Articles by Dice Staff
-
Can Reactive Programming Handle Complexity?
A previous article in this series illustrated the expressive power of Reactive Programming, where five lines of Reactive could solve a problem that required 500 lines using Java or 200 lines usin… -
Coming Soon: Video Technical Interviews
Yahoo's purchase last week of San Francisco startup Distill was about its team's background in mobile advertising. To us, though, what’s interesting is the company’s most recent effort: a new onl… -
NSA Leak: Snowden Stole All-Access Password
Former National Security Agency (NSA) contractor and current fugitive/whistleblower Edward Snowden may have scammed a fellow civilian NSA employee in order to expand his access to top-secret docu… -
How Gracenote Became a Big Metadata Player
[caption id="attachment_17390" align="aligncenter" width="618"] Gracenote Rhythm is a lot like Pandora with a RESTful JSON API.[/caption] Last week, Tribune Company completed the $170 million acq… -
Kickstarter Hacked, User Data Stolen
[caption id="attachment_17384" align="aligncenter" width="399"] Crowdfunding site Kickstarter was notified of a breach Feb. 12.[/caption] Crowdfunding site Kickstarter has been hacked, and the pe… -
These Are the Traits Amazon Likes in Tech Hires
IT job seekers complain of the hoops they have to jump through to work at Google or Microsoft. Amazon’s not much different, though it does have its own unique set of hoops. To be a manager at the… -
Why Women Start Lifestyle Tech Companies
Women tech entrepreneurs in the retail and lifestyle space are increasingly gaining customers and attracting venture capital interest. Companies like Birchbox, Gilt, Rent the Runway and Foodspott… -
Study IDs Spot in the Brain That Decides on Love
[caption id="attachment_17368" align="aligncenter" width="500"] fMRI images show regions of the brain lighting up at thoughts of love or lust.[/caption] If the $2 billion Americans spend on onlin… -
iPhone, IE10 Suffer 'Monster' Hacks
[caption id="attachment_17344" align="aligncenter" width="499"] iOS flaw lets attacker take over messaging; IE 10 flaw lets attacker pwn the PC.[/caption] Security researchers announced yesterday… -
Game Developers Crossing the Uncanny Valley
Meet "Ira." Ira isn't an actual human being—he's just a computer model—but you'd be forgiven for not being able to tell the difference. "Not only does Ira look real, but this is all generated in…