
Since 1998, DevX has helped people start businesses, build websites, and provide enterprise technology to people globally. Interviewing the likes of Microsoft’s co-founder, Steve Ballmer, the publication brings comprehensive, reliable, and accessible insights to the Internet.
Have you dropped a table by mistake and want to restore it? In some cases you can. Let’s say you’ve run this statement: DROP TABLE yourtable; Now, you want to
In this article, I’ll introduce you to Cloud platforms, discuss the services they provide, the cost (not just monetary cost) and the problem of lock-in. I’ll also discuss hybrid systems

Don’t you just hate it that the Euro monetary symbol is not present on all computers? With this simple trick you can add the Euro sign to a textbox. Put
A quick way to check if an HTTP Request is an Ajax request is by examining the X-Requested-With Header value. Please see below: bool isAjaxRequest = request.Headers[“X-Requested-With”] != null &&

As you know, Jenkins accept parameters in different kind of projects, including pipelines. Depending on the operating system where Jenkins is running, we can refer to the parameters as follows,
If you’re working with DATE fields in Oracle, and select this data, you’ll see the dates in the default output format. Depending on your location, the default date format could
Python is a major programming language, eco-system and community. It is influential in numerous domains: scientific computing, Web applications, DevOps, education. It is being used extensively by prominent companies and
Many developers have used MySQL, while they have only heard of MariaDB. Let’s explore the differences between these two database management systems. History MySQL and MariaDB share common history. MySQL
In this article, I’ll introduce you the WebSocket technology using a sample application based on Socket.io. At the end of this article you will have a good idea what WebSockets
TEXTSIZE can limit the amount of data returned for the following data types: varchar(max)nvarchar(max)varbinary(max)textntextimage To set the TEXTSIZE use the following command: SET TEXTSIZE (number) So, if I were to
Imagine that you have already fetched a few hundreds records matching certain criteria. Now, all that you need is the next 10 from that point on. MySQL has a handy
Add the following function: public void DownloadFile(string urlAddress, string location) { using (webClient = new WebClient()) { webClient.DownloadFileCompleted += new AsyncCompletedEventHandler(Completed); webClient.DownloadProgressChanged += new DownloadProgressChangedEventHandler(ProgressChanged); Uri URL = urlAddress.StartsWith(“http://”, StringComparison.OrdinalIgnoreCase)
It’s no surprise that big data?is becoming an integral part of any business conversation. Desktop and mobile search are providing data to marketers and companies around the world on an
A non-developer who works with developers details 5 workplace practices every team member can implement (today) for happier and more productive developer teams.

The DATEFROMPARTS function returns a date value with the date portion set to the specified year, month and day, and the time portion set to the default. An example follows:
The Singleton design pattern is one of the most popular design patterns in use. The Singleton design pattern is one of the Gang of Four’s (GOF) design patterns and belongs
There has been a lot of talk recently about job losses and how the recovery from the recent recession has been jobless. Historically, technological revolutions have eliminated many jobs but

The following snippet will allow you quickly determine whether or not a specified phrase exists in a string: If (!String.IsNullOrEmpty(STRINGTOCHECK.ToString()) && STRINGTOCHECK.ToString().ToLower().Contains(“PHRASETOSEARCHFOR”)){//Found}Else{//Not Found}
The java.nio package contains the types required to perform input output operations in Java. The introduction of the java.nio package has simplified input — output operations. This article presents a discussion on
The following example replicates a # character five times in front of a Student Number in the Students table: SELECT [Student Name], REPLICATE(‘#’, 5) + [Student Number] AS ‘Student Number’FROM

When handling sensitive user data, it is important to test the security of your Web application before deploying it to the production environment. There are many tools that can help

In this tutorial, we will discuss the benefits of using Magento to operate multiple stores. I will also explain how to configure this feature. What is Magento Multi Store? Magento
Security has never been more important. Our world is managed by software and algorithms make wide ranging decisions based on data. The reputation of large enterprises can be severely impeded
ZDNet has put together a round-up of some of the biggest technology stories of the year, and quite a few of the stories they mention had big implications for enterprise

GraphQL is a data query language used by Facebook since 2012 that was recently open sourced. It was designed to expose hierarchical data and make it easier for front-end developers
Unforeseen outages make entrepreneurs painfully aware of the preeminence of disaster recovery (DR) planning. However, anticipating a data center outage is not just about an effective DR strategy, it is more about lessening the business impact. Executing a DR plan aligned with operational imperatives and business needs can trigger challenges with demanding recovery time objective (RTO) and recovery point objective (RPO) requirements, with a little crave for the investment, deployment, and continuous management of a DR environment. Therefore, for enterprises with limited resources to maintain DR needs, cloud-based disaster recovery as a service (DRaaS) offers another layer of protection to their data while minimizing CapEx and simplifying deployment. DRaaS includes the replication of infrastructure, applications, and data to the cloud. DRaaS not only protects your data and also ensures your business continuity by minimizing downtime and interruption to clients, customers, and employees in the event of a disaster or server failure. A dedicated DRaaS service provider manages both primary production and disaster recovery instances in the cloud and benefits enterprises in eliminating on-premises infrastructure. An ideal cloud-based DR Service offers the following key elements: Greatly reduced CapExImmediate business continuitySimpler disaster recovery deploymentFull-site, disk, file, and system recoveryA replica of all protected systemsWAN optimization between cloud and the customer siteData validation to ensure the data integrity Benefits of Cloud-based DR Service Cost-effective Solution The pay-as-you-go pricing model of the cloud significantly lowers costs by eliminating unpredictable failure of hardware, software or data center. The DR Service helps reduce the secondary or tertiary data center investments and on-going maintenance. Efficient to Start An effective DR strategy provides an easy way to implement a DR Service by not investing in any hardware or a secondary site and by not hiring and training the new staff. The service offers a secure, scalable, automated, and simple process to replicate and recover applications & data during a disruptive event. Improve Operational Efficiency DR offers flexible services that help you to scale up during seasonal peaks and to scale down while slower times. This versatility improves the operational efficiency of your business and helps in better management of your budget, resources, and personnel. Reliable Security To deploy and manage applications in cloud services, organizations concern about security. However, choosing a service provider, who is compliant with all the relevant regulations, will help you with the most reliable security. Hence, with cloud-based DR solution, organizations can benefit from flexible contract terms, lower price points, and the scalability to grow as your business needs change. DRaaS ensures your business continuity of daily operations with minimal disruptions. Therefore, to safeguard all aspects of your organization, a comprehensive DR strategy has to be implemented. For details please visit : http://vmokshagroup.com/blog/
Images of a new version of the Google Glass wearable have popped up on a Federal Communications Commission (FCC) website. The updated device is said to be the forthcoming Enterprise
IBM has announced that it has added a new Alert Notification Service to its Bluemix PaaS. The service aims to help DevOps teams respond quickly to problems with applications running
By default, in Hibernate the second level cache is disabled and there is no default implementation for it. Therefor you’ll need a third part implementation. In order to activate the
Python 3 has been around for years. I actually wrote a series of articles for DevX on Python 3 called “A Developer’s guide to Python 3.0“. The first article was











