Apple dissolves iTunes into new apps

Apple has announced that iTunes is to be replaced by Apple Music, Apple Podcasts and Apple TV.

There had been speculation that the tech giant was planning to shutter the music service it launched in 2001.

The firm also revealed a number of new privacy measures at its annual developer conference in San Jose.

A new sign-in will be an alternative to logging into apps using social media accounts, hiding the user’s email address and data.

iTunes will remain unchanged on Windows platforms, and downloads will still be available in a sidebar on the Apple Music app for Macs.

The announcements were made at the WWDC conference, where the tech giant outlines its software plans for the months ahead.


Apple's new sign in includes an email address hiding functionImage copyrightAPPLE
Image captionApple’s new sign in includes an email address-hiding function

Apple announced several new privacy measures, building on last year’s event where it pledged to jam Facebook’s tracking tools.

“Privacy is a fundamental human right,” said Apple’s software chief Craig Federighi.

He said that there will be an option for apps which request location information to have to ask every time they require it, and they will be blocked from using other markers, such as identifying Wi-Fi or Bluetooth signals.


Apple is also launching a sign-in-with-Apple login, as an alternative to logging in to a service using a social media account.

Using this login, users can choose to hide their email address, with Apple creating a random alternative address which will forward to the real mailbox.

“The unveiling of ‘Sign-in With Apple’ will concern rivals, particularly the web giants,” commented Ben Wood from CCS Insight.

“Existing sign-in services provide a simple means for single sign-in across the web. Privacy is the differentiator that will be heavily emphasised versus Facebook and Google, and represents a great marketing tool for Apple’s broader privacy stance.”

iOS 13

dark modeImage copyrightAPPLE
Image captioniOS 13 introduces Dark Mode, where apps are displayed on a black background

The next iteration of the iPhone’s operating system – iOS 13 – includes a range of changes to its interface, as well as new functions.

The new Dark Mode enables iPhone apps to be viewed with a black background, while the Apple Maps app will come with a virtual tour experience similar to Google’s Street View.

Other key features include the option to silence unknown callers and block senders within the Mail app, improved search in messages, and optimised battery charging.

Apple has also made improvements to its language keyboards, including the introduction of new bilingual keyboards and typing predictions for Arabic, Hindi, Thai, Cantonese, Vietnamese and the 22 official Indian languages.

Other news from the conference included:

  • The Find My iPhone and Find My Friends apps will now track and locate any Apple device, even if it is offline
  • Apple says it travelled 4 million miles by car and aeroplane in order to improve the detail on its maps app
  • The new Apple TV screensaver will feature 4K high definition images from under the ocean filmed in collaboration with the BBC Natural History Unit, which made Blue Planet
  • Improvements to Apple’s Memojis – a form of 3D avatar – were demonstrated in a video made by beauty vloggers Desi Perkins and Patrick Starrr. They now include more accessories such as piercings and make-up

Apple Watch

Apple Watch facesImage copyrightAPPLE
Image captionThe Apple Watch now comes with multiple new watch faces

The Apple Watch is to become more independent from the iPhone with its own app store.

New apps for the Watch include a menstrual cycle tracker, with an optional fertility window predictor, and a noise level tool to alert Watch wearers when they are around noise levels that can damage hearing.

Apple said it would not record or store the noise data.

Mac Pro

Apple Mac ProImage copyrightAPPLE
Image captionThe Apple Mac Pro has powerful specifications

The tech giant also unveiled a redesigned Mac Pro complete with a 28-core Intel processor and 6k retina display screen, which is 40% larger than the current iMac display screen.

It will launch in the autumn with prices starting at $5,999 (ÂŁ4,700) – this does not include the screen or stand.

And instead of buying additional monitors, existing Mac users will now be able to use the iPad as a second screen.

Tuong Nguyen, senior principal analyst at Gartner, said this year’s event had a different feel to its predecessors, following on from Apple’s last announcements which saw it reposition itself as a provider of services, rather than hardware.

