
Since 1998, DevX has helped people start businesses, build websites, and provide enterprise technology to people globally. Interviewing the likes of Microsoft’s co-founder, Steve Ballmer, the publication brings comprehensive, reliable, and accessible insights to the Internet.
Imagine, you want to schedule activating a task few moments (3 seconds in this case) from now, the following code snippet will be helpful. import java.util.*;//We only need Timer and
You can identify tables with a huge column count in the following way: DECLARE @limit INT;SET @limit = 30; –MAX 30 Columns;WITH c([object_id], [column count]) AS( SELECT [object_id], COUNT(*) FROM
zero = new Integer(0);return Boolean.valueOf(“true”); Integer and Boolean are immutable; so, it is a bad idea to create objects that represent the same value, those classes have built-in caches for
We can now use the Performance API to compute the execution time for a piece of code in JavaScript. //capture the start time in a variable.var timeStart = performance.now();//run a
Excel Pivot Tables are a great way to summarize statuses and aggregate data. However, with any kind of data that you aggregate you will see blanks at times. There are cases, where you would like to universally replace all blank values in Pivot table with an alternate value. Right-click on the Pivot table. Select the ???Pivot table options???. Under ???Layout and Format – Format??? there is an option that lets you replace empty cells value with your own predefined value. Enter a value there, and the Pivot table would use that in all blank places.
If you want to replay a XHR request, you can do that very easily in chrome. Right-click on the selected request and choose the ???Replay XHR??? option, and the browser will issue that request. You can see the replayed request at the bottom of the all captured requests.
When you refresh a page in the Chrome browser during any troubleshooting, you would have realized that the logs are being cleared for every page reload. To override this, you can check the ???Preserve Log??? box under the ???Network??? tab in Developer tools. It retains all the requests across page reloads, until you clear them manually or close the page.
The new keyword definitely consumes more time when compared to direct initializing the value to a String object. The following illustrates the time consumed by both the mechanisms. These values
There are a lot of layout settings that help you define the page layout for printing — background, margins, etc. The Print area option allows you to select a certain area to
There are a lot of layout settings that help you define the page layout for printing???background, margins, etc. The Print area option allows you to select a certain area to
You can use the following snippet to quickly find out a column’s name. COL_NAME accepts two parameters: TableID and the ordinal position. SELECT COL_NAME(object_id(‘waybill’),2) AS col_name ? Visit the DevX
You can use the following snippet to quickly find out a column’s name. COL_NAME accepts two parameters: TableID and the ordinal position. SELECT COL_NAME(object_id(‘waybill’),2) AS col_name
Writer w = new OutputStreamWriter(os, “UTF-8”);while (…){ w.write(“something”);} OutputStreamWriter uses memory for each call to its write() methods. This is why it is better to avoid this; if you do
Microsoft applications, such as Word, Excel, PowerPoint, etc., allow you to add frequently used toolbar items that are buried in various menu groups to a section called the Quick Access
Devart, a recognized vendor of professional database tools for developers and DBAs, has released a new version of SecureBridge. An update of SecureBridge components delivers such new features as: * Support for the HTTP and HTTPS protocols is added * The TScHttpWebRequest component to support the request/response model for accessing data using HTTP/HTTPS protocol is added * Performance of downloading and uploading a file using TScSFTPClient is improved * The TScSFTPClient.PipelineLength property to indicate the number of pending requests is added *The TScSSHClientOptions.SocketReceiveBufferSize and SocketSendBufferSize properties to increase socket performance are added SecureBridge protects any TCP traffic using SSH or SSL secure transport layer protocols that provide authentication for both client and server, strong data encryption, and data integrity verification. SecureBridge components can be used in conjunction with data access components to prevent data interception or modification in an untrusted network. Learn more about SecureBridge at https://www.devart.com/sbridge/ About DevartDevart is one of the leading developers of database tools and administration software, ALM solutions, data providers for various database servers, data integration and backup solutions. The company also implements Web and Mobile development projects.Learn more about Devart at https://www.devart.com.
The String class facilitates finding the unicode of characters in a String using the codePointAt method. Listing 1. Finding Unicode Characters public class StringCodePoint{ public static void main(String args[]) {

Java provides a very easy mechanism to read jar files. It is the same process used for reading a zip file. The file myFiles.jar contains one or more files (as
The following code snippet shows a small example of how you can sum the result of a count aggregate function. select sum(studentcount) as TotalCountfrom( SELECT count(s.studentname) as studentcount, s.studentname as
You can convert videos in different formats to view them in your browser. An easier way to play video in HTML format is to use YouTube. YouTube generates an automated
Use the string class’s constructor to specify the character and the number of times you want it to be repeated. Listing 1. Repeat String Characters String repeatedCharacterString = new String(‘*’,50);
In nearly all applications, there is critical data that we would not want anyone to see. Java has an easy way of implementing this. All that is required is to
Oftentimes, you might want to understand and control all the threads in your runtime. Java provides an effective and easy mechanism to achieve this using Thread.activeCount() and Thread.enumerate() methods. public

You can handle errors in T-SQL almost the same way as in C# or Visual Basic. You can make use of a Try and catch block to trap errors and

if (name.compareTo(“Jerry”) == 0) …if (name == “Jerry”) …if (name.equals(“Jerry”)) …if (“”.equals(name)) … All the above comparisons are correct, but they are not great. The compareTo method is overkill and
Import the time module and call the time function. The units are in Seconds. See below for an easy example. import timestartTime= time.time()”time consuming stuff”time consuming stuff”time consuming stuffendTime =
We are well aware of validating a Palindrome string. The emphasize here is usage of StringBuffer/Builder and the reverse method to get the string reversed instead of using an interactive
.NET uses SSL3 as the default security protocol for communicating with vendor servers. You can override the default SecurityProtocol used in .NET by setting the TLS 1.2 version explicitly: ServicePointManager.SecurityProtocol
Just type “.” in your run menu, and press Enter. It will open the ???downloads??? folder in Windows folder.
Windows Explorer status bar offers rich information about the files being viewed. For any video file, Windows shows the length of the video in the status bar along with the size, date created and other attributes.

Learn how to use FILEPROPERTY to check for free space in a database. SELECT DB_NAME() AS DBName, name AS FileName, size/128.0 AS MB, size/128.0 – CAST(FILEPROPERTY(name, ‘SpaceUsed’) AS INT)/128.0 AS











