(Mohammed Moinudheen) I would like to secure the contents of my Azure storage and limit the accessibility to authorized users based on a certain end date. I would also like to limit the access to the various other services that are available within the Azure storage account. Is there any easy way th
Author: SSWUG Research
Data Guard Fast-Start Failover Test – Shutdown Primary Host
(mdinh) Note: Primary Database: cdb1_stby is because failover was previously performed.
Refactoring using Functional Programming
(Arvind Kumar GS) Refactoring is used for making code more readable and understandable to humans, thereby maintainable. It does not effect the functionality. In fact it should not effect the functionality.
Useful scripts for working with Oracle directories on AWS RDS
(Matthias Hoys) Working with directory objects on the Oracle RDS platform on Amazon Web Services (AWS) is a bit different compared to a native installation of the Oracle database.
MySQL InnoDB Cluster 8.0 – A Complete Deployment Walk-Through: Part One
(Ashraf Sharif) MySQL InnoDB Cluster consists of 3 components:
Considering HTTP Methods PUT And PATCH Indicators Of An Anemic Domain Model And A Leaky Abstraction
(Ben Nadel) A few years ago, I wrote about how I don’t like “Update” methods in my API design. In that post, I talked about my “feelings” on the matter because I couldn’t really articulate the red flags that were going off in the back of my mind.
Function parameters in C# and the flattened sum type anti-pattern
(Yacoub Massad) In this tutorial, I will discuss function parameters in C#. I will talk about how function parameters tend to become unclear as we maintain our programs and how to fix them.
Using configurable composite command in multi-tenant ASP.NET Core application
(Gunnar Peipman) My previous posts about tenant-based dependency injection and using composite command in ASP.NET Core culminated with idea to use configurable composite commands in multi-tenant ASP.NET Core applications.
Db2 for z/OS and RACF, Part 1: External Db2 Security
(Robert Catterall) In a Db2 for z/OS context, RACF (the IBM security management subsystem for z/OS systems) can serve two important purposes, providing security for a Db2 environment in an external and an internal sense.
Identity Vs. Equality in Java
(Attila Mihaly) Take a quick look at identity and equality in Java, what they are, and how they compare to one another.