“Typically at WWDC you might see it begin with something interesting, in terms of how devices are used or how apps interact, but this time it kicked off with a video that looked more like a movie trailer,” he said.

“Is this the new way we should see Apple events, more rooted in the media content side of things, rather than the strong emphasis on technology and hardware innovation?

“Remember, the last event was all about services and content – this may be the new way that Apple differentiates itself.”

How to deploy an “classic” terminal server with Windows 2012

Ramazan Can BLOG : Hyper-V, High Availibility, Infrastructure......

Since Windows 2008 the “oldschool” and well known 2003 terminal services are extended on rich web services which provides now great new capabilities in designing and deploying built in terminal server services based on HTTP/HTTPS. in combination with RD Gateway the applications can also be securely published to WWW and session host server be isolated in non public facing network segments. all terminal services are now called Remote Desktop services shortly RD.

To enable RD (Remote Desktop) services there are generally 2 ways, “Quickstart” and “Standard Deployment”. Also there 2 types of RD services available, Session Virtualization or VDI (Virtual Desktop Infrastructure). In this blog article I focus and deploy RDS for session virtualization which means hosting and publishing of terminal server applications.


Quickstart is straight forward and deploys you quickly the required services and configure an standard pool of applications mainly can be used for setting up a…

View original post 240 more words

KENYA: Satellite Tracking System Puts Africa On Map of Space-Based Climate Surveillance

Kenya has made a remarkable move of deploying  its first ever satellite tracking system. Thanks to a new satellite tracking system based in Kenya, eastern and southern African states have joined the growing ranks of countries tracking extreme weather and climate change impacts from space.

The Regional Centre for Mapping of Resources for Development (RCMRD) in Nairobi launched a satellite tracking system in mid-July that can collect real-time data from 75 percent of Africa’s land area.

Capable of capturing images with a 250-metre resolution, the Moderate Resolution Imaging Spectroradiometer (MODIS) monitors factors affecting the environment, like forest fires, in areas where human surveillance cannot reach without the aid of aerial photography.

“It enables the acquisition of direct data which can be processed into different products for a variety of applications, such as flood mapping, crop monitoring, fire assessment, water quality assessment and hailstorm prediction, among others,” said the RCMRD’s director for remote sensing, Tesfaye Korme.

The satellite receiving station in Nairobi collects data from several earth observation satellites, which it shares with the RCMRD’s 15 member states in eastern and southern Africa, Korme said.

Funded by the Google Foundation at a cost of $250,000, the MODIS antennae gathers information on Africa from the Atlantic coast to the Indian Ocean and from the north to the south of the continent, officials said.


That means it can tap data from Gachari Wanja’s village in central Kenya.

The farmer from Nanyuki has tried a couple of options, including conservation agriculture techniques, to boost production from her land in Laikipia County. But none has yet shown promise, laments the mother of four.

“I have even signed up with a crop insurance scheme as a way of ensuring I do not suffer so much loss when the rains fail,” said the 36-year-old. “Sometimes I am compensated for the loss, but at other times I do not get a payout.”

It is not her fault when she doesn’t get anything, as payouts are made to farmers depending on data collected from the nearest remote weather station.

Powered by solar energy, the automatic weather stations are fitted with a General Packet Radio Service (GPRS), which enables them to record rainfall data from farms within a radius of 20 km every 15 minutes, according to officials at the Center for Training and Research in Arid and Semi Arid Lands Development (CETRAD).

For instance, if rain falls at Wanja’s farm but doesn’t reach her neighbour’s land some 5 km away, it means the neighbour wins compensation but Wanja doesn’t.

“Insurance companies ask for evidence of what is being claimed,” said Robinson Mugo, who heads up an ecological monitoring and disaster-response project called SERVIR-Africa at the RCMRD. But sometimes remote weather stations fail to give accurate data, he added.

