Core Blog Author

Data Team

Data Protection
Security

6 Practical Data Protection Features in SQL Server (Pros & Cons)

Here's how we use the data protection features within SQL Server to protect confidential data and make it available to only those authorized to see it.
Getting started
Data Analytics

Realtime vs Near-Realtime Data: Pros and Cons

What factors go into handling these data sources? How do we process them? How do we provide data visualizations based on those sources to meet business needs?
cybersecurity myth tools
Cloud Deployment & Optimization

Machine Monitoring IoT Solution with Azure Services and Power BI

We custom-made an IoT framework with Azure components and Power BI to implement a scalable solution to source, stream and show machine performance in real-time.
looking up at buildings
Cloud Deployment & Optimization

How to Dynamically Scale an Azure SQL Database

By designing and implementing a dynamic scaling plan for your Azure solution, you can get the resources you need while reducing cost at the same time.
path through field
Data Analytics

7 Things to Remember When Setting Up Fuzzy Lookups

In my last post, I explained why I would want to use Fuzzy Lookups for my various matching needs. Now I want to explain the how.
Cloud Connectivity
Data Analytics

3 Steps to Implement AD Security for an On-Premises Data Gateway

The idea to implement AD groups was first realized when trying to dynamically populate O365 group membership, that can be done with PowerShell.
X