Feeds

Rethinking the iPhone

The Swiss Army knife of telephony

Security for virtualized datacentres

When I asked my friend Quentin recently how he liked his new iPhone, he said it was great, except as a telephone. He was right, and as a devoted iPhoner since its introduction, this made me think.

My carrier’s coverage (AT&T) is lousy, the 3G connection is slow/patchy and AT&T is expensive, on average $82 a month. I love the iPhone’s design, its Apps and look, and of course the “always-on” access to emails and internet it provides, but I recognized myself an over-user - constantly looking things up, checking/replying to emails in real time, and generally being a nerd!

So I decided to rethink the experience, especially as, on analysis, my 300 minutes average monthly phone usage was costing me a whooping 27¢ per minute - OK so this included manic email internet usage. This meant spending $2,168 over my two-year contract, if I include the $200 upgrade fee.

Recently, AT&T obligingly told me I had to wait several months before I could get a $200 upgrade to iPhone 4, which would trigger yet another two-year contract cycle. How I hate being in the hands of a telephone company!

So this is what I did: it retains all of the iPhone functionality, markedly improved my phone and internet experience, saved money and ended the two-year contract habit. And I can live with the minor compromise, which make me less manic.

iPhone Rethink Graphic

Protecting users from Firesheep and other Sidejacking attacks with SSL

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.