Swift and Visual Studio Code – owensd.io

We’ll be able to start building plug-ins as the product matures to enable all sorts of development, including Swift! Who’d expect Visual Studio to work with Swift? Source: Swift and Visual Studio Code – owensd.io

Reducing WatchKit Traffic With View Models

By using View Models the developer can create wrappers around their model objects, simplifying their extension architecture while at the same time reducing the network traffic sent from the phone to the watch. Source: Reducing WatchKit Traffic With View Models — theScore Tech Blog

Lessons on app marketing

Complete cold call but the story was right up his alley. He was interested but didn’t end up writing something. That happens — get over it! He did start reading the Tapity blog though (hint: in case you hadn’t noticed, the blog has been pretty key to my success). Journalists want good stories and if you become […]

Making command line tool in NodejS

In the last post, we made a simple command line tool. In this post, we’ll add subcommands to that tool. Source: The npm Blog — Adding subcommands to your command line tool

SwiftLint

An experimental tool to enforce Swift style and conventions. Source: realm/SwiftLint

9 Anti-Patterns Every Programmer Should Be Aware Of

Every once in a while we’d interrupt that to discuss the typography and the color of the cover. And after each discussion, we were asked to vote. I thought it would be most efficient to vote for the same color we had decided on in the meeting before, but it turned out I was always […]

JSONExport

Code Issues 1 Pull requests 0 Wiki Pulse Graphs SSH clone URL You can clone with HTTPS, SSH, or Subversion. Clone in Desktop Download ZIP JSONExport is a desktop application for Mac OS X which enables you to export JSON objects as model classes with their associated constructors, utility methods, setters and getters in your […]

Technical Note TN2232: HTTPS Server Trust Evaluation

If this trust evaluation fails, the client refuses to connect. This can happen for a variety of reasons, some benign—the server might be using a self-signed certificate, an intermediate certificate is missing, and so on—and some malicious—the server is an impostor, looking to steal the user’s data. This document describes the reasons why server trust […]