Category Archives: Apple

How Much Memory Do You Need in an M1-Based Mac?

If you’re thinking about buying a new Mac, you’re almost certainly planning to get one that uses a chip from Apple’s M1 family—the M1, M1 Pro, M1 Max, and M1 Ultra. Only the Mac Pro and one Mac mini configuration still rely on Intel CPUs, and they will likely be discontinued before the end of 2022. That’s not a bad thing—the M1 chips offer astonishing performance combined with low power consumption. But the move from Intel chips to Apple silicon has changed the game when it comes to one decision: how much memory to get.

That’s because Apple completely rearchitected how M1-based Macs incorporate memory. On Intel-based Macs that have separate CPU and GPU chips, each chip has its own memory. For instance, the base level Mac Pro comes with 32 GB of RAM on user-replaceable memory sticks, while its Radeon Pro graphics card has 8 GB of memory. The main advantage of this approach is that you can install more system memory if you need it—up to 1.5 TB at purchase time or later—and you can opt for one or even two video cards with up to 64 GB of memory. But that sort of flexibility was available only for the Mac Pro, Mac mini, and now-discontinued 27-inch iMac—with Apple’s laptops, you couldn’t upgrade memory because it was soldered onto the logic board, not socketed.

For M1-based Macs, Apple went even further and built “unified memory” directly onto the M1 chip itself. This provides significant performance benefits for two reasons:

  • Shared memory pool: The M1 chips contain CPU cores, GPU cores, and Neural Engine cores, all of which need to use memory. By creating a shared pool of memory—hence the “unified memory” name—each processor can operate on the same data in memory rather than sending it back and forth from chip to chip. That’s both faster and more efficient.
  • Higher memory bandwidth: By building memory onto the M1 chips themselves, Apple could also speed up the connection between memory and the various processors. Communication between on-chip components is much faster than when data has to travel back and forth between chips across the circuitry of the logic board and graphics card, as was the case for Intel-based Macs.

The downside of unified memory is that you’re stuck with how much you choose when you buy a Mac—there’s no way to upgrade the memory later. Given that only certain Macs have particular M1 chips, figuring out how much you need gets a little complicated.

For instance, if you want a MacBook Air, you can only choose between 8 GB and 16 GB of memory. However, if you are interested in the 14-inch MacBook Pro, you can get either an M1 Pro or M1 Max, and which chip you choose determines whether you can opt for 16 GB, 32 GB, or 64 GB of memory. Here are your choices, with each chip offering two options:

  • M1: 8 GB and 16 GB. Used in the MacBook Air, 13-inch MacBook Pro, Mac mini, and 24-inch iMac. The 16 GB option adds $200 to the price.
  • M1 Pro: 16 GB and 32 GB. Used in the 14-inch and 16-inch MacBook Pro. The 32 GB option adds $400 to the price.
  • M1 Max: 32 GB and 64 GB. Used in the 14-inch and 16-inch MacBook Pro and Mac Studio. The 64 GB option costs an additional $400, half the price per gigabyte of the M1 and M1 Pro memory upgrades.
  • M1 Ultra: 64 GB and 128 GB. Used solely in the Mac Studio. The 128 GB option costs an additional $800, matching the M1 Max’s price per gigabyte.

With all that background in your head, here are some questions to guide your decision:

  • What sort of user are you? For average users who use Safari, Mail, Photos, and the apps in Apple’s iWork suite, an M1 Mac with 8 GB is probably sufficient, although $200 isn’t that much more to pay for 16 GB. If you regularly work with photos, audio, or video, a Mac with an M1 Pro or M1 Max would likely be more appropriate, and the larger the files you work with, the more memory you should get. Only those with the highest performance demands, such as a video professional working with 8K video or data scientist, should consider a Mac Studio with an M1 Ultra—if you’re at that level, you probably know if you need 64 GB or 128 GB.
  • How much RAM do you have now? Another way to approach the problem is to think about how much RAM your current Intel-based Mac has, and if that’s enough. (Look at the Memory Pressure graph in the Memory tab of Activity Monitor—if it’s regularly yellow or red, you need more memory.) The increased performance and efficiency of memory use on the M1 chips suggest that you can get away with the same amount or even less than you have now while still enjoying improved performance. We recommended 16 GB as the minimum for Intel-based Macs, but 8 GB seems to be an acceptable base level for M1-based Macs.
  • Do you anticipate increased memory needs? The hardest part of the decision is looking into the future and thinking about whether a certain amount of memory will be sufficient in several years. It’s never a bad idea to buy more memory than you think you need now to plan for the future—just more expensive. For example, if you’re on the fence between 16 GB and 32 GB with an M1 Pro-based Mac, $400 may be a reasonable price to pay for some future-proofing.

In the end, you’ll never regret having more memory, though you may dislike paying for it now. If cost is a real problem, you’re probably better off getting more memory and less internal SSD storage, since you can always add more external storage. Regardless, feel to reach out for help choosing the right Mac and memory configuration.

(Featured image by Apple)

Export Passwords from Safari to Ease the Move to a Password Manager

Although Apple has improved the built-in password management features in macOS and iOS (you can now add notes to password entries!), third-party password managers like 1Password and LastPass are still more capable. For those still getting started using a password manager, another new capability will ease the transition: Safari password export. To export a CSV file of your Safari passwords, choose Safari > Preferences > Passwords, and enter your password when prompted. From the bottom of the left-hand sidebar, click the ••• button, choose Export All Passwords, and save the Passwords.csv file to the Desktop. After you import the file into 1Password (instructions), LastPass (instructions), or another password manager, be sure to delete the exported file and empty the trash.

(Featured image by iStock.com/metamorworks)

Three Tricks for Dealing with Duplicated Contacts

In today’s world, there’s no reason to remember our contacts’ phone numbers or email addresses—that’s a job for our Macs, iPhones, and iPads. This sort of data is so core to using digital devices that Apple has long provided an ecosystem-wide solution in the form of Contacts and syncing through iCloud.

Unfortunately, it’s all too common to end up with multiple cards for the same person in Contacts, either precise duplicates or versions that contain different details. Further muddying the situation, many of us have multiple contact accounts—such as from Google or Microsoft Exchange—and some contacts may be duplicated across several accounts.

This situation is sufficiently common that Apple has provided three ways to deal with duplicate contacts: manually merging selected contact cards, automatically merging duplicate cards, and linking cards replicated in multiple accounts. The first two can be done only in the Contacts app on the Mac; linking can also be accomplished on an iPhone or iPad.

Merge Contact Cards

Let’s say you’ve ended up with two or more contact cards for the same person in the same account. They’ll usually have the same name, but it doesn’t matter if the names are different. To merge them, which combines the data from each into a single card, select them in Contacts, and choose Card > Merge Selected Cards. You should now see just the single merged card.

Contacts generally does a good job of identifying data that’s identical between the cards (like the iPhone numbers above), though different labels can sometimes trip it up. When there’s a conflict, Contacts creates a new entry for it. Name conflicts are added to the note field.

Look for Duplicates

Merge Selected Cards works if you have a small number of duplicates that you can identify easily. However, many people have found themselves in situations where tens or hundreds of contacts have been duplicated, often due to a hiccup in cloud syncing or importing. To help with that too-frequent occurrence, Apple added a feature that looks at all your contact cards and merges those that it determines are duplicates.

It’s simple to use—just choose Card > Look for Duplicates. After Contacts scans all your cards, it puts up a dialog telling you how many cards it found. Click Merge to combine all the duplicates.

Although merging hundreds of cards can be stressful, it usually works very well, and it’s far faster and easier than the alternative, which is to select each set of duplicates manually and use Merge Selected Cards.

Link Contact Cards

The two previous solutions help when you have duplicate contacts in a single account. Equally annoying can be ending up with contact cards for the same person across multiple accounts. (Check to see what accounts are configured and enabled in Contacts > Preferences > Accounts.) At best, those duplicates will simply clutter your contact list; at worst, you might have to check multiple cards to find the right phone number or email address.

