Weekly Roundup

Weekly Roundup No. 32

Google+ Pinterest LinkedIn Tumblr

Web Development

5 Big Enterprise Web Application Development Trends for 2017

This article reviews where enterprise application development is headed in 2017.


How Do I Become a Java Web Developer?

This post provides information on how to become a Java web developer.


Top Mobile App Development Companies and Developers 2017

This article curated a list of the top mobile app development companies in 2017.


Essential Enterprise iPad Application Development Tips

This article presents certain points too keep in mind before investing in an enterprise iPad application.


Tutorials

A Guide to Faster Web App I/O and Data Operations with Streams

This is a guide on how to use streams for Web App I/O and data operations.


Progressive Web Apps Tutorial | How to Build A Progressive Web App? | Web Apps Development Tutorial

Hello, and Welcome to Progressive Web Apps Tutorial conducted by ACADGILD! It is a frontend webinar, introducing you to progressive web development and also make you build the first progressive web app. Objectives: After completing this webinar session, you will able learn, * What is Progressive Web Application * Why is it called a progressive web application?


Laravel 5.5 Angular 4 Tutorial Example From Scratch

This is a Laravel 5.5 Angular 4 tutorial. This example is a showcase of how we can use both to create a full stack application and how we can connect with an API.


PHP

Most Used PHP Frameworks in 2017

This article reviews 5 PHP frameworks used extensively in 2017.


PHP Benchmarks: OPcache vs OPcache with Performance Tweaks

This Benchmark attempts to squeeze a little more performance out of PHP by tweaking OPcacheís directives.


52: Upload files and images to website in PHP – PHP tutorial

Upload files and images to website in PHP – Learn PHP backend programming. In this episode I will show how to easily upload images and files to a website. We will also learn how to add error handlers specific to uploading such as file size and file type.


From Our Partners

Ixia – Penetration Testing: Money Spent, Still Vulnerable

It is assumed that if you have undergone a penetration test, received a report, and fixed the issues discovered, you are secure and immune to devastating attacks. But data shows that this view is dangerously wrongóorganizations that pay big bucks for penetration testing services may find they are still vulnerable. Why is this the case?

 

I am a frontend and backend web developer who loves building up new projects from scratch. In my blog "Lingulo" me and some guest authors regularly post new tutorials, web design trends or useful resources.

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments