Posts

DMA - A safe way to migrate SQL Server database objects

Image
SQL Server database objects migration was not so easy earlier as of now with the help of DMA(Data Migration Assistant). The Data Migration Assistant (DMA) which is a free tool from Microsoft. DMA helps us to upgrade to a modern data platform by detecting compatibility issues that can impact database functionality in your new version of SQL Server or Azure SQL Database. DMA recommends performance and reliability improvements for your target environment and allows you to move your schema, data, and uncontained objects from your source server to your target server. The DMA assessment workflow detects Migration blocking issues,Partially supported or unsupported features,compatibility issues (Breaking changes,Behavior changes,Deprecated features) and suggests feature recommendations(Performance,Security,Storage). References :- https://docs.microsoft.com/en-us/sql/dma/dma-overview?view=sql-server-2017 https://channel9.msdn.com/Shows/Data-Exposed/First-Look-at-the-new-SQ...

Silent Installation Implementation in ClickOnce Application

Image
What is Silent Installation? A silent install is the installation of a software program that requires no user interaction. It is a convenient way to streamline the installation process of a desktop application. In a non-silent or "attended installation," the user is prompted to select or confirm these options during the installation process. In a silent install, these items are selected automatically and the installer runs from start to finish without requiring any user input. How to create a custom installer that silently installs a ClickOnce application In your ClickOnce application, add references to System.Deployment and System.Windows.Forms.  Add a new class to your application and specify any name. This walkthrough uses the name MyInstaller.  Add the following Imports or using statements to the top of your new class.  Add the following(see the attached images of MyInstaller.cs) methods to your class. MyInstaller -1 MyInstaller -2 Eve...

ClickOnce Technology - Easy way to distribute updates(Auto update) of .NET based Windows application to workstations

Image
ClickOnce Technology is Windows application publishing technology which can be used for any Windows Presentation Foundation (.xbap), Windows Forms (.exe), console application (.exe), or Office solution (.dll). Applications which is published using ClickOnce technology is called ClickOnce application. ClickOnce applications can be self-updating; they can check for newer versions as they become available and automatically replace any updated files. The developer can specify the update behavior; a network administrator can also control update strategies for example, marking an update as mandatory. Updates can also be rolled back to an earlier version by the end user or by an administrator. ClickOnce applications are self-contained; each ClickOnce application is installed to and run from a secure per-user, per-application cache. ClickOnce applications run in the Internet or Intranet security zones. If necessary, the application can request elevated security permission...

How Software Development Technology are Connected

Image
Technologies cluster together into related ecosystems that tend to be used by the same developers. In this chart we see a large central cluster for web development (with JavaScript, HTML, and CSS) connected via SQL to one for Microsoft technologies (with C#, Visual Studio, and .NET Core). Along the left we see a constellation connecting Java, Android, and iOS across to Linux, bash/shell, and Python. Other smaller correlated clusters include Scala/Spark, C/C++, and other smaller technologies that include language-specific IDEs. Source:- stackoverflow.com

Passwordless Authentication-A Mechanism where Users do not need to Login with Passwords

Image
Introduction :- Passwordless authentication is a type of authentication where users do not need to login with passwords. This form of authentication totally makes passwords obsolete. With this form of authentication, users are presented with the options of either logging in simply via a magic link, fingerprint, or using a token that is delivered via email or text message. Case Study :- Over the years, cases of stolen and hacked passwords have been on the rise. So many cases, such as the Yahoo data breach, Dropbox user accounts leak, and LinkedIn Data Breach, had to do with having several passwords leaked. With these challenges staring down at us like a monster, what if there are no more passwords to be hacked? What if there are no more passwords for users to remember? What if we discard the use of passwords totally? Passwordless authentication to the rescue! Benefits:- Improve User Experience:- The faster users can sign up and use your service, the more users your app ten...

Native Android SDK Integration with Xamarin Projects

Image
Did you ever encounter a such challenge or limitation that you did not find any package or DLL for your Xamarin app?   For me yes, I always encounter with such challenges. To over come from this there is work around to over come from this however you need to work on Android Studio or other Android app development IDE besides Visual Studio,Xamarin. Following are steps which you need to follow. Step-1. Download native Android SDK or Sample project from respectively provider and open it in Android Studio. Step 2-> Review the sample project structure and find Lib/Library folder.Open the folder and and go to build > Intermediate-output > debug>*.jar or class.jar Step 3-> if there is no classes.jar/ *.jar file the given above path(../build > Intermediate-output > debug>) then open build.gradle file and in bottomline add these lines Step 4 -> if you do not find *.jar file then go to Build menu and select Make Project or follow the command using...

Defensive Programming Approach - A developer must have this skill

Image
Defensive programming is a form of defensive design intended to ensure the continuing function of a piece of software under unforeseen circumstances. Defensive programming practices are often used where high availability, safety or security is needed — Wikipedia Defensive programming techniques are used especially when a piece of software could be misused mischievously or inadvertently to catastrophic effect. # Defensive programming is an approach to improve software and source code, in terms of: # General quality – reducing the number of software bugs and problems. # Making the source code comprehensible – the source code should be readable and understandable so it is approved in a code audit. # Making the software behave in a predictable manner despite unexpected inputs or user actions Key points in order to achieve a Defensive Programming approach.These are as follows. 1.Don’t trust developers 2.Never trust user input 3.Use database abstraction 4.Don’t ...