Skullcandy collabs with Teenage Mutant Ninja Turtles (TMNT) franchise! 

Skullcandy have announced a groundbreaking collaboration with the legendary Teenage Mutant Ninja Turtles (TMNT) franchise! 

This exciting partnership brings you the Skullcandy x TMNT Push Active True Wireless Earbuds and Skullcandy x TMNT PLYR Multi-Platform Wireless Gaming Headset, designed to honor The Turtles ahead of their 40th anniversary.

Inspired by the iconic toxic green ooze that transformed the Turtles into fearless crime-fighting heroes, this limited-edition collection boasts cutting-edge audio technology and is infused with affectionate nods to your beloved characters.

The exclusive design features transparent and glow-in-the-dark elements. The Push Active earbuds are doused in TCRI Mutagen Ooze, while the PLYR features turtle-shell earcups, a manhole cover inside the ear cushion, a radioactive headband, and a pepperoni pizza boom mic. Fans can also customize their ear gel and suspension headband colorways to rep their favorite turtle – red for Raph’s, purple for Don’s,orange for Mikey or blue for Leo.

Product Highlights:

Skullcandy x TMNT Push Active True Wireless Earbuds – £79.99 MSRP

  • Skull-iQ Smart Feature Technology

  • Over-the-Air Updates

  • Flexible Over-Ear Hooks

  • Premium Audio Quality

  • Up to 44 Hours of Battery Life

  • USB-C Rapid Charging Case

  • True Wireless via Bluetooth® 5.2

  • Auto On/Connect

  • IP55 Sweat and Water Resistance

  • Built-in Tile™ Finding Technology

 

Skullcandy x TMNT PLYR Multi-Platform Wireless Gaming Headset – £139.99 MSRP

  • Bluetooth 5.2 Wireless Technology

  • Skullcandy Supreme Sound

  • Enhanced Sound Perception

  • Advanced Audio Controls via Skullcandy Software

  • Clear Voice Smart Mic

  • Mute & Volume Control

  • Adjustable Suspension Headband

  • Up to 24 Hours of Battery Life + Rapid Charge

  • Built-In Tile™ Finding Technology

  • Skull-HQ Software

  • Low Latency via Included 2.4GHz Wireless Transmitter

Tech Review – Ringke Onyx Google Pixel 8 Pro Case and Tempered Glass

The Pixel 8 Pro is one of the devices I am using right now and tend to always have a Pixel in my daily driver routine all year round and having said that having protection is the norm for me as I prefer to have a case on and be protected, I do like the naked feel of a phone but still keep them in good order, We have a few case reviews for several devices from Ringke and screen protection and today we start off with the Onyx case and tempered glass screen protector for the Google Pixel 8 Pro.

In the hand this case offers superb grip and is clean, all ports are accessible and you can also add lanyards or straps if you wish to do so, the keys are very tactile and work well and there is raised corners and lip on the front of the screen,, the camera bar on the rear is also fully protected from edge to edge and raised to keep that glass protected, Ringke also have lens protectors on offer plus much more on their site.

The case is made with TPU which is my preferred option on a case and feels smooth yet grippy all round giving you the best protection along with their screen protectors,not only that you can still wirelessly charge your device without the need to remove the case, check the video below for more.

Google Pixel 8 Pro Screen Protector | Glass

  • 2 Pieces of Glass Screen Protectors (Compatible with Google Pixel 8 Pro)
  • Premium edge-to-edge tempered glass screen protector precisely designed to fit the Pixel 8
  • 9H hardness tempered glass protects the touchscreen from scratches and scuffs
  • Edge-smoothing technology naturally integrates the screen protector into the device without sharp borders
  • Full adhesive design from top to bottom for easy, long-lasting installation without bubbles and lift
  • Case-friendly design. Complete your protection by pairing it with a Ringke case for a guaranteed fit

Buy 

Google Pixel 8 Pro Case – Onyx

 

Features

  • Rugged Back Case Compatible with Google Pixel 8 Pro
  • Made from flexible, long-lasting premium silicone-type TPU for heavy-duty defense
  • Grip enhancing circular emboss sides and sleek button covers provide extra protection
  • Unique matte, granulate texture is anti-skid and anti-fingerprint
  • Attach hand or neck straps with the built-in dual QuikCatch lanyard holes (Strap sold separately)

BUY

Video Review

The Cyber Security Breaches Survey Identifies 39% Of UK Businesses Previously Experienced Cyber Attacks

In the corporate world, where remote workforces and cloud technologies have become the new norm, cyber security has taken centre stage. Recent statistics underscore the growing need for resilient cyber security measures as cyber threats continue to proliferate. 

The Alarming Reality: Cyber Threats on the Rise

The Cyber Security Breaches Survey, a comprehensive report on the state of cyber security in the UK, has unveiled a sobering truth. In 2022, an eye-opening 39% of surveyed businesses in the United Kingdom fell prey to cyber incidents. These attacks, characterised by their sophistication and the difficulty of preventing them, have fundamentally altered the way we perceive cyber security.

Once perceived as a possibility, cyber threats are now considered an inevitability. This shift in mindset has driven an increased demand for disaster recovery solutions that are both comprehensive and capable of rapid response and recovery. The reality is clear: businesses must take proactive measures to fortify their defences in the face of an ever-expanding digital threat landscape.

Outsourcing Proves To Be A Strategic Shift for Large UK Businesses

Among the notable trends stemming from the evolving threat landscape is the growing trend of large UK businesses choosing to outsource their cyber security operations. A staggering 60% of these enterprises have opted for this strategic move, reaping substantial benefits in the process.

The decision to outsource is motivated by several key factors, each of which underscores the wisdom behind this strategic choice:

Access to Specialised Expertise: Cyber threats have grown in complexity and scope, making it challenging for in-house teams to keep pace with the evolving threat landscape. Outsourcing security operations grants access to expert partners who specialise in staying one step ahead of cyber adversaries.

Abundant Resources: Cyber security is resource-intensive, from advanced tools and technology to personnel. By outsourcing, businesses gain access to a wealth of resources that might otherwise be cost-prohibitive.

Stringent Security Standards: Compliance with stringent security standards is imperative, especially for large enterprises. Expert cyber security partners are well-versed in these standards, ensuring businesses meet and exceed regulatory requirements.

By entrusting their cyber security to external partners, large UK businesses are freed from the burden of maintaining in-house cyber security teams, allowing them to focus on their core operations. This strategic shift is not merely a cost-saving measure; it is a proactive step toward enhanced cyber resilience.

The Way Forward: A Comprehensive Approach to Cyber Resilience

In light of the rising threat landscape, businesses must adopt a holistic approach to cyber resilience. This approach encompasses various elements, each essential for safeguarding business operations in an increasingly digital world.

Continuous Data Protection, or CDP, has emerged as a cornerstone of modern cyber security. CDP captures and tracks data changes, automatically saving every version of data as it evolves. This technology enables businesses to recover data at any given point in time, even mere seconds before an outage occurs. In an era of relentless cyber threats, CDP is an indispensable safety net.

Disaster Recovery as a Service (DRaaS) simplifies the complexities of disaster recovery by entrusting them to external partners. These partners provide fully managed services, offering expertise from implementation to recovery. In the face of an impending disaster, DRaaS ensures swift response and recovery, allowing businesses to resume operations with minimal downtime.

Peter Moorhead, Cyber Security CTO at Telefónica Tech, underscores the importance of adopting Disaster Recovery as a Service (DRaaS) solution; “DRaaS not only empowers businesses to tackle modern cybersecurity threats with continuous data protection but also provides the expertise, resources, and standards required to navigate the complex cybersecurity landscape. As cyber attacks become more sophisticated, organisations must invest in resilient disaster recovery strategies to safeguard their operations and maintain business continuity.”

With cloud computing becoming integral to business operations, it is imperative to develop strategies that ensure data security and recovery in the cloud. As businesses transition from legacy infrastructure to the cloud, disaster recovery requirements evolve. Having a trusted partner by your side who comprehends these changes is essential, regardless of whether you are in the early stages of transition or fully immersed in the cloud.

Sustainability is a crucial consideration in all areas of business, including disaster recovery. As businesses seek to minimise their environmental impact. DRaaS can mitigate the ecological footprint. By managing all backups and servers, DRaaS reduces the environmental impact associated with purchasing, maintaining, and upgrading legacy infrastructure. Additionally, the flexibility to add or remove services as needed optimises resource usage and minimises waste.

The Round-Up

The statistics from the Cyber Security Breaches Survey serve as a stark reminder of the urgent need for robust security measures. Embracing continuous data protection, disaster recovery as a service, and sustainable practices not only fortifies a business’s resilience but also contributes to a more responsible and secure future. As companies navigate the dynamic landscape of business in the digital age, one thing is certain: cyber threats are a reality, and it’s up to all businesses to fortify their defences and protect their digital assets.

6 Ways To Protect Yourself From Hackers

Hacking has been making waves in the tech world, especially since the rise of cryptocurrency. It’s a realm where brilliant minds seek innovation and disruptors try to cause chaos. Shockingly, recent data show that Ireland saw a 37% surge in cryptocurrency theft, totalling about €1.8 billion. Here’s the reality: the risk of getting hacked is greater than ever as these cunning cybercriminals evolve. However, you can fortify your defences by understanding their tactics. Here are six ways you could fall victim to hacking. 

  1. Smartphone apps 

Many people have and love those handy apps that make life easier. In today’s digital world, they’ve become essential. However, your smartphone could be more vulnerable if you’re an Android user without two-factor authentication (2FA). Android’s open-source operating system, while offering flexibility, can be a playground for viruses, making it less secure than the iPhone. When you open an app, you often share sensitive information, potentially giving hackers an open door. The solution is to be picky with your app choices, focus on the ones with credible ratings and reviews, and beef up your security with Two-Factor Authentication on all apps and devices. Don’t forget to double-check your links too. 

    2. Sites-cloning and phishing

Site cloning and phishing are a classic that has been around since the ‘dot-com revolution.’ As they say, ‘the old ones are the best.’ In one scenario, the cyber tricksters create a near-perfect replica of a legitimate website, hoping to trick you into entering your password or secret key. They might even slightly alter the website’s domain, so be vigilant. In the second scenario, they send emails that look identical to official communications but aim to trick you into clicking a malicious link and giving away your data. Trust your instincts, and if something feels off, delete it. Stick to websites with genuine HTTPS protocol. 

   3. Beware of public Wi-Fi

Public Wi-Fi is a hacking scenario that many naturally fear. Your device can connect to a hacker’s Wi-Fi network through a misleading link or accidentally choosing the wrong network. Anything you download or send while connected to that network is fair game for hackers. They can access your private keys from crypto wallets, online banking details, email passwords, and more. This issue is especially critical when using public Wi-Fi in railway stations, airports, hotels, or any crowded spot. Hackers can lurk incognito, waiting for an unsuspecting victim. The rule of thumb here is never to use public Wi-Fi for financial or sensitive transactions, not even with a VPN. Also, keep your router firmware updated, as manufacturers frequently release updates. Meanwhile, you can use SSID as an alternative. But what is SSID? It stands for Service Set Identifier, enabling you to learn more ways to protect yourself on Wi-Fi networks. 

   4. Malicious USB sticks 

You’ve probably heard stories of people finding USB sticks in parking lots and trying to do the right thing by returning them. However, there’s a darker side to this scenario. Sometimes, these USB sticks are loaded with malware and intentionally left by criminals. You don’t need to be the target of a specific attack to fall victim to malware. Inserting random devices like CDs, DVDs, USB drives, or any other found peripherals, such as a mouse or keyboard, puts you at risk of getting hacked. To protect yourself, use reputable antivirus software and make sure it scans all connected devices. While it’s not foolproof and can’t catch every threat, it significantly reduces the chances of falling prey to random malware or malware created by less skilled attackers. 

