Reviewing the Sony Xperia XA1 and Xperia XA1 Ultra
By Ted Kritsonis
Flying under the radar is Sony’s penchant these days, as it continues to try gaining traction with smartphone users, this time with the mid-range Xperia XA1 and Xperia XA1 Ultra.
By Ted Kritsonis
Flying under the radar is Sony’s penchant these days, as it continues to try gaining traction with smartphone users, this time with the mid-range Xperia XA1 and Xperia XA1 Ultra.
New iPhones and Google Pixel devices are expected in the coming months and with them improved software functionality. Here are some of the expected updates in iOS 11 and the Android O
While telcos and service providers have offered new options and plans, it isn’t as affordable, or as transparent as it needs to be (i.e. in the EU, you can travel across borders, use your home service without penalties).
By Ted Kritsonis
The Moto Z2 Play is one of the few smartphones that can be augmented by add-ons, or Mods, that click onto the back, physically enhancing a certain feature on the device itself. Is there enough in this device to get people connected to the wider ecosystem?
by Lee Rickwood
The idea that digital technology can increase a gallery-goer’s access to and engagement with art is a popular and powerful one, yet it’s still controversial and contested at the same time.
By Christine Persaud
According to Kaspersky Labs, 70% of tablet owners and 53% of mobile phone users have used a public Wi-Fi network. But they can be easily intercepted. You could go the extra mile to ensure safe usage by doing something like setting up a Virtual Private Network (VPN) to encrypt the traffic sent and received between your device and the VPN server. But not everyone has the tech-savvy to do such a thing.
by Lee Rickwood
A major disinformation and cyber-espionage campaign with “a strong Russian nexus” uses techniques that target consumer gadgets and digital devices, including iPhones.
By Christine Persaud
We’re all aware of the importance of loading antivirus software on our computers to help protect against malicious attacks and theft of our personal information, but what about our mobile devices?