The MacValley blog
Welcome to the MacValley blog, your first stop for all the latest MacValley news and views.
The MacValley blog Editor: Tom Briant
|
Labels used in posts
|
To search the blog posts please use the box below
Saturday, October 12, 2013
It's Saturday; therefore, it's time for Senior Correspondent Arnold Woodworth!
Enterprises Will Love Apple's New 'Mavericks' Operating System, Expert Says
Like the rest of the PC industry, sales of Apple Macs have been declining, consumed by the tablet, namely the iPad.
But what these numbers don't show is that Apple has been winning in the one area it never really owned before: enterprise.
http://www.businessinsider.com/enterprises-will-love-mac-mavericks-2013-10
Mac sales dropped 11% from last year's third quarter to 1.9 million
PC sales have been sliding largely due to the rapid growth of mobile devices, led by tablets and smartphones.
http://www.marketwatch.com/story/apples-mac-sales-slide-as-pcs-fall-again-2013-10-09
Check Out What's Happened To The Windows PC Market Since Apple Launched The iPad
http://www.businessinsider.com/windows-pc-market-since-apple-launched-the-ipad-2013-10
Hundreds of American companies are lying about data privacy and trade could suffer as a result
The US-EU Safe Harbor agreement is even more ineffective than previously thought.
Either the US will have to take European concerns about data protection more seriously or American firms will have to substantially change the way they do business so they can keep customer data within Europe's borders. Neither seems likely at the moment. But the EU may just force America's hand.
China has more internet monitors than soldiers
China has two million people working as online monitors.
There is now an entire industry and profession dedicated to controlling-or attempting to control-China's fast-moving social media world.
Social media monitoring, a measure whose ostensible goal is social stability, has been turned into a "money-making machine for local governments [and] firms.
http://qz.com/132590/china-has-more-internet-monitors-than-active-army-personnel/#
FBI's Arrest Of Alleged Silk Road Founder Perfectly Timed To Reveal A 'Treasure Trove' Of Information
the FBI had Ulbricht dead to rights, but they didn't just storm after him, they watched and waited until just the right moment.
FBI agents had tailed him, waiting for the 29-year-old to open his computer and enter his passwords before swooping in. They marched him out of the library without incident.
By waiting until Ulbricht had input his password into his laptop, FBI agents were able to get full access to his archive and accounts — a treasure trove of intelligence on the criminal network that made up the Silk Road.
http://www.businessinsider.com/ross-ulbricht-silk-road-tor-2013-10
The Mathematician's Defense of Bitcoin: It's Just Another Option
http://www.pbs.org/newshour/businessdesk/2013/10/the-mathematicians-defense-of.html
Harvard Business School Launching Online Learning Initiative
Harvard’s initiative follows a major push into online business education by Wharton.
What's the Big Deal About Big Data?
http://news.discovery.com/human/life/whats-the-big-deal-about-big-data-131010.htm
What the NSA is doing with all our data
in many cases, information carrying no apparent investigative value is treated no differently from information that does give rise to reasonable suspicion of criminal or terrorist activity. Basically, the chaff is treated the same as the wheat.
When the NSA is collecting so much data and not sifting the wheat from the chaff, can all these mountains of data really hold the key to protecting the nation?
If you’re looking for a needle in a haystack, a bigger haystack doesn’t help.
http://www.dailykos.com/story/2013/10/09/1245717/-What-the-NSA-is-doing-with-all-our-data#
How The NSA Deploys Malware: An In-Depth Look at the New Revelations
https://www.eff.org/deeplinks/2013/10/how-nsa-deploys-malware-new-revelations
How the NSA identifies Tor users in 6 easy steps
Despite these efforts, the NSA has apparently had little success identiying specific Tor users at will, and has been unable to peel back the veil of anonymity that protects the network as a whole.
http://www.dailydot.com/politics/six-steps-nsa-attack-tor/
Don't Snoop Me Bro Tunnel
VPN services -- even ones targeted at consumers -- can be challenging to configure, putting privacy out of reach for non-technical users.
But the DSMB Tunnel is a device to establish an on-demand Virtual Private Network (VPN) tunnel with no user setup.
http://www.indiegogo.com/projects/don-t-snoop-me-bro-tunnel
The whistleblowers who visited Snowden
Google just granted itself the right to use your name and photo in its online ads
Google just got a tad creepier.
Thanks to tweaks made to its terms of service today, Google will be able to use its users’ names and photos in select advertising beginning next month.
Google could use your picture to claim that you endorsed things that you really don't approve of. Advertisers will pay Google, but not you.
Facebook gets rid of setting that lets users control who can search for them
From Now On, No One On Facebook Can Hide From You (Unless They Block You)
How to Protect Your Privacy from Facebook's Graph Search
https://www.eff.org/deeplinks/2013/01/how-protect-your-privacy-facebooks-graph-search
So much data, so little security -- what happens if your city gets hacked?
To date, users have agreed to give away certain discrete pieces of information -- such as a name or email addresses -- in exchange for something -- a product or a service, for instance.
That situation is no longer viable
For instance, a mobile phone app may ask for permission to use your location data, but it isn't always apparent or disclosed how that data will be used later.
"We're talking about the legal acquisition of data," Mundie said. "We need a usage-based way of controlling it, with a cryptographic wrapper and then policies and laws that govern usage."
He called for a new class of felony for people or organizations that subvert these policies. Without such a change, "the penalty is too low" and people will continue to subvert the laws.
The wrappers would be akin to the digital rights management systems that now protect movie or music ownership, where people or companies hold keys that allow appropriate use of the information.
Blog Archive
-
▼
2013
(139)
-
▼
October
(10)
- Make a Clone, not just a Time Machine Backup, befo...
- Senior Corespondent Arnold Woodworth has a review ...
- It's Saturday, and Senior Correspondent Arnold Woo...
- Avatron Air Display 2 on sale today! Go get it
- Quattro Pro Spreadsheet formats and the Mac-An Int...
- Senior Correspondent Arnold Woodworth has a potpou...
- The head of Burberry joins Apple's top management
- A Morning Rant and tips from Joe Kissell
- It's Saturday; therefore, it's time for Senior Cor...
- Sunday Morning and it's time for Senior Correspond...
-
▼
October
(10)
No comments:
Post a Comment