Viewing 15 posts - 436 through 450 (of 515 total)
Steve Jones - SSC Editor (5/24/2011)
I haven't said don't test it or throw it out the door. The decision to move something out before it is complete doesn't mean that...
May 24, 2011 at 11:57 am
Shudder.
Steve, that's a recipe for absolute disaster.
First, you're falling into the "get it out the door, we'll test it afterward" trap. Second, users will initially love it, and cause it...
May 24, 2011 at 7:29 am
I think the point about being risk-averse is absolutely true--and gets the cart before the horse.
Think about it. Would *you* want somebody who enjoyed high-stakes risk taking being a DBA?...
May 17, 2011 at 6:51 am
Am I the only one who thinks "none of the above" is the correct response, because the script is so buggy it won't compile?
Unless I'm crazy you can't insert 'a'...
April 25, 2011 at 6:55 am
Personally I think the data dictionary approach would be better served using a data modeling tool like Toad Data Modeller or Rational Rose. (I use Toad myself).
That way not...
February 17, 2011 at 7:13 am
I'm reading all these comments about how Access and VB and .NET are horrid compared to the competition. Sure, there are a few "it's not the tool..." comments but for...
December 14, 2010 at 7:29 am
tommyh (12/2/2010)
roger.plowman (12/2/2010)
As to why...
December 2, 2010 at 7:03 am
I had the need for this and used a non-clustered unique filtered index. Simple, efficient, and solves the problem neatly while letting SQL Server enforce it.
As to why you'd ever...
December 2, 2010 at 6:53 am
GSquared (11/9/2010)
So what you're saying is that you're an industry insider who knows that there's a huge security flaw in the product your company sells, and...
November 10, 2010 at 6:24 am
Mike Caldwell (11/8/2010)
November 9, 2010 at 6:47 am
Biometrics are a nightmare for authentication.
The central, unsolvable issue is that once your biometric is compromised, *it can't be changed*. Lose your fingerprint and spoofers will be able to pose...
November 8, 2010 at 9:19 am
No approach to passwords is ideal, because the whole login id/password paradigm tries to serve two masters and as we all know that means it serves neither particularly well.
The whole...
November 8, 2010 at 7:49 am
Face it, in the days before the internet systems were far less complex, it was *possible* to know just about everything there was to know about a system.
Today? Not so...
November 2, 2010 at 7:28 am
Ok, I have a problem with the approach from the word go, and it's this:
"implement "ideal" auditing, where the app itself can recall all versions of the data that were...
October 13, 2010 at 7:13 am
I've needed GUIDs exactly once, when I was creating an application that was intended for distributed authorship of items to be stored in (author local) databases.
My solution for the ID...
October 12, 2010 at 7:09 am
Viewing 15 posts - 436 through 450 (of 515 total)