Tutorial by Topics: h

Lodash is a library of utilities for manipulating and examining objects and arrays. VersionRelease Datev0.1.02012-04-23v0.2.02012-05-21v0.2.12012-05-24v0.2.22012-05-30v0.3.02012-06-06v0.3.12012-06-10v0.3.22012-06-14v0.4.02012-07-11v0.4.12012-07-11v0.4.22012-07-16v0.5.02012-08-17v0.5.12012-08-1...
Angular Material is an UI component framework that allows you to produce single-page-application using a set of predefined components and directives. VersionRelease Date1.1.42017-04-201.1.32017-01-311.1.22017-01-051.1.12016-09-011.1.02016-08-141.1.0-rc52016-06-031.1.0-rc42016-04-151.1.0-rc2201...
Meteor.wrapAsync(func, [context]) ParametersDetailsfunc: FunctionAn asynchronous/synchronous function to be wrapped in a Fiber that takes a callback w/ parameters (error, result).context: Any (optional)A data context in which the function gets executed upon. An asynchronously wrapped funct...
.htaccess redirection is a common vector for malicious hackers to exploit and infect websites. We have seen what .htaccess files are, how they are used by malicious hackers, and how to protect your website.
methoddetailsSoftwareSerial.hDocumentationSoftwareSerial(rxPin, txPin, inverse_logic)Constructor. rxPin: Data in (receive) pin, defaults to 0. txPin: Data out (transmit) pin, defaults to 1. inverse_logic: If true, treats LOW as if it were HIGH and HIGH as LOW when determining bit values. defaults t...
This section provides an overview of what cmd is, and why a developer might want to use it. It should also mention any large subjects within cmd, and link out to the related topics. Since the Documentation for cmd is new, you may need to create initial versions of those related topics.
This section provides an overview of what ssis is, and why a developer might want to use it. It should also mention any large subjects within ssis, and link out to the related topics. Since the Documentation for ssis is new, you may need to create initial versions of those related topics.
Setup Download and install Atmel Studio 7 from here. Purchase a debugger. You can get by with a ISP programmer, but if you want debugging capabilities, which is one of the big advantages of using Atmel Studio, you will want a debugger. I recommend the Atmel ICE, as it provides debugging ca...
The core.match library implements a pattern match compilation algorithm that uses the notion of "necessity" from lazy pattern matching.
Each thread will have its own last error code. The Windows API will set the last error code on the calling thread. You should always call the GetLastError function immediately after checking a Windows API function's return value. The majority of Windows API functions set the last error code whe...
In HTTP, status codes are a machine-readable mechanism indicating the result of a previously issued request. From RFC 7231, sec. 6: "The status-code element is a three-digit integer code giving the result of the attempt to understand and satisfy the request." The formal grammar allows cod...
Kruskal's Algorithm is a greedy algorithm used to find Minimum Spanning Tree (MST) of a graph. A minimum spanning tree is a tree which connects all the vertices of the graph and has the minimum total edge weight. Kruskal's algorithm does so by repeatedly picking out edges with minimum weight (whi...
The DOM, or Document Object Model, is the API used by web browsers and other applications to access the contents of an HTML document. The DOM represents the structure as a tree, nodes can contain child-nodes, nodes with no children are said leaf nodes. With it, one can manipulate the structure a...
Haxe is an open source toolkit that is capable of compiling to many different target languages and platforms. It consists of: the Haxe programming language - a modern, high-level, and strictly typed programming language the Haxe standard library - a collection of general purpose, system, and ...
Python, being one of the most popular languages in computer and network security, has great potential in security and cryptography. This topic deals with the cryptographic features and implementations in Python from its uses in computer and network security to hashing and encryption/decryption algor...

Page 34 of 159