(I'm posting this for Mara, who speaks French and lives in Africa - please give him a hand with his dev question! I translated the question using Babelfish. You can, too.)


Hello! I have only one problem to be able to advance, It is the connection of the iPhone application to a database. I would like to know the most suitable base and the methods of connection. Thank you.

Mara


Hello!

J'ai un seul problème pour pouvoir avancer, c'est la connexion de l'application iPhone à une base de données. Je voudrais savoir la base la plus appropriée et les méthodes de connexion.

Merci, Mara

Views: 61

Replies to This Discussion

Here's an update: "J'ai installé le framework de mysql mais aprés avoir compilé mon programme j'obtiens comme erreur: ".objc_class_name_MCPConnection", referenced from:

Qu'est ce fait ça et comment peut on le corriger."

Translated:

"I installed the framework of mysql but after compiling my program I get as error: ". Objc_class_name_MCPConnection", referenced from:

What is it and how can we fix it. "
I just published my first iPhone App, Party Twacker. This app uses SQLite which is perfect for the iPhone dev environment. Go to www.sqlite.org for more information.
* 300 million copies of Mozilla Firefox.
* 20 million Mac computers, each of which contains multiple copies of SQLite
* 20 million websites run PHP which has SQLite built in. [3] We have no way of estimating what fraction of those sites actively use SQLite, but we think it is a significant fraction.
* 450 million registered Skype users.
* 20 million Symbian smartphones shipped in Q3 2007 [5] Newer versions of the SymbianOS have SQLite built in. It is unclear exactly how many Symbian phones actually contain SQLite, so we will use a single quarter's sales as a lower bound.
* 10 million Solaris 10 installations, all of which require SQLite in order to boot.
* Millions and millions of copies of McAfee anti-virus software all use SQLite internally.
* Millions of iPhones use SQLite
* Millions and millions of other cellphones from manufactures other than Symbian and Apple use SQLite. This has not been publicly acknowledged by the manufactures but it is known to the SQLite developers.
* There are perhaps millions of additional deployments of SQLite that the SQLite developers do not know about.

RSS

Happy 10th year, JCertif!

Notes

Welcome to Codetown!

Codetown is a social network. It's got blogs, forums, groups, personal pages and more! You might think of Codetown as a funky camper van with lots of compartments for your stuff and a great multimedia system, too! Best of all, Codetown has room for all of your friends.

When you create a profile for yourself you get a personal page automatically. That's where you can be creative and do your own thing. People who want to get to know you will click on your name or picture and…
Continue

Created by Michael Levin Dec 18, 2008 at 6:56pm. Last updated by Michael Levin May 4, 2018.

Looking for Jobs or Staff?

Check out the Codetown Jobs group.

 

Enjoy the site? Support Codetown with your donation.



InfoQ Reading List

Claude Code Used to Find Remotely Exploitable Linux Kernel Vulnerability Hidden for 23 Years

Anthropic researcher Nicholas Carlini used Claude Code to find a remotely exploitable heap buffer overflow in the Linux kernel's NFS driver, undiscovered for 23 years. Five kernel vulnerabilities have been confirmed so far. Linux kernel maintainers report that AI bug reports have recently shifted from slop to legitimate findings, with security lists now receiving 5-10 valid reports daily.

By Steef-Jan Wiggers

Article: Using AWS Lambda Extensions to Run Post-Response Telemetry Flush

At Lead Bank, synchronous telemetry flushing caused intermittent exporter stalls to become user-facing 504 gateway timeouts. By leveraging AWS Lambda's Extensions API and goroutine chaining in Go, flush work is moved off the response path, returning responses immediately while preserving full observability without telemetry loss.

By Melvin Philips

New Rowhammer Attacks on NVIDIA GPUs Enable Full System Takeover

Security researchers have demonstrated a new class of Rowhammer attacks targeting NVIDIA GPUs that can escalate from memory corruption to full system compromise, marking a significant shift in hardware-level security risks.

By Craig Risi

Anthropic Paper Examines Behavioral Impact of Emotion-Like Mechanisms in LLMs

A recent paper from Anthropic examines how large language models internally represent concepts related to emotions and how these representations influence behavior. The work is part of the company’s interpretability research and focuses on analyzing internal activations in Claude Sonnet 4.5 to understand the mechanisms behind model responses better.

By Robert Krzaczyński

Presentation: Platform Engineering: Lessons from the Rise and Fall of eBay Velocity

Randy Shoup discusses the "Velocity Initiative," a transformation that doubled engineering productivity and modernized eBay’s DORA metrics. He shares the technical playbook used to scale 4,500 services while explaining why even elite engineering execution can’t save a company hampered by waterfall planning, risk aversion, and a "pathological" culture of fear.

By Randy Shoup

© 2026   Created by Michael Levin.   Powered by

Badges  |  Report an Issue  |  Terms of Service