top of page
Search
The Tech Platform
Apr 18, 2022
Go Application Vulnerability Cheatsheet
Securing applications is not the easiest thing to do. An application has many components: server-side logic, client-side logic, data...
The Tech Platform
Apr 13, 2022
INTRODUCTION TO AWS RDS (AMAZON RELATIONAL DATABASE SERVICE)
Amazon Web service has a large spectrum of products and services to offer to businesses of all sizes and shapes. Among these, one of the...
The Tech Platform
Apr 11, 2022
LINQ to SQL in ASP.Net With CRUD Operations
Language-Integrated Query (LINQ) In Language-Integrated Query (LINQ) to SQL, the data model of a relational database is mapped to an...
The Tech Platform
Apr 6, 2022
How to run ASP.NET Core & SQL Server from Docker
In this tutorial, we will first show you how to configure ASP.NET Core to run on Docker, then how to configure SQL Server on Docker....
The Tech Platform
Apr 4, 2022
8 Tips and Tricks for Writing the Best Queries in LINQ to Entities
LINQ is a powerful querying tool for .NET applications. There are certain techniques to follow when writing queries to make sure they run...
The Tech Platform
Feb 22, 2022
Custom State Management in Hangfire
Most enterprise applications require asynchronous, scheduled, or recurring tasks such as batch imports from a file, mass mails or...
The Tech Platform
Feb 22, 2022
Soccer Microservice on .Net core, Entity Framework, Mysql and Insomnia
Building Soccer microservice on .Net Core, Entity Framework, Mysql, Insomnia, with Swagger, Auto-mapper, OData, etc. Introduction In this...
The Tech Platform
Feb 1, 2022
Graph Database in SQL Server
Graph A graph is a collection of node and edge tables. Node or edge tables can be created under any schema in the database, but they all...
The Tech Platform
Jan 31, 2022
Data consistency in Entity Framework Core
Theoretical What is a transaction? A transaction is a single unit of work. If a transaction is successful, all of the data modifications...
The Tech Platform
Jan 25, 2022
Top 5 Programming Languages for Cyber Security
Cyber security is the application of technologies, processes and controls to protect systems, networks, programs, devices and data from...
bottom of page