You are viewing page 2 of 32.

Why I Don't Use "Linux"

By Tim Butler | Posted at 5:22 PM

Why GNOME's Got it Right

By | Posted at 10:23 AM

Why Can't I Use My Phone Number on Messages.app?

By | Posted at 10:25 PM

Zach Phillips explains my most significant frustration with iMessage on the iPad and Mac:

It would only take one feature to make Messages on iPad and Messages.app useful. Allow me to use my phone number as my iMessages account. My phone number has always been my unique identifier through which I choose to receive these short bits of text (for good reason). If I can't use my real “address,” there's not much point in signing up for a different delivery company. The package will not arrive where I need it.

Since iOS 5 launched, it has puzzled me why Apple designed the system so that iMessages sent to my Apple ID go to my Mac, iPhone and iPad while iMessages sent using my phone number only go to my iPhone. It creates a confusing (and technologically needless) situation where one ideally needs to give up iMessages' brilliant capability of seemlessly replacing SMS to reap all the benefits of using it.

Apple should fix this in iOS 6.

Why Anyone Who Loves Freedom Needs to Support Apple

By | Posted at 12:52 PM

I tweeted this article about the severe implications of the government's request for a backdoor in Apple's products and included the comment “Imagine the 1st missionary killed in a hostile land, found via an FBI mandated backdoor. This is why Apple is right.” A friend of mine asked me on Facebook why it is so crucial Apple not be forced to create a system that would allow the unlocking of the San Bernardino terror suspect's phone. I want to answer my friend's question by exploring two different parts of the problem.

To understand where this all starts, it starts with Apple creating an encryption system that they did not have the key to unlock. After the revelations about the NSA that Edward Snowden released, Apple created such a system for a very simple reason: it became clear that the government intended to vastly exceed its constitutional surveillance powers and the only way a company like Apple could avoid becoming a collaborator was to remove itself from the key equation so that it genuinely could not access customer data. If a company has the key, the government can demand the key not only to see what a terrorist has on his or her phone, but also for other, less desirable searches like the warrantless, broad data collection the NSA has been doing over the last decade. Worse, when the government utilizes these unconstitutional powers, it imposes gag orders on the companies it interacts with so they cannot even say anything about what is happening.

It bears repeating: while there is broad support for breaking into a terrorist's phone, the only way Apple can legally avoid being made a tool for the government against all of us, not just terrorists, is to create a product that does not have a backdoor. So, Apple did the logical thing: it created a product without any backdoors. Apple is now being asked not just to “unlock” its phone, but to create a new version of its software that has an intentionally broken security system. If it exists, even if it were installed on only this one phone, we will be only a few secret FISA orders away from it being installed on thousands or millions of phones. If an iOS variant that creates a vulnerability exists, the NSA can just contact Apple six months from now and order that same backdoor be included in every iOS device the next time a software update goes out. And, it could gag Apple so that the company could not warn anyone.

Whoops!

By | Posted at 11:37 AM

Who Copied Whom?

By | Posted at 1:12 AM

Since Apple has been busy with their patent suits against Android phone manufacturers, certain parties have made claims about how Android was already going where Apple headed with an all touchscreen phone before the iPhone. Thus, a presentation the Verge discovered which presents what an Android phone was originally suppose to look like is enlightening:

Exact specs for those first concepts aren't detailed, but Google does spell out what it had in mind for the least common denominator across Android devices. […] At that time, touchscreen support wasn't a requirement — in fact, the baseline specs required two soft menu keys, indicating that touchscreens weren't really in the plan at all.

Keep in mind that this plan was communicated a month or so before the iPhone launched and over year before Android finally came to market in the United States. Google was clearly aiming to copy the BlackBerry until the iPhone completely changed what people wanted in a phone. To his credit, Thom Holwerda, who has been a vocal critic of this suggestion in the past, has admitted that this new revelation shows he was wrong.

What's Wrong With Android: Exhibit 1392

By | Posted at 5:26 PM

Airpush is trying to attract developers to its Android ad network. How it suggests delivering its ads is telling: the company offers advertising shortcuts app developers can place on users' home screens and also push ads that show up in users' notification trays.

Nothing like bringing that genuine Windows adware experience to the mobile world.

What'd I Just Do?

By | Posted at 10:35 AM

So, I was looking through American TV's ad this morning for their warehouse sale and noticed they had Mac minis (PowerPC) starting at $299. I called up and while my store did not have any, they had two in the St. Louis area — one 1.42 GHz/256 megs of ram and one 1.25 Ghz/256 megs of ram for $349 and $299 respectively. Both are the combo drive models, but that's not so bad.

I bought both of them. They're going for more than that on eBay, after all and they have a 15 day return policy if I get buyers remorse.

I thought I'd mention this truly great deal in case anyone has an American store in their area. Seems like a great deal. I have a sample copy of OS X Server that I'm going to put on one of them. Maybe the other will be an extra computer workstation or something, I'm not sure.

What Technology Do You Really Want?

By | Posted at 6:00 PM

What Happened

By | Posted at 6:27 PM

You are viewing page 2 of 32.