Tutorial by Topics: x

This is a small code (xml) snippet to highlight how to use the taglist-maven-plugin to generate customized reports (of TODO, FIXME work ...)
With the datatables plugin you can add export buttons to your table. You can export your table data to excel, pdf or copy it to the clipboard. This manual is intended for the bootstrap 4 framework.
Modern cryptography operates on bytes, not text, so the output of cryptograhic algorithms is bytes. Sometimes encrypted data must be transferred via a text medium, and a binary-safe encoding must be used. ParameterDetailsTEText Encoding. The transformation from text to bytes. UTF-8 is a common ...
Let's try to implement the basic higher orders functions like map and reduce using Elixir
Overview Cross-Site Scripting, commonly referred to as XSS, is a type of web application injection attack in which malicious scripts are injected into trusted websites. XSS attacks occur when an attacker takes advantage of, or "exploits," a flaw in a web application to send the attack...
Fortran files come under a variety of extensions and each of them have a separate meaning. They specify the Fortran release version, code formatting style and the usage of preprocessor directives similar to C programming language.
This section provides an overview of what indexeddb is, and why a developer might want to use it. It should also mention any large subjects within indexeddb, and link out to the related topics. Since the Documentation for indexeddb is new, you may need to create initial versions of those relate...
PLY is a pure-Python implementation of the popular compiler construction tools lex and yacc. Additional links: Official docs Github
There are a number of exceptions that can be thrown while using a webdriver. The examples below are meant to give an idea of what they mean.
The GNU C compiler comes with some cool features that are not specified by the C standards. These extensions are heavily used in system software and are a great tool for performance optimization.
The X-Request-ID header can be used to trace individual requests to a web service (such as a REST API) from the client to the server and its backends. X-Request-ID: < value > A Client can send an HTTP header X-Request-ID: some-value. The server should use the provided value and pr...
There a number of ways to include environment variables into the docker application. Here are some examples:
Getting started guide using Sass exentsion Compass. Compass is very useful when dealing with CSS3 as it provides mixins to write 1 line in order to support every browser using CSS3 features. It is also great to include sprite images.
The point of this wiki is to show you how to execute integration tests using Apache Camel. More precisely, doing this you will be able to launch an existing route from beginning to end (With or without your real database) or intercept the exchange between each part of the route and test if your hea...
First, I have to say. There is a reason this Proxy thing, despite its seeming usefulness, is not highlighted enough on the Internet. You cannot use it to watch a random property of a random class/instance. You are only allowed to use this technique by subclassing the Proxy class. Some operations d...
If you are having issues with your Shiny apps, it is good practice to create an app that illustrates your point. This app should be as simple as possible while still reflecting your problem. This means using simple datasets, self-explanatory naming (especially for I/O IDs) and replacing plots with s...

Page 39 of 41