Showing Tag: "to" (Show all posts)

Top 5 Stored Procedure Performance Tips You Can Use

Posted by jineesh uvantavida on Friday, December 23, 2022, In : Tips & Ideas. 

Top five performance tips for Stored Procedures

In this post, we will dig into some super easy tips that can be used to speed up your stored procedures.

Knowing how to optimize stored procedures is important, so stick around and I’ll show top five stored procedure performance tips you can use today.

Let’s dig into some super easy tips you...


Continue reading ...
 

Extracting urls from web page using chromedeveloper tools

Posted by jineesh uvantavida on Tuesday, December 6, 2022, In : Tips & Ideas. 

Step 1: In Chrome, go the website that you want to extract links from, like https://www.codeschool.com/. Step 2: Open Chrome Developer Tools by pressing Cmd + Opt + i (Mac) or F12 (Windows) in the same tab. Step 3: Click the Console panel near the top of Chrome Developer Tools. Inside the Console panel paste the JavaScript below and press Enter: var urls = document.getElementsByTagName('a'); for (url in urls) { console.log ( urls[url].href ); } Now you will see all the links from tha...

Continue reading ...
 

What are the best free tools/approaches for API management?

Posted by jineesh uvantavida on Wednesday, November 9, 2022, In : Tips & Ideas. 

Some of the open source API Management Solutions are

WSO2 API manager is just one tool in the massive open source catalog that WSO2 brings in. The company provides a number of open source tools including Identity Server, ESB, Data, Application and API management solutions.

Can use to build stacks of reusable software components. These components can be leveraged by service developers to perform common A...


Continue reading ...
 

How to Make Microsoft Teams Secure

Posted by jineesh uvantavida on Wednesday, November 9, 2022, In : Tips & Ideas. 
Microsoft Teams is convenient and powerful, but is it secure?

There are multiple layers of encryption at work within Microsoft 365. Encryption in Teams works with the rest of Microsoft 365 encryption to protect your organization's content.
End-to-end Encryption

For situations that require heightened confidentiality, Teams offers end-to-end encryption (E2EE) for one-on-one calls. With E2EE, call information is encrypted at its origin and decrypted at its intended destination so that no informatio...

Continue reading ...
 

How to Remove 'Show More Options' From the Windows 11 Context Menu - Command Prompt

Posted by jineesh uvantavida on Thursday, June 30, 2022, In : Tips & Ideas. 
How to Remove 'Show More Options' From the Windows 11 Context Menu - Command Prompt

Open Windows Terminal, Command Prompt, or PowerShell.

Disable:
reg add "HKCU\Software\Classes\CLSID\{86ca1aa0-34aa-4e8b-a509-50c905bae2a2}\InprocServer32" /f /ve

Enable:
reg delete "HKEY_CURRENT_USER\Software\Classes\CLSID\{86ca1aa0-34aa-4e8b-a509-50c905bae2a2}" /f​

 Restart Explorer or reboot.

Continue reading ...
 

Difference between == and === operator in JavaScript

Posted by jineesh uvantavida on Monday, June 7, 2021,
 ‘==’ operator
  • check abstract equality i.e. it does the necessary type conversions before doing the equality comparison
 ‘===’ operator
  • strict equality i.e. it will not do the type conversion hence if the two values are not of the same type, when compared, it will return false

Continue reading ...
 

How to find List of Stored Procedures/ Functions in PostgresSQL Database

Posted by jineesh uvantavida on Wednesday, December 23, 2020,
Finding procedures without schema name

select n.nspname as schema_name, p.proname as specific_name, l.lanname as language, case when l.lanname = 'internal' then p.prosrc else pg_get_functiondef(p.oid) end as definition, pg_get_function_arguments(p.oid) as arguments from pg_proc p left join pg_namespace n on p.pronamespace = n.oid left join pg_language l on p.prolang = l.oid left join pg_type t on t.oid = p.prorettype where n.nspname not in (...
Continue reading ...
 

What Is Token-Based Authentication?

Posted by jineesh uvantavida on Friday, November 20, 2020, In : Tips & Ideas. 

Token-based authentication is a protocol which allows users to verify their identity, and in return receive a unique access token. During the life of the token, users then access the website or app that the token has been issued for, rather than having to re-enter credentials each time they go back to the same webpage, app, or any resource protected with that same token.


Auth tokens work like a stamped ticket. The user retains access as long as the token remains valid. Once the user logs out o...


Continue reading ...
 

Could not load file or assembly 'Newtonsoft.Json' or one of its dependencies. Manifest definition does not match the assembly reference

Posted by jineesh uvantavida on Friday, November 10, 2017, In : asp.net 

You can solve the issue by adding below lines in web.config file.

 <runtime>
    <assemblyBinding xmlns="urn:schemas-microsoft-com:asm.v1">
      <dependentAssembly>
        <assemblyIdentity name="Newtonsoft.Json" publicKeyToken="30ad4fe6b2a6aeed" culture="neutral"/>
        <bindingRedirect oldVersion="0.0.0.0-8.0.0.0" newVersion="8.0.0.0"/>
      </dependentAssembly>
    </assemblyBinding>
  </runtime>

Continue reading ...
 

Installing CKEditor & CKFinder in Drupal

Posted by jineesh uvantavida on Saturday, January 7, 2012, In : Tips & Ideas. 
1. Download CKEditor from http://ckeditor.com/download
 
Then Extract it and copy the ckeditor folder to 
- " c:/xampp/htdocs/drupal/sites/all/modules/ " folder if it is xampp
- " c"/wamp/www/drupal/sites/all/modules/ " if it is wamp
 
2. Enable CKEditor module in Modules.
 
- Go to  Configuration Content authoring CKEditor         
edit full profile and change File Browser to CKFinder.

 
3. Open  sites/all/modules/ckeditor/ckfinder/config.php and  Delete function CheckAuthentication()
 
- af...
Continue reading ...
 

Intermediate guide to bit torrent

Posted by jineesh uvantavida on Saturday, December 17, 2011, In : Tips & Ideas. 
http://lifehacker.com/286607/intermediate-guide-to-bittorrent
Continue reading ...
 

You can find out your total PC usage with a simple program...!!!

Posted by jineesh uvantavida on Thursday, October 20, 2011, In : Tips & Ideas. 
        We are all anxious to see the total usage time of our PC. Now it is simple. You only have to download a simple application named "PC On/Off Time". This free time tracking tool shows the times your computer has been active during the last 3 weeks, with no previous setup required. The software doesn't need to run in the background, because Windows OS tracks logon and logoff/standby times (working hours) by default, and the program analyses it.

Continue reading ...
 
 

Translate This Page

 


Make a free website with Yola