Tech


 

POCO F1 Armored Edition with 6GB RAM, 128GB storage launched in India for Rs. 23999

Xiaomi's POCO launched the F1 smartphone in India in four versions, including a Kevlar Armored Edition with 8GB RAM and 256GB storage, now it has launched a new 6GB RAM with 128GB storage Armored Edition of the smartphone in the country. The Armored Edition that uses Kevlar aramid fibre for a premium look and feel. The POCO F1 got MIUI 10 update recently, and soon after it also received the most expected Android 9.0 (Pie) update along with MIUI 10.1. Earlier this month it got a Rs. 1000 per...
Tags: News, India, Blogging, Xiaomi, Gpu, Flipkart, Octa, MIUI, NTSC, Poço, POCO F1, POCO F1 price, POCO F1 Armored Edition


OnePlus 5 and 5T OxygenOS 9.0 Android 9.0 (Pie) update starts rolling out

OnePlus has released OxygenOS 9.0.0 Android 9.0 (Pie) stable update for its 5 and 5T smartphones, after it rolled out beta update couple of weeks back. This comes after the OnePlus 6 got the stable Android Pie-based OxygenOS 9.0 update back in September. The update brings new navigation gestures for the 5T, Google Lens integration in camera, Gaming mode 3.0 and more features. The OnePlus 5 / 5T Android 9.0 Pie stable update is 1.74 GB in size and also includes Android security patch for D...
Tags: Android, News, Blogging, Oneplus, Google Lens, Camera Integrated Google Lens


A Woman on Twitter is Abused Every 30 Seconds

That shocking statistic comes from a study conducted by Amnesty International and AI software startup Element AI. From a report: In the study, called Troll Patrol, Amnesty International and Element AI looked at data from 288,000 tweets sent to 778 female politicians and journalists in the U.S. and U.K. in 2017. Using machine learning on the data, the group then extrapolated just how wide-ranging abuse toward women is on Twitter. The result: 1.1 million abusive or problematic tweets were sent to ...
Tags: Tech, Amnesty International, 288, Troll Patrol Amnesty International


Two years later, I still miss the headphone port

Two years ago, Apple killed the headphone port. I still haven’t forgiven them for it. When Apple announced that the iPhone 7 would have no headphone port, I was pretty immediately annoyed. I figured maybe I’d get over it in a few months. I didn’t. I figured if worse came to worse, I’d switch platforms. Then all of the other manufacturers started following suit. This, of course, isn’t a new annoyance for me. I’ve been hating right here on this very website since two thousand and nine. For a ...
Tags: Iphone, Apple, Google, TC, Mobile, Nokia, Samsung, Tech, Headphones, Xiaomi, Pixel, Headphone Jack, Sony Ericsson, Dongles, Pop Port Samsung, Greg Stop


David Bowie and Bing Crosby’s “Peace On Earth/Little Drummer Boy” Gets Psychedelically Covered by The Flaming Lips

By now, you've hopefully seen David Bowie and Bing Crosby's unlikely encounter in 1977, where they sang a hastily prepared medley of "Peace On Earth/Little Drummer Boy." It's a curious Christmas classic, and now the subject of a tribute by The Flaming Lips. Above, watch their psychedelic take on the mashup. And if you need to revisit the original, just head here. Follow Open Culture on Facebook and   Twitter and  share intelligent media with your friends. Or better yet, sign up f...
Tags: Google, Facebook, Music, New York, College, David Bowie, David Byrne, Facebook Twitter, Bing Crosby, Pogues, Colonial Massachusetts


How Google Software Won 2018

Google is relatively new to the hardware game -- at least compared to rivals Apple and Samsung. But it's not just what's outside that matters. An analysis, by Engadget : The Pixel 3 is the best example. Physically, the phone is a more premium version of the Pixel 2. But aside from that, nothing about the Pixel 3's design makes me yearn for the phone. In fact, the 3 XL even has one of the biggest screen notches in the market, which some people find hideous. And yet, the Pixel 3s were still one of...
Tags: Apple, Google, Samsung, Tech, Assistant, Pixel, Engadget


iOS 12.1.2 disconnects some iPhones from cellular data: Here’s how to fix it

The iOS 12.1.2 upgrade was supposed to fix cellular connectivity issues, but it appears that things have not gone according to plan. Here are some suggested solutions to fix the cellular data bug. The post iOS 12.1.2 disconnects some iPhones from cellular data: Here’s how to fix it appeared first on Digital Trends.
Tags: Iphone, Apple, Ios, Mobile, News, Trends, iOS 12.1.2


