Posts From Dave Drager

Dave Drager
Dave Drager 5 posts

Administrator / CTO of XDA Developers. If you have any site feedback, please let me know!

Under The Hood at XDA Developers

Running a website as large as XDA isn't an easy process - we depend on a web development team here in Philadelphia, plus the fantastic products and serviced offered by our host, LeaseWeb, to ensure the availability and speed of the site that every Android enthusiast knows and loves. Knowing that our visitors are more...

XDA & New Relic Performance Monitoring [Sponsored]

In other posts we've raved about New Relic Mobile for monitoring performance of our XDA One mobile application and New Relic APM, which we use for daily oversight of XDA's database and PHP servers. In this post we want to explain how we use New Relic on a daily basis and provide a specific example...

Google ATAP Reveals Project Ara Developer Kits and 100K Prize Challenge

Today, Paul Eremenko from Google's Advanced Technology and Projects division announced a developer prize challenge and the upcoming availability of developer kits, which represent the Project Ara platform and enable developers to begin working on modules.The developer boards will allow users to explore the Project Ara platform, and will include multiple reference "modules" on board so...

Project Ara – What Do You Want to Know?

Google will be holding its first Project Ara Developers' Conference this April 15-16 in Mountain View, CA. The conference will be live-streamed, and in-person attendance is limited. Guess who will have a representative at the conference?While the Project Ara MDK .10 has been released and the conference schedule is online, what details the conference will...

Heartbleed: What XDA Did to Patch This Critical Internet Flaw

Pardon this break from our usual mobile development news for a short brief on a recent security vulnerability that affected XDA. Heartbleed is rightly considered to be one of the most dangerous bugs to hit the Internet in a long time, if not ever. Since XDA's servers were vulnerable to this exploit, we wanted to...