Patch Your Samba Servers or Risk a Worse Version of WannaCry
The big cybersecurity news of the past couple of weeks has been the WannaCry worm. It took advantage of some rather old bugs, dating back to Windows XP and Windows Server 2003. We got lucky! The vulnerability, the problems in the targets, allowed unlimited abuse. But the exploit, the attackers’ code, had a built-in “kill […]
The Benefits of Microsoft Office Document Versioning
Two ways to achieve Microsoft Office Document Versioning Have you ever worked for long hours on a document only to lose all of the changes you recently made to it? I believe that has happened to everyone at some point in the past whether it be with Word, Excel, or PowerPoint documents. Traditionally people save […]
Is Perfect the Enemy of Good Enough in Software-Defined Networking?
Perfect is the enemy of good. That’s an old saying. Confucius (551-479 BC) said, “Better a diamond with a flaw than a pebble without.” Aristotle (384-322 BC) said something similar. Voltaire popularized the phrase in the 1770s. And maybe that’s where we are with SDN WAN. Software-Defined Networking and Wide Area Network Links Software-defined networking, […]
How to Use Temporal History in Oracle 12c to Track Changes Over the Lifetime of a Table
In this posting, we are continuing with the theme of Information Lifecycle Management (ILM). As mentioned in an earlier posting, there usually comes a point during the lifecycle of the data when it is no longer being regularly accessed: May be obsolete and is eligible for purging Might be needed in the future but could […]
What is the Role of a Business Analyst in Agile?
If you’re thinking that the Agile methodology doesn’t make clear the business analyst’s job…well, you’re not wrong. However, you may be looking in the wrong place. Learning Tree’s business analyst in Scrum course follows the Institute of Business Analyst’s when defining the role of “business analyst.” Drawing from the institute’s “A Guide to the Business Analysis Book […]