We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!
Bismillah (993337) writes "While you're in coverage during take-off and landing, at least. Passengers flying with Qantas and Virgin Australia might be able to leave their devices on from as early as September this year after the Civil Aviation Authority decided it was no longer unsafe to do so."
rtoz writes Google has just announced a new processor for Project Ara. The mobile Rockchip SoC will function as an applications processor, without requiring a bridge chip. A prototype of the phone with the Rockchip CPU, will be available early next year. Via Google+ post, Project Ara team Head Paul Eremenko says "We view this Rockchip processor as a trailblazer for our vision of a modular architecture where the processor is a node on a network with a single, universal interface -- free from also serving as the network hub for all of the mobile device's peripherals." (Project Ara is Google's effort to create an extensible, modular cellphone; last month we mentioned a custom version of Linux being developed for the project, too.)
MojoKid writes We're often told that having a kill switch in our mobile devices — mostly our smartphones — is a good thing. At a basic level, that's hard to disagree with. If every mobile device had a built-in kill switch, theft would go down — who would waste their time over a device that probably won't work for very long? Here's where the problem lays: It's law enforcement that's pushing so hard for these kill switches. We first learned about this last summer, and this past May, California passed a law that requires smartphone vendors to implement the feature. In practice, if a smartphone has been stolen, or has been somehow compromised, its user or manufacturer would be able to remotely kill off its usability, something that would be reversed once the phone gets back into its rightful owner's hands. However, such functionality should be limited to the device's owner, and no one else. If the owner can disable a phone with nothing but access to a computer or another mobile device, so can Google, Samsung, Microsoft, Nokia or Apple. If the designers of a phone's operating system can brick a phone, guess who else can do the same? Everybody from the NSA to your friendly neighborhood police force, that's who. At most, all they'll need is a convincing argument that they're acting in the interest of "public safety."
stephendavion (2872091) writes Researchers will demonstrate the process used to spy on smartphones using gyroscopes at Usenix Security event on August 22, 2014. Researchers from Stanford and a defense research group at Rafael will demonstrate a way to spy on smartphones using gyroscopes at Usenix Security event on August 22, 2014. According to the "Gyrophone: Recognizing Speech From Gyroscope Signals" study, the gyroscopes integrated into smartphones were sensitive enough to enable some sound waves to be picked up, transforming them into crude microphones.
New submitter nrjperera (2669521) submits news of a new laptop from HP that's in Chromebook (or, a few years ago, "netbook") territory, price-wise, but loaded with Windows 8.1 instead. Microsoft has teamed up with HP to make an affordable Windows laptop to beat Google Chromebooks at their own game. German website Mobile Geeks have found some leaked information about this upcoming HP laptop dubbed Stream 14, including its specifications. According to the leaked data sheet the HP Stream 14 laptop will share similar specs to HP's cheap Chromebook. It will be shipped with an AMD A4 Micro processor, 2GB of RAM, 32GB of flash storage and a display with 1,366 x 768 screen resolution. Microsoft will likely offer 100GB of OneDrive cloud storage with the device to balance the limited storage option.
stephendavion writes Looks like Chinese device maker, Xiaomi, is taking its "Apple of the East" tag too literally. First, their CEO brazenly copies Steve Jobs' signature look, sitting cross-legged on the floor. And now, Xiaomi's latest version of Android shamelessly rips off iOS 7. MIUI 6, which is Xiaomi's upcoming edition of Android for its latest phones and tablets, looks almost exactly like Apple's operating system for iPhones, iPads and the iPod Touch. It features the same bright color palette and a flat design. Heck, it even does away with Google's "app drawer" and puts all apps on your home screen. It's like the CEO handed iPhones to the design team and barked: "Here, copy this!"
