All posts filed under “Mobile phones

Biting Apple

Biting Apple

Interesting to see the BBC’s summary of the current iPhone update story: “Apple issues an update which damages iPhones that have been hacked by users”. I’m not sure that’s quite how Apple’s PR people would have put it, but it’s interesting to see that whoever […]

On the level

On the level

A tilt-detector from this 1984 US patent, with intended application on a packing box. The liquid detection stickers in mobile phones, which allow manufacturers and retailers to ascertain if a phone has got wet, and thus reject warranty claims (whether judiciously/appropriately or not), seem to […]

Dishonourable discharge?

Dishonourable discharge?

Long overdue, I’m currently reading Bruce Schneier‘s excellent Beyond Fear, and realising that in many ways, security thinking overlaps with architectures of control: the goal of so many systems is to control users’ behaviour or to deny the user the ability to perform certain actions. […]

Key issue

Key issue

Is this simply poor design or a deliberate feature? A friend tells me of his irritation with his Sony Ericsson W880i’s ‘internet’ key, which is positioned such that it frequently gets pressed accidentally when pressing the buttons above and below it – “three or four […]

Some links

Some links

First, an apology for anyone who’s had problems with the RSS/Atom feeds over the last month or so. I think they’re fixed now (certainly Bloglines has started picking them up again) but please let me know if you don’t read this. Oops, that won’t work… […]

The Tell-Tale Part

The Tell-Tale Part

Open the case of your mobile (cell) phone. Do you see a round white sticker, similar to that in the first photo below? This is a water damage sticker, which changes colour if moisture gets into this bit of the phone, and will be used […]

Review: Made to Break by Giles Slade

Review: Made to Break by Giles Slade

Last month I mentioned some fascinating details on planned obsolescence gleaned from a review of Giles Slade‘s Made to Break: Technology and Obsolescence in America. Having now read the book for myself, here’s my review, including noteworthy ‘architectures of control’ examples and pertinent commentary. Slade […]

‘Secret alarm becomes dance track’

‘Secret alarm becomes dance track’

The Mosquito sound has been mixed (sort of) into a dance track: “…the sound is being used in a dance track, Buzzin’, with secret melodies only young ears can hear. … Simon Morris from Compound Security said: “Following the success of the ringtone, a lot […]

Uninnovate – engineering products to do less

Uninnovate – engineering products to do less

Image from uninnovate.com I’ve just come across a very interesting new blog, uninnovate.com, which focuses on the phenomenon of “engineering expensive features into a product for which there is no market demand in order to make the product do less.” The first few posts tackle […]

Some interesting aspects of built-in obsolescence

Some interesting aspects of built-in obsolescence

This San Francisco Chronicle review of Giles Slade’s Made to Break: Technology and Obsolescence in America (which I’ve just ordered and look forward to reading and reviewing here in due course) mentions some interesting aspects of built-in (planned) obsolescence – and planned failure – in […]

Feature deletion for environmental reasons

Feature deletion for environmental reasons

From the Sunday Times, ‘Standby buttons face axe to curb energy waste’: “Ministers want to do away with the standby buttons that allow [users] to flick their TVs and other electronic gadgets on and off while moving barely a muscle…

Review: Everyware by Adam Greenfield

Review: Everyware by Adam Greenfield

This is the first book review I’ve done on this blog, though it won’t be the last. In a sense, this is less of a conventional review than an attempt to discuss some of the ideas in the book, and synthesise them with points that […]

Friend or foe: Battery-authentication ICs?

Friend or foe: Battery-authentication ICs?

Via MAKE, an article from Electrical Design News looking at lithium battery authentication chips in products such as phones and laptops, designed to prevent users fitting ‘non-genuine’ batteries. Now, the immediate response of most of us is probably “razor blade model!” or even “stifling democratic […]