Click here to Skip to main content
16,004,974 members
Everything / Hat

Hat

RedHat

Great Reads

by Howard 9448490
Creating a reusable editor for C# Applications using the RichTextBox Control
by Arthur V. Ratz
Compute the Levenshtein distance of literal strings effectively by using the Wagner-Fischer (two matrix rows-based) algorithm.
by Howard 9448490
Windows Forms Print Dialog for rich text with accurate page preview and zooming
by Jozu MLOps
In this article, we build a Retrieval-Augmented Generation (RAG) pipeline using KitOps, integrating tools like ChromaDB for embeddings, Llama 3 for language models, and SentenceTransformer for embedding models.

Latest Articles

by Trần_Tuấn_Anh
In today's rapidly evolving tech landscape, understanding the difference between PaaS (Platform as a Service) and SaaS (Software as a Service) is crucial for making informed decisions about cloud computing solutions.
by Trần_Tuấn_Anh
Lambda functions are a powerful feature introduced in Java 8 that revolutionize how you write and manage code. They allow for more concise and readable code, especially when dealing with functional interfaces.
by Trần_Tuấn_Anh
In Spring Framework, the singleton bean scope is the default and most commonly used scope. Despite its widespread use, many developers wonder how a singleton bean can handle multiple parallel requests in a multi-threaded environment without running into concurrency issues.
by Trần_Tuấn_Anh
In Spring, handling request parameters is a fundamental task that developers often encounter. Two commonly used annotations to achieve this are @RequestParam and @PathVariable. Though they may seem similar, they serve different purposes.

