
LTE-U: on the way to 5G
Recently Ericsson and Qualcomm have begun promoting their state-of-art technology, LTE-U. Is it any better that LTE-A, which is increasingly available all over the world, including US, Europe, Russia, China
80 articles
Recently Ericsson and Qualcomm have begun promoting their state-of-art technology, LTE-U. Is it any better that LTE-A, which is increasingly available all over the world, including US, Europe, Russia, China
I am not a gambler, and it is not too easy to lure me into a dare. Yet, I could not resist it this time. A friend posed this bet
At the recent Google I/O conference, the ‘corporation of good’ announced (in addition to new Android versions, new services, and other predictable announcements), four new projects: Soli, Jacquard, Vault, and
How did you like it the last time you saw your friends? Did you have a nice chat with them? Or were you all only taking pictures of your meals
Threatpost journalists Chris Brook and Brian Donohue discuss security and privacy at Google I/O conference, the IRS and Carefirst BlueCross BlueShield Data Breach, Sections 215 of the PATRIOT Act and
Despite the fact that Google I/O is a developers conference, it always gets the attention of journalists and consumers as well. The reason is simple: this is when Google shows
While LTE networks are seemingly just now starting to take off and are not yet omnipresent, networking vendors and carriers are already fully engaged in a vivid discussion on 5G’s
In theory, it’s common knowledge that “there’s no such thing as a free lunch”, but when it comes to practice, some forget about the ‘free lunch’ proverb and prefer another
When it comes to Mobile OSes, every 3rd option conversation these days mentions the need for some “true openness”. But do we really need this kind of openness?
WhatsApp has finally released a Web version of its popular mobile messaging service. We take a look at it from the security perspective.
Are you getting enough sleep at night? If not, it might be because your sleep pattern is disrupted due to the display on your PC, TV, tablet, and smartphone.
We collected the 10 best tweets related to an IT security event in 2014.
We have seen a number of cases where a user has deleted our product for Android and ended up with a locked device. Here we discuss why this happens and what can be done about it.
Let’s take a moment to discuss the numerous troubles that our bright, technology-packed future could bring about.
By default, your iPhone’s OS is set to give you the best performance instead of the best battery life. But you can change that!
Everyday millions of computers solve the same problem; these machines try to check if you are actually you and not some other person. The most popular tool to do that
If you haven’t heard by now, three days before Jay Z released his most recent album “Magna Carta… Holy Grail” in July, Samsung Galaxy device owners could download it via