Tutorial by Examples: d

The following is the list of all the data structures supported by Redis: Binary-safe strings Lists: collections of string elements sorted according to the order of insertion. Sets: collections of unique, unsorted string elements. Sorted sets: similar to Sets but where every string element is a...
When you need to find the bounding rectangle of a quadratic bezier curve you can use the following performant method. // This method was discovered by Blindman67 and solves by first normalising the control point thereby reducing the algorithm complexity // x1,y1, x2,y2, x3,y3 Start, Control, and ...
We will present some examples to show how to apply happens-before reasoning to check that writes are visible to subsequent reads. Single-threaded code As you would expect, writes are always visible to subsequent reads in a single-threaded program. public class SingleThreadExample { public in...
If you have an elixir file; a script or a module and want to load it into the current IEx session, you can use the c/1 method: iex(1)> c "lib/utils.ex" iex(2)> Utils.some_method This will compile and load the module in IEx, and you'll be able to call all of it's public methods. ...
react-rails includes a view helper (react_component) and an unobtrusive JavaScript driver (react_ujs) which work together to put React components on the page. You should require the UJS driver in your manifest after react (and after turbolinks if you use Turbolinks). The view helper puts a div on t...
// If you find yourself doing something like this... function fieldChanged(type, name, index) { if (name == 'salesrep') { var salesRepId = nlapiGetFieldValue('salesrep'); var salesRepEmail = nlapiLookupField('employee', salesRepId, 'email'); nlapiSetFieldValue('custb...
The iv is prefixed to the encrypted data aesCBC128Encrypt will create a random IV and prefixed to the encrypted code. aesCBC128Decrypt will use the prefixed IV during decryption. Inputs are the data and key are Data objects. If an encoded form such as Base64 if required convert to and/or from in ...
It is a basic human instinct to assess risk and to accept or take some kind of action on that risk. This is the essence of security, which is the body of knowledge that provides a framework around this instinct. Security defines three key concepts in a triangular paradigm - Confidentiality, Integri...
OS: Mac OS X 10.11 (Should work on Windows / Linux since we are using Vagrant) Vagrant 1.8.4 Installed Directory Structure on Host OS (Mac OS): /path/to/project /provision /packages Note: If you use different vesions, be sure to update Variables at top of provision.sh script b...
This Example assumes you setup as explained in Example: Setting Up Environment for aurelia-cli Explained of this document. Creating a new project In main host os, open terminal (Mac OS in my case) $cd /path/to/project/vagrant $vagrant up (Launches VM GUI) Log into VM via UI U...
Aspx <asp:DataList runat="server" CssClass="sample" RepeatLayout="Flow" ID="dlsamplecontent" RepeatDirection="Vertical" OnItemCommand="dlsamplecontent_ItemCommand"> <ItemStyle CssClass="tdContainer" /> ...
// Must enable the feature to use associated constants #![feature(associated_consts)] use std::mem; // Associated constants can be used to add constant attributes to types trait Foo { const ID: i32; } // All implementations of Foo must define associated constants // unless a defaul...
Use the below command to check the replica set status. Command : rs.status() Connect any one of replica member and fire this command it will give the full state of the replica set Example : { "set" : "ReplicaName", "date" : ISODate("2016-09-26T07:3...
Sharding Group Members : For sharding there are three players. Config Server Replica Sets Mongos For a mongo shard we need to setup the above three servers. Config Server Setup : add the following to mongod conf file sharding: clusterRole: configsvr replication: replSe...
Sql Server 2016+ and Azure Sql database enables you to automatically filter rows that are returned in select statement using some predicate. This feature is called Row-level security. First, you need a table-valued function that contains some predicate that describes what it the condition that will...
Row-level security enables you to define some predicates that will control who could update rows in the table. First you need to define some table-value function that represents predicate that wll control access policy. CREATE FUNCTION dbo.pUserCanAccessProduct(@CompanyID int) RETURNS TABLE WIT...
Every good IDE provides a GUI for interactively debugging Ruby (and thus Rails) applications where you can add breakpoints, watches, auto pausing on exception and allows you to follow the code execution even step by step, line by line. For example, take a look at one of the best Ruby IDE's, RubyMin...
Automatic calculation of low and high thresholds for the Canny operation in opencv
Access the RecyclerView in the NavigationView and add ItemDecoration to it. NavigationView navigationView = (NavigationView) findViewById(R.id.nav_view); NavigationMenuView navMenuView = (NavigationMenuView) navigationView.getChildAt(0); navMenuView.addItemDecoration(new DividerItemDecoration(thi...
Create a new SSDT project Import 3rd party DB Build project to create a dacpac Reference dacpac in other projects

Page 486 of 691