How to use Common Table Expression (CTE) in SQL Server to break down problems into multiple steps

How to use Common Table Expression (CTE) in SQL Server to break down problems into multiple steps
In this SQL Server training video, instructor Peter Avila demonstrates how to utilize common table expressions (CTEs) to progressively convert one data structure to another. Using a real world example, Peter introduces a common problem in which the structure of the desired output and the structure of the data in the database are so different that the output cannot be obtained by a single transformation of the data from the database. Using a chain of CTEs, Peter shows how to break down the problem into smaller transformations and perform them step by step to obtain the desired structure in the output.
Agile Methodology in Project Management
0 162 0In this video, you will gain an understanding of Agile and Scrum Master Certification terminologies and concepts to help you make better decisions in your Project Management capabilities. Whether you’re a developer looking to obtain an Agile or Scrum Master Certification, or you’re a Project Manager/Product Owner who is attempting to get your product or … Continue reading Agile Methodology in Project Management
JavaScript for C# Developers – September 24, 2014
0 491 3Is JavaScript worth taking the time to learn if I’m a server-side .NET developer? How much of C# carries over to JavaScript? In this recorded video from Dan Wahlin’s webinar on September 24,2014, Dan answers these questions and more while also discussing similarities between the languages, key differences, and the future of JavaScript (ES6). If … Continue reading JavaScript for C# Developers – September 24, 2014
Detailed Forensic Investigation of Malware Infections – April 21, 2015
4 647 5How does an investigator hunt down and identify unknown malware? In this recording of our IT Security training webinar on April 21, 2015, Security expert Mike Danseglio (CISSP / CEH) performed several malware investigations on infected computers and identify symptoms, find root cause, and follow the leads to determine what’s happening. He demonstrated his preferred … Continue reading Detailed Forensic Investigation of Malware Infections – April 21, 2015