Tanglewood Java TWJP Review

If you’ve never played a parlor guitar like the Tanglewood Java TWJP, you’ll likely be struck by how small, narrow, and super-light it feels. You might also be surprised to learn that in the 1880s, a guitar of its proportions actually would have been considered large.

By the early mid-20th century, guitar was becoming more common in live ensembles, making big, loud guitars like the dreadnought a necessity and, in time, the most popular acoustic guitar design ever. But as sound-reinforcement technology makes an acoustically loud guitar less important on stage, the tone potential of the parlor guitar has been re-examined.

There are plenty of stunning parlor options at the high end of the market by Bedell, Bourgeois, Collings, Martin, Santa Cruz, and others. Now those guitars are inspiring offerings at the opposite end of the price spectrum. The Java TWJP is a fine example of this trend. It’s designed in England and made in Indonesia, and references both 19th-century instruments and modern boutique flourishes. If you’re looking for a small, affordable acoustic that generates unique acoustic tones and textures, this cool, compact instrument might be just the ticket.

The low-end warmth is nice counterpoint to the guitar’s punchy midrange focus, which lends itself well to old-time fingerpicking styles like country blues and ragtime.

Wooden Tangents
One of the first things sharp-eyed tonewood connoisseurs will notice about the Java TWJP is the unusual selection of woods used for its back and sides. The back is built from three pieces, like a Martin D-35. But instead of a traditional tonewood, like rosewood or mahogany, the centerpiece is mango—a pale-colored wood with spalted figuring. The two outer pieces, also dramatically figured, are amara, which looks more like rosewood. Amara makes up the guitar’s sides as well.

The top is built from solid cedar, which is a fairly conventional tonewood, but one that’s more common on nylon-string guitars and boutique steel strings. And then there are the tasteful wooden flourishes that lend an organic classiness to the instrument. Instead of the usual plastic binding, Tanglewood uses mahogany binding on its body and fretboard. There’s also a mango heel cap, and the slotted headstock lends a touch of old-world elegance.

The build quality of inexpensive guitars seems to be continuously improving these days, and the Java TWJP shows how nicely built an affordable offering can be. Though the fretwork isn’t perfect—there’s a little roughness at the edges—it’s certainly neat enough. The kerfing and X-bracing appear tidily glued, and the polyurethane finish is smoothly buffed, without any obvious visual defects.


Solid cedar top. Nice quality for the price. Punchy output. Cool tones.

Bass response could be better; not necessarily appropriate for heavy-handed strummers.


Playability/Ease of Use:




Tanglewood Guitars Java TWJP

Modern Moves
The Java TWJP is a pleasure to play, with a neck that should appeal to a wide range of players and hand sizes. The C-shaped, nato neck is of moderate girth. At 43 mm (about 1.69″), the nut width is narrower than the fashionable-for-fingerstylists 1.75″. But it definitely feels spacious and is a good fit for players transitioning from the electric guitar to the acoustic. The guitar has a plastic nut and compensated saddle, instead of the traditional and more expensive bone, but the intonation is perfectly precise. The open-geared tuners, meanwhile, manage a vintage appearance while delivering smooth, accurate, modern performance.

Moves to the Middle
Like most folks, I’m accustomed to playing a larger-bodied guitar with a more traditional tonewood mix (in my case, an Orchestra Model with an Adirondack spruce top and rosewood back and sides), so at first I was a little underwhelmed by the projection of the Java. But it certainly didn’t take long for me to appreciate its abundant charms.

The Java’s diminutive size isn’t the only factor in its unique tone makeup. Neck and body meet at the 12th-fret rather than the 14th. Most players and luthiers assert that this configuration improves bass resonance by moving the bridge closer to a sweet spot near the center of the top. And indeed the Java’s voice has a hint of warmth and sweetness that you could probably link to the 12-fret design as well as the cedar top. The low-end warmth is nice counterpoint to the guitar’s punchy midrange focus, which lends itself well to old-time fingerpicking styles like country blues and ragtime. And while the midrange is certainly the more powerful voice of the two, there is enough balance to create nice separation between notes. When I let a chord ring out, especially one that included a combination of fretted notes and open strings, I was impressed with the sustain and detail.

