Month: June 2023
Satellites Keep Photobombing Space Images. Astronomers Need a Fix
submitted by /u/ninjascotsman [link] [comments]
submitted by /u/ninjascotsman
[link] [comments]
iOS 17: All the Safety Features in the Latest iPhone Update
Apple is introducing several new safety-focused features in iOS 17, including new measures to keep you safe when you’re traveling and to prevent you from seeing images you don’t want to see.
This guide highlights all of the safety functions that Apple added to iOS 17, and it accompanies our iOS 17 privacy and security guide.
Sensitive Content Warnings
With Sensitive Content Warnings, incoming files, videos, and images are scanned on-device and blocked if they contain nudity. It is a function that will put a stop to unsolicited nude photos and similar content.
The opt-in blurring can be applied to images in Messages, AirDrop, Contact Posters for the Phone app, FaceTime messages, and third-party apps. This is separate from the Communication Safety features implemented for children, and is designed for people of all ages.
All nudity will be blocked by default if the feature is enabled, but it can be viewed by tapping on the “Show” button. Sensitive Content Warnings can be enabled in the Settings app.
Open up the Settings app.
Choose Privacy & Security.
Tap on Sensitive Content Warning.
Tap to toggle on Sensitive Content Warning.
You can turn on Sensitive Content Warnings for specific services, including AirDrop, Messages, and Video Messages. All detection of images is done on device, and there are Safety Resources that can be accessed.
Messages Check In
Messages Check In is a feature that lets you inform other people when you’re going somewhere so they can keep tabs on you and make sure that you get to that location safely.
It tells a friend or family member your destination and the time that you’re meant to be there, and if you don’t check in at the proper time, they can ping you to see what’s going on and get access to your location in case of emergency. Here’s how to use it:
Open up the Messages app.
Open the conversation with the person you want to use Check In with.
Tap on the “+” button next to the text input bar.
Tap on More.
Tap on Check In.
Tap on Continue.
Follow the prompts to start the feature.
With Check In, a friend or family member will be notified of your destination and approximate travel time, with another automatic notification sent when you reach your destination. So if you’re going from a friend’s house to your house late at night, you can set up Check In and your friend will get an alert when you make it home.
If you are not making progress toward your destination, you’ll be prompted and will have 15 minutes to respond on your iPhone. If you don’t respond, your friend will get an alert.
There are two data sharing options for Check In. With “Limited,” current location, details about battery level, and network signal for your iPhone and Apple Watch are shared. With “Full” data selected, all of that information will be shared along with route traveled and location of last iPhone unlock and Apple Watch removal.
Check In requires your friends or family members to be running iOS 17.
Communication Safety
Apple last year introduced Communication Safety, an opt-in feature that warns children when sending or receiving photos that contain nudity. It blurs nude photos and provides children with helpful resources and suggests that they get in touch with a trusted adult.
Communication Safety in iOS 17 is expanding worldwide, so it will be available in more countries than it was previously. It will be turned on by default for children under the age of 13 who are signed in to their Apple ID and who are part of a Family Sharing group.
Parents can enable it for older teens as well, with the option to turn it on available in the Settings app under Screen Time.
In addition to being available worldwide, Communication Safety’s protections will expand to AirDrop, the systemwide photo picker, FaceTime messages, and third-party apps in addition to the Messages app.
Offline Maps
The Maps app works offline in iOS 17, providing access to turn-by-turn directions and information for the area that you’re in even if you do not have a cellular or Wi-Fi connection.
Offline Maps is useful if you’re planning to travel somewhere remote, such as when hiking or traveling in rural areas. Downloading a map can be done by putting in a location, tapping on the “More” button, and then choosing the “Download Map” option.
You can select the size of the area that you want to save, and multiple areas can be downloaded. You can manage Map downloads by opening up the Maps app, tapping on your profile picture, and selecting Offline Maps.
Maps can be updated, deleted, renamed, and resized, and you can download new maps from this interface too. Downloads can be set to automatically update, and there is an option to use offline maps even when a connection is available.
Critical Medication Reminders
The Medications feature in the Health app can send a follow up reminder if you haven’t marked a medication as taken 30 minutes after the initial notification.
Apple also plans to add a Critical Alerts feature for important medications that will appear on the Lock Screen and play a sound even if the iPhone is muted or a Focus mode is turned on.
