Forum Replies Created

Viewing 15 posts - 5,221 through 5,235 (of 6,026 total)

  • RE: SQL server Architecture

    Here is another MSDN tool that provides a visual guide to drilling down on the SQL Server technology stack.

    Use these technical reference guides after you have made the conceptual architectural...

  • RE: Old, but stable

    Old.. stable.. reliable.. and too expensive to replace.. that sounds like a description for most of us SQL Server developers and DBAs who have worked with versions 6.5 - 2008....

  • RE: Old, but stable

    About four years ago, I was involved in a project to migrate several SQL Server 2000 databases to 2005. One of the 2000 servers hosted a database containing transactional records...

  • RE: Data Gravity

    Steve Jones - SSC Editor (3/7/2012)


    Eric M Russell (3/7/2012)


    I don't think a US corporation can avoid SOX or HIPAA regulations simply by locating their applications and/or data offshore.

    Hope not, but...

  • RE: Data Gravity

    Most companies won't bother trying to avoid laws like this right now, but at some point in the future, the cost of moving an application to another country might be...

  • RE: Three Attack Vectors in SQL Server 2005

    SSIS connections should be using Windows authentication and use the encrypted option. However, you can at least try locating any .dtsConfig and .dtsx files and looking for properties called "ConnectionString".

  • RE: Best approach to let users create and manage their own tables and data

    Lynn Pettis (3/6/2012)


    agustingarzon (2/29/2012)


    ...

    This would be fool proof, and monitored by DBAs for performance problems, but this is just a small project.

    ...

    I find this part the toughest. There really...

  • RE: Best approach to let users create and manage their own tables and data

    Eugene Elutin (3/6/2012)


    I would go with Eric M Russell's suggestion:

    Kill the project!

    Give your users MS Access if they want to abe able to create tables themselves.

    Unless we're talking about...

  • RE: Zettabyte

    It's expected that this year the amount of data stored and replicated will get to 255EB,

    Yeah, but what percentage of that data consists of porn, spam, and fragmented indexes?

  • RE: SELECT to transform a csv of INT into VARCHAR

    Henk Schreij (3/5/2012)


    What I learned from this discussion is: there is no easy 'set based' solution to the problem of unwrapping a csv with sql.

    (a solution, like the other...

  • RE: Code Scanning

    Steve Jones - SSC Editor (3/5/2012)


    Eric M Russell (3/5/2012)


    So you're saying that the project requirements should include a document or Excel sheet that explicitly list what accounts / roles should...

  • RE: When to use Transparent Data Encryption (TDE)?

    kilkenny (3/5/2012)


    I think you nailed it on the head. And in that case, the only protection is in the collaboration processes and making sure that people are handling data...

  • RE: When to use Transparent Data Encryption (TDE)?

    kilkenny (3/5/2012)


    Thanks everyone for the great insight. It seems in our situation that TDE is the best solution, aside from the performance hit to the server. The reason being...

  • RE: Code Scanning

    Steve Jones - SSC Editor (3/5/2012)


    @eric, not knocking your process in terms of what it does. I'm more concerned with the issue of actually understanding what permissions are granted and...

  • RE: Code Scanning

    Steve Jones - SSC Editor (3/5/2012)


    Eric M Russell (3/5/2012)


    Databases have a much smaller surface area for security breaches than do Web applications. For a database, you're basically concerned with how...

Viewing 15 posts - 5,221 through 5,235 (of 6,026 total)