Editorials

Virtual Conference Registration – Last 2 Days of Early Bird

Virtual Conference Registration – Last 2 Days of Early Bird
You don’t want to spend your time running all over the country to keep skills updated. You also want to stay on top of techniques, best practices and such. On top of all this, if your budgets are like everyone else’s, your travel and training budgets are non-existent at the moment. We can help. We’ve left the early bird registration rates up until Weds – when was the last time you had three days of best-of training for only $80? Top speakers, amazing content. A great deal. No travel, no budget hassles.

Register here – we’ll see you there July 22, 23 and 24.

Featured Article(s)
How To Change the Default EditForm, NewForm and DispForm in SharePoint
If you’ve done any custom SharePoint development and have had the need to replace the standard out of the box new, edit and display forms, this post will walk you through the steps for doing just that. SharePoint Designer is limited in what it enables you to do. By accessing the properties within the Object Model, we can go a lot further.

Security – Some Thoughts on Complexity
Is security getting so complex that it is getting to the point where the complexity compromises the security you’re trying to put into place?

I think it’s possible. As you think about security, you think about encryption, policies, USB devices, control of data, control of uses of data, access controls, user names and passwords… you get the idea. At some point, all of these pieces *potentially* begin to limit the access and usability of information, and they also begin to rely on assumptions. Assumptions that other items are done in the chain of security (I assume the user names and passwords are handled correctly when I assign access for a view to a given role).

I was reading an article in TechNet Magazine about security, the things to think about and so-on and it really had me start to think about the complexities that we are relying on for managing security. With those complexities come "work-arounds" (compromising security to get something done potentially) and assumptions (see above).

What do you think – is the complexity part of the solution? Does making security more complex make it more… secure? Or does it hinder and possibly impair the very security you’re trying to deploy and apply?

Drop me a note – what do you think?

Webcast: How to Hire a DBA Part 1 of 3
Are you looking to hire a DBA? This 3 part series will help you in what you should look for. In Part one of this series we will talk about defining the role. Presented by: Chris Shaw

> Register Now
> 7/8/2009 at 12:00pm Noon Pacific

Webcast: How to Hire a DBA Part 2 of 3
Are you looking to hire a DBA? This 3 part series will help you in what you should look for. In Part two of this series we will talk about reviewing a resume. Presented by: Chris Shaw

> Register Now
> 7/15/2009 at 12:00pm Noon Pacific

Featured White Paper(s)
Open Database Connectivity
Database connections are the lifeblood of enterprise applications, administrating the secure and steady flow of information b… (read more)