Forum Replies Created

Viewing 15 posts - 91 through 105 (of 296 total)

  • RE: Search a value to complete database

    I forgot to add to my earlier post that adding an order by table name and ordinal position in the information_schema select that drives the cursor made a huge difference...

  • RE: Search a value to complete database

    I would add a criteria to only search the columns that could conceivably contain the data. There's no use searching numeric columns for character data, and if you are looking...

  • RE: Why SQL Server?

    I fell into SQL Server when I started a new job in 2001 supporting a new version of an accounting package I had supported elsewhere. From day 1, everything clicked....

  • RE: Geeky Oscars

    No movies stand out for me this year, but for TV with a sci-fi component, I highly recommend the UK TV shows Life on Mars and Ashes to Ashes. Great...

  • RE: 'At-Rest Data-Leakage': The Euphemism

    I've always taken the hard drives out of the computers I've disposed of, and deconstructed them into their component pieces. The magnets go into a jar, the housings go into...

  • RE: Disaster After Disaster

    Steve Jones - SSC Editor (12/12/2012)


    Ross McMicken (12/12/2012)


    Your DR plans should be tested with a scenario where more than half your staff can't be found or can't connect. In real...

  • RE: Disaster After Disaster

    A few comments on disasters.

    If you are critical, then you need a real landline and a phone that doens't require power to operate. This is one huge reason we have...

  • RE: Can you prent a DBA from viewing the data ?

    A good start to this would be to not grant sysadmin privileges to the DBA's every day ID's, but require them to use a special ID to perform sysadmnin tasks....

  • RE: keeping dev and live databases in sync

    I've used MS Access as a quick compare tool across servers (we aren't allowed to use linked servers, or this would be possibl ein SQL Server itself). Use ODBC to...

  • RE: Geeky Books

    The Neal Stephenson books are great. I reread Cryptonomicon this summer, and will reread the Baroque Cycle later this year.

    Any of the Eric Flint Grantville books are good

    I will read...

  • RE: The High Availability Poll

    This is something that has to be evaluated on an application by application basis. As part of the risk assessment process every application should be undergoing, assess the need for...

  • RE: Virtualization for Security

    That would be what Invincea is pushing http://www.invincea.com/. One of my cyber-security colleagues was telling me about them recently, as a way to reduce the risk of malware infection. If...

  • RE: The Window Is Shrinking

    IT security isn't limited to the design and implementation of applications. It also includes the users and infrastructure, and has to be assisted by strong support from management up to...

  • RE: The Window Is Shrinking

    Security has to become an integral part of the corporate culture. A good way to jump start that is to implement policies around applications and security that make a risk...

  • RE: More Regulation Coming?

    SanDroid (6/22/2011)


    Ross McMicken (6/22/2011)


    Uh, no. Banks have been responsible for forged checks for decades, especially if you reported the loss of the checks. As for credit cards, consumers in the...

Viewing 15 posts - 91 through 105 (of 296 total)