Loyalty Cards
Many businesses have loyalty programs to encourage repeat business. However do they think about data security when they build these programs? Steve Jones thinks they could do better.
2009-08-06
465 reads
Many businesses have loyalty programs to encourage repeat business. However do they think about data security when they build these programs? Steve Jones thinks they could do better.
2009-08-06
465 reads
Many businesses have loyalty programs to encourage repeat business. However do they think about data security when they build these programs? Steve Jones thinks they could do better.
2009-08-06
726 reads
Many businesses have loyalty programs to encourage repeat business. However do they think about data security when they build these programs? Steve Jones thinks they could do better.
2009-08-06
482 reads
Part two of his series on table schema changes, this article examines those changes that affect the actual data. Read this great article from Alok Dwivedi.
2009-08-05
5,182 reads
Full/partial schema refreshes across environments are a regular requirement in databases. This article builds on a previous article, providing scripts to disable and re-enable foreign key constraints on all of the tables in a schema.
2009-08-05
3,175 reads
In his previous article “Hyper-V, an introduction” Jaap Wesselius explained about the Hypervisor, the parent partition, the child partition, and Integration Components. In this article Jaap discusses installing Hyper-V, all kinds of Virtual Hard Disks, Virtual Networks, and some best practices.
2009-08-05
2,325 reads
What's your stolen data worth? It might be worth investigating, as Steve Jones suggests. Then you'll know how much you should be spending to protect it.
2009-08-05
616 reads
What's your stolen data worth? It might be worth investigating, as Steve Jones suggests. Then you'll know how much you should be spending to protect it.
2009-08-05
667 reads
What's your stolen data worth? It might be worth investigating, as Steve Jones suggests. Then you'll know how much you should be spending to protect it.
2009-08-05
447 reads
This article is an attempt to explain the application of new XML support in SQL Server 2005 for efficient data storage and performance.
2009-08-04
4,172 reads
By Vinay Thakur
Continuing from Day 5 where we covered notebooks, HuggingFace and fine tuning AI now...
By Steve Jones
This is kind of a funny page to look at. The next page has...
A while ago I blogged about a use case where a pipeline fails during...
I have a table I didn't design that has tons of repeating groups in...
Comments posted to this topic are about the item Writing as an Art and...
Comments posted to this topic are about the item String Similarity II
What is the range for the result from the EDIT_DISTANCE_SIMILARITY() function in SQL Server 2025?
See possible answers