Read More
More information on the additions in the iOS 17 update can be found in our iOS 17 roundup.Related Roundups: iOS 17, iPadOS 17Related Forums: iOS 17, iPadOS 17This article, “iOS 17: All the Safety Features in the Latest iPhone Update” first appeared on MacRumors.comDiscuss this article in our forums
Apple is introducing several new safety-focused features in iOS 17, including new measures to keep you safe when you’re traveling and to prevent you from seeing images you don’t want to see.
This guide highlights all of the safety functions that Apple added to iOS 17, and it accompanies our iOS 17 privacy and security guide.
Sensitive Content Warnings
With Sensitive Content Warnings, incoming files, videos, and images are scanned on-device and blocked if they contain nudity. It is a function that will put a stop to unsolicited nude photos and similar content.
The opt-in blurring can be applied to images in Messages, AirDrop, Contact Posters for the Phone app, FaceTime messages, and third-party apps. This is separate from the Communication Safety features implemented for children, and is designed for people of all ages.
All nudity will be blocked by default if the feature is enabled, but it can be viewed by tapping on the “Show” button. Sensitive Content Warnings can be enabled in the Settings app.
Open up the Settings app.
Choose Privacy & Security.
Tap on Sensitive Content Warning.
Tap to toggle on Sensitive Content Warning.
You can turn on Sensitive Content Warnings for specific services, including AirDrop, Messages, and Video Messages. All detection of images is done on device, and there are Safety Resources that can be accessed.
Messages Check In
Messages Check In is a feature that lets you inform other people when you’re going somewhere so they can keep tabs on you and make sure that you get to that location safely.
It tells a friend or family member your destination and the time that you’re meant to be there, and if you don’t check in at the proper time, they can ping you to see what’s going on and get access to your location in case of emergency. Here’s how to use it:
Open up the Messages app.
Open the conversation with the person you want to use Check In with.
Tap on the “+” button next to the text input bar.
Tap on More.
Tap on Check In.
Tap on Continue.
Follow the prompts to start the feature.
With Check In, a friend or family member will be notified of your destination and approximate travel time, with another automatic notification sent when you reach your destination. So if you’re going from a friend’s house to your house late at night, you can set up Check In and your friend will get an alert when you make it home.
If you are not making progress toward your destination, you’ll be prompted and will have 15 minutes to respond on your iPhone. If you don’t respond, your friend will get an alert.
There are two data sharing options for Check In. With “Limited,” current location, details about battery level, and network signal for your iPhone and Apple Watch are shared. With “Full” data selected, all of that information will be shared along with route traveled and location of last iPhone unlock and Apple Watch removal.
Check In requires your friends or family members to be running iOS 17.
Communication Safety
Apple last year introduced Communication Safety, an opt-in feature that warns children when sending or receiving photos that contain nudity. It blurs nude photos and provides children with helpful resources and suggests that they get in touch with a trusted adult.
Communication Safety in iOS 17 is expanding worldwide, so it will be available in more countries than it was previously. It will be turned on by default for children under the age of 13 who are signed in to their Apple ID and who are part of a Family Sharing group.
Parents can enable it for older teens as well, with the option to turn it on available in the Settings app under Screen Time.
In addition to being available worldwide, Communication Safety’s protections will expand to AirDrop, the systemwide photo picker, FaceTime messages, and third-party apps in addition to the Messages app.
Offline Maps
The Maps app works offline in iOS 17, providing access to turn-by-turn directions and information for the area that you’re in even if you do not have a cellular or Wi-Fi connection.
Offline Maps is useful if you’re planning to travel somewhere remote, such as when hiking or traveling in rural areas. Downloading a map can be done by putting in a location, tapping on the “More” button, and then choosing the “Download Map” option.
You can select the size of the area that you want to save, and multiple areas can be downloaded. You can manage Map downloads by opening up the Maps app, tapping on your profile picture, and selecting Offline Maps.
Maps can be updated, deleted, renamed, and resized, and you can download new maps from this interface too. Downloads can be set to automatically update, and there is an option to use offline maps even when a connection is available.
Critical Medication Reminders
The Medications feature in the Health app can send a follow up reminder if you haven’t marked a medication as taken 30 minutes after the initial notification.
Apple also plans to add a Critical Alerts feature for important medications that will appear on the Lock Screen and play a sound even if the iPhone is muted or a Focus mode is turned on.
Read More
More information on the additions in the iOS 17 update can be found in our iOS 17 roundup.
