Breaking Biometrics
Fingerprint readers on laptops are shown not to be as secure as they could be, and primarily because the manufacturers haven't done a good job implementing the secure protocols.
Fingerprint readers on laptops are shown not to be as secure as they could be, and primarily because the manufacturers haven't done a good job implementing the secure protocols.
Dive deep into the powerful SQL window functions, LAG() and LEAD(). Explore their intricacies, discover real-world examples, and avoid common pitfalls.
Azure SQL Managed Instance is fully managed SQL Server instance hosted in Azure cloud. Managed Instance introduces some limits such as max log write throughput that can slow down your workload. In this post you will see how to identify write log throughput issue on Managed Instance.
As data grows and databases become larger and more complicated, data
subsetting provides a method of working with a smaller, lighter copy of a
database to make development and testing faster and easier.
In this article, James Hemson poses the questions; what exactly is data subsetting, how and why are developers using it – or not using it, and
what’s prompting conversations about it?
Love is many a splendored thing. It is also a much-abused word with many different (and twisted) meanings. The type of love I wish to speak about today is not friendship, nor the kind of thing that makes your heart go pitter patter in the springtime, but rather the type of love known as storge, […]
Steve has some advice on how to grow your career by growing your skills and developing deeper knowledge.
This article looks at the basics of the OVER() clause and how the PARTITION section works.
The rise of cross platform databases which are both on-premises and in the cloud, alongside decreasing customer satisfaction and trust in digital channels, has increased the importance - and value - of enhanced database monitoring. Find out how using a database monitoring tool creates value for the whole organization.
This article covers how to use the different date and time functions when working with Spark SQL.
The first three levels of this series have been the lead-up to this level, automating the database deployment with Azure Pipelines. First, we started with an introduction to Azure DevOps and the Git client. Next, SQL Source Control was introduced to manage a database’s schema and manually deploy changes from the database to source control […]
Every organization I talk to has the same problem dressed up in different clothes....
By DataOnWheels
I am delighted to host this month’s T-SQL Tuesday invitation. If you are new...
By alevyinroc
Ten years (and a couple jobs) ago, I wrote about naming default constraints to...
Comments posted to this topic are about the item The day-to-day pressures of a...
Comments posted to this topic are about the item Using OPENJSON
Comments posted to this topic are about the item Data Modeling with dbt for...
I have some data in a table that looks like this:
BeerID BeerName brewer beerdescription 1 Becks Interbrew Beck's is a German-style pilsner beer 2 Fat Tire New Belgium Toasty malt, gentle sweetness, flash of fresh hop bitterness. 3 Mac n Jacks Mac & Jack's Brewery This beer erupts with a floral, hoppy taste 4 Alaskan Amber Alaskan Brewing Alaskan Brewing Amber Ale is an "alt" style beer 8 Kirin Kirin Brewing Kirin Ichiban is a Lager-type beerIf I run this, what is returned?
select t1.key
from openjson((select t.* FROM Beer AS t for json path)) t1 See possible answers