Mobile

How to Write Your Own C++ Game Engine

http://preshing.com/20171218/how-to-write-your-own-cpp-game-engine/  The gaming platforms of 2017 – mobile, console and PC – are very powerful and, in many ways, quite similar to one another. Game engine development is not so much about struggling with weak and exotic hardware, as it was in the past. In my opinion, it’s more about struggling with complexity of your own

Permissionless data slurping: Why Google’s latest bombshell matters • The Register

https://www.theregister.co.uk/2017/11/22/permissionless_data_slurping_google/ Somebody else than just your mobile operator gets to know where you are: According to an old Chinese proverb: “When a wise man points at the Moon, an idiot looks at his finger.” Google may have been hoping that you were examining a finger, not reading a Quartz story yesterday, which reveals how Android phones send

Evolution of Mobile Communication from 1(G) to 4G, 5G, 6G, 7G …

http://vitorr.com/post-details.php?postid=2615 The cellular wireless Generation (G) generally refers to a change in the nature of the system, speed, technology and frequency. Each generation have some standards, capacities, techniques and new features which differentiate it from the previous one. Now 5G is hot technology at the top of the hype cycle. But that’s not the end

André Staltz – The Web began dying in 2014, here’s how

https://staltz.com/the-web-began-dying-in-2014-heres-how.html Here are some key points from this long article: Before the year 2014, there were many people using Google, Facebook, and Amazon. Today, there are still many people using services from those three tech giants (respectively, GOOG, FB, AMZN). However, the underlying dynamics of power on the Web have drastically changed. Internet activity itself

LiShield Can Block Smartphone Cameras for Privacy’s Sake – IEEE Spectrum

Phttps://spectrum.ieee.org/tech-talk/consumer-electronics/audiovideo/lishield-can-block-smartphone-cameras-for-privacys-sake Rules that prohibit photos or videos can prove almost impossible to enforce when nearly everyone carries a smartphone. But a new indoor privacy system has shown how the power of smart LED lighting could prevent people from taking illegal videos of a live events. LiShield has a capability to corrupt digital camera images and videos without

RIP Windows phones: New Windows 10 Mobile hardware and features ‘aren’t the focus’ | PCWorld

This is the end of era of Microsoft Windows smartphones that never really started!  https://www.pcworld.com/article/3231965/windows-phone-os/windows-10-mobile-phones-are-dead.html Windows phones are really, truly dead. This weekend, Microsoft’s VP of operating systems confirmed the writing on the wall. “Of course we’ll continue to support the platform [with] bug fixes, security updates, etc.,” Joe Belfiore wrote on Twitter.  Microsoft’s Joe Belfiore says

Here’s everything Google just announced

https://techcrunch.com/gallery/heres-everything-google-announced-today/ Google held a press conference yesterday in San Francisco, where the company announced everything from new phones to crazy machine learning-powered wearable cameras. It was a flurry of news. Techcrunch condensed it all the highlights down well into one quick slideshow.

iPhone 8 teardowns

iFixit Teardown Gives First Look at iPhone 8′s Guts. View IFixit iPhone 8 Teardown to  find out if Apple’s playing a game of mere numerical catch-up to Samsung’s Galaxy S8 line, or if glass backing and wireless charging warrants skipping ahead a grade. iFixit’s iPhone 8 teardown shows that you really don’t want to crack

Bluetooth Vulnerability Affects All Major OS

https://hackaday.com/2017/09/14/bluetooth-vulnerability-affects-all-major-os/ Turn off your Bluetooth! I checked that mine was turned off after reading this: Security researchers from Armis Labs recently published a whitepaper unveiling eight critical 0-day Bluetooth-related vulnerabilities, affecting Linux, Windows, Android and iOS operating systems. These vulnerabilities alone or combined can lead to privileged code execution on a target device. The only requirement is: