Apple Powers Mac mini and MacBook Pro with New M2 Chips, Releases New HomePod

With a handful of press releases buttressed by a 19-minute video, Apple pulled back the curtains on its new M2 Pro and M2 Max chips and announced updated Mac mini and MacBook Pro models that rely on the new chips. There are no significant design or feature changes with these updated models, just faster performance, enhanced external display support, and support for the latest wireless connectivity standards. The new Mac mini and MacBook Pro models are available to order now, with units in stores and orders starting to arrive on January 24th.

Then, in another surprise announcement, Apple announced the second-generation HomePod, which updates the full-size smart speaker with a few new features and likely makes it more cost-effective to produce.

New M2 Mac mini and M2 Pro Mac Broaden the Appeal

For many years, the Mac mini has been popular for its small size, low price, and decent performance, bolstered in 2020 by a move from Intel CPUs to Apple’s M1 chip. Apple has now increased the Mac mini’s power even more by letting users choose between the M2 and the new M2 Pro. How much more? It depends greatly on what you’re doing, and Apple offers some comparisons. The improvements will likely be noticeable with the M2 and obvious with the M2 Pro.

The M2 Mac mini starts at $599—$100 less than the starting price for the M1 Mac mini—and provides an 8-core CPU and 10-core GPU with unified memory configurations of 8 GB, 16 GB (add $200), or 24 GB ($400). In terms of storage, the base level is 256 GB, but you can increase that to 512 GB ($200), 1 TB ($400), or 2 TB ($800). It provides only two Thunderbolt 4 ports.

The M2 Pro Mac mini starts at $1299 for a 10-core CPU and 16-core GPU, but you can bump that up to an M2 Pro with a 12-core CPU and 19-core GPU for $300. You also get 16 GB of unified memory and 512 GB of storage for that base price. 32 GB of memory costs $400 more, and storage upgrades are 1 TB ($200), 2 TB ($600), 4 TB ($1200), and 8 TB ($2400). It offers more connectivity with four Thunderbolt 4 ports. Note that as you configure a powerful M2 Mac mini, you’ll be straying into Mac Studio territory in terms of both price and performance.

Both Mac mini models boast enhanced external display support. Read the tech specs for full details, but in essence, along with multiple monitor support over Thunderbolt, the HDMI port on an M2 Pro Mac mini supports either an 8K display or a 4K display running at a faster refresh rate, which might be a boon in video-focused fields. Other improvements that may be welcome in specific setups include the option to add 10 Gigabit Ethernet for $100, support for Wi-Fi 6E (which can improve throughput over short distances with a new router), and Bluetooth 5.3.

The updated Mac mini replaces both the M1 Mac mini and the Intel-based Mac mini that Apple had left in the lineup until now.

It probably won’t be long before Apple releases an M2 24-inch iMac, too. We know that some are pining for a 27-inch iMac with Apple silicon, and we’ll just have to wait to see if Apple returns to that form factor with either an iMac or iMac Pro. We can also expect M2 versions of the Mac Studio at some point, but we’ll have to wait for Apple to come out with an M2 Ultra chip if it’s to maintain the same lineup as today’s M1 family.

M2 Pro and M2 Max Speed Up 14-inch and 16-inch MacBook Pro

Since their October 2021 release, Apple’s professional laptops, the 14-inch MacBook Pro and 16-inch MacBook Pro, have provided impressive processing power thanks to their M1 Pro and M1 Max chips. Apple has now switched to the new M2 Pro and M2 Max chips, and the company says that both offer 20% more CPU performance, 30% more GPU performance, and 40% more Neural Engine performance than their predecessors. As with the Mac mini, the updated MacBook Pro models also feature enhanced external display support (see the tech specs for full details), Wi-Fi 6E, and Bluetooth 5.3. Finally, Apple estimates they’ll have an hour more battery life.

The 14-inch MacBook Pro starts at $1999 for an M2 Pro with a 10-core CPU and 16-core GPU, 16 GB of memory, and 512 GB of storage. Chip upgrades include the 12/19-core (CPU/GPU) M2 Pro ($300), the 12/30 M2 Max ($500), and the 12/38 M2 Max ($700). With memory, the M2 Pro configurations can upgrade to 32 GB ($400), whereas the M2 Max configurations start at 32 GB and let you go to 64 GB ($400) or 96 GB ($800, with the 12/38 M2 Max only).