    5. SMS authentication 

SMS for authentication may seem like a quick and familiar way to confirm your identity, but it’s not as secure as you think. Positive Technologies, a cybersecurity company, has shown how easy it is for attackers to intercept SMS messages containing password confirmations, thanks to the Signalling System 7 (SS7) protocol used worldwide. They demonstrated that any system relying solely on SMS can be accessed by hackers, even if 2FA is used. To protect yourself, turn off call forwarding to prevent data access and consider using a software-based authentication solution instead. 

    6. Malicious documents

Hackers often hide malware in seemingly harmless Office documents like Word or Excel. When you open these files, your computer can get instantly infected. These malicious documents typically arrive in your inbox, disguised as seemingly secure emails. Upon opening, you might receive a pop-up message prompting you to enable macros to view the document’s content. If you allow macros, your computer becomes susceptible to malware attacks. So, avoid enabling macros and never open attachments from suspicious emails or unknown contacts. 

Top 7 Multiplayer Card Games to Play on Mobile

Are you someone who thrives on social interaction and cherishes those moments spent bonding with friends and family? Well, what if I told you there’s a fantastic way to combine your love for socializing with the thrill of gaming? Games have an incredible ability to bring people closer, fortify relationships, and provide endless entertainment. Today, we’re here to introduce you to seven of the most engaging multiplayer card games that you can easily enjoy on your mobile device. So, let’s dive right into the world of digital card battles and discover which ones are perfect for you. 

Hearts 

Hearts are often the first game that comes to mind when many people gather to enjoy a card game. This classic trick-taking game has been a beloved pastime for generations, known for its simplicity and ability to captivate players of all ages. This amazing multiplayer card game is typically played with four players, although variations exist for three to six players. It revolves around a set of 52 playing cards and the cards are ranked in their usual order, with the Ace being the highest and the two as the lowest. 

One of Hearts’ defining features is the concept of “shooting the moon.” This daring strategy involves trying to collect all the penalty cards (the hearts) and the Queen of Spades in a single round. Successfully shooting the moon can lead to a spectacular win or, if it fails, a substantial loss, making it a high-risk, high-reward aspect of the game.

Slay the Spire 

Have you ever imagined a game that combines the elements of deck-building strategy and roguelike adventure into a single, captivating experience? If so, then “Slay the Spire” is a game that will undoubtedly pique your interest. This indie gem has taken the gaming world by storm with its innovative gameplay and addictive replayability.

Slay the Spire” is a deck-building roguelike game developed by MegaCrit and has garnered a devoted following since its release. At its core, the game presents you with a simple yet compelling challenge: ascend the titular Spire by battling through a series of procedurally generated floors, each teeming with unique enemies, treasures, and increasingly formidable bosses.

UNO 

UNO, the iconic card game known for its fast-paced action and colorful cards, has been a source of fun and laughter for players of all ages for decades. At its core, UNO is a game of strategy, luck, and cunning. The objective is simple: be the first player to empty your hand of cards by matching them to the top card of the discard pile either by number, color, or special action. The deck consists of four colors—red, blue, green, and yellow—and each color has cards numbered from 0 to 9, along with special action cards that can change the course of the game.

UNO’s special action cards include the Skip card, which forces the next player to miss their turn; the Reverse card, which changes the direction of play; and the powerful Wild card, which allows the player to choose the next color. The Wild card can be a game-changer, as it introduces an element of unpredictability and strategy, leading to unexpected twists and turns in the game.

Euchre

When it comes to multiplayer card games, no one can deny the power of Euchre. Euchre is a classic trick-taking card game that has been captivating players for generations. This game is renowned for its simplicity and strategic depth, making it an ideal choice for gatherings and social events. Euchre is typically played with four players, divided into two partnerships. The deck is reduced to 24 cards, with the 9s through aces in all four suits. 

The objective is to win tricks and earn points, but what sets Euchre apart is the concept of “trump,” where one suit becomes more powerful than the others. This dynamic adds an element of strategy and bluffing, making every hand a thrilling challenge. Euchre’s popularity endures due to its blend of luck and skill, making it accessible to newcomers and endlessly engaging for seasoned players. 

Oh Hell 

This game is another multiplayer card game that has captured the minds of players due to its unpredictability. Oh Hell, also known as Oh Pshaw, is a trick-taking game that can accommodate a variable number of players, making it suitable for both intimate gatherings and larger gatherings. It’s often described as a game of controlled chaos, where every round presents players with a fascinating mix of calculated decisions and unexpected twists.

Oh Hell typically uses a standard deck of cards, and the objective is to predict and capture a precise number of tricks each round. What adds a tantalizing twist to the game is that the number of tricks players must take varies from round to round, creating an element of suspense and excitement. Participants must assess their hands and predict how many tricks they can win, but there’s always the risk of overestimating or underestimating, which can result in penalties.

Spades

Spades is something like the heavyweight champion of trick-taking card games. It stands out as a game of strategy, teamwork, and calculated risk that has enthralled card enthusiasts for generations. This four-player game typically played with a standard 52-card deck, is known for its fiercely competitive spirit, where partnerships must work together to outwit their opponents.

Spades is all about mastering the art of communication without speaking a word. The game revolves around a simple yet intriguing premise: players must predict how many tricks their team can take, with the added twist that spades are always the trump suit. This dynamic makes each hand a tantalizing puzzle, where players must decide when to bid big or hold back.

Crazy Eights

Crazy Eights is a card game that has the potential to make you crazy in the most delightful way possible. This game is a favorite among all ages, thanks to its straightforward rules and a healthy dose of fickleness. It’s a game that’s perfect for family gatherings, casual hangouts, or those moments when you simply want to unwind and have some fun.

The premise of Crazy Eights is as simple as it gets: players aim to be the first to get rid of all their cards. The catch? You can only play a card that matches either the suit or the rank of the top card on the discard pile, with one remarkable exception—the eights. Eights are the game changers. When played, you get to choose the new suit, adding an element of strategic choice and surprise to every round.

Cards Against Humanity Online

Cards against humanity online (via Rotten Apples on bloob.io) is a delightfully chaotic twist on the party card game you know and love—without the need to download anything. Players take turns judging while everyone else submits their funniest card combinations, all with customizable rules and settings. Want to pick your gameplay style? Choose from classic judge mode or a democratic voting system, swap out unwanted cards with a “dump round,” toggle NSFW content, adjust hand size, or decide how a match ends—whoever hits the score or round cap wins. You can even import or create your own card sets using Cardcast, making each round fresh, personal, and hilariously unpredictable.

New Google Maps updates: Immersive View for routes and other AI features

Over the past few years, Google Maps has transformed how people interact with the world with features like fuel-efficient routing and Live View to help you orient yourself when walking with augmented reality. Today with the power of AI, Google are announcing even more updates so you can confidently plan and navigate trips, make sustainable choices, and get quick inspiration for things to do.
Chris Phillips, VP & General Manager, Geo gives us the details..

Know before you go with Immersive View for Routes

Google Maps provides over 20 billion kilometers of directions every day. And with AI, we’re reimagining how you plan your trips before you go. At I/O this year, we announced Immersive View for routes, an entirely new way to preview every step of your journey — whether you’re driving, walking or cycling. This week, Immersive View for routes starts rolling out in Amsterdam, Barcelona, Dublin, Florence, Las Vegas, London, Los Angeles, Miami, New York, Paris, San Francisco, San Jose, Seattle, Tokyo and Venice on Android and iOS.

