Latest Post

Nokia N9 Meego Handset Leaked

Written By Unknown on Saturday 27 November 2010 | 05:30

Nokia's been working on its new Meego platform for a while now, and details about the first device to use it should be coming out any day now, but until then we have to rely on stuff like these photos that were recently leaked. A forum poster on Chinese language site Baidu.com put out these clear, high-quality photos claiming they are of Nokia's N9, a device Nokia has confirmed will be the first to run with the new Meego operating system but has declined to provide any official photos of.
Meego will for all intents and purposes be Nokia's response to the colossal uprising of competing smartphone platforms iPhone and Android. Unlike most phone manufacturers that use third-party software to power the device's operations, Nokia, perhaps stubbornly, sticks exclusively to its own internally developed operating systems. Its Symbian platform once had a commanding presence in North America. But as times changed, Nokia did not. It is the largest phone manufacturer that does not have a handset running on Android.
Still the undisputed leader in global handset sales, spurred largely by its dominance in under-developed parts of the world, Nokia is rapidly fading into obsolescence in the US. It hopes Meego can help change that.
However, if these photos are genuine, this is not going to be an easy climb for Nokia. Despite having a nice-looking screen and full Qwerty keyboard, the device looks unabashedly bland. Besides, it may be too little too late. Consumers are already becoming very familiar with Android and/or the iPhone operating system. Most are unlikely to be willing to give a different platform a fair shake.

Nokia Black Friday and Cyber Monday Sale 2010

Written By Unknown on Friday 26 November 2010 | 11:48

 

  • 15% off Nokia phones
  • 35% off all Nokia accessories 
  • $50 off the Nokia N8
  • WWW.NOKIA.COM  
  •  
11/26/2010 - 11/29/2010
    Black Friday Nokia Accessories Deal Nokia Black Friday Black Friday Nokia Phones Deal Black Friday Nokia N8 Deal





















    Feedback

    Prompted Response Prompts Lies.

    Written By Unknown on Friday 19 November 2010 | 14:17

    When it comes to customer satisfaction evaluation, I've written often of my distrust of prompted recall and my preference for the net promoter score. But I'd never expected to encounter them simultaneously.

    Earlier this week I had a ten minute conversation with John Maeda as Part of his Fortune Cookie performance. Before I left the gallery, I was asked if I had heard of the net promoter score and, when I answered yes, was asked to rate my experience

    You'll be surprised to read that I tend to grade low, so while I had thoroughly enjoyed the conversation I was going to rate it as an 8. But,under net promoter rules, I know that rating would be discarded as middling and so I found myself rating it a 9. In other words, the prompt had changed my behaviour and my perceived appraisal.

    Now this was an art event and the prompt may well have been an innocent conversation-starter or, indeed, part of the event but the bottom line is, if you want
    a true reflection of your customers' experience, you have to be utterly agnostic and make no attempt at prompting.

    You may think it's going to facilitate the rating, but Heisenberg taught us otherwise.

    15 Hidden Firefox Tricks You Must Know

    On the other hand Firefox has already been downloaded 8.3 million times in a single day. To help out the millions of users find useful information in one place, I have created some list of tips and tricks for Firefox written by talented bloggers from around the blogosphere.

    1) More screen space. Make your icons small. Go to View – Toolbars – Customize and check the “Use small icons” box.

    2) Smart keywords. If there’s a search you use a lot (let’s say IMDB.com’s people search), this is an awesome tool that not many people use. Right-click on the search box, select “Add a Keyword for this search”, give the keyword a name and an easy-to-type and easy-to-remember shortcut name (let’s say “actor”) and save it. Now, when you want to do an actor search, go to Firefox’s address bar, type “actor” and the name of the actor and press return. Instant search! You can do this with any search box.

    3) Keyboard shortcuts. This is where you become a real Jedi. It just takes a little while to learn these, but once you do, your browsing will be super fast. Here are some of the most common (and my personal favs):
    • Spacebar (page down)
    • Shift-Spacebar (page up)
    • Ctrl+F (find)
    • Alt-N (find next)
    • Ctrl+D (bookmark page)
    • Ctrl+T (new tab)
    • Ctrl+K (go to search box)
    • Ctrl+L (go to address bar)
    • Ctrl+= (increase text size)
    • Ctrl+- (decrease text size)
    • Ctrl-W (close tab)
    • F5 (reload)
    • Alt-Home (go to home page)
    4) Auto-complete. This is another keyboard shortcut, but it’s not commonly known and very useful. Go to the address bar (Control-L) and type the name of the site without the “www” or the “.com”. Let’s say “google”. Then press Control-Enter, and it will automatically fill in the “www” and the “.com” and take you there – like magic! For .net addresses, press Shift-Enter, and for .org addresses, press Control-Shift-Enter.

    5) Tab navigation. Instead of using the mouse to select different tabs that you have open, use the keyboard. Here are the shortcuts:
    • Ctrl+Tab (rotate forward among tabs)
    • Ctrl+Shft+Tab (rotate to the previous tab)
    • Ctrl+1-9 (choose a number to jump to a specific tab)
    6) Mouse shortcuts. Sometimes you’re already using your mouse and it’s easier to use a mouse shortcut than to go back to the keyboard. Master these cool ones:
    • Middle click on link (opens in new tab)
    • Shift-scroll down (previous page)
    • Shift-scroll up (next page)
    • Ctrl-scroll up (decrease text size)
    • Ctrl-scroll down (increase text size)
    • Middle click on a tab (closes tab)
    7) Delete items from address bar history. Firefox’s ability to automatically show previous URLs you’ve visited, as you type, in the address bar’s drop-down history menu is very cool. But sometimes you just don’t want those URLs to show up (I won’t ask why). Go to the address bar (Ctrl-L), start typing an address, and the drop-down menu will appear with the URLs of pages you’ve visited with those letters in them. Use the down-arrow to go down to an address you want to delete, and press the Delete key to make it disappear.

    8) User chrome. If you really want to trick out your Firefox, you’ll want to create a UserChrome.css file and customize your browser. It’s a bit complicated to get into here, but check out this tutorial.

    9) Create a user.js file. Another way to customize Firefox, creating a user.js file can really speed up your browsing. You’ll need to create a text file named user.js in your profile folder (see this to find out where the profile folder is) and see this example user.js filetechlifeweb.com, this example explains some of the things you can do in its comments. that you can modify. Created by

    10) about:config. The true power user’s tool, about.config isn’t something to mess with if you don’t know what a setting does. You can get to the main configuration screen by putting about:config in the browser’s address bar. See Mozillazine’s about:config tips and screenshots.

