This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| iPhone のバッテリーとパフォーマンス | |
| iPhone のパフォーマンスとバッテリーとの関連性についてご説明します。 | |
| iPhone はシンプルで使い勝手のよいユーザ体験を実現すべく設計されています。これを可能にするには、さまざまな先進的なテクノロジーと精巧なエンジニアリングを組み合わせることが必要不可欠になりますが、そうしたテクノロジーの重要分野の一つがバッテリーとパフォーマンスです。バッテリーは複雑なテクノロジーです。バッテリーのパフォーマンスや、それに関連する iPhone のパフォーマンスには、数多くの可変要素が関わっています。すべての充電式バッテリーは消耗品で、その耐用年数 (寿命) には限りがあり、いずれは容量やパフォーマンスが低下して交換が必要になります。バッテリーが劣化すると、その影響で iPhone のパフォーマンスにも変化が表れます。以下、このことについて詳しくご説明します。 | |
| リチウムイオンバッテリーについて | |
| iPhone のバッテリーにはリチウムイオン技術が使われています。旧世代のバッテリー技術と比べて、リチウムイオンバッテリーはより速く充電でき、より長持ちします。また、より高い出力密度を持っているため、耐用年数が延びた一方でバッテリー本体は軽くなっています。現在のところ、充電式リチウムイオンバッテリー技術は、お使いのデバイスに最適なテクノロジーです。リチウムイオンバッテリーの詳細についてはこちらをご覧ください。 | |
| バッテリーのパフォーマンスを最大限に引き出す方法 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| About speculative execution vulnerabilities in ARM-based and Intel CPUs | |
| Apple has released security updates for macOS Sierra and El Capitan with mitigations for Meltdown. | |
| Apple has released updates for iOS, macOS High Sierra, and Safari on Sierra and El Capitan to help defend against Spectre. | |
| Apple Watch is unaffected by both Meltdown and Spectre. | |
| Security researchers have recently uncovered security issues known by two names, Meltdown and Spectre. These issues apply to all modern processors and affect nearly all computing devices and operating systems. All Mac systems and iOS devices are affected, but there are no known exploits impacting customers at the time of this writing. Since exploiting many of these issues requires a malicious app to be loaded on your Mac or iOS device, we recommend downloading software only from trusted sources such as the App Store. | |
| Apple has already released mitigations in iOS 11.2, macOS 10.13.2, and tvOS 11.2 to help defend against Meltdown. Security updates for macOS Sierra a |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| ARM ベースおよび Intel CPU の投機的実行の脆弱性について | |
| Apple では、Meltdown の影響緩和策を盛り込んだ macOS Sierra および El Capitan 向けのセキュリティアップデートをリリースしました。 | |
| Apple では、Spectre 対策に効果的な iOS、macOS High Sierra、Sierra や El Capitan の Safari 向けのアップデートをリリースしました。 | |
| Apple Watch は Meltdown と Spectre のどちらの影響も受けません。 | |
| 最近、複数のセキュリティ研究者が「Meltdown」「Spectre」という 2 つの名前で知られる脆弱性を公表しました。これらの脆弱性はすべてのモダン CPU に存在し、ほぼすべてのコンピューティングデバイスやオペレーティングシステムがその影響を受けます。Mac システムや iOS デバイスもすべて影響を受けますが、この記事の執筆時点で、これらの脆弱性が悪用されてお客様に被害が出たという例は報告されていません。多くの場合、これらの脆弱性を悪用するには Mac や iOS デバイスに悪意のある App をインストールさせる必要があるため、ソフトウェアをダウンロードする際には、App Store などの信頼できるソース以外はご利用にならないようお勧めします。 | |
| Apple では、iOS 11.2、macOS 10.13.2、tvOS 11.2 においてすでに Meltdown の影響緩和策をリリースしています。macOS Sierra および OS X El Capitan 向けのセキュリティアップデートにも Meltdown の影響緩和策が組み込まれています。Spectre 対策として、Apple は iOS 11.2.2、macOS High Sierra 10.13.2 追加アップデート、macOS Sierra および OS X El Capitan 用の Safari 11.0.2 にて影響緩和策をリリースしています。Apple Watch は Meltdown と Spectre のどちらの影響も受けません。 | |
| これらの脆弱性については今後もさらに影響緩和策を開発・検証していきます。 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| About the security content of Safari 11.0.2 | |
| This document describes the security content of Safari 11.0.2. | |
| About Apple security updates | |
| For our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the Apple security updates page. | |
| For more information about security, see the Apple Product Security page. You can encrypt communications with Apple using the Apple Product Security PGP Key. | |
| Apple security documents reference vulnerabilities by CVE-ID when possible. | |
| Safari 11.0.2 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| About the security content of Safari 11.0.2 | |
| This document describes the security content of Safari 11.0.2. | |
| About Apple security updates | |
| For our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the Apple security updates page. | |
| For more information about security, see the Apple Product Security page. You can encrypt communications with Apple using the Apple Product Security PGP Key. | |
| Apple security documents reference vulnerabilities by CVE-ID when possible. | |
| Safari 11.0.2 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| About the security content of macOS High Sierra 10.13.2 Supplemental Update | |
| This document describes the security content of macOS High Sierra 10.13.2 Supplemental Update. | |
| About Apple security updates | |
| For our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the Apple security updates page. | |
| For more information about security, see the Apple Product Security page. You can encrypt communications with Apple using the Apple Product Security PGP Key. | |
| Apple security documents reference vulnerabilities by CVE-ID when possible. | |
| macOS High Sierra 10.13.2 Supplemental Update |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| About Speedometer 2.0 | |
| Speedometer tests a browser's Web app responsiveness by timing simulated user interactions. | |
| This benchmark simulates user actions for adding, completing, and removing to-do items using multiple examples in TodoMVC. Each example in TodoMVC implements the same todo application using DOM APIs in different ways. Some call DOM APIs directly from ECMAScript 5 (ES5), ECMASCript 2015 (ES6), ES6 transpiled to ES5, and Elm transpiled to ES5. Others use one of eleven popular JavaScript frameworks: React, React with Redux, Ember.js, Backbone.js, AngularJS, (new) Angular, Vue.js, jQuery, Preact, Inferno, and Flight. Many of these frameworks are used on the most popular websites in the world, such as Facebook and Twitter. The performance of these types of operations depends on the speed of the DOM APIs, the JavaScript engine, CSS style resolution, layout, and other technologies. | |
| Although user-driven actions like mouse movements and keyboard input cannot be accurately emulated in JavaScript, Speedome |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| BYTE UNIX Benchmarks (Version 5.1.3) | |
| System: Sierras-MacBook-Pro.local: Darwin | |
| OS: Darwin -- 16.7.0 -- Darwin Kernel Version 16.7.0: Mon Nov 13 21:56:25 PST 2017; root:xnu-3789.72.11~1/RELEASE_X86_64 | |
| Machine: x86_64 (unknown) | |
| Language: en_US.utf8 (charmap="US-ASCII", collate=) | |
| CPU 0: Intel(R) Core(TM) i5-5257U CPU @ 2.70GHz (0.0 bogomips) | |
| MMX, Physical Address Ext, SYSENTER/SYSEXIT, Intel virtualization | |
| CPU 1: Intel(R) Core(TM) i5-5257U CPU @ 2.70GHz (0.0 bogomips) | |
| MMX, Physical Address Ext, SYSENTER/SYSEXIT, Intel virtualization |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| BYTE UNIX Benchmarks (Version 5.1.3) | |
| System: hainoMacBook-puro.local: Darwin | |
| OS: Darwin -- 17.0.0 -- Darwin Kernel Version 17.0.0: Thu Aug 24 21:48:19 PDT 2017; root:xnu-4570.1.46~2/RELEASE_X86_64 | |
| Machine: x86_64 (unknown) | |
| Language: en_US.utf8 (charmap="US-ASCII", collate=) | |
| CPU 0: Intel(R) Core(TM) i5-5257U CPU @ 2.70GHz (0.0 bogomips) | |
| MMX, Physical Address Ext, SYSENTER/SYSEXIT, Intel virtualization | |
| CPU 1: Intel(R) Core(TM) i5-5257U CPU @ 2.70GHz (0.0 bogomips) | |
| MMX, Physical Address Ext, SYSENTER/SYSEXIT, Intel virtualization |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| BYTE UNIX Benchmarks (Version 5.1.3) | |
| System: hai1noMacBook-puro.local: Darwin | |
| OS: Darwin -- 17.2.0 -- Darwin Kernel Version 17.2.0: Fri Sep 29 18:27:05 PDT 2017; root:xnu-4570.20.62~3/RELEASE_X86_64 | |
| Machine: x86_64 (unknown) | |
| Language: en_US.utf8 (charmap="US-ASCII", collate=) | |
| CPU 0: Intel(R) Core(TM) i5-5257U CPU @ 2.70GHz (0.0 bogomips) | |
| MMX, Physical Address Ext, SYSENTER/SYSEXIT, Intel virtualization | |
| CPU 1: Intel(R) Core(TM) i5-5257U CPU @ 2.70GHz (0.0 bogomips) | |
| MMX, Physical Address Ext, SYSENTER/SYSEXIT, Intel virtualization |