This article, “iOS 17: All the Safety Features in the Latest iPhone Update” first appeared on MacRumors.com
Discuss this article in our forums
Reddit is Fun ‘what’s next?’ update, so long Reddit!
submitted by /u/return2ozma [link] [comments]
submitted by /u/return2ozma
[link] [comments]
Schools Say US Teachers’ Retirement Fund Was Breached By MOVEit Hackers
An anonymous reader quotes a report from TechCrunch: Two U.S. schools have confirmed that TIAA, a nonprofit organization that provides financial services for individuals in academic fields, has been caught up in the mass-hacks targeting MOVEit file transfer tools. Middlebury College in Vermont and Trinity College in Connecticut both released security notices confirming they experienced data breaches as a result of a security incident at the Teachers Insurance and Annuity Association of America, or TIAA. According to its website, TIAA serves mire than five million active and retired employees participating at more than 15,000 institutions and manages $1.3 trillion in assets in more than 50 countries.
Both of the security notices confirm that TIAA was affected by hackers’ widespread exploitation of a flaw in MOVEit Transfer, an enterprise file transfer tool developed by Progress Software. The mass-hack has so far claimed more than 160 victims, according to Emsisoft threat analyst Brett Callow, including the U.S. Department of Health and Human Services (HHS) and Siemens Energy. Only 12 of these victims have confirmed the number of people affected, which already adds up to more than 16 million individuals.
While TIAA notified affected schools of its security incident, the organization has yet to publicly acknowledge the incident. In response to a Twitter user questioning the organization’s silence, TIAA responded saying that its offices were closed. It’s not yet known how many organizations have been impacted as a result of the cyberattack on TIAA. TIAA has not yet been listed on the dark web leak site of the Russia-linked Clop ransomware gang, which has claimed responsibility for the ongoing MOVEit cyberattacks.
Read more of this story at Slashdot.
An anonymous reader quotes a report from TechCrunch: Two U.S. schools have confirmed that TIAA, a nonprofit organization that provides financial services for individuals in academic fields, has been caught up in the mass-hacks targeting MOVEit file transfer tools. Middlebury College in Vermont and Trinity College in Connecticut both released security notices confirming they experienced data breaches as a result of a security incident at the Teachers Insurance and Annuity Association of America, or TIAA. According to its website, TIAA serves mire than five million active and retired employees participating at more than 15,000 institutions and manages $1.3 trillion in assets in more than 50 countries.
Both of the security notices confirm that TIAA was affected by hackers’ widespread exploitation of a flaw in MOVEit Transfer, an enterprise file transfer tool developed by Progress Software. The mass-hack has so far claimed more than 160 victims, according to Emsisoft threat analyst Brett Callow, including the U.S. Department of Health and Human Services (HHS) and Siemens Energy. Only 12 of these victims have confirmed the number of people affected, which already adds up to more than 16 million individuals.
While TIAA notified affected schools of its security incident, the organization has yet to publicly acknowledge the incident. In response to a Twitter user questioning the organization’s silence, TIAA responded saying that its offices were closed. It’s not yet known how many organizations have been impacted as a result of the cyberattack on TIAA. TIAA has not yet been listed on the dark web leak site of the Russia-linked Clop ransomware gang, which has claimed responsibility for the ongoing MOVEit cyberattacks.
Read more of this story at Slashdot.
Cloud Adoption Frameworks – The AOD Model
In today’s digital age, cloud adoption has become a necessity for businesses to stay ahead of the game. However, many
The post Cloud Adoption Frameworks – The AOD Model appeared first on ReadWrite.
In today’s digital age, cloud adoption has become a necessity for businesses to stay ahead of the game. However, many organizations struggle with adapting and optimizing their infrastructure while delivering outstanding services to their customers. That’s where Cloud Adoption Frameworks come into play, offering a structured approach to cloud migration and management. In this article, we’ll delve into one such framework – the AOD Model – which helps businesses balance connections between on-premises and cloud environments for hybrid infrastructures. Let’s explore how this model can help modernize your IT operations and drive business results.
The AOD Model
The AOD Model, or the Adapt-Optimize-Deliver Model, is a cloud adoption framework/strategy designed to help businesses successfully migrate their operations to the cloud and optimize their hybrid infrastructures.
At its core, the AOD Model consists of three essential layers: The Foundation Layer, which establishes a solid foundation for teams to build on; The Migration Layer, which helps businesses plan and execute successful cloud migrations; and The Modernization Layer, which provides tools and strategies for optimizing applications in the cloud.
One of the most significant benefits of using the AOD model is that it offers guidance on balancing connections between different environments. This enables companies to maintain secure connections with legacy systems while taking advantage of all modern technologies offer.
