LightBlog

mardi 13 septembre 2016

Goodnight Sunrise, Outlook gains new features

sunrise calendar

Well, we've all known it was coming. Sunrise's acquisition by the Silicon Valley mogul was a fatal blow from the start, and we've witnessed all the writing on the wall in the intervening time. However, now Microsoft is finally putting the last nail in the casket. Sunrise is gone, and Outlook is gaining many of its features.

Today marks the last day that Sunrise will be updating their much beloved calendar app. Although you can still run it if you like, the service is now dead for all intents and purposes. The app was actually scheduled for termination at the end of August, but it managed to hang in there for a couple of more weeks so that its features could be appropriately transported over to Outlook.

sunrise calendarPreviously: Microsoft has officially confirmed its acquisition of Sunrise Calendar6

All of Sunrise's event icons will still be available if you use them for your regular interface. However, if you're willing to commute over to Outlook, Microsoft has integrated much of Sunrise's capabilities into their ubiquitous app, and they're even expanding on existing features' capabilities.

For instance, Sunrise's date and time picker has made its way to Outlook, although it's currently only available on the iOS version. This attribute is coming to Android shortly. Moreover, the Sunrise team is now hard at work for Outlook, meaning all you favorite ideas are likely on their way to this scheduling platform.

What do you think of Sunrise finally biting the dust and Outlook scavenging the remains?  Will Outlook ever be a Sunrise replacement? Let us know your take in the comments below!

sunrise calendarSee also: Microsoft shutting down Sunrise Calendar, team joining Outlook9


from Android Authority http://ift.tt/2cuHP0c
via IFTTT

Google Cast Preview is live and you can join now

Roku vs Chromecast (16)

It's not uncommon for apps and platforms to encourage their users to sign up for testing programs. These early releases allow developers to tackle bugs before they're unleashed on the audience at large, and it gives technosavvy users an opportunity to experience new features and updates ahead of the curve. Now we're learning that Google's popular Chromecast platform is getting a preview program.

Google is essentially making this early release as openly available as possible. All you have to do is download the preview firmware for your device. Users on this program will be able to submit feedback to Google directly, giving them direct input on the product's development.

Roku vs Chromecast (16)See also: Chromecast sales reach 30 million, 5 million sold in just the last two months7

To get started, all you have to do is have the Google Cast app installed on your smartphone or tablet. Go to settings, then navigate to Notifications and turn on "Preview email." Once you receive your first email upon enrolling, you'll also get a link to the preview program. Turn on that setting, and you're good to go.

Google is insisting that this is not a beta program. The preview program aims to be more stable and definitive than what you would normally expect from officially released software, Google is just giving early adopters the chance to hunt down any obscure bugs directly before release. In their words, "You're simply getting earlier access to new features before they're released broadly."

Google says that both generations of Chromecast as well as Chromecast Audio are eligible for the Preview program.  If you're interested, open up the Google Cast app and get started today!

What do you think of the Google Cast preview program? Will you be signing up? Let us know in the comments below!

Get Google Cast!
google home 1-Google IO 2016Semi-related: The beating heart of Google Home is reportedly Chromecast hardware3


from Android Authority http://ift.tt/2cXIM5l
via IFTTT

How does encryption work? – Gary explains

You probably use encryption, in one form or another, every day. You might not know that you are, but you are. And my guess is that you don't give it a second thought. Do you have a subscription based cable or satellite TV service? Guess what, some of that content will be encrypted. Do you connect to websites using https://? That's more encryption. Ever created a .zip file with a password? You got it, that uses encryption.

I could go on and a list dozens of other examples of every day encryption, but I won't. As for Android, it also supports encryption, not only for the web with https:// but also for your files and data. Android 6.0 Marshmallow used full disk encryption, while Android 7.0 Nougat has added the option for per-file encryption. The idea is that if your phone should fall into the hands of unfriendlies, then your private data is secure.

So what is encryption? It is the process of taking plain data, including text, and converting it into an unreadable (by humans or computers) form. The encryption process is based on a key, the analogy here being a lock which needs a key, and only people with the key can unlock (decrypt) the data and put it back into its original form. This means that anyone who gets hold of your encrypted data can't read it unless they have the key.

