• Technology

    MediaTek has teamed up with Intel to launch its first 5G chip for laptops

    Yes, that’s right you can now become known as a Lord of the Rings! Intel will no longer manufacture 5G modems on its own. But the partnership with MediaTek is beginning to bear fruit. So these two companies have teamed up to release MediaTek’s T700 5G modem for next-generation Intel-powered laptops. Intel said they were part of developing system integration, validation and platform optimization of 5G chips, as well as assisting OEM partners. MediaTek’s T700 5G modem supports Sub-6 5G technology. MediaTek also claims to have tested 5G standalone calls that do not depend on 4G LTE networks. However, the chipset at the same time supports non-standalone Sub-6 5G networks…

  • Technology

    What is Bluetooth?

    This is definitely a feature that we have all used. This technology is used in everything from keypad phones to smart phones. And not just for phones. Today, there is hardly a place where this Bluetooth technology is not used. What exactly is Bluetooth? Simply put, this is a technology used to exchange data between two devices. Also in a very short distance. ‌‌ Data transfer between two devices using UHF radio wave. In terms of history, the founder of this concept is Jaap Haartsen. He worked for Ericsson. Most Bluetooth devices have a maximum connectivity range of about 30 feet. But this range varies according to the things around…

  • Technology

    Intel adds an anti-malware hardware solution to its Tiger Lake CPUs

    On June 16, Intel announced the addition of Control Flow Enforcement Technology (CET), a hardware-based protection against common malware, to their upcoming Tiger Lake mobile CPU. Intel worked with Microsoft for about four years. As described by Chipmaker CET in 2016, the hard-ware protection measure regulates the control flow of operations in the CPU. Often, malware writers interfere with the control flow of apps by entering malicious code and running one app across another. CET restricts control flow intervention through two different modes: indirect brand tracking and shadow stack. In indirect branch tracking, the app imposes some restrictions on the use of the CPU brand table. This is a method…

  • Security

    What is Encryption?

    Encryption is the process of converting information into a secret code so that the true meaning of the information can be hidden. The science of encrypting and decrypting this information is called cryptography. This encryption helps to protect the data that you send, receive and store using any device. This can include text messages, emails, and bank information sent through your online account on your smartphone. How does this encryption work? You now know that encryption is the process of converting plain text to plain text, such as a text message or e – mail, and we’s called cipher text. This helps protect the confidentiality of digital data stored on…