Develop and deploy custom Alexa skills for Amazon devices with the Backendless SDK. Custom skills can be implemented with Java, JavaScript, or Codeless.
Today we are going to talk about a very valuable feature available for Managed Backendless and Backendless Pro users called Low Priority Tasks. In this article, we’ll look at how it works and what is it best used for. Backendless custom business logic (Cloud Code custom event handlers and custom API services) tasks are put into a…
Today we are going to demonstrate how to create a simple event handler to track subscriber statistics on your various messaging channels. This gives you the ability to easily track the number of subscribers for each of your channels to help you manage channel load and gauge user interest in specific topics. Used in combination with API usage…
Keep users updated with personalized, schedulable push notifications. Build your own templates, target specific users/groups, and customize popups, badges and sounds.
Customize your Backendless application to fit your business needs with three forms of Cloud Code: API Services, API Events Handlers, and Cloud Code Timers.
In this week’s Backendless Spotlight, we bring you an Australian company that has grabbed a piece of the crypto craze by creating a Bitcoin and cryptocurrency market ticker for Australia’s crypto markets. BTC Market Ticker provides users with up-to-the-second market movements on BTCMarkets.net, one of Australia’s largest crypto and blockchain asset exchanges. Editor’s Note: If you or…
For each entry in a given table, Backendless creates a unique objectId property – this is a UUID. In some cases, you may want to have a unique ID based on a whole number. To do this, we will use Backendless Atomic Counters (you can read the documentation about Atomic Counters here). In this article, we will…
It is common for developers to build apps where users will have varying access to data and features within the app based on the user’s role. Being able to limit user access is important to data security, user management, and often, the financial success of the application. This is because user access is commonly tied…