As the Tom Jericho character in the excellent film Enigma put it, "It turns plain-text messages into gobbledygook. At the other end is another machine, which translates the message back to the original text." Encryption and decryption!

It all started with Caesar

Julius_Caesar_Coustou_Louvre-16x9

The art of secret writing, what we would call encryption, has been around for at least 2500 years, however the most famous example from antiquity is that of the substitution cipher used by Julius Caesar to send messages to Cicero. A substitution cipher works like this, you start with the alphabet on one line and then add a second line with the alphabet shifted along a bit:

  A B C D E F G H I J K L M N O P Q R S T U V W X Y Z  X Y Z A B C D E F G H I J K L M N O P Q R S T U V W  

If you want to encrypt the word "HELLO" then you take the first letter, H, and look at the letter below it, that gives you E. Then the E gives B and so on. The encrypted form of HELLO is EBIIL. To decrypt it you lookup E on the bottom row and see the H above it, then the B on the bottom to get the E above it and so on. Complete the process to get HELLO.

In this case the "key" is 3, because the alphabet has been shifted three to the right (you can also shift to the left instead). If you change to key to say 5, then you get this:

  A B C D E F G H I J K L M N O P Q R S T U V W X Y Z  V W X Y Z A B C D E F G H I J K L M N O P Q R S T U  

Now the encrypted version of HELLO would be CZGGJ. Very different to EBIIL. In this case the key is 5. Magic!

However there are some major problems with this form of encryption. First of all there are only 26 keys. You might have heard of people talking about 128-bit keys or 256-bit keys, well this is a 5 bit key (i.e. 26 in binary is 11010). So it wouldn't take too long to try all 26 variations and see which one starts to produce understandable text.

Secondly, English (and other languages) has certain characteristics. For example, E is the most popular letter in English, so if you had a good chunk of text you could see which letter appears the most frequently and then guess that it is E. Shift the bottom alphabet to match E with the most common character and you have probably cracked the code. Also there are only a few letters that can double up in English, like OO, LL, SS, EE and so on. Whenever you see a double like the II or GG (from the examples above) then you should try matching those on the alphabets first.

The combination of the small key and the fact that the same letter always encrypts to the same corresponding letter on the cipher alphabet means that this is very weak encryption. And today with computers doing the hard work, this is beyond weak!

More alphabets and unbreakable encryption

The weaknesses of the Caesar substitution cipher can be slightly alleviated by using more than one shifted alphabet. The example below can be expanded to 26 shifted alphabets of which several are used at once, but not all of them.

  A B C D E F G H I J K L M N O P Q R S T U V W X Y Z  Z A B C D E F G H I J K L M N O P Q R S T U V W X Y  Y Z A B C D E F G H I J K L M N O P Q R S T U V W X  X Y Z A B C D E F G H I J K L M N O P Q R S T U V W  W X Y Z A B C D E F G H I J K L M N O P Q R S T U V  V W X Y Z A B C D E F G H I J K L M N O P Q R S T U  

So if we set the key to WVY that means we use the alphabet starting with W first, then the one starting with V and finally the one starting with Y. This is then repeated to encode the entire message. So HELLO would become DZJHJ. Notice that now the double L in HELLO isn't encoded as the same character, it is now J and then H. Also, the first J in the encrypted text is the code for L while the second on is the code for O. So J now doesn't always represent the same plain text letter.

A version of this idea, with 26 alphabets, is the basis of the Vigenère cipher which was published in the 16th century by Blaise de Vigenère. A similar idea was also described by Giovan Battista Bellaso in 1553. The Vigenère cipher remained unbreakable for 300 years until it was cracked by Charles Babbage and then by Friedrich Kasiski. The secret to breaking the Vigenère cipher is understanding that ultimately the same words can be encoded using the same letters because the same alphabets are used again and again. So the word "AND" might be encoded different the first few times it appears, but ultimately it will be encoded using the same letters again. Repetition is generally the downfall of a cipher.

Vigenere_square

Repetition is the weakness in the Caesar cipher, the Vigenère and all the variants, but there is one way to use an alphabet cipher to create an unbreakable secret code without repetitions, it is called the one-time pad. The idea is that rather than using a shifted alphabet then a random sequence of letters are used. This sequence must be truly random and must be the same length as the message.

  I S T H I S U N B R E A K A B L E  P S O V Y V U B M W S P A H Q T D  

Rather than doing a straight substitution this time we use addition, with a twist. Each letter of the alphabet is assigned a number, A is 0, B is 1, C is 2 and so on. I is the 9th letter of the alphabet, which means it has a value of 8. P (the letter below it on our one-time-cipher pad) 15. 8 + 15 = 25 which means X. The second letter of our message is S, which has the value 18. It just so happens that S is also the letter on our one-time pad (which isn't an issue at all). 18 + 18 = 36. Now here is the twist, there is no 36th letter of the alphabet. So we perform what is called a modulus operation. What that basically means is that we divided the result by 26 (the number of letters in the alphabet) and use the remainder. 36 / 26 = 1 remainder 10. The letter with the value of 10 is K. If you continue doing this the final encrypted message is:

  X K H C G N O O N N W P K H R E H  

The reason this code is unbreakable is that you only ever use the key (the random string) once. This means that anyone trying to decode the message has no reference point and there is no repetition. The next message to be sent will use a completely different random key and so on.

The biggest problem with one-time pads, is getting the keys to the other party so that they can decrypt the message. Traditionally this was done using a book in the form of a notepad, with the different codes on each page. Which pages were in use would change every day and once a code was used it could be ripped from the pad and discarded. However these pads need to be transported in a secure method. Because if someone else gets the codes then the encryption can be cracked. This basically meant you needed to meet with the other party before hand and agree on which codes would be used and when. It is the most secure method but it is also the most cumbersome, and it certainly isn't a workable solution for today's modern digital world.

The digital age

Enigma_Machine-720p

During the 20th century encryption became mechanized, the most famous example being the Enigma machine used by the Nazi's during World War II. However after the war encryption became computerized. There are three big benefits to computerized cryptography:

  1. Computers are flexible, unlike mechanical boxes, computers can be programmed to perform lots of different operations on a message and the number and complexity of these operations can be altered relatively quickly.
  2. Speed.
  3. Computers deal with binary numbers not just letters.

Points 1 and 2 are very important, especially when comparing computers to mechanical encryption methods. However the paradigm change is that computers deal with numbers and not letters. This means that encryption can be applied to any type of data. A text message, a picture, an audio file, a movie, a database, files on a smartphone and so on.

With the move from letters to binary came a change in how encryption is performed. Whole letters no longer need to be encrypted but instead the ones and zeros can be manipulated to yield new sequences. The word HELLO in 8-bit ASCII is 0100100001000101010011000100110001001111. From here the binary can be manipulated in a myriad of different ways. It can be split, shifted, added, multiplied, whatever.

The method used to process the ones and zeros is known as a cryptographic algorithm and there are many different types of algorithms. The main characteristics of an encryption algorithm are its security (can it be cracked) and its performance (how long does it take to encode or decode data).

Very broadly speaking there are two main types of digital encryption ciphers, stream ciphers and block ciphers. With a stream cipher the data is encrypted by byte at a time. The data is processed from the beginning to the end and is streamed through the encryption algorithm. RC4 is a famous example of a stream cipher. It was used in WEP and was an optional encryption method for several other protocols and products.

Stream ciphers are like one-time pads in that the data isn't just encrypted against a single key, but rather a sequence of pseudo-random numbers which is based on the key. The difference between a one-time pad and a stream cipher is that with a one-time pad the key must be truly random. With stream ciphers using the same key means you get the same sequence of numbers, that is what makes it possible to decode the message. However without the key the sequence looks random and is therefore hard to break.

