Forum Replies Created

Viewing 15 posts - 16 through 30 (of 37 total)

  • RE: The Biggest Data Breech (For Now)

    Can you start to imagine criminals using the information intelligently to not directly sell the data but to make a secondary use of the information.

    I think they call these...

  • RE: Who Watches the Watchers?

    "Max Headroom"...

    Best answer yet.

    Bonus points for not saying "the Picard".

  • RE: Who Watches the Watchers?

    In answer to the question Who Watches the Watchers...robots.

  • RE: CLR Could not find the type in the assembly

    I know this post is old but I had the same problem and thought I'd share the solution I found.

    When you compile the VB assembly in VS, pay attention to...

  • RE: Advice for Newcomers

    I agree, but it's the fantasy of becoming the next Bill Gates, Steve Jobs, or Mark Zuckerberg that gets kids fired up and fills the ranks of the next generation...

  • RE: Advice for Newcomers

    My advice would be to pick a particular thing and learn it really really well--whether it's writing a program, setting up a server, or wiring a network. Even if...

  • RE: Database Master Key Error After Database Restore

    Good post, thanks. I would love to dive into encryption more deeply and understand why such a complex structure of Service Master Keys, Certificates, Database Keys, and Symmetric Keys...

  • RE: More Data Security Issues

    I'd be interested to know what the main motivation is for insider data breaches. Is it random vandalism, retaliation, greed, a sense that something the company is doing is...

  • RE: Inconsistency

    I used to think people who had two monitors were just being ostentatious...now that I have two I want three.

    I used to think Windows 7 was worse than XP...now I...

  • RE: Stack Ranking

    A manager's job is to take the time to know each of the people they supervise, understand the needs of the company, and make appropriate decisions on pay/ termination on...

  • RE: A Welcome Intruder

    The easiest way to penetrate a system is to have the password. As long there are phones out there with rootkits capturing urls and keystrokes, none of our systems...

  • RE: Treat People Like People

    I could never understand why companies went from "Personnel" to "Human Resources". I feel like being thought of as somebody else's resource is a tad demeaning too (although it's...

  • RE: Odd Questions

    I think the "3 worst qualities" type questions are asked by lazy interviewers. Instead of asking numerous questions about your talents and specific job requirements the interviewer just decides...

  • RE: Odd Questions

    You're locked in a cell with a steel floor. At the center of the room is a pipe with massively thick walls securely welded to the floor all the...

  • RE: Odd Questions

    I was once asked what I saw myself doing in 5 years. I answered basically "working here at this company in the job you are interviewing me for." ...

Viewing 15 posts - 16 through 30 (of 37 total)