Latest

Jun
20
The first benchmarks of the new Apple M2 chip appeared in the network.

The first benchmarks of the new Apple M2 chip appeared in the network.

They were found in the Geekbench 5 synthetic test database. Tests show that the computational performance in the single-core Geekbench
1 min read
Jun
20
Spring microservices in action

Spring microservices in action

Authors: Carnell John, Sanchez Illari Wailupo Year: 2022 Number of Pages: 491 Spring makes creating and deploying microservices much easier!
1 min read
Jun
17
Microsoft has released the Defender cybersecurity app for Windows, macOS, iOS and Android.

Microsoft has released the Defender cybersecurity app for Windows, macOS, iOS and Android.

This is a cross-platform application that is designed for general users. It works as a simplified dashboard that connects to
1 min read
Jun
17
Bark biosensors transmit a Bluetooth signal without batteries or wires

Bark biosensors transmit a Bluetooth signal without batteries or wires

Engineers created a biosensor made of lignocellulose nanofibrils derived from tree bark. The self-powered prototype device sends data to a
1 min read
Jun
16
USB-C will become the standard for all smartphones from 2024

USB-C will become the standard for all smartphones from 2024

According to a new law announced yesterday by European Union officials, since 2024 all smartphone manufacturers will have to provide
Jun
16
Voicemode has released a beta version of its AI Voices tool that allows you to change your voice in real time.

Voicemode has released a beta version of its AI Voices tool that allows you to change your voice in real time.

The app is based on machine learning technology, and the voice collection already includes the voice of actor Morgan Freeman
Jun
15
Researchers at the Massachusetts Institute of Technology's Computer Science and Artificial Intelligence Laboratory (CSAIL) have outlined a PACMAN attack scenario that is possible thanks to a hardware vulnerability in Apple's M1 series processors

Researchers at the Massachusetts Institute of Technology's Computer Science and Artificial Intelligence Laboratory (CSAIL) have outlined a PACMAN attack scenario that is possible thanks to a hardware vulnerability in Apple's M1 series processors

Such an attack is performed using a combination of hardware and software and can be performed remotely. If successfully implemented,
1 min read
Jun
15
Microsoft has implemented a new feature designed to protect Windows-based computers from intruders.

Microsoft has implemented a new feature designed to protect Windows-based computers from intruders.

Microsoft Defender's built-in antivirus solution will now block all incoming and outgoing messages from a compromised Windows device. According to
Jun
14
Line spacing in Libreoffice

Line spacing in Libreoffice

LibreOffice Writer is a word processor included in the LibreOffice office suite. It is a fairly popular counterpart to another
Jun
14
Installing mc in Debian

Installing mc in Debian

Midnight Commander (another common name is mc) is one of the most famous file managers. It was first released in