Organizing a SQL Saturday – Part 1 – Why Do It?

To kick off this series, I thought it would be worthwhile to discuss why it is I step up to help lead the effort to pull this event together. I know it did because it helped change mine. Without hesitation, which I now question sometimes, I stepped up and said I’d run the event. Information and contact info was relayed …

tsql tuesday

T-SQL Tuesday #080 – The Gift of the Basics

This month’s T-SQL Tuesday (#080) is being hosted by Chris Yates (B|T) (Happy B-day Chris!). He decided that this month’s theme was to be a gift to the community of something you had to offer that someone else may find as a gift. Or maybe it isn’t. That’s my interpretation. You can figure it out for yourself here.   Anyhow, …

robertherjavec

Hearing Responsibility

A while ago I was watching Shark Tank on TV and at one point Robert Herjavich (T|B) made the great quote above. When I heard that statement I stopped the show immediately. I went back (Thank you whoever made rewindable TV possible!) and listened to it again to make sure I got it right. That one little statement really got …

STIGs Image

DoD STIGs – V-32534

Overview: Title: The DBMS must take needed steps to protect data at rest and ensure confidentiality and integrity of application data. Vulnerability ID: V-32534 STIG ID: IA Controls: None Severity: medium Description: This control is intended to address the confidentiality and integrity of information at rest in non-mobile devices and covers user information and system information. Information at rest refers …

evaluation

PASS Summit 2016 – My Session Evaluations

No Sessions For You! The announcements of the speakers and sessions selected for the PASS Summit 2016 were recently announced, and I was not picked for any sessions. I do not have any ill feelings to those that go through the herculean effort to create the reviews and the Summit in general. Am I upset & disappointed? Sure, who wouldn’t …

STIGs Image

DoD STIGs – V-32185

Overview: Title: The application must employ automated mechanisms to facilitate the monitoring and control of remote access methods. Vulnerability ID: V-32185 STIG ID: IA Controls: None Severity: medium