Trending February 2024 # Homekit Has About 100 Certified Devices More Than Two Years Since Inception # Suggested March 2024 # Top 10 Popular

You are reading the article Homekit Has About 100 Certified Devices More Than Two Years Since Inception updated in February 2024 on the website Achiashop.com. We hope that the information we have shared is helpful to you. If you find the content interesting and meaningful, please share it with your friends and continue to follow and support us for the latest updates. Suggested March 2024 Homekit Has About 100 Certified Devices More Than Two Years Since Inception

HomeKit, Apple’s software framework for communicating with and controlling connected accessories in a user’s home, currently works with about a hundred certified devices, Reuters said Friday.

By contrast, there are currently about 250 devices that are certified to work with Alexa, thanks to Amazon’s open-systems approach and even financial incentives for some partners.

But HomeKit, which debuted alongside iOS 8 in September 2014, now has an agile competitor in Amazon’s Alexa voice-controlled digital assistant which can also control smart accessories in the home with a few spoken words. The Reuters report outlines some of the requirements Apple imposes on device makers who wish to become HomeKit-certified.

UPDATE: The original version of this article mistated that HomeKit has passed 100 certified devices whereas the Reuters article stated that it has “about” 100 certified devices.

“The number of HomeKit-compatible accessories continues to grow rapidly with many exciting solutions announced just this month,” said an Apple spokesperson.

With HomeKit, users set up their iPhone to configure, communicate with and control smart home appliances.

Using the Home app for iPhone and iPad, users can group smart devices and enable automatic actions in the house through a simple voice dictation to Siri or through apps. The fourth-generation Apple TV can double as a HomeKit hub allowing for remote control of any connected devices.

Like with other Apple products, HomeKit strives to protect user privacy.

To achieve that, Apple requires HomeKit device vendors to purchase a license and use a special encryption co-processor in their products to prevents sensitive data about a user’s home from being compromised and hijacked wirelessly.

Small volumes of these chips can cost anywhere between fifty cents to two bucks. Apple also requires developers to buy specific Wi-Fi and Bluetooth networking chips that cost more than competitors’ because they offer stronger security.

HomeKit devices must be built in one of the more than 800 Apple-certified factories though only a few facilities specialize in home automation products. Developers can ask Apple to certify an unlisted factory they want to use.

HomeKit product samples must be sent to Apple for testing, which can take between three to five months. “During that time, device makers aren’t allowed to say publicly that they’re pursuing HomeKit certification,” said Reuters.

Apple’s focus on ease of setup, privacy and security has made possible HomeKit-certified accessories that operate reliably without needing to be connected to the Internet, which also helps reduce latency.

Amazon, on the other hand, does not require smart home companies to use special chips. To earn the “Works with Alexa” label, device makers simply submit their software code to Amazon and have their gadgets physically tested in a third-party lab.

“Amazon acknowledges that unlike Apple, it can’t guarantee the security of third-party devices,” Reuters writes. “A company spokeswoman did note that sensitive commands like unlocking doors have an extra layer of security such as a voice-controlled PIN.”

Aside from Amazon and Apple, Google is another important player in the smart home market. While it’s investing heavily in Google Assistant, Nest devices and its wireless Google Home speaker, Google is currently behind in the race.

Mark Mahaney, an analyst and managing director with RBC Capital Markets, estimates that Amazon sold about 10 million Alexa-enabled devices over the holiday season. Apple, as you know, is wildly rumored to have been secretly developing a voice-activated speaker of its own.

Source: Reuters

You're reading Homekit Has About 100 Certified Devices More Than Two Years Since Inception

Internet Marketing More Effective Than Tv Ads

cations programs.

Some described their successes with pure Internet plays, others with strategies that used economical Internet tie-ins to boost the impact of their TV buys.

DaimlerChrysler boosted its online media spending 30% last year, largely because of the importance of the Internet as an information medium for car buyers, said Bonita Stewart, director of interactive communications for the automaker. She said that 70% of car shoppers use the Internet as their primary means of getting automotive information.

Some of the most effective online efforts, however, dovetail with TV, she said, noting a 215% spike in overall site traffic and a 1,500% increase in the number of “handraisers” seeking information about the Dodge Magnum in the day following a Feb. 1 Super Bowl ad for the vehicle.

Chrysler now gets 80% of its online handraisers for quotes and product information online, Ms. Stewart said, adding that “800 numbers are just falling off a cliff and [voluntary response cards] are not as effective.”

She said a branded entertainment test Chrysler did with TiVo involving a 30-minute program that integrated its Crossfire model into the plot yielded four times the usual 2% response rate for other direct-marketing strategies.

“TV has worked a lot less than direct response — both mail and interactive,” he said. TV had a strong role in creating awareness, but ING research found direct marketing also created strong awareness even among non-respondents, he said.

Direct marketing vehicles yielded new accounts for as little as $10 to $15 each, he said, compared to as much as $150 to $200 for TV and $35 for incentive-based member referrals.

That can be the difference between profit and loss for ING Direct, an online bank that has concentrated mainly on a simple model of savings accounts paying 2% interest and mortgage lending, relying primarily on volume rather than up-selling its customers. An average savings account for ING is $10,000 and yields a gross margin of only $50 annually. But by acquiring accounts efficiently, Mr. Lewis said ING Direct now has $20 billion in assets and turned a profit its second year, three years ahead of plan.

ING’s $50 per customer is roughly similar to the revenue Unilever sees from each of its customers, said Tony Romeo, CEO of the consulting firm Strategic Dynamics and a former interactive marketing executive for Unilever.

So, not surprisingly, package-goods marketers also are looking to interactive programs to reach consumers on the cheap, said Grad Conn, a former Procter & Gamble Co. executive and now vice president and managing director of Grey Global Group’s Grey Direct Canada, Toronto.

Package goods marketers are spending hundreds of millions of dollars online, but very little of it on media, having concentrated on aggregating customers using custom content on their own branded and multibrand lifestyle Web sites, Mr. Conn said. They’ve already compiled vast online databases, ranging from P&G’s Tremor program with 280,000 highly connected teens to its 385 million name European database. He said 12% of P&G customers now connect with the company online.

Brands, such as Kimberly-Clark Corp.’s Huggies, have shifted 50% of their marketing budgets to relationship programs, much of that online, he said.

Because package-goods online marketing has migrated entirely to relationship programs, he said online publishers need to shift from cost-per-thousand to cost-per-acquisition (of new opt-in program members) to win their dollars.

But Mr. Romeo said even the relationship programs remain a fairly low priority with most package-goods companies, though some larger brands, such as Huggies or Unilever’s multi category Dove, have the resources and consumer appeal to support them.

Posted by Serge. Thanks to escalate for the tip.

How To Add And Remove Trusted Devices For Apple Id Two

A trusted device is an iPhone, iPad, or Mac, where you have previously signed in using your Apple ID. Trusted devices are used to verify your identity when signing in and keep your Apple ID secure with two-factor authentication.

In this tutorial, we will go over trusted devices for Apple ID two-factor authentication, their requirements, and some other pieces of valuable information that you should know.

What’s two-factor authentication in Apple ID?

A computer or system can identify you by asking one of these:

Something you are (like your fingerprint or your face)

Something you know (like Apple ID email and password)

Something you have (physical device or code that’s only with you)

Using at least two of the above factors to confirm identity is considered excellent. This way, the computer verifies your identity at a multi-level, ensuring it’s genuinely you who is trying to gain access. This is called two-factor authentication (2FA). Source: Tom Scott’s must-watch video

Apple uses two-factor authentication to secure your Apple ID and its data.

Suppose you try to log in to your Apple ID from a friend’s computer. You enter your Apple ID email and the correct password (something you know). As an additional layer of protection, Apple will send you a six-digit code on your trusted device or trusted phone number (something you have). Once you enter this code, you have successfully verified yourself at two levels. After this, you are logged in.

In summary, two-factor authentication protects your Apple ID and ensures no one can get unwarranted access to it, even if they have your Apple ID password. 2FA is built into the core of Apple operating systems like iOS and macOS.

Must read: How to set up Two-Factor Authentication for your Apple ID

What’s a trusted device?

A trusted device is an iPhone, iPad, or Mac that Apple knows is yours. Apple can send a verification code to these trusted devices to confirm your identity when you try to sign in from a new/different device or browser.

Trusted devices can also generate offline verification codes.

What’s a trusted phone number?

Like trusted devices, trusted phone numbers are added to your Apple ID and verified by a code received on this phone number (via text or call).

When you can’t receive the verification code on your trusted devices, you can choose to get them on your trusted phone number.

To ensure you aren’t locked out, make sure you add more than one phone number to your Apple ID. You can use your number and that of a close person like a spouse or parents. This way, if you lose your phone, the verification code can be sent to your spouse’s number.

Requirements to set a device as a trusted device

iPhone or iPad running iOS 9 or later

iPad running iPadOS 13 or later

Mac running OS X El Capitan or later

Apple Watch running watchOS 6 or later can receive verification codes needed to sign in to your Apple ID. But it can’t be used as a trusted device to reset passwords.

How to add a trusted device to your Apple ID

To add a trusted device to your Apple ID, simply sign in to a new iPhone, iPad, or Mac with your Apple ID. You will receive a 6-digit code on one of your already trusted devices. Once you verify the new device entering the code sent to your other device, this new iPhone, iPad, or Mac will be added as a trusted device. Now, it can receive two-factor authentication codes too!

If you didn’t sign in with your Apple ID during setup, you can do it later from the iPhone, iPad Settings app, or Mac’s System Preferences.

To check if your Apple device is trusted or not, follow these steps:

Open Settings on iPhone or iPad.

Tap your name from the top.

Scroll down and tap a device.

In tiny letters, it will say, “This device is trusted and can receive Apple ID verification codes.”

You cannot see this information in Mac’s System Preferences. But you can do that on the web.

Go to the Manage Your Apple ID page and sign in using your Apple ID.

For a trusted device, it will display a checkmark and say, “Can receive Apple ID verification codes.”

How to generate 2FA login codes for Apple ID

Suppose you’re trying to sign in using your Apple ID but can’t receive the code Apple sends to your trusted devices or trusted phone number. Maybe there’s a network issue, or the popup with the code disappeared quickly. In these cases, you can generate the login verification code from your trusted iPhone, iPad, or Mac. You can get these codes even if the device is offline! Here’s how:

On iPhone or iPad

Go to Settings and tap your name.

Select Password & Security.

Choose Get Verification Code. Use this code to authenticate your Apple ID sign-in process.

When your device isn’t connected to the internet, tap Password & Security and tap Get Verification Code from the popup.

On Mac

Pick Get Verification Code.

You can get the code even when your trusted Mac isn’t connected to the internet.

How to remove a trusted device from Apple ID

To remove a device from your list of trusted devices, you will have to remove it from your Apple ID. After that, it’s delisted from your Apple ID and, therefore, won’t receive 2FA codes.

Additionally, after removing a device, you can’t use iCloud, Find My, and several other Apple services on it. You can, however, sign in to this device using another Apple ID. Or, if you change your mind, you can sign in with the same Apple ID.

Here’s how to remove trusted devices for Apple ID two-factor authentication:

Using iPhone or iPad

Open Settings and tap your name from the top.

Scroll down and tap a device.

Tap Remove from account.

Confirm by tapping Remove.

Using Mac

Select a device from the bottom left.

Choose Remove from account.

Select Remove to confirm.

Using web browser

Go to the Manage Your Apple ID page and sign in using your Apple ID.

Select the desired device.

Managing trusted devices

This is how you can add and remove trusted devices from your Apple ID. Use this only to delist old devices you no longer use.

Once you remove a trusted device, it should not show up in your list of devices under Apple ID. But if it does, that is because you’re using this Apple ID for App Store or some other service on that device. To fix this, sign out from these services or erase the device.

Must see: 15 things you must do (and not do) before selling, giving away, or trading your iPhone or iPad

Finally, if you have only one Apple device added to your Apple ID, you may not see the option to remove it from your account. In that case, if you wish to remove the device from your Apple ID, sign out of your Apple ID.

You’ll also like:

Linkedin: There’s More Demand For Marketers Than Ever

LinkedIn says there’s more demand for marketers now than ever, and new job postings are shifting toward remote positions.

A LinkedIn report on marketing jobs looks at key hiring trends and insights over the past 6 months.

The report finds the demand for marketers grew significantly during the pandemic.

Companies recognize they need to change their approach to reaching customers, and they’re seeking the assistance of marketing professionals.

“Disruptive events, like a pandemic and economic recessions, often take a negative toll on hiring demand, but marketing has seen the opposite impact.

Businesses are recognizing a need to innovate and differentiate in the way they reach potential customers and are looking to their marketing departments to help drive that innovation.”

Here are additional highlights from the report, with more on the demand for marketing jobs and the types of positions available.

More Data From LinkedIn’s Report On Marketing Jobs Which industries are looking for marketers?

Marketing jobs in industries like arts and retail have been in the highest demand.

LinkedIn calls these “generally recession-proof” and non-cyclical industries, as they have been the least affected in terms of hiring slowdown.

Here is a list of top industries by marketing job growth:

Arts (85.9%)

Retail (72.6%)

Education (63.7%)

Corporate Services (60.6%)

Software & IT Services (22.7%)

Legal (23.6%)

Design (21.3%)

Media & Communications (20.5%)

Wellness & Fitness (-1.2%)

Public Administration (-2.1%)

Agriculture (-5.3%)

Transportation & Logistics (-5.6%)

Finance (-5.8%)

Energy & Mining (-5.8%)

Manufacturing (-6.7%)

Consumer Goods (-6.9%)

What types of marketing positions are available?

While that’s a substantial number, remote positions account for only 5% of all marketing job postings on LinkedIn in the past year.

Remote work is likely here to stay even when the pandemic is over, but it’s not on track to take over office work any time soon.

LinkedIn points out that in North America in particular, the job market for B2B marketers is shifting to a virtual space. This has led to an increase in roles in Digital & Media.

Data indicates a mostly positive response to the shift, as 50% of buyers in the B2B space say working remotely has made the purchasing process easier.

Employers are utilizing more flexible hiring solutions with a split between internship, full-time, and contractor positions.

Here’s a look at a 6-month change in the share of marketing job listings on LinkedIn by employment type:

Internship (24.5%)

Full-time (20.5%)

Contractor (15%)

Temporary (-19.2%)

Part-time (-19.4%)

About LinkedIn’s Report

These insights are based on an analysis of LinkedIn’s internal data.

Data was collected from from March 30, 2023 to September 29, 2023 and compared against data collected from September 30, 2023 to March 30, 2023.

A report from LinkedIn published earlier this year has digital marketing listed as the 6th most in-demand job in 2023.

For more on which skills are most valuable right now, see this list of the top 15 most in-demand jobs.

Source: LinkedIn Marketing Solutions Blog

More Than 80% Smartphones Will Have Ai On

Over the past year, artificial intelligence has attained a much more significant role in our smartphones. Be it the Google Assistant you question when you’re in doubt or the social feeds you check on the daily, AI has found a home for itself everywhere around us. But, what do market experts think of its reach in the near future?

Gartner’s AI Research

Even hardware makers have decided to adopt the tech and bake AI capabilities into their devices to optimize and improve the user experience. Gartner’s latest research points out that this is just a beginning and AI will become “a critical product differentiator for smartphone vendors” in the coming years.

Gartner predicts that 80% of smartphones shipped by 2023 will surely have on-device AI capabilities, which will help phone makers acquire and retain customers going forward. It currently stands at a mere 10% and is limited to premium phones such as Huawei’s Mate 10 Pro and Google Pixel 2. Continuing to talk about the same, Gartner’s research director CK Lu says,

Future AI capabilities will allow smartphones to learn, plan and solve problems for users. This isn’t just about making the smartphone smarter, but augmenting people by reducing their cognitive load. However, AI capabilities on smartphones are still in very early stages.

Expected AI Advancements

Let’s take the example of natural language recognition or augmented reality, we’re on the cusp of a breakthrough as both of these technologies are garnering interest and improving with each passing day. Now, if you fast forward four years, what do you see?

Smartphones won’t return the much-hated ‘I don’t understand that’ answer to the queries instead, they will one step ahead and help you out intuitively based on the cues it gathers. Such as, it may ask you to order a jacket when the temperatures are on a steep decline. As for AR technology, it will become more widely available and will have found its way to even more useful applications such as user data collection or illness detection.

Here, the former means that AI would be able to automatically detect your behavioral patterns and personal activities to build an intelligent profile that will help them adapt based on the surroundings. The latter, on the other hand, will help in the improvement of assistants as they approach the smartness levels of Tony Stark’s Jarvis. The continuous listening ability can come in handy as under:

For example, a smartphone hears a user snoring, then triggers the user’s wristband to encourage a change in sleeping positions.

