Viewing 15 posts - 256 through 270 (of 1,053 total)
I think this also highlights the need for built in 'sanity checks' for all code, especially critical stuff, to take emergency action and notification. The sanity check should have nothing...
July 26, 2016 at 9:11 am
TheFault (7/7/2016)
You could have just used pigeons! https://en.wikipedia.org/wiki/Project_Pigeon
Or this 😛
July 8, 2016 at 6:39 am
We really need a lot more research into that area, because strict algorithmic approaches are slow and can be error prone.
Thousands of species of animals from insects up through birds...
July 7, 2016 at 8:49 am
Through most of our evolutionary history, the vast majority of humans on the planet primarily had to worry about their next meal. People who had the resources and the wisdom...
June 21, 2016 at 8:58 am
Great developer is a bit vague. Fast? Accurate? Into arcane algorithmics? How about dependable? works with others? not ego driven?
There are great musicians that are impossible to work with, others...
May 31, 2016 at 6:55 am
It's important to keep the horse before the cart.
In an egalitarian organization diversity will naturally occur, and be healthy. Diversity that's created, however, as a target goal is likely to...
May 27, 2016 at 7:02 am
When you have a lot of third party stuff (as we do) there's a real black box problem. It's hard to even know if you've tested adequately.
This is one reason...
May 20, 2016 at 6:47 am
The basic issue was that tempdb files were sized unequally, discovered after "months of investigation."
Frequently when one sees an 'explanation' like this, there's a whole lot that's not...
May 12, 2016 at 7:18 am
It depends largely on the organization. Sometimes we wear a number of database related hats, in some organizations it would be highly siloed.
Interestingly in our organization we have one largish...
May 4, 2016 at 8:28 am
"Don't ever take a fence down until you know why it was put up." - Robert Frost
April 25, 2016 at 8:13 am
Offsite versioning is definitely a plus.
But for high profile attacks on high profile targets, there is another targeting approach: silently decrypt files each time they are accessed, re encrypt when...
April 19, 2016 at 8:36 am
An anonymous removal technique could possibly be a disguised vector.
[One thing that puzzles me (not that I have all the details) about the hospital incident is that patient records were...
April 19, 2016 at 7:07 am
We know that humans are bad at being consistent and reliable, and those are the places we should use computers. Even if the time savings don't directly add up,
Basically this...
March 16, 2016 at 9:00 am
Many years ago as a teenager I worked at a camera store that carried a large variety of models. In my inexperience and enthusiasm I would attempt to discuss the...
January 29, 2016 at 11:18 am
Viewing 15 posts - 256 through 270 (of 1,053 total)