2020-02-22
94 reads
2020-02-22
94 reads
As JSON documents becomes increasingly widely used, as the interface between application and database, Phil Factor reckons it's about time JSON Schema was built-in to SQL Server, alongside XML Schema.
2020-01-25
288 reads
Phil Factor's offers tips for longevity in the world of IT consultancy: listen well, humiliate no-one and convince others that it was their expertise that solved the problem.
2020-01-18
291 reads
At work in IT, we can wander around looking important with no apparent useful skills whatsoever. When working outside the bubble of the industry, things are different.
2019-12-14
253 reads
Until you open the box your data is, like Schrödinger's cat, both safe and breached.
2019-11-16
140 reads
Phil Factor on the difficult task of guarding against the theft of data from within an organization.
2019-10-19
196 reads
Is the DBA a fading star? More likely, there is a general lack of understanding of the roles of the different types of DBA, and of the other IT teams that ensure that successful application developments happen in any large enterprise.
2019-09-25 (first published: 2015-06-08)
599 reads
With the help of a database that provides fully representative data, we can do a great deal more to advance medical and pharmaceutical science. Phil Factor explains what stands in our way.
2019-09-21
276 reads
If you've ever stuffed SQL Server onto a Raspberry Pi 4 and given it a pet name, don't worry, you're not alone…
2019-08-24
279 reads
Phil Factor on dealing with "immutable" domain data during database development and deployment.
2019-08-16 (first published: 2016-01-18)
365 reads
By Steve Jones
vicarous – adj. curious to know what someone else would do if they were...
Say we have a database that we want to migrate a copy of into...
We are trying to get apps and users off of using SQL accounts to...
Hi I have this view to check if a job is running: SELECT...
All, if you are like me and do not care for the built-in color...
Certain internal SQL Server actions cause internal checkpoints. Which of these actions does not cause an internal checkpoint?
See possible answers