In addition, implementing this adaptable framework can help organizations streamline their processes through automation and other best practices. By breaking down complex tasks into manageable steps, businesses can improve efficiency while reducing downtime during migration.
With its focus on balancing connectivity across multiple environments and streamlining processes through automation and best practices –the AOD model presents an excellent option for companies looking to adopt or optimize their use of Google Cloud services.
The Three Layers of the AOD Model
The AOD model is a comprehensive cloud adoption framework that helps organizations to successfully migrate, operate, and optimize their workloads on the cloud. The model consists of three layers – Application, Operations, and Data.
The first layer of the AOD model is the Application layer which focuses on helping organizations adapt their applications for running in a cloud environment. This involves identifying which applications can be migrated to the cloud and how they can be modernized to take advantage of cloud-native features such as auto-scaling and serverless computing.
The second layer is the Operations layer which addresses operational concerns such as governance, security, compliance, monitoring, and management. This layer ensures that IT operations align well with business objectives by providing an agile foundation for managing hybrid infrastructures.
There’s the Data Layer – where data becomes more accessible through migration into Google Cloud services like BigQuery or leveraging Anthos configurations alongside GCP services like Kubernetes Engine clusters, so you have balanced connections between multiple clouds under a single-pane-of-glass view.
Each layer of this framework provides guidelines for optimizing resources while reducing costs incurred during cloud migration projects, thereby enabling businesses to deliver efficiently on their mission-critical objectives across all platforms involved in hybrid infrastructure deployments requiring significant orchestration challenges at scale..
The Benefits of the AOD Model
The AOD Model is a well-crafted framework that offers numerous benefits to organizations in their cloud adoption journey. The model helps companies to better understand the various stages of cloud migration and how they can adapt, optimize, and deliver their services on hybrid infrastructures.
One of the most significant advantages of using the AOD Model is its ability to enable balanced connections between different components within an organization’s IT infrastructure. This allows for seamless communication between applications, data centers, and public clouds, enhancing overall efficiency.
The AOD Model also provides a standardized approach toward cloud migration planning, enabling organizations to effectively manage costs associated with this process while reducing operational complexities. With clear guidelines available through each implementation stage, an organization has greater control over its resources and budget throughout the entire project lifecycle.
Additionally, businesses can improve security protocols around data protection policies by implementing the AOD Model as part of an organization’s cloud adoption strategy. The framework offers a comprehensive approach to identifying risks associated with transferring sensitive information across different environments, which helps enhance compliance requirements.
Adopting the AOD Model brings numerous benefits, such as improved agility when responding rapidly to market changes or competitive pressures. Additionally, increased flexibility through hybrid solutions leads to more efficient use of resources resulting in cost savings for your business over time.
How to Implement the AOD Model
Implementing the AOD Model requires a comprehensive approach. The framework provides clear guidance on how to adapt, optimize, and deliver hybrid infrastructures seamlessly. Here are some critical steps to consider when implementing the AOD model.
Firstly, assess your current infrastructure and identify areas that need improvement. This will help you determine where the AOD framework can be applied effectively.
Secondly, establish a clear strategy for cloud migration that aligns with your business goals and objectives. This should include identifying which applications should be migrated first and determining the right cloud platform for each application.
Thirdly, create a balanced connection between your on-premises infrastructure and public or private clouds. This will ensure that data is transferred smoothly across all environments.
Fourthly, use automation tools to streamline processes such as deployment, scaling, monitoring, and security management. These tools will help you maximize efficiency while minimizing manual errors.
Monitor your performance metrics regularly to ensure optimal results. Continuously evaluate your progress against established benchmarks so you can make necessary adjustments along the way.
By following these steps in implementing the AOD Model in Google Cloud adoption frameworks, businesses can get one step closer towards delivering better services through optimized hybrid infrastructures without any hassle.
Conclusion
The AOD Model is a comprehensive framework that can guide organizations through the process of cloud adoption. It provides a structured approach to cloud migration and helps companies adapt, optimize, and deliver hybrid infrastructures.
By breaking down the cloud adoption process into three layers – Adopt, Optimize, and Deliver — the AOD Model makes it easier for organizations to identify their goals and prioritize their efforts. The model also emphasizes the importance of balanced connections between different systems to ensure seamless integration.
Implementing the AOD Model requires careful planning and collaboration between various stakeholders within an organization. However, by following this framework’s guidelines, businesses can successfully migrate to Google Cloud while minimizing risks and maximizing benefits.
