Miguel has been a business growth and technology expert for more than a decade and has written software for even longer. From his little castle in Romania, he presents cold and analytical perspectives to things that affect the tech world.
The USB-C cable was designed to help pave the way for future devices that would require very versatile signalling and power transfers. So why are they, instead, frying laptops? Let’s find out.
Video conferencing has come a long way from the days when software used to come across hitches precisely at the most inopportune moments. Let’s take a look at its promising future.
When it comes to browser security, Internet Explorer is far from the best or safest browser. As as matter of fact, it’s getting more dangerous! See how in this article.
Spear phishing is dangerous because it uses the rapport between an individual and an organization to accomplish its purpose. This article explains what it is and how to protect yourself.
Companies like Symantec and FireEye have shown concern regarding malware on Apple devices, particularly iOS. This brings up a good point: Apple users should start thinking more about security. Here’s why.
Are you familiar with state-sponsored hacking? If not, this article will open your eyes and explain why it will continue to be a growing phenomenon as the Internet becomes more ubiquitous in our lives.
Following in YouTube’s steps, Facebook recently announced that it has stopped using Flash entirely for videos across the entire social network. It’s time to explain why Flash is being dumped in favor of HTML5.
Since 2006, Facebook has established a minimum age of 13 for the use of its services. Do you think that setting a minimum age like this is wise? Let’s discuss.
The Secure Hash Algorithm (SHA) has been an instrumental tool in the fight against hackers. While SHA-1 has been the standard, it’s now being abandoned for SHA-2. Here’s why.
Facebook’s Live Streaming Service is an immersive and authentic way to connect with the public figures you care about in real-time. Here’s what you need to know about it.
Generally all online quizzes look the same; however, some might appear as apps that require certain permissions on Facebook for you to proceed. This presents significant privacy concerns. Here’s how to protect yourself.
A water cooling system for PC can be difficult to implement. Would a circulatory system that worked a lot like our own vascular systems be more efficient?
A recent trend has emerged in which attackers are now asking for ransoms in web attacks. This is also known as ransom attacks. Here’s what you need to know.
As of October 23, 2015, the BBC reports that all public posts on Facebook will be searchable. Here’s what you need to know and how to opt out of searchable public posts.
The system we used to manage our files have not changed since PC first appeared. This begs the question: Is our current file and folder system flawed? Can we do better?
Sometimes a website that you often visit on your desktop or laptop will take much longer to load on your mobile device. What’s that all about? Find out!
There are many ISPs that have either not switched over to IPv6 or have only partially made the implementation. What’s the holdup? Should you be worried?
Facebook will soon add a dislike button to the platform. What exactly does the dislike button do for the most massive social network in the world? Let’s discuss.
Lenovo’s latest Yoga Tab 3 Pro tablet came with a small projector that is capable of displaying a 70-inch image onto surfaces. Is this a good idea? And is it useful?
Is 4K really a necessary resolution for a smartphone? Does this resolution even make a difference when placed side-to-side with previous high-end models?
The problem we face right now is that we do not have a clear line drawn on what “enough” data about an individual is. Where do we draw the limit on data collection?
The recent news is that Google will now be held by its new parent company – Alphabet. What is this all about? And what is Google Alphabet? Let’s find out.
Swatting is a dangerous cyber crime that puts people in danger by reporting false crimes and deploying SWAT to their home. Many want justice for this. Should the police get involved?
The amount of people with a tablet is about one-tenth of the world population; it’s slowly becoming a business-worthy item. Here’s why this device won’t die.
The Google Brain team is working on artificial neural networks. Let’s see how it could affect the way that technology interacts with us in the near future.
Online reviews are great because they give you a supposedly accurate depiction of the product that you are going to buy. But can they really be trusted? Let’s find out.
Streaming sites have been seeing increased usage by people who wish to pay for unlimited media streaming. Are these services going to make piracy obsolete?
The severity of a DDoS attack could vary from a mild inconvenience to a total takedown of a server. But how large can it really get? Let’s find out here.
Many articles have been talking about this radical type of display that uses “quantum dot technology.” Let’s find out what a quantum dot monitor actually is!
ICANN is in the process of making a policy decision that may expose people’s private information. Is this yet another infringement of privacy? Let’s check it out.
One vulnerability called the Dark Jedi exploit has managed to slip through the cracks and has affected older Apple computers. This is what it is all about.
The newly announced Android Pay by Google doesn’t require you to enter your PIN for your cards. Is this actually safe? Are PIN-less payments the way to go? Let’s check it out.
Cryptography is supposed to keep you safe, but what if there is a backdoor that allows the government access to your account? What would be its consequence? Let’s find out.