Techniques for portable computers and mobile devices
Portable and Mobile
The arrival of Linux on portable and mobile devices provides so many interesting opportunities for customization. This month we look at Linux in portable and mobile environments.
Once the computer was as big as a room, then it was as big as a car, then it was as big as a suitcase. Now, it seems, a computer can be smaller than a cigarette box – and not just in some mad scientist's lab but out in the world, on real mobile phones and other handheld devices. The hardware keeps getting lighter and smaller, and the tools keep getting smarter. This new age of mobile computing has ushered in a new era for open source. This month we examine some tools for portable and mobile environments.
The first article describes a technique for accessing a Linux computer from an iPhone or iPod Touch – not just with SSH, but through a full VNC-based GUI desktop session. Next up, longtime Linux author Marcel Gagné shows how to set up a small-scale collaboration environment on a Linux system with Open Atrium.
The next article provides a practical look at creating Qt-based applications for the Maemo platform, including real-world examples showing how to build a simple text editor and a map-reading tool for a Maemo-based mobile phone. The final article in this month's set shows how to customize the hot keys on a Linux laptop with acpid.
And if you're looking for even more on the world of portable computers, read on to our Reviews section, where we introduce you to Joulicloud and Moblin – a pair of Linux-based systems tailored for portable environments.
Buy this article as PDF
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
A first cousin of the recent Heartbleed attack affects EAP-based wireless and peer-to-peer authentication.
FOSS community acts to protect freedom of choice for laptop devices.
Quintessential open source browser shores up its market share with a step toward the proprietary dark side.
Authorities in 16 countries take action against users of the imfamous BlackShades malware tool.