The MacValley blog
Welcome to the MacValley blog, your first stop for all the latest MacValley news and views.
The MacValley blog
Editor: Tom Briant
Saturday, August 23, 2014
Apple on Friday announced a free replacement program for iPhone 5 batteries after discovering certain units sold during a five-month period after the product's launch in 2012 contain faulty components.
Apple updates iMovie for Mac, iWork suite for OS X and iOS with minor bug fixes
Why Everything Gets Better With Apple, Worse for Others
How Apple took over the only segment of the PC market that still matters
A new theory on why Apple device owners spend far more than Android users
Apple users place more value on their time, says Nikki Baird. They don't spend time messing around with geeky computer stuff, but Android users do.
Here's How Apple's Products Have Evolved Over The Years
The Best Typeface Apple Ever Had
The font named "Chicago", which came with the very first Macintosh.
Die in Delaware and your heirs get your online accounts
When people die, it often means the end of their online identity as well.
But this month, Delaware became the first state to pass a broad law giving heirs the right to access online accounts and digital assets of someone who has passed away.
Facebook Is Testing A 'Satire' Tag Since Users Think The Onion Articles Are True
This Is What Tech Was Like In 1994
I've come to the conclusion that the technology industry as we know it will soon cease to exist. We are currently in the early stages of a global transformation that's so enormous and pervasive it's actually hard to see.
Simply put, all the old boundaries have evaporated. All the characterizations and labels we've used for years no longer apply.
the common wisdom about management, markets and investing are being rendered obsolete in real time.
entrepreneurs, executives and investors are crossing boundaries in ways we've never seen before.
The New Editors of the Internet
Twitter and YouTube are among a tiny group of giant companies with greater and greater power-and less and less accountability-over what we read, hear, and watch online.
Who gave them this power? We did.
We need, as web inventor Tim Berners-Lee has urged, to re-decentralize the Internet, and restore its promise as a medium where the action takes place at the edges of networks-where we wouldn't need permission to communicate and innovate.
The first way we users of Internet services can re-decentralize is to create-and make use of-our own home base online. In practical terms, this means getting your own domain name and creating, at a minimum, a blog where you establish your own identity. The page you think is yours at LinkedIn, Tumblr, Instagram (Facebook), or any of the other centralized services is emphatically not truly your own; it's theirs.
You can also keep an eye on a small but growing movement among some software developers who are working quietly to give us some vital tools. I'm a big fan of what the "Indie Web" people are doing.
Crucially, you can recognize the even greater emerging threat to your freedom of expression in the dominance of telecom companies that want absolute control over the Internet by killing what's known as network neutrality.
This is a pivotal time for our communications ecosystem. As we cede control to governments and corporations-and as they take it away from us-we are risking a most fundamental liberty, the ability to freely speak and assemble. Let's not trade our freedom for convenience.
Re-Using the Same Password on Multiple Web Sites is the Most Dangerous Thing You Can Do Online
If a hacker obtains your password, the first thing he or she does is check whether or not that password works for other websites
Now that the age of digital patient information is upon us, along with it comes theft of data.
About 4.5 Million face risk of ID theft after hospital network hacked
About 4.5 million people in 28 states face the risk of identity theft due to a massive data breach at Community Health Systems (CHS) a Franklin, Tenn., based health network.
CHS, which operates over 200 hospitals, disclosed in a regulatory filing Monday that hackers, apparently based out of China, accessed systems containing the data sometime in April and June.
The hackers successfully bypassed the company's security controls and siphoned out names, Social Security Numbers, addresses, birthdates and phone numbers of people who received or were referred for services by CHS affiliated doctors over the past five years.
Why would Chinese hackers want US hospital patient data?
Medical records data can be a valuable asset, especially in a country where many have no health insurance
people without health insurance can potentially get treatment by using medical data of one of the hacking victims.
Already this year, around 150 incidents of lost or stolen personal data -- either due to hacking or ineptitude -- have been reported by medical establishments to the U.S. Department of Health and Human Services.
What to do if your Social Security number was stolen
Little-known ways hackers take over your phone, data and money