POPULARITY
Linh wonders what bitcode is, and Dimitri tries his best to explain it… slowly… Check out Linh's app, Not Phở, a cook that introduces the user to Vietnamese cuisine, especially dishes other than Phở. It runs on iPhone, iPad, and Mac. It also have an iMessage sticker pack so that you can share with all your friends and family. App Store: https://apps.apple.com/app/apple-store/id1525104124?pt=14724&ct=Podcast&mt=8 Follow us on Twitter: https://twitter.com/LinhAndDimiChan Follow Dimitri on Twitter: https://twitter.com/dimitribouniol Follow Linh on Twitter: https://twitter.com/linhbouniol
Pre-show: Marco flirts with his past Follow-up: Bitcode has been deprecated Previously, on ATP #205 (Overcast timestamp link) (Transcript) New big HomePod rumor Ricky on Passkey syncing YubiKey Very important Caffè Macs follow-up BNPL Planet Money The 256GB 13” M2 MacBook Pro has crummy SSD performance 15” MacBook… something? #askatp What makes WWDC ‘22 different than the before times? (via Elijah Yap) Are we living in the gilded age for Mac professionals? (via Wade Tregaskis) How close is APFS (
Jocke leker kroppsarbete och bygger pooldäck. Det är jobbigt att göra saker ordentligt. Jocke ger bort sin Macbook pro, avbeställer PC. Beställer PC igen. Livet med Linux på Latitude. Klistermärkesrapporten Det är mer som händer runt Max Temkin. Jocke börjar gräva Jocke köper mus, saknar Magic mouse Korvtips! Stora disketter och Playstation 5 Apples ARM-övergång, folks tyckande, vårt tyckande. Vore det inte kul om det kom en riktigt billig instegs-Mac? Kommer det att bli nedlåst och konstigt? Six Colors har bytt till Wordpress från Movable Type Poddkungarna börjar få dåligt med annonspengar: ATP börjar med medlemsskap. Är medlemsskap det nya annonser, och vad betyder det i så fall för poddvärlden? Jocke är oroad för långtgående effekter av minskade annonspengar i poddvärlden Kul podd om gammal teknik: Flashback Hey, det finns en ny e-posttjänst med starka åsikter Fandrake släpper bok om Kult Köra bil i Paris, på klassiskt vis Ronin - bilfilmernas bilfilm Länkar Shinobi - “the open source CCTV solution” Shinobi - gammalt spel Soundrecorder Jockes Fractal-låda Låda nummer två - Fractal design node 804 Skoterdelen Inet Do by Friday diskuterade Max avhopp Jockes Google-dokument Logitech M705 Brother korvtipsar GEOS Playstation 5 bs_labs: Re-engine, Not Re-imagine [5 reasons you’ll want to upgrade to an ARM MacBook Tom’s Guide](https://www.tomsguide.com/opinion/arm-macbook-reason-to-upgrade) Första Mac mini Filemaker Feta binärer Bitcode Six colors lämnar Movable type Dithering Luminary Friendly fire Omnibus Ida Peter Esse Flashback - Relay FM Hey - en ny e-postklient från Basecamp Mailspring [Döden är bara början - Fandrake släpper THE ART OF KULT! fandrake.com](https://fandrake.com/the-art-of-kult/) Kult Samlarkortspelet Kult Sinkadus Chock - ett helt annat spel C’était un Rendez vous - bilfilmen Hur C’était un Rendez vous gjordes Ronin (1998) - IMDb Två nördar - en podcast. Fredrik Björeman, Joacim Melin diskuterar allt som gör livet värt att leva. Fullständig avsnittsinformation finns här: https://www.bjoremanmelin.se/podcast/avsnitt-214-marco-armbook.html.
Eric and Jon are in Arizona; people seem to like the bees, and Jon gets to revel in his Bitcode conspiracy a little more. Instagram data found in an 'influencer' breach, and Google releases two factor auth effectiveness data. Jon's curious about Minecraft Earth, and everyone needs to sleep more. 0:00 - Intro 5:46 - More Bitcode Conspiracy 14:18 - Instagram Influencers Scraped 19:48 - 2FA Effectiveness Data 33:08 - Minecraft Earth 36:57 - Go to Sleep
C'est avec Benoît et Xavier que nous abordons l'actualité technologique de la semaine. Benoît nous parle du BitCode d'Apple et du drône-taxi Lilium, alors que Xavier s'est intéressé à Google, Huawei et à la sonnerie chinoise de la honte. Bonne écoute !A comme Apple (00:02:10)Bitcode: pour préparer la migration d'Intel vers ARM? (source, source)G comme Google (00:06:32)Les robots de Google en grève. (source)H comme Huawei (00:09:42)Google retire sa licence Android à Huawei. (source, source, source)L comme Lilium (00:18:57)Lilium présente ses taxis volants. Le nouveau modèle, électrique, 5 places. (source, source, source)N comme NASA (00:24:48)La NASA vous envoie sur Mars. (source, source)O comme Olympus (00:27:37)Olympus Tough TG-6. (source)P comme Panic (00:34:26)Play, la console à manivelle. (source)S comme Sécurité (00:40:12)Une « erreur » qui date de plus de 15 ans dans Google Suite. (source)U comme Unesco (00:47:03)Siri et les préjugés sexistes. Les assistants vocaux sont dotés par défaut de noms et de voix de femmes, ainsi que d'une « personnalité docile ». . (source, source, source)W comme Wéménon (00:53:31)La Chine invente la sonnerie de la honte… (source)En audio ici Voir Acast.com/privacy pour les informations sur la vie privée et l'opt-out.
