The MacValley blog


Welcome to the MacValley blog, your first stop for all the latest MacValley news and views.


Tom Briant

The MacValley blog

Editor: Tom Briant


Click here to email Tom

Click here for Tom's profile



To search the blog posts please use the box below

Sunday, May 25, 2014

It's Weekend Wrapup time from Senior Correspondent Arnold Woodworth

Steve Jobs Sent This Inspiring Email To A Startup Who Helped Design One Of The First iPad Apps

Apple's Mac Pro ship times fall below one week for first time since launch

iMessage Flaw Bugs Apple

Apple vowed Tuesday to fix a persistent bug in its iOS mobile operating system that punishes former iPhone users. The flaw, which has been in iMessage since the release of iOS 5, prevents former iPhone users from receiving SMS messages from current users.

Apple too late to stop massive iCloud breach, hackers claim

Boeing CEO wants to emulate Apple strategy

Mr. McNerney said Boeing is shying away from trying to make big technological leaps every 25 years, focusing on the less-risky approach of incremental improvements when it plans new jets.

AW comment:  Steve Jobs success was mainly due to two big tech leaps:  The iPod (music player) and the iPhone. An incremental approach would NEVER have brought those into existence.

Boeing Might Be Copying Apple's Innovation Policies But It Doesn't Understand Them

The Schools Where Apple, Google, and Facebook Get Their Recruits

The 15 Highest-Grossing iPhone And iPad Games

Fully 40% of human resources executives say they don't check social media before hiring employees and another 38% say they only sometimes do. And perhaps more importantly, of the hiring managers that did check social media, only 6% said that it had a significant impact on their hiring decision.

There is no way of telling how a prospective employer treats or reacts to social media impressions ... as with most endeavors, it is probably best to err on the side of caution and consider your social media activity as an open book that will be factored into hiring decisions.

How to Use #Hashtags on Twitter and Facebook

hashtags are a simple way to group conversations ........ to organize content into a large conversation

hashtags should be used around a very specific conversation bounded by both topic and time

users are driven by three motivations: Self-expression, human connection and content discovery

Too much sharing and 'liking' on social network could reveal emotional stress

a new study finds that oversharing on Facebook is also a sign of loneliness.

Facebook Gets Nosier Than Ever

Facebook recently made it even simpler to pry into your friends' private affairs on the social network.

Specifically, the Ask button -- which already has been available to those seeking more information about many other aspects of a given user's life -- now is an option when it comes to a user's relationship status as well.

It's definitely effective for Facebook, which gets to gather more user data.

The NSA Doesn't Need To Hack Your Phone
Facebook does it for them.

Facebook’s mobile app just grew a keen sense of hearing. Starting Wednesday, the app has the ability to recognize music and television shows playing in the vicinity of users.

The feature is designed to make it easier for users to share. When users begin to write a post, the Facebook app will offer to include information about music or shows playing in the background.

And maybe listen to your conversations with friends.

Wiretapping laws are not an issue, right?  Facebook says so.

The death of privacy over your medical records

the US Government has effectively mandated electronic medical records

The federal government is piecing together a sweeping national “biosurveillance” system that will give bureaucrats near real-time access to Americans’ private medical information in the name of national security.

How bickering and greed neutered the 'Do Not Track' (DNT) privacy initiative

Yes, if you turn it on in your browser, it sends a signal in the form of an HTTP header to Web companies' servers. But it probably won't change what data they collect.

That's because most websites either don't honor DNT

Antonin Scalia Totally Gets Net Neutrality
In 2005, the justice told us to imagine the Internet was a pizzeria. We should've taken his advice.

If there's an original sin in this [net neutrality] story-the moment that set in effect the entire fight over net neutrality-it happened in 2002.

The problem that the FCC is now facing-the reason it's talking about "commercial reasonableness"-is all a result of that 2002 regulatory decision to treat broadband Internet like an information product, rather than as electronic infrastructure.

Obama, alas, lets us down on net neutrality
Opinion: His FCC chairman is quietly letting the industry rewrite the rules

Obama appointed the current FCC commissioner, Tom Wheeler, a former lobbyist for the telecommunications industry

professional FCC watchers report that various passages from the proposal confirm a shift toward a looser definition of net neutrality that allows for paid prioritization of content

Wheeler is really an industry tool that has been put in place at the FCC to reward campaign donors and further the interests of the very industry he is charged with regulating while taking pains to craft a public perception that the administration remains true to Obama's campaign pledges to uphold net neutrality.

How to Fight the Battle for Net Neutrality

Hackers Paint Bull's-eyes on Cyber-currencies

Con men used credit-card fraud to rob banks of $200 million.
The real scandal is how easy it was

So how did they do it? Apparently it was a simple three-step process. 

The first was to create a fake identity.
They would make up a fake person and add him or her as an authorized user on their card.
And once that fictitious user existed, they just started apply for lots more credit cards in that person's name.

The second step was to pump up that user's credit score.

They set up sham companies, and then just applied to the credit card companies for card terminals.
the card companies deposited the money in these sham companies' bank accounts.

No comments:

Post a Comment



Blog Archive