Join the social network of Tech Nerds, increase skill rank, get work, manage projects...
 

Search In

Data Structure in C Array

Array is a homogenous container of items for storing and retrieving data. Most of data structure use array for its implementation. Following are important terms to understand the concepts of Array. Element − Each item stored in an array is

  • 229
Method Overloading in Java

METHOD OVERLOADING: Having more than one methods with the same in the same scope. i.e. class is known as method overloading. It is useful in increasing the readability of the program. If a user wants to perform some operation say multiplication on

Node.js: How to install Node.js on Ubuntu 14.04

This blog will help you to understand how to install node.js Install Node.js First update the apt-get package lists with this command: $ sudo apt-get update Now install the git package using apt-get $ sudo apt-get install git

To Check if edit distance between two strings is one

 Edit distance between two strings is said to be one when following changes occur:- Adding a character. Deleting a character A character is changed // C++ program to check if given two strings are // at distance one. #include <bits/st

Magento 1.9.1: How to sort products by quantity and price both ?

How to sort Products by quantity and price in Ascending or Descending order programatically? I was facing issue to sort products by quantity and price in descending order i.e.  products which is having maximum quantity in stock and with highest

Cryptography in Networking

  Cryptography is based on the calculation and manipulation  of data streams and the process to decrypt the data. It will allow you to store the sensitive information and then send it to the network so that the data cannot be read by anyon

Open PGP in Cryptography

  The techniques used for saving data is to change/replace it with some other symbol or text. There is a new thing that will compress the data this is called as OpenPGP.   It is like a hybrid system which changes the data in the compress

Ajax with PHP

Ajax codes are used to communicate between web pages and the server without loading the page. lets demonstrate a search through ajax call with php  <html> <head> <style> span { color: gre

MVC Custom Authorize Attribute with Use of Enum

Hi All, In many of our scenario's we need to use Authorize Attribute in our MVC project. The limitation of which is just that we can't use our custom user roles. What if we intend to use custom enum to Authorize some of our Action Methods. B

Authorize ajax call in MVC

Hi All, In many of our scenario's we intent to make ajax calls to get or post data. What if the session logged off before you made the ajax call, what will and should happen in this scenario. What will happen is the call will never be completed

1 189 320
Sign In
                           OR                           
                           OR                           
Register

Sign up using

                           OR                           
Forgot Password
Fill out the form below and instructions to reset your password will be emailed to you:
Reset Password
Fill out the form below and reset your password: