Viewing 15 posts - 451 through 465 (of 6,022 total)
"..It is somewhat odd that so many of the opinion-formers on the technology of the IT industry have so little experience working in the industry as technologists. Few other professions...
August 12, 2019 at 1:34 pm
Most phishing scams are automated and impersonal, while other scams hit closer to home. For example, last year my grandmother got a call from a guy pretending to...
August 9, 2019 at 8:47 pm
This is just based on my personal perspective, but today in 2019, I wouldn't invest in an on-prem home lab. For my personal PC, I prefer a smaller notebook, and...
August 9, 2019 at 2:01 pm
Most phishing scams are automated and impersonal, while other scams hit closer to home. For example, last year my grandmother got a call from a guy pretending to be me....
August 8, 2019 at 5:27 pm
Sadly, there are some crooks directing folks to fake Equifax settlement websites.
https://www.consumer.ftc.gov/blog/2019/07/equifax-data-breach-beware-fake-settlement-websites
August 8, 2019 at 5:03 pm
I'm guessing you're talking about a database modeling or entity relationship diagram (ERD) tool. I don't know of an extension for SSMS or Visual Studio, but there is a tool...
August 8, 2019 at 1:37 pm
When it comes to hacks against corporate or government targets, it is entirely plausible that in many cases the public disclosure itself is of more importance to the hacker than...
August 7, 2019 at 1:33 pm
.. The downside of chaining to slack and then Pagerduty is that is Slack is down, what happens? It's not often Slack goes down, but with my prior luck,...
August 5, 2019 at 5:30 pm
I believe you have two issues:
(1) Your SSIS package(s) are probaly logging a tremendous amount of event detail.
(2) The above has caused your SSISDB database to swell and then the...
August 5, 2019 at 2:52 pm
Synonyms can be useful for whomever created them, but confusing for others who stumble across them by accident. It depends on the purpose, but I prefer views instead.
August 5, 2019 at 1:40 pm
Yes, setting up an event monitoring solution is phase 1. The next phase is setting a solution for alerting, collaboration, triage, and incident workflow. Historically, we had error and threshold...
August 5, 2019 at 1:34 pm
If this user is to have only reader access going forward, then I would suggest changing the owner of the schema to someone else, like DBO.
ALTER AUTHORIZATION ON SCHEMA::schema_name TO...
August 2, 2019 at 1:26 pm
I guess the problem with users as it relates to security and deployments would be that: if a process is not simple, then they won't follow it. So the solution...
August 1, 2019 at 1:46 pm
Just out of curiosity, how does Microsoft inform someone they have been awarded MVP status?
July 30, 2019 at 1:30 pm
Back in the 1950s, it was predicted that mass produced frozen TV dinners would enable most Americans to purchase homes without kitchens and restaurants would be obsolete. While technically possible,...
July 22, 2019 at 3:03 pm
Viewing 15 posts - 451 through 465 (of 6,022 total)