Feeds

Rethinking the iPhone

The Swiss Army knife of telephony

The Power of One Brief: Top reasons to choose HP BladeSystem

When I asked my friend Quentin recently how he liked his new iPhone, he said it was great, except as a telephone. He was right, and as a devoted iPhoner since its introduction, this made me think.

My carrier’s coverage (AT&T) is lousy, the 3G connection is slow/patchy and AT&T is expensive, on average $82 a month. I love the iPhone’s design, its Apps and look, and of course the “always-on” access to emails and internet it provides, but I recognized myself an over-user - constantly looking things up, checking/replying to emails in real time, and generally being a nerd!

So I decided to rethink the experience, especially as, on analysis, my 300 minutes average monthly phone usage was costing me a whooping 27¢ per minute - OK so this included manic email internet usage. This meant spending $2,168 over my two-year contract, if I include the $200 upgrade fee.

Recently, AT&T obligingly told me I had to wait several months before I could get a $200 upgrade to iPhone 4, which would trigger yet another two-year contract cycle. How I hate being in the hands of a telephone company!

So this is what I did: it retains all of the iPhone functionality, markedly improved my phone and internet experience, saved money and ended the two-year contract habit. And I can live with the minor compromise, which make me less manic.

iPhone Rethink Graphic

Application security programs and practises

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.