C’est avec Benoît et Xavier que nous abordons l’actualité technologique de la semaine. Benoît nous parle du BitCode d’Apple et du drône-taxi Lilium, alors que Xavier s’est intéressé à Google, Huawei et à la sonnerie chinoise de la honte. Bonne écoute !A comme Apple (00:02:10)Bitcode: pour préparer la migration d’Intel vers ARM? (source, source)G comme Google (00:06:32)Les robots de Google en grève. (source)H comme Huawei (00:09:42)Google retire sa licence Android à Huawei. (source, source, source)L comme Lilium (00:18:57)Lilium présente ses taxis volants. Le nouveau modèle, électrique, 5 places. (source, source, source)N comme NASA (00:24:48)La NASA vous envoie sur Mars. (source, source)O comme Olympus (00:27:37)Olympus Tough TG-6. (source)P comme Panic (00:34:26)Play, la console à manivelle. (source)S comme Sécurité (00:40:12)Une « erreur » qui date de plus de 15 ans dans Google Suite. (source)U comme Unesco (00:47:03)Siri et les préjugés sexistes. Les assistants vocaux sont dotés par défaut de noms et de voix de femmes, ainsi que d’une « personnalité docile ». . (source, source, source)W comme Wéménon (00:53:31)La Chine invente la sonnerie de la honte… (source)En audio ici
This week, Chris and Soroush discuss Soroush's latest project, which among other things involves porting his Swift Promises library to Objective-C. Soroush's Swift promise library Gist of Soroush's Objective-C promise library Fucking Block Syntax Episode 4: Promises Episode 15: Not Invented Here BAPromise CocoaPods, Carthage Bitcode Android Support Library Tiny Swift Idioms in Objective-C We didn't discuss this in the episode, but it's relevant: One Weird Trick to Lose Size
There’s been a lot of debate and controversy around the lack of women and minorities being represented in tech companies from entry-level to the C-suite and board room. However, what isn’t showcased is how there is sisterhood within tech, where women are helping each other out, and enacting change at every level from schools to the board room. To talk about how women are investing and encouraging each other, I’ve invited Samantha Walravens who is the co-author of the new book Geek Girl Rising: Inside the Sisterhood Shaking Up Tech. If you’re a woman, minority, or male ally you’ll learn from Samantha how: Women like Maria Klawe at Harvey Mudd have tripled the number of women graduating with Computer Science degrees Women are connecting female founders to female angel investors and influencers to grow their startups Corporations are changing and disrupting the dynamics of the boardroom This is the last episode of FemgineerTV but don’t worry it’s not the end... After hosting FemgineerTV and listening to audience members like you for the past 2 ½ years, myself and my sponsor Pivotal Tracker decided it was time for a fun format! Starting next month, I’m going to be launching a new show called Build. I think you’ll enjoy the new format for Build. Each week you’ll receive a short video on a topic to help you build a product, company, and career in tech. So stay tuned for the launch of Build :) Want to help us get the word out about Build? Please take a moment to leave a review on iTunes here. If you’ve never left a review, here is a quick tutorial on how to do. -- Poornima: Welcome to another episode of *Femgineer TV*, brought to you by Pivotal Tracker, I'm your host, Poornima Vijayashanker, the founder of Femgineer. In this show, I invite innovators in tech, and together we debunk myths and misconceptions related to building tech products and companies. One of the most heated topics today is the lack of women and minorities represented in tech; from entry level, to the C suite, to the board room. While we all know this is already a problem, in today's episode, we're going to be talking about some of the solutions, and showing how there are companies and organizations enacting these solutions. And to help us out, I've invited Samantha Walravens, who is the coauthor of the latest book, *Geek Girl Rising: Inside The Sisterhood Shaking Up Tech*. Thanks so much for joining us today, Samantha. Samantha: Thanks for having me! Poornima: Yeah, it's wonderful. Let's start by talking about why you and your coauthor, Heather Cabot, decided to write this book. Sharing The Unspoken Narrative of Women In Technology Samantha: The inspiration for this book was a conversation I had about three years ago with a friend of mine, who's been in Silicon Valley for 20 years. She's a woman, she's the VP of sales in business development, and she's worked in a number of tech startups, and we were having coffee, and she said, "Sam, I cannot tell you what just happened in my performance group review, it was last week, and my manager commented on what I was wearing, the color of my dresses, the jewelry I wore, and he told me that I was too aggressive, and too bossy, and I needed to tone it down a bit." Meanwhile, she is the head of sales, and she was rocking her number out of the park. So she said, "Sam, you've got to write something." She knew I was a journalist. She said, "You've got to write something and you have to talk about this kind of discrimination and this kind of sexism in Silicon Valley." Mind you this is before the *Newsweek* article came out, "What does Silicon Valley really think of women," people were discussing women in technology, but it really was not a top of mind—and so I started to do a little digging, and researching and interviewing women. And what I found was, yes, there's sexism, there is harassment, there's discrimination, there's unconscious bias, it's there, it's a problem we need to talk about it and deal with it. But there was another narrative, another discussion that wasn't being told, which was: these women want to talk about the companies they were building, the technologies they were creating, the women who are supporting them and helping them along the way in their careers. There was this whole other narrative that was missing from the conversation that was happening in the national news media about sexism in Silicon Valley. And I thought, "we have to discuss this." So, Heather Cabot, who's my coauthor, was in New York, I'm in San Francisco, we talked, and she said, "Sam, I've been researching this topic," it was kind of a coincidence, it was like one of those weird moments of weird fate. And she said, "I've been researching this topic, let's work together." So we put our heads together and we just started digging into the topic, and it's been three years now, and finally the book is coming out! The Sisterhood That Is Supporting Women In Tech in Silicon Valley And Beyond Poornima: So one thing I experienced early on in my career, and it keeps me motivated, is the women who inspired me. So, early on, when I was a college student in engineering school, I had a professor, and she had twins, and she was doing her research, and she was teaching, and she was leading the department, and I thought, "If she could do it, I could do it." And as I was reading the book, I noticed the theme of the sisterhood kind of coming up again and again. Tell us how you discovered this theme as you started writing or as you were doing your research. Samantha: Of course. Well, I too had a mentor back in my Silicon Valley days when I worked for a software startup during the dotcom boom in 1998 to about 2003, so I saw the dotcom boom and the bust happen, I was living through it, our company went public, stock went to 130, then went down to two, so I lived and breathed the dotcom boom and bust. My manager/boss at that point was Carol Carpenter, who has since gone on to become—she was the CEO, actually CMO of ClearSlide and then CEO of ElasticBox, so she's a prominent woman in Silicon Valley, and she really pulled me up. She really, when I was lacking confidence, and I thought, "I can't do this," I'd just had my baby, my first baby, we were going public, and I thought, "I can't do this, this is crazy." We're working 24/7 and I have a newborn at home. She was the one who said, "Sam, you can do it, you can do it." And having that kind of mentorship and that kind of woman who was going through it herself pulling me up, really encouraged me. So as we were researching the book, we started noticing these pockets around the startup universe, women who were supporting each other, investing in each other, encouraging each other in their careers and inspiring the next generation of girls and young women to pursue technology and continue their careers in technology. Encouraging The Next Generation of Women To Consider Careers In Tech Poornima: Yeah, that's great. I think you're absolutely right, that is a narrative that's missing from the media and more women need to know that that's out there as well, so that they don't feel like all there is is just what the media portrays. Now, the first place that you write about change happening is at the primary school up to the high school level, so walk us through what that looks like. Samantha: Well, fortunately, before Obama left office, he did create an initiative, a $4 billion initiative called "Computer Science for All" that is encouraging and putting funds towards creating computer science curriculum in schools throughout the country. I was so excited to read about Rahm Emanuel in Chicago, in the Chicago public schools now, computer science is a requirement for all high schools in Chicago. So I think we're going to see more of that. When you look at the numbers, though, we still have a long way to go, cause 25% of high schools in the U.S. offer computer science, I think it's like 