With this glut of data, new analytics and Business Insight (BI) software have been developed to enable businesses to access previously unavailable data. Ten years ago, BI projects garnered little attention and investment compared to other enterprise systems like CRMs.
With changes often needed around security to ensure people have access, how does an organisation ensure who has what level of access? How can you identify potential security threats? The answer is to review or audit the security of your SQL Server environment on a regular basis. Here’s our suggestions for what to consider including in a SQL security audit:
Last week I spent some time judging the final presentations for the Information Systems Consulting course at QUT. I am part of the QUT Alumni and it was good to spend some time back where I first gained an interest in Information Technology. The students had a fictious customer project where they needed to design a marketing solution and present this to their cohort.
Over the last few days my daughter has been in hospital with repository issues. The last time I spent any time in a hospital was when my wife gave birth to this bundle of joy in the same hospital 19 months ago. In this time the technology in the hospital has changed dramatically, with each nurse now empowered with a mobile phone running a number of health applications to measure and capture vital statics.
This week I have joined the WARDY IT Solutions team at SQLBits in Manchester to launch SQL Beacon in EMEA. SQL Beacon™ is the underlying technology that powers our award-winning Virtual DBA service.
Whether a business has its doors open or not, they are still a 24×7 operation with systems that need to run, overnight processes and websites to take orders. The database environment underpins these operations and it’s vital these critical systems are effectively managed, no matter what time of the day or night.