Forum Replies Created

Viewing 15 posts - 3,976 through 3,990 (of 6,038 total)

  • RE: The Opportunistic Hacker

    Given the scenario, I'd leave power cord, mouse, umbrella, coffee, and egg bagel at the table, but not my laptop. It's too easy to just unplug and pack it with...

  • RE: Your Cloud Held Hostage – Could It Happen?

    Gary Varga (4/17/2015)


    Eric M Russell (4/17/2015)


    Gary Varga (4/17/2015)


    So we need to consider the failing of aspects of SLAs which might be too risky to ignore.

    Just as the IT department has...

  • RE: Monitoring After Deployment

    Some ALTER DATABASE operations can clear the buffer and procedure cache, so that can also explain a brief period of higher physical reads and CPU immediately following a deployment.

  • RE: Monitoring After Deployment

    Below is a script I use to quickly zip through every database, looking for objects that have been created or modified in the past 24 hours. In addition to running...

  • RE: Your Cloud Held Hostage – Could It Happen?

    Gary Varga (4/17/2015)


    So we need to consider the failing of aspects of SLAs which might be too risky to ignore.

    Just as the IT department has SLAs with their clients, the...

  • RE: QA for Data

    John Hanrahan (4/16/2015)


    I am a one stop shop so I have no one to check up on me. Almost always I create a backup of the table, do a...

  • RE: QA for Data

    But the important thing to understand is that any scenario where data in production needs to be "fixed", the root cause is a defect or missing functionality in the application,...

  • RE: QA for Data

    Where I work, a data analyst interfaces with the end user to determine what (if anything) needs to be updated, inserted, or deleted. If they decide to proceed forward with...

  • RE: The Opportunistic Hacker

    Steve Jones - SSC Editor (4/15/2015)


    Eric M Russell (4/15/2015)


    Walking around with your organization's production data, financial spreadsheets, or work email on your laptop is dumb in an age where VPN...

  • RE: The Opportunistic Hacker

    jay-h (4/15/2015)


    Eric M Russell (4/15/2015)


    Walking around with your organization's production data, financial spreadsheets, or work email on your laptop is dumb in an age where VPN is an option and...

  • RE: The Opportunistic Hacker

    Walking around with your organization's production data, financial spreadsheets, or work email on your laptop is dumb in an age where VPN is an option and wifi is widely available.

  • RE: The Opportunistic Hacker

    syoc (4/14/2015)


    Anyone use a bait computer, leave the table, stare at it from a crack in the bathroom door waiting for it to be taken so you can tackle the...

  • RE: The Opportunistic Hacker

    Leveraging something like a botnet or backdoor trojan, a hacker doesn't even need physical access to the laptop to get at your files. The type of security threats that keep...

  • RE: Truncate table failing (intermittently), no errors presenting.

    Consider setting up an audit event, DDL trigger, or profiler trace to keep track of when exactly a truncate operation is performed on this table. The simplist explanation is that...

  • RE: Converting date column that is a varchar data type to a datetime data type

    Sigerson (4/9/2015)


    ZZartin (4/3/2015)


    Quick question Grant, how many times have you seen systems/processes fail on the 13th of the month? I can count a good handful.

    In my last job I managed...

Viewing 15 posts - 3,976 through 3,990 (of 6,038 total)