Comment The Brennan Monster Breaks Cover (Score 4, Funny) 150
I guess he's decided it's time to do something about those damned Martians.
I guess he's decided it's time to do something about those damned Martians.
Yes, there are several ways of modelling hierarchies in SQL, each optimized for different usage patterns. The old foreign key adjacency list is only one of them (and my least favorite). Aside from Fact Tables, the most popular are Nested Set, Materialized Path, and Tropashko 'Nested Interval'. Materialized path usually gets poor treatment because values are conceived as strings to be parsed, rather than custom data type, but it can yield to some very fast tree traversal or searching if used right.
OP has disabled WPS.
Can you provide some kind of information on this? I would really like to know what CPUs to avoid.
If you are looking to avoid all errata, then buy an abacus. All CPUs have bugs.
From experience: You put one of the monitors on top of an old VCR with a tape in it in public view. Of course, the VCR is a ruse but they think they got the recording mechanism if they do break in and steal it. The VCR doesn't even have to work.
Fake cameras with built in motion sensors that pan the camera are also good. They run on 9V batteries and cost about 8 dollars each. Of course, this is in ADDITION to a real security system. It just allows you to have the look of extreme coverage.
Most crimes are of convenience. If you look like a very difficult target, they will move on to something that looks easier. Usually. Nothing is 100%, nothing is free, but choosing nothing is dumb.
An SSD has much less penalty for random reads and writes compared to a mechanical harddrive for example.
Behind every great computer sits a skinny little geek.