In a blast from the past, the iconic Commodore 64 is back, not as a retro console, but as a fully functional PC. The Commodore 64x, unveiled recently, marries the classic C64 design with modern PC components, offering a unique blend of nostalgia and functionality. The C64x sports the familiar beige case and keyboard of the original Commodore 64, but inside, it's a different beast. Powered by an Intel Core i5 processor and featuring 8GB of RAM, the C64x can handle modern computing tasks with ease. It also includes a 512GB solid-state drive for fast storage and an Nvidia GeForce GTX 1650 graphics card for smooth visuals. "We wanted to create a machine that would appeal to both retro enthusiasts and modern PC users," said a spokesperson for the company behind the C64x. "The C64x is a conversation starter, a piece of computing history that can also handle your everyday computing needs." The C64x comes with Commodore OS Vision, a Linux-based operating system designed to evoke the look and feel of the original Commodore 64's operating system. It also includes a suite of pre-installed software, including a web browser, office suite, and games. The C64x is available for purchase (if you can get one - out of stock everywhere) with prices starting at $AU1000 While it's not the cheapest PC on the market, the C64x is sure to appeal to those who want a unique and stylish computer that pays homage to one of the most iconic computers of all time. This could be your new replacement for your old Windows 10 PC. Ep297 Image Source from Supplier: https://www.mini-itx.com/
0 Comments
Vishing is particularly effective because it plays on our trust in voice communication. Hearing a human voice, even a recorded one, can create a sense of legitimacy that's harder to replicate in other forms of phishing. A typical vishing scam involves a phone call or voicemail message from someone claiming to represent a reputable organization, such as the IRS, your bank, a credit card company, or a tech support provider. They might use various pretexts to pressure you into revealing sensitive information:
These scammers often use sophisticated techniques to make their calls appear legitimate. They might use "spoofing" technology to display a familiar phone number on your caller ID, such as your bank's or a government agency's. They might also use pre-recorded messages that sound professional and urgent. The key to vishing is creating a sense of urgency and fear. Scammers want to pressure you into acting quickly without giving you time to think critically. The consequences of falling victim to a vishing scam can be severe, including:
Protecting yourself from vishing requires vigilance and a cautious approach to unsolicited phone calls. Here are some essential tips:
By staying informed and practicing these simple precautions, you can significantly reduce your risk of becoming a victim of vishing and protect your valuable personal information. Ep297 Image created by AI
Here's how to add a phone number to your Google/Gmail account:
Ep297 Image Source: Screenshot taken by MITE Radio
Your Google account, the key to your Gmail, holds a wealth of valuable information, making it a prime target for hackers. Protecting this information is crucial, and providing Google with your phone number is a key part of that protection. While privacy concerns are valid, from a security standpoint, the benefits of providing your phone number generally outweigh the risks. Google recommends using a phone number that:
In other words, your primary smartphone is the ideal choice. Using a shared or infrequently accessed number can compromise the verification process. Providing your phone number enables several important security features:
By providing Google with your phone number, you are significantly strengthening your account security and making it much harder for unauthorized individuals to gain access. While privacy concerns are understandable, the security benefits are substantial. Ep297 Image created by AI
Ring is a company that specializes in home security and smart home devices, most notably known for its video doorbells and security cameras. Video Recording: Ring cameras record video footage of their surroundings, capturing events like motion detection, doorbell rings, or live views. Motion Detection: Built-in motion sensors trigger recordings and send notifications to your smartphone when activity is detected. Two-Way Audio: Many Ring cameras feature two-way audio, allowing you to speak to and hear visitors through the Ring app, even when you're not home. Night Vision: Infrared LEDs provide clear video footage even in low-light or nighttime conditions. Wi-Fi Connectivity: Ring cameras connect to your home's Wi-Fi network, allowing you to access live feeds and recorded videos remotely through the Ring app. Cloud Storage: Recorded videos are typically stored in the cloud (with a Ring Protect subscription), allowing you to review past events. The Ring outdoor camera is a pretty neat bit of kit at $AU99. Totally wireless and portable with battery lasting 3 months between charges. There is a wired option and a solar option. Ep296 Image Source: ring.com
