Tag Archive: Products


India: We can help Apple build better products

After China, India is the next big developing market Apple wants to conquer — and apparently the Indian government couldn’t be happier about it. Meeting with Apple’s regulatory head for Europe, Middle East, India and Africa on Friday, India’s Communications and… Read more ›

Launch day queues for the latest must-have gadget are as much a part of Apple culture as learning to live without ports and optical drives. But Apple retail guru Angela Ahrendts wants to change all that — sending out an… Read more ›

Bose’s lineup of headphones and speakers were kicked out of the Apple Store earlier this year after the company filed a patent lawsuit against Beats Electronics, but now that the beef has been squashed, it appears that Apple is having… Read more ›

Reports of the Apple’s ban in China have been greatly exaggerated according to the country’s chief procurement center, which has denied a report from earlier this week that claimed MacBooks, iPhones and iPads have been banned from state use by… Read more ›

Most Apple Store thieves we’ve seen prefer to go with the classic smash and grab technique, but according to federal court charges, one fraudster in Florida broke his Apple heist into 42 separate scams by using a simple but major… Read more ›

Eddie Cue thinks 2014 will be the best product pipeline Apple’s had in 25 years, and according to the company’s latest filings with the SEC, they’re certainly pouring enough money into R&D back him up. Apple increased spending in research in development… Read more ›

Apple has never had an official retail presence of any kind in the Middle East, until now. Thanks to a deal struck with Jarir Bookstore, Apple is directly providing its products in Saudi Arabia. The Saudi Arabian government cleared Apple… Read more ›

Apple has confirmed that none of its products, including web services like iCloud.com, are vulnerable to the nasty Heartbleed web bug that was recently uncovered. Heartbleed allows hackers to intercept sensitive traffic and steal information like logins from websites using… Read more ›