The weakness of RC4 was that under some circumstances and under some conditions (mainly when the same data was repeatedly encrypted) then it is possible to guess which numbers might comes next in the sequence. This guess reduces the number of possible combinations and allows a brute force attack (where every combination is tried) to be used. To get the attack to work lots of data is needed. The RC4 NO MORE attack needs to collect 75 hours worth of encrypted data, based on 4450 requests per seconds.

The other major type of cipher is the block cipher. This works by dividing the data into more manageable blocks, say 64-bit. Each block is processed several times, known as rounds (like in boxing). For each round the block is split into two equal parts, the left and the right. The right part remains untouched while the left part is encrypted using a special function, called a round function. The round function takes two inputs, the key and the right part (the part that went untouched). The result from the round function is then "added" to the left part using XOR.

This model is known as a Feistel Cipher, named after its inventor Horst Feistel who worked on encryption at IBM. His work ultimately led to the development of the Data Encryption Standard (DES). In 1977 DES became the official encryption standard for the United States and saw worldwide adoption. DES uses 16 rounds working on 64-bit blocks. The problem with DES is that the NSA limited the key size to 56-bits. While in 1977 this was sufficient, by the late 1990s it became possible for non-governmental organizations to break DES encrypted messages.

JARGON BUSTER
Exclusive OR (XOR) – This is a bit level logical operation that is applied to 2 input bits A and B. The Exclusive OR returns true or false (1 or 0) to the question, "A or B, but not, A and B". You can think of it as, "one or the other but not both". So, if A is 1 and B is 0 then that is one or the other, so the result is 1 (true). The same result applies to A is 0 and B is 1. But if A is 0 and B is 0 then the result is 0 (false), as both have the same value. False is also given for A is 1 and B is 1.

But the real magic of XOR is that it is reversible. If A XOR B = C then B XOR C = A, and A XOR C = B. This is very important for encryption as it means that data can be encrypted (where A is the data) using a key (B) to get the encrypted data (C). Later the encrypted data can be decrypted by XOR it with the key again to get the original data. The reason XOR is used in conjunction with complicated round functions and bit shifting operations is because on its own XOR can be broken using frequency analysis (because of the constantly repeating key).

In response to the weaknesses of DES, a new standard was proposed called Triple DES (3DES). Which basically encrypted the data three times with DES, but with three different keys. 3DES offered a way to increase the key size from 56-bits to 168-bits without the need to design a completely new block cipher algorithm. Due to some technical details, the effective key is 112 bits, but if you had a machine that could crack DES in 1 minute, it would take the same machine about 260,658 years to crack a Triple-DES key.

While DES had served its purpose for almost 25 years, the limited key length meant that it was time for another encryption standard. In 2001, the U.S. National Institute of Standards and Technology (NIST) published the Advanced Encryption Standard (AES). It isn't a Feistel cipher, but rather a substitution-permutation network. It still uses blocks and rounds just like DES, however during each round the order of the bits in the block are swapped around and the result is combined with the key using XOR.

AES uses 128, 192 or 256 bits keys and works on blocks of 128-bits. The number of rounds used depends on the key size. The minimum is 10, which is used for 128-bit keys and the maximum is 14, which is used for 256-bit keys.

AES-SubBytes-720p

AES, Android and the ARMv8 architecture

AES is at the heart of the encryption subsystems in Android. For Android 5.0 and Android 6.0, Google mandated the use of AES with at least a 128-bit key for devices supporting full disk encryption. With Android 7, Google has moved over to file based encryption (FBE) which allows different files to be encrypted with different keys while allowing files to be decrypted independently. It looks like FBE in Android 7 uses 256-bit AES.

When ARM made the move from 32-bit to 64-bit it defined a new revision of its instruction set architecture called ARMv8. As well as defining the instruction set for 64-bit ARM chips, it also added new instructions to implement parts of the AES algorithm in hardware. During each round various bits are swapped around and substituted. How the bits are manipulated is well defined (and part of the standard) so the AES extensions in ARMv8 allow those parts of the encryption to happen in hardware rather than software.

The result is lightning fast encryption, which should have a negligible impact on overall system performance. The AOSP implementation of file-based encryption uses AES-256 and requires a performance of at least 50MB/s.