    11) Add a keyword for a bookmark
    . Go to your bookmarks much faster by giving them keywords. Right-click the bookmark and then select Properties. Put a short keyword in the keyword field, save it, and now you can type that keyword in the address bar and it will go to that bookmark.

    12) Speed up Firefox. If you have a broadband connection (and most of us do), you can use pipelining to speed up your page loads. This allows Firefox to load multiple things on a page at once, instead of one at a time (by default, it’s optimized for dialup connections). Here’s how:
    • Type “about:config” into the address bar and hit return. Type “network.http” in the filter field, and change the following settings (double-click on them to change them):
    • Set “network.http.pipelining” to “true”
    • Set “network.http.proxy.pipelining” to “true”
    • Set “network.http.pipelining.maxrequests” to a number like 30. This will allow it to make 30 requests at once.
    • Also, right-click anywhere and select New-> Integer. Name it “nglayout.initialpaint.delay” and set its value to “0″. This value is the amount of time the browser waits before it acts on information it receives.
    13) Limit RAM usage. If Firefox takes up too much memory on your computer, you can limit the amount of RAM it is allowed to us. Again, go to about:config, filter “browser.cache” and select “browser.cache.disk.capacity”. It’s set to 50000, but you can lower it, depending on how much memory you have. Try 15000 if you have between 512MB and 1GB ram.

    14) Reduce RAM usage further for when Firefox is minimized. This setting will move Firefox to your hard drive when you minimize it, taking up much less memory. And there is no noticeable difference in speed when you restore Firefox, so it’s definitely worth a go. Again, go to about:config, right-click anywhere and select New-> Boolean. Name it “config.trim_on_minimize” and set it to TRUE. You have to restart Firefox for these settings to take effect.

    15) Move or remove the close tab button. Do you accidentally click on the close button of Firefox’s tabs? You can move them or remove them, again through about:config. Edit the preference for “browser.tabs.closeButtons”. Here are the meanings of each value:
    • 0: Display a close button on the active tab only
    • 1:(Default) Display close buttons on all tabs
    • 2:Don’t display any close buttons
    • 3:Display a single close button at the end of the tab bar (Firefox 1.x behavior)
    Got any favorite Firefox tips or tricks of your own? Let us know in the comments.

    Words Have No Meaning.

    Written By Unknown on Tuesday 16 November 2010 | 15:33


    One of the great false assumptions that marketers make is that once you have someone's attention, then you've got them for good. Well I hope most marketers don't think that way, but I can't think of another explanation for this billboard ad I saw at a station today. Just look at all those words.

    It starts with a few superfluous humanising sentences about how they used to be bad at explaining things but they're trying much harder now and then goes on to explain how. Thereafter they probably telling me some more of their greatness, but even I (with a blogpost in mind) couldn't be bothered to read further. In fact, I was bored after the first sentence - it was all about them and nothing about what they could do for me.

    It's the sort of worthiness that would be ignored in a magazine or newspaper where the next page is crying out for your attention; around a billboard the number of distractions are even greater and yet they want to preach to me - if not in tone, certainly in verbosity.

    If you want to transmit information in an ad, then think elevator pitch in a very fast elevator. Know what you want to say and say it quick and clearly. That way you might keep my attention.

    Nokia N8 in drop/torture test (Nokia N8 gets severely tortured, lives to tell the story)

    A unibody anodized aluminum chassis and a reinforced glass over the panel make the Nokia N8 certainly look like one of the sturdiest smartphones around. And the Finnish company is keen to show just how resistant to the elements it really is.
    The Nokia Conversations blog has just published a video demonstrating the drop test that the N8 prototype is subjected to before entering mass production. They have also listed some of the other endurance trials the N8 had to pass.

    Those include exposure to extreme temperatures (from around -40°C to +85°C) and humidity over 95%. The N8 was also tested in some real life scenarios like simulation of carrying the phone in your pockets plus a buttons durability check, where buttons are tested to last over 1 million clicks.
    Still neither Nokia nor we would suggest you try any of these at home, unless you want your warranty voided.

    SOURCE: 
    Nokia N8 Torture Test
    Before they’re released to the world, Nokia phones undergo some rather stiff testing to see if they’ll stand up to the wear and tear of everyday life. After the break, you’ll see the heartbreaking sight of a pair of Nokia N8s undergoing the infamous drop test, simulating your phone falling from the height of your shirt pocket onto a hard surface dozens of times.

    In addition to the drop test, there’s more than 200 other endurance tests that we put new models through to see if they pass muster. Some of the highlights include:
    • Extreme weather: We use special machines to expose them to extreme temperatures from around -40°C to +85°C, helping them to withstand conditions from the cold of the arctic circle to the heat of the Sahara desert.
    • Humidity: We also test for use in tropical and humid parts of the world by placing devices in a special chamber for several weeks where they will experience humidity levels as high as 95%.
    • Clothing: When we carry devices in our back pockets they may bend when we sit down or rub on trouser fibres. We simulate these effects with special machines that bend and twist the device, and one that uses a real pair of jeans to test friction and wear and tear.
    • Pockets: Devices are often in bags or pockets with other items like keys or coins, so we place devices in a special “shaker” machine with hard particles to see how resistant they are.
    • Buttons: People press the main keys on their device an average of 200-300 times every day. To ensure the keypads can respond to this level of use, we press the keys up to one million times in the lab.
    As they say on TV, though, don’t try this at home! Extreme endurance tests are not covered by your warranty…
    PS: We’ve run a story on Nokia testing centres with another video earlier on Conversations. Head on over here for an introduction to the UK setup.


    6 Best Sites to View Maps of Airline Flight Paths + Bonus Mobile Apps

    Written By Unknown on Monday 15 November 2010 | 08:11

    If you have ever waited anxiously for a family member or friend to arrive at your airport after a long flight you will understand the need to receive reliable, up to date information about where a plane currently is located and when they are estimated to arrive.

    The way I see it, you have two reasons to need to view maps of an airline flight path: You are waiting for a family member or friend to arrive at the airport safely – let’s call this informational only, or you are waiting at the airport/driving in to pick up that person. These are two totally separate uses and a website does not do you much good if all you have is a smartphone or even just a regular phone. The sites below are reviewed based on these two parameters: informational sites for casual viewing and must-have information for those traveling to the airport for pickups.

    FlightStats

    FlightStats is my favorite website for tracking flight information on the web. It provides comprehensive flight information for all flights originating in the United States and also fairly comprehensive coverage for overseas flights in Europe. For other countries, the data you receive is hit or miss.

