Complex Constrained Security
Setting up your authorization and security can be fairly easy, but perhaps we ought to consider more complex scenarios.
2019-02-06
64 reads
Setting up your authorization and security can be fairly easy, but perhaps we ought to consider more complex scenarios.
2019-02-06
64 reads
Disaster recovery planning can be hard, and we often forget about some of the non technical issues.
2019-02-05
67 reads
2019-02-04
79 reads
2019-02-04
1,199 reads
Steve is looking for entertainment suggestions after the Oscar nominations were released.
2019-02-01
60 reads
2020-01-22 (first published: 2019-01-31)
401 reads
2019-01-30
3,072 reads
2019-01-29
114 reads
From the time you rise in the morning until you close your eyes at night, your day is filled with thousands of small decisions, many that you don’t even think about. For each decision that you make, there is a probably a good choice and a poor choice available. Most of the time, the good […]
2019-01-28
142 reads
2019-01-28
126 reads
By Vinay Thakur
Continuing from Day 6 we learned Embeddings, Semantic Search and Checks, on Day 7...
By Vinay Thakur
Continuing from Day 5 where we covered notebooks, HuggingFace and fine tuning AI now...
By Steve Jones
This is kind of a funny page to look at. The next page has...
Comments posted to this topic are about the item Why End-User Testing Is Even...
I have a table I didn't design that has tons of repeating groups in...
Comments posted to this topic are about the item Writing as an Art and...
What is the range for the result from the EDIT_DISTANCE_SIMILARITY() function in SQL Server 2025?
See possible answers