Archive for August, 2012

Source: Ars Technica

Apple and Samsung have been at logger heads over the alleged copying of iPhone and iPad designs in Samsung’s  implementation of the Galaxy Tablet and Galaxy S smartphones.

It has gone to trial and I feel its worth following as it has revealed many prototypes of previous iDevices and internal decisions made by Apple in the development of these devices which would have not seen public scrutiny.

Samsung has had its own share of leaked documents as well.

Whilst most of us may view Apple as being the villain in these proceedings, it is worth noting that Apple is not unique in its behaviour in the protection of its patents. Again, this can be viewed as a proxy war on Android and this could be part of the reason why Samsung has earned the brunt of Apple’s wrath. It is still early days in the smartphone race and Apple wants to be in pole position over competitors. Apple, if successful in this trial, will gain momentum in the smartphone race. A Samsung win will likewise work wonders for their reputation as smartphone makers. I can see headlines such as “This is a moral victory for us (Samsung) and victory for innovation”. NOTE TO SAMSUNG : I may sue over the latter statement as it is my intellectual property.

Here are some interesting links related to the trial:

Apple vs. Samsung : Coverage of the biggest tech trial by the Verge

Opinion: Does Samsung deserve this lawsuit by Unleash the Phones

Samsung: Power Corruption and Lies by The Kernel


Cloud computing enables applications and services maintained by remote servers, thereby reducing our hardware requirements.

We can see the trend moving in that direction. Tablets, smartphones, Ultrabooks and Macbook Airs (not an Ultrabook) are evidence of this.

However, immersing fully into a life up in the cloud is not without its risks.

We as consumers, are relinquishing control of data to a remote server and with that, run the risk of security breaches.

WIRED writer Matt Honan experienced these problem when his iCloud and Amazon accounts were hacked. There was no fancy algorithms involved in the hack. The hackers merely followed the breadcrumbs of connections from Matt’s Twitter account. These hacks highlighted Amazon’s and more crucially, Apple’s iCloud service.

He wrote a detailed account of the events that led the hacking. Despite the rather painful experience, he is objective in his assessment of the situation.

Tips to living more securely in the cloud:

  • Do not daisy chain your email, Twitter, Facebook accounts.
  • Create stronger passwords different for each account.
  • Create a separate email which functions specifically as a recovery address.
  • If you’re using Gmail services, enable two-step verification of your account.

No method is 100% secure. However, these measures reduces one’s chances of being compromised in the cloud.