The price comparison tools on this website require you to disable Adblock for full functionality. Please consider disabling your ad blocker on our website in order to best take advantage of our tools.
Have you seen the latest Captain America movie yet? For those who have, some of you may have noticed that the smartphones and tablet devices that were featured in that film were built by Vivo. Now, Vivo is not some product developed by Tony Stark, but a phone maker from China, which has just overtook Xiaomi (also from China) as the fifth biggest vendor of smartphones in the whole world right now.
In Influence Central’s new report, Kids & Tech: The Evolution of Today’s Digital Natives, the firm looked into how our children are using the latest forms of mainstream technology, most particularly mobile devices such as smartphones and tablets. Needless to say, the results of the company’s study were pretty interesting. Here are the most important points:
Every year in the beautiful city of San Francisco in California, usually in May or June, Google holds its Google I/O, an annual conference focusing on software, web, and mobile technologies. This year, the tech giant once again offers a fresh round of announcements and updates regarding its products as well as the latest in technological trends and breakthroughs. Scroll down for the rundown.
Here we go again. Right after Apple has deployed an update to its iOS mobile operating system, the Internet has exploded with yet another round of feedback from users complaining of new bugs found in the rollout. This time around, the affected device is the tech giant’s latest tablet offering -- the 9.7 inch iPad Pro.
Based on the latest quarterly report published by market research firm IDC, the total volume of wearable device shipments increased to 19.7 million units during the first quarter of this year. This year’s numbers are a major improvement over last year’s, wherein 11.8 million units of wearable devices were shipped during the first three months of 2015.
The Multicultural Media, Telecom and Internet Council (MMTC) has released a white paper stating that zero rate mobile data deals are actually an effective way for low income mobile users to enjoy access to broadband services. As a national nonprofit organization, the MMTC was formed to advocate equal opportunity and civil rights in industries such as mass media, telecommunications, and broadband.
Apple’s feud with the Federal Bureau of Investigation (FBI) may be over, but according to the agency’s director James Comey, there will be more battles to come over the subject of mobile device encryption. Speaking during a briefing held just this week, the FBI chief shares his insights on the topic, and has stated that he fully expects other legal actions from the United States government in the future in order to gain access to smartphones and tablet devices that are encrypted.
For some time now, Google has always made Nexus and Pixel C factory images available for those users can just can not wait to get the latest updated versions of the tech giant’s Android mobile operating system (also, for those who are looking to acquire means for an alternative restore). But it bears noting that when it comes to Nexus and Pixel C factory images, they are complete system images, which means that when getting them, the user will usually have to wipe his Android device.
A team of mathematicians from the University of Michigan have made full use of a mobile app in order to collect information regarding sleep patterns of various mobile users across the globe. Through the app (Entrain, which is designed to minimize jetlag), the researchers looked into how age, gender, amount of light, and native homeland affect how much sleep people are getting around the world, as well as what time time they go to sleep and get out of bed.
Regulating bodies in the United States now want to gather more information about how phone makers and wireless carriers go about dealing with security issues in mobile devices. At the same time, the feds want to know why fixes for bugs and vulnerabilities take too darned long be deployed. Indeed, both the Federal Communications Commission (FCC) and the Federal Trade Commission (FTC) have sent letters of inquiries to more than a dozen firms, collecting data about how mobile manufacturers and network operators handle security updates.