Search SSWUG.ORG:

Latest Video Programs

SSWUGtv Security Edition: Encrypting data with Microsoft\'s .NET encryption libraries.

SSWUGtv Security Edition: Encrypting data with Microsoft\'s .NET encryption libraries.

SSWUGtv: When to Tell Your Boss "No" - and how to do it in a way that won\'t offend them! Laura Rose has some great tips today.   SSWUGtv: If you have multiple job offers, how do you know that you\'re making the right decision? Laura Rose has your back on this tough decision.    SSWUGtv: Are your meetings a waste of time? How do you fix that and make them worth the time you spend? Laura Rose has some great tips today!  
 

From the Editor's Desk...

Linq or For  -  Resharper prompts me to convert all for type loops in C# into Linq statements. Do they have it right?

Have You Found That the Cloud Brings Discipline?  -  ...in a good way. We're constantly tuning and tweaking configurations and applications. We've found that the cloud, done right, modularly, forces a discipline for recovery, scale and so-on. Are you seeing this too in your work?

Some Interesting SQL Server 2014 Elements  -  In-memory! Great new features and performance in this release of SQL Server. It's a major change in options when it comes to processing and data access.

Best Practices for Virtual Machines  -  When your active directory stops authenticating, and is operating in a virtual machine on a host with many other virtual machines, could the cause come from the loads in one or more of the others?

Securing Passwords  -  Encrypting a password in your database is not often argued. But should you take further steps beyond encryption?

SQL Server 2014 Goodness  -  Have you seen some of the resources available to help get your arms wrapped around the latest release?

Agile vs. Big Picture - How Do You Reconcile?  -  More feedback needed: Interesting feedback on the previous thoughts about "2" (or 3) things for developers to consider in projects... is it at cross-purposes with Agile techniques?

Keep Plugging Those Holes  -  Recent security holes have been plugged after being exposed for a long time. Fixing these known holes is great. But, how much effort should we be putting in to finding the ones we don't know about?

The Stability of Information Systems is... Dangerous?  -  We've come to accept and assume that our systems work as advertised and work as needed. While this may usually be the case, a healthy respect and cynicism has its place and benefit.