Manuel VivoInterviewing at Staff+ levelIn this blog post, I’m covering how I prepared for various Staff level interviews at different companies.Mar 1213
Domen LanišnikGuide to Foreground Services on Android 14Learn how to work with Foreground Services on Android 14.Feb 104Feb 104
Cloderaldo Morales Pampanga IIIEssential Animations Every Mobile Developer Should Know (With Flutter Examples!)Hey there, fellow mobile developers! 🖐️ Ready to add some magic to your apps? Animations can turn a good app into a GREAT one. They make…2d ago2d ago
Scott HatfieldHow much MacBook RAM for a Mobile Developer?Will 8GB of RAM on that new MacBook Air 15" be sufficient or should you (or the company P-card) spring for a 16GB+ model?Jun 13, 202311Jun 13, 202311
Manuel VivoInterviewing at Staff+ levelIn this blog post, I’m covering how I prepared for various Staff level interviews at different companies.Mar 1213
Domen LanišnikGuide to Foreground Services on Android 14Learn how to work with Foreground Services on Android 14.Feb 104
Cloderaldo Morales Pampanga IIIEssential Animations Every Mobile Developer Should Know (With Flutter Examples!)Hey there, fellow mobile developers! 🖐️ Ready to add some magic to your apps? Animations can turn a good app into a GREAT one. They make…2d ago
Scott HatfieldHow much MacBook RAM for a Mobile Developer?Will 8GB of RAM on that new MacBook Air 15" be sufficient or should you (or the company P-card) spring for a 16GB+ model?Jun 13, 202311
Jiten PatelinLevel Up CodingIf Google no Longer Supports FlutterDespite being a proficient Flutter developer, I have some reservations about the framework. Let me explain why.Jun 410
Tharindu YehanHow to Open Inspect Elements on Mobile Phone Browsers: Simple GuideAs web developers and designers, we often need to inspect elements on web pages to debug, analyze, or modify the HTML and CSS. While…5d ago
TalsecProtecting Your API from App Impersonation: Token Hijacking Guide and Mitigation of JWT TheftDid you know about the significant security risks of JWT token stealing and impersonation attacks facilitated by malicious cloned apps?Apr 4, 20231