Huawei Honor 6
Oplus XonPhone 5
Samsung Galaxy Alpha
Xiaomi Redmi 1S
Asus Zenfone 6
Asus Zenfone 5
HTC One (M8)
Analysis: Sony Xperia Z3 camera capability and image quality
How to shop smarter online to get best prices, discounts
Xiaomi Redmi 1S tested after OTA update
iPhone 6 Plus vs Galaxy Note 4 vs Nexus 6: Specs Comparison
SignEasy lets you sign documents digitally on your phone or tablet
How tech is taking football to the next level
Classic FPS games are a dying breed
Slowly gathering steam...
The obsession within
Carmick Shift: Can John Carmack and Oculus Rift change the world?
Indian Air Force asks personnel not to use Xiaomi phones
Apple issues security warning for iCloud
Intex Aqua Amaze octa-core smartphone launched at Rs. 10,690
Microsoft releases first update to its Windows 10 Technical Preview
Philips Aurora i966 with 5.5-inch QHD display, 3GB RAM unveiled
Moto G 2nd gen launched, available from midnight at Rs. 12,999
Xiaomi goes for the kill, prices Redmi 1S at Rs. 5,999 in India
Xiaomi lists Mi3 cases and power-banks on Flipkart, offers 10,400 mAh powerbank for Rs. 999
Moto G2 expected to be announced on 10 September
Motorola Moto X (Gen 2) smartphone, Moto 360 smartwatch announced for India
Dell Inspiron 3542
Acer Aspire E1-572
ASUS Zenbook UX302LG
Lenovo Yoga Tablet 2 Pro
Lenovo Yoga Tablet 2 10.1 Windows
Overview: Implementing fast real-time GPU-based image blur algorithms
How to use Intel Perceptual Computing SDK for human-robot interface
How to use touch gestures to Influence Physics Parameters using TouchScript
Case Study: How to adapt multiple input methods on Intel based hybrid devices
How to fix Nexus 4 power button issue
How to get started with OpenCL on Android OS
How to use Intel Cilk Plus to speed up your Android application
Tutorial: How to implement H.265/HEVC for Intel Atom Based Android Platforms
How to implement Gesture Sequences in Unity 3D game engine via TouchScript framework
How to use Native Library Compression SDK for Android apps
Digit News Update [21 Oct 2014]
Digit News Update [20 OCT 2014]
Pentax K-500 Camera Review
Lenovo launches Yoga 2 series tablets
Apple unveils ipad air 2 and the ipad mini 3
Best online deals to look out for today
5 apps to get the Android Lollipop look on your smartphone
Top 10 value for money phones to buy from 6K to 20K
Apple iPad Air 2 vs. Google Nexus 9: Specs comparison
Lenovo Yoga 2 tablets: Hands on
The standoff between Research in Motion (RIM) and the Indian government over the issue of handing over access to BlackBerry's corporate email service is reportedly nearing to an end.
India's senior official at telecommunication ministry, R Chandrashekhar says in an interview the government has found a way it can monitor BlackBerry emails without having access to codes to unlock encrypted messages. He said the government is in talks with RIM over the issue and now has ensured the "law enforcement agencies will get what they need.”
"The issue is heading towards a resolution and I think necessary action is being taken in consultation and with the cooperation with all the agencies concerned," he remarked, without divulging more details about it.
RIM has refused to comment on the remarks made by the Indian official. The Wall Street Journal in its coverage quotes RIM statement that reads: "RIM maintains a consistent global standard for lawful access requirements that does not include special deals for specific countries. And it truly has no ability to provide its customers' encryption keys."
It may be recalled that the Indian government and RIM have been in talks over access to BlackBerry emails for quite some time. The government has asked the company to provide access to ensure national security. RIM has not yet complied but has offered to supply “metadata”, information about email's sender, recipient and the device from which the message was sent. Authorities can possible use this data to keep track of emails on companies services.
It's learnt that countries such as India and Indonesia have in the past threatened to ban RIM's services due to the difficulties faced by the law enforcement agencies in gaining access to emails of suspected criminals.