Viewing 15 posts - 466 through 480 (of 6,032 total)
I'm guessing you're talking about a database modeling or entity relationship diagram (ERD) tool. I don't know of an extension for SSMS or Visual Studio, but there is a tool...
August 8, 2019 at 1:37 pm
When it comes to hacks against corporate or government targets, it is entirely plausible that in many cases the public disclosure itself is of more importance to the hacker than...
August 7, 2019 at 1:33 pm
.. The downside of chaining to slack and then Pagerduty is that is Slack is down, what happens? It's not often Slack goes down, but with my prior luck,...
August 5, 2019 at 5:30 pm
I believe you have two issues:
(1) Your SSIS package(s) are probaly logging a tremendous amount of event detail.
(2) The above has caused your SSISDB database to swell and then the...
August 5, 2019 at 2:52 pm
Synonyms can be useful for whomever created them, but confusing for others who stumble across them by accident. It depends on the purpose, but I prefer views instead.
August 5, 2019 at 1:40 pm
Yes, setting up an event monitoring solution is phase 1. The next phase is setting a solution for alerting, collaboration, triage, and incident workflow. Historically, we had error and threshold...
August 5, 2019 at 1:34 pm
If this user is to have only reader access going forward, then I would suggest changing the owner of the schema to someone else, like DBO.
ALTER AUTHORIZATION ON SCHEMA::schema_name TO...
August 2, 2019 at 1:26 pm
I guess the problem with users as it relates to security and deployments would be that: if a process is not simple, then they won't follow it. So the solution...
August 1, 2019 at 1:46 pm
Just out of curiosity, how does Microsoft inform someone they have been awarded MVP status?
July 30, 2019 at 1:30 pm
Back in the 1950s, it was predicted that mass produced frozen TV dinners would enable most Americans to purchase homes without kitchens and restaurants would be obsolete. While technically possible,...
July 22, 2019 at 3:03 pm
One design pattern is to separate the PII database from the operational database using a service oriented architecture and that PII database could even be hosted by a 3rd party...
July 17, 2019 at 4:03 pm
For a highly selective and sensitive database, something like AIDS patients or voter records, address should be protected. Not only can it be used in conjunction with other public databases...
July 17, 2019 at 1:51 pm
So, how is it possible that an employee (even an IT administrator) clicking on an executable attachment can somehow wipe out the bulk of the organization's databases, network file shares,...
July 16, 2019 at 2:32 pm
Steve, your final point about how the insurance industry can help stimulate the progress of enterprise IT security is a good one. It's essentially the same same concept as the...
July 16, 2019 at 2:16 pm
I know I'm not a Villain, but I'm not sure where I fall on the spectrum between Hero versus Anti-Hero.
https://writerswrite.co.za/heroes-and-anti-heroes-whats-the-difference/
How far I'm willing to go beyond the call of duty...
July 11, 2019 at 5:49 pm
Viewing 15 posts - 466 through 480 (of 6,032 total)