Join the social network of Tech Nerds, increase skill rank, get work, manage projects...
 

Search In

Stored Procedures and Functions in MySQL - Part 3

Parameters in Stored Routines While executing any stored routine sometimes we need to pass on certain values in stored procedures these values are handled as Parameters. Their declaration consists of three parts : Type of parameter Parameter nam

What's the difference between @Component, @Repository, @Controller & @Service annotations in Spring?

When we define the annotations “ @Component, @Service, @Controller, @Repository” with the classes, Spring automatically scan and identifies those classes and register the Bean definition with the ApplicationContext. Difference between @Component, @R

Writing Skinny Controller In Rails

Hi friends today I am going to guide you how you can make our controller skinny by following some basic object oriented approach in rails. Often we start writing our program business logic in our controller thus making mess of our controller as the b

Discussion on CakePHP 3.0

Discussion on CakePHP 3.0   Welcome to FindNerd. Today our discussion is based on cakePHP. We all knows CakePHP has been launched its version with bulk of changes. If you check CakePHP3 then you can see lots of changes, changes in concept, fil

Top 5 Big Data Analytics Tools in 2019

Today, the data is growing at an exceeding rate ranging in the exponential set of bytes. The steps to digitalization have created a colossal impact at an organizational level. The paperwork is comprised of new-found technology, over the span of year

Data Security & Privacy Methods of Ensuring Anonymity Online

Numerous reviews of anonymity schemes that have recently appeared on the Internet pushed me to write this article. Below I am talking about various methods and ways to ensure anonymity on the web, simplifying many technical points. I divide anonymity

Web Security Testing- Aspects You Ought to Know

The modern epoch has significantly augmented our lifestyle but the fact that the security breach is still a major challenge of the system can’t be neglected!   Whether it is phishing attacks or data theft, one cannot be sure enough about

Top Benefits of Java Application Development For Business Enterprises

Java applications are not unknown to the world and it has completely transformed the way how business enterprises interact with their potential customers. Java Apps are quite user-friendly and interesting to use. Further, the amazing user interface i

How to implement C.R.U.D operations using Ajax and Simple PHP

This tutorial will help user to learn, how to implement create, retrieve, update, and delete operations without refreshing the web page using Ajax and simple php. This is the html file named view.php Ajax | CRUD <div id="ajxrs

SQL Tutorial -> Sql Select Top

<-- Chapter 21: SQL Injection Chapter 22 SQL Select Top SQL Select Top clause is used to retrieve TOP N number of Records or X percent of Records from database table. Note: All database systems does not support the SELECT TOP clause. Lets se

1 119 161
Sign In
                           OR                           
                           OR                           
Register

Sign up using

                           OR                           
Forgot Password
Fill out the form below and instructions to reset your password will be emailed to you:
Reset Password
Fill out the form below and reset your password: