MyAppleMenu

The Embracing-Subscription Edition Monday, August 13, 2018

Apple's Secret Charm Offensive: How An Invite-only Meeting At Apple's Luxury Loft In New York Helped Transform How Software Is Sold On The iPhone, by Kif Leswing, Business Insider

The message was clear: successful apps now focus on getting regular engagement from their users, not one-time sales. For developers, that meant embracing the subscription model.

If you focus on paid apps, instead of subscriptions, Apple warned, your business will eventually hit a cap.

[...]

Apple is quietly building one of the biggest subscription businesses in the world — something that's core to the company as iPhone sales growth slows. Apple wants its services, supported by the App Store, to be a Fortune 50 business by 2020, or about $55 billion per year in revenue.

Invisible Mouse Clicks Let Hackers Burrow Deep Into macOS, by Andy Greenberg, Wired

One way operating system developers try to protect a computers's secrets from probing hackers is with an appeal to the human at the keyboard. By giving the user a choice to “allow” or “deny” a program’s access to sensitive data or features, the operating system can create a checkpoint that halts malware while letting innocent applications through. But former NSA staffer and noted Mac hacker Patrick Wardle has spent the last year exploring a nagging problem: What if a piece of malware can reach out and click on that “allow” button just as easily as a human?

At the DefCon hacker conference Sunday in Las Vegas, Wardle plans to present a devious set of automated attacks he’s pulled off against macOS versions as recent as 2017 release High Sierra, capable of so-called synthetic clicks that allow malware to breeze through the permission prompts meant to block it. The result could be malware that, once it has found a way onto a user's machine, can bypass layers of security to perform tricks like finding the user's location, stealing their contacts or, with his most surprising and critical technique, taking over the deepest core of the operating system, known as the kernel, to fully control the computer.

Understanding Smartwatches, by Matt Burns, TechCrunch

Smartwatches need to be reviewed like ordinary watches. I need to explain more about how the watch feels rather than what it does or how it works. At this point, several years into smartwatches, it’s not notable if the smartwatch with a smartwatch. Of course, it tracks steps and heart rate and displays select notifications from my phone. If those items work then, they’re not important in a review.

Stuff

Review: Apple And Blackmagic's eGPU With Thunderbolt 3 Connectivity, by Max, AppleInsider

With the 13-inch MacBook Pro, you get added portability when on the go and a quad-core, 8GB Radeon Pro 580 workstation in the home or office, nearing the performance levels of a 15-inch Macbook Pro with i9 CPU.

The Codex Is A Handsome Case For The MacBook Pro, But Is Limited, by Dennis Sellers, Apple World Today

The Codex is great if you’re boarding an airplane, thanks to its TSA friendliness. Its also great for protecting your MacBook Pro when you’re carrying it around the house or office. However, the Codex 15 has no room for peripherals (not even a power supply). There’s also no way to attach a shoulder strap.

Develop

When Self-Care Turns Into Self-Sabotage, by Melody Wilding, Medium

Ultimately, self-care is any number of habits and actions that leave you feeling restored and nourished. It shouldn’t elicit shame or guilt. It’s a little less about treating yourself and much more about reparenting yourself. This sounds easy in theory, but in reality, the hardest work you’ll ever do is learn to discover (and preserve) who you really are.

If You Want People To See You Differently, You Have To Stop Caring What They Think, by Andrew Fiouzi, MEL

Under a deluge of social media influencers ostensibly living their best lives and doing it all for the Gram, who among us isn’t pretending to be someone they’re not?

Notes

Machine Learning Can Identify The Authors Of Anonymous Code, by Louise Matsakis, Wired

Researchers who study stylometry—the statistical analysis of linguistic style—have long known that writing is a unique, individualistic process. The vocabulary you select, your syntax, and your grammatical decisions leave behind a signature. Automated tools can now accurately identify the author of a forum post for example, as long as they have adequate training data to work with. But newer research shows that stylometry can also apply to artificial language samples, like code. Software developers, it turns out, leave behind a fingerprint as well.

Bottom of the Page

In Singapore, the ghosts come up twice a year, once during the hungry ghost festival, and then again during halloween.

~

Thanks for reading.