22% of girls, of students taking the computer science AP exam are girls, so we still have a long way to go. What we noticed, though, it's sort of this grassroots movement of women who are encouraging the younger generations to start building, to start creating, to start coding. For example, we start our book talking about Debbie Sterling, who's the founder and the CEO of Goldie Blocks, and she's got this great—I have two little girls, we have it at home, it's a great toy that encourages girls to build, and there's a really fun, positive role model, Goldie, who builds a spinning machine and she has all these sorts of engineering—you wouldn't even know it's engineering, it's really just building Ferris wheels and building merry-go-rounds and all these fun things, along with the story, talking about Goldie and her friends, and how she's building these different fun games and amusement park rides. We have that in our household. These are the kinds of things that women are doing to try to inspire the next generation. There is a woman in our book who started a company called Bitcode, she's actually working with the public schools to get them to use video to teach girls how to code. So if you have kids you know that they're on video, they're on YouTube, and they're really tech savvy. I have four kids, they can get around YouTube, and iMovie, and they're all over it. So, this tool is used in the public schools, to teach coding, using videos, to make it fun. How Colleges Are Changing The Ratio Of Women Graduating With Computer Science Degrees Poornima: It's great, yeah, it's good to see these grassroots efforts, so that even if there is kind of a gap in terms of change for public schools or the school system in general, there's ways in which parents and teachers can supplement that. So, the next place in which a lot of women and minorities drop off is at the college level, tell us who's working on changing that. Samantha: Well, we had the most amazing experience at Grace Hopper in 2015. I believe you were there, and Heather and I, my coauthor and I went, and just to see, I think it was 12,000 women there in computing, and it is a true celebration. And to see the enthusiasm and the excitement and the bonding between these young women, it was so encouraging. When you look at specific colleges, there's a lot being done to encourage more women in to pursue technology and computer science. I met with Maria Klawe, who's the president of Harvey Mudd, and wow! What a firecracker she is, she skateboards around campus, she's just a really fun, wonderful woman, and she implemented a program along with her colleagues a few years ago, where there are two tracks for computer science, so as a freshman you can take the gold track or the black track. The gold track is for students who have not had any computer science experience in high school; the black track is for students who've had some experience. So, by doing this, the students who have not had experience don't feel so impostered, they don't have the confidence cause no one's had this experience, so they get through this year and I spoke to a couple of students who have taken these classes, and they say that by the end of the year, everyone's pretty much at the same level. So, she, Maria Klawe, and her team has tripled the number of women graduating with computer science degrees at Harvey Mudd in the past ten years, and the number is, I hate to throw in all these numbers, cause they get little mind boggling at times, but 55% of the computer science graduates at Harvey Mudd are now women. Poornima: That's great, it's a nice change to—the numbers go up. Samantha: There's also Stanford. Another example of what's going on to encourage women to pursue computer science is Stanford University, of course a top institution, but they have a Women in Tech group called She++, which was started by Ayna Agarwal, and who was not even a computer science major by the way, but she started this group to encourage women and they had a Gala, every year, which gathers all the women in technology, not just Stanford. What they do is they go out into the communities and they take on high school students in different communities around the country and they support these young high school girls to start programs in their communities. For example, I live out in Marin County, and there is a girl who started a robotics happy schooler box program in Marin City, which is an underserved community in Marin County, and she runs this afterschool program in Marin City. So all of these girls around the country who are starting these programs through She++ gather together for this gala, and I am telling you, if you could be there to see these college women, these high school girls who came, they were dressed to the nines, they were glamorous, I mean, talk about debunking the myths and breaking stereotypes about what a woman in tech looks like, I mean, we could have been in an LA nightclub, not to sound like—but they were so beautiful and wonderful and smart and excited to talk about their programs, and they were so excited to be in technology. And again, this is why Heather and I said, "This is a story that no one sees," you don't see this kind of enthusiasm around technology, you see, "Oh, it's so hard, numbers are dropping, it's all doom and gloom." And so we really wanted to tell that other story. The Angel Investors And Others Who Are Supporting Female Founders Poornima: OK. That brings us back to industry, and I know there's a lot going on at the corporate level, as well as startups. I'm of course partial to startups, so let's start there and talk about how the ecosystem is changing for women and minorities. Samantha: There's a lot of momentum behind supporting female founders. For example, there are accelerator programs like the Women Startup Lab, which is down here at Menlo Park; there's MergeLane, which is in Colorado; there's The Refinery in Connecticut. These programs focus on female founders, and really giving them the tools, the skills they need to grow their company into a venture, fundable company. And they give the tools to learn how to pitch venture capitalists, and we all know the venture capital world is very male dominated. Poornima: Yeah, it is a challenge. I know I've had my fair share of doing the fundraising. So, there's a very common problem around women and minorities getting up and pitching their business to VCs, either male VCs not getting their idea, or they don't think it's a big enough market, or there's a lot of unconscious bias around it, so how are women getting their training to get over all of that? Samantha: Well, you've started a company, so you know what it's like. The founders that we've met, that I've met in my journey with this book, are so passionate about their idea. But you can have an idea, and it's not going to go anywhere—you have to have the product market fit, you have to test the idea, you have to build your team out—and so these programs are really teaching women what they need to do to get to that level, to actually pitch to investors. But when you look at the numbers, I think it's 10% of the venture funding, globally, goes to female founders—it's still a really small percentage. We've also noticed that there's women who are angels. So angel investors who fund companies at the early stages—for example, Joanne Wilson, aka Gotham Gal, who has a tremendous momentum in New York City, who has invested in a number of really great companies; Caren Maio, Nestio, Shanna Tellerman, Modsy—she finds these women, who have ideas that are big, that are scalable, and she nurtures them, and she's like the fairy godmother to these women. And there are other women that we talk about, we'd had to read the book to learn about all of them, but there are women who really take these female founders under their wing and support them on their journey. Poornima: I think it's great that there are women like Joanne Wilson out there. Do you have a sense of how many companies she's invested in? Samantha: Joanne Wilson has invested in around a hundred companies, and they're doing fantastic. One of them, Shanna Tellerman, started the company Modsy, which is an immersive, 3D environment for home décor, home design, and she told us that she created this project called “The Pinnacle Project,” at Park City, Utah, and it was Wednesday through Sunday, I think. And she invited Joanne, and Susan Lyne, and a bunch of angel investors, as well as a number of female founders, to come gather, network, ski, and have fun, and she said it was funny, because all the women were thinking, "We should be home, we should be working, we should be with the kids, we have so much to do," and she said she had to tell and remind people that, "This is what the guys do. They have a boys call and they pick off and it's all about business, whereas women don't have that sense of, “Let's go out to ski, or golf,” and that kind of networking, so it was an example of this pinnacle project, which is going to happen recurring every year, of, "OK, women, we can get together, have fun together, network, introduce each other to investors and influencers, and have fun while we're doing it. It's OK." Poornima: Yeah. That's fantastic. And I think another thing you had mentioned pipeline ventures, or pipeline angels? Samantha: Pipeline angels, yes, yes. Natalia Oberti Noguera is a force of nature and she started this angel investing group for women and I went through it and Heather went through it. I did it in San Francisco, Heather did it in New York, and basically