The Verdict
There are some inherent drawbacks that come with a guitar the size of the the Java TWJP—at least if you’re accustomed to the power of a dreadnought or orchestra model. Heavy strumming with a pick can induce a midrange-y wash (though it’s easy to imagine this sound making a cool rhythm track for more boisterous roots rock, country blues, or even gypsy jazz). And for many players, the lack of bass output will sound foreign and feel odd. But whether you’re new to the acoustic guitar or seeking more uncommon acoustic tones, Tanglewood’s Java TWJP has a lot to recommend itself. It pairs an old-school voice with modern reliability and build quality, and it’s a whole lot of fun to play. If you can work the lack of low-end punch into your sound, this little guitar can open up a world of unique and distinctive acoustic colors.


The best Mac antivirus software 2017

One of the following statements isn’t true:

  • Macs don’t get viruses
  • Ed Sheeran’s Galway Girl is a great song
  • TV presented Bob Holness played the ax solo in Baker Street

Did you spot it? That’s right: they’re all bobbins. But as far as Mac users are concerned, the first statement has a corollary: while Macs can get viruses, most don’t. We should probably explain.

Do Macs get viruses?

Yes and no. Mac viruses do exist, but it’s very hard for them to spread. OS X and macOS are based on the Unix operating system, which is sandboxed. That means it’s very difficult for viruses to do any damage. Think of them as locked in a little box from which they can’t escape no matter how hard they try.

Not only is a Mac much more difficult to hack or compromise than a Windows PC, but the relative obscurity of Macs means that even if a criminal does find a vulnerability to exploit, it’s a lot more effort to attack far fewer computers. That means Macs benefit from security by obscurity; the baddies target the more common and potentially lucrative Windows machines instead.

Mac users were spared the WannaCry ransomware that devastated Windows systems, but Apple devices have experienced other malware attacks

That’s great for Mac users, of course, but it’s also meant an entire generation of people believing that Macs don’t get malware of any kind. Unfortunately, Macs can and do, so when malware affecting Macs does appear or a popular Mac app gets bundled with a trojan, users are completely unprepared.

For example, Mac owners might have been spared the hassle of ransomware app Wannacry/WannaCrypt in May 2017, which only targeted Windows devices, but 7,000 Macs were infected with similar malware in 2016.

Ultimately, if you use a Mac, you need to consider whether the (so far, fairly remote) risk of infection is worth sacrificing performance, money or both.

What are the biggest security risks to Macs?

The bad guys’ favourite malware is currently ransomware – a type of app that locks up the victim’s computer and only unlocks it if a ransom is paid. And as some victims have discovered, it turns out that you just can’t trust criminals: people who did pay up found that they were asked to pay again, or that their card details were copied and used.

Ransomware made it to the Mac in 2016, when the KeRanger trojan was discovered in the Transmission BitTorrent client. It’s believed that the infection happened through compromising the Transmission website and replacing the real DMG download with an infected one. Some 7,000 Macs are believed to have been infected.

The readme file included with the KeRanger trojan, telling the user that their files have been encrypted and will only be released for a ransom of one Bitcoin

The fact that KeRanger generated so many headlines underlines how unusual such malware actually is: nobody holds the front page when a new Windows vulnerability is discovered. The reality is that unless you’re exceptionally unlucky, if you keep your Mac up to date, don’t download cracked software, don’t mess with OS X’s default sandboxing settings, don’t believe pop-ups that tell you to upgrade Flash and don’t click on phishing or other fraudulent emails then you’re likely to remain perfectly safe.

That may not remain the case forever, though, and Apple has been accused of reacting too slowly when genuine threats are discovered. So what can you expect from Mac antivirus software?

Mac antivirus: which is best at detecting threats?

The excellent AV-TEST regularly puts anti-virus programs through their paces, and their most recent tests took place in July 2017 on macOS Sierra. They tested two key areas: how well the packages detected Mac-specific threats, and how well they protected against Macs in mixed-OS environments being hijacked to spread Windows malware.

For Mac malware, four packages achieved 100% detection without false positives:

  • Bitdefender
  • Intego
  • Kaspersky
  • Norton

The next four achieved between 99.5% and 98.4% without false positives:

  • Trend Micro
  • ClamXav
  • ESET
  • Sophos

The worst performer was MacKeeper, with 85.9% detection.

