Viewing 15 posts - 3,976 through 3,990 (of 6,035 total)
Below is a script I use to quickly zip through every database, looking for objects that have been created or modified in the past 24 hours. In addition to running...
April 17, 2015 at 8:11 am
Gary Varga (4/17/2015)
So we need to consider the failing of aspects of SLAs which might be too risky to ignore.
Just as the IT department has SLAs with their clients, the...
April 17, 2015 at 7:42 am
John Hanrahan (4/16/2015)
April 16, 2015 at 10:33 am
But the important thing to understand is that any scenario where data in production needs to be "fixed", the root cause is a defect or missing functionality in the application,...
April 16, 2015 at 9:26 am
Where I work, a data analyst interfaces with the end user to determine what (if anything) needs to be updated, inserted, or deleted. If they decide to proceed forward with...
April 16, 2015 at 7:23 am
Steve Jones - SSC Editor (4/15/2015)
Eric M Russell (4/15/2015)
April 15, 2015 at 11:47 am
jay-h (4/15/2015)
Eric M Russell (4/15/2015)
April 15, 2015 at 9:52 am
Walking around with your organization's production data, financial spreadsheets, or work email on your laptop is dumb in an age where VPN is an option and wifi is widely available.
April 15, 2015 at 9:20 am
syoc (4/14/2015)
April 14, 2015 at 10:22 am
Leveraging something like a botnet or backdoor trojan, a hacker doesn't even need physical access to the laptop to get at your files. The type of security threats that keep...
April 14, 2015 at 9:54 am
Consider setting up an audit event, DDL trigger, or profiler trace to keep track of when exactly a truncate operation is performed on this table. The simplist explanation is that...
April 13, 2015 at 7:43 am
Sigerson (4/9/2015)
ZZartin (4/3/2015)
Quick question Grant, how many times have you seen systems/processes fail on the 13th of the month? I can count a good handful.
In my last job I managed...
April 10, 2015 at 8:16 am
I hear that Bruce Willis is making a 6th 'Die Hard' movie about an aging night shift security guard at Windows Azure data center that gets held hostage by a...
April 8, 2015 at 3:23 pm
Wayne, I guess what you're saying is that you don't trust your Cloud provider's ISP, because your own local ISP can't be trusted. However, one advantage to geo-location, aside from...
April 8, 2015 at 10:23 am
RonKyle (4/7/2015)
in the real world this typically ends up being a type 1, 2, or 3 slowly changing insert / update
How does it end up being a type 3? ...
April 7, 2015 at 2:47 pm
Viewing 15 posts - 3,976 through 3,990 (of 6,035 total)