The 16-inch MacBook Pro costs $2499 for an M2 Pro with a 12-core CPU and 19-core GPU, 16 GB of memory, and 512 GB of storage. Chip upgrades include the 12/30 M2 Max ($200) and the 12/38 M2 Max ($400). Memory is the same as with the 14-inch MacBook Pro, so the M2 Pro configuration can upgrade to 32 GB ($400), and the M2 Max configurations start at 32 GB and let you go to 64 GB ($400) or 96 GB ($800, with the 12/38 M2 Max only).

Given that these new MacBook Pro models provide more performance and battery life for the same prices as before, their release is entirely positive. If you were waiting for an M2 Pro or M2 Max laptop, now’s the time to place an order.

Apple Brings Back the Full-Size HomePod

Apple released the original HomePod in 2018, but even after dropping the price from $349 to $299, sales weren’t strong enough thanks to competition from much cheaper smart speakers from Amazon and Google. Apple discontinued the HomePod in 2021 and focused on the $99 HomePod mini. Now Apple has brought the full-size HomePod back, introducing a second-generation HomePod with a few extra features and the same $299 price. You can order it now in white or midnight, which replaces space gray, and it ships on February 3rd.

The new HomePod supports spatial audio with Dolby Atmos for music and video, which should enhance the listening experience. For those getting into home automation, it includes a sensor for temperature and humidity, and you’ll be able to use the Home app to create automations to control blinds, fans, and thermostats. It also supports the new Matter home automation standard. Finally, Apple says that a software update in a few months will add Sound Recognition, which will let the HomePod alert you if it hears smoke or carbon monoxide alarms. Wouldn’t you like to know if an alarm is going off while you’re away from home?

One note. You can use two HomePods to create a stereo pair, but both HomePods must be the same model. So you can’t pair an original HomePod with a second-generation HomePod or mix an HomePod mini with either one.

The main question, which we won’t be able to answer until the second-generation HomePod ships, is if it sounds as good as the original HomePod and hears Siri commands as well. That’s a question because Apple redesigned the HomePod’s audio hardware to use fewer tweeters and microphones. Plus, it relies on the S7 chip that powers the Apple Watch Series 7, as opposed to the A8 that first appeared in the iPhone 6. In short, it seems that Apple has worked to cut costs to enable the necessary profit margins. Given that Amazon’s hardware division reportedly lost $10 billion in 2022 by selling Echo smart speakers at cost, Apple’s move seems sensible, at least as long as it doesn’t hurt the HomePod user experience.

(Featured image by Apple)

AutoFill in Safari Not Working? Set “My Card” in Contacts

We heard from a client that AutoFill in Safari suddenly stopped entering her name and address in Web forms when she chose Edit > AutoFill Form or pressed Command-Shift-A, forcing her to enter her contact information manually, like an animal. (And yes, the “Using information from my contacts” checkbox was selected in Safari’s AutoFill preferences.) Although we have no idea what caused the problem, the solution turned out to be simple. She went into Contacts, found her personal contact card, and chose Card > Make This My Card. Give this a try if you’re having trouble with AutoFill or haven’t yet started using it in Safari.

(Featured image by Adam Engst)

LastPass Security Breach: Here’s What to Do

Password management company LastPass has announced that it suffered a security breach in which attackers stole both encrypted customer account data (which is bad) and customer vaults containing encrypted usernames and passwords (which is much, much worse). On the positive side, the data of users who abided by LastPass’s defaults and created master passwords of at least 12 characters in length will likely resist cracking attempts.

Although 1Password is the most popular password manager for Apple users, we’ve mentioned LastPass as an alternative in previous articles, so here’s what happened and how LastPass users should react. For those who don’t use LastPass, we also discuss ways your organization can improve its online security by learning from LastPass’s mistakes and misfortunes.

The Breach

According to LastPass, the breach started in August 2022 when an attacker compromised a developer’s account. The attacker then leveraged information and credentials from that initial breach to target another LastPass employee’s account, where they were able to steal data from cloud-based storage that LastPass used for backup.

