Protecting Code
We not only need to protect our systems, but the source code as well. Not for IP reasons, but for security.
2019-08-28
242 reads
We not only need to protect our systems, but the source code as well. Not for IP reasons, but for security.
2019-08-28
242 reads
There is a page where GDPR fines are tracked. None of us want to get on that page.
2019-08-22
429 reads
2019-08-20
432 reads
2019-08-20
684 reads
2019-08-19
208 reads
A phishing attack is directed at engineers, but it could easily be pointed at IT pros.
2019-08-08
193 reads
2019-08-07
381 reads
Users cause lots of security issues, and we ought to try to work within that framework, with the understanding the we can't prevent all problems.
2019-08-01
208 reads
Ransomware is becoming a bigger and bigger problem. Steve has some thoughts on how you should think about security in your database environment.
2019-07-15
351 reads
Learn how we can generate tokens that will give access to resources inside Azure without actually adding new users to your domain.
2019-07-01
2,669 reads
By Brian Kelley
If you are considering any of the ISACA AI certs like the Advanced Artificial...
By ChrisJenkins
Are you currently using Microsoft Fabric or considering migrating to it? If so, there...
By SQLPals
Track SQL Server Configuration Changes Using the Error Log If you...
WhatsApp:0817866887 Jl. Sunset Road No.88B, Kuta, Kec. Kuta, Kabupaten Badung, Bali 80113
Tlp/Wa_Cs:0817-866-887 Jl. Raya Puputan No.10, Panjer, Denpasar Selatan, Kota Denpasar, Bali 80226
Tlp/Wa_Cs:0817-866-887 Jl. Pangeran Diponegoro No.15, Petisah Tengah, Kec. Medan Petisah, Kota Medan, Sumatera Utara...
In the Database Engine, when a deadlock is detected, what does the detection interval shrink to (in time)?
See possible answers