Newsletter Subject

Software Flexibility, Lots of Fabric, and much more!

From

sqlservercentral.com

Email Address

subscriptions@sqlservercentral.com

Sent On

Sat, Jun 10, 2023 08:32 AM

Email Preheader Text

Database Weekly for June 10, 2023 Problems displaying this newsletter? . The Complete Weekly Roundup

Database Weekly for June 10, 2023 Problems displaying this newsletter? [View online](. [Database Weekly]( The Complete Weekly Roundup of SQL Server News by SQLServerCentral.com Hand-picked content to sharpen your professional edge Editorial  Software Flexibility (Avoiding the next hack) As computer scientists, it often feels like our job is to tell the business user, "No, we can't do that because the software you asked for, and we built, doesn't allow it ..." Then, after a long and relatively silly meeting where your soul dies a little, the business user typically gets 80% of what they wanted (and are no more than 8% satisfied), and horrible hack number 20456 gets implemented. Some hacks are innocuous-looking enough. A seldom-used salary column stores a supplemental email address. That column was mostly empty, and our super urgent need is more important than why this column was added, right? (Clearly, they were storing a number in a text column, so perhaps they got what they deserved?) These "misappropriation of column" hacks are unlikely to bother much code, but untangling the mess can be a substantial undertaking when they do. Other hacks are far more heinous. Say you have a system where users order products. A longstanding business rule is that if an order is paid with a credit card, a coupon for 20% off is sent. The solution was hardcoded into the application code; everything worked, met requirements, and passed all the tests... so the programmers moved on. This seems like an acceptable solution to a new person who does not know how business works. But a few time units later (days, weeks, probably not months later), the business user comes in and says, "Starting tomorrow, all orders get the same coupon." After profanely shouting something, including the word "tomorrow," in your head, It is time to make it happen. So you start hunting around. - How is the current coupon code sent? Is there a setting to determine who gets it? - If not, how can we change the code? Of course, in my (aggregated from other true stories) story, we know that the method created to send coupons was hard-coded to be triggered in one (and only one) way. Given the time constraints of "tomorrow," are likely too fast for the average company... horrible hack number 20457 is probably coming up next. This hack (as stated, based in truth) was put into place where customers not paying with a credit card would have a non-processed credit card charge added by the person taking the order. This fake charge caused a coupon to be created, and orders and payments were still processed. In a few days, those payments were simply deleted. Hack completed, and quite successfully, too... in terms of a coupon being sent. Unfortunately, now it looks like all orders are paid (at least somewhat) by credit card. Slowly, customers noticed reports all say 100% of orders were paid for electronically. The Data Warehouse/ETL team has to spend days and weeks working on hack #20458 because, as it turns out, reporting data didn't wait for the fake payments to be deleted before loading data to the Data Warehouse. And so on. How do we avoid hacks such as these? If you thought to yourself, "Everyone should just say no to the request and take the time to build the new iteration correctly," you win the optimist of the week prize. Sometimes you have to do the request immediately. My previous boss occasionally transmitted an offer to the members, and we had a few hours to implement it. Only sometimes is this something that you can prepare for. The real answer is that we cannot completely stop it. Software can never be created so perfectly that we can cover everything someone comes up with within 10 minutes, no matter how good we are. But when creating software, we certainly can see places where flexibility will likely be needed. Understand your customer, and realize that the customer's needs are very likely to grow faster than you can adapt rigidly written software. Even if you have to hard code everything, just modularizing code to individual activities that make sense is always good. For example, if the coupon ordering process was its own piece of code or its own microservice, the solution to this problem may have been easier. Achieving the right amount of flexibility is a work of art. Too much, and you are wasting time. Too little, and you are potentially wasting a lot more time. Knowing where that balance is a very tough challenge that generally comes with a lot of experience. Louis Davidson (@drsql) [Join the debate, and respond to the editorial on the forums](  The Weekly News All the headlines and interesting SQL Server information that we've collected over the past week, and sometimes even a few repeats if we think they fit. Vendors/3rd Party Products [Six things to monitor with PostgreSQL]( To get the most out of your PostgreSQL database, find out the six performance metrics that ought to be central to your PostgreSQL monitoring strategy. [Pipelining Configuration Information Securely to Flyway]( This article demonstrates two techniques for allowing Flyway to read extra configuration information from a secure location, possibly encrypted. The first technique pipes the contents of the config file to flyway via STDIN, and the second uses PowerShell splatting. This makes it much simpler to use Flyway to manage multiple development copies of a database using role-base security. AI/Machine Learning/Cognitive Services [What Is a Feature Store in Machine Learning?]( From Dataversity A feature store is a centralized platform for managing and serving the features used in machine learning (ML) models. A feature is an individual measurable property or characteristic of... [ChatGPT Hallucinations Open Developers to Supply Chain Malware Attacks]( From IT Pro - Microsoft Windows Information, Solutions, Tools Attackers could exploit a common AI experience — false recommendations — to spread malicious code via developers that use ChatGPT to create software. [Let’s All Calm Down About AI’s ‘Extinction Risk’]( From IT Pro - Microsoft Windows Information, Solutions, Tools The remote possibility of rogue, killer AI has overshadowed more pressing issues — like transparency. Administration of SQL Server [SQL Server Storage Modes - Choosing Rowstore or Columnstore]( From MSSQL Tips In this article, we look at two different methods ... [Starter Metadata T-SQL Query Examples for Databases and Tables]( From MSSQL Tips Learn about various metadata you can query from SQL Server with these example scripts and explanations. [What Can You Change With sysmail_update_account_sp?]