(Michael) In the First Part of the series, we talked about the Pipeline Pattern in programming. Also known as the Pipes and Filters design pattern.
Community
Stored Functions and Temporary Tables are Not a Good Fit
(Tibor Korocz) In this blog post, I am going to show why we have to be careful with stored functions in select list, as a single query can cause thousands of queries in the background if we aren’t cautious.
Disable scheduler jobs during deployment
(Jeffrey Kemp) Like most active sites our applications have a healthy pipeline of change requests and bug fixes, and we manage this pipeline by maintaining a steady pace of small releases.
Embedding Transformation Data Pipeline into ML Model using Oracle Data Mining
(brendantierney) I’ve written several blog posts about how to use the DBMS_DATA_MINING.TRANSFORM function to create various data transformations and how to apply these to your data.
Basic Replication — 1 : Introduction
(Hemant K Chitale) Basic Replication, starting with Read Only Snapshots has been available in Oracle since V7. This was doable with the “CREATE SNAPSHOT” command.
SQL SERVER – Performance Impact of Unique Index
(Pinal Dave) Today I am going to share a story of my client who has hired me over 7 times for my most popular consulting service Comprehensive Database Performance Health Check for different servers and situations. In the latest engagement, we had a very interesting situation of Performance Impact o
22 Python Tricks
(Brian Overland and John Bennett) Master crafters need many things, but, above all, they need to master the tools of the profession. This chapter introduces tools that, even if you’re a fairly experienced Python programmer, you may not have yet learned.
Introduction to Rest.API.Translator
(Alen Toma) When you work with REST API, the biggest issue is the unstructured URLs and HttpClient calls.
Encrypting a column in Db2 without modifying the application
(Chris Crone and Sarbinder Kallar) Db2 12 Function Level 505 introduces a new Encryption Built-in Function (BIF) ENCRYPT_DATAKEY that can be used to encrypt data at the column level using the AES algorithm.
SQL DROP TABLE statement overview
(Rajendra Gupta) This article gives an overview of the SQL DROP TABLE statement to remove one or more tables from a database.
