Command CompileAssetCatalog failed with a nonzero exit code

pulling out hair

Oh my good gravy!

I was working on a cleanly installed Mac after migrating user accounts onto it. My account is not the primary admin account (eg. UID 501). For some reason Xcode was installed with all the permissions set to that primary user, who has yet to log onto this Mac!

I have been having multiple issues trying to get Xcode to build on this Mac — my traveling Mac. I like to leave my bread and butter Mac at home and travel with an 11 inch MacBook Air. Primarily because any other Mac cannot be opened on an airplane, in Economy. I cannot afford to fly business class since the Indie-Apocalypse hit in 2014.

So the owner permissions were all f’ed up, where Xcode does it’s build business. The last straw was the “Command CompileAssetCatalog” failure.

The fix is to change the permissions on the Xcode folder in my own home Library (which all files should be all owed my username.) Pro Tip: replace your username where you see mine — tmitra

cd /Users/tmitra/Library/Developer/Xcode/UserData
ls -la

Checking the ownership of this folder showed I was not the owner. So I stepped back and fixed the permissions on the Xcode directory here:

sudo chown -R tmitra ~/Library/Developer/Xcode

Build and Run.

FWIW I also had to fix permissions elsewhere:

Error: Failed to create temporary directory: /Library/Developer/Xcode/UserData/IB Support/Simulator Devices/

sudo chown -R tmitra ~/Library/Developer/CoreSimulator/Devices

“tmp” couldn’t be removed because you don’t have permission to access it

sudo chown tmitra /Users/tmitra/Library/Developer/Xcode/DerivedData

Your mileage may vary.

Is Amazon Trying to Rip Off Canadians?

I mentioned this on the podcast a few episodes ago, but I go shot down. I edited my comments out. However there continues to be a huge disparity in the pricing of identical products between Amazon Canada and the main Amazon in the USA. I was looking for a track for my grandson’s birthday in July. I fooled up the price on the Apple Store as well as on Amazon. Apple was asking $45 and Amazon Canada was asking over $350 plus shipping! I bought the track from Apple with free shipping. See the screenshot below. A 560% increase in cost (based on today’s exchange rate)

Note the discrepancy between the Canadian price above and the US Store price.

 

A few days later I was looking for a shock mount for my Yeti microphone. Imagine my surprise when there was a huge discrepancy between the US and Canadian stores. see the image. A 370% increase.

 

 

Again today I found another potential rip off. A 400% increase.

 

So I’m calling out Amazon Canada. WTF? Every price I look up is marked up incredibly.

Disappointed – No Black Friday iPad for me this year.

I have to say that I am really disappointed in Apple Canada this Black Friday. For the past three years or so, I have leveled up either my iPads or Macs on Black Friday. Back then, I was pleased to see that Apple Canada mirrored the US based mothership store by offering an equivalent deal. However I guess that is only on the Other App Store as Aaron coined it.

Sure I can get my gear from Best Buy Canada or my local Apple dealer (Riverdale Mac $5o off iPads), who are participating in the Black Friday sales spirit. However I would normally get my iPad engraved by Apple. I would happily take an iTunes gift card in lieu of actual cash. I certainly spend more per year than the $50 iTines Card offered as incentive to our American cousins.

Yet another example of the fact that the “stores” are run out of the US version of Apple. Once again, Apple has demonstrated that Canada as a market is considered lower than Rhode Island or Delaware.

Xcode 6 FirstResponder Picker Conundrum

So I’m working away on a simple app, that has data presented in tableViews. By default tableViews use UILabels to display the data. To make them editable, requires adding a custom tableViewCell class and putting UITextFields in place. Simple enough.

What if the data to be input is a date or a choice of one, two or three values? Well then you add a UIDatePickerView or a UIPickerView when the user taps on the field. But wait! This is Xcode 6’s Simulator you’re running on. Why not mess with the developer a bit – that should be fun. When the date textField is tapped do nothing. Let’s see how many Google searches or twitter posts are required to solve this?

iOS Simulator Screen Shot Oct 14, 2014, 7.34.49 PM

 

Wait! What!? Tapping the date field doesn’t open the Date Picker?

“Well, let’s take a look at the simulator’s Keyboard setting,” says the wizen senior developer. Sure enough under the Hardware menu, is a Keyboard, with a submenu checked that says, “Connect Hardware Keyboard.” Uncheck that, and as if by magic, the Date Picker appears. There is much rejoicing throughout the land.

Picker View appears when "Connect Hardware Keyboard" is unchecked
Picker View appears when “Connect Hardware Keyboard” is unchecked

The example app is form “More iOS 6 Development” published by Apress.

Xcode Process launch failed: Security

launch failed security

The latest annoyance in Xcode had me stumped for a bit but @smappsoft set me straight. When trying to build and app under iOS 8, the build succeeds but the app doesn’t launch. Saying “process launch failed: Security” and not much else.

Turns out that the build was successful but your shiny new iOS 8 device doesn’t “trust” your profile.