( From Callihan Data Have you ever had an issue with SQL Server Database Mail settings being unexpectedly changed? If so, you have a few options when it comes to making corrections. A... Azure CosmosDB [Let's take that calculation out of your Azure Cosmos DB query with new Computed Properties.]( From Hasan Savran     A computed property is a virtual property that is not physically stored in a document. You can use data from other properties of a document to calculate... Azure SQL [Change Primary Region for Azure SQL Database Failover Group]( From MSSQL Tips This article explains the process to change the pr... Cloud - Azure [Public preview: Azure Container Instances(ACI) Spot containers]( From Azure Updates You can now take advantage of unused Azure computing with Azure Container Instances (ACI) Conferences, Classes, Events, and Webinars [Overcoming Organization Challenges in Cloud Migration: A Webinar for Senior IT Leaders]( Is your team looking to modernize and migrate your data but have questions about the complex organizational challenges? This webinar panel on June 29th covers all aspects of data modernization and migration that senior IT leaders should be aware of, including organization culture, communication, and politics. Why not send it to your boss? [First speakers announced for Summit 2023]( Your first speakers in the lineup for PASS Data Community Summit 2023 have been announced! Check out the full details for this year's Pre-Cons and Learning Pathways, and find out why some of our speakers are particularly excited for what’s in store this year. HA/DR/Always On/Clustering [Preparing for the Worst: Essential IT Crisis Preparation Steps]( From IT Pro - Microsoft Windows Information, Solutions, Tools Bad things can happen to any organization at any t... JSON [Determine if a Specific Path in a JSON Document Exists in SQL Server]( From MSSQL Tips Learn how to use the new JSON_PATH_EXISTS function... Microsoft Fabric ( Azure Synapse Analytics, OneLake, ADLS, Data Science) [Governance in Microsoft Fabric: Understanding the Roles and Domains]( From Data – Marc Microsoft Fabric is out there for a few weeks now.... [Lakehouse VS. Warehouse VS. Datamart – The Difference Between The Three Fabric Objects]( From RADACAD Three types of objects in the Microsoft Fabric hav... [Create and Verify Microsoft Fabric Capacity]( From SQLServerCentral Blogs From June 1, 2023, Microsoft Fabric (preview) capa... [Microsoft Fabric Licensing: An Ultimate Guide]( From RADACAD Microsoft Fabric is an end-to-end data analytics Saas solution product of Microsoft. It brings many workloads in the analytics area, including Data Integration, Warehousing, Engineering, Business Intelligence, Data Science,... [Understanding OneLake within Microsoft Fabric]( From Guy in a Cube The key to Microsoft Fabric is definitely OneLake! OneLake enables the reuse of data within Fabric to help drive all of the engines. One copy of the data! Josh... Oracle/PostgreSQL/MySQL/other RDBMS [PostgreSQL Basics: A Template for Managing Database Privileges]( In the first two articles of this series about PostgreSQL privileges, we reviewed how to create roles, grant them privileges to database objects, and how object ownership is an important aspect in managing access and control within the database. But how do you go about creating a set of roles and default privileges that will provide the right level of control and access? Let’s dig a little deeper. PowerPivot/PowerQuery/PowerBI [Power BI – Empowering Users to Disable Tooltips]( From Data on Wheels (Steve Hughes) Let’s set the scene. You’ve built a wonderful,... [Working with multiple Power BI dataset environments]( From Richard Swinbank In a recent article I talked about deploying Power BI reports through any number of environments (not just three, and automatically!). In this new post I look at how... [Unlock Your Creativity with the Power BI Tips Theme Generator: Exciting New Features!]( From PowerBI Tips At Power BI Tips, we’re committed to providing you with the best tools and resources to enhance your report building experience. That’s why we’re thrilled to announce a range... Professional Development [Remembering How to Learn New Things]( From Deb the DBA It’s been a while since I’ve blogged. It’s j... Security News and Issues [Easily Exploitable Microsoft Visual Studio Bug Opens Developers to Takeover]( From Dark Reading: Dark Reading News Analysis The bug is very dangerous and impacts a big swath ... T-SQL and Query Languages [Changing log growth strategy in SQL Server 2022]( When I first saw a bullet item stating SQL Server 2022 would support instant file initialization for log file growth, I was excited. When I later learned it only applies to automatic growths, and only those of 64 MB or less, I was a little less excited. But after playing with it, I’m a believer. [A Little About The OUTPUT Clause In SQL Server]( From Erik Darling Data A Little About The OUTPUT Clause In SQL Server Going Further If this is the kind of SQL Server stuff you love learning about, you’ll love my training. I’m... [SQL SERVER Heaps: Understanding Their Benefits and Limitations]( From Journey to SQL Authority with Pinal Dave In this article, we will delve into the use cases for SQL Server heaps, scenarios where caution should be exercised, and effective management techniques. First appeared on SQL SERVER Heaps:... [Unmasking SQL Server Dynamic Data Masking – Part 2 – Setting up Masking]( From Simple Talk This is the second part of a series on SQL Server Dynamic Data masking. The first part in the series was a brief introduction to dynamic data masking, including... Tech News [Microsoft to Block Outlook Web App on Unsupported Browsers in Fall 2023]( From Petri IT Knowledgebase Microsoft plans to redirect all users with unsuppo... Testing Software [Why Test-Driven Development? (Part 1)]( From Simple Talk Software development is a very tough discipline. R...  [RSS Feed]( This email has been sent to {EMAIL}. To be removed from this list, please click [here](. If you have any problems leaving the list, please contact the webmaster@sqlservercentral.com. This newsletter was sent to you because you signed up at SQLServerCentral.com. Note: This is not the SQLServerCentral.com daily newsletter list, and unsubscribing to this newsletter will not stop you receiving the SQL Server Central daily newsletters. If you want to be removed from that list, you can follow the instructions on the daily newsletter. ©2019 Redgate Software Ltd, Newnham House, Cambridge Business Park, Cambridge, CB4 0WZ, United Kingdom. All rights reserved. webmaster@sqlservercentral.com  - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

