Category

Latest

Category

The approach of a sports event the importance of the Football World Cup is an opportunity for many manufacturers to launch new products. For resellers, it’s about melting old model stocks. For the individual, it is an excuse to invest in a new TV and take advantage of advances in the field. Finally, for the hi-tech journalist, it is the opportune moment for a technical file on the criteria to be taken into account before…

While Samsung has been rather wise with its ranges of smartphones in recent years, he no longer hesitates to multiply, even to lose a little customers. The Korean manufacturer has just unveiled the Galaxy S Light Luxury, a simple Galaxy S8 whose data sheet has been lightened. Despite the release of the Galaxy S9 and Galaxy A8, Samsung obviously does not want to give up the Galaxy S8. The Korean smartphone manufacturer has announced the…

After AWS, Microsoft plans to support VMware’s virtualization technologies for on-premise apps on its Azure Cloud platform. Without the support of VMware. Starting Nov. 27, Microsoft will launch Azure Migrate. This free service will allow Azure users to migrate their on-premise VMware applications to the Redmond Cloud. An offer that responds to customer demand. “One of the things I hear a lot about is the desire to move existing on-premise VMware workloads to Azure,” said…

Developed by Google, Datally is an Android application to monitor the consumption of data of each application installed on a smartphone, and regulate this consumption on a case by case basis. After a beta test in the Philippines, this application can still be downloaded from the Play Store. Updated November 30, 2017: Datally is now available on the Play Store worldwide. The application is free. In usa, most operators now offer unlimited data plans,…

We all have three or four anxieties that ruin our lives. And among them we find the fear of ending up with the battery of his mobile completely discharged. This is not surprising. This is a problem that affects most smartphone users. To end the stress of the battery failure we reveal 5 tips to recharge your mobile phone without using a charger. Connect your mobile to your computer Reloading your phone outside your home…

Rummaging through a closet, you found your old Android smartphone. Rather than letting it get dusty, why not use it as a surveillance camera to secure your home? Especially since with a free application, it’s a breeze to turn an old mobile Wi-Fi webcam. We explain everything in the rest of this tutorial. A free Wi-Fi camera Wi-Fi surveillance cameras are experiencing its last years unprecedented growth. It is the ultimate connected object capable of…

Motorists know that in the event of a road accident it is very difficult to prove good faith. The vast majority of insurance companies refuse to give their guarantee for lack of material evidence or witnesses. To avoid such a situation, it is now possible to film the road with his smartphone. What is an on-board car camera? Very popular abroad and especially in Russia, the onboard car camera also known as Dashcam…

The Samsung Galaxy S9 would be equipped with a photo sensor offering a record aperture of f / 1.5, dethroning the LG V30 and its f / 1.6 aperture sensor. More importantly, the Galaxy S9 is the first smartphone to offer an adjustable aperture photo sensor! Until now, this feature was reserved for Reflex digital cameras (DSLR). Samsung is about to revolutionize the photophony. If we believe the latest rumors, the Samsung Galaxy S9 and…

At the same time desktop PC and autonomous mobile device, the Ockel Sirius A is a new kind of hybrid, compact and promising, which aligns very beautiful promises. Launched on the crowdfunding site Indiegogo, this mini PC under Windows 10 has already exceeded its fundraising goal. It must be said that the device is ingenious. Its case is small enough to fit in your hand and slip into a pocket. It measures only…

Denial of service, intrusion into the corporate system for hacking and data theft, today cyber attack techniques are numerous and increasingly sophisticated. To understand them is already to protect oneself. No company is safe from a cyberattack. Malware, APT, DoS, DDoS, ransomware … the processes are numerous and the objectives varied. Vincent Nguyen, Manager of CERT-Wavestone, categorizes cyberattacks into three levels: “The first is the diffuse attack, that is, mass aggression. In this process, the…