Feeds

Devs tempted to hit the source at appMobi's free bar

Celebration or desperation from cloudy crowd?

Security and trust: The backbone of doing business over the internet

Mobile developers with an AJAX leaning can now get free access to the source for appMobi's development toolkit, allowing them to incorporate bits of appMobi tech into their own apps.

AppMobi provides wrappers around the already open-source PhoneGap toolkit, enabling AJAX apps to access native APIs. The cloudy mobile tools vendor is also opening up its enhanced version of the HTML 5 Canvas for web-based gaming, but it is the open-sourcing of the mobiUs browser – which provides access to those APIs on iOS – which will likely attract most interest.

The code is all being shared under the "MIT X11" licence, and the company suggests that an iOS developer might, for example, drop the social sharing capability of mobiUs into an existing application to provide instant Facebook integration.

As well as the browser iOS developers can get hold of the source code for the company's HTML 5 Game Acceleration pack, featuring faster canvas rendering and improved sound APIs for 2D games development in JavaScript.

The idea is that one develops games, or other applications, using JavaScript and associated technologies, and then bundles them together into a what looks (to Apple) like a native application. Such applications are already populating the iTunes store, and provide the promise of cross-platform development.

For the moment Android fans will have to content themselves with the source code to the PhoneGap wrapper (called "Bridge"); the other components won't be available for Google's platform until next year.

AppMobi doesn't charge for access to its tools, in source or binary form, as it makes money offering a cloud-based service with which users then integrate. Such integration isn't mandatory, and appMobi is betting that once you've used it you'll want to pay, so the tools themselves aren't considered an important revenue stream.

The source is available under the "MIT X11" licence, which permits the downloader to "use, copy, modify, merge, publish, distribute, sub-license, and/or sell copies of the software" as long as the licence is distributed, but even if the code itself isn't lifted for inclusion, it's probably worth looking at to see how they do what they do. ®

Security and trust: The backbone of doing business over the internet

More from The Register

next story
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
'Windows 9' LEAK: Microsoft's playing catchup with Linux
Multiple desktops and live tiles in restored Start button star in new vids
iOS 8 release: WebGL now runs everywhere. Hurrah for 3D graphics!
HTML 5's pretty neat ... when your browser supports it
Mathematica hits the Web
Wolfram embraces the cloud, promies private cloud cut of its number-cruncher
Google extends app refund window to two hours
You now have 120 minutes to finish that game instead of 15
Intel: Hey, enterprises, drop everything and DO HADOOP
Big Data analytics projected to run on more servers than any other app
Mozilla shutters Labs, tells nobody it's been dead for five months
Staffer's blog reveals all as projects languish on GitHub
SUSE Linux owner Attachmate gobbled by Micro Focus for $2.3bn
Merger will lead to mainframe and COBOL powerhouse
iOS 8 Healthkit gets a bug SO Apple KILLS it. That's real healthcare!
Not fit for purpose on day of launch, says Cupertino
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.