All Articles

Sort by Score

Hat 

14 Feb 2022 by Howard 9448490
Creating a reusable editor for C# Applications using the RichTextBox Control
16 Sep 2022 by Arthur V. Ratz
Compute the Levenshtein distance of literal strings effectively by using the Wagner-Fischer (two matrix rows-based) algorithm.
13 Aug 2020 by Howard 9448490
Windows Forms Print Dialog for rich text with accurate page preview and zooming
9 Jul 2024 by Jozu MLOps
In this article, we build a Retrieval-Augmented Generation (RAG) pipeline using KitOps, integrating tools like ChromaDB for embeddings, Llama 3 for language models, and SentenceTransformer for embedding models.
16 May 2021 by Steffen Ploetz
Creation of a basic X3DOM editor based on OpenGL with as little code as possible, that is running on ReactOS and Windows, to check out the capabilities of X3DOM.
10 Jan 2022 by Afzaal Ahmad Zeeshan
Introduction and Background As the title suggests, this post is a personal recommendation for the users of Microsoft Cognitive Services, the services that provide a cloud-based subscription-based solution for artificially intelligent software applications, with an any team, any purpose and any scale
7 May 2023 by ToughDev
In my previous article I provided some information on the Tektronix TDS 340 100 MHz digital storage oscilloscope and instructions
18 Dec 2023 by Intel
Leveraging Open-Source AI Technologies with Red Hat OpenShift Data Science and Intel® Architecture
11 May 2022 by k5054
Quote: Could this be related to the compiler version? That's quite probable. You might be able to solve it by trying different standard compliance versions. GCC 4.8 compiles by default as C++ 98, you could try setting -std=c++11 for the compile...
29 Aug 2024 by Trần_Tuấn_Anh
In object-oriented programming (OOP), understanding the relationships between classes is crucial for designing robust and maintainable systems. The three fundamental types of relationships are Association, Aggregation, and Composition.
7 Nov 2013 by Michael Pauli
Hi,Two years back or so I used a profiling tool as an add-on for VS2010 - I think it was Red Hat product or something, but I'm not sure. Point is we used it for exposing for us where time was spend inside an application. It was very uesfull because it enabled us to sort-of drill-down the...
7 Nov 2013 by Ron Beyer
RedGate ANTS Profiler[^]
2 Jan 2014 by Prashant Gupta 241
Hello,See the ExampleEx: 1) Font Name : Times New RomanFont File Name : timesi (Italic)Font File Name : timesb (Bold)2)Font Name : ArialFont File Name : arialbd (Bold)Font File Name : arialbi (Italic)DescriptionFont names are provided in combobox, on...
8 Feb 2017 by merh
HiI have found on the internet "Building a simple RPM on Linux (RedHat) using rpm build"I have build the RPM but when I install it I get the following error"error: can't create transaction lock on /var/lib/rpm/.rpm.lock (Permission denied)Im not allwed to install at the root but how...
15 Aug 2018 by KeyurKelkar
Hello, I am trying to open an interactive session of R from Wine. I need to run R from the Rhel7 host as I have recompiled it specifically for my purpose. I am having trouble with (1) Opening R in the host from Wine, by way of commands, and (2) ensuring that R from the Rhel7 host is kept open...
15 Aug 2018 by Richard MacCutchan
Please do not repost the same question, you already asked this at How to open an interactive bash shell from wine (in RHEL7)[^]
1 May 2022 by PascalLandau
In the fifth part of this tutorial series on developing PHP on Docker we will setup some PHP code quality tools and provide a convenient way to control them via GNU make.
13 May 2022 by AVLoureiro
I'm trying to compile a C++ tomography code on RH7. I have previously compiled it on Ubuntu 20.04 with some issues that were easily solved by adding missing includes on the original code. I have limited experience with C++ and I'm still not...
13 May 2022 by AVLoureiro
After a few days, I managed to solve this problem. I configured cmake to use another version of g++ available on the system: -DCMAKE_C_COMPILER=/share/apps/gcc/v7.3.0/bin/gcc -DCMAKE_CXX_COMPILER=/share/apps/gcc/v7.3.0/bin/g++ This allowed me...
14 Jun 2022 by Member 15673286
Expectation is Need to connect aws server through java code by using Private Key I was able to log in successfully until Redhat 8 implemented in the server end. If I disable the FIS (Fuse Integration Service) then working as expected. I have...
24 Sep 2022 by Illya Reznykov
The post describes PowerShell script which creates WAF resources for the scenario when Application Load Balancer is used to serve content for a public website, but to block requests from attackers and to protect from OWASP Top 10 security risks.
7 May 2023 by ToughDev
In order to facilitate transferring files from my main PC to my VirtualBox machine running MS-DOS 6.22, I installed Microsoft
9 Aug 2024 by Wessel Beulink
In the world of government organizations, where I currently find myself navigating, there’s an almost unspoken rule: if you’re not listed in the Hall of Fame on Internet.nl, you’re missing the mark on modern internet standards. For those unfamiliar, Internet.
15 Aug 2024 by Trần_Tuấn_Anh
In Kubernetes, Pods are the smallest deployable units, consisting of one or more containers packaged together to run as a group.
28 Aug 2024 by Trần_Tuấn_Anh
The Fork/Join Framework is an essential tool in Java for optimizing parallel processing tasks. It is designed to take full advantage of multi-core processors by breaking down large tasks into smaller subtasks, executing them in parallel, and then combining the results.
28 Aug 2024 by Trần_Tuấn_Anh
Cross-Site Request Forgery (CSRF) is a serious security vulnerability that can compromise your web applications. It tricks users into performing actions they didn't intend, often leading to unauthorized actions on a website.
29 Aug 2024 by Trần_Tuấn_Anh
Coding in Java can be a rewarding experience, especially when you follow best practices and leverage the language's full potential. In this article, we'll explore several tips that can enhance your Java programming skills, backed by examples, demos, and results.
30 Aug 2024 by Trần_Tuấn_Anh
In Java, method overriding is a fundamental concept that allows a subclass to provide a specific implementation of a method already defined in its superclass. However, when it comes to private and static methods, the rules are different.
31 Aug 2024 by Trần_Tuấn_Anh
Virtual threads represent a significant advancement in Java's concurrency model, designed to simplify and enhance the way we handle multi-threading. This article delves into the core concepts of virtual threads, providing examples, demos, and results to illustrate their practical applications.
31 Aug 2024 by Trần_Tuấn_Anh
In Java, the main() method serves as the entry point for program execution. It's a well-known fact that it has a specific signature: public static void main(String[] args). This raises a question many developers ponder: Can the main() method be overloaded?
2 Sep 2024 by Trần_Tuấn_Anh
Cross-Origin Resource Sharing (CORS) is a crucial aspect of web security that controls how resources on a web server can be accessed from another domain. In Spring Security 6, configuring CORS ensures that your application interacts securely with resources across different domains.
2 Sep 2024 by Trần_Tuấn_Anh
In the world of software development, the Don’t Repeat Yourself (DRY) principle is more than just a best practice—it’s a fundamental approach to writing clean, efficient, and maintainable code. But why is it so important?
