Forum Replies Created

Viewing 15 posts - 4,846 through 4,860 (of 6,035 total)

  • RE: The Agile Cult

    You can call your process whatever you want, but what really matters are requirements, ticketing of tasks and bugs, source control, peer review of code, seperate dev / qa,...

  • RE: Password Ninjas

    Steve Jones - SSC Editor (7/19/2013)


    djackson 22568 (7/18/2013)


    Unmentioned in the article is an issue the industry needs to address, which is that a lot of vendors develop software that requires...

  • RE: Error inserting data with T-sql

    jdbrown239 (7/18/2013)


    Thanks

    Thanks Sean that worked. I also found that substring worked too.

    update XDDDepositor

    SET XDDdepositor.WBeneName = Vendor.RemitName,

    XDDDepositor.WBeneAddr = SUBSTRING( Vendor.RemitAddr1,0, 35),

    XDDDepositor.WBeneAddr2 = SUBSTRING( Vendor.RemitAddr2, 0 , 35),

    XDDDepositor.WBeneCity = Vendor.RemitCity,

    XDDDepositor.WBeneState = Vendor.RemitState,

    XDDDepositor.WBeneZipPostal...

  • RE: Password Ninjas

    In addition to protecting login credentials of accounts, another layer of security is at the firewall configuration level with IP blocking. That way, even if someone finds a sticky note...

  • RE: Data Philanthropy

    The best service that data professionals can do for the benefit of mankind is to keep the database locked down and secure.

  • RE: Data Philanthropy

    Obviously this concept of data philanthropy, sharing corporate data with the world for the good of hunamkind, should be left up executive management. Please run it past your boss first.

  • RE: Hack Resistant?

    Based on news stories, it seems to me that the vast majority of data breaches, and the ones that the most massive in scale, are the result of inadequate role...

  • RE: The Desktop

    anon_tyrant (7/15/2013)


    RDP is the real tool, laptop is only needed if you need to connect somewhere besides home or work. I finish up work at 5, go home and...

  • RE: The Desktop

    I have a beefy desktop sitting under a rarely used desk, and I VPN into that from a laptop. Thanks to VPN, the laptop is a cheap $350 model and...

  • RE: Reporting on Data

    phonetictalk (7/9/2013)


    I'm surprised (or I'd be surprised) that there isn't a way to automatically audit Excel sheets for these sorts of mistakes. I know Excel will highlight if a formula...

  • RE: Reporting on Data

    In addition to formulas not being replicated properly, another problem is when a cell that appears to contain a numeric value is treated as text by Excel, because it contains...

  • RE: Your Frame of Reference

    Somewhat related... Oracle has a feature called "Flashback" that leverages the transaction log to query the state of data for any table at a point in time using the "AS...

  • RE: Better Technical Interviews

    Where I work, we don't hire entry level developers straight out of university, or at least not on the database side. Every interview I've participated in has been with candidates...

  • RE: Better Technical Interviews

    Ed Wagner (6/27/2013)


    I like the idea of having interviewers conduct interviews of some existing employees. We have to be able to separate a strong candidate who interviews poorly from...

  • RE: More Data Security Issues

    djackson 22568 (6/26/2013)


    Eric M Russell (6/26/2013)


    I don't think that Microsoft can be faulted for insecure data. The database, network, and operating system framework that Microsoft has provided us is solid...

Viewing 15 posts - 4,846 through 4,860 (of 6,035 total)