Viewing 15 posts - 241 through 255 (of 269 total)
I'll also add that the vendor should not be doing anything to a production server that hasn't been tested thoroughly on a test server. If your company is subject to...
January 11, 2008 at 12:57 pm
We use the underscore _ character as a separator. Using periods can lead to confusion, given that other programming languages use them as separators for actions on objects. I hate...
January 11, 2008 at 8:03 am
My company's policy is that no one, ever, gets to use sa. Software that claims to requrie SA is either rewritten by the vnedor to use a dbo ID, or...
January 11, 2008 at 7:35 am
I'll add my endorsement of the Reacher novels. Great stuff. I'v ealso been reading anything by James Rollins, the Agent Prendergast novels by Douglas Preston and Lincoln Childs. Right now,...
December 21, 2007 at 8:04 am
This is why all companies whould have policies on the management and protection of information that spells out the different classes of data (company use, private, etc) and what steps...
November 16, 2007 at 2:02 pm
Try running some of the inquery analyzer so there's no impact from the application.
Personally, given how cheap memory is, I wouldn't try to run a server with less than 2GB...
October 29, 2007 at 8:28 am
In our environment, we have folks called DBA's whose main role is to check out a privileged ID from an automated ID control system, run the scripts they are given,...
October 4, 2007 at 2:59 am
And, if you work for a company whose stock trades on a US stock exchange, you better have comprehensive change management policies in place or the SOX police will be...
September 20, 2007 at 8:39 am
Why not query the information_schema views to get the data you are looking for? All of the contents of SP's, views, etc are exposed in those views.
September 5, 2007 at 4:13 pm
As far as I know, we don't have a Business Objects Server, but we do have .net available, which I had not thought of using, as deploying executables is problematic...
August 29, 2007 at 7:28 am
We;ve managed to kill the use of Access as a development tool by simply refusing to support applications developed by users or their proxies (hiring programmers outside the normal channels)....
August 13, 2007 at 12:47 pm
A couple of points here. USB ports can be inactivated by application of a group policy when the computer is booting. It creates pain for many users, but can be...
August 10, 2007 at 3:29 pm
"Loosing your server role rights, such as sysadmin, after activating an activation role seems like a non-issue. "
This is absolutely true. I can't think of a reason why anyone should be...
July 23, 2007 at 7:58 am
Our DBA's have admin rights, but not on their primary logins that are used for general LAN access, email etc. All admin ID's are restricted to use on servers. This...
June 20, 2007 at 7:56 am
I'll second the point that access to change data on a production database should be severely restricted. Our DBA's can only change data if they login with a special ID...
May 16, 2007 at 9:03 am
Viewing 15 posts - 241 through 255 (of 269 total)