Viewing 5 posts - 1 through 5 (of 5 total)
This is a nice article, but possibly a bit dated and not really considering higher-end enterprise-scale subsystems that are available and more common these days, where RAID is not only...
May 2, 2012 at 1:03 pm
Hi,
Good article, great topic.
I agree with the use of change tracking in 2008, and would add that triggers are not always straight forward. You must consider referential integrity, cascading events...
April 26, 2011 at 3:55 pm
Groovy, I'm following you.
"ACL" is actually how we name tagged our implementation as well (although it's a custom hybrid of sorts, in a very dynamic and ever changing environement)
Transactional data...
May 18, 2010 at 2:11 pm
Never one to shoot down an opportunity to learn, I'd be curious how AD has been implemented to address the granularity of securables needed in a large enterprise ?
Just as...
May 18, 2010 at 1:51 pm
We implemented a solution that combines the features mentioned here, along with a table sub-struture and temporary login tokens.
The user is detected, we drill into the transactional data itself to...
May 18, 2010 at 11:22 am
Viewing 5 posts - 1 through 5 (of 5 total)
This website stores cookies on your computer.
These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media.
To find out more about the cookies we use, see our Privacy Policy