Viewing 15 posts - 91 through 105 (of 296 total)
I forgot to add to my earlier post that adding an order by table name and ordinal position in the information_schema select that drives the cursor made a huge difference...
March 15, 2013 at 6:51 am
I would add a criteria to only search the columns that could conceivably contain the data. There's no use searching numeric columns for character data, and if you are looking...
March 14, 2013 at 11:56 am
I fell into SQL Server when I started a new job in 2001 supporting a new version of an accounting package I had supported elsewhere. From day 1, everything clicked....
March 1, 2013 at 1:42 pm
No movies stand out for me this year, but for TV with a sci-fi component, I highly recommend the UK TV shows Life on Mars and Ashes to Ashes. Great...
January 25, 2013 at 8:43 am
I've always taken the hard drives out of the computers I've disposed of, and deconstructed them into their component pieces. The magnets go into a jar, the housings go into...
January 2, 2013 at 7:37 am
Steve Jones - SSC Editor (12/12/2012)
Ross McMicken (12/12/2012)
December 12, 2012 at 3:20 pm
A few comments on disasters.
If you are critical, then you need a real landline and a phone that doens't require power to operate. This is one huge reason we have...
December 12, 2012 at 10:10 am
A good start to this would be to not grant sysadmin privileges to the DBA's every day ID's, but require them to use a special ID to perform sysadmnin tasks....
August 3, 2012 at 8:22 am
I've used MS Access as a quick compare tool across servers (we aren't allowed to use linked servers, or this would be possibl ein SQL Server itself). Use ODBC to...
August 1, 2012 at 8:27 am
The Neal Stephenson books are great. I reread Cryptonomicon this summer, and will reread the Baroque Cycle later this year.
Any of the Eric Flint Grantville books are good
I will read...
July 25, 2012 at 11:57 am
This is something that has to be evaluated on an application by application basis. As part of the risk assessment process every application should be undergoing, assess the need for...
July 3, 2012 at 12:40 pm
That would be what Invincea is pushing http://www.invincea.com/. One of my cyber-security colleagues was telling me about them recently, as a way to reduce the risk of malware infection. If...
October 27, 2011 at 11:30 am
IT security isn't limited to the design and implementation of applications. It also includes the users and infrastructure, and has to be assisted by strong support from management up to...
August 10, 2011 at 7:47 am
Security has to become an integral part of the corporate culture. A good way to jump start that is to implement policies around applications and security that make a risk...
August 9, 2011 at 8:13 am
SanDroid (6/22/2011)
Ross McMicken (6/22/2011)
June 22, 2011 at 2:19 pm
Viewing 15 posts - 91 through 105 (of 296 total)