
Two Kiwi students shine in Apple's global coding competition
Two 16-year-olds from New Zealand have been named among Apple's Swift coding competition winners for 2025.
Alex Liang from Westlake Boys High School and Ben Lawrence from Kaiapoi High School were named among the 350 winning submissions from the tech giant's global competition associated with the Worldwide Developers Conference.
Applicants span the globe, representing 38 countries and regions, and incorporating a wide range of tools and technologies.
Liang's entry called Make A Wish follows his success last year as the only winner from New Zealand, this time using maths to predict a meteor path, track it in the sky and capture pictures of meteor showers from a phone, rather than a meteor camera.
He said he vividly remembered standing outside in May 2021, holding his mother's phone up for three hours and being "very happy and proud of myself" when he finally captured a meteor on camera — but it was time consuming.
ADVERTISEMENT
"My app is focused on meteors because many people actually try to see meteors and then try to take a picture of it. Right now, the cheapest way to capture a meteor without having to endure it is to use a meteor camera."
Alex Liang demonstrates his app to a fellow student. (Source: Supplied)
For Liang, it's the second year in a row that he has been named as a winner and he said there had been a "very clear rise" in the number and calibre of applicants this year, and in the use of Artificial Intelligence.
"And so this year, unlike last year, I mentioned little planets, which was no AI at all. But this year I did actually implement AI/machine learning in the form of object detection."
Liang said he was "not surprised at all" that Apple had decided to allow the use of AI in the competition this year but all usage had to be disclosed.
"In fact, I was expecting it. Without AI, many of the things from the app I made would not be possible.
"I use it to bump up my efficiency sometimes because I do actually use AI to debug and stuff and then sometimes to create new features or learn new frameworks. But using it does not mean you have to rely entirely on it.
ADVERTISEMENT
"You have to understand your code top to bottom, every single line, not just saying 'hey GPT do something for me, just write me an app that's doing this'. And AI is not able to create things like that just by saying one word."
Liang said planning was already underway for next year's entry, and Make A Wish was being reviewed by Apple to be added to the App Store.
"Words cannot describe the experience. I felt like I stepped up to the whole next level of not just astronomy, but innovation. It is something I'm very profound about, something I'm very happy about."
Helping money make 'Good Cents'
Ben Lawrence pictured using his app, Good Cents. (Source: Supplied)
16-year-old Ben Lawrence from Kaiapoi High School, Christchurch, told 1News he "didn't expect anything" after entering his submission, Good Cents.
The app simulates real-world financial scenarios in which users get a job, spend and save money and navigate complex financial curveballs.
ADVERTISEMENT
'You do a quiz on some financial questions like 'What is a good way to spend money?' 'How do you save?' 'What's a budget used for?'.
'And based on that, you'll be awarded points, you'll get promotions and the player can also complete lessons that will teach you certain elements and aspects and then I'll quiz you on it to make sure you've actually read through it."
Throughout the game, Lawrence gave examples of "random events" players could encounter designed to test whether they will spend money or not.
"Oh, the new iPhone came out. You know you already have one, but you want the new one. Do you want to do it, or should you save your money? That kind of thing."
Ben Lawrence's app, 'Good Cents'. (Source: Supplied)
"Or if your savings are low but you have tonnes of money in your spending [the app] might say, 'hey do you want to put some money into your savings, get some interest on it?'."
Lawrence said learning money skills in class could be "pretty boring" and hoped his app could be a way to make learning finances more fun.
ADVERTISEMENT
"Just making learning more fun and then also helping people with skills better pretty darn important and going into adulthood."
The app took him three months to develop, and he hoped to launch it on the App Store soon.
'But I'm working on kind of upgrading it, almost making it so it's more of a platform so schools can sign up to it, license it, whatever and you can have classrooms and teachers can assign work to students and certain aspects of it.
'Phones are banned in schools so that's a huge problem, but I'm working on making it so that they can do it through a website now as well.'
An idea that could go 'global'
Denis Vida, Professor of Physics and Astronomy at Western University in Ontario Canada, runs a project called the Global Meteor Network (GMN), which has over 1400 meteor cameras globally across 42 countries.