    The content it provides (on US flights) is comprehensive. You can see the flight path on a variety of maps, all powered by Google Maps. You can also overlay radar which is a nice feature that the other flight tracking sites do not provide.

    Flightstats.com does not have a free iPhone app; however there are some paid ones if you are interested in that (I list some great free alternatives below). They do have a suite of Android apps; including FlightStats for Android Lite which is free.

     Finally, the killer feature that is unique to Flightstats is automatic notification via cell phone text or email when a flight is delayed or its status is updated at all (for example, when it arrives at the gate). This allows someone picking up a flyer to know when they get there without relying on a call; it also provides gate information.

    Flightview



    Flightview offers much of the same information as Flightstats above. You get a live map (although not as pretty as Flightstats) time and delay information, and more. The website isn’t quite as polished but it is still very informative for the flight traveller.


    The one area where Flightview really shines is mobile apps. They offer free mobile flight tracking apps for iPhone [iTunes link], Android, Blackberry and other platforms. Their mobile app for flight tracking is one of the highest rated in the iTunes app store and it is easy to see why: flights are easy to find, gate information and a maps at your fingertips.

    Flightwise

    Flightwise, formerly our favorite named fboweb, has some compelling features you might want to look at. They are geared more towards the technical information about a flight so if you are an aviation enthusiast you might want to choose them over the other sites. They have a free iPhone app, but information like the arrival Gate is left out for the paid versions.




    Flightwise offers one of the coolest visualizations of a flight on a map. One click and you can see the flight you are interested in, and nearby flights, in near-realtime 3D.

    This visualization is both interesting from a “cool” factor and also from an educational viewpoint. Elevation, speed and location are all mapped onto the earth in real-time, it doesn’t get much cooler than that!

    FlightArrivals



    FlightArrivals has the information listed above, but also adds some interesting other visualizations of airlines. You can select an airport and see all of the flights out of that airport to other cities and countries.

    Flightaware



    Flightaware has another neat visualization to add to the list above. In addition to receiving specific flight tracking for a commercial or private pilot flight, it also has a real-time map of US flights. Although it doesn’t display specific information for all of the flights, you can get a general idea as to the activity of the current airspace. They have historical information which is pretty neat to look at and watch.

    Flightaware also has a free iPhone app that will help you track and store flights.

    HelloFlight



    HelloFlight offers some interesting maps of airline flight paths. On their site they show all current positions of SouthWest airplanes in flight, as well as providing tracking information for any other commercial US flight.

    They have a mobile site up at http://m.helloflight.com/ which would be handy if you are mobile and need to retrieve flight information.

    Whichever site you choose to use, you can get some really cool visualizations whether at home or on the go. Flight paths are available both for commercial airlines and private pilot trips (depending on if they are travelling IFR or VFR) and this information is both useful and fun.

    Many of the sites mentioned above have a “Show a random flight” link, if you don’t know of any current flight numbers try those to get a sample of what they have to offer, that way when you do need to use the sites you will know which one will work the best for you. Happy travels!

    The Most Important Basic Hacking Skills You Should Know First

    Written By Unknown on Saturday 13 November 2010 | 03:09

    The hacker attitude is vital, but skills are even more vital. Attitude is no substitute for competence, and there's a certain basic toolkit of skills which you have to have before any hacker will dream of calling you one.

    This toolkit changes slowly over time as technology creates new skills and makes old ones obsolete. For example, it used to include programming in machine language, and didn't until recently involve HTML. But right now it pretty clearly includes the following:

    1. Learn how to program.

    This, of course, is the fundamental hacking skill. If you don't know any computer languages, I recommend starting with Python. It is cleanly designed, well documented, and relatively kind to beginners. Despite being a good first language, it is not just a toy; it is very powerful and flexible and well suited for large projects. Good tutorials are available at the Python web site.

    I used to recommend Java as a good language to learn early, but this critique has changed my mind (search for The Pitfalls of Java as a First Programming Language within it). A hacker cannot, as they devastatingly put it approach problem-solving like a plumber in a hardware store; you have to know what the components actually do. Now I think it is probably best to learn C and Lisp first, then Java.

    There is perhaps a more general point here. If a language does too much for you, it may be simultaneously a good tool for production and a bad one for learning. It's not only languages that have this problem; web application frameworks like RubyOnRails, CakePHP, Django may make it too easy to reach a superficial sort of understanding that will leave you without resources when you have to tackle a hard problem, or even just debug the solution to an easy one.

    If you get into serious programming, you will have to learn C, the core language of Unix. C++ is very closely related to C; if you know one, learning the other will not be difficult. Neither language is a good one to try learning as your first, however. And, actually, the more you can avoid programming in C the more productive you will be.

    C is very efficient, and very sparing of your machine's resources. Unfortunately, C gets that efficiency by requiring you to do a lot of low-level management of resources (like memory) by hand. All that low-level code is complex and bug-prone, and will soak up huge amounts of your time on debugging. With today's machines as powerful as they are, this is usually a bad tradeoff — it's smarter to use a language that uses the machine's time less efficiently, but your time much more efficiently. Thus, Python.

    Other languages of particular importance to hackers include Perl and LISP. Perl is worth learning for practical reasons; it's very widely used for active web pages and system administration, so that even if you never write Perl you should learn to read it. Many people use Perl in the way I suggest you should use Python, to avoid C programming on jobs that don't require C's machine efficiency. You will need to be able to understand their code.

    LISP is worth learning for a different reason — the profound enlightenment experience you will have when you finally get it. That experience will make you a better programmer for the rest of your days, even if you never actually use LISP itself a lot. (You can get some beginning experience with LISP fairly easily by writing and modifying editing modes for the Emacs text editor, or Script-Fu plugins for the GIMP.)

    It's best, actually, to learn all five of Python, C/C++, Java, Perl, and LISP. Besides being the most important hacking languages, they represent very different approaches to programming, and each will educate you in valuable ways.

    But be aware that you won't reach the skill level of a hacker or even merely a programmer simply by accumulating languages — you need to learn how to think about programming problems in a general way, independent of any one language. To be a real hacker, you need to get to the point where you can learn a new language in days by relating what's in the manual to what you already know. This means you should learn several very different languages.

    I can't give complete instructions on how to learn to program here — it's a complex skill. But I can tell you that books and courses won't do it — many, maybe most of the best hackers are self-taught. You can learn language features — bits of knowledge — from books, but the mind-set that makes that knowledge into living skill can be learned only by practice and apprenticeship. What will do it is (a) reading code and (b) writing code.

