In the 1980s and 1990s, writer and director Nora Ephron was the queen of the rom-com: When Harry Met Sally, Sleepless in Seattle and You’ve Got Mail were huge movies both commercially and culturally. You’ve Got Mail reunites the Sleepless duo of Tom Hanks and Meg Ryan, casting them as rival bookstore owners who can’t stand each other in real life, but fall for one another anonymously online. If you were around at the time, the computer stuff will make you feel absolutely ancient (and if you weren’t, might be mildly baffling), but the movie itself has aged well and remains one of the great rom-coms from the 1990s – and makes for a great weekend watch among Netflix‘s library.
You’ve Got Mail has a star-studded cast and some killer lines
Rewatching the movie after 25 years, The Cut had some thoughts: “In 1998, it was still a little bit radical to meet your partner on the internet, especially in a chat room, but today, when rewatching You’ve Got Mail, what we really noticed feels nearly unrecognizable is the Upper West Side, the price of apartments (duh) throughout the city, and Barnes & Noble’s reputation.” And Cosmopolitan was surprised by how many familiar faces are in it: “Dave Chappelle as Hanks’ funny friend? Steve Zahn as Ryan’s co-worker? Chris Messina as a bookstore employee?”
Entertainment Weekly did the recap thing five years previously, noting that the film was inevitable after Sleepless in Seattle “grossed $126 million domestically, helped establish Nora Ephron as the most formidable female filmmaker in Hollywood, and sealed Hanks and Ryan’s reputation as the can’t-miss combo of the ’90s.” The duo were “the Tracy and Hepburn of their time. The cutest couple on the big screen today”, and Mail was “Ephron’s slickest, most polished film to date”.
As Empire put it: “You’ve Got Mail attempts to imbue cold ’90s technology with a warm fuzziness reserved for kids and kittens. And, in the face of well worn formula, it works. Kind of.”
You might also like…
Get the hottest deals available in your inbox plus news, reviews, opinion, analysis and more from the TechRadar team.
If your Mac is running slow, there are a few things you can do to speed it up and better understand what’s slowing it down.
It’s not just that your Mac is old — although that is an important factor. It could be that you don’t have enough memory, especially if you like to use Google Chrome. You may have a bunch of apps running in the background. There also might be dust in the vents, keeping your Mac from running nice and cool.
This post contains affiliate links. Cult of Mac may earn a commission when you use our links to buy items.
5 reasons for a slow Mac
1. Switch from Google Chrome (and other apps) to Safari
Safari is much easier on your Mac than Google Chrome, which is a notorious power drain and memory hog. The more Chrome tabs you have open, the less memory you have available for everything else.
Safari consistently comes out on top of browser speed tests. According to Apple, Safari loads pages up to 50% faster than Chrome. So, switching to Safari from Chrome is an easy way to speed up your slow Mac. (Making the switch also gives you a security boost, especially if you max out Safari’s privacy settings.)
It’s not just Google Chrome itself, either. Apps like Slack, Discord, Spotify, Microsoft Teams and many others are made using the Chrome browser engine, too. But there’s a solution to this problem: Instead of using the official versions of those apps, you can open them and sign in from Safari, then click File > Add to Dock.
Then you’ll be able to run your web apps in their own windows, just like before, but with the energy-efficient Safari powering them instead.
2. Check what apps are running in the background on your slow Mac
Clear out the background items you don’t use. Screenshot: D. Griffin Jones/Cult of Mac
It’s good to keep an eye on what’s running in the background, especially if your Mac is running slow. It could be that you’ve installed a bunch of apps over the years, and one of them is still churning away in the background even though you never use it.
You can find this information in System Settings > General > Login Items.
On top, you’ll see apps that launch automatically when you sign in to your Mac. You can click to select one and click the − button to remove it. Below, you’ll see a list of apps allowed to run in the background. Simply uncheck them to turn them off.
Other background activities are built into macOS itself. There’s no easy way to turn them off without digging into the Terminal, but you should be aware of them:
If you sync your photo library to your Mac, it’ll download new pictures and videos in the background and scan through them to identify people and pets.
Spotlight, the universal search box that can find files, apps, messages, email and more, occasionally needs to scan your Mac to find if there’s anything new.
3. Your slow Mac is simply too old
Macs last a really, really long time — and that’s both a blessing and a curse. I used my 2015 MacBook Pro for eight years, even as its battery started swelling. Now, it’s probably a fire hazard.
