Tutorial by Examples: ti

react-rails includes a view helper (react_component) and an unobtrusive JavaScript driver (react_ujs) which work together to put React components on the page. You should require the UJS driver in your manifest after react (and after turbolinks if you use Turbolinks). The view helper puts a div on t...
It is not a good idea to expose Option types to C# code, as C# does not have a way to handle them. The options are either to introduce FSharp.Core as a dependency in your C# project (which is what you'd have to do if you're consuming an F# library not designed for interop with C#), or to change None...
The iv is prefixed to the encrypted data aesCBC128Encrypt will create a random IV and prefixed to the encrypted code. aesCBC128Decrypt will use the prefixed IV during decryption. Inputs are the data and key are Data objects. If an encoded form such as Base64 if required convert to and/or from in ...
It is a basic human instinct to assess risk and to accept or take some kind of action on that risk. This is the essence of security, which is the body of knowledge that provides a framework around this instinct. Security defines three key concepts in a triangular paradigm - Confidentiality, Integri...
CALL is also a way to extend COBOL functionality, and also to allow the reusability of code. It can also give access to "system" functionality. This example illustrates ways to provide "sleep" functionality to IBM Mainframe COBOLs. Bear in mind that the requirement to do so is r...
OS: Mac OS X 10.11 (Should work on Windows / Linux since we are using Vagrant) Vagrant 1.8.4 Installed Directory Structure on Host OS (Mac OS): /path/to/project /provision /packages Note: If you use different vesions, be sure to update Variables at top of provision.sh script b...
There are very good configurations to force typings and get more helpful errors which are not activated by default. { "compilerOptions": { "alwaysStrict": true, // Parse in strict mode and emit "use strict" for each source file. // If you have wrong c...
Row-level security enables you to define some predicates that will control who could update rows in the table. First you need to define some table-value function that represents predicate that wll control access policy. CREATE FUNCTION dbo.pUserCanAccessProduct(@CompanyID int) RETURNS TABLE WIT...
Automatic calculation of low and high thresholds for the Canny operation in opencv
You can configure the database settings in config/connections.js. Example: someMongoDb: { adapter: 'sails-mongo', host: 'localhost', // defaults to `localhost` if omitted port: 27017, // defaults to 27017 if omitted user: 'username_here', // or omit if not relevant password: 'passwo...
Install from NPM. npm install sails-mongo --save
Detailed instructions on getting mips set up or installed.
Step one We need to create a service called jwToken. Go to api/services directory and create jwToken.js. 'use strict'; const jwt = require('jsonwebtoken'), tokenSecret = "secretissecret"; module.exports = { // Generates a token from supplied payload issue(payload) { ...
We need two dependencies: bcrypt for encryption npm install bcrypt --save JSON Web token npm install jsonwebtoken --save
Laravel allows you to use multiple Authentication types with specific guards. In laravel 5.3 multiple authentication is little different from Laravel 5.2 I will explain how to implement multiauthentication feature in 5.3 First you need two different user Model cp App/User.php App/Admin.php ch...
You can add partial mask on the column that will show few characters from te beginning and the end of the string and show mask instead of the characters in the middle: ALTER TABLE Company ALTER COLUMN Phone ADD MASKED WITH (FUNCTION = 'partial(5,"XXXXXXX",2)') In the parameters of th...
Password Based Key Derivation can be used both for deriving an encryption key from password text and saving a password for authentication purposes. There are several hash algorithms that can be used including SHA1, SHA256, SHA512 which are provided by this example code. The rounds parameter is use...
See Swift 3 example for usage information and notes func pbkdf2SHA1(password: String, salt: [UInt8], keyCount: Int, rounds: Int) -> [UInt8]? { return pbkdf2(CCPBKDFAlgorithm(kCCPRFHmacAlgSHA1), password:password, salt:salt, keyCount:keyCount, rounds:UInt32(rounds)) } func pbkdf2SHA256(p...
We initialize the data we want to interpolate: x = 0:0.5:10; y = sin(x/2); This means the underlying function for the data in the interval [0,10] is sinusoidal. Now the coefficients of the approximating polynómials are being calculated: p1 = polyfit(x,y,1); p2 = polyfit(x,y,2); p3 = polyfit(...
Introduction Texas Instruments' (TI) CC26XX series SoCs are readily available wireless MCUs targeting Bluetooth Low Energy (BLE) applications. Along with the MCUs, TI offers a full-fledged software stack that provides necessary API and sample codes to help quickly get developers started with the to...

Page 354 of 505