Forum Replies Created

Viewing 15 posts - 466 through 480 (of 6,026 total)

  • Reply To: Deny Permissions to Schema Owner (assign read only) and deny to Linked Servers

    If this user is to have only reader access going forward, then I would suggest changing the owner of the schema to someone else, like DBO.

    ALTER AUTHORIZATION ON SCHEMA::schema_name TO...

  • Reply To: The Problem with Users

    I guess the problem with users as it relates to security and deployments would be that: if a process is not simple, then they won't follow it. So the solution...

  • Reply To: More MVPs Than Awards

    Just out of curiosity, how does Microsoft inform someone they have been awarded MVP status?

  • Reply To: An Age of AI?

    Back in the 1950s, it was predicted that mass produced frozen TV dinners would enable most Americans to purchase homes without kitchens and restaurants would be obsolete. While technically possible,...

  • Reply To: The Changing Nature of Data

    One design pattern is to separate the PII database from the operational database using a service oriented architecture and that PII database could even be hosted by a 3rd party...

  • Reply To: The Changing Nature of Data

    For a highly selective and sensitive database, something  like AIDS patients or voter records, address should be protected. Not only can it be used in conjunction with other public databases...

  • Reply To: Ransomware and DevOps

    So, how is it possible that an employee (even an IT administrator) clicking on an executable attachment can somehow wipe out the bulk of the organization's databases, network file shares,...

  • Reply To: Ransomware and DevOps

    Steve, your final point about how the insurance industry can help stimulate the progress of enterprise IT security is a good one. It's essentially the same same concept as the...

  • Reply To: Learning to Stop Being a Hero

    I know I'm not a Villain, but I'm not sure where I fall on the spectrum between Hero versus Anti-Hero.

    https://writerswrite.co.za/heroes-and-anti-heroes-whats-the-difference/

    How far I'm willing to go beyond the call of duty...

  • Reply To: Waking Up to No Support

    SQL Server itself is a very stable and secure product. Unfortunately, it sits on top of Windows. When operations has WSUS auto scheduling Windows updates on a database server, I've...

  • Reply To: Waking Up to No Support

    Fortunately, most of the major 3rd party applications in use today are hosted in the cloud by the vendor themselves, rather than the IT organization hosting them on-premises. Huge monolithic...

  • Reply To: Building Helpful Commit Messages

    The problem is that many organizations simply deploy a VCS solution and then put out the word that everybody should start using it. But it's not just another developer tool,...

  • Reply To: Fines for Data Access

    It wouldn't surprise me if the department staff improperly accessing DMV records were also selling the data to third parties like private investigators, skip tracers, and law firms. Cell phone...

  • Reply To: Fines for Data Access

    I doubt that this one specific female employee was an isolated target. The people doing this have probably been routinely accessing DMV records for hundreds or thousands of women over...

  • Reply To: Organisations and Technical Apartheid

    If you have an IT organization where departments (ie: developers and DBAs) are physically or culturally isolated, then conflict is only temporary. What it becomes over time is a cold...

Viewing 15 posts - 466 through 480 (of 6,026 total)