Thus, simply put, Gartner’s research confirms that AI’s presence will only increase in our lives and it’ll become the centerpiece of technological development over the coming years.

And it could be such that, we will spend most of our time with an AI assistant that’ll be aware of what we’re doing and what happens next. The scenario could be similar to the Hollywood movie, Her, which could surely be exciting – well, at least for some. Are you ready to welcome the flood of AI-based innovation? I sure am.

Nas Boxes More Vulnerable Than Routers, Researcher Finds

A security review of network-attached storage (NAS) devices from multiple manufacturers revealed that they typically have more vulnerabilities than home routers, a class of devices known for poor security and vulnerable code.

Jacob Holcomb, a security analyst at Baltimore-based Independent Security Evaluators, is in the process of analyzing NAS devices from 10 manufacturers and has so far found vulnerabilities that could lead to a complete compromise in all of them.

“There wasn’t one device that I literally couldn’t take over,” Holcomb said Wednesday during a talk at the Black Hat security conference in Las Vegas, where he presented some of his preliminary findings. “At least 50 percent of them can be exploited without authentication,” he said.

The devices he evaluated are: Asustor’s AS-602T, TRENDnet’s TN-200 and TN-200T1, QNAP’s TS-870, Seagate’s BlackArmor 1BW5A3-570, Netgear’s ReadyNAS104, D-LINK’s DNS-345, Lenovo’s IX4-300D, Buffalo’s TeraStation 5600, Western Digital’s MyCloud EX4 and ZyXEL’s NSA325 v2.

So far, the security organization MITRE has assigned 22 CVE (Common Vulnerabilities and Exposures) identifiers for the issues the researcher has found, but the project has just begun and he expects to find many more by the end of the year. These devices are far worse than routers, he said.

Holcomb led a similar study last year that identified over 50 vulnerabilities in popular SOHO routers. He expects the number of vulnerabilities identified in NAS systems to far exceed those he found in routers by the time his new project is over.

The type of issues he found in the NAS systems include command injection, cross-site request forgery, buffer overflows, authentication bypasses and failures, information disclosure, backdoor accounts, poor session management and directory traversal. By combining some of these vulnerabilities, attackers can gain a “root shell” on the devices, allowing them to execute commands with the highest possible privilege.

Holcomb demonstrated such attacks during his Black Hat presentation against the D-Link, Netgear, Buffalo and TRENDnet NAS devices. He also disclosed a backdoor account on the Seagate device and deterministic cookie generation on the Asustor product.

All the vulnerabilities found so far were reported to the vendors, but the release of patches for them can take months, Holcomb said. The issues presented at Black Hat had not yet been fixed, so they can be considered zero-days, he said.

There are obvious differences in what can be done by compromising NAS devices and compromising routers. By controlling a router an attacker could capture and modify Internet traffic for a network, while hacking into a NAS system could provide access to potentially sensitive information stored on it.

A router is more likely to be accessible from the Internet than a NAS system, but this doesn’t mean that NAS devices are not being targeted by attackers.

Researchers from Dell SecureWorks reported in June that a hacker made over $600,000 by hacking into Synology NAS devices and using them to mine Dogecoin, a type of cryptocurrency. More recently, some Synology NAS device owners reported that their systems had been infected by a file-encrypting malware program called SynoLocker.

By compromising a NAS device an attacker could also hijack traffic from other devices on the same network by using techniques like ARP spoofing, Holcomb said.

A big concern is that many NAS vendors use the same code base for their high-end and low-end devices, the researcher said. That means the same vulnerabilities in a low-cost NAS device designed for home use could exist in a much more expensive NAS system designed for enterprise environments.

Paying more money for a device does not mean it has better security, Holcomb warned.

Independent Security Evaluators has partnered with the Electronic Frontier Foundation to organize a SOHO router hacking contest at the DefCon security conference later this week, primarily to raise awareness about the poor security state of such devices. Holcomb’s new research suggests other embedded devices fare even worse.

Update the detailed information about Homekit Has About 100 Certified Devices More Than Two Years Since Inception on the Achiashop.com website. We hope the article's content will meet your needs, and we will regularly update the information to provide you with the fastest and most accurate information. Have a great day!