Apple’s new “Sign in with Apple” system is aiming to fix the privacy issue with other third-party login systems. Here’s how Sign in with Apple works and how it is different from the rest.
One of the biggest divisions in blockchain technology is permissioned vs. permissionless blockchains. Here are the differences between a permissoned and permissionless blockchain.
You may have heard the term IPv6 but don’t know what it means. IPv6 is important to the Internet, especially if you have a website. Learn what IPv6 is here.
Stablecoins are cryptocurrencies designed specifically to prevent big changes in their value. Are they safer than Bitcoins and other cryptocurrency? Let’s find out.
The newest kid on the block is the laser projector, which is different from the usual bulb projector. Learn the pros and cons of a laser projector before you make your purchase decision.
Fingerprint unlock is now a standard feature in smartphones, but what’s actually going on when you put your finger on the scanner? Here’s how fingerprint scanners work.
The concept behind brain-computer interfaces is fairly basic. Using the neurons and electrical signals in the brain, we can control things with our thoughts.
The Amazon Echo is only able to record voice commands after the wake word. Learn how Alexa recognizes the wake word amid the background noises in your home.
How QR codes work is by conveying information through a graphical code of black and white pixels. It can also be decoded even if parts of the code are unreadable.
NFC and Bluetooth both provide reliable communication between devices over short ranges. That is the only similarity. Beyond that, they are very different.
If you’ve used Apple Pay before, you already have a good idea of how the Apple Credit Card works, since it’s just a card optimized for use with iPhones.
USB Power Delivery is designed to be a single charging standard that provides a safe and efficient way to push the limits of voltage and current to devices.
A VPN is currently the best way to protect your device from hacking, DNS/IP address leaks and ISP surveillance. Learn what a VPN is and how it can protect you.
Modern video compression algorithms aren’t the same as the image compression algorithms you might be familiar with. Here’s how video compression works.
You’ve probably noticed that many flagship phones nowadays come with a time-of-flight camera. But what is a time-of-flight camera, and how does it work?
While the inner mechanisms of cryptocurrency are complex, buying and using it is actually very easy. Here is how you can buy bitcoin and start using it.
Serverless computing is a new trend that allows developers to host their apps and websites without having to run or maintain a server. Find out how it works here.
Different codecs, like Dobly Atmos and DTS:X, have different surround-sound capabilities and support different types of hardware used in higher-end home theater systems.
The accelerometer is the component in your phone that detects if you are holding it upright or sideways. Find out how an accelerometer works in a smartphone.
You may have come across the term “ping,” but what is a “ping” really? What does it mean in the computing world, and why does it have such an odd name?
From analog to digital, there are quite a few audio formats that are still in use today. Should you use Digital (S/PDIF), HDMI or just plain analog? Let’s check it out.
Technology products are designed to have a short lifespan, whether you like it or not. There is some rationale behind them, though a little outrage over planned obsolescence is certainly justified.
The news is packed with reports of huge data breaches, and they never seem to cease. This is a quick look at how data breaches work and why it is impossible to eradicate them.
Robotic process automation and artificial intelligence are starting to take over ever-increasing levels of knowledge work. Check out their differences and how they affect you.
Did you recently access the Internet on a commercial flight and wonder how you are able to connect to the Web at such a high altitude? Here’s how airplane Wi-Fi works.
Ethical hackers are people who hack for a good cause. These people use their hacking skills to uncover security flaws of a website/app. Find out how ethical hacking works.
What happens if viruses change their “signatures” to avoid detection by antiviruses software? This is what polymorphic and metamorphic malware are about.
While bone conduction technology’s been around for a while, headphones based on it are starting to take off. Learn what bone conduction tech is and where it’s being used.
Predictive analytics analyzes data to figure out what might happen in the future. How does predictive analytics really work, and how reliable are its forecasts?
We know that Google and Amazon have algorithms that give us updates, search results, and product recommendations, but what does that actually mean? What qualifies as an algorithm?
While Wi-Fi 6 brings faster speed to your wireless devices, there is another Wi-Fi standard, WiGig, that is even faster. Find out what WiGig is and its limitations.
The dopamine that we get from video games and the techniques we’ve devised to get that dopamine lie at the root of both good and addictive game design.
There are many different image file formats, and it can be confusing. Check out the differences between these image file formats and learn which one to use.
Wi-Fi 6 is the soon-to-be-released, newest version of Wi-Fi, which is faster and better. Find out what Wi-Fi 6 is and how it improves Wi-Fi performance.
Many websites and apps come with dark pattern interfaces to confuse and trick their users. Find out what “dark patterns” are and how they are used to trick people.
You might be surprised to learn that different mobile network operators are sharing the same infrastructure. This is known as a piggybacking mobile network. Find out more about it here.