Import Data from PDF to SQL Server
In this article we look at how we can use R and SQL Server to import lottery numbers from a PDF document into a SQL Server table.
In this article we look at how we can use R and SQL Server to import lottery numbers from a PDF document into a SQL Server table.
Phil Factor takes a strategic look at common SQL data masking techniques, and the challenges inherent in masking certain types of sensitive and personal data, while ensuring that it still looks like the real data, and retains its referential integrity, and distribution characteristics.
As I type this, I've got my right leg propped up on a stool. That's because if I sit for any length of time with the knee bent, I have a great deal of pain on standing. Seems there's something horribly wrong with my knee. I still don't know what yet. I've had an MRI […]
This article will show how you can read the @@OPTIONS variable and determine your settings.
If you have set any new goals for your career this year, Steve is asking you to let him know.
The SQL Server error log is a great source of information for DBAs for monitoring errors and the operation of the server. In this article, Greg Larsen explains the details and how to configure the SQL Server error log.
Have you ever had to demonstrate a database-driven application, and longed to have the real data to do so? To do what, precisely? Well, so you can then scroll through the customers who have used the system, demonstrate the accounting and audit, browse through the products, maybe even demo the customer tracking system with comments, complaints and so on. All this is possible, using realistic, fake data.
DML, or Data Manipulation Language, statements are used to manipulate the data present in a database. The most important DML statements are INSERT, UPDATE & DELETE. This tutorial covers the various PostgreSQL DML statements and how we can use them with SQL shell as well as pgAdmin. Assuming you are familiar with table creation in PostgreSQL, […]
Steve has a thought on the best way to protect sensitive data.
This article covers the relational database system evolution and covers terms used in relational models such as relation, tuple, attribute, domain, schemas, and key.
Want to build a data analytics foundation that transforms raw data into valuable business...
By Steve Jones
Recently a customer asked if SQL Compare and SQL Data Compare can be used...
By Tim Mitchell
Earlier this month, I hosted the monthly T-SQL Tuesday invitation in which I asked,...
Comments posted to this topic are about the item New article
Comments posted to this topic are about the item Monitoring Azure Blob Storage
Azure Data Lake Storage Gen 2 is built on ...?
See possible answers