Browse Definitions :
Definition

Apple Swift

Contributor(s): Matthew Haughn

Apple Swift is Apple's programming language for IOS, WatchOS , TVOS, MacOS and Linux.

Swift provides a compiled general-purpose language for Apple devices and computers, as well as Linux-based systems. The language makes it possible for a program to run C, Objective-C and C++, as well as Swift code within a single application.

Apple started developing Swift publicly at Swift.org in 2010. The language was developed to be easy to use and offers type safety, eliminating entire classes of common coding errors. Swift was also made to be secure without impacting performance. Bundling object-oriented programming (OOP) with similarities to C helped its popularity with programmers. The language is designed to be easy to learn, making it more tempting for new students and established programmers alike.

Swift maintains compatibility with existing programs coded in Objective-C and works with the Cocoa and Cocoa Touch API frameworks for MacOS and IOS devices. At the same time, the language strips away some of the baggage of C, for a less verbose and more efficient code. Swift performs better than Python with 3.9 times the speed sorting complex objects, while Objective-C outperforms Python 2.8 times. In RC4 encryption, powerful Objective-C offers 127 times the performance of Python, while Swift offers 220 times the performance of Python.

Swift is included with Apple's Xcode software development kit (SDK). Apple offers full documentation of Swift for free at the iBooks Store with the manual “The Swift Programing Language." Swift Playgrounds offers a site where iPad users can access a real-time interface to display their program as they develop it. Swift-enabled, programmable toys are also available.

 

This was last updated in February 2018

Continue Reading About Apple Swift

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • access control

    Access control is a security technique that regulates who or what can view or use resources in a computing environment.

  • ethical hacker

    An ethical hacker, also referred to as a white hat hacker, is an information security expert who systematically attempts to ...

  • two-factor authentication (2FA)

    Two-factor authentication (2FA), sometimes referred to as two-step verification or dual factor authentication, is a security ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • Flash Storage

    Flash storage is any type of drive, repository or system that uses flash memory to keep data for an extended period of time.

  • optical disc

    An optical disc is an electronic data storage medium that can be written to and read from using a low-powered laser beam.

  • RAID 0 (disk striping)

    RAID 0 (disk striping) is the process of dividing a body of data into blocks and spreading the data blocks across multiple ...

Close