To appeal to a wider audience, OnePlus has introduced two versions of its second-generation flagship, called OnePlus 2: a base model, which ships with 16 GB of internal storage and 3 GB of RAM, and a high-end variant, which is equipped with 64 GB of internal storage and 4 GB of RAM. However, with only a small difference in price between the two, there has only been one model worth considering -- the latter.
Few consumers have likely opted to purchase the cheaper OnePlus 2, because the company has just decided to drop it from the lineup. OnePlus now only sells the high-end model, but the good news for consumers on a budget and other prospective shoppers alike is that this version is now cheaper.
The Telecom Regulatory Authority of India (TRAI) has ruled in favor of net neutrality laws, effectively banning Facebook's beleaguered and controversial Free Basics program. In a win for net neutrality proponents, the telecom regulator ruled against "discriminatory tariffs for data services" saying that internet access should be provided on an equal basis.
Mark Zuckerberg's dream of connecting the entire world to the internet has met with controversy ever since it was first announced because of the way it only provides access to a limited number of websites from select Facebook partners.
Most Commented Stories
Today in Tech History
As a household name in the smartphone industry, Sony has a modest presence in US. It sells a small number of handsets in the country, and only a couple of those through major wireless carriers. What's more, its latest flagships arrive late, months after hitting other major markets.
Things are no different with Xperia Z5 and Xperia Z5 Compact. The two flagships, which were announced at CES 2015 and released shortly after, are only now making their way to US shores. There is no word of the more upscale Xperia Z5 Premium, however.
Remember the motto of the Clinton Presidential campaign back in 1992: "It’s the economy, stupid!" That election was about the economy and Clinton won as a result. Well Amazon.com this week let slip its plan to open 300-400 bookstores in U.S. cities, sending Wall Street analysts into a tizzy because bookstores look to them like a lousy business even for the world’s biggest bookseller. But this isn’t about selling books. This Amazon plan -- if it happens at all -- is about creating bases from which to fly delivery drones.
Delivery drones are to me a stupid idea except in certain rare circumstances like flying prescriptions to people living on remote islands. But Amazon is acting like it actually means it. And if it does mean it, then it’ll need a place from which to fly those drones.
Security problems are not new to Java, though it is, admittedly, not the only platform that suffers from these problems. Now Oracle has acknowledged a new hole and it is bad enough to issue an out of cycle emergency patch.
With the catchy name of CVE-2016-0603, the security flaw requires the user to access a malicious website and accept the download of Java version 6, 7 or 8 in order to become infected. However, for those who fall for it, the attack will allow for a total compromise of the system.
Many IT teams all over the world acknowledge the fact that a secure way to store and share files, both internally (within a company) and externally is extremely important. However, many IT teams also lack the proper tools to do so.
Those are the results of a latest survey by Ipswitch, after asking 555 IT professionals across the globe about their file sharing habits.
We're now counting down the hours to the kickoff of Super Bowl 50, which begins at 6:30PM EST when the Denver Broncos meet with the Carolina Panthers in Santa Clara, California. The fact that the big game is carried by network TV was a problem a few years ago for anyone who had cut the cord, but those days are changing and doing so quickly.
These days you have options that weren't available in those earlier times. In fact, it's not even just the game, but the halftime show and even the commercials, which sometimes become the real star of the game.
Julian Assange can't be allowed to hide behind the skirts of WikiLeaks to avoid answering rape allegations
Like Edward Snowden, Julian Assange is an incredibly divisive character. Just as Snowden is viewed by some as a hero for exposing the activities of the NSA, so Assange is viewed as a hero for exposing -- amongst other things -- the darker side of the US military through WikiLeaks. But both figures are also viewed as villains by those who believe that their whistleblowing has endangered national security.
While Snowden scampered off to Russia to avoid the US legal system, Assange took refuge in the Ecuadorian embassy in London. While it's certainly true that he's a man of interest for the US which ultimately seeks to prosecute him over the activities of WikiLeaks, Assange is actually holed up in the UK to escape extradition to Sweden where he faces questioning over allegations of rape. He has continually used the additional prospect of extradition to the US for WikiLeaks-related questioning as an excuse for not facing the music in Sweden. This is just about as wrong as it's possible to be.
Legalities aside, there is one problem with content made available through the likes of the Pirate Bay. Whether you use traditional torrents or magnet links, you'll (usually) need to wait for a download to complete before you can enjoy the movie, show, or album of your choice. But not anymore.
A new beta feature for the world-famous torrent site makes it possible to stream videos without the need to download them first. By integrating the Torrents-Time plugin, the Pirate Bay now includes a Stream It option for all video torrents.
Twitter went slightly nuts over the last couple of days. Suggestions that the chronological timeline was to be ditched in favor of one controlled by an algorithm gave birth to the #RIPTwitter hashtag. But the panic may have been for nought; Jack Dorsey wants to clear things up.
The Twitter founder took to the site to assure its users that a timeline change is not on the cards -- at least not next week. But what he says may not completely quell the fears of those who have been talking about the death of Twitter.
Day 5 morning, and I am close to returning the iPad Pro to T-Mobile. There are too many quirks that reaffirm my contention in this series' second post: Apple's big-ass tablet is a proof-of-concept device that's ready, or so I thought, for few users (digital content creators) but not the masses. Now I wonder if the thang is ready for anyone.
Setting up Apple Pencil should be as easy as pulling off the rear cap, inserting into Lightning port, and acknowledging Bluetooth connect request prompt. But there is no response from the tablet, after a half-dozen attempts, so I Google for solutions. No luck there, and I check Bluetooth settings, where the device doesn't appear. Disconnect my Harman Kardon speakers. No change. Turn off and on Bluetooth. Nope. Detach Pencil, try again. Success! Device shows up, pairs, then disconnects, and stays that way until I try again, and then it's "Groundhog Day" time. I'm Bill Murray reliving the same moment over and over without progress.
In something of a landmark ruling, the European Court of Human Rights says that websites cannot be held liable for comments left by readers. The ruling comes after a Hungarian website was sued over the content of messages left by readers.
The court said that if websites were held responsible for comments, it would constitute a breach of the right to free expression. Even in the case of 'offensive and vulgar' comments, providing nothing unlawful was written -- such as hate speech -- Hungarian news site Index.hu, and others, could not be held responsible for readers' comments.
One computer user has become so disillusioned with Windows 10's spying features that he has been driven to using Linux Mint as his primary operating system. But Voat user CheesusCrust was curious to find out just how pervasive Microsoft's privacy invasion is. The results of his investigation are quite staggering.
Using a router kitted out with DD-WRT, and a copy of Windows 10 Enterprise installed in a virtual machine on his Linux laptop, he started by disabling every single one of the tracking and telemetry features found in the operating system. Eight hours later, 4,000 connection attempts to 93 different IP addresses were logged, with most of these IPs addresses being linked to Microsoft.
You wouldn't expect a simple iOS update to completely kill your iPhone, but this is exactly what is happening. Users who took their handsets to a third party for repair and subsequently updated their software have run into error 53 and a bricked handset. Apple is not only aware of the problem, but says that it is intentional.
As we learned the other day, the problem seems to arise for people who have had their home key (specifically) fixed by a non-Apple-authorized repairer. Apple has now admitted that iOS detects the home key has been tinkered with, and says that Error 53 is a move to 'protect our customers' -- customers who will, presumably, think twice before upgrading to an iPhone 7.