Viewing 5 posts - 1 through 5 (of 5 total)
This is a nice article, but possibly a bit dated and not really considering higher-end enterprise-scale subsystems that are available and more common these days, where RAID is not only...
May 2, 2012 at 1:03 pm
Hi,
Good article, great topic.
I agree with the use of change tracking in 2008, and would add that triggers are not always straight forward. You must consider referential integrity, cascading events...
April 26, 2011 at 3:55 pm
Groovy, I'm following you.
"ACL" is actually how we name tagged our implementation as well (although it's a custom hybrid of sorts, in a very dynamic and ever changing environement)
Transactional data...
May 18, 2010 at 2:11 pm
Never one to shoot down an opportunity to learn, I'd be curious how AD has been implemented to address the granularity of securables needed in a large enterprise ?
Just as...
May 18, 2010 at 1:51 pm
We implemented a solution that combines the features mentioned here, along with a table sub-struture and temporary login tokens.
The user is detected, we drill into the transactional data itself to...
May 18, 2010 at 11:22 am
Viewing 5 posts - 1 through 5 (of 5 total)