Tutorial by Examples: p

GNU make This pairmap function takes three arguments: A function name First space-separated list Second space-separated list For each zipped tuple in the lists it will call the function with the following arguments: Tuple element from the first list Tuple element from the second list ...
The pandas.DataFrame.apply() method is used to apply a given function to an entire DataFrame --- for example, computing the square root of every entry of a given DataFrame or summing across each row of a DataFrame to return a Series. The below is a basic example of usage of this function: # create...
The iv is prefixed to the encrypted data aesCBC128Encrypt will create a random IV and prefixed to the encrypted code. aesCBC128Decrypt will use the prefixed IV during decryption. Inputs are the data and key are Data objects. If an encoded form such as Base64 if required convert to and/or from in ...
You should have a plain CMake project myproject, and we are going to make an Eclipse workspace outside of it: myproject/ .git/ CMakeLists.txt src/ main.cpp workspace/ myproject/ Release/ Debug/ Qt (optional) Get latest Eclipse ...
A very handy way to subset Time Series is to use partial string indexing. It permits to select range of dates with a clear syntax. Getting Data We are using the dataset in the Creating Time Series example Displaying head and tail to see the boundaries se.head(2).append(se.tail(2)) # 2016-09-2...
The following is the list of all the data structures supported by Redis: Binary-safe strings Lists: collections of string elements sorted according to the order of insertion. Sets: collections of unique, unsorted string elements. Sorted sets: similar to Sets but where every string element is a...
We will present some examples to show how to apply happens-before reasoning to check that writes are visible to subsequent reads. Single-threaded code As you would expect, writes are always visible to subsequent reads in a single-threaded program. public class SingleThreadExample { public in...
A CSV file itself requires no installation as it is just a plain text file, usually with .csv extension. A CSV file usually contains records. Each line represents one record and is separated by a delimiter, most commonly a comma; but semicolons and tabs are also frequently used. Each line should ha...
If you have an elixir file; a script or a module and want to load it into the current IEx session, you can use the c/1 method: iex(1)> c "lib/utils.ex" iex(2)> Utils.some_method This will compile and load the module in IEx, and you'll be able to call all of it's public methods. ...
React.js builds You can pick which React.js build (development, production, with or without add-ons) to serve in each environment by adding a config. Here are the defaults: # config/environments/development.rb MyApp::Application.configure do config.react.variant = :development end # conf...
Here is the JSON File we will be using called animals.json { "Sea Animals": [ { "name": "Fish", "question": "How many species of fish are there?" }, { "name": "Sharks", ...
What is Profiling? By definition Profiling is a form of dynamic program analysis that measures, for example, the space (memory) or time complexity of a program, the usage of particular instructions, or the frequency and duration of function calls. Why is it necessary? Profiling is important becau...
It is not a good idea to expose Option types to C# code, as C# does not have a way to handle them. The options are either to introduce FSharp.Core as a dependency in your C# project (which is what you'd have to do if you're consuming an F# library not designed for interop with C#), or to change None...
// If you find yourself doing something like this... function fieldChanged(type, name, index) { if (name == 'salesrep') { var salesRepId = nlapiGetFieldValue('salesrep'); var salesRepEmail = nlapiLookupField('employee', salesRepId, 'email'); nlapiSetFieldValue('custb...
The iv is prefixed to the encrypted data aesCBC128Encrypt will create a random IV and prefixed to the encrypted code. aesCBC128Decrypt will use the prefixed IV during decryption. Inputs are the data and key are Data objects. If an encoded form such as Base64 if required convert to and/or from in ...
PHP has no support for running code concurrently unless you install extensions such as pthread. This can be sometimes bypassed by using proc_open() and stream_set_blocking() and reading their output asynchronously. If we split code into smaller chunks we can run it as multiple suprocesses. Then usi...
CALL is also a way to extend COBOL functionality, and also to allow the reusability of code. It can also give access to "system" functionality. This example illustrates ways to provide "sleep" functionality to IBM Mainframe COBOLs. Bear in mind that the requirement to do so is r...
OS: Mac OS X 10.11 (Should work on Windows / Linux since we are using Vagrant) Vagrant 1.8.4 Installed Directory Structure on Host OS (Mac OS): /path/to/project /provision /packages Note: If you use different vesions, be sure to update Variables at top of provision.sh script b...
This Example assumes you setup as explained in Example: Setting Up Environment for aurelia-cli Explained of this document. Creating a new project In main host os, open terminal (Mac OS in my case) $cd /path/to/project/vagrant $vagrant up (Launches VM GUI) Log into VM via UI U...
Environment This Example assumes you setup as explained in Example: Setting Up Environment for Aurelia-cli Explained of this document. Summary of setup: On Mac OS X with Vagrant 1.8.4 $cd /path/to/project/vagrant $vagrant up Log into VM via UI as User:vagrant / PW:vagrant $cd /home/vagrant/...

Page 470 of 691