Would I encourage my daughter to pursue a career in IT?
A guest editorial today from Lynda Rab, PASS board member and new mother.
A guest editorial today from Lynda Rab, PASS board member and new mother.
Longtime author Kathi Kellenberger brings us a guest editorial today on what is happening with women in the technology world.
Steve Jones looks at some of the issues with gender in the workplace and reminds everyone that they need to respect each other.
In this presentation at the Jacksonville SQL Server Users Group, Bayer White playS the part of a developer protecting his application and Brian Knight attempts to hack his application using SQL Injection and cross-site scripting. Then, Bayer will show you how to protect yourself from the hacker and then Brian tries again. Back and forth the chess match goes until someone wins!
The third article in a four part series, this week Andy shows how to use the command object to work with stored procedure parameters.
The SQL Server 2005 Maintenance Plan Wizard offers many core tasks and options for database housekeeping. In addition, the wizard will roll all of your selected tasks into a reusable and customizable package. Read on to learn more.
Longtime SQL Server expert and author Michael Coles takes a look at one of the security products that every SQL Server DBA should consider. Read on to find out how NGSSQuirreL can help you.
In this session, Kathi continues her popular series and shows some of the more advanced joining techniques in T-SQL. She shows T-SQL self, outer and cross joins and gives many examples on how to use them.
Relational Data Warehouse or Reporting work loads are characterized by low volumes of very large transactions. These applications are often identified as having predominately read workloads (e.g. Decision Support, Analysis, and Reporting) with periodic feeds or batch loads. It is important to keep these characteristics in mind as we examine the significance of database design, resource utilization and system performance. The top performance bottlenecks or gotchas to avoid for Data Warehouse or Reporting applications are outlined below.
By Steve Jones
With the AI push being everywhere, Redgate is no exception. We’ve been getting requests,...
By Steve Jones
fawtle – n. a weird little flaw built into your partner that somehow only...
AWS recently added support for Post-Quantum Key Exchange for TLS in Application Load Balancer...
Hi all, I recently moved to a new employer who have their HA setup...
Comments posted to this topic are about the item Semantic Search in SQL Server...
Comments posted to this topic are about the item Encoding URLs
I have this data in a table:
CREATE TABLE Response ( ResponseID INT NOT NULL CONSTRAINT ResponsePK PRIMARY KEY , ResponseVal VARBINARY(5000) ) GOIf I want to get a value from this table that I can add to a URL in a browser, which of these code items produces a result I can use? See possible answers