Welcome to Software Development on Codidact!
Will you help us build our independent community of developers helping developers? We're small and trying to grow. We welcome questions about all aspects of software development, from design to code to QA and more. Got questions? Got answers? Got code you'd like someone to review? Please join us.
Posts by Peter Taylor
From MSDN: To escape a special character, use the syntax %<xx>, where <xx> represents the ASCII hexadecimal value of the character. So to use format %ad you should escape as %25ad.
Hidden in the documentation there's See fnmatch(3) and the FNM_PATHNAME flag for a more detailed description. so that's probably the route you should be taking to emulate the behaviour as acc...
The scope currently lists as on-topic: Best practices, as long as clear "best" criteria are provided. Examples: fastest execution, least memory use, widest tool support for a target, most begi...
private readonly int _checkInterval; What are the units? I have to search for usages to find out. I strongly favour using TimeSpan instead of int. private static readonly SemaphoreS...
I have created a Configuration Parameter in TC's 'Parameters' area: That can work, but from the rest of the question I think that what you actually want to do here is create an Environment Var...
Your diagnosis appears to be correct. Per https://www.lua.org/pil/22.html Because Lua is written in ANSI C, it uses only the functions that the ANSI standard defines. POSIX rename extends the...
I decided to tackle this again via the route of creating a new solution project-by-project, and this time the configuration manager actually did something useful. Specifically, it added a property ...
While writing the question I did find one hacky solution which works, and which I will use unless someone has an alternative. Create a codebehind file for the theme: using System; using System.W...
I have a project Anonymised.Theme which contains XAML resource dictionaries for a theme. This is used by about a dozen applications which simply include it by merging <ResourceDictionary Source...
When I implemented this for a code golf challenge, the state had to encode not only the vertex you were at but the edge by which you had entered (or, equivalently, the direction in which you were f...
Wrong operator. To test for NULL, use the IS NULL and IS NOT NULL operators ... You cannot use arithmetic comparison operators such as =, <, or <> to test for NULL.
I understand that in object oriented programming, an object is an instance of a class. Not necessarily. JavaScript famously supported object-oriented programming but did not support classes un...
forcing the GC collection after each operation - this can be done using GC.Collect(), but it is not recommended to do so ...unless you have good reason. Here you have good reason. The oth...
Per man gitignore there are four sources of patterns for ignoring files. Command-line arguments are probably too much hassle; .gitignore is itself version-controlled (unless you include .gitignore ...
If you remove the align="left" then it works fine. My best guess is that you put those in because you didn't want the image in the text flow, affecting the vertical positioning on the text. The ea...
Read the documentation for SQLite CREATE TABLE clauses, not questions about Netbeans JavaDB. In particular, if you expand column-def and column-constraint you'll see the correct syntax for what yo...
The question seems to show a certain level of confusion about terminology. I shall address what I believe to be the underlying question: How can I store binary data in SQLite? SQLite supports 5 da...
Overall the structure seems sensible. Style It's Python style to have two blank lines after a function or method, not just one. You seem to be trying to line wrap before 80 characters. Maybe you...
This should perhaps be a comment rather than an answer, but I want to allow people to vote to indicate agreement or disagreement. "Complete code" doesn't necessarily mean an entire project. It mea...
Situation: I have an Azure account which has management permissions for various subscriptions in various directories (tenants). I have a GUI tool to do various management tasks whose details are ir...
Is there any disadvantage of doing it this way that I should be aware of? In general whitelisting is the best way to sanitise, but it does create important error classes, especially missing it...
For small tables you can bound the recursion depth: WITH my_cte(childId, parentId, depth, max_depth) AS ( SELECT r.childId, r.parentId, 1, (SELECT COUNT(*) FROM My_Table) FROM My_Table ...
The date is sent in the form submission in ISO 8601 format (year-month-day). You can reformat it in the form handler as follows: $input_date = $_REQUEST['cf_input_date']; if ($input_date) { ...
My assumption is that, internally, log4net loads its XML file into some data structure (maybe not a dict, but some equivalent of cfg_dict above) and then passes that structure to whatever code ma...
An example for a current problem; the file downloaded can have a trivial name such as install.sh and collide with similar files (the rm is especially problematic here I think). This is why tem...