Smishing is a growing concern because people often treat text messages with less suspicion than emails. We're used to receiving legitimate updates and notifications via text, making it easier for scammers to blend in. A typical smishing attack involves a text message designed to create a sense of urgency or excitement. You might receive a message claiming you've won a prize, alerting you to a problem with a delivery, warning of suspicious activity on your bank account, or even offering a limited-time discount. These messages often include a link that, when clicked, leads to a malicious website. The goal of smishing is the same as phishing: to trick you into giving up valuable information. These links can take you to fake websites that mimic legitimate businesses, prompting you to enter your login credentials, credit card details, or other personal data. These fake websites are meticulously crafted to look authentic, often using logos and branding stolen from real companies. Once you enter your information, it goes directly to the scammers, who can then use it for fraudulent purposes. But the danger doesn't stop with fake websites. Some smishing attacks can also install malware directly onto your phone. This malware can track your activity, steal your data, or even take control of your device. Here are some common examples of smishing attacks:
Protecting yourself from smishing requires vigilance and a healthy dose of skepticism. Here are some key steps you can take:
By being aware of the risks and following these simple precautions, you can significantly reduce your chances of falling victim to a smishing attack and protect your personal information. Ep296 Image created by AI
Have you tested the Android Find My functionality? Better to know how to use it before you misplace or lose your phone. Google: “Find My Device” Sign in to your Google Account All your devices linked to that account will show up on a map Tap on your phone and it will zoom in to the location. If the device is online you can:
Ep296 Image Source: Screenshot taken by MITE Radio
Microsoft is making it even simpler for Windows 10 users to make the jump to Windows 11. The company has begun rolling out Windows 11 version 24H2 as a free upgrade to eligible Windows 10 PCs. According to a Microsoft support page, "Windows 11, version 24H2, also known as the Windows 11 2024 Update, is now broadly available." The rollout is being expanded to include eligible devices running Windows 10, version 22H2, starting this week. This move signals Microsoft's strong push to encourage wider adoption of Windows 11, especially as the end of support for Windows 10 approaches. This initiative also coincides with the recent announcement that the 24H2 update is now mandatory for Windows 11 users, effectively combining two goals into one. To determine if your Windows 10 PC qualifies for the free Windows 11 upgrade, you'll need to ensure it meets certain minimum hardware requirements, most notably the presence of a TPM 2.0 chip. Here's how to check your eligibility:
It's important to note that the update might not appear immediately, as the rollout is being conducted in phases. It may take a few days for it to reach your specific device. If you're running Windows 10 Home, you'll be upgraded to Windows 11 Home. Upgrading to Windows 11 Pro will require a separate purchase. This free upgrade offer comes with a deadline. Microsoft will officially end support for Windows 10 on October 14, 2025. After this date, Windows 10 PCs will no longer receive crucial security updates, and compatibility with Office 365 apps may eventually be affected. While you'll still be able to use your Windows 10 PC after the end-of-life date, doing so will significantly increase your vulnerability to malware and other security threats. Security experts strongly advise upgrading to Windows 11 to maintain a secure computing environment. If upgrading isn't an option, you can explore paying for extended Windows 10 support or consider switching to a different operating system altogether. This free upgrade opportunity offers a compelling incentive for Windows 10 users to transition to the newer operating system before the support deadline arrives. Ep296 Image Source: https://www.microsoft.com/en-us/software-download/windows11
SwitchBot, known for its diverse range of smart home gadgets, offers a clever solution for automating your curtains: the SwitchBot Curtain 3. This small, ingenious device brings a touch of modern convenience to a traditionally manual task, making your home a little bit smarter. The SwitchBot Curtain 3 is designed to be easily installed on existing curtains. The relatively compact device attaches between the first and second curtain rings, making installation toolless and adaptable to various curtain styles. Once installed and configured, the motor takes over, automatically opening and closing your curtains. Control is flexible and convenient. You can operate the curtains through the SwitchBot app on your smartphone, or use voice commands via Alexa or Google Assistant. This allows for seamless integration with other smart home devices and routines. Beyond simple open and close commands, the SwitchBot Curtain 3 offers automation features based on time of day or other conditions. You can schedule your curtains to open automatically in the morning to wake you with natural light or close at sunset for privacy. For iPhone users familiar with iOS Shortcuts, the SwitchBot can be integrated into custom automations for even more complex routines. Priced at $US89, the SwitchBot Curtain 3 comes in two variants to accommodate different curtain designs. With over 1,200 reviews and a 4-star rating on Amazon, the product has proven popular among users. When paired with blackout curtains, the SwitchBot Curtain 3 can significantly improve sleep quality by ensuring complete darkness at night and providing a gentle, natural wake-up call in the morning. It's a simple yet effective way to enhance your sleep and bring a touch of automated convenience to your daily routine. Ep295 Image Source: switch-bot.com
