Latest Posts'); elseif(is_search()) : _e('
Search Results for "').the_search_query()._e('"'); elseif(is_category()) : _e('
Archives for "').single_cat_title('')._e('"'); elseif(is_tag()) : _e('
Posts tagged as "').single_tag_title()._e('"'); elseif(is_author()) : _e('
Posts by "').the_author_link()._e('"'); elseif(is_archive()) : _e('
Archives for "').the_time('F, Y')._e('"'); endif; ?>
Mobile technology is a day-to-day technology that almost everyone has. Some even use this technology more than PC and they are always in need for new features and functionality. These features and functionality are provided using Mobile Applications, so I decided to write a series of articles about building mobile applications. At the beginning, I […]
Developers and software providers are in need to provide fully trusted and more secure applications, which means less error messages and security warnings. They also need to protect their identity and give users the ability to verify the provider’s identity and software integrity. So to reach that, they always provide digitally signed executables and scripts […]