12 December 2018
12 December 2018

Where’s the Bottleneck?

Delta Airlines recently announced that they have implemented the first fully biometric terminal in the US, at Hartsfield–Jackson Atlanta International Airport F Terminal with plans for Detroit late 2019. This means that, instead of scanning boarding passes and looking at passports for international flights at the checkpoints, the airline can just scan each passenger’s face … Read more
05 December 2018
05 December 2018

Data Quality

Problems with data quality are easier and cheaper to prevent than to solve later. In this article, Joe Celko talks about data quality and where the issues tend to happen.… Read more
28 November 2018
28 November 2018

Common Sense Data Science

Data science is so hip today that everyone is doing it. Everyone is showing off their ‘data science muscles’ by how much data they can lift and in what amazing ways the lifting is done. However, only some are showing that they can work in a smart way, and even fewer are showing common sense. … Read more
15 November 2018
15 November 2018

Are Tech Conferences Worth It?

In September, thousands of IT professionals, developers, and trainers descended on Orlando, FL, for Microsoft’s Ignite conference. This was Microsoft’s chance to make big announcements about artificial intelligence, Azure, SQL Server 2019, DevOps, and much more. The keynotes were live-streamed, and all the sessions are available for streaming on demand. From a distance, there was … Read more
02 November 2018
02 November 2018

Creating Calculated Columns Using DAX

0
12
In this article, Andy Brown shares his knowledge of how to create calculated columns in tables, using Power BI as the host software (all of the formulae shown would work equally well in PowerPivot or SSAS Tabular). This article is designed to be the first in a series of articles which will show you how to master programming in DAX. … Read more
01 November 2018
01 November 2018

Data Security: Nowhere to Hide

In my view, data security is an abstract concept, just as abstract as money, religion and fascination – all devised by humans. And anything that is human-made can be human-destroyed. When it comes to IT and data security, history has proven that pretty much anything can be cracked, taken, reshuffled, altered, refurbished, reheated and re-served. … Read more