Entries Tagged as ''

HTC Touch Pro

I’ve admired HTC cellular (PDA) phones for a very long time… their cost, though, has always made me choose an alternate.

With the release of the very popular Touch Diamond and Touch Pro (Windows Mobile 6.1) phones has come the opportunity to buy one at an aggressive price ($200 with no contract if you shop wisely on Craigslist).

Most all of the HTC phones are hackable, and there’s a large community preparing custom ROM sets for them.

You’ve never seen a HTC phone?  Well, you may not have seen HTC’s phones, but you’ve probably seen a derivative of their Touch Flow 3D interface… whether they’d like to admit it on not a company in Cupertino popularized that type of interface on a phone they sell in the US through AT&T.

You can check out HTC’s site (URL below) for a list of all the various handsets they make (and not all of them are Windows Mobile — you might notice they also make the Android based G1).

I purchased the Touch Pro because it has both a touch screen and a keyboard… it’s a little thicker than the Diamond Touch, but I’m just not willing to give up on the keyboard yet — but I wanted a touch screen to make browsing the web a little less tedious.  And with Windows Mobile 6.1 you can internet connection sharing built in (so you can tether you notebook very easily without paying any additional fees).

One of the first things you’ll want to do (even if you’re not changing phone carries on the handset you get) is unlock your phone… primarily so that you can flash a custom ROM in that matches your own tastes (you can even customize many of the ROMs yourself).

Touch Flow 3D is wizzy and cool… and will amaze your friends, but let’s face it — isn’t battery life and functionality more important?  And simplicity goes a long way in making the phone more practical for everyday use (after all, you’re probably going to use it as a phone most of the time… or not).

At the moment I’ve got Mighty ROM loaded in my handset; it’s fairly clean, fairly light-weight; and works… I’ll consider upgrading to a Mobile 6.5 versions once those are more stable, and I might consider customizing my own ROM to remove a lot of the apps I don’t every intend to use.

By-the-way, one of the things you may find you no longer need if you go to this phone is a GPS… you can run Google Maps on it, but that requires you have an active internet connection (and that doesn’t always happen in many places), I also loaded Garmin XT on my handset, so I basically have a Garmin GPS with access to Garmin Live (weather and gas prices, I think you can pay a monthly fee for traffic, but there’s no traffic in my area).

All I can say is it’s a GREAT phone, and a wonderful PDA… and my feeling is HTC has gone a long way towards providing us with a convergent device.  Microsoft is rumored to be working on their own handset; let’s hope they’ve studies HTC and will leverage off their design.

The only negatives are battery life (always an issue with a PDA phone, but far less of an issue when you can Touchflow 3D), and radio quality (I suspect that has to do with the way they designed the radio — it’s certainly adequate when cell coverage is reasonable, but you might not get good reception in fringe areas).

http://www.htc.com/us/

Originally posted 2009-06-10 11:00:22.

SSH Login Without Password Prompt

Often you have a set of machines you trust implicitly and you’d like to make ssh logins and scp copies less tedious by not having the system prompt you for the password.  It used to be incredibly confusing to manually setup and install the keys on remote machines, now, though with OpenSSH it’s gotten a lot easier.

The first thing you need to do is create public and private keys; to do that you use ssh-key-gen on your machine (you’ll either need to be on the console or have previously made a ssh connection).

For this example, the “local” workstation will be superman, and the remote server will be aries.

roger@superman$ ssh-keygen
Generating public/private rsa key pair.
Enter file in which to save the key (/home/roger/.ssh/id_rsa):
[Press Enter Key]
Enter passphrase (empty for no passphrase):
[Press Enter Key]
Enter same passphrase again:
[Press Enter Key]
Your identification has been saved in /home/roger/.ssh/id_rsa.
Your public key has been saved in /home/roger/.ssh/id_rsa.pub.
The key fingerprint is:
de:ad:be:ef:01:02:03:04:05:06:07:07:09:0a:0b:0c roger@superman

Then we need to copy the public key to the remote host using ssh-copy-id

roger@superman$ ssh-copy-id -i ~/.ssh/id_rsa.pub aries
roger@aries's password:

Finally, we can log onto the remote machine without a password

roger@superman$ ssh aries
Last login: Sun Jan 2 12:12:12 2011 from superman
roger@aries$

You can take a look at the key files that were generated; you can use ssh-copy-id to copy the keys to as many machines as you want; and you can use the same private key file on each of your machines to allow for more seamless access; but you should be aware that you should only place your public key on machines you trust.

NOTE:  If you use ssh-agent (and ssh-add) to manage keys, ssh-copy-id will attempt to access the key from ssh-agent.

Originally posted 2011-01-04 02:00:12.

Connect for the Cause

I’m a huge fan of credit unions; be they state or federal chartered; and I hate banks (all banks).  There’s a huge difference between what motivates a credit union and what motivates a bank, and dealing with even a bad credit union is generally much more satisfying than dealing with the best bank!

Personally I use credit unions when I can; and soak banks for their “give mes” on credit cards… I never pay a bank a penny further if they don’t pay me — I don’t make money for them, and my credit unions never charge me a penny (seems like a good arrangement to me) .

The quote below is from a web site that’s designed to keep you informed about legislation that might effect the services credit unions can provide to you; below it are two links to (California) organizations that support credit unions — while all of whats on those sites might not be important to you, certainly any of the federal changes proposed will likely effect you.

Support your credit unions in every way you can — and fight back against the greedy banks that feel you as a tax-payer (and a customer) should pay for their mistakes while they continue to pay the executive staff (who made the mistakes) huge bonuses.

Take back America… take it back from the greed that destroys the very foundation of our society!

 


As a credit union supporter, you are aware of the need for grassroots action and mobilization efforts to inform our elected officials about credit union issues. Thank you for your active support, and please visit this network frequently to stay informed about legislative issues that are important to your credit union.

Connect for the Cause

California Credit Union League

Originally posted 2009-11-28 01:00:29.

Re-Usable Shopping Bags

Rather than throw away bags that stores provide to you, why not consider purchasing some re-usable shopping bags?

Reduce, reuse, recycle…

You’re reducing the number of plastic (or paper) bags that need to be produced and recycled (or otherwise disposed of).

You’re reusing the same bag over and over.

You’re recycling, since almost every reusable shopping bag is made from 100% post consumer recycled material.

I know most vendors seem to want to charge around $1 each for these (and that’s ridiculous — and unconscionable to try and gouge a profit on people who are trying to do the right thing), but watch the sales at Walgreen’s, they put regularly advertise their smaller bag (which is perfect for most shopping) at 3 for $1 (with coupon in their advertising circular — look NOW).

Originally posted 2010-04-23 02:00:46.

Identity Theft

Identity theft is a real problem, and credit bureaus make it all to easy for individuals who get a little bit of information about you to get your entire life’s story — and use your name (and credit) to make their life better and your life a living hell.

While there’s been improvements in legal recourse for identity theft, your best bet is to guard against it.

To make yourself a harder target, try some simple things like:

  • Elect on-line delivery of banking and credit card statements; utility bills; and anything else you can.  It’s safe, it’s good for the environment, and it reduces the likelihood of mail theft.
  • Use on-line bill payment or pay bills with your credit card; it’s safe, convenient, and it reduces the likelihood of mail theft.  Using your credit card may give you additional rights, and cash back.
  • Destroy paper items that have any personal information on them; cross-cut or confettie shreaders are the best, a fire place, or just mark it over and tear it by hand.
  • Destroy old credit cards, drivers licenses, passports, etc — make sure nothing with personal and confidential information on it goes in the trash.
  • Don’t give out your name or address to any one or on any site or on any phone call unless you know who you’re dealing with and there’s some advantage for you to do so.
  • Remove your name from mailing lists, refuse delivery of mail you didn’t request (that will cost the sender money generally and is more likely to get your name expunged from the list they use).
  • Put a “freeze” on your credit report.  Click here for info
  • Report scammers, spammers, and phishers to law enforcement. Click here for info

 

There are lots of great sites online that are free (free of advertising), and full of information… here’s one of them:

          http://www.consumersunion.org/

Originally posted 2008-11-08 08:00:50.

Critial Microsoft Patch — DO IT NOW

Microsoft has released an out of cycle patch (they only release patches on Tuesdays), this was released today (Thursday), which means it’s an important patch for you to install now.  Get details below and use the Microsoft Update facility to download and install — don’t be part of the problem, take pre-emptive action.

Remember, in general it’s a good idea to check for updates often and install them unless you have a good reason not to.

http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx

Originally posted 2008-10-23 08:00:56.

conglomeration

con·glom·er·a·tion (kn-glm-rshn)
n.

    1. The act or process of conglomerating.
    2. The state of being conglomerated.
  1. An accumulation of miscellaneous things.

The American Heritage® Dictionary of the English Language, Fourth Edition copyright ©2000 by Houghton Mifflin Company. Updated in 2009. Published by Houghton Mifflin Company. All rights reserved.


conglomeration [kənˌglɒməˈreɪʃən] n

  1. a conglomerate mass
  2. a mass of miscellaneous things
  3. the act of conglomerating or the state of being conglomerated

Collins English Dictionary – Complete and Unabridged © HarperCollins Publishers 1991, 1994, 1998, 2000, 2003


conglomeration a cluster; things joined into a compact body, coil, or ball.

Examples: conglomeration of buildings, 1858; of chances; of Christian names, 1842; of men, 1866; of sounds, 1626; of threads of silk worms, 1659; of vessels, 1697; of words.

Dictionary of Collective Nouns and Group Terms. Copyright 2008 The Gale Group, Inc. All rights reserved.


The SCO infringement lawsuit over the Unix trademark is over… the Supreme Court has ruled that Novell owns the Unix trademark and copyright, and SCO has no grounds for it’s litigation against.  Just as Microsoft owned and retained the Xenix copyright while SCO distributed that operating system, so Novell retained the Unix copyright while SCO distributed that operating system.

While means, Novell now has a prime asset — and could be ripe for harvesting (that’s a poetic way to say merger, take-over, buy-out).

Which will likely be bad for Linux.

WHAT?

Yep, take a look at what happened when Oracle purchased Sun (one of the largest companies supporting Open Source innovation in Linux, virtualization, etc) there’s definitely movement in Oracle to retract from the Open Source and free (free – like free beer) software efforts that Sun was firmly behind.

Consider what happens if a company acquires Novell and uses the SystemV license from Novell to market a closed source operating system, and discontinues work on Suse; or at minimum decides it doesn’t distributed Suse for free (free – like free beer).

“Live free or die” might become a fading memory.

Originally posted 2010-06-05 02:00:18.

Domain Registrars

In going through looking for a new domain hosting company I also looked to see about costs for domain registration.

I can certainly tell you that all my domains will remain registered at 1and1.  I will be switching from a hosting package to their “instant domain” package (it’s free; but it does in fact have more than just basic registrar services).

Why?

Well, 1and1 isn’t quite the cheapest domain registrar (you can save a little with a few of the others), but 1and1 offers private domain registration at no additional cost.

A private domain registration does not publish your personal and confidential information in the ICANN database, so marketers cannot get your phone number or address.  It does publish an email address that will forward mail to you; but you can easily filter mail coming from that address (it’s likely SPAM) or change it occasionally (make the domain public then immediately private and it’ll generate a new email address — it would be nice if they just let you enter an email address).

Also, I’m not sure it isn’t a good idea to keep your domain hosting and domain registration separate — that way it’s much harder to fall into a trap (though we have to hope that the companies we use for either of those services are reputable).

Originally posted 2010-02-08 01:00:21.

Unhealthy lies and the truth about health care reform

On 18 August 2009 John Groom published an article on CreativeLoafing that might give you a little more perspective on the health care reform battle.  It’s dated, but still very relevant.

The article starts off…

For weeks, health insurance companies, Republican political operatives and politicians, and their media cheerleaders have thrown a thick blanket of lies over the national debate of health care reform. By now you’ve heard the one about how Obama is going to pull the plug on your granny. Maybe you also heard that illegal immigrants would soon be enjoying free health care on your dime. Or that new health care policies would be a bonanza for abortion clinics.

Most of the screamers we’ve seen at health care town hall meetings are obviously, at best, very uninformed about details of proposed reforms. What you may not know is that those uninformed views are largely the result of a deliberate, cynical campaign of outright, blatant dishonesty the likes of which this reporter hasn’t seen in nearly 40 years of following politics. Washington Post business columnist Steven Pearlstein summed up the risk the GOP is taking with its current tactics: “By poisoning the political well, they’ve given up any pretense of being the loyal opposition. They’ve become political terrorists, willing to say or do anything to prevent the country from reaching a consensus on one of its most serious domestic problems.”

For the complete article see: Unhealthy lies and the truth about health care reform.

Remember, question everything.

Originally posted 2009-12-29 01:00:56.

Windows Symbolic Links

I really hate to use drive letters; that’s the one thing Windows has inherited from DOS that should have been eliminated a very long time ago; or at least made into an “alias” and deprecated as a “fixture”.

NTFS has supported reparse points for a fairly long time; you may well have seen the type “<JUNCTION>” when you did a directory list from the command line.

Reparse points are a fairly generic phrase for a set of features that have grown in NTFS over the years, and they’re effectively the same as *nix link (both hard and soft).

Here are some interesting things you can do with reparse points using the MKLINK tool that ships with Windows 7.

You can create a file reference in a number of directories; that only consumes a directory entry, the file only exists a single time on the disk… if you make it a hard link (the default is a soft link) the file isn’t deleted until all links are deleted.

You can do the same with a directory — make it appear in more than one location.

You can make references across file systems (including drives and the network) just as easily.

For me, I use it to create references to network resources so that they appear on a local machine (I used to use DFS mainly for this and map a single drive letter)…

Anyway, this is another seldomly used feature of Windows that can really help to make it a much more usable system — unfortunately for those it would benefit the most, it’s difficult for them to setup the symbolic links.

Originally posted 2009-12-16 01:00:22.