Reed Me

Development schtuff, SQL Server & other random geekness. Now with more [fill in the blank]!

Browse by Tags

Tagged Content List
  • Blog Post: Thanks, Emily! My $0.02 US (unadjusted) on security.

    A friend of mine just sent me a link and asked my opinion. Always a dangerous thing to do… Here you go, Chris! I appreciate that she’s writing about MSFT and promoting what our execs are saying (have been saying for years =), but I think that Emily’s analysis is fine, if uninspired . Two factor auth...
  • Blog Post: Yeah, I know I said I’d never run for office again...

    But then I went and put my name in the hat once more... because it’s for a good cause! No, it’s not April Fool’s. That’s tomorrow. Personally, I’d like to thank L.D. Kirshenbaum (the author of the article below) for giving us a fair shake. I’m sure that there were some embarrassing quotes among all the...
  • Blog Post: Legal use of social network websites

    A long time ago, in a life far, far away, I was a deputy constable and I had to physically locate people and hand them court documents (or haul them off to jail). As much fun as it was to run around with a badge and a gun, it would’ve made life much easier if I could’ve just sent them an email! I guess...
  • Blog Post: Voice Command: FORMAT C: [ENTER]

    Well, that’s how the joke used to go about Vista voice command... Apparently somebody thought it would be fun to actually implement something similar in their mobile o/s. On purpose or not. Heh. The bug can hardly be called a security problem, given it requires access to the handset, but the fact that...
  • Blog Post: Get your beta on! SQL Server 2005 SP3 Beta

    No new features. Lots of good fixes rolled up in one package. Download details: SQL Server 2005 SP3 Beta We don’t call them “service packs” inside SQL Server anymore, but it would seem that a lot of people have a Linus’ blanket reaction to the term, so we’ll call it SP3 to make everyone happy. Enjoy...
  • Blog Post: We don‘t need yet another database security czar.

    I was reading this article about recent data breaches that was recommending Yet Another Government Agency® and (no surprise) I started getting mad: A program to share best practices among agencies at all levels of government and create cybersecurity templates, even if they are not mandated, would be...
  • Blog Post: You're doing it wrong!

    I always hear Randall's comic voice in my head now shouting "You're doing it wrong!" when I see things like this: "This is believed to be the first reported case of a space station computer getting a virus, but a Nasa spokesman said there had been previous instances." Computer virus infects International...
  • Blog Post: Big brother (or SkyNet) is coming... to a PC near you.

    I loved the book 1984 , even though it was almost 1984 by the time I read it. The fact that the date was around the corner and technology wasn't anywhere close kind of took the punch out of the story. I guess it didn't scare me the way it scared "previous generations" (to put it politely)....
  • Blog Post: Mr. Jobs, welcome to the slightly bigger time...

    Not a whole lot here to say, just entertainment value. After all the Mac v. PC commercials, I will laugh my considerable posterior off if Apple winds up creating a UAC-style prompt to warn their customers that an application is attempting to access critical system components... Apple declined to discuss...
  • Blog Post: Data mining from casinos to counterterrorism...

    I guess DHS has figured out that bad guys are bad guys and existing expertise and technology probably will translate from fraud prevention to terrorism prevention. Casinos have tried to use facial-recognition software to identify known cheats in real time, but with little success. Casino lighting is...
Page 1 of 1 (10 items)