Apple

'Something Is Rotten in the State of Cupertino' (daringfireball.net) 67

Apple's announcement that "more personalized Siri" features of Apple Intelligence would be delayed until "the coming year" reveals a troubling departure from the company's hard-earned reputation for reliability, long-time commentator John Gruber writes. Unlike other Apple Intelligence features that were demonstrated to media in June, the personalized Siri features -- promising personal context awareness, onscreen awareness, and in-app actions -- were never shown working to anyone outside Apple. Yet Apple prominently featured these capabilities in the WWDC keynote and even created TV commercials (now pulled) touting these functions to sell iPhone 16.

This represents a dangerous shift toward the pre-Jobs-return Apple that promised vaporware it couldn't deliver. Gruber writes. Apple has squandered its credibility, built meticulously over decades through consistently shipping what they promised, he writes. Gruber's post cites the following excerpt from a 2011 story: Apple doesn't often fail, and when it does, it isn't a pretty sight at 1 Infinite Loop. In the summer of 2008, when Apple launched the first version of its iPhone that worked on third-generation mobile networks, it also debuted MobileMe, an e-mail system that was supposed to provide the seamless synchronization features that corporate users love about their BlackBerry smartphones. MobileMe was a dud. Users complained about lost e-mails, and syncing was spotty at best. Though reviewers gushed over the new iPhone, they panned the MobileMe service.

Steve Jobs doesn't tolerate duds. Shortly after the launch event, he summoned the MobileMe team, gathering them in the Town Hall auditorium in Building 4 of Apple's campus, the venue the company uses for intimate product unveilings for journalists. According to a participant in the meeting, Jobs walked in, clad in his trademark black mock turtleneck and blue jeans, clasped his hands together, and asked a simple question: "Can anyone tell me what MobileMe is supposed to do?" Having received a satisfactory answer, he continued, "So why the fuck doesn't it do that?"

For the next half-hour Jobs berated the group. "You've tarnished Apple's reputation," he told them. "You should hate each other for having let each other down." The public humiliation particularly infuriated Jobs.
Gruber adds: Tim Cook should have already held a meeting like that to address and rectify this Siri and Apple Intelligence debacle. If such a meeting hasn't yet occurred or doesn't happen soon, then, I fear, that's all she wrote. The ride is over. When mediocrity, excuses, and bullshit take root, they take over. A culture of excellence, accountability, and integrity cannot abide the acceptance of any of those things, and will quickly collapse upon itself with the acceptance of all three.
Security

Attackers Exploit Critical Zimbra Vulnerability Using CC'd Email Addresses (arstechnica.com) 6

An anonymous reader quotes a report from Ars Technica: Attackers are actively exploiting a critical vulnerability in mail servers sold by Zimbra in an attempt to remotely execute malicious commands that install a backdoor, researchers warn. The vulnerability, tracked as CVE-2024-45519, resides in the Zimbra email and collaboration server used by medium and large organizations. When an admin manually changes default settings to enable the postjournal service, attackers can execute commands by sending maliciously formed emails to an address hosted on the server. Zimbra recently patched the vulnerability. All Zimbra users should install it or, at a minimum, ensure that postjournal is disabled.

On Tuesday, Security researcher Ivan Kwiatkowski first reported the in-the-wild attacks, which he described as "mass exploitation." He said the malicious emails were sent by the IP address 79.124.49[.]86 and, when successful, attempted to run a file hosted there using the tool known as curl. Researchers from security firm Proofpoint took to social media later that day to confirm the report. On Wednesday, security researchers provided additional details that suggested the damage from ongoing exploitation was likely to be contained. As already noted, they said, a default setting must be changed, likely lowering the number of servers that are vulnerable. [...]

Proofpoint has explained that some of the malicious emails used multiple email addresses that, when pasted into the CC field, attempted to install a webshell-based backdoor on vulnerable Zimbra servers. The full cc list was wrapped as a single string and encoded using the base64 algorithm. When combined and converted back into plaintext, they created a webshell at the path: /jetty/webapps/zimbraAdmin/public/jsp/zimbraConfig.jsp. Proofpoint went on to say: "Once installed, the webshell listens for inbound connection with a pre-determined JSESSIONID Cookie field; if present, the webshell will then parse the JACTION cookie for base64 commands. The webshell has support for command execution via exec or download and execute a file over a socket connection."

