Show truncated string with dots appended with CSS3
Showing starting few words of a long text by not using client side or server…
Showing starting few words of a long text by not using client side or server…
What is Memory Leak? Memory leak is a bug that mainly occurs when a program…
Active directory Authentication using forms authentication and login control in ASP.NET: For Active directory authentication…
In this tip I am explaining different ways to break out of a very deeply…
Sometimes we need to create customer portal user in test class to run the functionality…
Sharepoint 2010 has so many new exciting features and one of them is InPlace Record…
Using AJAX and web services in your application can make it richer. But passing information…
1. Who can start CUDA programming? – Any one who has some basicknowledge on C…
This tip describes how text can be converted to image using Java awt.. Step1: Create…
n many projects we give options to users to add multiple rows for submitting multiple records. To do this…
In this tip we will look at what Dependency Injection is and how this design pattern can be helpful. While working on different projects we sometimes come across situations where…
So the solution is keep it in your WEB-INF folder so that browser is not able to access it.Simple and steady. That is one part of the story.Beacuse everything cant…
Custom tags are user defiend tag elements that provide the code reusability in jsp. we can resuse that tag every where in our web application. there are following steps needed…
A method which is able to process variable numbers of parameters is called VarArgs method. Most of us came across a function ‘printf()‘ in ‘C’ which is an example of…
From a Java application we can send an email to any recipient on any domain e.g. gmail, yahoomail, etc. The only thing we needed is a valid SMTP . We…
We can customize our cursors in almost every Adobe software. Generally we do so by providing a beautiful image for our custom cursor. In Acrobat, In addition to customize the…
Earlier I had posted a tip regarding detecting the QR in an Image. After detecting we had also fetched the QR Image as BitMatrix object. BitMatrix is just a class…
If an XML file contains one tag that is used multiple times but in different context each time, it becomes a bit difficult extract and use each value programatically. In…
Following steps are to be followed:- 1.Write a Java program that does not contain main method. 2.Complile the java program into .class file(for that you need to install jdk and…