Tutorial by Examples: ti

The keyword function can be used to initiate pattern-matching on the the last argument of a function. For example, we can write a function called sum, which computes the sum of a list of integers, this way let rec sum = function | [] -> 0 | h::t -> h + sum t ;; val sum : int list -&...
Drop/Delete your database If you are using SQLite for your database, just delete this file. If you are using MySQL/Postgres or any other database system, you will have to drop the database and then recreate a fresh database. You will now need to delete all the migrations file except "init.py...
For this example, we will used 4 bodies and will show only the last 8 bits of the bit masks for simplicity. The 4 bodies are 3 SKSpriteNodes, each with a physics body and a boundary: let edge = frame.insetBy(dx: 0, dy: 0) physicsBody = SKPhysicsBody(edgeLoopFrom: edge) Note that the 'ed...
If you have an Arduino connected to a computer or a Raspberry Pi, and want to send data from the Arduino to the PC you can do the following: Arduino: void setup() { // Opens serial port, sets data rate to 9600 bps: Serial.begin(9600); } void loop() { // Sends a line over serial: Se...
You can include/install Select2 in one of the two ways Directly using CDN's in your project under the head section of your project. link href="https://cdnjs.cloudflare.com/ajax/libs/select2/4.0.3/css/select2.min.css" rel="stylesheet"/> <script src="https://cdnjs...
The basic unit of code used by JShell is the snippet, or source entry. Every time you declare a local variable or define a local method or class, you create a snippet whose name is the identifier of the variable/method/class. At any time, you can edit a snippet you have created with the /edit comman...
1) IP based vhosts <VirtualHost 192.168.13.37> ServerName example.com DocumentRoot /var/www/domains/example.com/html ErrorLog /var/log/example.com/error.log CustomLog /var/log/example.com/access.log common </VirtualHost> <VirtualHost 192.168.47.11> ...
Redis allow you to use the String data type to store floating point numbers. A user can set the float value of a key using the command: SET floatkey 2.0 The set command will create the key if necessary or update it if it already exists. The value of the key can be updated on the server using e...
In the JNDI declaration you may want to encrypt the username and password. You have to implement a custom datasource factory in order to be able to decrypt the credentials. In server.xml replace factory="org.apache.tomcat.jdbc.pool.DataSourceFactory" by factory="cypher.MyCustomDataS...
Interceptors are a good tool for implementing cross-cutting concerns such as logging or authentication. Let's say we have a following service: public interface IService { string CreateOrder(NetworkCredential credentials, Order orderToCreate); string DeleteOrder(NetworkCredential credenti...
Providing your microsoft account credentials you can authenticate and receive subscription keys to start with the services. This document describes the various flows in the tool to create your own knowledge base. QnA Maker works in three steps: extraction, training and publishing. To start, feed ...
To create a customization plugin, you simply create a class derived from CustomizationPlug and package it into customization. While the system is publishing customization project, it will execute the OnPublished and UpdateDatabase methods implemented in your customization plugin only within the curr...
The code will work on Windows and Linux. It runs on .NET Core or .NET Standard. The only difference is that, if you wish to run on .NET Core, you should use project.json. If you wish to run on .NET Standard, you should use packages.config. The API Client Library for Cloud Resource Manager API is a...
I won't repeat it all here: "Application Default Credentials provide a simple way to get authorization credentials for use calling Google APIs." If you can use Application Default Credentials, do. There is an extra step you will need to perform the before first using Application Default ...
Detailed instructions on getting enterprise-architect set up or installed.
Interstitial ads are full-screen ads that cover the interface of their host app. They're typically displayed at natural transition points in the flow of an app, such as between activities or during the pause between levels in a game. Make sure you have necessary permissions in your Manifest file: ...
The @Lazy allow us to instruct the IOC container to delay the initialization of a bean. By default, beans are instantiated as soon as the IOC container is created, The @Lazy allow us to change this instantiation process. lazy-init in spring is the attribute of bean tag. The values of lazy-init are...
<# .SYNOPSIS Gets the content of an INI file. .DESCRIPTION Gets the content of an INI file and returns it as a hashtable. .INPUTS System.String .OUTPUTS System.Collections.Hashtable .PARAMETER FilePath Specifies the path to the input INI file. .EXAMPLE ...
So what we will try to do is to compile a following function int sum(int a, int b) { return a + b + 2; } on the fly. And here's the entire .cpp example: #include <iostream> #include "llvm/IR/LLVMContext.h" #include "llvm/IR/Module.h" #include "llvm/IR/I...
A signal which type is resolved has an associated resolution function. It can be driven by more than one VHDL process. The resolution function is called to compute the resulting value whenever a driver assigns a new value. A resolution function is a pure function that takes one parameter and return...

Page 450 of 505