SEARCH KEYWORD -- long



  Feature: The History Of Mobile Gaming

Mobile phones have come a long way since the unsightly bricks of the 1980s. The sleek handsets of today are a fraction the size of their ancestors, yet exponentially more powerful. While the implications for communication have been profound, there have been many other applications for this technology. Modern devices are capable of supporting increasingly complex software, innovative interfaces and networking capabilities, and the gaming sector has been one of the biggest benefactors of this.Much...

   Game,Mobile,History,Feature, Game on mobile device     2011-10-12 11:44:30

  Don't write on the whiteboard

I recently interviewed at a major technology company. I won't mention the name because, honestly, I can't remember whether I signed an NDA, much less how strong it was.I did well. Mostly because of luck. I normally step over myself when I interview. I guess I've improved over the years. Here are a few tips to ace your own interview.1. Don't write on the whiteboardWhen I interviewed at Palantir around 5 years ago, I had a lot of trouble with this. Yes, I knew next to nothing about compu...

   Interview,Preparation,Whiteboard,Note,Python     2012-01-11 11:31:32

  The dystopia from “Blade Runner 2049” to come to mobile phones

Next Games, a Finnish mobile game developer and publisher is working along with Alcon Entertainment for the development of "Blade Runner 2049". The Next Games CEO, Teemu Huuhtanen disclosed the news this month in Electronics Entertainment Expo 2017. Besides displaying only a screenshot, the companies are yet to uncover the details regarding the release date and the title of the game. Alcon Entertainment is busy in the production of movie "Blade Runner 2049", a sequel to the 1982's dys...

   MOBILE GAME DEVELOPMENT, MOBILE GAME SERVICE,GAMES APPS SERVICE,GAME APPLICATION SERVICE     2017-06-29 12:33:18

  Web Security: In-Depth Explanation of X-XSS-Protection

What is X-XSS-Protection X-XSS-Protection is an HTTP response header designed to enable or configure built-in cross-site scripting (XSS) filters in certain versions of Internet Explorer, Chrome, and Safari. The purpose of these filters is to detect reflected XSS attacks in the response and prevent the loading of pages, thereby protecting users from such attacks. The X-XSS-Protection response header was initially introduced by Microsoft in Internet Explorer 8 to control the browser's XSS filter. ...

   X-XSS-PROTECTION,WEB SECURITY,CONTENT SECURITY POLICY,XSS,CSP     2023-11-29 01:48:40

  Streamlining the Project Invoicing Process: Tools and Strategies

For many businesses, project invoicing can be a complex and time-consuming task. Handling this aspect efficiently is crucial to maintaining cash flow and ensuring a healthy financial state for the company. Fortunately, many tools and strategies are available today that can help streamline the invoicing process. From automated software solutions to best practices in financial management, these improvements can greatly enhance the accuracy and efficiency of billing operations. Keep reading to expl...

   INVOICING,BUSINESS     2024-05-10 22:10:17

  Apps and web apps and the future

Dave Winer: Why apps are not the future: The great thing about the web is linking. I don’t care how ugly it looks and how pretty your app is, if I can’t link in and out of your world, it’s not even close to a replacement for the web. Let’s set aside one thing right away. The browser is an app. Text editors, outliners, and web servers are apps. And, without them, there’s no web at all. Somebody has to write these things. That implies APIs and more tools ...

   App,Web app,Future,Difference     2011-12-14 07:10:43

  Recent Online Scams You Need to Know About

It’s easy to forget that the internet is a dangerous place and that it’s easy to become a victim. Everyone wants to think that they’re too smart to fall for online scams or obvious fraud. Yet actions speak louder than words, and 97% of people still struggle to identify a phishing scam. Awareness is critical in beating the cybercriminals. So here are examples of the latest online scams and tips on how to avoid becoming a victim of similar attacks. What are Online Scams? Online s...

   DATA SECURITY,VPN     2019-12-12 07:18:36

  Cracking Siri

On October 14, 2011, Apple introduced the new iPhone 4S. One of its major new features was Siri, a personal assistant application. Siri uses a natural language processing technology to interact with the user.Interestingly, Apple explained that Siri works by sending data to a remote server (that’s probably why Siri only works over 3G or WiFi). As soon as we could put our hands on the new iPhone 4S, we decided to have a sneak peek at how it really works.Today, we managed to crack ...

   Siri,Cracking,Defect,Speech to text,Record,AI     2011-11-15 08:38:23

  Erlang Style Concurrency

Introduction On an evolutionary scale of innovation from one to ten (one being Bloomberg and Citi Group, eight being Google and Cirque Du Soleil, and ten being the company you couldn't imagine in your wildest dreams), the company I work for is about a three1. Being employed by this bastion of ingenuity affords me certain opportunities I can't get elsewhere. For example, every developer gets to interview potential...

   Erlang,Concurrency,Lock,Message,Innovation     2012-01-03 10:44:44

  Web programs written in C++ are no big deal

I had an interesting conversation with a friend the other day. She wanted to try putting together a weekend "hackathon" just to see what we could build. It would be one of those fun things where we just start tinkering and see what comes out of it. Somehow, this conversation got to the topic of libraries, programming languages, and frameworks. Then it got a little weird. I guess the current "shiny" thing is still more-or-less Ruby, and particularly when used with Rails. Oh, I suppo...

   C++,Web design,Library,Web app     2012-01-11 11:57:26