Web Development
5 Big Enterprise Web Application Development Trends for 2017
This article reviews where enterprise application development is headed in 2017.
How Do I Become a Java Web Developer?
This post provides information on how to become a Java web developer.
Top Mobile App Development Companies and Developers 2017
This article curated a list of the top mobile app development companies in 2017.
Essential Enterprise iPad Application Development Tips
This article presents certain points too keep in mind before investing in an enterprise iPad application.
Tutorials
A Guide to Faster Web App I/O and Data Operations with Streams
This is a guide on how to use streams for Web App I/O and data operations.
Progressive Web Apps Tutorial | How to Build A Progressive Web App? | Web Apps Development Tutorial
Hello, and Welcome to Progressive Web Apps Tutorial conducted by ACADGILD! It is a frontend webinar, introducing you to progressive web development and also make you build the first progressive web app. Objectives: After completing this webinar session, you will able learn, * What is Progressive Web Application * Why is it called a progressive web application?
Laravel 5.5 Angular 4 Tutorial Example From Scratch
This is a Laravel 5.5 Angular 4 tutorial. This example is a showcase of how we can use both to create a full stack application and how we can connect with an API.
PHP
Most Used PHP Frameworks in 2017
This article reviews 5 PHP frameworks used extensively in 2017.
PHP Benchmarks: OPcache vs OPcache with Performance Tweaks
This Benchmark attempts to squeeze a little more performance out of PHP by tweaking OPcacheís directives.
52: Upload files and images to website in PHP – PHP tutorial
Upload files and images to website in PHP – Learn PHP backend programming. In this episode I will show how to easily upload images and files to a website. We will also learn how to add error handlers specific to uploading such as file size and file type.
From Our Partners
Ixia – Penetration Testing: Money Spent, Still Vulnerable
It is assumed that if you have undergone a penetration test, received a report, and fixed the issues discovered, you are secure and immune to devastating attacks. But data shows that this view is dangerously wrongóorganizations that pay big bucks for penetration testing services may find they are still vulnerable. Why is this the case?