Subqueries, Real and Apparent

As a part of our continuing study of SQL Server query plans, we’re going to take a look at some subqueries. This is particularly important, since subqueries are the subject of some fair amount of folklore, and it is important to separate fact from myth. It’s not uncommon to hear someone say “Joins are better […]
Read More ›

Show, Don’t Tell: a writer’s and trainer’s mantra we can improve

As a young boy, my favorite part of Kindergarten (after milk and naps) was “show and tell.” I truly loved standing up in front of the class and showing them something I’d found, learned, or otherwise enjoyed. As a writer, trainer, and instructional designer, I learned to “show don’t tell.” Then I learned the Kindergarten […]
Read More ›

How I Was Wrong About Kerberos

Microsoft’s Active Directory includes a version of Kerberos that has had a bad reputation. There were problems several years ago, but the criticisms are now outdated. What was the problem, and how has it been fixed? Origins of Active Directory Windows 2000 was originally going to be called Windows NT 5.0. It was released in […]
Read More ›

GDPR: What You Need to Know and Do

GDPR or the General Data Protection Regulation takes effect next May. It’s an EU regulation. However, everyone must comply with it or else suffer heavy financial penalties and risk criminal prosecution. What Is GDPR? Simply put, the GDPR requires strong protection of personal privacy of people in the EU. Violations can lead to crippling fines, […]
Read More ›

How to Configure Linux for U2F Authentication

In my last post, I wrote about the benefits of U2F – Universal Two-Factor Authentication. Here are the three phases of installing it as the second factor on a Linux VM. For this article, I assume you have a Linux VM (or computer) configured with access to a USB port. I did this more as […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.