Monoliths and Microservices
Should we build modern software as monoliths or microservices? Or something else? Steve has a few thoughts today.
2025-03-24
135 reads
Should we build modern software as monoliths or microservices? Or something else? Steve has a few thoughts today.
2025-03-24
135 reads
I won't even try to hide it. I got a huge kick out of the penguin characters in the animated movie, Madagascar. For those who don't know, they're trying to escape the zoo, but are trying to hide that from anyone discovering it. So, they put up a front, "Smile and wave boys. Smile and […]
2025-03-22
85 reads
Code is vulnerable to supply chain attacks, which aren't something many of us think about.
2025-03-21
106 reads
We all know security is important, but we sometimes make the job harder when we don't handle data appropriately.
2025-03-19
165 reads
Phil Factor explains the enduring attachment of database developers to wildcards, despite their current deficiencies.
2025-03-17 (first published: 2018-12-17)
489 reads
It can be hard to change peoples' habits and get them to adopt new technology.
2025-03-15
99 reads
2025-03-14 (first published: 2018-11-02)
278 reads
2025-03-12 (first published: 2018-10-19)
1,034 reads
The ways in which you might try and reverse engineer a database design are on Steve's mind today.
2025-03-10 (first published: 2018-11-30)
310 reads
CSO recently published an article based on a report from Harmonic about generative AI data leaks, and the findings were eye-opening. According to the report, over 8% of employee prompts to public large language models (LLMs) contained sensitive data, ranging from security and compliance issues to privacy and legal vulnerabilities. This wasn’t just a handful […]
2025-03-08
146 reads
By Brian Kelley
If you want to learn better, pause more in your learning to intentionally review.
By John
If you’ve used Azure SQL Managed Instance General Purpose, you know the drill: to...
By DataOnWheels
Ramblings of a retired data architect Let me start by saying that I have...
Not sure if this is really a relational theory question but it seems about...
Hi everyone, Below is a consolidated summary of what we validated Architecture & data...
Hi all, I recently moved to a new employer who have their HA setup...
I have this data in a SQL Server 2025 table:
CREATE TABLE Response ( ResponseID INT NOT NULL CONSTRAINT ResponsePK PRIMARY KEY , ResponseVal VARBINARY(5000) ) GOIf I want to get a value from this table that I can add to a URL in a browser, which of these code items produces a result I can use? See possible answers