If you watched the most recent Mac media event, you already got a preview of Final Cut X — thanks to the on-stage demo showing how it worked in conjunction with the MacBook Pro’s new Touch Bar. But there’s a whole lot more to the Final Cut Pro 10.3 update than that.
To check out what you’ll find in the latest update for Apple’s video-editing software, check out our comprehensive video below.
Looking to save yourself some cash on Apple’s new MacBook Pro? You could be in luck. The company is teasing a one-day shopping event for Black Friday that could bring tasty discounts on its latest products.
Apple has finished unveiling its product lineup for 2016, and yet again it appears to have forgotten about the Mac Pro. The high-end desktop will be three years old next month, and although it might look pretty on the outside, it’s way past its best on the inside.
Apple won’t tell us why the Mac Pro isn’t a priority anymore, but its focus is clearly elsewhere. This is a problem for creative professionals who rely on the extra power the machine provides. For some, the iMac just isn’t beefy enough.
Some believe Apple should license macOS to third-party computer makers that are willing to cater to the pros Apple is ignoring. It’s a move Apple would never make, but is it a good idea?
Join us in this week’s Friday Night Fight as we battle it out over whether Apple should let rival PC vendors build macOS machines!
The new MacBook Pro finally lands in stores this week, and an awesome new Apple ad celebrates the arrival.
In the new spot, called “Bulbs,” Apple links the invention of fire, the wheel, plow and more to the creation of the Touch Bar, the thin OLED strip that completely changes how you interact with your Mac.
The next time you leave your Mac unattended, make sure to turn it off.
A well-known hacker has created a cheap tool that can steal data off of locked computers in minutes. The clever new device called PoisonTap is created using a $5 Raspberry Pi Zero and some open source code. Attackers can plug PoisonTap into a machine and as long as the victim has a web browser open, it can steal data and leave remote backdoors.