How do you ensure API security and avoid data leakage
Ensuring API security and preventing data leakage is critical in any Salesforce integration. Whether you’re exposing or consuming APIs, you must follow best practices around authentication, authorization, encryption, data validation, and monitoring. Key Strategies to Secure Salesforce APIs & Prevent
Blackboard | Changing Course Entry Point
Blackboard LMS allows us to change the “course entry point” for Blackboard. We can set up Blackboard so that user always go to the specific section of Course page when they enter the course. The default course entry page is
Hadoop | ServerNotRunningYetException and PleaseHoldException
Problem 1: ERROR: org.apache.hadoop.hbase.ipc.ServerNotRunningYetException: Server is not running yet While running the hbase shell sometimes we receive Server is Not Running Yet error while our hbase master server is running properly. Solution: This problem occurs when we fetch the data
Java | Understanding signature of main() method
The syntax of main method in java is: public static void main(String[] args) { } There are three keywords used in main: public, static, void public: public keyword is the access modifier in Java which gives its access to the
Adding Google Map in web page using Javascript
How to add Google Map in your project and show markers and InfoWindows for various locations using HTML and Javascript. Google Map API is one of the most used APIs in websites and projects. We can use the API to
SVN Switch
I am assuming you are working on code from branch A (it may be trunk as well) and have already made some changes locally. Now you find you can’t commit your changes to SVN because they are not stable yet.
Introduction to DataBase Isolation Levels
Introduction to DataBase Isolation Levels Transaction specifies an isolation level that defines the degree to which one transaction must be isolated from resource or data modifications made by other transactions. Isolation Levels are described in terms of side-effects of concurrent
Java | SSL and SSLHandshakeException for self-signed websites
What are secure SSL Certificate? Secure SSL certificate is used by most of the websites to prevent private and secure information of their users so that no third party could access them. When an SSL certificate is used, it encrypts
Linux – Get full path of a running process
2 ways that I know to get the full path of a process in linux: 1. /proc/ /exe is a symlink to the actual exe. Here’s what I get for a program eclipse running on my machine under pid 4825
Java | int and float overflow and underflow with examples
First we should know what is overflow and underflow. Overflow is a condition where value crosses the maximum prescribed size of a data type. Underflow is a condition where value reaches the minimum prescribed size of a data type. With
