4 Encryption options for your SQL Server
In today’s tutorial, we will learn about cryptographic elements like T-SQL functions, service master key, and more.
SQL Server cryptographic elements
Encryption is the process of...
How to build an options trading web app using Q-learning
Today we will learn to develop an options trading web app using Q-learning algorithm and will also evaluate the model.
Developing an options trading web...
Image filtering techniques in OpenCV
In the world of computer vision, image filtering is used to modify images. These modifications essentially allow you to clarify an image in order to...
Understanding SQL Server recovery models to effectively backup and restore your database
Before you even think about your backups, you need to understand the SQL Server recovery model that is internally used while the database is...
Recurrent neural networks and the LSTM architecture
A recurrent neural network is a class of artificial neural networks that contain a network like series of nodes, each with a directed or...
What is LSTM?
What does LSTM stand for?
LSTM stands for long short term memory. It is a model or architecture that extends the memory of recurrent neural...
Get SQL Server user management right
The question who are you sounds pretty simple, right? Well, possibly not where philosophy is concerned, and neither is it where databases are concerned...
How greedy algorithms work
What is a greedy algorithm?
Greedy algorithms are useful for optimization problems. They make the optimal choice at a localized and immediate level, with the...
OpenCV Primer: What can you do with Computer Vision and how to get started?
Computer vision applications have become quite ubiquitous in our lives. The applications
are varied, ranging from apps that play Virtual Reality (VR) or Augmented Reality...
Predicting Bitcoin price from historical and live data
Today, you will learn how to collect Bitcoin historical and live-price data. You will also learn to transform data into time series and train...