Hacking Data
A new series of attacks were proven recently using music files to attach embedded systems in cars. Could this be another attack vector that we need to worry about?
2015-12-22 (first published: 2011-03-23)
573 reads
A new series of attacks were proven recently using music files to attach embedded systems in cars. Could this be another attack vector that we need to worry about?
2015-12-22 (first published: 2011-03-23)
573 reads
2015-12-21
317 reads
Today we have a guest editorial from Andy Warren. We still have many applications runnning under sysadmin accounts, often "sa". Why do people do this? Andy has a few thoughts on the subject.
2015-12-21 (first published: 2011-05-04)
519 reads
2015-12-17
220 reads
2015-12-15
201 reads
This week Steve Jones looks at how we make secutiy decisions for our systems, and whether this is really the best way to do things.
2015-12-14
93 reads
2015-12-14
305 reads
This week Steve Jones wants to know if you have eventual consistency in your environment?
2015-12-11
243 reads
Steve Jones continues the never ending argument of whether software developers deserve the moniker of engineer.
2015-12-10
165 reads
2015-12-09
116 reads
By Brian Kelley
I mentioned this in my talk on Quantum Computing at the PASS Data Community...
By Brian Kelley
This was announced last week at Microsoft Ignite and it's been covered by others...
By Rayis Imayev
"Dave: Open the pod bay doors, HAL.HAL: I’m sorry, Dave. I’m afraid I can’t...
Comments posted to this topic are about the item The Ending Substring
Comments posted to this topic are about the item Done is Better than Good,...
Comments posted to this topic are about the item Configuring the On-Premises Data Gateway:...
In Azure SQL Database and SQL Server 2025, if I run this, what is returned?
SELECT '[' + SUBSTRING('Steve Jones', 7) + ']' See possible answers