Perhaps the most surprising change in the iPhone 14 line, at least in the United States, was the shift from using removable SIM cards to eSIM. SIM cards—SIM stands for Subscriber Identity Module—have been a fixture in the mobile phone world for many years because they provide the unique identification necessary to connect a subscriber […]

Read More

Spam remains one of the scourges of the Internet, although spam filters do a pretty good job of keeping most of it out of email inboxes. However, those spam filters can cause deliverability problems for organizations that send email for marketing or customer outreach. One way that happens is if the IP address—the unique numeric […]

Read More

Email may not be as sexy a way to communicate as modern-day darlings like Messages, Slack, or Microsoft Teams, but it remains the workhorse of business and personal communications. While Apple’s Mail is a mature app that has long provided the necessary basics, there has been room for improvement. In iOS 16, iPadOS 16, and […]

Read More

The iPhone and iPad have long allowed you to share Wi-Fi passwords with other nearby devices and people as long as they were in your Contacts list. But you couldn’t see those passwords, which is handy for sharing with non-Apple users and devices. In iOS 16 and iPadOS 16, you can now view and copy […]

Read More

In a series of press releases—no big video event this time—Apple has announced upgrades to the iPad, iPad Pro, and Apple TV. The new models are largely evolutionary, with changes that are welcome but unlikely to change your iPad or Apple TV experience. All are available to order now, with the new iPads arriving on […]

Read More

The iPhone has long been able to play clicking sounds when you tap the keys on the virtual keyboard, but that feedback, while sometimes welcome, can become annoying when you’re trying to be quiet. A new feature in iOS 16 provides haptic feedback—tiny taps you can feel in your fingertips as you tap keys on […]

Read More

We’re increasingly hearing from organizations that need to establish that they have sufficient security policies in place, either to meet the requirements of a larger client or to qualify for cyber insurance that insures against breaches and similar losses. Details vary, and we’re happy to work with you on the specifics, but here are some […]

Read More