Tutorial by Topics: at

An XPath location path is a series of location steps separated by a / character: step1/step2/step3 A location step contains an axis, a node test, and an optional list of predicates. The axis and the node test are separated by two colon characters ::. The predicates are enclosed in square brac...
Null Object is an object with no referenced value or with defined neutral behaviour. Its purpose is to remove the need of null pointer/reference check.
RequiredFieldValidator Control: <asp:RequiredFieldValidator ID="rfvcandidate" runat="server" ControlToValidate ="ddlcandidate" ErrorMessage="Please choose a candidate" InitialValue="Please choose a candidate"> </asp:RequiredFieldVal...
As a side note, a few advantages of the Monostate pattern over the Singleton: There is no 'instance` method to be able to access an instance of the class. A Singleton does not conform to the Java beans notation, but a Monostate does. Lifetime of instances can be controlled. Users of the Mono...
It became much easier to create custom controls in Interface Builder with the introduction of the @IBDesignable and @IBInspectable directives in Swift. Developers can now build rich, complex, fully animated controls using just a few extra lines of code. I'm surprised by how many developers have ye...
Spring Boot makes it easy to create Spring-powered, production-grade applications and services with absolute minimum fuss. It favors convention over configuration. Spring Data JPA, part of the larger Spring Data family, makes it easy to implement JPA based repositories. It makes it easier to build ...
Constructing a list of write operations to perform in bulk for a single collection.
Downloading Go Visit the Downloads List and find the right archive for your operating system. The names of these downloads can be a bit cryptic to new users. The names are in the format go[version].[operating system]-[architecture].[archive] For the version, you want to choose the newest avai...
There are several reason to invalidate a JWT token before its expiration time: account deleted/blocked/suspended, password or permissions changed, user logged out by admin. JWT is self-contained, signed and stored outside of the server context, so revoking a token is not a simple action.

Page 54 of 102