Welcome!

Microservices Expo Authors: Liz McMillan, Pat Romanski, Elizabeth White, Mehdi Daoudi, Yeshim Deniz

Blog Feed Post

Learning Objective-C 2.0: A Hands-on Guide to Objective-C for Mac and iOS Developers (2nd Edition) Book Review

If I had to give this book a one word description, I would say it is 'balanced'. In the beginning of the book the author mentions that he does not want to right one of those books that list a little code and then explains the code, changes the code, explains those changes and so on and so on.

At first he scared me. I have read some insanely wordy programming and engineering books. I have a much harder time getting through those than the type the author described. I was afraid this book would be one of those that I don't get anything out of except war stories from the author's career. That would not be all bad if the stories had anything to do with the book. I am happy to report that is not what happened.

I found the author had just the right amount of discussion around the different language features he was covering. I thought that the offer had a very no nonsense approach to all the topic that he covered.

The book is broken down into four parts. Below I have listed the three different parts, and the chapters that they contain.

Part I: Introduction to Objective-C
Chapter 1. C, the Foundation of Objective-C
Chapter 2. More about C Variables
Chapter 3. An Introduction to Object-Oriented Programming
Chapter 4. Your First Objective-C Program

Part II: Language Basics
Chapter 5. Messaging
Chapter 6. Classes and Objects
Chapter 7. The Class Object
Chapter 8. Frameworks
Chapter 9. Common Foundation Classes
Chapter 10. Control Structures in Objective-C
Chapter 11. Categories, Extensions, and Security
Chapter 12. Properties
Chapter 13. Protocols
Part III: Advanced Concepts Chapter 14. Memory Management Overview
Chapter 15. Reference Counting
Chapter 16. ARC
Chapter 17. Blocks
Chapter 18. A Few More Things

Part IV: Appendices
Appendix A. Reserved Words and Compiler Directives
Appendix B. Toll-Free Bridged Classes
Appendix C. 32- and 64-Bit
Appendix D. The Fragile Base Class Problem
Appendix E. Resources for Objective-C

One thing I really liked about the book was that the author did not use ARC throughout the book. He decided that reference counting is a very important topic to understand. The logic is that you're going to have to work with legacy code that is not going to be using ARC. There's much more legacy code out there then there is new code. He does take the time to explain how ARC works later in the book and the advanced concepts part.

I thought that I would lightly skim the first few chapters that cover the foundation of Objective-C. But as I was skimming, I found the author's writing style very nice to read, and therefore I ended up reading it word for word.

I must admit that I have been using messaging for a while now, but I never really understood messaging within the Objective-C context until I read this author's explanation of it. The author also has excellent coverage of properties and all of the different ways they can be declared.

The chapter on blocks was also very well put together. The author starts out by explaining function pointers and the issues that you can run into using them. He then does a very thorough job of covering blocks.

Every chapter in the book is a gem and overall I found this author's writing style made the book very easy to read. This book will stay by my side. It's not only a good cover to cover read, it is also a very good reference.

I would recommend this book as the place to start for anyone coming from a different find which such as C# or Java, and also as the place to start for anybody looking to get into building applications with Objective-C.

Learning Objective-C 2.0: A Hands-on Guide to Objective-C for Mac and iOS Developers (2nd Edition)

Read the original blog entry...

More Stories By Tad Anderson

Tad Anderson has been doing Software Architecture for 18 years and Enterprise Architecture for the past few.

Microservices Articles
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple cloud provider environments. Yet, despite this portability promise, developers may include configuration and application definitions that constrain or even eliminate application portability. In this session we'll describe best practices for "configuration as code" in a Kubernetes environment. We will demonstrate how a properly constructed containerized app can be deployed to both Amazon and Azure ...
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die. A Nutanix Enterprise Cloud has many benefits that provide the needed base for a true DevOps paradigm. In their Day 3 Keynote at 20th Cloud Expo, Chris Brown, a Solutions Marketing Manager at Nutanix, and Mark Lav...
The now mainstream platform changes stemming from the first Internet boom brought many changes but didn’t really change the basic relationship between servers and the applications running on them. In fact, that was sort of the point. In his session at 18th Cloud Expo, Gordon Haff, senior cloud strategy marketing and evangelism manager at Red Hat, will discuss how today’s workloads require a new model and a new platform for development and execution. The platform must handle a wide range of rec...
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound e...
If your cloud deployment is on AWS with predictable workloads, Reserved Instances (RIs) can provide your business substantial savings compared to pay-as-you-go, on-demand services alone. Continuous monitoring of cloud usage and active management of Elastic Compute Cloud (EC2), Relational Database Service (RDS) and ElastiCache through RIs will optimize performance. Learn how you can purchase and apply the right Reserved Instances for optimum utilization and increased ROI.
TCP (Transmission Control Protocol) is a common and reliable transmission protocol on the Internet. TCP was introduced in the 70s by Stanford University for US Defense to establish connectivity between distributed systems to maintain a backup of defense information. At the time, TCP was introduced to communicate amongst a selected set of devices for a smaller dataset over shorter distances. As the Internet evolved, however, the number of applications and users, and the types of data accessed and...
Consumer-driven contracts are an essential part of a mature microservice testing portfolio enabling independent service deployments. In this presentation we'll provide an overview of the tools, patterns and pain points we've seen when implementing contract testing in large development organizations.
In his session at 19th Cloud Expo, Claude Remillard, Principal Program Manager in Developer Division at Microsoft, contrasted how his team used config as code and immutable patterns for continuous delivery of microservices and apps to the cloud. He showed how the immutable patterns helps developers do away with most of the complexity of config as code-enabling scenarios such as rollback, zero downtime upgrades with far greater simplicity. He also demoed building immutable pipelines in the cloud ...
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...