An anonymous reader writes: The Electronic Frontier Foundation has updated its guide for protecting yourself and your cell phone at a protest. In addition to being extremely powerful tools (real-time communication to many watchers via social media, and video recording functionality), cell phones can also give authorities a lot of information about you if they confiscate it. The EFF is trying to encourage cell phone use and prepare people to use them. (The guide is based on U.S. laws, but much of the advice makes sense for other places as well.) Here are a few small snippets: "Start using encrypted communications channels. Text messages, as a rule, can be read and stored by your phone company or by surveillance equipment in the area. ... If the police ask to see your phone, tell them you do not consent to the search of your device. Again, since the Supreme Court's decision in Riley, there is little question that officers need a warrant to access the contents of your phone incident to arrest, though they may be able to seize the phone and get a warrant later. ... If your phone or electronic device was seized, and is not promptly returned when you are released, you can file a motion with the court to have your property returned."
angry tapir (1463043) writes Apple has done well to insulate its iOS mobile operating system from many security issues, but a forthcoming demonstration shows it's far from perfect. Next Wednesday at the Usenix Security Symposium in San Diego, researchers with the Georgia Institute of Technology will show how iOS's Achilles' heel is exposed when devices are connected over USB to a computer or have Wi-Fi synching enabled. The beauty of their attack is that it doesn't rely on iOS software vulnerabilities, the customary way that hackers commandeer computers. It simply takes advantage of design issues in iOS, working around Apple's layered protections to accomplish a sinister goal.
An anonymous reader writes Ryan Lackey of CloudFlare and Marc Rogers of Lookout revealed a new OPSEC device at Def Con called PORTAL (Personal Onion Router to Assure Liberty). It "provides always-on Tor routing, as well as 'pluggable' transport for Tor that can hide the service's traffic signature from some deep packet inspection systems." In essence, PORTAL is a travel router that the user simply plugs into their existing device for more than basic Tor protection (counterpoint to PogoPlug Safeplug and Onion Pi). On the down side, you have to download PORTAL from Github and flash it "onto a TP-Link compatible packet router." The guys behind the device acknowledge that not many people may want to (or even know how to) do that, so they're asking everyone to standby because a solution is pending. The project's GitHub page has a README file that lists compatible models, with some caveats: "It is highly recommended to use a modified router. The modified MR11U and WR703N provide a better experience than the stock routers due to the additional RAM. The severe space constraints of the stock router make them very challenging to work with. Due to the lack of usable space, it is necessary to use an external disk to store the Tor packages. The stock router has only a single USB port, and the best option is to use a microSD in a 3G modem." (Note: Lackey is no stranger to helping people secure internet privacy.)
New submitter User0x45 writes: Here's a nicely transparent announcement: "T-mobile has identified customers who are heavy data users and are engaged in peer-to-peer file sharing, and tethering outside of T-Mobile’s Terms and Conditions (T&C). This results in a negative data network experience for T-Mobile customers. Beginning August 17, T-Mobile will begin to address customers who are conducting activities outside of T-Mobile’s T&Cs." Obviously, it's not a good announcement for people with unlimited plans, but at least it's clear. T-mobile also pulled the backwards anti-net neutrality thing by happily announcing 'Free Streaming' from select music providers... which is, in effect, making non-select usage fee-based.
mrspoonsi (2955715) writes with word that Samsung is hopping on the metal case and rounded corners design bandwagon. From the article: Samsung says a metal frame and curved corners give the Galaxy Alpha a "sophisticated" look. The South Korean company describes the Galaxy Alpha as representing a "new design approach". The firm has previously been criticised for the plastic feel of its handsets at a time when other firms have opted to use materials marketed as having a "premium" feel. Samsung Electronics saw a 20% year-on-year drop in its last quarter's profit. The phone features 2G of RAM, a 4.7" AMOLED display, and either an 8-core Exynos 5 or 4-core Snapdragon 801.
orasio writes: One of the most frustrating first-world problems ever (trying to connect an upside-down Micro-USB connector) could disappear soon. The Type-C connector for USB has been declared ready for production by the USB Promoter Group (PDF). "With the Type-C spec finalized, it now comes down to the USB-IF to actually implement the sockets, plugs, cables, adapters, and devices. The problem is that there are billions of existing USB devices and cables that will need adapters and new cables to work with new Type-C devices. It’s a lot like when Apple released the Lightning connector, but on an even grander scale. Further exacerbating the issue is the fact that China, the EU, and the GSMA have all agreed that new mobile devices use Micro-USB for charging — though it might be as simple as including a Micro-USB-to-Type-C adapter with every new smartphone."
SpzToid writes Following up an earlier story here on Slashdot, now Xiaomi has apologized for collecting private data from its customers. From the article: "Xiaomi Inc said it had upgraded its operating system to ensure users knew it was collecting data from their address books after a report by a computer security firm said the Chinese budget smartphone maker was taking personal data without permission. The privately held company said it had fixed a loophole in its cloud messaging system that had triggered the unauthorized data transfer and that the operating system upgrade had been rolled out on Sunday. The issue was highlighted last week in a blog post by security firm F-Secure Oyg. In a lengthy blogpost on Google Plus, Xiaomi Vice President Hugo Barra apologized for the unauthorized data collection and said the company only collects phone numbers in users' address books to see if the users are online."
MojoKid (1002251) writes "Security researcher Gene Bransfield, with the help of his wife's grandmother's cat, decided to see how many neighborhood WiFi access points he could map and potentially compromise. With a collar loaded with a Spark chip, a Wi-Fi module, a GPS module, and a battery, Coco the cat helped Gene identify Wi-Fi networks around the neighborhood and then reported back. The goal here is obvious: Discover all of the unsecured, or at least poorly-secured, wireless access points around the neighborhood. During his journey, Coco identified dozens of Wi-Fi networks, with four of them using easily-broken WEP security, and another four that had no security at all. Gene has dubbed his collar the "WarKitteh", and it cost him less than $100 to make. He admits that such a collar isn't a security threat, but more of a goofy hack. Of course, it could be used for shadier purposes." (Here's Wired's article on the connected cat-collar.)
New submitter shervinemami writes (starting with a pretty big disclaimer: "I'm an Engineer at NVIDIA.") The latest CompuBench GPU benchmarks show NVIDIA's Tegra K1 running whole OpenCL algorithms around 5x faster than any other mobile device, and individual instructions around 20x faster! This huge jump is because mobile companies have been saying they support OpenCL on mobile devices since early 2013, but what they don't mention is that they only have software API support, not hardware-accelerated OpenCL running faster on their GPUs than CPUs. Now that NVIDIA's Tegra-K1 chip has started shipping in devices and thus is available for full benchmarking, it is clearly the only mobile chip that actually gives you proper hardware-accelerated OpenCL (and CUDA of course!). The K1 is also what's in Google's Project Tango 3-D mapping tablet.
Def Con shows no mercy. As gleefully reported by sites several Blackberry-centric sites, researcher Justin Case yesterday demonstrated that he could root the much-heralded Blackphone in less than five minutes. From n4bb.com's linked report: "However, one of the vulnerabilities has already been patched and the other only exploitable with direct user consent. Nevertheless, this only further proves you cannot add layers of security on top of an underlying platform with security vulnerabilities." Case reacts via Twitter to the crowing: "Hey BlackBerry idiots, stop miss quoting me on your blogs. Your phone is only "secure" because it has few users and little value as a target."
They may be well reviewed and China's new top selling phone, but reader DavidGilbert99 writes with reason to be cautious about Xiaomi's phones: Finnish security firm F-Secure has seemingly proven that Xiaomi smartphones do in fact upload user data without their permission/knowledge despite the company strongly denying these allegations as late as 30 July. Between commercial malware and government agencies, how do you keep your phone's data relatively private?
First time accepted submitter jarmund (2752233) writes "I first got a WRT54GL in 2007. Now, 7 years later, it's still churning along, despite only having one of its antennae left after an encounter with a toddler. As it is simply not up to date to today's standards (802.11N for example), what is a worthy successor? I enjoyed the freedom to choose the firmware myself (I've run Tomato on it since 2008), in addition to its robustness. A replacement will be considered second-rate unless it catered for the same freedom as its predecessor." Is there a canonical best household router nowadays?
