Developer Reading List | April 18, 2015 | Weekly insight of what's new and important for developers around the world. | Hiring? Access 250+ new candidates every Monday. Great companies are built with great teams. With Hired, access over 250 pre-screened developers, designers, and tech sales professionals every week all ready to explore new opportunities. Use Hired to find the best talent in tech so you can focus on what you do best. Sign up and make the key hires you need. | | Ahmet Alp Balkan "Today, as Microsoft and Docker, Inc. we are making the Docker command line interface available on Windows starting with the Docker 1.6 release. As a part of our partnership, Microsoft has worked with the Docker community to port the Docker client to Windows, making it easy to manage Docker hosts and containers for those using Windows as their development machines." | | shephertz.com "In this blog post, I will discuss the trade-offs of the commonly used protocols for communication in realtime games. One of the most essential components of building a multiplayer game is the communication between players. Picking the right protocol for your game is crucial and impacts your game's architecture and performance." | | http://devcodegeek.com/ "Here in this article we will be presenting you with a list of fifteen best Android code editors which are available for free of cost in the web. So, Just install one of these in your Android phone or tablet and then you can access codes in different languages and you can edit and run the programs in your Android smartphone." | | Andi Dysart and Matthias Christen "Modern desktop browsers offer powerful integrated developer tools that let you get to the bottom of CSS or JavaScript problems quickly. Whether it's Chrome, Firefox, Internet Explorer, or Safari, you will be able to inspect the DOM, apply CSS modifications in real-time, browse through loaded script files, set breakpoints to manually control the flow of execution and trace any exception or unexpected behaviour to its cause." | | Brian Lewis "We all know that encryption is complicated but most people think that because they are using AES, Blowfish, IDEA, or some other advanced encryption then the data is secure. Well it's more complicated than that. Not only do you have to look at the key size like 128 bit, 256 bit, etc., but another really important piece is the mode that the encryption uses. ECB mode has some serious problems because it is poor at hiding data patterns. There are a lot of software packages that offer strong AES encryption but use EBC mode and therefore aren't that strong." | | | You are receiving this email because you believe that the best startup articles and videos are made by active members of the startup community. © 2009-2015 Startup Digest. Startup Digest is a registered trademark of Startup Weekend. All rights reserved. | | |
No comments:
Post a Comment