Tech
Old treasures & new technologies
The most recent posts in Tech:
- Seldom does the media paint a more distorted picture than when it comes to hacking. Reason enough to take a closer look at hackers!8 min read
- Huge security holes, dubbed Meltdown and Spectre, have been discovered that affect Intel, AMD, Qualcomm and other processors. Read on to learn what happened and how manufacturers are responding!8 min read
- I recently saw the news that Nikon is shutting down a huge production plant in China as of now. Will specialists and enthusiasts be the only ones to still use digital single-lens reflex cameras (DSLRs) in 2018?8 min read
- In the life of a tech aficionado, there are many old favorites. For years, my favorite browser has been Firefox. Version 57 promises nothing less than a revolution.Is this the return to its old strength?5 min read
- Last week, a piece of news shook the IT world. The US government had banned federal agencies from using security software from Russian company Kaspersky. Looking closer, a couple a questions arise. Iis there anything left that is safe to install?6 min read
- I recently came upon an offer I could hardly ignore. Amazon's Fire HD 8 was being sold in its basic version for just €50 on "Prime Day". How will the bargain fare in the test?8 min read
- Video Indexer is a great example of how to leverage new technologies and you can give it a try - if you dare. After all, Microsoft didn't lie when they spoke of a "democratization of surveillance tools".6 min read
- Two-factor authentication may sound like a bureaucrat's wet fantasy but it does wonders for the security of your user accounts, even when your login credentials have already been stolen!6 min read
- Stations frequently show old spy movies with super villains stealing super secret weapons from government facilities. This blog article tells a similar story except that, in this case, the secret weapon is targeted at your PC.6 min read
- Android is runs on over one billion cellphones, tablets and other devices and is fairly secure, if those devices are running a somewhat current version which is not always the case.7 min read