I posted a cool piece over at aNewDomain.net on the history of the mobile phone business, some pics of the first commercially available mobile phone -- the circa 1973 Motorola DynaTAC with details -- an infographic and some analysis. Check them out at aNewDomain.net.
The latest episode of Tech Now is below. This time, I'm focusing on the inside story of the DynaTAC. Pretty interesting stuff. Let me know what you think. This new show is so totally a work in progress.
Source: Tech Now with Gina Smith, a GSMK Production
aGnuDomain.net TM unplugged and aNewDomain.net -- This short video is the money. If your friends ever ask you to explain the wisdom and architecture behind the glory that is Linux, you might refer them to this short video. It's called How Linux is Built.
I'm starting aNewDomain.net's Tech Now with Gina Smith -- targeted at those who either missed the day's tech news or slept through it because, perhaps, they're on the other side of the world.
What do you think? Special thanks to producer Marc Klempf for the video and audio quality upgrade. Still a work in progress, but it's a start. And an honor to work with Marc again. What a great talent.
aGNUdomain.net - This weekend I formatted my Nexus 4 and loaded up Canonical's new Ubuntu Touch preview. While this will not be anyone's daily driver in the near future, I was quite impressed by the level of polish and beauty that I encountered.
aGNUdomain.net unplugged -- It's official. The edit team at aNewDomain.net is spinning out its first new media site. It's going to be called aGNUdomain.net -- our co-founder John C. Dvorak gets cred for coming up with the name.
aGNUdomain.net unplugged: As we ramp up our upcoming aGNUdomain.net site, I thought this Linux Command Cheat Sheet from Dave Child was ideal -- it is the money if you want Linux commands at your fingertips or as a Valentine's Day 2013 gift for someone you love who loves Linux. And it's free, courtesy cheatography.com. Yum. Beats chocolate.
aNewDomain.net and aGNUdomain.net unplugged's Ant Pruitt, Mat Lee, Shane Brady and Eric Finkenbiner rock the latest Attack of the Androids show. Deep tech on Android, rooting, a major geek out.It's aNewDomain.net sponsored show featured here at the alpha site of the upcoming aGNUdomain.net. Never heard it? Hit play. Quick. It's awesome.Related articlesAnnouncing aGNUdomain.net -- aNewDomain.net Spins Out Linux News SiteSamsung Galaxy Note 8, Ingress Fever, Motorola X: Attack of the AndroidsAndroid becoming mobile malware magnet, says report[Developer Changelog] Here's What's New In Android 4.2.2 (JDQ39)Point and Shoot with Ant Pruitt: Send a Smartphone Pic, Join the HangoutGroove IP for Android Freeware Friday with Ant Pruitt798 mln Android smartphones to be active by Dec 2013 - studyBlueStacks App Player released for the Surface Pro, brings 750,000 Android apps to Windows 8Android 4.2.2 Reportedly Pushing Out On Nexus 4, Nexus 7 And Nexus 10
aGnuDomain.net unplugged -- By David Street, aNewDomain.net: You think you knew GNU. So do a lot of people. Richard Stallman does an amazing job in his GNU history and explainer to dispel myths about it.
Led by aNewDomain.net's Ant Pruitt and Eric Finkenbiner, aGNUdomain.net will be a total, unbridled geek fest. That's guaranteed, as you can see when you scroll below the fold in this post.
The site at the agnudomain.net url will be up soon. In the meantime, this aGNUdomain unplugged site will let you watch as we start putting material and staff together for our launch. And if you're interested in geeking up with us, shoot Ant or Eric a note on Google +. We're always looking for great writers, podcasters, podcaster and vidcasters who are open about their love of open source.
The full text of this review -- and it is growing -- is at my geeksite anewdomain.net. But check out the video from the SF Appshow, where theory.io exec Peter Tampte got 6 minutes cold to demo why this Evernote competitor was different. And better?
Let me know.
Send me your comments. If you include your name and IT job title in a comment around whether this makes sense in the enterprise, I'll let you run a guest piece on anewdomain.net with me, John C. Dvorak and Dr. Jerry Pournelle.
I did dossiers on the Kato Kaelin like character in the recent burglary news and arrest of suspect Kariem McFarlin -- for stealing 60K in goods and Apple iPads from the late Steve Jobs family home in Palo Alto.
His name is Kenny the Clown -- legally Kenneth Kahn, 47, of Alameda. Police found him with one of the stolen Jobs iPads, a 64GB "gift" from the clown's long time buddy, the suspect McFarlin.
