Some rivalries will never die — chocolate vs peanut butter, Yankees vs Red Sox, and iPhone vs Android, just to name a few. With the announcement of the iPhone 6 and iPhone 6 Plus, many Android users took to the Internet to loudly exclaim how underwhelmed they were by the devices. Its new features were things they’d already had for years, except for all the ones that weren’t, of course. Rivalries are fun, but the musings of voices on the Internet aren’t nearly as important as the voices of the buying public. And when you compare the launch numbers of various Samsung Galaxy S phones to the iPhone 6 and earlier iPhones, there’s absolutely no competition.
And still the overall market share of Android is higher. I think it’s because people who get an iPhone make a conscious choice to do so, and (most) people who get an android do so because they walk into a store and tell the sales rep they want “a phone”. They will make calls, use facebook, make a selfie, and that’s it. They never download an app unless recommended by a friend (“get snapchat!”), and just use the phone as a phone and are very happy with it.
According to a new report from The Financial Times, Apple stands to make quite a bit of money from its payments service. Banks and payment networks will be forking over 0.15 percent of each purchase to Apple, which equates to 15 cents out of a $100 purchase.
They are also paying hard cash for the privilege of being involved: 15 cents of a $100 purchase will go to the iPhone maker, according to two people familiar with the terms of the agreement, which are not public. That is an unprecedented deal, giving Apple a share of the payments’ economics that rivals such as Google do not get for their services
According to bank executives, Apple was able to negotiate with so many partners and receive choice deals because the industry didn’t see anything threatening in Apple Pay. One executive suggested that Apple’s payment model continued to put banks “at the centre of payments.” Apple may also have been able to negotiate better deals due to the tight security it has in place for Apple Pay. Payments will be made via NFC with a one-time token, and also secured with a Touch ID fingerprint.
There’s not much time now before the announcement, and some pictures of the apple wearables have leaked. These are confirmed as having come from Apple.
2. http://i.imgur.com/5aAu9h.jpg (apple logo clearly visible)
3. http://i.imgur.com/XrFzih.jpg (showing range of colors)
4. http://i.imgur.com/PpLv1h.jpg (hinting at a future google glass competitor?)
Apple Inc has invited top fashion editors and bloggers in unprecedented numbers to its Tuesday launch gala, further evidence that the iPhone maker is preparing to take the wraps off a smartwatch.
According to a designer who works at Apple, Jonathan Ive, Apple’s design chief, in bragging about how cool he thought the iWatch was shaping up to be, gleefully said Switzerland is in trouble — though he chose a much bolder term for “trouble” to express how he thought the watchmaking nation might be in a tough predicament when Apple’s watch comes out.
As nude celebrity photos spilled onto the web over the weekend, blame for the scandal has rotated from the scumbag hackers who stole the images to a researcher who released a tool used to crack victims’ iCloud passwords to Apple, whose security flaws may have made that cracking exploit possible in the first place. But one step in the hackers’ sext-stealing playbook has been ignored—a piece of software designed to let cops and spies siphon data from iPhones, but is instead being used by pervy criminals themselves.
On the web forum Anon-IB, one of the most popular anonymous image boards for posting stolen nude selfies, hackers openly discuss using a piece of software called EPPB or Elcomsoft Phone Password Breaker to download their victims’ data from iCloud backups. That software is sold by Moscow-based forensics firm Elcomsoft and intended for government agency customers. In combination with iCloud credentials obtained with iBrute, the password-cracking software for iCloud released on Github over the weekend, EPPB lets anyone impersonate a victim’s iPhone and download its full backup rather than the more limited data accessible on iCloud.com. And as of Tuesday, it was still being used to steal revealing photos and post them on Anon-IB’s forum.
The fact that Apple isn’t complicit in law enforcement’s use of Elcomsoft’s for surveillance doesn’t make the tool any less dangerous, argues Matt Blaze, a computer science professor at the University of Pennsylvania and frequent critic of government spying methods. “What this demonstrates is that even without explicit backdoors, law enforcement has powerful tools that might not always stay inside law enforcement,” he says. “You have to ask if you trust law enforcement. But even if you do trust law enforcement, you have to ask whether other people will get access to these tools, and how they’ll use them.”
Apple issued a media advisory related to recent celebrity photo theft, saying the accounts were compromised by a very targeted attack on users names, password and security questions and was not related to any breach of Apple’s systems, including iCloud.
Over the weekend a number of nude celebrity photos appeared online. Jennifer Lawrence, Kate Upton, Lea Michele, Victoria Justice and Kirsten Dunst all had their photos comprised, among others.
We wanted to provide an update to our investigation into the theft of photos of certain celebrities. When we learned of the theft, we were outraged and immediately mobilized Apple’s engineers to discover the source. Our customers’ privacy and security are of utmost importance to us. After more than 40 hours of investigation, we have discovered that certain celebrity accounts were compromised by a very targeted attack on user names, passwords and security questions, a practice that has become all too common on the Internet. None of the cases we have investigated has resulted from any breach in any of Apple’s systems including iCloud® or Find my iPhone. We are continuing to work with law enforcement to help identify the criminals involved.
To protect against this type of attack, we advise all users to always use a strong password and enable two-step verification. Both of these are addressed on our website athttp://support.apple.com/kb/ht4232.
If you are a celebrity, it’s more likely that people know the name of your first pet, or your mothers maiden name…
Rumors are pretty solid about the iPhone 6, but it’s unclear if there’s going to be any wearables, iWatches, or similar.
And the rumors about them are as varied as the rumors were about the original iPhone. So, how accurate are those rumors? Take a look at what people predicted the iPhone will look like, and take that as a reference…
For the occasion, it appears that Apple has been building a massive structure on the campus, which has been kept under tight wraps with a white barricade. A MacRumors reader has sent in images of a mysterious structure at the Flint Center, which appears to span three stories and is protected by “scads” of security people. Administrators had previously declined to comment on what the structure is for, stating only “We are not at liberty to discuss that due to client wishes.”
Apple has not held an event at the Flint Center in many years, so the company’s return to the site of the original Mac unveiling suggests its upcoming announcement will be a major one. The Flint Center has a much higher seating capacity than other venues where Apple has unveiled products in the past, including the Yerba Buena Center and its own Cupertino campus.
Could be just a “here’s a new iPhone model, and it has NFC” but somehow it feels different. I’m going to keep a spare set of pants on standby.
We show that the MEMS gyroscopes found on modern smart phones are sufficiently sensitive to measure acoustic signals in the vicinity of the phone. The resulting signals contain only very low-frequency information (<200Hz). Nevertheless we show, using signal processing and machine learning, that this information is sufficient to identify speaker information and even parse speech. Since iOS and Android require no special permissions to access the gyro, our results show that apps and active web content that cannot access the microphone can nevertheless eavesdrop on speech in the vicinity of the phone.
Apple’s documentation on the tel scheme is really short and easy to read. While reading the first paragraph something caught my attention:
When a user taps a telephone link in a webpage, iOS displays an alert asking if the user really wants to dial the phone number and initiates dialing if the user accepts. When a user opens a URL with the tel scheme in a native app, iOS does not display an alert and initiates dialing without further prompting the user.
So if I click the link in Safari I get the prompt asking me to confirm my action, if I click the link in a native app’s webView it doesn’t ask and performs the action right away (makes the call).
Do people read documentation?
No. And it’s bad.
I instantly assumed people do read documentation so there was no way a big player like Facebook, Twitter, Google, LinkedIn, etc. would do such a silly mistake… but I was wrong.
Apple may well be the only tech company on the planet that would dare compare itself to Picasso.
In a class at the company’s internal training program, the so-called Apple University, the instructor likened the 11 lithographs that make up Picasso’s “The Bull” to the way Apple builds its smartphones and other devices. The idea: Apple designers strive for simplicity just as Picasso eliminated details to create a great work of art.
Steven P. Jobs established Apple University as a way to inculcate employees into Apple’s business culture and educate them about its history, particularly as the company grew and the tech business changed. Courses are not required, only recommended, but getting new employees to enroll is rarely a problem.
Although many companies have such internal programs, sometimes referred to as indoctrination, Apple’s version is a topic of speculation and fascination in the tech world.
It is highly secretive and rarely written about, referred to briefly in the biography of Mr. Jobs by Walter Isaacson. Apple employees are discouraged from talking about the company in general, and the classes are no exception. No pictures of the classrooms have surfaced publicly. And a spokeswoman for Apple declined to make instructors available for interviews for this article.
There’s a nice little feuilleton in the New York Times looking at why everyone whines about their iPhone slowing down when Apple releases a new variant.
Starting from a personal complaint by a professor, one of his students looks at the incidence for “iPhone slow” in Google Trends and notes that there’s a leap every time a new model is released.
That is released – not announced – so it must come from actual use, rather than just thinking that it isn’t quite up to date.
It’s also noted that releases of new Samsung models do not coincide so strongly with leaps in similar search terms. Obviously there’s something specific to Apple here, and that’s that major upgrades to the iPhone coincide with upgrades to iOS, something which 90 per cent of iPhone users will implement.
Famously, Android users do not tend to upgrade their OS over time. So, we might think that this observed slow-down is a result of trying to run the new OS on old hardware which isn’t quite up to supporting it. And we’d probably be right there.
However, we can now go off on our own and go a little further than this. For what’s really remarkable about these OS upgrades is how good Apple has been at keeping new versions of iOS compatible with old versions of hardware. No one at all would suggest running today’s Samsung bloatware (that bit that floats around on top of Android) on hardware three years old. But it seems perfectly acceptable to be running this year’s iOS on old kit. It’s also at this point that we can wander off into a couple of bits of economics for illumination.
Russia has proposed that Apple Inc and SAP hand the government access to their source code to make sure their widely used products are not tools for spying on state institutions.
Apple’s App Store design is a big part of the problem. The dominance and prominence of “top lists” stratifies the top 0.02% so far above everyone else that the entire ecosystem is encouraged to design for a theoretical top-list placement that, by definition, won’t happen to 99.98% of them. Top lists reward apps that get people to download them, regardless of quality or long-term use, so that’s what most developers optimize for. Profits at the top are so massive that the promise alone attracts vast floods of spam, sleaziness, clones, and ripoffs.
Quality, sustainability, and updates are almost irrelevant to App Store success and usually aren’t rewarded as much as we think they should be, and that’s mostly the fault of Apple’s lazy reliance on top lists instead of more editorial selections and better search.
The best thing Apple could do to increase the quality of apps is remove every top list from the App Store.
In 1991 Steve Jobs’ company commissioned an head-to-head programming competition to show how much faster and easier it was to program a NeXT computer vs a Sun workstation. The NeXT operating system went on to be the foundation for Apple’s Macintosh OS-X about a decade later.
By the time its entire fleet of 24 satellites has launched in 2018, Skybox will be imaging the entire Earth at a resolution sufficient to capture, for example, real-time video of cars driving down the highway. And it will be doing it three times a day.
The ability to take such frequent imaging will certainly aid Google’s Maps product, but it also opens up a market for competitive intelligence. Skybox says they are already looking at Foxconn every week and are able to pinpoint the next iPhone release based on the density of trucks outside their manufacturing facilities.
This NYT profile of Tim Cook opens with a harrowing anecdote from the Apple CEO’s early life in 1970s Alabama:
Bicycling home on a new 10-speed, [Cook] passed a large cross in flames in front of a house — one that he knew belonged to a black family. Around the cross were Klansmen, dressed in white cloaks and hoods, chanting racial slurs. Mr. Cook heard glass break, maybe someone throwing something through a window. He yelled, “Stop!”
One of the men lifted his conical hood, and Mr. Cook recognized a deacon from a local church (not Mr. Cook’s). Startled, he pedaled away.
Reflecting on this event in December during his acceptance speech for Auburn University’s International Quality of Life Award, he said, “This image was permanently imprinted in my brain, and it would change my life forever” — human rights and dignity are “values that need to be acted upon,” and Apple is a company that believes in “advancing humanity.”
Of course. Remember this?
I wonder if that deacon is still alive. I want him to see how vastly that one act of hatred has backfired…
What we saw last week at WWDC 2014 would not have happened under Steve Jobs
It wasn’t touted onstage, but a new iOS 8 feature is set to cause havoc for location trackers, and score a major win for privacy. As spotted by Frederic Jacobs, the changes have to do with the MAC address used to identify devices within networks. When iOS 8 devices look for a connection, they randomize that address, effectively disguising any trace of the real device until it decides to connect to a network.
“Any phone using iOS 8 will be invisible to the process”
Why are iPhones checking out Wi-Fi networks in disguise? Because there’s an entire industry devoted to tracking customers through that signal. As The New York Times reported last summer, shops from Nordstrom’s to JC Penney have tried out the system. (London even tried out a system using public trash cans.) The system automatically logs any phone within Wi-Fi range, giving stores a complete record of who walked into the shop and when. But any phone using iOS 8 will be invisible to the process, potentially calling the whole system into question.
For the first time, iOS 8 opens up the keyboard to developers. And once new keyboards are available, you’ll be able to choose your favorite input method or layout systemwide.
Braille keyboard anyone?
Here’s the truth about WWDC keynotes:
- The fact that they’re part of a conference devoted to informing developers about Apple’s platforms means that the emphasis will be on software–particularly operating systems–and the odds of a radically new hardware product being announced are just about nil;
- Since epoch-shifting hardware is out of the picture, any devices which do get announced are, by definition, only incrementally superior to their predecessors;
- No matter how newsy the keynote is, some people–especially ones who were hoping for something extremely specific which didn’t get announced–will deem it a snoozefest;
- There’s a very good chance that Apple’s stock will fall in the wake of the keynote, presumably indicating that Wall Steeet was not instantly impressed.
Amazon’s power over the publishing and bookselling industries is unrivaled in the modern era. Now it has started wielding its might in a more brazen way than ever before.
Seeking ever-higher payments from publishers to bolster its anemic bottom line, Amazon is holding books and authors hostage on two continents by delaying shipments and raising prices. The literary community is fearful and outraged — and practically begging for government intervention.
“How is this not extortion? You know, the thing that is illegal when the Mafia does it,” asked Dennis Loy Johnson of Melville House, echoing remarks being made across social media.
Amazon is, as usual, staying mum. “We talk when we have something to say,” Jeffrey P. Bezos, the founder and chief executive, said at the company’s annual meeting this week.
It’s a good thing the Justice Department fixed the ebook antitrust issues. Perhaps they need to punish Apple some more to take care of this?
According to various court records and people who have worked with Samsung, ignoring competitors’ patents is not uncommon for the Korean company. And once it’s caught it launches into the same sort of tactics used in the Apple case: countersue, delay, lose, delay, appeal, and then, when defeat is approaching, settle. “They never met a patent they didn’t think they might like to use, no matter who it belongs to,” says Sam Baxter, a patent lawyer who once handled a case for Samsung. “I represented [the Swedish telecommunications company] Ericsson, and they couldn’t lie if their lives depended on it, and I represented Samsung and they couldn’t tell the truth if their lives depended on it.”
It was the same old pattern: when caught red-handed, countersue, claiming Samsung actually owned the patent or another one that the plaintiff company had used. Then, as the litigation dragged on, snap up a greater share of the market and settle when Samsung imports were about to be barred. Sharp had filed its lawsuit in 2007; as the lawsuit played out, Samsung built up its flat-screen business until, by the end of 2009, it held 23.6 percent of the global market in TV sets, while Sharp had only 5.4 percent. All in all, not a bad outcome for Samsung.
The same thing happened with Pioneer, a Japanese multi-national that specializes in digital entertainment products, which holds patents related to plasma televisions. Samsung once again decided to use the technology without bothering to pay for it. In 2006, Pioneer sued in federal court in the Eastern District of Texas, so Samsung countersued. The Samsung claim was thrown out before trial, but one document revealed in the course of the litigation was particularly damaging—a memo from a Samsung engineer stating explicitly that the company was violating the Pioneer patent. A jury awarded Pioneer $59 million in 2008. But with appeals and continued battles looming, the financially troubled Pioneer agreed to settle with Samsung for an undisclosed amount in 2009. By then, it was too late. In 2010, Pioneer shut down its television operations, tossing 10,000 people out of work.
Even when other companies have honored competitors’ patents, Samsung has used the same technology for years without paying royalties. For example, a small Pennsylvania company named InterDigital developed and patented technology and was paid for its use under licensing agreements with such giant corporations as Apple and LG Electronics. But for years Samsung refused to cough up any cash, forcing InterDigital to go to court to enforce its patents. In 2008, shortly before the International Trade Commission was set to make a decision that could have banned the importation of some of Samsung’s most popular phones into the United States, Samsung settled, agreeing to pay $400 million to the tiny American company.
Intel has already recognized that it is in the company’s long-term best interest to get into the ARM game in one capacity or another. At the same time, Intel no doubt has also recognized that it is not in the company’s short-term best interest to start producing large quantities of ARM-based chips for any company that asks. Intel has only so much production capacity, and the opportunity cost is too high to start producing low-margin ARM-based chips at the expense of its more profitable x64 processors. The company is at a crossroads: its short- and long-term best interests don’t align, and it has to choose one at the expense of the other.
That’s where Apple’s cash hoard comes in.
It’s interesting he doesn’t suggest Apple should outright buy Intel.
But as for building a chip factory for Intel, as well as the other worries he mentions, perhaps Apple should outright buy ASML to get a lead start on their EUV technology…
From the constant harping about the supposed “failure” of Apple’s iPhone 5c, you’d think the phone is selling poorly. The reality is that middle tier model, while dramatically less popular than Apple’s top of the line iPhone 5s, still managed to outsell every Blackberry, every Windows Phone and every Android flagship in the winter quarter, including Samsung’s Galaxy S4.