Browse Definitions :
Definition

Apple Swift

Contributor(s): Matthew Haughn

Apple Swift is Apple's programming language for IOS, WatchOS , TVOS, MacOS and Linux.

Swift provides a compiled general-purpose language for Apple devices and computers, as well as Linux-based systems. The language makes it possible for a program to run C, Objective-C and C++, as well as Swift code within a single application.

Apple started developing Swift publicly at Swift.org in 2010. The language was developed to be easy to use and offers type safety, eliminating entire classes of common coding errors. Swift was also made to be secure without impacting performance. Bundling object-oriented programming (OOP) with similarities to C helped its popularity with programmers. The language is designed to be easy to learn, making it more tempting for new students and established programmers alike.

Swift maintains compatibility with existing programs coded in Objective-C and works with the Cocoa and Cocoa Touch API frameworks for MacOS and IOS devices. At the same time, the language strips away some of the baggage of C, for a less verbose and more efficient code. Swift performs better than Python with 3.9 times the speed sorting complex objects, while Objective-C outperforms Python 2.8 times. In RC4 encryption, powerful Objective-C offers 127 times the performance of Python, while Swift offers 220 times the performance of Python.

Swift is included with Apple's Xcode software development kit (SDK). Apple offers full documentation of Swift for free at the iBooks Store with the manual “The Swift Programing Language." Swift Playgrounds offers a site where iPad users can access a real-time interface to display their program as they develop it. Swift-enabled, programmable toys are also available.

 

This was last updated in February 2018

Continue Reading About Apple Swift

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • challenge-response authentication

    In information security, challenge-response authentication is a type of authentication protocol where one entity presents a ...

  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system ...

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyberattackers and to detect, deflect or study hacking attempts...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • exbibyte (EiB)

    An exbibyte (EiB) is a unit used to measure data capacity.

  • zebibyte (ZiB)

    A zebibyte (ZiB) is a unit used to measure computing and storage capacity.

  • tiered storage

    Tiered storage is a way to assign different categories of data to various types of storage media with the objective of reducing ...

Close