
Google fixes worst thing about online clothes shopping with 30-second phone trick – and it works on BILLIONS of products
Google has revealed a game-changing new trick that allows people to try on billions of garments virtually.
2
All you need to do is upload a full length body image and the "try it on" tool will magically add the clothing onto you within seconds.
The firm says its latest tech is powered by a clever image generation model which is capable of understanding the human body and the various ways we wear clothing.
It can pick up on how different materials fold, stretch and drape on different bodies to produce an authentic looking shot of you in the clothing you've selected.
"It preserves these subtleties when applied to poses in your photos," said Lilian Rincon, Google's Vice President for Product Management.
"The result is a try-on experience that works with photos of you."
The feature is only available to test in the US for the moment.
It comes as part of Google 's major new AI Mode tool, a deeper chat-bot style addition to the main Google Search.
Shoppers will also be able to get price alerts for products so they don't miss sales.
Users can set a price they're prepared to pay for an item and Google will send them a notification as soon as it's within that value.
Consumers will be able to buy the product there and then too without needing to navigate to the retailer's website.
THIS COULD REVOLUTIONISE SHOPPING
Analysis by Jamie Harris, Assistant Technology and Science Editor at The Sun
This could mean you never have to miss a big sale never again.
We've all been there - spotted a cute jumper but don't like the price, so you keep checking back in case it's on sale (or, simply forget).
This new feature will keep tabs on that item and send you a notification as soon as the price has gone down to a price you're happy to pay.
And better still, you'll be able to pay for it there and then with Google, no need to go to the retailer's own site and add to basket.
The feature is only coming to the US first but will surely come to other countries later.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Reuters
11 minutes ago
- Reuters
HEDGE FLOW Hedge funds ditch tech and buy essentials, Goldman Sachs says
LONDON, July 28 (Reuters) - Hedge funds fled technology stocks at the fastest pace in 12 months in the latest week, just as the S&P 500 (.SPX), opens new tab reached all-time highs, a note to Goldman Sachs (GS.N), opens new tab clients and seen by Reuters said. The S&P 500, which includes seven tech stocks in its top 10 largest constituents by market value, has surged roughly 28% since its 2025 low, while the Nasdaq Composite (.IXIC), opens new tab has jumped 38% in that time. As of Friday, the S&P 500's forward price to earnings ratio, which reflects the value of a company's stock relative to its projected future earnings, was 23.11, around five-month highs, according to LSEG/Datastream. "U.S. equities valuations (such as price earnings ratios) are now 30% higher than their recent decade average, while 10-year yields remain stubbornly high and volatile. The future path of equities may depend partly on a decline in long-term rates; however, we do not seem to be there yet," Lombard Odier Investment Managers head of macro Florian Ielpo said in a note on Friday. Globally, hedge funds sold tech stocks, some of the most richly valued equities, more than any other sector last week, the Goldman Sachs note said. Rather than shorting the sector, hedge funds tended to ditch long bets and exit trades, the bank said. A short bet is designed to profit from a drop in an asset price. This week's exodus was the largest the bank had seen since July 2024, Goldman Sachs said. Hedge funds fleeing tech stocks centered on trading in North America and Europe. Every kind of tech stock was sold, including semiconductor chip companies, as well as those in software and IT services, the bank said. Meanwhile, shares in consumer staples - companies that sell items that people purchase regardless of economic conditions - were among the most net bought U.S. stock sectors this week, Goldman said. Hedge funds piled into these stocks for the fourth straight week and their trades were almost entirely long positions - those that will profit if the stock prices rise. The kind of companies whose shares hedge funds bought included those that sell food and beverages and personal care products.


