Category: Information Technology

  • Notes on SSIS packages (part 1)

    1. In a dataflow, if there are errors in the source (oledb or other) , for example, a conversion to date fails at some column – row,  there may still be data that were committed to the destination OLEDB before the error happened. The Rows Per Batch field is usually empty or -1, which defaults to 1000, so…

  • PowerToys, a great set of windows utilities!

    I have been using PowerToys since windows xp, They are a great set of free windows utilities that has improved a lot over time. Latest version (May 2023), has a new utility that I really found helpful. It’s called Mouse Without Borders. If you have multiple monitors and computers , you can simply connect the…

  • Possible Taiwan crisis will trigger world chip shortage chaos

    This article draws the landscape in the China Taiwan conflict and how that may affect the global chip’s supply . https://fortune.com/2023/04/12/warren-buffett-tsmc-taiwan-chipmaker-china-war-foxconn-terry-gou-emmanuel-macron/

  • TPM 2 vulnerabilities discovered

    Buffer overflow vulnerabilities were discovered recently in TPM 2 implementations. Related article here : https://kb.cert.org/vuls/id/782720 TPM 2 (Trusted Platform Module) is the latest version of this hardware security technology. More info on TPM here : https://learn.microsoft.com/en-us/windows/security/information-protection/tpm/trusted-platform-module-overview On a high level description, this security technology involves hardware encryption for sensitive data used in a computer (logins…