Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Share button



  A Guide on Creating a Magento 2 Extension

Normal 0 false false false EN-US X-NONE X-NONE

   MAGENTO, MAGENTO 2,MAGENTO 2 MODULE CREATOR     2016-02-29 03:08:08

  How Java Application Developers Can Build Secure Internet Based Apps?

There are few compiled solution tested by experts to guide Java application development and maintenance team how they can start safe journey on Internet. Strong encryption, wise passwords, secure hardware are few of the tech tools that should be used by Java app development team to secure their Internet based apps.   The Internet is most amazing yet most risky platform where nobody knows either they are doing safe transaction on Internet or there is some dog watching out for data packets t...

   JAVA APPLICATION MAINTENANCE,JAVA APPLICATION DEVELOPMENT     2015-09-16 02:13:17

  Learn about the Benefits of Providing an Engaging Onboarding Experience to your customers

Learn about the Benefits of Providing an Engaging Onboarding Experience to your customers A good onboarding experience helps create a positive first impression and makes your customers feel valued and helps convert leads into paying customers. Effective onboarding experiences also increase conversions and keep customers. High-quality onboarding experiences build brand awareness. Customers notice when businesses take time to engage with them. They even notice when businesses care about them and t...

   ELEARNING,EDUCATION     2022-08-26 21:41:17

  Silicon Valley engineers have something to say about work from home

Quitting from Google and joined Yahoo which was thought as a declining giant, Marissa Mayer has been trying to prove that she has the ability to lead this Internet giant to reverse the decline. In order to boost the low morale of the employees, Meyer tried to transplant Google's work culture to Yahoo with office decoration, free lunch and issuance of smart phones, these generous measures let her win the applause of the Silicon Valley.But a recent ban issued by Meyer has attracted a lot of contro...

   Work from home,Yahoo, Marissa Mayer     2013-03-07 02:39:23

  4 ways to obtain access token in OAuth 2.0

OAuth 2.0 is an authorization mechanism, it's ,mainly used for issuing access token. There are 4 ways to obtain access token as per RFC 6749. Authorization code Implicit Password Client credentials The third party application must obtain a client id and client secret from the target service before obtaining access token no matter which method to use. This is to prevent token to be used maliciously. Authorization code With this method, the third party application must first get an authorization...

   OAUTH2,ACCESS TOKEN,REFRESH TOKEN     2019-06-29 07:12:03

  Handy PHP functions should be in your toolkit

When developing projects, there are always some common work should be accomplished, for example, encrption/decryption, get IP. As a PHP developer, you should have a list of the handy functions in your toolkit so that you can pick up in every project you work on. Here is a summary of some handy PHP functions. 1. PHP encryption/decryption Encryption/decryption can be used when storing user confidential information such as passwords. Below function uses base64 and MD5 to accomplish encryption/decry...

   PHP,function,real IP,SQL injection     2014-12-06 08:46:08

  What I learned from a month of blogging and 250k visits

Roughly a month ago, I decided to give blogging another try, in earnest. I put out an article most days and up to 3 per day when I was experimenting with new channels.It has been fascinating.That being said, this is not a post about blogging tactics. It’s about what the experience has taught me about startups.Find the customers first, then build for themIt took me a long time to understand YC’s motto that you should:Make something people want.The first time I heard that, ...

   SEO,Promote,Website,Advice,Traffic     2011-11-10 10:58:40

  Top 10 Tell Tale Signs Your Computer Has a Virus

The true genius of the 'computer' is its ability to make human lives easier. This is only achieved from the ability of running software such as word processing, number crunching with Excel or learning from the worlds largest source of knowledge, via web browsers. Today being connected to the internet is fundamental to leading a productive modern life. While internet is a boon it comes with its own share of problems. As internet users increase so does the instance of com...

   COMPUTER VIRUS, INTERNET SECURITY, DATA SECURITY, ANTIVIRUS, COMPUTER REPAIR     2017-03-19 21:05:12

  5 Things You Can Do to Protect Your Data

The average cost of a data breach is $148 per record. Records include everything from personal addresses to birthdates to even more sensitive data, like Social Security Numbers and business files. Each year, these hacks cumulatively cost billions of dollars to companies and individual users. Nonetheless, like many other criminals, hackers tend to prey on easy targets. By following these essential steps, you’ll be able to ensure your data is always kept safe. 1) Use a File Encryption Servic...

   DATA SECURITY     2019-08-20 08:35:54

  Dieter Rams' 10 principles of good web design

Dieter Rams is one of the most important designers of the 20th century but his famous 10 principles for good design focused on industrial design. Here Lisbon-based designer Nuno Loureiro applies them to web design “My heart belongs to the details. I actually always found them to be more important than the big picture. Nothing works without details. They are everything, the baseline of quality”  â€“ D...

   Web design,Principle,Innovation     2012-02-08 10:29:32