Search This Blog

Saturday, August 9, 2008

iphone in negetivte approach

Last year it was iphone Dhamaka,cosumer didn't get any chance to think a bit what may make iphone hateable rather than loving, here 10 reason presented by
10+ Reasons Why You Should Hate the iPhone

Everybody loves the iPhone. Even though few in India have seen, touched, or used the device, the buzz for the product is palpable; its praise almost universal. While we agree that the iPhone is a great device that gets a lot right, there are several faults that need to be highlighted. The most glaring of these faults have come crawling out of the woodwork in the past few weeks.

The biggest issue here is that Apple has created what some like to call a "walled garden" through its App Store business. Instead of a thriving software ecosystem, Apple wants a developer to pay $99 before starting development; to only sell software through Apple's store, and to comply to restrictions placed. The reasons for doing so might be noble: greater security, and greater stability could only have been assured by a closed environment, as Apple likes to point out. But is that really so? Does Apple guarantee a secure and crash-proof product now that both consumers and developers live in this gilded cage?

The decision to create this walled garden has also seen useful applications removed from the store, or useless applications being added to the store, and then removed. Yesterday, we learned that Apple might be tracking everything installed on the iPhone, with speculation that this hidden mechanism might even allow them to remotely disable an application.

If all of this doesn't give you cause for a pause, here's everything else that's wrong with the iPhone and the Apple way of things:

1. You can only sync music and video through iTunes. Want to drag-and-drop content from your hard-drive? Would like to sync music from another store -- from Amazon, for example? You are out of luck.

2. You can only install apps through iTunes. Never before has a cellphone maker slammed the door to an open development enviornment and received nothing but praise for doing so. Imagine Microsoft creating a gated software ecosystem and installing themselves as the gatekeeper. They would be eaten alive by the press. Apple gets a free pass.

3. Apple deletes useful applications. Nullriver's modem app went to the grave with no reason stated. Apple's digital business is dependent on the music and movie industry's whims. How long before the industry dictates which applications we can run?

4. Apple might not accept apps which might be detrimental to its own business. We won't hold our breath for competitive products to appear on the iPhone anytime soon.

5. You can only run one third-party application at a time. An instant messenger that runs in the background and collects messages while you are away? Not happening.

6. Apple might not allow app vendors to open up their apps. The terms of the NDA that potential application developers for the iPhone need to sign, effectively restrict redistribution of the source. Apple has created OSX on the back of FreeBSD; Safari on KHTML, SproutCore library used in MobileMe, and now they have built a layer on top that excludes others. Nik at TechCrunchIT laments that "the same community who demand all from Microsoft, feel gifted and special when Apple give them an inch of rope... Applications can only be installed from a single source, iTunes, and open source applications and distribution is near impossible. How do you install an iPhone application without iTunes? Where are the community advocates arguing for a standard interface, openess and free code?"

7. Limited Bluetooth use. The iPhone 3G has Bluetooth 2.0 with EDR but can you transfer files over Bluetooth? Does it support A2DP? Stereo Bluetooth? No on all counts. As of now, all you get from Bluetooth are headset voice calls, and that's it.

8. No copy-paste. This might be more of an interface issue that Apple is seeking to solve, than anything else. But it only underlines the drawbacks of a walled garden. If development was as open as say, it is on the Palm platform -- you would have a hundred different solutions by now, and at least one you could actually use. This also underlines how much the innovative spirit is killed by a controlled development environment. The iPhone ecosystem doesn't encourage software tinkering and probably won't spur garage breakthroughs that drive the industry forward.

9. No MMS. While you can e-mail photos, multimedia messaging is absent from the device. And speaking of videos...

10. No video recording. In the world of YouTube, the iPhone 3G does not offer video recording.

11. No voice command. For a touch-screen-only phone, voice controls would have been a huge plus for hands-free or one-handed control. Can we expect this functionality to be added by a third-party app?

12. Hardware locked to carriers. You cannot use any SIM card with this GSM device. How stupid is that? Hello monopolies, goodbye competition. Thanks to carrier lock-in when the phone launches in India, the iPhone 3G might not even enjoy 3G until months afterwards. How do you like them apples?

The iPhone 3G is a great device. Apple has innovated with its interface; it's great at what it does. The problem is that its benefits and innovations only highlight Apple's missteps. Dave Winer posits that it is a lack of choice that makes Apple products an attractive proposition: "All the other products suck. Hugely. Apple's [products] just suck a bit less. Not a huge accomplishment for an industry, imho."

The Apple iPhone 3G might be a great product. But that does not account for the universal praise that it earns all over the net, from press and fans alike. If we do not underline its drawbacks, the status quo will be maintained. So grow a little hate inside your hearts for the iPhone. Apple can do wrong.

Wall of Sheep:the Defcon hacker conference


Three reporters for the French publication "Global Security Magazine" were booted out of the Black Hat convention for uncovering the login information of other reporters. Quoting the AP:
"The separate, wired Internet connections set up for reporters are supposed to be off-limits to hacking and the Wall of Sheep. Even so reporters who didn't take the extra step and log onto the Internet through an additional secure connection like a virtual private network, risked having their data exposed to colleagues sitting just feet away. It didn't appear to be a complicated hack. The network was working properly, but it wasn't set up to shield each journalist's computer from one another."

The Wall of Sheep has become a fixture of the Defcon hacker conference: a wall with a long list of details showing who at the conference has sent readable data using insecure wireless connections.

For Brian Markus, better known to conference attendees as "Riverside," it just may become a line of business.

Last month, Markus and three of his fellow volunteers incorporated a company called Aries Security, which they bill as an education and security awareness consultancy that can come in and identify risky behavior on corporate networks.

The company is still in an experimental state, meaning that none of the partners have actually quit their day jobs, Markus said.

They don't expect companies to start projecting their own Wall of Sheep displays in their lobbies, but they say the network analysis tools they've developed could be helpful when aimed at corporate networks. "We can go into a company if they need help with a security awareness program," Markus said. "There are an amazing amount of things that we could see by watching the traffic go by."

Wall of Sheep got its start in 2002, when Markus and friends were sniffing wireless LAN traffic at Defcon. It turned out there were plenty of people putting their data out on those networks. "We were saying there are so many of them, they are everywhere." Inspired by a T-shirt, they decided to call the people they could spy on "sheep," and they started sticking paper plates on the wall with some of the user details they'd found. They list login names, domain or Internet Protocol addresses and partial passwords.

Hotel management wasn't crazy about the idea of paper plates being stuck to the walls, so the Wall of Sheep was soon using a projector.

They've seen some pretty crazy stuff revealed on open wireless LANs over the years, including fake usernames and passwords, brand-new computer attacks, a tax return and what Markus calls "nontypical adult material."

Today the project attracts dozens of volunteers at the conference who spend hours hunched over computers analyzing data before it's put up on the wall. "It's a tremendous amount of human labor," Markus said.

Wall of Sheep made its first appearance ever at Defcon's less chaotic sister conference Black Hat this year, and it got a lot of attention when French journalists tried to post sensitive information on the wall that was culled from a Black Hat network set up for reporters.

Because the journalists had illegally sniffed the Black Hat network without permission, Markus refused, and eventually the journalists were ejected from the conference. "We said, 'No way,'" he said. "It's completely against what all of us are trying to do."

Find here

Home II Large Hadron Cillider News