Risk

2/12/2010
03:13 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Apple's iPad Drives New App Creation

The iPad is a hit, at least with developers.

Apple's widely anticipated announcement last month that its iPad tablet will ship in March was accompanied by predictions of a new gold rush, in which developers race to bring iPad applications to market.

Now Apple's wishful thinking is being realized. According to app analytics company Flurry, there has been a massive surge in the number of new iPhone OS application projects.

"Developers integrating Flurry analytics into iPhone OS applications in January increased by nearly three times over December," the company said in a blog post on Friday. "This represents the single largest spike in Flurry history, with over 1,600 new iPhone OS application starts for January."

The iPad, of course, runs the iPhone OS.

For developers, the popularity of iPhone OS development poses some problems. Apple's iTunes App Store already hosts over 140,000 apps and as more continue to flood in, it becomes harder for apps to stand out.

Apple appears to be aware that app discoverability could be improved. It recently started publishing Web previews for apps in its iTunes Store, a move seen as a way to make apps more visible to search engines.

Flurry also notes that Android development has been on the rise. On average, Android application starts rose by 25% per month between July 2009 and January 2010.

Android had been closing the gap with the iPhone in terms of application starts, but news of the iPad has reversed that trend.

According to Flurry, about 85% of new application starts involved the iPhone OS in January, compared to about 15% for the Android OS.

In December, those numbers were 70% and 30% respectively.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Want Your Daughter to Succeed in Cyber? Call Her John
John De Santis, CEO, HyTrust,  5/16/2018
Don't Roll the Dice When Prioritizing Vulnerability Fixes
Ericka Chickowski, Contributing Writer, Dark Reading,  5/15/2018
New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Security through obscurity"
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-7268
PUBLISHED: 2018-05-21
MagniComp SysInfo before 10-H81, as shipped with BMC BladeLogic Automation and other products, contains an information exposure vulnerability in which a local unprivileged user is able to read any root (uid 0) owned file on the system, regardless of the file permissions. Confidential information suc...
CVE-2018-11092
PUBLISHED: 2018-05-21
An issue was discovered in the Admin Notes plugin 1.1 for MyBB. CSRF allows an attacker to remotely delete all admin notes via an admin/index.php?empty=table (aka Clear Table) action.
CVE-2018-11096
PUBLISHED: 2018-05-21
Horse Market Sell & Rent Portal Script 1.5.7 has a CSRF vulnerability through which an attacker can change all of the target's account information remotely.
CVE-2018-11320
PUBLISHED: 2018-05-21
In Octopus Deploy 2018.4.4 through 2018.5.1, Octopus variables that are sourced from the target do not have sensitive values obfuscated in the deployment logs.
CVE-2018-8142
PUBLISHED: 2018-05-21
A security feature bypass exists when Windows incorrectly validates kernel driver signatures, aka "Windows Security Feature Bypass Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-1035.