Techno Security East: Quantum Computing Slides
I always try and ensure that I post my slides to my talks here on my blog. Here are the slides that I used for my Quantum Computing and...
2025-06-05
7 reads
I always try and ensure that I post my slides to my talks here on my blog. Here are the slides that I used for my Quantum Computing and...
2025-06-05
7 reads
The Techno Security & Digital Forensics Conference (East) runs from June 3-5, 2025, this year in Wilmington, NC. I'll be speaking on Thursday, June 5, from 11:30 AM -12:20...
2025-05-26
12 reads
I wrote not too long ago about planning out downtime, but I found a great article from the Harvard Business Review about the importance of doing so. The article...
2025-05-06
20 reads
Now that I’ve completed both TOGAF 9 tests, I am putting up a couple of quick posts on how I prepared for these Enterprise Architecture exams.
2025-05-05
21 reads
Now that I've completed both TOGAF 9 tests, I am putting up a couple of quick posts on how I prepared for these Enterprise Architecture exams.
2025-05-02
22 reads
If we aren't having the same conversation, we aren't going to be heard. That's what Charles Duhigg, author of The Power of Habit, covered in the following TED talk:
2025-04-18 (first published: 2025-03-31)
350 reads
I admit that until I read the article, Who are you as a Leader?, I had never heard of an identity map. It's a pretty simply thing: mapping all...
2025-04-11 (first published: 2025-04-01)
508 reads
Core skills depends on the position, but the point is that ensuring you have a strong foundational base for your chosen area is better than reaching for emerging skills.
2025-03-28
91 reads
Digital exhaust, or data exhaust, is the information you generate as you interact digitally. We've typically thought of this in terms of tracking cookies and the like, but it...
2025-03-07 (first published: 2025-02-25)
179 reads
Most of us know that spending a lot of time on social media and surfing the web isn't good for us, but we still do it. Why? Because it...
2025-01-17 (first published: 2025-01-07)
491 reads
By Steve Jones
Fear is fueled by a lack of imagination. The antidote to fear is not...
The slidedeck and the SQL scripts for the session Indexing for Dummies can be...
By Chris Yates
Change is not a disruption in technology; it is the rhythm. New frameworks appear,...
Comments posted to this topic are about the item Building AI Governance and Policies-...
Why is sql doing a full scan VS seeking on the index? I've included...
We have a report that has multiple tables that list the top 15 performers...
The DBCC CHECKIDENT command is used when working with identity values. I have a table with 10 rows in it that looks like this:
TravelLogID CityID StartDate EndDate 1 1 2025-01-11 2025-01-16 2 2 2025-01-11 2025-01-16 3 3 2025-01-11 2025-01-16 4 4 2025-01-11 2025-01-16 5 5 2025-01-11 2025-01-16 6 6 2025-01-11 2025-01-16 7 7 2025-01-11 2025-01-16 8 8 2025-01-11 2025-01-16 9 9 2025-01-11 2025-01-16 10 10 2025-01-11 2025-01-16The docs for DBCC CHECKIDENT say this if I run with only the table parameter: "If the current identity value for a table is less than the maximum identity value stored in the identity column, it is reset using the maximum value in the identity column. " I run this code:
DELETE dbo.TravelLog WHERE TravelLogID >= 9 GO DBCC CHECKIDENT(TravelLog, RESEED) GO INSERT dbo.TravelLog ( CityID, StartDate, EndDate ) VALUES (4, '2025-09-14', '2025-09-17') GOWhat is the identity value for the new row inserted by the insert statement above? See possible answers