
Search results for 'Technology' - Page: 8
| ITBrief - 29 May (ITBrief) DreamWorks Animation has deepened its partnership with Lenovo, naming it preferred provider to boost film production with advanced computing solutions. Read...Newslink ©2025 to ITBrief |  |
|  | | PC World - 29 May (PC World)Opera is resurrecting Opera Neon, a browser concept first introduced in 2017, and equipping it with the latest tech trend: agentic AI—an assistant you can assign tasks to, which it will carry out autonomously.
Opera Neon will work like a normal browser. Opera, however, is integrating local AI that you can chat with privately and ask to do tasks and combining it with an interface to a remote server that will serve as a workspace of sorts for Opera Neon’s AI creation tools. Most browsers are free; the twist here is that Opera Neon will require a paid subscription of an unknown amount, and potential users will be subject to a waitlist.
Opera has a history of experimenting with innovative concepts—it was an early proponent of VPNs, for example. The original 2017 launch of Opera Neon reimagined the browser with visual icons instead of text bookmarks and vertical tabs that bubbled up with frequent use. It was too radical to catch on, though that was never really the goal. Ironically, its revival comes just days after The Browser Company of New York shelved its Arc browser—with similar vertical tabs—in favor of the new Dio agentic browser, now in alpha testing.
Opera believes that Opera Neon will be a “cloud computer” and that it will operate more effectively based upon what it knows about you and your preferences. Whether that ends up being true or not, there are three concepts that Opera is designing Neon around: a local chatbot, the agentic “browser operator” it showed recently, and the “cloud computer,” which sounds like a remote LLM that’s been tuned for coding. It’s likely that owning and operating this remote service is why you’ll have to pay for Opera Neon.
Opera Neon’s Chat Mode looks pretty conventional, with image creation and web page summaries.Opera
The ability to chat with a browser isn’t really new, as everything from Microsoft Edge (and soon, Google Chrome) to Brave has integrated AI into the browser for tasks like summarizing web pages. Opera does say that it will be able to analyze the web page via the DOM tree and layout data, rather than “reading” the web page via OCR, like Microsoft’s Copilot Vision does. All of the information Opera Neon’s chatbot sees will remain on your PC, Opera says.
It’s the agentic technology that will make or break Opera Neon. Opera’s earlier demonstration of shopping agents was effective in concept, but how quickly a human user will accept its decisions and learn to trust it is unknown and that’s assuming it works. Opera Neon’s ability to “make” things via its hosted cloud computer is another unknown as well.
Opera Neon’s agentic browser can perform independent tasks, like organizing a weekend away and finding tickets.Opera
“Once the tasks have been defined, it employs AI agents contained in a virtual machine on our European-hosted servers to make your idea into a tangible (digital) result,” Opera says of this cloud computer: “Think of it as an orchestra conductor that understands the whole piece of music – your needs and wishes – and points to the different members of the orchestra to execute their parts – task division and execution.”
Opera Neon will “happily install Python libraries and JavaScript frameworks to get there” and self-correct in case of errors.
Opera Neon’s Make mode, or its “cloud computer,” will be where AI will be pushed the hardest.Opera
That all sounds good, but as so many people are willing to point out, AI companies not only haven’t always delivered on their promises, they’ve made some ugly mistakes. Even if you are willing to accept that risk, you must also have a need for the capabilities that Opera Neon offers. Will you be willing to pay whatever Opera is charging so that you can create your own versions of, say, Battleship, with anime characters? Or code an app to help pick out gifts for your nephew’s birthday well in advance?
As with so many things, we’ll have to wait and see. Read...Newslink ©2025 to PC World |  |
|  | | BBCWorld - 28 May (BBCWorld)The supermarket`s latest use of technology to crack down on shoplifting has led to both jokes and complaints. Read...Newslink ©2025 to BBCWorld |  |
|  | | PC World - 28 May (PC World)Dolby Atmos in your living room isn’t as easy as it sounds. Whether you’re dealing with a component A/V system or a soundbar, your speakers must be carefully positioned and calibrated to create that immersive envelope of Atmos sound—and if your furniture is in the way, you’ll just have to move it.
But with its new FlexConnect technology, Dolby is looking to make its Atmos audio technology more home decor-friendly, and it’s teaming up with TCL for the hardware.
Slated to arrive this summer, the TCL Z100 is a smart and “panoramic” wireless speaker that can pair with a Dolby Atmos FlexConnect-enabled QD-Mini LED TVs—specifically, the TCL QM8K, QM7K, or QM6k.
Unlike the speakers used in other Dolby Atmos systems, TCL’s cylindrical Z100 speaker can be placed anywhere in the room, while Dolby’s FlexConnect technology will “intelligently optimize” the sound depending on the position of the speaker, TLC says.
You can use anywhere from one to four of the Z100 speakers with a single TV, and the system can scale itself up as you add more speakers to your living room setup.
Dolby originally unveiled FlexConnect back in 2023, but while it announced TCL as a partner and gave some ears-on demonstrations at IFA 2023 in Berlin, this marks the first time that consumer-ready FlexConnect speakers have been ready to ship.
We’re still waiting on more specifics about the TLC Z100 speaker, namely how much it will cost. It’s also not clear what the intial setup process will entail, although has previously promised that it will be “simple and fast.”
What we do know is that Dolby Atmos FlexConnect won’t work with existing home speakers, nor will a FlexConnect speaker work with any old TV or A/V receiver. In other words, TCL’s Z100 speaker won’t do you much good unless you have a TCL FlexConnect-enabled TV to pair it with.
This news story is part of TechHive’s in-depth coverage of the best smart speakers.
Then there’s the question of performance: How do Dolby’s FlexConnect speakers actually sound? I don’t think anyone expects Dolby’s FlexConnect tech to compete with, say, a precisely positioned and calibrated 7.2.2 system with ceiling-mounted Atmos height speakers.
But for average users who want enveloping Atmos audio in their living rooms without drilling holes in the ceiling or completely redoing their living room decor, Dolby Atmos FlexConnect may wind up being an affordable and effective solution. Personally, I’m eager for an in-person demo. Read...Newslink ©2025 to PC World |  |
|  | | PC World - 28 May (PC World)Gabe Newell, co-founder and CEO of Valve, has been working on a new brain-computer interface project through his Starfish Neuroscience company for several years. The company just announced that it plans to launch its first brain chip by the end of 2025, reports The Verge.
This chip isn’t a complete implant solution, but a specially designed “electrophysiological” component that can both read and stimulate brain activity. Unlike competitors, such as Elon Musk’s Neuralink, Starfish aims to create a less invasive solution that doesn’t require a battery and can reach multiple brain regions at once using wireless energy transfer.
Starfish is also developing technology to treat neurological disorders such as depression and bipolar disorder, as well as a method to destroy tumors using targeted heat. The company is now seeking partners to further develop and integrate these technologies. It’s unclear whether Starfish’s technology will be used in the gaming industry. Read...Newslink ©2025 to PC World |  |
|  | | PC World - 27 May (PC World)I don’t know how your tech drawers look, but mine are filled with wires I’ll likely never use again because technology has advanced quite a bit. Thankfully, USB-C seems to be here to stay since there is no wrong way to plug these things in. It’s not just smartphones, tablets, and laptops that use these, however, but also a long list of gadgets.
We’ve scoured the market for hidden gems: gadgets that will make you think “Wow, I didn’t know I needed that, but it will make my life so much easier!” So, let’s dive in and see what cool devices you’ll be able to use your type-C cables and ports with.
Wowstick 1F+ mini electric screwdriver
Wowstick
If you often have to fiddle around with your computer or other gadgets, this Wowstick mini electric screwdriver may be just what you need. This pen-shaped screwdriver features three LED lights so it’s easier to see what you’re working on and rotates 200 times per minute so you can finish the job faster. The screwdriver has a stylish base so you can hold it on your desk, and a whole collection of 56 aluminum alloy bits. The screwdriver can be charged via USB-C and it can last for hours. This super fun electric screwdriver usually goes for $41.
Anker Nano Power Bank
Anker
One thing you need to have in you bag/pocket/backpack is a power bank because you never really know when your phone will fail you and cry for a recharge. Well, the Anker Nano power bank is tiny enough to fit just about anywhere. It comes with a foldable USB-C connector and a port on the side so you can charge two devices at once if you need to. The 5,000mAh capacity is just about enough for a full phone recharge, so it will be great in a pinch. It’s also only $30, but we’ve seen it as low as $16.