This is pilot three. Tech Now w Gina Smith starts in earnest Aug. 8 -- later this week. Hopefully I'll have the lighting, mic and sound issues down by then. It's a two minute show focusing on the story of the day.
Tech Now w Gina Smith is aNewDomain.net production.
aNewDomain.net -- geek news, reviews, views and how tos -- geek culture.
With me, John C. Dvorak, Jerry Pournelle and 65 of the best tech pros and journalists going.
The SF AppShow brings together app developers to demo their newsworthy new apps and unrecognized app gems to a live audience with an exciting social backdrop. The events are also streamed live on the web via Ustream.tv (and archives are available to view online). Past presenters have been featured in the New York Times, BBC, network television and the iTunes App Store home page after appearing in the SF AppShow!
Previous SF AppShow events in SF, Los Angeles, Las Vegas, and Chicago were sell out shows and drew quite a bit of positive industry press. Typically the events are watched by developers, entrepreneurs and investors.
It's also a pretty fun party.
Early bird Registration: $25 Advance Registration: $30 Door: $40
A day after the company he cofounded went public, Facebook CEO Mark Zuckerberg got married today. Here’s the shot from his Facebook page. The Zuckerberg marriage to Priscilla Chan appeared on Mark Zuckerberg’s Facebook timeline at 7:00 p.m. PT Saturday, May 19, 2012.
It is a wild, weird and wonderful festival. Email me at firstname.lastname@example.org with Maker Faire in the title and I'll share it at aNewDomain.net -- tech news, views, reviews -- with Gina Smith, John C. Dvorak, Jerry Pournelle ...
Takeaway: Whether they’re regarded as productivity killers or security risks, many apps have made it onto company blacklists.
Thanks to the invasion of personal apps, services, and hardware in enterprise, it shouldn’t surprise anyone that smart IT pros out to protect data are conducting a wholesale blacklisting of the apps they find most threatening to data security.
Zenprise, a mobile device management company that specializes in BYOD, recently released itsZenprise MDM Cloud Report. The report includes the top 10 apps that enterprises are blacklisting (or attempting to blacklist) in the United States and globally. The list is theirs. The snide commentary, mine. So here they are. The 10 most blacklisted apps this month, in descending order.
Takeaway: IT pros react harshly to Yahoo CEO Scott Thompson’s false claims of a computer science degree, adding fuel to investor Daniel Loeb’s pressure for a Yahoo board CEO ouster.
As Yahoo investor Dan Loeb continues to urge Yahoo’s YHOO board of directors to fire new CEO Scott Thompson - Loeb on Wednesday sent yet another letter to the press and the beleaguered company’s board - IT pros we contacted reacted pretty vehemently to what has emerged as Thompson’s falsified claims of holding a degree in computer science from Stonehill College in Easton, MA.
Yahoo execs called the computer science degree claim an “inadvertent error” in a San Jose Mercury News interview.
Loeb, according to records, runs a hedge fund that owns outright nearly 5.9 percent of Yahoo’s stock. In his latest letter, Loeb wrote that “Thompson’s fantasy degree was in no way an ‘inadvertent error.’ The evidence shows us he had been using false credentials for years.” Loeb and his fellows are demanding an immediate ouster.
IT pros I contacted reacted hotly on the issue.
John Livingston, an IT pro for the American Red Cross in Savannah, Georgia, wondered “if someone is willing to lie on (his) resume, what else would (he) be willing to lie about?”
Such prevarication “just makes it harder for people looking for IT jobs,” Livingston added, saying that though anyone can easily lie about extra degrees and certifications.
Tech pro Paul Miller agreed that ethics is “the bigger issue here.” Nonetheless, he said, “The irony of Silicon Valley (venture capitalists) and (hedge) fund managers asserting moral outrage is patently absurd. The “giant elephant” in the room is “that this was perpetuated for years and … no one noticed until some guy with an agenda began to dig up dirt. The fact that someone can claim a degree (he or she) does not have - and that there is little way to tell them from the (rest) of herd who has ‘earned’ a degree, without researching an educational background, tells how little these degrees mean.”
Andrew Terry, an IT consultant in the London area, also sided with Thompson’s detractors. He pointed out that “there’s a big difference between what most of us think of as resume padding (versus) adding qualifications (one) doesn’t have.”
“If I found out someone lied on the resume about something as important as a degree, (the employee) would be fired. I personally worked my ass off for my computer science degree,” said Peter Schmidt, a CTO at a Boston-based aviation firm. “Thompson’s bald-faced lying angers me.”
Other IT pros were a little easier on Thompson, though all 12 tech pros this reporter interviewed expressed distress at the prevarication.
