The topic of essential versus accidental complexity goes back to ancient Greece in a classification from Aristotle. But we can go just 30 years back instead of 3000 to find it well illustrated in software development, by Fred Brooks, a Turing award winner. In his 1987 essay “No Silver Bullet” he introduces two concepts, essential complexity and accidental complexity. Essential complexity is inherent to the problem the software needs to solve and cannot be removed.
Well, 2020 is behind us, although it hardly feels like it. Economies around the world, barring China, are under-performing. Various countries have flirted with reopening only to have a new wave of coronavirus spike causing them to fallback. Technology thrives and online has become just about the only line available.
Ben Coan is a business development manager with Odyssey Information Services. Ben’s ability to develop long-lasting professional relationships has driven him to fully understand his clients’ technology needs and provide them with the best solutions. In addition, he has more than 20 years of experience in providing HPE NonStop support solutions for companies in oil and gas, healthcare, retail, banking, and financial services.
In past years, prior to deploying an application, significant time and effort was expended in gathering requirements to produce a design. The design was completed up front, before any code was written or database schema created. Furthermore, the design was comprehensive and static – it was expected to be viable for years without requiring significant modifications. When changes eventually were needed, they became a major redesign effort that often impacted multiple facets of the application and database. None of this was completed quickly, or without risk.
With 2020 finally, in the books, it’s time to look forward and discuss our cybersecurity predictions that will most affect the industry in 2021. I thought long and hard about what I could say that would be impactful and hasn’t been said before. Obviously, COVID-19 and its security ramifications will continue to stay with us for 2021 and well beyond.
On an HPE NonStop system, this transaction log is maintained by the HPE NonStop Transaction Management Facility (TMF) subsystem, and is known as the TMF Audit Trail (TMF AT). Data managed in this way by TMF are known as audited files, or audited data (conversely, non-audited-files and non-audited data).
Databases and servers operated by enterprises today are large and complex. Every business is transforming, and data is the lifeblood of every organization. The growth of data and its importance has been a top executive priority. Equally important: Grappling with top technology trends such as analytics, AI, IoT, containers, VR/AR, and cloud/edge computing—all of with the common denominator of being data-driven. Learn how HPE NonStop SQL Cloud Edition is up to the challenge.