Forum Replies Created

Viewing 15 posts - 331 through 345 (of 6,022 total)

  • Reply To: Detecting Logins

    A few years back, I wrote a PowerShell script that queries login and permissions across 100+ servers. It's scheduled daily summarizes the data into SCD2 type tables for use in...

  • Reply To: Moving in the Post Pandemic World

    But what's the point in moving? You can't run from the virus, small towns can have a higher risk of spread than cities, and if you wait it out, the...

  • Reply To: Keeping Your Staff

    One aspect to this that doesn't get mentioned very often is that pensions don't exist in IT - or at least it doesn't here in the US private sector, so...

  • Reply To: Can You Catch SQL Injection?

    Hackers who leverage SQL injection are sort of like "office creepers", I suspect that they don't know exactly what they're looking for, so you're looking for activity that's out of...

  • Reply To: What's the Bus Factor?

    If one DBA gets hit by a bus, then it's a tragedy. Twice, it's a disturbing coincidence. But after the third time, the police show up and start asking questions....

  • Reply To: Summer Reading

    Michael Crichton wrote some near-future thrillers that were well thought out, prophetic, and a good read. Stuff about the potential uses and abuses of technology like genetic engineering and nanites.

  • Reply To: The Challenge of Audio Data

    When I'm on a Zoom call, I'll first dial in using my iPhone and use that for voice, and then I'll dial in from my laptop and use that for...

  • Reply To: Attacks on Unsecured Databases

    "Imagine that you're a researcher doing some data analysis for your company. You run some queries or load some data and then go home. The next day, you come in...

  • Reply To: A Data Attack

    Perhaps it's best for a cloud enabled application provider like Garmen to host their cloud data with a 3rd party provider like Azure or Amazon who specialize in that service....

  • Reply To: The Computing Revolution

    skeleton567 wrote:

    ...

    Agreed and true, Eric.  Just be sure to keep up the original skill sets in case some new job opportunity should require them.   When things become too easy, we...

  • Reply To: Follow Wheaton's Law

    Back in '80s and early '90s, conspiracy theorists or folks with extreme political views were ignored, and if they did something to cross the line, they were locked away -...

  • Reply To: The Computing Revolution

    skeleton567 wrote:

    From my admittedly aging perspective, I think sometimes the best 'revolution' is to go back and rethink and simplify things and make sure we are doing this the best,...

  • Reply To: Primary keys for an OLTP database

    Bryant McClellan wrote:

    What I haven't seen in this conversation is any control for uniqueness.

    ... How will you control uniqueness assuming that you find it incorrect to have a line item billed...

  • Reply To: Hacking the Admin

    Inserting, updating, or deleting rows in a table shouldn't be a routine function of a database sysadmin. So, perhaps the all-powerful SYSADMIN role itself should be deprecated or DML permission...

  • Reply To: Why Billing Will Be Part of Our Job

    In a traditional on-prem IT department, compute and storage are a capitalized expense (CapEx), so if  $500,000 is spent on a shiny new data warehouse server, then management wants to...

Viewing 15 posts - 331 through 345 (of 6,022 total)