Users of Apple’s iPhone, iPad and iPod touch devices got their first look at the company’s newest operating system, iOS 7, earlier today. Not only has Apple given iOS an entirely new look and feel, courtesy of head designer Jonathan Ive, but it has also revealed a revamped suite of core apps like Photos, Camera, Calendar, Weather and others, added new services like iTunes Radio and features like AirDrop, while also making it less lucrative for would-be thieves to steal your iPhone, and much more. Read more at: http://best1tec.blogspot.com/2013/10/the-best-features-of-ios-7.html
The Dropbox app for both iPhone and iPad not only stores all your files but lets you share them with people when and if you need to. From individual files to entire folders, you can easily create links to share content with someone.
Smart TVs can be hacked and compromised. On Thursday, at the Black Hat security conference, researchers Aaron Grattafiori and Josh Yavor demonstrated how they found vulnerabilities in different 2012 models of Samsung Smart TVs that allowed them to turn on the camera, take control of social media apps like Facebook or Skype, and access files and basically any app on the set.
“Because the TV only has a single user," Grattafiori explained to Mashable, "any type of compromise into an application or into Smart Hub, which is the operating system — the smarts of the TV — has the same permission as every user, which is, you can do everything and anything."
Frustrated by not being able to sing two notes at the same time, musical inventor Beardyman built a machine to allow him to create loops and layers from just the sounds he makes with his voice. Given that he can effortlessly conjure the sound of everything from crying babies to buzzing flies, not to mention mimic pretty much any musical instrument imaginable, that's a lot of different sounds. Sit back and let the wall of sound of this dazzling performance wash over you.
"Periodically, pages go missing, assets get misplaced -- you should not be concerned. This is a startup, this kind of thing happens. At Nosh, we are fortunate to have a relationship with several teams of ex-special forces operatives who help us track down these missing pages. When a page on this website goes rogue -- and a code 404 arises -- we dispatch one of our teams to bring it back. Ideally they are able to salvage the missing page, but sometimes, if the page is truly lost, they have to take it out (resulting in the subsequent code 500 when the page gets taken down). ..."
Apple recently acquired a small company that specializes in designing communications chips that use very little power, Passif Semiconductor. The purchase gives Apple more resources to tap for its venture into wearable computing, which appears inevitable.
Bluetooth Smart devices, such as heart-rate monitors, can connect to smartphones and tablets but sip power at a rate that their batteries can last months or even years on a single charge.
Such technology has obvious applications in the field of wearable computing, and indeed, many Bluetooth Smart devices exist today (such as the FitBit Flex). Apple is rumored to be working on a smart watch called the iWatch and has recently gone so far as to trademark the name in several countries.
Five months out of the year — starting in September and ending in March — the Norwegian town of Rjukan remains cast in the shadow of surrounding mountains. But officials are erecting a new installation that will permanently shed light on the small valley town during the dark winter months.
As part of The Mirror Project, engineers have begun installing three enormous rectangular mirrors on the face of the mountains that hem Rjukan in on either side. The mirrors will reflect sunlight down into the town square and become a sunny meeting place.
Most of the headlines surrounding Facebook’s (FB) second-quarter results centered on two things: the company’s very strong mobile revenue and the 20% stock jump.
It’s likely that no company has ever had to expand its computing infrastructure as fast as Facebook has, given the growth of its network and the large photo and video files that come with each new user. While it was rare a few years ago for a company to store a petabyte of information, Facebook must add several petabytes of storage per day to keep up with its users.
Still, the company has been pragmatic about adding to its infrastructure. Its facility in Sweden, less than half full, can be ready at a moment’s notice to install more computing gear that a partner company delivers pre-assembled. How many Swedes does it take to open one of the refrigerator-size packages? Three. In about five minutes. No joke. And they’re up and running inside the computing center a few minutes later. This means Facebook can dial up its capacity in short order.
Apple is testing a 13-inch iPad as well as an iPhone with a larger screen, The Wall Street Journal reports, citing officials at Apple's Asian suppliers.
The company is looking into producing an iPad with a screen measuring "slightly less than 13-inches," as well as iPhones of unspecified size, but with a screen larger than iPhone 5's 4 inches.
Rumors claiming a larger iPad and iPhone are in the works have been around seemingly forever, but there's no clear indication that Apple will actually produce these devices.
Steve Jobs famously shunned form factors different from those of the original iPad and iPhone, but later on Apple did introduce a larger iPhone — the iPhone 5 — as well as the iPad mini, so nothing is set in stone.
Responsive design, a technology that stretches or shrinks Web pages to fit differently sized screens, has emerged as the most-often recommended manner of optimizing content for mobile devices. This dominance was cemented in mid-2012 when Google recommended responsive design as the best strategy for smartphone-optimized websites.
Online graduate computer science programs provide flexible and convenient options for you to qualify for a profession in a rapidly changing and exciting field. This page tells you where to find suitable programs.
My first reaction - "do we need yet another social network?"
After reading about the philosophy of Zurker, my answer was "yes" - because it is one that is owned by the network members and responsive to needs of the network members, rather than being a centralized, corporate, profit-oriented, juggernaut.
Zurker is literally a member-owned application. You actually get shares in the company and so can profit from its growth.
And Zurker is driven by democracy. It's new - and still developing. Instead of changes being introduced top-down (whether you wanted the change or not) Zurker seeks out your ideas and feedback, so that their development team can develop the social application most in tune with what users actually want.
A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden.
The NSA boasts in training materials that the program, called XKeyscore, is its "widest-reaching" system for developing intelligence from the internet.
The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian's earlier stories on bulk collection of phone records and Fisasurveillance court oversight.
Wanjira Kinuthia, Georgia State University Stewart Marshall, The University of the West Indies
This a recently published book on how some educators have embraced the opportunities afforded by mobile learning in developing and resource challenged contexts.
The book will appeal to elected public/government representatives, public service agencies, community groups, regional development bodies, researchers, educational technologists and others interested in mobile learning. Students on senior undergraduate or postgraduate courses in educational technology, education, development studies, information technology, information systems, business, health, and social work will find this book useful in their studies related to the application of mobiles in learning and development.
Our lives are increasingly online, which means a lot of our personal data is at risk.
Abine, an online privacy company, found that the three things users wanted most protection for were emails, phone numbers and credit card numbers. While there are multiple ways that do it separately, Abine attempted to put it all together and came out with MaskMe.
MaskMe is a browser extension available on Chrome and Firefox that provides 'disposable' email addresses, phone numbers, and even credit card numbers. So you can sign up for something with your masked email address and then if it gets too annoying 'throw' the address away. MaskMe describes the feature as 'an unsubscribe button that always works.'
See-through screens that allow us to reach in, touch and interact? Jinha Lee believes his 3D devices will make our digital worlds feel more real.
Computer scientist Jinha Lee believes this is only the beginning. He has been working on 3D computer screens that react to the users hands moving behind the display – allowing the user to “feel” the virtual objects they are interacting with.