The Nexus Player hasn’t had the best of launches so far: first it was delayed by the FCC approval, and now pre-orders have opened up, the shipping is already slipping.
It’s not clear as to if the 3-4 weeks shipping time is due to stock restraints, or if that’s the intended lead-time it takes to ship the Nexus Player, but I would put money on it being stock issues.
But let us know in the comments below – did you order the Nexus Player, and if so did it show anything other than a 3-4 week shipping time?
Earlier this week, web censorship blog Great Fire suggested that hackers aligned with Chinese authorities were using man-in-the-middle attacks in order to harvest Apple ID information from Chinese users that visited Apple’s iCloud.com website.
In a newly released support document (via The Wall Street Journal), Apple has confirmed that it is aware of the “intermittent organized network attacks” on iCloud users, but says that its own servers have not been compromised.
Apple is deeply committed to protecting our customers’ privacy and security. We’re aware of intermittent organized network attacks using insecure certificates to obtain user information, and we take this very seriously. These attacks don’t compromise iCloud servers, and they don’t impact iCloud sign in on iOS devices or Macs running OS X Yosemite using the Safari browser.
Apple’s support document goes on to stress the importance of digital certificates, suggesting that users who see an invalid certificate warning in their browser while visiting iCloud.com should not proceed. The company also outlines how users can verify that their browser is connected to iCloud.com and not a third-party man-in-the-middle website.
Apple asks users to make sure that a green lock icon is visible in Safari and that the message “Safari is using an encrypted connection to http://www.icloud.com” is displayed when the lock icon is clicked. Apple also has verification instructions for both Chrome and Firefox.
Unfortunately, many of the victims falling prey to the fake iCloud sites are not using secure browsers that issue warnings when fake websites are visited. According to Great Fire, many Chinese users access the Internet through popular Chinese browser Qihoo, which does not let users know that a fake site is harvesting their information.
The attack works by redirecting Chinese users attempting to access iCloud.com to a fake website that resembles the iCloud website. Users that log into the fake site provide attackers with logins and passwords that can be used to access contacts, messages, photos, and documents stored within iCloud.
Though Great Fire has suggested that Chinese authorities may be involved in the attacks, a spokeswoman for China’s Foreign Ministry (via CNBC) said that Beijing was “resolutely opposed” to hacking.
Chinese users should switch to a trusted browser like Firefox or Chrome to avoid falling prey to the fake iCloud.com website, or use a VPN to bypass the redirection and log in directly to iCloud.com. Two-factor authentication should also be turned on as it can prevent unauthorized users from logging into an iCloud account even when a username and password are obtained.
Note: Due to the political nature of the discussion regarding this topic, the discussion thread is located in our Politics, Religion, Social Issues forum. All forum members and site visitors are welcome to read and follow the thread, but posting is limited to forum members with at least 100 posts.
Yesterday, Primate Labs highlighted some Geekbench 3 benchmarking results for the new 3.5 GHz 27-inch Retina 5K iMac, unsurprisingly showing the machine performing better than slower-clocked Core i5 chips in non-Retina models but below that of high-end Core i7 chips also available in the machines since their late 2013 introduction.
Primate Labs’ John Poole noted that once benchmarks for the high-end Retina 5K iMac with Intel’s 4.0 GHz Core i7-4790K chip started appearing, they could show the new iMac outperforming the low-end Mac Pro, and that is indeed the case as revealed today and highlighted in an updated version of Poole’s blog post from yesterday.
The 4.0 GHz Retina 5K iMac clocks in with a score of 4438 on the single-core 64-bit benchmarking test, while multi-core testing achieves a score of 16407. Across the two tests, the new high-end Retina iMac scores 11-13 percent higher than the fastest non-Retina model due to the faster processor included on the Retina model.
Compared to the low-end Mac Pro, which runs on a quad-core 3.7 GHz Xeon E5-1620 v2, the high-end Retina iMac clocks in over 13 percent higher on multi-core testing, although it is unsurprisingly outclassed by higher-level Mac Pro models carrying processors with more cores.
Both Retina iMac processor options outperform all Mac Pro models on single-core benchmarks, but this is unsurprising as the Xeon processors used in the Mac Pro sacrifice single-core clock speed for many more cores and other benefits that enhance performance for professional-level applications that can take advantage of the multiple cores.
