Keyboard Hardlines
The potential vulnerabilities of wireless devices might be a security issue for databases.
2016-08-10
103 reads
The potential vulnerabilities of wireless devices might be a security issue for databases.
2016-08-10
103 reads
When do you have too much data? What do you do if you aren't actually using all of it?
2016-08-09
81 reads
The complexity of tables makes modifying them over time a challenge, especially as data sizes grow.
2016-08-08
62 reads
This week Steve Jones looks at a new idea, rating the security of products publicly to try and shame vendors into more secure coding.
2016-08-08
89 reads
Too many failovers can cause problems, as can those that happen to often. Steve Jones says you need to consider whether you always need to failover in a sitaution.
2016-08-05
169 reads
2016-08-04
224 reads
It's possible to change a software development team and dramatically improve things. Steve Jones highlights an example from Redgate Software.
2016-08-02
93 reads
2016-08-01
66 reads
Passwords are a problem, especially when we're in a hurry. What should we do?
2016-08-01
88 reads
This Friday Steve Jones talks SQL Saturdays and asks how far you've traveled to attend one.
2016-07-29
95 reads
By Steve Jones
I coach volleyball and I do a lot of stat stuff on paper. I...
By Steve Jones
dolorblindness – n. the frustration that you’ll never be able to understand another person’s...
By Steve Jones
I had a customer ask about analyzing their Test Data Manager (TDM) usage to...
Is there a good syllabus for reading these two together? (Yes, it's called the...
Comments posted to this topic are about the item GPX distance and time analysis...
Comments posted to this topic are about the item The DBA is Dead; Long...
In SQL Server 2025, if I want to remove an IP from a listener, what do I do?
See possible answers