SEARCH KEYWORD -- User base



  Mobile payment status quo in Singapore

Currently there are lots of mobile payment companies operating in Singapore, these players include GrabPay(a subsidiary of Grab), AliPay, WeChat Pay, Fave Pay, NETS Pay and some others. In some hawker centers, you can see QR code from different companies. This brings lots of benefits to users. But this introduces a big headache to consumers as they have to download different apps to use in different merchants. There is no dominating mobile payment company in Singapore though there are a few lead...

   SINGAPORE,GRAB,GRABPAY,ALIPAY     2019-02-27 07:19:49

  Weibo is testing an Instagram like app called Lvzhou

Weibo, the Chinese version of Twitter, is testing an Instagram like app called Lvzhou(Oasis in English). Now only invited people can access the app. You can download the app on App Store if you are an iPhone user or you can download online if you are an Android user. The vision of this app is to allow users to discover beautiful world, users can post photos or short videos and share with the rest of the world. Before you can access the app, you have to obtain an invitation code shared by y...

   INSTAGRAM,WEIBO,LVZHOU,OASIS     2019-09-07 09:59:54

  App Store Visibility – A Few Do’s and Don’ts

Discovery and Visibility are the two vital components for any mobile app, if the app publishing company is to derive some amount of revenue from their apps. However, the lack of organized marketing channels, a well-laid user acquisition strategy or even a poorly designed app often reduces the chances of being widely adopted by the users. In short, it hampers the possibility of the app being successful. Here is a list of few things to keep in mind while posting an app to the app stores. What to ...

   Mobile Application Development Company, Android App Development Company, Mobile App Company, Android     2015-09-01 07:52:24

  Amazon is a good company but doesn't have the best business model

Public opinion about a company is usually based on its performance. If it performs well, people will praise it, otherwise people will blame it. In 1999, Apple was still a broken apple(Steve Jobs's talent and effort was paid off yet). Public opinion about Apple was the closed model caused Apple's failure. They built hardware themselves, developed software themselves and delivered service themselves, this is certainly not sustainable. But Steve Jobs let everyone see this new model. In order to con...

   Business model,Amazon,Apple, Microsoft     2013-07-02 11:34:45

  SameSite attribute in cookie

Starting from Chrome 51, a new attribute SameSite has been introduced for browser cookie. This attribute is to prevent CSRF attack. Cookie is normally used to store data exchanged between client and server. It frequently stores user login information. If a malicious website can forge a HTTP request with the valid third party website cookie, it may be called a CSRF attack. For example, if a user logins to a bank website your-bank.com, the bank server responds a cookie: Set-Cookie:id=a3fWa; L...

   JAVASCRIPT,COOKIE,SAMESITE,CHROME,CSRF     2019-09-14 04:57:51

  Three ways to define class in JavaScript

In object oriented programming, class is the template of object, it defines the properties and methods of a group of objects. Unfortunately, JavaScript doesn't support class, but we can have some workarounds to simulate class.1. Constructor functionThis is the classical approach, it is also the approach mentioned in many text books. It uses the constructor function to simulate class and it uses the keyword this to represent the object internally.function Cat() {  this.name = "Kelly...

   JavaScript,Class,Method,Private,Inheritance     2012-07-09 11:59:51

  Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base

Project Design Purpose : The primary goal of this article is to explore how to deploy DeepSeek-R1 an open-source large language model (LLM), and integrate it with a customized Retrieval-Augmented Generation (RAG) knowledge base on your local machine (PC/server). This setup enables the model to utilize domain-specific knowledge for expert-level responses while maintaining data privacy and customization flexibility. By doing so, users can enhance the model’s expertise in specific technical ...

   LLM,RAG,DEPLOYMENT     2025-02-10 00:17:37

  CRM Approach - A Well Planed Business Strategy Not a Mere Technology

Customer relationship management (CRM) has transitioned and evolved over the last few years.  Its adoption is powered by the rapid growth and popularity of SaaS tools. Too many companies have adopted CRM in order to cater to customers in a better manner and hence build loyalty. However, often implementing CRM does not yield the results as expected. CRM policies turn out to be ineffectual. This happens because, organizations over emphasize on CRM as a technology and undermine its importanc...

   customer relationship management services, CRM development, CRM Solutions, customer service manageme     2014-08-28 05:50:49

  Useful functions to provide secure PHP application

Security is a very important aspect of programming. There are many functions or modules in any kind of real programming language providing security functionalities  In modern websites, we may often get inputs form users all around the world.There is a famous saying which says that never trust user input. So in web programming languages, we will often see functions which will guarantee the security of the data input from users. Today we will cover some of these functions in the most famous o...

   PHP,security,SQL Injection,XSS,AJAX     2014-10-30 04:21:59

  Difference between localhost and 127.0.0.1

Lots of people would think what the address 127.0.0.1 is when first seeing this address. In fact, 127.0.0.1 is a loopback address which refers to the local machine. It is generally used for local testing. When typing ping 127.0.0.1 on local command console, it will send network packets to local IP/TCP layer to test whether IP/TCP works properly or not.  To those who are used to use localhost, it is actually mapped to 127.0.0.1 by default. There are hosts files in the system which store this...

   LINUX,NETWORK,LOCALHOST,127.0.0.1,LOCALHOST VS 127.0.0.1     2018-09-29 22:11:12