Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- COMMON UI/UX MISTAKES



  Open Letter to sites with annoying interfaces

Remember those childhood games where you are given two nearly identical images and your objective was to find some number of subtle differences? Well, I shouldn't have to play that game when I'm using your damn website. I show here two examples of a common practice that is plaguing the modern web. First, a clipping from a project page on github.com.     And now the second image:     See the difference? My question is this: why? That edit button is the only component of...

   Web design,User interface,User friendly,Layout     2011-12-27 09:32:10

  HTTP is not a transport protocol, HTTP is not RPC

Recently there was a question on the forums asking why we encourage usage of HttpRequestMessage<T> / HttpResponseMessage<T> in the signature of a web api implementation. The point made in the post is that if you have an ICalculator contract which your API implements, then it’s violating SOC / inappropriate to have those messages as params and in the contract. The argument is valid when looking at HTTP from the standpoint of an RPC mechanism, which is actually a quite co...

   HTTP,Transport protocol,RPC     2012-01-19 10:14:26

  JSP connect MySQL

To connect MySQL with Java Server Page(JSP). Some steps should be followed:Step 1: Download MySQL JDBC connector driver from the Internet. URL:  http://dev.mysql.com/downloads/connector/j/Step 2: Put the jar file downloaded in Step 1 in the Tomcat common lib folder and add this jar file to the CLASSPATH so that the JSP page can find the specified class.Step 3: Create the JSP page with MySQL connection : Example is shown below:        <% String driver="com.mysql.j...

   MySQL,JSP,Connection,Driver,Download     2011-05-11 10:04:57

  A New Experimental Feature: scoped stylesheets

Chromium recently implemented a new feature from HTML5: scoped stylesheets, aka. <style scoped>. A web author can limit style rules to only apply to a part of a page by setting the ‘scoped’ attribute on a <style> element that is the direct child of the root element of the subtree you want the styles to be applied to. This limits the styles to affect just the element that is the parent of the <style> element and all of its descendants. Example Here’s a...

   HTML5,Style,Draw,Use case     2012-03-23 12:11:47

  Expectations, Desperation And Anticipation All You Need To Know About iOS 9.3

With so much anticipation filled among the audience, iOS 9.3 on contrary came out to be as a blooper. All the users were filled with a lot of enthusiasm about the latest advancements in the software, but the final release went to several crest and troughs. iOS 9.3 was quite important for the users when it comes to mobile OS update, however this did not go as it was expected to be for the iOS. The latest software in some cases is locking users. Along with the users this has also creased the eye ...

   IPHONE APP DEVELOPMENT,IPHONE APP DEVELOPER,IOS DEVELOPER,IOS APP DEVELOPMENT,IPHONE APP DEVELOPERS     2016-04-11 03:05:15

  XML Abuse

It’s everywhere. XML Abuse. From Domain Specific Languages to Data Serialization, XML is the most commonly abused data format I’ve ever encountered. XML is perfectly fine for (because it was designed for this): First of all: XML was designed to be written by humans and read by humans. Nearly all generated XML I’ve seen sucks badly. I think this is because XML cannot efficiently represent common data structures found in programming languages.XML is good...

   XML,Abuse,Alternative,Serialization,Data storage     2011-12-14 07:12:10

  bcrypt: Safeguarding Passwords with Strong Hashing and Adaptive Security

Introduction In today's digital world, passwords play a crucial role in protecting personal privacy and information security. Passwords are the most commonly used means of authentication because they are simple yet effective. Password security is the cornerstone of cybersecurity and plays a fundamental role in safeguarding the information security of individuals and organizations. However, with the increasing frequency and complexity of cyberattacks, traditional password hashing algorithms like ...

   BCRYPT,SECURITY     2023-11-15 08:14:35

  GitHub Copilot may generate code containing GPL code

GitHub Copilot is a new AI-powered code completion tool that can generate code snippets from natural language descriptions. It is powered by OpenAI Codex, a deep learning system that has been trained on billions of lines of public code. GitHub Copilot claims to be a “copilot, not a pilot”, meaning that it is not intended to write code for you, but rather to help you write code faster and better. However, some developers have raised concerns about the legal and ethical implications of...

   GITHUB COPILOT,GPL     2023-04-21 14:21:29

  Microsoft’s “Picture Password”: A Breath Of Fresh Air On The Lock Screen, Of All Places

Remember that feeling you got back when Steve Jobs was unveiling the iPhone, and he did the “slide to unlock” gesture for the first time? I remember the way he said it – “You like that? Want to see it again?” Since then I haven’t seen a lock screen interface that has made me feel that same “how obvious, how elegant!” feeling – until today at the NVIDIA press conference, and later at the Microsoft keynote here at CES. It sounds a little silly...

   Microsoft,Windows 8,Picture Password,CES     2012-01-10 06:55:28

  10 Reasons Why Visual Basic is Better Than C#

Visual Basic is a better programming language than Visual C#. Who says so? This article! Here are 10 reasons why you should always choose VB over C#. 1 – “Rose is a rose is a rose is a rose” This is a quotation from Gertrude Stein’s 1922 play Geography and Plays. However, the poetry wouldn’t work in C#, because – unforgivably – it’s a cASe-SeNSitIvE language. This is madness! Before I start ranting, let me just acknowledge that case-sens...

   Visual basci,C#,Advantage,Comparison     2012-03-10 04:24:03