it's a training, it's a bootcamp or a training program for women who are credited investors, to learn how to invest in female and minority-led companies. So it walked us through the process of how do you set evaluation on a company, what do you look for in a startup that you're investing in, what kind of traits you want to look for in the team, what's going to make this a good investment. So it trains women to invest as angels, and then you actually make an investment at the end. We made an investment in a great startup—which I believe is still hush hush, underground at this point—but I believe we made a great investment and we're following the course of these early stage female founders, and it's really her goal to change the face of angel investing, to increase the amount of money going towards these early stage female founders. Poornima: As we were doing research for your book and when I was reading it, I noticed that there was some astonishing findings, like only 11 companies that were founded by African-American women have received funding over a million dollars. So walk us through who is working to change this. Samantha: Well, that number has actually increased, it's now 13 companies that have received more than a million dollars, but the numbers are still really low. One woman who is really on top of this problem is Kathryn Finney, who is the founder of DigitalUndivided, which is an organization whose main purpose is to increase the number of women, minorities in the tech world, latino women, and black women founders, and she just recently launched an accelerator, in Atlanta, Georgia, called the Big Innovation Center, and I think their first cohort is gathering this year to help skill up and prepare these minority founders to raise money. How Tech Companies Are Growing Up And Changing How The Nature of Work Poornima: So let's switch gears, and talk about corporations. We previously had Lisen Stromberg on the show, talking about the changes that were happening for parents—what have you seen? Samantha: Well, what we've noticed is that Silicon Valley is growing up. They are trading in their ping-pong tables and foosball tables for nursing rooms, which is inspiring to see. When I started out, I had my Medela Pump in Style in a cold bathroom out of the courtyard of our startup, so it wasn't pretty, but we spent a day at Eventbrite not too long ago, and Julia Hartz, who's now the CEO of Eventbrite, it's very focused on woman, developing women in leadership positions and allowing for work-life balance. And I say that word, “work-life balance,” a term that is loaded, what she's trying to do with that company is focus on the whole person, not just the employee self. For example, they have a program called “Take the time you need.” So if you need time to care for a child or to care for an adult, you can work from home, you can take time off, so she's really interested in her employees, and telling her employees, "You can do what you need to do, so you can live a life and you can be an employee." And she also tells the women who are having babies at her company, she says, "You know what? You can get through the first six to nine months," it gets a lot easier, because a lot of women when they have their babies early on, they think, “I can't leave this poor creature alone with a daycare with a babysitter,” and she says, “If you can just get through that”—she's got two little girls herself—”If you can just get through that time, stick with it, come back, and we will support you while you're doing it,” which is fantastic. Poornima: You also showcase companies like Power to Fly. Walk us through what Power to Fly is. Samantha: Yeah, Power to Fly was started by Milena Berry and Katharine Zaleski. Katharine actually wrote an article apologizing to all the mothers out there. Before she had children, she was a little bit judgemental of mothers taking time off and having to leave work early, and then she had her first baby and she thought, "Oh, my gosh, this is really hard," so she and Milena got together and started this company, Power to Fly, which connects women with remote and flexible job positions, so they can actually care for their family and pursue careers in technology. The great thing about technology is that it can be done remotely. Especially if you're in coding, you don't have to be in an office 24/7, so Power to Fly works on that. Another great program is Tina Lee started a program called MotherCoders, and she's based in San Francisco, a fabulous woman, her program retrains mothers in tech skills, so they can go off and they can—either they've taken time off or they have background in some other field, they can skill up in technology, and go out and get the tremendous amount of jobs that are available in technology as they get back to work. Disrupting The Boardroom Poornima: Well, that brings us to the boardroom, so walk us through what changes are happening there. Samantha: The number of women holding board seats in our country is still very, very low, I think the number is 18% of board seats at Fortune 500 companies are held by women. So we still have a long way to go. One real pioneer in this area is a woman, her name is Sukhinder Singh Cassidy, she's fabulous, she is the CEO and founder of a company called Joyus, a tech company, and she, a few years ago penned an article called "Tech Women Choose Possibility." And she really wanted to profile the women in Silicon Valley, in the startup world, who are doing great things, just founding great companies. There was a lot of positive response to that article, and so she created an organization called #choosepossibility. Part of that organization is a group called, or an initiative called "The Boardlist." And basically it's a matchmaking tool that matches qualified, board-ready women with startup, tech companies, looking to fill board seats with women, so she made that happen, and they placed three women on the board, which it seems like it's very low, but what they're doing is they're connecting the VCs and the startup companies with these women, and a lot more placements have been made not directly through the platform, but just through the connections that have been made on this platform. Poornima: OK, great, so it's good to know that there is some change happening at the board level as well. Well, thank you so much for joining us today, Samantha, I know our viewers out there are going to enjoy reading your book, *Geek Girl Rising*. And for our viewers who are women, minority, and allies, is there anything else you would like to share with them in terms of resources? Samantha: Yeah. I would love to see everybody come to our website. We have a gazillion resources on how you can join the digital revolution, just take a peek. Poornima: Thanks for tuning in today and special thanks to our sponsor, Pivotal Tracker, for their help in producing this episode of *Femgineer TV*. If you've enjoyed this episode, then please be sure to share it with your friends, your teammates, your boss, and everyone so that they get to benefit from all the great resources, and subscribe to our channel to receive the next episode. Ciao for now! -- FemgineerTV is produced as a partnership between Femgineer and Pivotal Tracker. San Francisco video production by StartMotionMEDIA.
This week on the show we interview Wendell from Level1Techs, cover Google Summer of Code on the different BSD projects, cover YubiKey usage, dive into how NICs work & This episode was brought to you by Headlines Google summer of code for BSDs FreeBSD (https://www.freebsd.org/projects/summerofcode.html) FreeBSD's existing list of GSoC Ideas for potential students (https://wiki.freebsd.org/SummerOfCodeIdeas) FreeBSD/Xen: import the grant-table bus_dma(9) handlers from OpenBSD Add support for usbdump file-format to wireshark and vusb-analyzer Write a new boot environment manager Basic smoke test of all base utilities Port OpenBSD's pf testing framework and tests Userspace Address Space Annotation zstandard integration in libstand Replace mergesort implementation Test Kload (kexec for FreeBSD) Kernel fuzzing suite Integrate MFSBSD into the release building tools NVMe controller emulation for bhyve Verification of bhyve's instruction emulation VGA emulation improvements for bhyve audit framework test suite Add more FreeBSD testing to Xen osstest Lua in bootloader POSIX compliance testing framework coreclr: add Microsoft's coreclr and corefx to the Ports tree. NetBSD (https://wiki.netbsd.org/projects/gsoc/) Kernel-level projects Medium ISDN NT support and Asterisk integration LED/LCD Generic API NetBSD/azure -- Bringing NetBSD to Microsoft Azure OpenCrypto swcrypto(4) enhancements Scalable entropy gathering Userland PCI drivers Hard Real asynchronous I/O Parallelize page queues Tickless NetBSD with high-resolution timers Userland projects Easy Inetd enhancements -- Add new features to inetd Curses library automated testing Medium Make Anita support additional virtual machine systems Create an SQL backend and statistics/query page for ATF test results Light weight precision user level time reading Query optimizer for find(1) Port launchd Secure-PLT - supporting RELRO binaries Sysinst alternative interface Hard Verification tool for NetBSD32 pkgsrc projects Easy Version control config files Spawn support in pkgsrc tools Authentication server meta-package Medium pkgin improvements Unify standard installation tasks Hard Add dependency information to binary packages Tool to find dependencies precisely LLVM (http://llvm.org/OpenProjects.html#gsoc17) Fuzzing