
Search In
If you want to set the expected payment data in Odoo follow the following code :
if vals.get('expected_pay_date') and self.invoice_id:
msg = _('New expected payment date: ') + vals['expected_pay_date'] + '.\n' + vals.get('internal_note'
Hi friends,
The popularity of Ruby on Rails now a days is so much because of its rapid development, which is possible because of its gems. For every generic functionality there is a gem available, so why not create our own gem. Today I am going to te
Stored Procedure is already written queries which are saved in database. If you want to use any SELECT, INSERT, UPDATE, DELETE query multiple times then you can put your query in stored procedure and use it anywhere. You can execute your stored proce
In OpenERP first create custom module and inherit the email_template object in your own module. Then create templates in .xml file.
Follow these step given below:
Step1- First, create module like: test and then create .py file like as: test
Basically we sync all the contact everytime when user do login in our app but this is time consuming task to do all the time so it would be better and effective if we sync only new contact after last sync.
so basically for the first time we have to
Node.js which make use of chrome v8 engine can be used for building fast, scalable network applications. It is based on event-driven and non-blocking I/O model thus making it lightweight and efficient and most suitable for real time application.
&nb
In modern world, most of the web applications are api based. So using api's we also need to validate the authenticity of the user. When it is a proper web application the authentication of the user is maintained using cookies and sessions. But in

Memory leak is a situation when a computer program starts managing memory allocation incorrectly in a way that the resources or a memory which is not anymore in use and needed is not released. In this tutorial, we will learn "How to Find a JavaS
Many entrepreneurs around the globe are suffering under the scourge of cyber attacks. Data is being stolen or manipulated at an alarming rate. Locations such as free Wi-Fi hotspots are plagued with malware which can be utilized for industrial espiona
The 9th of September marked the release of the most recent Angular version 10.1 with capable features. Contrary to the previous versions of Angular, Angular 10.1 is smaller having a powerful message extraction tool, performance improvement to the com
