Working Under Pressure
A time of crisis means a lot of things to people in technology, but Steve Jones talks about something that's often forgotten.
2008-08-25
58 reads
A time of crisis means a lot of things to people in technology, but Steve Jones talks about something that's often forgotten.
2008-08-25
58 reads
As DBAs we must secure and protect data, but what can we do when there are fundamental issues with the way the systems are designed. Steve Jones comments on problems with voting machines.
2008-08-23
62 reads
Gaining recognition or an award without earning it is something Steve Jones thinks is a problem in society in general, and it's filtered into the IT industry.
2008-08-23
72 reads
Gaining recognition or an award without earning it is something Steve Jones thinks is a problem in society in general, and it's filtered into the IT industry.
2008-08-23
57 reads
Gaining recognition or an award without earning it is something Steve Jones thinks is a problem in society in general, and it's filtered into the IT industry.
2008-08-23
61 reads
As DBAs we must secure and protect data, but what can we do when there are fundamental issues with the way the systems are designed. Steve Jones comments on problems with voting machines.
2008-08-22
231 reads
As DBAs we must secure and protect data, but what can we do when there are fundamental issues with the way the systems are designed. Steve Jones comments on problems with voting machines.
2008-08-22
238 reads
It is an interesting problem in Transact SQL, for which there are a number of solutions and considerable debate. How do you go about producing a summary result in which a distinguishing column from each row in each particular category is listed in a 'aggregate' column? A simple, and intuitive way of displaying data is surprisingly difficult to achieve. Anith Sen gives a summary of different ways, and offers words of caution over the one you choose.
2008-08-22
4,249 reads
Lately it seems like SQL Injection attacks have been increasing. Recently our team has worked through resolving a few different SQL Injection attacks across a variety of web sites. Each of these attacks had a number of similarities which proved to point back to the same source. With this information in hand, the resolution should be much quicker. As such, if your web site is attacked with SQL Injection, how should you address it? How can the identification, analysis, recovery and resolution be streamlined? What are some lessons learned?
2008-08-22
4,820 reads
This video covers lift charts, an advanced data mining feature in SQL Server 2008. MVP Brian Knight walks through a data mining example that tests a model with a lift chart.
2008-08-21
2,176 reads
By Steve Jones
on tenderhooks – adj. feeling the primal satisfaction of being needed by someone, which...
By DataOnWheels
I have been active in the data community throughout my career. I have met...
By Vinay Thakur
Quick Summary for Microsoft SQL Server till 2025, I am fortunate to be part...
I have a quick question on Ola Hallengren Index Optimize Maintenance . Do we...
hi, in an ssis for each loop over an object variable called MyListVariable, i...
SQL Server is typically viewed as a transactional or analytical database engine. However, it...
On SQL Server 2025, when I run this, what is returned?
SELECT EDIT_DISTANCE_SIMILARITY('SQL Server', 'MySQL') See possible answers