In the wireless world, it’s back to the unlimited future

 In the wireless world, its back to the unlimited futureYears after three of the big four carriers ditched their unlimited data plans, all the major companies are offering plans that promise users they can access the mobile internet as much as they’d like. Well, kind of. If you read the fine print, you’ll find that there are some notable limitations to the new so-called unlimited plans.

Still, if you use a lot of a data, you could save money by signing up for one of them. And they make a lot of sense for families who have multiple members needing to get connected. Continue reading

App trains people not to reach for chocolate and alcohol

 App trains people not to reach for chocolate and alcoholA game which trains the brain to stop reaching for alcohol and unhealthy food such as cakes, cookies and chocolate, can lead to ‘pain free’ weight loss and cut energy intake by more than 200 calories a day.

Psychologists at the University of Exeter have found that less than ten minutes a day of ‘brain training’ using a game they have devised can slow impulses to reach for unhealthy snacks, and reduce calorie intake.

Using neuroscience and lab trials to devise a proven method of curbing unhealthy food intake, Professor Natalia Lawrence’s Food Trainer app is being launched in January, free to the public, in a month when people traditionally make resolutions to lose weight and cut down on junk food.

Continue reading

5 tech tips that pro travelers use

smartphone 731274 640 5 tech tips that pro travelers useLuggage? Check. Wallet? Yep. Tech? You bet.

Today’s travelers likely have some high-tech companions to help keep them organized, productive, entertained, and in touch with those who matter.

But to avoid any hiccups while on the road – whether it’s for a Spring Break vacation or quick business trip — the following is a look at a few considerations before you pack your gear-to-go. Continue reading

Gadgets that help keep your cats and dogs safe and well-fed

dog 186222 640 Gadgets that help keep your cats and dogs safe and well fedErik Hagen bought an interactive camera that dispenses treats to amuse his pets, but he is the one who has become addicted.

The self-employed Minnesotan has posted more than 300 photos of his five cats and one dog to a human social media network via his Petzi Treat Cam.

While not everyone will shell out $169 for a gadget that lets you take candid photos of your four-legged friends and say hello via high-quality audio, pet parents love to buy stuff for Fido and Fluffy.

Americans spent $62 billion on pet products and services in 2016, according to the American Pet Products Association.

Here are some new and noteworthy high-tech gadgets. Continue reading

How to remove ransomware: Use this battle plan to fight back

stature 935643 640 How to remove ransomware: Use this battle plan to fight backA combination of common sense, backup, proactive protection, and automated removal tools is a solid defense against the growing scourge of ransomware.

Ransomware doesn’t sneak into your PC like ordinary malware. It bursts in, points a gun at your data, and screams for cash—or else. And if you don’t learn to defend yourself, it could happen again and again.

Armed gangs of digital thieves roaming the information superhighway sounds like an overwrought action movie, but the numbers say it’s true: Ransomware attacks rose from 3.8 million in 2015 to 638 million in 2016, even as the number of malware attacks declined. Why steal data when you can simply demand cash?

For the first time ever, the RSA security conference in San Francisco held a comprehensive one-day seminar on ransomware, detailing who’s being attacked, how much they’re taking—and, more importantly, how to block, remove and even negotiate with the crooks holding your data hostage. Continue reading

Your Hot Hands Can Give Away Your Smartphone PIN

coffee 1867443 640 Your Hot Hands Can Give Away Your Smartphone PINThermal images reveal what parts of the screen were tapped, even after it’s left untouched for 30 seconds.

If you were protecting your smartphone passcode from someone lurking over your shoulder, or from unseen security cameras, you might cover the screen as you tap in the PIN’s four or six digits. But once you’ve unlocked the phone, perhaps you’d let down your guard, and leave the screen in full view—especially if it’s off.

That would be unwise, according to researchers at two German universities. A new study explains how someone armed with a thermal-imaging camera would have little trouble extracting your passcode from the heat signature left on your smartphone’s screen. It even works 30 seconds after you last touched it.

How does this work? A guy enters a PIN to unlock his phone, then turns off the screen and puts it down on a table. He gets up to grab a cup of coffee, as an attacker quietly strides in, points a small handheld thermal camera at the phone for a moment, and walks back out.

Continue reading

The Growing Niche for Telecom Consultants

network 1823429 640 The Growing Niche for Telecom ConsultantsWhy a Consultant? Facts, Myth Busters and the Cloud

The convergence of IT and telecom has changed the landscape of telecommunications. In fact, the term “telephony” may be dying a slow death. Today, we’re primarily talking about “communications”… “IP communications.” Taken further, in the current environment, voice is just another application running on your network. This network convergence—voice and data—has opened a whole Pandora’s Box of services and solutions that enhance workforce collaboration and productivity. Continue reading

A guide to all those weird words your teen uses

texting 1490691 640 A guide to all those weird words your teen usesI’m fairly hip, though my teenage daughter would beg to differ. Still, translating the latest “slanguage” in 2017 is no easy feat.

Teens these days drop so many “lits,” “fams,” and “wokes,” that you never know if they’re giving you a compliment or secretly planning to set your house on fire. It’s partly the natural evolution of language and part byproduct of text messaging and social media.

Continue reading