Tutorial by Examples: en

From the Terminal command line Get the current URL from Safari osascript -e 'tell app "safari" to get the url of the current tab of window 1' Get the active URL in Google Chrome osascript -e 'tell app "google chrome" to get the url of the active tab of window 1'
Get the name of the web page in Safari osascript -e 'tell app "safari" to get the name of the current tab of window 1' Get the title of the web page in Google Chrome osascript -e 'tell app "google chrome" to get the title of the active tab of window 1'
To generate json user model with username, password_hash, email_id, created_at, updated_at, type mix phoenix.gen.json User users username:string email_id:string password_hash:string timestamps()
The following code sample demonstrates a quick and easy means of encrypting and decrypting files using the AES symmetric encryption algorithm. The code randomly generates the Salt and Initialization Vectors each time a file is encrypted, meaning that encrypting the same file with the same password ...
Use Spring REST Docs to document your services. It's a powerful framework which makes sure that the Service logic is always inline with the documentation. In order to do so, you would have to write integration tests for your services. If there is any mismatch in the documentation & service beha...
Use Spring REST Docs to document your services. It's a powerful framework which makes sure that the Service logic is always inline with the documentation. In order to do so, you would have to write integration tests for your services. If there is any mismatch in the documentation & service beha...
This example grabs the Node.gitignore file from GitHub's gitignore repository, downloads it to your current working directory and renames it to .gitignore - all very typical actions for someone starting a new node.js project. $ curl http://github.com/github/gitignore/raw/master/Node.gitignore -o .g...
Using Intents to Load the Image from Gallery. Initially you need to have the permission <uses-permission android:name="android.permission.READ_EXTERNAL_STORAGE"/> Use the Following Code to have the layout as designed follows. <?xml version="1.0" enco...
<?php defined('BASEPATH') OR exit('No direct script access allowed'); class Api extends CI_Controller { //default value private $login_credential; function __construct() { parent::__construct(); //for user authentication $this->load->library('session'); ...
ng-repeat is the built-in directive provided by AngularJS, mostly used for listing the array elements on UI dynamically as per the changes in our model. Official "ng-repeat" docs can be found at : https://docs.angularjs.org/api/ng/directive/ngRepeat Also the most common error faced whil...
This code creates the table: begin execute immediate 'create table my_table (id number, column_value varchar2(100))'; end; /
How comp, comp-1 ... comp-5 are implemented is implementation dependent. Format Normal Implementation Comp Big endian binary integer Comp-1 4 byte floating point Comp-2 8 byte floating point Comp-3 Packed decimal 123 is stored as x'123c' Comp-5 Binary In...
Acknowledgement This example is adapted from this article on type inference What is type Inference? Type Inference is the mechanism that allows the compiler to deduce what types are used and where. This mechanism is based on an algorithm often called “Hindley-Milner” or “HM”. See below some of th...
=> Original Post <= ASP.NET Core uses the ASPNETCORE_ENVIRONMENT environment variable to determine the current environment. By default, if you run your application without setting this value, it will automatically default to the Production environment. > dotnet run Project TestApp (.NETC...
The machine has to automatically determine the ideal behavior to maximize its performance. For example: Using reinforcement learning you can also make a computer program that can complete a Mario level (MarI/O - Machine Learning for Video Games).
Bukkit has a system called Event Priorities to help plugins handle events in the correct older. The seven priorities are (in older from first executed to last): Lowest Low Normal (default) High Highest Monitor If you are planning to cancel a lot of events (e.g. protection plugin) it would...
Open3.popen3 or Open3.capture3: Open3 actually just uses Ruby's spawn command, but gives you a much better API. Open3.popen3 Popen3 runs in a sub-process and returns stdin, stdout, stderr and wait_thr. require 'open3' stdin, stdout, stderr, wait_thr = Open3.popen3("sleep 5s && ls&q...
Asymmetric encryption is often regarded as preferable to Symmetric encryption for transferring messages to other parties. This is mainly because it negates many of the risks related to the exchange of a shared key and ensures that whilst anyone with the public key can encrypt a message for the inten...
Shopify themes can also be developed locally. Follow the steps below to setup local development environment: Install Shopify Theme Kit Get API Access Use a new theme or Configure an existing theme with theme kit Explanation of the above steps are as follows: Install Shopify Theme Kit A...
import { Injectable } from '@angular/core'; import { HttpEvent, HttpHandler, HttpInterceptor, HttpRequest } from '@angular/common/http'; import { UserService } from '../services/user.service'; import { Observable } from 'rxjs/Observable'; @Injectable() export class AuthHeaderInterceptor imple...

Page 274 of 275