Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

8 Common Tech Myths You Should Stop Believing Today
Business Insider ^ | 11/8/2014 | LISA EADICICCO

Posted on 11/08/2014 6:15:11 PM PST by SeekAndFind

Is it bad to charge your phone overnight? What about charging an iPhone with an iPad adapter?

Despite how often we use devices like smartphones and laptops, we have plenty of questions about how those technologies works. And with so much information out there — not all of it true — it's hard to know if we're treating our electronics properly.

We've dug into some of the most common myths in consumer tech to debunk some of the biggest misconceptions out there.

1. Mac computers can’t get viruses

Yes, Apple computers are susceptible to malware, too. Apple used to brag its computers aren't vulnerable to PC viruses, but the company quickly changed its marketing page after a Trojan affected thousands of Mac computers in 2012.

2. Private/Incognito browsing keeps you anonymous

There’s a misconception that “incognito” and “private” are synonymous with anonymous. If you’re using Incognito Mode in Google Chrome or Private browsing in Safari, it simply means the browser won’t keep track of your history, import your bookmarks, or automatically log into any of your accounts. It won’t keep your identity anonymous — so keep that in mind if you’re visiting sites you shouldn’t be.

3. Leaving your phone plugged in destroys the battery

If you’re like most people, you probably leave your phone plugged in overnight long after the battery is fully charged. Some used to say this would hurt your phone's battery life, but in fact, there's no proof that this damages your phone’s battery in any way. Modern smartphones run on lithium-ion batteries, which are smart enough to stop charging when they’ve reached capacity.

4. More megapixels always means a better camera

What’s the difference between 12 megapixel cameras and 8 megapixel cameras? Not much, as it turns out.

(Excerpt) Read more at businessinsider.com ...


TOPICS: Computers/Internet; Science
KEYWORDS: myth; techmyths; technology
Navigation: use the links below to view more comments.
first 1-2021-28 next last

1 posted on 11/08/2014 6:15:11 PM PST by SeekAndFind
[ Post Reply | Private Reply | View Replies]

To: SeekAndFind

Myth #9: Your smart phone is not a tracking device.


2 posted on 11/08/2014 6:21:38 PM PST by MV=PY (The Magic Question: Who's paying for it?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: SeekAndFind
I agree with all of them except the cameras mega pixels. Don’t tell me a 3 mega pixel camera is better than a 12 mega pixel camera. Resolution, file size, and a number of other factors come into play. There is also the type of sensor in play. Sigma's foveon sensor is the best around, but it has not been widely accepted. Just a thought. As usual, an article for the masses....
3 posted on 11/08/2014 6:31:28 PM PST by Fungi
[ Post Reply | Private Reply | To 1 | View Replies]

To: SeekAndFind

I think a lot of the battery confusion goes back to ni-cads which would develop a memory if they were only discharged a little bit before being recharged over and over again. They needed to be totally discharged fairly often.

The article is right about the number of pixels tho it is still good to have a lot. They are getting to where they can put 24 megapixels on a 35mm sized sensor and still maintain extreme quality.

The real problem is the tiny sensors on P&S cameras which sometimes contain tiny sensors which combined with a lot of pixels result in a lot of noise and not good low light capability.

Even those tiny sensors will do OK in good light tho still not equal to the large sensors in late model DSLRs.


4 posted on 11/08/2014 6:35:22 PM PST by yarddog (G)
[ Post Reply | Private Reply | To 1 | View Replies]

To: MV=PY

Only true if you don’t count that authorities and your cell phone company can always find you and that your spouse or anyone else who has rooted your phone can, as well, but needing a simple, but hidden, download.


5 posted on 11/08/2014 6:35:57 PM PST by ConservativeMind ("Humane" = "Don't pen up pets or eat meat, but allow infanticide, abortion, and euthanasia.")
[ Post Reply | Private Reply | To 2 | View Replies]

To: MV=PY
Myth #9: Your smart phone is not a tracking device.

Myth #10, 11 and 12: Your smart phone is not a tracking device.

6 posted on 11/08/2014 6:36:17 PM PST by gunsequalfreedom (Conservative is not a label of convenience. It is a guide to your actions.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: yarddog

laptop batteries still die pretty easily though

especially if they are Toshiba


7 posted on 11/08/2014 6:41:30 PM PST by GeronL (Vote for Conservatives not for Republicans)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Fungi
More Megapixels doesn't help if the optics or electronics are cheap.

8 posted on 11/08/2014 6:42:41 PM PST by BitWielder1 (Corporate Profits are better than Government Waste)
[ Post Reply | Private Reply | To 3 | View Replies]

To: BitWielder1

True, but that is another factor, among so many others......


9 posted on 11/08/2014 6:48:38 PM PST by Fungi
[ Post Reply | Private Reply | To 8 | View Replies]

To: SeekAndFind

> 4. More megapixels always means a better camera
> What’s the difference between 12 megapixel cameras and 8 megapixel cameras? Not much, as it turns out.

A friend of mine who consults on optics systems for both Nikon and Canon, once told me that unless you are willing to spend $10K or more for the lenses, no camera will give any better picture that a 3 or 4 megapixel camera.


10 posted on 11/08/2014 6:58:54 PM PST by BuffaloJack (Muslim Creeping Conquest of America and Canada)
[ Post Reply | Private Reply | To 1 | View Replies]

To: SeekAndFind

Mac (Unix) systems are not susceptible to viruses. Some applications like firefox and safari can pick up malware, but he operating system will be unaffected. To damage the Operating System(the goal of a virus) on a UNIX system the root password is required.


11 posted on 11/08/2014 7:03:35 PM PST by central_va (I won't be reconstructed and I do not give a damn.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: BuffaloJack

Your friend told you wrong. It is possible to get pretty decent enlargements from a good 4MP camera, you would have to get a way more pixels before consumer quality lenses would not benefit from more resolution in the sensor. I don’t know exactly but probably more than 36MP in a 35mm sized sensor.

He is right in theory but way too low in his estimate.


12 posted on 11/08/2014 7:09:15 PM PST by yarddog (G)
[ Post Reply | Private Reply | To 10 | View Replies]

To: SeekAndFind

Myth #2014 Democrats have a better, “ground game”.


13 posted on 11/08/2014 7:20:40 PM PST by outofsalt ( If history teaches us anything it's that history rarely teaches us anything.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: central_va
Mac (Unix) systems are not susceptible to viruses. Some applications like firefox and safari can pick up malware, but he operating system will be unaffected.

That's like saying Chevys can't get flats but your installed Firestones can.


14 posted on 11/08/2014 7:21:46 PM PST by 867V309 (Crusade: the only solution.)
[ Post Reply | Private Reply | To 11 | View Replies]

To: BuffaloJack

BS.


15 posted on 11/08/2014 7:27:28 PM PST by gfbtbb (Ladies and Gentlemen, we are on our own.)
[ Post Reply | Private Reply | To 10 | View Replies]

To: 867V309
That's like saying Chevys can't get flats but your installed Firestones can.

If you define the purpose of a virus is to harm the operating system then it is true UNIX is not susceptible. The OS is not responsible for an applications security or lack there of. On windows the virus over takes and alters the OS itself.

16 posted on 11/08/2014 7:27:42 PM PST by central_va (I won't be reconstructed and I do not give a damn.)
[ Post Reply | Private Reply | To 14 | View Replies]

To: SeekAndFind

Myth #11

Half Life 3 will be released in 2014.


17 posted on 11/08/2014 7:32:11 PM PST by RandallFlagg (Vote fraud solution: Stake, Rope, Sugar and Bullet Ants.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: central_va
The OS is not responsible for an applications security or lack there of.

So if windows gets infected by a virus from Outlook, Flash, or Adobe it doesn't count?

Dancing on the head of a pin.


18 posted on 11/08/2014 7:57:24 PM PST by 867V309 (Crusade: the only solution.)
[ Post Reply | Private Reply | To 16 | View Replies]

To: 867V309
So if windows gets infected by a virus from Outlook, Flash, or Adobe it doesn't count?

You make the point, that cant happen to UNIX. The trojan was in the application, not the OS. I dont have time to explain the differences in the design of UNIX kernel vs windows. They are different, very different.

19 posted on 11/08/2014 8:00:43 PM PST by central_va (I won't be reconstructed and I do not give a damn.)
[ Post Reply | Private Reply | To 18 | View Replies]

To: central_va

So why do macks get infected>


20 posted on 11/08/2014 8:08:23 PM PST by 867V309 (Crusade: the only solution.)
[ Post Reply | Private Reply | To 19 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-28 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson