Viewing 15 posts - 1 through 15 (of 36 total)
:w00t:??? Totally agree!!! The importance of encryption of data at rest (any data, not just SQL-DB) is linearly dependent on the mobility of the medium of said data. Period.
I've followed...
December 4, 2011 at 11:58 pm
brad.ashforth (9/21/2011)... As for doing someone elses homework and getting paid for it, why not? It is only the person that requested the service that is losing. ....
[rant] No it's...
September 21, 2011 at 5:33 pm
The case of a student paying for school, then paying again to have his/her homework done by someone else (hence getting less value out of more money) is ironic at...
September 20, 2011 at 12:00 am
[Quote]As DBAs we often try to control our world and ensure a high degree of stability, often at the cost of slowing or severely impeding changes in our systems. While...
September 19, 2011 at 12:41 am
Ulysses_Infinity (9/1/2011)
September 1, 2011 at 5:46 pm
The problem of readability of (very) old data from a backup is twofold: a) is the data physically readable (the bits) and b) can those bits be translated into meaningful...
August 24, 2011 at 10:05 pm
nadabadan (8/16/2011)
mar10br0 (8/16/2011)
August 16, 2011 at 4:53 pm
A few months ago I installed 4x 64GB SSD in a RAID 0 configuration using the SATA-controller on my motherboard in my home PC. I can tell you: it FLIES....
August 16, 2011 at 6:03 am
Eric M Russell (8/1/2011)
mar10br0 (7/29/2011)
Eric M Russell (7/29/2011)
mar10br0 (7/28/2011)
August 1, 2011 at 5:11 pm
Eric M Russell (7/29/2011)
mar10br0 (7/28/2011)
July 29, 2011 at 9:24 pm
peter-757102 (7/29/2011)
July 29, 2011 at 2:57 am
For deduping duplicates in a heap-table, I would just delete all offending rows, then re-insert one record. Since a heap cannot have any foreign-keys pointing to it, this will succeed...
July 28, 2011 at 5:30 pm
paul.knibbs (7/27/2011)
July 27, 2011 at 1:58 am
In my database designs my default choice for all tables is for them to have a surrogate key, a TIMESTAMP togethe with Last Modified UserID. For the surrogate key I...
July 26, 2011 at 11:52 pm
Hi Steve, agree with you in almost all aspects. But, "If a cloud vendor's employees can access your files, so can a hacker that gains access". Well yes, but taking...
June 1, 2011 at 1:17 am
Viewing 15 posts - 1 through 15 (of 36 total)