GPS is not the only positioning system around. There are several other global navigation satellte systems that your phone can access.
If you’ve used Apple Pay before, you already have a good idea of how the Apple Credit Card works, since it’s just a card optimized for use with iPhones.
USB Power Delivery is designed to be a single charging standard that provides a safe and efficient way to push the limits of voltage and current to devices.
A VPN is currently the best way to protect your device from hacking, DNS/IP address leaks and ISP surveillance. Learn what a VPN is and how it can protect you.
If you’ve ever formatted a hard drive or USB thumb drive, you might have seen the “Allocation Unit Size” setting. What is this, and can you change it? Let’s find out.
Modern video compression algorithms aren’t the same as the image compression algorithms you might be familiar with. Here’s how video compression works.
Thieves can easily steal information from your credit cards if the card has an embedded RFID chip. This is where an RFID blocking wallet is useful.
You’ve probably noticed that many flagship phones nowadays come with a time-of-flight camera. But what is a time-of-flight camera, and how does it work?
While the inner mechanisms of cryptocurrency are complex, buying and using it is actually very easy. Here is how you can buy bitcoin and start using it.
Serverless computing is a new trend that allows developers to host their apps and websites without having to run or maintain a server. Find out how it works here.
Using a dark theme is said to be better for eyesight and battery life; how accurate is this? Here we will debunk the myths about dark themes.
Different codecs, like Dobly Atmos and DTS:X, have different surround-sound capabilities and support different types of hardware used in higher-end home theater systems.
The accelerometer is the component in your phone that detects if you are holding it upright or sideways. Find out how an accelerometer works in a smartphone.
Bluetooth 5.1 is here, and it comes with handy improvements. This short primer on Bluetooth 5.1 shows how it’s different from the previous standard.
Chances are that some of your data has been stolen. There’s a good chance it was encrypted, but how secure is your stolen encrypted data?
You may have come across the term “ping,” but what is a “ping” really? What does it mean in the computing world, and why does it have such an odd name?
There are various methods used to safely store your password in a web server. Here we show how password hashing, encryption and storage works.
From analog to digital, there are quite a few audio formats that are still in use today. Should you use Digital (S/PDIF), HDMI or just plain analog? Let’s check it out.
Technology products are designed to have a short lifespan, whether you like it or not. There is some rationale behind them, though a little outrage over planned obsolescence is certainly justified.
Sandboxing is a tool used by macOS to limit the damage that a hijacked app can do. Here is how macOS app sandboxing works to protect its users.