Mohamed ElsdodyUnderstanding Handlers, Loopers, and Message Queues in Android: A Practical Guide with Code…Introduction3 min read·2 days ago--
Manuel VivoInterviewing at Staff+ levelIn this blog post, I’m covering how I prepared for various Staff level interviews at different companies.11 min read·Mar 12, 2024--12
Domen LanišnikGuide to Foreground Services on Android 14Learn how to work with Foreground Services on Android 14.8 min read·Feb 10, 2024--2--2
DevInterfaceMobile development: from idea to implementation with DevInterfaceDo you have an idea for an application and are wondering what to do next?6 min read·1 day ago----
Scott HatfieldHow much MacBook RAM for a Mobile Developer?Will 8GB of RAM on that new MacBook Air 15" be sufficient or should you (or the company P-card) spring for a 16GB+ model?·9 min read·Jun 13, 2023--11--11
Mohamed ElsdodyUnderstanding Handlers, Loopers, and Message Queues in Android: A Practical Guide with Code…Introduction3 min read·2 days ago--
Manuel VivoInterviewing at Staff+ levelIn this blog post, I’m covering how I prepared for various Staff level interviews at different companies.11 min read·Mar 12, 2024--12
Domen LanišnikGuide to Foreground Services on Android 14Learn how to work with Foreground Services on Android 14.8 min read·Feb 10, 2024--2
DevInterfaceMobile development: from idea to implementation with DevInterfaceDo you have an idea for an application and are wondering what to do next?6 min read·1 day ago--
Scott HatfieldHow much MacBook RAM for a Mobile Developer?Will 8GB of RAM on that new MacBook Air 15" be sufficient or should you (or the company P-card) spring for a 16GB+ model?·9 min read·Jun 13, 2023--11
Bruno LorenzoRouting & Navigation in SwiftUI — the right wayLearn how to create a light & simple routing layer to handle your application’s navigation4 min read·Apr 4, 2023--15
Shrinath HimaneThe Magic of Animated Typing Transition in React NativeFeel free to connect with me !3 min read·Apr 30, 2024--
TalsecProtecting Your API from App Impersonation: Token Hijacking Guide and Mitigation of JWT TheftDid you know about the significant security risks of JWT token stealing and impersonation attacks facilitated by malicious cloned apps?15 min read·Apr 4, 2023--1