Back

Coding & Development

  • Tony Robalik
  • Posted by Tony Robalik
September 29, 2015

At the Google Nexus event today, Google's CEO and others from their leadership team unveiled several new and improved products as well as launched the new Android 6.0 update named Marshmallow. They made sure everyone understood that the ubiquity of Google and their products was only going to become more profound with the passage of time.

Read More
  • Kyle Sharp
  • Posted by Kyle Sharp
September 15, 2015

Android M has officially been revealed to be Android Marshmallow, version 6.0. Among a number of improvements and changes are permissions. Previously, permissions were required to be accepted by the user before installing the app, and they could never be revoked. This meant that the only way to prevent an app from accessing something it requested was to not use the app. The new setup instead gives users granular control over which permissions are allowed on a per app basis.

Read More
  • Drew Pitchford
  • Posted by Drew Pitchford
September 10, 2015

Apple's much anticipated event for announcing their late 2015 products was Wednesday and more than exceeded expectations. The invitation to the event included the tagline "Hey Siri, give us a hint!" Actually asking Siri to give a hint would illicit a playful and humorous response. Now that the event is over, you may be wondering what really happened at Apple's Hey Siri event.

Read More
  • Drew Pitchford
  • Posted by Drew Pitchford
September 8, 2015

The most exciting event of the year is almost here (most exciting for Apple developers at least)! On Wednesday, Sept 9th, Apple will unveil next year’s worth of hardware that runs its mobile platform, iOS. Here is what we expect to see.

Read More
  • Dave Lane
  • Posted by Dave Lane
September 3, 2015

As our society increasingly uses mobile devices for financial transactions, information sharing, and social interactions, mobile devices will become an increasingly attractive target to cyber criminals. Metova's CTO, Dave Lane, has identified three opportunities to safeguard your users' information that should be taken into consideration when building a mobile application.

Read More
  • Dave Lane
  • Posted by Dave Lane
August 27, 2015

As mobile devices increase in usage and popularity, hackers have been looking for more ways to exploit them. People are using their devices in all aspects of their daily lives and are willing to share and store sensitive personal information in order to do so. Because there there is more information available for exploitation, hackers have begun to avoid the quick attack, preferring to wait in the shadows and silently gather data. This week, we will go into detail on the top four security threats Metova foresees in mobile.

Read More
  • Sarah Klinefelter
  • Posted by Sarah Klinefelter
August 20, 2015

So there you are digging and sifting through mounds of source code and console logs in XCode or Android Studio or even ADB wondering how on earth you are going to track down this bug before you ship this next iteration release to a customer. Your pulse quickens as erroneous lines fly past you with none of the information you need. That's when you have the startling revelation that log messages have little value without some meaningful data and context.

Read More
  • Ron Unger
  • Posted by Ron Unger
August 11, 2015

In the past few development posts, Ron has given us insight into several aspects of Android unit testing. He began with an overview of unit testing concepts and then discussed JUnit, the framework that Android testing is built upon. Today, he rounds out the series with an article on some specific Android libraries that can make unit testing a whole lot easier.

Read More
  • Ron Unger
  • Posted by Ron Unger
June 30, 2015

Android Unit Testing Implementation at Metova

 

Welcome back friends. Let's continue our discussion on Android Unit Testing from last weeks session.

  • Michael Eatherly
  • Posted by Michael Eatherly
June 22, 2015

Ever wonder how hard it is to implement authentication with Phoenix or how hard it is to roll your own authentication in Phoenix? Well in this blog post we'll find out!

Read More