Mobile Apps vs Web Apps
Mobile Apps vs Web Apps - what's the difference? Mobile Applications and Web Applications can appear to be very similar, but the difference in fact, is fairly simple: Mobile Applications: A mobile application is created using native device code languages specific to the mobile device. For instance the Android platform requires that code is written in Java and C++ with some variations. The Apple iOS platform requires predominantly Objective C. Mobile applications require the code to be compiled. The application is then submitted (in the case of iOS) to the App Store or to Google Play (predominantly) for Android apps, for distribution. From there, a user logs onto the appropriate store for their platform and [...]
Technology Startups hit by Budget Cuts
Technology Startups hit by Budget Cuts Australia - the land of innovation, where string and baling wire turned dreams into rocket ships and we wallowed in the spirit of true blue innovation. Sadly, thats a dream of the past (and probably has been for a while as our brains get drained - attracted to other countries where the work is recognised and better paid). Another nail in the coffin has been added by the Coalition Government's decision to cut spending in the technology sector to save $845.6 million. This means that the current stream of talent exiting Australia for foreign [...]
Johnny Depp. Singularity. Transcendence.
Johnny Depp. There, I've said the name. Now the story. Johnny Depp's new movie 'Transcendence' has been savaged by critics : 'Sleepy-eyed Johnny Depp is an implausible genius in this unclever sci-fi movie about artificial intelligence' and 'Johnny Depp is less attractive here than Zoolander'. Personally I couldn't care less about Johnny Depp's facial hair - what interests me is the concept of artificial intelligence and the idea that the entire consciousness of a human being could be uploaded to a computer. A brain in a bottle. The concept is certainly not new and whether the Frankenstein factor exists or [...]
Facebook and Google buy high altitude drones
The news that both Google and Facebook have spent billions of dollars buying up technology companies is not new. Google has bought at least eight top robotics companies, spent masses of cash buying the artificial intelligence company Deepmind and acquired the high-altitude drone manufacturer Titan Aerospace. Facebook, on the other hand, has bought Instagram, the photo sharing network, WhatsApp, a messaging company, Oculus VR, a virtual reality company and Ascenta, the aptly named company that creates high-altitude solar-powered drones that can stay airborne for weeks. Conspiracy theorists might speculate that the drones are all about keeping tabs on you, but [...]
NSA denies knowledge of Heartbleed Security bug
NSA didn't know about the Heartbleed Security bug - or so they say. Everyone loves a good conspiracy story , so when Bloomberg reported that the NSA had been aware of the potential for exploitation for at least 2 years, the White House and US intelligence agencies replied on Friday that neither the National Security Agency nor any other part of the government were aware before this month of the "Heartbleed" bug. They wholeheartedly deny that the spy agency exploited the glitch in widely used web encryption technology to gather intelligence in order to obtain passwords and other basic information used [...]
Heartbleed Security Bug
Heartbleed Security Bug - Will you be affected? There's been a flurry of news on the web over the last few days about this because clearly some of the major news services needed some front-page pull. The vulnerability has been common knowledge for over a year, and the affected versions have been available for at least two years. Let's get a few things straight before you start running around like headless chooks changing your passwords, moving your Internet Service provider and generally making life difficult for yourself. What is Heartbleed? The Heartbleed Bug is a serious vulnerability in the popular [...]
Firefox – is the fire out?
Firefox - is the fire out? As a developer, I've always been a great fan of Firefox, for quite a few reasons, but here's a couple: It wasn't Internet Explorer. It came from an open-source mindset and had thousands of great plugins. It was great to use as a de-bugging tool. But when the mobile revolution really took hold, it didn't seem to catch on as much for me. Chrome became my browser of choice on my Android devices, and Safari was already well entrenched on my iOS devices. The latest news that Brendan Eich has departed as CEO after [...]
Apple vs Samsung
Apple vs Samsung Apple and Samsung are beginning a new trial - accusing each other, once again, of ripping off designs and features. The last one was held in 2012 and resulted in the jury finding in Apple's favour, but reducing the amount of damages awarded. US$929 million is still a massive chunk of capital, but it pales against the current US$2 billion claim. This time round, it looks like Apple is claiming five patent infringements that cover Galaxy smartphones and tablets sold between 2010 and 2012. In juxtaposition, Samsung is claiming that Apple infringed two patents employed in iPhone [...]
Google Glass
Is the Google Glass half full or half empty? It turns out that the maker of Ray-Ban and Oakley sunglasses (Luxottica) is to work with Google on Google Glass eyewear. The Italian company will design, develop and distribute eyewear as part of strategic partnership with Google that might see everyone wearing Glass in dozens of different styles. In reality, Google Glass is a just a small stamp-sized screen attached to a pair of eyeglass frames. It can record video, access email, and retrieve information from the web by connecting wirelessly to a user's mobile phone. Some people have flagged the tech-savvy [...]
Devices at risk of hacking
Apple mobile devices could be at risk of hacking A major flaw in Apple software for mobile devices could possibly allow hackers to intercept email and other communications that are meant to be encrypted. If attackers have access to a mobile user's network, such as by sharing the same unsecured wireless service , they could see or alter exchanges between the user and protected sites . Governments with access to telecom carrier data could do the same. Apple did not say when or how it learned of the flaw in the way iOS handles sessions in what are known as [...]