Liang said he was collaborating the organisation with the goal of sharing his app with the global astronomy community.
ADVERTISEMENT
Adjunct Research Professor at the University of Western Ontario. (Source: Supplied)
"Essentially everyone can follow a simple set of instructions and buy very reasonably low-cost hardware and install a meteor camera, then install our open-source software and contribute to the project," Vida said.
He said "you don't really need to know much about space or science" to do so.
"We have a lot of participants in New Zealand who are farmers with no previous context or interest in astronomy, but when they heard about potential meteor fall in their area they got in touch to get a camera installed."
He said Liang reached out to him as one of New Zealand's "strong, well-organised" group of space enthusiasts, and was excited to collaborate with him on a project to solve a common problem.
Vida said the main issue they faced was that people may be told when a meteor event could happen in their area, but won't know where exactly to look or which way to point their phone in the sky.
"Most of the time when people do it, they hold their phone up, they wait for the right time, and it turns out they were looking the completely wrong direction. Or they'll swing the phone and then the only thing they have in the frame is just the fireball with no other reference points.
ADVERTISEMENT
"The problem is if we want to make measurements in that, we can't use it. There needs to be stars, it needs to be static or have some kind of reference points."
He said developing an app to solve this problem sounded like the perfect project for programming pro Liang.
"So the idea was let's build an app or some service that people can install where every time something like that happens within a certain radius of you, you'll get a notification and a set of instructions of how to start calibration and the sorts of images to take."
Vida said now that Liang had created the app, the next step was getting it installed on a lot of phones, to get other meteor agencies on board.
"Once we know that, you know things are going to happen and then people are going to install it, they're going to take pictures with the app and then once we show results that's where the app is going to get more established or where people are going to get more recognised."
He said with some more rigorous testing and development of some features, Liang's app would have the potential to have an "oversized impact" globally.
"Impacts of little asteroids happen all over the world in a random way. So something's on the App Store and anyone can download it, that's literally [going to] go global."
ADVERTISEMENT
"These challenges are a great way to find talent. You have pretty small investment and you set some sort of a goal, and you find talented people who are inspired by it," he said.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Techday NZ
2 days ago
- Techday NZ
World's largest data breach exposes 16 billion credentials
The scale of the latest data breach, involving a staggering 16 billion new credentials and passwords, is forcing both experts and organisations to reckon with the ongoing weaknesses in global digital security. Described as the world's largest data breach, the incident has reportedly swept up data from a vast array of online platforms, including not only commercial giants like Apple and Google but also government services and numerous SaaS (Software as a Service) applications. Brian Soby, co-founder and CTO at AppOmni, whose company specialises in securing digital records, believes the breach was inevitable given the industry's reliance on outmoded security frameworks. Soby warns that the gravity of the situation goes beyond the raw numbers: "This isn't just a collection of old, previously leaked passwords; it appears to be a new, massive, and highly organised library of credentials." According to Soby, cybercriminals now hold a "roadmap for widespread account takeovers" that threatens the backbone of modern digital life — cloud services and SaaS applications — potentially outpacing many current security defences. Soby highlights a critical vulnerability at the heart of today's enterprises. While many organisations invest in identity management and access security projects, basic misconfigurations and failure to disable outdated forms of credential use leave them exposed. "Large credential dumps such as these are likely to highlight just how many organisations indeed remain vulnerable to credential attacks due to these insufficient protections," he adds. Spencer Young, Senior Vice President EMEA at cybersecurity firm Delinea, echoes the concern, underlining that static credentials, especially passwords which are seldom changed, represent an Achilles' heel. "Passwords alone – especially unrotated ones – leave consumers and organisations vulnerable to phishing, credential stuffing, and Pass-the-Hash attacks," he notes. Young stresses that the traditional advice of strong password hygiene is no longer sufficient. Instead, initiatives like automated password rotation and credential vaulting, which reduce the window of opportunity for attackers, should be the new standard. In terms of longer-term solutions, Young observes that passwordless authentication approaches are gaining traction. "Technologies such as biometrics, where biometric data remains encrypted and safely stored in the device and does not travel across the network, improves the authentication process," he explains. However, he warns that passwords themselves are far from obsolete; they are increasingly being relegated to the background as part of a layered, multifactor authorisation system that may include one-time passwords or magic links to enhance security. With cybercriminals orchestrating campaigns using vast troves of login data, the scale of weaponisation is unprecedented. Tim Eades, CEO and co-founder at Anetac, illustrates the dilemma facing organisations across the world, as these troves become "a commodity that are bought, sold, and weaponised in countless attacks." Eades notes that the unrelenting circulation of stolen records magnifies the risk over time, especially as new AI agents — sometimes deployed without adequate safeguards — can introduce further vulnerabilities and thousands of new access points for attackers. "The part that keeps CISOs up at night? These records circulate for years, the risk doesn't go away, it only grows over time." Raising further alarm, Eades points out that until affected organisations are identified, compromised individuals may have no warning or recourse. This opacity not only endangers users but also perpetuates a cycle in which threat actors vie to surpass one another, pushing the boundaries of data breaches ever further. He urges organisations to reinforce security measures: "Leaders should protect all credentials like they are the keys to the castle." Encouraging the use of unique passwords, two-factor authentication, and embedding a culture of security awareness are presented as essential starting points. Another concern arising from the breach is the "snowball effect" it might have on cyber-attacks, especially through the proliferation of sleeper accounts. Xavier Sheikrojan, Senior Risk Intelligence Manager at Signifyd, warns that fraudsters may use stolen credentials not just for immediate exploitation but to create dormant accounts for later and larger-scale attacks. He advocates for proactive action, urging businesses to monitor user behaviour, force password resets, and continually refine machine learning systems aimed at picking up fraudulent activity. As experts across the sector agree, the exposure of billions of records simultaneously marks a pivotal moment in the digital security landscape. While technology continues to advance, so too does the capacity and sophistication of cybercrime, prompting renewed calls for organisations and individuals alike to treat identity and access security with unwavering seriousness and vigilance.


Otago Daily Times
3 days ago
- Otago Daily Times
‘Nanogirl' informs South on AI's use
Even though "Nanogirl", Dr Michelle Dickinson, has worked with world leading tech giants, she prefers to inspire the next generation. About 60 Great South guests were glued to their Kelvin Hotel seats on Thursday evening as the United Kingdom-born New Zealand nanotechnologist shared her knowledge and AI's future impact. Business needed to stay informed about technology so it could future-proof, she said. The days were gone where the traditional five year business plan would be enough to futureproof due to the breakneck speed technology has been advancing. Owners also needed to understand the importance of maintaining a customer-centric business or risk becoming quickly irrelevant. "I care about that we have empty stores." The number of legacy institutions closing was evidence of its model not moving with the customer. "Not being customer-centric is the biggest threat to business." Schools were another sector which needed to adapt to the changing world as it predominantly catered to produce an "average" student. "Nobody wants their kids to be average." Were AI technology to be implemented it could be used to develop personalised learning models while removing the stress-inducing and labour-intensive tasks from teachers' workload. "Now you can be the best teacher you can be and stay in the field you love. "I don't want our teachers to be burnt out, I want them to be excited to be teaching." In 30 seconds, new technology could now produce individualised 12-week teaching plans aligned to the curriculum, in both Ma¯ori and English she said. Agriculture was another sector to benefit from the developing technology. Better crop yields and cost savings could now be achieved through localised soil and crop tracking information which pinpointed what fertiliser needs or moisture levels were required in specific sections of a paddock. While AI was a problem-solving tool which provided outcomes on the information available to it, to work well, it still needed the creative ideas to come from humans, she said. "People are the fundamentals of the future . . . and human side of why we do things should be at the forefront. "We, as humans, make some pretty cool decisions that aren't always based on logic." Personal and commercial security had also become imperative now there was the ability to produce realistic "deep-fake" productions with videos and audio was about to hit us. She urged families and organisations to have "safe words" that would not be present in deep fake recordings and allow family members or staff to identify fake from genuine cries for help. "This is the stuff we need to be talking about with our kids right now." Great South chief executive Chami Abeysinghe said Dr Dickinson's presentation raised some "thought-provoking" questions for Southland's business leaders. She believed there needed to be discussions about how Southland could position itself to be at the forefront of tech-driven innovation. "I think some of the points that she really raised was a good indication that we probably need to get a bit quicker at adopting and adapting. "By the time we get around to thinking about it, it has already changed again." AI was able to process information and data in a fraction of the time humans did, but the technology did not come without risks and it was critical businesses protected their operations. "If we are going to use it, we need to be able to know that it's secure." Information on ChatGPT entered the public realm that everyone could have access to and business policies had not kept up. "You absolutely have to have a [AI security] policy."


Techday NZ
3 days ago
- Techday NZ
Nearly half of developers say over 50% of code is AI-generated
Cloudsmith's latest report shows that nearly half of all developers using AI in their workflows now have codebases that are at least 50% AI-generated. The 2025 Artifact Management Report from Cloudsmith surveyed 307 software professionals in the US and UK, all working with AI as part of their development, DevOps, or CI/CD processes. Among these respondents, 42% reported that at least half of their current codebase is now produced by AI tools. Despite the large-scale adoption of AI-driven coding, oversight remains inconsistent. Only 67% of developers who use AI review the generated code before every deployment. This means nearly one-third of those working with AI-assisted code are deploying software without always performing a human review, even as new security risks linked to AI-generated code are emerging. Security concerns The report points to a gap between the rapid pace of AI integration in software workflows and the implementation of safety checks and controls. Attacks such as 'slopsquatting'—where malicious actors exploit hallucinated or non-existent dependencies suggested by AI code assistants—highlight the risks when AI-generated code is left unchecked. Cloudsmith's data shows that while 59% of developers say they apply extra scrutiny to AI-generated packages, far fewer have more systematic approaches in place for risk mitigation. Only 34% use tools that enforce policies specific to AI-generated artifacts, and 17% acknowledge they have no controls in place at all for managing AI-written code or dependencies. "Software development teams are shipping faster, with more AI-generated code and AI agent-led updates," said Glenn Weinstein, CEO at Cloudsmith. "AI tools have had a huge impact on developer productivity, which is great. That said, with potentially less human scrutiny on generated code, it's more important that leaders ensure the right automated controls are in place for the software supply chain." Developer perceptions The research reveals a range of attitudes towards AI-generated code among developers. While 59% are cautious and take extra steps to verify the integrity of code created by AI, 20% said they trust AI-generated code "completely." This suggests a marked difference in risk appetite and perception within developer teams, even as the majority acknowledge the need for vigilance. Across the sample, 86% of developers reported an increase in the use of AI-influenced packages or software dependencies in the past year, and 40% described this increase as "significant." Nonetheless, only 29% of those surveyed felt "very confident" in their ability to detect potential vulnerabilities in open-source libraries, from which AI tools frequently pull suggestions. "Controlling the software supply chain is the first step towards securing it," added Weinstein. "Automated checks and use of curated artifact repositories can help developers spot issues early in the development lifecycle." Tooling and controls The report highlights that adoption of automated tools specifically designed for AI-generated code remains limited, despite the stated importance of security among software development teams. While AI technologies accelerate the pace of software delivery and updating, adoption of stricter controls and policy enforcement is not keeping up with the new risks posed by machine-generated code. The findings indicate a potential lag in upgrading security processes or artifact management solutions to match the growing use of AI in coding. Developers from a range of industries—including technology, finance, healthcare, and manufacturing—participated in the survey, with roles spanning development, DevOps management, engineering, and security leadership in enterprises with more than 500 employees. The full Cloudsmith 2025 Artifact Management Report also explores other key issues, including how teams decide which open-source packages to trust, the expanding presence of AI in build pipelines, and the persistent challenges in prioritising tooling upgrades for security benefits.