Tutorial by Examples: u

Declare the cursor to scan a list of records Open it Fetch current record into variables (this increments position) Use %notfound to detect end of list Don't forget to close the cursor to limit resources consumption in current context -- DECLARE CURSOR curCols IS -- select column name a...
If you don't have Visual Studio 2015, go to https://www.visualstudio.com/en-us/downloads/download-visual-studio-vs.aspx and select Visual Studio Community. It is a free version that have all the required capabilities to develop Windows 10 application. You can install the Enterprise Edition if you ha...
You can override the default vmoptions with your own personal settings by choosing Help > Edit Custom VM Options from the toolbar. This will create a local copy of the file which you are free to edit. For example, if you double the value set for Xmx, the maximum size of the memory allocation poo...
This example shows the base of almost any XSLT transformation and the most fundamental XSLT design pattern. Producing as output an XML document that is identical to the source XML document. Source XML document: <t>Hello, World!</t> XSLT transformation: <xsl:stylesheet version=&q...
qplot is intended to be similar to base r plot() function, trying to always plot out your data without requiring too much specifications. basic qplot qplot(x = disp, y = mpg, data = mtcars) adding colors qplot(x = disp, y = mpg, colour = cyl,data = mtcars) adding a smoother qplot(x = d...
A downcast can be used to make use of a subclass's code and data inside of a function taking a parameter of its superclass. class Rat { var color = "white" } class PetRat: Rat { var name = "Spot" } func nameOfRat(🐭: Rat) -> String { guard let petRat = ...
In the following code let us assume for simplicity that float and uint32_t have the same size. void fun(uint32_t* u, float* f) { float a = *f *u = 22; float b = *f; print("%g should equal %g\n", a, b); } u and f have different base type, and thus the compiler can a...
Detailed instructions on getting seaborn set up or installed.
If we have two pointer arguments of the same type, the compiler can't make any assumption and will always have to assume that the change to *e may change *f: void fun(float* e, float* f) { float a = *f *e = 22; float b = *f; print("is %g equal to %g?\n", a, b); } f...
Detailed instructions on getting MarkLogic set up or installed can be found in the Installation Guide. The full offering of documentation is available via docs.marklogic.com The overall setup process involves Installing the binary/rpm Starting the services Configuring first and subsequent host...
A common use of macros is to create templates for data structures which obey common rules but may contain different fields. By writing a macro, you can allow the detailed configuration of the data structure to be specified without needing to repeat boilerplate code, nor to use a less efficient struc...
Server side (Host Webservices) Web services must be installed and running (deployed) in a web server as web application components. They can be part of a bigger application, or they can be deployed alone as they may compose a complete application. It is responsibility of the server to forward an i...
To begin using YouTube, just head over to youtube.com and use the search bar on the top of the page to find the required subject. Alternatively, you could just browse the home page. On this page, you can search the popular and trending videos, from Music, to gaming. If you wish to participate with c...
null returns True if there are no elements a in a foldable structure t a, and False if there is one or more. Structures for which null is True have a length of 0. ghci> null [] True ghci> null [14, 29] False ghci> null Nothing True ghci> null (Right 'a') False ghci> null ('x'...
To discover SQL Server's edition, product level and version number as well as the host machine name and the server type: SELECT SERVERPROPERTY('MachineName') AS Host, SERVERPROPERTY('InstanceName') AS Instance, DB_NAME() AS DatabaseContext, SERVERPROPERTY('Editio...
From Section 9 of JSON Web Encryption specification (RFC 7516): The JOSE Header for a JWS can be distinguished from the JOSE Header for a JWE by examining the "alg" (algorithm) Header Parameter value. If the value represents a digital signature or MAC algorithm, or is the value "no...
In fluent programming style you return this from fluent (setter) methods that would return nothing in non-fluent programming style. This allows you to chain the different method calls which makes your code shorter and easier to handle for the developers. Consider this non-fluent code: public clas...
To add a value to a WeakSet, use the .add() method. This method is chainable. const obj1 = {}, obj2 = {}; const weakset = new WeakSet(); weakset.add(obj1).add(obj2);
To check if a value exits in a WeakSet, use the .has() method. const obj1 = {}, obj2 = {}; const weakset = new WeakSet([obj1]); console.log(weakset.has(obj1)); // true console.log(weakset.has(obj2)); // false
To remove a value from a WeakSet, use the .delete() method. This method returns true if the value existed and has been removed, otherwise false. const obj1 = {}, obj2 = {}; const weakset = new WeakSet([obj1]); console.log(weakset.delete(obj1)); // true console.log(weakset.delete(obj2));...

Page 375 of 701