Endoscope camera with light
Ennovor
Although it’s not something you’ll use every day, this Ennover endoscope camera can definitely come in handy. You just plug it in your phone, install and app, and see everything your camera does. Our team swears by it, using it for finding whatever they dropped behind the desk, while working on the car, or looking for pipe leaks. Since it has an IP67 rating, you can even plop it in your aquarium. The camera comes with a 16.4ft semi-rigid cable and several accessories, including a hook, magnet, and a mirror. You can get this one for $23 right now.
Blukar flashlight
Blukar
I don’t care who you are—you need a flashlight. The smaller, the better, because you get to shove it into any pocket. This model from Blukar comes with a built-in 1800mAh battery that you’ll recharge with one of those many type-C cables you have in that tech drawer we were talking about. It can work for up to 16 hours on a single charge, which is pretty decent. There are four different lightning modes to cycle through, including one that will help you signal for help. Plus, one of these is only $10, so no excuse to pass on this one.
Heat It insect bite healer
Anyone plagued by mosquitoes in the summer will be particularly pleased with this ingenious gadget. This tiny device, which can be easily connected to your smartphone via USB-C, can significantly reduce the itching of bites and stings with targeted heat.
You simply charge the small Heat It bite healer via the app and then hold it on the bite. The heat then does the rest, breaking down the proteins in the mosquito bite that cause the area to swell, itch, and hurt. A true must-have for summer, and it costs only $20.
A tiny air pump
Also perfect for summer is this small air pump from Cycplus, which fits in any bag while on the go. Not only can it inflate a bicycle tire in two minutes at the touch of a button, but it’s also USB-charged. According to the manufacturer, it’s suitable for mountain bikes, road bikes, motorcycles, and even cars!
In addition to being an air pump, this practical gadget can also be used as a flashlight or power bank for on-the-go use — all things that come in very handy on a bike ride. And at just $57, it’s highly recommended if you need quick help with a flat tire.
Samsung flash drive
Samsung
The vast majority of flash drives have a USB-A connector, but this one from Samsung has a Type-C connector. With transfer speeds of up to 400MB/s, you’ll move files around in no time. The beauty of this thumb drive is that you can even pop it in your smartphone to record 4K vids directly on it. The Samsung Type-C flash drive comes in multiple storage options, starting at 64GB and up to 512GB and they start at $14. The 256GB version, for instance, is $27 at the time of writing.
Editor’s note: This article was originally published on May 16, but was updated to include two additional devices. Read...Newslink ©2025 to PC World |  |
|  | | PC World - 27 May (PC World)The internet might be more sanitized than it was in decades past, but it’s still plenty dangerous. You’ve been warned that the web is a security minefield—that it’s easy to get in trouble. You can do everything right and still be taken by a malware infection, a phishing scam, or an invasion of online privacy. We want to help.
Here are some of the most dangerous threats on the internet and what you can do to stay out of harm’s way. Not all web dangers are created equal, though. Indeed, some threats will actively come looking for you while others you may never see if you don’t seek them out. Let our threat level indicator be your guide:
Foundry
Threat 1: Misinformation
Where it happens: Social media
Foundry
You know this one already, but we’re all as susceptible as ever. As social media algorithms continue to curate content, create bubbles, and spur echo chambers, they’ve become better at pushing misinformation in stories and images that seem like they could be true—and that’s often all it takes. Once you’ve clicked through, you’ll be susceptible to further misinformation that reinforces the faux story that caught your interest, and it’ll tell the algorithms to keep pushing more of that kind of content that interests you, sending you down the wrong path.
How to stay safe: While cutting out social media altogether is the best answer, it just isn’t practical for most of us. You can protect yourself against social media misinformation by actively analyzing all stories, images, and links you come across. If it seems designed to provoke an emotional response in you, pause and reconsider. Double-check all stories with trusted third-party sources. And lastly, think about leaving certain social media sites that are inundated with misinformation and move towards ones that are better moderated and more open.
Threat 2: Deepfakes and AI scams
Where it happens: Just about everywhere
Foundry
This one’s tricky because you’re just as likely to find deepfakes and AI scams in your email inbox as you will on social media, on YouTube, and ads all across the internet. The dangers are equally varied. A deepfake (which is a video or audio that’s been digitally altered to appear as someone else) can damage someone’s reputation, lead you to believe misinformation, or incite you to feel negatively towards certain groups, countries, or organizations. Meanwhile, AI scams can catch you off guard and hack your data or steal your personal information.
