Apple’s best product ever
All week, we've been asking you to help us rank the 50 best products Apple ever made, as we mark the company's 50th anniversary. Thanks to everyone who pitched in - we ended up with more than 1.6 million votes! We also have lots of other coverage of Apple's first half century, and you should [ ]
On The Vergecast: AI’s pivot to business, and the impossible task of ranking Apple’s 50 best products.
On The Vergecast: AI’s pivot to business, and the impossible task of ranking Apple’s 50 best products.
by David Pierce
Apr 3, 2026, 12:52 PM UTC
David Pierce
is editor-at-large and Vergecast co-host with over a decade of experience covering consumer tech. Previously, at Protocol, The Wall Street Journal, and Wired.
All week, we’ve been asking you to help us rank the 50 best products Apple ever made, as we mark the company’s 50th anniversary. Thanks to everyone who pitched in — we ended up with more than 1.6 million votes! We also have lots of other coverage of Apple’s first half century, and you should check it all out. All those votes later, we have some answers. And some thoughts.
Verge subscribers, don’t forget you get exclusive access to ad-free Vergecast wherever you get your podcasts. Head here. Not a subscriber? You can sign up here.
On this episode of The Vergecast, after some housekeeping (vote for us in the Webby Awards, and come see Sneakers with us in New York in a few weeks!) and some OpenAI news, Nilay and David dig into the rankings. First we go through the overall results, reacting our way from number 50 to number 11.
Then, we compare your top 10 to our own rankings, which we’ve been making and tweaking for weeks. Turns out, we all agree on some big things — and we have a few to argue about. Is it recency bias, anti-printer bias, or something else? Who knows.
After that, it’s time for the lightning round, with another edition of Brendan Carr is a Dummy, some more gadget price hikes, Nilay’s adventures in iMac repurposing, and more.
If you want to know more about everything we discuss in this episode, here are some links to get you started:
Follow topics and authors from this story to see more like this in your personalized homepage feed and to receive email updates.
- David Pierce
The Verge Daily
A free daily digest of the news that matters most.
Email (required)
Sign in to highlight and annotate this article

Conversation starters
Daily AI Digest
Get the top 5 AI stories delivered to your inbox every morning.
More about
productcompanymillion
Why I Built a Menu Bar App Instead of a Dashboard
Everyone who builds with AI eventually hits the same moment. You're deep in a coding session. Claude is flying. You're feeling productive. Then you open your API dashboard and the number hits you like a bucket of cold water. That happened to me. I don't want to talk about the exact number, but it was enough to make me stop and actually think about what I was doing. The problem wasn't that I was spending money. The problem was that I had no idea I was spending it. The dashboard problem My first instinct was what everyone does: open the Anthropic dashboard. Check the usage graphs. Try to correlate the spikes with what I was working on. But here's the thing about dashboards — they're designed for after-the-fact analysis, not real-time awareness. You go to a dashboard when something's already

Why AI Security Governance is Failing in 2026
Why AI Security Governance is Failing in 2026 73% of enterprises have AI in production without proper security controls Let me be blunt: enterprise AI security is a disaster waiting to happen. After working with AI deployments at scale, I've seen the same mistakes repeated over and over. The Real Problem Everyone's rushing to deploy AI systems, but security is an afterthought. Sound familiar? It's the same pattern we've seen with cloud adoption, DevOps, and every other major technology shift. The difference? AI systems can make decisions that directly impact business operations, customer data, and regulatory compliance. When an AI model gets compromised, the blast radius is massive. What's Actually Happening In my experience building security for large-scale systems, here's what I'm seeing

OpenClaw CVE-2026-33579: Unauthorized Privilege Escalation via `/pair approve` Command Fixed
CVE-2026-33579: A Critical Analysis of OpenClaw’s Authorization Collapse The recently disclosed CVE-2026-33579 vulnerability in OpenClaw represents a catastrophic failure in its authorization framework, enabling trivial full instance takeovers. At the core of this issue lies the /pair approve command—a mechanism intended for secure device registration that, due to a fundamental design flaw, bypasses critical authorization checks. This analysis dissects the vulnerability’s root cause, exploitation process, and systemic failures, underscoring the urgency of patching and the ease of attack. Root Cause: Authorization Bypass via Implicit Trust OpenClaw’s pairing system is designed to facilitate temporary, low-privilege access for device registration. The /pair approve command, however, omits ex
Knowledge Map
Connected Articles — Knowledge Graph
This article is connected to other articles through shared AI topics and tags.
More in Products

Why AI Security Governance is Failing in 2026
Why AI Security Governance is Failing in 2026 73% of enterprises have AI in production without proper security controls Let me be blunt: enterprise AI security is a disaster waiting to happen. After working with AI deployments at scale, I've seen the same mistakes repeated over and over. The Real Problem Everyone's rushing to deploy AI systems, but security is an afterthought. Sound familiar? It's the same pattern we've seen with cloud adoption, DevOps, and every other major technology shift. The difference? AI systems can make decisions that directly impact business operations, customer data, and regulatory compliance. When an AI model gets compromised, the blast radius is massive. What's Actually Happening In my experience building security for large-scale systems, here's what I'm seeing

🔹Azure Compute Fundamentals: Creating and Managing a Virtual Machine
🖥️ Introduction Creating a Virtual Machine (VM) in Azure allows organizations to deploy scalable,on-demand computing resources in the cloud without investing in physical hardware. Virtual machines can host applications,run development and test environments,or support enterprise workloads securely and efficiently. In this guide, we will walk you through how to provision and configure an Azure Virtual Machine step-by-step. 👩💻Implementation Steps 🖥️ Create a Virtual Machine in Azure 🎯 Objective Provision and configure an Azure Virtual Machine (VM) to host applications or perform testing in a secure cloud environment. ⚙️ Procedure 1️⃣ Create the Virtual Machine 1.Sign in to the Azure portal. 2i.Search for Virtual machines. 2ii.Select + Create. 2iii.Select Azure virtual machine. 3.Select

The Agent Economy Is Here — Why AI Agents Need Their Own Marketplace
The Agent Economy Is Here — Why AI Agents Need Their Own Marketplace AI Agents are starting to need each other's services. But there's no standardized way for them to discover, verify, and pay. That's changing. Agents Are No Longer Just Tools — They're Becoming Economic Participants Between late 2025 and early 2026, the role of AI Agents shifted in a subtle but critical way. When we used to say "AI Agent," we pictured an assistant that follows orders — organizing inboxes, summarizing documents, handling customer support. It was a tool. You were the user. Clear relationship. That's not how it works anymore. A quantitative trading Agent needs real-time news summaries. It doesn't scrape news sites itself — it calls another Agent that specializes in news aggregation. That news Agent needs mult

Getting Data from Multiple Sources in Power BI
Introduction Let’s be honest, Power BI dashboards can look really pretty. But if the data behind them is messy, incomplete, or just plain confusing, then congratulations… you’ve built a very attractive lie. At the heart of every solid Power BI report is one thing: good data coming in the right way. In the real world, your data is never sitting nicely in one place waiting for you. Nope. It’s scattered everywhere, Excel files from one department, CSVs from another, a database somewhere, maybe even a random PDF someone swears is “the source of truth.” This is where Power BI earns its paycheck. With its Get Data feature and Power Query, you can pull in data from multiple sources, clean it up, and actually make sense of it, all in one place. In this guide, we’ll walk through how to: Connect Pow


Discussion
Sign in to join the discussion
No comments yet — be the first to share your thoughts!