Tutorial by Examples: t

// If you find yourself doing something like this... function fieldChanged(type, name, index) { if (name == 'salesrep') { var salesRepId = nlapiGetFieldValue('salesrep'); var salesRepEmail = nlapiLookupField('employee', salesRepId, 'email'); nlapiSetFieldValue('custb...
Package Control - Download/Install this plugin to install and manage all your other plugins in sublime. Git - Keeps track of your git versioning system. Also enables you to execute some git commands from ST itself. GitGutter - With GitGutter, you can see which lines have been added, deleted or m...
The iv is prefixed to the encrypted data aesCBC128Encrypt will create a random IV and prefixed to the encrypted code. aesCBC128Decrypt will use the prefixed IV during decryption. Inputs are the data and key are Data objects. If an encoded form such as Base64 if required convert to and/or from in ...
PHP has no support for running code concurrently unless you install extensions such as pthread. This can be sometimes bypassed by using proc_open() and stream_set_blocking() and reading their output asynchronously. If we split code into smaller chunks we can run it as multiple suprocesses. Then usi...
It is a basic human instinct to assess risk and to accept or take some kind of action on that risk. This is the essence of security, which is the body of knowledge that provides a framework around this instinct. Security defines three key concepts in a triangular paradigm - Confidentiality, Integri...
CALL is also a way to extend COBOL functionality, and also to allow the reusability of code. It can also give access to "system" functionality. This example illustrates ways to provide "sleep" functionality to IBM Mainframe COBOLs. Bear in mind that the requirement to do so is r...
IDENTIFICATION DIVISION. PROGRAM-ID. STRINGVAL. ENVIRONMENT DIVISION. DATA DIVISION. WORKING-STORAGE SECTION. 01 WORK-AREAS. 05 I-STRING PIC X(08) VALUE 'STRNGVAL'. 05 O-STRING PIC XBXBXBXBXBXBXBX. 88 O-STRING-IS-EMPTY VALU...
OS: Mac OS X 10.11 (Should work on Windows / Linux since we are using Vagrant) Vagrant 1.8.4 Installed Directory Structure on Host OS (Mac OS): /path/to/project /provision /packages Note: If you use different vesions, be sure to update Variables at top of provision.sh script b...
Environment This Example assumes you setup as explained in Example: Setting Up Environment for Aurelia-cli Explained of this document. Summary of setup: On Mac OS X with Vagrant 1.8.4 $cd /path/to/project/vagrant $vagrant up Log into VM via UI as User:vagrant / PW:vagrant $cd /home/vagrant/...
Aspx <asp:DataList runat="server" CssClass="sample" RepeatLayout="Flow" ID="dlsamplecontent" RepeatDirection="Vertical" OnItemCommand="dlsamplecontent_ItemCommand"> <ItemStyle CssClass="tdContainer" /> ...
// Must enable the feature to use associated constants #![feature(associated_consts)] use std::mem; // Associated constants can be used to add constant attributes to types trait Foo { const ID: i32; } // All implementations of Foo must define associated constants // unless a defaul...
There are very good configurations to force typings and get more helpful errors which are not activated by default. { "compilerOptions": { "alwaysStrict": true, // Parse in strict mode and emit "use strict" for each source file. // If you have wrong c...
Use the below command to check the replica set status. Command : rs.status() Connect any one of replica member and fire this command it will give the full state of the replica set Example : { "set" : "ReplicaName", "date" : ISODate("2016-09-26T07:3...
Sharding Group Members : For sharding there are three players. Config Server Replica Sets Mongos For a mongo shard we need to setup the above three servers. Config Server Setup : add the following to mongod conf file sharding: clusterRole: configsvr replication: replSe...
Sql Server 2016+ and Azure Sql database enables you to automatically filter rows that are returned in select statement using some predicate. This feature is called Row-level security. First, you need a table-valued function that contains some predicate that describes what it the condition that will...
Security policy is a group of predicates associated to tables that can be managed together. You can add, or remove predicates or turn on/off entire policy. You can add more predicates on tables in the existing security policy. ALTER SECURITY POLICY dbo.CompanyAccessPolicy ADD FILTER PREDICATE...
Row-level security enables you to define some predicates that will control who could update rows in the table. First you need to define some table-value function that represents predicate that wll control access policy. CREATE FUNCTION dbo.pUserCanAccessProduct(@CompanyID int) RETURNS TABLE WIT...
The point about temporary tables is that they're limited to the scope of the connection. Dapper will automatically open and close a connection if it's not already opened. That means that any temp table will be lost directly after creating it, if the connection passed to Dapper has not been opened. ...
Automatic calculation of low and high thresholds for the Canny operation in opencv
In this example, we will log into the GitHub website by using the FormElement class. // # Constants used in this example final String USER_AGENT = "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.103 Safari/537.36"; final String LOGIN_FORM_U...

Page 802 of 1132