Viewing 15 posts - 1 through 15 (of 22 total)
A-Good-Thing: It's also possible to fix OS level bugs, without having to go back to the supplier.
It may or may not be cheaper, you get the OS for free, but...
June 15, 2010 at 5:38 am
For the purpose of the article, you probably want to select all customers with order_count >= min(order_count of top 10). That way you don't exclude customers that sort 'later'...
February 28, 2010 at 11:02 pm
Robert.Smith (9/9/2009)
September 9, 2009 at 10:58 am
from the faq @ http://www.sentrigo.com/passwordizer-faq
Are all user logins affected?
The vulnerability exists only when using mixed authentication in the SQL Server, which is typically used by DBA’s, system administrators,...
September 9, 2009 at 5:52 am
Even though the cards were returned, you can't be sure they weren't skimmed and duplicated while they were out of your sight. It's a good think the cards are...
August 20, 2008 at 3:43 am
I agree with Jereme: Any code that is used in governmental procedures (law enforcement, voting, etc) should be inspectable. If you think about it any work generated by the state...
February 8, 2008 at 12:25 am
An audit table perhaps? i.e. a copy of the master table with extra columns for 'operation, datetime, userid'. You could then make a 4+ column primary key, but...
December 11, 2007 at 1:22 am
*sigh* errata yesterday and today
August 22, 2007 at 6:22 am
FYI: It's sync_method and not synch_method.
August 21, 2007 at 3:41 am
Why RAID 1, with what? Are you doing the RAID with two partitions on the same drive? How does that help? If the drive fails, it fails, and...
May 18, 2007 at 2:37 am
Yegh, what a lack of responsibility. As Stewart said, development is a team process - that includes your client. SPECIFICATIONS, Feedback meetings and demos are a good way...
April 30, 2007 at 2:48 am
I use KeePass as my Password Safe. It seems to have more features than the Password Safe you linked to. It also has up-to-date contributed builds for...
April 13, 2007 at 12:43 am
"Not for replication" identity columns exist in SQL 2000 too, the article makes it sound like they're new in 2005.
March 28, 2007 at 1:55 am
With XMPP (Jabber) the IM messages are 100% XML. This allows you to do anything you can imagine. It even supports tabular results to be shown directly to...
October 30, 2006 at 12:50 am
Viewing 15 posts - 1 through 15 (of 22 total)