...attachments 2) convert the data into a JSON format and post the object plus any attachments to a specific web API that we will provide. The ideal solution will come with instructions on how to install/set up the solution, as well as how to configure the target mailbox (including login credentials) and target URL for the web API. We have a system where users
...firm a. Dodawanie, firmy - Wybór kategorii zaimportowanych z google. - Nazwa firmy - Opis firmy - Zdjęcie logo - Oferta, dodawanie ręczne oraz import z pliku XML google zakupy. - Strona www (pokazywana w ramce) - Widok na mapce google (dostosowanej graficznie) - Opcja wysuwającego zaczepiacza, czyli po 10 sekundach oglądania
I need a library that will read and write FNMA 3.2 files. This library will also return the number of errors, if any, while parsing/reading the file. All fields must be supported, and an appropriate object model created that matches the data in the file.? This utility will run as part of a web application so it will need to be thread safe. Required development language: Node.js developer must und...
...looking for a developer who has experience in Wordpress & importing an XML file from ZIP into wordpress to display products. My client has a website which lists properties. The properties are managed from 3rd party called REST which controls the properties. The software exports an XML file in ZIP format which we need to then add to the wordpress database
I am looking for the ability to create a pdf like the one attached from .json files like the one attached. It is important that this is not a one off document and it is a program or script created so that I can make this template pdf any amount of times possible. Key thing: Need to be able to change the logos up the top and down the bottom Need to
...familiar with Chatterbate's Affiliate program and know how to make a complete website using the affiliate links. Some of the work includes: RSS/Atom Tools API - Users Online (XML, .JSON, YAML) Embed Cam & Chat Rooms including RevShare iFrame Left handed sorting options similar to [login to view URL] For instance, [login to view URL] is powered
We had an XML file created to upload to Crossref. However, when we tried to upload it, we received this message from Crossref support: The XML file you attached does not use Crossref's metadata schema. To deposit DOIs with Crossref, you must submit metadata and DOI information to our system. If you are able to create XML for your deposits, it needs
Simple XML, need some help on a path query in Oracle. Need to extract specific values from named pairs. e.g. GreenQuantity=4 <Identifier> <Type>GreenQuantity</Type> <Value>4</Value> </Identifier> See attached test script for full example. Must work on Oracle 11gR2.
If you've been developing with XML for even a short period of time, you are likely to have reached the point of wanting to describe your XML data structures. Document Type Definitions (DTDs) and XML Schemas are key technologies in this area.
Summary: Create a simple view for our team to see the contents of one bank account via a banking API. Pagination to load more results. Simple search to search for descriptions on transactions. TrueLayer: [login to view URL] Google Auth: [login to view URL] Log in should be using Google Auth
...and edit profile and Show profile page. Next, on 2nd site, using Json, users there to be able to register & login to 1st site, & show and edit their profile information on 1st site, "all without leaving 2nd site, ie by being on just 2nd site itself", and without going to 1st site. Json to query MySqlDB on 1st site using db Username and db Password, and
...supports TCP and our application will need to do the following: - Connect to a WebSocket Server API (existing & well documented. WebSockets are based on TCP which is supported by the chip). - parse JSON text commands received from the server and reply with JSON responses. - help define an interface to be used when integrating the chip into our hardware
...between customers or users - Unauthorized actions on the API The testing will need to be performed using the Black Box methodology to expose security weaknesses on the application level such as: SQL Injection XSS (Cross Site Scripting) CSRF (Cross Site Request XPATH Injection XML Injection Parameter Manipulation Remote File Includes Information