Apple helps you clean up your contact list by linking cards for the same contact across different accounts. (You mustn’t link cards for different people; that can result in people receiving texts meant for others and other confusions.) In essence, this works like Merge Selected Cards, but the separate contact cards remain in their accounts, with Contacts displaying just one card with the combined information.

You can also link contacts using the Contacts or Phone apps on an iPhone or iPad, although the steps are much fussier than in Contacts on the Mac:

  1. Find a person who is replicated across multiple accounts, and view one of their contact cards.
  2. Tap Edit, scroll to the Linked Contacts section at the bottom of the card and tap the green + button.
  3. In the contact list that appears, find and tap the second card for the person—it should either be showing or require scrolling up slightly.
  4. Tap Link, and in the next screen, tap Done.

If you accidentally link the wrong cards and need to unlink them, edit the linked card and click or tap the red Remove button to break the link.

Changes you make to a combined card are saved to each separate card. However, if you want to edit one of the cards but not the other, you can view and edit each one separately by clicking the account name next to Cards on the Mac or tapping the appropriate card under Linked Contacts on an iPhone or iPad.

Cleaning up your contact list may not be the most exciting thing to do, but it’s worthwhile to eliminate duplicates that could cause confusion later on.

(Featured image by iStock.com/anyaberkut)

Hidden Tricks for Navigating the Mac’s App Switcher More Quickly

Although the Mac’s Dock shows all your running apps, it’s often not the most efficient way to switch among them. Instead, turn to the App Switcher. You may know that pressing Command-Tab switches to the last-used app, making it easy to flip back and forth between two apps. However, if you press Command-Tab and continue to hold the Command key down, the App Switcher itself appears, with icons for all running apps. When you let up on the Command key, the App Switcher disappears, and you’ll switch to the selected app. To select an app, while the Command key is down, press Tab or Shift-Tab to cycle through the apps, or hover your pointer over the desired app. You can also click the desired app to switch to it instantly, without letting up on the Command key. And if you want to dismiss the App Switcher without switching apps, press Esc.

(Featured image by iStock.com/SIphotography)

Increase Business Cybersecurity Awareness in Light of Russian Invasion of Ukraine

For several decades, Russia has targeted a wide variety of cyberattacks at countries with which it has had disputes. That includes the United States and other Western nations, which have recently levied unprecedented sanctions against Russia after it invaded Ukraine. President Biden has warned that “Russia could conduct malicious cyber activity against the United States” in response, encouraging the private sector to increase the protection of systems and networks. This isn’t theoretical—the US Cybersecurity & Infrastructure Security Agency lists numerous such attacks in the last five years.

It’s tempting to think that your business is too small or unimportant to be targeted in a Russian cyberattack. While that may be true of direct infiltration by individual Russian hackers, many cyberattacks are carried out indiscriminately by bots—the ultimate is the DDoS (distributed denial of service) attack that uses compromised computers and Internet-of-things devices to flood a targeted server or company with an unmanageable amount of random Internet traffic. Plus, a common hacking approach is to compromise an account on one seemingly unrelated system as a stepping stone to another, more secure system.

There’s nothing new here—we’ve been encouraging everyone to take cybersecurity seriously for years now. But the threat is now more serious than ever before. So, here’s what we suggest—if you need help with any of this, don’t hesitate to contact us.