    Peter Norvig, who is one of Google's top hackers and the co-author of the most widely used textbook on AI, has written an excellent essay called Teach Yourself Programming in Ten Years. His "recipe for programming success" is worth careful attention.

    Learning to program is like learning to write good natural language. The best way to do it is to read some stuff written by masters of the form, write some things yourself, read a lot more, write a little more, read a lot more, write some more ... and repeat until your writing begins to develop the kind of strength and economy you see in your models.

    Finding good code to read used to be hard, because there were few large programs available in source for fledgeling hackers to read and tinker with. This has changed dramatically; open-source software, programming tools, and operating systems (all built by hackers) are now widely available. Which brings me neatly to our next topic...

    2. Get one of the open-source Unixes and learn to use and run it.

    I'll assume you have a personal computer or can get access to one. (Take a moment to appreciate how much that means. The hacker culture originally evolved back when computers were so expensive that individuals could not own them.) The single most important step any newbie can take toward acquiring hacker skills is to get a copy of Linux or one of the BSD-Unixes or OpenSolaris, install it on a personal machine, and run it.

    Yes, there are other operating systems in the world besides Unix. But they're distributed in binary — you can't read the code, and you can't modify it. Trying to learn to hack on a Microsoft Windows machine or under any other closed-source system is like trying to learn to dance while wearing a body cast.

    Under Mac OS X it's possible, but only part of the system is open source — you're likely to hit a lot of walls, and you have to be careful not to develop the bad habit of depending on Apple's proprietary code. If you concentrate on the Unix under the hood you can learn some useful things.

    Unix is the operating system of the Internet. While you can learn to use the Internet without knowing Unix, you can't be an Internet hacker without understanding Unix. For this reason, the hacker culture today is pretty strongly Unix-centered. (This wasn't always true, and some old-time hackers still aren't happy about it, but the symbiosis between Unix and the Internet has become strong enough that even Microsoft's muscle doesn't seem able to seriously dent it.)

    So, bring up a Unix — I like Linux myself but there are other ways (and yes, you can run both Linux and Microsoft Windows on the same machine). Learn it. Run it. Tinker with it. Talk to the Internet with it. Read the code. Modify the code. You'll get better programming tools (including C, LISP, Python, and Perl) than any Microsoft operating system can dream of hosting, you'll have fun, and you'll soak up more knowledge than you realize you're learning until you look back on it as a master hacker.

    For more about learning Unix, see The Loginataka. You might also want to have a look at The Art Of Unix Programming.

    To get your hands on a Linux, see the Linux Online! site; you can download from there or (better idea) find a local Linux user group to help you with installation.

    During the first ten years of this HOWTO's life, I reported that from a new user's point of view, all Linux distributions are almost equivalent. But in 2006-2007, an actual best choice emerged: Ubuntu. While other distros have their own areas of strength, Ubuntu is far and away the most accessible to Linux newbies.
    You can find BSD Unix help and resources at www.bsd.org.

    A good way to dip your toes in the water is to boot up what Linux fans call a live CD, a distribution that runs entirely off a CD without having to modify your hard disk. This will be slow, because CDs are slow, but it's a way to get a look at the possibilities without having to do anything drastic.

    I have written a primer on the basics of Unix and the Internet.

    I used to recommend against installing either Linux or BSD as a solo project if you're a newbie. Nowadays the installers have gotten good enough that doing it entirely on your own is possible, even for a newbie. Nevertheless, I still recommend making contact with your local Linux user's group and asking for help. It can't hurt, and may smooth the process.

    3. Learn how to use the World Wide Web and write HTML.

    Most of the things the hacker culture has built do their work out of sight, helping run factories and offices and universities without any obvious impact on how non-hackers live. The Web is the one big exception, the huge shiny hacker toy that even politicians admit has changed the world. For this reason alone (and a lot of other good ones as well) you need to learn how to work the Web.

    This doesn't just mean learning how to drive a browser (anyone can do that), but learning how to write HTML, the Web's markup language. If you don't know how to program, writing HTML will teach you some mental habits that will help you learn. So build a home page. Try to stick to XHTML, which is a cleaner language than classic HTML. (There are good beginner tutorials on the Web; here's one.)

    But just having a home page isn't anywhere near good enough to make you a hacker. The Web is full of home pages. Most of them are pointless, zero-content sludge — very snazzy-looking sludge, mind you, but sludge all the same (for more on this see The HTML Hell Page).

    To be worthwhile, your page must have content — it must be interesting and/or useful to other hackers. And that brings us to the next topic...

    4. If you don't have functional English, learn it.

    As an American and native English-speaker myself, I have previously been reluctant to suggest this, lest it be taken as a sort of cultural imperialism. But several native speakers of other languages have urged me to point out that English is the working language of the hacker culture and the Internet, and that you will need to know it to function in the hacker community.

    Back around 1991 I learned that many hackers who have English as a second language use it in technical discussions even when they share a birth tongue; it was reported to me at the time that English has a richer technical vocabulary than any other language and is therefore simply a better tool for the job. For similar reasons, translations of technical books written in English are often unsatisfactory (when they get done at all).

    Linus Torvalds, a Finn, comments his code in English (it apparently never occurred to him to do otherwise). His fluency in English has been an important factor in his ability to recruit a worldwide community of developers for Linux. It's an example worth following.

    Being a native English-speaker does not guarantee that you have language skills good enough to function as a hacker. If your writing is semi-literate, ungrammatical, and riddled with misspellings, many hackers (including myself) will tend to ignore you. While sloppy writing does not invariably mean sloppy thinking, we've generally found the correlation to be strong — and we have no use for sloppy thinkers. If you can't yet write competently, learn to.

    And if you still have some good suggestions please do use the comment box below.

    Five Principles of the Hackers Mindset

    Hackers solve problems and build things, and they believe in freedom and voluntary mutual help. To be accepted as a hacker, you have to behave as though you have this kind of attitude yourself. And to behave as though you have the attitude, you have to really believe the attitude.

    But if you think of cultivating hacker attitudes as just a way to gain acceptance in the culture, you'll miss the point. Becoming the kind of person who believes these things is important for you — for helping you learn and keeping you motivated. As with all creative arts, the most effective way to become a master is to imitate the mind-set of masters — not just intellectually but emotionally as well.

    Or, as the following modern Zen poem has it:

        To follow the path:
        look to the master,
        follow the master,
        walk with the master,
        see through the master,
        become the master.

    So, if you want to be a hacker, repeat the following things until you believe them:

    1. The world is full of fascinating problems waiting to be solved.


    Being a hacker is lots of fun, but it's a kind of fun that takes lots of effort. The effort takes motivation. Successful athletes get their motivation from a kind of physical delight in making their bodies perform, in pushing themselves past their own physical limits. Similarly, to be a hacker you have to get a basic thrill from solving problems, sharpening your skills, and exercising your intelligence.

    If you aren't the kind of person that feels this way naturally, you'll need to become one in order to make it as a hacker. Otherwise you'll find your hacking energy is sapped by distractions like sex, money, and social approval.

    (You also have to develop a kind of faith in your own learning capacity — a belief that even though you may not know all of what you need to solve a problem, if you tackle just a piece of it and learn from that, you'll learn enough to solve the next piece — and so on, until you're done.)

    2. No problem should ever have to be solved twice.


    Creative brains are a valuable, limited resource. They shouldn't be wasted on re-inventing the wheel when there are so many fascinating new problems waiting out there.

    To behave like a hacker, you have to believe that the thinking time of other hackers is precious — so much so that it's almost a moral duty for you to share information, solve problems and then give the solutions away just so other hackers can solve new problems instead of having to perpetually re-address old ones.

    Note, however, that "No problem should ever have to be solved twice." does not imply that you have to consider all existing solutions sacred, or that there is only one right solution to any given problem. Often, we learn a lot about the problem that we didn't know before by studying the first cut at a solution. It's OK, and often necessary, to decide that we can do better. What's not OK is artificial technical, legal, or institutional barriers (like closed-source code) that prevent a good solution from being re-used and force people to re-invent wheels.

    (You don't have to believe that you're obligated to give all your creative product away, though the hackers that do are the ones that get most respect from other hackers. It's consistent with hacker values to sell enough of it to keep you in food and rent and computers. It's fine to use your hacking skills to support a family or even get rich, as long as you don't forget your loyalty to your art and your fellow hackers while doing it.)

    3. Boredom and drudgery are evil.

    Hackers (and creative people in general) should never be bored or have to drudge at stupid repetitive work, because when this happens it means they aren't doing what only they can do — solve new problems. This wastefulness hurts everybody. Therefore boredom and drudgery are not just unpleasant but actually evil.

    To behave like a hacker, you have to believe this enough to want to automate away the boring bits as much as possible, not just for yourself but for everybody else (especially other hackers).

    (There is one apparent exception to this. Hackers will sometimes do things that may seem repetitive or boring to an observer as a mind-clearing exercise, or in order to acquire a skill or have some particular kind of experience you can't have otherwise. But this is by choice — nobody who can think should ever be forced into a situation that bores them.)

    4. Freedom is good.

    Hackers are naturally anti-authoritarian. Anyone who can give you orders can stop you from solving whatever problem you're being fascinated by — and, given the way authoritarian minds work, will generally find some appallingly stupid reason to do so. So the authoritarian attitude has to be fought wherever you find it, lest it smother you and other hackers.

    (This isn't the same as fighting all authority. Children need to be guided and criminals restrained. A hacker may agree to accept some kinds of authority in order to get something he wants more than the time he spends following orders. But that's a limited, conscious bargain; the kind of personal surrender authoritarians want is not on offer.)

    Authoritarians thrive on censorship and secrecy. And they distrust voluntary cooperation and information-sharing — they only like ‘cooperation’ that they control. So to behave like a hacker, you have to develop an instinctive hostility to censorship, secrecy, and the use of force or deception to compel responsible adults. And you have to be willing to act on that belief.

    5. Attitude is no substitute for competence.


    To be a hacker, you have to develop some of these attitudes. But copping an attitude alone won't make you a hacker, any more than it will make you a champion athlete or a rock star. Becoming a hacker will take intelligence, practice, dedication, and hard work.

    Therefore, you have to learn to distrust attitude and respect competence of every kind. Hackers won't let posers waste their time, but they worship competence — especially competence at hacking, but competence at anything is valued. Competence at demanding skills that few can master is especially good, and competence at demanding skills that involve mental acuteness, craft, and concentration is best.

    If you revere competence, you'll enjoy developing it in yourself — the hard work and dedication will become a kind of intense play rather than drudgery. That attitude is vital to becoming a hacker.

    Step by Step Guide on Connecting to a Wi-Fi Network Using Windows

    Wireless Internet (Wi-Fi) zones are convenient, easy to access, and available to any device with a wireless adapter. Finding open wireless Internet is usually no problem in populated areas. In fact, airports, libraries, and cafรฉs often advertise free Wi-Fi hotspots.

    When you find an open Wi-Fi zone, you'll need to take a few simple steps in Windows 7 or Windows Vista to connect safely. Note that public Wi-Fi networks are typically unsecured, meaning that a determined attacker can follow everything you do while siphoning off your private information. While we recommend avoiding unsecured networks whenever possible, sometimes you just need to use one. Whether your network is secured or unsecured, follow these steps to connect:

    Step by Step: In Windows 7

    1. Click the network icon in the notification area to open the list of available networks. Alternatively, click the Windows Start button and open Control Panel; click Network and Internet; and then click Connect to a network (under Network and Sharing Center) to open the list of available networks.

    2. Click the network to which you would like to connect.

    3. Click the Connect button. If the network is security-enabled, you'll need to enter a security key obtained from the network administrator.

    If this is the first time you are connecting to the network, you'll be prompted to choose a network location. A network location is a profile Windows uses to determine appropriate security settings. Always choose the Public network location when connecting to public Wi-Fi networks. You can change the location of any network you connect to by clicking Start, Control Panel, Network and Internet, Network and Sharing Center. Change the network location by clicking the network location below the network name.

    Step by Step: In Windows Vista

    1. Click the Windows Start button, then click Connect to. Alternatively, click Start, Control Panel, Network and Internet, Connect to a network (under Network and Sharing Center).

    2. In the list of available networks, click the network to which you would like to connect.

    3. Click the Connect button. If the network is security-enabled, you'll need to enter a security key (obtained from the network administrator).

    Remember: Unsecured wireless networks--which many public Wi-Fi hotspots are--carry greater risk than secured (password-protected) wireless networks. Do not work with sensitive information while surfing on an open public network.

    Setting Up VPN in Windows 7 for Dummies

    VPN (Virtual Private Network) technology lets a computer using a public Internet connection join a private network by way of a secure "tunnel" between that machine and the network. The most common case is a business allowing its employees to connect to its work network from home or from the road.

    There are two principal ways to configure VPN. The first and more-common scenario, called outgoing, is setting up a remote computer to call into the office network. The second scenario, called incoming, occurs on the network side, where a computer allows secure connections from other computers. Windows 7 comes preloaded with the Agile VPN client, which makes setting up either kind of connection relatively easy.
    Step by Step: Connecting to a VPN (Outgoing)

    Step 1 Click the Start button. In the search bar, type VPN and then select Set up a virtual private network (VPN) connection.

    Step 2 Enter the IP address or domain name of the server to which you want to connect. If you're connecting to a work network, your IT administrator can provide the best address.

    Step 3 If you want to set up the connection, but not connnect, select Don't connect now; otherwise, leave it blank and click Next.

    Step 4 On this next screen, you can either put in your username and password, or leave it blank. You'll be prompted for it again on the actual connection. Click Connect.

    Step 5 To connect, click on the Windows network logo on the lower-right part of your screen; then select Connect under VPN Connection.

    Step 6
    In the Connect VPN Connection box, enter the appropriate domain and your log-in credentials; then click Connect.

    Step 7 If you can't connect, the problem could be due to the server configuration. (There are different types of VPN.) Check with your network administrator to see what kind is in use--such as PPTP--then, on the Connect VPN Connection screen, select Properties.

    Step 8
    Navigate to the Security tab and select the specific Type of VPN from the drop-down list. You may also have to unselect Include Windows logon domain under the Options tab. Then click OK and Connect.

    Step by Step: Building a VPN (Incoming)


    Step 1 Click the Start button, and, in the search bar, type Network and Sharing.

    Step 2 Click Change Adapter Settings in the left-hand menu.

    Step 3 Click File, and then New Incoming Connection.

    Step 4 Select the users you'd like to give access to and click Next.

    Step 5 Click Through the Internet and select Next.

    Step 6
    Select the Internet Protocol you'd like to use. (The default TCP/IPv4--the line highlighted in the screenshot below--will work fine.)

    Step 7 Finally, click Allow access; you've now set up an incoming VPN connection.

    Customer Service Insight.

    Written By Unknown on Wednesday 10 November 2010 | 15:31

    Tonight, amongst other nonsense, I heard a creative director declare that twitter could be a great customer service tool. No it can't. It can be a great customer mood monitor, it can be a great way to field customer complaints, but that's not what we should understand as customer service.

    Customer service is what happens throughout your contact with the customer. If you do it right, you shouldn't need to have a Twitter presence because your customers will be happy.

    Learn how to Print your Twitter Feed

    You can probably think of some good reasons to archive your Twitter messages (or someone else's). Printing a Twitter feed is an effective way to do it. Whether you want to have a hard copy of useful or entertaining tweets, or whether you worry about the possibility of Twitter losing part or all of your message history, read on to discover the most effective ways to save Twitter timelines in print.

    Twitter's Web interface does not provide an option to print a feed, so you have several options to consider. I'll outline the pros and cons of each below.
    Printing From Your Browser

    Pull up the Twitter feed you want to preserve, and print it using your browser's Print command. You can also select, copy, and paste the information you want into a word processor and print from there.

    Pros: Fast and simple.

    Cons: Typically you'll lose or distort the formatting when you print this way. As a result, the printed output will probably be more challenging to read. If you choose to print all of the images and the background, you will rapidly deplete your ink supply. To see and print more than the first page of the feed, you need to spend time clicking the More button at the bottom of the screen.

    Best use: Printing the most recent posts of any Twitter timeline, in a quick-and-dirty way.
    Using Searchtastic

    Searchtastic is a service that allows you to search and export tweets by user or by keyword. To export a complete Twitter feed, visit the Searchtastic site. Enter any Twitter account's login name into the top box, and click the Search button. On the next page, click Excel Export, enter the number you're given to start the download, and save the file to your computer. You can now open and print the file from Excel.

    Pros: The process is fast, and the output is organized and complete. You don't need to have a Twitter account to use it. And it's free.

    Cons: Retweets are not included in the output. Twitter's formatting is removed. Some very long Twitter feeds are truncated after the first few thousand results.

    Best use:
    Archiving all the necessary details of a feed quickly and anonymously.


    Using an OAuth Application

    The Open Authorization (OAuth) protocol allows you to grant an application access to your Twitter account without revealing your password to that application. Granting OAuth access means that an application can find, pull, and organize information from your Twitter account just as you can (but much more quickly).

    Some examples to try: Tweetake exports and prints your tweets in CSV format. TweetBackup exports and prints your tweets in a variety of formats. TweetScan Backup exports and prints your timeline in TiddlyWiki format. TwitPrint prints your tweets and those of your friends, including pictures. TwDocs exports and prints timelines in many formats.

    None of these options allow you to view protected accounts to which you don't have access, however. I suggest trying Searchtastic first, because it doesn't require any of your credentials to function. If you need more than it can provide, try another application.

    Pros: Many OAuth applications can update the archive of a feed constantly, so your printed output will always be up-to-date. OAuth applications offer many export format options that are all printable. The process is free, fast, and simple.

    Cons: You must allow an application access to your data. Most applications permit you to back up only your own feed. Some applications require that you follow them on Twitter in order to use the service.

    Best use: Generating output with more options than an anonymous service provides.

    Optimize Performance on your Portable PCs | Laptop Gaming

    Most mainstream laptops have modest CPUs and weak graphics cards. Here's how to tune your games for the best laptop gaming.

    Sales of laptop PCs are outpacing those of desktop systems, even as PC gaming has undergone something of a revival in the past couple of years. So it's natural that laptop owners would be playing games on their mobile PCs. Gamers want to have their favorites on the go, whether those titles are casual games such as Plants vs. Zombies, strategy games such Civilization V or Starcraft 2, or first-person shooters like the Call of Duty franchise.

    The problem is that mainstream laptops simply aren't built for high-end gaming. Sure, you can buy one of those 10-pound monsters that claim to be "gaming laptops," but they're really laptops in name only. For our purposes here, I'm defining a laptop as a portable that offers a 16-inch or smaller screen and weighs 7 pounds or less--something you might reasonably carry on a business trip or a long vacation.

    How do you get robust gaming from current-generation laptops of reasonable size? It's actually pretty straightforward, with a little knowledge and the willingness to give up a few features that you'll never really notice on the small screen.

    Laptop Gaming: Understanding the Limitations

    First, it's worth exploring the limitations you need to live with. As it turns out, those limitations seem more severe than they really are.

    Processor, Memory, and Storage


    Most small and midsize laptops ship with dual-core CPUs. A few models have quad-core processors, but those don't have the impact on gaming that you might suspect. For one thing, mobile quad-core processors often run at clock speeds substantially lower than their dual-core cousins. Take Intel's Core i7 820QM: Intel advertises it as a 1.73GHz CPU with a turbo-boost speed of 3.06GHz. What that actually means is that one of the four cores may run as fast as 3.06GHz when needed--but the other cores are relatively inactive.

    On the other hand, the Core i5 540M is a dual-core CPU that runs at 2.53GHz--but also supports a turbo-boost of 3.06GHz. Performance under many games will be very similar for these two CPUs, but you'll pay a premium for the 820QM. Those extra cores become useful if you're heavily into photo or video editing, but they don't add much to the performance of many games, particularly at the lower clock speed.

    Memory is another factor. You really want 4GB of RAM, especially if you're running the 64-bit version of Windows 7 or Windows Vista. For games, however, more memory isn't all that useful beyond 4GB.

    Whether you have a dual-core CPU or a quad-core one, the processor isn't the biggest player in holding back gaming performance--the graphics component is.

    Graphics and Audio Hardware

    Perhaps the biggest roadblocks to robust gaming on a laptop are limitations in graphics hardware. Integrated graphics--3D hardware built into either the chipset or the processor itself--is particularly limiting.

    Even if your laptop has "discrete graphics"--a separate chip built into the system just for accelerating 3D graphics and video--it's likely to be a cut-down version of what's available for desktop PCs. The number of computational units (often called shader units or shader cores) may be smaller than on even midrange desktop graphics cards. Similarly, clock speeds and memory bandwidth may be lower. So while these chips can technically support the latest and greatest graphical features of modern games, in practice the performance trade-offs are too great.

    What users often don't realize is that giving up a little graphics eye candy can help game performance improve substantially. Remember, you're playing on a small screen--as small as 11 or 13 inches in some cases. Even a 15- or 16-inch laptop screen isn't large when compared with affordable 22- to 27-inch desktop displays. If you dial back some of the intense graphics settings on smaller laptop LCDs, you may not notice much difference.

    Audio hardware isn't as limiting a factor as graphics hardware is, but the tiny speakers built into most laptops won't generate the powerful sound effects that many games can produce. If you want immersive game audio, what you should really get is a good set of in-ear or over-the-ear headphones.

    Point and Shoot!

    Touchpads and eraserheads have always been problematic as pointing devices, but they're particularly bad for gaming. Some newer laptops come equipped with touchscreens, but for the most part PC games don't support touch. You'll find a few exceptions: The excellent real-time strategy game R.U.S.E. works great with a multitouch screen. With most modern games, though, you'll want a mouse. For mobility, it's best to leave the big gaming mice at home; a cordless mouse designed for laptops will work fine, as long as it has a scrollwheel button and a couple of side buttons.

    Although carrying a small, cordless mouse isn't too onerous, lugging around a keyboard is usually out of the question. While the keyboards built into many laptops are somewhat cramped, many games often allow you to reconfigure keyboard controls. Reconfiguring allows you to use keys that may be more suitable: If the arrow keys are too tiny, for instance, reconfigure their action to the PgDn key or a function key.
     
    Rules of Thumb: Hardware Driver Configuration

    Now that you have a basic understanding of the hardware limitations, let's talk configuration. First, you need to configure your hardware. You do that through driver configuration--in most cases, graphics drivers. The discussion below applies to AMD, nVidia, and Intel driver control panels. In truth, you can make only limited changes to driver controls, and those tweaks will have only small effects on performance; most of the real gains will be in game configuration. But every little bit helps.

    The various graphics drivers have similar options; some have more than others, but you can generally ignore the more esoteric ones.

    One key item is vsync. This feature is a throwback to the era of CRT monitors, when games would try to synchronize the display of a frame of animation to coincide with the refresh rate of the monitor. Most LCDs, however, set the refresh rate to 60Hz--if vsync is on, your game will never run faster than 60 frames per second.

    When you disable vsync, the game can paint the frames as fast as they're rendered. The downside: If the frame rate is lower than the vertical refresh rate, you may see visible tearing in the image. But the trade-off may be worthwhile to get an acceptable frame rate.

    The other setting that can have some impact on performance is the texture quality setting. Lowering this setting may affect overall image quality--but if you have a particularly small display, it may not matter. Texture quality will likely affect performance only by a slim margin.

    Disabling Crapware

    It's amazing how much performance-sucking junk comes preloaded into retail laptops. Going through your notebook and uninstalling anything that may affect performance might be worth your time. Some apps, such as OS X-like menu bars, don't really eat into performance, but they do take up memory. Look through your system tray and use the system configuration utility to minimize the number of apps your laptop runs in the background.

    You can launch the system configuration utility by clicking Start, Run and typing msconfig in the field. It's best to leave all the Microsoft apps running, as well as any antivirus programs. But try disabling some of the others, such as iTunes, Adobe updaters, and so on.

    Rules of Thumb: Game Settings

    The games themselves are where you have the most control over both graphics quality and performance. Here are some key settings that are worth considering when you're playing on a laptop.
    • If the game gives you the option of choosing which version of DirectX to use, go for the lower-numbered version. Performance will almost certainly be better, and image quality won't substantially degrade.
    • Look for a global setting in the game's graphics configuration screen. It may allow you to choose settings such as 'optimal', 'medium', or 'low'. Experiment with different global settings to see if one will work best for your laptop.
    • Some games enable antialiasing by default, no matter what hardware the game detects. On laptops it's a good idea to turn off antialiasing, as it's a tremendous graphics-performance hog.
    • Shadows are another significant drain on performance, particularly at higher settings. Turning shadow settings off will make the game look less realistic, but you can typically get by with setting this feature to 'low' without much of a performance hit. On lower-end hardware, or on systems with integrated graphics, disabling shadows entirely may be best.
    • If you have the option of setting the view distance (how far into the virtual world you can see objects), reduce it to a visually acceptable level. Push it too low, and objects may pop out in a jarring way.
    • Set postprocessing effects to a minimum. The game may have no specific setting for postprocessing, however; instead, you may see features such as depth-of-field and motion blur. If the result looks similar to a film effect, it's probably postprocessing. Specialized water and flame effects may also fall under this category.
    • Try starting with lower resolutions, such as 1280 by 720, and then pushing up the resolution gradually. On smaller LCDs, though, it's better to turn up features first, and then the resolution.
    As an example, here's a look at Sid Meier's Civilization V, the latest in the long-running Civilization franchise. It's a turn-based game, which means that you can play at your own pace. By the same token, it's a demanding game graphically, taking advantage of the latest DirectX 11 graphics technology built into Windows 7.

    This game gives you two options: DirectX 9 and DirectX 10 & 11. If you want to maximize performance, choose the DirectX 9 option and then set most of the in-game settings to low, as shown below. You still get fairly attractive graphics while playing the game.

    This is a good general rule of thumb with any game: If the title gives you the option of dropping down to an older version of DirectX, do it. You probably won't notice any image-quality difference unless you look very closely, and performance will be better--in some games, the difference is 50 percent or more.

    Choose Your Games Wisely: Picks for Different Laptops

    What laptop hardware you carry around may be the deciding factor as to what games you play. A netbook won't be able to handle the heavy demands of a modern first-person shooter, but it might be quite capable of playing casual or older titles.

    A 6-pound thin-and-light laptop with modest discrete graphics, on the other hand, may prove surprisingly capable. Here are a few games that would be playable at low-to-medium settings on each class of system.

    Netbook Gaming

    We're definitely in low-end territory here. Casual games such as Peggle, Puzzle Quest, and Plants vs. Zombies are playable on netbooks. The latter two titles even have strong appeal to more serious gamers. You'll also find certain classes of games that attract hard-core gamers but have low-quality graphics or even old-school ASCII text, making them very playable on laptops; examples of these games include Dwarf Fortress and Minecraft.

    Thin-and-Light, Integrated Graphics

    Your game repertoire can expand a bit here, even if you have fairly entry-level Intel integrated graphics hardware such as that built into Core i5 processors. Most strategy games are playable, although you'll have to tweak the settings somewhat in certain more-demanding real-time strategy games. Some shooters, like those in the Call of Duty line and Valve titles such as Team Fortress 2, are quite playable if you're willing to dial down the settings to medium-low or low quality and set your resolution to something more modest, along the lines of 1280 by 720.

    Thin-and-Light, Discrete Graphics

    Now the choices expand even more. A few games, such as the very demanding Metro 2033 first-person shooter, may be only marginally playable, even at lower settings. But most games are playable if you're willing to sacrifice resolution and graphics settings.

    The problem here is the variance in products. Thin-and-light laptops can have everything from the fairly high-end AMD Radeon HD 5850 Mobile or nVidia GeForce GT 445M to the entry-level nVidia GeForce GT 325M or AMD Radeon HD 5450 Mobile.
    Case Studies: Looking at Two Laptops

    Now it's time to turn to a couple of real-world examples. The first--the Toshiba Satellite T235, which ships with a 1.5GHz AMD Turion II Neo CPU--is an ultraportable, which offers better performance than a netbook, but not by a wide margin. The second is a mainstream thin-and-light laptop, the Asus N82j, a 14-inch unit with a Core i5 540M and a discrete nVidia GeForce GT 335M GPU.

    What applies to the Toshiba is also likely to apply to netbooks, except that the Toshiba's integrated AMD graphics hardware offers higher performance for 3D.

    Toshiba Satellite T235

    No matter what I tried, I couldn't get decent first-person shooter performance out of the T235. Even relatively forgiving titles such as Portal and Team Fortress 2 were only marginally playable.

    Civilization V ran fine in DirectX 9 mode, with most graphics features turned down. Animations were a little ragged; since this game is turn-based, that isn't a big deal. However, you should definitely keep map sizes smaller--a large or huge map with many AI players means long waits as turns are executing.

    Games like Puzzle Quest ran well. The oddly fun side-scrolling shooter Blade Kitten also offered reasonable performance.

    Asus N82j

    The N82j is one of a new breed of laptops that support nVidia's Optimus technology. The system runs with integrated Intel graphics in normal use--office apps and Web surfing, for instance--but when you launch a game, the discrete nVidia GeForce GT 335M graphics kick in.

    Even so, the GT 335M is a midrange mobile 3D part, which would be entry-level on a desktop system. So I had to make some sacrifices. Although I had to set the combat flight simulator Tom Clancy's HAWX to DX9 mode with mostly low settings, the game ran above 30 frames per second, which is acceptable for this class of game.

    Far Cry 2 ran at about 30 fps in DX9 mode, too, but with most graphics features set to 'low' and the resolution at 1280 by 720. Civilization V performance, even on a large game, was reasonably good, though the game ran with DirectX 9 graphics at medium settings.
    Game On

    If you're mostly a mobile PC user, as are an increasing number of people, you can still get your gaming fix. All you need is a little knowledge, a desire to experiment, and a willingness to run your games at more modest graphics settings. Not every game will run on every laptop well, but you should be able to find excellent titles that will tickle your gaming fancy, whatever your hardware budget.

    The QWERTY slider Nokia E7 hits the stores on 10 December

    Written By Unknown on Tuesday 9 November 2010 | 17:32

    The fourth Symbian^3 device - Nokia E7 - will be released on 10 December. It will bring a full hardware QWERTY keyboard under the tilting 4-inch ClearBlack AMOLED screen.
    The confirmation came straight from the official Nokia Twitter account. Strangely enough though, the tweet was removed shortly after it was published.

    The Nokia E7 comes to complement the Nokia high-end portfolio with its bigger 4-inch nHD AMOLED capacitive screen, using the new ClearBlack technology. It comes with scratch-resistant surface and, of course, the sliding out QWERTY keyboard.
    There are a couple of sacrifices, though - E7 has an 8 megapixel fixed-focus camera with dual-LED flash instead a 12 megapixel monster with xenon. Also, there's no card slot on this one. Well, you can't have it all, we guess.
    The rest of the specs are pretty much the same as those of the N8 - a 680MHz processor, 3D graphics accelerator, 720p video recording, 16GB onboard storage, 256MB ROM, 1GB ROM (N8 has 512MB) and full connectivity package. Nokia E7 also packs HDMI slot just like the N8.
    The first wave of availability starts on 10 December so we guess you should have yours by Christmas. And you might want to start saving now as the expected price is around 495 euro (637 USD) before taxes and subsidies.
    Source: Nokia Twitter channel (tweet now removed)
    http://www.technotips.org/wp-content/uploads/2010/09/2-Nokia-E7.jpg
     
    Support : Creating Website | Johny Template | Mas Template
    Copyright © 2011. Turorial Grapich Design and Blog Design - All Rights Reserved
    Template Created by Creating Website Published by Mas Template
    Proudly powered by Blogger