WWW dev

Aftermath Web 2014

Here is a my look back on web development trends from 2014. 2014 was quite a year, and things did not in all details turn out as predicted on some predictions. I did not make my own predicions specifically on web development, but my computer trends 2014 posting had some web related predictions. Web is still

HTML5 is here

I can say that HMTL5 is now finally mainstream. HTML5′s “Dirty Little Secret”: It’s Already Everywhere, Even In Mobile  article tells that while HTML5 has never really lived up to its potential, due a problem with marketing as awell as VisionMobile posits, this is partly a problem with performance and partly a question of tooling.

Full stack developer at IoT era

Since Facebook’s Carlos Bueno wrote the canonical article about the full stack in 2010, there has been no shortage of posts trying to define it. For a time, Facebook allegedly only hired “full-stack developers.” That probably wasn’t quite true, even if they thought it was. Is it reasonable to expect mere mortals to have mastery over

The Golden Age of Tech Blogging?

Is the golden age of Tech Blogging over or not? Here are two views: End of an Era: The Golden Age of Tech Blogging is Over article tells that like the film industry, the Golden Era is the emergence period, when fresh innovation in a new medium is born. New techniques, revolutionary content, and different

HTTP/2 on Firefox

Firefox 36 arrives with full HTTP/2 support and a new design for Android tablets. Mozilla launched Firefox 36 for Windows, Mac, Linux, and Android. The biggest news for the browser is undoubtedly HTTP/2 support. HTTP/2, the second major version of Hypertext Transfer Protocol (HTTP) and the biggest update in years.  HTTP/2 (originally named HTTP/2.0) is

FREAK attack on HTTPS

A new security hole to attach against HTTPS has been found! It called FREAK Attack. FREAK (Factoring RSA Export Keys) name called hole to force the equipment to spend a considerable outdated encryption – OpenSSL, iOS and OS X tricked into using weak 1990s-grade encryption keys. Well-planned man-between-the attack of the hacker could hijack a