This, according to Mugo, is where MODIS – which supports the SERVIR project, among other things – comes in.

It can show insurance companies, governments and farmers how much rain is received over a given period of time much more accurately than the weather stations, he said.

The SERVIR platform, set up in 2008, integrates satellite observation and predictive models with other geographic information to track and forecast ecological changes, and respond to natural disasters.


Mugo, who recalls his childhood growing up on a farm, is troubled by the rapid change in climate patterns. Installations like automatic weather stations, he says, cannot meet the demand for factual information to shore up expanding initiatives like crop insurance.

“Climate change not only affects countries but has gone beyond geographical and political boundaries,” Mugo said. The cross-border data captured by MODIS can be shared to inform policies that help ordinary people cope with the impacts of a warming world, he added.

The technology is also useful for scientific activities such as measuring ocean temperatures and soil sediment running off into water bodies, and predicting hazards like tsunamis, he added.

But not everyone is convinced that big investments in technology will achieve much in tackling climate change.

Lanyasunya T.P., a member of the management board at Kenya’s National Commission for Science, Technology and Innovation (NACOSTI), argues that young people and women need to be involved at the community level in such efforts if they are to bear real fruit.

“The future of this country in all spheres of development is in the hands of the coming generation,” he said. But NACOSTI – which is not involved in the MODIS project – lacks funding to help young people begin exploring their own ideas, he added.

The RCMRD’s Mugo, however, believes governments affiliated with his institution are making progress in engaging their employees, as well as donors and communities affected by climate change.

“It might look like governments are making a small contribution to fight climate change but it is significant,” Mugo said.

In the case of the MODIS project, the Kenyan government employs the staff working on the project, and is responsible for gathering, processing and distributing the data to the centre’s other member states.


Here’s A Look At The Finger-Vein Scanner Barclays Is Going To Use On Its Customers

Barclays Bank in the U.K. will begin using a finger vein scanner to identify its customers. The move comes after a wave of hacks on financial institutions that have demonstrated how feeble password and PIN protections have become.

The bank will send the small portable device to its customers who want to do their banking online. It will function as a form of two-factor identification. Users will punch in their pass word or account details, and then be required to confirm their identities by sticking their fingers into the scanner, a separate device from their computer.

Here’s a look at how it will work:barclays-4 barclays-finger-vein-scannerimage_adaptive_full_image barclays-finger-vein-scanner-1  

Barclays customers have already been using a separate portable device, the PINsentry, the access their accounts online. Users log in, then insert their debit cards into the PINsentry to retrieve another code number, and can only proceed with transactions once the web site is satisfied that the user, the card and the PINsentry code all came from the owner of the account.

Here is a PINsentry:

Jim Edwardsbarclays-pinsentry

The vein scanner will be even more secure, Barclays says: “The compact device can read and verify the users’ unique vein patterns in the finger. Unlike finger prints, vein patterns are extremely difficult to spoof or replicate. Barclays will not hold the user’s vein pattern and there will be no public record of it.”

Here is a closeup:

Barclays finger vein scanner

The device will require users to make sure they don’t lose any of their fingers, the Guardian noted:

Customers will first have to register a finger – Barclays is recommending the index finger, plus a back-up digit should you be careless enough to lose or damage the first choice. The unique vein pattern in the finger will then be held on a sim card that is added to the reader. Barclays itself will not store the data.


The device then scans the unique pattern of veins inside your finger to confirm that it’s actually you:


Japan, Turkey, Russia and Poland already have banks using vein scanners to confirm IDs, the Financial Times says.

Read more:


Stay Safe Online

By Tom Cheshire, Technology Correspondent

Millions of eBay users were asked to change their passwords on Wednesday after the site’s security was compromised. Here are some top tips and what to do to tighten up your online security.

Change your password

Even if you haven’t used your eBay account, change your password – especially if you’ve used that password on other sites.

It’s a pain, but it’s worth changing your major passwords – especially anything tied to financial and sensitive personal information – every few months.

