How to Recover a Deleted Git Stash

How to Recover a Deleted Git Stash

This is a scary story, not like a horror movie, but frightening enough to give any developer the shivers. The story goes a little something like this… A customer directs your attention to a bug you know you’ve solved, tested and shipped. You fixed it one day ago so the bug can’t be there, the …

Company insights, security tips and how to stay awake at work – August 2016

Company insights, security tips and how to stay awake at work – August 2016

In this August edition of our bulletin, we’ve got some internal company insights on our hiring process and remote workspaces, more security tips and a device to help you stay awake at work! Our Workspaces as a Remote Friendly Company We’re a remote friendly company. Our HQ is based in Barcelona, but we’ve got designers …

How We Hire at Mobile Jazz

How We Hire at Mobile Jazz

We have amazing people working with us at Mobile Jazz. Not only because of their deep, strong knowledge of mobile, web, backend and design, but also because of the incredible stories behind each and every person. We enjoy working with great people in a familiar and non-formal environment, and whilst we’re sure there are many …

Our Workspaces as a Remote Friendly Company

Our Workspaces as a Remote Friendly Company

We’re a remote friendly company. Our HQ is based in Barcelona, but we’ve got designers and engineers from all over the world: Brazil, Mexico, Ireland, England, Germany, Italy, Spain and Ukraine, some of whom, work partially or fully remotely. One of the perks about working remotely is being able to design your own work environment, …

Four Tips to Help Reduce Spam Traffic in Google Analytics

Four Tips to Help Reduce Spam Traffic in Google Analytics

Google Analytics is an immensely powerful free service to track and report website traffic. If you’re already using Google Analytics, you’ll most likely have noticed some unhelpful spam traffic from any number of sites such as theguardlan.com, social-buttons.com, get-free-traffic-now.com and a whole slew of others. In this post, I’m going to give you four tips …

Embrace HTTP/2 and Improve Your Websites and Apps User Experience

Embrace HTTP/2 and Improve Your Websites and Apps User Experience

What is HTTP/2? HTTP/2 is a major revision of the Hyper Text Transfer Protocol, a standard that controls the connection between your browser and a server. The last version of HTTP (1.1) was released in 1997 when the web was very basic, as you imagine it needed a refresh. HTTP/2 assures improved websites and apps …

Previewing Our New Look, Top Security Insights and Steps to Happiness – July 2016

Previewing Our New Look, Top Security Insights and Steps to Happiness – July 2016

Welcome to the Mobile Jazz Bulletin, this month we’ve got a sneak preview of our upcoming website and top security insights from Jordi; our CTO, co-founder and security expert. This is Mobile Jazz – Our 2016 Look is Coming At Mobile Jazz, we like to stay One Step Ahead which frequently involves reinventing ourselves. Our …

Optimizing for Happiness: Moving the Company to Cape Town for Two Months

Optimizing for Happiness: Moving the Company to Cape Town for Two Months

Employing our Optimizing for Happiness philosophy, several times a year we set up temporary offices in various locations around the world. Our priority is always happiness and company retreats give our remote friendly team the chance to spend some time together, both working and relaxing. Earlier this year we rented a villa in Cape Town …

The Pros and Cons of Running SSL/TLS on Your Website

The Pros and Cons of Running SSL/TLS on Your Website

Running SSL/TLS on your website has advantages and disadvantages, but I’m willing to wager that you’re more than likely to want it on your website. From it’s privacy benefits to boosting your website’s Google ranking, running SSL/TLS is almost common sense. However, there are also a lot of false myths about SSL/TLS that might make …

Which Security Risks Do CORS Imply?

Which Security Risks Do CORS Imply?

Cross-origin resource sharing (CORS) is a security relaxation measure that needs to be implemented in some APIs in order to let web browsers access them. However, when CORS is enabled by a back-end developer some security analysis needs to be done in order to ensure you’re not relaxing your server security too much. The problem …