
Since 1998, DevX has helped people start businesses, build websites, and provide enterprise technology to people globally. Interviewing the likes of Microsoft’s co-founder, Steve Ballmer, the publication brings comprehensive, reliable, and accessible insights to the Internet.
java.lang.Math has numerous methods and our interest here is toIntExact() method.Consider the following example public class MathExact{ public static void main(String args[]) { MathExact mathExact = new MathExact(); mathExact.proceed(); } private void proceed() { long l = 100000000; int i = (int) l; System.out.println(“i: ” + i); System.out.println(“Math.toIntExact(“+l+”);: ” + Math.toIntExact(l)); }} /* Expected output: [root@mypc]# java MathExacti: 100000000Math.toIntExact(100000000);: 100000000 */

Month-start boundaries show up everywhere in reporting queries, billing cycles, cohort aggregations, and partition pruning. Hard-coding a date string works for one run but quickly rots. Deriving the first day
Let us consider a table representing employee data with a few columns, and, of course, their salary details as well. It is not wise to expose this table to all
It is quite easy to find the error log location through a quick query such as : SELECT SERVERPROPERTY(‘ErrorLogFileName’) AS ‘Error log file location’ This shows where your Error log file is stored
DBCC SHRINKDATABASE The command shrinks the size of the data and log files in a database. Here is a small example: DBCC SHRINKDATABASE (Database_Name, 10); –This allows for 10 percent free space in the database.
You can use the following command to monitor all your databases’ log file’s free space DBCC SQLPERF (‘LOGSPACE’)

Java’s modern HttpClient (introduced in Java 11, fully stable through Java 21 and 25) is the canonical way to issue HTTP requests from server-side Java. For a simple synchronous GET,
Use the math module???s isfinite method to determine if a value is finite or not. If it is not a number, the function returns false. See below for an example:math.isfinite(10) returns True
At times, we want to run our code only if the version of Python engine is above a certain version. See below for sample code. Import sysversion = sys.version
Python can return multiple values at a time. See below for a simple example. def multipleValueFunc(): z = 11 b = 22 return z, b j,k = multipleValueFunc () print(j, k)
Use the rstrip method to return the string with all occurrences of the trailing characters removed. For e.g. inputString = “devxyyy”inputString.rstrip(???y???) gives ???devx???
Its pretty ease to reverse a string in Python. ???Devx Jan???[::-1] gives ???naJ xveD???

A tiny refactor that has survived every Java version from 8 to 25: flip the null check. To guard against a NullPointerException when comparing a string to a literal, most

MySQL has several ways to locate a substring, and FIND_IN_SET is the right pick when your data is stored as a comma-separated list in a single column. It returns the
Get all the tables with a count of their records with the following query: CREATE TABLE #Temp ( TableName VARCHAR(MAX), Rows INT ); EXEC sp_MSForEachTable @command1 = ‘INSERT INTO #Temp(TableName,

Some .NET namespaces are unavoidably long, especially around COM interop and older libraries. C# lets you alias them at the top of a file so the rest of your code
The following code shows you how to compute the n Fibonacci number recursively: int fibonacci(int k) { if (k return k; } return fibonacci(k – 2) + fibonacci(k – 1);}
We use a lot of ng-templates in our HTML and have cases where we would need to swap one with another based on a condition. ngSwitch comes handy in this
We know that AUTO_INCREMENT is used to have a sequential value auto incremented by itself for the records that we insert. CREATE TABLE AUTO_TABLE (ID INT NOT NULL AUTO_INCREMENT,PRIMARY KEY
SQL injection is probably the most common and easiest hacking technique out there. Now, don’t think I condone it, I’m just trying to make you aware of some of the
SQL injection is probably the most common and easiest hacking technique out there. Now, don’t think I condone it, I’m just trying to make you aware of some of the
Automation of tasks is a good concept. Consider the example below in which you create a task and schedule it at your convenience to execute the needed actions. There are
Java arrays are not resizable. But we can work around this constraint with the following trick. int[] newArr = Arrays.copyOf(arr, arr.length + 1);
Just add a border-radius over the image element. See below for an example. . round {width: 100px;border-radius: 100%;}

Amid tons of data, finding a particular string’s presence in the data is extremely tedious. MySQL has a command named LOCATE that can be used with certain conditions and the
SQL injection is probably the most common and easiest hacking technique out there. Now, don’t think I condone it, I’m just trying to make you aware of some of the
SQL injection is probably the most common and easiest hacking technique out there. Now, don’t think I condone it, I’m just trying to make you aware of some of the
You can terminate the Java runtime that you are in programmatically. The Java Runtime class provides a method halt(argument) to support this. Of course, caution is advised when using this

With the Java Reflection API, we can isolate the abstract methods from a class via the following snippet of code: List abstractMethods = new ArrayList();Class clazz = Foo.class;Method[] methods =

MySQL provides you a mechanism to find the current user. SELECT USER(), CURRENT_USER(); This command comes handy when you have associated a proxy privilege to a user. Sample: mysql SELECT