Change your password in the browser

When changing your password, don’t do this by following an email prompt.

Instead, go the website directly by pasting its URL into the address bar in your web browser.

More generally, never click on links on emails unless you’re completely sure it’s from a trustworthy source. Even a friend sharing an amusing cat video may have been hacked.

Choose the best possible password

What makes the best password is subject to hard fought debate online.

The most secure passwords are also the hardest to remember, and any password is a trade-off between security and convenience. A long, unintelligible string of alphanumeric and special characters is strongest, but not practical for everyday use.

Instead, use a memorable combination of words – not culled from a famous phrase or book.

If your phrase is anywhere on the web, chances are it’s known to hackers – so ‘itwasthebestoftimesitwastheworstoftimes’ isn’t much better than ‘eBayPassword679’.

Don’t use easily guessable information. Choose a nonsense phrase that you’ll remember, and swap in some numbers and special characters.

Something like ‘InApril1EnjoyThrowingDucks!n1ntoTh3R1ver’ is good, then come up with a variation on that for each site.

Again, don’t use the same passwords across different sites.

Use a password manager

If you do prefer to use a stronger password, but struggle to keep track of them, consider using a password manager.

These collect all your passwords into one place, so that you access all the different passwords with one master password.

Because there’s only one point of failure, that password needs to be very secure – and also very well protected.

KeePass, LastPass, Password Box and Dashlane are all good options.

Consider two-step verification

For your most important online accounts – banking, email and social networking – two-step authentication is a very good way of making yourself more secure.

This means that when you log into an unusual computer, you’ll have to authenticate yourself using your mobile phone or another means of verification. Most major web sites offer this now, and it’s less of a hassle than you think.

Pay attention to iTunes

If you suspect you’ve been hacked, pay close attention to your outgoing finances.

Hackers will often use very small amounts to test the water with stolen financial information.

Pay close attention to iTunes especially – hackers will make tiny purchases worth pennies here, to see if a credit card works. So make sure you check your iTunes statements.

Scan for malware

If hackers have your email address and other personal information, there’s a good chance they can access your personal devices.

Install malware protection from a reputable source and scan your computer.

Be patient

Everyone hates passwords and, thankfully, they may not be around for much longer.

Many companies are working on software that uses behavioural monitoring – the way you type, click around a website and generally interact – to uniquely identify you.

Others are looking at biometrics – like Apple and Samsung’s fingerprint readers on their smartphones.

Future technology might use facial recognition, or heartbeat pattern detection.



ExchangeTransport Rules

Understanding How Transport Rules Are Applied

Exchange 2010

Applies to: Exchange Server 2010 SP3, Exchange Server 2010 SP2

Topic Last Modified: 2010-01-25

In Microsoft Exchange Server 2010, transport rules allow you to apply messaging policies to messages in the transport pipeline. Actions such as redirecting a message or adding recipients, rights-protecting messages, and rejecting or silently deleting a message can be taken on messages that match the conditions and none of the exceptions defined in the rule.

Given the scope and potential impact of transport rules on messages, it’s important to understand how transport rules work. To learn more about transport rules, see Understanding Transport Rules. For a comprehensive list of transport rule predicates and actions available on the Hub Transport server and Edge Transport server, see Transport Rule Predicates and Transport Rule Actions.

Looking for management tasks related to managing transport rules? Check out Managing Transport Rules.


Transport Rule Scope

Transport Rule Replication

Order in Which Transport Rules are Applied

Transport Rules and Group Membership

Transport Rule Scope

Although the procedures used to create and modify transport rules on each server role are the same, the scope of transport rules on each server role is very different.

