Microsoft CRM Security Internals
On the Microsoft Dynamics CRM Team Blog, Jay Grewal has posted information about the CRM Security Model Internals.
CRM is...
2007-04-09
1,637 reads
On the Microsoft Dynamics CRM Team Blog, Jay Grewal has posted information about the CRM Security Model Internals.
CRM is...
2007-04-09
1,637 reads
This is just frightening. A piece of a beer can, a pair of pliers, and the combo lock pops open.
...
2007-04-07
1,499 reads
Like many other SQL Server focus area, SQL Server Samples has its own blog. A recent post there indicates that...
2007-04-06
1,416 reads
The Cuckoo's Egg by Clifford Stoll has been around for a while, having been published in 1989. It details how...
2007-04-06
1,654 reads
First saw this at Blade Watch. VMWare has released a white paper on using SANs with VMWare ESX Server 3.0....
2007-03-20
1,490 reads
I've taken some time to update my website. In particular I have updated:
ArticlesReading ListChess Reading List
Nothing fancy or special, but...
2007-03-20
1,342 reads
Saw this on the Windows PowerShell blog:
Since W2K3 SP2 is an update to W2K3 SP1, if you install Powershell on...
2007-03-19
2,544 reads
Saw this first here: SQL Server 2005 Security Best Practices. It's on the blog for Microsoft UK's SQL Server Premier...
2007-03-19
1,871 reads
Animals are near and dear to my heart, to the point where I have a cat even though I am...
2007-03-17
1,343 reads
I'm working on a new article for SQL Server Central talking about physical security and SQL Server and I was...
2007-03-17
1,356 reads
By Steve Jones
Redgate Monitor has been able to monitor replication for a long term, but it...
By Steve Jones
Superheroes and saints never make art. Only imperfect beings can make art because art...
One feature that I have been waiting for years! The new announcement around optimize...
Comments posted to this topic are about the item Think LSNs Are Unique? Think...
Comments posted to this topic are about the item The AI Bubble and the...
In SQL Server 2025, how many columns can be included in a Primary Key constraint?
See possible answers