Estel Tech Blog



How to Implement Pull-to-Refresh in Mobile Applications


A common pattern in mobile applications is to allow a user to refresh the data in a List by pulling down on the List past the top of the List and if the user pulls down past some threshold value, to trigger a List refresh once the user releases the List, and it bounces back to its initial position.

Thanks to Estel Tech Anywhere's RMAD (Rapid Mobile Application Development) features, complex, but common, development patterns like pull-to-refresh are easy to add to your mobile apps. In this video we show how you can implement the 'pull-past-end-to-refresh' pattern in an Estel Tech Anywhere List control.

Video: Add Pull to Refresh Mobile Functionality to Your Apps

Prev Post Image
Gartner: How to Make Your Mobile Business Intelligence Deployment a Success
Next Post Image
Services Are Key For Building Business Apps that Get Off to a Great Start

About Author

Default Author Image
Chris Conroy

Chris Conroy runs digital programs for Estel Tech.

Related Posts
Top Security Concerns for Low-code and No-code Development
Top Security Concerns for Low-code and No-code Development
What Are Super Apps? Get the Facts
What Are Super Apps? Get the Facts
Estel Tech Anywhere Enables Music Students to Share Performances Despite COVID
Estel Tech Anywhere Enables Music Students to Share Performances Despite COVID

The Estel Tech platform is the only unified mobile and web app development and deployment environment with distinct “no-code” and “low-code” components. Using the Estel Tech Transform no-code product, business users and developers can take full advantage of all the capabilities of the smartphone to turn any form into a mobile app in minutes, and power users can add advanced app functionality with Estel Tech Transform's built-in programming language. IT developers can use the Estel Tech Anywhere low-code environment to develop complex web or mobile business apps from scratch, integrate data with existing systems of record and workflows (including data collected via Estel Tech Transform), and add additional security or authentication requirements to protect corporate data.

Comment