(Mohammed Moinudheen) I would like to secure the contents of my Azure storage and limit the accessibility to authorized users based on a certain end date. I would also like to limit the access to the various other services that are available within the Azure storage account. Is there any easy way th
Author: SSWUG Research
(Ben Nadel) A few years ago, I wrote about how I don’t like “Update” methods in my API design. In that post, I talked about my “feelings” on the matter because I couldn’t really articulate the red flags that were going off in the back of my mind.
(Arvind Kumar GS) Refactoring is used for making code more readable and understandable to humans, thereby maintainable. It does not effect the functionality. In fact it should not effect the functionality.
(Vidyadharran G) In this article, I will explain about hiding and showing form fields using Angular forms. Forms are used in web applications that enable the users to enter data and process the data from it.
(James McCaffrey) Perceptron classification is arguably the most rudimentary machine learning (ML) technique. The perceptron technique can be used for binary classification, for example predicting if a person is male or female based on numeric predictors such as age, height, weight, and so on.
(David Walsh) The content security policy spec has been an amazing front-end security tool to help prevent XSS and other types of attacks.
(Morgan Patou) In the scope of an upgrade project, with some colleagues, we have been deploying some D2-REST applications on Kubernetes pods using WebLogic Server.
(David Fitzjarrell) Database replication is no longer restricted to Oracle-to-Oracle configurations; Oracle-to-cloud and Oracle-to-BigQuery are just two of the various options that can now be selected for replication configurations.
(Pinal Dave) Sometimes it is critical to get back to basics when working on solving a complex problem at Comprehensive Database Performance Health Check. Recently, I solved a huge performance problem for one of my clients by just adding the SET NOCOUNT inside the stored procedure.
(Erik Frøseth) For a long time, the only algorithm for executing a join in MySQL has been variations of the nested loop algorithm. With the release of MySQL 8.0.18, the server can now execute joins using hash join.