How to stay safe: Deepfakes and AI scams are by nature hard to spot, which is why you need to develop a healthy skepticism towards everything on the internet. Remember that disinformation campaigns, hackers, and bad actors are all trying to prey on you in some way. Always question any video or audio that seems alarming or sensational.
Threat 3: Lookalike URLs
Where it happens: Your browser’s address bar
Foundry
With phishing scams on the rise, you’re likely to encounter lookalike URLs in fraudulent emails, but you’re also likely to run into this if you often type URLs directly into your browser’s address bar. If you mis-type a popular website—for example, goggle.com instead of google.com—you could end up on a fake site that imitates the one you meant to visit. It doesn’t happen all the time, but when it does, it’s because the fake site’s owner wants you to input your login credentials so they can steal them.
Similarly, you may run into scam links on the web that replace certain mundane characters with lookalike letters, such as from the cyrillic alphabet. When you’re in a rush, you may not easily spot the difference between realsite.com and r?alsite.com.
How to stay safe: Double-check every URL you type into a browser, and double-check every link you click on by hovering your mouse over it and looking at the URL preview at the bottom of the browser. When in doubt, it’s safer to type in a URL than it is to click on a link.
Threat 4: QR code scams
Where it happens: The real world
Foundry
QR code scams are particularly nefarious because they can follow you into the real world. They’re commonly found on parking meters, restaurant menus, bulletin boards, or outdoor venues that offer Wi-Fi access. Scammers and criminals stick their own fake QR codes on top of the original ones—often with a literal sticker—and it sends you to an imposter site that steals your logins, details, and/or financial information.
How to stay safe: Before scanning any QR code, double-check that it’s from a legitimate organization. When scanning QR codes in public, make sure it isn’t a sticker. Also, remember that QR code scams simply take you to fraudulent sites, so double-check that you’ve arrived on a legitimate page that doesn’t have any red flags. If it seems off, close the tab.
Threat 5: Malvertising
Where it happens: Streaming sites
Foundry
Who hasn’t visited ad-infested streaming sites to watch TVs shows without suffering Netflix’s or Disney’s increasingly expensive paywalls? Doubly so for live sports! If you’ve ever pirated a soccer stream or boxing pay-per-view, then you know the kinds of sketchy sites I’m talking about. The risk here is that these sites are funded via ads, but most ad sellers don’t want to be associated with such illegal activity—so these streaming sites have to be less scrupulous with which ads they accept, and that means their ads can contain malware. This is known as “malvertising.”
How to stay safe: Not only should you never give these sites your personal or financial information, you should never click on any of their ads. Also, make sure your antivirus software is up-to-date and working properly before visiting such sites. (You are using antivirus, right?) Consider using a VPN, too. These sites are illegal, after all.
Threat 6: Dangerous ideologies
Where it happens: Discord, Telegram, WhatsApp, other modern communication apps with weak moderation
Foundry
Modern communication apps are great for staying in touch with friends and family, but they’re also hotbeds of nefarious activity. Terrorists, white supremacist groups, illegal pornographers, and militant groups have all been known to use such apps for organizing, recruiting, and spreading dangerous ideologies and unlawful material. Some groups use these apps to operate slowburn pipelines of propaganda, disinformation, and indoctrination to radicalize susceptible people.
How to stay safe: “Just say no” is useless advice most of the time, but it’s entirely apt here. You just need to avoid such groups and communities. In fact, when you see them, consider reporting them. If you’re part of an online community that has devolved into espousing dangerous, derogatory, or distasteful ideas that make you uncomfortable, steer clear and leave. Delete. Block. Report. Move on.
Threat 7: Crypto scams
Where it happens: Social media, user comments
Foundry
Cryptocurrency and blockchain technology have some legitimate uses and could still impact the future of financial institutions, but we’re still in the get-rich-quick, anything-goes era—and that means scammers love using crypto to part those who don’t know any better from their money. Such scams include fake celebrity accounts that promise a big return on your investment of just a few fractions of Bitcoin, and crypto wallet transfer services that try to steal your private key and/or recovery phrase.
