So how do you create a primary key in a table? Believe it or not, there are a few different methods that have proven useful in different scenarios. Let’s start with some of the traditional methods supported by most SQL Engines.in First there is the database generated sequential number generation from the SQL Engine itself. In SQL Server we call […]
Tag: Editorials
Have You Ever Re-Architected a Database?
Has there been a time where you had to change out the schema, security, views, etc. associated with an established application? I ask because with new technologies, new techniques, increasing security needs and the like, along with just flat learning better ways to do things, sometimes it’s nothing short of a re-architecting situation. We’ve worked through situations like this where […]
SQL is Number One
Do you wonder if you are working on developing skills need to keep you working in the future? Based on the latest review of job postings by codingdojo.com, if SQL is one of your skills, you have chosen the most demanded skill of the top 9 for 2017. There are a few reasons SQL is in such high demand. […]
Public vs. Private Cloud – Blurry Lines
Definitions and functionality expectations seem to be all over the board for what makes up a private vs. public cloud infrastructure solution. It seems like everywhere you look you see all sorts of defintions – particularly for private cloud. Is a private cloud a VPC hosted on a public cloud provider’s system? Is it on-premises “cloud-type” solutions where your users […]
Get In Sequence
oday I wanted to deomonstrate some cool things you can do with a Sequence (or sometimes called Tally) table. I put them in just about every database I create. A tally table simply has one numeric column with a sequence of numbers, say 1 to 1000. Then you can use that table to manipulate other objects in a sql query […]
Do You Have a Data Governance Policy?
Having the pre-considered controls and processes in place for your information is more and more important every day. While I’m no fan of the 999 page specification, I am in favor of having spent the mental time on things prior to needing them. This is true of disaster recovery, it’s true of management of systems. Data governance is just a […]
Encrypting In An Image
Encryption is one of the hardest things to do in a way that can’t be decrypted by a hacker. So, if you can do one way encryption, that’s a real plus. But, when you need to have something you can decrypt, the problem is more difficult. I wrote about this quite a bit a few weeks back. Today I wanted […]
Webcast today: Creating an End to End Power BI Solution
Today’s webcast will be all about Power BI – and setting up a solution. Click here to register (it’s free) Here’s the description: Power BI has a many moving parts that can make it difficult to know when and where each part of the tool is necessary. In this session you will get a clear end to end journey through […]
Big Data Projects Failure Rate?
I saw a recent post talking about the failure of Big Data Projects… and it made me wonder about the metrics we would use to judge success/failure. I know that there are very well worn statistics about more traditional projects and the failure rate at companies when it come to waterfall methods and such. The statistics that I’ve seen are […]
Are You Human?
Does your public facing web site validate that a connected client is a person and not an automated bot? Usually you see a web site confirming that the connection on the other end is a user when there are credentials being provided, such as setting a password, or creating a user profile. One of the things I have found interesting […]