From Ars Technica:
In a similar vein, Canon has probably restricted the two new cameras to 5 fps continuous (the Mark III can do 6 fps)
Yeah they probably arbitrarily restricted that. I mean, writing 21MP images to disk (5D III) requires exactly the same bandwidth and processing speed than writing 50MP to disk (5DS)... NOT.
Recently I was involved in a very unnerving experience. And it made me realize that there is a fundamental weakness in some of our layers of protection from Bad Things. In specific, if an implicit trust relationship exists between yourself and someone else, information fed to you by that person will most likely be much less critically scrutinized for malevolence, opening up a loophole for a malicious party to do their Evil Deeds.
I recently tried to register QuickBooks, but it failed with some nondescript error message. Following an unproductive google search, I asked a work colleague to call QuickBooks support and ask them for assistance. A day later I received a response that QuickBooks advised there were some issues in QB 2014 and they would like me to call back. I did not think too much of this at the time, and called Christie at 1-888-700-2789. Initially someone else answered the phone and said she would call me back. She did not, so I called again, and was put through to this Christie. She asked me if she could call me back. That was strange but I agreed. The caller ID showed 000123456 and Anonymous - very strange.
She asked if she could get a remote session on the server, to which I agreed. She used https://www.fastsupport.com/ - an affiliation with Go2Meeting from Citrix - nothing too shady. Once she was on the machine she basically ignored the registration issue I showed her - instead, she went straight to Event Viewer and created a filter to show me many QuickBooks related errors. She insisted that she needed to resolve these errors before QuickBooks can be registered. I countered by stating it made no sense, as registration does not depend on company files. She countered by arguing the 2014 company files will become corrupt if opened in 2015 while there are unresolved errors. I needed to leave for another meeting at this time so I asked her to reschedule this session for the next day. She offered to keep on working by fixing all these errors while I am away. I said, "I don't think so".
Anyone not living under a rock should at least have some general awareness of security related issues as it applies to our way of life. Most people will be very familiar with security related issues as it applies to the "real" world. For instance, most people will have locks on their doors, have cars that can be locked, some societies have burglar proofing in front of their windows, gates, alarm systems to detect intruders etc. Our lives are surrounded by measures meant to protect us from security exploits.
The same applies to the "virtual" world - in the electronic bits that flow through the copper and optical fibre and air veins of our digital networks. Just as there are real threats to our real world, we encounter virtual threats in our virtual world. Do note that I am not using the words real and virtual by their common meaning, virtual is no less real than real. It is just referring to existing digitally, as opposed to physically.
In the virtual world we encounter many security issues as well. Most people have heard of hacking, passwords, anti-virus, firewalls, HTTPS, encryption etc. All those concepts refer to protecting oneself from various security related exploits. These exploits do not (usually) attack us directly, but rather our digital presence and our information.