Due to popular demand for my previous post about implementing and displaying the search container under the tab bar for tvOS, I’m going to revise this topic and share with everyone an updated version for getting UISearchController to work properly in tvOS Swift 3.0. The purpose of this tutorial is to focus on getting the search container to display under the tab bar for […]
Understanding the concept of algorithms is an empowering thing to have in your arsenal. It makes you think about scaling, performance, and being efficient at what you’re doing. You can decrease your workload and the time you spend at your desk. I’m not an algorithmic or a mathematical expert, but I understand algorithms to increase efficiency at what I’m […]
There are many bad habits that WordPress developers should avoid. Some of these include using asterisk (*) for SELECT queries, redundant queries, and most importantly not being familiar enough with SQL. After years of developing on enterprise websites, developers often ask themselves these following questions: Why did I not know this method before? How was I able to get by before? Most developers […]
“The hackers are breaching the architecture, not the authentication mechanism” – Garret Grajek, CSO at dinCloud How do I protect myself from being hacked? Here are twelve best practices that will help you protect your accounts. You should never trust anyone or any site with your credentials. Period. Two-factor authentication The difficulty of obtaining both authentication factors make 2FA accounts more difficult to […]
Apple released the 4th generation Apple TV on October 30, 2015, packaged with tvOS 9.0. On December 8, 2015, tvOS 9.1 was released. One of the most exciting things that happened during 2015 was Apple’s announcement of the new Apple TV and the public release of tvOS SDK. With the tvOS SDK being available, third-party developers can finally develop apps […]
SSH provides a highly secure method to authenticate a client and communicate with a remote server using public-key cryptography. It does not send unencrypted credentials, like telnet, FTP, and other older clients. One of the well-known risks with unencrypted password-based authentication is that anyone can eavesdrop on your connection, capture network packets, and crack your password with a rainbow table. […]