Comment Upgrade to a new OS after 5 updates. (Score 1) 319
Much easier to sleep at night.
Much easier to sleep at night.
There are multiple reasons why one wants to obtain a patent, including denying competitors use.
These are two entirely different aspects of the issue.
Earliest detection can lead to stopping a problem or getting rid of it with minor treatment or life style changes, so health systems are promoting "wellness" programs involving early detection/monitoring.
If we manage early detection on a large % of the population, we won't need as much "treatment" and "cures."
That would decrease the cost & need for healthcare overall and lead to a healthier population. A lot of companies are working on aspects of this.
People get granted access to a specific machine only for that work and it is kept isolated off all network connections.
It is not malice or incompetence but a desire make as much money as possible by keeping their actions hidden.
Like an open back door into your home usable by the US Govt. would make you safer, right? Right FBI director James Comey?
That will happen. It is only a matter of time.
Given the numerous Android security problems and APPs with hidden data collection issues, I'ld say forget 'Force Touch' as a reason to switch.
Boy, this takes the cake.
Of course China is going to go along with this hair-brained idea, right?
The number cited in the Slashdot summary is a US Patent Application and not an issued patent.
An issued Patent is one which would be written as the number in the Subject line of the above post.
And if you are doing nefarious business, Apple plainly states they need a proper court warrant to turn over any data.
Well, Apple has been consistent about what it sells and it is not data to aggregators.
Given the dozens and dozens of reported hacks against large orgs over the last 2 year, I can only conclude there is a large disregard for properly addressing security that starts right at the top of the C suite in big companies.
That is at least as troubling for smaller companies, who likely have less resources to deal with security.
It is easier to change the specification to fit the program than vice versa.