Gatekeeping and Accessibility
In my final post about gatekeeping in technology, I have to come clean about something. Let’s go through this journey together. In the first post we spoke about what...
2019-09-25
13 reads
In my final post about gatekeeping in technology, I have to come clean about something. Let’s go through this journey together. In the first post we spoke about what...
2019-09-25
13 reads
In my home lab I have an Ubuntu virtual machine that runs both SQL Server 2017 and SQL Server 2019 in Docker containers. After SQL Server 2019 Release Candidate...
2019-09-18
55 reads
Recently I have become more vocal on Twitter and on my personal blog about my social activism. For the record, I have been an activist for LGBTQIA+ rights since...
2019-09-11
111 reads
In a previous post I wrote about storing password hashes in a database, which raises the question of how to convert an existing legacy password storage system to use hashes (or...
2019-09-04
22 reads
As regular readers of this blog will know, I’m a big fan of AzCopy, especially now that it has a sync option to keep local data synchronized with blob...
2019-08-28
1,549 reads
An exciting new feature in SQL Server 2019 is Accelerated Database Recovery (ADR). Resulting from a combination of magic beans and smart software developers (I might be wrong about...
2019-08-21
39 reads
Recently I wrote: Don’t store passwords in a database. I stand by this statement. I expected a lot of flak because I didn’t explain myself. This post goes into...
2019-08-14
290 reads
This is the second in a series of posts about gatekeeping in Information Technology and other fields. Negative terminology The language we use matters. In the first post I...
2019-08-07
15 reads
Hello, and welcome to today’s class on storing passwords in a database. Don’t store passwords in a database. Thanks for attending. Photo by James Sutton on Unsplash.
The post How...
2019-07-31
245 reads
This is the first in a series of posts about gatekeeping in Information Technology and other fields. I am not the first — nor will I be the last...
2019-07-17
45 reads
By Brian Kelley
In information security (INFOSEC), there several foundational concepts and principles. One of the ones...
By Steve Jones
the standard blues– n. the dispiriting awareness that the twists and turns of your...
By Chris Yates
A brief introduction to the tool and its advantages for database migrations DevOps is...
Comments posted to this topic are about the item One more reason to use...
I'm tracing activity on one database and would like to include the client_app_name in...
select Custno, Addr1, City, Res_Phone, Bus_Phone, Fax_Phone, Marine_Phone, Pager_Phone, Other_Phone, email1, email2 from customer...
I want to mark a transaction in the log as a recovery point. How do I do this in my code if I use the transaction, myTran?
See possible answers