Introduction As we all know about the Identity columns and Merge statement. We are not going to discuss any boring theoretical tropics related to it. Better we... Read all
Last week I was showing the foul graph to my colleague Alistair who came up with the idea of running a ‘foul revenge’ query to find out which players gained... Read all
I'm working on a mechanism that will allow HPCC to access data stored in Cassandra with data locality, leveraging the Java streaming capabilities from HPCC. Read all
I’ve been playing around with dplyr over the weekend and wanted to extract the values from a data frame column to use in a later filtering step. I had a data... Read all
API Management? Did you say “API Management?”Software application development models are evolutionary things. New technologies are always being created and... Read all
both high availability (ha) and disaster recovery (dr) have been essential it topics. fundamentally ha is about fault tolerance relevant to the availability of... Read all
Originally Written by Arunjith AravindanPercona Toolkit’s pt-table-checksum performs an online replication consistency check by executing checksum queries on... Read all
This article represents top 4 security vulnerabilities related coding practice to avoid while you are programming with Java language. Recently, I came across... Read all
"Lambda Architecture" (introduced by Nathan Marz) has gained a lot of traction recently. Fundamentally, it is a set of design patterns of dealing with Batch and... Read all