With the iPad Air 2 and the iPad mini 3 set to hit stores any day now, retailers have begun offering some discounts on the previous-generation iPad Air and Retina iPad mini 2, especially on higher-capacity models that have been discontinued.
On its own website, Apple offers the original iPad Air in 16 and 32GB capacities only, with prices at $399 and $449, respectively, for Wi-Fi models, and $529/$579 for Wi-Fi+ Cellular models. The same is true for the iPad mini 2, which is available in 16 and 32GB capacities at $299/$349 for Wi-Fi and $429/$479 for Wi-Fi + Cellular.
Retailers are not offering discounts on the iPad Air and iPad mini 2 models that Apple continues to sell, but the discontinued higher capacity 64 and 128GB models are available at lower prices. Customers who don’t care about Touch ID or the new features in the iPad Air 2 but want more storage capacity will be able to get a solid deal on an older-generation model.
The Wi-Fi only 64GB iPad Air in Space Gray can be purchased for $499 from Best Buy, as can the 64GB Silver Wi-Fi model. The Wi-Fi only 128GB iPad Air in Silver can be purchased from B&H Photo for $599.
Several sites are also offering deals on the higher-capacity Wi-Fi + Cellular iPad Air models. The 64GB Cellular iPad Air in Silver from AT&T is available for $599 from Adorama. The 64GB Cellular iPad Air in Space Gray from AT&T is also available for $599, from Amazon, Adorama, and B&H Photo.
The 128GB Cellular iPad Air in Silver from AT&T is available for $829.99 from Best Buy and the 128GB Space Gray AT&T Cellular iPad is available for $699 from Adorama, a hefty discount of $230 off the original price.
iPad mini 2
Higher-capacity iPad mini 2 models are also available at steep discounts, and these iPads are a particularly good deal as the only difference between the mini 2 and the mini 3 is Touch ID and a gold color option.
Though sites have not yet begun offering discounts on the current-generation iPad Air 2 and iPad mini 3, Best Buy is accepting older iPads as trade-ins towards the cost of a new iPad Air 2 or iPad mini 3. The company is guaranteeing a minimum of $175 towards the iPad mini 3 with the trade in of an iPad 2 or newer, and a minimum of $200 towards the iPad Air 2 with the trade in of an iPad 2 or newer.
It remains unclear when the new iPad Air 2 and iPad mini 3 will be available in stores, but Apple continues to offer pre-orders for the devices on its website, with prices beginning at $499 and $399, respectively.
MacRumors is an affiliate partner with some of these vendors.
While Apple touted the power of the new A8X chip used in the iPad Air 2 at the company’s media event last week, the company as usual opted not to disclose exact specifications on the part, leaving the details up to rumor and speculation until the device starts making its way into the hands of users and teardown experts.
But with Apple shipping out orders to customers for delivery as soon as tomorrow, it appears that at least one user has already gotten his or her hands on the iPad Air 2 and run a Geekbench 3 benchmarking test on it (via Gizmobic). If the result is genuine, and Primate Labs founder John Poole tells MacRumors that it appears to be, it reveals that the A8X contains an unusual triple-core CPU configuration running at 1.5 GHz and paired with 2 GB of RAM.
The extra core and 100 MHz faster clock speed compared to the A8 found in the iPhone 6 and 6 Plus means the iPad Air 2 scores roughly 13 percent higher on single-core benchmarks and 55 percent higher on multi-core benchmarks than Apple’s latest iPhones.
More details will undoubtedly be unveiled in the coming days as teardown experts take the iPad Air 2 apart and chip experts examine the internal layout of the chip.
The Pokemon Company today released Camp Pokemon, an official Pokemon game that stars real Pokemon characters. Because the game is aimed at kids between 6 and 8 years of age, it’s unlikely to be of interest to adults, but it does suggest The Pokemon Company is committed to bringing Pokemon games to iOS.
In Camp Pokemon, kids are tasked with exploring an island “filled with fun Pokemon-themed activities” that include searching for Pokemon to earn pins and playing a variety of Pokemon mini games to earn rewards.
