17 11, 2014

Is there a decline in personal device usage?

By |November 17th, 2014|Trends|

Fotolia_67672288_XSThe ongoing focus of this series has been the changing habits of application users. Until now we have focused largely on applications and how the evolving use of applications means that it is necessary for developers to make a change in their approach to creating and marketing their products.

The change in application use is reflective of a broader shift in the way that people interact with the technology around them. Even five years ago, people were not as ‘connected’ as they are now. Increasing broadband connection speeds, wider availability of free Wi-Fi, 3G and 4G mobile networks has meant that we are hardly ever away from the multitude of computers that we now carry with us, wherever we go.
[…]

1 11, 2014

Labs64 NetLicensing 2.1 is Out!

By |November 1st, 2014|NetLicensing, News and Announcements|

Today we’re excited to finally announce the availability of the Labs64 NetLicensing version 2.1.

You’re very welcome to give it a try, and share your feedback with us.

Release highlights:

  • Get an instant overview of your activities on a vendor dashboard at NetLicensing Management
  • Licensing Models got new friendly and intuitive names: “Try & Buy”, “Subscription”, “Rental”
  • Service reliability taken to the next level with NetLicensing Agent
  • New Java client library introduced
  • Java, C# and PHP client libraries adapted to employ the new API features
  • Service documentation revisited for better clarity and readability
  • … and many other useful improvements

Please see the Release Notes for the complete list of changes and new features.
[…]

11 09, 2014

The New Way to Pay

By |September 11th, 2014|PSP, Trends|

NFC - Near field communication The defining aspect of the success of Smartphones over the last five years has been the ability that they have given us to literally do anything we want in practically any place. The phrase ‘there is an app for everything’ has now become common parlance amongst both industry members and consumers alike. We carry in our pockets mini-computers with more power and potential than those which we used in offices just 10 years ago.

We are also using our phones and tablet devices for much more than the simple entertainment devices which can make and  receive calls that was the at the core of the first smartphones. Millions of people now manage their finances largely through online banking and carry out a significant number of transactions and transfers just using their thumbs on the 4 inch screen of a mobile phone.
[…]

31 08, 2014

Think outside the Box (and your wallet)

By |August 31st, 2014|Labs64|

Think Outside The Box Torn Paper

 

You are an inventor, you have a great idea for a new piece of technology but you don’t have the resources to properly explore your ideas and bring them to fruition. You don’t have any great amount of disposable income and there is no one willing to back you. You don’t want to do a half hearted job as you’re worried that if you don’t get it right first time, then you will have lost your chance and your dreams will be over.

What makes the whole situation worse is that the few people you have told about your idea have been really positive, you’ve approached a few potential investors and they’ve all mentioned the ‘potential’ which your idea has but none of them have been willing to hand over any cold hard cash to actually help you get off the ground and take the time to truly develop your idea to the best of its potential.
[…]

10 08, 2014

‘Specific Use’ Applications

By |August 10th, 2014|Trends|

It might seem strange to think that it is now ten years since the largest social network every created was first dreamt up in the dormitory of an American University. It’s uniquely recognisable symbol is everywhere and can be used to access almost everything. It is undeniable that social networking has completely changed the way in which we interact with people as well as how we approach our day to day communications with one another.

A significant part of the success of the major names in social media has been the ability to share photos, stories and send instant messages from a single place. This convenience has stretched from the browser interface across to tablets and mobile devices.

However, the endless amount of advertising, ‘promoted posts’ and a general excess of material in which people simply have no interest has pushed users away from the fully integrated GUI and towards applications which have a particular function. Applications which do one thing exceptionally well, as opposed to do many things to a lower level of quality and with regular changes to the user experience.
[…]

16 07, 2014

Working with Canvas – The new technology of vector animation

By |July 16th, 2014|HTML5|

Use of HTML5 gives developers new horizons in animation implement for their websites. There is no need to use outdated Flash technology or to overload traffic with large images, you can simply familiarize with a few norms of creation of motion interpretation by canvas redraw.

[…]

8 07, 2014

Application Security: The Essentials – Insufficient Transport Layer Protection

By |July 8th, 2014|Security|

In this, our final article in our series on the essentials of Application Security, we will be looking at Insufficient Transport Layer Protection. This occurs when an application has failed to properly encrypt network traffic, which means that confidentiality and overall integrity has been compromised. ITLP also covers the times when applications network level security is weakened; this can be because of flaws in algorithms, improper use of certificates and use of security certificates which have expired.