Education

2014 Geek Gift Guide 113

With the holidays coming up, Bennett Haselton has updated his geek-oriented gift guide for 2014. He says: Some of my favorite gifts to give are still the ones that were listed in several different previously written posts, while a few new cool gift ideas emerged in 2014. Here are all my current best recommendations, listed in one place. Read on for the list, or to share any suggestions of your own.
Businesses

Patent Expires On Best Selling Drug of All Time 491

Hugh Pickens writes "The U.S. patent has just expired on Lipitor, the best-selling drug of all time, as the first generic versions go on sale, marking the end of a brand that has dominated the drug industry, lowered the cholesterol of tens of millions of patients, and generated $10.7 billion last year in annual sales. But drug manufacturer Pfizer, dependent on Lipitor for almost one-fifth of the company's revenue, does not intend to go down without a fight. Pfizer is employing unprecedented tactics to hold onto as many Lipitor prescriptions as it can with an aggressive marketing plan and forging deals with insurers, pharmacy benefit managers and patients to meet or beat the price of its generic replacements because even at the lower price, Pfizer has a huge profit margin because of the relatively low cost of materials for Lipitor. Some deals require pharmacies to reject prescriptions for low-cost generics and substitute a discounted name-brand Lipitor while other deals block generic makers from mail-order services that account for an estimated 40 percent of all Lipitor prescriptions. 'Pfizer's tactic of dressing up as a generics company is pulling the rug under the incentive system created to foster the development of generic drugs,' says attorney David A. Balto."
Bitcoin

Amir Taaki Answers Your Questions About Bitcoin 262

Last week, you asked questions (many rather pointed!) of Amir Taaki, co-founder of Bitcoin Consultancy, which develops Bitcoin related services, exchanges and Bitcoin itself. (They also own Britcoin.co.uk.) Says Taaki: "When creating video games I spent much time imagining tools to make artists lives easier, and how we could keep funding developers to write free software. One contribution of mine to the community was a site where developers could get funded for developing features and I'd love nothing more than to pay people to write free software." With regard to Bitcoin, similarly, "We need fulltime developers thinking about the problems and solutions needed to keep this system running. We aim to get all the creative thinkers from the community and provide a mechanism for enabling their work." Below find his answers to the questions readers raised.
Advertising

Power To the Pop-Ups 204

Slashdot frequent contributor Bennett Haselton writes a piece advocating for Pop-Ups and even more obtrusive advertising. But not for the reasons you might think. He says "Annoying pop-up ads have been a great friend to Internet freedom, by enabling the operation of proxy sites that would be too expensive to operate otherwise. With the rising costs of making new proxy sites to stay ahead of the 'censorware' companies, even more intrusive ads could be an even bigger friend to Internet freedom. Got any ideas for how those more intrusive ads could work?" Clicky clicky below to read his point.
Image

Drupal Multimedia Screenshot-sm 130

Michael J. Ross writes "Of the leading content management systems used by developers for creating websites, Drupal is highly regarded for many characteristics, including a much smaller initial footprint, compared to Joomla and other CMSs. Yet some developers find this a disadvantage as well, because one of the most common criticisms leveled against Drupal is its lack of built-in support for images and multimedia elements — thereby forcing new Drupal developers to choose from the thousands of contributed Drupal modules those that would be optimal for implementing their websites' multimedia functionality. Aaron Winborn's book Drupal Multimedia is intended as a guide to help such developers." Keep reading for the rest of Michael's review.
Privacy

Who's Trading Your E-mail Addresses? 355

Bennett Haselton is back with another piece on e-mail privacy. He starts "On April 14, 2007, I signed up for an AmeriTrade account using an e-mail address consisting of 16 random alphanumeric characters, which I never gave to anyone else. On May 15, I started receiving pump-and-dump stock spams sent to that e-mail address. I was hardly the first person to discover that this happens. Almost all of the top hits in a Google search for "ameritrade spam" are from people with the same story: they used a unique address for each service that they sign up with, so they could tell if any company ever leaked their address to a spammer, and the address they gave to AmeriTrade started getting stock spam. (I don't actually do that with most companies where I create accounts. But after hearing all the AmeriTrade stories, I created an account with them in April just for the purpose of entering a unique e-mail address and seeing if it would get leaked.)" Bennett continues on if you're willing to click the link.

