Forum Replies Created

Viewing 15 posts - 2,536 through 2,550 (of 3,221 total)

  • RE: Stored Procedure Boundaries

    I haven't made this mistake yet (that I know of) but I am not certain that I knew this. In fact, I don't think I did. This question was excellent...

  • RE: Caching

    There are so many types of caching too. Most developers do at least one type without paying any attention to it: memoization. An example of this is to get a...

  • RE: Lawsuits and Data Breaches

    At a recent client's (I do not want to identify them as this story is specific but I find it generally applicable) the development team were forced to update configuration...

  • RE: Lawsuits and Data Breaches

    Phil Factor (2/25/2014)


    ...A lot of attacks seem to merely probes to determine weaknesses. Others, if successful, take effective control of the server, but in a way that is generally undetected,...

  • RE: Lawsuits and Data Breaches

    We should be doing the right things and be seen to be doing them. Except for a possible small number of exceptions, I would hazard a guess that the majority...

  • RE: The SQLCLR Impact

    David.Poole (2/24/2014)


    ...If you had developers with a strong database skillset then blending the two worlds together would be much more likely.

    I could take exception to that!!! :rolleyes:

  • RE: Auditing Matters

    thisisfutile (2/24/2014)


    From Steve's editorial:

    look for potential hacking issues, like updating all of your lookup values to the same string, or embedding script tags in your data.

    Can anyone elaborate on either...

  • RE: Auditing Matters

    I found that reading a couple of books on hacking in general (i.e. hacking networks, systems, databases, applications, etc.) really helped open my eyes to a new way of thinking....

  • RE: The SQLCLR Impact

    jmoneysteph (2/21/2014)


    In my shop CLR functions have a limited use, primarily for complex financial computations. One crucial best practice when coding CLR objects should include mechanisms to avoid runaway...

  • RE: The SQLCLR Impact

    Only used in a prototype. A number of different options were considered. SQLCLR was not selected in the end. I am sure that there are some valid uses, however, there...

  • RE: The Remote Balance

    David.Poole (2/20/2014)


    A present headache is trying to employ agile methodologies across geographically disperse teams. One of the things about agile is that it encourages all participants to be co-located...

  • RE: The Remote Balance

    I wonder if more remote working will facilitate freelancers to take more part time work e.g. Company A needs a specialist so asks for 2 days a week of Consultant...

  • RE: The Security of Interconnected Systems

    Authentication is a problem currently without a suitable solution.

    That is what I think. I have yet to use a system that succeeds on the two criteria required:

    1) Secure.

    2) Usable.

    For the...

  • RE: Software Patents

    Eric M Russell (2/18/2014)


    ...

    I don't know how the patent process works, but it seems to me that before a pending patent is awarded, it should be approved by a panel...

  • RE: The Security of Interconnected Systems

    paul.knibbs (2/18/2014)


    SQLRNNR (2/17/2014)


    the ability to protect the entire system is dependent on the weakest link

    That needs to be underscored. No matter the system, there is a weakest link.

    The weakest...

Viewing 15 posts - 2,536 through 2,550 (of 3,221 total)