Forum Replies Created

Viewing 15 posts - 166 through 180 (of 5,986 total)

  • Reply To: How do you secure sensitive data in a modern Data Warehouse?

    Securing data in a warehouse is an often overlooked topic. Rather than granting wholesale access of tables to an entire IT department, group level permissions should be based on functional...

  • Reply To: The Level of Security These Days

    david.edwards 76768 wrote:

    I like that chart Jeff, I might add it to my favourite argument I trot out every time I am faced with a short password requirement that forces numbers,...

  • Reply To: The Level of Security These Days

    Regarding best practice for password complexity: it depends on whether it's only used only for authentication (ie: Netflix) - or if it's leveraged for symmetric key encryption and there is...

  • Reply To: Easily Repeating Work

    So, we maintain a collection of PowerShell modules in a shared Git repository for performing operational tasks like failing over an AOG node, starting/stopping traces, or enabling/disabling features. PowerShell is...

  • Reply To: The Level of Security These Days

    I think it's a TV trope that a clever hacker can somehow guess your password or brute force it with a script. What's really going on is that folks re-use...

  • Reply To: Is CosmosDB the One?

    Jeff Moden wrote:

    larry.blake wrote:

    About Fusion restaurants: it's pretty rare for them to do everything (or even most things) at a master chef level.

    I've never worked with CosmosDB, so I don't speak...

  • Reply To: Is CosmosDB the One?

    "I'd love to be able to insert data into a table, have it not available as a live value until committed on other nodes, and avoid locking my table. I...

  • Reply To: Is CosmosDB the One?

    I think of CosmosDB as like a fusion restaurant at an international airport where you can order from the menu of your choice (table, document, key store, graph, etc.) using...

  • Reply To: IoT Pros and Cons

    Here is my take on IoT devices:

    IoT has revolutionized industries like: manufacturing, transportation, healthcare, and science. Since this article was originally posted in 2017, I have since installed a Ring...

  • Reply To: Can We Please Stop Sending Passwords Over the Wire?

    Yes, at a minimum developers should set "Encrypt=true" property in client connection string, and even better the DBA should install a proper SSL certificate in SQL Server and set option...

  • Reply To: A Real World Security Reminder

    Steve Jones - SSC Editor wrote:

    Eric M Russell wrote:

    Thanks to AirTags and similar tracking technology, thieves have to be more careful about swiping stuff left lying around in the open. I've thought about taking an old...

  • Reply To: A Real World Security Reminder

    Thanks to AirTags and similar tracking technology, thieves have to be more careful about swiping stuff left lying around in the open. I've thought about taking an old phone or...

  • Reply To: Do You Still Use CHAR?

    skeleton567 wrote:

    Thought crosses my mind that maybe the use of CHAR data is a good way to have to revisit the Y2K days.

    As of 2014, FaceBook recognizes 58 variations of...

  • Reply To: Do You Still Use CHAR?

    I'll use CHAR(1) on occasion for internal status codes where I also have control over the domain of allowable values (ie: RunStatus = 'P').

  • Reply To: The Cloud as a Foundation

    ".. Snowflake is something that a company can run on AWS, Amazon, or GCP .."

    Maybe you meant to say Azure instead of "Amazon", but Snowflake can be hosted in Azure...

Viewing 15 posts - 166 through 180 (of 5,986 total)