Viewing 15 posts - 586 through 600 (of 6,034 total)
In addition to protecting your organization's IT from external threats using firewalls, passwords, and encryption, we also need to implement internal security controls, like with least privilege. That way, even...
February 26, 2019 at 6:59 am
Is this more of a religious debate about whether everybody is 'sposta' make their data lake immutable?
Azure Blob Storage already has an optional immutable (Write Once, Read Many)...
February 26, 2019 at 6:49 am
February 25, 2019 at 12:50 pm
February 25, 2019 at 7:12 am
Four year university degrees will become more affordable when the job market collectively decides that it's no longer essential.
February 25, 2019 at 6:42 am
Flexibility is good, and it would help. But, for the most folks, especially in the 20-something recent graduate age range, the cash value for one work week would hardly make...
February 22, 2019 at 6:45 am
.. Recently there was a data breach from B&Q, a home improvement retailer in the UK, where 70,000 names were lost. These weren't customers, but rather people that had been...
February 21, 2019 at 7:44 am
February 21, 2019 at 7:35 am
February 20, 2019 at 3:00 pm
February 20, 2019 at 2:58 pm
Rather than hash key matching, consider implementing Change Tracking on the source table, and then leverage that to perform a differential merge.
https://youtu.be/ZNUN9qejCfc
February 20, 2019 at 12:39 pm
February 20, 2019 at 9:11 am
Ask 10 users what perfection looks like, and you'll get 10 different answers. Ask them again the following week, and you'll have 20 different answers. So, in reality, "perfection" can...
February 19, 2019 at 7:53 am
February 13, 2019 at 1:48 pm
The problem with Google and FaceBook is that they want to create this alternate digital universe where they are essentially an all knowing, all judging, all powerful God. A universe...
February 13, 2019 at 10:16 am
Viewing 15 posts - 586 through 600 (of 6,034 total)