Glenn Fleishman’s 14-year relationship with Quicken 2007 finally ended this year. But it took a dead motherboard, an old Mac mini, and a conveniently timed tip for him to break with his accounting software past.
Chipolo previously offered trackers that operated only via its own network. The company’s new Chipolo ONE Spot instead relies entirely on Apple’s Find My network—with all its advantages and limitations.
We have many choices now for boosting coverage and throughput on our home Wi-Fi networks. The main determinants on the path you might pick? Cost, complexity, and installation hassle.
Apple is piercing the privacy veil on our devices to protect children. The company claims its efforts won’t open up a Pandora’s Box in the interests of averting sexual exploitation of children or recognition of sexual material handled by children under 18 when a parent wants oversight. But it’s a big change from its previous absolutist stance in favor of user privacy.
Anyone using FTP or SFTP to connect to their Web site or other servers should consider a tweaky but significant security upgrade that swaps passwords for encryption keys.
Apple says that the dangers of allowing customers to load arbitrary apps are too severe and that the iOS App Store is a bulwark against ransomware, device hijacking, the invasion of children’s privacy, and other problems common on Android.
New services and features in operating systems coming later this year will improve security and privacy for everyone using Apple products, even outside the Apple walled-garden ecosystem. iCloud+ even adds anonymized browsing.
Apple’s new AirTag trackers have provoked considerable interest about their potential for misuse. That’s why your iPhone or iPad can alert you if you’re being tracked by one, with or without your knowledge. We detail exactly when and why.
A little-noticed fact about M1-based Macs has started to get some attention. If the Mac’s internal drive is dead or fully erased, you can’t boot from an otherwise valid external drive. Why would Apple make that choice? Security, security, security.
Apple’s new tracking devices have a lot of potential uses: some good and some not so good. We look at a number of likely scenarios and how they could play out.
T-Mobile has furthered its reputation as the most competitive of the big three cellular companies in the United States by rolling out an unlimited usage broadband service that relies on the company’s 4G and 5G networks.
Rosetta 2 for Apple silicon Macs is the latest in a line of emulators and virtual machines that Apple has released to provide continuity across hardware and operating system transitions. What’s next to come? A full Intel chip emulator for Apple’s M-series ARM chips? We’ll see.
Prices for SSDs and Thunderbolt 3 enclosures have plummeted, so Glenn Fleishman finally bit the bullet to upgrade the storage for his lagging 2017 iMac. Doing so probably extended the useful lifespan of his iMac by years.
Two interlocking technologies that phone carriers began rolling out a couple of years ago are helping dramatically reduce unwanted calls from spammers and fraudsters, while giving law enforcement better tools to track those that remain.
Master the techniques necessary to present slide decks, images, and demonstrations in Zoom by sidestepping limitations in presentation software and learning how to configure some of Zoom’s more fiddly settings.