Public key cryptography and wrap-up

Most of what we have discussed until now is known as symmetric encryption. To encrypt and decrypt a message both the sender and the recipient need to know the secret key. There is a form of encryption called asymmetric encryption where there are two keys, one for encrypting messages and a different one for decrypting them. The encryption key can be freely published for everyone who wants to send the recipient a message, however the decryption key needs to remain secret, but only needs to be known by the recipient. This means there is a public key and a private key. This system is the basis of how security on the Internet works, how the https:// protocol functions. However that is a story for another day!

In closing I want to add a caveat. Encryption is a complex topic and there is much more to encryption than I have written here.



from Android Authority http://ift.tt/2cH6PDj
via IFTTT

New Android distribution numbers don’t show Nougat yet

Android distribution september 2016Android has just released the latest detailed statistics regarding the operating system's version distribution, and it's no real surprise to see that Android 7.0 Nougat isn't quite on the listing yet. These numbers represent data taken over the past month, so Nougat still isn't represented on the charts. Android only counts versions equal to or exceeding .1 percent of the ecosystem.

What we are seeing is Marshmallow achieving a record share clocking in at 18.7 percent of the platform. Lollipop is still the big man on campus, snagging 35 percent of Android devices between its two API versions. KitKat remains surprisingly strong at 27.7 percent, and Froyo is finally vanishing into oblivion with approximately 0.1 percent share.

Taskbar FreeformSee also: Taskbar makes Nougat's Freeform windows actually useable7

Android is also releasing data about how screen sizes are distributed throughout devices. They're reporting that "normal" size screens constitute nearly 90 percent of the market, which just goes to show that their designation is accurate. "Large" screens of the phablet variety make up 7.4 percent of the market, and tablet-sized "Xlarge" screens constitute 3.9 percent.

For more details, including Open GL Version information, head on over to Android Developers to see the comprehensive breakdown. In the meantime, sound off in the comments below giving us your take on the current Android ecosystem!

samsung galaxy note edge review aa (4 of 26)Next: Marshmallow finally arrives on Galaxy Note 4 and Note Edge on AT&T23


from Android Authority http://ift.tt/2cjSH6t
via IFTTT

10 best video editor apps for Android

best video editor apps for Android
Video editing is one of the heaviest tasks that a device can perform. On computers, it requires decent specs, tons of RAM, tons of storage, and some know-how on how to make it work. Because of this, it's one of the more difficult tasks to reproduce on mobile. Phones do not have the specs or power to replicate experiences like Final Cut Pro or Adobe Premiere Pro. You will not find anything even close to that on mobile. However, some apps can do the basic stuff pretty well. It's even good enough for some pro vlogging if you're patient. Without further delay, here are the best video editor apps on Android.


adobe premiere clip best video editor apps for AndroidAdobe Premiere Clip

[Price: Free]
Adobe Premiere Clip is kind of the big name when it comes to video editor apps. It has a laundry list of features, including the ability to auto-generate videos using your images and video if you don't want to do it yourself. If that's not your thing, you can edit your video manually using a variety of tools, effects, and music. The app boasts that you can use your own music but some users have found this process to be difficult. It does sync and work with Adobe Premiere Pro so you can start a project on one and continue on the next one. It's worth a shot, especially if you use Adobe Premiere Pro on PC or Mac.

Download now on Google Play!

funimate best video editor apps for AndroidFunimate

[Price: Free]
Funimate is one of the surprisingly popular, but not overly powerful video editor apps. It boasts itself as being a great app for making music videos or simple videos out of the stuff you already have on your device. There are 15 video filters that you can play with and the creation process is fairly painless. This isn't something you'd want to use on a serious video but it's definitely worth a look if you need something really simple. It's also entirely free so there's no harm in checking it out.

Download now on Google Play!

funimate best video editor apps for Android

 movie maker filmmaker best video editor apps for AndroidMovie Maker Filmmaker

[Price: Free]
Movie Maker Filmmaker is a classically designed video editor that lets you actually edit video. You'll be able to trim, crop, and reorder video content as well as set focal points. The app also boasts a variety of video effects and you can design your own custom filters, although that functionality isn't amazingly powerful. The app has struggled with some bug issues since it's major redesign, but it's still one of the better video editing apps out there. It's also completely free.

