Tuesday, August 24, 2010

How To Delete History Recordingdirect Tv

extends Apple could make their devices recognize the user in an intelligent way

requested a new Apple patent application describing methods to allow the iPhone and iPad" feel "to the user, sensing your voice, your face, behavior patterns and even beats of his heart. If detected unauthorized use, could activate different types of measures.


For example, if the IOS device detects that a user is not authorized, you can start taking pictures and send them an e-mail, along with GPS coordinates, records passwords, phone calls and possibly several other activities. The owner may also be able to safeguard their data remotely, with the ability to "turn off" your device after making the backup.


This patent application seems to be a version of "supercharged" feature Find my iPhone, which is available with the MobileMe service along with other hardware and software features. While features may described by this patent application never find a path towards achieving real products, it makes sense that Apple wants to increase the security of their devices, especially taking into account the increase are taking its number of corporate clients.

to here, was my direct translation Gizmodo article. My personal opinion about it is somewhat ambiguous: while on one hand I like the security that an application like this could offer the other do not like the idea of \u200b\u200bknowing that not only the user could use the features but also (and security) Apple and its marketing division, whether to sell the information to others in the style Google, or in order to "improve its products."

am a person who is serious about privacy, although I know many do not mind Google and Facebook sell your data so that people from other advertising companies to approach them based on their tastes and habits of the Internet. In any case, I hope that if they become reality such characteristics (or some of them), they require a particular software that enables them. Because the truth that have devices that can monitor the user without knowing that this sounds like too much power for a few hands ... let alone what a hacker could do if he were to enter the database.

0 comments:

Post a Comment