Telephone network access on iPhone unlocked by teen

Friday, August 24, 2007 George Hotz, 17, confirmed on Friday that he has cracked the lock that joins the Apple iPhone to AT&T‘s wireless network and was using it on T-Mobile‘s network—the only other major U.S. carrier compatible with iPhone technology. This crack opens up the phone, which is only being sold in the U.S., […]

Continue Reading...

Spelbound declared winner of Britain’s Got Talent 2010

Monday, June 7, 2010 An acrobatic group known by the name of Spelbound has been declared as the winner of Britain’s Got Talent 2010, a televised variety talent show competition broadcast on ITV in the United Kingdom. As the winning act of the show, Spelbound have won £100,000 (US$144,580, €120,313, A$175,079) and a place at […]

Continue Reading...

Creating Your Brand Grabbing The Spotlight

Creating Your Brand – Grabbing The Spotlight by Dana J Lange I am no marketing expert, but I do know that people will form opinions of you. Those opinions may be from a brief encounter, something you said on a social network or something you did. The more we begin to think of ourselves as […]

Continue Reading...

Sony refreshes VAIO brand for business and entertainment

Thursday, July 31, 2008 From the middle of July, Sony Corporation refreshed their senior laptop brand VAIO from “Video Audio Integrated Operation” to “Visual Audio Intelligent Organizer”. According to Sony Taiwan Limited, this refreshment is an attempt to relocate the laptop consuming market for business and entertainment factors. In the “VAIO Experience 2008” press conference […]

Continue Reading...

Wikileaks publishes files on CIA hacking abilities

 Correction — March 19, 2017 This article incorrectly describes WikiLeaks as “the organisation behind the Edward Snowden leaks”. WikiLeaks only got involved with Snowden after Snowden had leaked material through other outlets.  Wednesday, March 8, 2017 Yesterday, WikiLeaks, the organisation behind the Edward Snowden leaks, released files going into detail about the CIA’s hacking capabilities. The […]

Continue Reading...