microsoft

Some interesting Articles about the Upcoming Windows Mobile | Lukew.com

> ### Windowsphone > > **8** articles about **windowsphone** from the LukeW [writing archives](http://www.lukew.com/ff/). > > - [Touch Target Sizes](http://www.lukew.com/ff/entry.asp?1085) —May 4, 2010 > - [Touch Gesture Diagrams](http://www.lukew.com/ff/entry.asp?1073) —Apr 22, 2010 > - [MIX10: Designing & Developing for the Rich Mobile Web](http://www.lukew.com/ff/entry.asp?1028) —Mar 18, 2010 > - [Windows Phone: Input Controls](http://www.lukew.com/ff/entry.asp?1021) —Mar 16, 2010 > - [MIX10: Windows Phone UI and Design Language](http:…

Keep reading

Microsoft's RearType - What are they smoking over there in Redmond?

> The RearType paper describes the project as follows: > > > “Our goal is a system that provides the tactile feedback and familiarity of a regular keyboard without cluttering the front of the display, ameliorates the occlusion problem inherent in direct on-screen touch and pen input, does not use the valuable screen real-estate taken up by an on-screen keyboard, leverages users existing skills in touch-typing on a regular physical QWERTY keyboard, and allows for text entry in highly mobile usage scenarios.” > > After building a prototype, the researchers put it through its paces with…

Keep reading

'Unhackable' Android can be hacked | Phones | iPhone Central | Macworld

> Once thought to be [unhackable](http://www.productiveorganizer.com/android-productivity/android-phones-with-encrypted-bootloaderunhackable/), the [Android](http://www.networkworld.com/columnists/2010/072610-gearhead.html) phone is anything but, according to researchers presenting at Black Hat 2010. > > Not only has malicious software cloaked in a [wallpaper application]() stolen personal information from [infected phones](http://www.networkworld.com/news/2010/070610-smartphone-essentials.html?fsrc=netflash-rss) and sent it to a Website in China, but researchers from Lookout Mobile Security have found a way to take the phones over completely—including top-of-the-line models hawked by major wireless…

Keep reading

Headlines that contradict their own stories

> Though this does not mean that Apple’s software is the most insecure—the report takes no consideration of the severity of the flaws—it points at a growing trend in the world of security flaws: the role of third-party software. Many of Apple’s flaws are not in its operating system, Mac OS X, but rather in software like Safari, QuickTime, and iTunes. Vendors like Adobe (with Flash and Adobe Reader) and Oracle (with Java) are similarly responsible for many of the flaws being reported. via [arstechnica.com](http:…

Keep reading

Daring Fireball Linked List: 'I Wish Microsoft Had Their Evil Genius Back' - My Take

His chart comparing Microsoft’s stock price under Bill Gates vs. Ballmer is devastating. How much longer can Ballmer last? Is the problem that Gates doesn’t want to return? That Gates doesn’t want to concede that it was a terrible error to hand the company to Ballmer? That he doesn’t want to fire his friend? via daringfireball.net I have a theory: It’s not that Gates is afraid to fire his old friend. I think he expected Microsoft to falter after he left. I think that’…

Keep reading