On its pre-order page, Carphone Warehouse disclosed the details about Nexus 4 before the forthcoming launch of this device on October 29 in New York. In spite of the fact that the smartphone was produced by LG, it will be simply called Nexus 4.Read More
Apple’s operating system Mac OS X version 10.5 won’t bear the new version of Chrome. Chrome browser developers focused on implementing webcam and gamepad support. A short while ago Google has released Chrome browser for iOS together with the Android version.Read More
According to recent discoveries, the humanity is close as never to the era of cyber computing. Things like storage limits, data transfer and sharing speed limits will become a thing of the past.
Two studies were carried out on the behaviours of light. The first one was in nature photonics and it was based on the ability to encrypt data in twisted light, send it across a vacuum and then receives it at the other end. The research showed that data could be transmitted by the use of photons made in a limitless array of orbital angular momentum structures. The other research showed that data can also be shared if laser beams are used to stabilise the spin of electrons, but it was overlooked for a while despite how important it is. Scientists designed a way to use laser beams to arrange atomic spins and make it possible to rewrite their pattern, therefore make it possible to rewrite spintonic circuits.Read More
Google has sent European competition commissioner a proposal to change its search system to avoid legal battle against its market dominance. Google has been under close examination of the European Commission since 2010 when there were complaints from its rivals. The proposal Google sent has not been made public, but their Spokesperson addressed it and said that they addressed four areas that were described as potential concerns by the commissioner. He also added that Google will continue to work cooperatively with the competition commissioner.Read More
Computer scientists claim to have found a way to hack the security token which is an employee card that constantly produces changing numbers used by government officials to prove their identity electronically for briefing. This is a highly secure tool for logging into highly sensitive cooperate and government networks. There are four different types of these keys varying in the type of passwords they give. Several attempts have been made to break the token’s security by other individuals and corporations; however their attempts either failed or were too slow. Now computer scientists claim to have found a way to break the common RSA electronic token in a record time of just 13 minutes.Read More
According to the Wall Street Journal, a digital note-taking service Evernote asked
Evernote says it is going to use a recently made 70 million dollars investment for expansion in