Recent Posts

Common Vulnerabilities in Web Applications:

Security in a website is the most important factor needs to be taken care of if considered. Are your website and user data safe and secure? Do you have enough security over your website’s database that prevents attackers to fill in junk info, modify or delete info? Is it possible for an attacker to gain access to restricted resources on your web server by any means? Sometimes, it happens that users can be tricked to collect important information on behalf of a different site by presenting them a fake site of the exact similar interface.

Read More

Android Marshmallow runtime permissions

Starting with Android 6.0 (Android Marshmallow, API level 23), application will not be granted any permission during installation time. If your application targeting API level 23, has to ask user for a required permission at runtime.

 

Read More

SignalR – Why, What and How?

An increasing number of software out there namely websites and web applications today offer or need to offer real-time data, they want to have up-to-date data delivered to any device and to any application over any network and any connection. Whether an application is based on a browser and a website or a web application, or whether that's just a WPF or Silverlight, or a Windows store application, it doesn't matter a lot. An increasing number of collaborative apps and collaboration solutions running in the web browser but also running on mobile devices as well. So to cater these needs a robust framework is needed.

Read More

Indexing in SQL Server

In this article we are going to dive deep into clustering index and non-clustered index. But before that we need to have an informal introduction of indexing in database and it’s usage for non-database guys.

 

So the question is What is index in database? Why do we need indexing in database? Let us learn with some scenario along with an analogy. The analogy is the index of a book.

 

Read More

Grunt Framework

Grunt is a JavaScript based Task Runner. The main use of grunt is automation, an example: build automation. Grunt uses the available plugins to automate the task. These plugins can be installed and managed by using Node Package Manager (npm). You need to have npm installed globally in the machine.

 

Read More

GULP !!!

Gulp is a Java Script based task runner build tool, which can automate the common task while building an application.  There are many tools available in the market which do the same work such as Grunt, Broccoli etc. Gulp is preferred a bit because of its faster performance using the stream line.

 

Read More

Native, Web or Hybrid App -Which App should opt for your business?

Many companies/institutions taking their initial steps to develop a mobile program are facing an important decision that will influence the outcome of this initiative. The process of selecting a development approach for a mobile application, namely native, web and hybrid, entails many parameters, such as development cost, project timeframe, and targeting specific group of people and app functionality. Each approach carries inherent benefits and limitations, and finding the one that best addresses the organization’s needs could be a challenging task.

Read More

Non-clustered index in SQL Server

In previous article we had discussed internals of clustered indexing.  Here we are going to discussed non clustered indexing in details and we will use the same example table as shown below.

CREATE TABLE STUDENT

(

StudentID int IDENTITY(1,1) NOT NULL,

FirstName char(50) NOT NULL,

LastName char(50) NOT NULL,

SSN char(11) NOT NULL

)

Above table may be a clustered table or may not be a clustered table. It’s not mandatory for a table to be clustered one to create a non-clustered index on it.  We want to create a non-clustered index “IX_Student_SSN” on SSN column of Student table as shown below

 

Read More

SQL Injection

SQL Injection is a code injection technique to attack a web application. Generally malicious SQL statements are inserted into an entry field (or manipulate http request with malicious statement) for execution. The execution of malicious script might cause unauthorized access to content, deleting table form underlying database, becoming a database administrator, shutting down the database server and so on. SQL Injection is one of the most dangerous attack performed on web applications.

 

Read More

Unobtrusive Javascript

Unobtrusive Javascript is an approach which defines efficient way of using Javascript in a web page. With unobtrusive javascript in place you code your javascript functionality separately from the site’s content, follow best practice to avoid the problems of traditional JavaScript programming and give progressive enhancement to support user agents that may not support advanced JavaScript functionality.

 

Read More

Recent Posts

Discuss A Project



Tell us about your requirement and we will get back to you soon.

Archives

TAGS

Tweets