Skip to main content

Posts

Showing posts with the label mobile app development

Dangerous command in SQL

SQL Server/Microsoft Data Platform professional with over 10 years of experience working in various fields such as financial, healthcare, and Manufacturing Domains. we have worked in various DB-related roles from database Modeler to database developer to Data Warehouse. The most dangerous command in SQL There’s one command, in particular, that has been effectively hidden since it was introduced pre-SQL Server 2000. I present to you  DBCC WRITEPAGE  – the most dangerous command you can use in SQL Server. Well, no danger of death  DBCC WRITEPAGE  allows you alter any byte on any page in any database, as long as you have sysadmin privileges. It also allows you to completely circumvent the buffer pool, in other words you can force page checksum failures. The purposes of  DBCC WRITEPAGE  are: To allow automated testing of  DBCC CHECKDB and repair by the SQL Server team. To engineer corruptions for demos and testing. To allow for last-ditch disaster recovery by manu

Docker Container-based Custom Application Management - what business leaders should know

Docker Containers have become an essential element in modern, high-performance IT operations practices — particularly in the cloud computing era. This article defines what containers are and why they are important to your business, whether you are responsible for just managing a single server or running IT operations at scale. Docker Containers Background IT operations are responsible for managing and maintaining an efficient and reliable computing infrastructure that supports the range of computing tasks performed by a business. These tasks are facilitated through enterprise resource planning applications that support Human Resources, Finance, Customer Relationship Management, Project Management, Operations Management and Workflow, Logistics, Reporting and Analytics, and more. While these applications differ in function all share a common dependence on efficient, reliable, and responsive computing resources. These resources include an operating system, processor, RAM, stora

The Internet of Things It Cover All Business Web Services

The Source IoT, It will describe the market around the Internet of Things (IoT), the technology used to build these kinds of devices, how they communicate, how they store data, web services, cloud computing contributes to the growth of the internet of things from the mere definition to reality. ... Web service uses XML for data representation and data transportation between layers. Divided into four modules, we will learn by doing. We will start with simple examples and integrate the techniques we learn into a class project in which we design and build an actual out system. Internet of  Things Graph, a service that connects different devices and cloud services, such as linking humidity sensors to sprinklers to weather data services to create agricultural applications, Industrial apps through a visual drag-and-drop interface.  Internet of Things Site Wise to monitor operations across facilities, quickly compute common industry performance metrics, build applications that analy

The Complete Guide to Machine Learning for Business Leaders

Machine Learning For Business Leaders Machine Learning has garnered a significant share of recent press coverage in both tech and main street media. It is inextricably intertwined with, and central to, discussion and dialogue on topics ranging from big data in general to Facebook’s threat to privacy, Boston Dynamics creepy robotics, and Google’s exploitation of artificial intelligence for good and ill. As such, it is easy to view machine learning as either sinister or magical — neither of which is true. For today’s business leader, an objective and actionable understanding of machine learning are as important as an actionable understanding of finance and financial management. Machine Learning is a subset of artificial intelligence, where computer algorithms are able to learn from data and modify their behavior accordingly. These algorithms have the ability to identify patterns in data that humans can’t see. Some commercial applications of Machine Learning include speech recognition,

The Hidden Opportunities of Internet of Things (IoT)

IoT is a network of connected objects that can collect and exchange data. It has been around for a while, but only recently has it become more mainstream. IoT is not just for consumer products, there are also many opportunities in the enterprise. The internet of things is often called the “next big thing” and is largely responsible for the rise of big data. The internet of things provides us with an unprecedented amount of information on how people use their products, how they behave in their homes, and what they do at work. Along with  AI , The Internet of Things is changing the expectations of consumers. It will also change the way that businesses operate. The initial uptake of interconnected smart devices was slower than was forecast. But, the demand for technology is now developing at a rapid pace. That demand will place new pressures on businesses. It will also provide businesses with new opportunities. Here are some of the ways that the Internet of Things will impact the busine

The most dangerous command in SQL

Vijay is a SQL Server/Microsoft Data Platform professional with over 10 years of experience working in various fields such as financial, healthcare, and Manufacturing Domains. He has worked in various DB-related roles from database Modeler to database developer to Data Warehouse. The most dangerous command in SQL There’s one command, in particular, that has been effectively hidden since it was introduced pre-SQL Server 2000. I present to you  DBCC WRITEPAGE  – the most dangerous command you can use in SQL Server. Well, no danger of death  DBCC WRITEPAGE  allows you to alter any byte on any page in any database, as long as you have sysadmin privileges. It also allows you to completely circumvent the buffer pool, in other words, you can force page checksum failures. The purposes of  DBCC WRITEPAGE  are: To allow automated testing of  DBCC CHECKDB and repair by the SQL Server team. To engineer corruptions for demos and testing. To allow for last-ditch disaster recovery b