Standard Members

Pro Members SQL Server Standard Members

Intelligent Text Generation with spaCy Part2

Word sequence patterns based on linguistic features and introduced in the previous article in this series are not the only means of intelligent text processing and text generation. This article focuses on another common technique based on using syntactic dependency trees. This is also one of those techniques that you can use to teach your conversational application to generate meaningful...

This content is for Pro, Pro Member, Pro Member Annual - Fall Sale, Pro Member Monthly - Fall Sale, Standard, Standard Member, Standard Member Annual - Fall Sale, and Standard Member Monthly - Fall Sale members only.
Register
Already a member? Log in here
Pro Members SQL Server Standard Members

Transaction Using ACID Properties Timestamp Protocol and Security Procedures – Part 2

How should timestamps be used? The timestamp order protocol ensures that two conflicting read / write operations are executed in the corresponding timestamp order. It is an alternative solution to the use of locks. For Reading operations: If TS (T) is < W timestamp (P), transaction T attempts to read a value of P data that has already been overwritten...

This content is for Pro, Pro Member, Pro Member Annual - Fall Sale, Pro Member Monthly - Fall Sale, Standard, Standard Member, Standard Member Annual - Fall Sale, and Standard Member Monthly - Fall Sale members only.
Register
Already a member? Log in here
Pro Members SQL Server Standard Members

What Should I Do If My Boss Asks Me to Cover My Friend’s Shift so He Can Fire Her?

This question came from a business professional. My boss asked me to cover my coworker’s shift because he is about to fire her. She and I are good friends outside of work. Should I warn her? I can see that this is a very difficult decision for you. You can probably see it both ways: Being loyal to the company...

This content is for Pro, Pro Member, Pro Member Annual - Fall Sale, Pro Member Monthly - Fall Sale, Standard, Standard Member, Standard Member Annual - Fall Sale, and Standard Member Monthly - Fall Sale members only.
Register
Already a member? Log in here
Pro Members SQL Server Standard Members

Troubleshooting SQL Server 2017 Columnstore Indexes

Troubleshooting SQL Server 2017 Columnstore Indexes If you have problems with SQL Server 2017 columnstore indexes, review this troubleshooting checklist to find potential solutions. 1. You can get the error 980 when you try to load SQL Server 2017 database. This is the error message text: “SQL Server cannot load database ‘%.*ls’ because it contains a columnstore index.” This error...

This content is for Pro, Pro Member, Pro Member Annual - Fall Sale, Pro Member Monthly - Fall Sale, Standard, Standard Member, Standard Member Annual - Fall Sale, and Standard Member Monthly - Fall Sale members only.
Register
Already a member? Log in here
Pro Members SQL Server Standard Members

Transaction Using ACID Properties Timestamp Protocol and Security Procedures – Part 1

Transaction – Definition A transaction is a set of modifications that must all be done together. This is a program unit whose execution may change the contents of a database or not. The transaction is implemented as a single entity. If the database was in a consistent state before a transaction, it must be in a consistent state even after...

This content is for Pro, Pro Member, Pro Member Annual - Fall Sale, Pro Member Monthly - Fall Sale, Standard, Standard Member, Standard Member Annual - Fall Sale, and Standard Member Monthly - Fall Sale members only.
Register
Already a member? Log in here
Pro Members SQL Server Standard Members

Database Development Life Cycle, Normalization, Errors and Security of Database – Part 6

Database security Database security cannot be considered an isolated problem because it is also affected by other components of a computer system. The security requirements of a system are determined by means of a security policy, which is then enforced by various security mechanisms. For databases, security requirements can be divided into the following categories: Identification, authentication – Normally, each...

This content is for Pro, Pro Member, Pro Member Annual - Fall Sale, Pro Member Monthly - Fall Sale, Standard, Standard Member, Standard Member Annual - Fall Sale, and Standard Member Monthly - Fall Sale members only.
Register
Already a member? Log in here
Pro Members SQL Server Standard Members

3 Things Should You Never Do on a Job Interview

This question came from a business professional. What 3 things should you never do on a job interview? Top 3 things you should never do Although there are lots of things to keep in mind, some things to consider are: Don’t be late. Plan to be at least 1 hour early to avoid any traffic or travel issues. Once there,...

This content is for Pro, Pro Member, Pro Member Annual - Fall Sale, Pro Member Monthly - Fall Sale, Standard, Standard Member, Standard Member Annual - Fall Sale, and Standard Member Monthly - Fall Sale members only.
Register
Already a member? Log in here
Pro Members SQL Server Standard Members

Troubleshooting problems with deadlock in SQL Server 2017

Troubleshooting problems with deadlock in SQL Server 2017 If you have problems with deadlock in SQL Server 2017, review this troubleshooting checklist to find potential solutions. 1. Keep transactions as short as possible. This can be used to reduce deadlock, because problems with locking typically occurs when several long-running transactions execute concurrently in the same database. The shorter the transaction,...

This content is for Pro, Pro Member, Pro Member Annual - Fall Sale, Pro Member Monthly - Fall Sale, Standard, Standard Member, Standard Member Annual - Fall Sale, and Standard Member Monthly - Fall Sale members only.
Register
Already a member? Log in here
Pro Members SQL Server Standard Members

Using Linguistic Features in NLP

If you had to describe what NLP is about, what would you point out as the most important thing? Is there something that is vital for many use cases and is employed in almost every NLP application? For example, what do you almost certainly need when it comes to a task of information extraction of any kind? Right. Linguistic features,...

This content is for Pro, Pro Member, Pro Member Annual - Fall Sale, Pro Member Monthly - Fall Sale, Standard, Standard Member, Standard Member Annual - Fall Sale, and Standard Member Monthly - Fall Sale members only.
Register
Already a member? Log in here
Pro Members SQL Server Standard Members

Database Development Life Cycle, Normalization, Errors and Security of Database – Part 5

Database Security The database security means to practice a broad range of information security controls to safeguard databases (which include data, database applications or stored functions, base systems databases, database servers as well as related network connections) to breaches of their confidentiality, integrity as well as integrity. It includes different types or categories of controls, for example technical, procedural /...

This content is for Pro, Pro Member, Pro Member Annual - Fall Sale, Pro Member Monthly - Fall Sale, Standard, Standard Member, Standard Member Annual - Fall Sale, and Standard Member Monthly - Fall Sale members only.
Register
Already a member? Log in here