In mixed operating system environments, five programs achieved 99% detection of Windows threats:

  • Bitdefender
  • ESET
  • Kaspersky
  • Sophos
  • Trend Micro

Mac antivirus: what’s the effect on performance?

Most of us believe that anti-virus software has a negative effect on performance, but chances are it’s much less negative than we think: in their tests, AV-Test found that there was no measurable performance drop when using ClamXav, MacKeeper, Kaspersky or Norton. There was a measurable difference with Sophos and Trend Micro (2% of additional system load), and with ESET and Bitdefender, which added around 4% to the overall system load.

If you don’t want to spend money, go for AVG: it achieved 100% detection in AV-TEST benchmarks. However, AV-TEST did point out that unlike paid-for products, AVG had a significant effect on system performance, taking around 10% of system resources.

Of the paid-for products, AV-TEST recommends Kaspersky Lab and Norton, noting that they deliver 100% detection with no noticeable effect on performance.

Bitdefender and Trend Micro are highly recommended too, as is Intego – albeit with the caveat that it can increase system load by 16%.

AV-TEST recommends Kaspersky’s antivirus suite, which gives excellent protection without a noticeable effect on system performance

Mac antivirus: do I really need it?

That really depends on you. The risk of infection remains pretty remote, and if you practice basic security measures and don’t fall for common scams then you’re very unlikely to suffer from any problems. Even ransomware can be defeated with the cunning tactic of having a backup of anything important.

That said, if you’ve ever experienced the mess malware can make on a Windows system you’ll know that just getting things back to normal can be an incredible time thief, especially if key data has been damaged. Perhaps the question shouldn’t be whether anti-virus is worth the money, but whether your time is more valuable than the cost of a security app.


How to set network connection priority on a Mac

mac network icon

With different networking options available—ethernet, Wi-Fi, iPhone tethering, etc.—you may find yourself in a situation where you want your Mac to automatically select one type of connection over another. A Macworld reader finds themselves in that exact situation.

I’d like to connect to my grandma’s Wi-Fi connection so that I can use her printer. However, her internet connection is as slow as molasses, so I want to simultaneously use my iPhone’s tethering capability (via USB or Bluetooth, of course) to browse the internet.

macOS does let you prioritize network connections, so you can pick which adapter gets used first when your system tries to connect to local network and internet-connected resources.

  1. Open the Network system preference pane.
  2. Click the settings (gear) icon at the bottom of the adapter list.
  3. Select Set Service Order.
  4. Drag the items around in your preferred order.
  5. Click OK.
mac911 prioritize network cxns


You can drag your available network connections into the order you want macOS to use them.

In the case of the reader’s question, the iPhone tethering item should be placed above the Wi-Fi item. This should retain the ability to access locally available resources, like the printer.

In this situation, to achieve the best possible speed without any monkeying around, disable Wi-Fi fully unless the printer is needed. You can use the Wi-Fi system menu and choose Turn Wi-Fi Off until you need to print. Or, you can create a location via the Network preference:

  1. Click the Location pop-up menu at the top of the pane.
  2. Choose Edit Locations.
  3. Click + to add a location.
  4. Click OK.
  5. Choose that new location from the Location menu.
  6. Make changes, such as disabling Wi-Fi (select Wi-Fi in adapters list, click the gear, and choose Make Service Inactive).
  7. Click Apply.

Repeat for as many different kinds of network setups you want. You might name one “Cell Only” and another “Grandma Plus Cell.”

You can easily switch between locations from the  > Locations menu available throughout the system.

Ask Mac 911

We’ve compiled a list of the questions we get asked most frequently along with answers and links to columns: read our super FAQ to see if your question is covered. If not, we’re always looking for new problems to solve! Email yours [email protected] screen captures as appropriate. Mac 911 can’t reply to—nor publish an answer to—every question, and we don’t provide direct troubleshooting advice.


Emerging trends: data, technology and wellness now the focus of healthtech

One of the biggest sectors in the startup ecosystem, healthtech is evolving significantly. Amid a government-backed push, the spotlight is now on innovations, including artificial intelligence (AI) and other technology.

Just off the first half of the year, India’s startup ecosystem has seen a whole lot of action on several levels. According to YourStory Research, the first half saw close to $7 billion raised in funding across 455 deals. By comparison, the first half of 2016 had over 552 deals but funding raised was far lower at $2.3 billion.

What is an interesting trend is that while the number of deals is lesser, deal sizes are larger. And this holds true for the healthcare sector as well. YourStory Research shows that there were 99 deals amounting to $161 million in 2016; this year, there have been 55 deals, which have already touched $302 million.

Srini Vudayagiri, of PE firm Peepul Capital, believes that even if Flipkart and Paytm gobbled up close to $3 billion of the $7 billion funding, sectors like healthcare and financial services stood out.

Apart from funding, healthcare has grown a big way this year. Beginning from the budget this year, there seems to be a focus on healthcare. The government’s key areas of focus were access to healthcare, amending drug rules and emphasis on data.

A government-backed push towards healthcare

The funding pumped into the healthcare sector has also seen a shift. While aggregator models for doctors, diagnostic centres and healthcare were key last year, there is a strong focus on specialisation, online pharmacy and data-driven approach this year.

In the budget in February, Finance Minister Arun Jaitley announced that the government has prepared an action plan for poor health. The government is also targeting elimination of tuberculosis by 2025. The budget proposal said 1.5 lakh health sub-centres will be transformed into health and wellness centres.

Stock-taking will take place towards the end of this financial year.

The renewed focus on amending drug rules comes as a relief to many. As of last year, India recorded one of the highest percentages of out-of-pocket expenditure towards medicines.

A report by NSSO stated that over 72 percent of out-of-pocket health expenses were on buying medicine in rural areas while 68 percent was spent in urban areas. For online healthcare companies, this focus on making drugs available at a reasonable price comes as a welcome move.

The online-offline tussle: push towards technology

Prashant Tandon, Co-Founder and CEO, 1mg, an online healthcare startup, says the new drugs and cosmetics rules will ensure availability of drugs at reasonable prices and believes there is a shift towards technology.

“Telemedicine using digital technologies in DigiGaon is another great thought and key to bringing healthcare access to all. We are waiting to see details of the blueprint and how we can participate,” Prashant says.

1mg, which raised additional Series C funding this year, is set to focus on data and AI. However, there still has been an online and an offline tussle. In May this year, offline pharmacies had gone on strike against online pharmacies to speak up against e-portals as mandated by the government. They also wanted to have their views on the central drug act amendment, where the government has mandated the presence of pharmacies in all stores taken into consideration.

This tussle has been on since online pharmacies grew across the country in late 2015 and early 2016.

Prashant, however, believes that over the several years there has been little technology shift in the healthcare ecosystem, but there are now several players bringing in the much-needed technological change in the healthcare space.

“We are at the cusp of a massive change. Data-based and technology-based healthcare is coming of age. I think the next year is going be exciting and the year of healthcare,” Prashant says.

Top startups that got funded in 2016
Image Credit: Avinash

A focus on wellness

By July last year, the healthtech world started seeing a push towards wellness and fitness, especially when Mukesh Bansal and Ankit Nagori’s Curefit raised $15 million in funding led by Kalaari Capital, IDG ventures and Accel partners. This was before they had launched the platform.

This year, even Practo, which started as a SaaS platform and evolved into a doctor consultancy platform, has ventured into healthcare insurance. The startup is now looking at healthcare from a more holistic perspective.

Four months shy of raising Series D funding, Practo has unveiled its brand identity and positioning as a complete health platform.

Varun Dubey, VP, Marketing, Practo, during the rebranding said,

“When we first started in 2007, we had Practo Ray, a SaaS platform for doctors. Our branding and positioning focused on that. But now with us focusing on everything to do with healthcare, whether it is consultations, discovery, record keeping and even insurance, we felt that we needed our brand to reflect that change clearly.”

Top funded startups 2017
Image credit: Avinash

Post GST impact on healthcare

The GST has started to have a strong impact on the healthcare sector, despite being exempted under GST. However, the consumer will end up spending more in terms of medical bills and hospitalisation costs.

Drugs, disposables and reagents are under the 12 percent GST bracket, and procedures and cost of surgeries are likely to rise.

Sanjay Anandaram, a well-known mentor in the startup ecosystem, believes that like the e-commerce sector, the healthcare sector too will continue to grow and have a significant impact.

