Telecom and Networking

Fake phones from China

Shanzhai ji gallery: Fake phones from China article looks into a Shanghai tech market to sort the fake from the real and to see how the fake iPhones stack up to the real thing. There are many brands of China Mobile Phones and almost of them are fake mobile phones with cheap price. This is

PC is not irrelevant

Google says desktop PC is three years from ‘irrelevance’. Google Europe boss John Herlihy told a “baffled” conference audience that very soon the smartphone will completely eclipse the desktop. “In three years time, desktops will be irrelevant,” he said. “In Japan, most research is done today on smart phones, not PCs.” Herlihy was trying to

Web technologies for mobile applications

I visited yeasterday Mobile Dev Camp. Mobile Dev Camp is a one day event devoted to developing mobile applications on the latest mobile platforms such as iPhone, Android, Maemo. It is held in Helsinki Finland. The end result waht I got from the presentations I followed that web techniologies are coming more and more into

Most Dangerous Programming Errors

The 2010 CWE/SANS Top 25 Most Dangerous Programming Errors is a list of the most widespread and critical programming errors that can lead to serious software vulnerabilities. They are often easy to find, and easy to exploit. They are dangerous because they will frequently allow attackers to completely take over the software, steal data, or

MeeGo Linux

According to news around Internet Intel and Nokia are combining their respective Linux operating environments to power future smartphones and tablets. The Intel-Nokia collaboration began in earnest in June when the two companies announced the beginning of a “long-term relationship,” focusing on developing new chip architectures, software, and a new class of Intel-based mobile computing

LackRack

This is a really neat trick I just read about. LackRack is the ultimate, low-cost, high shininess solution for your modular datacenter-in-the-living-room. Its low-cost and perfect fit are great for mounting up to 8 U of 19″ hardware, such as switches (see below), or perhaps other 19″ gear. Featuring the LACK (side table) from Ikea,

Universal identification is futile

Bruce Schneier blog post Anonymity and the Internet has interesting points on Internet security. I can agree many of them. Universal identification is portrayed by some as the holy grail of Internet security and that anonymity is bad. According to the blog this is not the case. The problem is that universal identification won’t work.

Open Source Symbian

When Nokia bought Symbian in 2008, nobody had any reason to believe their thoughts were anywhere near Open Source. Parts of the Symbian platform have been Open Source for quite some time and other portions have slowly been released. Symbian, maker of the the world’s most popular mobile operating system, has just completed the transition

Text message ripoff

Everyone knows that movie popcorn is one of the biggest ripoffs, right? It turns out that movie popcorn carries a 600 percent markup. The biggest ripoff: text message beats movie popcorn article tells that the text messaging has a much bigger markup. Text messages themselves, are just tiny blips of data being transferred to and