first_img It’s showtime for Apple’s streaming service • Apple Tags Apple iPhone XS Apple purges parental control apps it says pose a security… See it Over the past year Apple said it became aware that several of the apps utilized mobile device management (MDM) software. This “gives a third party control and access over a device and its most sensitive information including user location, app use, email accounts, camera permissions and browsing history.” MDM software is often used by businesses to easily manage and control their employees’ devices, but Apple said that in mid-2017 it updated its guidelines about the use of MDM for non-enterprise purposes.”It is incredibly risky — and a clear violation of App Store policies — for a private, consumer-focused app business to install MDM control over a customer’s device,” Apple said. “Beyond the control that the app itself can exert over the user’s device, research has shown that MDM profiles could be used by hackers to gain access for malicious purposes.” Share your voice 2 Apple said it gave the app developers 30 days to fix the guideline violations. Several did, but the others that didn’t had their apps removed from the App Store. “Apple has always supported third-party apps on the App Store that help parents manage their kids’ devices,” the company said. “Contrary to what The New York Times reported over the weekend, this isn’t a matter of competition. It’s a matter of security.”The iPhone maker introduced its own screen-time and parental-controls features last year when it unveiled iOS 12, the most recent major update to its mobile operating system. On Friday, CEO Tim Cook discussed screen addiction at the Time 100 Summit in New York.Apple’s Screen Time feature came following backlash from investors and users over concerns about phone addiction among children. Two of Apple’s major shareholders published an open letter in January 2018 that asked Apple to take a socially responsible approach toward children’s device use. It cited concerns about mental health problems and other issues that come from heavy phone use. The Times report on Saturday said the makers of two of the App Store’s most popular parental control apps filed a complaint Thursday with the European Union’s competition office, with one saying Apple compelled it to alter its app in ways that made it less effective than Apple’s parental controls.Last month, music-streaming service Spotify filed a complaint about Apple with European Union regulators, saying the Apple Music purveyor uses its grip on the App Store to stifle innovation, weaken competition and unfairly tax its rivals. Apple called Spotify’s claims “misleading.” $999 Related stories $999 Best Buy See It Apple, App Store again face accusations of anticompetitive behavior Screen time is rising and it’s ruining us: 11 ways to cut back Apple helps you kick iPhone addiction with iOS 12 Spotify: Apple’s App Store abuses its power to ‘stifle’ rivals Sprint See It reading • Apple says it removed parental control apps for security reasons, not competition Apple CEO Tim Cook has made privacy a priority for his company. James Martin/CNET Apple on Sunday fired back at a New York Times report that said the company has been using its hold on the App Store to hurt competitors’ products.A Saturday report in the Times said that in the past year, Apple has targeted 11 of the 17 most downloaded third-party apps designed to help phone users limit screen time or oversee their children’s phone use. Apple either removed the apps from the App Store outright or restricted them in some way, the Times said.But Apple on Sunday published a statement in its newsroom titled, “The facts about parental control apps.” In it, the company said it recently removed several parental control apps from the App Store because “they put users’ privacy and security at risk.”center_img Aug 31 • iPhone XR vs. iPhone 8 Plus: Which iPhone should you buy? CNET may get a commission from retail offers. Preview • iPhone XS is the new $1,000 iPhone X Comments Review • iPhone XS review, updated: A few luxury upgrades over the XR $999 iOS 12 Apple See It Mentioned Above Apple iPhone XS (64GB, space gray) Now playing: Watch this: Aug 31 • iPhone 11, Apple Watch 5 and more: The final rumors Aug 31 • Best places to sell your used electronics in 2019 97 Photos See All $999 Boost Mobile Aug 31 • Your phone screen is gross. Here’s how to clean it Phones Mobile Apps 2:12last_img read more

first_imgIn this file photo taken on March 11, 2019 an Air China Boeing 737 MAX 8 plane is seen at Beijing Capital Airport. Photo: AFPBoeing and US aviation regulators are coming under intense scrutiny over the certification of the 737 MAX aircraft after news that two recent crashes share similarities.On 11 March, just a day after the Ethiopia crash left 157 dead, a grand jury in Washington issued a subpoena to at least one person involved in the plane’s certification, according to a Wall Street Journal article citing people close to the matter.The subpoena, which came from a prosecutor in the Justice Department’s criminal division, seeks documents and correspondence related to the plane, according to the report.A criminal inquiry is “an entirely new twist,” said Scott Hamilton, managing director of the Leeham Company, who recalled a probe of a 1996 ValuJet crash as the only other aviation probe that was not a civil investigation.”Unlike France, where criminal investigations into aviation accidents seems common, it is very, very rare in the US,” Hamilton added.The Transportation Department’s inspector general also is probing the approval of the 737 MAX by the Federal Aviation Administration (FAA), The Wall Street Journal also reported. Neither department responded to requests for comment from AFP.The probe is focusing on the Maneuvering Characteristics Augmentation System, or MCAS, implicated in the Lion Air crash, which authorities have said shared similarities with the latest accident.The Ethiopian Airlines crash on March 10 came less than five months after a 737 MAX 8 operated by Lion Air crashed in Indonesia, killing 189.While it may take months for definitive conclusions, Ethiopian officials said Sunday there were “clear similarities” between the two catastrophes based on information from the flight data recorder.The two incidents have prompted air transport regulators to ground 737 MAX aircraft worldwide, a surprising setback for a line of jets that has been flying for less than two years and is Boeing’s top seller.An investigation by The Seattle Times — in the city where Boeing has a large manufacturing presence — showed numerous problems with the MCAS, including that it would repeatedly override a pilot’s actions based on one faulty sensor. The paper asked for a response from Boeing and the FAA at least a week prior to the latest crash.Shares of Boeing dropped another 1.8 per cent on Monday to $372.28. The company has fallen about 12 per cent since the Friday before the crash.FAA officials had no comment Monday on the investigations but reaffirmed that the certification for the plane followed standard procedure.Boeing said it followed the rules in bringing the plane to the market.”The 737 MAX was certified in accordance with the identical FAA requirements and processes that have governed certification of all previous new airplanes and derivatives,” Boeing said.”The FAA considered the final configuration and operating parameters of MCAS during MAX certification and concluded that it met all certification and regulatory requirements.”Later Monday, Boeing CEO Dennis Muilenburg sought to reassure clients and passengers of the firm’s commitment to safety in a video message.”Safety is at the core of who we are at Boeing, and ensuring safe and reliable travel on our airplanes is an enduring value and our absolute commitment to everyone,” Muilenburg said.”Soon we’ll release a software update and related pilot training for the 737 MAX that will address concerns discovered in the aftermath of the Lion Air Flight 610 accident.”- Auto-certification? -The 737 MAX was certified as a variant of the 737 Next Generation, the plane it replaced, despite major differences in the engine and the addition of the MCAS, according to documents available on the FAA’s website.The motors on the new plane are heavier than in the 737 NG, posing more of a risk of stalling, so the MCAS was designed to protect against the possibility. But the Lion Air accident showed the system can erroneously correct for a stall when the plane is taking off, based on one bad sensor, and continuously fight the pilot for control.US pilots complained to Boeing about the issues following the Lion Air crash.Because of budget constraints, the FAA delegated aspects of the approval process to Boeing itself, according to sources.Under a program, known as the Organization Designation Authorization (ODA), employees of Boeing are accredited by the FAA to assist in approving the aircraft — including design, production, flight tests, maintenance and other systems — as well as signing off on the training procedures of pilots on new planes.The FAA last week said it already had ordered Boeing to develop a fix for problems with the MCAS system. But the agency was not able to describe any changes in the plane implemented by Boeing after the Lion Air accident.According to one aviation expert who requested anonymity, Boeing had readied some modifications for the system by the end of 2018 but the regulatory approval and subsequent installation of the changes were delayed by the five-week US government shutdown.Legislators Peter DeFazio, chairman of the House of Representatives Transportation and Infrastructure Committee, and Ted Cruz, who chairs a Senate transportation subcommittee, have each called for hearings to look into the 737 MAX’s certification.last_img read more

first_imgKOLKATA: Some BJP supporters clashed with civic volunteers and later chased them away after police refused them to hold a public meeting at their preferred venue. The police on Wednesday did not allow the BJP supporters to hold a meeting at the site and suggested an alternative spot. However, they refused to move and told police they would hold the programme at the announced site. On Thursday morning, the police deployed civic volunteers at the venue to stop the BJP supporters from entering. They clashed with the civic volunteers and later chased them away and took possession of the land. When Mukul Roy had come he was taken to a make shift dais from where he addressed the gathering. The local BJP leaders said the police cancelled on the venue at the eleventh hour when it was impossible for the party to shift to an alternative venue. They alleged that police did not give allotment of an alternative site in writing and apprehended they could have stopped the supporters from entering the venue and holding the meeting.last_img read more

first_imgNovember 19, 2010 Free Webinar | Sept 5: Tips and Tools for Making Progress Toward Important Goals Brought to you by PCWorld 10 min read Good citizens of technological America, this story is not for you. Today we honor the louts, the Luddites, and the lazy. Everyone has a little techie vice — raise your hand if you have ever used “password” as a password — but with this outing we’re digging a little deeper, calling out the really bad habits that can cause permanent damage to your high-tech psyche.Without further ado, it’s time to get our hands dirty. We present to you our 25 worst high-tech habits.1. Avoiding Security SoftwareSo you thought you could get by without antimalware utilities, just by being mindful of what Web links you click and what e-mail you open. How’s that working out for ya? Use something — anything — to protect your PC from the bad guys, who are happy to have you as a target. You can even start with free antivirus software.2. Failing to Back Up Your ComputerThe funny thing about people who admit that they don’t back up is that they always preface it by saying, “I know it’s bad, but…” Listen: All hard drives crash eventually. All of them. Yours will, too. For help, see our simple guide to getting started with backup.3. Neglecting Offsite BackupA thief breaks into your apartment and steals your laptop. No problem: You just backed it up last night. Oh, wait, he stole your backup drive too, because it was sitting right next to the laptop. Store your data in multiple locations, with automatic backups scheduled for hard drives kept away from your PC — and make a backup plan to prepare for worst-case scenarios.4. Replying to SpamWhy do spammers do their dirty work? Because enough people respond to it to make sending junk worth their while. Yes, clicking the “remove me” link counts as a response — though on rare occasions, if a message is clearly from a legitimate brand-name company, using that link is worth a try. If you’re not part of the solution, you’re part of the problem. In addition to following this commonsense advice, you can take an extra step to harness the spam-fighting powers of your e-mail service.Tempting as the offer may be, put spammers out of business by ignoring their e-mail.5. Traveling With an Operating ComputerTaking your computer from the kitchen to the living room while it’s running? No problem. Taking your running PC from the office, on the subway, for a mile-long walk, and up the stairs to your house? Terrible idea. Spinning hard drives can crash, and computers can easily overheat in cramped quarters. Shut the PC down. (Extra demerits if your hot, whirring laptop is sweating it out in a closed briefcase for the entire ride.) Windows offers custom settings for the power button and lets you tell a laptop to power off when you shut the lid.6. Using a Laptop on a BedUse your laptop in bed all you want — it’s when you leave the machine running on your goose-down comforter that the problems begin. Fluffy cushions and the like can block ventilation ports, overheating (and ruining) your PC. Use a lap desk or a coffee-table book to keep some airflow between the two. Plus, you can hurt your body if you’re typing in an unnatural position, so pay attention to ergonomics.7. Printing EverythingYou already have a digital record — why do you need to print it out? Even forms that require signatures often can accept a “digital” signature that you create in Microsoft Paint. Save completed files as PDFs for even easier transportation and archiving.8. Taking a Camera to the BeachOne grain of sand in the shutter or zoom mechanism, and it’s toast. If you must shoot beachside, put the camera in a waterproof case or a plastic bag. Better yet, get a waterproof camera.9. Leaving a Laptop in the CarThieves stake out hot parking spots and wait for fancy-pants business types to leave their laptop bags in the car, even just for a few minutes. All they have to is smash a window and grab it, and they’re gone in 10 seconds flat. Or, maybe you thought you got smart, and you put your laptop in the trunk, out of sight — too bad you waited until you got to Sketchy Street to do it, where the bad guys watched you every step of the way. Trunks are even easier to pop open than windows. Stow your rig in the trunk before you embark on your trip. Better yet, take the laptop with you, or try a travel lock.10. Keeping All of Your E-MailEvery e-mail message you’ve ever received is sitting in your inbox in chronological order. Congratulations! You now have an unassailable historical record of your communications…and a guarantee that you will never find anything of any importance whatsoever. Use folders or tags to organize your inbox, and be liberal with the Delete key.11. Failing to Learn Keyboard ShortcutsDid you know that some people out there still aren’t aware that Ctrl-C is copy and Ctrl-V is paste? I’m not saying you need to learn every Alt-Ctrl-Shift combo, but the more Alt-F4s you pick up, the sooner you can go home. Drop the mouse and try a few essential shortcuts for shutting down a PC and more, and several specific shortcuts for Windows 7.12. Installing Too Much JunkWhy is Windows so slow? You installed three instant messaging clients and seven browser toolbars on your machine. Once some of this stuff is installed, the damage is already done, as many of these apps leave behind traces that are impossible to eliminate. You can try uninstalling as much as possible, but a clean Windows setup is often your best bet.13. Discarding ReceiptsNull’s Law dictates that consumer products will always break immediately after the expiration of their warranty — but once in a while they break sooner. You might be able to get the thing fixed … if you saved your receipt. Keep a folder next to your medical records. Once you collect some receipts, you can scan and organize them with the Neat Receipts system.14. Waiting in Line for Tech StuffRemember when you slept in a tent so that you could be the first guy in your ‘hood to own a PlayStation 3? Your parents are probably just as proud of that achievement as when you finally leveled your Druid up to 80. Trust us: The gadget works the same 24 hours later. You can probably even preorder it online and let it come to your door.15. Hitting Your ComputerBe mad. Seriously, Windows aggravates everyone — get angry! Remember, though: We can offer a lot of aid, but throwing, kicking or otherwise abusing a PC physically will not help. And shelling out a few hundred bucks for a new computer will actually make you feel even worse in the end. Meditate, and restrain yourself. If your laptop is sick from a latte that you tossed on it in a fit of rage, clean it carefully. Luckily, you can try a few emergency tech fixes that can restore hardware to health if your tantrum goes too far.16. Saving Files Anywhere and EverywhereWhen you get your electric bill, do you just throw it on the table, mixing it in with family photos, flyers, the Sunday paper and your discs from Netflix, or do you take 20 seconds to file it away where it really ought to go? Wait, don’t answer that. As with your inbox, folders are your friend.17. Checking in With Location-Based ServicesThe only people who care that you’re at Sizzler or TJ Maxx are people you really don’t want to know. Exceptions: If you’re someplace really cool — like Mt. Fuji, Versailles or Chernobyl — check in all you want. We’ve looked at some practical uses for services like Foursquare; stick to those.18. Citing WikipediaWhen you need a fact to make a point, the perfect place to go is a gargantuan website that anyone can edit anonymously, and where hoaxes and gag entries can have a life span of years. If you must use Wikipedia, click the links in the footnotes on the page to get the real story, and to see how credible the information digested there really is.19. Posting Hilarious Pictures Online”Hey, coworker! Looks like you had a great time at your pal’s bachelor party. Oh, is that you posing with a Heineken in your hand? How original! Yeah, you and that girl look pretty wasted in that one. At least, that’s what our boss said when he e-mailed it to me. Good luck with that evaluation!” Save such moments for posterity in private — or else. Pay close attention to the privacy settings on Facebook (and untag yourself in those compromising pictures) and on photo-sharing sites. On Flickr, for example, click Edit your profile privacy from the ‘Manage your profile’ page to control who can see what.20. Believing the SalespersonLet’s put it this way: If that guy really knew a lot about computers, would he be wandering the aisles in a blue shirt and slacks asking if you need help? No. No, he would not. Do your research by googling for consumer reviews and comments before you get to the store, and learn which stores offer the best services and deals.21. Ignoring the SpecsThe big idea in tech today is to offer three classes of product: A bare-bones version, a power-user version and an “extreme” version, each with an escalating price tag. The problem is, the extreme edition may not really do anything that the bare-bones version can’t do — or it has features you don’t actually need — but you buy the expensive one anyway, because you didn’t really read the specs. It can take a lot of Web research time to figure out the meaning of some of the arcana — and what’s really important — but this is time well invested.22. Using One Password for EverythingAll it takes is a single data leak at your cell phone company for a crook to get into your e-mail, bank, investing, online shopping and Match.com accounts. It’s one-stop shopping for identity thieves! Having a unique password for every site is unrealistic, but use a series of several passwords and save your best for the most critical sites. Password managers can help.23. Not Having a Disposable E-Mail AddressDon’t give out your regular e-mail address to newsletters, iffy Web services and girls or boys you meet after midnight. A disposable e-mail address that you check once a fortnight is a better solution. This is why Gmail was invented.24. Failing to Lock Your SmartphoneWhen an unsavory type finds a lost phone, his first order of business is to call as many international and 900-type numbers that he humanly can. Then he harvests all the data on it for identity theft and spam purposes. Or you could, you know, prevent all of that by putting a simple PIN on the thing. You can find tools built to manage security for Android and other mobile operating systems.25. Commenting OnlineI know: You have the perfect bon mot to counter one of the points on this list, and you’re going to enter it painstakingly into a Web form at the bottom of this article so you can be clever comment #86 on page four. Congratulations, sir or ma’am. Touché. Seriously, people, this is 2010. If you have something snarky or inflammatory to say, at least have the common courtesy to tweet it (politely). Register Now » Attend this free webinar and learn how you can maximize efficiency while getting the most critical things done right.last_img read more