Joe Celko reminisces about the origins of databases and one of the early pioneers, Charles Bachman. He explains how pointer chains were used to traverse data in the NDL standard and referential integrity that we use today.
Developers need to consider not only system performance when writing code, but also how readability impacts code maintenance.
Nat Sundar explains the different ways to load JSON data into SQL Server, along the way also covering the use OpenRowset and OpenJSON functions to manage JSON data effectively.
Governments are requiring better security, and Steve wishes the US would follow.
Describe and provide a set-based method that takes a multiple character split term and returns as a table
When using Transparent Data Encryption, you might wonder “What is the state of my transparent data encrypted database?” Read on to learn the many different states that a transparent data encrypted database might go through.
TEMPDB Enhancements in SQL Server 2016 - By default enforced to follow best practices.
The key challenge for application developers is to build a foolproof system to ensure data security. This is not only more intense, but more complex these days, as many organizations are planning to move their applications to the cloud. Read on to learn more.
By DataOnWheels
Thanks to everyone who joined the blog party this month. I noticed three themes...
By Vinay Thakur
This week has training on AI – Cyber security experts – Omar Santos and...
Following on from my previous post on building The Burrito Bot, I want to...
Comments posted to this topic are about the item What's new in R 4.6
Comments posted to this topic are about the item Interesting Changes in R, which...
Comments posted to this topic are about the item PostgreSQL String Functions Part 1
When thinking about the identity property and sequence objects, which of these can generate values before an insert statement is executed?
See possible answers