Viewing 3 posts - 16 through 18 (of 18 total)
Sounds like a two step process. 1. Download attachment xyz.txt from an e-mail from abc@company.com and place in \\dbserver\dtsinput directory, and 2. Once xyz.txt is found in the...
August 9, 2007 at 9:01 am
Are there users waiting on these jobs to complete at 8am? Maybe the overall goal is to get all of the jobs completed earlier. Perhaps the boss wants the job...
August 3, 2007 at 6:47 am
Encryption can help in mitigating risk. There is a question as to what type of breech database encryption (table, column, or entire DB) will prevent. If the back-up tapes are...
July 27, 2007 at 9:14 am
Viewing 3 posts - 16 through 18 (of 18 total)
This website stores cookies on your computer.
These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media.
To find out more about the cookies we use, see our Privacy Policy