From androidtapp.com
It must be the most welcome flaw to hit an Apple product, as a bug in iPhone alarm settings gave many across Europe an extra hour's sleep this morning.
When Britain flipped out of summer time and back to GMT over the weekend, the iPhone's clock automatically made the change - but didn't update alarm settings, leaving some users asleep for an extra hour.
This morning, Twitter was awash with complaints. "Anyone else's iPhone alarm delayed by an hour? Great start to a Monday, cheers Jobs," said one.
"Don't trust your iPhone alarms folks. They're going off one hour late since clocks changed," noted another user.
As Engadget has noted, the bug was first noticed in New Zealand and then a week later in Australia, with users woken up an hour early for the area's hour jump forward last month.
A month ago, a New Zealand user on the Apple forum noted: "I guess we're just lucky this didn't occur when the clock went the other way."
The iOS4 bug can apparently be avoided by using one-off alarms, rather than pre-set regular wake-up calls.
Since then, Apple clearly hasn't fixed the bug or chosen to alert European customers. The company wasn't available for comment at the time of publishing.
From pcpro.co.uk
Amerikában egy washingtoni döntés értelmében nem törvényellenes ha a tulajdonos feltöri a saját iPhone telefonját, annak érdekében, hogy más forrásból származó aplikációkat telepítsen a telefonjára.
Librarian of Congress Announces DMCA Section 1201 Rules for
Exemptions Regarding Circumvention of Access-Control TechnologiesLibrarian of Congress James H. Billington today released the following statement:
Section 1201(a)(1) of the copyright law requires that every three years I am to determine whether there are any classes of works that will be subject to exemptions from the statute’s prohibition against circumvention of technology that effectively controls access to a copyrighted work. I make that determination at the conclusion of a rulemaking proceeding conducted by the Register of Copyrights, who makes a recommendation to me. Based on that proceeding and the Register’s recommendation, I am to determine whether the prohibition on circumvention of technological measures that control access to copyrighted works is causing or is likely to cause adverse effects on the ability of users of any particular classes of copyrighted works to make noninfringing uses of those works. The classes of works that I designated in the previous proceeding expire at the end of the current proceeding unless proponents of a class prove their case once again.
This is the fourth time that I have made such a determination. Today I have designated six classes of works. Persons who circumvent access controls in order to engage in noninfringing uses of works in these six classes will not be subject to the statutory prohibition against circumvention.
As I have noted at the conclusion of past proceedings, it is important to understand the purposes of this rulemaking, as stated in the law, and the role I have in it. This is not a broad evaluation of the successes or failures of the DMCA. The purpose of the proceeding is to determine whether current technologies that control access to copyrighted works are diminishing the ability of individuals to use works in lawful, noninfringing ways. The DMCA does not forbid the act of circumventing copy controls, and therefore this rulemaking proceeding is not about technologies that control copying. Nor is this rulemaking about the ability to make or distribute products or services used for purposes of circumventing access controls, which are governed by a different part of section 1201.
In this rulemaking, the Register of Copyrights received 19 initial submissions proposing 25 classes of works, many of them duplicative in subject matter, which the Register organized into 11 groups and published in a notice of proposed rulemaking seeking comments on the proposed classes. Fifty-six comments were submitted. Thirty-seven witnesses appeared during the four days of public hearings in Washington and in Palo Alto, California. Transcripts of the hearings, copies of all of the comments, and copies of other information received by the Register have been posted on the Copyright Office’s website.
The six classes of works are:
(1) Motion pictures on DVDs that are lawfully made and acquired and that are protected by the Content Scrambling System when circumvention is accomplished solely in order to accomplish the incorporation of short portions of motion pictures into new works for the purpose of criticism or comment, and where the person engaging in circumvention believes and has reasonable grounds for believing that circumvention is necessary to fulfill the purpose of the use in the following instances:
(i) Educational uses by college and university professors and by college and university film and media studies students;
(ii) Documentary filmmaking;
(iii) Noncommercial videos(2) Computer programs that enable wireless telephone handsets to execute software applications, where circumvention is accomplished for the sole purpose of enabling interoperability of such applications, when they have been lawfully obtained, with computer programs on the telephone handset.
(3) Computer programs, in the form of firmware or software, that enable used wireless telephone handsets to connect to a wireless telecommunications network, when circumvention is initiated by the owner of the copy of the computer program solely in order to connect to a wireless telecommunications network and access to the network is authorized by the operator of the network.
(4) Video games accessible on personal computers and protected by technological protection measures that control access to lawfully obtained works, when circumvention is accomplished solely for the purpose of good faith testing for, investigating, or correcting security flaws or vulnerabilities, if:
(i) The information derived from the security testing is used primarily to promote the security of the owner or operator of a computer, computer system, or computer network; and
(ii) The information derived from the security testing is used or maintained in a manner that does not facilitate copyright infringement or a violation of applicable law.(5) Computer programs protected by dongles that prevent access due to malfunction or damage and which are obsolete. A dongle shall be considered obsolete if it is no longer manufactured or if a replacement or repair is no longer reasonably available in the commercial marketplace; and
(6) Literary works distributed in ebook format when all existing ebook editions of the work (including digital text editions made available by authorized entities) contain access controls that prevent the enabling either of the book’s read-aloud function or of screen readers that render the text into a specialized format.
