Tutorial by Examples: di

Case 1: While using in the place of method arguments. If a method requires an object of wrapper class as argument.Then interchangeably the argument can be passed a variable of the respective primitive type and vice versa. Example: int i; Integer j; void ex_method(Integer i)//Is a valid statem...
The following is the list of all the data structures supported by Redis: Binary-safe strings Lists: collections of string elements sorted according to the order of insertion. Sets: collections of unique, unsorted string elements. Sorted sets: similar to Sets but where every string element is a...
When you need to find the bounding rectangle of a quadratic bezier curve you can use the following performant method. // This method was discovered by Blindman67 and solves by first normalising the control point thereby reducing the algorithm complexity // x1,y1, x2,y2, x3,y3 Start, Control, and ...
Aspx <asp:DataList runat="server" CssClass="sample" RepeatLayout="Flow" ID="dlsamplecontent" RepeatDirection="Vertical" OnItemCommand="dlsamplecontent_ItemCommand"> <ItemStyle CssClass="tdContainer" /> ...
Sharding Group Members : For sharding there are three players. Config Server Replica Sets Mongos For a mongo shard we need to setup the above three servers. Config Server Setup : add the following to mongod conf file sharding: clusterRole: configsvr replication: replSe...
Sql Server 2016+ and Azure Sql database enables you to automatically filter rows that are returned in select statement using some predicate. This feature is called Row-level security. First, you need a table-valued function that contains some predicate that describes what it the condition that will...
Row-level security enables you to define some predicates that will control who could update rows in the table. First you need to define some table-value function that represents predicate that wll control access policy. CREATE FUNCTION dbo.pUserCanAccessProduct(@CompanyID int) RETURNS TABLE WIT...
If you add default mask on the column, instead of actual value in SELECT statement will be shown mask: ALTER TABLE Company ALTER COLUMN Postcode ADD MASKED WITH (FUNCTION = 'default()')
In order to compile the driver, it is necessary to have the Linux Kernel source tree. Assuming the sources are at /lib/modules/<kernel-version>, the following Makefile will compile the file driver.c into the driver.ko Kernel Object obj-m := driver.o KDIR := /lib/modules/$(shell uname -r)/bu...
If you have found your software in the ports tree, now its the time to build it. Simple build and install with manual configuration cd /usr/ports/www/apache24 make make install Simple build and install with automatic configuration cd /usr/ports/www/apache24 make BATCH=yes make install ...
This example implements a custom binding that toggles visibility (similar to the existing visible binding), but will utilize jQuery's fading API to animate the transition from visible to invisible. Custom binding definition: //Add a custom binding called "fadeVisible" by adding it as a p...
DIVIDE a INTO b c d Data item b, c, and d are changed as b/a, c/a and d/a. DIVIDE a INTO b GIVING c Data item c is changed as b/a. DIVIDE a BY b GIVING c Data item c is changed as a/b. DIVIDE a INTO b GIVING q REMAINDER r Data items q and r are set with results of b/a DIVIDE a BY b G...
DISPLAY "An error occurred with " tracked-resource UPON SYSERR DISPLAY A, B, C UPON CONSOLE DISPLAY group-data UPON user-device ON EXCEPTION WRITE device-exception-notice NOT ON EXCEPTION WRITE device-usage-log END-DISPLAY UPON CONSOLE is a default, ra...
EVALUATE a ALSO b ALSO TRUE WHEN 1 ALSO 1 THRU 9 ALSO c EQUAL 1 PERFORM all-life WHEN 2 ALSO 1 THRU 9 ALSO c EQUAL 2 PERFORM life WHEN 3 THRU 9 ALSO 1 ALSO c EQUAL 9 PERFORM disability WHEN OTHER PERFORM invalid END-EVALUATE
This example is a custom binding that replaces text whenever an input value is updated. In this case, spaces will be replaced with "+". It is intended to be used alongside the existing value binding, and shows binding with an object literal. Sample markup with the replaceText binding: &l...
Objects that are not built-in To print the source code of a Python object use inspect. Note that this won't work for built-in objects nor for objects defined interactively. For these you will need other methods explained later. Here's how to print the source code of the method randint from the ran...
A common pattern in other languages is having a function that produces a "stream" of objects, and being able to use loop-code to loop over it. We can model this in C++ as template<class T> struct generator_iterator { using difference_type=std::ptrdiff_t; using value_type=T; ...
Laravel automatically resolves Eloquent models defined in routes or controller actions whose variable names match a route segment name. For example: Route::get('api/users/{user}', function (App\User $user) { return $user->email; }); In this example, since the Eloquent $user variable de...
To register an explicit binding, use the router's model method to specify the class for a given parameter. You should define your explicit model bindings in the boot method of the RouteServiceProvider class public function boot() { parent::boot(); Route::model('user', App\User::class); ...
Given these sample data: IDSTATUSSTATUS_TIMESTATUS_BY1ONE2016-09-28-19.47.52.501398USER_13ONE2016-09-28-19.47.52.501511USER_21THREE2016-09-28-19.47.52.501517USER_33TWO2016-09-28-19.47.52.501521USER_23THREE2016-09-28-19.47.52.501524USER_4 Items identified by ID values must move from STATUS 'ONE' to...

Page 119 of 164