Artificial Intelligence is making inroads in all aspects of technology. In this article, Afsana Atar explains the role of AI in software testing including some examples using a popular testing tool.… Read more
It's even more fun to play a game when you can customize it, but creating such a game is more difficult for the game developer. In this article, Lance Talbert shows you how to add some simple modifications to games you create with Unity and VS. … Read more
Organizations have many choices when it comes to database platforms. Choosing the right one for an application should be based on the application’s characteristics and the platform’s features. In this article, Pushpa Sekhara explains why the Apache Cassandra database might be a good choice and how to get the most from it.… Read more
PowerShell is the preferred tool for many DBAs when automating SQL Server administration. In this article, Greg Moore demonstrates how to use a server list to control which tasks are performed on which servers.… Read more
In this article, the second in the series, Robert Sheldon demonstrates how to manage the SQL Server security with granting permissions to users, logins, and groups.… Read more
In today’s world, some people do not need computers because they can do everything on their smartphones. Playing games is no different and is one of the most popular uses for the mobile devices (who makes phone calls, anymore?). In this article, Lance Talbert shows you how to create a game that will run on an Android device.… Read more
Whether or not to have NULLable columns in a table can be a religious debate, and how missing data is represented should be carefully considered during database design. In this article, Joe Celko considers the ways that SQL Server handles NULLs in several situations. … Read more
Getting security right is always necessary but often not easy. In this article, Joydip Kanjilal describes policy-based authorization in ASP.NET Core used to create a reusable authorization model and simplify securing your applications.… Read more
As more dev teams move their code to Git, it’s important to understand the differences between it and other tools they have used in the past. In this article, Michael Sorens provides some good advice about doing code reviews with Git. … Read more
In order to protect data and comply with regulations such as the GDPR and HIPAA, databases used by developers and testers must not contain private and sensitive data from production databases. To help DBAs protect data, Microsoft have released a new feature as part of SSMS called Static Data Masking. In this article, Greg Larsen demonstrates how to use this new feature.… Read more
When most of us think of robotics used in enterprises, automating manufacturing processes comes to mind. Robotics Process Automation (RPA), however, deals with automating mundane office tasks. In this article, Arvind Kumar explains the benefits of RPA and presents a case study.… Read more
In this second article of the series, Diogo Souza walks you through creating the MongoDB code, the query side of the pattern, to complete the CQRS configuration. … Read more
In the first article in this series, Andy Brown demonstrated how to create calculated columns in Power BI using the DAX language. This second article in the series explains what measures are, and how you can use DAX to create measures within Power BI. The formulae in the article apply equally well to PowerPivot and Analysis Services Tabular Model. … Read more
If only there were a ‘single version of the truth’ in data and data analytics. Unfortunately, data and everything that derives from it is subjective: it cannot be disentangled from our cultural biases. We can only find the version of the truth that fits the evidence and our cognitive map of the world we live … Read more
IT transformation projects often fail due to poor planning, poor communication and more. In this article, Mohammad Rizvi explains how to be successful and give your customer a great experience.… Read more
Delta Airlines recently announced that they have implemented the first fully biometric terminal in the US, at Hartsfield–Jackson Atlanta International Airport F Terminal with plans for Detroit late 2019. This means that, instead of scanning boarding passes and looking at passports for international flights at the checkpoints, the airline can just scan each passenger’s face … Read more
DBAs running SQL Server on Linux will not only need to understand SQL Server security well, they will also need to understand how security works on Linux. In this article, Kellyn Pot'Vin-Gorman walks you through several examples, explaining the permissions and ownership of files and directories in Linux.… Read more
Problems with data quality are easier and cheaper to prevent than to solve later. In this article, Joe Celko talks about data quality and where the issues tend to happen.… Read more
It’s easy to use invoke-sqlcmd to send T-SQL statements to SQL Server from PowerShell. There is, however, a rich PowerShell library, sqlps, that can be used instead. In this article, Greg Moore shows how to use sqlps to treat a SQL Server instance as an object.… Read more