When Socrates reportedly said the “unexamined life is not worth living,” the Greek philosopher didn’t imagine the modern internet with its seemingly unlimited ability to absorb data. Every mouse click ...
In the ninth part of Robert Schifreen's SharePoint 2010 epic, he learns how one user can generate 16GB of logs in just three months. Creating a structure for our SharePoint 2010 installation was ...
Transaction logs in Exchange Server are very important. These are not just logs of what happens, transaction logs act as a buffer between the database and the users. Data is temporary kept in ...
Despite the best precautions, it is impossible to protect your network against every attack. When the inevitable happens, your log data can be critical for identifying the cause of the breach and ...
This is the third and final article of a three-part series which investigates the top five human threats to the data held by banks and financial institutions, and offers a fresh perspective on how the ...
An unsecured database that exposed the security logs -- and therefore potential cybersecurity weaknesses -- of major hotels including Marriott locations has been uncovered by researchers. VpnMentor ...
What do you do when you can't avoid huge transaction logs in SharePoint and your files are too large? Last month, I wrote about how to avoid having ginormous transaction logs within SharePoint ...
Things break and the DBA must be prepared for situations where a failure impacts the availability, integrity, or usability of a database. Reacting to failures and service disruptions is a key ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results