Viewing 15 posts - 751 through 765 (of 813 total)
1. Fully parameterize all your SQL calls, whether they're stored procedures or not. This is your best protection.
2. Get Firefox 3.5 (perhaps on a VM), and install addons like...
April 12, 2010 at 2:30 pm
What's the Fill Factor on the indexes with the fragmentation issues?
If you're doing updates or inserts throughout the values of the index, I would recommend trying a value lower than...
April 8, 2010 at 9:25 am
Thank you for such an informative post. I've been involved in initial benchmarking of more standard enterprise SATA SSD's on a local RAID controller, and while the results are...
April 8, 2010 at 8:30 am
For the record, I checked with the user, and of the two 2/29/2007's in there, one was supposed to be 3/29/2007 (typo), and the other should have been 12/29/2007 (the...
April 7, 2010 at 8:44 am
Welcome to health care.
Do hire a reputable and fully up to date legal and regulatory compliance expert (or two). The penalties for noncompliance can be very serious.
Do consult the...
March 31, 2010 at 7:56 am
WayneS (3/26/2010)
One year isn't enough; three years is probably too much. Two sounds like a good middle to me.
Now, how would one go about getting documented experience? I think figuring...
March 26, 2010 at 10:13 am
As far as standard vs. proprietary: it depends.
If you need your work to be portable with a minimum of fuss, then you must write as standard a set of code...
March 25, 2010 at 7:15 am
I agree with GSquared; an apprenticeship system is what I have been supporting for decades. Yes, you have a varying education based on the master you study under (i.e....
March 23, 2010 at 8:45 am
As another poster mentioned, anyone interested can start with some of the NIST Special Publications.
For example, if we look at the path of, say, SSL encryption, we might start at:
March 17, 2010 at 11:21 am
I would also, in your experimenting, be cautious; certainly with SQL Server 2000 I've seen the database engine choose to use absolutely the wrong index, even with up to date...
March 16, 2010 at 8:21 am
I think Perfmon is missing in the list; I find it a useful tool for watching, in particular, disk and network IO.
A packet sniffer of choice can also be very...
March 8, 2010 at 11:13 am
A few more, and some "I support the previous posters":
Look for Enabled but Untrusted constraints
+1 on check for index fragmentation
Check for external (OS level) fragmentation
Check for databases on OS compressed...
February 26, 2010 at 11:45 am
Alan Vogan (2/12/2010)
February 12, 2010 at 9:32 am
As my SQL Server backups are usually a mix of backup and archive:
Backup: the ability to restore a system to functionality following a problem (DML or DDL (DROP) mistake by...
February 12, 2010 at 8:02 am
As another example of the issue: assume the data actually changes in the base table, but the checksum of the new data is the same as the checksum of the...
February 11, 2010 at 12:27 pm
Viewing 15 posts - 751 through 765 (of 813 total)