Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- USER EXPERIENCE



  The State of Digital Commerce and Smartphones

The ubiquitous nature of the smartphones and other mobile devices has given rise to a highly informed and connected consumer base. They walk into a retail outlet and they would already be whipping out their mobile devices to compare products or prices available in-store to those available online. Moreover, they expect the retailers to be well aware of not only the merchandise, but also about promotions and discounts on offer. Interestingly, the number of e-commerce transactions has been on the r...

   Ecommerce Web Development Company, Android App Developers     2015-09-09 04:57:31

  4 ways to obtain access token in OAuth 2.0

OAuth 2.0 is an authorization mechanism, it's ,mainly used for issuing access token. There are 4 ways to obtain access token as per RFC 6749. Authorization code Implicit Password Client credentials The third party application must obtain a client id and client secret from the target service before obtaining access token no matter which method to use. This is to prevent token to be used maliciously. Authorization code With this method, the third party application must first get an authorization...

   OAUTH2,ACCESS TOKEN,REFRESH TOKEN     2019-06-29 07:12:03

  Password-less login

Most websites need user login in order to provide personalized content to visitors. The usual way is to request user to register an user account. Actually, this is not so appealing since if we need to remember one password for each website, it's troublesome, while for developers, it's their responsibility to protect password, once password is leaked, then it's a big headache to a website's business and reputation. So long time ago people started thinking about password-less login, this is a big ...

   Password-lesslogin,Authentication     2012-11-05 12:29:55

  Stanford Computer Science '10-'11 Salary Survey Results

CS/EE UndergradsData: I received 140 responses which described 360 job offers. 95% of the job offers were primarily located in the Bay Area, 5% were from the Midwest and East Coast. 10% of the job offers were from start-ups.Salary offers ranged from $64,400 to $100,000. The average salary offer was $79,914. The median salary offer was $ 82,200.About 70% of students were offered stock options. About 80% of students were offered signing bonuses. And about 60% were offered relocation assistan...

   Stanford,Computer science,Salary,Survey     2011-12-25 00:54:41

  Pagination or continuous scrolling? It's a question

No matter in web page or mobile applications, information often can not be displayed on one page all alone, there needs some interactive modes which can expand page information: Pagination and Continuous Scrolling are very common interactive modes. Every day we may see them, they are so common that we do not even feel their presence, when browsing to the bottom of the page, we will see it. But it's difficult to choose which mode to use in design. Here we have a discussion on these two modes. Pag...

   Pagination,Continuous scrolling,Design     2012-09-12 19:55:51

  Designing Great API Docs

Writing documentation is one of those things that is dreaded by many developers. It takes a lot of effort and time to get right. And too often, people take shortcuts. This is sad, because well designed documentation is the key to getting people excited about your project, whether it's open source or a developer focused product. In fact, I argue that the most important piece of UX for a developer product isn't the homepage or the sign up process or the SDK download. It's the API documentati...

   API docs,Design API docs,Advice     2012-03-09 23:15:00

  Use of log in programming

Usually, The purposes of log are for troubleshooting and displaying program running status. Good log will help us locate the error easier. Many programmers think log in programs is very simple, but it's not an easy task to write log codes to efficiently locate the error. Here we discuss about program log in three aspects: Where to log What to log Log styles to be avoided Where to log 1. When calling external functions When your program is calling some external functions which are not written b...

   Log, Programming,Debug     2012-11-28 11:42:23

  Amazon unveils 8.9" Kindle Fire HD

Amazon today unveiled 7 products of Kindle family, including the $69 new Kindle; Kindle Paperwhite WiFi/3G, priced at $119 / $179; 7-inch Kindle Fire regular edition/HD version, $159/$ 199; 8.9inch Kindle Fire HD with WiFi/4G Edition at $299 /$499. However, the Amazon phone did not show up. The 8.9-inch Kindle Fire HD is today's highlight, because it looks real similar to iPad. Kindle Fire HD has the following features: 1920 x 1200 resolution, 254PPI Texas Instruments OMAP 4470 proce...

   Amazon,Kindle Fire HD,tablet     2012-09-06 19:12:05

  What will happen after Baidu acquires PPS?

One month ago there was some news that Ai Qiyi would acquire PPS through Baidu Now this has been confirmed, Baidu will spend $400,000,000 on acquiring Shanghai Public Source Network Co., Ltd. (PPS). After completion of the acquisition, Ai Qiyi will likely change the overall content and production line of PPS so that they can complement each other's shortages. Many people are optimistic about this merger, Ai Qiyi can complement its shortage on PC side and PPS can also get more copyrighted film an...

   Ai Qiyi,Sohu,Youku,PPS,acquisition     2013-04-26 22:53:12

  Android Hardware Buttons are not broken, let me tell you why

This post is written as a reaction on Christoffer Du Rietz’s article The Android Hardware-Buttons Are Broken. In his article Christoffer explains how the Android back button shows inconsistent behavior like doing different actions when it is used on the same screen.In the following article I will try to explain that this behavior is not broken. Instead it is exactly what the Android developers had in mind while designing the back button behavior.The way the back button is broken according...

   Android,Hardware,Button,Protect     2011-11-03 13:38:21