Transport rule scope

Transport component

Hub Transport server role

Edge Transport server role

Agent Transport Rules agent Edge Rules agent
Transport event OnRoutedMessage EndOfData
Rule storage Active Directory domain controllers Active Directory Lightweight Directory Services (AD LDS) (local)
Rule replication Active Directory replication No automated replication between Edge Transport servers
Rule scope Entire Exchange organization Local to each Edge Transport server
Message types All messages except system messages All messages
Lookup distribution group membership Yes No
Lookup Active Directory attributes Yes No
Inspect or modify Information Rights Management (IRM)-protected message content Yes (requires transport decryption) No

Rule Storage and Replication

The transport rules you create on a Hub Transport server are stored in Active Directory and are available after Active Directory replication on all Hub Transport servers in your Exchange 2010 organization. This allows you to apply a consistent set of rules across the entire Exchange organization.

Transport rules created on an Edge Transport server are stored in the local instance of AD LDS. No automated replication of configuration information or transport rules occurs between two Edge Transport servers. You can use distinct sets of transport rules on different Edge Transport servers. For example, if an organization uses a different set of Edge Transport servers for inbound and outbound messages to and from the Internet, different rules can be used on these servers. Rules created on the Edge Transport server apply only to messages that pass through that server. However, if applying the same set of transport rules on all Edge Transport servers is a requirement, you can also clone the Edge Transport server configuration, or export transport rules from one Edge Transport server and import it to other Edge Transport servers. For more details, see Understanding Edge Transport Server Cloned Configuration and Export and Import Transport Rules.

Message Types

On Edge Transport servers, rules apply to all messages. On Hub Transport servers, rules are applied to messages that meet the following criteria:

  • Messages sent by anonymous senders   Transport rules are applied to all messages received from anonymous senders. E-mail received from the Internet falls under this category.
  • Messages sent between authenticated users   Transport rules are applied to the following types of messages sent between authenticated users:
    • Interpersonal messages   Interpersonal messages that contain a single rich text format (RTF), HTML, or plain text message body or a multipart or alternative set of message bodies.
    • Encrypted e-mail messages   Messages that are encrypted using S/MIME. Transport rules can access envelope headers contained in encrypted messages and process messages based on predicates that inspect them. Rules with predicates that require inspection of message content, or actions that modify content, can’t be processed.
    • Protected messages   Messages that are protected by applying an Active Directory Rights Management Services (AD RMS) rights policy template. With transport decryption enabled, the Transport Rules agent on a Hub Transport server can access the content of protected messages. Messages must be published using an AD RMS cluster in the same Active Directory forest as the Exchange 2010 server. With transport decryption disabled, the agent can’t access message content and treats the message as an encrypted message.
    • Clear-signed messages   Messages that have been signed but not encrypted.
    • Unified messaging e-mail messages   Messages that are created or processed by the Unified Messaging server role, such as voice mail, fax, missed call notifications, and messages created or forwarded by using Microsoft Outlook Voice Access.
    • Read reports    Reports that are generated in response to read receipt requests by senders. Read reports have a message class of IPM.Note*.MdnRead or IPM.Note*.MdnNotRead.


Transport Rule Replication

Transport rules configured on Hub Transport servers are applied to all messages handled by the Hub Transport servers in the Exchange 2010 organization. When a transport rule is created or an existing transport rule is modified or deleted on one Hub Transport server, the change is replicated to all Active Directory domain controllers in the organization. All the Hub Transport servers in the organization then read the new configuration from the Active Directory servers and apply the new or modified transport rules. By replicating transport rules across the organization, Exchange 2010 enables you to apply a consistent set of rules across the organization.

Replication of transport rules across an organization depends on Active Directory replication. Replication time between Active Directory domain controllers varies depending on the number of sites in the organization, slow links, and other factors outside the control of Exchange. When you configure transport rules in your organization, make sure that you consider replication delays. For more information about Active Directory replication, see Active Directory Replication Technologies.
Each Hub Transport server maintains a recipient cache that’s used to look up recipient and distribution list information. The recipient cache reduces the number of requests that each Hub Transport server must make to an Active Directory domain controller. The recipient cache updates every four hours. You can’t modify the recipient cache update interval. Therefore, changes to transport rule recipients, such as the addition or removal of distribution list members, may not be applied to transport rules until the recipient cache is updated. To force an immediate update of the recipient cache, you must stop and start the Microsoft Exchange Transport service. You must do this for each Hub Transport server where you want to forcibly update the recipient cache.
Each time the Hub Transport server retrieves a new transport rule configuration, an event is logged in the Security log in Event Viewer.

Transport rules configured on Edge Transport servers are applied only to the local server on which the transport rule was created. New transport rules and changes to existing transport rules affect only messages that pass through that specific Edge Transport server. If you have more than one Edge Transport server and you want to apply a consistent set of rules across all Edge Transport servers, you must either manually configure each server or export the transport rules from one server and import them into all other Edge Transport servers.


Order in Which Transport Rules Are Applied

Transport rules are applied in the following order:

  1. Message scope   The first check performed by rules agents is whether a message falls within the scope of the agent. Transport rules aren’t applied to all types of messages.
  2. Priority   For messages that fall within the scope of the rules agent, the agent starts processing rules based on rule priority in ascending order. Rules with lower priority are applied first. Transport rule priority values range from 0 to n-1, where n is the total number of transport rules. Only enabled rules are applied, regardless of priority. You can change the priority of rules using the Exchange Management Console or the Exchange Management Shell.
  3. Conditions   Transport rule conditions are made up of predicates.
  4. Rule with no conditions   A rule with no predicates and no exceptions is applied to all messages.
  5. Rule with multiple predicates   For a rule’s action to be applied to a message, it must match all of the predicates selected in the rule. For example, if a rule uses the predicates from a member of distribution list, and when the Subject field contains specific words, the message must match both predicates. It must be sent by a member of the distribution list specified, and the message subject must contain the word specified.
  6. Predicate with multiple values   If one predicate allows entering multiple values, the message must match any value specified for that predicate. For example, if an e-mail message has the subject Stock price information, and the SubjectContains condition on a transport rule is configured to match the words Contoso and stock, the condition is satisfied because the subject contains at least one of the values of the condition.
  7. Exceptions   A rule isn’t applied to messages that match any of the exceptions defined in the rule. Note, this is exactly opposite of how the rules agent treats predicates. For example, if the exceptions except when the message is from people and except when the message contains specific words are selected, the message fails to match the rule condition if the message is sent from any of the specified senders, or if the message contains any of the specified words.
  8. Actions   Messages that match the rules conditions get all actions specified in the rule applied to them. For example, if the actions prepend the subject with string and Blind carbon copy (Bcc) the message to addresses are selected, both actions are applied to the message. The message will get the specified string prefixed to the message subject, and the recipients specified will be added as Bcc recipients.
Some actions, such as the Delete the message without notifying anyone action, prevent subsequent rules from being applied to a message.


Transport Rules and Group Membership

When you define a transport rule using a predicate that expands membership of a distribution group, the resulting list of recipients is cached by the Hub Transport server that applies the rule. This is known as the Expanded Groups Cache and is also used by the Journaling agent for evaluating group membership for journal rules. By default, the Expanded Groups Cache stores group membership for four hours. Recipients returned by the recipient filter of a dynamic distribution group are also stored. The Expanded Groups Cache makes repeated round-trips to Active Directory and the resulting network traffic from resolving group memberships unnecessary.

In Exchange 2010, this interval and other parameters related to the Expanded Groups Cache are configurable. You can lower the cache expiration interval, or disable caching altogether, to ensure group memberships are refreshed more frequently. You must plan for the corresponding increase in load on your Active Directory domain controllers for distribution group expansion queries. You can also clear the cache on a Hub Transport server by restarting the Microsoft Exchange Transport service on that server. You must do this on each Hub Transport server where you want to clear the cache. When creating, testing, and troubleshooting transport rules that use predicates based on distribution group membership, you must also consider the impact of Expanded Groups Cache.