“In recent years there seems to be a growing awareness towards a healthy lifestyle, rather than just preventive care. Therefore there needs to be a larger market for this,” Sanjay says.


Hill, Robins AFB to provide F-35 software sustainment

Lt. Col. George Watkins, the 34th Fighter Squadron commander, flies his combat-coded F-35A Lightning II aircraft past the control tower on Sept. 17, 2015, at Hill Air Force Base, Utah. During the sortie Watkins conducted mission qualification training focusing on weapons employment, range familiarization and mission system proficiency. (U.S. Air Force photo/Alex R. Loyd)

The Air Force Sustainment Center is making plans to establish organic software sustainment capability for the F-35A Lightning II.

Vice Adm. Mat Winter, the Joint Strike Fighter program director, requested Naval Air Systems Command and Air Force Materiel Command develop depot activation plans for software sustainment on their respective variants of the F-35.

“The F-35 Lightning II Joint Program is approaching completion of system development and demonstration and transitioning to production, follow-on modernization, and sustainment,” Winter wrote in a June 26 memorandum. “As production ramps up and the global fleet size rapidly grows over the next few years, the program is at a critical junction in making software sustainment assignments to meet operational requirements.”

The multi-role F-35 combines low-observable technologies with state-of-the-art sensor fusion, advanced air-to-air and air-to-ground weapons. The core of its lethality and survivability ultimately relies on computer hardware and software.

The program office assigned nine software integration functions to the AFSC and seven to the Navy.

AFSC Commander Lt. Gen. Lee K. Levy II noted his workforce includes a large number of software developers to support the fifth-generation fighter fleet, which is expected to grow as the center postures for the new workload in support of the F-35.

The 402nd Software Maintenance Group, Warner Robins Air Logistics Complex at Robins AFB, Gerogia, will tentatively be responsible for functions in the areas of F-35 communications and mission systems.

Ogden ALC’s 309th SMXG at Hill AFB, Utah, is currently planned to oversee pilot and processor systems, the autonomic logistics information system and integration.

“The future of air dominance will revolve around software, but the dedication and ingenuity of our people will be key to our success,” Levy said. “The Air Force Sustainment Center is ready to take on this new workload and complete these missions to make and keep the F-35 even more lethal and capable.”

The Air Force declared initial operational capability for the F-35A in August 2016 and the JSF program is in low-rate initial production for the Air Force, Navy, Marine Corps, international partners and allies including Israel, Japan and South Korea.

The ALCs are working closely with a joint Defense Department organic transition team comprised of Air Force and Navy members, who have formulated the initially recommended software sustainment assignments, said Donna Frazier, the Robins AFB 402nd SMXG director.

“The transition team is also developing the overall F-35 Software Sustainment Transition Plan,” she said.

At Hill AFB, the Ogden ALC will build on successful software work already performed on the F-16 Fighting Falcon and F-22 Raptor, said Kelly Capener, the 309th SMXG director.

AFMC and NAVAIR sustainment organizations and their industry partners expect to provide initial implementation plans to the Joint Program Office within the next 180 days. Winter said the plans should include specific centers of industrial and technical excellence designations, timelines and resource requirements to meet statute implementation no later than four years after achieving IOC.

Levy said the F-35 organic software workload will be performed by a mix of experienced software engineers moving over from other systems, coders and developers from other commands, and new hires.

“In order for us to be able to sustain and maintain fifth- and sixth-generation aircraft, we need to have a fifth- and sixth-generation workforce,” Levy said. “As a result, the Air Force Sustainment Center has been working very diligently to put ourselves in a position to do just that.

“I’m confident our software maintenance groups will be able to tackle this new workload with flying colors, allowing us to do what we do best and that’s provide combat power for America,” Levy added.


Google lets three enterprise cloud databases loose

Google lets three enterprise cloud databases loose

Google has made three new enterprise database offerings generally available, hoping to lure customers currently on Amazon Web Services and Microsoft’s Azure platforms over to its Compute Engine service.

The three offerings include the fully managed Cloud SQL Second Generation with MySQL instances, the Cloud Bigtable noSQL wide-column service with Apache HBase compability, and the Cloud Datastore, a scalable, NoSQL document database.

