The MacValley blog


Welcome to the MacValley blog, your first stop for all the latest MacValley news and views.


Tom Briant

The MacValley blog

Editor: Tom Briant


Click here to email Tom

Click here for Tom's profile



To search the blog posts please use the box below

Saturday, October 24, 2015

Senior Correspondent's Arnold Woodworth's Weekly Web Wrap-Up for October 24, 2015

Steve Jobs' reaction to this insult shows why he was such a great CEO

Forget the article.  Just scroll down to the video of Steve and WATCH THAT VIDEO.

Apple iMac with Retina 5K 27in (2015) review

See how much tech giants like Apple and Google make per employee

The Monthlification of Apple

Okay, so I just made up a word, but it’s the best word I can think of for one of the biggest new trends with Apple’s business — one that has the potential to dramatically change its relationship with its customers. The trend I’m referring to is the increasing move at Apple to establish recurring monthly revenue relationships with its customers, and move away from merely having periodic one-off payments for hardware.

Apple is tapping into a broader trend away from one-off purchases and toward monthly subscriptions.

There’s a risk that, as Apple embraces this “monthlification” of its business, it begins to occupy the same mental space for consumers as a utility.

Apple's EULA Gives the Government a License to Invade Your Privacy – or so The Government Claims

The Electronic Frontier Foundation (EFF) and Apple both disagree.

in the United States District Court for the Eastern District of New York, the government is currently arguing that the way Apple licenses its software to users means that people don’t actually own their copy of code that powers their iPhones, and thus the company can be ordered to bypass the lock screen in order to get at data on those users’ devices.

"Absent Apple's assistance, the government cannot access that evidence without risking its destruction. But Apple can," states the court brief.

Reader Comment:
Apple is not refusing to hand over the keys, they are telling the DoJ that there ARE NO KEYS.

How to use the app that can make browsing the web on your iPhone faster

by blocking advertisements with 1Blocker or Blockr or Crystal.

Macs attacked by waves of malware amid Apple enterprise push

research finds Five times more malicious software in 2015 than previous five years combined

Epic slide deck from former Yahoo board member lays out the future of tech and media

How one Austrian student took on American tech companies over privacy — and won

Earlier this month the European Union's top court struck down a major trade agreement that thousands of companies use to transfer Europeans' personal data to the United States, ruling that it violates the privacy rights of Europeans by allegedly leaving them exposed to U.S. government surveillance.

The decision was a potential disaster for U.S. tech companies, who are now open to investigation by European regulators for their privacy practices and may need to restructure how they handle their European operations.

But for Max Schrems, a 28-year-old activist and student pursuing a law doctorate from the University of Vienna, it was a victory.

Facebook will now tell you if a state government is hacking your account

the web site didn’t use basic security that could have protected its 4 million customers’ details

TalkTalk has admitted that it didn't protect customers' data with encryption, after a massive hack has led to the potential theft of 4 million UK customers' details. 
Encryption is a method of scrambling data so that it can only be understood by someone with the correct key or password, and is considered standard practice in safeguarding sensitive data.

Amazon is suing more than 1,000 people for writing fake product reviews on its website in exchange for payments of $5 per review.

Amazon also sued several websites and their domain owners in April for promising to write unlimited four- and five-star reviews on Amazon, according to court documents.

How can you sniff out fake reviews? Cornell University researchers developed the website, in which users can copy and paste a hotel review and run a test as to whether it is fake or real, based on their research of language that indicates phoniness. Frequent use of adverbs and pronouns is a red flag, for example. And Wired has published a flowchart as to whether Yelp reviews are real or fake.

Star Wars: The Force Awakens Trailer (Official)

No comments:

Post a Comment



Blog Archive