#TechCriticism
Explore tagged Tumblr posts
enterprisewired · 1 year ago
Text
Apple Vision Pro Faces Early Criticism and Returns from Users
Tumblr media
Early Adopters Report Comfort and Productivity Issues
As the initial wave of Apple Vision Pro headsets reaches the 14-day return window, a notable number of buyers are taking to social media to express their dissatisfaction with the $3,500 device. Complaints range from comfort issues, including headaches and motion sickness, to concerns about productivity and the device’s overall value.
Comfort Concerns and Physical Discomfort
One of the most cited reasons for returns is discomfort. Some users reported experiencing headaches and motion sickness attributed to the weight and front-heavy design of the headset. The discomfort factor has led to several users expressing their intentions to return the device, emphasizing that it was too uncomfortable to wear even for short periods.
Parker Ortolani, The Verge’s product manager, highlighted his personal experience, mentioning that the device contributed to a burst blood vessel in his eye. While anecdotal reports of discomfort, dry eyes, and redness are not new in the virtual reality (VR) space, the unique challenges of wearable production for mass markets become apparent when addressing individual variations in anatomy and comfort preferences.
Productivity Shortcomings and Lack of Applicability
Beyond physical comfort, another common criticism revolves around the Apple Vision Pro‘s limited productivity relative to its high price. Users have expressed that tasks like looking at Figma screens induced dizziness, while others found the device lacking applicability in their professional work. Issues with coding experiences and focusing problems causing headaches have also been reported.
The lack of support for various file types and challenges in multitasking between “windows” have been cited as productivity deal-breakers. Carter Gibson, a senior manager at Google, pointed out finer details such as difficulties in file management and multitasking, raising questions about the device’s practicality in daily professional use.
Uncertain Impact and User Expectations
It remains unclear how this vocal subset of early adopters expressing criticism will impact the future of the Apple Vision Pro. While some users indicate their intention to return the device, many express interest in trying a potential second-generation model. Some attribute their concerns not to the technology itself but to the absence of a compelling application or lack of comfort.
The actual return rate and Apple’s internal expectations for the Apple Vision Pro are unknown, making it challenging to gauge the extent of the reported issues. As Apple addresses user feedback and potential improvements, the early criticism may influence the company’s approach to future iterations of mixed-reality headsets. The evolving landscape of user preferences and expectations will likely play a crucial role in shaping the future success of Apple’s ventures into mixed-reality technology.
Curious to learn more? Explore our articles on Enterprise Wired
0 notes
xpnd · 2 years ago
Text
All Watched Over By Machines Of Loving Grace
by Richard Brautigan (first published in 1967)
I like to think (and the sooner the better!) of a cybernetic meadow where mammals and computers live together in mutually programming harmony like pure water touching clear sky.
I like to think (right now, please!) of a cybernetic forest filled with pines and electronics where deer stroll peacefully past computers as if they were flowers with spinning blossoms.
I like to think (it has to be!) of a cybernetic ecology where we are free of our labors and joined back to nature, returned to our mammal brothers and sisters, and all watched over by machines of loving grace.
1 note · View note
osintelligence · 2 years ago
Link
https://bit.ly/3RbZEaD - 🌐 In the first half of July, Microsoft revealed that Chinese hacking group, Storm-0558, accessed emails from approximately 25 entities, some of which were US government agencies. The breach was a result of a series of internal mishaps. The gravity of safeguarding extensive software infrastructure, especially in today's digitally vulnerable age, cannot be overemphasized. #Cybersecurity #MicrosoftBreach 💡 Microsoft's probe discovered that Storm-0558 infiltrated corporate and government emails using a "Microsoft account consumer key," granting them permission to generate access tokens to their victim's accounts. #Storm0558 #DigitalSecurity 🔑 This key was inadvertently left in a system "crash dump" due to a cascade of errors reminiscent of a Rube Goldberg machine. Though Microsoft’s systems should've identified the sensitive "key material" in the crash dump, they failed to do so. As a result, engineers mistakenly believed the dump was devoid of sensitive data, leading to its transfer from a protected network to the company's debugging environment. #TechMishap #DataBreach 🚫 In a following misstep, a credential scan that should've identified the key's presence overlooked it. Storm-0558 later breached a Microsoft engineer's corporate account, gaining access to the debugging environment, which improperly contained the key. Although Microsoft can't definitively confirm this sequence, they believe it's the likely path taken by the hackers. #HackerAccess #SystemVulnerability 🔐 Interestingly, the exploited key was intended for consumer use, yet it allowed intruders entry into Microsoft's enterprise accounts. Microsoft started using common key metadata publishing in 2018, but failed to update authentication systems. Consequently, mail system engineers, believing the updates were in place, didn’t implement extra authentication, causing the system to be oblivious to the key type used. Had the updates been applied, Storm-0558 might not have accessed the enterprise accounts. #KeyAuthentication #EnterpriseSecurity ✅ Microsoft claims to have resolved these issues and is perpetually enhancing its systems. Despite these affirmations, critics, including Senator Ron Wyden and Tenable CEO Amit Yoran, have censured Microsoft's security methods, with some labeling them as "negligent" and others suggesting the company's sluggish response to security vulnerabilities.
1 note · View note
justin-aptaker · 7 years ago
Link
via Twitter https://twitter.com/justin_aptaker
0 notes