Isn’t a degree really just a glorified piece of paper? Yes and no, IT pros said. “I don’t have a degree,” said Dan Phillips, who is in tech support and network security in Ontario, Canada. “What I do have is nearly two decades of real world IT experience and that gets me in the door every time.
“Not to knock all computer science students, but I won’t hire anyone straight out of school because they just won’t have the knowledge that’s needed for some high end IT jobs,” Phillips said. “Certifications are nice but you tend to have to MORE HERE ...
Thanks to this site -- I finally identified the name and type of hummingbird in my Northern California coastal backyard. Constantly in the lavender. Well, turns out it's Anna's Hummingbird Calypte ...
Here are the high points! From the site:
Family: Trochilidae, Hummingbirds view all from this family
Description ADULT MALE Hood usually appears uniformly dark (almost black in harsh light), but when light catches it a metallic rose-red iridescence is revealed. ADULT FEMALE Has metallic greenish yellow upperparts. Underparts grayish white with yellowish green feathering on flanks and a few dark spots (iridescent in the right light) on throat. Tail has striking white tips on outer three feathers and a dark subterminal band. IMMATURE Similar to adult female; immature males gradually acquire adult's head coloration.
Dimensions Length: 3 1/2-4" (9-10 cm)
Habitat Common and widespread within its restricted west coast range. Resident year-round in many parts, especially in coastal districts, but often found at higher altitudes, and further inland, during breeding season than in winter. Favors deserts, scrub-covered slopes, urban parks, and gardens.
Observation Tips Easiest to observe at feeders throughout the year, and in city parks and ornamental gardens in winter.
Range Western Canada, Northwest, Alaska, California, Texas, Southwest
Voice Utters a sharp tchik call.
Discussion Males are amazingly colorful when seen in the right light and are pugnacious when defending territory against rivals. Sexes are strikingly dissimilar.
Takeaway: Steve Wozniak, co-founder of Apple, remembers tech pioneer and Commodore founder Jack Tramiel in an interview with Gina Smith. Tech pros who cut their teeth on early systems like the Commodore 64 and the Atari Series computers weigh in on how those early systems got them in the biz. Tramiel, 83, has died.
Jack Tramiel, the tech revolutionary and Holocaust Auschwitz concentration camp survivor who brought the Commodore 64 and Amiga Series computers to the world in the early and mid 1980s, has died at 83.
Those two computing lines were prescient in that, unlike efforts from Apple and IBM at the time, Tramiel wanted a computer for the “masses” and targeted home rather than business users. The systems were far ahead of their time in many ways.
In 1975, Wozniak and the late Apple co-founder and CEO Steve Jobs tried to get a few thousand dollars from Commodore as Wozniak was designing the Apple II, which he said was ... MORE at Tech Republic ... and here's our coverage at aNewDomain.net
Michael Roberts is the Founder of Rexxfield, a company that assists and supports individuals who have been the victims of online lies, defamation, and privacy invasion by “rendering all reasonable assistance in order to have deceptive materials retracted or hidden from the public domain and the victims’ good name and reputation restored.”
He understands first-hand what being a victim feels like, having been on the receiving end of character assassination and defamatory attacks by his ex-wife, who is now in prison for a murder conviction, and others associated with her case or seeking to capitalize upon it.
CiviliNation: Tell us about your company Rexxfield and what let to its creation.
Michael Roberts: To understand why Rexxfield was created, you first need to understand what happened in my personal life, which is a long, convoluted and incredibly complicated story.
In December 2000, my now ex-wife Tracey Richter murdered 20-year-old Dustin Wehde in what was described by one prosecutor as an execution-style killing . She claimed self-defense, and despite contradictions in her testimony and evidence to the contrary, I believed her – perhaps because at the time I couldn’t emotionally fathom the fact that she actually murdered someone in cold blood. Then in early 2004, after I discovered her affair with another man, she attempted to kill me, first by drugging me and then, when I was semiconscious, by suffocating me. By the grace of God I survived the ordeal but to this day I’m still struggling from the injuries sustained from the attempt on my life. Thankfully, the Iowa Department of Justice, crime victims compensation fund paid for my associated medical expenses.
I finally wised up, saw her for the person she really is, and filed for divorce. But notwithstanding the evidence that she had killed one man and attempted to murder another, the Family Court judge in the subsequent divorce case gave primary care of our children to my ex-wife time and time again. This just goes to show that domestic relations courts are seriously flawed and that some judges make highly questionable decisions that have serious and negative repercussions on innocent lives.
Fortunately, after her incarceration, I was able to obtain primary custody of our children.
What does all of this have to do with the creation of Rexxfield? Everything, I would say.
Right after I filed for divorce in 2004, my ex-wife began a relentless Internet smear campaign against me, my business, and any individual that offered any kind of support to me, whether financial, emotional, vocational, or otherwise.
My business at the time was mile2, and the relentless attacks on my reputation and, by association, my business, brought mile2, which designed, developed and delivered information security training and information assurance services, to its knees. I was forced to sell for a fraction of what it would’ve otherwise been worth had it not been for these attacks. Even then the flaming aspersions continued until July 30, 2011, the day Tracy was arrested on first-degree murder charges.
She is actually now a 3 times convicted felon; in 2009 she also received felony convictions for both perjury and fraud by trials in Iowa and Nebraska, respectively.
Rexxfield was founded in 2008 in response to understanding what character assassination and unfounded attacks on businesses can do. I had experienced first-hand the devastation that these types of attacks can cause and that, in most cases, neither law enforcement nor the civil authorities and judiciary can relate to this issue.
Instead, what I’ve frequently found is that the very entities that are supposed to help people who have been wronged seem to take the position that “sticks and stones will break your bones, but names will never hurt you”. In my case, I had to fully prove that all of these anonymous attacks in fact originated from my ex-wife before anyone would even listen to me. So, in the process of having to convince the legal system to take my situation seriously, I developed some proprietary techniques, technologies, and methods for getting behind the cloak of anonymity in ways that ultimately helped inexorably link Tracey to the poison-penned attacks.
Unfortunately my breakthroughs were too little and too late to prevent the damage to my own name and business, but as I started blogging about my experiences I found myself being inundated with desperate cries for help. These requests ranged from tearful calls from parents of cyber bulling victims to the CEOs of multi-billion dollar companies. Realizing the desperate need for these types of services, Rexxfield was born..
CiviliNation: What kinds of people typically seek Rexxfield’s services?
Michael Roberts: Calls for help are incredibly diverse. Some are relatively simple and yet emotionally devastating because they come from teenaged cyber bullying victims, and others originate from from powerful people in multinational corporations. We also receive many calls from frustrated law-enforcement officials who are trying to investigate serious crimes. I’ve helped law enforcement investigate in cases of rape, robberies and even death threats against police officers who are living in fear despite their station in life. In all of these situations, without exception, the Internet service providers were not willing to reasonably cooperate with the investigations - I have found Google and Facebook to be quite notorious in this area.
I was recently invited to teach some of my methods to members of a joint federal and state task force whose mandate is protecting children from exploitation. I showed them some of the techniques we have developed and how the task force can implement those techniques into their own investigations. The group then shared some horror stories with me, including a case involving Facebook where a teenage rape victim was involved in a chat through Facebook less than half-an-hour before the crime took place. In that case it took months before Facebook complied with the requests for the originating IP address, by which time the evidence had perished because the ISP providing the connectivity to the suspect had subsequently purged the log file records. And to think the loss of this information could have been easily avoided with the proper cooperation.
In addition to helping private individuals and businesses, I am also assisting members of State House of Representatives in drafting new laws that will force Internet service providers to retain this perishable evidence for at least 2 years, because currently there are no laws addressing this obvious need. Obviously this needs to be balanced with people’s desire for privacy, so I want to make clear that through these proposed laws we are not asking to give Big Brother the keys to everybody’s Internet activities; on the contrary, we want the Internet service providers to remain the sole custodian of these confidential records and to only provide information in instances of legitimate civil and criminal warrants or subpoenas. In other words, we simply want to help avoid what happened in the rape case I described above.
CiviliNation: How have the attacks against you helped positively influence your work at Rexxfield?
Michael Roberts: Had I not gone through this fiery trial, I would’ve been like so many other people and considered the issue of online attacks and character assassination a mere trifle not worthy of serious attention. I would probably have also dismissed the victims who issue anguished cries for help as thin-skinned weaklings, as seems to be the reaction by most people who have not experienced this tragedy firsthand and simply refuse to see what is happening online.
CiviliNation: What is your response to people who claim that online reputation attacks against adults are rare and not something that most people need to worry about?
Michael Roberts: I would encourage such people to take a course in critical thinking, sympathy, empathy, and to open their eyes. I’ve found that until somebody has experienced this issue first-hand, or even second-hand through someone they love, they simply cannot relate to the devastation it causes.
Anonymous free speech is a wonderful privilege and should be preserved. In many cases horrible problems have been avoided by the ability to communicate anonymously, such as in situations involving whistle blowing of white-collar crimes, community awareness of when sexual predators move into the neighborhood, and many other alerts that are of great community benefit.