Believe in Your Data - Database Weekly (Aug 25, 2008)
As DBAs we must secure and protect data, but what can we do when there are fundamental issues with the way the systems are designed. Steve Jones comments on problems with voting machines.
As DBAs we must secure and protect data, but what can we do when there are fundamental issues with the way the systems are designed. Steve Jones comments on problems with voting machines.
Gaining recognition or an award without earning it is something Steve Jones thinks is a problem in society in general, and it's filtered into the IT industry.
Gaining recognition or an award without earning it is something Steve Jones thinks is a problem in society in general, and it's filtered into the IT industry.
Gaining recognition or an award without earning it is something Steve Jones thinks is a problem in society in general, and it's filtered into the IT industry.
This Friday Steve Jones comments on the practice of using Active Directory to help manage your SQL Server and what the best practice should be.
As DBAs we must secure and protect data, but what can we do when there are fundamental issues with the way the systems are designed. Steve Jones comments on problems with voting machines.
As DBAs we must secure and protect data, but what can we do when there are fundamental issues with the way the systems are designed. Steve Jones comments on problems with voting machines.
It is an interesting problem in Transact SQL, for which there are a number of solutions and considerable debate. How do you go about producing a summary result in which a distinguishing column from each row in each particular category is listed in a 'aggregate' column? A simple, and intuitive way of displaying data is surprisingly difficult to achieve. Anith Sen gives a summary of different ways, and offers words of caution over the one you choose.
Lately it seems like SQL Injection attacks have been increasing. Recently our team has worked through resolving a few different SQL Injection attacks across a variety of web sites. Each of these attacks had a number of similarities which proved to point back to the same source. With this information in hand, the resolution should be much quicker. As such, if your web site is attacked with SQL Injection, how should you address it? How can the identification, analysis, recovery and resolution be streamlined? What are some lessons learned?
This video covers lift charts, an advanced data mining feature in SQL Server 2008. MVP Brian Knight walks through a data mining example that tests a model with a lift chart.
By Brian Kelley
My most recent bout with imposter syndrome was with ISACA’s Digital Trust Ecosystem Framework...
By Steve Jones
“On the way to a grand goal, celebrate the smallest victories as if each...
Materialized lake views (MLVs) in Microsoft Fabric are an effective way to implement medallion...
Untuk membuka blokir Mobile Banking permata bank , Anda bisa menghubungi Call Center permata...
Graha Elok Mas, Jl. Panjang No.79 EF, RT.6/RW.1, Kedoya Sel., Kec. Kb. Jeruk, Kota...
Jl. Daan Mogot No.48 A, Jelambar, Kec. Grogol petamburan, Kota Jakarta Barat, Daerah Khusus...
In honor of May the fourth and Star Wars (may the force be with you), finish this quote:
"Do, or do not. ..."See possible answers