article thumbnail

Why 36% is the magic number: Finding the right amount of text in mobile apps

Intercom, Inc.

The results shows us the value of taking a principled approach to writing text for mobile apps – because product design is still all about the words. Mobile apps dominate our digital experiences. A quick Google search and a calculator tells me that’s an average 25 mobile apps for every person on Earth. Measuring the letters.

Mobile 291
article thumbnail

David Barrett, CEO of Expensify: Good Intentions, Bad Advice: How to Keep Your Board Aligned with Your Vision (Video + Transcript)

SaaStr

It’s probably that you’re small, you have very little revenue, you have a couple of employees maybe, you’re probably struggling, maybe your bank accounts are stretched, you’re probably incredibly stressed. They’re a very important part of the team. That’s what we’re here for. There we go.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Digital Wallet vs. Credit Card: What Payment Methods Should You Accept?

FastSpring

Alternatively, the service stores a user’s bank or credit card information in the app and takes money directly from a financial account when completing a purchase. Now that more and more customers are completing online purchases on mobile devices, security has become a concern. The answer: a poor checkout experience.

article thumbnail

What Are the Security Measures to Prevent Authentication Attacks

Frontegg

Two-factor authentication gives developers the freedom to implement a variety of options to act as a second layer of security. While registering for a new account on a website, users are prompted to add and verify their email address or mobile number. One that comes to mind right off the bat is the dreaded weak password.

article thumbnail

How to do application penetration testing with your current devs & QA team

Audacix

Ensuring that every update released for your application is rigorously tested for security holes through penetration testing is important for compliance with cyber security laws, privacy laws like GDPR and CCPA and also other regulatory frameworks, particularly for fintech, banking, insurance and other regulated industries.

article thumbnail

How to build mobile apps that hackers will find difficult to breach

Audacix

The inconvenient truth about developing a mobile app today is that hackers will find and exploit vulnerabilities in your app to steal data, demand ransoms, ruin your reputation and even destroy your business. The good news for you is that we know the most common vulnerabilities that hackers will target to compromise your mobile app.

Mobile 45
article thumbnail

GDPR: The Good, the Bad, and the Grey

Sales Hacker

This article dives into an overview of the GDPR, the good, the bad, and the grey areas around this new data privacy regulation. Personal and corporate contact information (addresses, mobile numbers, internet accounts, email addresses, etc.). This is not trivial for sales, marketing, and operations teams. Employee information.