This week, Apple's preventing their own sales, Microsoft is preventing cheating and you need to protect your Wi-Fi.
Scott is a developer who has worked on projects of varying sizes, including all of the PLuGHiTz Corporation properties. He is also known in the gaming world for his time supporting the DDR community, through DDRLover and hosting tournaments throughout the Tampa Bar Area. Currently, when he is not working on software projects or hosting F5 Live: Refreshing Technology, Scott can often be found returning to his high school days working with the Foundation for Inspiration and Recognition of Science and Technology (FIRST), mentoring teams and judging engineering notebooks at competitions. He has also helped found a student software learning group, the ASCII Warriors.
Avram's been in love with PCs since he played original Castle Wolfenstein on an Apple II+. Before joining Tom's Hardware, for 10 years, he served as Online Editorial Director for sister sites Tom's Guide and Laptop Mag, where he programmed the CMS and many of the benchmarks. When he's not editing, writing or stumbling around trade show halls, you'll find him building Arduino robots with his son and watching every single superhero show on the CW.
Over the past 3 generations of handsets, Apple has had a 2-model strategy: a standard and larger screen variant of the same hardware. Other than the screen size, the only other major difference between the two models is the quality of the camera. Both models have come out at the same time, with the same general availability, meaning that neither truly cannibalized sales of the other.
Since the introduction of Windows 10, and the merging of Windows and the Xbox One platform, Microsoft has been working to bring developers to the Universal Windows Platform. Software written for UWP are potentially capable of running on Windows 10, Windows 10 mobile, Windows 10 IoT Core, Xbox One and HoloLens.
Shortly after we published our show last week, researchers revealed information about a fundamental flaw in the WPA2 security protocol. This technology is almost certainly the technology that you use to protect your Wi-Fi at home and at work. The vulnerability allows an attacker to decrypt data sent from your device to your router without needing to know your WPA2 security key. Researcher Mathy Vanhoef wrote about the topic,
One thing that has always been an annoyance for many music fans is a lack of a great way to discover new artists. Some companies have tried, but either the service never launches or never gains traction. With support from a top-tier brand, however, perhaps music lovers can learn about new, talented artists.