Achintha IsuruBuilding Blocks: Learnings from the Competitor AnalysisAsgardeo Android SDK Development Journey — Episode 23 min read·5 days ago--
Manuel VivoInterviewing at Staff+ levelIn this blog post, I’m covering how I prepared for various Staff level interviews at different companies.11 min read·Mar 12, 2024--12
Domen LanišnikGuide to Foreground Services on Android 14Learn how to work with Foreground Services on Android 14.8 min read·Feb 10, 2024--2--2
Scott HatfieldConnecting Physical Devices to Your Firebase EmulatorLinking Your Physical Device to the Firebase Emulator Suite for Flutter Development and Testing7 min read·5 days ago----
Scott HatfieldHow much MacBook RAM for a Mobile Developer?Will 8GB of RAM on that new MacBook Air 15" be sufficient or should you (or the company P-card) spring for a 16GB+ model?·9 min read·Jun 13, 2023--11--11
Achintha IsuruBuilding Blocks: Learnings from the Competitor AnalysisAsgardeo Android SDK Development Journey — Episode 23 min read·5 days ago--
Manuel VivoInterviewing at Staff+ levelIn this blog post, I’m covering how I prepared for various Staff level interviews at different companies.11 min read·Mar 12, 2024--12
Domen LanišnikGuide to Foreground Services on Android 14Learn how to work with Foreground Services on Android 14.8 min read·Feb 10, 2024--2
Scott HatfieldConnecting Physical Devices to Your Firebase EmulatorLinking Your Physical Device to the Firebase Emulator Suite for Flutter Development and Testing7 min read·5 days ago--
Scott HatfieldHow much MacBook RAM for a Mobile Developer?Will 8GB of RAM on that new MacBook Air 15" be sufficient or should you (or the company P-card) spring for a 16GB+ model?·9 min read·Jun 13, 2023--11
Bruno LorenzoRouting & Navigation in SwiftUI — the right wayLearn how to create a light & simple routing layer to handle your application’s navigation4 min read·Apr 4, 2023--15
TalsecProtecting Your API from App Impersonation: Token Hijacking Guide and Mitigation of JWT TheftDid you know about the significant security risks of JWT token stealing and impersonation attacks facilitated by malicious cloned apps?15 min read·Apr 4, 2023--1