Re: Let's play...

2007-06-19 Thread Christopher Tokarczyk
let's play read the mailing lists game: From: *Luit van Drongelen <[EMAIL PROTECTED]>*To: * [EMAIL PROTECTED] Date: *Jun 18, 2007 4:49 AM* Subject: *Re: How to buy/order Neo1973* Hello, You can't order yet, but we hope it'll be any day now. That's when. Where and how? On openmoko.com. - Show qu

Re: Openness (was RE: Concern for usability and ergonomics)

2007-06-12 Thread Christopher Tokarczyk
I agree definitely with the parts that I excerpted below from what John said, and would further like to point out what I personally see as one of the major strengths of this project: To show the world and other device makers that there can be a market for open mobile devices/phones. Of course this

Re: First impressions of Neo1973

2007-05-15 Thread Christopher Tokarczyk
not having a neo yet I can't comment on how it actually performs now, but I just think it's worth pointing out that this is still very very early. personally, i'm not too worried because i have faith that once the phones are out and the community at large has a crack at them, things will improve.

Re: Itch3: Anti-lost/theft protection

2007-02-28 Thread Christopher Tokarczyk
I think the disagreement over what the phone ideally should do when stolen is even more support for the proposition that there should be a way for the owner to configure this behavior. ___ OpenMoko community mailing list community@lists.openmoko.org htt

Re: Itch3: Anti-lost/theft protection

2007-02-28 Thread Christopher Tokarczyk
this also looks like these things can be categorized into different groups. First, there are events or situations that set off the stolen-mode (such as wrong pin, owner sending a message to the phone, possibly even getting close to a gps coordinate, etc.). Then there are actions to be taken: emi

Re: Itch3: Anti-lost/theft protection

2007-02-28 Thread Christopher Tokarczyk
Hi all, In addition to the data suggested to be sent when a phone is in stolen mode, such as GPS, perhaps the phone could even send other data. If the person uses a stolen phone to store contacts, send the contacts. in fact, send the numbers dialed, too. If they use it to manage email, forward th