– Find the Pokémon: Use a spyglass to search for virtual Pokémon and earn their Pins. Earn Rewards to unlock new levels and search for other Pokémon in different environments.
– Poké Ball Throw: Launch Poké Balls at cardboard cutouts of Pokémon hiding in the grass and knock them down. Earn Rewards to unlock the Rock and Water environments.
– Pokémon Evolutions: Test your knowledge of Pokémon Evolutions by choosing the correct Pokémon missing from the Evolution chain.
– Battle Matchups: Practice type matchups, an important skill in Pokémon battles, by choosing which type is strong against the given Pokémon.
– Pokémon in Focus: Choose the Pokémon that matches the shadow projected on the tent.
– My Cabin: In this home base, campers can find their Pin Book, Photo Book, and Bulletin Board.
– Photo Booth: Create camp memories by taking photos with the iPad, iPhone, or iPod touch camera, adding stickers to the images, and saving the pictures to the app’s Photo Book or the Camera Roll on the camper’s device.
– Mystery Cave: What could be hiding in the Mystery Cave? To find out, campers will need to earn the right to enter!
As noted by our sister site TouchArcade, Camp Pokemon is going to be a “snooze-fest” for adults, but it makes it “obvious that The Pokemon Company is serious about iOS,” hinting that additional Pokemon games could come to iOS in the future.
Along with Camp Pokemon, The Pokemon Company also released Pokemon TCG Online on iOS in late September, bringing the card trading game to the iPad for the first time. Pokemon TCG was the first official Pokemon game to be released on iOS.
Camp Pokemon is a free app for the iPad and iPhone and can be downloaded from the App Store. [Direct Link]
Need a little help getting through your next big math exam? MicroBlink has an app that could help you study more effectively — perhaps too effectively. Its newly unveiled PhotoMath for iOS and Windows Phone (Android is due in early 2015) uses your smartphone’s camera to scan math equations and not only solve them, but show the steps involved. Officially, it’s meant to save you time flipping through a textbook to check answers when you’re doing homework or cramming for a test. However, there’s a concern that this could trivialize learning — just because it shows you how to solve a problem doesn’t mean that the knowledge will actually sink in. And if teachers don’t confiscate smartphones at the door, unscrupulous students could cheat when no one is looking. The chances of that happening aren’t very high at this stage, but apps like this suggest that schools might have to be vigilant in the future.
Following reports yesterday that China was secretly collecting data from iCloud users, Apple has confirmed to Dow Jones that it is aware of network attacks on its service. The iPhone maker said it knows about “intermittent organized network attacks” on people who were trying to access iCloud.com, although the company failed to mention China specifically in the statement to Dow Jones. Apple did say these recent attacks had not compromised its servers, and added that iOS and desktop users (who running the latest version of OS X) should not be worried — it appears this issue was limited to the iCloud website. We’ve reached out to Apple for comment and will keep you in the loop should any more details emerge soon.
Update: Below is Apple’s official statement on the matter, along with a link to some browser security instructions.
We’re aware of intermittent organized network attacks using insecure certificates to obtain user information, and we take this very seriously. These attacks don’t compromise iCloud servers, and they don’t impact iCloud sign in on iOS devices or Macs running OS X Yosemite using the Safari browser.
Source: Dow Jones
Best known for his roles in The Office and The Rocker, actor-turned-producer Rainn Wilson is reportedly getting ready to bring some of Vine’s biggest personalities to TV. According to Deadline, Wilson is set to produce a comedy show called Hollywood and Vine, featuring popular members of Twitter’s video-focused social network, like Curtis Lepore, Jerry Purpdrank, Simone Shepherd and a few others. Hollywood and Vine, which is said to be written by Lance Krall (It’s Always Sunny in Philadelphia), will be based on following the lives of these Vine personalities as they try to make it into the crazed world that is Hollywood. A co-creator of Soul Pancake, the media company behind characters such as Kid President, Wilson is quite familiar with people who have gained fame thanks to the internet — now it’s just a matter of translating that to TV instead of YouTube.
[Image credit: pamhule/Flickr]
Via: The Verge
I can’t stress enough how important it is to use a security lock screen on your mobile devices. If you ever misplace your phone or tablet, no one will be able to get into the device. However, constantly entering a code to unlock your device is a royal pain in the you know what.
Finally, Finally, Finally Google has implemented Trusted Devices in Android. With Android Lollipop and a new feature called Smart Lock, you will be able to set any Bluetooth device, NFC tag, or even your face as a way to automatically unlock your device so you won’t have to constantly enter your PIN code or swipe a pattern over 100 times per day.
In this guide, I will show you how to use Smart Lock to bypass the security lock screen when your phone or tablet is safe and in your possession. If you prefer to watch instead of reading, I included a video at the bottom of this post. Note: If you don’t have Android Lollipop, you can still get the same features, and then some, using Delayed Lock. Check out that guide here.
Bluetooth devices are probably the best to setup because you know your phone is safe when it’s connected to them. For example, if you own an Android Wear smartwatch (or any other Bluetooth smartwatch that works with your phone), it’s always on your wrist. If it’s set as a trusted device, you won’t have to unlock your phone as long as it’s connected. However, if you leave your phone in a restaurant and walk away, your phone will lose the connection with your smartwatch and your security lock screen will go back into effect. So as you go about your normal day, you will probably never have to enter your security code. But you can rest easily knowing that if your phone is stolen or you leave it somewhere, nobody will be able to get into it. Not everyone has a smartwatch so that’s why you can also set your car’s Bluetooth hands free / stereo system or even another Bluetooth headset.
You also have the option to temporarily lock you phone even when it’s connected to one of your trusted Bluetooth devices by tapping the padlock icon on the lock screen. Your device will remain locked until you enter your code.
NFC tags is other option that is probably not going to be all that helpful for most of you. First, you have to own an NFC tag, and second, it only works when your phone or tablet is resting on the tag itself, so you can’t pick it up before turning it on.
Trusted Face is another option that Google threw in. If you remember, Face Unlock was launched with Ice Cream Sandwich as one of the security lock options, but not with Lollipop. Instead, you will only find Trusted Face in Smart Lock. The procedure for recording your face is the same as Face Unlock, but they also added an option to capture more images in different lighting environments giving you better reliability. Trusted Face isn’t really unlocking your phone, it’s a means to bypass the lock screen. So say you have enabled a PIN code for your security lock. When you turn on the phone’s display, it immediately looks for your face, but you won’t see yourself on the display like you did with Face Unlock. It does it all in the background, and if your face is recognized before you swipe, the security lock will be bypassed. If it doesn’t recognize your face, you will then have to enter your security lock. It actually works pretty well, but I couldn’t really show you on the video.
The only item that is missing in Smart Lock is WiFi. I would liked to have seen the option of adding any saved WiFi network such as your home or a friend’s house. For whatever reason, Google omitted it, and we can only hope it will be added at a later date.
To set a Trusted Device or a Trusted Face, just head into your Settings, and find Security by scrolling down. For some phones, you might have to tab over to a category. For example, Samsung phones have Security under the General tab. Tap on Security and you will see Smart Lock. After tapping Smart Lock you will have to enter your security code and then you will see two options: Trusted Devices and Trusted Face. Note: Smart Lock won’t be an option unless you have a security lock such as PIN or pattern enabled.
Trusted Devices allows you to set as many Bluetooth devices or NFC tags as you want. Bluetooth devices must already be paired to your device, but it’s also very easy to add a device that you just paired. Upon pairing a device for the first time, you will get a notification asking you if you want to set it as a Trusted Device. Just tap “Add as Trusted Device,” enter your security code, and you’re all set. If for whatever reason you swiped away the notification card, you can still add it by going to Trusted Devices through the Settings.
For NFC tags, you will only need to touch your device to any NFC tag. After it’s paired, you will then enter a name for it such as Nightstand, My Car, or whatever. Now whenever your phone or tablet is touching the NFC tag (device has to be turned on and unlocked to initiate), the security lock screen will be bypassed. It’s not the greatest implementation since most people don’t have NFC tags lying around, not to mention having to keep the tag connected to the phone at all times.
The Trusted Face option will simply walk you through the process of capturing your face.
I put together a video showing you how it all works……..
I hope this guide helped you out. If I missed something, please let me know in the comments.
Come comment on this article: How to setup Trusted Devices on Android Lollipop to automatically unlock your phone or tablet