2018 proved that computer vision is the most powerful manifestation of AI

You probably use computer vision every day and don’t even think about it. Enjoy checking out the latest Snapchat filters? That’s computer vision. Unlock your iPhone with your face? That’s computer vision, too. Use your phone to deposit your latest paycheck and get some cash in your bank account? Well, that’s also computer vision. Computer vision as we know it is at a tipping point. Thanks to industry-wide development efforts and advances in deep learning algorithms and graphics processors, we’re...
Tags: Startups, Tech, Artificial Intelligence, Contributors


Amid plummeting stocks and political uncertainty, VCs urge their portfolios to prepare for winter

The warning signs are flashing faster and more furiously now and investors are increasingly urging their startups to take notice. With the Dow Jones Industrial Average enduring a Christmas Eve rout of historic proportions and other indices entering bear market territory, the long-predicted end of the latest bull market is upon the technology industry. Stock markets suffer their worst Christmas Eve trading day While tech companies managed to escape the worst parts of the great recession in ...
Tags: TC, Microsoft, China, Softbank, Tech, Bloomberg, Sequoia Capital, Zymergen, Frankel, Bill Gurley, Milford, University of Western Ontario, David Frankel, Micah Rosenbloom, Lux Capital, Bilal Zuberi


Some Chinese Companies Are Giving Employees Incentives For Buying Huawei Devices or Just Giving Them One and Boycotting Apple

A growing number of Chinese companies are throwing their support behind Huawei Technologies following the recent arrest of its chief financial officer in Canada, taking such steps as offering subsidies for staff who buy the telecom equipment maker's smartphones. From a report: Many Chinese businesses have told employees they will receive subsidies if they buy Huawei smartphones to aid the company. Most are subsidizing 10% to 20% of the purchase price, with some even covering the full amount. Ove...
Tags: Tech, Canada, Huawei, ZTE, Shenzhen Stock Exchange, Huawei Technologies, Shanghai Youluoke Electronic and Technology, Shenzhen Yidaheng Technology, Fuchun Technology


The top 10 books on Apple's iBooks-US

iBook charts for week ending December 23, 2018: (Rank, Book Title by Author Name, ISBN, Publisher :iBooks US Bestseller List - Paid Books1. Becoming by Michelle Obama - 9781524763152 - (Crown)2. The Last Anniversary by Liane... [Author: [email protected]]
Tags: Apple, Business, US, Michelle Obama, Liane


Are you ready to break up with your phone?

Smartphone owners have a growing sense of unease about the amount of time spent staring at that screen.
Tags: Tech


We finally started taking screen time seriously in 2018

At the beginning of this year, I was using my iPhone to browse new titles on Amazon when I saw the cover of “How to Break Up With Your Phone” by Catherine Price. I downloaded it on Kindle because I genuinely wanted to reduce my smartphone use, but also because I thought it would be hilarious to read a book about breaking up with your smartphone on my smartphone (stupid, I know). Within a couple of chapters, however, I was motivated enough to download Moment, a screen time tracking app recommende...
Tags: Psychology, Iphone, Apple, Amazon, Android, TC, Mobile, Facebook, Pinterest, Stanford, Tech, Smartphone, Reddit, Moment, Tim Kendall, Screen Time


Microsoft's Emergency Internet Explorer Patch Renders Some Lenovo Laptops Unbootable

Earlier this month, Microsoft issued an emergency patch for Internet Explorer to fix a zero-day vulnerability in the web browser. The problem affects versions of Internet Explorer from 9 to 11 across multiple versions of Windows, but it seems that the patch has been causing problems for many people. Specifically, people with some Lenovo laptop have found that after installing the KB4467691 patch they are unable to start Windows, reports BetaNews. Read more of this story at Slashdot.
Tags: Microsoft, Tech, Lenovo


How to choose and use an encrypted messaging app

Getty Images Text messaging has been around since the dawn of cellular technology, and sparked its own unique language. But it’s time to put sending regular SMS messages out to pasture. If you have an iPhone, you’re already on your way. iPhones (as well as iPads and Macs) use iMessage to send messages between Apple devices. It’s a data-based messaging system reliant on 3G, 4G, and Wi-Fi, rather than SMS messaging, which uses an old, outdated but universal 2G cellular network. iMessage has grown...
Tags: Apple, Google, Security, Facebook, Fcc, Privacy, Imessage, White House, Tech, Encryption, Cryptography, Facebook Messenger, Federal Communications Commission, Computing, Signal, Operating Systems


Giant Boombox in New York

Large boombox plays Christmas music on Pier 17 in Manhattan, New York. Improv Everywhere created 10-foot tall boombox with 160-foot long power cord and waited for unsuspecting people to plug it in. Also check out: Giant Baby Strolle
Tags: New York, Design, Tech, Manhattan New York, Pier 17


Hot Tub Hack Reveals Washed-up Security Protection

Thousands of hot tubs can be hacked and controlled remotely because of a hole in their online security, BBC Click has revealed. From a report: Researchers showed the TV programme how an attacker could make the tubs hotter or colder, or control the pumps and lights via a laptop or smartphone. Vulnerable tubs are designed to let their owners control them with an app. But third-party wi-fi databases mean hackers can home in on specific tubs by using their GPS location data. Balboa Water Group (BWG)...
Tags: UK, Tech, Bbc, Ken Munro, Balboa Water Group BWG


Google searches for 'recession' highest since 2009

Recent market turmoil, driven in part by the ongoing chaos in President Donald Trump's White House, has many analysts wondering if another recession is on the horizon.It's not just the financial pros who are worried: Data from Google... [Author: [email protected]]
Tags: Google, Business, White House, Donald Trump


How to browse the web securely and privately

Getty Images So you want to browse the web securely and privately? Here’s a hard truth: it’s almost impossible. It’s not just your internet provider that knows which sites you visit, it’s also the government — and other governments! And when it’s not them, it’s social media sites, ad networks or apps tracking you across the web to serve you specific and targeted ads. Your web browsing history can be highly personal. It can reveal your health concerns, your political beliefs and even your porn h...
Tags: Apple, Firefox, Google, Security, New York, Privacy, Internet, Congress, Tech, Tor, Fbi, Vpn, Firewall, Java, Cloudflare, Dns


How to protect your cell phone number and why you should care

Getty Images Assuming you have your strong passwords in place and your two-factor authentication set up, you think your accounts are now safe? Think again. There’s much more to be done. You might think your Social Security or bank account numbers are the most sensitive digits in your life. Nowadays, hackers can do far more damage with little effort using just your cell phone number. But unlike your Social Security number, you’re far less likely to keep your cell phone number a secret — otherwis...
Tags: Security, Verizon, Privacy, Tech, E-commerce, Authentication, Cryptography, Sprint, Telephony, Social Security, Mobile Phone, John Biggs, Computer Security, AT T, Verizon Sprint, Facebook Gmail Twitter


Two-factor authentication can save you from hackers

Getty Images If you find passwords annoying, you might not like two-factor authentication much. But security experts say it’s one of the best ways to protect your online accounts. Simply put, two-factor authentication adds a second step in your usual log-in process. Once you enter your username and password, you’ll be prompted to enter a code sent as a text message or an email, or sometimes as a push notification on your phone. In all, it usually only adds a few extra seconds to your day. Two-f...
Tags: Google, Security, Facebook, Privacy, Tech, Smartphone, Sms, Cryptography, Password, Facial Recognition, Phishing, Computer Security, Don, Yubikey, Multi-factor Authentication, Microsoft Facebook Google


Why you need to use a password manager

Getty Images If you thought passwords will soon be dead, think again. They’re here to stay — for now. Passwords are cumbersome and hard to remember — and just when you did, you’re told to change it again. And sometimes passwords can be guessed and are easily hackable. Nobody likes passwords but they’re a fact of life. And while some have tried to kill them off by replacing them with fingerprints and face-scanning technology, neither are perfect and many still resort back to the trusty (but frus...
Tags: Iphone, Security, Privacy, Identity Management, Tech, Cryptography, Software, Password Manager, Mobile Devices, Troy Hunt, 2018 Year In Review, Cybersecurity 101


Fortnite Was 2018's Most Important Social Network

An anonymous reader shares a report: Epic Games managed to produce a hit, sure, but the genius of it is how it's rewritten the idea of what hanging out online can be. Fortnite is a game, but it's also a global living room for millions of people, and a kind of codex for where culture has gone this year -- it's a cultural omnibus that's absorbed everything from Blocboy JB's shoot dance to John Wick. It got Ted Danson to learn how to floss. This thing is here to stay, as a new kind of social networ...
Tags: Tech, Epic Games, Ted Danson, John Wick, Fortnite


The best OnePlus 6T cases

The OnePlus 6T is a solid choice if you want a great flagship. But your powerful new phone can be put out of commission with a single drop. Here are the best OnePlus 6T cases to keep your phone safe. The post The best OnePlus 6T cases appeared first on Digital Trends.
Tags: Android, Mobile, Trends, Oneplus, Flagship, Buying Guides, Android Army, Accessory of the Week, OnePlus 6T


Google's John Mueller Helping Webmasters On Christmas Eve Again

John Mueller to me seems like a real genuine person and someone who is in a tough position every day trying to balance the line of defending the Google search results while helping some people who try to manipulate those same results. Each Christmas eve for over 12 years, John Mueller has been helping webmasters with their problems.
Tags: Google, Seo, Google Search Engine Optimization, John Mueller


Cybersecurity 101: Why you need to use a password manager

If you thought passwords will soon be dead, think again. They’re here to stay — for now. Passwords are cumbersome and hard to remember — and just when you did, you’re told to change it again. And sometimes passwords can be guessed and are easily hackable. Nobody likes passwords but they’re a fact of life. And while some have tried to kill them off by replacing them with fingerprints and face-scanning technology, neither are perfect and many still resort back to the trusty (but frustrating) passw...
Tags: Iphone, Security, Privacy, Identity Management, Tech, Cryptography, Software, Password Manager, Mobile Devices, Troy Hunt, 2018 Year In Review, Cybersecurity 101


Cybersecurity 101: Two-factor authentication can save you from hackers

If you find passwords annoying, you might not like two-factor authentication much. But security experts say it’s one of the best ways to protect your online accounts. Simply put, two-factor authentication adds a second step in your usual log-in process. Once you enter your username and password, you’ll be prompted to enter a code sent as a text message or an email, or sometimes as a push notification on your phone. In all, it usually only adds a few extra seconds to your day. Two-factor authenti...
Tags: Google, Security, Facebook, Privacy, Tech, Smartphone, Sms, Cryptography, Password, Facial Recognition, Phishing, Computer Security, Don, Yubikey, Multi-factor Authentication, Microsoft Facebook Google


Cybersecurity 101: How to protect your cell phone number and why you should care

Assuming you have your strong passwords in place and your two-factor authentication set up, you think your accounts are now safe? Think again. There’s much more to be done. You might think your Social Security or bank account numbers are the most sensitive digits in your life. Nowadays, hackers can do far more damage with little effort using just your cell phone number. But unlike your Social Security number, you’re far less likely to keep your cell phone number a secret — otherwise nobody can c...
Tags: Security, Verizon, Privacy, Tech, E-commerce, Authentication, Cryptography, Sprint, Telephony, Social Security, Mobile Phone, John Biggs, Computer Security, AT T, Verizon Sprint, Facebook Gmail Twitter


Cybersecurity 101: How to browse the web securely and privately

So you want to browse the web securely and privately? Here’s a hard truth: it’s almost impossible. It’s not just your internet provider that knows which sites you visit, it’s also the government — and other governments! And when it’s not them, it’s social media sites, ad networks or apps tracking you across the web to serve you specific and targeted ads. Your web browsing history can be highly personal. It can reveal your health concerns, your political beliefs and even your porn habits — you na...
Tags: Apple, Firefox, Google, Security, New York, Privacy, Internet, Congress, Tech, Tor, Fbi, Vpn, Firewall, Java, Cloudflare, Dns


Cybersecurity 101: How to choose and use an encrypted messaging app

Text messaging has been around since the dawn of cellular technology, and sparked its own unique language. But it’s time to put sending regular SMS messages out to pasture. If you have an iPhone, you’re already on your way. iPhones (as well as iPads and Macs) use iMessage to send messages between Apple devices. It’s a data-based messaging system reliant on 3G, 4G, and Wi-Fi, rather than SMS messaging, which uses an old, outdated but universal 2G cellular network. iMessage has grown in popularity...
Tags: Apple, Google, Security, Facebook, Fcc, Privacy, Imessage, White House, Tech, Encryption, Cryptography, Facebook Messenger, Federal Communications Commission, Computing, Signal, Operating Systems



Filters
show more filters
January - 2019
MoTuWeThFrSaSu
 123456
78910111213
14151617181920
21222324252627
28293031   
February - 2019
MoTuWeThFrSaSu
    123
45678910
11121314151617
18192021222324
25262728   
March - 2019
MoTuWeThFrSaSu
    123
45678910
11121314151617
18192021222324
25262728293031