  • Be vigilant: The most common way that hackers gain entry into computer systems is through an employee opening a malicious attachment or being fooled into entering credentials into a fake website. Implement or refresh security awareness training that teaches employees how to recognize suspicious email, identify phishing attempts, and report appropriately.
  • Use good password practices: Make sure that everyone uses strong, unique passwords that are created, stored, and entered using a password manager. Password managers also identify weak passwords and those that have been compromised in security breaches—ask everyone to audit their passwords and update any that aren’t secure. (But there’s no reason to change good passwords willy-nilly.)
  • Implement 2FA: Whenever possible, require two-factor authentication, which provides extremely strong protection against remote intrusion given that a compromised password is no longer sufficient.
  • Keep software up to date: Install all software and operating system updates on all platforms. In its security update notes, Apple often says that particular vulnerabilities are actively being exploited—it’s crucial to install such updates immediately. If you use anti-malware software (essential for Windows; less so for macOS), keep its signatures current.
  • Backup regularly: Ensure that all systems are backed up regularly, and for your most important data, make sure backups are protected from ransomware encryption by storing them offline or using object locking on a cloud storage service. Be sure to test your backups regularly as well—backing up is the first step, but being able to restore is what’s necessary.
  • Increase monitoring: Keep a centralized record of all employee reports of suspicious behavior to better identify attack patterns and targeted systems. Whenever possible, make sure server and network device logging is enabled so any incidents can be investigated more fully. Turn on any anomaly reporting capabilities in backup and other security-related apps.
  • Plan for the worst: Develop or revisit business continuity and crisis response plans. For instance, discuss how you’d deal with losing Internet connectivity, being locked out of key online accounts, or having all your data rendered inaccessible by ransomware.

There’s no reason to panic, but the increased threat from Russian cyberattacks is a good excuse to focus more attention on digital security. The Internet makes astonishing things possible, but it also opens us up to attacks that would previously have been inconceivable. Stay safe out there.

(Featured image by iStock.com/BeeBright)

Can’t Rotate the Screen on an iPad or iPhone? Fix the Problem in Control Center

Normally, when you rotate an iPad, the screen happily flips from portrait (vertical) to landscape (horizontal) orientation as appropriate. Rotating an iPhone has the same effect in some apps, though many are written to work only in one orientation. If you ever end up in a situation where your device’s screen doesn’t rotate when you think it should, the reason is likely that Rotation Lock has been turned on in Control Center. Swipe down from the top-right corner of your screen (or up from the bottom of the screen on a Touch ID iPhone) and disable the Rotation Lock button. You can turn it on again later if you ever want to prevent the screen from rotating temporarily.

(Featured image by iStock.com/Jacephoto)

Apple Works to Improve Safety in the Wake of AirTag Stalking Reports

Over the past few months, there has been a spate of media reports about how people may have been tracked without their knowledge using AirTags, Apple’s elegant location trackers. Like many mainstream media forays into the tech world, the reports are often short on detail and sometimes unclear on the reality of how the AirTags work. Nor is it clear that there have been many successful cases of AirTag abuse, but the mere fact that people are trying to use AirTags to stalk others is concerning.

Apple put significant effort into preventing such abuses, revolving around three features:

  • Safety alerts: If you have an iPhone or iPad running iOS 14.5 or later and an unknown AirTag is traveling with you, your device will alert you to that fact. Although safety alerts aren’t available for those using Android smartphones, Android users can download Apple’s Tracker Detect app to scan manually.
  • Safety sounds: After an AirTag has been separated from its owner for several days, it will make a sound the next time it moves.
  • NFC identification: If you find an AirTag, you can hold it up to an iPhone or other NFC-capable smartphone to load a website that reveals the AirTag’s serial number and the last four digits of the owner’s phone number. The police can use this information to learn the owner’s identity from Apple.

Sadly, those precautions haven’t been sufficient either to dissuade all would-be stalkers or to educate potential stalking victims (and let’s be real—dissuading stalkers is also a matter of educating people that it’s unethical, likely dangerous, and often illegal to abuse an AirTag in this way). Apple has responded in two ways, one general, the other specific to AirTags.

Personal Safety User Guide

Apple documents its products and services quite well, but the company tends to generate many focused pages without much high-level organization. It’s all too easy to flail around within Apple’s support documentation looking for help if you don’t know what search terms are likely to work. In an effort to mitigate that problem for issues surrounding personal safety, Apple has created the Personal Safety User Guide website, also available as a downloadable 56-page PDF.

