Data Mining Part 33: The Performance counters
In this new article, we will explain how to use the Performance Counter to measure performance and activity in Microsoft Data Mining
In this new article, we will explain how to use the Performance Counter to measure performance and activity in Microsoft Data Mining
The SQL Server Luxembourg User Group invites you to join us at our next event, where Pieter Vanhove from Microsoft will be presenting a double bill: Microsoft Azure SQL Database at Your Service and Run Your DBA Morning Checklist with Policy-Based Management.
There are more exciting things in life than unit testing SQL Statements, checking the results, timings, and execution plans. Phil Factor demonstrates a PowerShell-based technique taking the tedium out of testing SQL DML.
Steve Jones reminds us that we must manage our time, and learn to do so despite the demands placed on us.
This SQL Prompt tip shows you how code highlighting makes it easier to find which items match up with each other.
Sandeep Mittal provides an introduction to the COALESCE function and shows how to use it.
What are the most popular SQL implementations for Hadoop? How different are they from T-SQL?
JP Morgan suffers the largest data breach for a financial institution, but Steve Jones doesn't think this record will stand for long.
Transparent Data Encryption offers the ability to encrypt content of the database, its transaction logs, as well as backups while at rest. Encryption and decryption are performed in real-time, at the individual page level, as the database is being written to and read from storage, without necessitating changes to applications accessing their data. Marcin Policht reviews the feature.
Before adopting Hadoop into your organisation there are a number of factors to consider. This article highlights some of the key points.
By Steve Jones
With the AI push being everywhere, Redgate is no exception. We’ve been getting requests,...
By Steve Jones
fawtle – n. a weird little flaw built into your partner that somehow only...
AWS recently added support for Post-Quantum Key Exchange for TLS in Application Load Balancer...
Hi all, I recently moved to a new employer who have their HA setup...
Comments posted to this topic are about the item Semantic Search in SQL Server...
Comments posted to this topic are about the item Encoding URLs
I have this data in a table:
CREATE TABLE Response ( ResponseID INT NOT NULL CONSTRAINT ResponsePK PRIMARY KEY , ResponseVal VARBINARY(5000) ) GOIf I want to get a value from this table that I can add to a URL in a browser, which of these code items produces a result I can use? See possible answers