As you may have heard, Xojo 2015 Release 3 added the long-awaited ability to create 64-bit apps. And it also added the ability to create Raspberry Pi 2 apps (Linux ARM). This now means there are lots more apps that can get built.
Comments closedCategory: Technology
In order to interface with the Raspberry Pi, you often want to use the General Purpose Input/Output (GPIO) port. It is easy enough to connect a broadboard to the port, but how do you write Xojo code that can talk to the port?
Comments closedXojo Cloud has always taken the headaches out of setting up, securing, maintaining and deploying servers for web apps. Now Xojo Cloud servers are better, stronger and faster- all for the same great price!
Comments closedIn case you missed the change, Xojo no longer creates apps that run on Windows XP.
Comments closedSerious about cross-platform development? Consider going Pro with Xojo. Whether you are new to Xojo or looking to upgrade your existing licenses, Xojo Pro is the best way to take advantage of everything Xojo has to offer.
Comments closedYou can develop and build console and desktop apps for Raspberry Pi 2 (and Raspberry Pi 3) using Xojo 2019r1 or later for free.
Download Xojo today and get started!
Comments closedEarlier this year, Xojo added the ability to create 64-bit iOS apps. And now with Xojo 2015 Release 3, you can create 64-bit apps for your Desktop, Web and Console apps.
Comments closed
Paul and special guest Geoff Perlman talk about the new features in Xojo 2015 Release 3 plus a a bonus announcement at the end.
Comments closedI was up hours later than I should have been last night reading The Martian when, after discussing in detail how to hack some really old software in some really old equipment located about 54.6 million kilometers away, I read this line: “âJesus, what a complicated process,â Venkat said. âTry updating a Linux server sometime,â Jack said.”
And my first thought was, “Oh!, that’s why we offer Xojo Cloud!”
Comments closedPasswords are a problem, as we frequently see in the news when databases containing password and login information are hacked and exposed.
Though too much security is never enough, as developers, there are things we can do to keep our users’ passwords secure.
Comments closed