My T-SQL contribution for this month discusses imposter syndrome. This month’s T-SQL Tuesday is hosted by Jon Shaulis. Jon invites us all to write about when we have seen, experienced, or overcome imposter syndrome. You can read more about the invite in detail by clicking on the T-SQL Tuesday logo. My Experience I’ve had my fair share of experiences with imposter syndrome in my career. My first time was when I first went on SQL Cruise, now called Tech Outbound, and I had the privilege to meet people like Aaron Bertrand, Grant Fritchey, Kevin Kline, etc.
You always think your environment is set up correctly and that you’re able to recover in case of a disaster. You make backups, test your backups, set up DR solutions, and in the end test the DR plan (very important). But have you ever considered a situation where all your data is unusable? If you get infected with ransomware, and the trojan gets a hand on your backups, all your precautions and preparations have been for nothing.
My T-SQL contribution for this month discusses why you should consider adopting SQL Server on Linux. This month’s T-SQL Tuesday is hosted by Tracy Boggiano. Tracy invites us all to write about what we think everyone should know when working with SQL Server on Linux, or anything else related to SQL running on Linux. You can read more about the invite in detail by clicking on the T-SQL Tuesday logo on the left.
I recently read an article about delegation of work and this gave me an idea of the yes/no e-mail and the rubber duck. What is this article about This article is about the delegation of work. When you manage a team you could get lots of e-mails from people asking all sorts of questions for you to figure out. Mostly those questions are along the line of “What do I need to do?
Recently a brand new command was released that could help you scan for PII (Personal Identifiable Information) in our databases. What Is Personally Identifiable Information (PII)? Personally identifiable information (PII) is like the name implies, data that can be used to identify a person. It is typically actively collected, meaning the information is provided directly by the individual. Here are a couple of identifiers that qualify as PII-based data: Name Email address Postal address Phone number Personal ID numbers (e.
I got involved in a discussion about open-source software. A maintainer of an open-source project handed over the reins to another person and the other person changed the software to include a coin/mining exploit. This got me thinking about the double-edged sword of open source. Where did open-source originate from? A little history lesson about open-source projects. Open-source came to be in 1998 when it was developed after Netscape’s announcement that the software for the Navigator software was going to be publicly released.