Tutorial by Examples: en

Although package:listenv implements a list-like interface to environments, its performance relative to environments for hash-like purposes is poor on hash retrieval. However, if the indexes are numeric, it can be quite fast on retrieval. However, they have other advantages, e.g. compatibility with ...
Here is a very simple example to illustrate how to write a NIF. Directory structure: nif_test ├── c_src │   ├── Makefile │   └── nif_test.c ├── rebar.config └── src ├── nif_test.app.src └── nif_test.erl This structure can be easily initialized using Rebar3: $ rebar3 new lib nif_...
var client = new AmazonDynamoDBClient(); Table booksTable = Table.LoadTable(client, "Books"); // Store item Document book = new Document(); book["Title"] = "Cryptonomicon"; book["Id"] = 42; book["Authors"] = new List<string> { "Ne...
This example consists of two parts: first, we must define our Book type; second, we use it with DynamoDBContext. [DynamoDBTable("Books")] class Book { [DynamoDBHashKey] public int Id { get; set; } public string Title { get; set; } public List<string> Authors { ...
Suppose we have a component which will hide at a certain window width. import { Component } from '@angular/core'; @Component({ ... template: ` <div> <p [hidden]="!visible" (window:resize)="onResize($event)" >Now you see me...</p> &lt...
Step 1: Create events.xml file according to your requirement in frontend, Backend, or both YKM/Banner/etc/frontend/events.xml <?xml version="1.0" encoding="UTF-8"?> <config xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamespaceSchemaLocation=&q...
Using parameters passed by reference An event may define a ByRef parameter meant to be returned to the caller: Public Event BeforeSomething(ByRef cancel As Boolean) Public Event AfterSomething() Public Sub DoSomething() Dim cancel As Boolean RaiseEvent BeforeSomething(cancel) If...
This example finds an array of approximately evenly spaced points along an entire Path. It decomposes all Path segments created with context.lineTo, context.quadraticCurveTo and/or context.bezierCurveTo into points along that Path. Usage // Path related variables var A={x:50,y:100}; var B={x:12...
A goto statement transfers control to the statement with the corresponding label within the same function. Executing the goto statement must not cause any variables to come into scope that were not already in scope at the point of the goto. for example see the standard library source code: https:/...
To check if an element with a specified key exits in a WeakMap, use the .has() method. It returns true if it exits, and otherwise false. const obj1 = {}, obj2 = {}; const weakmap = new WeakMap([[obj1, 7]]); console.log(weakmap.has(obj1)); // true console.log(weakmap.has(obj2)); // false...
To remove an element with a specified key, use the .delete() method. It returns true if the element existed and has been removed, otherwise false. const obj1 = {}, obj2 = {}; const weakmap = new WeakMap([[obj1, 7]]); console.log(weakmap.delete(obj1)); // true console.log(weakmap.has(obj...
In order to compile docker its recommended you have at least 2 GB RAM. Even with that it fails sometimes so its better to go for 4GB instead. make sure git and make is installed sudo apt-get install make git-core -y install a new kernel (at least 4.2) sudo apt-get install linux-generic...
Required compiler features can be specified on a target using the command target_compile_features: add_library(foo foo.cpp ) target_compile_features(foo PRIVATE # scope of the feature cxx_constexpr # list of features ) The features must be part of CMAKE_C_COMPILE_FE...
Given - A have sheet of employees who have requested for reimbursement. Requirement - We should sent out an email to the employee when their reimbursement is processed So, the sheet is as follows: The function for sending out an email is as follows: function getDataSheet() { sheet = Sprea...
In the above example, if we want to send out HTML content as message in the email, then create a HTML file by going to File -> New -> HTML file Now you can see a HTML file besides your gs file as follows : Now, update the getMessage() method from above example as follows : function getMes...
This example shows the base of almost any XSLT transformation and the most fundamental XSLT design pattern. Producing as output an XML document that is identical to the source XML document. Source XML document: <t>Hello, World!</t> XSLT transformation: <xsl:stylesheet version=&q...
The loop macro supports iteration over the keys, the values, or the keys and values of a hash table. The following examples show possibilities, but the full loop syntax allows more combinations and variants. Over keys and values (let ((ht (make-hash-table))) (setf (gethash 'a ht) 1 (g...
The keys and values of a hash table can be iterated over using the macro with-hash-table-iterator. This may be a bit more complex than maphash or loop, but it could be used to implement the iteration constructs used in those methods. with-hash-table-iterator takes a name and a hash table and binds...
JSON Web Encryption (JWE) represents encrypted content using JavaScript Object Notation (JSON) based data structures. It defines a way to encrypt your claims data so that only intended receiver can read the information present in a token. In the JWE JSON Serialization, a JWE is represented as a JS...
In fluent programming style you return this from fluent (setter) methods that would return nothing in non-fluent programming style. This allows you to chain the different method calls which makes your code shorter and easier to handle for the developers. Consider this non-fluent code: public clas...

Page 148 of 275