Telerik blogs
  • People

    Do developers know a hybrid app when they see one?

    Do developers know a hybrid app when they see one? It turns out, if the app is written well, they aren’t so sure. Last week we posted a video on YouTube of a fun project we ran. We wanted to see how much perception can play into people’s opinion of an app’s performance We got inspired by Jimmy Kimmel’s “Starbucks taste test” video, and we captured this video with developers taking the same hybrid mobile app for a ride.
    November 07, 2013
  • Mobile

    Why care about the next Telerik Icenium release if you are a .NET developer?

    The next Telerik Icenium release addresses specific challenges mobile app and .NET developers face every day, making it possible to tackle the crazy, constantly changing mobile world. And because we love .NET developers, this next release is all about making cross-platform hybrid mobile development easier than ever…just for YOU.
    September 12, 2013
  • Mobile

    Push Notifications With Apache Cordova & Icenium

    Push notifications are messages sent from an application server to a specific device using the vendor infrastructure. Typically, push notifications are used to notify an application to update its data. For example, push notifications are sent when a feed has been updated, a message has been received, or a new appointment has been made.
    August 01, 2013
  • Mobile

    Using the Barcode Scanner Plugin with Icenium

    Need to use bar codes in your hybrid mobile application? Guest blogger Rob Lauer walks you through how to do this with Icenium.
    July 03, 2013
  • Mobile

    Is This Thing On? (Part 4)

    This is Part 4 of a four part series where we explore some of the tools available to detect and manage online/offline connectivity in web/mobile applications. In Part 1 we looked at the available APIs for detecting connectivity state (and the woes associated with them). In Part 2 we wrote a hand-rolled abstraction to manage using these APIs together and began to see elements of a state machine emerge from the chaos. In Part 3 we explored how we can keep our FSMs from violating SRP, and set the stage for using multiple FSMs together to model more complex application behavior. In this final part of the series, we look at setting up hierarchical FSMs to manage more complex behavior.
    June 04, 2013