2013 beschenkte uns reich mit technischem Spielzeug. Ob neue Smartphones, Konsolen oder 3-D-Drucker - von überall lockte die süsse, digitale Versuchung. Das sind unsere Highlights des Jahres.
«GTA V», «The Last of Us» oder doch lieber «Super Mario 3D World» - nehmen Sie an unserem Duell teil und küren Sie das beste Spiel des Jahres.
Sensoren, wie sie in Smartphones oder Google Glass zum Einsatz kommen, könnten auch die Game-Industrie revolutionieren. Erste Ansätze sind bereits erkennbar.
Linux-Distributor Canonical hat eine Entwicklervorschau einer Dual-Boot-Option veröffentlicht. Damit sollen Android- und Ubuntu-Betriebssystem abwechselnd auf einem Gerät laufen.
In Asien ist das Bildbearbeitungsprogramm Camera360 auf dem Vormarsch. Nun sollen noch mehr Märkte erobert werden - und starke Partner wie Twitter an Bord geholt werden.
Ex-Nokia-Mitarbeiter haben ein automatisches Videoaufnahmesystem entwickelt, das den Gefilmten auf Schritt und Tritt folgt. Nun soll FilmMe die deutschsprachigen Märkte erobern.
Auf fast 200 Seiten legt das US-Justizministerium offen, weshalb es Megaupload-Gründer Kim Dotcom vor Gericht sehen will. Die Liste der Anschuldigungen ist lang.
Braune Flecken und welke Blätter: Dass es Zimmerpflanzen manchmal schlecht geht, muss nicht nur an mangelnder Pflege liegen. Die Strahlung des Wi-Fi-Routers könnte mitschuldig sein.
Ein neuer Werbefilm für Samsungs Smartwatch Galaxy Gear zeigt, wie ein junger Snowboarder ein Pistenhäschen nur wegen seines Gadgets aufreissen kann.
Kanadischen Forschern ist es gelungen, SMS chemisch zu «verschicken»: Über kurze Distanzen werden Informationen in einem feinen Alkoholnebel übermittelt.
Kommen 2014 die iWatch, gekrümmte iPhones oder gar der ominöse Apple-Fernseher? Firmenchef Tim Cook blickt in einem Schreiben zurück und kündigt «Grosses» fürs nächste Jahr an.
Mit dem Jailbreak für Apple-Geräte lassen sich die Gadgets von den Fesseln des iOS-Systems befreien. Die Installation ist simpel, noch aber sind wenige Funktionen kompatibel.
Apple hat einen Vertrag mit dem grössten Mobilfunkanbieter der Welt abgeschlossen: Dank der 700 Millionen Kunden von China Mobile hofft der US-Konzern, in China wieder mehr iPhones absetzen zu können.
Ein Mail-Verschlüsselungsprogramm liess sich nur aufgrund der Geräusche des Computers hacken. Dazu reicht ein simples Mobiltelefon.
From the launch of its , in this video report from IDG News Service.
The HP Chromebook 11 is back on the market after a faulty charger scuttled Christmas sales.
”A child born today will grow up with no conception of privacy at all,” Edward Snowden warned Wednesday in a message broadcast to U.K. television viewers. ”They’ll never know what it means to have a private moment to themselves, an unrecorded, unanalyzed thought,” said Snowden, famous for leaking documents from the U.S. National Security Agency that reveal just how much of what we say, write and do is already recorded and analyzed. ”That’s a problem because privacy matters. Privacy is what allows us to determine who we are, and who we want to be,” Snowden said in “” recorded for Channel 4, a commercially funded public service broadcaster owned by the U.K. government. The video, one minute 43 seconds in duration, was produced by Praxis Films, the production company of freelance journalist Laura Poitras, who has worked on a number of based on the documents Snowden leaked.
While still lagging far behind Android and iOS in terms of users and scope, Windows Phones are slowly of its own. Still, the big knock against the ecosystem is the apps—or lack thereof. Sure, the WP app store is comparatively tiny and the apps that have attempted migrating over have . While the WP app market continues to mature, there are plenty of good grabs within the 200,000-plus strong ecosystem right now. We've highlighted 11 Windows Phone apps that will make your mobile experience as smooth as Steve Ballmer's scalp.
As 2013 winds to a close, it’s time to look back at the biggest security events and incidents of the year. Here’s hoping there are some lessons to be learned—something to provide a foundation for stronger protection and a safer online and mobile world in 2014 and beyond. With each passing year, the world of technology evolves and improves, and that includes building stronger defenses against cybersecurity threats. Unfortunately, cybercriminals are continuously adapting and acquiring new techniques, too, and successfully exploiting emerging technologies in a perpetual game of security leapfrog. Here’s the 2013 security highlight—er, lowlight—reel. The concept of ransomware is simple: Attackers encrypt your data or lock you out of your PC or device using malware exploits, and then demand payment in exchange for restoring your access.
Apple has been fined NT$20 million (US$663,332) by the Taiwan Fair Trade Commission for interfering with the pricing of the iPhone by three mobile carriers, according to reports. The antitrust agency found Apple’s unit in charge of Taiwan sales violated article 18 of the Taiwan’s Fair Trade Act by asking operators Chunghwa Telecom, Far Eastone Telecommunications and Taiwan Mobile to submit pricing plans for approval by Apple, which had also recommended changes in the prices. Apple’s agreements with the operators are said to have stipulated, for example, that subsidies these companies offer for buying iPhones with contracts cannot be lower than those of their competitors. The Fair Trade Commission had not issued a statement on the order on its English website, though a was available.
Because killer apps like these are the gift that keeps giving all year long.
Desktop-replacement laptops like the Gateway NE72206u have two major advantages over their smaller brethren, including lots of screen real estate and a full-size keyboard. For many users, these features are paramount, trumping other concerns such as portability and battery life. Of course, some systems take better advantage of their large size than others do. The NE72206u—with its 17.3-inch, 1600-by-900-pixel display and its large keyboard with full numeric keypad—falls somewhere in the middle, mainly because it’s not an overwhelming performer. But with a street price of just 500 bucks, we’re not complaining. Gateway’s NE72206u isn’t the lightest or most powerful laptop you’ll find, but this desktop replacement does offer a 17.3-inch display and a compelling price-to-performance ratio. The NE72206u is built around an AMD A6-5200 CPU with integrated AMD HD 8400 graphics. It also has 6GB of memory (500MB of which is allocated to the graphics), and a 500GB, 5400-rpm Toshiba MQ01ABD050 hard drive. Together those components helped the laptop produce a WorldBench 8.1 score of 100—the same as our reference-point notebook (a now aging ). Its battery life of 4 hours, 22 minutes, on the other hand, is quite good for a desktop replacement. In hands-on use, the NE72206u is smooth enough once Windows does its caching thing, but it doesn’t snap to as a machine based on a faster AMD A8/A10 or an Intel Core i3 processor would. Adding a solid-state drive would be an easy way to goose this system, but the NE72206u is a tease in that respect: Although it has a second drive bay just waiting to fulfill that fantasy, the bay lacks a SATA connector. That means you’d have to ditch the hard drive to add an SSD. At least you can easily access both the bays and the memory by loosening nine captive screws and removing one large panel on the bottom of the unit.
I've owned four Mac laptops over the last decade or so, but I've gone through countless power adapters. Invariably, the adapters fail because the cord frays where it meets the brick or the connector that plugs into the computer. Argh. So annoying. While you might not be able to prevent power adapters from failing, this simple hack could help extend the life of your power adapter or computer cables. Be sure to follow the instructions that came with the glue and heed any warnings it provides. You may want to protect your work surface from damage with a sheet of newspaper or plastic. And make sure you don't get glue on any connectors; otherwise, you might render the cable unusable. Hook the twist-tie around the end closest to the connector or power brick, then use a little glue to hold it in place.
A security vulnerability within the Knox software used by the Samsung Galaxy S4 and the Note 3 could allow a malicious app to “listen in” on data transferred within the secured environment, researchers warned. The vulnerability was that the vulnerability was found in developer phones that weren’t “fully loaded with the extra software that a corporate client would use in conjunction with Knox,” the paper reported. So far, the Knox vulnerability has only been discovered on the Galaxy S4. Like third-party apps such as , Knox was developed with an eye for the so-called “BYOD” movement, where personal smartphones and other devices are allowed onto corporate networks. The problem is that those same corporate network administrators want to ensure that sensitive corporate data—which can include email, contacts, and calendar information—doesn’t wander outside the corporate firewall, intentionally or not. Samsung’s Knox creates an encrypted, virtualized space within the smartphone, so that apps such as email, phone, contacts, and others can be loaded securely. Data can be prevented, by policy, by being moved outside of Knox.
You're using way more data now than you used to. What's that mean for data caps?
The CyanogenMod Edition Oppo N1 costs a cool $600, but it's unlocked and comes preloaded with everybody's favorite custom Android ROM.
Ashampoo Burning Studio 14 is a nice, but extremely mild, upgrade to what is now one of the longest-lived and competent CD/DVD/multimedia burning suites available for PC. It offers all the usual features: CD/DVD/Blu-ray burning, jewel case and cover editing, movie and slideshow creation, plus backup from PC and mobile devices, and does so for an affordable $50 ($20 to upgrade from a previous version). New features in version 14 are the ability to write password-protected and encrypted discs, and one-click backup of mobile devices. Alas, the one-click backup seems to accept only an optical disc as a destination. Most of the backups that ABS performs may be stored anywhere, even across the network. Ashampoo Burning Studio14 is easy-peasy to use and pleasing to the eye. ABS 14 will create, burn, and also let you browse .iso, img, bin/cue, and its own .ashdisc image files. It also copies non-copy-protected discs and gives you the impression that it will do the same with copy-protected movie discs. It doesn’t, but it won’t say so until it runs into an unreadable sector, which can be well into the process.
Apple's new Mac Pro is finally here, but is it for you? That all depends on the apps you use and what expansion options you need.
I have a dream every holiday season. It’s Christmas Eve, and I’m sitting in front of a roaring fire. Christmas carols are echoing through the living room. Faithful friends who are dear to me gather near to me. The scene is something out of a Hallmark card. Now if only my fireplace would co-operate. Unfortunately, the fireplace in my house may as well have been stamped “For Display Purposes Only.” The fireplace seems to have been designed by people with only a passing familiarity with fire safety codes. It’s built shallow and the hearth is practically non-existant. What I’m trying to say is, one spark from the fireplace and my Christmas tree will be lit up all right, but probably not in the manner that local fire marshals would find advisable. So like millions of apartment dwellers or people who live in fireplace-free homes, it seems that I’ll be dreaming of a Yule log-free Christmas. That is, unless I take this holiday traditional digital.