BT

Facilitating the Spread of Knowledge and Innovation in Professional Software Development

Write for InfoQ

Topics

Choose your language

InfoQ Homepage Apple Content on InfoQ

Articles

RSS Feed
  • Q&A on the Book Competing with Unicorns

    The book Competing with Unicorns by Jonathan Rasmusson explores the culture of tech unicorns like Google, Amazon, and Spotify, and dives into the techniques and practices that they use to develop software.

  • An Introduction to Differential Privacy

    Differential privacy leapt from research papers to tech news headlines last year when, in the WWDC keynote, Apple VP of Engineering Craig Federighi announced Apple’s use of the concept to protect user privacy in iOS. This article gives a definition of differential privacy and example of differentially private algorithms.

  • Swift and Objective-C Runtime Programming

    Since a few months ago, a debate has been going on within the Objective-C/Swift developer community concerning the lack of dynamic features in Swift and the importance that runtime programming plays in Objective-C and Cocoa. InfoQ has spoken with Swift developers Chris Eidhof and Drew Crawford to learn more about these potential issues.

  • The InfoQ Podcast: Shuman Ghosemajumder on Security and Cyber-Crime

    In this week's podcast, professor Barry Burd talks to Shuman Ghosemajumder VP of product management at Shape Security on Security and Cyber-Crime at QCon New York 2016.

  • Merry Swiftmas from InfoQ

    It's nearly Christmas time now and some might still be looking for a tree and a few presents. Well, InfoQ would like to help you here. This article teaches you to create as many trees and presents as you need on your iOS device using Apple Swift and SceneKit. SceneKit is a 3d-graphics-framework often used for gaming projects and obviously sometimes to create Christmas accessories. Merry Swiftmas!

  • Mobile Attacks and Defense

    In this IEEE article, author Charlie Miller talks about the mobile security vulnerabilities. He explains how smart phones are becoming targets of attackers and discusses security models of two smart phone operating systems: Apple's iOS and Google's Android. The attackers can get remote code to run on a mobile device in two ways: mobile malware and drive-by downloads.

  • Omnipresent Synching and Availability with Mobile Couchbase

    Omnipresent synchronisation will be easy with CouchDB not only hosted as server side database but also being embedded in mobile applications. Couchbase made the NOSQL Document Database available for the mobile platforms to enable developers to benefit from the replication and offline capabilities while using the convenient and uniform HTTP based protocol to interact with it locally or remotely.

BT