Keyboard Hardlines
The potential vulnerabilities of wireless devices might be a security issue for databases.
2016-08-10
106 reads
The potential vulnerabilities of wireless devices might be a security issue for databases.
2016-08-10
106 reads
When do you have too much data? What do you do if you aren't actually using all of it?
2016-08-09
86 reads
The complexity of tables makes modifying them over time a challenge, especially as data sizes grow.
2016-08-08
65 reads
This week Steve Jones looks at a new idea, rating the security of products publicly to try and shame vendors into more secure coding.
2016-08-08
89 reads
Too many failovers can cause problems, as can those that happen to often. Steve Jones says you need to consider whether you always need to failover in a sitaution.
2016-08-05
171 reads
2016-08-04
229 reads
It's possible to change a software development team and dramatically improve things. Steve Jones highlights an example from Redgate Software.
2016-08-02
95 reads
2016-08-01
71 reads
Passwords are a problem, especially when we're in a hurry. What should we do?
2016-08-01
90 reads
This Friday Steve Jones talks SQL Saturdays and asks how far you've traveled to attend one.
2016-07-29
98 reads
By DataOnWheels
Thanks to everyone who joined the blog party this month. I noticed three themes...
By Vinay Thakur
This week has training on AI – Cyber security experts – Omar Santos and...
Following on from my previous post on building The Burrito Bot, I want to...
Comments posted to this topic are about the item What's new in R 4.6
Comments posted to this topic are about the item Interesting Changes in R, which...
Comments posted to this topic are about the item PostgreSQL String Functions Part 1
When thinking about the identity property and sequence objects, which of these can generate values before an insert statement is executed?
See possible answers