Picture this, your data ingestion team has created a table that has the sales for each month year split into different columns. At first glance, you may think “what’s...
2024-05-13 (first published: 2024-05-10)
20 reads
Another security fundamentals topic is authentication versus authorization. For those who have a clear understanding of the difference between the two, like with Recovery Point Objective (RPO) vs. Recovery...
2024-05-13 (first published: 2024-05-03)
35 reads
I did a post last month titled RTO and RPO are myths unless you've tested recovery, but I only briefly covered what RPO and RTO are. This post goes...
2024-05-13 (first published: 2024-05-10)
142 reads
In information security (INFOSEC), there several foundational concepts and principles. One of the ones that’s introduced almost immediately is called the CIA triad or the Information Security Triad. While...
2024-05-13 (first published: 2024-04-26)
173 reads
I recently reviewed, worked on, and added a similar example to the DATETIMEOFFSET Microsoft Learn Docs article at the recommendation of my colleague Randolph West, who guessed (accurately) I...
2024-05-13 (first published: 2024-05-03)
26 reads
Recently I’ve been looking at archiving some data at SQL Saturday. As a start, I needed to read some of the archive data I have in Python. This post...
2024-05-13 (first published: 2024-05-12)
19 reads
Data isn't just about numbers and spreadsheets. It holds stories, patterns, and the answers to questions that can drive your business forward. To unlock this potential, you need the...
2024-05-13 (first published: 2024-05-07)
16 reads
Have you ever wanted to filter a visual by selecting a range of values for a measure? You may have found that you cannot populate a slicer with a...
2024-05-13 (first published: 2024-05-01)
170 reads