Happy Beta 6 day! UnfortunatelyAssertMacros: queueEntry, file: /SourceCache/IOKitUser/IOKitUser-920.1.11/hid.subproj/IOHIDEventQueue.c, line: 512it doesn't fix the mostAssertMacros: queueEntry, file: /SourceCache/IOKitUser/IOKitUser-920.1.11/hid.subproj/IOHIDEventQueue.c, line: 512annoying bug in Beta 5. I was going to carryAssertMacros: queueEntry, file: /SourceCache/IOKitUser/IOKitUser-920.1.11/hid.subproj/IOHIDEventQueue.c, line: 512this on throughout the entireAssertMacros: queueEntry, file: /SourceCache/IOKitUser/IOKitUser-920.1.11/hid.subproj/IOHIDEventQueue.c, line: 512issue today but you will be glad toAssertMacros: queueEntry, file: /SourceCache/IOKitUser/IOKitUser-920.1.11/hid.subproj/IOHIDEventQueue.c, line: 512hear I decided against it.
Updates to the review guidelines around the new COPPA rules and requiring parental consent before allowing IAPs to be purchased. There are also sensible additional rules for gambling apps as well and a few other minor updates. Changes to this document are always worth keeping up to date on as there is nothing worse than a nasty surprise after months of development.
This excellent series of posts by Jeff LaMarche cover the process of designing and developing a new game for iOS. Every one of these articles is worth a read but I particularly enjoyed "Finding a Smaller Game in the Backstory" (#4) and "Experiments in Environment Creation" (#8). Be sure to check back on this post as time goes on for more diary entries.
Spending less time marketing and more time building is high on any developer's wish list. Make your life easier with Tapstream's SDK in your app (it's free) and let it help you grow your user base. Learn where your best users come from by tracking conversions for installs and in-app events, with 100% clarity. See what's working so you don't waste time on what's not. The signup and installation take only minutes - install it today and start collecting data for your next release.
Derek Selander with a look at some common techniques used to attack iOS applications. It's a good reminder to always be aware of what you are shipping in your application bundle, not to store encryption keys embedded in strings inside your binary and how to use the keychain effectively. This is part one of a two part series so be be sure to read the follow up post which has already been published.
Nick Lockwood with an open source implementation of the standard iOS navigation controller. Useful if you want to do heavy navigation customisation as you will fall down pretty quickly attempting to do that on iOS 6 or below.
Miguel de Icaza talks about the async and await keywords in C#. We obviously don't have anything similar in Objective-C but it's an interesting approach and I like it. It's certainly very different to block based callbacks and definitely looks less like the construction of an Aztec temple but there are complexities lurking which I would imagine will take developers some time to get to grips with. The code demonstrated here is using Xamarin on iOS so I guess it still qualifies as iOS development.
Not much to say about this other than this is a simple, fully editable, black and white Illustrator template from Blake Perdue for producing iOS app wireframes. A nice alternative to the Teehan+Lax PSD I linked to a couple of weeks back if you want to keep things a little more low fidelity.
I love when people publish iterations of a new icon design and I couldn't resist linking to this one from Iconfactory. Follow the design of the iOS 7 icon for xScope Mirror's icon through 5 versions ending in a beautiful icon which fits beautifully into the new OS.
A few months ago Stuart Hall started a little experiment on the app store by placing a small app live to test marketing approaches. Starting out with no marketing at all, then contacting the press, experimenting with pricing and in this update, adding in-app purchases. Both parts of this are well worth a read.
Sam Marshall with a new Mac Framework for accessing iOS devices over USB without relying on private Apple frameworks. It allows devices to be detected, queried for hardware configuration, file transfers, access to app sandboxes and installation of apps.