We often hear about cyberattacks targeting big businesses, but home computer users are increasingly in the crosshairs of a particularly dangerous type of email scam: spear phishing. Unlike the generic phishing emails that cast a wide net, spear phishing is a highly personalized attack designed to trick specific individuals like you. Imagine receiving an email that seems to be from a close friend, mentioning a shared inside joke or referencing a recent social media post. It might contain a link to a funny video or an article you'd supposedly be interested in. This is the hallmark of spear phishing: meticulous research and personalized content designed to lower your guard. Spear phishing at home is especially concerning because people often feel more relaxed and less suspicious when checking their personal email. Instead of sending the same generic message to thousands of people, spear phishers do their homework. They might scour your social media profiles, online forums, and even family websites to gather information about your interests, hobbies, family members, and online activity. This research allows them to create emails that appear incredibly legitimate. For example, a scammer might discover through your Facebook profile that you're a fan of a particular sports team. They could then send you an email seemingly from a fellow fan, offering "exclusive" tickets to an upcoming game. The email, of course, contains a link to a fake website designed to steal your login credentials, credit card information, or even install malware on your computer. Another common tactic involves exploiting family connections. A scammer might pose as a distant relative or a friend of a family member, using information gleaned from social media to establish a sense of familiarity. They might claim to be in a financial emergency or offer a "too good to be true" investment opportunity. The danger of spear phishing lies in its personalization. Because the emails seem so relevant and trustworthy, home users are more likely to click on links, open attachments, or share personal information without thinking twice. The consequences of falling victim to spear phishing at home can be devastating:
Here's how you can protect yourself and your family: (cue the broken record)
By staying informed and practicing good online habits, you can significantly reduce your risk of falling victim to this increasingly prevalent threat. Ep295 Image created by AI
There are many keyboard shortcuts for Windows 10 and 11 and these are a few that you should remember. Useful if you get into trouble and need to close a program of screen that won’t go away. CTRL + W: Closes the selected active window ALT + F4: Closes the selected active window (repeatedly press to shutdown Windows) Windows Key + L: Logs you out to the startup screen Ep295 Image created by AI
The Magic Editor goes beyond basic adjustments like brightness and contrast. It uses generative AI to understand the content of your photos, enabling you to make more advanced edits, such as:
Using the Magic Editor is designed to be intuitive and user-friendly:
The Magic Editor is designed to democratize advanced photo editing, making it accessible to everyone, regardless of their technical skills. It removes the need for complex photo editing software and allows users to achieve professional-looking results with minimal effort. While some might express concerns about the potential for misuse or manipulation of images, Google emphasizes responsible use and provides tools to help users understand when an image has been significantly altered. The Magic Editor represents a significant leap forward in AI-powered photo editing, offering a glimpse into the future of image manipulation and creative expression. It's currently rolling out to select users and devices, with wider availability expected in the future. Ep294 Image Credit: Google Photos
Romance scams exploit people's desire for connection and companionship. Scammers create fake online profiles on dating apps and social media platforms to lure victims into romantic relationships, ultimately with the goal of financial gain. The increasing sophistication of AI tools has made these scams even more convincing and difficult to detect. How Romance Scammers Operate:
The Role of AI: AI has significantly enhanced the effectiveness of romance scams:
Protecting Yourself from Romance Scams:
If you suspect you've been targeted by a romance scammer, report it to the platform where you met them and to the appropriate authorities. Remember, it's important to protect yourself and your finances by being cautious and skeptical of online relationships, especially those that involve financial requests. Ep294 Image created by AI
For cyclists, saddle soreness is an all-too-familiar foe. That nagging discomfort, numbness, or even pain experienced after long rides can turn a pleasant cycling experience into an ordeal. Now, a new bicycle seat called the vabsRider is aiming to change all that, promising to banish saddle soreness for good. The vabsRider isn't just another padded saddle. It features a unique split-seat design, consisting of two separate, independently moving padded sections. This approach directly addresses the root cause of saddle discomfort: concentrated pressure on the sit bones. Traditional bicycle seats force the rider's weight onto a small area of the pelvis, the sit bones. As you pedal, your legs move up and down and rotate at the hips, creating friction and pressure points. The vabsRider's split design allows each side of the saddle to move in conjunction with each leg's natural motion. This "virtual axis" movement, centered around the hip joint, is the key to its comfort. By allowing independent movement, the vabsRider effectively distributes pressure away from the sit bones and onto the larger surface area of the femurs (thigh bones). This more even weight distribution minimizes pressure points, reducing friction and chafing, and ultimately leading to a more comfortable ride. The benefits of this design are clear:
