Technology

Firefox – is the fire out?

Firefox - is the fire out? As a developer, I've always been a great fan of Firefox, for quite a few reasons, but here's a couple: It wasn't Internet Explorer. It came from an open-source mindset and had thousands of great plugins. It was great to use as a de-bugging tool. But when the mobile revolution really took hold, it didn't seem to catch on as much for me. Chrome became my browser of choice on my Android devices, and Safari was already well entrenched on my iOS devices. The latest news that Brendan Eich has departed as CEO after [...]

Apple vs Samsung

Apple vs Samsung Apple and Samsung are beginning a new trial - accusing each other, once again, of ripping off designs and features. The last one was held in 2012 and resulted in the jury finding in Apple's favour, but reducing the amount of damages awarded.  US$929 million is still a massive chunk of capital, but it pales against the current US$2 billion claim. This time round, it looks like Apple is claiming five patent infringements that cover Galaxy smartphones and tablets sold between 2010 and 2012. In juxtaposition, Samsung is claiming that Apple infringed two patents employed in iPhone [...]

Google Glass

Is the Google Glass half full or half empty? It turns out that the maker of Ray-Ban and Oakley sunglasses (Luxottica) is  to work with Google on Google Glass eyewear. The Italian company will design, develop and distribute eyewear as part of strategic partnership with Google that might see everyone wearing Glass in dozens of different styles. In reality, Google Glass is a just a small stamp-sized screen attached to a pair of eyeglass frames. It can record video, access email, and retrieve information from the web by connecting wirelessly to a user's mobile phone. Some people have flagged the tech-savvy [...]

Devices at risk of hacking

Apple mobile devices could be at risk of hacking A major flaw in Apple software for mobile devices could possibly allow hackers to intercept email and other communications that are meant to be encrypted. If attackers have access to a mobile user's network, such as by sharing the same unsecured wireless service , they could see or alter exchanges between the user and protected sites . Governments with access to telecom carrier data could do the same. Apple did not say when or how it learned of the flaw in the way iOS handles sessions in what are known as [...]

Go to Top