SEARCH KEYWORD -- Web De



  API Design is UI for Developers

I’ve been thinking a lot about APIs and their design recently.I stumbled on this fantastic quote from Greg Parker: A programming language is a user interface for developers. Language authors should learn from HCI principles.22/02/2012 19:10 via webReplyRetweetFavorite@gparkerGreg ParkerWhen I first started learning C++ (back in the bad old days) I was convinced that any 1st year student could design a better programming language. One which behaved in a sane fashion without a lot of le...

   API design,UI,developers,PHP     2012-03-11 13:21:43

  Introduction to OAuth (in Plain English)

Last week we talked about giving away your passwords and how you should never do it.  When a website wants to use the services of another—such as Bitly posting to your Twitter stream—instead of asking you to share your password, they should use OAuth instead. OAuth is an authentication protocol that allows you to approve one application interacting with another on your behalf without giving away your password. This is a quick guide to illustrate, as simply as possibl...

   Security,OAuth,Permission,Partial access     2012-04-05 11:39:54

  5 things my 4-year-old taught me about technology

One of the great things about being a parent is that you get to see how kids use technology. I have a 4 year-old daughter who loves to mess around with my phone, watch videos on YouTube and play Angry Birds.It’s fun to watch her interact with these things, not only because she’s already better at some of the games than me. The really interesting stuff happens when stuff doesn’t work the way she expects it to, or when she finds ways to use tech that I hadn’t thought of...

   Learning,Children,Siri,Voice,Tech,Course     2011-10-26 07:07:48

  How to let Google index AJAX contents?

There are lots of websites containing only one page now with the popularity of AJAX. The website will load different contents according to different inputs from users. This approach provides good user experience and it also helps save bandwidth, the drawback is that AJAX contents are not easy to be indexed by search engines. For example, if you have a website: http://example.com Users can see different contents with the appended # structure in the URL: http://example.com#1 http://example.com#2 h...

   AJAX,Search engine,Google,History     2013-07-16 00:47:14

  Alibaba gains spotlight due to female employee alleging sex harassment from supervisor

During the weekend, the Chinese e-commerce giant Alibaba gains spotlight from Chinese general public due to a hot discussion going on on various Chinese social media platforms where a female employee alleges that her supervisor(alias Yi Qu) conducted sex harassment on her during a previous business trip. The case happened a couple of weeks back where the female employee at Alibaba was asked by her direct supervisor to go for a business trip to Shandong province(a northern province in China), sh...

   ALIBABA,SEX HARASSMENT     2021-08-07 22:27:02

  How to upload file to FTP server using C# Asp.Net

This post is about uploading files to FTP server in asp.net development. You will learn step-by-step to upload files programmatically to FTP web server. All the examples shared in this post are intended by professionals to make you learn about the subject Here, I will explain you an example of Uploading Files to FTP Server programmatically in C#.Net. Using this approach, the Files will be programmatically uploaded to FTP Web Server. For example, I will create a function in which we will simply p...

   ASP.NET,DEVELOPMENT     2016-06-24 08:45:37

  Please Steal These webOS Features

When Apple introduced the first iPad in 2010, I bought one immediately. I didn’t know what I’d use it for, but I was sure that I would find some use for it. I never did. I played around with it, wrote some code for it, but eventually stopped using it. I would pick it up from time to time to read something or watch a YouTube movie, but even that was a rare occurrence. I have since picked up an iPad 2, and I’m using it a lot more than the first iPad, but again, I’...

   WebOS,Feature,HP,borrow     2012-02-22 05:45:49

  How to Encrypt Your Online Conversations

Do you ever get the feeling that somebody might be listening to or reading your private conversations? You're not crazy.  Online platforms don’t hide that they use data from chats, searches, emails, and other places for targeted advertisements. Aside from being a massive invasion of privacy, it also puts your security at risk.  But it is possible to prevent people from snooping on you. All you need is a little encryption. Check out these different ways you can add encryption into...

   DATA SECURITY,VPN     2020-01-30 07:33:29

  What’s Custom Software Development in 2021?

Each year, custom software development shows us its new angles — those shaped by the technology trends and changes in customer behavior and preferences. Considering the highly impactful nature of 2020 with the outbreak of COVID-19, 2021 custom software development was formed around the technologies that have contributed to the minimization of the pandemic’s harmful impact. So what are these technologies? In this article, you will find out info about the top trends in software develop...

   CLOUD,SOFTWARE DEVELOPMENT     2021-11-04 01:22:37

  Build RPM package on Linux

1. Check the OS version and core version #uname -a #more /etc/redhat-release 2. Create relative directories /usr/src/redhat/SOURCES    //Store source codes, patches, icons etc /usr/src/redhat/SPECS        //Store specs about the process of building RPM packages /usr/src/redhat/BUILD     //File after uncompressed are stored here /usr/src/redhat/RPMS     //Store the binary files built with rpmbuild /usr/src/redhat/SRPMS&nbs...

   RPM,Linux,Build     2013-03-22 12:44:29