Skip to main content

Microsoft launches Translator app for Android

In the past few months, it is being noticed that Microsoft is launching new apps one after the other on its rival platforms. It might be an effort to attract new users to the Windows Phone platform. The latest from Microsoft is a Translator app. The app has been released for both Android and iOS. As you can expect, it is similar to Google Translate and works on smartphones, tablets and even smartwatches.


The app is simple and easy to use. Simply open the app and either type or talk the word or phrase that you need a translation for. Wait for a moment and you have instant translation. The app even lets you pin certain translations that you require frequently. Users can also pull up a history of words or phrases previously translated, kind of helpful for learning purposes. Microsoft Translator supports 50 languages - twice the number of languages supported by Google Translate.

"Our researchers are continuously looking at the most effective ways to bring down linguistic barriers by solving significant technical and interaction design challenges. Today, we have a number of ways in which Microsoft Translator is accessible to our users— on the web, as part of your search experience, through many experiences built by our developer community, via Office and more. Most recently we worked closely with our friends in Skype to deliver an entirely new interaction model for translation by enabling long distance real-time speech translation. Like we did with Skype Translator, we have been thinking about how wearable technology might affect language and translation experiences. The new wearable apps we are releasing today are part of this exploration." reads a blog post from Microsoft.

Comments

Popular posts from this blog

Android M Developer Preview updated for Nexus devices

Google has released the Android M Developer Preview 2 which brings enhancements and bug fixes to Developer Preview 1 based on user feedback. Nexus devices running Android M Developer Preview 1 are expected to receive notifications about the OTA update over the next few days. This update brings up to date M release platform code, near-final APIs to validate apps and to provide more testing support, Nexus system images and emulator system images with the Android platform updates have been refined. Apart from the platform update, the system images also include Google Play services 7.6. Other changes include modifications to platform permissions including external storage, WiFi and Bluetooth location and changes to contacts/identity permissions. Here is a list of the key changes in Android M Developer Preview 2. Permissions changes The android.permission.USE_FINGERPRINT permission now has "normal" protection level, so it is no longer necessary to request this permission...

How to enable Chrome tabs in Android Lollipop

In Android Lollipop, Google changed the way tabs are handled in Chrome browser. Now, by default, Chrome tabs do not appear within the app. Instead they appear as separate apps in the Overview which also displays other recently used apps. Although, Google thinks that it is better to have tabs as separate apps, but you might not feel so. It's easy to get lost within recent apps and tabs. Thankfully there's a simple remedy to this problem. All you have to do is open Google Chrome and head to Settings > Merge tabs and apps. Then just turn off the feature. You will be notified that the tabs will move inside the Chrome app. That's all! You can now switch between tabs in Chrome just like you did in the previous versions of Android.

Android Phones vulnerable to hacks with just a single text

Android is the most popular mobile operating system with around 80% smartphones running on it. And now according to security experts at the firm Zimperium, there's a major security flaw in the Android operating system that can let hackers crack into someone's phone just by sending a text. Well, users of Google's OS can relax for a while, thanks to the fact that this security hole is so far not widely exploited. Now here's how the attack would take place: The hacker makes a short video, hides the malicious code inside it and texts it to your number. As soon as the message is received by the phone, it does its initial processing triggering the vulnerability. This can happen even before the sound of an incoming message reached your ears. The problem is more exaggerating due to the fact that even if Google patches the hole, it would not reach the majority of users immediately since the updates to most phones are provided by their respective manufacturers and carrier...