Viewing 15 posts - 2,536 through 2,550 (of 3,221 total)
I haven't made this mistake yet (that I know of) but I am not certain that I knew this. In fact, I don't think I did. This question was excellent...
February 26, 2014 at 2:37 am
There are so many types of caching too. Most developers do at least one type without paying any attention to it: memoization. An example of this is to get a...
February 26, 2014 at 2:32 am
At a recent client's (I do not want to identify them as this story is specific but I find it generally applicable) the development team were forced to update configuration...
February 26, 2014 at 2:03 am
Phil Factor (2/25/2014)
February 25, 2014 at 2:21 am
We should be doing the right things and be seen to be doing them. Except for a possible small number of exceptions, I would hazard a guess that the majority...
February 25, 2014 at 2:17 am
David.Poole (2/24/2014)
...If you had developers with a strong database skillset then blending the two worlds together would be much more likely.
I could take exception to that!!! :rolleyes:
February 25, 2014 at 1:47 am
thisisfutile (2/24/2014)
look for potential hacking issues, like updating all of your lookup values to the same string, or embedding script tags in your data.
Can anyone elaborate on either...
February 24, 2014 at 7:31 am
I found that reading a couple of books on hacking in general (i.e. hacking networks, systems, databases, applications, etc.) really helped open my eyes to a new way of thinking....
February 24, 2014 at 3:15 am
jmoneysteph (2/21/2014)
February 21, 2014 at 9:32 am
Only used in a prototype. A number of different options were considered. SQLCLR was not selected in the end. I am sure that there are some valid uses, however, there...
February 21, 2014 at 4:45 am
David.Poole (2/20/2014)
February 20, 2014 at 2:31 am
I wonder if more remote working will facilitate freelancers to take more part time work e.g. Company A needs a specialist so asks for 2 days a week of Consultant...
February 20, 2014 at 2:21 am
Authentication is a problem currently without a suitable solution.
That is what I think. I have yet to use a system that succeeds on the two criteria required:
1) Secure.
2) Usable.
For the...
February 19, 2014 at 2:45 am
Eric M Russell (2/18/2014)
I don't know how the patent process works, but it seems to me that before a pending patent is awarded, it should be approved by a panel...
February 18, 2014 at 9:20 am
paul.knibbs (2/18/2014)
SQLRNNR (2/17/2014)
the ability to protect the entire system is dependent on the weakest link
That needs to be underscored. No matter the system, there is a weakest link.
The weakest...
February 18, 2014 at 3:27 am
Viewing 15 posts - 2,536 through 2,550 (of 3,221 total)