References
[1] (2015). A Multilevel Authentication based on the RFID technique for a Multiple Mobile Cloud user in Cloud storage: A Survey. IJRA, 8(2), 371-375. https://doi.org/10.17812/ijra.2.8(63)2015
[2] Isa, Suhaimi, Noordin, Harun, Ismail, Teh (2019). Cloud computing adoption reference model. IJEECS, 1(16), 395. https://doi.org/10.11591/ijeecs.v16.i1.pp395-400
[3] Gangwar, Date, Ramaswamy (2015). Developing a Cloud-Computing Adoption Framework. Global Business Review, 4(16), 632-651. https://doi.org/10.1177/0972150915581108
[4] Al-Ramahi, Odeh, Alrabie, Qozmar (2022). The TOEQCC Framework for Sustainable Adoption of Cloud Computing at Higher Education Institutions in the Kingdom of Jordan. Sustainability, 19(14), 12744. https://doi.org/10.3390/su141912744
[5] Sudyana, Lizarti, Erlin (2019). Forensic Investigation Framework on Server Side of Private Cloud Computing. LKJITI, 181. https://doi.org/10.24843/lkjiti.2019.v10.i03.p06
[6] Gangwar, Date, Ramaswamy (2015). Understanding determinants of cloud computing adoption using an integrated TAM-TOE model. Journal of Enterprise Information Management, 1(28), 107-130. https://doi.org/10.1108/jeim-08-2013-0065
[7] Ahmed (2020). Technology organization environment framework in cloud computing. TELKOMNIKA, 2(18), 716. https://doi.org/10.12928/telkomnika.v18i2.13871
[8] (2022). Phase Model of Adopting Cloud Computing in the Implementation of E-government. JRSE, 7(4). https://doi.org/10.53469/jrse.2022.04(07).18
[9] Owusu (2020). Determinants of Cloud Business Intelligence Adoption Among Ghanaian SMEs. International Journal of Cloud Applications and Computing, 4(10), 48-69. https://doi.org/10.4018/ijcac.2020100104
[10] Aldahwan, Ramzan (2022). Quadruple Theories Based Determinants and their Causal Relationships Affecting the Adoption of Community Cloud in Saudi HEI. BioMed Research International, (2022), 1-10. https://doi.org/10.1155/2022/2382535
Featured Image Credit: Photo by Roberto Nickson; Pexels; Thank you!
The post Cloud Adoption Frameworks – The AOD Model appeared first on ReadWrite.
Apple’s Card partnership could move from Goldman Sachs to American Express
Illustration: The Verge
The Apple Card may soon no longer be backed by Goldman Sachs. According to a report from The Wall Street Journal, Goldman Sachs is in talks to offload its partnership with Apple to American Express.
Apple launched its credit card in partnership with Goldman Sachs in 2019 and, more recently, made its new Pay Later service available to users in March. While Apple’s new financial division is handling the lending side of its buy now, pay later service, it’s still working with Mastercard and Goldman Sachs to enable the program.
But now, sources tell the Journal that Goldman Sachs wants to exit from both of these partnerships and have American Express take its place. According to the Journal, a deal with American Express isn’t “imminent or assured.” It also wouldn’t happen anytime soon, given that Apple would have to agree to the new partnership. Apple is reportedly aware of these discussions but didn’t immediately respond to The Verge’s request for comment.
The shift to American Express could affect where Apple cardholders can use their card. While Apple Cards are currently issued by Mastercard, which is accepted at a majority of retailers across the US, American Express has a bit less reach, although this seems to have improved in recent years.
Illustration: The Verge
The Apple Card may soon no longer be backed by Goldman Sachs. According to a report from The Wall Street Journal, Goldman Sachs is in talks to offload its partnership with Apple to American Express.
Apple launched its credit card in partnership with Goldman Sachs in 2019 and, more recently, made its new Pay Later service available to users in March. While Apple’s new financial division is handling the lending side of its buy now, pay later service, it’s still working with Mastercard and Goldman Sachs to enable the program.
But now, sources tell the Journal that Goldman Sachs wants to exit from both of these partnerships and have American Express take its place. According to the Journal, a deal with American Express isn’t “imminent or assured.” It also wouldn’t happen anytime soon, given that Apple would have to agree to the new partnership. Apple is reportedly aware of these discussions but didn’t immediately respond to The Verge’s request for comment.
The shift to American Express could affect where Apple cardholders can use their card. While Apple Cards are currently issued by Mastercard, which is accepted at a majority of retailers across the US, American Express has a bit less reach, although this seems to have improved in recent years.