While the vabsRider isn't a "smart" device in the sense of incorporating electronics or data tracking, its ingenious mechanical design offers a smart solution to a common cycling problem. It's a testament to the power of biomechanics and ergonomic design in improving the cycling experience. For cyclists tired of saddle soreness, the vabsRider offers a promising new approach to comfortable riding. Smart but not tech smart. Ep294 Credit: https://www.ataraxybsc.com/
Just for completeness: The Turing Test is a test of a machine's ability to exhibit intelligent behavior equivalent to, or indistinguishable from, that of a human. 1 It was introduced by Alan Turing in his 1950 paper "Computing Machinery and Intelligence," which explored the question "Can machines think?" For years, CAPTCHAs have been the internet's gatekeepers, presenting users with distorted text, identifying objects in images, or solving simple math problems to prove they're human. But a new form of CAPTCHA is becoming increasingly common: the simple "I'm not a robot" checkbox. While it might seem too easy, there's a lot more going on behind the scenes. This new approach, often referred to as "No CAPTCHA reCAPTCHA," relies heavily on analyzing user behavior. When you click that seemingly simple checkbox, the system is secretly observing a range of factors to determine if you're a human or a bot:
By combining these factors, the CAPTCHA system can make a highly accurate determination about whether a user is human or a bot, often without requiring any further interaction. If the system is confident that you're human, you'll simply be allowed to proceed. However, if it detects suspicious behavior, it might present you with a more traditional CAPTCHA challenge, such as identifying objects in images. This new approach offers a much smoother user experience, as most users can simply click the checkbox and move on. It also makes it more difficult for bots to bypass the system, as they need to mimic not only the click itself but also a range of complex human behaviors. While no system is foolproof, this new type of CAPTCHA represents a significant advancement in online security, making it easier for humans to access websites while keeping bots at bay. Ep294 Image created by AI
The proposed deal would involve ByteDance, TikTok's parent company, retaining a minority stake, while Oracle would take the lead in overseeing the app's algorithm, data collection, and software updates. NPR reports that the White House is involved in negotiating the deal, although President Trump later denied direct collaboration with Oracle. He did however acknowledge speaking with numerous interested parties regarding a potential acquisition of TikTok, stating a decision would likely be made within the next month.
Other parties reportedly interested in acquiring TikTok include Elon Musk, real estate billionaire Frank McCourt, and Shark Tank personality Kevin O’Leary. President Trump had previously expressed a preference for Oracle co-founder Larry Ellison to purchase the platform. Oracle already plays a significant role in TikTok's infrastructure, providing a large portion of its server network. A potential acquisition could see Oracle significantly enhance its involvement, "effectively monitoring and providing oversight with what is going on with TikTok," according to an NPR source who wished to remain anonymous. The source also indicated that a key objective of the agreement is to "minimize Chinese ownership" of the platform. Microsoft's reported role in the discussions remains less clear, described only as being "engaged in the talks." Microsoft was also involved, along with Oracle and Walmart, in a previous attempt to take over TikTok in 2020, which Microsoft co-founder Bill Gates famously described as a "poisoned chalice." Walmart is reportedly not participating in the current negotiations due to concerns about the app's valuation. This news follows an executive order granting TikTok and other companies a 75-day reprieve from enforcement actions related to requirements for ByteDance to divest from TikTok in the US. The president had earlier suggested the possibility of a "joint venture" with the US owning 50% of the company. Microsoft has declined to comment on the reports. Reaching out to Oracle, TikTok, and the White House for comment did not immediately result in a response. This potential acquisition highlights the complex intersection of technology, business, and international politics surrounding TikTok and its future. Ep 295 Image source: MITE Radio. Sharing and editing welcome. The recent legal rollercoaster surrounding TikTok in the US has created a truly bizarre marketplace on eBay: used iPhones with the app pre-installed are being listed for prices ranging from $2,000 to a staggering $50,000. It seems some sellers think they've struck gold – or at least TikTok gold – believing they've cornered the market on pre-ban digital relics. This comes after a period of legal uncertainty that could rival a soap opera plot, including a Supreme Court ruling, a brief digital blackout, and a subsequent executive order that basically said, "Oops, never mind." To recap the legal tango: The US Supreme