Huawei Honor Holly: Budget phone without budget performance [Review]
If I wanted to pinpoint the most important development in the smartphone sector in the last two years, it would probably have to be the rapid rise of Chinese manufacturers. Huawei is one of the companies that has forced the mighty Samsung to consent to a rapidly declining market share in the huge Chinese market. Now it is going even further to conquer the world.
The Huawei Honor Holly that I review here is a typical example of what is on offer. It signifies what consumers in rising Asian markets want most: A large screen and good performance that will allow operation as the user’s only device. Let’s take a closer look.
HTC Re Vive promises an amazing VR experience
The HTC Re Vive looks to be the main contender against Oculus Rift Crescent Bay, according to early hands-on tests by press at the Game Developer Conference in San Francisco and Mobile World Congress in Barcelona.
Using Valve’s own Steam VR platform, the HTC Re Vive does more than strap a smartphone onto a VR headset, it offers the complete package similar to the Oculus Rift.
ZTE launches a new range of fitness-focused smartwatches
ZTE has launched three new smartwatches at Mobile World Congress this week, in an attempt to win over three of the sub-markets interested in wearables: runners, fitness trackers and health nuts.
The Venus G1 will feature a GPS chip made for runners, giving them detailed map information and routes. The Venus S2 will feature all of the fitness stats on its own operating system. The ZTE Business Intelligence Watch (excellent name by the way) will work similarly to the Withings Activité, sending health information back to a smartphone app.
Offline is not just another mobile feature
Every discussion on mobile-first development misses out on one of its most important and least understood characteristics: Mobile apps need to work offline.
The fundamental premise of mobility is that the technology should work everywhere. And that means everywhere. Imagine if you couldn’t access iTunes on the subway, or look up your next meeting on your calendar in an elevator, or a phone number in your contacts while trying to make an urgent call from the road. And forget being able to access anything when you are 15,000 feet in the sky.
Qualcomm challenges Apple's fingerprint sensor tech with new Touch ID rival
Fresh from a few big mobile announcements at MWC, Qualcomm has announced a new fingerprint sensor technology to compete with Apple’s Touch ID.
Qualcomm’s Snapdragon Sense ID is a new technology using ultrasonic waves to create a 3D fingerprint of the user, offering more depth than Touch ID, which uses an area-type capacitive 2D fingerprint.
7 ways to maximize your Android and Apple contacts
I’m sure you all know that your smartphone contacts app has long been essential for storing contact information, but while storage is its typical use, Android and Apple devices contacts are not limited to that function.
There are several nifty tricks you can use to lever the full potential of your contacts list. Here are seven of the best.
Will the Galaxy S6 help Samsung challenge Apple once more?
On the surface, Samsung’s position as the world’s second largest smartphone vendor seems formidable. The firm’s mobile division posted profits of £1.1 billion for the fourth quarter of last year and its most recently released flagship phone, the S5, has sold more than 12 million units worldwide since its launch.
However, all is not well with the South Korean technology giant.
Protecting your brand in the new domain name era
The online world has long been a space in which brands and businesses have jostled for attention. Until recently, there have been only a small number of domain extensions available, with the most popular ones including .com, or .co.uk.
The limited number of possibilities meant that prime domain addresses were fiercely fought over, with the market becoming increasingly saturated as rising numbers of brands looked to establish an online presence. Now however, a new programme spearheaded by the Internet Corporation for Assigned Names and Numbers (ICANN) is changing the face of the domain name marketplace -- by introducing more than 1200 new domain suffixes to the Internet.
How Netflix helped millions of TV viewers cut the cord
Netflix just won another indirect victory in the form of a net neutrality proposal passed by the Federal Communications Commission, which would ban all types of paid prioritization on the Internet.
This means Verizon, AT&T and Comcast will be unable to seek more revenue from Netflix, in exchange for fast video streaming rates to Netflix’s 40 million US subscribers.
7 useful online tools for your business
As the manager of a small business or an entrepreneur just starting out, you should always be on the lookout for anything that can improve your productivity, time management, organization, and ultimately make day to day tasks easier to manage.
It can be hard enough trying to run things in the office without also having to worry about your online presence. But like it or not, today’s business needs an online presence in order to ultimately succeed, or at least remain competitive.
Apple Watch could replace your car keys
The Apple Watch "official" launch event (as opposed to last autumn’s mere unveiling) is almost upon us -- in fact it’s a week from today -- and CEO Tim Cook has been busy stoking the hype fires one last time.
Cook talked to the Telegraph about the sort of innovations Apple is planning to bring forth with its smartwatch, one of which is that the device will be usable as your car keys -- replacing the chunky fobs that vehicles use these days.
How much is your personal or company data worth? 50% of Brits say at least £1 million
How much would you be prepared to sell your data for? According to a new survey, almost half of the UK wouldn’t give it up for any less than a million quid.
The study of a thousand Brits, undertaken by Swiss data center Artmotion, found that 49 percent of respondents would only sell their personal or company data for £1 million or more.
Agile versus waterfall development: The case for agile
Agility and flexibility are top of mind when it comes to delivering IT projects. With that being the case, the traditional waterfall development approach, which requires each step of a project to be completed before the IT team can move onto the next, seems a bit outdated.
Enter the agile development technique. This iterative development method should be the go-to today. It's based on collaboration and continuous development, and differs from the waterfall approach in that it can be characterized as being adaptive rather then predictive. Essentially, with agile, the requirements gathering, development and testing happen concurrently versus consecutively. Let’s take a closer look at why this development method makes more sense for most businesses today. And then, we’ll briefly examine a newer method -- DevOps -- which, too, is becoming more common. Regarding agile:
Pivot or Divot: How a first time founder learns to navigate the realities of running a startup
Starting a tech business in today’s rapidly evolving landscape presents a real challenge: how do you conceptualize an idea, develop it, and push it to market before the idea becomes obsolete in the face of new technology?
Firepype was first conceptualized in 2011 -- eons ago by tech standards. Amazingly, there is still no other product that offers automated media distribution the same way this does. The basic prototype came together pretty quickly for the first client, in a matter of weeks. Then it became time to refine the idea into an elegant, marketable package, and the forward momentum slowed to a crawl as I searched for the right team to help turn my vision into a reality.
Lack of employee context hinders protection efforts
Even with significant security solution spend, program maturity and external third-party certification efforts, organizations continue to struggle to adapt and protect themselves from attackers employing new and innovative approaches that take advantage of the very systems put in place to thwart them.
Today’s attackers are very sophisticated, well-funded and patient. They act more like detectives and scientists as they follow a systematic approach to understand their targets’ environments, their nuances and day-to-day operations even better than you do. They know that security point solutions have an important role to play in protecting your environment but that they also have their limitations. Attackers test these to understand exactly when an organization reacts and when it does not. But it doesn’t end there.
© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.