Complex Constrained Security
Setting up your authorization and security can be fairly easy, but perhaps we ought to consider more complex scenarios.
2019-02-06
64 reads
Setting up your authorization and security can be fairly easy, but perhaps we ought to consider more complex scenarios.
2019-02-06
64 reads
Disaster recovery planning can be hard, and we often forget about some of the non technical issues.
2019-02-05
67 reads
2019-02-04
79 reads
2019-02-04
1,190 reads
Steve is looking for entertainment suggestions after the Oscar nominations were released.
2019-02-01
60 reads
2020-01-22 (first published: 2019-01-31)
401 reads
2019-01-30
3,067 reads
2019-01-29
114 reads
From the time you rise in the morning until you close your eyes at night, your day is filled with thousands of small decisions, many that you don’t even think about. For each decision that you make, there is a probably a good choice and a poor choice available. Most of the time, the good […]
2019-01-28
142 reads
2019-01-28
126 reads
By Vinay Thakur
it has been a year since i have not written much on the blog...
By Steve Jones
on tenderhooks – adj. feeling the primal satisfaction of being needed by someone, which...
By DataOnWheels
I have been active in the data community throughout my career. I have met...
I have a quick question on Ola Hallengren Index Optimize Maintenance . Do we...
hi, in an ssis for each loop over an object variable called MyListVariable, i...
SQL Server is typically viewed as a transactional or analytical database engine. However, it...
On SQL Server 2025, when I run this, what is returned?
SELECT EDIT_DISTANCE_SIMILARITY('SQL Server', 'MySQL') See possible answers