Director of SQL Technologies

Jeff Jones

 "It is my goal to create a positive learning environment, facilitate the learning experience, provide guidance in problem solving and introduce students to additional resources for continuing education."

Biography

MCT, MCDBA, MCSE, Advanced Teradata Certified Professional and State of Arizona Certified Community College Instructor
Career Highlights:
  • Over thirty (30) years as an IT Professional in the role of DBA, Product Manager, Database System Consultant, Software Development Manager, Database Systems Technical Support Manager and Technical Instructor
  • Instructor specialization includes SQL Server (Programming, Administration and Data Warehousing) including SQL Query Optimization, Index Tuning, System Tuning, Security Administration, SSIS Package Design, Star Schema Design and Multidimensional Cube Design. SQL Language/Query Design and Development
  • Managed the development of the first parallel relational database system on Unix
  • Provided product support during the implementation of one of the largest data warehouses
  • Vendor representative on the ANSI SQL committee during development of the ANSI SQL-92 standard and SQL Access Group that standardized database interoperability protocols

Blog

Capture a Windows Image with ImageX – Simplified

Posted July 21, 2014

A recent email from a former student asked, “ Is it possible to have you show me how to capture an image using Imagex?” My first thought was ‘Happy to aim you in the proper direction’. This is easy – … Continue Reading

Do Not Rely on PDF Document Security

Posted July 16, 2014

The scenario is simple enough. You need to share some information, a document, with a friend or coworker. You want them to read the document, but not alter or print it. You don’t want them to copy the text or … Continue Reading

Schedule SFC scan NOW!

Posted July 14, 2014

With the recent (May 2014) occurrence of a significant Windows Internet Explorer bug, we are reminded of the potential for Windows OS intrusion and damage. No matter how proactive we become, cyber criminals will continue to pursue efforts to intrude, … Continue Reading