Is Perfect the Enemy of Good Enough in Software-Defined Networking?
Perfect is the enemy of good. That’s an old saying. Confucius (551-479 BC) said, “Better a diamond with a flaw than a pebble without.” Aristotle (384-322 BC) said something similar. Voltaire popularized the phrase in the 1770s. And maybe that’s where we are with SDN WAN. Software-Defined Networking and Wide Area Network Links Software-defined networking, […]
How to Use Temporal History in Oracle 12c to Track Changes Over the Lifetime of a Table
In this posting, we are continuing with the theme of Information Lifecycle Management (ILM). As mentioned in an earlier posting, there usually comes a point during the lifecycle of the data when it is no longer being regularly accessed: May be obsolete and is eligible for purging Might be needed in the future but could […]
What is the Role of a Business Analyst in Agile?
If you’re thinking that the Agile methodology doesn’t make clear the business analyst’s job…well, you’re not wrong. However, you may be looking in the wrong place. Learning Tree’s business analyst in Scrum course follows the Institute of Business Analyst’s when defining the role of “business analyst.” Drawing from the institute’s “A Guide to the Business Analysis Book […]
The Mirai Botnet and My Old Advice
Security expert and writer Brian Krebs was the victim of a distributed denial of service attack that used the Mirai botnet. His site discusses the source code used on the compromised computers. Others have provided analysis of the code. The software is used to infect Internet of Things or IoT devices. Examples include webcams, DVRs, […]
How to Overcome Training Budget Constraints
Don’t you wish your company allowed unlimited training opportunities to help you improve your technical and business skills? Well, that would be great, but most of us aren’t that lucky. Most companies have training budget limitations that force bosses to pick and choose. We all know training is extremely helpful for the continued growth of employees, which […]