A Computer on Wheels
Tesla is updating their software in a real world, real life DevOps that their customers experience every day. It impresses Steve and tempts him to get one of their cars.
Tesla is updating their software in a real world, real life DevOps that their customers experience every day. It impresses Steve and tempts him to get one of their cars.
This article examines how to split a data set for training and testing and evaluating our model using Python.
How to create and maintain a 'data dictionary' for your databases, in JSON format, which you can then use to add and update the table descriptions, whenever you build a new version using Flyway.
Using sequences when scaling up with Oracle RAC presents more issues with contention. In this article, Jonathan Lewis explains how to avoid the problems.
It's a holiday weekend in the US this weekend. As such, many of you will be taking a break from work and enjoying time with family, as well as remembering some history in the US. If you're in the rest of the world, hopefully you have a holiday coming up soon you can enjoy. One […]
What's the true and permanent cost of lowering the Fill Factor of an index in SQL Server? It's a lot more than many people think. 9 year SQL Server MVP veteran, Jeff Moden, demonstrates how to calculate the extra space that will be used by lowering the Fill Factor and saved by increasing it.
Database systems have powerful features built right in that can ensure the integrity of data. In this article, Joe Celko discusses keys and constraints.
Join the world’s largest gathering of data professionals at this year’s free online PASS Data Community SUMMIT. Connect and network with 1000s of your peers and learn from some of the brightest minds in the data industry. This year’s must-attend online event is completely free, so sign up now to be notified when registration opens.
Forcing users to agree to a new EULA or removing features seems like a bad idea to Steve.
By Vinay Thakur
Following up on my Part 1 baseline, the journey from 2017 onward changed how...
By Brian Kelley
In cryptography, the RSA and ECC algorithms which we use primarily for asymmetric cryptography...
By Steve Jones
In today’s world, this might mean something different, but in 2010, we had this...
Comments posted to this topic are about the item An Unusual Identity
Comments posted to this topic are about the item Dancing Robot Goes Rogue
Hi , i installed winscp on my pc, added it to GAC thru vs...
What values are returned when I run this code?
CREATE TABLE dbo.IdentityTest2
(
id NUMERIC(10,0) IDENTITY(10,10) PRIMARY KEY,
somevalue VARCHAR(20)
)
GO
INSERT dbo.IdentityTest2
(
somevalue
)
VALUES
( 'Steve')
, ('Bill')
GO
SELECT top 10
id
FROM dbo.IdentityTest2 See possible answers