Tutorial by Topics: are

The layouts are a necessary in every Qt application. They manage the object, their position, their size, how they are resized. From Qt layout documentation: When you use a layout, you do not need to pass a parent when constructing the child widgets. The layout will automatically reparent ...
A regular expression is a powerful way of specifying a pattern for a complex search.
For some time I've searched for the best way to log requests and response in an ASP.Net Core. I was developing services and one of the requirements was to record request with its response in one record the the database. So many topics out there but none worked for me. it's either for request only, r...
How to configure a ReplicaSet to support TLS/SSL? We will deploy a 3 Nodes ReplicaSet in your local environment and we will use a self-signed certificate. Do not use a self-signed certificate in PRODUCTION. How to connect your Client to this ReplicaSet? We will connect a Mongo Shell. A descripti...
Accessing network share file using PInvoke.
This section provides an overview of what sharedpreferences is, and why a developer might want to use it. It should also mention any large subjects within sharedpreferences, and link out to the related topics. Since the Documentation for sharedpreferences is new, you may need to create initial ...
The standard Maven plugin used by a Release Process is the maven-release-plugin – the configuration for this plugin is minimal: SCM in the Maven pom:The Release process will interact with the Source Control of the project – this means we need to define the "scm" element in our pom.xml.The...
This document introduces the basics of regular expressions as used in R. For more information about R's regular expression syntax, see ?regex. For a comprehensive list of regular expression operators, see this ICU guide on regular expressions.
InlineDescription$numberSubstitutes the substring matched by group number.${name}Substitutes the substring matched by a named group name.$$Escaped '$' character in the result (replacement) string.$& ($0)Replaces with the whole matched string.$+ ($&)Substitutes the matched text to the last...
SharePoint Hosted App Reference required from site: http://www.letsharepoint.com/what-is-user-information-list-in-sharepoint-2013/
Shared Preferences are key-value based XML files. It is located under /data/data/package_name/shared_prefs/<filename.xml>. So a user with root privileges can navigate to this location and can change its values. If you want to protect values in your shared preferences, you can write a simple e...
Shared Preferences are key-value based XML files. It is located under /data/data/package_name/shared_prefs/<filename.xml>. So a user with root privileges can navigate to this location and can change its values. If you want to protect values in your shared preferences, you can write a simple e...
Check sample input and output below.
Two string with same set of character is called anagram. I have used javascript here. We will create an hash of str1 and increase count +1. We will loop on 2nd string and check all characters are there in hash and decrease value of hash key. Check all value of hash key are zero will be anagram. ...
The java.lang.Class class provides many methods that can be used to get metadata, examine and change the run time behavior of a class. The java.lang and java.lang.reflect packages provide classes for java reflection. Where it is used The Reflection API is mainly used in: IDE (Integrated Developm...
This topic introduces some of the underlying core mechanics of parallel computing which are needed to fully understand and utilize OpenCL.
Fortran files come under a variety of extensions and each of them have a separate meaning. They specify the Fortran release version, code formatting style and the usage of preprocessor directives similar to C programming language.
Several android devices have custom buttons added by the manufacturer. This opens new possibilities for the developer in handling those buttons especially when making Apps targeted for Hardware Devices. This topic documents buttons which have intents attached to them which you can listen for via in...
This documentation explains how an external Image can be tested and compared with the output image of OpenCV. For example, To compare two blurred images and test if they both are same, we blur an original image in an external software (I used WiT Image Processing software) or just download any blurr...
This technique divides input data into data classes to reduce test cases amount to validate a rule. The idea is that given a set of possible equivalent values, using just one of those values will be enough to design a test case. An advantage of this approach is reduction in the time required for...

Page 5 of 6