
Search results for 'Technology' - Page: 2
| PC World - 28 May (PC World)Dolby Atmos in your living room isn’t as easy as it sounds. Whether you’re dealing with a component A/V system or a soundbar, your speakers must be carefully positioned and calibrated to create that immersive envelope of Atmos sound—and if your furniture is in the way, you’ll just have to move it.
But with its new FlexConnect technology, Dolby is looking to make its Atmos audio technology more home decor-friendly, and it’s teaming up with TCL for the hardware.
Slated to arrive this summer, the TCL Z100 is a smart and “panoramic” wireless speaker that can pair with a Dolby Atmos FlexConnect-enabled QD-Mini LED TVs—specifically, the TCL QM8K, QM7K, or QM6k.
Unlike the speakers used in other Dolby Atmos systems, TCL’s cylindrical Z100 speaker can be placed anywhere in the room, while Dolby’s FlexConnect technology will “intelligently optimize” the sound depending on the position of the speaker, TLC says.
You can use anywhere from one to four of the Z100 speakers with a single TV, and the system can scale itself up as you add more speakers to your living room setup.
Dolby originally unveiled FlexConnect back in 2023, but while it announced TCL as a partner and gave some ears-on demonstrations at IFA 2023 in Berlin, this marks the first time that consumer-ready FlexConnect speakers have been ready to ship.
We’re still waiting on more specifics about the TLC Z100 speaker, namely how much it will cost. It’s also not clear what the intial setup process will entail, although has previously promised that it will be “simple and fast.”
What we do know is that Dolby Atmos FlexConnect won’t work with existing home speakers, nor will a FlexConnect speaker work with any old TV or A/V receiver. In other words, TCL’s Z100 speaker won’t do you much good unless you have a TCL FlexConnect-enabled TV to pair it with.
This news story is part of TechHive’s in-depth coverage of the best smart speakers.
Then there’s the question of performance: How do Dolby’s FlexConnect speakers actually sound? I don’t think anyone expects Dolby’s FlexConnect tech to compete with, say, a precisely positioned and calibrated 7.2.2 system with ceiling-mounted Atmos height speakers.
But for average users who want enveloping Atmos audio in their living rooms without drilling holes in the ceiling or completely redoing their living room decor, Dolby Atmos FlexConnect may wind up being an affordable and effective solution. Personally, I’m eager for an in-person demo. Read...Newslink ©2025 to PC World |  |
|  | | PC World - 28 May (PC World)Gabe Newell, co-founder and CEO of Valve, has been working on a new brain-computer interface project through his Starfish Neuroscience company for several years. The company just announced that it plans to launch its first brain chip by the end of 2025, reports The Verge.
This chip isn’t a complete implant solution, but a specially designed “electrophysiological” component that can both read and stimulate brain activity. Unlike competitors, such as Elon Musk’s Neuralink, Starfish aims to create a less invasive solution that doesn’t require a battery and can reach multiple brain regions at once using wireless energy transfer.
Starfish is also developing technology to treat neurological disorders such as depression and bipolar disorder, as well as a method to destroy tumors using targeted heat. The company is now seeking partners to further develop and integrate these technologies. It’s unclear whether Starfish’s technology will be used in the gaming industry. Read...Newslink ©2025 to PC World |  |
|  | | PC World - 27 May (PC World)I don’t know how your tech drawers look, but mine are filled with wires I’ll likely never use again because technology has advanced quite a bit. Thankfully, USB-C seems to be here to stay since there is no wrong way to plug these things in. It’s not just smartphones, tablets, and laptops that use these, however, but also a long list of gadgets.
We’ve scoured the market for hidden gems: gadgets that will make you think “Wow, I didn’t know I needed that, but it will make my life so much easier!” So, let’s dive in and see what cool devices you’ll be able to use your type-C cables and ports with.
Wowstick 1F+ mini electric screwdriver
Wowstick
If you often have to fiddle around with your computer or other gadgets, this Wowstick mini electric screwdriver may be just what you need. This pen-shaped screwdriver features three LED lights so it’s easier to see what you’re working on and rotates 200 times per minute so you can finish the job faster. The screwdriver has a stylish base so you can hold it on your desk, and a whole collection of 56 aluminum alloy bits. The screwdriver can be charged via USB-C and it can last for hours. This super fun electric screwdriver usually goes for $41.
