SEARCH KEYWORD -- API DESIGN
How to monitor user behavior in webpage
Sometimes there is a need for website owners to monitor user behavior on the site so that they can know what pages are mostly visited and which parts are more popular so that they can provide better service to their users. These behavior usually contain user clicks, user mouse over events etc. These data can be sent back to server when triggered with some meta data. In this post, we will cover a few ways to monitor user behavior on a web portal and send data back to backend sever. 1. Synchronous...
HTML,BEACON API,PING,USER BEHAVIOR 2019-06-29 06:06:59
Will Microsoft use Windows 8 to replace Metro?
Since there is some dispute with a German company Metro AG on the word "Metro", it is said that Microsoft will abandon "Metro" in Windows 8. Then what will be the replacement of "Metro"? According to Zdnet, the answer may be Windows 8. Microsoft reminds Windows developers not to use "Metro" when they mention interface of Windows Phone or Windows 8 in their apps and recommends that the developers use New User Interface when they describe Windows 8 style interface design. Microsoft officially anno...
jQuery 2.0 gives up IE 6/7/8
jQuery 2.0 is released after 10 months development. jQuery 2.0 is customized for modern web browsers and also considers about mobile devices. But one big change is that jQuery 2.0 will not be compatible with old versions of IE and its size is 10% less than the version 1.9.1. The execution efficiency is higher as well. jQuery 1.9.x will still be maintained by jQuery team, they will also provide update for it. Those websites which want to be compatible with all browsers should not upgrade to...
jQuery 2.0,IE support 2013-04-20 07:58:16
Using JavaScript to operate clipboard
Browsers allow JavaScript to read and write data on clipboard. Generally script should not modify user's clipboard to avoid impacting user expectation, but there are cases where this can indeed bring convenience to users. For example, for some code snippet, user can copy it to clipboard with one click instead of select and copy manually. There are three options for clipboard operation provided in JavaScript/browser: document.execCommand() Asynchronous Clipboard API copy and paste events This p...
JAVASCRIPT,CLIPBOARD,NAVIGATOR.CLIPBOARD 2021-01-23 23:23:34
Singleton Design Pattern in Java
Singleton is frequently used in applications where resource may be expensive to create and no instance specific state needs to be maintained. For example, when creating database connection, a singleton may be needed. Today we will share the famous Singleton design pattern in Java. 1. Definition Singleton design pattern is a design pattern that restricts the instantiation of a class to one object. It is one of the most well-known design patterns. 2. Application Singleton ...
DESIGN PATTERN,SINGLETON,MULTITHREAD,JAVA 2020-04-11 02:16:28
Life in Apple design team
While in mentioning about Apple, everyone of us will think of the amazing products shipped out by Apple such as iPhone and iPad. We are all impressed by its smooth design and handy user experience. But as a outsider do you know the story behind the amazing design of Apple? Apple has a team of world class designers and they are leading the fashion of design. What's the life in Apple's design team? Ben Williamson from Apple shared one story of him which can give us some hints on what the life is ...
Mozilla releases a web identity system : Persona
Now almost every website requires the user to register, there are many benefits of registration for a website, such as retaining users, accommodating discussions, providing customized content and so on.But there is too much trouble if each site requires registration, right?Of course, users can also have their own way, for those less important sites, for example, using a unified user name, password and email so that you only need to remember one account. Then, we also see some advanced methods em...
Books for entry level C programmers
In computing, C is a general-purpose programming language initially developed by Dennis Ritchie between 1969 and 1973 at Bell Labs Its design provides constructs that map efficiently to typical machine instructions, and therefore it found lasting use in applications that had formerly been coded in assembly language, most notably system software like the Unix computer operating system.To learn C, we need to read many C books and have many practices. Here we summarize a list of C books which may h...
Access control in Java -- Permission check order
Previously we showed you how to turn on SecurityManager in Java. After SecurityManager is turned on, a series of permission checks will be applied on the code you are calling in your application to protect some resources against malicious access such as files, sockets etc. To perform these permission checks, a set of Permissions will be created and checked using the AccessController. The AccessController has three purposes : To decide whether an access to a critical system resource is to be all...
JAVA,SECURITY,ACCESSCONTROLLER 2016-03-07 04:17:40
The 9 lines of code of Google
Are you still remembering the then hot debated news about Oracle suing Google allegedly copying a small portion of codes from Oracle's Java in 2010. At that time, Oracle experts estimated that Google owes Oracle between $1.4 billion and $6 billion in damages if liable. But the court thought Oracle was eligible only for statutory damages for that copying, which were not expected to exceed a few hundred thousand dollars. At last, Oracle agreed the zero damage result. Are you curious about whi...
Google,Java,Open source 2014-08-15 20:29:52
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>