Mobile@ExxetaHow to reduce your app’s environmental impact5 green coding best practices to reduce energy consumption6h ago
Manuel VivoInterviewing at Staff+ levelIn this blog post, I’m covering how I prepared for various Staff level interviews at different companies.Mar 1212
Domen LanišnikGuide to Foreground Services on Android 14Learn how to work with Foreground Services on Android 14.Feb 102Feb 102
Centizen NationwideA Practical Approach to End-to-End Testing for React Native AppsIn mobile app development, ensuring the quality and reliability of your application is paramount. React Native, a popular framework for…8h ago8h ago
Scott HatfieldHow much MacBook RAM for a Mobile Developer?Will 8GB of RAM on that new MacBook Air 15" be sufficient or should you (or the company P-card) spring for a 16GB+ model?Jun 13, 202311Jun 13, 202311
Mobile@ExxetaHow to reduce your app’s environmental impact5 green coding best practices to reduce energy consumption6h ago
Manuel VivoInterviewing at Staff+ levelIn this blog post, I’m covering how I prepared for various Staff level interviews at different companies.Mar 1212
Domen LanišnikGuide to Foreground Services on Android 14Learn how to work with Foreground Services on Android 14.Feb 102
Centizen NationwideA Practical Approach to End-to-End Testing for React Native AppsIn mobile app development, ensuring the quality and reliability of your application is paramount. React Native, a popular framework for…8h ago
Scott HatfieldHow much MacBook RAM for a Mobile Developer?Will 8GB of RAM on that new MacBook Air 15" be sufficient or should you (or the company P-card) spring for a 16GB+ model?Jun 13, 202311
Jiten PatelinLevel Up CodingIf Google no Longer Supports FlutterDespite being a proficient Flutter developer, I have some reservations about the framework. Let me explain why.Jun 46
Forhadul IslamEffective Dependency Injection in Android with HiltDependency Injection (DI) is a powerful design pattern used in Android development to improve the modularity, readability, and testability…2d ago
TalsecProtecting Your API from App Impersonation: Token Hijacking Guide and Mitigation of JWT TheftDid you know about the significant security risks of JWT token stealing and impersonation attacks facilitated by malicious cloned apps?Apr 4, 20231