Loading ...

Security Tokens

Hello everybody, today I want to write a few words about security tokens in OAuth2.  So, first of all I'd like to point that security tokens wasn't needed for corporate world. When I say corporate world, I mean networks like B2B, or B2E or something, that has strong system administration arm...

How To Avoid Many If During Programming For Calgo

Hello everybody, today I want to write few words about how to avoid nested ifs if you program for cAlgo. Recently I've got following request ( code is modified in order to protect privacy of customers idea ): buy in following case: price is above moving average 20 price is above moving aver...

Oauth 2 Parts

Hello everybody, today  I want to describe for main components of OAuth 2, which should be implemented by any framework which claims to be programmer friendsly implementation of OAuth 2. We will start from left botton box, or from user. So, user as usually is something or more precise someb...

Jforex Utilities Sample And Jfquantisan Jar

Greetings to everybody. Recently when I visited blog of Paul Lam, I've noticed JFUtil 2.0 alpha demonstration of usage of his library JForex-Utilities.   It is nice example, but very unformatted. It looks like this:   So I've made formatting corrections, and put his sample on my p...

Chocolatey Usage For Installing Programs

Hello everybody, today I want to document wonderfull tool. Chocolatey. It allows you to install quite big list of programs without need to search, download and setup them.  Before chocolatey will be able to execute anything at your pc, following command needs to be executed at your powershel...

How To Parse Google Search Results

Hello everybody, today I want to describe how to use C# for scrapping results.  For me it was surprising to see, that there is a stereotype that for scrapping the best tool or tools only to use are R, Python. And majority of people who needed functionality of parsing wanted that functionalit...

Asp Net Lifecycle

Hello everybody, today I want to write few words about ASP .Net lifecycle.  Actually just sequence of events.  Begin Request Resolve request cache Map request handler Acquire request state Request handler execute Update request cache Log request End request Here are the 8 main steps o...

How Closures Are Implemented By Net

Hello everybody, today I want to share piece of wisdom which is interesting, but hard to explain why somebody may need it. That is how closures are implemented.  Consider the following code: Snippet class Program     {         ...