Trusting Online
How do you earn trust online? How do you decide who to trust? Steve Jones comments a bit about this this works in the digital world.
2009-06-25
484 reads
How do you earn trust online? How do you decide who to trust? Steve Jones comments a bit about this this works in the digital world.
2009-06-25
484 reads
With the GDR release, a whole new set of deployment functionality has become available to VSTS: DB.
2009-06-24
5,536 reads
Changing a database an integral and crucial part in every application's life cycle. Part 1 of this series looks at the steps and procedures prior to implementing the change
2009-06-24
3,907 reads
We look at performing the same task for the sys.dm_db_index_operational_stats Dynamic Management Function (or DMF.) The process is identical, the code is however quite different due to the structural differences between sys.dm_db_index_usage_stats and sys.dm_db_index_operational_stats.
2009-06-24
2,265 reads
Part 1 discussed ways to find opportunities, Part 2 was about how to get more interviews, and today we’ll cover some tips from the employer perspective. Don’t use an AOL.com email address. Seriously. Gmail, Live, Yahoo, all are good, but AOL.com makes...
2009-06-24
2,538 reads
In this SQL School video, Andy Warren shows how you can alter a table to add a computed column. This is part 1 of 2.
2009-06-23
4,649 reads
In this article, Edward Elliot shows us how to capture the types, size and location of SQL Server I/O requests.
2009-06-23
9,808 reads
Most companies in a recent survey expect to get hacked this year. Steve Jones wishes that the technological leaders would help everyone develop more secure code by publishing more information.
2009-06-23
683 reads
Most companies in a recent survey expect to get hacked this year. Steve Jones wishes that the technological leaders would help everyone develop more secure code by publishing more information.
2009-06-23
734 reads
Most companies in a recent survey expect to get hacked this year. Steve Jones wishes that the technological leaders would help everyone develop more secure code by publishing more information.
2009-06-23
927 reads
By DataOnWheels
Thanks to everyone who joined the blog party this month. I noticed three themes...
By Vinay Thakur
This week has training on AI – Cyber security experts – Omar Santos and...
Following on from my previous post on building The Burrito Bot, I want to...
Comments posted to this topic are about the item What's new in R 4.6
Comments posted to this topic are about the item Interesting Changes in R, which...
Comments posted to this topic are about the item PostgreSQL String Functions Part 1
When thinking about the identity property and sequence objects, which of these can generate values before an insert statement is executed?
See possible answers