How to stay safe: Not your keys, not your coins. If you own cryptocurrencies, keep your keys private and never share them with anyone. Get your crypto off of exchanges and into cold wallets where you are the only master of your coins. You probably aren’t going to be one of those who get rich quick, so play it safe, invest only what you can afford to lose, never panic, and keep your FOMO in check.
Threat 8: Fake app stores
Where it happens: APK download sites
Foundry
Every so often, Google might ban a game you really want to play or an app that you depended on. When this happens, you can usually sideload those apps and games via APK download sites—but if you aren’t careful, you could fall victim to fake apps that are loaded with malware. It may seem fine and proper when you launch it, but in the background it could be stealing your passwords, credit card info, etc. The locked-down nature of the Google Play Store and Apple App Store can be annoying, but part of it is done for your protection. Going outside puts you at risk.
How to stay safe: For best results, avoid sideloading apps that aren’t available through official app stores. But if you simply must download an app that isn’t available, make sure you 100% trust the creator of the app and make sure you only download the app with their official links. Meanwhile, install anti-malware on your device for an extra layer of protection, and consider backing up your device just in case you catch ransomware that blocks you from accessing your data.
Threat 9: Man-in-the-middle attacks
Where it happens: Public Wi-Fi
Foundry
Public Wi-Fi is super convenient, but remember: if you have free access to a public Wi-Fi network, then so do scammers and hackers. Some hackers are able to eavesdrop on public Wi-Fi and tap into your online activity. Scammers can set up imitation Wi-Fi access points that seem like they belong to that cafe you’re in, except it’s a fake. Lastly, even without any scammers or hackers involved, do you trust whoever is providing you with free Wi-Fi? Perhaps they’re the ones spying on you and stealing your personal data as it flows through the network.
How to stay safe: Always use a reputable VPN before connecting to public Wi-Fi. The VPN will encrypt your online activity and hide what you’re doing so it’s useless to anyone eavesdropping. But as a rule of thumb when using public Wi-Fi, don’t log in to online accounts and don’t type your banking details or any other sensitive information that you wouldn’t want to share publicly. Assume everything you do on public Wi-Fi is being monitored, as it may well be.
Threat 10: Search engine poisoning
Where it happens: Search engines
Foundry
Search engine optimization has ruined search engines—in more ways than one. The first page of Google’s search results is often filled with not-so-high-quality content, but I’m talking about something else: the fact that scammers and hackers can also poison the search results by pushing their malicious websites to the top of the list, either via manipulative SEO techniques or paid ad positions. You might think you’re clicking on a link to a well-known and reputable brand, but it could be an imposter site that tries to steal your sensitive data or infect you with malware.
How to stay safe: It’s near impossible to avoid search engines altogether, so it behooves you to pay extra attention before clicking on links in the search results. Avoid clicking on the paid ad links, and always double-check the URL before clicking on an organic link. If it looks off, don’t click it. Lastly, make sure you’re protected by antivirus software.
Threat 11: Scam and malware emails
Where it happens: Your inbox
Foundry
The “Nigerian prince” scam email has been the butt of jokes for decades now, but the rise of generative AI has made these scams way more effective and overwhelming to deal with. Scam and malware-infested emails are trickier than ever as they now incorporate personal details to surgically target individuals. This can make them much harder to spot and easier to trust, lulling you into their carefully laid traps.
How to stay safe: There’s no good replacement for email just yet, so we all need to keep using it for now. But you can be more careful by never clicking links in emails and never opening unsolicited attachments. If you didn’t request it, don’t bother with it. And as with other scams, be wary of any email that sounds alarming, urgent, or scary, especially if it seems to want you to act fast within a time limit.
Threat 12: Physical attacks in person
Where it happens: eBay, Craigslist, Facebook Marketplace, Vinted, Mercari, any used marketplace with local pickup options
Foundry
As the cost of living crisis chomps down on victims across the world, second-hand marketplaces have boomed in popularity. They’re great for scoring deals and for limiting your environmental impact as a consumer. But they have their risks. You can be scammed, of course, but you can also be attacked if you pick up your purchases in person. Just a few months ago, a woman in Pennsylvania was robbed while test driving a used car she planned to buy.