3 Sep 2024 by Trần_Tuấn_Anh
In software development, adhering to design principles can significantly impact the maintainability and scalability of your code. One such principle is the Open/Closed Principle (OCP), which states that "software entities should be open for extension but closed for modification.
4 Sep 2024 by Trần_Tuấn_Anh
Spring Boot simplifies Java application development by providing a range of powerful annotations that help streamline configuration and setup. Among these annotations, @SpringBootApplication plays a pivotal role.
5 Sep 2024 by Trần_Tuấn_Anh
Serialization and deserialization are crucial concepts in computer science that facilitate the storage and transmission of complex data structures. In this article, we will explore what these terms mean, their significance, and how they are implemented in practice.
6 Sep 2024 by Trần_Tuấn_Anh
In the world of software development, ensuring data integrity and correctness is paramount. In a Spring Boot application, one of the most effective ways to achieve this is through semantic validation.
7 Sep 2024 by Trần_Tuấn_Anh
In Java, two common runtime issues related to class loading are ClassNotFoundException and NoClassDefFoundError. These exceptions can be confusing for developers, especially when diagnosing and fixing classpath issues.
N 9 Sep 2024 by Trần_Tuấn_Anh
Inversion of Control (IoC) is a fundamental principle in software design that aims to decouple components and manage their dependencies more effectively.
N 9 Sep 2024 by Trần_Tuấn_Anh
In Java, a shutdown hook is a feature that allows you to perform cleanup operations before your application terminates. This can be particularly useful for releasing resources, saving state, or ensuring that certain tasks are completed properly before the program exits.
N 10 Sep 2024 by Trần_Tuấn_Anh
Component scanning is a core feature of the Spring Framework that simplifies the management of beans and their lifecycle. Understanding how @ComponentScan works can significantly enhance your ability to manage Spring applications effectively.
N 10 Sep 2024 by
Cross-Site Scripting (XSS) is one of the most prevalent security vulnerabilities in web applications. It occurs when an attacker injects malicious scripts into content that users can view on a web page. These scripts can steal data, hijack user sessions, or perform other harmful actions.
N 11 Sep 2024 by Trần_Tuấn_Anh
In Spring Framework, managing beans effectively is crucial for building robust and maintainable applications. The Spring Bean Lifecycle is a key concept that helps developers understand how beans are created, initialized, and destroyed within a Spring container.
N 12 Sep 2024 by Trần_Tuấn_Anh
The @Configuration annotation is a powerful feature in Spring Framework that plays a crucial role in defining and managing the beans in a Spring application context. In this article, we'll explore what @Configuration does, how it works, and why it’s essential for your Spring-based applications.
N 13 Sep 2024 by Trần_Tuấn_Anh
Configuring Spring Profiles is a crucial aspect of managing multiple environments, such as development, testing, and production, in a Spring Boot application. In this article, we'll explore what Spring Profiles are, how they work, and how you can configure them effectively.
N 13 Sep 2024 by bradyguy
.NET MAUI, REST APIs, Android and Fiddler: Insights on the use of Fiddler How to configure development environment to use fiddler to monitor only the traffic from your android emulator and use fiddler to develop a deeper understanding of the API’s you are using.
N 14 Sep 2024 by Trần_Tuấn_Anh
Cyclic dependencies can be a challenging issue in Spring applications, especially when working with dependency injection. This article will guide you through understanding, identifying, and resolving cyclic dependencies between beans in Spring.
N 15 Sep 2024 by Trần_Tuấn_Anh
In this article, we'll explore the core component of the Spring MVC framework: DispatcherServlet. By the end, you'll have a clear understanding of what DispatcherServlet is, how it works, and how to configure it in your Spring applications.
N 16 Sep 2024 by Trần_Tuấn_Anh
When developing web applications with Spring MVC, understanding the differences between @Controller and @RestController is crucial. This article will guide you through these two annotations, showcasing their distinctions, use cases, and examples to solidify your understanding.
N 17 Sep 2024 by Trần_Tuấn_Anh
In Spring, handling request parameters is a fundamental task that developers often encounter. Two commonly used annotations to achieve this are @RequestParam and @PathVariable. Though they may seem similar, they serve different purposes.
N 18 Sep 2024 by Trần_Tuấn_Anh
In Spring Framework, the singleton bean scope is the default and most commonly used scope. Despite its widespread use, many developers wonder how a singleton bean can handle multiple parallel requests in a multi-threaded environment without running into concurrency issues.
N 19 Sep 2024 by Trần_Tuấn_Anh
Lambda functions are a powerful feature introduced in Java 8 that revolutionize how you write and manage code. They allow for more concise and readable code, especially when dealing with functional interfaces.
N 20 Sep 2024 by Trần_Tuấn_Anh
In today's rapidly evolving tech landscape, understanding the difference between PaaS (Platform as a Service) and SaaS (Software as a Service) is crucial for making informed decisions about cloud computing solutions.
14 Aug 2021 by Christ Kennedy
In this article, you will learn about a word-processor that makes use of multiple dictionaries, pop-up definitions and an interactive multi-button picturebox expedited with a swift Sweep And Prune algorithm.
U 9 Sep 2024 by Robert Gustafson
A UserControl that allows rich-text applications to have a ruler with support for margins, indents, and tabs
18 Jun 2012 by Shivprasad koirala
Difference between BasicHttpBinding and WsHttpBinding.
N 8 Sep 2024 by Trần_Tuấn_Anh
Database partitioning is a technique used to divide a large database into smaller, more manageable pieces while still being treated as a single entity. This method can drastically improve performance, maintainability, and scalability of a database, especially as the amount of data grows.
31 May 2016 by DataBytzAI
How to ensure there is sufficient disk-space for SQL backup before you run a backup!
5 Apr 2010 by Mahdi Mansouri
This program shows you how to control, give set-point and get feedback from Hua YI made Power Supplies
9 Jun 2022 by Pete O'Hanlon
In the previous article, I started describing how I had built a more complex TypeScript web application that retrieves data from a separate API and displays the data in a relatively visually pleasing manner.
1 Sep 2024 by Trần_Tuấn_Anh
Write-Ahead Logging (WAL) is a crucial component of PostgreSQL's data integrity and recovery mechanisms. In this article, we'll explore how WAL works, its benefits, and how to leverage it for effective database management.
6 May 2019 by Anton Kukoba, Apriorit Inc, Sergii Bratus
The knowledge base needed to perform reverse engineering, basic principles of reverse engineering a piece of Windows software, disassemblers, and tools
9 Apr 2014 by Member 10738586
I tried the above solution and it worked but the Required field text now shows up in black font instead of Red.