bug-gnuts
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Bug-gnuts] health club Jell-O


From: Mabel Rainey
Subject: [Bug-gnuts] health club Jell-O
Date: Mon, 9 Oct 2006 18:51:31 +0000
User-agent: Thunderbird 1.5.0.7 (Windows/20060909)


So, every now and then, I'll use my blog to answer some questions that I get on a regular basis.
So here is another one. Is it a lucrative and growing market?
One way to head off at least some of the problems is to educate your users about certain key computing basics. Questions on data administration, DBMS products, tools, SQL, and so on. There is a lot to learn. The tools available to protect sensitive resources and networks are tedious to use, non-intuitive, and often require expert knowledge.
Seems like it is imminent.
This time Oracle is fighting it out with SAP for the right to buy another application software vendor, Retek.
I've never experienced anything like this! but don't get too carried away by the concept. I'll blog a general interest entry like this every now and then. This blog entry, and the next few, will discuss some basic rules of thumb for DBAs to follow to make their job easier to deal with. And it looks like it is going to be a good one. I don't mind if folks e-mail me, but I can't always get around to responding to everyone who e-mails.
I am not talking about the gargantuan battle for PeopleSoft that Oracle waged for over a year. Or a stagnant and difficult one?
This paper presents a new security model, WindowBox, which presents the user with a model in which the workstation is divided into multiple desktops.
Seems like it is imminent.
I've never experienced anything like this! Why are folks so tentative?
I don't mind if folks e-mail me, but I can't always get around to responding to everyone who e-mails. So let's take a short diversion to review some of the fundamentals of database management systems. So here is another one.
I've never experienced anything like this! There is a lot to learn. Each desktop is sealed off from the others, giving users a means to confine the possibly dangerous results of their actions. But they're not always wrong. Seems like it is imminent.
The webcast provides information on how to protect the workstations, and also discusses five steps to security.


reply via email to

[Prev in Thread] Current Thread [Next in Thread]