Linking to a story at Reuters, reader WilliamGeorge writes "Russia is further constraining access to the internet and freedom of speech, with new laws regarding public use of WiFi. Nikolai Nikiforov, the Russian Communications Minister, tweeted that "Identification of users (via bank cards, cell phone numbers, etc.) with access to public Wifi is a worldwide practice." This comes on top of their actions recently to block websites of political opponents to Russian president Vladimir Putin, require registration of prominent bloggers, and more. The law was put into effect with little notice and without the input of Russian internet providers. Sergei Plugotarenko, head of the Russian Electronic Communications Association, said "It was unexpected, signed in such a short time and without consulting us." He added, "We will hope that this restrictive tendency stops at some point because soon won't there be anything left to ban." In addition to the ID requirement to use WiFi, the new law also requires companies to declare who is using their web networks and calls for Russian websites to store their data on servers located in Russia starting in 2016." That's not the only crackdown in progress, though: former Slashdot code-wrestler Vlad Kulchitski notes that Russian users are being blocked from downloading Java with an error message that reads, in essence, "You are in a country on which there is embargo; you cannot download JAVA." Readers at Hacker News note the same, though comments there indicate that the block may rely on a " specific and narrow IP-block," rather than being widespread. If you're reading this from Russia, what do you find?
itwbennett writes China is tightening control over mobile messaging services with new rules that limit their role in spreading news. Under the new regulations, only news agencies and other groups with official approval can publish whatever the government considers political news via public accounts. "All other public accounts that have not been approved cannot release or reprint political news," the regulations said. Users of the instant messaging services will also have to register with their official IDs, and agree to follow relevant laws.
An anonymous reader writes "The battle over Comcast's public WiFi network that is hosted on your cable modem continues. Comcast responded to Speedify's earlier power measurements by rushing them a new Cisco cable modem. The new modem proved to be more power hungry than the last, and also introduced some tricky IPv6 problems that caused major headaches for the team."
OpenSignal, by means of mobile apps for iOS and Android, has been amassing data on Wi-Fi and cell-network signal strength. They released yesterday a few of their findings on the speed of Wi-Fi available at U.S. chain hotels (download speeds, specifically). Though it shouldn't be surprising that (as their data shows) more expensive hotels generally have faster speeds, I know it hasn't always matched my own experience. (Hotel chains also vary, even within brands, in whether the in-room Wi-Fi is free, cheap, or exorbitant.) If the in-room connection is flaky or expensive, though, from the same report it seems you'll do better by popping into a Google-networked Starbucks location than one fed by AT&T, and McDonalds beats Panera Bread by quite a bit.
Lucas123 (935744) writes "A new company has just opened a crowdsourcing campaign for a heads-up display that plugs into your car's OBD II port and works with iPhones and Android OS-enabled mobile devices via Bluetooth to project a 5.1-in transparent screen that appears to float six feet in front of the windshield. The HUD, called Navdy, works with navigation apps such as Google Maps for turn-by-turn directions, and music apps such as Spotify, Pandora, iTunes Music and Google Play Music. Using voice commands via Apple's Siri or Google Voice, the HUD can also write, read aloud or display notifications from text messages or social media apps, such as Twitter. Phone calls, texting or other applications can also be controlled with hand gestures enabled by an infrared camera."
MojoKid (1002251) writes "China seems to be on a mission to isolate itself from the world, at least in terms of technology. After banning Windows 8 on government PCs and raiding several of Microsoft's offices in China as part of an anti-trust investigation, Chinese officials have now prohibited purchase of several Apple products for government use. The list of banned Apple products include the iPad, iPad Mini, MacBook Air, MacBook Pro, and half a dozen other items, all of which were left off of a final government procurement list distributed in July. This is a potentially big hit to Apple, which generated around 16 percent of its $37.4 billion in revenue last quarter from China. Apple saw its iPad sales jump 51 percent and Mac sales boosted 39 percent in China."
New submitter redseo writes Xiaomi, known as the Apple of China, and recently enjoying its new-found fame and glory in the Indian market, has achieved yet another milestone. It has overtaken Samsung, to become China's best selling smartphone manufacturer, in Q2 2014. Xiaomi sold total of 15 million smartphones in China in Q2, which is a three-fold increase from a year ago. That's pretty good for a company founded only four years ago, with no stores of its own. (And though Xiaomi's phones are not widely sold in the U.S., they're offered by third-party sellers on Amazon and elsewhere; CNet has mostly good things to say about the company's Mi 3.)