Download now on Google Play!

movie maker filmmaker best video editor apps for Android

powerdirector best video editor apps for AndroidPowerDirector Video Editor

[Price: Free / $5.99]
PowerDirector is one of the most comprehensive video editor apps on this list. It comes with a ton of features, including quick editing tools, various effects and other tools, and it even comes with things like a collage maker and slow motion support. The interface is relatively easy to work with and it utilizes the classic "timeline editor" method which should make people with prior video editing experience feel more at home. It's free to download and use, but you'll need to fork out some extra money to get all the features.

Download now on Google Play!

Quik best video editor apps for androidQuik

[Price: Free]
Quik is from a newer generation of video editor apps and it's actually pretty good if you need something simple. The way it works is you add up to 50 photos and video clips and the app will analyze each thing and spit out a short video based on them. Quik contains about two dozen video styles and you can re-order and customize your video before you export it. It's not nearly as powerful as something like Adobe Premiere Clip or PowerDirector, but not everyone needs something that intense. You can pick it up for free if you're interested.

Download now on Google Play!

best free android apps mobile gamingSee also: The best Android apps, ever!102

viravideo best video editor apps for AndroidViraVideo

[Price: Free / Up to $4.49]
VivaVideo is a good "middle of the road" video editor app that gets the job done for most people. The app uses a storyboard style of editing where you load clips, edit and trim them as needed, and then move on to the next segment. It includes over 200 video filters and various other effects, text input, and fast and slow motion support. VivaVideo has a free version that comes with a watermark and a time limit for any given video. You can remove these restrictions by buying the pro version.

Download now on Google Play!

best video editor apps for AndroidVideo Editor

[Price: Free]
Usually apps with non-imaginative names like Video Editor aren't worth your time. This time, however, it definitely is. It's a simple video editor that lets you do the basic stuff like trim video, organize your clips, and add music. You'll also find some additional features like the ability to add emoji and text to videos and a variety of video effects to make things a little more fun. It's great for stuff like Vine or Instagram, but it's not powerful enough for bigger productions. At the very least, this one is completely free to use.

Download now on Google Play!

best video editor apps for Android

videoshop best video editor apps for AndroidVideoshop

[Price: Free]
Videoshop is another one of those video editor apps where it's really good if you need something simple. It has a ton of features including the most basic stuff like trimming, basic editing, and adding music. Along with that, the app also includes transition animations, the ability to record voice overs, stop motion support, sound effects and some fun little things like the ability to play a video in reverse. You can download and use the app for free and there's an additional $0.99 purchase that you can make.

Download now on Google Play!

videoshop best video editor apps for Android

videoshow best video editor apps for AndroidVideoShow

[Price: Free]
VideoShow is actually one of the more powerful video editor apps out there. It's not quite on par with something like PowerDirector or Premiere Clip, but the list of features is long. On top of the basic stuff, you'll be able to add a variety of effects to your video. These include stickers, text (including font), themes, and other effects that you can pick and choose. You can also draw on the video if you want to or record a voiceover if needed. The controls can be a bit finicky and there are some bugs and issues that need worked out, but it is worth a shot.

Download now on Google Play!

vquick best video editor apps for AndroidVQuick

[Price: Free]
VQuick is last on our list of video editor apps and it's also one the newest. It was built specifically for people who do things like vlog, do journalism, and similar, socially minded video content creators. It has some basic editing features but nothing overly special and there is a built-in social network where you can view videos made by other people. There is also a self-destruct mode included so you can show a video to someone and then have it deleted after it's been viewed. It's unique and it's completely free. However, please note that not a lot of people have used it and there are likely bugs that still need worked out!

