Complex Constrained Security
Setting up your authorization and security can be fairly easy, but perhaps we ought to consider more complex scenarios.
2019-02-06
64 reads
Setting up your authorization and security can be fairly easy, but perhaps we ought to consider more complex scenarios.
2019-02-06
64 reads
Disaster recovery planning can be hard, and we often forget about some of the non technical issues.
2019-02-05
67 reads
2019-02-04
1,190 reads
2019-02-04
79 reads
Steve is looking for entertainment suggestions after the Oscar nominations were released.
2019-02-01
60 reads
2019-01-30
3,067 reads
2019-01-29
114 reads
From the time you rise in the morning until you close your eyes at night, your day is filled with thousands of small decisions, many that you don’t even think about. For each decision that you make, there is a probably a good choice and a poor choice available. Most of the time, the good […]
2019-01-28
142 reads
2019-01-28
126 reads
Disaster recovery is one of those situations that we plan for and hope we never experience. Are you prepared?
2019-01-25
49 reads
By Steve Jones
on tenderhooks – adj. feeling the primal satisfaction of being needed by someone, which...
By DataOnWheels
I have been active in the data community throughout my career. I have met...
By Vinay Thakur
Quick Summary for Microsoft SQL Server till 2025, I am fortunate to be part...
hi, in an ssis for each loop over an object variable called MyListVariable, i...
SQL Server is typically viewed as a transactional or analytical database engine. However, it...
Hello, Is there a way in Azure SQL Database to change the 'Blocking Process...
On SQL Server 2025, when I run this, what is returned?
SELECT EDIT_DISTANCE_SIMILARITY('SQL Server', 'MySQL') See possible answers