|
|
|
|
|
|
|
|
|
|
|
|
|
|
| Semaphores are used to limit the simultaneous execution of a code (procedure, line of code, etc.... |
|
|
|
|
|
|
|
| Several images can be used when developing a WEBDEV site...... |
|
|
|
|
|
|
|
| Merges several files into a single one. |
|
|
|
|
|
|
|
| Stops one or more Beacon detections in the background. |
|
|
|
|
|
|
|
| Modifies the value of a key if this one was not modified. |
|
|
|
|
|
|
|
| Returns one or all the permissions declared by the application. |
|
|
|
|
|
|
|
| Configures the functions that use the HTTP protocol. |
|
|
|
|
|
|
|
| Copies one or more files (regardless of their attributes). |
|
|
|
|
|
|
|
| Allows you to simulate the use of phone keys. |
|
|
|
|
|
|
|
| Creates a socket that uses the UDP protocol. |
|
|
|
|
|
|
|
| Creates a socket that uses the infrared port. |
|
|
|
|
|
|
|
| Moves a file from one directory to another. |
|
|
|
|
|
|
|
| Converts a value from a unit to another one. |
|
|
|
|
|
|
|
| Constants used by the scanner functions... |
|
|
|
|
|
|
|
| Extracts an integer from a binary buffer at a given position.... |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|