Download now on Google Play!

vquick best video editor apps for Android

Related best app lists:

If we missed any of the best video editor apps for Android, tell us about them in the comments! To see our complete list of best app lists, click here.



from Android Authority http://ift.tt/2cKTdG5
via IFTTT

Netflix tells FCC that Internet Service Providers cap data unreasonably

Netflix logo

None of us are fans of data caps. Heck, maybe that's why so many users are willing to take a string of caveats for an unlimited data plan or pay out of pocket for each new smartphone to maintain their grandfathered status. But data caps aren't just a problem in the mobile world. Netflix says ISPs are being unreasonable.

Last week Netflix appealed the FCC as part of the regular review of the Telecommunications Act. The popular streamer said that carriers and ISPs in general are capping data in a way that harms regular citizens.

"Data caps (especially low data caps) and usage-based pricing ('UBP') discourage a consumer's consumption of broadband, and may impede the ability of some households to watch Internet television in a manner and amount that they would like," said Netflix. "For this reason, the Commission should hold that data caps on fixed-­line networks ­­and low data caps on mobile networks­­ may unreasonably limit Internet television viewing and are inconsistent with Section 706."

Netflix logoSee also: Netflix will now help you conserve precious mobile data5

Netflix claims that service providers are using data caps on streaming video to force subscribers back over to their traditional television service. The company says that this policy is discriminatory, and that any data cap in the realm of 300 GB is a disservice to the subscriber.

"Today's 'above-average' Internet consumer is tomorrow's average Internet consumer," said Netflix.

Today's 'above-average' Internet consumer is tomorrow's average Internet consumer.

The Telecommunications Act exists to ensure that technology is being fairly rolled out to the population in a reasonable way. Netflix says that the technology and bandwidth exist to render these data caps unnecessary, but that ISPs are setting artificial limits for their own gain.

What are your thoughts regarding Netflix's accusations that ISPs are capping data for reasons that don't have the consumer's best interest in mind? Let us know in the comments below!

LeEco and Vizio-AANext: Netflix says they have no part in LeEco's effort to take over the world29


from Android Authority http://ift.tt/2cpFvsW
via IFTTT

A Galaxy Note 7 didn’t explode in a child’s hands after all

samsung galaxy note 7 aa autom3otices ryan vergara (10 of 23)

Samsung has a huge problem on its hands with the exploding Galaxy Note 7 incident, but there's one important detail that needs some clarification.

Earlier today we learned that over 70 Note 7 overheating incidents have been reported in the U.S. alone, which is about double the figure that Samsung originally disclosed in its first recall statement. The fact that roughly 70 Note 7 devices have overheated in the past few days is definitely scary, which is why it's a very good thing that Samsung has issued a worldwide recall on the handset.

Throughout the entire recall process, it's been reported that only one exploding device has actually physically harmed someone. On Sunday, the New York Post reported that a 6-year-old boy was playing with a Note 7 when it exploded, causing the family to rush him to the hospital with burns on his body. Many folks around the web became angry toward the boy's grandfather for not taking away the recalled Note 7 and putting his grandson in danger.

As it turns out, that exploding smartphone wasn't a Galaxy Note 7 after all

As it turns out, that exploding smartphone wasn't a Galaxy Note 7 after all – it was a Samsung Galaxy Core Prime. In an interview with NBC New York, John Lewis, the 6-year-old boy's grandfather, said the entire family has Samsung phones and initially told reporters the exploding phone was, in fact, a Galaxy Note 7. The boy's mother later clarified that the exploding phone was a Galaxy Core Prime, not the recalled Note 7.

This certainly isn't good news for Samsung, nor does it take away what happened to the Lewis family. Still, this is an important detail. The Galaxy Core Prime has a removable battery and basically no history of battery problems. And while all the details are still trickling in, it's important to note that there seems to be no relation between the exploding Galaxy Core Prime and the Note 7.

Samsung has reached out to the Lewis family regarding the incident:

We take every report very seriously and have contacted the Lewis family to learn more about their situation. As we are currently looking into this case, we are unable to comment further right now.

If you own or know anyone who owns a Galaxy Note 7, please take our advice and return it. Samsung is taking this matter very seriously, and so should you.



from Android Authority http://ift.tt/2cBXnTh
via IFTTT