All of these classes of works find their origins in classes that I designated at the conclusion of the previous rulemaking proceeding, but some of the classes have changed due to differences in the facts and arguments presented in the current proceeding. For example, in the previous proceeding I designated a class that enable film and media studies professors to engage in the noninfringing activity of making compilations of film clips for classroom instruction. In the current proceeding, the record supported an expansion of that class to enable the incorporation of short portions of motion pictures into documentary films and noncommercial videos for the purpose of criticism or comment, when the person engaging in circumvention reasonably believes that it is necessary to fulfill that purpose. I agree with the Register that the record demonstrates that it is sometimes necessary to circumvent access controls on DVDs in order to make these kinds of fair uses of short portions of motion pictures.
A szabály természetesen nem csak az iPhone telefonra vonatkozik, de alapjaiban rázhatja meg az Apple és hozzá hasonló zárt rendszerek fejlesztőit.
From arstechnica.com
Nagy Britanniában a Samsunk szétosztott 100 Samsunk Galaxy S telefont azok között akik elégedetlenek voltak az iPhone4 telefonjukkal. Természetesen a Twitteren panaszkodókkal kezdték. Lett is belőle felhajtás!
Már nem osztják, de a hír elterjedt a háború megkezdődött!
From phandroid.com
Természetesen a legbiztonságtalanabb rendszer versenyben.
A Secunia tesztje szerint az Apple gyártja a legkevésbé biztonságos operációs rendszert. A teszt nem kimondottan az Mac OS X hibájának tartja azt, sokkal inkább a szoftverek hibája miatt kerültek az első helyre az Almások.
Az Oracle a második és a Microsoft a harmadik.
From gizmodo.com
Már egy 15 éves is át tudja verni a Nagy Almát de, az mindig visszavág.
Az iPhone internet megosztása valamilyen misztikus okból tiltott volt elég sokáíg. Most azoknak, akik hajlandóak még többet fizetni érte, lehetőségük van rá vagy trükközések sorával (feltört telefonnal) lehet megosztani az internetet. Nick (15) készített egy aplikációt (Handy Light), ami első ránézésre egy a sok "elemlámpa" közül, mely 0,99$ áron be is került az AppStore árui közé, de a zseblámpa felszíne alatt egy internetmegosztó szolgáltatás lapult.
Az aplikáció 3G modemmé alakította a iPhone-t. Persze ezt ma már megtehetik az AT&T felhasználók havi 20$ ellenében, de azért ez a megoldás mégis egyszerűbb és olcsóbb, így akár laptopon is internetezhetünk az iPhone-on keresztül. Ez az aplikáció további költségek nélkül megoldja a problémát.
Néhány másodperc alatt össze lehetett kapcsolni az internetet, az iPhone-t és a laptopunkat, hogy szabadon száguldhassunk az szupersztrádán, de a Nagy Testvér a hibáját elég könnyen orvosolta és megszüntette az aplikációt.
Sikersztori szomorú véggel, reméljük lesz még sok hasonló próbálkozás.
Mi a véleményed?
From gizmodo.com
100000 darabbal több Android rendszerrel működő telefont aktiválnak naponta, mint ahány iPhone 4 telefont értékesítenek, azaz az iOS4 kezd hátrányba kerülni az Androiddal szemben már nem csak erőben és minőségben, hanem darabszámban is.
Nagyon szépek a hatalamas eladási eredmények, amiket az Almások puffogtatnak, de valójában kezdenek belassulni.
“3 million phones in 23 days – that’s a pretty strong clip, the fastest sales of an Apple phone to date, Mashable reports. If I do the math, that’s more than 130,000 phones a day.
But did anyone in the press notice Google’s little announcement, the day before Apple launched its iPhone 4? This one? The one where Google said, and I quote: ’Every day 160,000 Android-powered devices are activated — that’s nearly two devices every second.’
Yep, that’d be 30K MORE phones a day than Apple. And my guess is that Android’s pace is accelerating, while the iPhone 4 is probably sliding downward, given how many folks bought it at launch (Mashable reports that 1.7 million were sold in first three days, so 1.3 million the next 20 days). In fact, if you do THAT math, and divide 1.3 million by 20 days, you get 65,000 iPhone 4s sold each day, which is nearly 100,000 less, PER DAY, than Android phones.”
Persze most mindenki drukkol az Google-nak, hogy behozza a mobilpiacon a hátrányát, de ne felejtsük el, hogy egyik 19 a másik is, mindkető nagyvállalat és csak a domináns pozícióra törekszenek, nekünk talán az a legjobb, ha az óriások versenye fejlesztési és árversennyé változik és egyre olcsóbban jutunk egyre jobb készülékekhez és szoftverekhez.
From battellemedia.com via phandroid.com
From hijinksensue.com
From joyoftech.com
Ami nem tetszik az Almásoknak, mert rontaná a renomét azt egyszerűen törlik a saját fórumaikból, de miért gondolják, hogy ezzel eltűnnek a problémák, mint az iPhone4 antenna gondjai? Nem látják, hogy az internet elég nagy ahhoz, hogy minden napvilágra kerüljön vagy tényleg a Nagy Alma hívők csak nekik hisznek?
From engadget.com
Jó lenne, de az iPad nem megy iOS4-el vagy csak akadozva, akkor is nehezen. Meg amúgy se tudják egymás pozícióját a készülékek, de próbálkozásnak jó, az ötlet remek, csak az Almának fel kellene nőnie a feladathoz.
From tuaw.com