Inspiring global thought leaders at Tallan’s headquarters, the Hartford Power BI User Group’s very own Michael Thomas took the #2 spot in his global debut! Data & Analytics is an area that maintains its voice in the industry, as well as in our relationship with Microsoft and a part of that relationship involved the work Tallan has done historically with Power BI; a Microsoft visual analytics platform and tool. To spread the word on Power BI, as well as encourage the community of users and those interested, Tallan has been hosting Hartford, CT’s local Power BI User Group.
People are welcome to attend for the refreshments and stimulating conversation, however the focus of these monthly meetings is to showcase the features and capabilities of the tool and collaborate with like, and different minded people on how to utilize Power BI.
What is SSIS?
SSIS, or SQL Server Integration Services, is a tool for data migration most commonly utilized to create and maintain a data warehouse.
Migrating data is generally done with a process known as an ETL (Extract, transform, and load). This involves ingesting data from one or more source(s), converting it to the desired format and finally sending it to a destination that is often a data warehouse.
An SSIS project is broken down into smaller units of work called packages that are executed individually. Packages are typically organized and grouped according to their destination, such as the table they are loading data into, rather than their sources. This is because a package may create all of the necessary output for a single table in a data warehouse while coming from multiple sources.
Different parts of an SSIS package include:
Connection(s): sources and destinations…
What Are Advanced Persistent Threats?
Advanced Persistent Threats (also known as APTs) are prolonged targeted cyberattacks. Such attacks are carried out by a well-funded (typically state-sponsored) group of highly skilled hackers who have high aspirations. Typically, APTs involve the creation of custom attacks that specifically target the victim’s network/machine. APTs primarily target government agencies, defense contractors, manufacturers of products, vendors, and partners of a primary target, and companies with intellectual property. The Stuxnet worm is a good example of such an attack. It is believed to have been created by the NSA, CIA, and Israeli intelligence. It was discovered in 2010 and was responsible for destroying several centrifuges at Iran’s Natanz uranium enrichment facility. The worm would search infected computers for signs of Siemens Step 7 software (used on industrial computers serving as PLCs), if found, it would update its code…
In Azure Cosmos DB, partitioning is what allows you to massively scale your database, not just in terms of storage but also throughput. You simply create a container in your database, and let Cosmos DB partition the data you store in that container, to manage its growth.
This means that you just work with the one container as a single logical resource where you store data. And you can just let the container grow and grow, without worrying about scale, because Cosmos DB creates as many partitions as needed behind the scenes to accommodate your data.
These partitions themselves are the physical storage for the data in your container. Think of partitions as individual buckets of data that, collectively, is the container. But you don’t need to think about it too much, because the whole idea is that it all just…
Azure Cosmos DB is Microsoft’s globally distributed, massively scalable, horizontally partitioned, low latency, fully indexed, multi-model NoSQL database.
If you start to elaborate on each of the bullet points in this soundbite opening, there’s a lot to discuss before you get to “multi-model NoSQL” at the tail end. Starting with “globally distributed,” Cosmos DB is – first and foremost – a database designed for modern web and mobile applications, which are (typically) global applications in nature. Simply by clicking the mouse on a map in the portal, your Cosmos DB database is instantly replicated anywhere and everywhere Microsoft hosts a data center (there are nearly 50 of them worldwide, to date). This delivers high availability and low latency to users wherever they’re located.
Cosmos DB also delivers virtually unlimited scale, both in terms of storage – via server-side horizontal partitioning, and throughput…
Developers with a background in relational databases are accustomed to achieving data integrity using transactions. Once a writer updates a bank balance and commits the transaction, it’s entirely unacceptable for a reader to ever be served the previous value, and a relational database ensures that this never happens. In the NoSQL world, this is referred to as strong consistency. Achieving strong consistency in a NoSQL database is more challenging because NoSQL databases by design write to multiple replicas. And in the case of Azure Cosmos DB, these replicas can be geographically spread across multiple Microsoft data centers throughout the world.
First, let’s understand consistency within the context of a single data center.
In one Azure data center, your data is written out to multiple replicas (four at least). Consistency is all about whether or not you can be sure that the data…
Welcome to part two of Exploring Buffer Overflows in C! If you have not taken the time to read the previous article I highly recommend doing so before going any further. In this post, I will be walking you through a simplified version of a buffer overflow exploit and will draw heavily on the vocabulary and theory discussed out in the last post. You can find Part One on Tallan’s Blog here. It also would be helpful to be familiar with hexadecimal numbers, which you can read about here. With that out of the way, let’s get to hacking.
Before We Begin
Before we can start we have to pick a target. Several methods exist to detect potential buffer overflows, ranging from manually reading the code to automated testing. Assuming you do have the source code of a program, searching for insecure…
Cybersecurity is one of the fastest evolving tech fields and the stakes are high. Mistakes can be in the order of millions of dollars. Computers have invaded all aspects of our everyday lives. Although this means I can access millions of cat pictures with the touch of a button, it is dangerous to assume that everyone using a computer is in it for the fuzzy felines. Credit cards, passwords, and social security numbers are moving across the internet just as quickly as cat pictures but with a lucrative black market. There is a lot to gain from a successful hack and hackers will be doing their best to break into the systems we rely on and use daily. Ranging from high-tech exploits such as 2018’s Spectre and Meltdown to low-tech exploits like phishing and social engineering, it is important for…
Let’s jump right back into the thick of this topic. In the first part of this blog series, we discussed why insurers should be empowering their customers to complain in fairly general terms. Check out the link to our Decision Maker’s Guide to Complaint Enablement for more background on this topic.
This post dives deeper into a few key metrics: retention rates, customer lifetime value, and quantity of feedback gathered. To do so, we’ll take a look at the financial impact of non-complainers. While you read, it may also be helpful to consider whether you are currently measuring or utilizing any data to achieve similar goals.
Before getting to specifics, here’s a quick recap of what was covered last time:
J.D. Power’s 2018 research tells us that the industry average score for providing a satisfying purchase experience is 839 out of 1,000.1
For most Microsoft IT professionals, migrating or updating a native mode SQL Server Reporting Services (SSRS) installation from one version to another is a rare, if not once-in-a-lifetime, event – and probably one you would prefer a root canal to. Because software upgrades of all types tend to get postponed as long as possible, if you find yourself finally tasked with such an upgrade, several unpleasant things are likely true:
The effort is in crisis mode, driven by software (SSRS, OS) going off support, hardware becoming unreliable, or a line-of-business application that must itself be upgraded but cannot be until SSRS is.
The current installation was not done by you and whomever did is long gone, so you are not that familiar with it and would frankly rather not be. SSRS is not your “thing”.
The current installation is poorly documented, if at…