Say you want to bike along the water to the Palace of Fine Arts in San Francisco. Just request cycling directions, then tap the Immersive View preview to see your route in a stunning, multidimensional view from start to finish. You can prepare for each turn as if you were there with detailed, visual turn-by-turn directions, and use the time slider to plan when to head out based on helpful information, like simulated traffic and weather conditions. That way, you can easily avoid riding during rainy weather or heavy traffic.

All of this builds on our  work for Immersive View for places, which uses AI to fuse together billions of Street View and aerial images so you can know what a restaurant or landmark is like before you go. Now developers can also create their own immersive experiences with the launch of Photorealistic 3D Tiles in Google Maps Platform this week.

Easily understand your surroundings with Lens in Maps

Google Maps also makes it easier to understand your surroundings once you get somewhere — like if you’re exiting a subway station and need to orient yourself or if you’re scoping out a new neighborhood and need to find the nearest coffee shop. Lens in Maps (formerly called Search with Live View) uses AI and augmented reality to help you quickly acclimate yourself — whether you’re navigating a new city or discovering local hidden gems.

Simply tap the Lens icon in the search bar and lift your phone to find information about nearby ATMs, transit stations, restaurants, coffee shops and stores. In our biggest expansion of this feature yet, starting this week Lens in Maps is coming to more than 50 new cities including Austin, Las Vegas, Rome, São Paulo and Taipei.

Navigate with confidence with a more detailed map

Today, hundreds of millions of drivers depend on Google Maps’ helpful information about real-world conditions, like nearby crashes or upcoming traffic jams.

Soon, the navigation map will reflect the real world even more accurately. In addition to updated colors throughout the map, you’ll see more realistic buildings to help you better orient yourself – like if you’re driving downtown and need to understand where you are during the final stretch of your ride. And on highways, where some of the trickiest driving maneuvers often happen (like that annoying exit that requires you to quickly cross multiple lanes), you’ll see improved lane details to help you feel prepared. These updates start rolling out in the coming months in 12 countries, including the U.S., Canada, France and Germany.

In the U.S., you’ll soon see if there are HOV lanes along your route so you can make a more informed decision about how to get to your destination. And in Europe, our AI-powered speed limit information is expanding to 20 countries so you can stay safe even when it’s hard to spot speed limit signs on the road. Both features start rolling out on Android, iOS, and for cars with Google Built-in in the coming months.

Reduce charging anxiety with even more EV information

If you’re an electric vehicle driver, you may be familiar with charging anxiety. Whether you’re on a road trip, commuting to work, or heading across town, there’s nothing worse than not knowing where you can charge mid-trip.

Starting this week, building on our capabilities in cars with Google built-in, EV drivers on Android and iOS will now see even more helpful charging station information, including whether a charger is compatible with their vehicle and whether the available chargers are fast, medium, or slow to help you find the charging station that best meets your needs. And since 25% of all chargers in the U.S. are down at any given time, you can also see when a charger was last used to help you avoid wasting time heading to a broken charger. These updates start rolling out globally on iOS and Android this week wherever EV charging station information is available.

EV charging information will also be available to developers on Google Maps Platform in the Places API, so companies can show real-time EV charging station information in their websites and apps.

Find inspiration for things to do with new ways to search

Sometimes you know exactly what you want to do, but aren’t sure where to go. Search in Google Maps is evolving to give you even more answers to your questions, help you discover things to do, and find inspiration in a whole new way.

Now, when you search in Maps for specific things like the best place to find “animal latte art” or “pumpkin patch with my dog,” you’ll get photo-first results of what you’re looking for. These results are based on the analysis of billions of photos shared by the Google Maps community — all done with AI and advanced image recognition models. With this visual list of places, you can discover new spots that match exactly what you’re looking for. Just scroll through the results, tap on a photo to learn more, and navigate right there. This new way to search in Maps starts rolling out in France, Germany, Japan, the U.K. and the U.S. this week, and we’ll expand to more countries over time.

And for those times when you’re starting from scratch and have no idea what to do — like when you magically have a free weekend — you’ll soon see better-organized search results to spark your imagination. So if you’re in Tokyo, you could search for “things to do” to see thematic place suggestions like “anime”, “cherry blossoms” or “art exhibitions.” Tap on the places that interest you to learn more, and even save the options to a list if you want to check them out later. Thematic results for activities and dining roll out globally on Android and iOS in the coming weeks.

Google Maps is transforming how people explore and navigate, and AI continues to play a pivotal role in bringing how we’re building innovative experiences for people around the world. To learn more about how we use AI, check out this deep dive about how AI and imagery bring Immersive View to life. 

Electric vehicle charging points vulnerable to cyber attack

Belfast based cyber security specialist ANGOKA says developers of the UK’s fast-growing network of electric vehicle charging points could be sleep-walking into a high-risk vulnerability to hacking and cyber-attacks.  

Significant and rapid growth in the number of electric vehicle charging points is expected in the next three years. There are estimated to be more than 100,000 petrol and diesel pumps across the UK while the number of EV charging points( home and Public) stands at over 350,000 and counting.  While the growth in public charging points will grow exponentially, the risk of hacking, disabling and even weaponizing these has become an increasingly recognized problem. 

Richard Barrington, ANGOKA’s head of land mobility says the race to decarbonize and the shift to electrification goes hand in hand with digitization.  

“We need to electrify our economy but we have not fully understood the need for cyber security in this transition,” says Mr Barrington.  

“While data protection through encryption is in place to prevent the theft of financial information through credit cards and electronic payment forms, the cyber security of the actual charging points should be at the top of the agenda,” he says. 

Because EV charging points are all networked, the risk goes beyond theft of financial information or abstracting electricity. ANGOKA says the potential to engineer an attack back onto the national grid or spoof charging indicators allowing batteries to be over or undercharged means the industry must adopt the Zero Trust principles of Never Trust, Always Verify! 

“The threat landscape becomes even more extensive when you consider the bi-directional data exchange between vehicle and charging point,” says Mr Barrington, “this data exchange can be unprotected and vulnerable meaning hijacking, the introduction of malware and denial of service attacks become probable. 

ANGOKA says the responsibility of providing the cyber security to protect these from attack has fallen between the players in the supply chain, Manufacturers, Installers, operators and procurers e.g. local authorities. 

New regulations coming into force next year creates a more open market in that anyone should be able to use any charging point  irrespective of the operator.  Unfortunately greater levels of interconnectivity will lead to a widening of the threat landscape and risk potentially at national scale.  Mr Barrington. “We believe there is an approach that can address these concerns and the  EV charging sector and the motor industry must step up and take action.” 

Representatives from the automotive sectors are due to meet ANGOKA representatives in Belfast in the coming weeks in anticipation of new EV charging point regulations to be introduced next summer.  

Tech Review – Nava Bands Voyager Loop strap for Apple Watch Ultra 2

The Nava Bands Voyager loop strap for Apple Watches might look familiar to those who bought the first Apple Watch Ultra, Nava Bands has a wide range of straps that may look familiar but much cheaper than what Apple charge and a wider variety of colours and style, The Voyager Loop is one of those and my favorite so far and having has a similar band on the Apple Watch Ultra 1 I had to test out this one on the Watch Ultra 2.

There is an extra loop on this one vs what Apple offer and looks better, the strap is comfortable and easy to take on an off compared to the other Nava Band strap we tried out the Nautico band that we recently checked out. I find this strap more secure all round and again if comes in a range of colours but limited unlike the Nautico range.

This strap would suit most users and in my opinion and more comfortable and for me looks better but that is subjective the straps in all sizes again like the Nautico Band and again costing less and I feel this one is better than what Apple offers.

