
Search In
ny Are you thinking of creating an online community?
Do you want a nice and related traffic for your post?
Do you want to grow your business via group posting, where you don’t have to wait for your post approval?
The a
In this blog, we illustrate how to enable a client side validation in Asp.Net MVC.
Firstly we need to understand what is client side validation in Asp.net MVC.
Client side validation:
All Client side validation is handled on the We
STEP 1
Choose File > New. Once the new document window appears name the document then add width and height.
STEP 2
Create a triangle having width 2 in and height 3. Then fill it orange color ( R= 255, G= 163, B= 41 ). Make the corners r
Introduction :
A WPF trigger changes one or more properties of a control in response to an action when a pre-defined condition is met. For example, we can use a Trigger on IsMouseOver event to change the font of the control. Triggers allow you to d
In below example I have written Python script to the partner's sale currency . Use below python code in .py file :
for order in self.pool.get('pos.order').browse(cr, uid, ids, context=context):
if order.invoice_id:
i
Hello all readers. In this blog,I am going to tell you how to restrict a particular view (Relative or Linear) to be always at parent bottom of your activity even when the keyboards appears.
Lets us first look at the xml, activity_main.xml
Hello
This blog post gives a brief about the process that needs to be followed to import structured data in PIM.
Overview
Importing structured data includes a sequence of steps that should be followed in order to complete import successful
Typically, to bind data with the layout i.e with the UI fields we access the view elements in the activity using findViewById() method and then set the values to the views.
This sometimes becomes quite cumbersome when there are large no. of views whi
CSRF (Cross Site Request Forgery) is an attack that can be performed by tricking the victim to submit a malicious request without his consent or knowledge. This attack will inherit the identity of the victim while performing an undesired function on
Just because you don't have the same resources, it doesn’t mean your small business can't learn from the big players and apply their tactics in your marketing. Business giants are usually on the leading edge of their industries and the