Court upheld a TikTok ban, leading to its removal from app stores and a brief period where the app went dark, leaving millions of teens in a state of existential dread. A subsequent executive order then suspended enforcement of the ban, essentially saying, "Just kidding! You can have your dance videos back." However, legal experts have disputed the validity of this order, suggesting that companies disregarding the original ban could still face substantial fines. This legal limbo created a window of opportunity for opportunistic sellers on eBay – who apparently thought they could sell digital air for a premium. Well after the ban (however brief it was), prices on ebay skyrocketed, with some "Buy It Now" listings reaching as high as $50,000 for an unlocked iPhone 12 Pro Max with TikTok. That's enough to buy a brand new car, a down payment on a house, or perhaps, several thousand hours of therapy to cope with the loss of TikTok (and the realization you just spent $50,000 on a used phone). Many other listings fell within the $2,000 to $5,000 range, significantly above the typical market value for these devices. You could practically buy a brand new phone and hire a professional TikTok dancer to teach you all the trends for that price. Settle down people, you can still download the app. It might just be a bit more tricky. Ep293 Image created by AI
Traditional phishing often relies on generic emails or messages with obvious red flags like poor grammar and spelling. However, AI enables scammers to create context-specific messaging that mimics the writing style and tone of trusted organizations, making the communication appear legitimate. This personalization significantly increases the chances of unsuspecting victims clicking on malicious links. How AI Enhances Phishing Attacks:
The Consequences of Clicking a Phishing Link: Phishing links typically lead to one of two outcomes:
Protecting Yourself from Phishing:
Ep293 Image created by AI
Depending on your device, you might also find quick access to features like Clear Calling (which reduces background noise during calls), Live Caption (which automatically generates captions for audio), and Spatial Audio (for a more immersive sound experience). This expanded menu also allows you to manage audio output to connected Bluetooth devices or cast audio to other screens, all from one convenient location. It's a powerful feature many of us overlook, so take a moment to explore it and unlock a new level of audio control on your phone. Ep293 Image Source: Screenshot taken by MITE Radio
For Samsung users, this is likely a welcome change. Bixby, while improving over time, never quite reached the level of functionality and widespread adoption of competitors like Alexa, Google Assistant, or Siri. While Bixby will still be available as an app for dedicated users, the vast majority will now have access to Google's more advanced AI. This switch is an even bigger win for Google. After being caught off guard by the rapid rise of ChatGPT, Google has doubled down on its AI efforts, with CEO Sundar Pichai reportedly believing that Gemini has now surpassed ChatGPT in capabilities. Google aims to reach 500 million Gemini users by the end of the year, and this partnership with Samsung could significantly accelerate that goal. By making Gemini a front-and-center feature on millions of Samsung Android phones—some of the most popular in the world—Google gains access to a massive new user base. This increased usage provides invaluable data and feedback, which will further refine and improve Gemini's performance. It's a classic network effect: more users lead to better data, which leads to a better product, which attracts even more users. Google's current advantage lies in Gemini's extensive access to information and a vast user base. While other AI assistants like ChatGPT, Claude, Grok, and Copilot have powerful underlying models and even similar multimodal capabilities, they lack the same level of distribution. These alternatives require users to actively download, install, and open separate apps, while Gemini is now integrated directly into the core functionality of millions of devices. This deep integration gives Gemini a significant edge. It can perform tasks across multiple apps, seamlessly transferring information between them—for example, pulling data from an email and inserting it into a text message. Due to the architecture of iOS and Android, other assistants currently can't match this level of integration. Google is also integrating Gemini across its broader ecosystem, from Workspace apps like Gmail and Docs to platforms like YouTube and Drive. This pervasive presence ensures that users encounter and interact with Gemini in various contexts throughout their daily digital lives. While all current AI assistants, including Gemini, still have limitations and occasional errors, Google's strategy of widespread distribution is a powerful one. By placing Gemini in front of a massive audience, Google gains the data and feedback necessary to rapidly improve its AI, potentially solidifying its position as a dominant force in the rapidly evolving world of artificial intelligence. Ep293 Image Source: Screenshot taken by MITE Radio
The New York Times Games app is a popular destination for word puzzle enthusiasts, offering a variety of engaging games that provide a daily mental workout. The key strength of the NYT Games app is its diverse selection of puzzles, catering to different preferences and skill levels. Some of the most popular games include:
Why People Enjoy NYT Games:
