The MacValley blog
Welcome to the MacValley blog, your first stop for all the latest MacValley news and views.
The MacValley blog Editor: Tom Briant
|
Labels used in posts
|
To search the blog posts please use the box below
Saturday, August 23, 2014
Senior Correspondent Arnold Woodworth's Weekly Roundup
Apple on Friday announced a free replacement program for iPhone 5 batteries after discovering certain units sold during a five-month period after the product's launch in 2012 contain faulty components.
http://appleinsider.com/articles/14/08/22/apple-activates-iphone-5-battery-replacement-program
Apple updates iMovie for Mac, iWork suite for OS X and iOS with minor bug fixes
http://appleinsider.com/articles/14/08/21/apple-updates-iwork-suite-for-os-x-and-ios-with-minor-bug-fixes-stability-improvements
Why Everything Gets Better With Apple, Worse for Others
http://www.macobserver.com/tmo/article/why-everything-gets-better-for-apple-worse-for-others
How Apple took over the only segment of the PC market that still matters
http://www.zdnet.com/how-apple-took-over-the-only-segment-of-the-pc-market-that-still-matters-7000032801/
A new theory on why Apple device owners spend far more than Android users
Apple users place more value on their time, says Nikki Baird. They don't spend time messing around with geeky computer stuff, but Android users do.
http://www.internetretailer.com/2014/08/19/new-theory-why-apple-trumps-android-mobile-commerce
Here's How Apple's Products Have Evolved Over The Years
http://www.businessinsider.com/heres-how-apples-products-have-evolved-over-the-years-2014-8
The Best Typeface Apple Ever Had
The font named "Chicago", which came with the very first Macintosh.
http://gizmodo.com/the-best-typeface-apple-ever-had-1625325454
Die in Delaware and your heirs get your online accounts
When people die, it often means the end of their online identity as well.
But this month, Delaware became the first state to pass a broad law giving heirs the right to access online accounts and digital assets of someone who has passed away.
http://money.cnn.com/2014/08/20/pf/death-online-accounts/
Facebook Is Testing A 'Satire' Tag Since Users Think The Onion Articles Are True
http://www.forbes.com/sites/amitchowdhry/2014/08/18/facebook-is-testing-a-satire-tag-since-users-think-the-onion-articles-are-true/
This Is What Tech Was Like In 1994
http://www.businessinsider.com/tech-in-1994-the-year-the-web-was-born-2014-8
I've come to the conclusion that the technology industry as we know it will soon cease to exist. We are currently in the early stages of a global transformation that's so enormous and pervasive it's actually hard to see.
Simply put, all the old boundaries have evaporated. All the characterizations and labels we've used for years no longer apply.
the common wisdom about management, markets and investing are being rendered obsolete in real time.
entrepreneurs, executives and investors are crossing boundaries in ways we've never seen before.
http://www.foxbusiness.com/technology/2014/08/21/tech-industry-is-vanishing-before-our-eyes/
The New Editors of the Internet
Twitter and YouTube are among a tiny group of giant companies with greater and greater power-and less and less accountability-over what we read, hear, and watch online.
Who gave them this power? We did.
We need, as web inventor Tim Berners-Lee has urged, to re-decentralize the Internet, and restore its promise as a medium where the action takes place at the edges of networks-where we wouldn't need permission to communicate and innovate.
The first way we users of Internet services can re-decentralize is to create-and make use of-our own home base online. In practical terms, this means getting your own domain name and creating, at a minimum, a blog where you establish your own identity. The page you think is yours at LinkedIn, Tumblr, Instagram (Facebook), or any of the other centralized services is emphatically not truly your own; it's theirs.
You can also keep an eye on a small but growing movement among some software developers who are working quietly to give us some vital tools. I'm a big fan of what the "Indie Web" people are doing.
Crucially, you can recognize the even greater emerging threat to your freedom of expression in the dominance of telecom companies that want absolute control over the Internet by killing what's known as network neutrality.
This is a pivotal time for our communications ecosystem. As we cede control to governments and corporations-and as they take it away from us-we are risking a most fundamental liberty, the ability to freely speak and assemble. Let's not trade our freedom for convenience.
http://www.theatlantic.com/technology/archive/2014/08/the-new-editors-of-the-internet/378983/
Re-Using the Same Password on Multiple Web Sites is the Most Dangerous Thing You Can Do Online
If a hacker obtains your password, the first thing he or she does is check whether or not that password works for other websites
http://www.businessinsider.com/biggest-password-mistake-2014-8
Now that the age of digital patient information is upon us, along with it comes theft of data.
http://blogs.marketwatch.com/health-exchange/2014/08/21/theft-of-patient-data-shows-up-as-health-digital-movement-spreads/
About 4.5 Million face risk of ID theft after hospital network hacked
About 4.5 million people in 28 states face the risk of identity theft due to a massive data breach at Community Health Systems (CHS) a Franklin, Tenn., based health network.
CHS, which operates over 200 hospitals, disclosed in a regulatory filing Monday that hackers, apparently based out of China, accessed systems containing the data sometime in April and June.
The hackers successfully bypassed the company's security controls and siphoned out names, Social Security Numbers, addresses, birthdates and phone numbers of people who received or were referred for services by CHS affiliated doctors over the past five years.
http://www.computerworld.com/s/article/9250464/About_4.5M_face_risk_of_ID_theft_after_hospital_network_hacked
Why would Chinese hackers want US hospital patient data?
Medical records data can be a valuable asset, especially in a country where many have no health insurance
people without health insurance can potentially get treatment by using medical data of one of the hacking victims.
Already this year, around 150 incidents of lost or stolen personal data -- either due to hacking or ineptitude -- have been reported by medical establishments to the U.S. Department of Health and Human Services.
http://www.computerworld.com/s/article/9250477/Why_would_Chinese_hackers_want_US_hospital_patient_data_
What to do if your Social Security number was stolen
http://www.marketwatch.com/story/what-to-do-if-your-social-security-number-was-stolen-2014-08-20
Little-known ways hackers take over your phone, data and money
http://www.marketwatch.com/story/little-known-ways-hackers-take-over-your-phone-data-and-money-2014-08-22
Blog Archive
-
▼
2014
(176)
-
▼
August
(20)
- An essential OS X Mavericks problem-solving guide ...
- Senior Correspondent Arnold Woodworth's Weekly Update
- Newegg rolls out same-day delivery in Los Angeles ...
- Rumored 12.9-inch iPad could be better for busines...
- The LA Unified School District, iPads, and other news
- How I got Synergy to work with Ubuntu Linux withou...
- Senior Correspondent Arnold Woodworth's Weekly Rou...
- Dukto-cross platform file transfer between Windows...
- How I got the latest version of Synergy to work re...
- Quicken brings out 2015 version for Mac; gets hit ...
- 10 Things You Didn't Know Your Mac Could Do - Esquire
- Revised music royalty rules could hurt Apple's Bea...
- Senior Correspondent Arnold Woodworth's Weekly Rou...
- Four Finder timesavers every smart Mac user should...
- Senior Correspondent Arnold Woodworth's Weekend Ro...
- The iPad doesn't come with a keyboard and other ob...
- Amazon.com: Batman The Complete TV Series Limited ...
- How to Speed Up, Clean Up, and Revive Your Mac
- 5 Smart Playlists That Make iTunes Worth Using
- Senior Correspondent Arnold Woodworth's Weekly Rou...
-
▼
August
(20)
No comments:
Post a Comment