Music
Trailers
DailyVideos
India
Pakistan
Afghanistan
Bangladesh
Srilanka
Nepal
Thailand
StockMarket
Business
Technology
Startup
Trending Videos
Coupons
Football
Search
Download App in Playstore
Download App
Best Collections
Technology
I&m sure most Mac users know Command-C means copy and Command-V means paste, but therea host of other useful shortcuts that make a Mac userlife much easier. I&ve assembled this short collection to illustrate this truth:
Command-W
Closes the active window you are currently in. Use Option-Command-W to close all currently active app windows.
[ Further reading: 40 tips to get the most from your Mac (and macOS 'High Sierra') ]Command-Y
- Details
- Category: Technology
Read more: 24 keyboard shortcuts Mac users need to know
Write comment (93 Comments)Slack users can now create action points directly from a message post in the app with the introduction today of a new Actions feature.
Announced as Slack kicked off its first Spec developer conference in San Francisco on Tuesday, Actions deepens integration with third-party apps such as project management tool Asana and issue-tracking app Jira.
[ Further reading: 10 tips for preventing Slack burnout ]An Asana task can be created by clicking on the context menu in the right hand corner of a Slack message, for instance; it will capture relevant data directly from the message menu such as due date, what needs to be done and the project involved.
- Details
- Category: Technology
Read more: Slack adds Actions feature, highlights dev community growth
Write comment (91 Comments)Siri became a built-in element of iOS way back in October 2011, when Apple announcedits inclusion inside iPhone 4S and iOS 5. AppleAI has seen numerous improvements since then, so I thought it would be interesting to explore the evolution of Siri at WWDC since launch.
WWDC is important for the evolution of Siri
Applebig developer conference isn&t just about wowing the crowd with consumer-focused improvements; italso about sowing new seeds developers can choose to use to build their own solutions and businesses.
- Details
- Category: Technology
Read more: WWDC: The evolution of Apple’s Siri
Write comment (93 Comments)Stop me if you've heard this one before: A new version of Android is right around the corner — and with it comes some lofty talk about how this'll finally be the year Android manufacturers start taking upgrades seriously.
That's the story with Google's upcoming Android P release, thanks to the software's integration of Project Treble — a new "modular base" for Android that makes it easier for manufacturers to process updates. In short, Treble keeps the guts of Android in their own standalone layer within your device's storage. The hardware-specific code needed to make the device run properly, meanwhile, lives in a totally separate lower layer. It's kind of like a fancy cake, only with less unsaturated fat than the kind you normally buy.
- Details
- Category: Technology
Read more: Will Android P lead to faster upgrades 3 words to remember
Write comment (96 Comments)- Details
- Category: Technology
Read more: Instagram Is Adding A 'Mute' Button For The Sake Of Your Sanity
Write comment (99 Comments)The FBI seems to have been caught fibbing again on the topic of encrypted phones. FBI director Christopher Wray estimated in December that it had almost 7,800 phones from 2017 alone that investigators were unable to access. The real number is likely less than a quarter of that, The Washington Post reports.
Internal records cited by sources put the actual number of encrypted phones at perhaps 1,200 but perhaps as many as 2,000, and the FBI told the paper in a statement that &initial assessment is that programming errors resulted in significant over-counting of mobile devices reported.& Supposedly having three databases tracking the phones led to devices being counted multiple times.
Such a mistake would be so elementary that ithard to conceive of how it would be possible. These aren&t court notes, memos or unimportant random pieces of evidence, they&re physical devices with serial numbers and names attached. The idea that no one thought to check for duplicates before giving a number to the director for testimony in Congress suggests either conspiracy or gross incompetence.
The latter seems more likely after a report by the Office of the Inspector General that found the FBI had failed to utilize its own resources to access locked phones, instead suing Apple and then hastily withdrawing the case when its basis (a locked phone from a terror attack) was removed. It seems to have chosen to downplay or ignore its own capabilities in order to pursue the narrative that widespread encryption is dangerous without a backdoor for law enforcement.
An audit is underway at the Bureau to figure out just how many phones it actually has that it can&t access, and hopefully how this all happened.
It is unmistakably among the FBIgoals to emphasize the problem of devices being fully encrypted and inaccessible to authorities, a trend known as &going dark.& That much it has said publicly, and it is a serious problem for law enforcement. But it seems equally unmistakable that the Bureau is happy to be sloppy, deceptive or both in its advancement of a tailored narrative.
- Details
- Category: Technology
Read more: FBI reportedly overestimated inaccessible encrypted phones by thousands
Write comment (99 Comments)Page 5308 of 5614