Viewing 15 posts - 1 through 15 (of 56 total)
Phil,
Thank you for the guidance. I will give it a try and let you know how it goes. Thank you for your time and consideration.
January 8, 2017 at 3:39 pm
Yes, I was able to gain an access key. I was able to get a JSON string from Google Sheets and Directory API through Google's API Explorer - but not...
January 5, 2017 at 6:32 pm
Amen, brother!
Here is a posting on the same subject on my blog back in June 2010:
http://www.simple-talk.com/community/blogs/johnm/archive/2010/06/21/93146.aspx
December 5, 2011 at 4:01 am
It is very important for DBAs to understand the importance of protecting sensitive data and the laws/regulations that are associated with their protection. Our role is certainly one of public...
June 1, 2011 at 4:12 am
I realize that it has been three years since you posted this question; but I thought that I would reply for the benefit of those who may come across this...
December 3, 2010 at 4:15 am
For those who are interested in the intro sessions or in the advanced sessions:
- What specific questions do you have that could be answered in...
July 27, 2010 at 4:15 am
A few posts prior to mine make the points that I will make regarding database object schemas; but I would like to add that I am actively utilizing these in...
June 22, 2010 at 4:08 am
Very timely, Steve. When you are doing the job you love it is hard sometimes to pull yourself away. The enemy is the "I just need ten more minutes to...
May 25, 2010 at 4:01 am
Great post, Steve. Leadership comes in many forms and does not require position to be exercised. John Maxwell is an author who writes on this topic often. I recommend his...
May 3, 2010 at 4:02 am
Many of the prior replies noted Transparent Data Encryption as an option. It was also noted that TDE encrypts the physical data files and not the data itself. The intent...
April 29, 2010 at 4:15 am
I am with you, Steve. There are always security vulnerabilities to mitigate and features to tweak. SPs could also be used to stair step the product into the next major...
April 28, 2010 at 4:46 am
Thank you for the replies; but they are not the scenarios that I am describing. Please let me describe this a bit more:
- Bob Smith has a Windows Active...
April 8, 2010 at 7:34 pm
One of the things that is emphasized in the culture of my employer is "Work harder on yourself than your job." They understand that the byproduct of doing that results...
February 16, 2010 at 4:13 am
There are a lot of dependencies in the answer to the question of how often keys are to be changed. If you are considering key changes for encrypting credit card...
January 29, 2010 at 4:44 am
I would add that you maintain your attendance, or start attending, social IT events, such as User Groups or shop-talk gatherings. It always amazes me how a casual conversation with...
July 16, 2009 at 5:23 am
Viewing 15 posts - 1 through 15 (of 56 total)