the Bitcode reader Description of the project: The optimizer is 25-30% slower when debug info are enabled, it'd be nice to track all the places where we don't do a good job about ignoring them! Extend clang AST to provide information for the type as written in template instantiations. Description of the project: When instantiating a template, the template arguments are canonicalized before being substituted into the template pattern. Clang does not preserve type sugar when subsequently accessing members of the instantiation. Clang should "re-sugar" the type when performing member access on a class template specialization, based on the type sugar of the accessed specialization. Shell auto-completion support for clang. Bash and other shells support typing a partial command and then automatically completing it for the user (or at least providing suggestions how to complete) when pressing the tab key. This is usually only supported for popular programs such as package managers (e.g. pressing tab after typing "apt-get install late" queries the APT package database and lists all packages that start with "late"). As of now clang's frontend isn't supported by any common shell. Clang-based C/C++ diff tool. Description of the project: Every developer has to interact with diff tools daily. The algorithms are usually based on detecting "longest common subsequences", which is agnostic to the file type content. A tool that would understand the structure of the code may provide a better diff experience by being robust against, for example, clang-format changes. Find dereference of pointers. Description of the project: Find dereference of pointer before checking for nullptr. Warn if virtual calls are made from constructors or destructors. Description of the project: Implement a path-sensitive checker that warns if virtual calls are made from constructors and destructors, which is not valid in case of pure virtual calls and could be a sign of user error in non-pure calls. Improve Code Layout Description of the project: The goal for the project is trying to improve the layout/performances of the generated executable. The primary object format considered for the project is ELF but this can be extended to other object formats. The project will touch both LLVM and lld. Why Isn't OpenBSD in Google Summer of Code 2017? (http://marc.info/?l=openbsd-misc&m=149119308705465&w=2) Hacker News Discussion Thread (https://news.ycombinator.com/item?id=14020814) Turtles on the Wire: Understanding How the OS Uses the Modern NIC (http://dtrace.org/blogs/rm/2016/09/15/turtles-on-the-wire-understanding-how-the-os-uses-the-modern-nic/) The Simple NIC MAC Address Filters and Promiscuous Mode Problem: The Single Busy CPU A Swing and a Miss Nine Rings for Packets Doomed to be Hashed Problem: Density, Density, Density A Brief Aside: The Virtual NIC Always Promiscuous? The Classification Challenge Problem: CPUs are too ‘slow' Problem: The Interrupts are Coming in too Hot Solution One: Do Less Work Solution Two: Turn Off Interrupts Recapping Future Directions and More Reading Make Dragonfly BSD great again! (http://akat1.pl/?id=3) Recently I spent some time reading Dragonfly BSD code. While doing so I spotted a vulnerability in the sysvsem subsystem that let user to point to any piece of memory and write data through it (including the kernel space). This can be turned into execution of arbitrary code in the kernel context and by exploiting this, we're gonna make Dragonfly BSD great again! Dragonfly BSD is a BSD system which originally comes from the FreeBSD project. In 2003 Matthew Dillon forked code from the 4.x branch of the FreeBSD and started a new flavour. I thought of Dragonfly BSD as just another fork, but during EuroBSDCon 2015 I accidentally saw the talk about graphical stack in the Dragonfly BSD. I confused rooms, but it was too late to escape as I was sitting in the middle of a row, and the exit seemed light years away from me. :-) Anyway, this talk was a sign to me that it's not just a niche of a niche of a niche of a niche operating system. I recommend spending a few minutes of your precious time to check out the HAMMER file system, Dragonfly's approach to MP, process snapshots and other cool features that it offers. Wikipedia article is a good starter With the exploit, they are able to change the name of the operating system back to FreeBSD, and escalate from an unprivileged user to root. The Bug itself is located in the semctl(2) system call implementation. bcopy(3) in line 385 copies semid_ds structure to memory pointed by arg->buf, this pointer is fully controlled by the user, as it's one of the syscall's arguments. So the bad thing here is that we can copy things to arbitrary address, but we have not idea what we copy yet. This code was introduced by wrongly merging code from the FreeBSD project, bah, bug happens. Using this access, the example code shows how to overwrite the function pointers in the kernel used for the open() syscall, and how to overwrite the ostype global, changing the name of the operating system. In the second example, the reference to the credentials of the user trying to open a file are used to overwrite that data, making the user root. The bug was fixed in uber fast manner (within few hours!) by Matthew Dillon, version 4.6.1 released shortly after that seems to be safe. In case you care, you know what to do! Thanks to Mateusz Kocielski for the detailed post, and finding the bug *** Interview - Wendell - wendell@level1techs.com (mailto:wendell@level1techs.com) / @tekwendell (https://twitter.com/tekwendell) Host of Level1Techs website, podcast and YouTube channel News Roundup Using yubikeys everywhere (http://www.tedunangst.com/flak/post/using-yubikeys-everywhere) Ted Unangst is back, with an interesting post about YUBI Keys Everybody is getting real excited about yubikeys recently, so I figured I should get excited, too. I have so far resisted two factor authorizing everything, but this seemed like another fun experiment. There's a lot written about yubikeys and how you should use one, but nothing I've read answered a few of the specific questions I had To begin with, I ordered two yubikeys. One regular sized 4 and one nano. I wanted to play with different form factors to see which is better for various uses, and I wanted to test having a key and a backup key. Everybody always talks about having one yubikey. And then if you lose it, terrible things happen. Can this problem be alleviated with two keys? I'm also very curious what happens when I try to login to a service with my phone after enabling U2F. We've got three computers (and operating systems) in the mix, along with a number of (mostly web) services. Wherever possible, I want to use a yubikey both to login to the computer and to authorize myself to remote services. I started my adventure on my chromebook. Ultimate goal would be to use the yubikey for local logins. Either as a second factor, or as an alternative factor. First things first and we need to get the yubikey into the account I use to sign into the chromebook. Alas, there is apparently no way to enroll only a security key for a Google account. Every time I tried, it would ask me for my phone number. That is not what I want. Zero stars. Giving up on protecting the chromebook itself, at least maybe I can use it to enable U2F with some other sites. U2F is currently limited to Chrome, but it sounds like everything I want. Facebook signup using U2F was pretty easy. Go to account settings, security subheading, add the device. Tap the button when it glows. Key added. Note that it's possible to add a key without actually enabling two factor auth, in which case you can still login with only a password, but no way to login with no password and only a USB key. Logged out to confirm it would check the key, and everything looked good, so I killed all my other active sessions. Now for the phone test. Not quite as smooth. Tried to login, the Facebook app then tells me it has sent me an SMS and to enter the code in the box. But I don't have a phone number attached. I'm not getting an SMS code. Meanwhile, on my laptop, I have a new notification about a login attempt. Follow the prompts to confirm it's me and permit the login. This doesn't have any effect on the phone, however. I have to tap back, return to the login screen, and enter my password again. This time the login succeeds. So everything works, but there are still some rough patches in the flow. Ideally, the phone would more accurately tell me to visit the desktop site, and then automatically proceed after I approve. (The messenger app crashed after telling me my session had expired, but upon restarting it was able to borrow the Facebook app credentials and I was immediately logged back in.) Let's configure Dropbox next. Dropbox won't let you add a security key to an account until after you've already set up some other mobile authenticator. I already had the Duo app on my phone, so I picked that, and after a short QR scan, I'm ready to add the yubikey. So the key works to access Dropbox via Chrome. Accessing Dropbox via my phone or Firefox requires entering a six digit code. No way to use a yubikey in a three legged configuration I don't use Github, but I know they support two factors, so let's try them next. Very similar to Dropbox. In order to set up a key, I must first set up an authenticator app. This time I went with Yubico's own desktop authenticator. Instead of scanning the QR code, type in some giant number (on my Windows laptop), and it spits out an endless