Comparison to Other Daily Games: Individual games like Wordle or smaller crosswords can be fun for a while, but they might lose their appeal after a few weeks or months. The NYT Games app addresses this issue by offering a rotation of different games, keeping users engaged over a longer period. Overall: The NYT Games app is a well-regarded platform for word and logic puzzles. Its variety, daily challenges, and connection to a respected brand make it a popular choice for those seeking a daily dose of mental stimulation. While some users might prefer individual puzzle apps, the NYT Games app provides a convenient and comprehensive package for puzzle enthusiasts. Ep292 Image Source: Screenshot taken by MITE Radio
The speed and efficiency of AI allow scammers to create highly personalized and targeted campaigns, making their pitches even more compelling. Some common tactics include:
Protecting Yourself from AI-Driven Investment Scams: It's crucial to exercise caution and skepticism when presented with investment opportunities, especially those that seem too good to be true. Here are some key steps to protect yourself:
The use of AI in investment scams represents a significant escalation in online fraud. By staying informed, exercising caution, and following these protective measures, you can significantly reduce your risk of becoming a victim. Ep292 Image created by AI
Imagine you're in London and want to know how much £5 is in AU dollars. You open the Calculator, turn on conversion, select British pounds as the starting currency and AU dollars as the target currency, and then type in "5". The calculator will instantly tell you the equivalent amount in AU dollars. 1. Open the Calculator app: Find the Calculator app on your iPhone, iPad, or Mac and open it. 2. Enable Conversion:
3. Choose Currencies: Once conversion is enabled, you'll see default currencies at the top. Tap on one of them to bring up a full list. Select the currency you want to convert from and then the currency you want to convert to. 4. Enter the Value: Enter the amount you want to convert in either of the fields. The calculator will instantly show the converted value as you type. Key things to remember:
This feature is a quick and convenient way to handle currency conversions without needing a separate app or website. Ep292 Image Source: Screenshot taken by MITE Radio
Microsoft has announced it will discontinue support for its Microsoft 365 apps on Windows 10 starting October 14, 2025, aligning with the operating system's own end-of-life date. While the apps will continue to function after this date, Microsoft will cease providing updates, including security patches and new features. This means users may encounter performance issues, reliability problems, and increased vulnerability to security threats over time. What This Means for Windows 10 Users: According to Microsoft's support page, using Microsoft 365 apps on Windows 10 after October 14, 2025, could lead to "performance and reliability issues." The company strongly recommends upgrading to Windows 11 to maintain full functionality, security updates, and access to the latest features. Alternatives for Windows 10 Users: If upgrading to Windows 11 isn't an option (due to hardware limitations or other reasons), users have a few alternatives:
The Push for Windows 11: Microsoft has been actively encouraging Windows 10 users to migrate to Windows 11, even using full-screen prompts within Windows 10 itself. However, many PCs that currently run Windows 10 don't meet Windows 11's stricter hardware requirements, making a direct upgrade impossible for some users. Extended Security Updates (ESU) for Windows 10: For users who cannot or choose not to upgrade to Windows 11, Microsoft is offering an Extended Security Update (ESU) program. This program provides security updates for Windows 10 for an additional year (up to 2026) for a fee of $30. Businesses can purchase up to three years of extended support. This means that while regular support ends in 2025, paying for ESU will keep your Windows 10 machine protected against known security vulnerabilities for a limited time longer. Microsoft's Perspective: Microsoft executives have emphasized the importance of upgrading to Windows 11, suggesting that PCs will be a key technology refresh for many in 2025. The Bottom Line: Windows 10 users need to consider their options before October 14, 2025. Upgrading to Windows 11 is the recommended path for continued support and access to the latest features. However, alternatives like web apps, free office suites, and the standalone Office 2024 package are available for those who cannot upgrade. The ESU program offers a paid option for continued security updates on Windows 10 for a limited time. Ep292 Image Source: https://www.microsoft.com/en-au/software-download/windows10ISO
Here’s a gadget that never made it - Effie the drying and ironing robot. Effie was a domestic ironing machine designed to automate the chore of ironing clothes. Effie was designed to take damp clothes directly from the washing machine and dry and iron them automatically.
…and Effie had wheels, making it easy to move and store when not in use. Rumor has it, the Effie design concept was on-sold to a large appliance manufacturer and with the latest advancements in AI, I think we will see it reappear in the near future. Ep291 Image Source: helloeffie.com
|
AuthorDelve into the world of MITE Radio through our captivating blogs. From music and tech to community news, our articles offer fresh perspectives and behind-the-scenes glimpses. Stay informed, connect with our community, and explore MITE Radio in a new way today! Archives
June 2025
Categories
All
|