SEARCH KEYWORD -- Web blog
Password-less login
Most websites need user login in order to provide personalized content to visitors. The usual way is to request user to register an user account. Actually, this is not so appealing since if we need to remember one password for each website, it's troublesome, while for developers, it's their responsibility to protect password, once password is leaked, then it's a big headache to a website's business and reputation. So long time ago people started thinking about password-less login, this is a big ...
Password-lesslogin,Authentication 2012-11-05 12:29:55
How to let Google index AJAX contents?
There are lots of websites containing only one page now with the popularity of AJAX. The website will load different contents according to different inputs from users. This approach provides good user experience and it also helps save bandwidth, the drawback is that AJAX contents are not easy to be indexed by search engines. For example, if you have a website: http://example.com Users can see different contents with the appended # structure in the URL: http://example.com#1 http://example.com#2 h...
AJAX,Search engine,Google,History 2013-07-16 00:47:14
UIWebView Secrets - Part1 - Memory Leaks on Xmlhttprequest
My first blog post on iphone subject reveal a big memory bug when using UIWebView component. This is the (only one) component to display some HTML content in an iphone interface. UIWebView object has a lot of differents issues and I’m going to highlight the biggest of them. Actually, all XMLHttpRequests used in javascript code are fully leaking!!! I mean when you do a request that retrieve 100ko of data, your memory used grow up for 100ko! This bug is not always active, but almost always....
XMLHttpRequest,Memory leak,Mobile device,UIWebView 2011-11-25 13:46:30
Four reasons we don’t apply the 80/20 rule
Why can’t we make more use of the 80/20 rule? I’ll review what the 80/20 rule is, explain how it can be powerful, then give four reasons why we don’t take advantage of it. What is the 80/20 rule? The 80/20 rule is amazing when you first learn about it. It says that efforts and results are often very unevenly distributed. You’ll get 80% of your results from the first 20% of your efforts. For example, maybe your top 20% of customers will provide 80% of your profit. O...
80/20,Development,Profit,Revenue,Effort 2012-02-08 10:03:50
What is Deep Web- all you need to know about it?
Deep web is the most nefarious out of sight underground area that exists and not accessible to the public domain. The deep web sites cannot be accessed through standard search engines. Many experts believe to have compared this part of the internet hidden from paywalls and forms. The truth is that deep web is a hidden iceberg while the usual internet available to the public domain is just the tip of the iceberg. That part of what is available from search engines such as Bing or Google ...
A Javascript When Function
function when(conditionFunc, execFunc, interval){ if (conditionFunc()){ execFunc(); }else{ setTimeout(function(){ when(conditionFunc, execFunc, interval);}, interval); } } You have some code which should only execute when a condition is true. E.g. You have code which relies on a javascript library but can't be sure the library has loaded yet and don't want the code to execute until it has. This is common if you have a bookmarklet which injects more than one <...
JavaScript,When,Implementation,When function 2012-02-24 05:08:34
SameSite attribute in cookie
Starting from Chrome 51, a new attribute SameSite has been introduced for browser cookie. This attribute is to prevent CSRF attack. Cookie is normally used to store data exchanged between client and server. It frequently stores user login information. If a malicious website can forge a HTTP request with the valid third party website cookie, it may be called a CSRF attack. For example, if a user logins to a bank website your-bank.com, the bank server responds a cookie: Set-Cookie:id=a3fWa; L...
JAVASCRIPT,COOKIE,SAMESITE,CHROME,CSRF 2019-09-14 04:57:51
3 meanings of Stack
We may frequently see stack when we read programming books. But many times we may be confused about the different meanings of it. This term actually has three common meanings. Here we explain the three different meanings of Stack in programming. 1. Data structure The first meaning of Stack defines a method for storing data. Its feature is LIFO9Last In First Out). In this data structure, data are accumulated level by level. The data last put in is added at the top of the stack. When using the dat...
Stack,Memory,Data structure 2014-02-24 04:56:46
Is Shared Hosting Secure?
Shared hosting is incredibly popular with users who are looking for the cheapest hosting available – the problem is that along with the low price you get poor performance and even more concerning – questionable security. When running on a shared host dozens if not hundreds of other sites are running on the same servers – this means any single security flaw in any of those applications can compromise the entire server. This dramatically increases the odds of your ...
Shared hosting,Virtual host,Security,Data security 2012-02-14 10:48:59
Necessary Elements for Developing a Website
Website has given businesses a great way to communicate with their existing customers. Without a user-friendly and attractive website, you may not receive as many customers as you may have expected prior launching your website. Therefore, it is usually advisable to outsource your web development services to one of the best web development companies in Singapore. Web development services in Singapore ensures proper development of your website without missing out on any important element. These a...
WEB DEVELOPMENT SERVICES IN SINGAPORE 2015-09-30 07:07:27
RECENT
- The Role of Coding Skills in Advancing Tech Careers
- Tips for Socializing With Friends During College
- Proximity Cards Do More Than Just Open Doors
- How to choose quality painted auto parts
- Oval engagement rings from MoonOcean: Elegance of form and individual approach
- Hologres vs AWS Redshift
- GoLand connect to Hologres
- A journey to investigate a goroutine leakage case
- Understanding Slice Behavior in Go
- Breaking Barriers: How 3D Printing is Democratizing Product Development
- more>>