Pricing for Cloud SQL 2nd Generation starts at US$0.015 per hour for 0.6 gigabytes of memory, shared virtual processor, and maximum 3TB capacity for the smallest, db-f1-micro instance.

This goes up to US$2.012 per hour for the db-n-highmem-16 instance, with 16 VCPUs, 104GB of RAM and up to 10TB of storage. In addition, Google charges US$0.17 per GB and month for storage capacity, and US$0.08 per GB and month for backups.

Bigtable nodes cost US$0.65 per node and hour, with a minimum of three required per cluster. Each node can delivery up to 10,000 queries per second and 10 Mbps data transfers.

Storage for Bigtable on solid state disks is charged at US$0.17 per GB and month, with the hard drive equivalent service costing US$0.026 per GB and month. Australian customers pay US$0.19 per GB for up to 1TB of internet egress traffic, which drops to US$0.18/GB for 1 to 10TB, and US$0.15/GB for more than 10TB.

Cloud Datastore is free for up to 1GB of storage, 50,000/20,000/20,000 entity reads/writes/deletes, with additional charges once those limits are reached.

Customers wanting to run their own databases on the Google Compute Engine can now use Microsoft SQL Service images with built-in licenses. Business can also use their own, existing application licenses.

Google claimed that its Cloud SQL 2nd Gen database provides substantially better performance than Amazon’s RDS MSQL Multi-Availability Zone and RDS Aurora databases – up to 16 concurrent threads, as measured with the Sysbench benchmark.

Beyond 16 concurrent threads the AWS databases were slightly better than Cloud SQL 2nd Gen. In terms of transactions per second, Sysbench testing showed AWS Aurora to be the leader beyond 16 concurrent threads.

Some of the performance difference is due to design decisions for the databases: Google’s SQL 2nd Gen emphasises performance and allows for replication lag which can increase failover times albeit won’t put data at risk, Google said.

AWS Aurora, meanwhile, is designed with replication technology that exhibits minimal performance variation and consistent lag.

Google also said the Cloud SQL 2nd Gen replicated database had about half the end-to-end latency for single client threads compared to AWS RDS for MySQL Multi-Availability Zone, at 32.02ms – substantially better than the 70.12ms measured for AWS RDS Aurora.


iPhone 8 Design Revealed in Leaked Images, ‘Won’t Be Cheap’ Says Foxconn Exec: Reports

iPhone 8 Design Revealed in Leaked Images, 'Won't Be Cheap' Says Foxconn Exec: Reports


  • The new render suggests same design as many previous renders
  • The yield of the new OLED displays is said to be low
  • The iPhone 8 has been tipped to come with wireless charging feature

While the design on the upcoming iPhone 8 has been leaked several times in the last few months, each new round does certainly build the anticipation. The iPhone 8 has been leaked in a fresh set of renders and live images yet again. Separately, a new report reiterates support for wireless charging on the iPhone 8, while a Foxconn executive is said to have suggested the handset will not come in cheap.

First talking about the leaked render, shared by popular tipster @evleaks aka Evan Blass. In it, the iPhone 8 has been shown encased in a smartphone cover with a near bezel-less design and a distinct top notch – expected to feature a range of sensors including the 3D front camera. The design on the display is almost identical to some of the earlier leaks and is quite likely to be the final design on the iPhone 8 as well. While Blass didn’t share the name of the case-maker, 9To5Mac points out that the case in the leaked render resembles to the ones made by UAG.

iPhone 8 weibo iPhone 8 Weibo

Photo Credit: Weibo

On Chinese social networking website Weibo, some of the images that claim to show an X-Ray view of the iPhone 8 have been posted. While it is very hard to figure out much from these images, the constant dark spot in the middle suggests that the iPhone 8 might feature wireless charging support, as per a report by 9To5Mac. To recall, several reports have previously indicated that the iPhone 8 will support wireless charging and Wistron CEO Robert Hwang was also said to have confirmed that this year’s iPhone models will support wireless charging.

