On this put up, we are going to discover methods to use the iOS SDK StoreKit framework to request app retailer rankings. By leveraging SKStoreReviewController, we will immediate customers with a pop-up to price our iOS app with out requiring them to depart the app. Beforehand, we would have liked to open the App Retailer and ask customers to price the app there. Let’s dive into methods to use the StoreKit framework to request app retailer rankings seamlessly.
Issues to bear in mind whereas including app score pop up utilizing SKStoreReviewController
The app score alert might be displayed as much as thrice inside a 365-day interval.
Keep away from triggering the app score alert via a button click on, as it might not at all times present the alert.
The app icon is managed by SKStoreReviewController and is retrieved out of your app particulars on the iOS App Retailer.
SKStoreReviewController is out there ranging from iOS 10.3 and later variations.
Steps to indicate app score alert in iOS utilizing SKStoreReviewController
Step 1: Import StoreKit framework
Step 2: Open your swift class, the place you need to implement this app score alert. Create a operate to request assessment pop up usingSKStoreReviewController class. Under is the code for asking app score pop up.
import UIKit
import StoreKit
class ViewController: UIViewController {
override func viewDidLoad() {
tremendous.viewDidLoad()
// Do any further setup after loading the view.
self.requestAppReview()
}
func requestAppReview() {
if #obtainable(iOS 14.0, *) {
if let scene = UIApplication.shared.connectedScenes.first as? UIWindowScene {
SKStoreReviewController.requestReview(in: scene)
}
} else {
SKStoreReviewController.requestReview()
}
}
}
Since requestReview is deprecated in IOS 14.0 and onward. So we are going to use, requestReview(in: scene) operate launched after iOS 14.0 and onward. That’s it and we’ve got applied app score pop up in our iOS app. You will note a pop up in your app like this (please ignore the app icon because it’s taken from app that’s already on iOS app retailer).
Safety researchers have highlighted a brand new vulnerability, ‘SinkClose,’ affecting AMD CPUs that enable malicious code execution following an exploit. AMD, whereas addressing the vulnerability, clarifies that it usually impacts ‘critically breached techniques.’
SinkClose Vulnerability Threatens AMD CPUs
Researchers from IOActive found a brand new safety flaw affecting AMD processors. They shared the small print on the current Defcon 2024, elaborating on how the vulnerability, named ‘SinkClose,’ dangers AMD CPUs to code execution assaults. Particularly, the vulnerability impacts the AMD chips’ System Administration Mode (SMM).
Merely put, SMM is an remoted working mode in x86 structure that serves BIOS or firmware to carry out low-level system-wide operations, equivalent to energy administration and {hardware} management. Since SMM stays inaccessible to the working system or system purposes, codes at this stage stay invisible to the Hypervisor and OS-level protections.
The privilege escalation vulnerability that IOActive researchers detected in AMD CPUs may enable an adversary to bypass safe boot and modify SMM settings to deploy just about undetectable malware on the goal techniques.
Exploiting the flaw requires an adversary to have Kernel-level entry (Ring 0), which permits Ring-2 privileges. This allows the attacker to switch SMM, which might stay invisible to the system’s antivirus packages. Thus, the malware deployed this manner would persist even after wiping the system drive clear.
This vulnerability has obtained the CVE ID CVE-2023-31315 and achieved a excessive severity score with a CVSS rating of seven.5. The vulnerability description states,
Improper validation in a mannequin particular register (MSR) may enable a bug with ring0 entry to switch SMM configuration whereas SMI lock is enabled, probably resulting in arbitrary code execution.
AMD Launched The Patch
In response to the IOActive researchers’ findings, AMD launched a detailed advisory acknowledging the vulnerability. The seller additionally launched separate safety fixes for various processors, urging customers to patch their techniques.
Alongside releasing the patch, AMD additionally clarified that the risk principally dangers outdated, weak techniques. In line with their assertion to SecurityWeek,
Whereas the problem solely impacts critically breached techniques, AMD prioritizes safety. We consider our mitigations accessible in the present day are an applicable response to the risk. AMD has launched mitigation choices for its AMD EPYC™ datacenter merchandise and AMD Ryzen™ PC merchandise.
Apple as we speak launched an up to date model of iOS 17.6.1, with the brand new software program coming every week and a half after the launch of the authentic iOS 17.6.1 replace. The brand new model has a construct variety of 21G101, up from 21G93.
iOS 17.6.1 will be downloaded on eligible iPhones and iPads over-the-air by going to Settings > Common > Software program Replace.
Based on Apple’s launch notes, the iOS 17.6.1 replace addresses a problem that might forestall the enabling or disabling of Superior Information Safety. It isn’t clear what’s completely different between the brand new model of the software program and the unique model.
This replace consists of vital bug fixes and addresses a problem that stops enabling or disabling Superior Information Safety.
The Superior Information Safety bug impacted a small variety of customers. Those that tried to show Superior Information Safety on and weren’t in a position to get it enabled noticed an error message and it was clear it wasn’t energetic. Affected customers who tried to show it off noticed it disabled within the interface, although it was really nonetheless energetic for iCloud knowledge.
Each of these bugs have been fastened within the replace. iPhone customers who had the bug that prevented Superior Information Safety from correctly turning off will see a notification that asks them to verify the choice to show the characteristic off after putting in iOS 17.6.1. Apple says that the few customers who skilled this bug had an anticipated stage of safety or extra, within the scenario the place ADP didn’t flip off as anticipated.
Leaker Sonny Dickson is again as we speak with a brand new dummy unit picture displaying all 4 iPhone 16 Professional shade variants, together with the rose gold or “bronze” unit that replaces Blue Titanium within the present iPhone 15 Professional fashions. The iPhone 16 Professional fashions are anticipated to return in black, white or silver, grey or “Pure Titanium,” and a rose or rose gold shade changing Blue Titanium, based on Apple…
It is nearly September, however Apple nonetheless has a number of new product launches deliberate for 2024. New iPhone 16 fashions and Apple Watches are coming in September, and we’re additionally going to get not less than three Mac updates with M4 chips this 12 months, based on rumors. Here is what’s on the horizon. MacBook Professional Apple plans to refresh each the 14-inch and 16-inch MacBook Professional fashions, including M4 chips. The …
Alongside iOS 18, macOS Sequoia, and the opposite fall updates, Apple plans to launch an up to date model of tvOS. Apple TV software program updates typically do not get a lot consideration as a result of they have a tendency to introduce a restricted variety of new options, however there are some fascinating additions coming this 12 months. Subscribe to the MacRumors YouTube channel for extra movies. InSight – InSight is like Amazon…
Apple usually releases its new iPhone collection within the fall, and a potential September 10 announcement date has been floated this 12 months, which suggests we’re lower than a month away from the launch of the iPhone 16. Just like the iPhone 15 collection, this 12 months’s lineup is anticipated to stay with 4 fashions – iPhone 16, iPhone 16 Plus, iPhone 16 Professional, and iPhone 16 Professional Max – though there are many…
The brand new bronze-like shade rumored to be changing Blue Titanium in Apple’s upcoming iPhone 16 Professional lineup could also be known as “Desert Titanium,” based on the leaker often called “Majin Bu.” Idea render of recent iPhone 16 Professional shade Bu referenced the identify on Sunday in a put up on X (Twitter) wherein they shared a picture of digital camera lens rings purportedly destined for the iPhone 16 Professional and iPhone 16 Professional…
Apple plans to improve its whole AirPods lineup this 12 months in a single kind or one other, with a mixture of recent mannequin launches and upcoming software program updates for present gadgets. Whether or not you are holding out for the subsequent era of AirPods or AirPods Max, or simply need to know what new options are on the way in which to your present earbuds, preserve studying for the complete lowdown on what to anticipate. AirP…
Whether or not it tags alongside through a smartphone, laptop computer, pill, or wearable, it looks as if the web follows us wherever we go these days. But there’s one thing else that follows us round as effectively — a rising physique of private data that we create whereas banking, purchasing, and easily shopping the web. And little question about it, our data is terrifically invaluable.
What makes it so invaluable? It’s no exaggeration to say that your private data is the important thing to your digital life, alongside together with your monetary and civic life as effectively. Except for utilizing it to create accounts and logins, it’s additional tied to all the things out of your financial institution accounts and bank cards to your driver’s license and your tax refund.
For sure, your private data is one thing that wants defending, so let’s try a number of methods you are able to do simply that.
What’s private data?
What’s private data? It’s data about you that others can use to establish you both straight or not directly. Thus, that data may establish you by itself. Or it may establish you when it’s linked to different identifiers, like those linked with the gadgets, apps, instruments, and protocols you utilize.
A primary instance of direct private data is your tax ID quantity as a result of it’s distinctive and straight tied to your title. Additional cases embody your facial picture to unlock your smartphone, your medical data, your funds, and your cellphone quantity as a result of every of those will be simply linked again to you.
Then there are these oblique items of private data that act as helpers. Whereas they won’t establish you on their very own, a number of of them can once they’re added collectively. These helpers embody issues like web protocol addresses, the distinctive machine ID of your smartphone, or different identifiers comparable to radio frequency identification tags.
You too can discover items of your private data within the accounts you utilize, like your Google to Apple IDs, which will be linked to your title, your electronic mail deal with, and the apps you may have. You’ll additionally discover it within the apps you utilize. For instance, there’s private data within the app you utilize to map your walks and runs, as a result of the mixture of your smartphone’s distinctive machine ID and GPS monitoring can be utilized at the side of different data to establish who you’re. To not point out the place you usually love to do your 5k hill days. The identical goes for messenger apps, which may acquire the way you work together with others, how typically you utilize the app, and your location data based mostly in your IP deal with, GPS data, or each.
In all, there’s a cloud of private data that follows us round as we go about our day on-line. Some wisps of that cloud are extra personally figuring out than others. But collect sufficient of it, and your private data can create a high-resolution snapshot of you — who you’re, what you’re doing, once you’re doing it, and even the place you’re doing it, too — notably if it will get into the mistaken arms.
Bear in mind Pig-Pen, the character straight from the outdated humorous pages of Charles Schultz’s Charlie Brown? He’s exhausting to overlook with that ever-present cloud of mud following him round. Charlie Brown as soon as mentioned, “He could also be carrying the soil that trod upon by Solomon or Nebuchadnezzar or Genghis Khan!” It’s the identical with us and our private data, besides the cloud surrounding us, isn’t the mud of kings and conquerors. They’re motes of information which might be of tremendously excessive worth to crooks and dangerous actors — whether or not for functions of identification theft or invasion of privateness.
Defending your private data protects your identification and privateness
With all the private data we create and share on the web, that calls for safeguarding it. In any other case, our private data may fall into the arms of a hacker or identification thief and find yourself getting abused, in probably painful and expensive methods.
Listed here are a number of issues you are able to do to assist make sure that what’s personal stays that means:
1) Use an entire safety platform that may additionally shield your privateness.
Sq. One is to shield your gadgets with complete on-line safety software program. This defends you in opposition to the newest virus, malware, spy ware, and ransomware assaults plus additional protects your privateness and identification. Additionally, it could present robust password safety by producing and mechanically storing complicated passwords to maintain your credentials safer from hackers and crooks who may attempt to power their means into your accounts.
Additional, safety software program also can embody a firewall that blocks undesirable site visitors from getting into your property community, comparable to an attacker poking round for community vulnerabilities in order that they will “break in” to your pc and steal data.
2) Use a VPN.
Also called a digital personal community, a VPN helps shield your very important private data and different knowledge with bank-grade encryption. The VPN encrypts your web connection to maintain your on-line exercise personal on any community, even public networks. Utilizing a public community and not using a VPN can enhance your threat as a result of others on the community can probably spy in your shopping and exercise.
Should you’re new to the notion of utilizing a VPN, try this text on VPNs and the way to decide on one with the intention to get the perfect safety and privateness doable. (Our McAfee+ plans provide a VPN as a part of your subscription.)
3) Hold an in depth grip in your Social Safety Quantity.
Within the U.S., the Social Safety Quantity (SSN) is without doubt one of the most prized items of private data because it unlocks the door to employment, funds, and far more. First up, hold an in depth grip on it. Actually. Retailer your card in a safe location. Not your purse or pockets.
Sure companies and medical practices may ask you in your SSN for billing functions and the like. You don’t have to supply it (though some companies may refuse service for those who don’t), and you’ll at all times ask if they may settle for some different type of data. Nonetheless, there are a handful of cases the place an SSN is a requirement. These embody:
Employment or contracting with a enterprise.
Group medical health insurance.
Monetary and actual property transactions.
Making use of for bank cards, automobile loans, and so forth.
Bear in mind that hackers typically come up with SSNs as a result of the group holding that data will get hacked or compromised itself. Minimizing how typically you present your SSN can provide an additional diploma of safety.
4) Defend your recordsdata.
Defending your recordsdata with encryption is a core idea in knowledge and data safety, and thus it’s a strong technique to shield your private data. It entails reworking knowledge or data into code that requires a digital key to entry it in its unique, unencrypted format. For instance, McAfee+ contains File Lock, which is our file encryption characteristic that allows you to lock necessary recordsdata in safe digital vaults in your machine.
Moreover, you can even delete delicate recordsdata with an utility comparable to McAfee Shredder, which securely deletes recordsdata in order that thieves can’t entry them. (Fast truth: deleting recordsdata in your trash doesn’t delete them within the truest sense. They’re nonetheless there till they’re “shredded” or in any other case overwritten such that they will’t be restored.)
5) Keep away from these web “quizzes.”
Which Marvel Universe superhero are you? Does it actually matter? In any case, such quizzes and social media posts are sometimes grifting items of your private data in a seemingly playful means. When you’re not giving up your SSN, you is likely to be giving up issues like your birthday, your pet’s title, your first automobile…issues that folks typically use to compose their passwords or use as solutions to frequent safety questions on banking and monetary websites. The one technique to go this sort of quiz is to not take it!
6) Be looking out for phishing assaults.
A much more direct type of separating you out of your private data is phishing assaults. Posing as emails from recognized or trusted manufacturers, monetary establishments, or perhaps a good friend or member of the family, a scammer’s assault will attempt to trick you into sharing necessary data like your logins, account numbers, bank card numbers, and so forth underneath the guise of offering customer support.
How do you see such emails? Properly, it’s getting slightly more durable these days as a result of scammers are getting extra subtle and may make their phishing emails look more and more authentic. Much more so with AI instruments. Nonetheless, there are a number of methods you may spot a phishing electronic mail and phony web sites. Furthermore, our McAfee Rip-off Safety can do it for you.
7) Hold mum in your social media profile.
You’ll be able to take two steps to assist shield your private data from being in danger through social media. One, suppose twice about what you share in that put up or photograph — like the situation of your baby’s faculty or the license plate in your automobile. Two, set your profile to personal in order that solely buddies can see it. Social media platforms like Fb, Instagram, and others provide the choice of creating your profile and posts seen to buddies solely. Selecting this setting retains the broader web from seeing what you’re doing, saying, and posting, which may help shield your privateness and offers a scammer much less data to use. Utilizing our Social Privateness Supervisor could make that even simpler. With just a few clicks, it could alter greater than 100 privateness settings throughout their social media accounts — making them extra personal consequently.
8) Search for HTTPS once you browse.
The “S” stands for safe. Any time you’re purchasing, banking, or sharing any type of private data, search for “https” firstly of the online deal with. Some browsers additionally point out HTTPS by exhibiting a small “lock” icon. Doing in any other case on plain HTTP websites exposes your private data for anybody who cares to observe that website for unsecured connections.
10) Hold tabs in your credit score — and your private data.
Theft of your private data can result in bank cards and different accounts being opened falsely in your title. What’s extra, it could take a while earlier than you even change into conscious of it, comparable to when your credit score rating takes a success or a invoice collector comes calling. By checking your credit score, you may repair any points that come up, as firms usually have a clear-cut course of for contesting any fraud. You may get a free credit score report within the U.S. through the Federal Commerce Fee (FTC) and likewise, different nations just like the UK have related free choices as effectively.
Main Drumroll: We’re excited to welcome Jim Smittkamp as our Chief Income Officer as we embark on the subsequent section of our development journey!
Jim joins us from Fivetran, certainly one of our esteemed companions, the place he was their Chief Income Officer and notably helped scale the corporate’s ARR from $5 million to $250 million. His profound affect at Fivetran underscores his distinctive functionality to drive substantial income development and foster vital strategic partnerships.
However that’s not what makes Jim particular.
And on this weblog publish, we need to share with you what does. As founders, this may need been probably the most tough searches we’ve ever carried out. Once we started our seek for a Chief Income Officer, we have been conscious about the heavy weight of accountability that got here with the function.
At Atlan, we’ve been extremely lucky to construct a product that individuals love (and need). We achieved practically 3X development in 2023, exiting the yr as one of many few corporations to speed up development regardless of a difficult macroeconomic local weather. Our aggressive win price stands at 75%—a testomony to our product’s worth, as three out of each 4 information leaders select Atlan when in comparison with rivals. To not point out that, 85% of our clients attempt Atlan earlier than they purchase.
The previous Chief Income Officer of ServiceNow, Dave Schneider, as soon as stated to me,
When you could have lightning in a bottle and buyer traction such as you do—it’s your responsibility to take your software program to each single potential potential buyer, so that they make the precise shopping for choice.”
This recommendation crystallized the significance of discovering a frontrunner who might assist us fulfill our responsibility to information groups around the globe.
“Obligation” is an evocative phrase at Atlan, one we maintain with the utmost seriousness. In our seek for a Chief Income Officer, it was essential to discover a chief who not solely resonated with however would additionally protect the distinctive DNA that defines Atlan. Beginning out as an information group ourselves, we penned a manifesto even earlier than promoting our first product. This manifesto wasn’t simply phrases—it was a dedication to be the sort of accomplice we ourselves had wanted throughout our early days as an information group.
This dedication has formed each side of our operations—we stayed in stealth for much longer than most corporations do, until we have been positive that we had the precise product — one which drives real adoption in information groups. We have now a bigger buyer expertise group than a gross sales group, which is nearly extraordinary in SaaS corporations. We consider our job as serving to clients achieve success with their program, not simply promote them software program — resulting in the launch of Atlan College, Atlan Neighborhood and even management packages just like the DataOps Leaders program.
Our method to measuring success goes past standard metrics and we monitor natural “love moments” on our #wall-of-love on Slack. And these core beliefs: do what’s proper on your clients, and they’re going to aid you construct an amazing enterprise, are coming true.
Once we surveyed our clients final yr to find what actually units us aside, the response was unanimous and clear: “Companion, not vendor.” Over 90% of our clients come to Atlan inbound (sure, they discover us and need to purchase Atlan).
Not Only a Chief, however a Steward of Tradition
All through our intensive search, I personally spoke with over 30 income leaders, every with a formidable background. Nevertheless, from our very first dialog, Jim stood out distinctly.
Why? As a result of Jim is greater than a gross sales chief; he’s a seasoned enterprise chief and a real firm builder. Sure, he belongs to that elite cadre of income leaders who haven’t solely demonstrated world-class operational rigor but in addition led income organizations by varied go-to-market phases—from scaling groups in early levels to main complicated partnership motions in mature enterprises, as evidenced by his impactful tenures at Fivetran and Gigya (acquired by SAP) — throughout a wide range of enterprise fashions, from PLG to enterprise gross sales — and consumption based mostly pricing to SaaS subscriptions.
However what actually units Jim aside is his extraordinary emotional intelligence. He has cultivated a novel gross sales tradition that’s based on belief and empathy. Throughout our reference checks, the accolades have been overwhelming.
Have your again sort management.”
I’d go work for him once more in a heartbeat.”
This suggestions got here not simply from his direct reviews, but in addition from account executives and front-line managers.
Furthermore, Jim extends his affect past simply main income groups; he builds corporations. His direct reviews shared insights into his management fashion, a testomony to his capacity to foster belief and development inside his groups
He provides us studying assignments earlier than our offsites.”
Jim has a e-book advice for every thing.”
And most significantly, Jim champions a first-principles method and he’s prepared to vary his thoughts when he’s flawed. At Atlan, certainly one of our core values is “Downside first, answer second.” This philosophy compels us to totally perceive the challenges earlier than proposing options, setting apart trade norms and previous biases. This rigorous concentrate on the issue can lead us to overtake our product roadmap and even problem our clients’ views in the event that they aren’t addressing the core points successfully.
Simply final month, Bryan and Andrew from our group suggested a potential shopper, who had accomplished a proof of worth with us and was able to buy, to carry off on shopping for Atlan. They identified that the shopper's customers didn’t face vital sufficient challenges to warrant our answer at the moment.
The quick consequence was a loss in income, however the long-term final result was way more useful. This shopper now trusts us implicitly, understanding that our dedication is before everything to their success, not simply to our backside line. And sometime, they'll grow to be a life-long buyer.
We wanted a frontrunner who’d protect that tradition. Jim is exactly that chief.
The “A-ha Second”
I nonetheless bear in mind the second when all of it clicked for me—that Jim was actually meant to be at Atlan. It was March twelfth, throughout a buyer dinner on the Gartner Summit, and it was removed from peculiar. At one desk, a bunch of knowledge lovers have been partaking in a spirited “information brawl,” laughing loudly as they debated the definition of “buyer.” Amidst this, a CIO I had by no means met earlier than pulled me apart.
We typically keep away from vendor occasions and dinners, however you aren’t only a vendor to us; you’re a accomplice. Your group is outstanding, and we’ll go wherever to help you.”
One other chief took apart my cofounder, Varun, and me, expressing his concern,
I’m actually paranoid that you will screw this up. What you’re constructing is actually particular. Don’t screw it up.”
As I seemed across the room, taking within the passionate debates and the sense of neighborhood amongst these leaders, I felt a profound sense of belonging. This “particular” factor we had constructed felt like residence. In that second, I used to be sure—Jim would match completely into this image.
Welcome residence, Jim! Let’s construct the house that information groups deserve.