series of six digit numbers, but only while the yubikey is inserted. I guess this is kind of what I want, although a three pound yubikey is kind of unwieldy. As part of my experiment, I noticed that Dropbox verifies passwords before even looking at the second auth. I have a feeling that they should be checked at the same time. No sense allowing my password guessing attack to proceed while I plot how to steal someone's yubikey. In a sense, the yubikey should serve as a salt, preventing me from mounting such an attack until I have it, thus creating a race where the victim notices the key is gone and revokes access before I learn the password. If I know the password, the instant I grab the key I get access. Along similar lines, I was able to complete a password reset without entering any kind of secondary code. Having my phone turn into a second factor is a big part of what I'm looking to avoid with the yubikey. I'd like to be able to take my phone with me, logged into some sites but not all, and unable to login to the rest. All these sites that require using my phone as mobile authenticator are making that difficult. I bought the yubikey because it was cheaper than buying another phone! Using the Yubico desktop authenticator seems the best way around that. The article also provides instructions for configuring the Yubikey on OpenBSD A few notes about OTP. As mentioned, the secret key is the real password. It's stored on whatever laptop or server you login to. Meaning any of those machines can take the key and use it to login to any other machine. If you use the same yubikey to login to both your laptop and a remote server, your stolen laptop can trivially be used to login to the server without the key. Be mindful of that when setting up multiple machines. Also, the OTP counter isn't synced between machines in this setup, which allows limited replay attacks. Ted didn't switch his SSH keys to the Yubikey, because it doesn't support ED25519, and he just finished rotating all of his keys and doesn't want to do it again. I did most of my experimenting with the larger yubikey, since it was easier to move between machines. For operations involving logging into a web site, however, I'd prefer the nano. It's very small, even smaller than the tiniest wireless mouse transcievers I've seen. So small, in fact, I had trouble removing it because I couldn't find anything small enough to fit through the tiny loop. But probably a good thing. Most other micro USB gadgets stick out just enough to snag when pushing a laptop into a bag. Not the nano. You lose a port, but there's really no reason to ever take it out. Just leave it in, and then tap it whenever you login to the tubes. It would not be a good choice for authenticating to the local machine, however. The larger device, sized to fit on a keychain, is much better for that. It is possible to use two keys as backups. Facebook and Dropbox allow adding two U2F keys. This is perhaps a little tiresome if there's lots of sites, as I see no way to clone a key. You have to login to every service. For challenge response and OTP, however, the personalization tool makes it easy to generate lots of yubikeys with the same secrets. On the other hand, a single device supports an infinite number of U2F sites. The programmable interfaces like OTP are limited to only two slots, and the first is already used by the factory OTP setup. What happened to my vlan (http://www.grenadille.net/post/2017/02/13/What-happened-to-my-vlan) A long term goal of the effort I'm driving to unlock OpenBSD's Network Stack is obviously to increase performances. So I'd understand that you find confusing when some of our changes introduce performance regressions. It is just really hard to do incremental changes without introducing temporary regressions. But as much as security is a process, improving performance is also a process. Recently markus@ told me that vlan(4) performances dropped in last releases. He had some ideas why but he couldn't provide evidences. So what really happened? Hrvoje Popovski was kind enough to help me with some tests. He first confirmed that on his Xeon box (E5-2643 v2 @ 3.50GHz), forwarding performances without pf(4) dropped from 1.42Mpps to 880Kpps when using vlan(4) on both interfaces. Together vlaninput() and vlanstart() represent 25% of the time CPU1 spends processing packets. This is not exactly between 33% and 50% but it is close enough. The assumption we made earlier is certainly too simple. If we compare the amount of work done in process context, represented by ifinputprocess() we clearly see that half of the CPU time is not spent in etherinput(). I'm not sure how this is related to the measured performance drop. It is actually hard to tell since packets are currently being processed in 3 different contexts. One of the arguments mikeb@ raised when we discussed moving everything in a single context, is that it is simpler to analyse and hopefully make it scale. With some measurements, a couple of nice pictures, a bit of analysis and some educated guesses we are now in measure of saying that the performances impact observed with vlan(4) is certainly due to the pseudo-driver itself. A decrease of 30% to 50% is not what I would expect from such pseudo-driver. I originally heard that the reason for this regression was the use of SRP but by looking at the profiling data it seems to me that the queuing API is the problem. In the graph above the CPU time spent in ifinput() and ifenqueue() from vlan(4) is impressive. Remember, in the case of vlan(4) these operations are done per packet! When ifinput() has been introduced the queuing API did not exist and putting/taking a single packet on/from an interface queue was cheap. Now it requires a mutex per operation, which in the case of packets received and sent on vlan(4) means grabbing three mutexes per packets. I still can't say if my analysis is correct or not, but at least it could explain the decrease observed by Hrvoje when testing multiple vlan(4) configurations. vlaninput() takes one mutex per packet, so it decreases the number of forwarded packets by ~100Kpps on this machine, while vlanstart() taking two mutexes decreases it by ~200Kpps. An interesting analysis of the routing performance regression on OpenBSD I have asked Olivier Cochard-Labbe about doing a similar comparison of routing performance on FreeBSD when a vlan pseudo interface is added to the forwarding path *** NetBSD: the first BSD introducing a modern process plugin framework in LLDB (https://blog.netbsd.org/tnf/entry/netbsd_the_first_bsd_introducing) Clean up in ptrace(2) ATF tests We have created some maintanance burden for the current ptrace(2) regression tests. The main issues with them is code duplication and the splitting between generic (Machine Independent) and port-specific (Machine Dependent) test files. I've eliminated some of the ballast and merged tests into the appropriate directory tests/lib/libc/sys/. The old location (tests/kernel) was a violation of the tests/README recommendation PTRACE_FORK on !x86 ports Along with the motivation from Martin Husemann we have investigated the issue with PTRACE_FORK ATF regression tests. It was discovered that these tests aren't functional on evbarm, alpha, shark, sparc and sparc64 and likely on other non-x86 ports. We have discovered that there is a missing SIGTRAP emitted from the child, during the fork(2) handshake. The proper order of operations is as follows: parent emits SIGTRAP with sicode=TRAPCHLD and pesetevent=pid of forkee child emits SIGTRAP with sicode=TRAPCHLD and pesetevent=pid of forker Only the x86 ports were emitting the second SIGTRAP signal. PTSYSCALL and PTSYSCALLEMU With the addition of PTSYSCALLEMU we can implement a virtual kernel syscall monitor. It means that we can fake syscalls within a debugger. In order to achieve this feature, we need to use the PTSYSCALL operation, catch SIGTRAP with sicode=TRAPSCE (syscall entry), call PTSYSCALLEMU and perform an emulated userspace syscall that would have been done by the kernel, followed by calling another PTSYSCALL with sicode=TRAPSCX. What has been done in LLDB A lot of work has been done with the goal to get breakpoints functional. This target penetrated bugs in the existing local patches and unveiled missing features required to be added. My initial test was tracing a dummy hello-world application in C. I have sniffed the GDB Remote Protocol packets and compared them between Linux and NetBSD. This helped to streamline both versions and bring the NetBSD support to the required Linux level. Plan for the next milestone I've listed the following goals for the next milestone. watchpoints support floating point registers support enhance core(5) and make it work for multiple threads introduce PTSETSTEP and PTCLEARSTEP in ptrace(2) support threads in the NetBSD Process Plugin research F_GETPATH in fcntl(2) Beyond the next milestone is x86 32-bit support. LibreSSL 2.5.2 released (https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.5.2-relnotes.txt) Added the recallocarray(3) memory allocation function, and converted various places in the library to use it, such as CBB and BUFMEMgrow. recallocarray(3) is similar to reallocarray. Newly allocated memory is cleared similar to calloc(3). Memory that becomes unallocated while shrinking or moving existing allocations is explicitly discarded by unmapping or clearing to 0. Added new root CAs from SECOM Trust Systems / Security Communication of Japan. Added EVP interface for MD5+SHA1 hashes. Fixed DTLS client failures when the server sends a certificate request. Correct handling of padding when upgrading an SSLv2 challenge into an SSLv3/TLS connection. Allow protocols and ciphers to be set on a TLS config object in libtls. Improved nc(1) TLS handshake CPU usage and server-side error reporting. Beastie Bits HardenedBSD Stable v46.16 released (http://hardenedbsd.org/article/op/2017-03-30/stable-release-hardenedbsd-stable-11-stable-v4616) KnoxBUG looking for OpenBSD people in Knoxville TN area (https://www.reddit.com/r/openbsd/comments/5vggn7/knoxbug_looking_for_openbsd_people_in_knoxville/) KnoxBUG Tuesday, April 18, 2017 - 6:00pm : Caleb Cooper: Advanced BASH Scripting](http://knoxbug.org/2017-04-18) e2k17 Nano hackathon report from Bob Beck (http://undeadly.org/cgi?action=article&sid=20170405110059) Noah Chelliah, Host of the Linux Action Show calls Linux a ‘Bad Science Project' and ditches Linux for TrueOS](https://youtu.be/yXB85_olYhQ?t=3238) *** Feedback/Questions James - ZFS Mounting (http://dpaste.com/1H43JGV#wrap) Kevin - Virtualization (http://dpaste.com/18VNAJK#wrap) Ben - Jails (http://dpaste.com/0R7CRZ7#wrap) Florian - ZFS and Migrating Linux userlands (http://dpaste.com/2Z1P23T#wrap) q5sys - question for the community (http://dpaste.com/26M453F#wrap)
