- Welcome Guest
- Sign In
Microsoft on Thursday announced that it was restricting its Cortana digital assistant to operating with the Edge browser and Bing search engine in Windows 10. "As Windows 10 has grown in adoption and usage, we have seen some software programs circumvent [its] design and redirect you to search provid...
A white hat hacker last week announced the discovery of more than a half-dozen security flaws in some software Facebook used on its corporate network. While performing penetration testing of some third-party software in a network appliance Facebook used, Orange Tsai, a security researcher for Devcor...
Google appears to be on the verge of executing a long-speculated plan to integrate Google Play's vast collection of more than a million Android apps into the Chrome operating system. A series of screen shots recently posted on Reddit show Chrome OS users able to access the Google Play store on a Chr...
Every time the "PC is dead" topic comes up, an old Monty Python movie comes to mind, and I'll bet you can guess which one. PCs are on almost every desk, and the installed base is measured not in the hundreds, thousands, or even tens of thousands -- it is measured in the hundred millions. Brian Krzan...
The European Commission on Wednesday charged that Google breached EU antitrust rules by seeking to maintain and expand the dominance of its Android operating system. "A competitive mobile Internet sector is increasingly important for consumers and businesses in Europe," said the EC's antitrust chief...
Apple on Tuesday announced a refreshed MacBook with some incremental improvements but nothing likely to dazzle even the staunchest Mac fans. The improved battery life and fanless design got the attention of Eric Smith, a senior analyst at Strategy Analytics. "Battery life is always top of mind for c...
Facebook's WhatsApp last week announced it would roll out end-to-end encryption for its users to better protect their privacy, but the move could make the service more attractive to spammers, too. While encryption can safeguard information from data thieves, it also can block data protectors from de...
HP on Tuesday unveiled its latest challenger to Apple's laptops, touting it as the thinnest laptop in the world. At 10.4 mm, the HP Spectre's chassis is as thin as a triple-A battery, the company noted. The Spectre is powered by Intel Core i5 and i7 processors and weighs in at 2.45 pounds. It has a ...
IBM last week announced that Lawrence Livermore National Laboratory has purchased its TrueNorth processor-based cognitive computing platform. The purchase included an end-to-end ecosystem and a multisocket host node. The lab will build a supercomputer based on the platform to see how neural networks...
Apple has been deluged with complaints from users who say the latest version of its mobile operating system is breaking links and crashing apps. "Following iOS 9.3 on iPhone 6splus update links in safari no longer open, then safari crashes -- any ideas how to fix? Same problem in Chrome," user John ...
Following Apple's announcement last week, I noticed a number of reports on how disappointed customers were that there was nothing they wanted to wait in line for hours to buy. I personally thought they should have been excited about that, because I hate to stand in lines. I've never really figured o...
Google has been developing a third-party keyboard for Apple devices in an effort to increase the number of Google searches on iOS, according to a news report published Tuesday. The keyboard, which is being tested internally, reportedly would incorporate a number of search options and a Swype-like fe...
A team of researchers at Johns Hopkins University has found a way to crack open files sent as encrypted instant messages in Apple's iMessage app, according to news reports published Monday. Although it took months to do, the researchers were able to brute force a 64-bit encryption key, allowing them...
Researchers last week discovered the first ransomware in the wild aimed at Apple's hardware platform. While the threat was subdued quickly, it exposed the weakness of digital certificates in authenticating software to devices. The ransomware appeared as a legitimate application because it contained ...