Categories
Accessory Cases Hardware iPhone Legal Mobile Phone Patents User Interface

Blackberry suing Typo Products over keyboard design

In the litigious world of  tech companies who scramble daily to protect their patents and intellectual property, you can expect anything claiming to be new and innovative to be hit by a roomful of lawyers saying it isn’t true. Such is the case with the Typo Keyboard case which was getting ready to launch at […]

Categories
Apple Hardware Mac Pro Take Apart Thunderbolt

iFixit posts their Mac Pro teardown

Gadget teardown specialists, iFixit, have completed their full disassembly of the new Mac Pro and have given it an 8 out of 10 on the repairability scale. So what else did they find out? Best to head on over there for the full details (24 steps for the full take-apart), but here are a few […]

Categories
Accessory Announcement Consumer Electronics Gadget Wearables

Prescription frames for Glass start at $99 and available soon

We’ve talked quite a bit about Google Glass recently, and I even had a chance to drive it around the block a bit thanks to Jason O’Grady. One of my biggest problems with Glass, somewhat ironically, is that I already wear a pair of glasses which made for very awkward placement of the Glass frame […]

Categories
Apple Hardware iOS iPhone News Sighting

Prototype iPhone nabs $1500 on eBay

Anybody remember the original iPhone? I do, I had one and I think it’s still my favorite design of all of them so far. The body was aluminum, except for a section at the bottom which was plastic so as not to interfere with reception, all rounded edges, and a nice chrome bezel around the […]

Categories
Apple Consumer Electronics iOS iPhone Legal Mobile Mobile Phone News privacy security Services Software

Will the next NSA satellite have an Apple logo?

Well, perhaps that is a stretch, but Apple’s possible connection with the NSA was revealed in a report dating back to 2008. Reuters explains that the report outlined a system that the NSA was developing, called DROPOUTJEEP, which would be software implanted into an iPhone that allows infiltrators to push and pull and retrieve data from […]