The MacValley blog


Welcome to the MacValley blog, your first stop for all the latest MacValley news and views.


Tom Briant

The MacValley blog

Editor: Tom Briant


Click here to email Tom

Click here for Tom's profile



To search the blog posts please use the box below

Saturday, October 12, 2013

It's Saturday; therefore, it's time for Senior Correspondent Arnold Woodworth!

Enterprises Will Love Apple's New 'Mavericks' Operating System, Expert Says

Like the rest of the PC industry, sales of Apple Macs have been declining, consumed by the tablet, namely the iPad.

But what these numbers don't show is that Apple has been winning in the one area it never really owned before: enterprise.




Mac sales dropped 11% from last year's third quarter to 1.9 million

PC sales have been sliding largely due to the rapid growth of mobile devices, led by tablets and smartphones.




Check Out What's Happened To The Windows PC Market Since Apple Launched The iPad




Hundreds of American companies are lying about data privacy and trade could suffer as a result

The US-EU Safe Harbor agreement is even more ineffective than previously thought.

Either the US will have to take European concerns about data protection more seriously or American firms will have to substantially change the way they do business so they can keep customer data within Europe's borders. Neither seems likely at the moment. But the EU may just force America's hand.




China has more internet monitors than soldiers

China has two million people working as online monitors.

There is now an entire industry and profession dedicated to controlling-or attempting to control-China's fast-moving social media world.

Social media monitoring, a measure whose ostensible goal is social stability, has been turned into a "money-making machine for local governments [and] firms.




FBI's Arrest Of Alleged Silk Road Founder Perfectly Timed To Reveal A 'Treasure Trove' Of Information

the FBI had Ulbricht dead to rights, but they didn't just storm after him, they watched and waited until just the right moment.

FBI agents had tailed him, waiting for the 29-year-old to open his computer and enter his passwords before swooping in. They marched him out of the library without incident.

By waiting until Ulbricht had input his password into his laptop, FBI agents were able to get full access to his archive and accounts — a treasure trove of intelligence on the criminal network that made up the Silk Road.




The Mathematician's Defense of Bitcoin: It's Just Another Option




Harvard Business School Launching Online Learning Initiative

Harvard’s initiative follows a major push into online business education by Wharton.




What's the Big Deal About Big Data?




What the NSA is doing with all our data

in many cases, information carrying no apparent investigative value is treated no differently from information that does give rise to reasonable suspicion of criminal or terrorist activity. Basically, the chaff is treated the same as the wheat.

When the NSA is collecting so much data and not sifting the wheat from the chaff, can all these mountains of data really hold the key to protecting the nation?

If you’re looking for a needle in a haystack, a bigger haystack doesn’t help.




How The NSA Deploys Malware: An In-Depth Look at the New Revelations




How the NSA identifies Tor users in 6 easy steps

Despite these efforts, the NSA has apparently had little success identiying specific Tor users at will, and has been unable to peel back the veil of anonymity that protects the network as a whole.




Don't Snoop Me Bro Tunnel

VPN services -- even ones targeted at consumers -- can be challenging to configure, putting privacy out of reach for non-technical users.

But the DSMB Tunnel is a device to establish an on-demand Virtual Private Network (VPN) tunnel with no user setup.




The whistleblowers who visited Snowden




Google just granted itself the right to use your name and photo in its online ads

Google just got a tad creepier.

Thanks to tweaks made to its terms of service today, Google will be able to use its users’ names and photos in select advertising beginning next month.

Google could use your picture to claim that you endorsed things that you really don't approve of.  Advertisers will pay Google, but not you.




Facebook gets rid of setting that lets users control who can search for them




From Now On, No One On Facebook Can Hide From You (Unless They Block You)




How to Protect Your Privacy from Facebook's Graph Search



So much data, so little security -- what happens if your city gets hacked?

To date, users have agreed to give away certain discrete pieces of information -- such as a name or email addresses -- in exchange for something -- a product or a service, for instance.

That situation is no longer viable

For instance, a mobile phone app may ask for permission to use your location data, but it isn't always apparent or disclosed how that data will be used later.

"We're talking about the legal acquisition of data," Mundie said. "We need a usage-based way of controlling it, with a cryptographic wrapper and then policies and laws that govern usage."

He called for a new class of felony for people or organizations that subvert these policies. Without such a change, "the penalty is too low" and people will continue to subvert the laws.

The wrappers would be akin to the digital rights management systems that now protect movie or music ownership, where people or companies hold keys that allow appropriate use of the information.

No comments:

Post a Comment



Blog Archive