Part 2 of 4 in our Loopback series.
In our previous article, we taught you how to successfully create a standard multi-tenant architecture API application using LoopBack 4.
Soft-delete is a technique to mark a record in a database for deletion. Or to temporarily prevent it from being selected.
It is usually implemented by adding a
deleted (boolean) column to each table whose entries are to be soft-deleted.
Entries with this flag set to true are considered logically deleted.
Application logic needs to ensure that these entries are not visible or available to the outside world.
Making soft-deletes’ counterpart, hard-delete…
SourceFuse builds innovative applications for today’s enterprises.
Over the years, we have delivered many applications using various frameworks and technologies — each one of these applications have a common set of high-level capabilities and quality attributes that enterprise customers expect these days.
While there is no architectural free lunch, we believe we have come pretty close.
Our enterprise architect, @Samarpan talks about the needs of these modern applications and how the latest version of the IBM backed Loopback provides a solid foundation to build these on.
As many entrepreneurs who have sought funding know, there are hot areas of technology that many investors seem to gravitate to and expect to hear. So naturally, early stage elevator pitches, pitch decks, and tag-lines start to blend together when looking at a group of young hopeful startup companies all in one place.
Everything tends to become “the ____ of _____” with a dash of machine learning, blockchain, and of course, some AI behind the scenes running it all.
NOTE: By “favorite”, I am referring only to the tag lines and buzz-worthiness. It is no testament to the business itself…
Just like you upgraded your audio library in 2001 with iTunes, legacy .NET applications can also benefit from some modernization.
.NET is one of the most popular software frameworks in the world. Designed to perform on Windows, which can become expensive and subject to Vendor lock-in, making future development dependent on Microsoft.
The fundamentals of your migration and modernization process:
Currently, there are over 700 different Windows ISV (Independent Software Vendor) listings in the AWS marketplace, more than 50…
This tutorial was written Divyun Vaid of SourceFuse, a software development company that builds custom, full-scale web and mobile SaaS products, and has deployed over 1000 apps and solutions since their founding in 2005.
In the last decade, office suites have transformed from clunky, heavy pieces of desktop software taking up valuable space on your system into on-demand, lightweight, collaborative applications. This opened up a new world of real-time collaboration, empowering multiple users in the web browser to work together from anywhere on Earth.
That’s what we’ll be building today in this tutorial. We’ll focus on collaborative spreadsheets in particular…
Even though we’ve been an AWS partner and in the APN ecosystem for years, we finally got our ducks in line and applied for our DevOps Competency. The process made us organize ourselves and bring some of our capabilities to the forefront to prepare for our AWS audit.
If you are new to Angular or HTTP Interceptors in general than the below quote does a great job illustrating what they are and how they work.
According to the Angular Team at Google:
“When your application makes a request, interceptors transform it before sending it to the server, and the interceptors can transform the response on its way back before your application sees it.”
This concept is extremely useful if you want to retry a request if it does not succeed at first.
Another nice thing about interceptors is that they can process the request and response together. Making…
Every iPhone, iPad and iPod Touch has a Unique Device Identifier (UDID), which is either a 40-character alphanumeric string (on iPhone X models and prior.) Or a 24 character identifier with a dash after the 8th digit, on iPhone XS and subsequent models) that is unique to each device.
On older models of iPhones like:
Did you know that there is a Smart Corridor coming to downtown Jax, including smart sensors, autonomous vehicles, and other new tech? Join us for a speaker series, brainstorm session, and afterparty as we chat about how we all can use open-source data to solve safety, mobility, and productivity problems.
Learn, discuss, and help shape the future of Jax’ Smart City Initiative, the Internet of Things, and Using Data for Good.
Speaker Series • Discussion • Rooftop After Party
📆 Thursday, November 15, 2018
⏰ 5:30 PM to 10:00 PM
📍 MOSH — 1025 Museum Circle · Jacksonville
240,000 stores run on Magento and pretty much every one of them has identified overall site speed as a paramount priority. Serious e-commerce businesses understand that a scalable infrastructure can throttle and expand to seamlessly handle peak shopping times and traffic spikes. A critical feature when aiming to increase session time, reduce drop offs, abolish abandoned carts, and most importantly convert visitors.
Making sure your site runs like a cheetah hunting an antelope through the Serengeti, means making sure your Magento 2.x install is properly configured for production. Properly configured means a few things. One, that your technical components are…
A digital product company and the leading AWS partner in the Southeast. Custom code and infrastructure development, migration, and optimizations.