Forum Replies Created

Viewing 15 posts - 316 through 330 (of 5,986 total)

  • Reply To: Defending Against Ransomware

    What I'm talking about is a firewall on the PC that profiles executable for suspicious behaviour and then warns via a dialog - allowing user to whitelist or block the...

  • Reply To: Defending Against Ransomware

    It seems that modern malware detection / prevention should be more AI. It's highly unusual for an executable to traverse through \My Documents and network folders encrypting files, and that...

  • Reply To: What does the Future DBA Do?

    Aubrey Love wrote:

    ...

    Unless I flip the bill myself and do it on my own time, I’m stuck in a vintage world of DBA’s.

    Any suggestions for someone like that?

    The good news...

  • Reply To: What does the Future DBA Do?

    As a DBA in the cloud era, there are many more technologies that we need to familiarize ourselves with (PowerBI, ML, Document databases) but we don't necessarily need to know...

  • Reply To: Choosing Sequences Over Identity

    Jeff Moden wrote:

    With that, I have to ask, since MD5 returns a 16 Byte result and you convert that to BIGINT, which is an 8 Byte result (which is a whopping...

  • Reply To: Choosing Sequences Over Identity

    A recent database I created involves tables where the natural unique keys are several columns wide. Rather than using an IDENTITY or other incremental ID, for the surrogate key column...

  • Reply To: A Security Regression

    I don't know for sure either, but reading the FAQ, it seems like this wasn't a 3rd party hack but perhaps two employees abusing their privileges. I can picture a...

  • Reply To: Mongodb Encryption

    Our company has a mobile app that allows customers to make payments, update contact info, look at purchase history, etc. We have an enterprise data warehouse that works great for...

  • Reply To: Server Side SSMS

    When we provision a instance, we will set SQL Server max mem so that at least 4 - 8 GB memory is free for both Widows and SSMS. If I'm...

  • Reply To: Have You Deployed an Availability Group?

    "Or maybe you've done it once or twice and forgotten about it."

    Well, once you've deployed an Availability Group, it's impossible to just forget about about. It's an endless source of...

  • Reply To: Next Person Up

    Doctor Who 2 wrote:

    Extremely good advise, Steve. I'll add just one thing and that's if you find you need to look for another job, it might mean relocating, if the opportunities aren't...

  • Reply To: Next Person Up

    Most of the organizations I've worked for were IT centric - where folks tend to be rational, competent, and focused on their job. The better employers will weed out individuals...

  • Reply To: Cursors Without Performance Penalties

    Any candidate who fails to get the joke doesn't get a 2nd interview. 🙂

  • Reply To: When Will Privacy Matter?

    Organizations that hoard data indiscriminately and fail to properly secure data should be seen as robber barons who cheat the system and put the public at risk. We should judge...

  • Reply To: A Data Controversy

    swwg69 wrote:

    So do you want the government to have a searchable database of all the flights taken?

    If the airlines have to keep it, and the government can draw from it...

Viewing 15 posts - 316 through 330 (of 5,986 total)