Anker Nano Power Bank
Anker
One thing you need to have in you bag/pocket/backpack is a power bank because you never really know when your phone will fail you and cry for a recharge. Well, the Anker Nano power bank is tiny enough to fit just about anywhere. It comes with a foldable USB-C connector and a port on the side so you can charge two devices at once if you need to. The 5,000mAh capacity is just about enough for a full phone recharge, so it will be great in a pinch. It’s also only $30, but we’ve seen it as low as $16.
Endoscope camera with light
Ennovor
Although it’s not something you’ll use every day, this Ennover endoscope camera can definitely come in handy. You just plug it in your phone, install and app, and see everything your camera does. Our team swears by it, using it for finding whatever they dropped behind the desk, while working on the car, or looking for pipe leaks. Since it has an IP67 rating, you can even plop it in your aquarium. The camera comes with a 16.4ft semi-rigid cable and several accessories, including a hook, magnet, and a mirror. You can get this one for $23 right now.
Blukar flashlight
Blukar
I don’t care who you are—you need a flashlight. The smaller, the better, because you get to shove it into any pocket. This model from Blukar comes with a built-in 1800mAh battery that you’ll recharge with one of those many type-C cables you have in that tech drawer we were talking about. It can work for up to 16 hours on a single charge, which is pretty decent. There are four different lightning modes to cycle through, including one that will help you signal for help. Plus, one of these is only $10, so no excuse to pass on this one.
Heat It insect bite healer
Anyone plagued by mosquitoes in the summer will be particularly pleased with this ingenious gadget. This tiny device, which can be easily connected to your smartphone via USB-C, can significantly reduce the itching of bites and stings with targeted heat.
You simply charge the small Heat It bite healer via the app and then hold it on the bite. The heat then does the rest, breaking down the proteins in the mosquito bite that cause the area to swell, itch, and hurt. A true must-have for summer, and it costs only $20.
A tiny air pump
Also perfect for summer is this small air pump from Cycplus, which fits in any bag while on the go. Not only can it inflate a bicycle tire in two minutes at the touch of a button, but it’s also USB-charged. According to the manufacturer, it’s suitable for mountain bikes, road bikes, motorcycles, and even cars!
In addition to being an air pump, this practical gadget can also be used as a flashlight or power bank for on-the-go use — all things that come in very handy on a bike ride. And at just $57, it’s highly recommended if you need quick help with a flat tire.
Samsung flash drive
Samsung
The vast majority of flash drives have a USB-A connector, but this one from Samsung has a Type-C connector. With transfer speeds of up to 400MB/s, you’ll move files around in no time. The beauty of this thumb drive is that you can even pop it in your smartphone to record 4K vids directly on it. The Samsung Type-C flash drive comes in multiple storage options, starting at 64GB and up to 512GB and they start at $14. The 256GB version, for instance, is $27 at the time of writing.
Editor’s note: This article was originally published on May 16, but was updated to include two additional devices. Read...Newslink ©2025 to PC World |  |
|  | | PC World - 27 May (PC World)The internet might be more sanitized than it was in decades past, but it’s still plenty dangerous. You’ve been warned that the web is a security minefield—that it’s easy to get in trouble. You can do everything right and still be taken by a malware infection, a phishing scam, or an invasion of online privacy. We want to help.
Here are some of the most dangerous threats on the internet and what you can do to stay out of harm’s way. Not all web dangers are created equal, though. Indeed, some threats will actively come looking for you while others you may never see if you don’t seek them out. Let our threat level indicator be your guide:
Foundry
Threat 1: Misinformation
Where it happens: Social media
Foundry
You know this one already, but we’re all as susceptible as ever. As social media algorithms continue to curate content, create bubbles, and spur echo chambers, they’ve become better at pushing misinformation in stories and images that seem like they could be true—and that’s often all it takes. Once you’ve clicked through, you’ll be susceptible to further misinformation that reinforces the faux story that caught your interest, and it’ll tell the algorithms to keep pushing more of that kind of content that interests you, sending you down the wrong path.
How to stay safe: While cutting out social media altogether is the best answer, it just isn’t practical for most of us. You can protect yourself against social media misinformation by actively analyzing all stories, images, and links you come across. If it seems designed to provoke an emotional response in you, pause and reconsider. Double-check all stories with trusted third-party sources. And lastly, think about leaving certain social media sites that are inundated with misinformation and move towards ones that are better moderated and more open.
Threat 2: Deepfakes and AI scams
Where it happens: Just about everywhere
Foundry
This one’s tricky because you’re just as likely to find deepfakes and AI scams in your email inbox as you will on social media, on YouTube, and ads all across the internet. The dangers are equally varied. A deepfake (which is a video or audio that’s been digitally altered to appear as someone else) can damage someone’s reputation, lead you to believe misinformation, or incite you to feel negatively towards certain groups, countries, or organizations. Meanwhile, AI scams can catch you off guard and hack your data or steal your personal information.
How to stay safe: Deepfakes and AI scams are by nature hard to spot, which is why you need to develop a healthy skepticism towards everything on the internet. Remember that disinformation campaigns, hackers, and bad actors are all trying to prey on you in some way. Always question any video or audio that seems alarming or sensational.
Threat 3: Lookalike URLs
Where it happens: Your browser’s address bar
Foundry
With phishing scams on the rise, you’re likely to encounter lookalike URLs in fraudulent emails, but you’re also likely to run into this if you often type URLs directly into your browser’s address bar. If you mis-type a popular website—for example, goggle.com instead of google.com—you could end up on a fake site that imitates the one you meant to visit. It doesn’t happen all the time, but when it does, it’s because the fake site’s owner wants you to input your login credentials so they can steal them.
Similarly, you may run into scam links on the web that replace certain mundane characters with lookalike letters, such as from the cyrillic alphabet. When you’re in a rush, you may not easily spot the difference between realsite.com and r?alsite.com.
How to stay safe: Double-check every URL you type into a browser, and double-check every link you click on by hovering your mouse over it and looking at the URL preview at the bottom of the browser. When in doubt, it’s safer to type in a URL than it is to click on a link.
Threat 4: QR code scams
Where it happens: The real world
Foundry
QR code scams are particularly nefarious because they can follow you into the real world. They’re commonly found on parking meters, restaurant menus, bulletin boards, or outdoor venues that offer Wi-Fi access. Scammers and criminals stick their own fake QR codes on top of the original ones—often with a literal sticker—and it sends you to an imposter site that steals your logins, details, and/or financial information.
How to stay safe: Before scanning any QR code, double-check that it’s from a legitimate organization. When scanning QR codes in public, make sure it isn’t a sticker. Also, remember that QR code scams simply take you to fraudulent sites, so double-check that you’ve arrived on a legitimate page that doesn’t have any red flags. If it seems off, close the tab.
Threat 5: Malvertising
Where it happens: Streaming sites
Foundry
Who hasn’t visited ad-infested streaming sites to watch TVs shows without suffering Netflix’s or Disney’s increasingly expensive paywalls? Doubly so for live sports! If you’ve ever pirated a soccer stream or boxing pay-per-view, then you know the kinds of sketchy sites I’m talking about. The risk here is that these sites are funded via ads, but most ad sellers don’t want to be associated with such illegal activity—so these streaming sites have to be less scrupulous with which ads they accept, and that means their ads can contain malware. This is known as “malvertising.”
How to stay safe: Not only should you never give these sites your personal or financial information, you should never click on any of their ads. Also, make sure your antivirus software is up-to-date and working properly before visiting such sites. (You are using antivirus, right?) Consider using a VPN, too. These sites are illegal, after all.
Threat 6: Dangerous ideologies
Where it happens: Discord, Telegram, WhatsApp, other modern communication apps with weak moderation
Foundry
Modern communication apps are great for staying in touch with friends and family, but they’re also hotbeds of nefarious activity. Terrorists, white supremacist groups, illegal pornographers, and militant groups have all been known to use such apps for organizing, recruiting, and spreading dangerous ideologies and unlawful material. Some groups use these apps to operate slowburn pipelines of propaganda, disinformation, and indoctrination to radicalize susceptible people.
