"One of the most, if not the most, profound change at Apple, certainly in our products over the last 20 years, is how we now do so many of those technologies in-house," said John Ternus, who runs hardware engineering at Apple. "And top of the list, of course, is our silico...
By treating devices as if they had an expiration date, Apple is able to better meet spikes in demand when new products are launched – cutting down on waste and allowing them to remain as nimble as possible. “When Tim Cook initially took over Apple’s supply chain, he cut down the numb...
" it seems irresponsible not to provide customers a path to using their old USB-C devices on the new iPhone without rate limiting them. MFi will be there to push new and future devices, but we find it difficult to fathom Apple abandoning the incredible amount of prod...
In the supply chain sector, Apple is widely regarded as an innovative leader, providing inspiration for other brands and forcing the competition to keep up to the same standards with their supply chains, or risk falling behind. But how does Apple manage to always stay at the top in this reg...
Direct-to-consumer businesses that previously relied heavily on Facebook as a way to target and advertise on the social media giant are now starting to realize the perils that resulted from privacy policy changes instituted by Apple. These changes have upended the digital adve...
Police have even used Apple AirTag data to help crack luggage theft cases. When your plane gets to your final destination, you can also use the Apple AirTracker to track the progress of your luggage on its way to baggage claim. Since their battery life can last up to a year, you don...
But over a decade ago, Apple took a different approach, and attempted to force news publications to reveal their sources so it could crack down on leaks. Apple sought to subpoena editors atAppleInsiderandPowerPagein an effort to identify sources who provided accurate details o...
Additionally, Apple plans to require developers to verify their identities using two-factor authentication. That could cut down on the practice of forging, loaning, or selling enterprise certificates, as Testut suspects many Chinese operations are engaging in. “Every time Apple revokes a certificat...
Apple Watch features a Passbook application wherein the users can store payment information, keep coupons, loyalty cards and more.The marketers also have the option to advertise their retail store by displaying “Apple Pay is accepted here.” While checking out from their smartwatch, when the ...
AirTags don’t rely on an internet connection of their own. Instead, they piggyback off of a network of almost a billion iOS devices and Macs already out in the world. Each AirTag sends out a unique encrypted Bluetooth identifier; other Apple devices can detect it and relay the location of...