Bush, Kerry, and Nader Respond to Youth Voter Questions 1312

Slashdot readers both contributed and helped moderate questions for the New Voters Project Presidential Youth Debate. You can read the answers below, but if you'd like to see an expanded introduction, thumbnails of the candidates, and different formatting, go to the Youth Debate page. And that's not all: We're supposed to get candidates' rebuttals on or about October 17, so don't touch that dial!
The Courts

Attorney Mike Godwin Answers 'Cyberlaw' Questions 322

In this Q & A session, in which attorney Mike Godwin answers your questions, you'll see talk about many topics that get chewed up on Slashdot over and over again -- except this time the person speaking actually knows what he's talking about. Note especially the bit about liability for what you post online. A *lot* of people who post on Slashdot ought to read that part...
The Courts

Answers On LUGs, Life, and Linux in Iraq 318

Adam Davidson is an American reporter who has been in Baghdad for many months, and in his 'spare time' helped start Iraq's first LUG. We sent him your questions last week, and he's replied in great detail, not only about the LUG itself but also with a rare 'geek's eye view' of daily life in Baghdad, and comments about how the Iraqi IT infrastructure (and laws controlling it) are being (re)built.
News

Piers Anthony Unbound 430

Today we present Piers Anthony's responses to Slashdot questions about topics ranging from Linux shortcomings to female sexuality. Piers asked us, in a followup email after we received his answers, if we considered them "too feisty." Hah! Is there such a thing as "too feisty" for Slashdot?
United States

Responses from Consumer Advocate Jamie Love 159

We put up the original call for questions on September 5. Jamie's travel schedule (mentioned in one of his answers) is so hectic that it is amazing he found time to answer these questons at all. But answer he did, in detail. It's going to be interesting to see how Jamie's take on tech-oriented lobbying compares with that of "commercial" lobbyist Morgan Reed, whose interview responses we hope to see in the very near future.
News

Sheet Music to Napster: Music Distribution Tech 97

Musical styles evolve like biological species evolve, in response to their environment. Musical ideas flourish -- or die off -- depending on how well their human creators are rewarded. A big factor in the evolution of musical style is us, the listeners; the next sound is cool, some old sounds are lame, Artist X now gets our dollars while Artist Y goes back to working as a waitress. Style marches on. But dollars just help steer the evolution of the machine. It's technology that decides where it can go. And to understand what influence our music technology can have, it helps to know what influences it has had. (Part two of three; here's yesterday's part one if you missed it.)
Technology

Does Peer-to-Peer Suck? 150

Peer-to-Peer: Harnessing the Power of Disruptive Technologies from O'Reilly, presents p2p as the next great thing on the Internet. Maybe. (Please - jump into this discussion). This book will tell you every technical detail you ever dreamed of knowing about peer-to-peer, but it fails to make the case that this complex, collaborative, subterranean technology will have much impact or appeal beyond the tech elite obsessively engaged in making and touting it. And, of course, keeping free -- some will say stolen -- music alive.(Read more).
News

Prior Art to Squash Database Patent? 142

Marianne Winslett asks: "I'm looking for prior art to help squash a US patent that I think should never have been granted. In particular, I am looking for applications with a relational database back end, X-windows user interface, and application code somewhere in between. Think of it as an example of a 3-tier architecture, with a very thin client and a remote relational database back end. The application must have been released by the end of 1991." The patent in question was not revealed by the submittor on advice from legal counsel. Anyone know of any application that might satisfy these requirements?
Games

Answers from Loki President Scott Draeker 165

Scott Draeker writes, "Here are my responses to the questions you sent, and a few others that had been posted." All we can say in return is, "Thanks, Scott. We really appreciate the time you took to do this."
Caldera

Using Caldera OpenLinux

Caldera Systems, who's currently IPO Bound also has created one of the most popular distributions for use in the business environment. Click below to read more about how to use Caldera OpenLinux - and thanks to Terry Collings for the review.

Slashdot Top Deals