Forum Replies Created

Viewing 15 posts - 5,236 through 5,250 (of 6,034 total)

  • RE: Best approach to let users create and manage their own tables and data

    Eugene Elutin (3/6/2012)


    I would go with Eric M Russell's suggestion:

    Kill the project!

    Give your users MS Access if they want to abe able to create tables themselves.

    Unless we're talking about...

  • RE: Zettabyte

    It's expected that this year the amount of data stored and replicated will get to 255EB,

    Yeah, but what percentage of that data consists of porn, spam, and fragmented indexes?

  • RE: SELECT to transform a csv of INT into VARCHAR

    Henk Schreij (3/5/2012)


    What I learned from this discussion is: there is no easy 'set based' solution to the problem of unwrapping a csv with sql.

    (a solution, like the other...

  • RE: Code Scanning

    Steve Jones - SSC Editor (3/5/2012)


    Eric M Russell (3/5/2012)


    So you're saying that the project requirements should include a document or Excel sheet that explicitly list what accounts / roles should...

  • RE: When to use Transparent Data Encryption (TDE)?

    kilkenny (3/5/2012)


    I think you nailed it on the head. And in that case, the only protection is in the collaboration processes and making sure that people are handling data...

  • RE: When to use Transparent Data Encryption (TDE)?

    kilkenny (3/5/2012)


    Thanks everyone for the great insight. It seems in our situation that TDE is the best solution, aside from the performance hit to the server. The reason being...

  • RE: Code Scanning

    Steve Jones - SSC Editor (3/5/2012)


    @eric, not knocking your process in terms of what it does. I'm more concerned with the issue of actually understanding what permissions are granted and...

  • RE: Code Scanning

    Steve Jones - SSC Editor (3/5/2012)


    Eric M Russell (3/5/2012)


    Databases have a much smaller surface area for security breaches than do Web applications. For a database, you're basically concerned with how...

  • RE: DBCC Transaction Logs - How to read/interpret

    GilaMonster (3/5/2012)


    Eric M Russell (3/5/2012)


    If you're thinking about implementing some solution that involves auditing events, then consider extended events.

    Though since this is the SQL 2000 forum, it needs mentioning that...

  • RE: DBCC Transaction Logs - How to read/interpret

    Klarence A. (3/1/2012)


    Hi Guys,

    How to read/interpret the transaction logs displayed by DBCC command? can I convert the records into human readable format? If so, how?

    Thanks in advance!

    If you're in some...

  • RE: Need an alternative way for using parameters in views

    mikemartineac (3/4/2012)


    Hello,

    In a stored procedure, I have a view as my data source. Unfortunately, views restrict the use of parameters. In my case, I need to get a value into...

  • RE: When to use Transparent Data Encryption (TDE)?

    Perry Whittle (3/4/2012)


    kilkenny (2/27/2012)


    My company has been getting a lot of requests from our clients to put into place more stringent security practices. I just received the word from...

  • RE: Best approach to let users create and manage their own tables and data

    agustingarzon (2/29/2012)


    We are going to develop a project where clients will be able to Create their own SQL tables and fields.

    The idea is to give the client the possibility...

  • RE: Code Scanning

    Databases have a much smaller surface area for security breaches than do Web applications. For a database, you're basically concerned with how accounts, role membership, or object permissions have changed,...

  • RE: The Cloud is good for your career

    I ran across a piece that surveyed some salaries and it shows that people working with cloud platforms are commanding higher salaries, even when the underlying technologies are the same....

Viewing 15 posts - 5,236 through 5,250 (of 6,034 total)