Feeds

Flash finally finagled onto iPhone

For those prepared to risk it

Security for virtualized datacentres

A dedicated iPhone hacker has ported a client for Adobe's Flash onto an iPhone 4, just about, and with a dicey installation process.

The hack can only be applied to a Jailbroken iPhone 4, though the developer reckons it will run on an 3GS and an iPad. But if you've got the hardware and the nerve then you're only eight steps away from being able to lord it over your Android-touting mates with a beautifully designed handset that can also run Flash.

Not that you'll be able to run much Flash content. Frash - as the developer has termed the port - is very much an alpha version (v0.02 to be precise), so you're not going to be browsing YouTube just yet. But once Frash is installed the iPhone user is able to tap on (reasonably basic) Flash animations in a web page to see them rendered in all their animated glory.

Most of those embedded animations are advertisements of course, so you might be happier missing them. But enabling Flash is, for many people, about choice rather than utility, not to mention shutting up all the whining from those people who don't have an iPhone.

Those prepared to risk an early version of Frash can now silence that noise, which might be worth it even if one never actually uses the capability in anger. ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.