Thursday, August 26, 2010

Waiting for next cool gadget (definitely not like waiting for prostrate surgery appointment)

While I continue to suffer with the battery life of my 35-month-old Windows Mobile smartphone and look forward to getting an Android 2.2 device, I find it interesting that although members of our society feels like they are caught in a rat race, simultaneously we cannot wait patiently for the next new device. 

For tasks that need to get done, weeks seem to fly by while we are preoccupied with other things or procrastinating.  Outside, in our backyard, vegetables and weeds alike grow bigger with each passing day.  My wife's tummy is getting bigger.  On the other hand, I have a hard time keeping on top of all the things that need to get done.  And therefore the launch date of the next cool gadget will be here sooner than we think.

Here's to Android 2.2 in Canada, here before I'm ready  :-)

Wednesday, August 18, 2010

Listened to TWiT 261: Abandon All HPOA

  • Netcast
  • Economics of privacy have changed.  Before it used to be becoming public (well known) was expensive: You were either Marilyn Monroe or a shmoe.  Now, to stay out of the lime-light (keep your personal details private), you have to pay extra or make an extra effort 
  • Is the reason that Android phones are selling more than iPhones is that iPhone is still restricted to AT&T in the US?  And AT&T reception is relatively poor?  And that people are still locked into contracts with other carriers (that don't have the iPhone for their network)?

Saturday, August 7, 2010

Listened to This Week In Google 54: Wave Bye Bye

  • Netcast
  • Potential malware in Android apps 
  • Vulnerabilities in the Safari browser in the iPhone, iPod Touch, etc. that also enable jail-breaking
  • Need for firewalls (controlling outgoing traffic) and UAC for these devices 
  • A certification process for Android apps, paid by developers of apps
  • As with so-called free applications available for Windows, Linux, etc., any type of code that is not from a trusted source is installed at your own risk.  An application may not wipe out your data but perhaps worse, it can send your data to malicious users for their purposes.  Code to be wary of include Firefox Add-Ins, GreaseMonkey scripts, etc. that may not normally be viewed as "applications"