Should I put my company in the footer of the site of a client? [closed]
Closed 9 years ago.
How do I handle a spam server invalidating my tokens?
Our web application sends a one-time use generated token, in the form of an URL, to clients who forget their passwords. This works except for the case where the client is sitting behind another server (i.e. the spam server) that scans their email for URLS and does a GET on the URL. I’m assuming the server is checking for a malicious payload.
How do I handle a spam server invalidating my tokens?
Our web application sends a one-time use generated token, in the form of an URL, to clients who forget their passwords. This works except for the case where the client is sitting behind another server (i.e. the spam server) that scans their email for URLS and does a GET on the URL. I’m assuming the server is checking for a malicious payload.
How do I handle a spam server invalidating my tokens?
Our web application sends a one-time use generated token, in the form of an URL, to clients who forget their passwords. This works except for the case where the client is sitting behind another server (i.e. the spam server) that scans their email for URLS and does a GET on the URL. I’m assuming the server is checking for a malicious payload.
How to deal with clients that only gives you huge flow of “how to do this”, but can’t say “what and why” they need? [duplicate]
This question already has answers here: Dealing with bad/incomplete/unclear specifications? [duplicate] (12 answers) How to manage and estimate unstructured requirements received from customers (2 answers) Closed 9 years ago. Sometimes I have clients that from start gives you huge flow of words about “how task should be done in details”, like “you must use SQL […]
How to deal with clients that only gives you huge flow of “how to do this”, but can’t say “what and why” they need? [duplicate]
This question already has answers here: Dealing with bad/incomplete/unclear specifications? [duplicate] (12 answers) How to manage and estimate unstructured requirements received from customers (2 answers) Closed 9 years ago. Sometimes I have clients that from start gives you huge flow of words about “how task should be done in details”, like “you must use SQL […]
How to solicit new product recommendations from existing clients?
My company is working on developing a new product that is similar (but larger in scope) than our existing, primary application. It will incorporate most of the functionality of our current application (except where that functionality isn’t currently being used) and eventually supplant it.
Is there something as a bug-free application? [duplicate]
Why do bugs get reported even after going through so much testing? Is it our requirements’ issue?
Is there something as a bug-free application? [duplicate]
Why do bugs get reported even after going through so much testing? Is it our requirements’ issue?
How to work with a messy codebase and client [duplicate]
This question already has answers here: What is the most effective way to add functionality to unfamiliar, structurally unsound code? [duplicate] (7 answers) Closed 9 years ago. A client came to me with some features he wanted implementing. Easy enough to do what he asked. He paid me, I agreed to start on the start […]