More Supply Chain Attacks
Code is vulnerable to supply chain attacks, which aren't something many of us think about.
Code is vulnerable to supply chain attacks, which aren't something many of us think about.
The other day, my lovable coworker and frequent Simple Talk writer: Grant Fritchey, sent this post on X:
We all know security is important, but we sometimes make the job harder when we don't handle data appropriately.
In our conversations with job seekers, a consistent theme has been HOW do you use AI tools. This can be used to get new ideas, improve and optimize resumes, understand trends/market data, determine new connections and networking avenues, save time, alleviate headaches and roadblocks, and be more efficient and effective overall. Well, say goodbye to the days where you need to start a cover letter or resume from scratch or feel isolated, alone, and anxious during the resume writing, interview prep, salary negotiation, and other parts of the job search process, as we all now have an incredibly powerful job searching tool and career coach at our disposal to help with any writer’s block and almost every challenge you may run into!
Learn how you can integrate the SQL Server error logs into Crowdstrike for better analysis.
Phil Factor explains the enduring attachment of database developers to wildcards, despite their current deficiencies.
One of the cornerstones of AI is a concept called embeddings. Virtually every AI model, whether for text, video, or audio, uses something related to embeddings. Starting with SQL Server 2025, this is a term you’ll be hearing a lot, as its potential for applications is enormous!
It can be hard to change peoples' habits and get them to adopt new technology.
Learn how you can call stored procedures in the Django ORM, which lets you encapsulate more complex queries inside the database.
Every organization I talk to has the same problem dressed up in different clothes....
By DataOnWheels
I am delighted to host this month’s T-SQL Tuesday invitation. If you are new...
By alevyinroc
Ten years (and a couple jobs) ago, I wrote about naming default constraints to...
Comments posted to this topic are about the item The day-to-day pressures of a...
Comments posted to this topic are about the item Data Modeling with dbt for...
Comments posted to this topic are about the item Data Modeling with dbt for...
I have some data in a table that looks like this:
BeerID BeerName brewer beerdescription 1 Becks Interbrew Beck's is a German-style pilsner beer 2 Fat Tire New Belgium Toasty malt, gentle sweetness, flash of fresh hop bitterness. 3 Mac n Jacks Mac & Jack's Brewery This beer erupts with a floral, hoppy taste 4 Alaskan Amber Alaskan Brewing Alaskan Brewing Amber Ale is an "alt" style beer 8 Kirin Kirin Brewing Kirin Ichiban is a Lager-type beerIf I run this, what is returned?
select t1.key
from openjson((select t.* FROM Beer AS t for json path)) t1 See possible answers