The Oldest Tech Myth is a Reality – Apple Slows Down iPhones
It all started years ago with a few iPhone owners complaining about the performance of their mobile devices. At first, it seemed like a few, random devices malfunctioned at about the same time and that the cases weren’t related to one another.
However, at some point, Apple users began to notice an emerging pattern: whenever a new iPhone was about to come out, the company recommended that they update their iOS software, and more phones began to show the same symptoms. Some apps rarely worked anymore, while others froze in the middle of an action, leaving the iPhone owners extremely frustrated.
That’s when people began to speculate – is it just a technical issue that wasn’t detected and resolved on time, or is it intentional? Many people believed that Apple never bothered to fix this glitch for one main reason – sales. When your phone isn’t functioning properly, you automatically go and buy yourself a new one.
As it turns out, iPhone users are usually quite loyal to their mobile of choice, so if one phone stops working – their next purchase would probably be a newer version of the phone they’ve got. So was it just a ploy to keep sales numbers up?
For years, people discussed this issue, but no clear answer was given – until now. Only a few days ago, Apple announced that they did slow down older iPhones, but their reasons weren’t as sinister as you might think.
Why Did It Happen?
When previously addressed, the iPhone problem was easily explained by experts as a simple lack of storage space. In their opinion, every software update requires that you update your apps as well, which can take up a lot of space on your phone.
Even though this is a plausible explanation, consumers didn’t buy it, and the speculations continued. This week, Apple put us all out of our misery by admitting to slowing older iPhones down, and explaining why.
The company announced that older iPhone models include a slowing down feature that is designed to counteract any issues that come with aging phone batteries. Apple uses lithium-ion batteries, which are not perfect – but they are the best option that is available for use today.
Apparently, at some point, the battery loses its capacity to store energy, and after about 500 charging cycles, the battery can be charged to 80% max. When put under a lot of stress, older iPhones can shut down because of the inefficiency of the batteries, so Apple did its best to avoid such occurrences.
Unfortunately, instead of providing users with this information in the first place, the company kept quiet for years, which led to a lot of resentment on the users’ part. That is why two iPhone owners decided to sue the company, claiming that Apple didn’t ask for their consent to slow down their phones, and they require a compensation of some sort.
How will the situation evolve? Only time would tell.
All in All…
Now that the cat is out of the bag, iPhone users can understand the way their phones work better, and decide whether they want to keep the older iPhone models or not. Either way, using the Apple mobile devices is supposed to be less problematic now that people can wrap their minds around the issue.
If you have an iPhone or any other smartphone in your possession, you probably know what it feels like to have your phone malfunctioning. Once you get the problem sorted out with the newfound understanding of how mobile phones work, you can start using your apps freely and without a single glitch in sight.
There are a lot of fun things you can do with a functioning smartphone, but online gambling might be the most exciting of them all. There are a lot of casino online games you can access via mobile apps, so if you want to use your phone to relax at the end of a long day, this activity can help you turn your day around!
How To Keep Your Personal Information Anonymous And Secure While Using A Web Browser
Browsing the web or checking Facebook a few times a day has recently become something natural as breathing and eating. People wake up, immediately reaching for their phones to be up to date. Is it already an addiction to the Internet? Of course, it depends…
How To Stay More Secure When Using Kubernetes
Kubernetes is an open-source system for automating deployment of new apps and software, and is becoming increasingly popular due to its utility in going back to previous versions. But while lots of developers are excited to take advantage of the benefits and convenience offered by…
If Online Privacy Is Dead, Is There Anything We Can Do?
The online world is both wonderful and frightening in equal measure. On the one hand, we have access to unlimited information and resources, but on the other, we have zero privacy. For most adults, the internet is a part of every aspect of their daily…
Reason To Choose Comodo SSL Certificate To Secure Your Website
It should be clear by now that for your website to survive in this modern era, hacker ridden internet era, it is important for all the information that go on it or through it to be encrypted. To have a website without SSL protection is…
6 Unexpected Security Concerns, and How to Prepare
As powerful as the Internet is right now, it’s impossible to even imagine where it will go over the next years and beyond. But, as fast as security protection continues to improve, hackers seem to improve even more quickly. Everything from new devices to apps…
- 3D Printing
- App Dev
- Artificial Intelligence
- Arts and Entertainment
- Big Data
- Blockchain Tech
- Business Technology
- Car Technology
- Cloud Computing
- Cloud Storage
- Computer and Technology
- Conference Calling
- Coupons and Deals
- Cyber Security
- Dark Left 1
- Data Center
- Data Recovery
- Digital Arena
- Digital Marketing
- Edu Tech
- Email Marketing
- Google Glass
- Guides and Tutorials
- Health and Fitness
- Home Appliance
- Home Improvement
- Home Security
- Internet and Businesses Online
- Internet Marketing
- IT Careers
- Mobile Apps
- Mobile Security
- New Tech
- Online Shopping
- Project Management
- Reference and Education
- Reputation Management
- Sales & Marketing
- Self Improvement
- Shopping and Product reviews
- Small Business
- Social Media
- Tech Trends
- Technical Support
- Technology in Education
- Tips & Tricks
- Tips And Tricks
- Video Conferencing
- Virtual Reality
- Wearable Technology
- Web Design
- Web Development
- Web Hosting
What Is An Advanced Threat?
When you are on the hunt for business cyber security solutions, you are almost certain to come across products in a category called advanced threat protection. These security tools are available both as software or managed services and differ in approaches to security; some might…
The Guy Who Ghosted You Is Back? Here’s How To Deal
Imagine this: You matched a cute guy on Tinder and started exchanging messages on the app. Then, he takes it to Telegram. You two start texting almost every day and even go out on a date. During the date, you two really hit it off;…
Online Security Tips You Might Not Know About
Technology is now playing a major role in our daily lives. From how we work to how we spend our leisure time; it is central to us all now. Of course, a tech advance that has transformed our lives the most is the internet. While…
Here’s How Proxies Can Aid Email Protection
Are you concerned about your email protection measures? If that is the case, then this is for you. It all began in November 2014 with leaked emails from Sony Movie Pictures. After this leakage of emails went viral all over the world, people, organizations and…
3 Ways to Prepare For Cyber Security Risks That Employees Must Know
In a world where everything is much easier to do via mobile, app, or device, technology is not going to slow down. We’re all guilty of potentially owning more than one device, whether that is our personal phones, work phones, tablets or fitness trackers. All…
Non-Negotiable Elements For Your Business IT Security Plan
In 2019, having a business IT security plan is more important than ever. An IT security plan is the first line of defense you have for protecting your business – and your clients – against cybercriminals. Cybercriminals include hackers, who frequently obtain personal information with…