Viewing 15 posts - 1,741 through 1,755 (of 3,656 total)
We use it for proof-of-concept stuff because the costs of spinning up hardware, storage etc just for a test is prohibitive. As much of what we do requires large...
February 5, 2013 at 9:42 am
I've actively shooed spectators away from my colleagues desks during a difficult deployment.
You...stay I need you to do this.
You....stay I need you to do that.
The rest of you, I will...
February 4, 2013 at 5:45 am
I know a lot of good folks looked at that and, having worked with Adjacency Lists where both the child and parent IDs are numeric, might wonder why you even...
February 4, 2013 at 4:50 am
@jeff, it sounds as if you should write a counterpoint article for EAV.
Streaming stuff into an EAV has never been a problem, its the use cases for getting it out...
February 1, 2013 at 7:50 am
@jeff What sort of size, scale and traffic are you putting through your EAV models?
January 31, 2013 at 3:48 pm
Don't forget that 64bit removes the limit on the size of the proc cache. Under 32bit SQL proc cache was limited to 2GB so it would never munch its...
January 28, 2013 at 9:54 am
OK, to summarise all this.
There ARE valid use cases for EAV models as was...
January 24, 2013 at 1:48 am
Sergiy (1/21/2013)
And if you do not know how to retrieve items with all 3 attributes having requested values it indicates weakness of your SQL skills, not EAV model.
It isn't a...
January 21, 2013 at 2:30 pm
@eric, it depends on what you want to do with those contact details. If it is just a block of unstructured data that you want to eyeball whenever you...
January 21, 2013 at 12:20 pm
Eric M Russell (1/21/2013)
January 21, 2013 at 11:41 am
Apparently if you could send an iPad2 back to 1997 it would be the 7th most powerful computer on earth.
My first computer was a Commodore Vic20 with 3.5K RAM and...
January 18, 2013 at 9:10 am
I'm another one who agrees with JimBob.
I got excited about external activiation but this is service broker talking to an external app, not an external app talking to service broker.
There...
January 17, 2013 at 1:26 am
I think that vendors should react faster when a vulnerability is identified. Putting it on the some-time-maybe-never inclusion in the next release simply isn't good enough.
Similarly it would be...
January 14, 2013 at 7:09 am
Given that audit logs are not read frequently I feel we need to consider where the appropriate place is to store audit logs.
Clearly they need to be secure so they...
January 11, 2013 at 1:39 am
I initially thought Big Data was a "so what" but then had an epiphany.
Big Data is not an IT term, it is a business term and as such it is...
January 9, 2013 at 5:20 am
Viewing 15 posts - 1,741 through 1,755 (of 3,656 total)