Hints for Next Step
We will wrap up the tutorial by presenting some hints for next step.
After completing this tutorial, we advise you to read the following pages to understand Kii Cloud further.
Check some practical samples
We have Kii Balance that provides the next step tutorial for Android and iOS. This tutorial focuses on how to implement more practical applications while the Hello Kii tutorial explains how to leverage our API. We recommend you to read the tutorial while cross-checking the source codes.
Check programming guides
The section Programming Guides explains various features the Kii Cloud provides, together with the detailed explanation and sample codes. The content should help you to design your apps properly.
Check the push notification tutorial
One of the mostly used Kii Cloud features is Push Notification.
If you need to leverage the push notification feature, you can walk through Push Notification Tutorials that provides a step-by-step guide to help you get started.
Start a new project
When you implement an original application, probably you will not start with modifying Hello Kii but with creating a new project and integrating Kii Cloud SDK into your project. Android Quick Start shows you how to integrate the SDK into your project.
Kii Cloud also provides the following features.
Accessing data in the user scope without login
The pseudo user feature will allow you to handle users without explicit login. The feature will create a user without any username and password and allow your application to retrieve and store the access token that represents the login state. The pseudo user cannot log in again.
See Pseudo Users for more details.
You can store binary data like images by binding them to objects. We call them as Object Body in Kii Cloud.
See Accessing an Object Body for more details.
To share data among users, you can create a group and use the group-scope bucket. Alternatively, you can use an application-scope bucket that is accessible to all application users.
See Scopes and Access Privileges for the overview of the scope. The topic that relates to the access control is covered in Securing Data. An example of data sharing in a group is presented in Designing with the Group Feature.