There are hundreds of fitness apps available for iOS and Android and, I suspect, like fitness equipment, many people buy them with the best of intentions, but then never use them. I’m a prime example. Although I use running apps like Zombies, Run! and Runtastic on a regular basis, most of the workout apps I own see far less action (the one exception being Runtastic PushUps which I use daily).
However, Six to Start -- the creator of story-driven apps like Zombies, Run! and The Walk -- has come up with a workout app that people will actually want to use. Superhero Workout uses camera-based motion tracking to record the reps as you exercise, and marries it with a thrilling sci-fi story. Punches become plasma blasts, abdominal crunches charge your AEGIS One battlesuit’s reactor, and you can brace yourself from incoming debris with a wall sit...
The Ice Bucket Challenge has taken off on social media in the past week or so. The campaign is designed to fuel awareness of ALS, or Lou Gehrig's disease -- a problem that has famously, and sadly, afflicted Stephen Hawking, though many others are just as unfortunate. It's certainly a worthwhile cause, and something everyone should be aware of and fund, if they can spare a few dollars.
But what if a major company attempted to hijack the pledge drive for the benefit of its product? It's really hard to say if that is what Samsung has done, but it certainly seems to be that way.
Most Commented Stories
Microsoft pulls download links to Windows 8.1 August Update, recommends users uninstall some updates
Cloud computing is one of the most important technologies in the world right now, but it can be extremely confusing at times.
What, for example, are SaaS, PaaS and IaaS? Read on as we take the jargon out of the cloud and explain things in a much more brain-friendly way.
When it comes to building a computer, there are many routes to take. Of course, if you are wealthy, you can throw money at your build and achieve something wonderful. However, for many of us average folks, money can sometimes be tight. If you are on a budget, you can aim for either cheap or inexpensive; there is a difference. You see, cheap components are of low quality, but inexpensive can mean high quality at a value.
For my last few major desktop builds, I have trusted G.SKILL exclusively. My brand loyalty is due to past performance; the manufacturer's memory has proven to be reliable and reasonably priced. Today, the company sets my heart aflutter, as it announces the Ripjaws 4 Series DDR4 Memory Kits.
For anyone looking to stay anonymous online, Tor seems like an obvious option. At the same time, it could lull users into a false sense of security -- after all, this is a network that was, at least in the past, funded by the military and US government -- and conspiracy theories abound that Tor is nothing more than a honey trap to catch the kind of people who have a need for anonymity because of their nefarious activities. The network has evolved over the years and now agencies such as the NSA in the US and GCHQ in the UK are actively seeking out vulnerabilities so they can crack the network. But the relationships are actually far more complex than that.
According to Andrew Lewman, chief of operations at Tor, the same agencies that are trying to break Tor are also posting tips anonymously about the vulnerabilities that have been found -- giving a chance for them to be patched. Talking to the BBC Lewman said:
John Haller’s PortableApps.com has announced the release of PortableApps.com Platform 12, a major update for the all-in-one app manager.
Right-clicking the Platform system tray icon now displays a cascading menu containing all your apps, links to system folders, Backup/ Restore/ Eject functions and more.
If you're an Android user you may already have been tempted to don your tin hat and descend to your bunker following today's earlier story about app hacking. Prepare to settle in for a long seige then as new research reveals that many of the most popular Android apps have SSL vulnerabilities that leave them open to man in the middle (MITM) attacks aimed at stealing personal information.
According to threat protection specialist FireEye a significant proportion of apps allow an attacker to intercept data exchanged between the Android device and a remote server.
Ninety-fifth in a series. Welcome to this week's episode of the best new apps and games for Microsoft's Windows 8.x operating system.
This week has been rather uneventful. Microsoft did release an update for its OneNote application that adds options to print notebooks and pages to the app among other things.
While the claims of Android malware may be a bit overblown, it does exist and has to be a consideration for customers. That fact has brought about an abundance of software designed to combat the perceived problem.
Now Sophos is jumping into the market with an updated version of its offering, but for the moment this latest version is in a testing phase. The company is calling on Android users to begin beta testing the new offering, and the security firm is adding an incentive in the form of prizes for people willing to step up.
The internet has become as ubiquitous as air. You’re connected at home via Wi-Fi, then you go out and stop by a cafe to grab a quick morning coffee and check your Facebook, then you come to the office, get all serious and send business mail to your colleagues. The internet gives us great freedom. But with that freedom comes great dangers and great responsibility -- you are responsible for protecting yourself on the web.
Every time you indulge into any sort of online activity, your data can be easily monitored and checked. The websites you visit receive your IP address, location, browser and operating system, screen resolution, ISP and more. You can check on what information you give away at stayinvisible.com. I have nothing against sharing this data when I do simple browsing. I am like Dutch windows without curtains -- doing nothing wrong, peep in whenever you want, I have nothing to hide.
Worldwide spending on information security is set to top $71.1 billion this year, up almost 8 percent over 2013, according to forecasts by Gartner. It's also forecast to grow by a similar percentage next year to reach $76.9 billion.
Gartner says increased use of mobile, cloud and social services will drive new security technology through 2016. There's been a democratization of security threats too, driven by the easy availability of malware and infrastructure, via the underground economy, that can be used to launch targeted attacks.
Yes, I know not everyone is a smartwatch fan. It is a device reserved for geeks, athletes and the curious souls who wish to know what it's about. Pebble was one of the first to market (Microsoft came early, but failed) and now it has one more app to get existing customers, and potential ones, excited.
With baseball season heading into the homestretch and football, basketball and hockey all looming, the company has landed ESPN for its wrist technology. You'll get scores and game updates right from the watch -- Sports Center always with you while you're out and about, not sitting on the sofa watching the game.
In late-July, Apple launched the public beta testing program for OS X 10.10 Yosemite, which it previewed at WWDC 2014. It was the first time the fruit logo company gave its non-developer Mac-toting users the ability to install a pre-release version of its long-lasting operating system. As an early adopter, I was eager to try it out as soon as possible. Sadly, the first public beta, as it was likely to happen, had its kinks.
But Apple has launched the second public beta of OS X 10.10 Yosemite (dubbed Beta 2), which brings with it a number of important changes over its predecessor, including some necessary bug fixes. Maybe the second time's the charm for those of us who ran into trouble with the first public beta.
PhotoWand is a free photo effects app for Windows 8. It’s not going to compete with the desktop equivalents any time soon, but there’s more than enough power here to make it genuinely useful.
There are simple and practical tools to improve your photos, for instance, including a crop function, blur and sharpen filters, and adjustments for hue, saturation, brightness and contrast.
The Lenovo Yoga 2 is not to be confused with the Yoga 2 Pro. Although the basic principle of a notebook with a screen that flips over to turn the device into tablet is the same, the specification is markedly different. Just for starters, this is an 11.6in device rather than 13.3in -- but what's inside is much more value-oriented as well.
Instead of a processor from Intel's Core range, our Yoga 2 sample came with a Pentium N3520. This is part of Intel's Silvermount microarchitecture generation, in particular the Bay Trail-M family, which means it's actually from the same line as the Atom processor, despite the Pentium brand name. The N3520 has a nominal frequency of 2.166GHz, but a single core can rise to 2.42GHz in Turbo mode.