The navigation app used for traffic that’s called Waze, and that’s owned by Google, apparently knows its users really well. It’s able to recognize the user’s routine and it’s even known to suggest the next location, based on previous experiences. Basically, it’s using a form of Bayesian probabilistic reasoning. If the user’s routine includes the […]
In early 2015, Travis Kalanick, the chief executive of Uber, was called to a meeting with Timothy Cook, that currently runs the Apple Inc. The meeting wasn’t exactly about two friends chatting, but rather an opportunity for Kalanick to explain his and his company’s actions, after Apple discovered that Uber has inserted a code in […]
An entire group of bugs was discovered in Linksys smart WiFi routers, and security experts say that these bugs could allow access to any hacker that managed to exploit them. Apparently, more than 7,000 routers have these bugs as a part of the system, and anyone who discovered them could have easily overloaded the device, […]
The post Linksys WiFi routers vulnerable to cyber attacks, almost a dozen flaws found appeared first on Use of Technology.
In today’s review of Samsung Gear 360, I would like to point out that photography and videography have traveled a great distance since digital cameras came into existence. 3D video filming is still an attraction but somewhat flailing one. VR tech is even newer but comparatively more hyped. So let’s see how capturing spherical scenes […]
The post Samsung Gear 360 Review: The Best is Not Good Enough Yet appeared first on Use of Technology.
Upon discovering the flaw in their rival company’s system, Uber decided that they should use it to their advantage and make sure that Lyft will remain in second place. That’s why they created a new program called “Hell” and used it to spy on Lyft’s drivers during a two-year period, from 2014 to 2016. The […]
The post Uber Targeted and Tracked Lyft Drivers through Program Called “Hell” appeared first on Use of Technology.
Microsoft has decided to continue its support of hybrid computing environments as one of the company’s main cloud differentiators. The officials from Microsoft have blogged three hybrid migration tools on April 12, and the said tools are now available to all of the company’s customers. Another tool, Azure Site Recovery, that’ used for migrating virtual […]
A new zeroday attack is exploiting a flaw in Microsoft Word and infects fully patched devices with malware. This method of infection was announced by FireEye, a security firm that published a blog post about it this Saturday. Apparently, the attack starts with an email that arrives with an infected Word document attached. After its […]
An urgent update to Apple’s iOS 10.3 was released only a few days before the official distribution to users around the world. This new version of an iOS operating system for mobile phones was supposed to be released to the iPad and iPhone users around the world when an urgent update was suddenly released. This rushed […]
The post Urgent iOS 10.3 Patch Released By Apple for Over 70 Vulnerabilities appeared first on Use of Technology.
Researchers and developers have already made a lot of progress and gained a lot of skill when it comes to using drones to explore hard-to-reach places on our planet. Now, a similar type of drones is being planned that could be crucial in order to explore other planets as well. These UAVs (Unmanned Aerial Vehicles) […]
Right now, as you’re reading this, somewhere in the world, a robot is being assembled. It could be happening at some manufacturing plant, or somewhere in Shenzhen, or perhaps in some facility around Gaithersburg. Someone somewhere is currently working on preparing one of 10,000 robots that are expected to be introduced to the world in […]
The post Robo-Army on its Way: Roboteam Builds Army of 10,000 appeared first on Use of Technology.