Remember that photo of the beautiful sunset you took two months ago with your iPhone? Do you have the slightest idea where it is today? Did you ever back it up off your phone? And what about that funny photo of the guy arguing with a parking meter? What happened to that photo?
The January meeting is all about bringing order and sanity to the tidalwave of photos we take (and receive). Come see how to do this with Apple's Photos app (included in macOS and on iPhones and iPads) and Adobe Photoshop Lightroom CC. You'll be glad you did.
Pi Notice of Proposed ByLaw Change
At our January General Meeting, before an exciting session about curation of photos, we will ask the Pi membership to approve a small ByLaws amendment to improve our Pi operations. This notice is posted in compliance with Article XV of the Bylaws (about publication of proposed Bylaw amendments).
Our Bylaws have long provided for 15 Directors. In recent years, we have had trouble filling these seats. Most nonprofits like ours use a range of number of Directors in their bylaws to be able to more flexibly expand or contract the number to changed circumstances. Accordingly, we propose to amend this bylaw provision as follows (where bold shows the area of change, brackets indicate omission and underline shows addition).
Article VII – Board of Directors
Section 1. Powers
SECTION 2. COMPOSITION. The Board of Directors shall be comprised of 9-15  Directors elected by the membership pursuant to Article IX hereof. An officer does not cease to be a Director if removed or replaced as an officer.
Apple has published a technical note on how to avoid phishing attempts (fake email messages), fake virus and malware alerts, and other attempts to compromise your computer or mobile device, or your online resources.
These scams range from messages claiming to be from Apple, to phone calls claiming to have discovered problems on your computer, to text messages sent to your mobile devices. The Apple technical note has practical advice on how to protect your computer, mobile device, credentials, and online information.
Please read Apple's technical note on speculative execution vulnerabilities in ARM-based and Intel CPUs used in Apple products.
These newly-discovered vulnerabilities have received a massive amount of attention, and pose problems for virtually every modern microcomputer-based device, desktop, mobile, or cloud-based, from almost every manufacturer. Apple's note explains the issue in plain language, and outlines their efforts to mitigate the problem.
A preview of the future. Click on the image for more information.
Recent podcast video