
Search In
To Save Object values into SharedPreferences, you can use GSON library.
To save objects follow these steps:
Add Gson library dependency in your Gradle (App Level):
dependencies {
compile 'com.google.code.gson:gson:2.4'
You generally develop your apps on both the renowned platforms iOS and Android. This requires writing separate codes for both of them. Many of the tools have cropped up to make cross-platform development a reality. Microsoft, Facebook, and Adobe gave
Hello Guys.
Important: Make sure Odoo is correctly configured to send email before starting this tutorial. Odoo will need to email an activation link when you enable OAUTH.
So, let’s get started.
Enabling OAuth Support in Odoo
Login to Odoo as the
It is not just any mere announcement. The biological application system is unbelievably in competition. The hard certainties indicate almost 20% of your clients use your application once. The majority of clients will go within ninety days. Esta
For Push Notification using GCM in Android, use the following steps:
Create the Google Api Project on Google Console.
Note down the project number which will be used as GCM Sender Id.
Enable the GCM service by turn on the toggle for Google Cloud Me
In the below example code I have created Custom Notification in android. Here first I have added ImageView and TextView in activity_main.xml layout. Then I have used NotificationManager class and NotificationService in MainActivity. You can s
Displaying images in a mobile application is one of the most common tasks for app developers.
It can be quite challenging to efficiently load multiple images and display it on list-view or grid-view in Android.
You can use following single class
Hello Readers,
Side menus widely uses in mobile application and it provides a user friendly interface. Ionic framework provides an excellent directive which is easy to implement. In this post we will learn implementation of side menus in our app.
I
Have a go at the enlisting of reasons of security threats and essential security measures to make mobile applications hack proof and reliable.
Mobile applications have to be guarded as closely as computer applications as they are direct
Many people do not pay attention to the process of technological development – they simply use the resulting products. However, if we count a couple of years back, we would hardly remember such a variety of different apps that are hard to do wi