Breaking Biometrics
Fingerprint readers on laptops are shown not to be as secure as they could be, and primarily because the manufacturers haven't done a good job implementing the secure protocols.
Fingerprint readers on laptops are shown not to be as secure as they could be, and primarily because the manufacturers haven't done a good job implementing the secure protocols.
Dive deep into the powerful SQL window functions, LAG() and LEAD(). Explore their intricacies, discover real-world examples, and avoid common pitfalls.
Azure SQL Managed Instance is fully managed SQL Server instance hosted in Azure cloud. Managed Instance introduces some limits such as max log write throughput that can slow down your workload. In this post you will see how to identify write log throughput issue on Managed Instance.
As data grows and databases become larger and more complicated, data
subsetting provides a method of working with a smaller, lighter copy of a
database to make development and testing faster and easier.
In this article, James Hemson poses the questions; what exactly is data subsetting, how and why are developers using it – or not using it, and
what’s prompting conversations about it?
Love is many a splendored thing. It is also a much-abused word with many different (and twisted) meanings. The type of love I wish to speak about today is not friendship, nor the kind of thing that makes your heart go pitter patter in the springtime, but rather the type of love known as storge, […]
Steve has some advice on how to grow your career by growing your skills and developing deeper knowledge.
This article looks at the basics of the OVER() clause and how the PARTITION section works.
The rise of cross platform databases which are both on-premises and in the cloud, alongside decreasing customer satisfaction and trust in digital channels, has increased the importance - and value - of enhanced database monitoring. Find out how using a database monitoring tool creates value for the whole organization.
This article covers how to use the different date and time functions when working with Spark SQL.
The first three levels of this series have been the lead-up to this level, automating the database deployment with Azure Pipelines. First, we started with an introduction to Azure DevOps and the Git client. Next, SQL Source Control was introduced to manage a database’s schema and manually deploy changes from the database to source control […]
By Steve Jones
Recently a customer asked how they could get index changes to be captured in...
By Steve Jones
giltwrights – n. the imaginary committee of elders that keeps a running log of...
By DataOnWheels
Hey folks, fun personal post today. A few weeks ago, I got married! My...
Comments posted to this topic are about the item SQL Window Functions Series: LAG()...
Comments posted to this topic are about the item Breaking Biometrics
Comments posted to this topic are about the item Attaching Databases