doku.pub_swipe-to-unlock-the-primer-on-technology-and-business-strategy-mehta-agashe-detroja
about Macs’ invincibility, [119] but now they were forced the publicly admitthat this wasn’t entirely true. Apple’s website used to brag that “Macs don’tget PC viruses,” but shortly after this incident, Apple replaced it with themore generic tagline “it’s built to be safe.” [120] Over the next few years,several more Mac viruses, including ones called Rootpipe and KitM.A,started appearing. [121]Clearly, Macs aren’t immune to viruses. In fact, one 2017 analysis found thatmacOS actually had more security flaws than Windows 10. [122] So if you havea Mac, it’s worth checking out free Mac antivirus apps. [123]One last thing: anyone, no matter how secure their operating system, can fallprey to “social engineering” attacks like phishing, which trick you into givingaway personal information that hackers can use to defraud you. [124]So if anyone ever smugly tells you that their Mac can’t get viruses, tell themto look beyond the marketing. The fact is that no operating system is perfect— any OS can get a virus.
Chapter 3: Software DevelopmentEvery piece of software, from the original Pac-Man game to the latest versionof Snapchat, is made of instructions, or code, that people wrote down and thatcomputers follow. While the code behind apps like Spotify or Yelp mightseem like magical spells, many of the core ideas are simple. We won’t getinto the nitty-gritty of the code, but here we’ll look into three big buildingblocks of apps and websites.First, software is built around algorithms, or well-defined procedures thatcomputers use to solve a problem. For instance, the algorithm to find the areaof a triangle is to multiply the base and the height, then cut the result in half.There are algorithms to predict the weather, recommend movies to watch,process credit card payments, and more. We’ll take a look under the hood ofsome famous apps and websites to reveal the algorithms that make them tick.Then we’ll turn to a second building block: APIs, or applicationprogramming interfaces, which let apps borrow algorithms and data fromother apps. We’ll explore how APIs work and why developers use them, andwe’ll learn how to analyze an app to figure out what APIs it uses.Algorithms and APIs help developers build out software, but to perfect it,developers turn to a third tool: A/B tests. In an A/B test, you show differentversions of a feature to different groups of users: for instance, half the usersget a red button while the other half get a blue button. Then you look atcertain metrics to see which variation performed better, and you push thewinning version to all users. We’ll finish up this chapter with a look at howsome apps and websites use this powerful, scientific technique to improvetheir software.Once you understand these three building blocks, you can start peering underthe hood of any app or website to learn how it works.
- Page 2 and 3: Swipe to Unlock:The Non-Coder’s G
- Page 4 and 5: To my friends and family, for suppo
- Page 6 and 7: PrefaceChapter 1: IntroductionWho t
- Page 8 and 9: Chapter 9: Hardware & RobotsWhat ar
- Page 10 and 11: PrefaceI’ve always been fascinate
- Page 12 and 13: However, after a good half hour of
- Page 14 and 15: Who this book is forThe goal of Swi
- Page 16 and 17: What’s insideWe’ll kick off Swi
- Page 18 and 19: Third, we’ll give you some great
- Page 20 and 21: and Strategy. He has previously wor
- Page 22 and 23: Chapter 2: Operating SystemsAndroid
- Page 24 and 25: Like cars, apps built for different
- Page 26 and 27: Google. [23] Plus, Google pays Appl
- Page 28 and 29: Why do Android phones come pre-inst
- Page 30 and 31: money for carriers and phone makers
- Page 32 and 33: made by Lenovo around 2015 came wit
- Page 34 and 35: just letting employees use their pe
- Page 36 and 37: Can Macs get viruses?For years, one
- Page 40 and 41: How does Google search work?Wheneve
- Page 42 and 43: return webpages that include terms
- Page 44 and 45: How does Spotify recommend songs to
- Page 46 and 47: How does Facebook decide what shows
- Page 48 and 49: Algorithms like Facebook’s news f
- Page 50 and 51: Uber uses the Google Maps API to dr
- Page 52 and 53: All this brings us back to the ques
- Page 54 and 55: always gets imported from Facebook.
- Page 56 and 57: distances on demand” market, Uber
- Page 58 and 59: weather patterns (green blobs for r
- Page 60 and 61: versions of a feature, A and B.A/B
- Page 62 and 63: against a powerful blend of social
- Page 64 and 65: Why is almost every app free to dow
- Page 66 and 67: frequently. There are still several
- Page 68 and 69: How does Facebook make billions wit
- Page 70 and 71: anyone else, Google and Facebook ca
- Page 72 and 73: Why do online news platforms have s
- Page 74 and 75: How does Airbnb make money?Amazon,
- Page 76 and 77: How does the app Robinhood let you
- Page 78 and 79: Dropbox bought the app and the team
- Page 80 and 81: How is Google Drive like Uber?Befor
- Page 82 and 83: Where do things in “the cloud”
- Page 84 and 85: The best and worst of the cloudThin
- Page 86 and 87: Why can’t you own Photoshop anymo
about Macs’ invincibility, [119] but now they were forced the publicly admit
that this wasn’t entirely true. Apple’s website used to brag that “Macs don’t
get PC viruses,” but shortly after this incident, Apple replaced it with the
more generic tagline “it’s built to be safe.” [120] Over the next few years,
several more Mac viruses, including ones called Rootpipe and KitM.A,
started appearing. [121]
Clearly, Macs aren’t immune to viruses. In fact, one 2017 analysis found that
macOS actually had more security flaws than Windows 10. [122] So if you have
a Mac, it’s worth checking out free Mac antivirus apps. [123]
One last thing: anyone, no matter how secure their operating system, can fall
prey to “social engineering” attacks like phishing, which trick you into giving
away personal information that hackers can use to defraud you. [124]
So if anyone ever smugly tells you that their Mac can’t get viruses, tell them
to look beyond the marketing. The fact is that no operating system is perfect
— any OS can get a virus.