
Multi-Factor Authentication (MFA) Has ‘Graduated’ to Must-Have
The internet is a vast and powerful place. It is constantly fueling innovation and bringing the world together. Even so,
DevX is the leading provider of technical information, tools, and services for professionals developing corporate applications.
The internet is a vast and powerful place. It is constantly fueling innovation and bringing the world together. Even so,
As our modern world continues to evolve, the relationship between technology and business is adapting constantly. The rapid growth of
The java.lang.Math package is very powerful. Understand more methods in this package that are related to the Euler’s number named e.
For triggering a synchronous GET request we can rely on HTTP Client API as follows: HttpClient client = HttpClient.newHttpClient();HttpRequest request
To avoid null exceptions, we usually validate against null and emptiness as shown: if(object != null && !object.equals(“”)) {} We
The following code shows you how to compute the n Fibonacci number recursively: int fibonacci(int k) { if (k return
Automation of tasks is a good concept. Consider the example below in which you create a task and schedule it
Java arrays are not resizable. But we can work around this constraint with the following trick. int[] newArr = Arrays.copyOf(arr,
To expose non-public methods to the test project, you need
Use StringContent?in the Web API response to return a custom
AmazonRekognitionClient amazonRekognitionClient = new AmazonRekognitionClient(Amazon.RegionEndpoint.);byte[] imageData = System.IO.File.ReadAllBytes(inputImageFile);DetectFacesRequest facesRequest =
Explore how to convert a string to a byte array.
Here is how to split a concatenated string with a
BitConverter’s ToString?method can be used to convert a byte array
See below for a code sample of how to perform
Use the GetTempPath?method to retrieve the temp file path in
To get the first date of the current month, you could a query similar to the following: SELECT CONVERT(VARCHAR(25),DATEADD(DAY,-(DAY(GETDATE())) +1, GETDATE()), 105) Day1;
Let us consider a table representing employee data with a few columns, and, of course, their salary details as well. It is not wise to expose this table to all querying entities since there is sensitive data that makes sharing the contents problematic. In real time, there are VIEWS that
It is quite easy to find the error log location through a quick query such as : SELECT SERVERPROPERTY(‘ErrorLogFileName’) AS ‘Error log file location’ This shows where your Error log file is stored
DBCC SHRINKDATABASE The command shrinks the size of the data and log files in a database. Here is a small example: DBCC SHRINKDATABASE (Database_Name, 10); –This allows for 10 percent free space in the database.
You can use the following command to monitor all your databases’ log file’s free space DBCC SQLPERF (‘LOGSPACE’)
For triggering a synchronous GET request we can rely on HTTP Client API as follows: HttpClient client = HttpClient.newHttpClient();HttpRequest request = HttpRequest.newBuilder() .uri(URI.create(“https://reqres.in/api/users/2”)) .build();HttpResponse response = client.send(request, BodyHandlers.ofString());
Subscribe to receive our latest blog posts directly in your inbox!