Query data with no SQL code in SQL Server
A beginner free course for analysist and everyone who don't want to learn SQL language but need to query data from a database. Report designer or specification writes can learn how to use a built-in visual gui tool in SQL Server Management Studio. Lean to use Query Designer in this short (40 minutes) course in 11 sections:
That means the next time you relink a table, the date/time field definition becomes the new data type. The issue with that is there is no corresponding type in VBA and any code you have that works with the field will treat it as a string. This will break your application.
At the present time, the only thing you can do is roll back to 2008.
There is a bug in the september cumulative (security-) update for windows server 2016 1607 that cripples the ability to pre-set security options using GPOs. Microsoft is aware of the problem and there are two workarounds mentioned.
For all those admins who think immediate patching doesn't matter: without installing the August (or September) 2020 updates on your machines, any malicious insider or someone who simply plugged in a device to an on-premise network port can immediately take over the whole network.
Too bad: the problem was patched in August, the attack script was available (for people in the know) in its current form since February, maybe even much earlier.
Enabling the integration of SharePoint within Dynamics 365 gets the documents you currently have in Microsoft Dynamics 365 moved to Microsoft SharePoint, It is the best way I know of saving money on Dynamics storage, and having the documents in SharePoint is actually a plus. Check out the video I just made on how to enable it https://www.youtube.com/watch?v=ABpHzvcEc-A
The online grocery market in Nordic countries is currently in the midst of seismic change due to the COVID-19 pandemic. In the hunt for daily-use items, people across Nordics have turned to online shopping, skyrocketing the adoption rate of grocery delivery services
Attention, this is a warning you admins should take seriously: there is exploit code available for windows 10 that allows a local user to elevate to admin... so far nothing new, we have that almost every month. Only that this time, Microsoft will not be able to patch it unless you actively co-operate.
If you use WSUS or configmgr to deploy windows 10 feature upgrades (ANY version up to 20H1), you will HAVE TO decline those packages on WSUS/configmgr and sync the latest (patched) feature update bundles and approve those for deployment. Also make sure that no setups linger at your clients in a "downloaded, ready to install" state.
What the old, unpatched setups do: they allow attackers to create a fake temporary setup folder and place scripts within that get executed by the update service (=system) account. The same holds of course true for any ISOs that you might have downloaded before August 11th, 2020 - delete them and re-download them. https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1571 assesses this as "Exploitation Less Likely" and "not exploited", but I saw videos of people demonstrating how to exploit it.