Apple releases a major new version of macOS every year. And updating can make an older Mac run slowly. If you keep using an older version (while still installing Apple’s minor security updates), your Mac might run a little faster. (Or, at least, stop getting slower.) Major new releases with new features can slow down an older computer.
Toward the end of the period when Apple sold computers with Intel chips — let’s say from 2014 to 2020 — there were some pretty bad Macs. The 2014 to 2018 Mac mini is legitimately one of the worst Macs ever made. If you own one of those, I’m sorry.
Clean out your old Mac with compressed air. Photo: D. Griffin Jones/Cult of Mac
If your Mac starts getting warm, it will automatically slow down (aka “throttle”) the processor to keep it from getting too hot. Normally, your Mac will only throttle itself if you’re doing something really intense, like exporting a video. It can be frustrating if your Mac slows down in the middle of your regular work.
In an older MacBook, the vents can become blocked by dust over time and cause overheating. That’s pretty easy to fix. Carefully unscrew and remove the MacBook’s bottom case. Then use a vacuum cleaner or a can of compressed air to clear out all the visible dust.
In ordinary usage, it’s rare for a newer MacBook Air with Apple silicon to be pushed to its limits, but it can still happen. Since these laptops doesn’t come with an internal fan, you can boost their performance with a cooling pad.
This model sold on Amazon costs only $25. When you’re at your desk, you can put your MacBook on top of it. The cooling pad’s fans will keep cool air blowing underneath, where a MacBook Air gets the hottest. This particular cooling pad doubles as a USB hub, so plugging it into your Mac gives you two USB ports as well.
5. You don’t have enough memory (or storage)
Most Macs made in the last 10 years start with just 8GB of memory on the base model. Upgrading to 16GB or more is one of the most important upgrades you can make when buying a Mac, but a lot of people skip it. You can upgrade the RAM on some older Macs, but not on any recent ones running on Apple silicon.
The bad news is, if you have too many apps open at once, other apps you have open will be pushed out of memory. And that can really make your Mac run slowly if you’re trying to multitask. Short of splurging on extra memory with your next Mac, unfortunately, the only solution when this happens is to quit big apps you’re not using.
This problem can be compounded if your Mac is running low on storage, too. Usually, when your Mac is running low on memory, background apps will be offloaded into storage — but if you don’t have enough storage, that can cause more problems. Here’s what to do if you need to clear up space on your Mac.
It’s every researcher’s worst nightmare. A careless click on an e-mail and years of laboratory data are instantaneously encrypted by hackers. Or a piece of legacy lab equipment is compromised through its ancient, zero-security connection to the Internet. The machine might have been a godsend for running experiments from home during the COVID-19 pandemic, but now it’s an open door to those who wish to exploit your institutional intranet. In this viral infection, you, embarrassingly, are patient zero.
The list of hacked academic institutions, research centres and infrastructure makes alarming reading. It includes the School of Medicine at the University of California, San Francisco (UCSF); the Fred Hutchinson Cancer Center in Seattle, Washington; the Berlin Museum of Natural History; the Atacama Large Millimeter/submillimeter Array (ALMA) telescope in Chile; the Japan Aerospace Exploration Agency in Tokyo; the University of Wollongong in Australia; and the British Library in London.
Cyberattacks on knowledge institutions are increasing: what can be done?
But that list hardly scratches the surface — and certainly doesn’t reflect the many incursions that have been attempted. Research institutions are essentially under siege. “At the University of São Paulo, there are daily attempts to breach security protocols,” says Ildeberto Aparecido Rodello, director of the Information Technology Center at the university’s Ribeirão Preto campus in Brazil. The same goes for CERN, Europe’s particle-physics lab near Geneva, Switzerland. “We’ve been lucky in the past couple of years that we haven’t had any breaches which are worth calling a breach,” says Stefan Lueders, CERN’s head of computer security. “There are attackers outside who are constantly probing the organization for weaknesses.”
It can be hard to appreciate the scale of these operations, says James Fleming, chief information officer at the Francis Crick Institute in London. “The kind of actors who perform cyberattacks at scale are hugely efficient: they automate the vast majority of their processes,” he says. “The data our firewall collects shows that bots are trying different passwords to log onto accounts and different systems, or trying to find the vulnerabilities, tens of thousands of times a week.”
The problem is, universities and other research institutions can be soft targets. They thrive on data-sharing and openness and have a vast and highly mobile workforce, most of whom are less focused on cybersecurity than on the ability to access their systems from wherever they happen to be. “We’re here to share research and we’re open by design, which makes us weak to cybercrime,” says Sarah Lawson, chief information security officer at University College London. “Education has been heavily targeted over the last few years, and the statistics tell us that that’s on the rise.”
What’s more, she adds, universities haven’t conventionally invested in cyber defence, putting them on the back foot in what she likens to “a game of whack-a-mole”: eventually, you are going to lose. “It’s not if,” she says, “it’s when.”
Devastating consequences
When that happens, the consequences can be catastrophic. In a ransomware attack, for instance, precious files could be stolen or encrypted so that they cannot be accessed, unless the file owner pays the attacker. “You really have very few options,” Fleming says. “You can either just wipe everything and take the hit, or you can end up with a financial penalty.” UCSF took the second option after a 2020 breach of their systems, choosing to pay a ransom of US$1.14 million.
But if everything is backed up and no sensitive data have been compromised, the first option might not be too bad, Fleming says. “You hard-wipe all the machines and reformat all the hard drives, and then you do a rebuild. You maybe lose a week of productive time.”
That does depend on the scale of the attack and the preparedness of your institution, however. The British Library is now performing a “full technical rebuild and recovery” on its digital infrastructure after an October 2023 cyberattack, which occurred as the library was updating its core technology infrastructure. “The work will now be accelerated,” a spokesperson told Nature. It’s too early to say how long that will take or what it will cost, they add, but The Financial Times has estimated a price tag of around £7 million (US$9 million).
The British Library in London has had to rebuild its digital infrastructure after a cyberattack in October 2023.Credit: Old Town Tourist/Alamy
Recovering from the attack on the ALMA observatory, which happened in October 2022, took “a bit less than seven weeks”, according to Jorge Ibsen, head of ALMA’s computing department. But the financial hit can only be guessed at, he says. “The best estimate would be 13% of the annual operational cost, which is the fraction of days within a year we could not deliver to our mission.” As for details of what the recovery entailed, and the measures taken since, Ibsen is keen to keep them under wraps. “Given the nature of this threat, we cannot further discuss details about our specific cybersecurity strategy,” he says.
Institutional cyberattacks don’t always end with a ransom payment or rebuild of digital infrastructure. For one thing, paying a ransom doesn’t necessarily preclude bad actors from weaponizing or releasing data. And there could be legal repercussions. For instance, some people who were affected by the attack at the Fred Hutchinson Cancer Center, in November 2023, have filed class-action lawsuits against the centre.
Unplug and shut down
What about the individuals who are compromised? When it happens to you, what should you do? Unanimously, these heads of cybersecurity plead that you communicate with them — after turning off and disconnecting whatever device has been hacked. “Pull out the plugs and shut it down. Close it and then seek advice,” Lawson says.
11 ways to avert a data-storage disaster
That said, prevention is always better than cure, and a properly prepared human can be a powerful firewall. “Update your software regularly; implement firewall and antivirus solutions; control access and permissions to your systems; encrypt sensitive data,” Rodello says. He even suggests engaging cybersecurity specialists to conduct regular audits and provide guidance on improving your lab’s digital safety.
After all, most academics are not trained IT professionals, and DIY solutions can be dangerous. Lawson says she can’t help but admire cybercriminals’ ability to manipulate their targets. “They’re the best psychologists in the world,” she says. “They will use every technique in the book to find the way into your money. And they’re really good at it.”
It might seem obvious, but another tip is to back up data somewhere secure — and, if possible, somewhere off-site. And don’t overlook the software you wrote yourself. “Ideally, people use proper software libraries and they run tests to make sure of its security,” Lawson says. “But we do have problems with people who don’t think about that.” Great researchers, she appreciates, are rarely focused on the fact that many criminals are out to ruin their lives.
Evolving threats
Those working in the health-care sector are at especially high risk. “The health-care system currently is one of the number-one targets for hacking because of the financial benefit that people can gain from getting a health record,” says Anthony Cartwright, an anaesthesiologist at the Cleveland Clinic in Abu Dhabi, United Arab Emirates, who has written about the cybersecurity risks in health care (A. J. Cartwright J. Clin. Monit. Comput. 37, 1123–1132; 2023).
Some vulnerabilities arose during the COVID-19 pandemic, Cartwright says, when many hospital staff began working from home. In many cases, those systems have not been updated. “They’re now accessing hospital network systems on an unsecured personal network. Often, that computer in the house will be shared between the mum, dad, brother or sister.” In other words, anything could get on there.
Such systems need to be updated, of course. But don’t overlook common-sense precautions, such as keeping passwords private. Cartwright was struck by a television segment filmed in a hospital during the pandemic. “As the camera panned around to one of the nurses at the control desk, there was a piece of paper giving the password — and you could read it on screen,” he says. “The Wi-Fi password was right there, on TV.”
NatureTech hub
That said, thanks to government initiatives such as the 1996 US Health Insurance Portability and Accountability Act (HIPAA), health-care workers are often more security-savvy than are academic researchers, reckons Anton Dahbura, executive director of Johns Hopkins University’s Information Security Institute in Baltimore, Maryland. “It’s much more top of mind and it’s been instilled in the culture.”
At the same time, however, bad actors are getting more sophisticated. Although some hacks are for sport or to advance a political agenda — hacktivists targeting scientists working on controversial research, for instance — cybersecurity professionals are increasingly concerned about state-level actors whose aim is to destabilize critical infrastructure or steal intellectual property. “Universities hold a lot of important, proprietary and sensitive information,” Dahbura says. Scientific research institutes such as genomics labs “hold information that adversaries, in particular nation states, would love to have”, he points out. “It’s no different than hacking into a research and development lab of a pharmaceutical company, except that it’s probably easier at a university.”
Whatever the motivation, no one wants to be the one who let an attacker in. Lueder offers a simple mantra: “Stop, think, don’t click!” This is how you prevent the majority of hacking attempts, he says. “The Internet has made us all so curious that we click on things without knowing what they are. The brain can be really stupid.”
When you’re buying an office chair, pretty soon you’re going to have to choose between mesh and foam models. We’ve tested a massive range of the best office chairs, and as a rule of thumb, we recommend a mesh chair for breathability and a foam chair for extra comfort. But does that make mesh the better option for workers?
Not necessarily, according to a report by researchers at the University of California, in partnership with Secretlab, the company behind our pick for the best gaming chair. In their study, the researchers compared a high-end mesh model against the foam-covered Secretlab Titan Evo.
The results suggest that mesh office chairs might not be the best for ergonomics after all, as you may have been led to believe.
Foam office chairs vs. mesh office chairs
In a wide-ranging, eight-hour blind test, researchers found that both chairs exhibited no differences when it came to comfort, pains, and general fatigue – common complaints for chairs that aren’t ergonomically designed or made from unsuitable materials.
However, it appears foam-covered office chairs may have the edge when it comes to general computing tasks in the office or home office. According to trends identified in the study, the foam office chair from Secretlab showed greater signs of support and more positive results when sat on for extended periods.
“The rise of hybrid work has prompted everyday workers to invest in their home office furniture. The search for a good chair often leads to a choice between mesh and foam chairs. People are often drawn to mesh chairs, but our findings suggest that foam seats shouldn’t categorically be underestimated as a seat material suitable for long bouts of sitting,” said Melissa Afterman MS, CPE of the UC Human Factors Ergonomics Lab at University of California, Berkeley & San Francisco.
Meanwhile, Dr. Stuart McGill, Distinguished Professor Emeritus at the University of Waterloo and an ergonomics expert, warned office chairs that are too soft “lack sufficient support to allow the stress migrations and distributions critical to achieving comfort and injury resilience.” In other words, with the chair not supporting and distributing weight properly, greater pressure and stress is applied to the body.
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
In a stress migration study, Dr. McGill noted: “Tissue loads must be migrated from tissue to tissue to minimize the risk of any single tissue accumulating microtrauma. Secretlab Titan Evo’s foam seat base helps to distribute pressure to the parts of the body designed for bearing weight.”
But the mesh versus foam issue might not be quite so clear-cut. After all, Secretlab has spent a lot of R&D time creating more comfortable and supportive high-density foam for office chairs – a process that goes well beyond dynamic lumbar support and pebbled seat design, with recognition from leading industry bodies like United States Ergonomics (and you can see what we thought of those efforts in our Secretlab Titan review).
Ultimately, then, it comes down to the type of office chair that best fits your workspace and workflow – and for that, mesh might not always be a better choice than foam.