Tutorial by Examples: p

Aspx <asp:DataList runat="server" CssClass="sample" RepeatLayout="Flow" ID="dlsamplecontent" RepeatDirection="Vertical" OnItemCommand="dlsamplecontent_ItemCommand"> <ItemStyle CssClass="tdContainer" /> ...
There are very good configurations to force typings and get more helpful errors which are not activated by default. { "compilerOptions": { "alwaysStrict": true, // Parse in strict mode and emit "use strict" for each source file. // If you have wrong c...
Use the below command to check the replica set status. Command : rs.status() Connect any one of replica member and fire this command it will give the full state of the replica set Example : { "set" : "ReplicaName", "date" : ISODate("2016-09-26T07:3...
Sharding Group Members : For sharding there are three players. Config Server Replica Sets Mongos For a mongo shard we need to setup the above three servers. Config Server Setup : add the following to mongod conf file sharding: clusterRole: configsvr replication: replSe...
Sql Server 2016+ and Azure Sql database enables you to automatically filter rows that are returned in select statement using some predicate. This feature is called Row-level security. First, you need a table-valued function that contains some predicate that describes what it the condition that will...
Security policy is a group of predicates associated to tables that can be managed together. You can add, or remove predicates or turn on/off entire policy. You can add more predicates on tables in the existing security policy. ALTER SECURITY POLICY dbo.CompanyAccessPolicy ADD FILTER PREDICATE...
Row-level security enables you to define some predicates that will control who could update rows in the table. First you need to define some table-value function that represents predicate that wll control access policy. CREATE FUNCTION dbo.pUserCanAccessProduct(@CompanyID int) RETURNS TABLE WIT...
The point about temporary tables is that they're limited to the scope of the connection. Dapper will automatically open and close a connection if it's not already opened. That means that any temp table will be lost directly after creating it, if the connection passed to Dapper has not been opened. ...
Access the RecyclerView in the NavigationView and add ItemDecoration to it. NavigationView navigationView = (NavigationView) findViewById(R.id.nav_view); NavigationMenuView navMenuView = (NavigationMenuView) navigationView.getChildAt(0); navMenuView.addItemDecoration(new DividerItemDecoration(thi...
Create a new SSDT project Import 3rd party DB Build project to create a dacpac Reference dacpac in other projects
Google Apps Script is a JavaScript based platform-as-a-service primarily used to automate and extend Google Apps. Apps Script runs exclusively on Google's infrastructure requiring no server provisioning or configuration. An online IDE serves as the interface to the entire platform connecting all the...
Detailed instructions on getting mips set up or installed.
Go to the repository you want to clone (something like: https://github.com/username/repo) On the right, click on the green button named clone or download A small window will appear, copy the url (something like: https://github.com/username/repo.git) Open a terminal window on...
You can add partial mask on the column that will show few characters from te beginning and the end of the string and show mask instead of the characters in the middle: ALTER TABLE Company ALTER COLUMN Phone ADD MASKED WITH (FUNCTION = 'partial(5,"XXXXXXX",2)') In the parameters of th...
download QtSpim from here 32.6 MB install it easy installation make your first assembly file (.s) or use the sample C:\Program Files (x86)\QtSpim\helloworld.s run the program from the desktop shortcut or C:\Program Files (x86)\QtSpim\QtSpim.exe there are two windows for the program the main ...
Password Based Key Derivation can be used both for deriving an encryption key from password text and saving a password for authentication purposes. There are several hash algorithms that can be used including SHA1, SHA256, SHA512 which are provided by this example code. The rounds parameter is use...
See Swift 3 example for usage information and notes func pbkdf2SHA1(password: String, salt: [UInt8], keyCount: Int, rounds: Int) -> [UInt8]? { return pbkdf2(CCPBKDFAlgorithm(kCCPRFHmacAlgSHA1), password:password, salt:salt, keyCount:keyCount, rounds:UInt32(rounds)) } func pbkdf2SHA256(p...
#include <linux/init.h> #include <linux/module.h> /** * This function is called when the module is first loaded. */ static int __init hello_kernel_init(void) { printk("Hello, World!\n"); return 0; } /** * This function is called when is called if a...
We initialize the data we want to interpolate: x = 0:0.5:10; y = sin(x/2); This means the underlying function for the data in the interval [0,10] is sinusoidal. Now the coefficients of the approximating polynómials are being calculated: p1 = polyfit(x,y,1); p2 = polyfit(x,y,2); p3 = polyfit(...
Func<int, int> add1 = i => i + 1; Func<int, int, int> add = (i, j) => i + j; // Behaviourally equivalent to: int Add1(int i) { return i + 1; } int Add(int i, int j) { return i + j; } ... Console.WriteLine(add1(42)); //43 Console.WriteLine(Add1(42));...

Page 471 of 691