Miguel has been a business growth and technology expert for more than a decade and has written software for even longer. From his little castle in Romania, he presents cold and analytical perspectives to things that affect the tech world.
One way to encrypt your files is via the public/private key. Let’s take a look at the public key encryption concept to understand how it can protect you.
You’ve probably seen the term RFC thrown around in applications that you’ve been using. What is this mysterious RFC that people been talking about? Let’s find out.
We are coming closer to creating supercomputer that can function as digital brain. Can we really speed up cancer research to the point of finding a cure with the help of these mega-thinkers?
Banks have been issuing contactless debit cards since 2008. These contactless cards allow you to pay by just tapping on the reader, but is it safe? Let check it out.
Most smartphones (and tablets) come with phone memory range between 8 and 32 GB. Will this always be the case? How much bigger can mobile devices really get?
You are probably not aware that Flash has an “Rosetta” exploit. Here is what you need to know about Rosetta Flash exploit and what you can do about it.
Internet transmission speed on fiber optic cable is much faster than the old copper infrastructures we relied on for decades. Why is this so? Let discuss it.
When you are looking for a new webcam, you might have noticed some products known as IP cameras. If you’re wondering what those are, here’s the explanation.
Google has been testing their driverless vehicles for past two years. Is it ready for prime time? Here’s what you need to know about driverless vehicles.
As of late, many people have been hacked and are the victims of password leaks and Trojan horse infections. The following are some tips if it happens to you
What if I tell you that your encrypted data may already be cracked by the hackers? Here are some examples why encryption is not as safe as you may believe.
If you are always wondering why the Internet provider have slow connection speed, you may want to find out more about wireless spectrum and the crisis it is facing.
Intel has recently started to produce CPUs for mobile. How does its mobile chipset stack up against ARM? Will Intel be able to beat ARM at its own game?
You’re probably so used to charging your devices that you don’t realize how inconvenience it is. Can we see a future without having to charge our devices? Let’s find out.
Things just don’t work the way they should in the Internet. Here are some things you should know about the OpenSSL “Heartbleed” bug and how it affects you.
Windows XP has been a great OS, but it won’t be supported any more this coming April. Here is what you can do after Windows XP end of support by Microsoft.
For the first time in history, a smartphone comes with a fingerprint authentication technology. It’s a good a time now to answer some questions about it.
Samsung came out with a new operating system for mobile devices, called Tizen. What makes Tizen any different? Will it be a threat to Android? Let check it out.
One proposition that security experts made recently was to use short sentences as passwords, rather than a complicated string of characters. Let’s see if this is a more secure method.
As mobile technology becomes more advanced, there are more demand to push the processing power even further. Let’s discuss how the future of processing power will look like.
Even before Apple releases a phone, people often know the buzz before it reaches the market. Here are some rumors on what iPhone 6 might look like and work.
There’s much more to your SIM card than what you think. You’ll discover that these little gold-plated pieces of plastic is more intriguing than you thought!
Have you been waiting long for LTE to arrive in your region? Here are some of the reasons why your country might not be adopting LTE as quickly as you may have hoped.