CloudOn for iPad mini-review

CloudOn for iPad Ediitng

The iPad has been touted as a replacement for the laptop, but if this is to happen a serious office suite is needed to allow everyday tasks such as word processing and number crunching to be carried out. In this area there are a number of mobile office suites to choose from, including Apple’s own iWork apps Pages, Keynote and Numbers as well as the likes of Documents To Go, Quickoffice and a few others.

While all of these are capable of producing and working with Microsoft Office compatible files, there is no getting away from the fact that none of them is Microsoft Office. This is something that CloudOn for iPad aims to address, bringing you fully functional versions of Word, Excel and PowerPoint to your tablet.

Continue reading

iPhone represents more than half of Verizon smartphone sales

white iPhone 4S

This morning before the opening bell, Verizon Wireless announced fourth-quarter results. The carrier sold 7.7 million smartphones. Earlier this month, the nation's largest carrier disclosed 4.2 million iPhone activations during the same time period. Divide it up, and iPhone accounted for 54.5 percent of Verizon smartphone sales. (Update: Revised 4.3 million number released today puts it at 55.8 percent.) By comparison, Verizon sold 2.3 million 4G LTE devices, which includes mobile hotspots and tablets. At best, LTE devices accounted for 30 percent of smartphone sales. However, since that number includes other devices, iPhone outsold LTE smartphones by about 2 to 1.

In September I asked: "What if there is no iPhone 5 LTE?", before Apple announced 4S instead. Today, Verizon answered that question. As of Monday, the nation's largest 4G network reached 200 million in 195 US markets. Verizon currently offers 20 LTE devices, 10 of them smartphones -- 11, if counting 16GB and 32GB Droid Razrs. How much does LTE matter? Clearly not enough.

Continue reading

Get more from Windows Firewall with TinyWall

Firewall

One common view of the Windows Vista/ 7 firewall is that it’s a toy, almost entirely useless, and you should replace it with something more capable just as soon as you possibly can. But this isn’t entirely fair.

Sure, there’s no easy way to, say, restrict outgoing network connections to the applications you specify, but that’s more to do with the firewall’s awkward configuration options than the underlying technology. And these are easy to fix. Install TinyWall and this compact tool will immediately extend the standard Windows Firewall, giving you far easier control over who gets to go online, and who really shouldn’t.

Continue reading

'This is our generation's Woodstock'

Galaxy S II Commercial

Samsung's newest "The Next Big Thing is Already Here" TV commercial is the riskiest, but by far the snarkiest for anyone closely following the marketing campaign. The jokes are all inside and require some familiarity with previous installments. The risk: Everyone else won't get it. The snark: The iPhone hipster putdowns are mean -- really mean.

During the very first commercial, one Apple hipster waiting in line for iPhone could never get a Samsung because he's "creative". The guy next to him snipes: "Dude, you're a barista". Both men are back in the new commercial, with the barista serving coffee to the snarky companion -- who is carrying Galaxy S II! He's done with the iPhone hipset and makes it known: "It's nice latte art, my man. I see you're still creative". He's with a woman who had the same Samsung smartphone during the first commercial in the series. The Barista: "You two look happy, with your phone".

Continue reading

Google+ names policy goes just far enough

Google Plus

There are lots of places where you can be anonymous online. Google+ isn't one of them. Late today, Google announced a revision to the G+ names policy that doesn't change this, but it does allow people to use nicknames and established pseudonyms. If anonymity is your thing, go somewhere else. I don't want you on Google+. You can bully pulpit somewhere else. As for those folks whose lives might be at risk for using real names, please be safe someplace else -- Facebook, Reddit, Twitter, Tumblr or WordPress, for example. Those services have proven they can protect your identity.

But, of course, the griping will continue from the Internet rabble determined to hide their identities everywhere. They want more from Google than just nicknames. What are you afraid of? I use my real name everywhere, as I have always done. I see that as being in the very spirit of the open -- and transparent -- Internet. Be who you are, not someone else. And if that comment --- or other online interaction -- requires you to hide your identity, shut the frak up. Vent somewhere else. For everyone else, and this includes people who have built up alternative identities, Google+ welcomes you.

Continue reading

AT&T, T-Mobile look to FCC to approve spectrum transfer

GSM tower in nature

AT&T and T-Mobile filed a request with the Federal Communications Commission to gain approval for the transfer of spectrum, a stipulation agreed to as part of the breakup of the planned merger between the two companies. The value of the spectrum is about $1 billion, and is in addition to $3 billion in cash that AT&T will pay T-Mobile.

The nation's fourth largest carrier has repeatedly said it needs additional spectrum in order to compete with its larger rivals as they look towards 4G. T-Mobile is also due a favorable roaming agreement from AT&T, which would also address criticisms of the carrier over lack of coverage.

Continue reading

Don't believe me about the iTunes hack? Just check Twitter

laptop thief hacker

In my most recent story about Apple's hacking problems within iTunes, I was not surprised to see the same criticisms as eight months ago: there's no evidence of it, it's all the users' fault for their crappy passwords, it's a small problem.

Okay, I'll give you the possibility that this could be partially the user's fault in some way. Like saying the guy run down by a speeding vehicle shouldn't have been driving during rush hour. That does not answer how these hackers are getting in -- which from BetaNews' research on this, is mainly an in-app purchase mechanism issue -- nor the true scope of this problem.

Continue reading

Sony unveils next-generation mobile camera sensors

nagasakitech


Sony Corporation on Monday announced that it is working on a new design for CMOS image sensors that will be used in camera modules for smartphones, tablets, and other mobile applications. This model of sensor includes built-in signal processing functionality, a task which used to be handled by external elements, and that it can handle advanced imaging tasks in an even smaller profile.

The design is what is known as a stacked CMOS sensor, and Sony has turned two major elements of the sensor into independent components. The stack puts the "pixel section" and "circuit section" fully on top of one another rather than fitting them on the same board side-by-side.

Continue reading

One in four Americans own an e-book reader or tablet

Kindles

That's a dramatic change from just a few months ago and, perhaps not coincidentally, before new Nooks and Kindles lowered price of entry for both categories. Between December and January, the number of Americans owning one of the devices rose to 29 percent from 18 percent. During the same time period, the number owning a tablet rose to 19 percent from 10 percent, which is the same rise for e-book readers.

Pew Internet released the data earlier today, based on surveys conducted in mid December and early January. "These findings are striking because they come after a period from mid-2011 into the autumn in which there was not much change in the ownership of tablets and e-book readers", according to the report. "However, as the holiday gift-giving season approached, the marketplace for both devices dramatically shifted". As recently as August 9 percent of Americans owned e-book readers and 10 percent tablets.

Continue reading

Compact software development is IN, bloat is OUT!

PC laptop rock bloatware

For years I have discussed with others about how software development should get back to basics, using native code (rather than scripting languages) by using compilers optimized for creating fast and compact applications.

A recent TIOBE index reemphasizes this point.

Continue reading

Android, not iOS, will win over developers

Android Army

Android will replace iOS as the most important platform to developers within the next 12 months, British analyst firm Ovum says. It also notes an increased interest in Windows Phone and BlackBerry OS, and sees a move towards web standards in development over proprietary technologies.

Timing is surprising. Tomorrow, Apple will announce fourth calendar quarter earnings, where analysts expect record iOS device sales. Despite these platform gains, developer attention shifts to Android.

Continue reading

RIM's strategy of marketing, Android apps, and low-end devices fails to excite

Businessman scowls at blackberry  (Steve Heap/Shutterstock)

Canadian smartphone pioneer Research in Motion announced on Sunday that its co-chairmen Mike Lazaridis and Jim Balsillie would be stepping down, and former Siemens CTO Thorsten Heins would be rising from his position of Chief Operating Officer at RIM to the role of Chief Executive.

Heins' formal introduction to the public seems to have done little to change the public's mind about Research in Motion and its prospects as a competitor against Android and Apple smartphones.

Continue reading

After MegaUpload raid, FileSonic cuts off file sharing

File Sharing

In a move that seems in response to the shuttering of MegaUpload last week, UK and Hong Kong-based file storage site FileSonic removed all file sharing capabilities over the weekend.

"All sharing functionality on FileSonic is now disabled. Our service can only be used to upload and retrieve files that you have uploaded personally", a message reads on the front page of its website.

Continue reading

Big Data approach pinpoints malware that other solutions miss

security

Last month, in preparation for a panel, I was asked to put together a list of pros and cons with respect to using Big Data techniques in the context of information security technologies. While Big Data has benefits that span many security disciplines, it’s important to look at this from the perspective of what we call Advanced Malware Protection, which is the ability to discover, analyze and block advanced malware.

With that context in mind, let’s look at the "pros" of Big Data.

Continue reading

SaveGameBackup 2.0 beta supports 1,377 titles

game gaming

When you’re thinking of files that you really should include in a backup, then saved games probably don’t rank highly on the list. But maybe they should. After all, in some cases your current game state will represent hours, days, maybe weeks of effort, and if for some reason this gets lost, will you really want to start again from the very beginning? (No. Didn’t think so.)

It can make sense to back up at least some of your saves, then. And there are few easier ways to do this than with a copy of SaveGameBackup. The program is portable, for instance, so there’s no need for installation: just unzip it and go.

Continue reading

Load More Articles