Tutorial by Examples: v

- real(6); val it = 6.0 : real
Instead of running intensive tasks into JavaFX Thread that should be done into a Service.So what basically is a Service? A Service is a class which is creating a new Thread every time you are starting it and is passing a Task to it to do some work.The Service can return or not a value. Below is ...
Standard ML doesn't have built-in support for lazy evaluation. Some implementations, notably SML/NJ, have nonstandard lazy evaluation primitives, but programs that use those primitives won't be portable. Lazy suspensions can also be implemented in a portable manner, using Standard ML's module system...
You can access the command line arguments passed to your program using the std::env::args() function. This returns an Args iterator which you can loop over or collect into a Vec. Iterating Through Arguments use std::env; fn main() { for argument in env::args() { if argument == &qu...
To list available login shells : cat /etc/shells Example: $ cat /etc/shells # /etc/shells: valid login shells /bin/sh /bin/dash /bin/bash /bin/rbash
This example uses Angular 2.0.0 Final Release registration-form.component.ts import { FormGroup, FormControl, FormBuilder, Validators } from '@angular/forms'; @Component({ templateUrl: "./registration-form.html" }) export class ExampleComponent { ...
The iv is prefixed to the encrypted data aesCBC128Encrypt will create a random IV and prefixed to the encrypted code. aesCBC128Decrypt will use the prefixed IV during decryption. Inputs are the data and key are Data objects. If an encoded form such as Base64 if required convert to and/or from in ...
When you need to find the bounding rectangle of a quadratic bezier curve you can use the following performant method. // This method was discovered by Blindman67 and solves by first normalising the control point thereby reducing the algorithm complexity // x1,y1, x2,y2, x3,y3 Start, Control, and ...
Introduction Sometimes migrations conflict, resulting in making the migration unsuccesful. This can happen in a lot of scenerio's, however it can occur on a regular basis when developing one app with a team. Common migration conflicts happen while using source control, especially when the feature-...
The iv is prefixed to the encrypted data aesCBC128Encrypt will create a random IV and prefixed to the encrypted code. aesCBC128Decrypt will use the prefixed IV during decryption. Inputs are the data and key are Data objects. If an encoded form such as Base64 if required convert to and/or from in ...
It is a basic human instinct to assess risk and to accept or take some kind of action on that risk. This is the essence of security, which is the body of knowledge that provides a framework around this instinct. Security defines three key concepts in a triangular paradigm - Confidentiality, Integri...
IDENTIFICATION DIVISION. PROGRAM-ID. STRINGVAL. ENVIRONMENT DIVISION. DATA DIVISION. WORKING-STORAGE SECTION. 01 WORK-AREAS. 05 I-STRING PIC X(08) VALUE 'STRNGVAL'. 05 O-STRING PIC XBXBXBXBXBXBXBX. 88 O-STRING-IS-EMPTY VALU...
OS: Mac OS X 10.11 (Should work on Windows / Linux since we are using Vagrant) Vagrant 1.8.4 Installed Directory Structure on Host OS (Mac OS): /path/to/project /provision /packages Note: If you use different vesions, be sure to update Variables at top of provision.sh script b...
Sharding Group Members : For sharding there are three players. Config Server Replica Sets Mongos For a mongo shard we need to setup the above three servers. Config Server Setup : add the following to mongod conf file sharding: clusterRole: configsvr replication: replSe...
Row-level security enables you to define some predicates that will control who could update rows in the table. First you need to define some table-value function that represents predicate that wll control access policy. CREATE FUNCTION dbo.pUserCanAccessProduct(@CompanyID int) RETURNS TABLE WIT...
Random mask will show a rundom number from the specified range instead of the actual value: ALTER TABLE Product ALTER COLUMN Price ADD MASKED WITH (FUNCTION = 'random(100,200)') Note that is some cases displayed value might match actual value in column (if randomly selected number matches valu...
Password Based Key Derivation can be used both for deriving an encryption key from password text and saving a password for authentication purposes. There are several hash algorithms that can be used including SHA1, SHA256, SHA512 which are provided by this example code. The rounds parameter is use...
See Swift 3 example for usage information and notes func pbkdf2SHA1(password: String, salt: [UInt8], keyCount: Int, rounds: Int) -> [UInt8]? { return pbkdf2(CCPBKDFAlgorithm(kCCPRFHmacAlgSHA1), password:password, salt:salt, keyCount:keyCount, rounds:UInt32(rounds)) } func pbkdf2SHA256(p...
Introduction Texas Instruments' (TI) CC26XX series SoCs are readily available wireless MCUs targeting Bluetooth Low Energy (BLE) applications. Along with the MCUs, TI offers a full-fledged software stack that provides necessary API and sample codes to help quickly get developers started with the to...
To install/update MVC version, follow these steps: In visual studio, open the Package Manager console (use CTRL + Q, and type package manager console) In the console appearing, enter the following after the console cursor showing PM>: Install-Package Microsoft.AspNet.Mvc -Version 5.2.3...

Page 209 of 296