This article describes an overview of the newly released features in SQL Server 2022 and the authors’s personal understanding of each function as a user.
In a bypass attack, the attacker's primary goal is to acquire information and inject a file or web shell code into the targeted system.
This article explains how to use PostgreSQL Recursive SQL and the PL/pgSQL function to draw fractal graphs (with examples).
All well-known open-source products (such as MySQL, Spark, and Presto) have optimizers. This article explains the principle of SQL optimizers with an easy-to-understand approach.
Part 20 of this series discusses another important SQL optimization method: rule-based optimization (RBO).
Part 19 of this series discusses SQL performance optimization.
This short article uses a demo to explain how to use OpenAI to convert natural language instructions into SQL queries.
This article is compiled from Xiaolin He’s presentation at the 2022 Flink Forward Asia (FFA) Conference, discussing Flink SQL insight, best practices, and future works.
Part 1 of this series introduces the theoretical basis and focuses on various high-end SQL operations.
Part 2 of this series focuses on various SQL syntaxes.
This article mainly introduces how mainstream parsers implement the LIKE syntax logic.
This article mainly explains common SQL development scenarios, distinctive SQL writing, and execution plans.
This article explains what SQL injection is, the potential risks of an attack, and how to avoid it in web applications.
This article introduces RDS AliSQL, binlog, and performance optimization tactics.
This article discusses the options available to safeguard your self-managed Microsoft SQL Server database running on Alibaba Cloud using different backup and restore approaches.
This article was compiled from a speech from the Apache Flink Meetup, discussing the release of Flink 1.16.
This article follows Øystein Grøvlen's path from a Norwegian employee to an Alibaba Cloud Architect.
Part 1 of this series introduces some principles of Presto from a macro perspective, from the outside to the inside.
Part 2 of this series discusses Presto memory management.
This short article discusses Pandas and the advantages/disadvantages of SQL Language.