Security: 1, Developer: 0

IMG_5124-cropped

So to solve this new cryptic behavior, launch the app on your device (which you just installed) and you will get a trust prompt asking you to approve an “Untrusted App Developer”. This is Gatekeeper asking you to confirm your trust of the developer (yourself).

Once you’ve completed this trust you can happily install apps from Xcode.

Weird Time Machine AFP Error – solved

This was a first. I just rebooted the OSX server to free up the Time Machine volume – after getting the ubiquitous “volume is in use error”.

When Time Machine on my Mac next ran, I got this weird error “The network backup disk does not support the required AFP features”. This was the first time that I’ve seen this error. I googled around for the error, and even on the Drobo web site. I didn’t get any useful information… so I logged onto the server to look for errors.

There were no messages in the Server app’s Alerts pane. There was nothing unusual in the Drobo Dashboard. However I did notice that Time Machine was switched to “off”. WTF? A service on the OSX service that was NOT running after a reboot? Perish the thought! (I reboot my servers about once or twice a year. A properly running Unix server should never “need” a reboot.)

So I turned Time Machine back “On” in the Server’s app. There were no existing Time Machine volumes set up in the pane. So I had to direct the Time Machine back to the folder that I had set up on the Drobo to store the backups. Very strange indeed.

When the backup tried to run on the Mac again, I had to go into the Time Machine preferences and choose “Add or Remove Disk” to reconnect the back up. It’s running once again…

This is why I also use Background Backup to backup all my Macs. I never have issues with that service. You get what you pay for.

Protecting yourself online – seriously

protect-croppedThere’s been a lot press lately about people’s online if being leaked or hacked. Some blame the online service providers, such as Apple’s iCloud or retail stores lackadaisical storage of credit card data. Let’s be honest with ourselves, that type finger pointing or product bashing doesn’t serve anyone. While I realize that you are busy starring in movies or running a successful business, being aware of what needs to happen will help you do or find someone to help you out. The only person or persons who can protect your online interests is yourself. So here are some things you should already be doing or at the very least be preparing to do.

  1. _DSC3946Start using encrypted email. Nearly every email host on the planet offers some type of SSL encryption. Check your email settings, or hire an expert to check, and make sure that the SSL protection in ON. It also needs to be set to “on” for both incoming and outgoing email on all of your devices. SSL, or secure socket layer, encrypts your email as it leaves your device and delivers it to your mail service provider. That means that no one can intercept and read the contents of your email messages, coming or going. This does not mean that it’s OK to send sensitive information, like passwords, credit card details or even a spreadsheet. However if you do, then you can be sure that the data sent will be encrypted. Next you’ll need to make sure that the people you are communicating with are also encrypting their email.
  2. 1PasswordUse a password management application. I personally recommend iPassword from AgileBits. A good password management app will keep track of your passwords, integrate into your web browsers, help store security questions, generate secure passwords that meet or exceed the required types that your provider suggests. It will also keep track of what passwords you have used on the various web sites. AgileBits is even making this functionality available to iOS 8 applications so that developers can utilize it’s functionality in their own apps. You can here more about AgileBits in our latest podcast: MTJC Podcast Episode 5
  3. IMG_1591Create stronger passwords. This is the most important way to protect yourself online. You can no longer rely on your own methods for creating passwords. Again it may seem annoying to create hardened passwords but it is only a matter of time when some script out there cracks your password. If you use common worlds or phrases, you are only fueling the fire. The scripts that attempt to break your passwords will start with the basics, common words and phrases. No there is not a little man or whiz kid trying to crack your password. It is a script running on a remote server. In fact, once your password is cracked it goes onto a list server to be exploited later. There are so many already compromised users and servers that the exploiters don’t need to attack you today. So change your passwords regularly. Best practices recommend using a combination of uppercase and lowercase letters and numbers as well some punctuation or special charters (aka high ascii). There are plenty of password checkers online like: https://howsecureismypassword.net – This site shows you how many seconds it would take to crack your password. A simple password with a common word and number would be cracked in seconds. More complex passwords would take hours. Ideally you want a password that would take years to crack.
  4. Screen Shot 2014-09-09 at 1.47.03 AMChange your passwords regularly. It may seem to be annoying but rotating your passwords on a regular basis is always a good idea. I personally change critical passwords every 90 days or so. You can set up or ask your providers and/or IT guys to set up a password policy that prompts you to change your passwords. Once again use a password management app, see above, to keep track of your passwords.
  5. Create different passwords for each site. In general I change up my passwords on every site. Initially I used a shorthand to distinguish each variation. Now I use 1Password to keep track of the passwords and even allow 1Password to suggest new passwords with it’s Password Generator feature. The simple trick here is that if you use the same passwords in more than one place, then you open yourself up to a multisite exploit.
  6. icloudUse a secure online storage. If you must keep your data in the cloud, make sure you are using  a secure service. It goes without saying that you should use secure passwords to access these. In  previous point we suggested using password management to keep track of your passwords. No more sticky notes or pieces of paper stuffed under your keyboard. Yes, I’m looking at you. Despite what you may have heard, services like DropBaox, Google Drive and iCloud, do use state of the art encryption to protect you from yourself. They are using better than military grade encryption, Advanced Encryption Standard (AES) with 256-bit or 128-bit key length at least. In theory it would take trillions of years to decrypt your data without the correct key or password. It doesn’t help if your password is the name of your niece’s new puppy. The bottom line is, if the information is too important to lose, then do not store it online. There are tools out three that anyone can buy to get at your online data. I personally recommend that you sync or back your devices up to a computer at home, not online (Sorry, iCloud!)
  7. Screen Shot 2014-09-09 at 12.30.05 AMEnable 2-step verification for all of your online services. As mentioned in our podcast, MTJC Podcast Episode 5, 2-step verification uses a secondary device to authenticate you when you set up your account. If someone attempts to compromise your data, they won’t get far without the secondary confirmation. Often the online service will ask for your cell phone and send you a txt msg  with an additional code to verify your account. So along with your password only you will need to supply the second code to access your stuff. That would keep the bad guys out. You can read about 2-step authentication with Google here: Google 2-step authentication and with Apple’s iCloud here: How to step up Two Factor Authentication on iCloud
  8. Screen Shot 2014-09-09 at 12.35.12 AMModify your online privacy settings. Go into Facebook, Twitter, LinkedIn and whatever online social network tools you use and check your “privacy settings“. While it’s tempting to be popular by making yourself as public as you can, you must by now be aware that there are many people out there who are looking the exploit you. Maybe they are after your credit card or banking information. Maybe they are after your private photos. Maybe they are simply out to drive traffic to their web site, and get more money from advertisers. When I was a kid, the boogy man hid behind doors and under my bed. Now the boogy man is a well respected business man running web services in Eastern Europe, China and South Asia. You need to visit your privacy settings and make sure your postings go to people you know and trust. While you’re at it, take a look at the Applications that you’ve allowed to access your online data. Delete or disable the connected apps that you don’t need.

