Security Leaks from Websites
No matter what we do to secure our databases, we need to be sure our applications are well written, both with secure coding, but also good information handling.
2016-08-23
112 reads
No matter what we do to secure our databases, we need to be sure our applications are well written, both with secure coding, but also good information handling.
2016-08-23
112 reads
Many of us would like to be sure we could rollback changes made during a deployment if they caused issues. Steve Jones notes that it might not be worth actually building those scripts in advance.
2016-08-22
496 reads
2016-08-22
94 reads
A smoke test can be a good way to ensure complex systems are working as expected after maintenance or changes.
2016-08-19
952 reads
The way that governments build software and work with data must change if we want to be more efficient.
2016-08-18
59 reads
2016-08-16
120 reads
Phil Factor explains why data detached from its temporal context often loses all meaning.
2016-08-15
85 reads
2016-08-15
84 reads
Today we have a guest editorial from Andy Warren as Steve is on vacation. Andy talks about a trip to Microsoft for the SQL Server 2016 launch.
2016-08-12
149 reads
A story I heard a long time ago reminds us to choose what is really important.
2016-08-11
115 reads
By Steve Jones
I coach volleyball and I do a lot of stat stuff on paper. I...
By Steve Jones
dolorblindness – n. the frustration that you’ll never be able to understand another person’s...
By Steve Jones
I had a customer ask about analyzing their Test Data Manager (TDM) usage to...
Is there a good syllabus for reading these two together? (Yes, it's called the...
Comments posted to this topic are about the item GPX distance and time analysis...
Comments posted to this topic are about the item The DBA is Dead; Long...
In SQL Server 2025, if I want to remove an IP from a listener, what do I do?
See possible answers