SEARCH KEYWORD -- Information
Touching and Gesturing on iPhone, Android, and More
One of the most important parts of creating an effective and intuitive user interface on touch-enabled smartphones has nothing to do with visual appearance—instead, it has to do with creating an interface that properly responds to user input based on touch. For Web applications, this means replacing mouse events with touch events. In Dojo 1.7, new touch APIs help make this process easy. This is an updated version of the post Touching and Gesturing on the iPhone, published in 2008. I...
Android 4.0+ occupies quarter of Android market
Google updates its developer page about Android platform version market share. From the latest data, we can find Android 4.0 and above system occupy around 25% of all Android market. But Android 2.3 Gingerbread still occupies over 50% of Android market. From the above chart, Android 4.0 has 23.7% market share, the latest Android 4.1 JellyBean takes 1.8%, these two have 25.5% market share in total. But Android 2.3 Gingerbread alone still dominates the Android market, it takes 55.8% market share....
Some laws of interactive design
The well known quote from Alan Cooper is Conforming to the standard unless there is a better choice. There are some best practices in interaction design. How many do you know? 1. Fitts' Law The time from one start point to target point is determined by two parameters: The distance to the target and the size of the target. )D and W in above picture), the formula is : T=a+blog2(D/W+1). It was first proposed by Paul Fitts, it is mathematical model used to predict the time from any poin...
interaction design, laws, Fitts' law 2012-11-16 11:25:24
C programming tips in SPARC architecture
If you are a newbie of C programmers in SPARC architecture (For example, working on Solaris), you should pay attention to the following tips:(1) By default, SPARC is big-endian (For Endianness, you can refer http://en.wikipedia.org/wiki/Endianness). It means for an integer (short, int, long, etc), the MSB will be stored in the lower address, while the LSB will be stored in the higher address. (2) SPARC requires byte-alignment. It means for a short (2 bytes long) variable, the star...
C 2014-06-01 03:56:30
Internet trends and your web development strategy
Takeaway: Ryan Boudreaux looks at some of the latest reports on how users are spending their time on the web. Keeping an eye on trends is one way for web developers to stay current. Recent figures in Internet activity include several interesting trends, including: the number of smartphone-user adoption rates Cyber Monday sales figures mobile banking app usage social networking on mobile social media hours spent online search habits Trends in worldwide Internet activity may or may not translate ...
Internet trend,Mobile,Web design,Web app 2012-02-01 00:02:29
Top rules you can't afford to miss while developing a Magento website
A powerful and attractive website has become a vital necessity of every online entrepreneur. Whether its about boosting the inflow of customers or enhancing the overall profitability of your business, a good website can do all the hardwork. The growing demand and popularity of Magento development services has made online merchants switch to Magento for promoting their business products and services via the internet. As a website creator, it is absolutely essential for you to consider some basic...
Magento development service, offshore Magento development, outsource Magento development, Magento de 2015-06-19 04:21:55
Transparency in Cloud Services
37signals recently launched public “Uptime Reports†for their applications (announcement). The reaction on Hacker News was rather tepid, but I think it’s a positive development, and I applaud 37signals for stepping forward. Reliability of cloud applications is a real concern, and there’s not nearly enough hard data out there. Not all products are equally reliable; even within 37signals, the new reports show a 3:1 variation in downtime across apps. That said, ...
Cloud,Transapency,37signals,Announcement 2012-01-10 07:24:02
When a CA becomes untrustable
Information security has become a vital part of people's life, especially for those people who spend much time online. Tons of data are being transmitted over the internet every second. These data include user ids, passwords, credit card information etc and some of them are sensitive information which needs secure way to transmit. Hence different protocols have been developed including SSL/TLS to encrypt data transmitted over the internet. The core of these security protocols is the certifi...
APPLE,SECURITY,GOOGLE,MOZILLA,NEWS,WOSIGN 2016-10-01 23:03:44
China has blocked Wikipedia again
Recently lots of Chinese found they experienced problems while trying to access Wikipedia, the world's largest and most well-known free encyclopedia. It turns out that the notorious Chinese GFW(Great Firewall) is playing the critical role here. It blocks the Chinese version of Wikipedia. The reason why the Chinese version of Wikipedia is blocked is said to be that Wikipedia has changed its default protocol from HTTP to HTTPS. This change made it difficult for the GFW to filter some sensiti...
Build your own internet search engine - Part 2
After having started to build my own internet search engine as described in a previous blog post, I now have read some papers and books about web search engine architecture and information retrieval to complete my hobby project. Here is a list of papers and books that I highly recommend to anybody who is interested in this topic: 1. Google: data structures and algorithms by Petteri Huuhka 2. The Anatomy of a Large-Scale Hypertextual Web Search Engine by the Google founde...
Search engine,Paper,Database,Data structure 2011-12-22 08:25:59
RECENT
- The Role of Coding Skills in Advancing Tech Careers
- Tips for Socializing With Friends During College
- Proximity Cards Do More Than Just Open Doors
- How to choose quality painted auto parts
- Oval engagement rings from MoonOcean: Elegance of form and individual approach
- Hologres vs AWS Redshift
- GoLand connect to Hologres
- A journey to investigate a goroutine leakage case
- Understanding Slice Behavior in Go
- Breaking Barriers: How 3D Printing is Democratizing Product Development
- more>>