We should all rethink the level of access of our mobile devices
A recent second phone theft in the family prompted me to revisit the extent to which the iPhone is secure from unwanted access. The key security hole is the loc...
A recent second phone theft in the family prompted me to revisit the extent to which the iPhone is secure from unwanted access. The key security hole is the loc...
At the core of what is going to drive this new wave of adoption of AI will be the “conversational interface.”* We spoke a bit about bots, and how th...
I’ve had a iPhone for a few years now and am definitely a heavy Siri user. I’ve learned her way, how to speak with her, and get her to do the things...