Tutorial by Topics: en

The documentation for the DateTime::UniversalTime states: "A 64-bit signed integer that represents a point in time as the number of 100-nanosecond intervals prior to or after midnight on January 1, 1601 (according to the Gregorian Calendar)." This is the same as the Win32 FILETIMEstruct ...
When publishing a customization project, you might see some item being skipped for the reason of being already applied. Ex: EntityEndpoint EntityEndpoint#6.00.001§DefaultPlus(skipped, already applied) This can happen for any items contained saved in the database. Ex: Generic inquiries, reports, s...
Whilst most of the Blender source code is written in C and C++, Extensions (Add-ons) are coded entirely in Python. Blender comes with >90 extensions installed, but they are not all activated by default. Blender extensions are installed and activated through the User Preferences window (accessib...
Java EnumMap class is the specialized Map implementation for enum keys. It inherits Enum and AbstractMap classes. the Parameters for java.util.EnumMap class. K: It is the type of keys maintained by this map. V: It is the type of mapped values.
Java EnumSet class is the specialized Set implementation for use with enum types. It inherits AbstractSet class and implements the Set interface.
In Mac OS X, you can set the environment variables in one of the following files : ~/.bashrc ~/.bash_profile ~/.profile By default, Mac OS X does not has above files, you need to create it manually.
This topic is about enhancing an AlertDialog with additional features.
This topic introduces some of the underlying core mechanics of parallel computing which are needed to fully understand and utilize OpenCL.
Before utilizing OpenCL, one has to set up their code to use it. This topic focuses on how to get opencl up and running in your project and execute a basic kernel. The examples are based on the C# wrapper OpenCL.NET but as the wrapper adds no abstraction to OpenCL the code will probably run with ver...
Modern cryptography operates on bytes, not text, so the output of cryptograhic algorithms is bytes. Sometimes encrypted data must be transferred via a text medium, and a binary-safe encoding must be used. ParameterDetailsTEText Encoding. The transformation from text to bytes. UTF-8 is a common ...
Fortran files come under a variety of extensions and each of them have a separate meaning. They specify the Fortran release version, code formatting style and the usage of preprocessor directives similar to C programming language.
Several android devices have custom buttons added by the manufacturer. This opens new possibilities for the developer in handling those buttons especially when making Apps targeted for Hardware Devices. This topic documents buttons which have intents attached to them which you can listen for via in...
There are a number of exceptions that can be thrown while using a webdriver. The examples below are meant to give an idea of what they mean.
In order to use the pipe in a user-created package, it must be listed in the NAMESPACE like any other function you choose to import.
The java.util.StringTokenizer class allows you to break a string into tokens. It is simple way to break string. The set of delimiters (the characters that separate tokens) may be specified either at creation time or on a per-token basis.
The GNU C compiler comes with some cool features that are not specified by the C standards. These extensions are heavily used in system software and are a great tool for performance optimization.
I switched to Selenium 3 and started using Chrome instead of Firefox. I discovered that for Chrome I need to download a binary for WebDriver to handle the browser. For that to work I need to set absolute path to this binary as Java variable. If binary gets updated, I need to update that binary manua...
This document provides a high level overview and explains the whole architecture of Azure AD Authentication Process for Node.js (MOBILE TOOL) It is explains technical component and its interaction between mobile App, Web-API, Document DB and Azure Active Directory. Finally, how mobile user will be a...

Page 62 of 66