How to stay safe: This problem isn’t common enough to avoid second-hand marketplaces altogether, and you don’t have to avoid local pickups either. But always meet in a well-lit, public space. Ideally, take a friend with you to the meet; if you have to go alone, always let someone know where you’ll be, who you’re meeting, and when you’ll be home. And if possible, skip the cash and pay for your purchase digitally—after inspecting the product’s condition, of course.
Threat 13: Lies and hallucinations
Where it happens: AI chatbots, search engines
Foundry
The rapid growth of AI is both exciting yet terrifying. One of the scariest aspects of modern AI chatbots and assistants is how easily they make things up and confidently present them as fact. At best, you ask a simple question and get the wrong answer; at worst, you get a complex answer that sounds right but is full of falsehoods and non-existent entities. The danger is when you don’t know enough yourself to fact check the AI’s response. These “hallucinations” appear in everything from ChatGPT to Copilot to Google’s AI Overviews and more—and as more sketchy websites use AI to create their content, the entire web is barreling towards a future where it becomes one giant hallucination.
How to stay safe: Never take AI entirely at its word. Ask for citations. Use other non-AI sources to double-check its statements. If you really want to be safe, avoid using AI for anything that hinges on factual accuracy and only use AI for fun or creative tasks. Once you start assuming that everything AI tells you is suspect, you’ll be ahead of curve.
Threat 14: Criminal content
Where it happens: Onion sites, porn sites
Foundry
The cleartext (i.e., non-encrypted) internet that we all use every day is much cleaner than it once was, but illegal content is still always one click away. Some unsafe porn sites have illegal content hiding in their video libraries, and it gets even worse once you start dabbling with the Tor Browser and “onion sites” (i.e., the dark web). On the dark web, you can encounter all kinds of dubious, dangerous, and detestable things—hitmen for hire, illicit drug sales, outlawed pornography, other stuff that will scar your mind and can never be unseen. The kind of stuff that you can actually be arrested and charged with real crimes for.
How to stay safe: Using the Tor Browser to hide your identity online is a good start, as is using a VPN to further obfuscate your online activity. But your best bet is to steer clear of the dark web altogether. A strong antivirus might help protect you against malware, but it won’t do anything for the illegal content you might come across. If you must use the dark web, be extremely careful. But seriously, don’t.
Threat 15: Copyright infringement
Where it happens: Torrent sites, illegal download sites
Foundry
Any time you download something illegally, you put yourself at risk. If you aren’t careful, you can be caught by law enforcement and copyright holders. That popular torrent might seem innocent enough, but it could be a honeypot set up to trap unsuspecting downloaders. On top of that, ISPs like Comcast and Verizon monitor internet activity and can easily tell when you’re pirating digital content. All that to say, you could get slapped with a copyright infringement notice—and if that happens, you could lose your internet access and/or face legal consequences.
How to stay safe: Always use a reputable VPN to mask your identity when you download torrents and visit illegal download sites. A VPN covers up your tracks, so to speak, by preventing ISPs from spying on your traffic and making your internet activity impossible to trace back to you. But again, you need a reputable VPN that doesn’t store your internet activity. Look for one with a no-logs policy. Read...Newslink ©2025 to PC World |  |
|  | | ITBrief - 27 May (ITBrief) Airspeeder`s electric flying car races over South Australia`s salt flats could spark a revolution in urban transport and eVTOL technology development. Read...Newslink ©2025 to ITBrief |  |
|  | | ITBrief - 26 May (ITBrief) Seagate boosts its share buyback to USD $5 billion, unveiling new 2028 financial goals and plans to lead storage innovation with HAMR technology. Read...Newslink ©2025 to ITBrief |  |
|  | | RadioNZ - 24 May (RadioNZ) `There`s a lot of different aspects of technology, and there`s a lot of creative technology as well. And for us, Maori and Pasifika, our brain leads more to the creative side,` Muliagatele Danny `Brotha D` Leaoasavai`i. Read...Newslink ©2025 to RadioNZ |  |
|  |  |
|
 |
 | Top Stories |

RUGBY
Levi Aumua is departing the Crusaders after two Super Rugby seasons More...
|

BUSINESS
China's EV newcomer Xiaomi sells nearly 300,000 SUVs in an hour More...
|

|

 | Today's News |

 | News Search |
|
 |