The VALUES clause makes inserting literal values into a table simple and easy. In this article, Joe Celko explains how to use the VALUES clause.… Read more
There are several tools available to keep a MySQL database secure. In this article Lukas Vileikis discuses access control and user privileges.… Read more
It’s easy to create a unique dataset using DISTINCT in SQL, however, it may be beneficial to do this in managed code instead. In this article, Camilo Reyes demonstrates several ways to create unique datasets with managed code.… Read more
The SSRS database contains a wealth of undocumented information that can help administrators. In this article, Edward Pollack explains how to get to the data and ways to use it.… Read more
Artificial intelligence applications are all around us, but what does it really mean? In this article, Kumar Abhishek explains the history and progress of artificial intelligence. … Read more
We recently ordered a tablet for our 8-year-old grandson. We ensured that it would support a decent-sized SSD card, 128 GB, for storing all the photos and videos he will likely take. He’ll mostly play games or watch videos on the tablet, and his favorite video is Dragon’s Doom. Purchasing this gift made me think … Read more
Kubernetes production clusters are typically run on cloud platforms. However, running and deploying Kubernetes applications on cloud platforms such as Google Kubernetes Engine is costly. These high costs can restrict the Kubernetes learning process for beginners. However, running Kubernetes clusters locally helps you efficiently test applications without disrupting the production environment or paying for cloud … Read more
Stored functions in MySQL return a scalar value and can be used in a SQL statement. In this article, Robert Sheldon explains how to create and use a MySQL stored function.… Read more
Using a change management system for database code is a new idea for many database administrators. Grant Fritchey explains the many benefits of database change control.… Read more
The Oracle optimizer often changes the query to get better performance. In this article, Jonathan Lewis explains two more optimizations involving subqueries.… Read more
You can find memory leaks in Python code with tracemalloc. In this article, Priyanka Nawalramka demonstrates how to use tracemalloc to find the leaks.… Read more
Successfully implanting change in an organization requires buy-in from leadership. Rohan Kapoor explains what’s needed to get leadership alignment.… Read more
SQL Server has many features to keep the database secure, but you must implement them to benefit. In this article, Priyanka Chouhan describes how to do a vulnerability assessment of SQL Server.… Read more