The Personal Safety User Guide brings together numerous Apple support articles in two main sections:

  • Review and take action: The first section helps you review how your devices and apps are set up, with a focus on settings that could expose you to harm. It helps you manage sharing settings, look at location sharing, control your Home accessories, and more. You’ll also learn how to block unknown sign-in attempts, document suspicious activity, delete suspicious content, and avoid fraudulent requests to share information, among much else. The main criticism here is that the section on AirTag safety doesn’t explain or link to all the features Apple provides.
  • Safety and privacy tools: The second section is a bit more generic, providing support documentation that encourages you to take advantage of the features Apple has provided to protect your safety and privacy. Among other topics, it discusses passcodes, setting up Face ID and Touch ID, using two-factor authentication, seeing which apps are accessing your data, blocking unwanted calls and messages, and using Emergency SOS.

The Personal Safety Guide ends with three checklists, each of which walks you through a series of steps. These are extremely useful because almost no one would necessarily know or remember all the places to check. The checklists help you:

  • See who has access to your device or accounts
  • Stop sharing with someone
  • Control how someone else can see your location

The Personal Safety User Guide website is best when you want an answer to a specific question, but it doesn’t lend itself to reading front to back. For that, we recommend downloading the PDF, which you can read at whatever depth you desire. But do at least scan the entire thing to get a sense of what it contains should you need that information later.

Apple AirTag Announcement

Shortly after releasing the Personal Safety Guide, Apple also posted a short but detailed statement on its website. In it, the company makes it clear that it is actively working with law enforcement on all cases involving AirTag abuse. Apple also says that it has updated its unwanted tracking documentation to explain AirTag safety features more clearly to users and to include resources for those who feel their safety is at risk.

Apple also outlined important advancements that will be coming to the AirTag and Find My network systems via software updates later this year:

  • New privacy warnings during AirTag setup: To ensure that everyone understands the utility of AirTags and the implications of abuse, people setting up an AirTag for the first time will see a message that clearly states that AirTags are meant to track their own belongings, that tracking people without their consent is a crime in many places, that AirTags are designed to alert victims to their presence, and that law enforcement can request identifying information about the owner of an AirTag.
  • Better alerts for AirPods: Instead of an “Unknown Accessory Detected” alert when your iPhone detects Find My network-compatible AirPods traveling with you, the alert will specify that AirPods are involved, not an AirTag. (There are third-party Find My network accessories that will still generate this alert, such as the Chipolo ONE Spot.)
  • Refined unwanted tracking logic: Apple will be updating its unwanted tracking alert system to notify users sooner that an unknown AirTag or Find My network accessory is traveling with them.
  • Precision Finding for unknown AirTags: Those with an iPhone 11, iPhone 12, or iPhone 13 will be able to take advantage of Find My’s Precision Finding feature to home in on the location of an unknown AirTag. Previously, this capability was limited to your own AirTags.
  • Display alerts with unknown AirTag sound: When an unknown AirTag emits a sound to alert anyone nearby to its presence, and it’s detected moving with your iPhone or iPad, an alert will also appear to help you play the sound again or use Precision Finding, if available. This should help when an unknown AirTag is in a place that blocks sound or if its speaker has been disabled.
  • More obvious AirTag alert sound: Apple will be adjusting the tone sequences to make an unknown AirTag’s alert sound easier to hear and find.

Overall, these changes are welcome, and it’s a testament to the care Apple took when designing the AirTag and Find My network systems that it can make such enhancements through software updates—no hardware changes are necessary. It’s also good to see Apple taking the problem—however small it might actually be—seriously and working to reduce it even further.

(Featured image by Apple)

Extend Your Battery Life in macOS 12 Monterey with Low Power Mode

We’ve become accustomed to our iPhones and iPads switching into Low Power Mode to preserve battery life, and you can enable it manually if you want to reduce power usage for a day. New in macOS 12 Monterey for the MacBook Air and MacBook Pro is a similar feature, though you must enable it manually. Open System Preferences > Battery, click Battery in the sidebar, and select Low Power Mode. It reduces the screen brightness automatically and may decrease CPU performance. Make sure to turn it off once you don’t need it anymore.

(Featured image by iStock.com/Pascal Kiszon)

Please Dispose of Old Electronics Responsibly—Not in the Trash or Standard Recycling!

We all have old electronics squirreled away in our drawers and closets. It’s hard to admit that a computer, phone, or peripheral that cost hundreds or even thousands of dollars years ago has little or no value. That’s doubly true if it doesn’t work anymore. Once you’ve decided to get rid of that PowerBook 520 from the 1990s or your first digital camera from 2004, resist the urge to toss it in the trash.

In some places, it’s illegal to throw out electronics because they tend to contain heavy metals like mercury, lead, and lithium, plus other hazardous materials that can pollute the air if incinerated or contaminate the ecosystem if buried in landfills. Even if dumping e-waste is not actively illegal in your area, it’s a terrible thing to do. So what can you do instead?

No matter what you choose, make sure to delete all your data to the extent possible. If the device in question works, it’s best to erase or reformat its storage. Apple makes that relatively easy, especially on iOS devices; look in Settings > General for a reset option that contains Erase All Content and Settings. For dead computers whose drives contain data, you can remove the drive and ensure your data can’t be accessed by whacking it with a hammer or drilling through the case. That can be a good stress reliever too, but be sure to wear safety goggles.

Sell

If the old device is fully functional or sufficiently rare, you may be able to sell it on eBay or through Craigslist. To determine if that is likely to be worthwhile, search for similar used devices on those sites. If others are selling their old stuff, you probably can too. Keep in mind that you’re not likely to make much, and be sure to take shipping costs and fuss into account.

Donate

Given the low value of even fully functional hardware, a more socially beneficial option is often to take advantage of local programs that accept donations of working computers and other electronics, clean and refurbish them as necessary, and then donate them to schools, libraries, community centers, and other worthy institutions. If the program to which you’re donating is a registered nonprofit, you may even be able to deduct the value of the gear from your taxes.

If your area lacks such programs, check out Computers with Causes, which accepts donations of computers, tablets, and gadgets. It then refurbishes them and moves them on to groups like youth centers, K–12 schools, libraries, historical societies, wildlife conservation organizations, and more. Also look into World Computer Exchange, which provides donated computers and electronics to youth in developing nations.

Recycle

All too often, the only realistic option for disposing of old electronics is recycling. That doesn’t mean just tossing that old iPhone 3GS in the bin with your #2 plastics. It’s extremely important that e-waste be recycled separately from standard recyclables like cardboard, paper, cans, and plastic tubs. That’s because lithium batteries from improperly recycled electronics are causing dangerous fires at recycling centers.

Municipal waste programs are often set up to recycle e-waste properly, and they may be the easiest option in your area. For alternatives, look to the large chain stores Best Buy and Staples, both of which accept electronics for recycling, generally for free. Apple stores also accept electronics for recycling, or you can request a prepaid shipping label that lets you ship e-waste to Apple. Alternatively, try searching the Earth911 database for other recycling options near you. The Consumer Technology Association also provides a locator for electronics recycling; it may have slightly different listings.

Regardless of where you take your e-waste, be sure to read the requirements first. Not all sites take all types of electronics—a cell phone is much easier to handle than a broken large-screen TV. Also, you may need to remove any batteries first and recycle them separately so they can be handled with additional care to prevent fires.

Thanks for doing your part to keep old electronics from causing harm!

(Featured image by iStock.com/ThamKC)

Delete or Position iOS Apps from Search

In iOS 15 and iPadOS 15, Apple added a feature that would have been even more welcome before the advent of the App Library: the capability to manage apps from Search. But it’s still handy as a way to delete or position an app you can’t find on a Home screen page. Swipe down from the middle of the Home screen to enter Search, after which you can work with any app you see in Siri Suggestions or find with a search ➊. Touch and hold an app to display its contextual menu ➋, including a Delete App option. Or touch and hold it and start dragging to move it to a Home screen page ➌. Bonus: you can even drag an app out multiple times to put it on multiple Home screen pages or in multiple folders!

(Featured image by iStock.com/B4LLS)