Complex Constrained Security
Setting up your authorization and security can be fairly easy, but perhaps we ought to consider more complex scenarios.
2019-02-06
57 reads
Setting up your authorization and security can be fairly easy, but perhaps we ought to consider more complex scenarios.
2019-02-06
57 reads
Disaster recovery planning can be hard, and we often forget about some of the non technical issues.
2019-02-05
61 reads
2019-02-04
74 reads
2019-02-04
1,120 reads
Steve is looking for entertainment suggestions after the Oscar nominations were released.
2019-02-01
56 reads
2020-01-22 (first published: 2019-01-31)
395 reads
2019-01-30
3,018 reads
2019-01-29
109 reads
From the time you rise in the morning until you close your eyes at night, your day is filled with thousands of small decisions, many that you don’t even think about. For each decision that you make, there is a probably a good choice and a poor choice available. Most of the time, the good […]
2019-01-28
132 reads
2019-01-28
119 reads
By Chris Yates
There was a time when the Chief Data Officer lived in the shadows of...
By Rayis Imayev
"But I don’t want to go among mad people," Alice remarked."Oh, you can’t help...
By Steve Jones
I saw some good reviews of the small gemma3 model in a few places...
Comments posted to this topic are about the item Create an HTML Report on...
Comments posted to this topic are about the item SQL Server Advanced Troubleshooting and...
Comments posted to this topic are about the item T-SQL Fundamentals