Elements you should avoid: After the introduction of several new elements in HTML5, it is now time to talk about what you should be avoiding in HTML5. Ever since CSS was invented, web developers have been always told to segregate design from content. Let CSS take care of the styles and HTML take care the […]
CSS is a simple mechanism for adding styles, for example, fonts, colors, spacing, etc. to web documents. It is a collaboration of CSS2 with some new specifications, which we can call as modules.
Introduction Provisioning SharePoint makes it easier for developers and the organization too, as it reduces time consuming manual effort and resource utilization. More importantly, it is a single-click, reusable component, suitable for anyone! Here, we will see how to develop a reusable component – methods and functionalists. SharePoint Web Application Creation We will create a […]
What are Apps? Over the last few years, desktops became laptops. Laptops gave way to Notebooks. Notebooks became Ultra Books and the trend is moving towards Tablets and Smartphones. As a result of this, web applications are paving the way for Apps. Reasons for “Apps” development No custom code execution on server side. It avoids […]
Share Point 2013 has many out-of-the-box web parts and one of them, i.e. a widely used web part is Content Query Web Part (CQWP). ContentByQuryWebpat referred to as Content Query Web Part (CQWP) is used to display content using query/filter from another site or sub-site within the same site collection. With the CQWP, content display as per […]
A recent project, required that Excel file data be inserted dynamically into a Oracle database and I identified the following steps that need to be undertaken to do the same: Generate Excel file data into XML format. Validate each column value from the Excel file with given .xml file of Column Cell, data type,and Column […]
Content negotiation is a process where the server identifies the kind of format that the client supports and depending on the comfort of the client, he sends that format. You might often want to consume your services from various types of devices. A resource may be available in several different representations. For example, it might […]
Having an Android device is beneficial as we can install apps as per our need. Many of us might already be familiar with Google play store which is the app store for Android and have been using it for downloading apps. It is Play Store which is responsible for notifying us of any updates to […]
Code review, as we all know, plays a critical role in software development. It helps in developing high quality, custom codes using industry best practices. Code analyzing can be performed in two ways, i.e. by manual analysis or by using tools. The main benefits of using tools over manual process is the fact that it is […]
In computer security, a vulnerability is a weakness which allows an attacker to reduce a system’s information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. In this blog, I will focus only on Cross-Site Request Forgery (CSRF).