Join the social network of Tech Nerds, increase skill rank, get work, manage projects...
 

Search In

Converting Strings in a Table to Numbers

Hello reader's in this tutorial we will convert string in a table to a numbers, for doing this we have to access the values in a HTML table and for processing we have to convert into numbers.   Using the Document Object Model (DOM) API we

HTML5 Audio element methods

In the previous post HTML5 Audio element and its attributes i have explained about the HTML5 <audio> elements and its attributed. In this blog i will further explained the different methods associated with the audio element. Methods : 1. loa

Software Test Manager’s Roles And Responsibilities

Hello Readers, As we know that software ‘Test Manager’ is a high level person in the testing team. Test manager have a lots of roles and responsibilities in the team. Every Test manager play his/her role and responsibility throughou

Use of set and get methods in magento

Magento handles the setting and getting values of the fields with the set and get methods. To understand how it handles using these methods lets see : the set method in magento works as setter method, which sets to the value of the attributes and th

Environment Variables( Part 1)

What exactly are the environment variables? Environment variables are a set of key value pairs on which our project configuration depend and which might change according to the environment in which code it running i.e development/production/stagging

Tabindex attribute in Html

Tabindex attribute: User uses tab key in a webpage to navigate  through interactive elements(links,input fields etc) and navigation depends upon the elements order in Html code. But with the help of tabindex attribute we can change  the ta

How to protect CakePhp application against Sql injection in 2.x version?

Hi Reader's, Welcome to FindNerd, today we are going to discuss How to protect CakePhp application against SQL injection in 2.x version? Basically SQL injection is a technique which is used for attacking to data-driven in a web applications. It

using return keyword within a Ruby block

As we all know,Ruby Blocks and Ruby Methods work in tandem and the output/value of the last line/expression being executed by the block is returned to the associated method . Have a look at this example: 2.1.5 :006 > def demo 2.1.5 :007?>

Ruby Blocks

As we all know,Ruby Blocks and Ruby Methods work in tandem as clearly elucidated by the below example: def demo_method yield "hello" end demo_method { |block_argument| "#{block_argument}!! our first ruby blog"}   here, the yield keyword w

Mobile Application Testing

Mobile Application Testing:   Testing the applications which are developed and designed for the mobile devices is known as Mobile Application Testing. Test the application for its functionality, consistency, and usability. But, there are few b

1 183 342
Sign In
                           OR                           
                           OR                           
Register

Sign up using

                           OR                           
Forgot Password
Fill out the form below and instructions to reset your password will be emailed to you:
Reset Password
Fill out the form below and reset your password: