or Connect
New Posts  All Forums:

Posts by Corrections

Tom Kaneshige writes absolute garbage for CIO. An entire article about iPhone & BYOD that failed to even mention IBM, after a previous article that said Apple and IBM couldn't possbilly work together and that Apple has done nothing to support Enterprise MDM. Except that Apple has made enterprise MDM a major feature since iPhone 2.0 in 2008.   He's pushing BlackBerry so hard that its painful to read. All based on "stats" by one anonymous source at an unnamed company that...
 It's nothing short of a cowardly character assassination to sit in the comments passing out accusations of copious "inaccuracies" without stating what any of these are, then represent a conversation where you stuff words into the authors mouth--without any specifics whatsoever--and complain how difficult this process is as the reason why you can't say anything other than what a terrible person in general the author is, because looking up the facts is so time consuming....
The first editorial to appear on AI was last March. So no, you could not possibly look back on "some from a couple of years ago."Busted.
 Describing some possible solution to an existing problem does not change the fact that there is a clear, recognized problem with actual existing software that is widely known about and already being exploited in the real world. You asked, "What do you mean by 'assumes apps won't be bad?'" and then I gave you an answer. Why run to change the discussion to be about how one can indeed assume apps can be bad, while ignoring the clear and obvious corollary that Google allowed...
 If you don't ostracize, marginalize and foster hatred of people for irrational reasons, you don't end up missing out on what they can contribute to society.  Examples include a lot of artists and musicians, but also engineers and mathematicians like Alan Turing, who developed a critical crack for Nazi ciphers that allowed England to intercept German messages. Winston Churchill said Turing made the biggest contribution to the Allied victory against the Nazis. Turing later...
Google provides copious literature on the subject when you search for "Intent Vulnerabilities"The TL;DR short version:"There are two main ways that the security of intents can be compromised:"Intent interception involves a malicious app receiving an intent that was not intended for it. This can cause a leak of sensitive information, but more importantly it can result in the malicious component being activated instead of the legitimate component. For example, if a malicious...
 No. App Extensions are created for specific roles (photo editing, NC widgets, keyboards, share sheets, etc). Each of these is accommodated by iOS/OS X frameworks (exposing an "extension point" which you can think of like a cell receptor site that only responds to matching enzymes). So developers can't create their own AEs to do random things inside any app. Also AEs are intended to do a simple task and then go away. They're not full blown apps or runtime environments, so...
New Posts  All Forums: