Additionally, it has been criticized for its litigious legal policy of suing before first gathering all the facts necessary to pursue a legitimate lawsuit.
The controversy over Apple's changes to section 3.3.1 of the iPhone SDK license agreement erupted after John Gruber's April 8, 2010 Daring Fireball blog post entitled, New iPhone Developer Agreement Bans the Use of Adobe’s Flash-to-iPhone. Strong opposition to Apple's licensing changes spread quickly with bloggers and others. Others were quick to note that the language used in the agreement also banned other developer tools including MonoTouch, Lua, Unity3D, and many others.
The original iPhone OS 3 section 3.3.1 reads:
:3.3.1 Applications may only use Published APIs in the manner prescribed by Apple and must not use or call any unpublished or private APIs.
The revised iPhone OS 4 section 3.3.1 reads:
:3.3.1 — Applications may only use Documented APIs in the manner prescribed by Apple and must not use or call any private APIs. Applications must be originally written in Objective-C, C, C++, or JavaScript as executed by the iPhone OS WebKit engine, and only code written in C, C++, and Objective-C may compile and directly link against the Documented APIs (e.g., Applications that link to Documented APIs through an intermediary translation or compatibility layer or tool are prohibited).
Uncertainty over Apple's exact intentions went largely unresolved with platform developers reaching out to Apple such as Novell who tried but Apple remained silent over the issue. Steve Jobs posted a reaction entitled "Thoughts on Flash", but did not directly address any third party development tools other than Adobe's Flash platform.
The "Thoughts on Flash" post drew immediate and harsh criticism with Steve Jobs being accused of outright lying by many. Jobs' assertion that Flash is not open, or closed and proprietary, attracted a great deal of attention with references to open source projects that take advantage of Adobe making the Flash specification open for developers to build on.
Immediately after the allegations, Apple launched an investigation and worked with their manufacturers to ensure that conditions were acceptable to Apple. In 2007, Apple started yearly audits of all its suppliers regarding Worker's Rights, slowly raising standards and pruning suppliers that did not comply. Yearly progress reports have been published since 2008. In 2010, workers in China planned to sue iPhone contractors over poisoning by a cleaner used to clean LCD screens. One worker claimed that they were not informed of possible occupational illnesses.
Apple states its policy on how it influences the corporate culture of its suppliers in its Supplier Responsibility Progress Reports. Holding suppliers accountable for their errors and omissions in their relationship with Apple is an area of concern Apple reports itself as taking seriously, and in its latest report, Apple stated that "[our] procurement decisions take into account a facility’s social responsibility performance, along with factors such as quality, cost, and timely delivery. When social responsibility performance consistently fails to meet Apple expectations, we terminate business." Apple has not announced whether it has severed business ties with Foxconn. Given Apple's stated policy, terminating relationships with such suppliers may be difficult without incurring huge financial losses.
In 2009 and 2010, Foxconn factories supplying iPhones, iPads and other devices have still come under fire in the press, with one source describing conditions as a "white collar prison". In 2009, Foxconn guards were videotaped beating employees. Later in April 2010, four workers attempted suicide in a single month in the same factory. By May 2010, 12 workers had attempted suicide at a Foxconn operations in China. Apple, HP, and others stated that they were investigating the situation.
Apple has been repeatedly criticized for its unwillingness to honor its warranties and its concomitant penchant for giving any reason for doing so, no matter how bizarre: in 2008, Apple repair centers began to refuse to honor warranties of its products which had been used in an environment it deemed hazardous, i.e., that had been used around someone who smokes; and in 2009, Apple refused to honor its warranty and replace a defective battery on a machine that had a small amount of unrelated cosmetic damage that did not affect the machine's functionality, nor that of its battery.
Apple advertises its products as being secure and has succeeded in persuading the public of this. Despite the existence of a small number of known viruses and malware designed for Apple products, a 2006 report by McAfee found a 228 percent increase in the annual rate of vulnerabilities in the period 2003-5, compared to Microsoft's products, which saw a 73 percent. Moreover, every year since then a significant number of vulnerabilities have been found and fixed through security updates. However, the public's lack of awareness of the security vulnerabilities of Apple products has led to criticism of Apple for misleading the public which has risen over the years. This criticism has also drawn attention to Apple's failure to update its products with security updates in a timely fashion. An example of this was a security flaw in Sun Microsystems's Java, which Sun fixed promptly, while Apple took more than five months to distribute the fix. That is much longer than other companies, and drew sharp criticism from experts and journalists. A recent example is a malware product called MacDefender, MacProtector, MacSecurity, or MacGuard, which is an application that can be installed in OS X by the user; ZDNet's Microsoft Blogger Ed Bott estimates that it has been installed by 60,000 to 120,000 Mac customers who thought it was legitimate anti-virus software.
Overall, experts admit that Apple products are less likely to be breached by a hacker or infected by a virus/malware, though they emphasize that this is mainly due to the lack of interest by hackers in attacking Apple products. In particular they fear that Apple places its clients in danger by not taking action to inform the public of its security vulnerabilities. As David Harley, security expert from anti-virus vendor ESET said:
}}
According to Secunia vulnerability rankings, Apple has led Microsoft in reported security vulnerabilities since 2007, and currently leads all other vendors in reported vulnerabilities for 2010. This ranking, however, doesn't "indicate the actual security (or lack thereof) in the different vendors products; it rather shows that vulnerabilities continue to be discovered in significant numbers in products from even the largest and most popular vendors including those who spend significant resources on improving the security of their products" according to the authors of the study.
Category:Apple Inc. Apple
This text is licensed under the Creative Commons CC-BY-SA License. This text was originally published on Wikipedia and was developed by the Wikipedia community.
The World News (WN) Network, has created this privacy statement in order to demonstrate our firm commitment to user privacy. The following discloses our information gathering and dissemination practices for wn.com, as well as e-mail newsletters.
We do not collect personally identifiable information about you, except when you provide it to us. For example, if you submit an inquiry to us or sign up for our newsletter, you may be asked to provide certain information such as your contact details (name, e-mail address, mailing address, etc.).
When you submit your personally identifiable information through wn.com, you are giving your consent to the collection, use and disclosure of your personal information as set forth in this Privacy Policy. If you would prefer that we not collect any personally identifiable information from you, please do not provide us with any such information. We will not sell or rent your personally identifiable information to third parties without your consent, except as otherwise disclosed in this Privacy Policy.
Except as otherwise disclosed in this Privacy Policy, we will use the information you provide us only for the purpose of responding to your inquiry or in connection with the service for which you provided such information. We may forward your contact information and inquiry to our affiliates and other divisions of our company that we feel can best address your inquiry or provide you with the requested service. We may also use the information you provide in aggregate form for internal business purposes, such as generating statistics and developing marketing plans. We may share or transfer such non-personally identifiable information with or to our affiliates, licensees, agents and partners.
We may retain other companies and individuals to perform functions on our behalf. Such third parties may be provided with access to personally identifiable information needed to perform their functions, but may not use such information for any other purpose.
In addition, we may disclose any information, including personally identifiable information, we deem necessary, in our sole discretion, to comply with any applicable law, regulation, legal proceeding or governmental request.
We do not want you to receive unwanted e-mail from us. We try to make it easy to opt-out of any service you have asked to receive. If you sign-up to our e-mail newsletters we do not sell, exchange or give your e-mail address to a third party.
E-mail addresses are collected via the wn.com web site. Users have to physically opt-in to receive the wn.com newsletter and a verification e-mail is sent. wn.com is clearly and conspicuously named at the point of
collection.If you no longer wish to receive our newsletter and promotional communications, you may opt-out of receiving them by following the instructions included in each newsletter or communication or by e-mailing us at michaelw(at)wn.com
The security of your personal information is important to us. We follow generally accepted industry standards to protect the personal information submitted to us, both during registration and once we receive it. No method of transmission over the Internet, or method of electronic storage, is 100 percent secure, however. Therefore, though we strive to use commercially acceptable means to protect your personal information, we cannot guarantee its absolute security.
If we decide to change our e-mail practices, we will post those changes to this privacy statement, the homepage, and other places we think appropriate so that you are aware of what information we collect, how we use it, and under what circumstances, if any, we disclose it.
If we make material changes to our e-mail practices, we will notify you here, by e-mail, and by means of a notice on our home page.
The advertising banners and other forms of advertising appearing on this Web site are sometimes delivered to you, on our behalf, by a third party. In the course of serving advertisements to this site, the third party may place or recognize a unique cookie on your browser. For more information on cookies, you can visit www.cookiecentral.com.
As we continue to develop our business, we might sell certain aspects of our entities or assets. In such transactions, user information, including personally identifiable information, generally is one of the transferred business assets, and by submitting your personal information on Wn.com you agree that your data may be transferred to such parties in these circumstances.