The MacValley blog
Welcome to the MacValley blog, your first stop for all the latest MacValley news and views.
The MacValley blog
Editor: Tom Briant
Saturday, November 15, 2014
The iPhone 6 Is Selling Like Crazy
How Apple Pay helped me catch a fraudulent credit-card charge
Apple Just Fixed A Bug On iPhone That Put Undercover Cops At Risk
Previously, anyone who switched from iPhone to Android faced a huge problem: unless you executed this complicated system of steps exactly right, your phone number stayed inside Apple's iMessage system and no one using an iPhone was able to reach you by text. The texts stayed trapped inside iMessage, undelivered.
Apple is now the defendant in two class action lawsuits on behalf of Android customers whose messages were lost by Apple.
Apple thinks iOS 'Masque Attack' isn't such a big deal
The iPad Air 2 is, without hyperbole, the best tablet on the market.
I thought the iPhone 6+ was too big; I was wrong
Apple is revitalizing its iPad division to target companies, but it may not have what they're looking for
What companies want — and aren't getting from Apple — is customized software for their devices.
Apple has promised to develop "100 industry-specific enterprise solutions" as part of its IBM partnership.
Apple's A8X iPad chip causing big problems for Intel, Qualcomm, Samsung and Nvidia
Apple will increasingly hold onto the high end in tablets with few legitimate competitors, while its tablet rivals all fight for scraps at the low end. Vendors who do want to enter the high end tablet space will face chip options limited to Intel's expensive x86 chips or very low end ARM chips aimed at powering phones rather than more sophisticated tablets.
The profits Apple is earning from iPad sales are being aggressively reinvested back into the rapid development of Apple's own A-series chips, which no other vendor has access to.
What Steve Wozniak Got Wrong About The iPhone 6
"Apple could have had a much bigger share of the smartphone market if it had a larger-screen iPhone for the past three years," said Wozniak.
But the Apple cofounder is missing an important point.
Apple is almost never first-to-market in any product category. Their strategy is to come up with dramatic, generational improvements to products that others have done not as well.
Jony Ive: Apple isn't here to make money. And students shouldn't use computers so much
Firefox Develops a Case of Selective Amnesia -- You Select
"Forget gives you an easy way to tell Firefox to clear out some of your recent activity," explained Firefox Vice President Johnathan Nightingale. "Instead of asking a lot of complex technical questions, Forget asks you only one: How much do you want to forget? Once you tell Firefox you want to forget the last five minutes, or two hours, or 24 hours, it takes care of the rest."
6 Reasons Why You Should Quit Facebook
Microsoft Windows Is Now More Than 30 Years Old — Here's How Drastically It's Changed Over The Years
Why you'll finally be using bitcoin soon
digital currency saves time and money when shopping and transferring money.
"The 'blockchain' - the engine on which Bitcoin is built - is a new kind of distributed consensus system that allows transactions, or other data, to be securely stored and verified without any centralized authority at all, because (to grossly oversimplify) they are validated by the entire network. Those transactions don't have to be financial; that data doesn't have to be money. The engine that powers bitcoin can be used for a whole array of other applications."
Elon Musk calls AI "our biggest existential threat." He's WRONG.
Phishers' Attacks Pay Off Nicely
The most successful phishing attacks manage to dupe their victims a full 45 percent of the time, according to a study released last week by Google.
On average, phishing's success rate is about 14 percent, but even the most obvious scams still manage to lure 3 percent of the people targeted to a fake website and convince them to turn over personal information, the report found.
About 20 percent of the hijacked accounts identified in Google's study were accessed within 30 minutes of the hacker's acquisition of its login information. Once inside, hijackers spent more than 20 minutes there, often changing the password to lock out the true owner, searching for other account details, such as bank information and social media accounts, and scamming new victims.