Backstage: Tiger kills first day’s productivity, then raises it
When it first arrives (ordered direct from Apple) a day ahead of schedule, then installs smoothly onto all three of my computers, Mac OS X Tiger is 75% thrilling, 25% frightening. Within minutes of finishing each machine’s installation, it’s already making significant progress in indexing each of my hard disks, making metadata connections between files that I can’t quite believe. Search the files on my computer by the person who originally sent them to me? Yeah. Simultaneously pull up a flight tracker, dictionary, Japanese-to-English language translator, currency converter and the Yellow Pages with one press of the F12 button? Yup. Today is the day I can’t get anything done because I’m too busy learning how to work smarter for the next two years.
And then there’s the new iChat stuff. My old “microphone-enabled” icon now looks like a stack of three icons to indicate that I can have multi-person voice chats. The one chat I’ve tried this morning with an iLounger in France was clearer and better-sounding than any I’d had with the last Mac OS. And Mail just looks ten times better than before. All of my information, sorted however I like it, with video and audio that’s better than ever before coming from multiple directions at once.
That’s the scary part. This had better be every bit as secure as they’ve been promising. Because the last thing I want is to have my super hard drive indices accessible to random people - or not-so-random people - via the Internet. Tiger is about to enable an entirely amazing new level of simplified personal computing, but in the wrong hands, its tools could also make personal hacking and snooping far more dangerous than ever before. After seeing how Microsoft nosedived over the past 18 months, I’m trusting Apple not to let hackers find ways to abuse these tools - and certainly hoping that the company doesn’t do anything foolish like that, itself.
If you have a comment, news tip, advertising inquiry, or coverage request, a question about iPods or accessories, or if you sell or market products, read iLounge's Comments + Questions policies before posting, and fully identify yourself if you do. We will delete comments containing advertising, astroturfing, trolling, personal attacks, offensive language, or other objectionable content, then ban and/or publicly identify violators. Wondering why we're talking about something other than iPods? Check the Archives: Backstage has been here and kicking it since 2004.
- Notes from Apple’s Q2 2015 earnings call
- Apple Q2 2015: Record $58B revenue, 61.1M iPhones, 12.6M iPads
- Apple releases second iOS 8.4 beta to developers
- Major hospital links HealthKit data to patient records
- Apple Pay adds Discover cards
- Apple enables iTunes donations for Nepal earthquake
- Apple’s third-generation Siri built on Mesos platform
- iLounge Weekly coming Monday, sign up now
- Apple Watch unboxing gallery posted
- FoneFox posts Apple Watch waterproof testing video
- Apple Watch
- Zagg Pocket Keyboard
- Adonit Jot Script 2
- Rokform Rokfolio Wallet Case for iPhone 6 and iPhone 6 Plus
- Parrot Bebop Drone
- Soen Audio Transit XS Wireless Speaker
- Divoom Voombox-party Portable Bluetooth Speaker
- Scosche MagicMount XL Dash/Window
- Theo Power Jump + Power Jump Wireless for iPhone 6
- VERT Wearable Fitness Monitor
- Why can’t I see the iPad-style landscape view on my iPhone 6 Plus?
- Is there a point to having both iCloud Photo Library and iCloud Photo Stream enabled?
- Why can’t I set a longer passcode timeout on my iPhone 6 Plus?
- Can I turn off Message Read Receipts for only some users?
- How do I share one iCloud Photo Library within a family?
- Can I turn off the app icons that appear in the bottom corner on the lock screen?
- Why do I have two separate conversations with the same person in Messages?
- Can I transfer the existing version of an app to my new iPhone?
- How do I quickly erase all of the contacts on my old iPhone?
- How do I disassociate my phone number from iMessage?