Tutorial by Examples: ti

'Declare an array of bytes, assign multi-byte character codes, and convert to a string Dim multiByteChars(9) As Byte multiByteChars(0) = 87 multiByteChars(1) = 0 multiByteChars(2) = 111 multiByteChars(3) = 0 multiByteChars(4) = 114 multiByteChars(5) = 0 multiByteChars(6) = 108 multiByteChar...
As a root user: sudo nginx -s reload Ubuntu 14.04 example sudo service nginx reload Ubuntu 16.04 example sudo systemctl reload nginx Before reloading, it is a good idea to check config for syntax errors: sudo nginx -t Or sudo service nginx configtest
The following example encrypts a given data block using AES. The encryption key is derived in a secure way (random salt, 1000 rounds of SHA-256). The encryption uses AES in CBC mode with random IV. Note that the data stored in the class EncryptedData (salt, iv, and encryptedData) can be concatenate...
We can easily separate distribution specific tasks and variables into different dedicated .yml files. Ansible helps us to automatically identify the target hosts distribution via {{ ansible_distribution }} and {{ ansible_distribution_version }}, so we just have to name the distribution dedicated .y...
CSRF is an attack which forces end user to execute unwanted actions on a web application in which he/she is currently authenticated. It can happen because cookies are sent with every request to a website - even when those requests come from a different site. We can use csurf module for creating cs...
Create a new httpHandler inside your ASP.NET project. Apply the following code (VB) to the handler file: Public Class AttachmentDownload Implements System.Web.IHttpHandler Sub ProcessRequest(ByVal context As HttpContext) Implements IHttpHandler.ProcessRequest ' pass an ID thr...
The way the $scope is injected in the controller's constructor functions is a way to demonstrate and use the basic option of angular dependency injection but is not production ready as it cannot be minified. Thats because the minification system changes the variable names and anguar's dependency i...
Detailed instructions on getting iPhone set up or installed. Turn on your iPhone. You will see the "Hello" screen in many languages. Slide to right to continue. Choose the language you want and tap your country or region. Choose a Wi-Fi network and make sure your iPhone 7 is connected...
Const baseString As String = "Foo Bar" Dim containsBar As Boolean Dim posB As Long posB = InStr(1, baseString, "B", vbBinaryCompare) 'posB = 5
Const baseString As String = "Foo Bar" Dim containsBar As Boolean 'Find the position of the last "B" Dim posX As Long 'Note the different number and order of the paramters for InStrRev posX = InStrRev(baseString, "X", -1, vbBinaryCompare) 'posX = 0
An array is just a block of sequential memory locations for a specific type of variable. Arrays are allocated the same way as normal variables, but with square brackets appended to its name [] that contain the number of elements that fit into the array memory. The following example of an array uses...
Typical usage of ExtJS leverages the framework to build single-page rich-applications (RIA). The simplest way to get started is to make use of Sencha Cmd, a CLI build tool covering most of the general concerns in a deployment life-cycle, primarily: package and dependency management code compil...
Authenticate user with Plus login onCreate GoogleSignInOptions gso = new GoogleSignInOptions.Builder(GoogleSignInOptions.DEFAULT_SIGN_IN) .requestIdToken(getString(R.string.default_web_client_id)) .requestScopes(new Scope(Scopes.PLUS_LOGIN)) .requestEmail() .build(); mGoogleApiClient...
Client.java import java.io.*; import java.net.*; public class Client{ public static void main(String [] args) throws IOException{ DatagramSocket clientSocket = new DatagramSocket(); InetAddress address = InetAddress.getByName(args[0]); String ex = "He...
Starting out: HTML <table id='my-table' width='960' height='500'></table> JS var data = [ { type: "Name", content: "John Doe" }, { type: "Birthdate", content: "01/01/1970" }, { type: "Salary", content: "$40,000,0...
The most flexible base R function for reshaping data is reshape. See ?reshape for its syntax. # create unbalanced longitudinal (panel) data set set.seed(1234) df <- data.frame(identifier=rep(1:5, each=3), location=rep(c("up", "down", "left", &quo...
Build.VERSION_CODES is an enumeration of the currently known SDK version codes. In order to conditionally run code based on the device's Android version, use the TargetApi annotation to avoid Lint errors, and check the build version before running the code specific to the API level. Here is an exa...
Protocols enable polymorphism in Elixir. Define protocols with defprotocol: defprotocol Log do def log(value, opts) end Implement a protocol with defimpl: require Logger # User and Post are custom structs defimpl Log, for: User do def log(user, _opts) do Logger.info "User: ...
Use & to capture functions from other modules. You can use the captured functions directly as function parameters or within anonymous functions. Enum.map(list, fn(x) -> String.capitalize(x) end) Can be made more concise using &: Enum.map(list, &String.capitalize(&1)) Captu...
\documentclass{article}% or book, report, ... \begin{document} See \cite{citeA} or \cite{citeB} or \cite{citeA, citeB}. \begin{thebibliography}{x} % \bibitem{<biblabel>} <citation> \bibitem{citeA} {\scshape Author, A}, {\itshape A title}, Journal of So-and-So, 2000....

Page 176 of 505