MegaMacs offers the refurbished 5.5-lb. Apple MacBook Pro Intel Core 2 Duo 2.53GHz 15.4″ LED-Backlit Notebook, model no. MB471LL/A, for $729.99 plus around $20 for shipping. That’s $48 under our mention from two weeks ago and among the best prices we’ve seen for a MacBook Pro with this CPU and […] Read the original post…
Month: March 2013
Apple Will No Longer Approve Apps Using Unique Device Identifier (UDID) Beginning May 1, Must Also Support iPhone 5 and Retina Display
Apple has informed app developers that it will no longer allow apps to use the unique device identifier or UDID after May 1, according to a post on Apple’s developer website. Instead, Apple requests developers use the new ‘Vendor or Advertising identifiers’ that were introduced in iOS 6. Developers […] Read the original post by…
Apple Will No Longer Approve Apps Using Unique Device Identifier (UDID) Beginning May 1
Apple has informed app developers that it will no longer allow apps to use the unique device identifier or UDID after May 1, according to a post on Apple’s developer website. Instead, Apple requests developers use the new ‘Vendor or Advertising identifiers’ that were introduced in iOS 6. Using Identifiers […] Read the original post…
Hewlett-Packard boosts dividend 10 percent amid investor unrest
Hewlett-Packard raised its quarterly dividend by 10 percent on Thursday, amid shareholder displeasure over the company’s $11 billion acquisition of British software firm Autonomy. Read the original post by dailybulletin.com
How to enable two-step verification for your Apple ID
Most people use their Apple ID account not only to house their iCloud contacts, photos, calendars, and other data, but to purchase content from iTunes and the App Store. That means that anyone who gets ahold of your account or manages to change your password could have access to your […] Read the original post…
How to enable two-step verification for your iCloud account
Most people use their iCloud account not only to house their contacts, photos, calendars, and other data, but to purchase content from iTunes and the App Store. That means that anyone who got ahold of your account or managed to change your password would have access to your credit card […] Read the original post…
Hard Candy Hard Shell Case for 15-inch MacBook Pro Retina
The Hard Candy Hard Shell Case for 15-inch MacBook Pro Retina is a simple and relatively inexpensive way to protect your MacBook Pro from scratches and maintain that “new computer” look. Read the original post by james_melzer@sra.com
Apple Podcasts app updated with custom stations, on-the-go playlists, new design, more
Apple has updated their Podcasts app. A lot. Version 1.2 now includes the ability to create custom stations that automagically update when new episodes become available. You can set your custom stations to start with the newest episode, so you always get the latest and the greatest, or the oldest, […] Read the original post…
Yahoo CEO’s Criticized Hiring Changes Suggest a Cultural Shift
Marissa Mayer is now personally vetting new employees. One expert commended the move as part of the shifting culture at Yahoo. Read the original post by iPhoneHacks
Jony Ive Pushing For ‘Flat Design’ in iOS 7 [Report]
Read the original post by Rounak Jain
Jony Ive Pushing For ‘Flat Design’ in iOS 7 [Report]
Read the original post by Rounak Jain
Report: Jony Ive Pushing For ‘Flat Design’ in iOS 7
Read the original post by Rounak Jain
Apple’s Management Shakeup Enabling Increased Collaboration Between Hardware and Software Teams
Read the original post by Rounak Jain
Apple leads consumer cloud storage wars
Apple is the leading consumer cloud storage provider, beating out Dropbox, Amazon, and Google according to a new survey. The survey of 2,300 consumers who regularly use the Internet was conducted in October by research firm Strategy Analytics. It found that 27% of consumers have used Apple‘s iCloud followed by 17% […] Read the original…
Mobile-Device Management: 10 Best Practices for Creating a BYOD Policy
eWEEK and Domingo Guerra, president and co-founder of mobile security company Appthority, talk about best practices in establishing a BYOD policy. Read the original post by iPhoneHacks