected over an incredibly versatile range of sources, constituents are concerned over whether or not their information is exempted - especially on a cloud platform.
Although cloud migration appears to be the biggest trend in business optimization, in-house databases are adapting to the shifting technological climate. The increased complexity of these intricate infrastructures means that enterprises are looking for database administration professionals to manage their systems off-premise. This outsourcing strategy provides corporations with the ability to consolidate their resources towards delivering their services to customers, and lets remote management teams focus on supporting the operations.
For my first blog post, I decided to write about a cool little project that came across my desk a few months ago. The request was to create a SSRS report that could be used to insert records to a database by supplying the user with dropdown parameter values from a list of tables. With a simple stored procedure, you can easily set up a report to insert records to a table, but there was an added requirement for the user to be able to select the site (database) that the values should come from. As the user needed to be able to select the site first, the rest of the parameters needed to be set up depending on which value they selected. You can set up the data sources dynamically using a couple different techniques, but I’ll explain how I approached it.
By now, consumers and business leaders alike should know of the pressing threat that cyberattackers pose to retailers and financial institutions across the world. Following the major breaches at Target and Neiman Marcus this past holiday season, IT decision-makers are scrambling to reevaluate and strengthen their security measures to minimize the likelihood of a harmful attack on their organizations. But while security strategists know that they must take action to avoid the fate of losing customers' data by the millions, the workings of the point-of-sale (POS) malware that executed last year's attacks are still unknown to many. PCWorld pointed to "ChewBacca" malware as the primary variant responsible for the unprecedented magnitude of these incidents.
The past couple of years have brought considerable investment in telecommunication technologies and remote access applications. Being able to work from home when hazardous weather doesn't permit travel gives both private enterprises and public organizations the benefit of delivering service to customers and constituents. Privacy concerns have accompanied this convenience, driving interest in mobile device management software capable of preventing cyberattacks.
Since mobile technology first came on the scene as a business tool years ago, thought leaders across industries have been extolling the virtues of its capabilities. Businesses were rightfully excited about the possibilities that this highly agile platform could bring to the table, allowing workers to email on the go and remain an active participant in company operations regardless of geographical location. Of course, mobile has come a long way since its origins with antennae-laden cell phones and greyscale personal organizers, but there are still a few concerns that are keeping it back from reaching its full potential.
There is no denying the great range of benefits that a business can reap from implementing mobile devices into its strategies, but without a dedicated security plan to accompany the decision it can be extremely risky, especially for firms that handle a lot of personal financial information. With data breaches occurring more frequently year after year, IT leaders need to be extra cautious when proceeding with mobile integration and bring-your-own-device (BYOD) or potentially suffer the consequences of a cyberattack that could compromise company secrets and customer data or harm internal network processes.
While IT departments are often exclusively given the burden of handling database quality measures, maintaining a consistently effective network security strategy is the responsibility of everyone within an organization, especially those in executive positions. Not only are these individuals calling the shots when it comes to devising and implementing these plans, but they need to recognize their influence as role models in the corporate structure. In other words, employees are less likely to follow security protocols if upper-level management is shirking their obligations to adhere to those same policies. With the recent spike in data breaches and other high-profile cyberattacks on retail and financial firms worldwide, there is no better time for the C-suite to get themselves in line with best security practices.
Here at RDX, I’ve been focused on the Big Data/NoSQL sphere, as we have recently begun offering Hadoop solutions to our clients. I wanted to take a few moments to highlight some of the skills useful for integrating Big Data solutions – they may not be what you expect!
It is no secret that data breaches are one of the greatest IT security concerns in today's digital landscape. Falling victim to a large-scale attack such as the ones sustained this past year by retailers Target and Neiman Marcus can not only be instantly damaging to a company's reputation, but may continue to wreak havoc on an organization that leaves vital customer financial information exposed to malicious parties. CBS MoneyWatch recently explored the prolonged concerns that come with a data breach in a world reliant on the convenience of e-commerce.
Security breaches are quickly moving from unwanted possibilities to realities in the health care landscape as organizations continue to struggle when combating next-generation risks. Specifically, security-related incidents, data loss and unexpected outages cost U.S. hospitals approximately $1.6 billion per year, with exposure expenses exceeding $810,000 per incident.
The power, efficiency and life span of a company's data centers each play a big role in determining the overall effectiveness of an IT strategy. From the ground up, businesses need to implement their storage in a way that will give users fast access to information while remaining stable and resistant to network threats. But while IT security concerns have received the spotlight in recent news reports in the wake of the Target and Neiman Marcus data breaches, IT leaders cannot overlook the importance of maintaining company technology assets as a preventive measure against network shut-downs, poor performance and the yearly wear and tear of computer systems.
While the protection of internal data such as employee records, financial information and company secrets has to rank high in companies' lists of IT security concerns, customer credit card numbers have to be prioritized, considering the high-profile breaches that have lately cluttered headlines. Recently, retailers have been especially prone to having their customers' information compromised, as a Reuters report revealed that malicious software known as "ChewBacca" was implemented by a cybercriminal ring, targeting several brands and stealing data from 49,000 payment cards, according to cybersecurity research firm RSA FirstWatch.
I have been working as a DBA for RDX (Remote DBA Experts) for a few years now. At this point in my career, I believe it’s time to start giving back to the SQL community. I have commonly seen many misunderstand how the Lookup task in SSIS actually works. The Lookup task does work as a join method. However, the Lookup task actually is going to pull back only the top matching record from the defined Lookup task in your SSIS package.
IT departments these days are often just as, if not more, concerned with the security measures taken to protect their company's data than they are optimizing their databases for speed and efficiency. With the increasing complexity and frequency of cyberattacks over the past few years, this pattern is certainly warranted. The consequences of a high-profile breach can not only compromise vital company data and the private information of employees and clients, but also severely damage the reputation of an organization, making it difficult to recover. Government spying is also a concern, and business leaders want to ensure that their operations remain in total privacy.