{"id":1922,"date":"2010-06-18T14:26:39","date_gmt":"2010-06-18T14:26:39","guid":{"rendered":"http:\/\/www.markwilson.co.uk\/blog\/?p=1922"},"modified":"2010-06-19T18:44:52","modified_gmt":"2010-06-19T18:44:52","slug":"lies-damn-lies-and-apple-marketing","status":"publish","type":"post","link":"https:\/\/www.markwilson.co.uk\/blog\/2010\/06\/lies-damn-lies-and-apple-marketing.htm","title":{"rendered":"Lies, damn lies, and Apple marketing"},"content":{"rendered":"<p>Earlier today <a href=\"http:\/\/twitter.com\/markwilsonit\/status\/16463476652\">I retweeted<\/a> The Guardian&#8217;s technology editor, <a href=\"http:\/\/twitter.com\/charlesarthur\/status\/16461812899\">Charles Arthur&#8217;s tweet about a Sophos blog post<\/a> highlighting <a href=\"http:\/\/www.sophos.com\/blogs\/gc\/g\/2010\/06\/18\/apple-secretly-updates-mac-malware-protection\/\">an undocumented change to Mac OS X, that appears to guard against a particular malware exploit<\/a>.<\/p>\n<p>The response I got was accusation of having a half-empty iGlass and being an iHater. To be fair, the &#8220;accuser&#8221; was a friend of mine, and the comments were probably tongue in cheek (maybe not, based on the number of follow-up tweets&#8230;) but I was sure I&#8217;d read something on the Apple website about Macs not getting viruses, so I had a quick look&#8230;<\/p>\n<p>Here is <a href=\"http:\/\/www.apple.com\/getamac\">a quote from the Apple website<\/a>, on why you&#8217;ll love a Mac:<\/p>\n<blockquote cite=\"http:\/\/www.apple.com\/why-mac\/better-os\/\"><p>&#8220;<strong>It doesn\u00e2\u20ac\u2122t get PC viruses.<\/strong><br \/>\nA Mac isn\u00e2\u20ac\u2122t susceptible to the thousands of viruses plaguing Windows-based computers. That\u00e2\u20ac\u2122s thanks to built-in defenses in Mac OS X that keep you safe, without any work on your part.&#8221;<\/p><\/blockquote>\n<p>Of course not &#8211; Macs (which these days have almost nothing, other than design aesthetics and operating system to distinguish them from any other PC\u00c2\u00a0&#8211; i.e. a personal computer running Windows, Linux or something else) don&#8217;t get the same viruses as Windows machines.\u00c2\u00a0 No, they have their own &#8220;special&#8221; sort of (admittedly rare) malware, that Apple is fortunate enough to be able to patch within the operating system.\u00c2\u00a0 That will be the &#8220;built-in defenses&#8221; (sic) they talk about then.\u00c2\u00a0 So why not be transparent and mention them in the release notes for the updates?<\/p>\n<p>That&#8217;s the big text&#8230; then we get:<\/p>\n<blockquote cite=\"http:\/\/www.apple.com\/why-mac\/better-os\/\"><p>&#8220;<strong>Safeguard your data. By doing nothing.<\/strong><br \/>\nWith virtually no effort on your part, Mac OS X defends against viruses and other malicious applications, or malware. For example, it thwarts hackers through a technique called \u00e2\u20ac\u0153sandboxing\u00e2\u20ac\u009d \u00e2\u20ac\u201d restricting what actions programs can perform on your Mac, what files they can access, and what other programs they can launch. Other automatic security features include Library Randomization, which prevents malicious commands from finding their targets, and Execute Disable, which protects the memory in your Mac from attacks.<\/p>\n<p><strong>Download with peace of mind.<\/strong><br \/>\nInnocent-looking files downloaded over the Internet may contain dangerous malware in disguise. That\u00e2\u20ac\u2122s why files you download using Safari, Mail, and iChat are screened to determine if they contain applications. If they do, Mac OS X alerts you, then warns you the first time you open one.<\/p>\n<p><strong>Stay up to date, automatically.<\/strong><br \/>\nWhen a potential security threat arises, Apple responds quickly by providing software updates and security enhancements you can download automatically and install with a click. So you\u00e2\u20ac\u2122re not tasked with tracking down updates yourself and installing all of them one by one.<\/p>\n<p><strong>Protect what\u00e2\u20ac\u2122s important.<\/strong><br \/>\nMac OS X makes it easy to stay safe online, whether you\u00e2\u20ac\u2122re checking your bank account, sending confidential email, or sharing files with friends and coworkers. Features such as Password Assistant help you lock out identity thieves who are after personal data, while built-in encryption technologies protect your private information and communications. Safari also uses antiphishing technology to protect you from fraudulent websites. If you visit a suspicious site, Safari disables the page and displays an alert warning you about its suspect nature.<\/p>\n<p>As a parent, you want your kids to have a safe and happy experience on the computer. Mac OS X keeps an eye out even when you can\u00e2\u20ac\u2122t. With a simple setup in Parental Controls preferences, you can manage, monitor, and control the time your kids spend on the Mac, the sites they visit, and the people they chat with.&#8221;<\/p><\/blockquote>\n<p>Now, to be fair to Apple, with the exception of the bit about viruses (and let&#8217;s put aside the point that viruses are only one potential form of malware), they don&#8217;t suggest that they are unique in any of this&#8230; but the page does infer this, and talks about how Macs are built on the world&#8217;s most advanced operating system (really?). So let&#8217;s take a look at Apple&#8217;s bold claims:<\/p>\n<ul>\n<li>Safeguard your data by doing nothing.\u00c2\u00a0 &#8220;Sandboxing&#8221; &#8211; Windows has that too.\u00c2\u00a0 It prevents malicious applications from accessing sensitive areas of the file system and the registry using something called User Access Control (UAC).\u00c2\u00a0 You may have heard about it &#8211; generally from people getting upset because their badly-written legacy applications didn&#8217;t work with Windows Vista.\u00c2\u00a0 Thankfully, these days things are much better.\u00c2\u00a0 And I&#8217;m sure my developer colleagues could comment on the various sandboxes that .NET and Java applications use &#8211; I can&#8217;t, so I won&#8217;t, but let&#8217;s just say OS X is not alone in this regard.<\/li>\n<li>Download with peace of mind.\u00c2\u00a0 Internet Explorer warns me when I attempt to download an application from a website too.\u00c2\u00a0 And recent versions of Windows and Office recognise when a file has originated from the Internet.\u00c2\u00a0 I have to admit that the Safari\/OS X solution is more elegant &#8211; but, if Macs don&#8217;t get viruses, why would I care?<\/li>\n<li>Stay up to date, automatically.\u00c2\u00a0 Windows has Automatic Updates &#8211; and the update cycle is predictable: Once a month, generally, on the second Tuesday; with lots of options for whether to apply updates automatically, to download and notify, or just to notify.\u00c2\u00a0 Of course, if you want to patch the OS manually, then you can &#8211; but why would you start &#8220;tracking down updates yourself and installing all of them one by one&#8221;?<\/li>\n<li>Protect what&#8217;s important.\u00c2\u00a0 I&#8217;ll admit that Windows doesn&#8217;t have a password manager but it does have all the rest of the features Apple mentions: encryption (check); anti-phishing (check); warnings of malicious websites (check); parental controls (check).<\/li>\n<\/ul>\n<p>I&#8217;m sure that a Linux user could list similar functionality &#8211; Apple is not unique &#8211; this is run-of-the-mill stuff that any modern operating system should include.\u00c2\u00a0 The trouble is that many people are still comparing against Windows XP &#8211; an operating system that&#8217;s approaching its tenth anniversary, rather than any of the improvements in Vista (yes, there were many &#8211; even if they were not universally adored) and 7.<\/p>\n<p>So, back to the point:<\/p>\n<blockquote><p>&#8220;@<a href=\"http:\/\/twitter.com\/markwilsonit\">markwilsonit<\/a> Seriously? We needed confirmation?! Apple often patches security holes. Your iGlass is still half empty, then? <a title=\"#ihater\" href=\"http:\/\/twitter.com\/search?q=%23ihater\">#ihater<\/a>&#8221;<\/p>\n<p class=\"citation\">[<a href=\"http:\/\/twitter.com\/alexcoles\">@alexcoles<\/a> on Twitter, <a href=\"http:\/\/twitter.com\/alexcoles\/status\/16468768541\">18 June 2010<\/a>]<\/p>\n<\/blockquote>\n<p>Patching security holes in\u00c2\u00a0software\u00c2\u00a0(e.g. a potential buffer overflow attack) is not the same as writing signature code to address specific malware.\u00c2\u00a0 I&#8217;m not an iHater: I think it&#8217;s good that Apple is writing AV signatures in their OS &#8211; I&#8217;d just like them to be more open about it; and, as for the criticism that I don&#8217;t write much that&#8217;s positive about Apple, I see it as having an ability to see past the Steve Jobs Reality Distortion Field and to apply my technical knowledge to\u00c2\u00a0look at what&#8217;s really there underneath the glossy exterior.<\/p>\n<p>I should add that I own two Macs,\u00c2\u00a0three iPods and a iPhone (I also owned another iPhone previously) and hope to soon have the use of an iPad. In general, I\u00c2\u00a0like my Apple products &#8211; but they&#8217;re far from perfect, despite what the fanboys and Apple&#8217;s own marketing machine might suggest.