Your tech-expert for enterprise. software. security. small business. finance. tools.

DevX is the leading provider of technical information, tools, and services for tech-interested professionals.

Popular Posts:



SQL Injection Tips, Part 1

SQL injection is probably the most common and easiest hacking technique out there. Now, don’t think I condone it, I’m


Simplifying Null Check in Java

To avoid null exceptions, we usually validate against null and emptiness as shown: if(object != null && !object.equals(“”)) {} We

Automation of Tasks

Automation of tasks is a good concept. Consider the example below in which you create a task and schedule it


Extract Faces Using Amazon Rekognition

AmazonRekognitionClient amazonRekognitionClient = new AmazonRekognitionClient(Amazon.RegionEndpoint.);byte[] imageData = System.IO.File.ReadAllBytes(inputImageFile);DetectFacesRequest facesRequest =

All Articles

better software tools

How to Choose Better Software Tools for Your Business

If you want your business to succeed in the modern world, you need to make sure it’s equipped with all the best software tools. Software boosts your performance in a multitude of ways, enabling innovation, improving productivity, and helping you meet obligations like regulatory compliance. But most businesses need many

Read More »
Increased hacking, phishing schemes, and costly ransomware events have pushed multi-factor authentication into the category of "must-have."

Multi-Factor Authentication (MFA) Has ‘Graduated’ to Must-Have

The internet is a vast and powerful place. It is constantly fueling innovation and bringing the world together. Even so, cybersecurity remains a persistent and growing concern for internet users (which is nearly everyone, at this point). This perfect storm of use and risk is pushing multi-factor authentication (MFA) into

Read More »
The rapid growth of the gig economy has produced massive changes in the way peer-to-peer enterprises around the world do business.

Tech Trends in the Gig Economy

As our modern world continues to evolve, the relationship between technology and business is adapting constantly. The rapid growth of the gig economy has produced massive changes in the way peer-to-peer enterprises around the world do business. Instead of hiring employees and contractors in a traditional manner, the gig economy

Read More »

Understanding FULLTEXT Searches

In MySQL, there is a provision to search based on natural mode. Let us consider the following example to understand this in detail. Creation of the table: CREATE TABLE ‘PROP_TBL’ ( ‘PROPERTY’ VARCHAR(100), ‘DOMAIN’ VARCHAR(20), ‘VALUE’ VARCHAR(2000), ‘PATH’ VARCHAR(100), PRIMARY KEY (‘PROPERTY’, ‘DOMAIN’, ‘PATH’), FULLTEXT (PROPERTY,DOMAIN))ENGINE=InnoDB; And use the following

Read More »

How to Use the Spring Example API

First, define a probe (an instance of the entity class): User user = new User();user.setName(“Ana”);user.setEmail(“[email protected]”); Next create a probe: Example userExample = Example.of(user); Next, define a repository that extends QueryByExampleExecutor interface: @Repository public interface UserRepository extends JpaRepository, QueryByExampleExecutor { } Finally, call one of the QueryByExampleExecutor methods (e.g., exists()): public

Read More »

How to log transactions details in Spring Boot

To log transactions details in a Spring Boot application simply add the following settings in logging.level.ROOT=INFO

Read More »

Join Our Newsletter

Subscribe to receive our latest blog posts directly in your inbox!