Today opens up WWDC, Apple’s Worldwide Developer Conference. Apple has confirmed three major foci for the conference this year: iOS 5, Mac OS X Lion and iCloud. Word on the street points to major Twitter integration in the core of iOS as a key component to iOS 5, something that sounds interesting, but hardly earth shattering. Let’s go a step further: what if Apple’s Twitter integration work was a step towards an Apple purchase of Twitter?
There is a world of difference between Windows and Linux in file handling. Your immediate need is to understand the business of permissions. One of the fundamental security advantages in Linux is every file is owned by someone, and the owner gets to decide what happens to those files. Ownership, of course, is limited to those who have an identity on the computer in question.
Last year, choosing a cellular network for a smartphone was easy enough: pretty much any phone you might buy was a “3G” capable one and, for the most part, the speed those phones achieved on their respective networks was about the same.. Today, all four of the big cellular companies are proclaiming the arrival of 4G phones. In this series, we will be looking at the latest and greatest phones to hit the market and examine whether they live up to the hype, starting with the first nationally available 4G LTE phone: the HTC Thunderbolt.
RHEL (and clones) does not come with very much multimedia capability. It has to do with politics, copyrights, and philosophical debates. Even if we tried to outline all the issues here, chances are quite good you don't care a whit. You want to play your music and videos, and there is no good reason you shouldn't. There are plenty of Linux developers willing to join you in seeking to play what Windows can play, and a lot more besides, but Red Hat is being careful and sticking to their commitment to the corporate client base.
How secure is “secure”? Nobody can decide for you. What I offer here is the measures I take before browsing the Net. From what I can tell, these measures are effective in that the data-mining and marketing industry has a very poor idea of who and where I am. Try looking yourself up on sites like Spokeo or Zabasearch to get an estimate of your online data trail. While your webbrowser is not the only source, nor even a major source, of such information, it is a part of the bigger effort. The whole idea is to make those data mining sites as inaccurate as possible. And maybe you don't care, but for those who do, I'd like to suggest a few configuration changes to improve things.
My cousin Alan in Missouri sends news that Harold Biellier has died. The report made me sad. Not because it was a tremendous surprise: Mr. Biellier was 90. Nor was he someone critical to my day-to-day existence: I doubt I’ve seen him even once in the last 40 years. I know I haven’t in the last 35.
Last time, we got the basic Linux system set up. Now, you need to orient yourself. Things may look a little different here than you are use to on other systems, but nothing is nearly as mysterious as it might seem. The main menu system is in the upper left-hand corner. In the upper right is the notification area (“Systray”). On the lower toolbar, the left is where the open windows are listed, and the lower right is an iconic representation of multiple desktops with your desktop “trashcan.”
In the last part of this series, we prepared to install Linux. Now's the time to take the leap and actually perform the installation, a process that is typically easy enough, but may include some complications I will outline below.
So, we have already discussed why you may want to try RHEL as your computer operating system. Now come the preparations. Take your time. RHEL 6 will install on most computers, but you should perform due diligence and research your hardware against Linux before attempting to install it.
The last week included major strategy announcements from two troubled cellular phone makers: Silicon Valley’s Hewlett-Packard and Finland’s Nokia. If the machinations of phone producers were a tragedy, the present act would surely be near the climax, complete with the start of a reversal of fortunes for an unlikely player and the flawed hero making a move cementing his death.