Tutorial by Topics: se

The search API allows you to execute a search query and get back search hits that match the query. The query can either be provided using a simple query string as a parameter, or using a request body.
.bash_profile, .bash_login, .bashrc, and .profile all do pretty much the same thing: set up and define functions, variables, and the sorts. The main difference is that .bashrc is called at the opening of a non-login but interactive window, and .bash_profile and the others are called for a login she...
A customization of the Android RangeSeekBar proposed by Alex Florescu at https://github.com/anothem/android-range-seek-bar It allows to define a step value (increment), when moving the seek bar 1- Add the increment attribute in attrs.xml <attr name="increment" format="integ...
Sometimes you want to ignore some of the test cases you have in Junit. For instance, they are partially done and you want to come back to them later.
From Adminer management tool it's has export to csv file option for mysql database But not available for postgresql database. Here I will show the command to export CSV for postgresql database.
Autofilter ultimate goal is to provide in the quickest way possible data mining from hundreds or thousands of rows data in order to get the attention in the items we want to focus on. It can receive parameters such as "text/values/colors" and they can be stacked among columns. You may conn...
Sometimes you need to generate the skeleton for the test cases based on the classes you have in your project.
This tutorial will show you how to use Weka in JAVA code, load data file, train classifiers and explains some of important concepts behind machine learning. Weka is a toolkit for machine learning. It includes a library of machine learning and visualisation techniques and features a user friendly G...
In this post I am giving an example on how to connect to Couchbase over SSL/TLS to establish a secure connection to protect data on wire. Hopefully, you have enabled SSL on Couchbase side. For Information on enabling SSL on Couchbase side you can refer to http://docs.couchbase.com/developer/dotnet-...
According to Python's standard documentation, the webbrowser module provides a high-level interface to allow displaying Web-based documents to users. This topic explains and demonstrates proper usage of the webbrowser module. webbrowser.open(url, new=0, autoraise=False) webbrowser.open_new(ur...
Base 64 encoding represents a common scheme for encoding binary into ASCII string format using radix 64. The base64 module is part of the standard library, which means it installs along with Python. Understanding of bytes and strings is critical to this topic and can be reviewed here. This topic exp...
To troubleshoot errors that occur with building from source, please view the build documents.
Typical database backed, annotation base spring security setup. configureGlobal() configure the auth object. The later two SQLs may be optional. configure() method tells spring mvc how to authenticate request some url we do not need to authenticate others will redirect to /login if not yet...
This section provides an overview of what selenium-grid is, and why a developer might want to use it. It should also mention any large subjects within selenium-grid, and link out to the related topics. Since the Documentation for selenium-grid is new, you may need to create initial versions of ...
Downloads This chapter contains useful downloads like the webdrivers and link to browsers Drivers Place all the drivers in your path variable Chrome driver FireFox driver Microsoft Edge driver Opera driver Browsers Chrome FireFox Microsoft Edge Opera
This section provides an overview of what data-warehouse is, and why a developer might want to use it. It should also mention any large subjects within data-warehouse, and link out to the related topics. Since the Documentation for data-warehouse is new, you may need to create initial versions ...
A private and secure docker registry instead of a Docker Hub. Basic docker skills are required. CommandExplanationsudo docker run -p 5000:5000Start a docker container and bind the port 5000 from container to the port 5000 of the physical machine.--name registryContainer name (use to make “docke...
Cryptography is used for security purposes. There are not so many examples of Encryption/Decryption in Python using IDEA encryption MODE CTR. Aim of this documentation : Extend and implement of the RSA Digital Signature scheme in station-to-station communication. Using Hashing for integrity of mess...
If you have to change some things in renderer.js or main.js but you want to do the changes in index.html, you can use the remote function. It lets you access all the electron functions you need! use remote like require("electron"): main.js:    const electron = require("elec...
Starting with PowerShell version 5.0, you can use PowerShell class definitions to create Desired State Configuration (DSC) Resources. To aid in building DSC Resource, there's a [DscResource()] attribute that's applied to the class definition, and a [DscProperty()] resource to designate properties a...

Page 41 of 54