Last weekend, what is believed to be the world’s first ransomware (a form of malware) attack against OS X machines was discovered in a Mac app called Transmission. The threat took many Mac users by surprise because up until now, malware has primarily affected Windows machines. The threat has been contained following more than 6,000 downloads, but experts are expecting to see an increase in malware attacks on Macs in the future. There’s no time to waste in being vigilant — we’re here to give you an A-to-Z (A-to-W, rather) refresher in forms of malware, common delivery methods, symptoms and prevention.
Continue reading Malware A to Z: Common Forms, Symptoms and Prevention Methods
Ah, the new year. Time for setting ambitious resolutions you may or may not keep, writing the wrong date on everything and reading through “Best of 2015” lists — including ours! On our blog last year we covered everything from Nerd culture to tech tips to business strategy. Check out our ten most-read posts of 2015 below.
Continue reading Top 10 Blog Posts of 2015
With all the press surrounding security breaches lately, you might be wondering how it’s possible for your business to operate without getting hacked. We sat down with one of our security experts, Senior Quality Assurance Engineer Chris Wade to ask what you need to know about cyber security, hackers and how to protect your business and yourself.
Continue reading Cyber Security Q&A: How NOT to get Hacked
Whether in a desktop browser or the embedded webview of your favorite social media app, your website is a battleground. Keeping your users and their data safe is one of the most difficult (but important) problems to solve when creating any Internet-connected product. There’s plenty to be done to ensure that data stays safe server-side, but your first and last line of defense is client-side.
Continue reading Security on the Client-side
Many of you already know the buzz going on with iOS 8 and some critical issues which occurred with Apple’s first iOS 8.0.1 software update on Wednesday, September 24th. A major bug with the HealthKit feature was discovered prior to the iOS 8.0 release, which resulted in Apple pulling all HealthKit enabled apps from the App Store ahead of the public release, leaving 3rd-party devs uncertain as to the fate of their Apps.
Continue reading Quality Assurance Pro Tips – Learn from Apple’s recent HealthKit bug
More than just Mobile Devices: Where touch detection breaks down
When you think of “touch,” mobile phones and tablets may immediately come to mind. Unfortunately, it’s far too easy to overlook the newest crop of touch-driven devices, such as Chromebook laptops that employ both a touchscreen and a trackpad, and Windows 8 machines paired with touchscreen monitors. In this article, you’ll learn how to conquer the interesting challenges presented by these “hybrid” devices that can employ both mouse and touch input. In the browser, the Document Object Model (DOM) started with one main interface to facilitate user pointer input: MouseEvent. Over the years, the methods of input have grown to include the pen/stylus, touch, and a plethora of others. Modern web browsers must continually stay on top of these new input devices by either converting to mouse events or adding an additional event interface. In recent years, however, it has become apparent that dividing these forms of input – as opposed to unifying and normalizing – is becoming problematic when hardware supports more than one method of input. Programmers are then forced to write entire libraries just to unify all the event interfaces (mouse, touch, pen, etc). So how did mouse and touch events come to be separate interfaces? Going forward, are all new forms of input going to need their own event interface? How do I unify mouse and touch now?
Continue reading Developing for Next Generation Touchscreen Computers
It’s not uncommon to encounter a few roadblocks during a project and the typical next-step might involve doing a quick Google search for the answer. Unfortunately there are occasions in which we are on own with a unique problem. In this case we had to roll up our sleeves and discover the answer that works. We hope this helps the next person looking for this answer.
“I spent a bit of time reading documentation and testing and getting increasingly frustrated.”
I ran into an interesting problem this week. I have a staging site in active development that needs to remain behind a firewall, but we plan to use the WordPress REST API to serve content from the site to iOS and Android Apps. Unfortunately, for the API to work Continue reading Apache Configuration for Testing WordPress REST API on Secured Sites
An experienced quality assurance (QA) engineer will have their spidey-senses tingling with every announcement of a new OS version, hardware refresh, or browser update. These are all good things for innovation, it just means we all need to be ready for launch day by starting to plan today. Continue reading Features Most Likely to Break When Upgrading to iOS 8 and What to Plan For
When a client asked me to address the performance problems with their Solr full-imports (9+ hours), I knew I was going to have to put on my computer-detective hat.
Continue reading DataImportHandler: Recreating problems to discover their root
So you want to embed Google Maps in your website. Maybe you have a list of locations you want to display, or perhaps you need to provide directions or perform simple GIS operations. You’re a pragmatic person, so you don’t want to reinvent the wheel. You’ve settled on Google Maps as your mapping platform, acquired your API key, and you’re raring to go. Awesome! I’m so excited! Google Maps has great bang for the buck, and their API is well documented and easy enough to use. But there’s a downside. Google Maps has become the Power Point of cartography.
Continue reading Mapmaker, Mapmaker, Map Me a (Google) Map