(Siddharth Gajbhiye) Observables and Promise both provide us with abstractions that help us deal with the asynchronous nature of applications.
Community
SQL SERVER – Fix: Configuration Manager- Cannot Connect to WMI Provider. You Do Not Have Permission or The Server is Unreachable
(Pinal Dave) The reason, I like SQL Server as a product is that there are multiple solutions to one problem and one can use the method they find most convenient. Almost three years ago, I wrote a blog post about how to solve the error: Configuration Manager – Cannot Connect to WMI Provider. You Do N
Using a MySQL Keyring SECRET and Asymmetric Encryption
(Mike Frank) The following is an example of how to allow applications to asymmetrically encrypt data using a public key. In MySQL 8.0.19 support for the SECRET datatype was added to our Keyring technology.
How to test your C# Web API
(Tim Deschryver) If you’ve read some of my other blog posts already, you probably know that I’m not a big fan of unit tests.
Implementing an ST_SnapToGrid (PostGIS) function for Oracle Spatial
(Simon Greener) I am continuing my looking at PostGIS and developing new functions for Oracle that plug-gaps identified in PostGIS. Much of this has been wrapping existing functions in my existing GEOM PL/SQL package, but some has involved developing new functions.
SAP HANA Data Management and Performance on IBM Power Systems
(Dino Quintero, Damon Bull, Vinicius Cosmo Cardoso, Cleiton Freire, Eric Kass) This IBM Redpaper Redbooks publication provides information and concepts about how to take advantage of SAP HANA and IBM Power Systems features to manage data and performance efficiently.
It’s 2020, Do I really need to DBCC CHECKDB?
(Daniel Janik) I’ll start by saying that I swear I posted this at some point in the past but I don’t see it looking back at old posts. This is from Aug ‘19; though, I haven’t seen any release notes on corruption in Azure.
JavaScript Security – Interview with David Balaban
(Juho Vepsäläinen) Given JavaScript dominates the world of web development, it has become a good target for malicious actors. Furthermore, the flexibility has led to a plethora of attack vectors for cybercriminals making JavaScript security an important topic for web developers.
Creating Dynamic Forms with Dependent Controls and Angular Implementation
(Merna El Katatnee) Developing applications with dynamic forms is required for many sections of business, and there are many approaches to write those forms natively with most of the UI frameworks.
SQL Server Maintenance Plans Maintenance Cleanup Task
(Sergey Gigoyan) In a previous article, we discussed the History Cleanup Task, which cleans old historical records in the msdb database generated by Maintenance Plans, Backup and Restore operations and SQL Server Agent Jobs.