Multiple Regression Model Enhanced with Bagging
This article explains what bagging is relative to a basic decision tree model and demonstrates how to apply bagging for better multiple regression model fits to data from SQL Server.
This article explains what bagging is relative to a basic decision tree model and demonstrates how to apply bagging for better multiple regression model fits to data from SQL Server.
Georg Ferdinand Ludwig Philipp Cantor is considered the creator of set theory, and his theories are the basis for the naïve set theory you learned in school. But there are lots of other mathematicians you should know, such as Hilbert, Frege, Russell, Zermelo and Dedekind. They made a lot of contributions, too. Hilbert Hilbert is […]
Business Intelligence Architect, Analysis Services Maestro, and author Bill Pearson continues his series surrounding the DAX financial functions. In this article, he exposes four functions that are popular in the calculation of depreciation and amortization. Those accustomed to these functions within Excel will find the syntax, uses and operation of the functions familiar within the Power BI environment.
This article explains ten ways that SQL Monitor tackles the problem of scaling out the coverage of a single, lightweight monitoring system, and so allows your teams to maintain the health and performance of larger collections of databases and higher numbers of monitored SQL servers.
Using default credentials is a poor practice, but people still continue to forget to change them.
The need to print doesn't seem to go away. Using RDL format report file you can print local reports in .net to PDF without having to connect to a Reporting Service Server.
In this article we present a PowerShell script that can help you monitor all of your SQL Server Availability Groups in your environment.
My final job in my previous career was at a hospital. I worked there for five years in the 90s before getting my first position as a developer. While I didn’t love the career I was leaving, I did appreciate what I learned from that last job. Part of the onboarding included a short class […]
Introduction Recently, I had the task of analyzing a varchar field for special characters. The field contained text entered by the user with a standard US keyboard; however, the proprietary software was breaking up the text and delimiting it with characters whose ASCII values were above 127. Eyeballing the text that I dumped using a […]
By Vinay Thakur
Following up on my Part 1 baseline, the journey from 2017 onward changed how...
By Brian Kelley
In cryptography, the RSA and ECC algorithms which we use primarily for asymmetric cryptography...
By Steve Jones
In today’s world, this might mean something different, but in 2010, we had this...
Comments posted to this topic are about the item Dancing Robot Goes Rogue
Hi , i installed winscp on my pc, added it to GAC thru vs...
Comments posted to this topic are about the item Identities and Sequences II
In thinking about the differences between the identity property and a sequence object, which of these two guarantees that there are consecutive numbers (according to the increment) inserted in a single table?
See possible answers