The MacValley blog


Welcome to the MacValley blog, your first stop for all the latest MacValley news and views.


Tom Briant

The MacValley blog

Editor: Tom Briant


Click here to email Tom

Click here for Tom's profile



To search the blog posts please use the box below

Sunday, December 21, 2014

Senior Correspondent Arnold Woodworth's Weekly Web Roundup

10 Secret Features Hidden In Your Mac

11 Tiny Design Features That Show Apple's Insane Attention To Detail

20 iPad Apps That Will Make Your Android Friends Jealous

A note from analysts at Morgan Stanley estimates Apple could sell up to 70 million iPhones this quarter. 
If the average selling price of the iPhone is $605, then that would be $42.3 billion in revenue.

Apple Pay may be easy to use, but security is its biggest strength.

Unlike using a credit or debit card, Apple Pay doesn't show merchants your payment information when you buy something.

Instead, it uses a digital account number called a "token" to tell the merchant you're good for the purchase.

45% of Americans said they had received a letter from a retailer or cardholder saying their payment information had been leaked.

That's staggeringly high.

Here's What People Don't Get About Apple Pay: It's Not Just Changing Payments

Apple already has a way for merchants to push these offers: Passbook. 

"The marketing is done through Passbook," said Philbin. "Apple Pay is just the payment functionality."

If Apple Were A Worker Cooperative, Each Employee Would Earn At Least $403K

Apple found not guilty in iPod antitrust lawsuit

Apple was found not guilty in an iPod antitrust case that was brought against it almost a decade ago. The decision comes after a week-long trial that accused the Cupertino company of forcefully locking in consumers into iTunes software and preventing them from using other services thanks to the now-defunct FairPlay DRM.

Here's How Much You Have To Buy To Make Amazon Prime Worth It

This person wrote:
"I disagree with some in the Cloud Industry who say calling the storage devices you carry with you and your home storage a personal Cloud is wrong. But they don't want to call it outsourced storage. It's semantics. Key is it's sitting somewhere else out of your control. There are too many people out there who want to put another conquest notch on their hacking skills by tapping into big companies. There are things you can do every day to protect your stuff from evil doers even if you use their Cloud. Be a little paranoid combined with a big dose of common sense/diligence.",_Hacks_Will_Be_Solved

Sony Pictures Entertainment said it would cancel the Christmas Day release of "The Interview," the subject of recent hack attacks and violent threats against the company and theater owners

FBI says 90% Of Cyber Security Systems Out There Would ***NOT*** Have Been Able To Block The Sony Hackers

How The Hackers Broke Into Sony And Why It Could Happen To Any Company

5 ways the Sony hack will change how America does business

Here's How Cyber-Warfare Started And Where It's Going

In 2007 a computer worm called Stuxnet was detected for the first time by virus-scanning software

At least three more versions followed, seeking to wreak havoc upon Iran's uranium-enrichment facility

Despite the opportunity, the world has yet to see a sequel to Stuxnet.

A cyberwarrior needs only a computer and an internet connection to wreak havoc.

No comments:

Post a Comment



Blog Archive