It is interesting to note that these types of cases keep coming up where a "non-practicing" entity that have purchased some patents for the sole purpose of extorting money but do not actually use them for the purposes intended.
My opinion is that if a company or someone buys patents then they can only be used as a basis for litigation if these patents are actually being used by the owner or the owner has clear plans on how they will be used within a reasonable period of time.
In the absence of laws that restrict the ability of trolls to extort money, perhaps another approach is to keep these trolls in court until they have no further resources left to fight the case. This course of action should only be available when the entity is non-practicing in relation to the patents.
Within five minutes of a smart device going online, hackers will try to gain access by using well-known factory setting passwords and usernames. Even devices that have been updated, where a buyer sets up new credentials immediately, may be hacked because of security vulnerabilities built into the security camera, virtual assistant, thermostat or other product.
Read the full article at gearbrain.com
The Commonwealth Bank of Australia’s backflip on its longstanding Apple Pay boycott has paid off in spades, with more than half a million people flocking to the new payment service just two weeks after it was made publicly available to customers." And "The bottom line is CBA is prepared to sacrifice its transaction fee pipeline for customer satisfaction and loyalty."
Originally, CBA was one of the banks in a consortium that tried to get Apple to let them have access to the fundamental security (NFC). The ACCC ruled that their case was unjustified and it was basically a ploy which would have allowed banks to process transactions from within their own apps and thereby undermining the security. It would also have given banks access to data that they could have used for marketing or to sell on to others.
Read the article at itnews
In an article on AppleInsider, they have listed and provided some useful commands but in reality there are many many more.
To read the article, go to AppleInsider.
Apple offers what are known as certificates that let businesses have deep controls over iPhones, with the potential to remotely install apps, monitor app usage and access, and delete data owned by a business on an iPhone. Apple designed the program for organizations whose staff use iPhones for official duties, when privacy needs are different from phones for personal use.
Source: Reuters. (Click the link to read the full story)
“Houzz recently learned that a file containing some of our user data was obtained by an unauthorised third party. The security of user data is our priority. We immediately launched an investigation and engaged with a leading forensics firm to assist in our investigation, containment, and remediation efforts. We have also notified law enforcement authorities.
Out of an abundance of caution, we have notified all Houzz users who may have been affected.”
If you have a Houzz account, it would be worth reading the following information on their site: Houzz Security Update - FAQ
On the Mac you can use Dictation Commands to trigger a keyboard shortcut, menu item, or to even insert some text.
You can do this while typing, or while dictating. You can set the spoken phrase to precede a dictation command to make sure the command only executes when you want it to.
From one of my favourite sites that gives many useful hints, the author of the site has posted a video explains the process for using dictation.
Previously I had used Dragon Dictate which is (was) quite sophisticated but this has been now discontinued on the Mac (as far as I am aware), probably as many of its features are just native to the MacOS anyway.
See MacMost - Dictation Commands for a video tutorial.