Low cost web & Android app development for Bishop's Stortford

Why choose New Media Aid?
We develop affordable cutting-edge web apps, Android apps and ecommerce websites. Providing bespoke app development services since the year 2000, we are only 19 miles from Bishop's Stortford, Hertfordshire. The development cost of a bespoke Android app, web app or ecommerce website for organisations in Hertfordshire will usually be between £2,000 and £5,000.

We develop advanced, bespoke, Android apps, mobile-friendly web applications and e-commerce websites for Hertfordshire organisations who want state-of-the-art web and mobile applications at down-to-earth prices.

If you are looking for custom made, Android app development,mobile-friendly website development or e-commerce website design you need look no futher than New Media Aid.

A random fact!
Bishop's Stortford is 19 miles from our app development office in Hitchin and 19 also happens to be the SDK Tools revision number (SDK Tools, Revision 19) released in April 2012 and made available through the Android SDK Manager as a downloadable component for the Android SDK. It includes the complete set of Android development and debugging tools. It is included with Android Studio. (SDK Tools, Revision 19).


Useful web app developers term of the day: OAuth2

OAuth2 (Open Authorization 2) is an authorization framework that allows a user to grant a third-party application access to their resources, without giving the application their login credentials. It is used for secure API authentication and authorization.

In OAuth2, the user (resource owner) grants permission to a third-party application (client) to access their resources on a server (resource server). The authorization process involves the following steps:

  1. The client sends a request to the authorization server, asking for permission to access the user's resources.
  2. The user is then redirected to the authorization server to authenticate and authorize the request.
  3. If the user grants permission, the authorization server sends an authorization code back to the client.
  4. The client then exchanges the authorization code for an access token that it can use to access the user's resources from the resource server.

There are four main roles involved in the OAuth2 process: the resource owner, the client, the resource server, and the authorization server. The resource owner is the user who has the resources that the client wants to access. The client is the third-party application that wants to access the user's resources. The resource server is the server that hosts the user's resources. The authorization server is the server that verifies the user's identity and issues access tokens to the client.

OAuth2 is widely used by many web services, such as Google, Facebook, Twitter, and GitHub. It is considered a secure and reliable way to grant third-party applications access to user resources without compromising the user's security.

OAuth2 is an authorization protocol used to grant third-party applications access to user resources, without disclosing the user's credentials. It has become a standard for authenticating users and providing authorization access to resources on the web. OAuth2 works by providing access tokens that represent authorization to access a user's data. This allows third-party applications to access a user's data without requiring the user to share their credentials.

OAuth2 has four main participants: the user, the client, the resource server, and the authorization server. The user is the entity that owns the resource, which is being accessed. The client is the third-party application requesting access to the user's resource. The resource server is the server that hosts the resource that the client is requesting access to. The authorization server is responsible for verifying the identity of the user and generating the access token.

The OAuth2 protocol works in several steps, which are outlined below:

  1. The user initiates the OAuth2 process by accessing the client application. The client application requests access to the user's resource.

  2. The client application directs the user to the authorization server, which will request the user to log in or confirm their identity if they haven’t already. Once the user has provided their credentials, the authorization server verifies their identity.

  3. Once the user's identity is verified, the authorization server issues an access token to the client application.

  4. The client application sends the access token to the resource server to request access to the user's resource.

  5. The resource server verifies the access token's validity with the authorization server, and if the token is valid, the resource server grants the client application access to the user's resource.

  6. Once the client application has been granted access, it can retrieve and manipulate the user's data as long as the access token remains valid.

Access tokens are typically short-lived and will expire after a set period. OAuth2 also provides a refresh token that can be used by the client application to obtain a new access token once the old token expires. This allows the client application to continue accessing the user's resources without requiring the user to re-authenticate every time the access token expires.

OAuth2 is a flexible protocol that supports multiple grant types, which determine the process of obtaining an access token. Some of the commonly used grant types are:

  1. Authorization Code Grant: This grant type is used by client applications that are running on a web server. The authorization server issues an authorization code to the client application, which is then exchanged for an access token.

  2. Implicit Grant: This grant type is used by client applications that are running on a user's web browser. The access token is issued directly to the client application without using an authorization code.

  3. Resource Owner Password Credentials Grant: This grant type is used by client applications that have obtained the user's username and password. The client application exchanges the user's credentials for an access token.

  4. Client Credentials Grant: This grant type is used by client applications that are accessing resources that do not belong to a user, such as an API. The client application uses its own credentials to obtain an access token.

In conclusion, OAuth2 provides a secure and flexible way for third-party applications to access user resources without requiring the user to share their credentials. The protocol uses access tokens and grant types to authenticate users and provide authorization access to resources on the web. OAuth2 has become a standard for authenticating users and providing authorization access to resources on the web, and it is widely used by major companies such as Google, Facebook, and Twitter.



Crimes reported in Bishop's Stortford
Our custom app development prices are criminally low, but not as criminal as these events recently reported in Bishop's Stortford.

How safe is Bishop's Stortford?
Here are some Jan 2025 crimes for Bishop's Stortford which we have added to show you how our software engineers can integrate data from external sources in web apps.

burglary
  • Mayfield Park (Under investigation)
criminal damage arson
  • Villiers-sur-marne Avenue (Investigation complete; no suspect identified)
  • Gibbs Field (Unable to prosecute suspect)
  • Elizabeth Road (Investigation complete; no suspect identified)
other theft
  • Robinson Close (Under investigation)
  • Supermarket (Under investigation)
  • Sweet Briar (Under investigation)
  • Supermarket (Investigation complete; no suspect identified)
  • Pynchbek (Investigation complete; no suspect identified)
public order
  • Whittington Way (Under investigation)
  • Waytemore Road (Under investigation)
shoplifting
  • Beechlands (Under investigation)
vehicle crime
  • Appleton Fields (Investigation complete; no suspect identified)
  • Wheat Croft (Under investigation)
  • Kent Crescent (Awaiting court outcome)
  • Beechlands (Under investigation)
violent crime
  • Merrill Place (Under investigation)
  • Penningtons (Under investigation)
  • Merrill Place (Under investigation)
  • Kent Crescent (Under investigation)
  • Brewers Close (Under investigation)
other crime
  • Apsley Close (Unable to prosecute suspect)
We are only 19 miles from Bishop's Stortford
ab@newma.co.uk