I’m not sure if I like this game or not.

I played the first hour of The Surge, and it was pretty good! It felt like a mix between Dark Souls and Bloodborne (which is to say: Good), but then I got stuck on one boss fight for about an hour bec ...

Continue Reading
I’m a software engineer who has been working in the games industry for over 10 years.

I've worked on many AAA titles, including Bioshock 2 and Infinite as well as The Bureau: XCOM Declassified. In my spare time I make indie games like Bug Princess and have recently started making video ...

Continue Reading
I’m a software engineer, and I want to help you write better code.

I have been writing code for almost as long as I can remember. My first computer was an IBM PCjr that my parents bought me when I was in third grade. It came with a BASIC programming language cartridg ...

Continue Reading
I’m not sure if I like this or not.

It's a bit of a mess, but it is an interesting mess. The good: The art is great and the story has some potential to be really fun. The bad: There are too many characters in this issue for me to care ...

Continue Reading
Don’t get overwhelmed with the API Security Checklist.

Focus on a few things, and you will be well on your way to securing APIs https://t.co/dzuPgVtOnG ...

Continue Reading
I got a job as a software engineer at Google.

The Interview Process I applied to the Software Engineer Internship program in early February, and was invited for an on-site interview about two weeks later. I flew out from Boston to Mountain View, ...

Continue Reading
  Zoom is a web conferencing tool that allows for up to 100 participants.

It works on all devices and browsers, including mobile phones.  You will need a microphone and speakers or headphones (headphones are preferred). You can download the Zoom software from their website ...

Continue Reading
You need to have a logging and monitoring system that is capable of detecting malicious activity as soon as possible.

trends in abnormal API usage, such as repeated failed login attempts or repeated invalid inputs. You can then use the data from your logging and monitoring system to detect attacks early on, before th ...

Continue Reading

Back to Main

Subscribe for the latest news: