John Smith

365 Added | 7 Magazines | 6 Likes | 1 Following | 9 Followers | @easthighNerd | Nothing interesting about me to put in a bio

KCRG Meteorologist Arrested For Deceiving Viewers, Stealing Spring

Forecasting serious winter weather is apparently now a serious crime in Iowa. Any offenders could be arrested, at any time and this morning KCRG …

Advertising Industry

27 Incredibly Useful Things You Didn’t Know Chrome Could Do

Give your internet experience a jolt of fresh energy with these easily overlooked features, options, and shortcuts for Google’s browser.<p>These days, a browser is more than just a basic navigator for the web. It’s effectively a second desktop—a gateway to countless apps, sites, and services. And …

Google

It sure looks like Google is about to kill Inbox

It has been almost exactly three years since Google made its new email client available to the whole world.<p>Inbox by Gmail was sold as a "completely …

Google

Google app kills the last remnants of Voice Search, completely switches to Assistant (Updated)

• Update 1: 2018/04/16 9:56am PDT This seems to be a server-side test. Some of you are updating to v7.26 beta and finding that Voice Search is still …

Google

Yahoo and AOL just gave themselves the right to read your emails (again)

Though Yahoo was already scanning its users' emails to maximize ad opportunities, doubling-down on the policy could raise eyebrows in a post-Cambridge Analytica world.<p>Oath, the media division of Verizon that runs both AOL and Yahoo, is finally unifying the privacy policy of its two giant legacy …

Privacy

I miss Windows Phone

Microsoft’s mobile OS had great features<p>I first gave up on Windows Phone back in December 2014. Microsoft’s mobile platform was being left behind, and I was tired of not getting access to the apps everyone else was using. It took Microsoft a few years to finally admit Windows Phone is dead, and the …

Windows Phone

Apple is moving on from Intel because Intel isn’t moving anywhere

Apple’s abandonment of Intel chips is inevitable<p>A report from <i>Bloomberg</i> this week has made public something that should already have been apparent to tech industry observers: Apple is planning to replace Intel processors in Mac computers with its own chips starting sometime around 2020. The two …

MacBook Air

Millennials destroyed the rules of written English – and created something better

The spelling and grammar rules do not apply on the Millennial Internet™.<p>That's because millennials have created a new rulebook for a variant of …

Language

How to ‘poison’ your data before you delete Facebook

Over the past few weeks, we’ve learned a lot about Facebook, Cambridge Analytica, and how Facebook uses your data. The revelations have pushed many …

Privacy

The 5 biggest announcements from the Apple education event

Apple took its annual spring event out of California and hosted it at a high school in Chicago this year, promising to focus its newest products toward the education market that’s been dominated by Google and Microsoft. The keynote was condensed into just one hour, most of which revolved around all …

Education Technology

Revolut launches disposable virtual cards

Fintech startup Revolut is launching a new type of virtual cards — disposable cards for online purchases. While you could already generate additional virtual cards for a fee, this is a different kind of virtual card as it gets destroyed after each transaction.<p>If you usually shop on Amazon or if you …

Virtual Reality

From copycat to Goliath: A deep dive into China's massive WeChat

China has long been perceived as a “nation of copycats,” where the shanzhai mentality reigned supreme, but, while pirating still goes on there, China has already moved on to the next phase of its development. The same has happened with WeChat. What started out as a Chinese copy of Whatsapp has …

Chatbots

Teen's devastating bug-report on a "tamper-proof" cryptocurrency wallet shows why companies can't be left in charge of bad news about their products

Saleem Rashid is a 15 year old self-taught British programmer who discovered a fatal defect in the Ledger Nano S, an offline cryptocurrency wallet …

Information Security

New Zealand just took care of a $3.6 million mouse infestation

The million dollar mouse is dead. Long live the million dollar mouse.<p>Compared to New Zealand, we are all terrible at getting rid of mice. The country just totally eradicated the 200,000 or so rodents scurrying around the subantarctic Antipodes island.<p>Unlike most of the mouse traps around the world, …

New Zealand

YouTube wants to ruin music videos with more ads

YouTube wants a larger piece of the streaming music pie than it’s currently earned, so it’s come up with an audacious plan that you’re going to hate – and it involves more ads.<p>In an interview at SXSW, YouTube’s global head of music, Lyor Cohen, said that people who listen to plenty of music on the …

Google Play

Generate Two-Factor Authentication Codes on Linux with ‘Authenticator’

'Authenticator' is an easy to use two-factor authentication app for the Linux desktop, and lets you generate 2-factor authentication codes for more …

Authentication

Cryptographic crumpling: The encryption 'middle ground' for government surveillance

Researchers believe a new encryption technique may be key to maintaining a balance between user privacy and government demands.<p>For governments …

Privacy

Former Apple Employees Reflect on Siri's 'Squandered Lead' Over Amazon Alexa and Google Assistant

<i>The Information</i> has published an in-depth look at how Siri has transitioned from one of Apple's most promising technologies into a "major problem" for the company. The article includes interviews with a dozen former Apple employees who worked on the various teams responsible for the virtual …

This little-known iPhone feature lets you share your Wi-Fi with friends in seconds

Apple has a feature in iOS that makes it easy to share access to your home Wi-Fi network with visitors -- such as friends or family -- in seconds. That means you don't need to remember, or even share, your home Wi-Fi password. It just grants access at the tap of a button.<p>The next time you have …

Apple Store

How To: Install Android P on Your Pixel Using a Mac

While installing the new Android P Developer Preview is fairly easy if you're using a Windows machine, it's a little trickier if you want to use …

Google launches Flutter beta, a mobile UI framework for building native Android and iOS apps

At Mobile World Congress 2018 in Barcelona today, Google launched the first beta release of Flutter, the company’s open-source mobile UI framework that helps developers build native interfaces for Android and iOS. The library is designed to combine the performance and platform integrations of …

In Memoriam: All the consumer products Microsoft has killed off | ZDNet

Microsoft's consumer products: A vanishing breed<p>In Microsoft's early days, it offered a little something for everyone: businesses, developers, and …

Living Rooms

MIT's Veil service will make private browsing more private

After reports and studies revealed that browsers' private modes aren't that secure, MIT graduate student Frank Wang decided to take things into his own hands. He and his team from MIT CSAIL and Harvard have created a tool called Veil, which you could use on a public computer -- or on a private one …

Veil is private browsing for the ultra-paranoid

If you’re worried about someone finding out what you’re pointing your browser at, there are plenty of options for keeping it secret, with varying levels of difficulty and effectiveness. Veil takes things further than perhaps any other anonymous browsing method by masking the page you’re viewing not …

Privacy

J-Pop Band Mr. Children Releases New Short Film, 'here comes my love': Watch

Veteran Japanese pop-rockers Mr. Children released a new 10-minute short film to accompany their latest hit, "here comes my love."<p>The earnest, …

Crucial iPhone source code posted in unprecedented leak (updated)

Critical, top secret Apple code for the iPhone's operating system was posted on Github, opening a new, dangerous avenue for hackers and jailbreakers to access the device, <i>Motherboard</i> reported. The code, known as "iBoot," has since been pulled, but Apple may have confirmed it was the real deal when …

Beware the looming Google Chrome HTTPS certificate apocalypse!

Well, melee. Dust-up? Minor inconvenience? But it's coming!!Tens of thousands of websites are going to find themselves labeled as unsafe unless they …

IT security

This desk chair cost $1 million on Amazon

If you’re looking for a new office chair, perhaps look elsewhere.<p>A rather standard desk chair, produced by furniture-maker Humanscale, was listed on Amazon for $1,000,000.<p>If that seems a bit steep, consider this: Prime members get free shipping (delivery time 1 to 2 weeks), and if you open an …

Why Linux is better than Windows or macOS for security

Enterprises invest a lot of time, effort and money in keeping their systems secure. The most security-conscious might have a security operations …

Linux

Artificial intelligence is the weapon of the next Cold War

It is easy to confuse the current geopolitical situation with that of the 1980s. The United States and Russia each accuse the other of interfering in …