Rockbox 3.0 Released

Rockbox
Image via Wikipedia

Lifehacker alerted us this week to the release of Rockbox 3.0. Rockbox is a product we already use on our MP3 player. It is an alternative open-source firmware which includes not only expanded music support, but album art, games, video playback, and more.

For those of you wishing to try it, but not willing to give up the manufacturer’s firmware, it installs a dual-boot firmware loader, allowing you to press a hotkey to boot into the old firmware.

We have switched from MP3 to playing files encoded using open-source format OGG and this software allows us to do so. It runs on a variety of players produced by Apple, Archos, Cowon, iriver, Olympus, SanDisk, and Toshiba. More will come, as people work to port it.

So, check Rockbox out. If you don’t like it, you can uninstall it.

Reblog this post [with Zemanta]

Congress to Investigate Text Messaging

For all of us wondering why text messages have doubled in price in the last year, rest assured, the Federal Government is on the case.

Senator Herb Kohl, Chairman of the Anti-Trust Subcommittee of the Senate Judiciary Committee sent a letter this month to the four major wireless carriers, AT&T, Sprint, Verizon, and T-Mobile asking them to explain the increase.

Carriers limit the number of characters in a text message to 160. Assuming a maximum of 140bytes stored per message, that means that if you were charged the same per-byte rate to download a 4MB song, you would pay about $6000. Nothing has changed particularly in the cost of providing the service, however, companies have the right to charge whatever they can get away with.

The odd thing is that math. We have a phone where text messages are 20 cents each, yet megabytes of downloaded data are 1.99 each. If we want to use Instant Messenging applications provided on our phone, they use text messages as opposed to using data time so they can charge more(We’re Verizon customers, in the interest of disclosure).

Kohl has asked for a response by October 6th. Some experts feel the increases may be a reflection of the decrease in competition as the four major players absorb smaller regional providers.

We look forward to hearing the response from the providers and hope it sparks some sort of change. The current system is ridiculous.

Cell Phone Battery Ignites in Man’s Pocket

Batteries would seem to be a safe and established technology. Perhaps if it was a now fuel-cell battery, we could understand some flaws in the technology. It would be no less acceptable…but more understandable.

A cell phone apparently ignited in a man’s pocket, causing second and third degree burns. There is currently no information on the manufacturer of the phone of the battery. We hope we use neither of them.

Unlocking Your Phone

With the recent decision stating that cell phone companies have to provide unlock codes for their phones, allowing all the functionality they’ve restricted to be restored, as well as transfer to another network, we thought it would be a good idea to give people a place to start.

PC Magazine presented this article on How to Unlock Your Phone. This includes a series of unlocking services, sites, etc. For free options, try Howardforums.com, a good forum for all things mobile phone…including hacks, reviews, advice, etc.

Of course, most of the unlocking services mentioned only work for GSM phone…the ones used on networks such as Cingular and T-Mobile. CDMA Phones, used by Sprint, Verizon, Alltel, etc, have to be individually authenticated by their networks. So, even if your existing provider lets you unlock the phone, your new provider will not add it to the list of approved phones on its network.

Most providers sell different versions of the same phones, using their own custom firmware(the software that operates the phone) which could be changed to the specific firmware for a different carrier. The carriers refuse to cooperate.

For those of you who use GSM phones, check out this ABC News article on the Best Unlocked Phones. Just bear in mind that without contract you will be paying more to secure them. Of course, that means no contract, which may be to your advantage.

SkypeOut will soon have Annual Fee

According to the New York Times, Skype announced on Tuesday that as of January 1st, it would begin charging $30 a year for unlimited calls onto the telephone network in the U.S. and Canada. The service, SkypeOut, has been available for free during its test phase.
Skype is a Voice over Internet service that allows users to communicate using their computer. While SkypeOut allows outgoing calls over the regular telephone lines, their converse service, SkypeIn, allows a telephone number to be given which will forward to a Skype account. It is in beta as of now, and incurs a charge of 30 euro for a year subscription.

These two charges are still less than those of most VOIP service providers. Skype is unique to those as it uses its own proprietary system instead of the existing standard VOIP protocols. Several hardware manufacturers have debuted Skype-compatible hardware that allows the process to be more telephone-like.

Skype certainly has its place, but its proprietary nature does limit it. This new feature certainly can allow Skype to supplement other calling options.

Backup Your Windows Notebook Now or Face Dire Consequences!

We like the title of this article from the Mobility Guru a great deal. Backup is something we save for the last minute too often…and ultimately forget, dooming us in an emergency. It is not a matter of IF you need to back up your data, it is WHEN.

For the frugal individual, try an old hard drive. For a minimal fee, you can convert it to USB operation and use it as backup. There is also the CD/DVD option, which will definitely work for some data. For the average person remember…your media files will not change, and thus can be backed up on a few DVDs rather efficient. For frequently updated information, such as application data, a copy of your registry, and your documents, you can use the old hard drive, supplemented with regular optical disc backups to back that drive up.

You Can Now Break the Software Locks on your Cell Phone

As CNN reports, new copyright rules announced Wednesday allow cell phone owners to break software locks in order to use them with competing carriers.

The U.S. Copyright Office determined that consumers cannot enjoy full legal use of their cell phones because of software locks added by the providers block access to the phones’ programs. Since ownership of the cell phone is technically that of the customer, restricting the software means that they are putting an artificial limit on the hardware.

For those of you choosing to stay with your provider, the advantages come with features that are locked out. For example, many providers lock out the feature allowing you to transfer ringtones or pictures taken with a camera phone to a computer using a data cable so that they can charge you for transfer over the network. Ringtones and such are big business.

Laptop Security

Jim Rossman of the Dallas Morning News advised of his experience leaving his laptop at an airport security checkpoint. Mr. Rossman is right, a simple business card attached to your laptop will allow its owner to be idenitified.

Our colleagues at Flight Wisdom suggested that you consider STOP. Security Tracking of Office Property, despite the name, works well for personal use as well. If you want your thief to know your name and address, putting it on the laptop will certainly help them find you, although that may be a bit paranoid. A third-party is certainly helpful in these cases. Also, the security plate, cemented to your laptop, is a theft deterrent in itself.

The next step after a security tag, or equivalent label is a laptop security cable. These cables are enough theft deterrent. Given time and a hacksaw, someone can remove these cables, but the goal is such things will delay them. Most theft is dependant on stealth and speed, not hanging around with such tools. Of course, finding a place to lash it in your hotel room on vacation is usually hard.

The final step is of course, in software. Set your computer BIOS to require a password, and then prevent booting from the USB port, a floppy disk, or a CD-ROM. If you need to do any of these things, go in and override it for the time you need it. Then, set a password for logging onto the system, be it a variant of Windows, UNIX, or the Mac OS.

Of course, protecting your files can be a matter of encyption. Check out a future post, when we intend to report on Encryption Tools as well as other software security for your laptop or even your desktop.

Protect Yourself from Burnout

Our colleagues at Flight Wisdom wrote a few weeks ago here about the danger of laptop battery issues. Dell was followed by Apple in its battery recall. As this article from Business Week reports, the online community kept pressure on the manufacturers to do something about this. And now Dell and Apple are recalling over 5 million batteries.
But the danger of computer components isn’t limited to batteries, as one writer reports here. His hard drive burnt out in what appears to be a rather dramatic manner.

So, we thought we would take this time to give our tips to reduce the risk of preventable accidents. Obviously, if your component is faulty or improperly designed, there is no amount of preparation you can make to prevent problems…although even outside of warranty, some companies will replace an item that spontaneously combusted as opposed to other types of mechanical failure.

  1. Make sure cables inside your computer do not interfere with airflow. The biggest cables in computers are ribbon cables used for components such as ATA hard drives and CDROMs. The cheapest solution is to replace these with round cables, which compress the ribbon down for increased airflow. The better solution is to, if possible, replace your drives with the new Serial ATA drives. The SATA cables are much thinner than the older parallel ones, and the drives themselves are better as well. SATA CD/DVD drives are still relatively rare though, but at least consider replacing the hard drives.
  2. Once a month or so, shut the computer down and blow out the interior of the computer with a bottle of canned air, especially the exhaust fans to remove dust that might accumulate and reduce air efficiency.
  3. Keep aware of any product recalls or reports of problems with hardware in your system and be prepared to replace it if necessary. For laptops, blow out the exhaust fans from the outside while the computer is off.
  4. Also for laptops, if you plan on using the laptop for long periods on AC power, take the battery out. If that is not an option, regularly discharge and recharge the battery. For business travellers, consider a second battery and regular swap the two.