Melting iMac Mod

Posted by:
Date: Tuesday, August 2nd, 2005, 22:28
Category: Mod

Is your G5 iMac too hot to handle? One user was overheating after 40 minutes with CPU temps exceeding 76C / 170F. His solution ain’t pretty, but worked like a charm. Read on…


Mobile Google Maps on the Treo 650

Posted by:
Date: Tuesday, August 2nd, 2005, 10:59
Category: Mobile Phone

Google Maps on the Treo 650 with KMaps“Since I use Google Maps often and I use my Treo 650 all the time, I thought it would be nice to have some of Google Maps on my Treo. Google Maps implementation is heavy on AJAX and no Treo 650 web browser to my current knowledge is able to handle Google Maps the way they are handled in PC browsers (at least my Xiino and Blazer aren’t able to handle them). So, I decided to add some of Google Maps’ functionality on Treo 650.” (KMaps Courtesy of TreoNauts)


Think DRM: Apple Adding Trusted Computing to OS X

Posted by:
Date: Tuesday, August 2nd, 2005, 08:33
Category: Hardware

A post on boingboing has some people ready to defect from the Macintosh platform. Ok, step off the ledge, it’s only a Slashdot report that “the new Intel kernel Apple has included with the Developer Kit DVD uses TCPA/TPM DRM. More specifically, it includes “a TCPA/Palladium implementation that uses a Infineon 1.1 chip which will prevent certain parts of the OS from working unless authorized.” (click through and read the comments).

This means that “open formats” are no longer meaningful. It means that the price of being a Mac user will be eternal vigilance. If this “feature” appears in a commercial, shipping version of Apple’s OS, they’ll lose me as a customer — I’ve used Apple computers since 1979 and have a Mac tattooed on my right bicep, but this is a deal-breaker.

The Trusted Computing Group would have you believe that it’s all good but an article by the EFF has quite a different take on the situation:

There is a widespread perception that personal computer security is in an unfortunate state and that something must be done to fix it. There are many promising approaches to improving security — redesigning operating systems, changing programming methodologies, or altering the PC’s hardware itself. It is well known that a comprehensive defense against the security threats faced by PC users will involve several approaches, not just one. An insecure system can’t magically become “secure” with the addition of a single piece of technology.

Would you buy a Mac with Trusted Computing inside?


PowerPage Podcast Episode 1

Posted by:
Date: Tuesday, August 2nd, 2005, 02:05
Category: Podcast

PowerPage PodcastWe’re happy to announce that PowerPage Podcast 1.0 is available for download from the iTunes Music Store.
Episode 1 of the PowerPage Podcast features the Mighty Mouse, Sony VAIO notebook engineers being courted by Apple and features an interview with Paul Alfieri, Director of Communications & Public Affairs at Motorola Connected Home Solutions. In this episode we’ll take you on an audio tour of the latest gear from Motorola connected home products, including the Ojo Personal Video Phone, the Homesight monitoring, security and control system, DCT6412 dual tuner, high definition DVR and Motorola and Oakley’s RAZRwire Bluetooth sunglasses.
It’s far from perfect but it’s a good start. Our next episode will feature a mobile technology roundtable discussion and we’re working on an article that will detail how to create your own Podcast on a PowerBook.
Subscribe to the Podcast directly in iTunes. (OPML file)
(Thanks to Jimi Robinson for creating our Podcast logo)