SEARCH KEYWORD -- APPLICATION
Mobile devices are facing new threats
More and more companies allow employees to use smartphones and tablet PCs in workplace, but they are facing a new potential threat - malware embedded in games and applications.Dan Hoffman, network security company Juniper Networks mobile security director, said the application store is quickly becoming the main delivery mechanism of infected applications. Consumers purchase applications for their equipments through an online application store.As the consumers are free to download applicatio...
Mobile device,Data security,Malicious software 2012-04-05 13:00:57
Why Outsourcing .Net Services is a Growing Trend?
IT companies are focusing more on .net for application development. This is because; the .net platform empowers developers with a wide range of tools and libraries to create diverse applications in an easy and efficient manner. The dot net framework allows users i.e. developers, to design and develop applications that can interact with web services and a range of online devices. .Net programming language is richer than others in many contexts. It has several objects oriented features like proper...
dot net services, outsourcing, .net, framework 2014-10-23 22:30:43
Different ways to print "Hello world" in Java
This post is not about best practice to print "Hello world" in Java, it is about exploring different capabilities offered by Java. Also there are articles about printing "Hello world" in different programming languages, but this post is not about that. Standard literal The most commonly used way is to use System.out to print"Hello world". System.out.println("Hello world"); Enumeration An enumeration can define a set of values belonging to one category. For example, an enumeration for all months ...
Using Angular 2 with Asp.Net MVC/Asp.Net Core
Asp.net development professionals bring this post to explain the use of Angular 2 with Asp.net MVC/ Core. You will read the overview of Angular 2 and Asp.net Core at first in this post. Read the article to find how experts use Angular 2 with MVC / Core. Angular 2 Overview Angular 2 is the upcoming version of MV framework used for creating high level applications in browser. It contains everything needed to create a complex mobile or web apps from a variety of templates. Angular team recently re...
ASP.NET DEVELOPMENT,ANGULAR 2, ASP.NET MVC 2016-10-29 05:15:06
Example of less is more
Less is more is a very important design principle. It is as important as the 80:20 principle. It means that which is less complicated is often better understood and more appreciated than what is more complicated; simplicity is preferable to complexity; brevity in communication is more effective than verbosity. Next we will use an animated image to describe what is less is more. The popularity of flat design in web application design also proves the importance of less is more. Many famous compan...
Less is more,Flat design 2013-09-20 07:20:43
PaaS vs. SaaS: The Differences And How To Pick The Right Option
Platform as a service (PaaS) and software as a service (SaaS) are two kinds of cloud computing products that enable businesses and their clients to deliver and use various services, respectively. Before diving into the differences between the two concepts, it’s important to take a step back and understand what a cloud service really is. Cloud computing primarily refers to large storage of data, programs, and operations that are accessible via the Internet and are not stored on a user&rsquo...
An easy way to log client side information to server
JavaScript debug is a very troublesome thing in web application development. Because many web browsers will not notify you if there is any error in the JavaScript codes you write. They just silently fail and block the following codes execution. In order to debug JavaScript codes, we need a good log mechanism which will help us log the error information,, we often need to log errors in JavaScript codes to server for debug purpose in a production web application, What should we do? The first ...
JavaScript log, Ajax,Image,Debug 2012-12-30 09:16:50
4 ways to obtain access token in OAuth 2.0
OAuth 2.0 is an authorization mechanism, it's ,mainly used for issuing access token. There are 4 ways to obtain access token as per RFC 6749. Authorization code Implicit Password Client credentials The third party application must obtain a client id and client secret from the target service before obtaining access token no matter which method to use. This is to prevent token to be used maliciously. Authorization code With this method, the third party application must first get an authorization...
OAUTH2,ACCESS TOKEN,REFRESH TOKEN 2019-06-29 07:12:03
NativeScript-Vue 1.0 Is Finally Out!
After a year of hard work and dedication, NativeScript-Vue 1.0 is finally available in the market. For those who are new to NativeScript- Vue, it is all about a plugin that simply allows one to build native iOS and Android apps with the help of Vue.js. NativeScript-Vue 1.0 is ready for use in production! And it may quite interest you to know that blending of NativeScript and Vue makes it even easier when it comes to building mobile apps. This launch comes with a shiny new website and extensive d...
JAVASCRIPT,HYBRID APP DEVELOPMENT,NATIVESCRIPT,VUE.JS,MOBILE APPLICATION 2018-02-26 00:14:03
Jack Ma's interviews during Alibaba's IPO at NYSE
Alibaba has been listed on NYSE on 19 September. It becomes the largest IPO ever in the history of US stock exchange, larger than Facebook then the largest one. And after the trading closed on Friday, its share price closed at $93.89 per share, this makes it the second largest Internet company in the world following Google. Jack Ma, the founder of Alibaba, also becomes the richest person in China with a total wealth of $18.1 billion. He accepted interviews from different media during the IPO. Le...
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>