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Earlier today I retweeted The Guardian&#8217;s technology editor, Charles Arthur&#8217;s tweet about a Sophos blog post highlighting an undocumented change to Mac OS X, that appears to guard against a particular malware exploit. The response I got was accusation of having a half-empty iGlass and being an iHater. To be fair, the &#8220;accuser&#8221; was a &hellip; <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2010\/06\/lies-damn-lies-and-apple-marketing.htm\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Lies, damn lies, and Apple marketing<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[],"tags":[4,62],"class_list":["post-1922","post","type-post","status-publish","format-standard","hentry","tag-apple","tag-malware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Lies, damn lies, and Apple marketing - markwilson.it<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.markwilson.co.uk\/blog\/2010\/06\/lies-damn-lies-and-apple-marketing.htm\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Lies, damn lies, and Apple marketing - markwilson.it\" \/>\n<meta property=\"og:description\" content=\"Earlier today I retweeted The Guardian&#8217;s technology editor, Charles Arthur&#8217;s tweet about a Sophos blog post highlighting an undocumented change to Mac OS X, that appears to guard against a particular malware exploit. The response I got was accusation of having a half-empty iGlass and being an iHater. To be fair, the &#8220;accuser&#8221; was a &hellip; Continue reading Lies, damn lies, and Apple marketing\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.markwilson.co.uk\/blog\/2010\/06\/lies-damn-lies-and-apple-marketing.htm\" \/>\n<meta property=\"og:site_name\" content=\"markwilson.it\" \/>\n<meta property=\"article:published_time\" content=\"2010-06-18T14:26:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2010-06-19T18:44:52+00:00\" \/>\n<meta name=\"author\" content=\"Mark Wilson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:site\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mark Wilson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2010\\\/06\\\/lies-damn-lies-and-apple-marketing.htm#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2010\\\/06\\\/lies-damn-lies-and-apple-marketing.htm\"},\"author\":{\"name\":\"Mark Wilson\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"headline\":\"Lies, damn lies, and Apple marketing\",\"datePublished\":\"2010-06-18T14:26:39+00:00\",\"dateModified\":\"2010-06-19T18:44:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2010\\\/06\\\/lies-damn-lies-and-apple-marketing.htm\"},\"wordCount\":1207,\"commentCount\":5,\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"keywords\":[\"Apple\",\"Malware\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2010\\\/06\\\/lies-damn-lies-and-apple-marketing.htm#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2010\\\/06\\\/lies-damn-lies-and-apple-marketing.htm\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2010\\\/06\\\/lies-damn-lies-and-apple-marketing.htm\",\"name\":\"Lies, damn lies, and Apple marketing - markwilson.it\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\"},\"datePublished\":\"2010-06-18T14:26:39+00:00\",\"dateModified\":\"2010-06-19T18:44:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2010\\\/06\\\/lies-damn-lies-and-apple-marketing.htm#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2010\\\/06\\\/lies-damn-lies-and-apple-marketing.htm\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2010\\\/06\\\/lies-damn-lies-and-apple-marketing.htm#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Lies, damn lies, and Apple marketing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/\",\"name\":\"markwilson.it\",\"description\":\"get-info -class technology | write-output &gt; \\\/dev\\\/web\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\",\"name\":\"Mark Wilson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"width\":800,\"height\":800,\"caption\":\"Mark Wilson\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\"},\"description\":\"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.\",\"sameAs\":[\"http:\\\/\\\/www.markwilson.co.uk\\\/\",\"https:\\\/\\\/www.instagram.com\\\/markwilsonuk\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/markawilson\\\/\",\"https:\\\/\\\/x.com\\\/markwilsonit\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCWHlZCoHRTocdvtrOJ2IL4A\"],\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/author\\\/mark-wilson\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Lies, damn lies, and Apple marketing - markwilson.it","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.markwilson.co.uk\/blog\/2010\/06\/lies-damn-lies-and-apple-marketing.htm","og_locale":"en_GB","og_type":"article","og_title":"Lies, damn lies, and Apple marketing - markwilson.it","og_description":"Earlier today I retweeted The Guardian&#8217;s technology editor, Charles Arthur&#8217;s tweet about a Sophos blog post highlighting an undocumented change to Mac OS X, that appears to guard against a particular malware exploit. The response I got was accusation of having a half-empty iGlass and being an iHater. To be fair, the &#8220;accuser&#8221; was a &hellip; Continue reading Lies, damn lies, and Apple marketing","og_url":"https:\/\/www.markwilson.co.uk\/blog\/2010\/06\/lies-damn-lies-and-apple-marketing.htm","og_site_name":"markwilson.it","article_published_time":"2010-06-18T14:26:39+00:00","article_modified_time":"2010-06-19T18:44:52+00:00","author":"Mark Wilson","twitter_card":"summary_large_image","twitter_creator":"@markwilsonit","twitter_site":"@markwilsonit","twitter_misc":{"Written by":"Mark Wilson","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.markwilson.co.uk\/blog\/2010\/06\/lies-damn-lies-and-apple-marketing.htm#article","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2010\/06\/lies-damn-lies-and-apple-marketing.htm"},"author":{"name":"Mark Wilson","@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"headline":"Lies, damn lies, and Apple marketing","datePublished":"2010-06-18T14:26:39+00:00","dateModified":"2010-06-19T18:44:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2010\/06\/lies-damn-lies-and-apple-marketing.htm"},"wordCount":1207,"commentCount":5,"publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"keywords":["Apple","Malware"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.markwilson.co.uk\/blog\/2010\/06\/lies-damn-lies-and-apple-marketing.htm#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.markwilson.co.uk\/blog\/2010\/06\/lies-damn-lies-and-apple-marketing.htm","url":"https:\/\/www.markwilson.co.uk\/blog\/2010\/06\/lies-damn-lies-and-apple-marketing.htm","name":"Lies, damn lies, and Apple marketing - markwilson.it","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#website"},"datePublished":"2010-06-18T14:26:39+00:00","dateModified":"2010-06-19T18:44:52+00:00","breadcrumb":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2010\/06\/lies-damn-lies-and-apple-marketing.htm#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.markwilson.co.uk\/blog\/2010\/06\/lies-damn-lies-and-apple-marketing.htm"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.markwilson.co.uk\/blog\/2010\/06\/lies-damn-lies-and-apple-marketing.htm#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.markwilson.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Lies, damn lies, and Apple marketing"}]},{"@type":"WebSite","@id":"https:\/\/www.markwilson.co.uk\/blog\/#website","url":"https:\/\/www.markwilson.co.uk\/blog\/","name":"markwilson.it","description":"get-info -class technology | write-output &gt; \/dev\/web","publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.markwilson.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":["Person","Organization"],"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468","name":"Mark Wilson","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","url":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","width":800,"height":800,"caption":"Mark Wilson"},"logo":{"@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1"},"description":"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.","sameAs":["http:\/\/www.markwilson.co.uk\/","https:\/\/www.instagram.com\/markwilsonuk\/","https:\/\/www.linkedin.com\/in\/markawilson\/","https:\/\/x.com\/markwilsonit","https:\/\/www.youtube.com\/channel\/UCWHlZCoHRTocdvtrOJ2IL4A"],"url":"https:\/\/www.markwilson.co.uk\/blog\/author\/mark-wilson"}]}},"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":374,"url":"https:\/\/www.markwilson.co.uk\/blog\/2006\/09\/its-time-to-practice-safe-computing.htm","url_meta":{"origin":1922,"position":0},"title":"It&#8217;s time to practice safe computing &#8211; whatever the operating system","author":"Mark Wilson","date":"Friday 29 September 2006","format":false,"excerpt":"I recently switched my primary home computer to a Mac but I also use Windows and Linux. I