However, Daily Mail points out that these images don’t give a layered look of the device and are therefore not taken through X-Ray. Further, the images have been said to be likely of an early stage version of iPhone 8 as the codename ‘FERRARI’ can also be seen in the leaked images.

iphone 8 copper gold mydrivers iPhone 8 Copper Gold

Photo Credit: via MyDrivers

Moving on to the leaked live images, the iPhone 8 images shared on Weibo suggest that the smartphone will come in a new Copper Gold colour variant. Apart from Black and White colour variants, the new live images have shown a Copper Gold colour variant of the yet-to-be-announced smartphone.

Finally coming to the pricing of the iPhone 8, Foxconn Vice President Luo Zhongsheng is said to have revealed to reporters that due to supply chain issues, the iPhone 8 “will not be cheap”, reportsMyDrivers. Zhongsheng is cited to say the yields of the company’s new OLED display on the smartphone are low (60 percent success rate) – something another report about Samsung’s role in the OLED display supply corroborates. This could possibly be because of introduction of the new top-notch design by the company.

As we mentioned, the role of the top notch seen against the shape of the iPhone 8’s display – also visible in the schematic pulled out the HomePod firmware – is said to correspond to Face ID facial recognition (said to completely replace Touch ID fingerprint sensor) as well augmented reality features, both powered by a 3D front camera and an infrared sensor.

For the latest tech news and reviews, follow Gadgets 360 on Twitter, Facebook, and subscribe to our YouTube channel.

Apple iPhone 8

Apple iPhone 8

  • NEWS






750×1330 pixels




iOS 11



Also See
  • Apple iPhone 5s (Silver, 16GB)
  • Apple iPhone 5s (Space Grey, 16GB) –
  • Apple iPhone 5s (Space Grey, 16GB) – OFFER


Google Pixel 2 Live Photos Leak, Show Off Stereo Speakers and Wide Bezels

Google Pixel 2 Live Photos Leak, Show Off Stereo Speakers and Wide Bezels


  • Pixel 2 live photos tip sufficient bezel on top and bottom edge
  • The smartphone is seen having two stereo speaker cut outs
  • The fingerprint scanner sits at the rear end

Google’s Pixel 2 and Pixel XL 2 smartphones are slated to release this fall, and ahead of the launch event, leaks have been flowing aplenty, with the most recent detailing the removal of the 3.5mm headphone jack, the presence of bezels in the smaller variant, as well as the different manufacturers of both devices. Fresh tips today come in the form of live photos showing the front and back of the Google Pixel 2. The smartphone appears to be a bit wider, with sufficient bezels, and two stereo speakers in the front.

GSMArena has gotten hold of two photos showing the Google Pixel 2 smartphone from the front and back. The smartphone’s overall shape seems to have changed, with the rounded corners retained, but the overall frame being a bit wider and rectangular than the current generation Google Pixel. There is a wide bezel on all sides, disappointing us a little bit, and stereo speaker cut-outs are seen on the top and bottom edge as well. This hints at better audio output, as the current generation only has a single cut-out at the top.

At the back, there is a single camera setup, reiterating previous rumours, and the fingerprint sensor sits at the back as well, in the centre. These images show a Black colour variant, however a Silver renderhas also been spotted in the past. The Google Pixel 2 is expected to ditch the 3.5mm audio jack, come with a support for USB Type-C, and the camera is expected to bump out a little bit at the rear.

Another recent leak hints that the Pixel 2 will be made by HTC, and sport the ‘squeezable’ frame and EdgeSense seen in the HTC U11, apart from the stereo BoomSound speakers the company is known for. It will also not feature a bezel-less display. On the other hand, the Pixel XL 2 is said to be manufactured by LG, and sport a FullVision style display seen on the LG G6.

Pixel 2 and Pixel XL 2 are rumoured to feature a 4.95-inch full-HD and 5.99-inch QHD (1440×2560 pixels) displays that will be manufactured by LG. The smartphones will sport 4GB RAM, apart from 64GB and 128GB of internal storage options. So far, they have also been tipped to sport an ‘Always On’ display mode. recent report also suggests that the upcoming Pixel smartphones will be the first to sport Qualcomm’s Snapdragon 836 SoCs.


