Tutorial by Topics: d

Cryptography is used for security purposes. There are not so many examples of Encryption/Decryption in Python using IDEA encryption MODE CTR. Aim of this documentation : Extend and implement of the RSA Digital Signature scheme in station-to-station communication. Using Hashing for integrity of mess...
Keeping your code clean and organized while developing a large Rails application can be quite a challenge, even for an experienced developer. Fortunately, there is a whole category of gems that make this job much easier.
Note, the icons used at the end of the Opening Files and Directories example are not part of Atom's standard styling, but are the result of the file-icons styling package.
Sometimes we need to build QtWebEngine from source for some reason, such as for mp3 support.
IO.inspect is very useful when you try to debug your chains of method calling. It can get messy though if you use it too often. Since Elixir 1.4.0 the label option of IO.inspect can help Only works with Elixir 1.4+, but I can't tag that yet.
This section provides an overview of what ssrs-2008 is, and why a developer might want to use it. It should also mention any large subjects within ssrs-2008, and link out to the related topics. Since the Documentation for ssrs-2008 is new, you may need to create initial versions of those relate...
This section provides an overview of what installshield is, and why a developer might want to use it. It should also mention any large subjects within installshield, and link out to the related topics. Since the Documentation for installshield is new, you may need to create initial versions of ...
Starting with PowerShell version 5.0, you can use PowerShell class definitions to create Desired State Configuration (DSC) Resources. To aid in building DSC Resource, there's a [DscResource()] attribute that's applied to the class definition, and a [DscProperty()] resource to designate properties a...
Starting with PowerShell version 2.0, developers can create PowerShell modules. PowerShell modules encapsulate a set of common functionality. For example, there are vendor-specific PowerShell modules that manage various cloud services. There are also generic PowerShell modules that interact with soc...
We may use QML to build hybrid applications, since it's much more easier than C++. So we should know how they communicate with each other.
How to validade user inputs. Validation constrains the values a user can input into a cell, and/or set a combobox for the user select the value for the cell. Optionally, a message can be displayed when the user clicks in a cell and a message error, when the validation fails.
AppDelegate is a protocol which defines methods that are called by the singleton UIApplication object in response to important events in the lifetime of an app. Normally used to perform tasks on application startup (setup app environment, analitycs (ex.: Mixpanel/GoogleAnalytics/Crashlitics), DB st...
Stop words are the words which are mostly used as fillers and hardly have any useful meaning. We should avoid these words from taking up space in database or taking up valuable processing time. We can easily make a list of words to be used as stop words and then filter these words from the data we w...
Strict Mode is a special class introduced in Android 2.3 for debugging. This developer tools detect things done accidentally and bring them to our attention so that we can fix them. It is most commonly used to catch the accidental disk or network access on the applications’ main thread, where UI ope...
This topic illustrates how to exploit Functional Programming in a WPF application. The first example comes from a post by Māris Krivtežs (ref Remarks section at the bottom). The reason for revisiting this project is twofold: 1\ The design supports separation of concerns, while the model is kept pur...
This section provides an overview of what apache-spark-sql is, and why a developer might want to use it. It should also mention any large subjects within apache-spark-sql, and link out to the related topics. Since the Documentation for apache-spark-sql is new, you may need to create initial ver...
The cut command is a fast way to extract parts of lines of text files. It belongs to the oldest Unix commands. Its most popular implementations are the GNU version found on Linux and the FreeBSD version found on MacOS, but each flavor of Unix has its own. See below for differences. The input lines a...
This topic contains information about working with columns and rows, like resizing, hiding, autofit

Page 170 of 221