A list of what's broken in Apple's most important... →
Photos is broken Control over default apps Content warnings Homescreen & folders Easier toggles Restore from iCloud Airdrop for iOS I haven’t had any problems with Photos but the rest is spot on - some are things I’ve been complaining about for years. I hope someone important at Apple is keenly aware of this shortcomings and doing something about them!
Is it a Condom or an Android phone? →
I laughed so hard…
The shocking toll of hardware and software... →
Having been an iOS developer and mobile html5 app developer I still find android’s fragmentation problem hard to comprehend. Nevertheless it seems clear that this is a very hard to solve problem with very real consequences.
Death of a data heaven →
An overview of the history of the Principality of Sealand and it’s infamous data haven. Keen legal and practical observations included.
Your Favorite Programming Language →
Hacker News Poll: What is Your Favorite Programming Language
The Story of Keep Calm and Carry On →
A short film that tells the story behind the ‘Keep Calm and Carry On’ poster.
Windows 8 vs Mac OS X
A series of videos by lockergnome of an erderly person (“Chris’ Dad”) using Windows 8 and OSX for the first time: How Real People Will Use Windows 8: He can’t go back to the Windows 8 tiles. Using Mac OS X for the First Time: With some difficulty, he’s able to use it. Windows 8 Vs. Mac OS X: the conclusion. Spoiler: OSX wins.
Kevin Rose’s Oink Shuts Down →
I would’ve gone with Stamped anyway. Jokes aside, this was unexpected - 5 months from launch to close for a product that seemed fairly successful.
Hacking is Important →
The story of every company begins with a clever hack. Pick any company, read its history, and I’m pretty sure there will be a well-documented origin story that will define its beginning and involves someone building something new and possibly of unexpected value. What isn’t documented is the story of every moment before where everyone surrounding the hacker asked, “Why the hell are doing you...
Galaxy S II Android 4.0 update - Soon →
Samsung has finally made Android 4.0 available to Galaxy S II users in South Korea via Kies. The company also announced the first details of European availablity — Poland, Sweden, and Hungary will also be getting the update today, with more countries on the way. Oh and it doesn’t matter if your GSII is unlocked - apparently it still needs carrier approval or some other green light from...
ARM: 32 bit 1mm X 1mm - Years of Battery Life →
The Cortex -M0 architecture is designed to provide chip-makers with the means to build microcontrollers that require “ultra low power” but are capable of 32-bit processing. Arm says it went back to the drawing board to create the new processor cores which measure 1mm by 1mm in size. It says the microcontrollers should draw around a third less energy than their predecessors,...
Congratulations on creating your brand new Gmail...
It’s not the first time I get an email like this from google: Congratulations on creating your brand new Gmail address, [address_that_has_nothing_to_do_with_me]@gmail.com. Please keep this email for your records, as it contains an important verification code that you may need should you ever encounter problems or forget your password. You can login to your account at...
Windows 8 and Metro show true multiplatform OS... →
Even an iPad screen can often look cluttered next to Metro. I spent a couple of days in deep-soak mode with Windows 8 on a developer tablet, to learn as much as I could. Then it was time to pick up my iPad and return to my usual daily work. My eyes were drawn to all of the user elements and controls that stuck to the screen long before and long after I used them. I found myself wondering why...
When 802.1x/PEAP/EAP-TTLS is Worse Than No... →
A wireless network that is open with no authentication or encryption provides an attacker one thing: Network access. It’s up to the attacker to then use that network access to do what he or she wants to do. That’s bad enough but a network running LEAP without a sufficiently complex and uniformly enforced password complexity policy nets an attacker two things: Network access...