Now that you know the items you need to check, you’ll be better prepared to start protecting yourself. If you haven’t already started using these methods, at least add them to your TO DO list. As the sergeant on Hill Street Blues used to say, “Let’s be careful out there.”

FounderDating – beware of strangers bearing gifts.

Note: The original source of this post was an email that I received on a Meetup email. The Administrator of the Meetup group normally screens emails sent to the group, for relevancy. Turns out there are a lot of spam messages sent to Meetup groups regarding FounderDating. The content is common, but the subject changes based on the group. The original post follows:

Beware of FounderDating it appears to be a viral mechanism to phish your contacts. You may receive an endorsement appearing to be from me. It is not an endorsement – not at this time any way. I’ll let you know if that changes.

A colleague of mine gave them an endorsement on a private network. So I figured I would take a look and applied. I didn’t think it was odd that it wanted me to apply through my LinkedIn profile. I rarely do allow strangers access to my contacts, but this was supposed to be a professional connection. So linkedIn made sense. I was applying to be a mentor…

What was odd was that a few hours after applying, I got an email saying that my application was incomplete. I was given a token to access the application. Before I was able to to get back to “finishing” the application, I received a “thanks but no thanks” rejection from FounderDating.

I should mention that I reached out to a friend who apparently was a member already. He didn’t mention anything was odd.

After I received the rejection, FounderDating proceed to contact the people I asked to vouch for me. Now I’m scrambling to stop them before they proceed.

I found another person whom’s experience in identical to mine.

FounderDating: Nice concept, dodgy viral mechanism

Hopefully you will read this and avoid this potential scam.

I’m not the only one who is unhappy with their endorsing system

Here’s the letter they are sending on my behalf:

Hi M*****,
I’m applying to join FounderDating (no, it’s NOT romantic) – a handpicked network of entrepreneurs – to meet other talented entrepreneurs. Can you do me a quick favor and vouch for (aka reference) me as an entrepreneur? Should take 2 minutes.

[link redacted]

(To prove that you’re the real M*****, you will be asked to use LinkedIn.)
The network is invite-only and they won’t consider my application without vouches, so I appreciate your help; adding your vouch will help me connect with world-class entrepreneurs.

Thank you,
Tim

Notifications – enough already!

If are annoyed by web sites offering to send you Notifications, the last thing you need is more distractions. Notifications were a pain on iOS and now that pain is available on OSX.

To turn of the near constant offers, go to Safari Preferences and uncheck the option for web sites to ask

no-notice

New Anti-Spam Legislation vs our mailing list

Effective July 1st there is a new anti-spam law in Canada, aka CASL. We have been trying to contact some of you in order to keep you on our email list. If you received such an email, it’s important that you respond. If you do not opt-in you will no longer receive email communication from iT Guy Technologies (or Tim Mitra) including invitations to upcoming events, information on hardware and software, advisories on software updates, scams and newsletters and general information. We thank those who have “opted-in” to keeping in touch. If you have not, please click here to “opt-in.”

Our Mailing List

#CASL