Ramón and Passy pick up where there they left off in Episode 1 discussing the differences between iOS and Android from a developer's perspective. Want us to talk about a topic? Tweet at us! Topics iOS: Move from GCC to clang/llvm Bitcode, LLVM IR Dalvik and ART Swift, Objective-C, Kotlin and Java News Kotlin 1.0 announcement StackOverflow MIT Attribution Change Android vs iOS Is LLVM a VM? Android Development 30% more expensive Swift runtime bundled with apps Picks Ramón CorePlot on Github Into Thin Air The Expanse Passy Stack Safety for Free - Phil Freeman PDF Google Contributor Music Intro: Bad Blood - Bastille Outro: Obstacles - Syd Matters About Ramón Argüello Pascal Hartig Strictly Untyped
More Than Just Code podcast - iOS and Swift development, news and advice
We started on Apple's new Apple Watch TV commercials, Apple TVOS Gold Master and all of Apple development products under one roof. We briefly discussed issues with Apple Transport Security, the lack of USB-C cable in second wave TVOS Dev Kits and Apple TV WWDC give-away conspiracy. How will the Apple TV app store work? We discussed challenges with Paypal's SDK and challenges uploading large bitcode laden builds to Github. Picks: Outlook for iOS, 19 Tips for Everyday Git and Swift Apprentice. Episode 62 Show Notes: Apple's Latest Apple Watch Ads Showcase Siri, Apple Music, Apple Pay and More Apple TV Development Kits USB 2.0 USB-C Male to USB-A Male Cable, 3ft Brian Gilham Tim Cook Says New Apple TV Will Ship Next Week, Orders Begin Monday Dash NetNewsWire crash assessment Brent Simmons Daniel Pasco Paypal SDK with Bitcode vs Github limits Inbox for iOS Gmail for iOS Mattjias Holleman Ray's post - Swift Apprentice Now Available! Beginning Swift Bundle Audrey Tam Episode 62 Picks: Outlook for iOS 19 tips for everyday git use Swift Apprentice
Saiu o iOS 9. E agora? O que muda? O que melhora? O que piora? Bruno, Douglas, Diogo e Tales se juntam para discutir suas features favoritas. Assuntos mencionados: Xcode7, App Thinning, Multitasking, Bitcode, Universal Links. Também confira o novo bloco do podcast: "Dica do Podcaster". Participaram dessa edição: Bruno Koga, Douglas Fischer, Diogo Tridapalli, Tales Pinheiro. Links relevantes: Invariante www.invariante.com Xchuck http://errorchucking.tumblr.com GitUp http://gitup.co/
Follow-up: Bitcode and portability Dan Gohman's mailing list post Google PNaCL Chris Lattner weighs in: 1 & 2 10.10.4 and TRIM support Overview Ars comment thread Cheap vs. Good vs. Commercial pricing and build qualities Apple's use of Samsung SSDs The comedy of updating hard drive firmware Apple Music Beats 1 Serenity Caldwell on Apple Music vs. iTunes Match Paul Haddad on how to turn off auto-renewal MUTEMATH article Casey found Fury Road Post-show: The Apple TV ad that mentions CONFIG.SYS Safari is the new IE will be covered next week Florida is hot TSA Pre-Check Global Entry Your Daily Lex Turning This Car Around Traveling with infants on airplanes Labyrinth Sponsored by: Cards Against Humanity: A free party game for horrible people. This week's toaster Harry's: An exceptional shave at a fraction of the price. Use code ATP for $5 off your first purchase. Casper: A mattress with just the right sink, just the right bounce, for better nights and brighter days. Use code ATP for $50 off.
In the wake of WWDC, the couch discuss their favourite sessions and lab experiences, and some of the answers to the questions they had following the keynote. Ben and Jake start by sharing some of their highlights from the labs at WWDC. They both explain some of the issues they took to the engineers, and the responses they got in talking them talking over. This leads into a discussion about Radar, especially in contrast with Google’s more open bug reporting tool. Everyone agrees that there are giant holes in Apple’s tool, and Jelly’s actually convinced we might see something change next year. Jake mentions at this point that he’s excited about the current focus from Apple on education, even in things as small as being able to run apps on device without having to be a paid developer. Jelly is quick to point out that there’s a lot of evidence that Apple has being thinking about education for at least a couple of years now. From here, Jelly asks Ben and Jake to name their favourite sessions from the conference. Ben’s is the session on protocol-oriented programming, while Jelly really liked the session on the new system font, and the thought that has gone into typography on the platform. Jake, who also liked Ben’s pick, settles for one about new features in playgrounds. Moving along, Jake talks a little about his experiences playing with CloudKit and CloudKit JS, coming to the conclusion that it’s still missing some crucial features, such as its lack of shared data and it’s lack of ability to run scheduled tasks. Jelly then brings up Bitcode, which is something that Apple really hasn’t explained very much at all. Jelly cites an article he’s read which explains both what Bitcode is, and some of the reasons Apple might be interested in it. Ben’s not convinced that it’s going to work as expected, however, since it just seems too magical. Finally, Jelly brings up to odd occurrence of a couple of presenters who made a big deal about using first-party frameworks, most notably Core Data. This leads to a conversation about Core Data vs. Realm and what they actually are and why you would choose something other than Core Data for data storage.
WWDC 2015 Videos 02:09 - Apple Music 03:12 - Metal for OSX The iPhreaks Show Episode #160: Metal with Warren Moore 05:04 - The New Swift Features Protocol Extensions 07:15 - Value Types 09:32 - Error Handling 16:02 - Support for Function Pointers from C 20:04 - Lightweight Generics 22:42 - Guard and Defer 27:27 - Xcode Improvements, Autolayout 29:55 - New Core Audio and Core Image Features 34:01 - Testing 38:15 - The Address Sanitizer Valgrind 51:07 - Crash Logs Addition in Xcode7 Crashlytics 54:43 - Installing Apps Without a Subscription to the Developer Program Picks Owen Williams: Apple’s biggest developer news at WWDC that nobody’s talking about: Bitcode (Alondo) neo-Style Lightning Charge & Sync Cable (Alondo) Hardcore History Podcast (Jaim) WebAssembly (Mike) ASCIIwwdc (Andrew)
WWDC 2015 Videos 02:09 - Apple Music 03:12 - Metal for OSX The iPhreaks Show Episode #160: Metal with Warren Moore 05:04 - The New Swift Features Protocol Extensions 07:15 - Value Types 09:32 - Error Handling 16:02 - Support for Function Pointers from C 20:04 - Lightweight Generics 22:42 - Guard and Defer 27:27 - Xcode Improvements, Autolayout 29:55 - New Core Audio and Core Image Features 34:01 - Testing 38:15 - The Address Sanitizer Valgrind 51:07 - Crash Logs Addition in Xcode7 Crashlytics 54:43 - Installing Apps Without a Subscription to the Developer Program Picks Owen Williams: Apple’s biggest developer news at WWDC that nobody’s talking about: Bitcode (Alondo) neo-Style Lightning Charge & Sync Cable (Alondo) Hardcore History Podcast (Jaim) WebAssembly (Mike) ASCIIwwdc (Andrew)
Follow-up: Bitcode is specific to its originally targeted CPU architecture Bruce Hoult tweet 1, tweet 2 C data types Endianness Data structure alignment Steve Troughton-Smith S1 analysis by Chipworks The (un)likelihood of ARM Macs Apple's transition from PowerPC to Intel CPUs Intel Skylake Swift 2 and compiler self-hosting Mono's compiler history Oculus as "the Palm Pilot of VR" John, his watch, and his nose Myke was right again Myke was originally right about the iPhone 6 Plus Safari Content Blocking API in iOS 9 and El Capitan WebKit Content Blockers Session video with John and Marco Safari View Controller to kill minibrowsers GlimmerBlocker YouTube ad settings Ad-banner blindness The ethics of running ad-blockers AdBlock Plus accepts money from some ad companies whitelisted as Acceptable Ads John's Reload Button extension for Safari TRIM) on non-Apple SSDs New trimforce command in El Capitan After-show: Casey, John, and Marco attempt to modify their houses. Sponsored by: Automatic: Your smart driving assistant. Get $20 off with this link. Hover: The best way to buy and manage domain names. Use coupon code LOSTBACKPACK for 10% off your first purchase. MailRoute: Hosted spam and virus protection for email. Use this link for 10% off for the life of your account.
