
Search In
CakePHP allows us to set up a combination of models,views ,controllers and release them as a packaged application called Plugins which can be used in the CakePHP applications.
Some of the useful Plugins in CakePhp web application are as follows:-
Hi all,
Below is an example to remove names from a list using ng-click.
Here is a simple form for editing, adding or removing user name, all of these methods are declared on the controller.
These methods can easily be called from the angular markup
PreparedStatement interface:
It is used to execute a SQL parameterized query and it compiles only one time and we can use it many times. It extends the Statement interface. It is more secure then Statement interface and safely provide valu
For sending notifications to android phone first you need to register yourself in google developer console
https://console.developers.google.com
After doing registeration in that you need to generate an API key from it
Code for GCM
Android was founded by Andy Rubin, Rich Miner, Nick Sears and Chris White in October 2003, and later in the year 2005, its is acquired by Google. As Android is nowadays very popular mobile operating system and it is continuously evolving according to
Hi All,
Paypal has updated their payment integration API to new REST API and existing APIs have been deprecated since Feb 2019. Due to less documentation, it was very hard to integrate these APIs with Laravel. After spending some time, I was able to
Imagine life without mobile!
It’s not acceptable as we are used to with. We do nearly everything online at any time, from banking to control IoT in our home, from remote work to check productivity and more. While we are dependent on mobile app
Generally access token concept is used to prevent the unauthorized access or misuse of the APIs from the mobile devices.
Whenever a client logs in a mobile device, server generates a access token and send this access token back to the client.
Strong Parameters in Rails
Strong parameters are used to prevent the action controller parameters that are used in Active Model Mass Assignment. If you want to use them, you need to white-list them. It is basically used as a security for sensitive mo
Earlier when programmer used to build a web application, they required the skills to code in both business logic language and database language. However now, back-end frameworks are using Object-Relational Mapping (ORM). It helps programmer store t