Forum Replies Created

Viewing 15 posts - 3,976 through 3,990 (of 6,035 total)

  • RE: Monitoring After Deployment

    Below is a script I use to quickly zip through every database, looking for objects that have been created or modified in the past 24 hours. In addition to running...

  • RE: Your Cloud Held Hostage – Could It Happen?

    Gary Varga (4/17/2015)


    So we need to consider the failing of aspects of SLAs which might be too risky to ignore.

    Just as the IT department has SLAs with their clients, the...

  • RE: QA for Data

    John Hanrahan (4/16/2015)


    I am a one stop shop so I have no one to check up on me. Almost always I create a backup of the table, do a...

  • RE: QA for Data

    But the important thing to understand is that any scenario where data in production needs to be "fixed", the root cause is a defect or missing functionality in the application,...

  • RE: QA for Data

    Where I work, a data analyst interfaces with the end user to determine what (if anything) needs to be updated, inserted, or deleted. If they decide to proceed forward with...

  • RE: The Opportunistic Hacker

    Steve Jones - SSC Editor (4/15/2015)


    Eric M Russell (4/15/2015)


    Walking around with your organization's production data, financial spreadsheets, or work email on your laptop is dumb in an age where VPN...

  • RE: The Opportunistic Hacker

    jay-h (4/15/2015)


    Eric M Russell (4/15/2015)


    Walking around with your organization's production data, financial spreadsheets, or work email on your laptop is dumb in an age where VPN is an option and...

  • RE: The Opportunistic Hacker

    Walking around with your organization's production data, financial spreadsheets, or work email on your laptop is dumb in an age where VPN is an option and wifi is widely available.

  • RE: The Opportunistic Hacker

    syoc (4/14/2015)


    Anyone use a bait computer, leave the table, stare at it from a crack in the bathroom door waiting for it to be taken so you can tackle the...

  • RE: The Opportunistic Hacker

    Leveraging something like a botnet or backdoor trojan, a hacker doesn't even need physical access to the laptop to get at your files. The type of security threats that keep...

  • RE: Truncate table failing (intermittently), no errors presenting.

    Consider setting up an audit event, DDL trigger, or profiler trace to keep track of when exactly a truncate operation is performed on this table. The simplist explanation is that...

  • RE: Converting date column that is a varchar data type to a datetime data type

    Sigerson (4/9/2015)


    ZZartin (4/3/2015)


    Quick question Grant, how many times have you seen systems/processes fail on the 13th of the month? I can count a good handful.

    In my last job I managed...

  • RE: Your Cloud Held Hostage – Could It Happen?

    I hear that Bruce Willis is making a 6th 'Die Hard' movie about an aging night shift security guard at Windows Azure data center that gets held hostage by a...

  • RE: Your Cloud Held Hostage – Could It Happen?

    Wayne, I guess what you're saying is that you don't trust your Cloud provider's ISP, because your own local ISP can't be trusted. However, one advantage to geo-location, aside from...

  • RE: Incremental Load

    RonKyle (4/7/2015)


    in the real world this typically ends up being a type 1, 2, or 3 slowly changing insert / update

    How does it end up being a type 3? ...

Viewing 15 posts - 3,976 through 3,990 (of 6,035 total)