How to stay safe: “Just say no” is useless advice most of the time, but it’s entirely apt here. You just need to avoid such groups and communities. In fact, when you see them, consider reporting them. If you’re part of an online community that has devolved into espousing dangerous, derogatory, or distasteful ideas that make you uncomfortable, steer clear and leave. Delete. Block. Report. Move on.
Threat 7: Crypto scams
Where it happens: Social media, user comments
Foundry
Cryptocurrency and blockchain technology have some legitimate uses and could still impact the future of financial institutions, but we’re still in the get-rich-quick, anything-goes era—and that means scammers love using crypto to part those who don’t know any better from their money. Such scams include fake celebrity accounts that promise a big return on your investment of just a few fractions of Bitcoin, and crypto wallet transfer services that try to steal your private key and/or recovery phrase.
How to stay safe: Not your keys, not your coins. If you own cryptocurrencies, keep your keys private and never share them with anyone. Get your crypto off of exchanges and into cold wallets where you are the only master of your coins. You probably aren’t going to be one of those who get rich quick, so play it safe, invest only what you can afford to lose, never panic, and keep your FOMO in check.
Threat 8: Fake app stores
Where it happens: APK download sites
Foundry
Every so often, Google might ban a game you really want to play or an app that you depended on. When this happens, you can usually sideload those apps and games via APK download sites—but if you aren’t careful, you could fall victim to fake apps that are loaded with malware. It may seem fine and proper when you launch it, but in the background it could be stealing your passwords, credit card info, etc. The locked-down nature of the Google Play Store and Apple App Store can be annoying, but part of it is done for your protection. Going outside puts you at risk.
How to stay safe: For best results, avoid sideloading apps that aren’t available through official app stores. But if you simply must download an app that isn’t available, make sure you 100% trust the creator of the app and make sure you only download the app with their official links. Meanwhile, install anti-malware on your device for an extra layer of protection, and consider backing up your device just in case you catch ransomware that blocks you from accessing your data.
Threat 9: Man-in-the-middle attacks
Where it happens: Public Wi-Fi
Foundry
Public Wi-Fi is super convenient, but remember: if you have free access to a public Wi-Fi network, then so do scammers and hackers. Some hackers are able to eavesdrop on public Wi-Fi and tap into your online activity. Scammers can set up imitation Wi-Fi access points that seem like they belong to that cafe you’re in, except it’s a fake. Lastly, even without any scammers or hackers involved, do you trust whoever is providing you with free Wi-Fi? Perhaps they’re the ones spying on you and stealing your personal data as it flows through the network.
How to stay safe: Always use a reputable VPN before connecting to public Wi-Fi. The VPN will encrypt your online activity and hide what you’re doing so it’s useless to anyone eavesdropping. But as a rule of thumb when using public Wi-Fi, don’t log in to online accounts and don’t type your banking details or any other sensitive information that you wouldn’t want to share publicly. Assume everything you do on public Wi-Fi is being monitored, as it may well be.
Threat 10: Search engine poisoning
Where it happens: Search engines
Foundry
Search engine optimization has ruined search engines—in more ways than one. The first page of Google’s search results is often filled with not-so-high-quality content, but I’m talking about something else: the fact that scammers and hackers can also poison the search results by pushing their malicious websites to the top of the list, either via manipulative SEO techniques or paid ad positions. You might think you’re clicking on a link to a well-known and reputable brand, but it could be an imposter site that tries to steal your sensitive data or infect you with malware.
How to stay safe: It’s near impossible to avoid search engines altogether, so it behooves you to pay extra attention before clicking on links in the search results. Avoid clicking on the paid ad links, and always double-check the URL before clicking on an organic link. If it looks off, don’t click it. Lastly, make sure you’re protected by antivirus software.
Threat 11: Scam and malware emails
Where it happens: Your inbox
Foundry
The “Nigerian prince” scam email has been the butt of jokes for decades now, but the rise of generative AI has made these scams way more effective and overwhelming to deal with. Scam and malware-infested emails are trickier than ever as they now incorporate personal details to surgically target individuals. This can make them much harder to spot and easier to trust, lulling you into their carefully laid traps.
How to stay safe: There’s no good replacement for email just yet, so we all need to keep using it for now. But you can be more careful by never clicking links in emails and never opening unsolicited attachments. If you didn’t request it, don’t bother with it. And as with other scams, be wary of any email that sounds alarming, urgent, or scary, especially if it seems to want you to act fast within a time limit.
Threat 12: Physical attacks in person
Where it happens: eBay, Craigslist, Facebook Marketplace, Vinted, Mercari, any used marketplace with local pickup options
Foundry
As the cost of living crisis chomps down on victims across the world, second-hand marketplaces have boomed in popularity. They’re great for scoring deals and for limiting your environmental impact as a consumer. But they have their risks. You can be scammed, of course, but you can also be attacked if you pick up your purchases in person. Just a few months ago, a woman in Pennsylvania was robbed while test driving a used car she planned to buy.
How to stay safe: This problem isn’t common enough to avoid second-hand marketplaces altogether, and you don’t have to avoid local pickups either. But always meet in a well-lit, public space. Ideally, take a friend with you to the meet; if you have to go alone, always let someone know where you’ll be, who you’re meeting, and when you’ll be home. And if possible, skip the cash and pay for your purchase digitally—after inspecting the product’s condition, of course.
Threat 13: Lies and hallucinations
Where it happens: AI chatbots, search engines
Foundry
The rapid growth of AI is both exciting yet terrifying. One of the scariest aspects of modern AI chatbots and assistants is how easily they make things up and confidently present them as fact. At best, you ask a simple question and get the wrong answer; at worst, you get a complex answer that sounds right but is full of falsehoods and non-existent entities. The danger is when you don’t know enough yourself to fact check the AI’s response. These “hallucinations” appear in everything from ChatGPT to Copilot to Google’s AI Overviews and more—and as more sketchy websites use AI to create their content, the entire web is barreling towards a future where it becomes one giant hallucination.
How to stay safe: Never take AI entirely at its word. Ask for citations. Use other non-AI sources to double-check its statements. If you really want to be safe, avoid using AI for anything that hinges on factual accuracy and only use AI for fun or creative tasks. Once you start assuming that everything AI tells you is suspect, you’ll be ahead of curve.
Threat 14: Criminal content
Where it happens: Onion sites, porn sites
Foundry
The cleartext (i.e., non-encrypted) internet that we all use every day is much cleaner than it once was, but illegal content is still always one click away. Some unsafe porn sites have illegal content hiding in their video libraries, and it gets even worse once you start dabbling with the Tor Browser and “onion sites” (i.e., the dark web). On the dark web, you can encounter all kinds of dubious, dangerous, and detestable things—hitmen for hire, illicit drug sales, outlawed pornography, other stuff that will scar your mind and can never be unseen. The kind of stuff that you can actually be arrested and charged with real crimes for.
How to stay safe: Using the Tor Browser to hide your identity online is a good start, as is using a VPN to further obfuscate your online activity. But your best bet is to steer clear of the dark web altogether. A strong antivirus might help protect you against malware, but it won’t do anything for the illegal content you might come across. If you must use the dark web, be extremely careful. But seriously, don’t.
Threat 15: Copyright infringement
Where it happens: Torrent sites, illegal download sites
Foundry
Any time you download something illegally, you put yourself at risk. If you aren’t careful, you can be caught by law enforcement and copyright holders. That popular torrent might seem innocent enough, but it could be a honeypot set up to trap unsuspecting downloaders. On top of that, ISPs like Comcast and Verizon monitor internet activity and can easily tell when you’re pirating digital content. All that to say, you could get slapped with a copyright infringement notice—and if that happens, you could lose your internet access and/or face legal consequences.
How to stay safe: Always use a reputable VPN to mask your identity when you download torrents and visit illegal download sites. A VPN covers up your tracks, so to speak, by preventing ISPs from spying on your traffic and making your internet activity impossible to trace back to you. But again, you need a reputable VPN that doesn’t store your internet activity. Look for one with a no-logs policy. Read...Newslink ©2025 to PC World |  |
|  | | ITBrief - 27 May (ITBrief) Airspeeder`s electric flying car races over South Australia`s salt flats could spark a revolution in urban transport and eVTOL technology development. Read...Newslink ©2025 to ITBrief |  |
|  | | ITBrief - 26 May (ITBrief) Seagate boosts its share buyback to USD $5 billion, unveiling new 2028 financial goals and plans to lead storage innovation with HAMR technology. Read...Newslink ©2025 to ITBrief |  |
|  | | RadioNZ - 24 May (RadioNZ) `There`s a lot of different aspects of technology, and there`s a lot of creative technology as well. And for us, Maori and Pasifika, our brain leads more to the creative side,` Muliagatele Danny `Brotha D` Leaoasavai`i. Read...Newslink ©2025 to RadioNZ |  |
|  | | PC World - 23 May (PC World)This year’s Computex – the premiere PC industry event of the year, where manufacturers reveal the hardware you’ll be able to buy during this year’s back to school and holiday shopping seasons – felt more muted than any in recent memory. It’s no surprise. US tariffs on Chinese goods have frozen the PC industry, and vendors are hesitant to announce (much less release) new hardware in such an unstable economic situation.
But still, the show went on – and it’s a good thing it did, because while we saw fewer PC announcements at Computex this year, we also saw some certified bangers. Which reveals got us deeply, personally excited? This is the best hardware of Computex 2025. Giddy up.
The best PC hardware of Computer 2025
AMD Ryzen Threadripper 9000
AMD
In a Computex curiously devoid of chip announcements (well, aside from the new RTX 5060 that Nvidia tried to bury), leave it to AMD to whip out the big guns. The Ryzen Threadripper 9000 series focuses on the same overwhelming CPU power as its predecessors, but now come infused with key power and performance improvements within AMD’s new 5nm “Zen 5” architecture.
Threadripper Pro models top out at 96 (!!!) cores, but the standard Threadripper 9000 chips intended for high-end desktops stick to the usual 64, 32, and 24 cores. (How will we ever survive with just 64 cores??!!) Better yet, Threadripper 9000 bumps up maximum boost clock speeds, and memory speed support improves from DDR5-5200 up to 8-channel DDR5-6400. These monstrous chips are built for heavy work.
The only thing missing? We know Threadripper will ship in July, but AMD hasn’t revealed pricing. Sigh. Thanks tariffs. — Brad Chacos
Acer Swift Edge 14 AI
I’ve admired OLED displays for years: first as a generic replacement for a traditional 60Hz laptop display, then as potential gaming displays as refresh rates climbed. Now I’ve found something new to covet: a matte OLED display without the glare and reflections that trouble most laptops.
So far, I’ve only seen this on the Acer Swift Edge 14 AI, one of the stars of Computex. But there’s more: this 14-inch laptop weighs a feather-light 2.18 pounds while packing an Intel Core Ultra 200 (Lunar Lake) chip inside and offering MIL-STD 810H resilience. That’s a true on-the-go productivity machine, with 21 hours of battery life, to boot.
While I was also taken with the Swift X creator-class notebook, I’d still give the, um, edge, to the Edge. It feels like Acer is delivering something other notebooks do not. — Mark Hachman
InWin ChronoMancy
Turning 40 is cause for celebration—and boy, did InWin bring a party to Computex. In honor of its milestone anniversary, the company unveiled a jaw-dropping, awe-inspiring bit of case design wizardry: the ChronoMancy.
IT`S TIME!!!! Presenting #InWin`s newest signature chassis, ChronoMancy! Paying homage to InWin`s 40th Anniversary. The blue top showcases iconic cases while the middle section opens completely with a press of a button or wave a wand! More details to come! #Computex2025 #Computex pic.twitter.com/hSokT2p8kO— InWin (@InWin) May 19, 2025
You could glance at this three-foot tall (yes) chassis and think, “Who could ever want this?” Me. I want this. I don’t build E-ATX systems, sure. But look at that contrast between the transparent blue panel and the gleaming gray body. The way the light looks when shining through the top. The metal vibes when you slide the case open, gray aluminum curving around, and the components sit exposed.
Also, you can open it with the wave of a wand. (Or by pressing a button, but there’s no fun in that.)
It’s perfectly cyberpunk while simultaneously festive. I’ll never invest hours into games with that flavor, but I’m definitely tempted to sink money into this likely astronomically expensive case. — Alaina Yee
Asus ROG Falcata keyboard
Aside from some cool cases, the only thing I saw at Computex that really got my nerdy attention was the ROG Falcata, a split gaming keyboard from Asus. This is the sort of very niche, targeted keyboard that’s extremely rare from gaming manufacturers — in fact I don’t think I’ve ever seen a split gaming board from a big brand, never mind one that’s also wireless.
Little touches like the many different angle and tenting options and the removable wrist rest give me hope that this has been made with both gamers and ergonomic users in mind, and I appreciate that it doesn’t need a driver package installed to access its advanced adjustable features. Also, I really hope you can use the left side on its own…but that might just be me. I couldn’t get confirmation on that this far out from a late 2025 release date. — Michael Crider
SilverStone FLP-02
Look, man, I’m old. My beard hair is more white than black these days, I make weird little grunts when I stand up, all that jazz. But age comes with a perk: SilverStone’s new retro-style FLP-02 case is pure catnip for an old dude like me whose first computer was an Intel 486 system in, yes, a beige box.
SilverStone’s case may look old-school – it even has an honest-to-goodness-actually-working-Turbo-button on its custom control panel – but inside, it’s built for modern PC demands. It’s a fully standard ATX case even if it looks like it fell out of a time machine, and it’s the first one I’ve seen in a long time that has real 5.25-inch drive bays. Now get off my lawn. — Brad Chacos
MSI Prestige 14 AI+ Ukiyo-e Edition
I usually don’t get excited about laptop designs–they’re all just gray rectangles to me. But the MSI Prestige 14 AI+ Ukiyo-e Edition stopped me in my tracks. Is that Hokusai’s iconic Great Wave Off Kanagawa painting on the lid? Yes. Yes, it is. The handcrafted rendition of the famous painting was achieved by applying multiple layers of translucent ink and lacquer by hand. It’s designed to inspire a sense of calm, but it just leaves me feeling awestruck.
While the artwork is definitely the star of the show here, the MSI Prestige 14 AI+ is no slouch in the performance department. It’s got up to an Intel Core Ultra 9 185H processor, up to 32GB of DDR5 RAM, and a 14-inch 2880×1800 OLED display. The internals are impressive, sure, but with only a limited run of 1,000 units… you’ll be lucky to snag one for yourself. — Ash Biancuzzo
G.Skill’s sparkly new Trident Z5 NeoX RGB RAM
I won’t lie, I’ve been a fan of G.Skill RAM for a long time—and not because their DIMMs perform well. (That’s just table stakes.)
No, they understand perfectly what my inner crow loves. They first had me with their now perennial-favorite Trident Z RGB line, then captured me with the ultra shiny Trident Z Royal in gold and silver.
And this week at Computex 2025, I got my true heart’s desire—almost. G.Skill’s display of its new Trident Z5 NeoX RGB lineup, which I first spotted in this awesome Paul’s Hardware video full of rad modded PCs, includes a concept finish that I badly want to be real. The sparkly silver is a more elegant take than the Trident Z Royal’s high-shine silver. I like my builds blingy, but sometimes a bit of understatement hits harder.
G.Skill is taking feedback, so if you also dig the finish, I recommend you also let them know you want that sparkly version. Prefer a louder take? Neon yellow and orange are color options as well, and sport beautifully shiny clear coats. Oh, and there’s white too, I guess. But c’mon. Sparkly silver. — Alaina Yee
Cherry’s wild new keyboard switches
This year at Computex Cherry unveiled that it’s releasing not one, not two, but four new keyboard switches. Three of the new switches will be added to Cherry’s existing line of MX mechanical switches: the MX Honey is its first silent tactile switch, the MX Blossom is a low actuation switch for light typing, and the MX Falcon is a strong tactile switch for that clacky typewriter experience.
The fourth switch is the one that has me most excited though. Cherry also debuted the brand new next-gen analogue IK switch. Built with inductive sensing technology the IK switch promises “consistent performance with no mechanical wear”. The switch also consumes 50% less power than magnetic switches so it’ll be great for wireless keyboards as well. If that wasn’t enough, the IK switches will feature RGB lighting and customizable actuation—the keyboard geek in me is itching to get ahold of these bad boys. All of the new switches are due out this year with the MX switches set for June and the IK switch to follow in the fall. — Sam Singleton Read...Newslink ©2025 to PC World |  |
|  | | PC World - 23 May (PC World)The Belkin division responsible for developing the excellent Phyn Plus smart water shut-off valve has been acquired by an investor group led by contractor and TV personality Jonathan Scott (HGTV’s Property Brothers).
The announcement is the latest sign that Belkin, which brought the Phyn Plus to market back in 2018, is rapidly losing interest in developing new smart home products following its own acquisition by Foxconn. Belkin has already discontinued many of its Wemo-brand smart home products, and it “paused” its efforts to develop Matter-compatible products in early 2023.
We’ve praised both the first- and second-generation Phyn Plus devices for their ability to not only warn homeowners of leaky or burst pipes, but to automatically take action to shut off a home’s main water supply to prevent the catastrophic damage that can result.
In an exclusive telephone interview with Scott and Phyn CEO Ryan Kim late last week, Scott described himself as a “technology nut” and expressed his admiration for the Phyn Plus, which he said he’d previously installed in his own home as well as in a guest house and in his parents’ home.
Celebrity contractor and TV personality Jonathan Scott is leading a group of investors buying Phyn from Foxconn’s Belkin.Scott Brothers Global
“One of the benefits of being on the air for as long as we have is that when something feels ‘off’ to me, I have to dig in. My brother [Drew Scott] once spent $3,000 to put in a water leak-detection system in his own home, but if it detected a leak and shut off your water, you had to be there to turn it back on. There was nothing like Phyn at the time.”
Asked why more consumers haven’t already installed products like the Phyn Plus, Scott replied “Sometimes you can tell people all the benefits in the world that a product has to offer, but they still don’t see the value.”
Scott continued: “People hate to spend money on what they don’t see, but eliminating the risk of a flood [caused by a pinhole leak or a burst pipe] is so worth it. [My family has] already recouped 10 times the value of the Phyn devices we’ve installed just based on the kids leaving the tap on or a toilet handle getting stuck. The Phyn Plus is one of the greatest kept secrets that no one knows about.”
The Phyn Plus leak detection and smart water shut-off valve also tracks household water consumption patterns.Michael Brown/Foundry
Phyn CEO Ryan Kim said the acquisition “will unlock not only massive awareness in the consumer space but also increased adoption by the insurance industry.”
Given the average cost of a water damage claim stemming from a leaking or burst pipe is around $12,500, many insurance companies already offer policy discounts to homeowners who install water leak detections systems with smart shut-off valves, such as the Phyn Plus and Moen Flo.
Scott believes the insurance industry will eventually move beyond just offering homeowners incentives to install such products. “I think in a matter of years,” he said, “all insurance companies will require this type of leak detection and smart water shut-off [as a condition of coverage].”
Phyn has revenue streams beyond selling its hardware, according to Kim. “Phyn is not just a hardware company.” he said “It’s also a data company. There’s value in the data we’ve collected from the 2.5 billion [water-related] events we’ve collected. The data is anonymized—we don’t track individual homes—but we can see trends on a regional basis, which can help insurance companies and utilities understand trends to offer better services. It’s exciting for me that this powerhouse group came together.”
In addition to Scott, the investor group acquiring Phyn includes Intuit founder and Quicken developer Tom Proulx, who will serve as an advisor and board member; Silicon Valley venture capitalist and Microsoft board member David F. Marquardt; and Allen Sands, founder of Icon Builders, a construction company focused on renovating affordable housing.
Terms of the deal were not made public as of this writing, but we’ll update the story if we receive additional information. Read...Newslink ©2025 to PC World |  |
|  | | sharechat.co.nz - 23 May (sharechat.co.nz) AUCKLAND, 23 May 2025: Transport technology services company EROAD Limited (NZX/ASX: ERD) attaches a copy of the FY25 Governance Roadshow presentation that will be presented to a number of investors and stakeholders in the coming weeks Read...Newslink ©2025 to sharechat.co.nz |  |
|  |  |
|
 |
 | Top Stories |

RUGBY
New Zealand sides have only supplied six players to Super Rugby's honorary team of the year, despite contributing four of the six play-off contenders More...
|

BUSINESS
Federated Farmers reports members are feeling better about banks - in its latest Banking survey More...
|

|

 | Today's News |

 | News Search |
|
 |