Tag Archives: key

iPhone 12 range could be delayed and lack a key feature

As exciting as the upcoming iPhone 12 range sounds, two not-so-promising rumors about it have emerged, focused on a missing feature and a potential delay of weeks or more. First up, the feature. According to Ross Young (CEO of Display Supply Chain Consultants and a major leaker of screen-related smartphone …

Read More »

Exclusive: OnePlus Nord chipset, 5G and 3 key focuses revealed

In early 2014 a package landed on my desk. Inside was a phone from a company I admittedly knew little about at the time, which came with the company’s bold claim to ‘Never Settle’, and a self-conferred ‘Flagship Killer’ tag. The OnePlus One had arrived. I was skeptical, but using …

Read More »

Open Source – the key to unlocking the networks of the future

Open source is proving itself to be invaluable in shaping large areas of science and technology. Most recently, we have seen how global cooperation among researchers, technologists, scientists and doctors has led to thousands of open source tools and projects emerging designed to model the COVID-19 pandemic and mitigate the …

Read More »

Why human contact is still key in customer service

Picture the scene. You’ve been on hold for 15 minutes, you finally get through to someone on the helpdesk to explain your query before they realize you’ve come through to the wrong department. After a few rounds of contact center tennis, you finally get your issue resolved by the right …

Read More »

Ubuntu 20.04 adds VPN and support for a key Windows 10 feature

Canonical has released the latest version of its Ubuntu Linux distribution which offers a number of exciting new features designed to improve performance and security. Ubuntu 20.04, aka Focal Fossa, is based on the Linux 5.4 kernel and this long-term-support (LTS) version is a major update for desktop, server and …

Read More »

New Azure exploit could let hackers create a ‘skeleton key’

The cybersecurity firm Varonis has discovered that an attacker can use a compromised on-premises IT environment to pivot and attack an organization’s Azure environment. Using a compromised PC as a stepping stone to move across a network to hack other targets is a tactic that cybercriminals frequently employ and security …

Read More »

LG Velvet design and key spec revealed in official video

In part 3 of LG’s teased-out reveal of its next flagship phone (see part 1 and part 2), a new video from the manufacturer shows the design of the LG Velvet in full. It also confirms it’ll be running the Snapdragon 765 processor from Qualcomm. The video – which is …

Read More »