The main lesson here is that a dedicated attacker will probe all points of access into a company’s digital infrastructure—everyone must be mindful of security at all times. It also seems that LastPass may have been paying more attention to its on-premises production systems than its cloud-based backup storage. Any organization can learn from that error—if backups contain sensitive data, they should be equally protected.

What Was Stolen

LastPass says that the stolen data included unencrypted customer account information such as names, addresses, and phone numbers, but not credit card details. In the customer vaults, LastPass did secure usernames, passwords, secure notes, and form-filled data using 256-bit AES encryption, so they can be decrypted only with a unique encryption key derived from each user’s master password. However, for inexplicable reasons, LastPass failed to encrypt website URLs associated with password entries.

Because LastPass left this information unencrypted, it’s now available for the attacker to use (or sell for others to use) in targeted phishing attacks. A forged password reset request from an unusual website you regularly use has a better chance of fooling you than a generic one for a big site that millions of people use. It’s even possible that the unencrypted website URLs could lead to extortion attempts, as in the infamous Ashley Madison data breach.

The larger lesson is that a high-value attack target like LastPass should never have stored customer data in unencrypted form. If your company handles customer data along these lines, ensure that it’s always stored in encrypted form. You may not be able to prevent attackers from accessing your network, but if all the data they can steal is encrypted, that limits the overall damage that can ensue.

Potential Problems

By default, LastPass requires master passwords to be at least 12 characters in length. Plus, LastPass applies 100,100 iterations of the PBKDF2 password-strengthening algorithm to make it harder for brute-force attacks to crack passwords. The company says:

If you use the default settings above, it would take millions of years to guess your master password using generally-available password-cracking technology. Your sensitive vault data, such as usernames and passwords, secure notes, attachments, and form-fill fields, remain safely encrypted based on LastPass’ Zero Knowledge architecture. There are no recommended actions that you need to take at this time.

Unfortunately, LastPass increased the master password minimum length only in 2018 and did not require users with shorter master passwords to reset them at that time. Similarly, the PBKDF2 setting now uses 100,100 iterations, but it previously used 5000, and some long-time users report it being set to 500.

LastPass was correct to increase the default level of security for new accounts as hardware cracking capabilities became faster. However, allowing users to continue using insecure master passwords that were too short and not forcing higher PBKDF2 iteration counts was a major mistake. If your organization steps up its security policies, bite the bullet and ensure that no accounts or users are grandfathered in with old, insecure options.

By not recommending any actions, LastPass missed an opportunity to encourage users to increase their security through multifactor authentication. LastPass also downplayed the concern over phishing attacks. That was likely a decision made by PR (and possibly Legal), but the company could have served users better. Should your organization ever be involved in a breach, make sure that someone involved in the transparency discussions represents the users’ best interests alongside those of the organization. And consider requiring multifactor authentication!

Finally, it’s worth noting that other companies significantly increase the security of their systems by mixing passwords with additional device-based keys. Apple does this by entangling device passcodes and passwords with the device’s unique ID, and 1Password strengthens your passwords with a secret key. LastPass has no such additional protection.

What LastPass Users Should Do

There are two types of LastPass users in this situation: those who had long, secure master passwords and 100,1000 iterations of PBKDF2 and those who didn’t:

  • Strong master password users: Despite LastPass’s claim that you don’t need to do anything, we recommend enabling multifactor authentication. (For instructions, click Features & Tools and then Multifactor Authentication in the LastPass support portal.) You could change your master password too, but that won’t affect the data that was already stolen. That horse has already left the barn, whereas enabling multifactor authentication would prevent even a cracked master password from being used in the future.
  • Weak master password users: Sorry, but you have work to do. Immediately change your master password and increase your PBKDF2 iterations to at least 100,100. We also recommend enabling multifactor authentication because LastPass is such an important account. Next, go through all your passwords and change at least those for important websites. Start with the critical accounts that could be used to impersonate you, like email, cell phone, and social media, plus those that contain financial data.

Regardless of the strength of your master password, be on high alert for phishing attacks conducted through email and text messages. Because the stolen data included both personal information and URLs to websites where you have accounts, phishing attacks may be personalized to you, making them harder to detect. In short, don’t follow links in email or texts to any website where you have to log in. Instead, navigate to the website directly in your browser and log in using links on the site. Don’t trust URL previews—it’s too easy to fake domain names in ways that are nearly impossible to identify.

