Tutorial by Topics: d

Linq queries are written using the Standard Query Operators (which are a set of extension methods that operates mainly on objects of type IEnumerable<T> and IQueryable<T>) or using Query Expressions (which at compile time, are converted to Standard Query Operator method calls). Query ...
Usage: rails generate GENERATOR_NAME [args] [options]. Use rails generate to list available generators. Alias: rails g. ParameterDetails-h/--helpGet help on any generator command-p/--pretendPretend Mode: Run generator but will not create or change any filesfield:type'field-name' is the name of...
This section provides an overview of what cmd is, and why a developer might want to use it. It should also mention any large subjects within cmd, and link out to the related topics. Since the Documentation for cmd is new, you may need to create initial versions of those related topics.
This section provides an overview of what ssis is, and why a developer might want to use it. It should also mention any large subjects within ssis, and link out to the related topics. Since the Documentation for ssis is new, you may need to create initial versions of those related topics.
Setup Download and install Atmel Studio 7 from here. Purchase a debugger. You can get by with a ISP programmer, but if you want debugging capabilities, which is one of the big advantages of using Atmel Studio, you will want a debugger. I recommend the Atmel ICE, as it provides debugging ca...
Each thread will have its own last error code. The Windows API will set the last error code on the calling thread. You should always call the GetLastError function immediately after checking a Windows API function's return value. The majority of Windows API functions set the last error code whe...
In HTTP, status codes are a machine-readable mechanism indicating the result of a previously issued request. From RFC 7231, sec. 6: "The status-code element is a three-digit integer code giving the result of the attempt to understand and satisfy the request." The formal grammar allows cod...
PLSQL procedure is a group of SQL statements stored on the server for reuse. It increases the performance because the SQL statements do not have to be recompiled every time it is executed. Stored procedures are useful when same code is required by multiple applications. Having stored procedures eli...
The DOM, or Document Object Model, is the API used by web browsers and other applications to access the contents of an HTML document. The DOM represents the structure as a tree, nodes can contain child-nodes, nodes with no children are said leaf nodes. With it, one can manipulate the structure a...
Haxe is an open source toolkit that is capable of compiling to many different target languages and platforms. It consists of: the Haxe programming language - a modern, high-level, and strictly typed programming language the Haxe standard library - a collection of general purpose, system, and ...
ValueMeaningnegativeelement will be focusable, but it should not be reachable via sequential keyboard navigation0element will be focusable and reachable through keyboard sequential navigation, but it's relative order is defined by the platform conventionpositiveelement must be focusable and accessi...
// +build tags Build tags are used for conditionally building certain files in your code. Build tags may ignore files that you don't want build unless explicitly included, or some predefined build tags may be used to have a file only be built on a particular architecture or operating system...
This is an implementation of the Core Data Stack which is initially placed in the AppDelegate file if the project is created with Core Data when project is created. These functions can also implemented in separate class for CoreDataStack.swift. One of the major functions is to get the NSManagedObj...
Python, being one of the most popular languages in computer and network security, has great potential in security and cryptography. This topic deals with the cryptographic features and implementations in Python from its uses in computer and network security to hashing and encryption/decryption algor...
Browsers, as they have evolved, offered more features to Javascript. But often these features are not available in all browsers. Sometimes they may be available in one browser, but yet to be released on other browsers. Other times, these features are implemented differently by different browsers. Br...

Page 50 of 221