MyAppleMenu

The Works-for-Everyone Edition Thursday, March 7, 2019

Prioritizing The MacBook Hierarchy Of Needs, by Jason Snell, Six Colors

I might love an SD card slot and a return of MagSafe and for Apple to keep the headphone jack around, but in the end, there are adapters that will bridge those gaps if need be. No adapter will solve the problem of an unreliable or unpleasant keyboard or replace a display. That’s where Apple must supply something that works for everyone—and if the needs of its users are varied, it should offer a variety of products that can fulfill those needs. A one-size-fits-all approach can work, but only if you’re really successful with the choices you make. With the 2015 MacBook keyboard design, Apple missed the mark—and still forced the result into every single new laptop it designed.

Leaked AirPods 2 Apple Ad Suggests Same Design As Current AirPods, No Sign Of Black Color, by Juli Clover, MacRumors

Unfortunately, there is no point in either video where the design of the second-generation AirPods is clearly visible, but we can garner some hints from what we can see. The second-generation AirPods look identical in design to the original AirPods, with no major changes apparent.

Safety and Wellbeing

Apple Releases Supply Chain Document Revealing iPhone, AirPods And Other Products Are All 'Zero Waste', by Andrew Griffin, Independent

As well as detailing the environmental impact of the production of its products, the document – Apple's 13th of this kind – details the ways it is looking to respond to criticism over technology company's supply chains by helping with the education and safety of those people who work to assemble the iPhone and other products.

While it does show some continuing issues with the ways Apple products are made, the document reveals a marked improvement of the safety and wellbeing of those people who work for Apple and its supply chain.

Apple Deserves Kudos For Doing Right By Workers, by Tim Culpan, Bloomberg

Two of my major beefs with Apple relate to the issues of bonded and underage labor. In the first instance, employees working for the iPhone maker’s suppliers are required to pay upfront fees just to secure a job. This money is usually paid to recruitment agencies. The second is self-explanatory.

Both problems have almost been stamped out. According to the company’s annual Supplier Responsibility Report, just two cases of bonded labor were found last year, involving 287 employees. That’s too many, to be sure, but it’s incredible progress compared with two years ago, when 10 violations were uncovered. By employee numbers, it’s an 82 percent improvement from last year alone.

Behind The Hype Of Apple's Plan To End Mining, by Maddie Stone, Gizmodo

There are 118 elements on the periodic table. An iPhone contains about 75 of them.

We don’t have an exact number because Apple wouldn’t provide one, which is going to be a theme of this story. And while some of those elements, like aluminum and lithium, are familiar in both name and function, others, like neodymium and gallium, are as exotic as the food additives at the bottom of a microwave dinner’s nutritional label. The metallurgical marvel inside your pocket wouldn’t exist without the entire ingredient list.

But the existence of devices like the iPhone has come at a price. All of the metals inside one—recognizable or foreign, precious or pedestrian—hail from rocks that were mined from the Earth, often, using environmentally-destructive processes and ethically-fraught labor practices. Now, Apple is hoping to change that.

Stuff

Apple Shares New 'iPhone Can Do What?' Features Page, by Juli Clover, MacRumors

Topics covered include water resistance, privacy, AirDrop, Group FaceTime, photos search, Memoji, Do Not Disturb, Find My iPhone, Apple Pay, iMessage photo effects, and more.

Introducing The MacStories Shortcuts Archive, A Collection Of 150 Custom Shortcuts For Apple’s Shortcuts App, by Federico Viticci, MacStories

In this first version, the archive contains 150 shortcuts, but more will be posted over time. Each shortcut was created and tested by me and the MacStories team; all of them have been categorized, updated for the Shortcuts app, and marked up with inline comments to explain what they do.

Google Fixes Chrome Zero-day Exploit, Security Update Rolling Out To Mac, Windows, Android, & Chrome OS, by Abner Li, 9to5Google

After releasing an incremental update for Chrome on Mac, Windows, and Linux last Friday, Google revealed yesterday that it addresses a zero-day exploit. The company’s security team advises users to update Chrome on all platforms immediately as there is evidence of a malicious party actively using the attack.

Notes

Apple To Add More Jobs At New San Diego Tech Hub, by Mimi Elkalla, ABC 10 News San Diego

Apple CEO Tim Cook said of his company’s presence in San Diego: “Apple has been a part of San Diego for nearly 20 years through our retail presence and small, fast-growing teams – and with this new investment we are proud to play an even greater part in the city’s future. You don’t have to try too hard to convince people that San Diego is a great place to live, work and do business, and we’re confident our employees will have a great home among the community there.”

According to city officials, San Diego “will become a principle engineering hub for Apple with new positions distributed across a number of specialty engineering fields, to include both hardware and software technologies.”

The Prototype iPhones That Hackers Use To Research Apple’s Most Sensitive Code, by Lorenzo Franceschi-Bicchierai, Motherboard

Solnik’s team used a “dev-fused” iPhone, which was created for internal use at Apple, to extract and study the sensitive SEP software, according to four sources with specific knowledge of how the research was done. Dev-fused devices are sometimes called prototypes in the security research industry. They are essentially phones that have not finished the production process, or have been reverted to a development state.

In other words, they are pre-jailbroken devices.

These rare iPhones have many security features disabled, allowing researchers to probe them much more easily than the iPhones you can buy at a store. Since the Black Hat talk, dev-fused iPhones have become a tool that security researchers around the world use to find previously unknown iPhone vulnerabilities (known as zero days), Motherboard has learned.

Google Revealed It Was Underpaying Some Men. That’s Misleading—and Damaging., by April Glaser, Slate

What the review doesn’t cover is whether women hired with the same levels of experience as men are given lower positions at the company—a problem called leveling.

Bottom of the Page

Why can't I have private and non-private browser tabs in the same browser window?

~

Thanks for reading.