BUY 

Video Review

Tech Review – GAOMON PD1161 digital drawing tablet

The  GAOMON PD1161 is a digital drawing tablet with an 11.6-inch IPS display that can connect to a laptop allowing drawing on the Tablet. The kit has 8 Shortcut customised keys and 5 Menu Keys on the tablet. The kit is solid to feel with grips to prevent slipping and working tilted allowing for E-learning, digital drawing, animation, sketching, photo editing, 3D sculpting etc The tablet is small and portable, making it easy to carry around.

Supplied Accessories

 

Setup:

The connection required the integrated cables connected to various ports in the Tablet and laptop. This looks confusing in the number of cable ports to connect but works well once connected.

Installation software – This is downloaded free from www.GAOMON.net/download

Screen calibration is recommended on initial setup and pen pressure test

The software download, setup, and calibration worked well with no issues observed allowing the tablet to be placed flat on a surface or at an angle ( Bracket not supplied for angle use ) Once connected to the Laptop the option to duplicate / Extend the display is available.

Manufacturer:

GAOMON was started in 2011 with a core area in pen tablets, pen displays, and manual tracing boards with a sales network spanning across more than 50 + countries and regions for their ten digital products used in various fields.

Comparison :

GAOMON Multi-Size Graphic Drawing Tablet with screen and pen for selection

Warranty

The warranty is disappointing in one year and I would have liked to see more on the warranty for a quality product.

Conclusion

The drawing table is listed as suitable for beginners and certainly requires minimal technical use to set and use.  The software installation & calibration on a laptop worked flawlessly we have reviewed similar tablets in the past here and this one comes out tops with ease of use. 

The 11.6 inch IPS screen display & 1920*1080 Resolution gave excellent picture quality allowing a high zoom option to get into detailed drawing close up. The 60-degree tilt Function allows for multiple uses to ensure comfortable hand movement.

The 8  Customisable  Shortcut keys and 5 Menu Keys are excellent allowing modification of the colorimetry, brightness, contrast, etc

Most users will notice the Battery-Free Pen which allows painting similar to using a standard pen and is compatible with the major drawing programs: Adobe Photoshop, Illustrator, Clip Studio, Lightroom, Sketchbook Pro, Manga Studio, CorelPainter, FireAlpaca, OpenCanvas, Paint Tool SAI2, Krita etc. The tilt, drawing pressure, and calibration option allow for easy use of the pen which feels like a standard pen, and the 1920*1080 display is clear. This is an easy-to-use, detailed clear tablet/pen use

Features

  • [11.6 Inch Work Area] GAOMON PD1161 drawing tablet comes with 11.6 inch IPS screen display & 1920*1080 Resolution, which can make you draw intuitively. Richer Color Gamut—178° Viewing Angle & 72% NTSC & 16.7 million display colors. Suitable for both right and left-hand users.
  • [8192 Battery-Free Pen] AP50 with 266PPS & 8192Levels & 5080LPI, you could have a comfortable painting and natural drawing feeling. Needs no charge or battery, which is environmentally friendly.
  • [Support Tilt Function] 60 Degrees Tilt Function, Simply tilt to add shading to your creation and enjoy smoother and more natural transitions between finest sketches and lines.
  • [Customisable Express Keys] 8 Shortcut keys and 5 Menu Keys. There are 8 shortcut keys on the left side, you can set 8 press keys based on your preference, which not only saves your time but also enhance your creativity.[5 Menu Keys]—- AUTO/+ /- /MENU/POWER. They are placed on the left side of the tablet, which allows you to easily adjust the colorimetry, brightness, contrast, etc.
  • [OS Support& Art Program Compatibility] GAOMON PD1161 drawing pen display must be used with a computer. Support Windows 7/8/8.1, Mac OS 10.12 or later; Compatible with most drawing programs: Adobe Photoshop, Illustrator, Clip Studio, Lightroom, Sketchbook Pro, Manga Studio, CorelPainter, FireAlpaca, OpenCanvas, Paint Tool SAI2, Krita and so on; It’s ideal for E-learning, digital drawing, animation, sketching, photo editing, 3D sculpting, and more

BUY ON AMAZON 

Buy Direct

Video Review