Tag: iphone 5
Ask a question
12 weeks ago
Has anyone else experienced problems with the fingerprint reader on the iPhone 5? After it learned my fingerprint, it worked great…..for a while. Now, it...
3 Answers |
17 weeks ago
I can't resist the siren's call of a new iPhone, but the money thing is a bit of an issue. What is the best way to sell the "old"...
5 Answers |
23 weeks ago
How much of an improvement will users see from Apple’s use of a 64-bit processor in the new iPhone 5S?
Will the average user be able to see a significant difference between devices with the new 64-bit processor and the older 32-bit...
2 Answers |
Updated Apple whitepaper reveals interlocking, defense-in-depth architecture for iPhone, iPad OS.
Forget illicit torrents tossed up by anonymous Russian bloggers: On Thursday, a build of the incoming Windows 8.1 update was leaked by Microsoft itself.
CIOs who haven't moved their companies from Windows XP by now ought to be fired, some people think, but those who haven't and are still on the job have options for saving their bacon.
Automation, virtualization, cloud computing -- these technology trends are transforming the data center and enabling companies to lower costs, increase flexibility and improve reliability. However, these shifts require IT, and their outsourcing providers, to rethink traditional strategies.
With smartphones and tablets increasingly at risk from malware, researchers from North Carolina State University have devised a new and potentially better way to detect it on Android devices.
Samsung hopes its new Milk streaming service is the next big thing in music.
Google and Verizon each made announcements this week that are significant in their race to catch the company many consider to still be the market leader in the IaaS public cloud: Amazon Web Services.
The CIA's decision to use Amazon's cloud is part of a broader IT shake-up to make the spy business more efficient.
The first Cebit trade show in the post-Snowden era will focus on security, showing off locally developed bug-proof phones and messaging systems, as well as the ability to protect mobile devices using smartcards.
A flaw similar to Apple's 'goto fail' bug leaves many Linux variants vulnerable to man-in-the-middle attacks.