Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Share



  Kicking ass together: How to improve coding skills as a group

Over the last year and a half, I have worked with a small group of students and staff to create an excellent online learning community at Mendicant University. Unfortunately, because Mendicant is something that we’re intentionally scaling at a very slow pace, we won’t directly reach as many people as we’d like to any time soon. In this post, I’ve collected some of the things that I think contribute to making Mendicant University a great place to learn. I’d love...

   Code skill,Group,Improvement,Efficiency     2012-01-31 23:59:33

  PHP to get access token for Twitter app

Previously we wrote an article about getting access token for Facebook app--PHP to get access token for Facebook app. Today we will introduce how to get access token for Twitter app using PHP. Since now Twitter is also using OAuth 2.0 to allow some web apps to access some users information on behalf of one user. They provided some APIs for developers to easily get them integrated with their own websites. The first step to get all these done is how to get the access token, the access token seems ...

   Twitter,OAuth,access token,PHP     2013-03-03 03:49:26

  Telecom elements in WeChat

As an engineer who spends much time on focusing on WeChat like applications(Skype, Fring, Viber, Kik Messenger, WhatsApp, Talkbox, LINE, Kakao Talk) , I would like to share with you the telecom element in WeChat to show the inheritance and integration of traditional telecom services in the Internet service and applications.First, WeChat is an application to send messages, the fully IP-based messaging capabilities may replace the traditional telecom services such as SMS, MMS and VMS ,This is ver...

   WeChat,Telecom operator     2013-04-13 20:29:46

   7 Incorrigible Mistakes Of Mobile App Design

Plethora of mobile apps are launched every day, let alone a month or a year. With such a rising competition making an app which is not liked by people is a committal sin not just from a user's perceptive but also due to so many people and their efforts attached to it. In this blog we will discuss some of the very important factors which one should know before crafting an app. It's obviously not worth crying over the split milk as 80% of the users not even open an app again if they encounter ...

   Mobile App     2015-06-18 08:08:48

  GitHub : Code is the most direct way for programmers to communicate

If not invested by Andreessen Horowitz, GitHub might not be noticed by Forbes, CNN, New York Times. People didn't know this tool because it was very far away from the world -- GitHub is a project hosting service used by programmers.But to some programmers, it is not just a place for project hosting, it is`also the hub for open source projects, a place for programmers improving themselves and a social network for programmers.There are around 3.26 million projects hosted on GitHub currently, inclu...

   GitHub,Open source,Hosting,Social     2012-07-20 11:38:31

  Is Java Set ordered or not?

“Is Java Set ordered or not? ” is the most popular question asked when you interview for a Java Developer position. Many fail to answer it, and I have to admit I was one of the many. I have known the answer is “Yes and No” for a long time. No. HashSet is not ordered. Yes.TreeSet is ordered. If the interviewer continues with some follow up questions, I’m not confident that I know the answer then. Why is TreeSet ordered? Are there any other ordered S...

   ORDER,SORTEDSET,HASHSET,JAVA     2021-02-11 06:55:00

  How Java Application Developers Can Build Secure Internet Based Apps?

There are few compiled solution tested by experts to guide Java application development and maintenance team how they can start safe journey on Internet. Strong encryption, wise passwords, secure hardware are few of the tech tools that should be used by Java app development team to secure their Internet based apps.   The Internet is most amazing yet most risky platform where nobody knows either they are doing safe transaction on Internet or there is some dog watching out for data packets t...

   JAVA APPLICATION MAINTENANCE,JAVA APPLICATION DEVELOPMENT     2015-09-16 02:13:17

  Learn about the Benefits of Providing an Engaging Onboarding Experience to your customers

Learn about the Benefits of Providing an Engaging Onboarding Experience to your customers A good onboarding experience helps create a positive first impression and makes your customers feel valued and helps convert leads into paying customers. Effective onboarding experiences also increase conversions and keep customers. High-quality onboarding experiences build brand awareness. Customers notice when businesses take time to engage with them. They even notice when businesses care about them and t...

   ELEARNING,EDUCATION     2022-08-26 21:41:17

  Silicon Valley engineers have something to say about work from home

Quitting from Google and joined Yahoo which was thought as a declining giant, Marissa Mayer has been trying to prove that she has the ability to lead this Internet giant to reverse the decline. In order to boost the low morale of the employees, Meyer tried to transplant Google's work culture to Yahoo with office decoration, free lunch and issuance of smart phones, these generous measures let her win the applause of the Silicon Valley.But a recent ban issued by Meyer has attracted a lot of contro...

   Work from home,Yahoo, Marissa Mayer     2013-03-07 02:39:23

  4 ways to obtain access token in OAuth 2.0

OAuth 2.0 is an authorization mechanism, it's ,mainly used for issuing access token. There are 4 ways to obtain access token as per RFC 6749. Authorization code Implicit Password Client credentials The third party application must obtain a client id and client secret from the target service before obtaining access token no matter which method to use. This is to prevent token to be used maliciously. Authorization code With this method, the third party application must first get an authorization...

   OAUTH2,ACCESS TOKEN,REFRESH TOKEN     2019-06-29 07:12:03