Should you switch from LastPass to another service, like 1Password? It comes down to whether you believe LastPass has both a sufficiently secure architecture despite not entangling the master password with some device-based key and sufficiently robust security practices despite having been breached. It would not be irrational to switch, and we would recommend switching to 1Password. Other password managers like Bitwarden and Dashlane may be fine too. If you have to change numerous passwords and choose to switch, it may be easier to change the passwords after switching—see how the process of updating a password compares between LastPass and 1Password or whatever tool you end up using.

We realize this is an extremely worrying situation for LastPass users, particularly those with weak master passwords or too-few PBKDF2 iterations set. Only you can reset your passwords, but if you need assistance switching to another password manager, don’t hesitate to contact us.

(Featured image by LastPass)

Upgrade Past macOS 10.15 Catalina to Keep Getting Microsoft Office Updates

We aren’t quite ready to recommend that everyone upgrade to macOS 13 Ventura, but if you use Microsoft Office with macOS 10.15 Catalina, you should start planning for an upgrade. Microsoft has announced that current versions of its productivity suite—Office for Mac 2019, Office for Mac 2021, and Microsoft 365—will receive updates only if your Mac is running macOS 11 Big Sur, macOS 12 Monterey, or macOS 13 Ventura. If you keep using Catalina, your Office apps will continue to work, but they won’t receive enhancements, bug fixes, or security updates past October’s 16.66 updates. Contact us if you have questions about appropriate upgrade paths.

(Featured image based on an original by iStock.com/jewhyte)

Copy Gigabytes of Data Between Macs with Target Disk Mode

Apple makes it easy to move data between Macs. You can send files via AirDrop, attach them to an email message, put them in a Messages conversation, turn on and connect via File Sharing, or use a file-sharing service like iCloud Drive, Dropbox, or Google Drive as an intermediary, to name just a few of the more obvious approaches.

But what if you have a lot of data—say tens or even hundreds of gigabytes—to transfer from one Mac to another? The techniques listed above might work, but we wouldn’t bet on it. If you had an external drive with sufficient free space handy, you could copy all the data to it from one Mac and then copy the data from it to another Mac. To cut the copy time in half, try Target Disk Mode instead. You may even be able to use Target Disk Mode on an older Mac to transfer an account with Migration Assistant when setting up a new Mac.

What Is Target Disk Mode?

Target Disk Mode is a special boot mode for Intel-based Macs and an option in macOS Recovery on Macs with Apple silicon that enables one Mac to behave like an external drive for another Mac. Target Disk Mode is nearly universal, easy to set up, and one of the fastest methods of moving files between Macs. Let’s unpack that statement:

  • Nearly universal: Every Mac sold in the last decade supports Target Disk Mode, so you can be sure it will work with any modern Mac. That’s true of both Intel-based Macs and Macs with Apple silicon.
  • Easy setup: Because Apple has baked Target Disk Mode into the Mac firmware, the version of macOS is irrelevant beyond the Thunderbolt cable requirement discussed below. There’s no software to configure nor any permissions to worry about. Putting a Mac into Target Disk Mode is particularly simple on Intel-based Macs, but it’s also easy on Macs with Apple silicon.
  • Speed: Because you’re connecting one Mac directly to another using Thunderbolt, you’ll get the fastest transfer speeds available.

If either Mac has macOS 11 Big Sur or later installed, you’ll need to connect them with a Thunderbolt cable—it’s fine to use Apple’s Thunderbolt 3 to Thunderbolt 2 adapter for connecting newer and older Thunderbolt-capable Macs. If both Macs are running an earlier version of macOS, you can use Thunderbolt, USB, or FireWire, depending on the available ports. (Note that the Apple USB-C Charge Cable that comes with the Apple power adapter doesn’t support Target Disk Mode, so if that’s the cable you were planning to use, sorry, but you’ll need to buy a real Thunderbolt cable.)

Step-by-Step Instructions for Intel-based Macs

To put an Intel-based Mac into Target Disk Mode for copying data, follow these steps:

  1. Connect the source Mac to the destination Mac with an appropriate cable.
  2. On the source Mac, either:
    • Restart the Mac, and once it starts booting, hold down the T key until you see the Target Disk Mode screen with a bouncing Thunderbolt logo.
    • Open System Settings/Preferences > Startup Disk, click Target Disk Mode, and then click Restart.
  3. The source Mac’s data and applications volume appears on the destination Mac’s Desktop like an external drive; if the source Mac is encrypted with FileVault, give it a minute to appear on the destination Mac, after which you’ll need to enter its password.
  4. Transfer the files as you would normally.
  5. When you’re done, unmount the source Mac’s drive by dragging it to the Trash in the Dock. Then press and hold the power button on the source Mac for a few seconds to shut it down.

Step-by-Step Instructions for Macs with Apple Silicon

The process is somewhat more involved for Macs with Apple silicon, where the shared drive or volume appears like a network volume:

  1. Connect the source Mac to the destination Mac with an appropriate cable.
  2. On the Mac with Apple silicon, choose Shut Down from the Apple menu to turn it off.
  3. Press and hold the power button until “Loading startup options” appears.
  4. Click Options, and then click Continue to enter macOS Recovery.
  5. Select a user, click Next, enter the user’s password, and click Continue.
  6. Choose Utilities > Share Disk.
  7. Select the drive or volume you want to share, and click Start Sharing. (If the drive is encrypted using FileVault, click Unlock and enter the FileVault password first.)
  8. On the destination Mac, open a Finder window and click Network (under Locations) at the bottom of the sidebar.
  9. In the Network window, double-click the Mac with the shared drive or volume, click Connect As, select Guest in the Connect As window, and then click Connect. The shared drive or volume becomes available like any other external hard drive.
  10. Transfer the files as you would normally.
  11. When you’re done, unmount the shared drive or volume by dragging it to the Trash, then click Stop Sharing on the source Mac.

Although it’s not something you’ll use every day, Target Disk Mode is one of the unsung innovations that has made Macs easier to use for decades, and it’s well worth keeping in mind whenever you need to move lots of data between machines.

(Featured image by Adam Engst)

Practice with the Emergency SOS via Satellite Demo, Just in Case

In mid-November, Apple launched its new Emergency SOS via satellite feature for the iPhone 14 lineup. If you have an iPhone 14 and find yourself in an emergency situation in the US or Canada without cellular or Wi-Fi service, you can still contact emergency services. Apple says the service will expand to France, Germany, Ireland, and the UK in December 2022. The service is free for 2 years, and Apple hasn’t said what it will cost after that.

The challenge we users face with Emergency SOS via satellite is that it works only when you have no cellular or Wi-Fi service, and nearly all the time when you’re in such a situation, there’s no emergency. So if something bad does happen when you’re far from civilization, you may not be in the best state of mind to use Emergency SOS for the first time.

Apple has thought of that and provides two ways to get some experience talking to a satellite. One is the Emergency SOS via satellite demo, which you can try anytime. Or, for a real-world test of the system when you have no cellular or Wi-Fi coverage, you can try sharing your location via satellite using the Find My app. Once you’re outside with a clear view of the sky, here’s what to do.

Emergency SOS via Satellite Demo

To get started with the Emergency SOS via satellite demo, go to Settings > Emergency SOS, scroll down, and tap Try Demo. First, the iPhone walks you through several screens that turn off cellular, explain how the system works, and tell you that in a real emergency, you’ll answer a series of standard questions to help the dispatcher send the help you need.

Next, the demo teaches you how to find and connect to a satellite. Along with asking you to turn left or right—follow the arrows on the locator until it turns green—the demo may tell you that you have to wait for a few minutes until another satellite comes into range.

You won’t run through the same questionnaire you would in a real emergency, though. Instead, you get canned texts that mimic the conversation you might have with a real dispatcher. You can reply however you want, but it won’t change the responses. When you finish, tap End Demo.

Remember, in a real emergency, you’d dial 911 or invoke Emergency SOS by holding the side button and either volume button until the Emergency SOS slider appears. The call won’t work, but you’ll be able to start the Emergency SOS via satellite process for real.

Share Your Location with Find My via Satellite

As welcome as Emergency SOS via satellite will be if you ever need it, Find My via satellite may have more real-world utility right now. It enables you to share your location manually via the Find My app, regardless of the situation. Once you complete the process, anyone with whom you share your location generally will be able to see the updated-via-satellite location.

To get started in your cellular-free location, open the Find My app, tap Me in the toolbar, and tap Send My Location.

Find My will then start directing you to turn left and right, holding your iPhone up to the sky and pointing it at the satellite. A circular direction-finder shows which way to go and when you’re pointing in the right direction. If it fails (as it did in the lower-left message below), you’ll be directed to get a clear view of the horizon. If you’re in a deep valley, climbing higher may solve the problem, as it did in our test. The process isn’t quick, but the constant feedback and progress bar ensures that you feel like it’s doing something the entire time.

It’s important to realize that no one will be notified of your location, and you have no other way to communicate with people via satellite. So you’ll want to make plans with a friend or family member before you go into a situation where you could need help without having cellular service. Have a conversation beforehand so they know to look for you in Find My if you don’t get in touch by a predetermined time.

It would be nice if you could notify family or friends of your location for situations where you’d like help but don’t need emergency services. In the future, Apple could use the Send My Current Location option in Messages, but that doesn’t work via satellite now. Regardless, Emergency SOS and Find My via satellite are tremendously impressive, and we expect Apple to enhance the iPhone’s satellite communication capabilities in future iPhones and versions of iOS.

(Featured image by iStock.com/AntonioFrancois)


Social Media: For iPhone 14 owners, the future is here today with Emergency SOS and Find My via satellite, which let you contact emergency services and share your location by talking to a communications satellite. Learn how to try it here:

Delete Contacts More Easily in iOS 16 and iPadOS 16

Deleting contacts on the iPhone and iPad used to be a pain, especially if you wanted to trash multiple contacts. You had to open the contact, tap Edit, scroll to the bottom, and tap Delete Contact. Although you still can’t swipe left on a contact in a list, as you do when deleting in Mail and Messages, iOS 16 and iPadOS 16 provide a simpler method. Touch and hold a contact in the Phone or Contacts lists, and then tap Delete Contact at the bottom.

(Featured image based on an original by iStock.com/anyaberkut)

Two Ways to Manage Your Email So You Can Find It Later

We recently wrote about different ways to organize your files, which prompted some people to ask us about the best ways to manage email. Email may have competition from messaging services like Slack and Microsoft Teams, but for many people, it’s still where the most important communications take place. That’s especially true for anyone who has to work with numerous people outside their organization—there’s a reason why business cards nearly always contain an email address.

As with file organization, how you manage and organize your email is all about making it easier to find a specific message or conversation later. The big difference between files and email is that you usually care about how other people will be able to find and work with your files. With email, however, you’re the only person who has to sort through your messages. Imagine you run an ad agency that has the Belvedere Hotel as a client—your organizational structure for files needs to work for all your colleagues, but no one but you needs to find your email message about what should change in the next print ad campaign.

When managing email so you can find what you want later, most people gravitate to filing messages in mailboxes (sometimes called folders) or searching, though we find that a combination is usually best.

Find Email in Mailboxes

Many people have traditionally used a hierarchical filing structure to organize their email, creating a mailbox for each project. (There’s generally little benefit in creating mailboxes for people or date ranges because it’s easy to search for messages from specific people or between certain dates.)

So, much as with files, you might have a top-level mailbox for Clients and a sub-mailbox for each client, including the Belvedere Hotel. You could make additional sub-mailboxes for different Belvedere Hotel projects, but unless you expect to receive a lot of email for each of those projects, increasing the depth of the hierarchy is often unnecessary and extra work.

It’s unnecessary because date sorting options usually make it easy to home in on the message you want even when the mailbox contains hundreds of messages. Plus, the more granular your filing approach, the more manual filing you’ll have to do to ensure that every message ends up in the right place. Worse, many messages will likely cross projects, as could happen in a discussion of a print ad when your contact mentions that they want to reuse the text and graphics in the next email blast too. Should it go in a Print Ads mailbox or an Email Blasts mailbox? Don’t waste time deciding—just leave it in a general Belvedere Hotel mailbox.

How do messages end up in these mailboxes? You can always file messages manually, and you’ll spend some time doing that, no matter what. However, whenever possible, you want to create rules (also known as filters) that file messages automatically. Rules look through every incoming message and take actions—including moving to a mailbox—on messages that match the criteria you specify. For sanity’s sake, you want to make your rules as general as possible.

For instance, you could make a rule that moved messages from your contact at the Belvedere Hotel to your associated mailbox. That would work initially, but it would fail if you regularly work with multiple people there or if someone else fills in while your contact is on vacation. So instead of creating a rule that looks for a specific email address or even a set of email addresses, set your rule to look for all messages from the belvederehotel.com domain.

Let’s assume a colleague asks you for details on the latest Belvedere Hotel print ad. How do you find that information? Here’s how we’d go about it:

  • Open the Belvedere Hotel mailbox, sort by date if necessary, and scroll through the list of recent messages. Most of the time, the message you need to find has arrived recently, and you’ll remember the sender and subject well enough to pick it out.
  • If you can’t identify the message quickly by scanning, search for it based on the sender or recipient, date, and keywords. Look first within the mailbox where you think the message is located, but if that fails, broaden the search to all your mailboxes.

The reason to start with a scan of the mailbox is that it’s usually the most efficient. However, if you know a message is old or can’t remember the sender, you may be better off starting with a search.

If you can’t easily build rules to move most of your email into the appropriate mailboxes, that’s a hint that a search-first approach might work better for you. You shouldn’t be spending a lot of your time filing email—that’s what computers are for!

Search for Email

When Google launched Gmail in 2004, the company introduced a new way of managing email that leveraged the company’s strength in search. The subsequent popularity of Gmail—which now has over 1.8 billion active users worldwide—means that a great number of people now default to searching when they want to find particular email messages, regardless of which email service they use.

A search-first approach can be fast and effective and doesn’t require that you file messages into mailboxes. For instance, if you always get email about Belvedere Hotel ad campaign details from the same person, it may be faster to search for email from that person first, rather than looking through a mailbox.

Searching rather than browsing for email works best for people whose work doesn’t break down neatly into categories or regularly cuts across multiple projects. But it’s not for everyone. For a search-first approach to be effective:

  • You must have the sort of brain that remembers details to use as search terms. If you’re more in the “I know it when I see it” camp, you may find searching less effective.
  • Your email must contain sufficiently unusual keywords that searching for a person and a keyword or two is likely to find the message you want.
  • You have to keep most messages. That may seem obvious, but if you delete a lot of incoming messages, you’ll likely remember messages you won’t be able to find.
  • Your email app must search quickly and accurately. Gmail is the gold standard, but other email apps have decent search capabilities.

Although we’re all familiar with searching in Google—and if you like searching the Web, you’ll probably like searching your email—a few tricks will make your email searches more likely to succeed:

  • Start with a focused search term—usually a person or unique keyword—that’s the most likely to give you the smallest number of results to scan for the message you want.
  • When searching for a person’s name, if your email app offers to autocomplete to that person’s email address, let it. This is because searching for “smith” is much less likely to work well than “johnqsmith1999@example.com.”
  • You can specify whether the person for whom you’re searching was the sender or the recipient, which helps reduce the number of results for people who appear regularly in your email.
  • If you’re looking for an attached file, you can usually specify that your search should return only messages that contain attachments, perhaps even just specific file types.
  • When you can’t remember much about the contents of the desired message, try to remember surrounding details, such as when the message might have been sent or who else might have received it, and add those terms to your search.

Precisely how you formulate these searches will vary by email app, but check these pages for details on using Mail, Outlook, and Gmail.

Choose the Best of Both Worlds

In reality, neither solely browsing through mailboxes nor relying entirely on search is likely to be satisfying. Those who file everything will find themselves needing to search within mailboxes at times, and those who prefer searching may find that using rules to store easily identified messages in associated mailboxes (mailing lists, for instance, or all email from your organization’s domain) makes searching easier.

(Featured image by iStock.com/anyaberkut)

You Can Now Use Siri to Reboot Your iPhone or iPad

Although iOS and iPadOS are extremely stable, there are times when rebooting your iPhone or iPad can eliminate odd or problematic behavior, and there’s no harm in trying it. In the past, you’ve had to remember which buttons to press or select Settings > General > Shut Down and then press a button to turn the device back on. In iOS 16 and iPadOS 16, however, Siri has learned a new trick: how to reboot iPhones and iPads. Invoke Siri by holding the side button or Home button, and then say, “Reboot” or “Restart this device.” (Using “Hey Siri” can result in unexpected results, and saying “Restart” on its own tends to cause Music to start playing the last song.) Tap Restart, and your device reboots. If only this worked for the Apple Watch and HomePod too!

(Featured image by iStock.com/Wachiwit)

Merge Duplicate Photos and Videos in iOS 16, iPadOS 16, and Ventura

It’s all too easy to end up with duplicate photos and videos in your Photos library. The most common way is to use the Duplicate command, but we’ve seen duplicates appear due to accidentally repeated actions in other apps, repeated screenshots, multiple imports that include the same image (much as Photos tries to prevent this now), and buggy behavior in iCloud Photos.

Identifying duplicate photos and videos is difficult to do manually. Although the human eye is good at noticing when things aren’t the same, it’s much harder to determine if two images are identical. And which of two identical images you want to keep can require that you compare file formats, sizes, and other metadata, which is fussy, tedious work.

Apple has come to the rescue with a new duplicate identification and merging capability in Photos in iOS 16, iPadOS 16, and macOS 13 Ventura. It may not be perfect, but it’s a good start and extremely easy to use.

To get started on the iPhone, tap Albums in the toolbar, scroll down to the Utilities section, and tap Duplicates (left). On the iPad, Duplicates appears in the sidebar under Utilities (middle), and on the Mac, it’s in the sidebar under the top-level Photos section (right).

Even if you use iCloud Photos, which syncs your photos and videos between all your devices, you may not see the same number of duplicates on each device. We’re not sure why this is the case—perhaps Apple’s code isn’t identical between platforms—but it may be necessary to run through the merging process on multiple devices to catch everything. Plus, it seems as though Photos identifies new duplicates slowly in the background, so the Duplicates album may not include new duplicates right away.

Regardless, once you’re in the Duplicates album, you’ll see a scrolling list of all duplicate photos and videos. Photos automatically displays the file size on each item so you can see that some are smaller than others. Tap the ••• button at the top right on the iPhone or iPad, or use the Filter By menu on the Mac to show all items, just photos, or just videos. You can also switch between a square grid and one that preserves the aspect ratio of the images—the control is in the ••• menu on the iPhone, the Aspect/Square button on the iPad, and the thumbnail toggle button next to the size slider on the Mac.

Note that Photos explains at the bottom of the screen what counts as a duplicate. Exact duplicates do, of course, but Photos also matches images that differ in size or other metadata. It may also identify images that are very nearly the same.

You can tap or click each image in a set to view it at full size, and if you were a glutton for punishment, you could delete one of the images in the set manually with the trash button. But there’s no reason to do that because Photos provides a Merge button (or link, on the Mac) next to each set. Tap or click that, and Photos will keep one version that combines the highest quality and relevant metadata, moving the rest to Recently Deleted. Note that Photos tells you when duplicates are exact (left) or very similar (right).

When you have lots of duplicates, using the Merge button for each set will be time-consuming. Instead, tap the Select button at the top on the iPhone and iPad. Then you can tap to select individual photos (which you could then trash manually; left), tap the Select button next to duplicates to select them (right), or tap the Select All button to select everything. Once you select one or more duplicate sets, a Merge link appears at the bottom. Tap that to merge the selected duplicates.

If you don’t want to verify each of the duplicates Photos has found, the process becomes as simple as this:

  1. Open the Duplicates album.
  2. Tap Select.
  3. Tap Select All.
  4. Tap Merge (###).

Boom, you’re done, regardless of how many hundreds or thousands of duplicates you had.

In our testing, Photos does a pretty good job, but for another approach, check out PowerPhotos, which uses a different visual comparison engine and may identify more images that are sufficiently similar to qualify as duplicates in your mind. It costs $29.95, but you can use its free trial to see if it will help your duplicate problem.

(Featured image by Adam Engst)