An anonymous reader writes About a week ago, the Federal Communications Commission (FCC) asked for Verizon's justification on its policy of throttling users who pay for unlimited data usage. "I know of no past Commission statement that would treat 'as reasonable network management' a decision to slow traffic to a user who has paid, after all, for 'unlimited' service," the FCC wrote. In its response, Verizon has indicated that its throttling policy is meant to provide users with an incentive to limit their data usage. The company explained that "a small percentage of the customers on these [unlimited] plans use disproportionately large amounts of data, and, unlike subscribers on usage-based plans, they have no incentive not to do so during times of unusually high demand....our practice is a measured and fair step to ensure that this small group of customers do not disadvantage all others."
An anonymous reader writes Laptop Mag battery tested the leading phones on all four major U.S. carriers and found that the same models on T-Mobile typically last 1 to 3 hours longer on a charge. This trend is not new, but has continued for over 3 years of testing. The article says While we don’t know for certain why T-Mobile phones last longer on a charge, there are some strong possibilities. T-Mobile’s network could be more efficient at sending and receiving data because of the bands it uses, or maybe there are far fewer customers on its LTE network, easing the strain. Another possibility is that T-Mobile tends to pre-load less bloatware on its flagship devices relative to the other carriers. AT&T is firmly in second place in the battery life findings presented, with Verizon and Sprint jockeying for last of the four carriers measured. It woud be interesting to see a similar test battery for phones in marginal reception areas; searching for service seems to deplete my battery faster than talking does.
vinces99 (2792707) writes "Imagine a world in which your wristwatch or other wearable device communicates directly with your online profiles, storing information about your daily activities where you can best access it – all without requiring batteries. Or, battery-free sensors embedded around your home that could track minute-by-minute temperature changes and send that information to your thermostat to help conserve energy. This not-so-distant 'Internet of Things' reality would extend connectivity to perhaps billions of devices. Sensors could be embedded in everyday objects to help monitor and track everything from the structural safety of bridges to the health of your heart. But having a way to cheaply power and connect these devices to the Internet has kept this from taking off. Now, University of Washington engineers have designed a new communication system that uses radio frequency signals as a power source and reuses existing Wi-Fi infrastructure to provide Internet connectivity to these devices. Called Wi-Fi backscatter, this technology is the first that can connect battery-free devices to Wi-Fi infrastructure. The researchers will publish their results at the Association for Computing Machinery's Special Interest Group on Data Communication's annual conference this month in Chicago. The team also plans to start a company based on the technology. The Pre-print research paper.
wired_parrot writes In a presentation to be shown Thursday at the Black Hat conference, cybersecurity consultant Ruben Santamarta is expected to outline how planes can be hacked via inflight wi-fi. Representatives of in-flight communication systems confirmed his findings but downplayed the risks, noting that physical access to the hardware would still be needed and only the communication system would be affected.
On Friday President Obama signed into a law a bill allowing mobile devices to be legally unlocked, so that consumers can switch between carriers. The legislation was kicked off by a successful petition on Whitehouse.gov after the Librarian of Congress decided that cell phones no longer needed an exemption from the Digital Millennium Copyright Act's anti-hacking provision. The legislation (PDF) passed both houses of Congress and is now law. Unfortunately, the new bill doesn't guarantee permanent legality. It simply reinstates the exemption, and leaves the DMCA alone. For the next year, cell phone unlocking will certainly be legal, but after that, the Librarian of Congress once again has the ability to void the exemption once every three years.
jfruh writes The FTC has moved aggressively recently against companies that make it too easy for people — especially kids — to rack up huge charges on purchases within apps. But at a dicussion panel sponsored by free-market think tank TechFreedom, critics pushed back. Joshua Wright, an FTC commissioner who dissented in a recent settlement with Apple, says a 15-minute open purchase window produced "obvious and intuitive consumer benefits" and that the FTC "simply substituted its own judgment for a private firm's decision as to how to design a product to satisfy as many users as possible."
mikejuk writes The constant war to jailbreak and patch iOS has taken another step in favor of the jailbreakers. Georgia Tech researchers have found a way to jailbreak the current version of iOS. What the Georgia Tech team has discovered is a way to break in by a multi-step attack. After analysing the patches put in place to stop previous attacks, the team worked out a sequence that would jailbreak any modern iPhone. The team stresses the importance of patching all of the threats, and not just closing one vulnerability and assuming that it renders others unusable as an attack method. It is claimed that the hack works with any iOS 7.1.2 using device including the iPhone 5s.
It is worth noting that the The Device Freedom Prize for an open source jailbreak of iOS7 is still unclaimed and stands at just over $30,000. The details are to be revealed at the forthcoming Black Hat USA (August 6 & 7 Las Vegas) in a session titled Exploiting Unpatched iOS Vulnerabilities for Fun and Profit:
GTRacer writes: Forbes reports that Hilton Worldwide, international hotel operator, is rolling out smartphone-based guest tools allowing self-service check-in, access to a virtual floorplan to select a room, and (in 2015) actual door access once checked in. The author states the drive for this technology is the growing influence of the swelling ranks of Millennials, who "[...] have a very strong inclination toward automated and self-service customer service." The security risks seem obvious, though.
jones_supa (887896) writes "Nokia's future as a company focused on providing network solutions, rather than mobile phones, looks to be bright. The company made big profits in the second quarter of 2014 after selling its mobile devices unit — the cornerstone of Nokia's rise in the 1990s — to Microsoft. Meanwhile Nokia has been buying up other businesses such as the Chicago-based SAC Wireless. Now Nokia is acquiring part of Panasonic's network business in an effort to boost its presence in Japan. The deal announced Thursday will give the Finnish firm control of roughly one third of Japan's mobile network market."
rtoz writes with this excerpt from an IDG story about the creation of an Android fork made just for Google's modular cell-phone project : A special edition of Android had to be created for the unique customizable design of Project Ara, said George Grey, CEO of Linaro. ... Android can already plug and play SD cards. But Grey said additional OS functionality is needed for storage, cameras and other modules that are typically inside smartphones, but can now be externally added to Project Ara. A lot of work is also being done on UniPro transport drivers, which connect modules and components in Project Ara. UniPro protocol drivers in Android will function much like the USB protocol, where modules will be recognized based on different driver "classes," such as those for networking, sensor, imaging, input and others. Some attachable parts may not be recognized by Android. For those parts, separate drivers need to be developed by module makers through emulators. "That will be need to be done in a secure system so the device can't do damage to the system," Grey said. Project Ara is a very disruptive concept, and it turns around conventional thinking on how to build phones, Grey said.
A recent post by Instapaper's Marco Arment suggests that design flaws in Apple's App Store are harming the app ecosystem, and users are suffering because of it. "The dominance and prominence of 'top lists' stratifies the top 0.02% so far above everyone else that the entire ecosystem is encouraged to design for a theoretical top-list placement that, by definition, won’t happen to 99.98% of them." Arment notes that many good app developers are finding continued development to be unsustainable, while scammy apps are encouraged to flood the market.
"As the economics get tighter, it becomes much harder to support the lavish treatment that developers have given apps in the past, such as full-time staffs, offices, pixel-perfect custom designs of every screen, frequent free updates, and completely different iPhone and iPad interfaces. Many will give up and leave for stable, better-paying jobs. (Many already have.)" Brent Simmons points out the indie developers have largely given up the dream of being able to support themselves through iOS development. Yoni Heisler argues that their plight is simply a consequence of ever-increasing competition within the industry, though he acknowledges that more app curation would be a good thing. What strategies could Apple (and the operators of other mobile application stories) do to keep app quality high?
Vigile (99919) writes "Last week NVIDIA announced the SHIELD Tablet and SHIELD Controller, and reviews are finally appearing this morning. Based on the high performance Tegra K1 SoC that integrates 192 Kepler architecture CUDA cores, benchmarks reveal that that the SHIELD Tablet is basically unmatched by any other mobile device on the market when it comes to graphics performance — it is more than 2.5x the performance of the Apple A7 in some instances. With that power NVIDIA is able to showcase full OpenGL versions of games like Portal and Half-Life 2 running at 1080p locally on the 19:12 display or output to a TV in a "console mode." PC Perspective has impressions of that experience as well as using the NVIDIA Game Stream technology to play your PC games on the SHIELD Tablet and controller. To go even further down the rabbit hole, you can stream your PC games from your desktop to your tablet, output them to the TV in console mode, stream your game play to Twitch from the tablet while overlaying your image through the front facing camera AND record your sessions locally via ShadowPlay and using the Wi-Fi Direct powered controller to send and receive audio. It is incredibly impressive hardware but the question remains as to whether or not there is, or will be, a market for Android-based gaming devices, even those with the power and performance that NVIDIA has built."
First time accepted submitter baka_toroi (1194359) writes I got a Tungsten E2 from a friend and I wanted to give it some life by programming for it a little bit. The main problem I'm bumping up against is that HP thought it would be awesome to just shut down every single thing related to Palm OS development. After Googling a lot I found out CodeWarrior was the de facto IDE for Palm OS development... but I was soon disappointed as I learned that Palm moved from the 68K architecture to ARM, and of course, CodeWarrior was just focused on Palm OS 4 development.
Now, I realize Palm OS 4 software can be run on Palm OS 5, but I'm looking to use some of the 'newer' APIs. Also, I have the Wi-fi add-on card so I wanted to create something that uses it. I thought what I needed was PODS (Palm OS Development Suite) but not only I can't find it anywhere but also it seems it was deprecated during Palm OS's lifetime. It really doesn't help the fact that I'm a beginner, but I really want to give this platform some life. Any general tip, book, working link or even anecdotes related to all this will be greatly appreciated.
New submitter tekxtc (136198) writes Slashdot has reported in the past that a Tizen phone is coming and that the design and photos leaked. But, it has just been announced that the launch of the first Tizen phone has been delayed because of Tizen's small ecosystem. Should it ever ship? Haven't Android and iOS completely cornered the market? Is there any hope for the likes of Tizen, Firefox OS, and Windows on phones and tablets?
UrsaMajor987 (3604759) writes I have a Asus Transformer tablet that I dropped on the floor. There is no obvious sign of damage but It will no longer boot. Good excuse to get a newer model. I intend to sell it for parts (it comes with an undamaged keyboard) or maybe just toss it. I want to remove all my personal data. I removed the flash memory card but what about the other storage? I know how to wipe a hard drive, but how do you wipe a tablet? If you were feeling especially paranoid, but wanted to keep the hardware intact for the next user, what would you do?
Bennett Haselton writes: I can't stand switching from a slideout-keyboard phone to a touchscreen phone, and my own informal online survey found a slight majority of people who prefer slideout keyboards even more than I do. Why will no carrier make them available, at any price, except occasionally as the crummiest low-end phones in the store? Bennett's been asking around, of store managers and users, and arrives at even more perplexing questions. Read on, below.
Forbes has an update on what sort of future Nokia faces, as Microsoft reveals a strategy for making sense of the acquisition: [Microsoft EVP of devices Stephen] Elop laid out a framework for cost cuts in a memo to employees on July 17. Devices would focus on high and low cost Windows smartphones, suggesting a phasing out of feature phones and Android smartphones. Two business units, smart devices and mobile phones, would become one, thereby cutting overlap and overhead. Microsoft would reduce engineering in Beijing and San Diego and unwind engineering in Oulu, Finland. It would exit manufacturing in Komarom, Hungary; shift to lower cost areas like Manaus, Brazil and Reynosa, Mexico; and reduce manufacturing in Beijing and Dongguan, China. Also, CEO Satya Nadella gave hints about how Microsoft will make money on Nokia during Tuesday' conference call. Devices, he said, "go beyond" hardware and are about productivity. "I can take my Office Lens App, use the camera on the phone, take a picture of anything, and have it automatically OCR recognized and into OneNote in searchable fashion. There is a lot we can do with phones by broadly thinking about productivity." In other words, the sale of a smartphone is a means to other sales.
New submitter Brett W (3715683) writes The security researchers that first published the 'Heartbleed' vulnerabilities in OpenSSL have spent the last few months auditing the Top 50 downloaded Android apps for vulnerabilities and have found issues with at least half of them. Many send user data to ad networks without consent, potentially without the publisher or even the app developer being aware of it. Quite a few also send private data across the network in plain text. The full study is due out later this week.
Harvard economics professor Sendhil Mullainathan takes a look in the New York Times at interesting correlations between the release dates of new phones and OSes and search queries that indicate frustration with the speed of the phones that people already have. Mullainathan illustrates with graphs (and gives plausible explanations for the difference) just how different the curves are over time for the search terms "iPhone slow" and "Samsung Galaxy slow." It's easy to see with the iPhone graph especially how it could seem to users that Apple has intentionally slowed down older phones to nudge them toward upgrading. While he's careful not to rule out intentional slowing of older phone models (that's possible, after all), Mullainathan cites several factors that mean there's no need to believe in a phone-slowing conspiracy, and at least two big reasons (reputation, liability) for companies — Apple, Google, and cellphone manufacturers like Samsung — not to take part in one. He points out various wrinkles in what the data could really indicate, including genuine but innocent slowdowns caused by optimizing for newer hardware. It's an interesting look at the difference between having mere statistics, no matter how rigorously gathered, and knowing quite what they mean.
PC Magazine (along with Forbes, Reuters, and others) reports that those on the rightmost edge of the graph for Verizon's "unlimited" 4G LTE service are about to hit a limit: [T]hose in the top five percent of Verizon's unlimited data users (which requires one to pull down an average of just around 4.7 gigabytes of monthly data or so) who are enrolled on an unlimited data plan and have fulfilled their minimum contract terms (are now on a month-to-month plan) will be subject to network throttling if they're trying to connect up to a cellular tower that's experiencing high demand." As the article goes on to point out, though, [A] user would have to hit all of these criteria in order to have his or her connection slowed down. There are a lot of hoops to jump through, giving even more weight to the fact that Verizon's throttling — while annoying on paper — won't affect a considerable majority of those still holding on to their unlimited data plans.
Jason Koebler (3528235) writes "The biggest thing that sets the Amazon Fire Phone apart from its Android and Apple competitors probably isn't the clean interface or the unlimited photo storage—it's the dirty power behind it. When Fire users upload their photos and data to Amazon's cloud, they'll be creating a lot more pollution than iPhone owners, Greenpeace says. Apple has made a commitment to running its iCloud on 100 percent clean energy. Amazon, meanwhile, operates the dirtiest servers of any major tech giant that operates its own servers—only 15 percent of its energy comes from clean sources, which is about the default national average." Greenpeace's jaundiced eye is on Amazon more generally; the company's new phone is just an example. Maybe Amazon or some other provider could take a page from some local utilities and let users signal their own preferences with a (surcharged) "clean energy" option.
theshowmecanuck (703852) writes with this excerpt from Reuters summarizing the upshot of a talk that Jonathan Zdziarski gave at last weekend's HOPE conference: Personal data including text messages, contact lists and photos can be extracted from iPhones through previously unpublicized techniques by Apple Inc employees, the company acknowledged this week. The same techniques to circumvent backup encryption could be used by law enforcement or others with access to the 'trusted' computers to which the devices have been connected, according to the security expert who prompted Apple's admission. Users are not notified that the services are running and cannot disable them, Zdziarski said. There is no way for iPhone users to know what computers have previously been granted trusted status via the backup process or block future connections. If you'd rather watch and listen, Zdziarski has posted a video showing how it's done.
NotSanguine (1917456) writes The U.S. Senate has passed a bill (S.517) today, allowing users to unlock their phones when moving to another provider. From a recent article at thehill.com: "Consumers should be able to use their existing cell phones when they move their service to a new wireless provider," [Sen. Patrick] Leahy said in a statement. "Our laws should not prohibit consumers from carrying their cell phones to a new network, and we should promote and protect competition in the wireless marketplace," he said. [Sen. Chuck] Grassley called the bipartisan compromise "an important step forward in ensuring that there is competition in the industry and in safeguarding options for consumers as they look at new cell phone contracts." "Empowering people with the freedom to use the carrier of their choice after complying with their original terms of service is the right thing to do," he said. The House in February passed a companion bill sponsored on cellphone unlocking from House Judiciary Committee Chairman Bob Goodlatte (R-Va.)." Also at Ars Technica, as pointed out by reader jessepdx.
jfruh writes While the Internet has made communications easier, that ease had made us very dependent on the Internet for communications — and, when disaster strikes, power and infrastructure outages tend to shut down those communications networks when we need them most. But now researchers are examining how the so-called "Internet of Things" — the proliferating array of Internet-communicating devices in our lives — can transmit emergency messages via ad-hoc networks even when the Internet backbone in a region is inoperable.