Category: Information Technology
-
Notes on SSIS packages (part 1)
1. In a dataflow, if there are errors in the source (oledb or other) , for example, a conversion to date fails at some column – row, there may still be data that were committed to the destination OLEDB before the error happened. The Rows Per Batch field is usually empty or -1, which defaults to 1000, so…
-
PowerToys, a great set of windows utilities!
I have been using PowerToys since windows xp, They are a great set of free windows utilities that has improved a lot over time. Latest version (May 2023), has a new utility that I really found helpful. It’s called Mouse Without Borders. If you have multiple monitors and computers , you can simply connect the…
-
Possible Taiwan crisis will trigger world chip shortage chaos
This article draws the landscape in the China Taiwan conflict and how that may affect the global chip’s supply . https://fortune.com/2023/04/12/warren-buffett-tsmc-taiwan-chipmaker-china-war-foxconn-terry-gou-emmanuel-macron/
-
TPM 2 vulnerabilities discovered
Buffer overflow vulnerabilities were discovered recently in TPM 2 implementations. Related article here : https://kb.cert.org/vuls/id/782720 TPM 2 (Trusted Platform Module) is the latest version of this hardware security technology. More info on TPM here : https://learn.microsoft.com/en-us/windows/security/information-protection/tpm/trusted-platform-module-overview On a high level description, this security technology involves hardware encryption for sensitive data used in a computer (logins…