Karbonn A41 Power With 4G VoLTE Support Launched in India: Price, Specifications

Karbonn A41 Power With 4G VoLTE Support Launched in India: Price, Specifications


  • Karbonn A41 Power runs on Android 7.0 Nougat
  • The smartphone is powered by the quad-core processor
  • It offers 8GB of internal storage

After the launch of the Aura Note Play earlier this month, Karbonn has now launched the A41 Power smartphone in India. The smartphone is priced at Rs. 4,099 in the country, and availability of the smartphone is still not clear. The Karbonn A41 Power smartphone has been listed on the company website, but hasn’t been announced officially yet.

The budgeted smartphone comes in three colour variants – Black-Champagne, Black-Red, and White-Champagne. It has capacitive buttons in the front, the power key and volume buttons sit on the right edge, and the speaker is seen at the back. The Karbonn A41 Power has its camera sensor on the top left corner of the smartphone.

As for the specifications, the Karbonn A41 Power runs on Android 7.0 Nougat and supports dual-SIM slots. It sports a 4-inch (480×800 pixels) WVGA display, and is powered by a 1.3GHz quad core processor paired with 1GB of RAM. The Karbonn A41 Power offers 8GB of inbuilt storage with the option to expand it further via microSD slot (up to 32GB).

As for optics, the Karbonn A41 Power sports a 2-megapixel rear camera with flash support and a VGA front camera for selfies and video chatting. It packs a 2300mAh battery that is rated to offer 8 hours of talk time (on 2G), and 300 hours of standby time. Connectivity options include Wi-Fi 802.11 b/g/n, Bluetooth, 4G VoLTE, and Micro-USB port. The dimensions on the Karbonn A41 Power smartphone are at 121.5×66.9x12mm, and the device weighs 130 grams.

For the latest tech news and reviews, follow Gadgets 360 on Twitter, Facebook, and subscribe to our YouTube channel.

Karbonn A41 Power

Karbonn A41 Power

  • NEWS




1.3GHz quad-core

Front Camera



480×800 pixels




Android 7.0



Rear Camera


Battery Capacity


Also See
  • Karbonn Titanium Machfive (Silver, 16GB)
  • Karbonn K9 Staar WH (Black) –
  • Karbonn K107 (Black Red) – OFFER


Lansing, Eaton County use Russian software the feds call unsafe


LANSING – At least two local governments in Greater Lansing use software from a company the federal government says could be used as a backdoor for Russian hackers.

Software from Kaspersky Lab — a long-popular antivirus firm based in Moscow and used by millions of governments, businesses and individuals internationally — is used to protect computer systems in the city of Lansing and Eaton County, officials from those places said.

As congressional and other federal investigations into Russian interference in the 2016 U.S. election continue, however, U.S. officials have taken steps to prohibit Kaspersky software from federal systems over fears the software poses a security risk.

Neither Lansing nor Eaton County use Kaspersky on elections-related systems, officials in both municipalities said, and the software could be dropped in both places soon.

Lansing “does make limited use of Kaspersky software on legacy systems that are being phased out of production by the end of this year,” Randy Hannan, chief of staff to Mayor Virg Bernero, said in an email to the State Journal. Citing security concerns, Hannan would not say which systems used Kaspersky — though explicitly said it is not on elections systems — and he said Kaspersky will not be used once the legacy systems are phased out.

Eaton County uses Kaspersky software countywide on all systems except the elections network, Controller/Administrator John Fuentes said in an email. However, the county is currently performing a routine review of its software choices and “will look to see if other products will work better for the county,” Fuentes said. “The recent federal government warnings will be taken into consideration as part of our overall evaluation.”

The county has used the software for five years without issue, Fuentes said.

Ingham and Clinton counties and several other Lansing-area governments told the State Journal they do not use Kaspersky software. Neither does state government, Caleb Buhs, a spokesman for the Michigan Department of Technology, Management & Budget, said in an email.

For decades, Kaspersky has been accused of, and denied, being involved with the Russian government. But the company has taken new heat since U.S. intelligence agencies determined Russia interfered with the 2016 presidential contest, including apparent attempts to access local governments’ voting systems.

Last month, the U.S. General Services Administration removed Kaspersky from the federal government’s list of approved vendors and some lawmakers are pushing to prohibit the Defense Department from using the software.

Though there’s no evidence Moscow changed vote totals in America, a National Security Agency report leaked to media this summer said Russian agents had hacked a U.S. elections software supplier and sent “phishing” emails to at least 100 elections officials around the country who used that supplier.