Hajime Morita さんをゲストに迎えて、Bitcode, microservices, Rust, Go, Web Assembly, Polymer, Web Components などについて話しました。 Show Notes Apple’s Bitcode Telegraphs Future CPU Plans LLVM Bitcode File Format Monolith First Don’t start with a monolith RailsConf 2015 - Opening Keynote by DHH The Recipe for the World's Largest Rails Monolith cookpad/chanko The Rust Programming Language Mozilla 2 - MozillaWiki Servo Generics | Rust by Example Rust Ownership Rust Means Never Having to Close a Socket Stability as a Deliverable PSA: Important info about rustc's new feature staging Cargo Using Rust from Perl and Julia Mozilla: land rust mp4parse v0.0.8 From ASM.JS to WebAssembly asm.js PNaCl - The Chromium Projects WebAssembly/polyfill-prototype-1 emscripten JavaScriptCore should natively support WebAssembly Future Features - WebAssembly/design Introducing Polymer 1.0 Polymer と Web Components Introduction - Material design What is a Polyfill? The state of Web Components HTML Imports Local DOM Basics and API - Polymer import - JavaScript
Guy English returns to the show, and we make a valiant but failed effort to cover all of the technical/developer news from last week’s WWDC. Among the topics we did hit: app thinning, Bitcode, WatchKit 2.0, CloudKit (and opening it up to web developers), Swift 2.0, Metal coming to the Mac, accessibility and low-level support for right-to-left languages, iOS 9’s new low-power mode, and more.
Followup LUKA ĐOKIĆ: Pozdrav ljudi, Vezano za poslednju epizodu i target disk mode na novom MacBook-u. Prema ovom support dokumentu oficijalno je moguć uz odredjene adaptere. Apple je u jednom trenutku sklonio deo koji objašnjava target disk mode ali koliko vidim, za sada stoji. Inače, slušam vas od prve epizode, fenomalani ste i vrlo mi je drago što ovakav podkast postoji. Samo nastavite ovako, Sve najbolje, Luka Ovo je prethodni model koji je nosio ime MacBook i koji nije mogao da se podigne u Target Disk Modu. Vesti Novi podcast gde su domaćini Siracusa i Merlinn Man: Reconcilable Differences WWDC Kako smo gledali keynote? Miki na iPadu preko MTS 3G-a sa terase u Mokrinu (utrošio oko 3,5 GB od 10 GB iz paketa koji ima) Alek u Macoli u Knez Mihajlovoj Utisci i razno nema novog AppleTV-a :( po prvi put (da ja znam) 2 žene na WWDC keynoteu (Jennifer Bailey, VP of Internet Services + Susan Prescott, VP of Product Marketing), a takođe i 2 žene na Platforms SOTU (Eliza Block i Sara Radi) Code llke a girl - video koji prati devojčice i devojke koje su dobile WWDC Scholarship Jimmy Iovine je toliko različit i prirodno cool lik u odnosu na ostale execs da oni izgledaju kao još veći nerdovi nego što jesu Apple Design Award winners Neke brojke sa WWDC-a WWDC 2015 keynote: The fine print Sve sesije na jednom mestu. Mac OS X Mac OS X El Capitan Sa korisničke strane: Split view (pomenuli smo Siracusu i The Windows of Siracusa County) Mission Control Call out your cursor (Miki koristio nekad i kupio Mouseposé) Spotlight with natural language queries Mail (tabovi u Mailu za Mikija su najlepši feature) Notes Safari (AirPlay, pins) Photos Metal News iOS 9 Initial Thoughts on iOS 9’s iPad Multitasking: A Deep Transformation Kompajliranje u Bitcode - potencijalno enormna glavobolja za 3rd party devs Sada sam se već pogubio kojim redosledom, ali valja posebno pričati o Privacy & Security novi mandatory App Transport Security u NSURLSession News app bez reklama (!) Siri i global Search koji rade anonimno itd watchOS WatchKit 2 je isti kao i WatchKit 1, to nema veze sa native API-jem. To je wrapper oko pravog API-ja koji i dalje nije dostupan nikome sem Appleu. Prave stvari: https://twitter.com/stroughtonsmith/status/609262287212425216 https://twitter.com/stroughtonsmith/status/609656558503526400 http://www.macrumors.com/2015/06/16/apple-watch-hacked-truly-native-apps/ watchOS 2 sadrži i HealthKit, u kome sada imaš novi API, HKWorkoutSession. dokle god je isti aktivan, tvoja watch app ostane u foregroundu. Development related Swift 2 Xcode 7 ReplayKit CloudKit je dobio Javascript web API. To je mega bitno, samo da to još izreklamiraju Dev program objedinjen Svi video snimci sa WWDC-a 2015. Razno nova News app je maltene identična sa http://instantarticles.fb.com. potpuno neverovatno koliko su slične a razvijano je izgleda u paraleli. News Publisher: https://developer.apple.com/news-publisher/ iPad multitasking samo na Air 2 (eto otkud 3 Core-a i 2GB RAMa) deluje baš, baš dobro. Slično ali znatno fluidnije od implementacije koju je Microsoft napravio za Windows Phone veliki update za Apple Pay i Passbook koji su objedinjeni u Wallet app. I dalje samo za US i sada i UK sjajna nova QuickType tastatura sa gesture-based selektovanjem teksta enorman update za Siri i povezano sa tim: Search API i deep linking za 3rd party apps (hell, yeah) Gruberov TalkShow live at WWDC - gost Phil Schiller, Markov komentar o značaju njegovog pojavljivanja Odličan podcast gde Fraser Speirs i Bradley Chambers pričaju o novostima sa WWDC-a, posebno o enterprise device managementu Music Kakvo gušenje ... Music streaming service Beats 1 radio Ping 2.0 ;) Spomenusmo ATP no.96, Windows of Siracusa County, poslušajte after show Zahvalnice Snimljeno 15.06.2015. kroz Audio Hijack 3 u Mikijevoj kancelariji i tehničku obradu Velikog Maga zvučnih majstorija Ognjena Tomića. Uvodna muzika by Vladimir Tošić. Logotip by Aleksandra Ilić. Artwork epizode Prasak 2010. by Saša Montiljo
Onderwerpen Tom Waes beklimt El Capitan. Crazy.WWDC Keynote 2015How Tesla Will Change the World. Wait But Why over Energy, Auto's en TeslaSteve Jobs Danced To My Song82 procent - Nieuwsbrief van ReinierMerlin Mann en John Siracusa samen in een podcast: Reconcilable DifferencesCortex - Myke Hurley en CGP Grey podcastJe aanmelden voor de Appels en Peren SlackDankwoord Grote dank aan de vrienden van Appels en Peren: Soundcloud voor de bandbreedte, Nozzman voor het coverartwork en Clublime voor de introjingle.
Download Weekly future bass mixes with love from the Treehaus studio in Brooklyn. Subscribe at podcast.treehausmusic.com. New record ‘Afterglow’ available now on iTunes: bit.ly/afterglow-itunes. Follow @treehausmusic on your favorite social media. Tracklist:1. Ekali - Unfaith2. Cassie - All My Love (KK Edit)3. AudioOpera - Last Form4. Ciara - Dote Me Good (Lowpro & Bitcode edit)5. Mikos Da Gawd - Shake ft. Tele Fresco6. Ginuwine - Differences (Hoodboi Remix)7. Jailo & AOBeats - Fallin’8. Trippy Turtle - Poison9. Schoolboy Q - Studio (Vices & Yung Wall Street Remix)10. Sam Gellaitry - Business11. Jailo & Kappa Kavi - Perfectly Timed Traffic Light12. Wave Racer - My Boo13. AOBeats - It’s OK14. Cashmere Cat - Rice Rain15. Eastern Shift - Katie Croons