Facebook, Google, Github, Netflix and few other tech giants have given a chance to the developers and products to consume their data through APIs, and became a platform for them. Even if you are not writing RESTful API for other developers and products, it is always very healthy for your application to have beautifully crafted APIs.
Google’s London-based AI subsidiary, DeepMind, has developed an algorithm that can render full 3D models of objects and scenes from regu
After a recent domain change at my workplace one of the API endpoints became inaccessible due to some configuration problems resulting in incorrect behavior in regards to cross-origin resource sharing policy. It interfered with one non-critical function of the website and was a bit of a nuisances but not big enough for back-end team to prioritize fixing it.
In this article we will be Understanding AngularJS Bootstrap Process talking about automatic Bootstrapping and manual Bootstrapping multiple modules in AngularJS.
Angular initiates automatically upon DOMContentLoaded event or when the angular.js script is downloaded to the browser and the document.readyState is set to complete.
Building HTML5 games with Phaser has been somewhat of a hobby of mine over the past few years, and I will be writing a few tutorials about Phaser with a focus on developing HTML5 games for mobile. However, despite having created a few mostly finished games most of them never actually see the light of day.
Read Angular js interview questions including topic advanced topics like Dependency injection, Two-way binding, scope in angular js and many more.
As it has for the last couple years, Google is releasing a developer preview of the next version of Android in March. Before you ask, no, we don’t know the name beyond “Android P.” Another thing we don’t know is just how big the user-facing changes will be this time around, as this preview is mostly focused on the changes that will affect developers.
This post is based on Chrome extension and Express server that exploits keylogging abilities of CSS i.e. CSS Keylogger. Scary little attack using essentially a bunch of attribute selectors.
This attack is really simple. Utilizing CSS attribute selectors, one can request resources from an external server under the premise of loading a background-image.