Forum Replies Created

Viewing 15 posts - 166 through 180 (of 390 total)

  • RE: Deleting Data

    Like Tim Berners-Lee, I find the "right to be forgotten" law in Europe to be dangerous.

    I find the lack of the law to be dangerous.

    Individuals have a right to...

  • RE: Overcoming Proposal Objections

    Where we fail in communicating is in a lack of understanding of the business’ goals and objectives and how we can integrate our solutions into those goals and objectives. ...

  • RE: The 2014 PASS Summit Report - Day 1

    Waiting to hear a complete report on the 'Seattle Underground' tour! 😉

  • RE: Have You Been Hacked?

    Our spies are so terrifying they work in...The Doughnut!!!

    I suppose it's marginally more terrifying than if they were working at Toad in the Hole.

  • RE: Have You Been Hacked?

    arnipetursson (10/30/2014)


    Don't think they are just rumors....;-)

    Well, that hardly seems sporting of them. The PRC talks peace buts seems to be preparing for war -- cyberwar.

  • RE: Have You Been Hacked?

    Occasionally I expose the 1433 port on a SQL server instance to the outside world for testing purposes.

    Every time within ~12 minutes I see failed sa login attempts and buffer...

  • RE: Have You Been Hacked?

    Can't afford irony, only the top .01 in 'Merica can and they have hidden most of it in off-shore accounts...

    'Sall right, mate, everyone outside of London is broke, too.

  • RE: Have You Been Hacked?

    Imagine having 100 former "script kiddies" all tethered together along a stretch of highway in the New Mexico desert, digging ditches for fibre optic cable. Let them do that every...

  • RE: Have You Been Hacked?

    Me: However, even 'more secure' operating systems such as Linux have exploitable vulnerabilities.

    ChrisN: I disagree. And Linux isn't more secure than Windows. (OpenBSD might be...)

    The reason more secure was placed...

  • RE: Have You Been Hacked?

    chrisn-585491 (10/30/2014)


    As IT professionals, we shall do our best, of course, but we are essentially in a reactive position.

    We could use programming languages to build our operating systems that are...

  • RE: Have You Been Hacked?

    I don't know how our profession will move forward in the future to meet these needs. Perhaps we'll become bonded like locksmiths. Perhaps we'll be bound by insurance requirements to...

  • RE: RegEx for DBAs

    David Poole wrote:

    I had two specific projects that involved parsing and extracting content from HTML, XML and MS Word documents then converting them into content fragments within a content management...

  • RE: A few reflections on security by a weary application developer

    My view of the 'security goons'.

    Signed,

    An applications development manager

  • RE: Bronze Age Development<!-- 864 -->

    Ed Wagner (8/21/2014)


    Eric M Russell (8/21/2014)


    If sufficient functional requirements are not provided upfront, then all these "fixes" in production are really just change requests and phase I, II, ~ deployments....

Viewing 15 posts - 166 through 180 (of 390 total)