EDM Keywords (229)

year work win weeks webinar wanted want wait users use untangling unsubscribing unlock unlikely turns truth triggered training tomorrow time thrilled three thought think tests terms template tell talked takeover take tables system storing store stop sql speakers sometimes something solution software since signed sharpen setting set serving series sent senior send scene say roles reviewed reuse respond resources request repeats removed redirect receiving realize questions query put providing provide properties process privileges prepare postgresql politics playing place piece petri perhaps perfectly payments paying passed paid overshadowed ought organization orders order options optimist one offer objects number next newsletter never needs much monitor modernize misappropriation migration migrate microsoft microservice mess members matter masking managing makes make love lot look long little list lineup limitations likely less leaders know kind key journey job issue instructions important implement impacts hours headlines head hardcoded happen hacks hack guy got good go gets get forums follow flyway flexibility find feature fast far fabric explanations exercised excited example everyone ever environments enhance end email electronically editorial domains document dig difference determine deserved delve deleted debate deb dba days dataversity databases database data dangerous customers customer cube creativity creating created course coupon control contents committed comes columnstore column collected code characteristic change certainly central caution calm calculation built build bug blogged benefits believer balance aware automatically aspects asked article art applies announce allow ai aggregated 20

Marketing emails from sqlservercentral.com

View More
Sent On

11/11/2024

Sent On

28/10/2024

Sent On

16/10/2024

Sent On

09/10/2024

Sent On

07/10/2024

Sent On

05/10/2024

Email Content Statistics

Subscribe Now

Subject Line Length

Data shows that subject lines with 6 to 10 words generated 21 percent higher open rate.

Subscribe Now

Average in this category

Subscribe Now

Number of Words

The more words in the content, the more time the user will need to spend reading. Get straight to the point with catchy short phrases and interesting photos and graphics.

Subscribe Now

Average in this category

Subscribe Now

Number of Images

More images or large images might cause the email to load slower. Aim for a balance of words and images.

Subscribe Now

Average in this category

Subscribe Now

Time to Read

Longer reading time requires more attention and patience from users. Aim for short phrases and catchy keywords.

Subscribe Now

Average in this category

Subscribe Now

Predicted open rate

Subscribe Now

Spam Score

Spam score is determined by a large number of checks performed on the content of the email. For the best delivery results, it is advised to lower your spam score as much as possible.

Subscribe Now

Flesch reading score

Flesch reading score measures how complex a text is. The lower the score, the more difficult the text is to read. The Flesch readability score uses the average length of your sentences (measured by the number of words) and the average number of syllables per word in an equation to calculate the reading ease. Text with a very high Flesch reading ease score (about 100) is straightforward and easy to read, with short sentences and no words of more than two syllables. Usually, a reading ease score of 60-70 is considered acceptable/normal for web copy.

Subscribe Now

Technologies

What powers this email? Every email we receive is parsed to determine the sending ESP and any additional email technologies used.

Subscribe Now

Email Size (not include images)

Font Used

No. Font Name
Subscribe Now

Copyright © 2019–2025 SimilarMail.