don't consider myself to be a member of the Mac community, or the Linux community, or the Windows community - because (based on many forum posts and blog comments that I read)\u2026","rel":"","context":"In \"Apple Mac OS X\"","block_context":{"text":"Apple Mac OS X","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/mac-os-x"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":299,"url":"https:\/\/www.markwilson.co.uk\/blog\/2006\/05\/forum-evangelism.htm","url_meta":{"origin":1922,"position":1},"title":"Forum evangelism","author":"Mark Wilson","date":"Wednesday 3 May 2006","format":false,"excerpt":"This example forum post history was stolen from James O'Neill. Given the comments I get whenever I write about Macs (like the prospect buying a Mac and installing an operating system that's not OS X on it), it seemed kind of relevant: A: I'm thinking of getting a new computer.\u2026","rel":"","context":"In \"Apple Macintosh\"","block_context":{"text":"Apple Macintosh","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/macintosh"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":605,"url":"https:\/\/www.markwilson.co.uk\/blog\/2006\/09\/macbreak-weekly-rant.htm","url_meta":{"origin":1922,"position":2},"title":"MacBreak Weekly rant","author":"Mark Wilson","date":"Thursday 14 September 2006","format":false,"excerpt":"Leo Laporte's TWiT Podcast Network has some really good podcasts including This Week in Tech (TWiT). More recently, the network has launched MacBreak Weekly and (I understand) will soon launch a Windows Podcast hosted by Paul Thurrott. Of course, some of the information is subjective and must be taken with\u2026","rel":"","context":"In \"Apple Macintosh\"","block_context":{"text":"Apple Macintosh","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/macintosh"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2,"url":"https:\/\/www.markwilson.co.uk\/blog\/2004\/06\/introduction-to-viruses-worms-and.htm","url_meta":{"origin":1922,"position":3},"title":"Introduction to viruses, worms, and Trojan horses","author":"Mark Wilson","date":"Thursday 10 June 2004","format":false,"excerpt":"Microsoft have published an interesting article to introduce the key concepts and differences between viruses, worms and Trojan horses. Some may find this a little simplistic, but it still contains some simple, practical advice that we should all be following.","rel":"","context":"In \"Malware\"","block_context":{"text":"Malware","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/malware"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":405,"url":"https:\/\/www.markwilson.co.uk\/blog\/2006\/01\/apple-observations.htm","url_meta":{"origin":1922,"position":4},"title":"Apple observations","author":"Mark Wilson","date":"Saturday 14 January 2006","format":false,"excerpt":"Although my day job involves a lot of work with Windows (often working closely with people at Microsoft), I also use a fair amount of open source software (e.g. Sun Solaris, Mozilla Firefox, FileZilla, etc.) so I'm not completely biased towards the company that everybody loves to hate. I'm also\u2026","rel":"","context":"In \"Apple\"","block_context":{"text":"Apple","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/apple"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1955,"url":"https:\/\/www.markwilson.co.uk\/blog\/2010\/08\/useful-links-august-2010.htm","url_meta":{"origin":1922,"position":5},"title":"Useful Links: August 2010","author":"Mark Wilson","date":"Tuesday 31 August 2010","format":false,"excerpt":"A list of items I've come across recently that I found potentially useful, interesting, or just plain funny: How to use Facebook Chat with Apple iChat - Henry Hernandez describes how to connect Apple's iChat client (or any other Jabber client) to Facebook How to create iPad formatted videos using\u2026","rel":"","context":"In \"Useful Websites\"","block_context":{"text":"Useful Websites","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/useful-websites"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1922","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=1922"}],"version-history":[{"count":3,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1922\/revisions"}],"predecessor-version":[{"id":1924,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1922\/revisions\/1924"}],"wp:attachment":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=1922"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=1922"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=1922"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}