Data Mining Part 26: Introduction to Cubes
In this tutorial we will explain what are the SSAS cubes to use them in Data Mining.
In this tutorial we will explain what are the SSAS cubes to use them in Data Mining.
There are several different approaches to automating deployment of SQL Server Infrastructure-as-a-Service virtual machines in Microsoft Azure. Marcin Policht examines an approach that involves uploading or creating a custom operating system image which is well suited for scenarios where you want to deploy a custom-configured SQL Server instance to multiple virtual machines with minimal effort and maximum consistency.
Tony Davis on why the dusty corners of many organizations still hide numerous SQL 2005 instances.
One of the most certain ways of going wrong with any relational database is to get data conversion wrong. Implicit data conversion is a good feature for the expert but can cause a lot of trouble to the unwary. These boil down to seven ways of failing to get data conversion right. Rob Sheldon explains and gives sage advice on how to avoid the problems.
The job of a DBA requires a fusion of skill and knowledge. To acquire this requires a craftsman mindset. Craftsmen find that the better they get at the work, the more enjoyable the work gets, and the more successful they become. Deliberate practice, Specialization and an appetite for overcoming difficulty are good habits to deliberately adopt to successfully grow those craftsmanlike skills to the point that you become “so good they can’t ignore you”.
Using SQL to perform cluster analysis to gain insight into data with unknown groups
Often DBAs and developers might make quick data changes to correct user problems or application shortfalls. Steve Jones notes that we can make mistakes, and perhaps we should ensure we QA, or at least log, our changes.
There are times when you don’t what to return a complete set of records. When you have this kind of requirement to only select the TOP X number of items Transact SQL (TSQL) has the TOP clause to meet your needs. In this article Greg Larsen explores how to select a subset of data from a record set.
This stairway level will explore data protection through encryption, both when the data is in motion across the network or in memory and at rest in a table. You’ll learn about the encryption key hierarchy and the various kinds of keys you can use to encrypt data, as well as how you can manage the keys or let SQL Server do it for you.
By Steve Jones
dolorblindness – n. the frustration that you’ll never be able to understand another person’s...
By Steve Jones
I had a customer ask about analyzing their Test Data Manager (TDM) usage to...
By Steve Jones
I had an idea for an animated view of a sales tool, and started...
Comments posted to this topic are about the item GPX distance and time analysis...
Comments posted to this topic are about the item The DBA is Dead; Long...
Comments posted to this topic are about the item Changing the AG Listener
In SQL Server 2025, if I want to remove an IP from a listener, what do I do?
See possible answers