Geeky Gadgets
12 minutes ago
- Geeky Gadgets
Awesome Raspberry Pi Cyberdeck : Modular Design and Dual Screens
What if your next DIY project wasn't just another gadget, but a statement—a sleek, retro-futuristic device that turns heads and redefines functionality? Enter the dual-screen cyberdeck, a marvel of design and engineering that blends the charm of science fiction aesthetics with the innovative versatility of modern computing. Built around a Raspberry Pi and brought to life with 3D-printed components, this portable, modular creation isn't just a tool—it's a canvas for creativity and innovation. Whether you're a seasoned maker or a curious beginner, this cyberdeck challenges the boundaries of what's possible in DIY electronics, offering a rare combination of practicality and visual appeal. SECTOR 07 takes you through the unique design philosophy and technical ingenuity behind this cyberdeck, from its dual rotating screens to its programmable inputs and sensor integration. You'll discover how its modular, open source framework enables users to customize, upgrade, and adapt the device to their specific needs. Along the way, we'll uncover how this project bridges the gap between retro inspiration and modern utility, creating a platform that's as functional as it is inspiring. What could you achieve with a device that's as bold and adaptable as your imagination? DIY Dual-Screen Raspberry Pi Cyberdeck What is a Cyberdeck? Cyberdecks are compact, customizable computers inspired by the science fiction aesthetic, designed to perform tasks such as field computing, sensor integration, or data visualization. These devices combine portability, modularity, and distinctive visual appeal to create tools that are both functional and eye-catching. This particular project exemplifies the concept by integrating dual screens, programmable inputs, and sensor compatibility into a cohesive, user-friendly device. Whether for technical experimentation or practical use, cyberdecks offer a creative and adaptable approach to modern computing. Design Goals: Balancing Form and Function The cyberdeck was developed with three primary objectives: practicality, ease of assembly, and a retro-futuristic aesthetic. Each component, from the 3D-printed chassis to the electronic interfaces, was carefully designed to ensure usability and adaptability. The result is a sleek, portable device that balances form and function, making it suitable for a variety of applications, including data analysis, field experiments, and creative projects. This thoughtful design approach ensures that the cyberdeck is not only visually appealing but also highly functional and accessible to users of varying skill levels. Raspberry Pi Cyberdeck : Sleek Design, Ultimate Functionality Watch this video on YouTube. Find more information on Raspberry Pi 5 by browsing our extensive range of articles, guides and tutorials. 3D Printing and Modular Assembly The cyberdeck's structure is entirely 3D-printed, allowing for precise customization and iterative design improvements. This approach ensures that the device is both lightweight and durable, while also allowing users to modify or replicate the design with ease. Key features of the 3D-printed structure include: Snap-Fit Parts: Components are designed to fit together seamlessly, making sure durability and simplifying the assembly process. Components are designed to fit together seamlessly, making sure durability and simplifying the assembly process. Modular Design: The modular structure allows for quick upgrades or repairs, enhancing the device's long-term usability. The modular structure allows for quick upgrades or repairs, enhancing the device's long-term usability. Lightweight Materials: The use of lightweight plastics improves portability without compromising structural integrity. By providing open source design files, the project encourages users to replicate, modify, and personalize their own cyberdeck, fostering creativity and innovation within the DIY community. Custom Electronics and GPIO Integration At the heart of the cyberdeck is a Raspberry Pi, chosen for its versatility and extensive GPIO (General Purpose Input/Output) capabilities. Custom-designed circuit boards streamline the assembly process and enhance the device's functionality. These boards are responsible for: Power Distribution: Making sure stable and efficient energy management for all components. Making sure stable and efficient energy management for all components. Connectivity: Supporting seamless integration with external devices and peripherals. Supporting seamless integration with external devices and peripherals. Sensor Integration: Allowing compatibility with a wide range of sensors for various applications. The GPIO pins provide users with the flexibility to connect sensors, buttons, and displays, making the cyberdeck highly adaptable for different projects. This integration of custom electronics ensures that the device is not only functional but also capable of supporting advanced experimentation and development. Key Features of the Cyberdeck The cyberdeck includes several innovative features that enhance its usability and versatility, making it a powerful tool for a wide range of applications. These features include: Dual Screens: Two rotating displays support both portrait and landscape orientations, offering flexibility for tasks such as coding, data visualization, or media playback. Two rotating displays support both portrait and landscape orientations, offering flexibility for tasks such as coding, data visualization, or media playback. Programmable Inputs: Buttons, a rotary encoder, and a linear slider provide customizable controls for various applications, from gaming to sensor calibration. Buttons, a rotary encoder, and a linear slider provide customizable controls for various applications, from gaming to sensor calibration. Mechanical Keyboard: A compact keyboard with interactive LED modes delivers tactile feedback and visual customization, enhancing the user experience. A compact keyboard with interactive LED modes delivers tactile feedback and visual customization, enhancing the user experience. External GPIO Header: An accessible header simplifies sensor integration and prototyping, making it easier to expand the device's capabilities. An accessible header simplifies sensor integration and prototyping, making it easier to expand the device's capabilities. Quick-Release Mechanism: The Raspberry Pi can be easily removed for upgrades or standalone use, adding to the device's modularity and convenience. These features make the cyberdeck a versatile and user-friendly tool, suitable for both beginners and experienced makers. Sensor Integration and Real-Time Data Processing The cyberdeck's compatibility with I2C sensors significantly broadens its potential applications. Users can integrate sensors for monitoring light, temperature, humidity, or even pH levels, making it ideal for scientific experiments, environmental monitoring, or data collection. The Raspberry Pi's processing power enables real-time data visualization, providing immediate insights and enhancing the device's utility for both hobbyists and professionals. This capability makes the cyberdeck a valuable tool for projects that require accurate and timely data analysis. Open source Documentation: Empowering Innovation To encourage replication and customization, all design files, schematics, and assembly instructions are available as open source resources. This transparency allows users to adapt the cyberdeck to their specific needs, whether by modifying the design, adding new features, or integrating additional sensors. By sharing these resources, the project fosters collaboration and innovation within the DIY electronics community, empowering users to explore new possibilities and push the boundaries of what can be achieved with a cyberdeck. Expanding the Potential of DIY Electronics This dual-screen cyberdeck demonstrates the possibilities of combining 3D printing, custom electronics, and programming into a single, functional device. Its modular design, programmable features, and sensor compatibility make it a versatile tool for a wide range of applications, from technical experimentation to creative projects. By sharing the project as open source, it invites others to explore, modify, and expand upon the concept, driving further advancements in the world of DIY electronics. This cyberdeck is not just a device—it is a platform for innovation, creativity, and collaboration. Media Credit: SECTOR 07 Filed Under: DIY Projects, Hardware, Top News Latest Geeky Gadgets Deals Disclosure: Some of our articles include affiliate links. If you buy something through one of these links, Geeky Gadgets may earn an affiliate commission. Learn about our Disclosure Policy.


