Posts Tagged ‘Web’

Twitter Development: Using OAuth to Authenticate Against the Twitter API: Walkthroughs

  This article is excerpted from Chapter 6: Basic Authentication and OAuth of the Wrox book, Professional Twitter Development: With Examples in .NET 3.5, by Daniel Crenna, and is reused by permission of the publisher. This may not be reused without publisher permission.   Twitter Development: Using OAuth to Authenticate Against the Twitter API: Walkthroughs […]

Tags:

Twitter Development: The OAuth Workflow

Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 This article is excerpted from Chapter 6: Basic Authentication and OAuth of the Wrox book, Professional Twitter Development: With Examples in .NET 3.5, by Daniel Crenna, and is reused by permission of the publisher. This may not be reused without publisher permission.   OAuth Workflow   […]

Tags:

Twitter Development: The Pitfalls of Basic Authentication

This article is excerpted from Chapter 6: Basic Authentication and OAuth of the Wrox book, Professional Twitter Development: With Examples in .NET 3.5, by Daniel Crenna, and is reused by permission of the publisher. This may not be reused without publisher permission. “There have been tons of third party applications built around Twitter but the […]

Tags:

Twitter Development: What are Data Portability and OAuth?

This article is excerpted from Chapter 6: Basic Authentication and OAuth of the Wrox book, Professional Twitter Development: With Examples in .NET 3.5, by Daniel Crenna, and is reused by permission of the publisher. This may not be reused without publisher permission. Twitter Development: What are Data Portability and OAuth? What Is Data Portability? With […]

Tags:

Twitter Development: The OAuth Specification

This article is excerpted from Chapter 6: Basic Authentication and OAuth of the Wrox book, Professional Twitter Development: With Examples in .NET 3.5, by Daniel Crenna, and is reused by permission of the publisher. This may not be reused without publisher permission. Twitter Development:  The OAuth Specification   The OAuth specification is thorough, detailed, and […]

Tags:

JavaScript Best Practices: Performance – Be Scope-Aware

Excerpted from chapter 20 "Best Practices" of the Wrox book Professional JavaScript for Web Developers, 2nd Edition By Nicholas C Zakas Chapter 4 discussed the concept of scopes in JavaScript and how the scope chain works. As the number of scopes in the scope chain increases, so does the amount of time to access variables […]

Tags:

Using Dojo to React to Page Load and Unload

Excerpt from The Concise Guide to Dojo By Leslie Michael Orchard   Reacting to the successful load and unload of a page are two basic event hooks that are the most convenient in setting up and tearing down a user interface. Dojo offers two methods to allow registration of handlers on these events, named dojo.addOnLoad() […]

Tags:

Using the Selectors API

Excerpt from Beginning JavaScript and CSS Development with jQuery By Richard York Using the Selectors API in jQuery is very easy. First, you must know that everything you want to do with jQuery originates from a single, very simply named object that is called $ . That’s right, its name is a single dollar sign. […]

Tags:

Ajax in Prototype

Excerpt from Professional Ajax 2nd Edition By Nicholas C. Zakas With the popularity of Ajax applications exploding in 2005, developers and companies began looking for ways to streamline the process. As with many common programming practices, Ajax involves a lot of repetitive procedures that can be identified and simplified for common use. It wasn’t long […]

Tags:

Adding Ajax to Joomla! Web Applications

Excerpt from Professional Joomla! By Dan Rahmel Ajax (which stands for Asynchronous JavaScript and XML) combines a powerful set of technologies for Web 2.0 sites. Using Ajax technology, you can make the user experience far more interactive than previous Web site implementations. In the past, changes to parameters or the selection of buttons on a […]

Tags: