Security Basics: Defense-in-Depth
In my security presentations, another basic I talk about is defense-in-depth. The idea here is to produce multiple layers of...
2009-04-28
4,237 reads
In my security presentations, another basic I talk about is defense-in-depth. The idea here is to produce multiple layers of...
2009-04-28
4,237 reads
I'm finally getting around to answering this one originated by Chris Shaw (@SQLShaw), as I was tagged by Jack Corbett...
2009-04-27
729 reads
C# MVP Chris Eargle (@kodefuguru on Twitter), who is also an INETA community champion and president of the Columbia Enterprise...
2009-04-24
1,006 reads
The standard best practice answer when it comes to connecting to SQL Server is to use Windows authentication. However, SQL...
2009-04-24
3,805 reads
Log File Sizes:
It's not unusual to see cases where database backups are taken from production and restored to a development or QA environment....
2009-04-23
1,343 reads
When it comes to logins to SQL Server, there are basically 3 types:
SQL Server-based loginsWindows user accountsWindows security groupsThe latter...
2009-04-22
6,931 reads
When I discuss SQL Server security, one of the basic concepts I concentrate on is the difference between logins and...
2009-04-21
22,733 reads
In the course of giving my security presentations over the past year, I've learned that quite a few folks have...
2009-04-20
9,094 reads
I was talking with a gentleman last night after the Greater Charleston .NET User Group about career development. He's not...
2009-04-17
788 reads
Next week I'll be giving presentations in Charleston and in Florence here in South Carolina.
Tuesday, April 14, 2009 - Pee Dee...
2009-04-07
630 reads
By Steve Jones
I have a presentation on finding balance in your career that got quite a...
By Brian Kelley
But as I've matured over the years, I came to realize that I needed...
By alevyinroc
I will be presenting my latest session, Documenting Your Work for Worry-Free Vacations, in-person...
I have a table with latitude longitude in the format. 45.123456 , -111.123456 ,...
Team, I'm trying to figure out what will be the best recommendation to configure...
Comments posted to this topic are about the item A Fun Computer Quote
Which movie featured this quote?
"All programs have a desire to be useful."Happy April Fools! See possible answers