All of these factors will reduce the effectiveness of any Secure Sockets Layer (SSL) and Transport Layer Security (TLS) which you have put in place as a part of the application’s development.

If you are unfamiliar with either TLS or SSL then now is the time to acquaint yourself. TLS, and SSL before it, is used to add a layer of security to all traffic which has gone through an authentication process – i.e. when you have logged into a website or application, TLS will protect any data which is sent over the network for the duration of the session. SSL certificates are installed on the relevant servers and are in place to act as verification that the site or app to which the user is connecting is genuine.

[…]

26 06, 2014

Application Security: The Essentials – Failure to Restrict URL Access

By |June 26th, 2014|Security|

It is often the case that applications will contain URL references to its separate pages through the use of protected links and buttons. The content to which you link depends entirely upon the application and its function; however, you should consider every link to be a potential gateway for an attack. Within an application, there is likely to be references to pages which contain confidential or sensitive data and unless you have correctly configured the restrictions; anyone with network access could potentially access private pages.

This is a security flaw which is easily exploited by attackers. This is because all they need to do to access a private page is make a manual change to the URL which forces the browser to open a different page to the one which you may have originally intended – this means that instead of accessing the pages designed for users, they can access those which are in place for use by admins only.

Depending upon the access rights which they have been granted, users are able to access different pages within the application, each of which has its own unique URL. Although links and buttons may be visible to users with all levels of access, if the access rights have been correctly configured then they will only be able to access the levels which they are supposed to.

[…]

16 06, 2014

Apps for Business

By |June 16th, 2014|Trends|

Mobile computing devices. Laptop, tablet pc and  cellphone. In this next article in our ongoing series on the future for application developers, we now turn to applications which are commissioned and made for business. The stereotypical image of a businessman with both his suitcase and email-enabled phone hastiled checking, reading and replying whilst on the go.

In more recent years this technology has evolved to include programs and applications which have revolutionised video conferencing – with meetings now taking place where none of the participants are in the same country, let alone the same room.

There has also been an increasing shift towards ‘24 hour working’ where business people are working as and when they can, rather than according to pre-set business hours. Businesses are run from people’s home offices, multimillion pound companies have only a handful of employees and it is becoming easier than ever to locate and work with partners and contractors across the globe.

A significant proportion of this rapid expanse and radical shift can be put down to the ever-faster (and indeed cheaper) broadband and 4G connections which we now have access to. It is also down to the fact that businesses are now challenging traditional concepts of ‘how it should be done’ and are instead trying new and radical means through which they can make money.

All application creators and developers are now in a position where they can provide a service to businesses that will soon become invaluable. Although some older and larger companies are still reluctant to give over control to new technology and to break away from traditional methods of communication.

Whilst this can seem to be counterproductive, […]

1 06, 2014

Apps in Education

By |June 1st, 2014|Trends|

In our recent article, we looked at the question of whether or not an increasingly saturated application market is leading towards an application ‘crash’. There is a strong argument to be made that developing for niche markets is the way forward if companies and developers are to be successful.

The rapidly decreasing costs of technology has meant that a larger number of educational institutions are investing in application based technology. With a particular focus on tablet computers and touch-control technology.

The reasons for this are twofold. Firstly; touch screen interfaces are by definition a visual medium and therefore lend themselves to simpler pictorial recognition, where complex linguistic understanding has not yet formed, or been able to form. As such, even children working at the lowest level are able to have their learning enhanced through technology. Applications which are built around the recognition of like for like images i.e. matching shapes; allow educators to use technology to provide much targeted tasks and assessments.
Secondly; a touchscreen interface is ideal for building the vital motor skills which form a fundamental building block of any child’s learning. Whereas writing with an pen and paper, or using the standard mouse and keyboard layout, requires of a child not only a high level of control and dexterity but also a level of hand-eye co-ordination that is simply far too advanced for those working at the lowest levels.

A touchscreen interface where the child is able is make logical connections between what they touch which their hands and what happens on screen, means that they can learn and develop skills and understanding which otherwise would be far beyond them.

Where then, does this leave developers and innovators of […]