Telegraph
14 minutes ago
- Telegraph
Chinese hackers have seized control. How did we let this happen?
A civilisation that cannot defend itself really should not expect to survive, and after the latest cybersecurity news, I wonder how it can. An official advisory was recently sent out to the US military, warning that all forces must now assume their networks have been breached. The enemy is inside the house. What it means is that no system connected to the internet can be defended. Our own national cybersecurity agency asked UK businesses to make this presumption in 2020. The reason this hasn't been bigger news is that we've become fatalistic and weary, as one cybersecurity attack follows another. So when we discovered in early July that Chinese hackers had gained control of Microsoft servers at hundreds of US government agencies – including the US nuclear weapons agency – it was just another hacking story. What made this one noteworthy was that there wasn't immediately a fix or a patch, Microsoft admitted last Tuesday. Incredibly, confirmation of the US military's 'assume breach' alert had to be dragged out of the Department of Defense via Freedom of Information Act requests by a campaigning non-profit called Property of the People. These developments are the latest stage in an ongoing state-sponsored Chinese campaign, in which hacking has evolved from widespread commercial espionage a decade ago into something far more threatening. The latest phases, Salt Typhoon and now Volt Typhoon, are meticulous and sophisticated. They target not just government agencies like the National Guard, and China-critical MPs like Sir Iain Duncan Smith, but also private sector companies in the energy, telecoms, transport and water sectors. Ciaran Martin, former head of NCSC, the cybersecurity centre based at GCHQ, says that China's capabilities have been transformed. 'Now think of dozens or even hundreds of [individual] hacks at the same time – 'everything, everywhere, all at once' in the words of Jen Easterly, recently departed head of the US Cybersecurity and Infrastructure Security Agency.' Software attacks on our computer systems can create unique damage in ways that conventional warfare cannot. Let's consider two. While aerial bombing can produce spectacular instant results, targets can be disassembled prior to attack, and can be quickly rebuilt after the attack. Both happened with the recent attack on Iraq's nuclear facilities. But recovering from cyber attacks is much harder. Ask the British Library, which has still not restored all of its services. 'Printed catalogues and handlists are available in our Reading Rooms', it still advises visitors to its website. The attack took place in October 2023. A second way in which cyber attacks now present a unique challenge is the ability of Chinese hackers to 'live off the land' after they break through. Rather like special forces embedded behind enemy lines, hackers conceal themselves undetected for months or years. To the guardians of the network, they are just another innocent user. 'Both Salt and Volt Typhoon were in play for years before being detected,' writes Martin. 'And they are strategic compromises of the West on a scale hitherto unseen by any other cyber power.' Not only do we not know when the attack is over, we don't even know when it has begun. How did this happen? If I haven't depressed you enough, this is where it gets particularly troubling. Cybersecurity is a gnarly failure of accountability and regulation that spans decades of indifference, and implicates business complacency and government apathy. The internet protocols (IP) we use today are completely rotten. The great and the good of the IT and telecommunications industries spent the entire 1980s in international committees devising complex secure networking protocols, only to be met with mistrust and specifications no one really wanted. Fed up with waiting, we adopted today's protocols, which were cheap and simple to implement, but not secure. Now, the international standards bodies that might devise a successor to IP are dominated by China. When they fail, suppliers can hide behind licensing agreements and expensive lawyers. No one goes to prison for bad security design. Their customers – us – are guilty of negligence too. Salt Typhoon took advantage of a bug in Cisco routers that users had not bothered to fix for seven years. As a society, we rush to implement technologies without thinking too hard about externalities. Generative artificial intelligence (AI) opens up lots of new holes, and also lowers the bar so that even the technically unskilled can plant hacks. All in all, then, this may not seem a good time to force Britons to use a new government identity service. Especially when you know that 'red team' penetration testing proved in March that this could be penetrated by hostile foreign agents without them being detected. This is what Baroness Neville Jones calls 'a piece of critical infrastructure'. Chinese agents may already be 'living off the land' inside the One Login system, on which your government wallet has been built, and soon perhaps, your digital ID. But don't expect Peter Kyle, the Science and Technology Minister, to put the brakes on the One Login project when he's its biggest fan. To survive and prosper, we need serious and technically aware people in his position, who listen to the security professionals. Kyle appeared on Newsnight last week wearing jeans and a T-shirt and trainers, all of which were intended to signal to viewers his youthful love of digital technology. He is 54.