The document discusses the September iPhone update which added new features but also rendered some hacked iPhones unusable. This prompted backlash from some users who felt Apple was being too restrictive in its control over the iPhone. Others defended Apple's actions, arguing they have the right to dictate how their devices operate. The document presents perspectives from both sides of the debate over iPhone restrictions and hacking.
Mobile Recruiting from OnRec Gravity RecruitingDave Martin
I presented this slide deck on Mobile Recruiting at the OnRec Gravity Recruiting Conference in London on 8th June 2011.
If your interested in Mobile Recruiting check out MoRecNews.com which provides mobile recruiting news.
You may also enjoy my blog mrDaveMartin.com , its a mix of techy, web, social, business thoughts and rants.
Today and Tomorrow: Mobile's Impact on Development and TestingTechWell
There are more than 1.4 billion smartphones in the world—one for every 4.5 people on earth. Over the next decade wearables and the Internet of Things (IoT) will make those numbers look puny. In fact, mobile is transforming how people and things connect and dramatically changing software development, as we know it. With more than 189 million apps downloaded daily from app stores and new IoT devices being released daily to the public, developers and testers are already behind the curve. James Montemagno takes a look at the problems and challenges we face today and what we can look forward to in the future. Explore how the ever-growing number of devices and connections will force companies to produce efficient mobile-first products to move ahead in the market. Take back ideas and action items to start tackling the immense fragmentation of devices in the marketplace and identify the steps necessary to transform your development/test teams, environment, and processes to survive and prosper in this brave new world.
Mobile Recruiting from OnRec Gravity RecruitingDave Martin
I presented this slide deck on Mobile Recruiting at the OnRec Gravity Recruiting Conference in London on 8th June 2011.
If your interested in Mobile Recruiting check out MoRecNews.com which provides mobile recruiting news.
You may also enjoy my blog mrDaveMartin.com , its a mix of techy, web, social, business thoughts and rants.
Today and Tomorrow: Mobile's Impact on Development and TestingTechWell
There are more than 1.4 billion smartphones in the world—one for every 4.5 people on earth. Over the next decade wearables and the Internet of Things (IoT) will make those numbers look puny. In fact, mobile is transforming how people and things connect and dramatically changing software development, as we know it. With more than 189 million apps downloaded daily from app stores and new IoT devices being released daily to the public, developers and testers are already behind the curve. James Montemagno takes a look at the problems and challenges we face today and what we can look forward to in the future. Explore how the ever-growing number of devices and connections will force companies to produce efficient mobile-first products to move ahead in the market. Take back ideas and action items to start tackling the immense fragmentation of devices in the marketplace and identify the steps necessary to transform your development/test teams, environment, and processes to survive and prosper in this brave new world.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
2. “ I bought an iPhone basically. It cost me $410 plus $80 for express guaranteed. I want to emphasize on the guarantee bit.” “ This September update adds some amazing new things to iPhone. Some of these new features may help you type a little faster, ring a litter better, and one in particular will allow you to discover and purchase music like never before!” “ Activating difficulties” “ Your iPhone is a brick” Google Video “ I agree with both assertions. Users should expect consequences if they tweak electronic devices against the warnings of the manufacturer. On the other hand, depriving a user of potentially critical security patches just to make a point puts not only the offending user at risk.” “ Instead, I’ve simply been the ecstatic owner of one of the finest pieces of innovative technology to come along in a very long time.” “ Apple Inc., not so good company with good products. Since Apple dropped the “Computer” they have gone downhill, in my opinion. “ Google Blog Search “ Owners of hacked iPhones have begun posting instructions on how to roll back a recent Apple firmware upgrade that rendered their mobile phones unusable.” “ This is the first time we know of, though, that an update might actually kill the hardware, proof that Apple is serious about keeping the handset with its partner carrier AT&T (or that AT&T has been putting the pressure on Apple).” “ I knew better than to take another risk since I am very happy with my iPhone in its current state running on the T-Mobile USA network and made the decision to never update it unless there was a reliable hack I could trust not to brick it. “ “ For the second time in less than a month, Apple is angering the iPhone community.” “ Even Bill at Red Ferret thinks its crap and can’t believe that Apple is getting by with this when MS would be asshole deep in lawsuits if they tried anything like this.” Google News Neutral Quotes Positive Quotes Negative Quotes
3. “ Say what you will about the iPhone hackers, but they are nothing if not a determined bunch. Erica Sadun over at The Unofficial Apple Weblog reports that the hackers are making headway in opening up Apple's recent iPhone update which knocked out the initial round of hacks. “ “ The Apple iPhone is a great multifunction device which has some excellent features, including Phone, IPod, Internet (using wifi or edge) and I would say it is well worth the price tag.” “ It is not surprising, then, that the inevitable backlash has begun. And, that backlash is no longer just contained to bloggers and fringe journalists -- it has now entered the mainstream. “ BlogPulse “ Apple posted three new iPhone television ads on their site this evening. Unlike , where the star of the show was the phone itself (and the user interface), these new ads focus on three actors - all men - who are using the phone to solve problems.” “ Big things are in Apple’s future; to all the naysayers and hate-mongers, perhaps now is the time to stop whining and griping about Apple and get on the bandwagon.” “ It was bound to happen, but now it’s official; Information Week is reporting that a California man has files a class-action suit against Apple for bricking iPhones with their latest firmware update.” Technorati “ Since the iPhone's launch, enthusiasts have been developing ways to allow the devices to run unauthorized software and to unlock them so that they can be run on any mobile network. Late last week, however, Apple cracked down on these efforts by releasing a software upgrade that made hacked iPhones unusable.” “ But after analyzing the update that actually came out, I don't blame Apple anymore. Instead, I blame AT&T for forcing Apple to do something it has never done before and effectively become the bad guy while AT&T laughs its way to the bank.” “ With stories of iPhones (even those who weren't unlocked) getting iBricked, it seems that there's a growing trend for people to fear Apple’s security patches.” Ask.com Blog Search Neutral Quotes Positive Quotes Negative Quotes
4. “ Owners of hacked iPhones have begun posting instructions on how to roll back a recent Apple firmware upgrade that rendered their mobile phones unusable.” “ Apple comes out with a sweet new phone that can do everything” “ Some observers blame the iPhone-bricking on Apple CEO Steve Jobs' perfectionism.” Digg “ I think they have a lot riding on how this issue is handled from now on - the world is watching them!” “ But that’s not fair at all. Apple didn’t kill or damage a single unlocked iPhone.” “ Although there is little doubt that the iPhone represents a breakthrough in device evolution, interface design and application integration, there is also little doubt that Apple has created a big problem for itself in the closed nature of the device, its release through single carriers and the stance they have taken over the whole unlocking issue, not to mention the bad press they are getting as a result!” Icerocket Neutral Quotes Positive Quotes Negative Quotes