An object lesson about what is really important
A story I heard a long time ago reminds us to choose what is really important.
2016-08-11
116 reads
A story I heard a long time ago reminds us to choose what is really important.
2016-08-11
116 reads
The potential vulnerabilities of wireless devices might be a security issue for databases.
2016-08-10
105 reads
When do you have too much data? What do you do if you aren't actually using all of it?
2016-08-09
83 reads
This week Steve Jones looks at a new idea, rating the security of products publicly to try and shame vendors into more secure coding.
2016-08-08
89 reads
The complexity of tables makes modifying them over time a challenge, especially as data sizes grow.
2016-08-08
64 reads
Too many failovers can cause problems, as can those that happen to often. Steve Jones says you need to consider whether you always need to failover in a sitaution.
2016-08-05
169 reads
2016-08-04
226 reads
It's possible to change a software development team and dramatically improve things. Steve Jones highlights an example from Redgate Software.
2016-08-02
94 reads
2016-08-01
66 reads
Passwords are a problem, especially when we're in a hurry. What should we do?
2016-08-01
89 reads
By Vinay Thakur
Continuing from Day 6 we learned Embeddings, Semantic Search and Checks, on Day 7...
By Vinay Thakur
Continuing from Day 5 where we covered notebooks, HuggingFace and fine tuning AI now...
By Steve Jones
This is kind of a funny page to look at. The next page has...
Comments posted to this topic are about the item Why End-User Testing Is Even...
I have a table I didn't design that has tons of repeating groups in...
Comments posted to this topic are about the item Writing as an Art and...
What is the range for the result from the EDIT_DISTANCE_SIMILARITY() function in SQL Server 2025?
See possible answers