Will Gekko realize his comments aren't funny? But that's not going to happen. So go back to your circle jerks with the other mailroom clerks on the Android sites. If you find you need to post here try to at least string together a cogent paragraph or two Perhaps you need some more snuggle time with a certain craven member of Colligan's BoyToys?
Android is an OS designed by geeks for geeks. It isn't an OS for regular, normal people. Normal people don't spend several hours a week rooting thrir phones, downloading and installing hacked custom ROMs and tweaking different near useless widgets cluttering up their home screen.
The ONLY reason Android has become the most commonly used smartphone OS is because almost every manufacturer is using it, so consumers are forced to use Android whether they want to or not. And the only reasons manufacturers are using Android are because it's "free" and they're too shortsighted, stupid and moneyhungry to realize why using Android and entrusting their future to Google is a big mistake.
A mobile OS should be all about speed, simplicity, ease of use, rapid presentation of data, stability, flexibility, and ease of application development. Android fails in most of these aspects. Another option would be to create a Launcher X UI or at least provide this as a user-selectable option.
Security and the rampant problems with rogue apps stealing user data needs to be addressed immediately. That issue alone should be enough for wise consumers to stay away from Android phones. Android has quickly become a blight upon the smartphone world and should be avoided at all costs until it is fixed.
Just say no to Android. Related Articles Article Comments 24 comments The following comments are owned by whoever posted them. Got it downloaded and will install as soon as I have some free time. Will be nice to hot sync again! Gekko, you are wrong on this one.
OK here is some info from the forums. Next time you feel like posting on a Palm OS thread, Take your keyboard and smash it on your head until the urge goes away. Oh by the way, one of the…. Mac account. Browser Sync is a free utility fromGoogle of course that allows you to synchronize your Firefox on one computer to another. This includes passwords and bookmarks. You will need a Gmail account.
If you need one, let me know and…. For your sake, I hope P1 fixes this thing. All good things Simply put, I am going to need a new PDA sometime soon. If you know of any other licensees currently producing Palm-based devices that fit my needs, then gladly recommend them. Last I checked, P1 was the last man standing so it's not like we have much choice in the matter, is it? The LD formfactor is still very nice despite its thickness.
I'll downgrade to a T E2 if I must after my T3 dies. It's as simple as that. The LD doesn't do simultaneous hard buttons??? The only other device i ever heard of with this were the early ipaqs.
And this is supposed to be a category of device intended for mobile entertainment! Bad enogh that they took perfectly great dpad design from the 1st OS 5 units well - too small on the T C - but the DPAD on the first 2 T T's was actually good for gaming and screwed it all up 'oh - wait!
But no simultaneous buttons??? Does p1 even test these things??? Can others confirm - is this true? I have an LD and I love it. It's unstable and crashes nearly every day. That's infuriating, but it's fixable.
For me, the good of the device far outweighs the bad. Do I wish it was more stable? Of course, but that doesn't supersede the aspects of it that make it darn useful for me and for many others.
The mp3 thing will likely be fixed within two weeks according to NormSoft , and the instabilities will likely be fixed soon afterward. No doubt P1 is going to have more HD-based devices in the future, so they're going to be working on making them work well.
SharkCache or not, it cannot handle the system calls for multiple button presses at one time. Every Palm device since, what, the III has accepted simultaneous input.
A true shame as it has the best d-pad yet in a PDA IMO and the hard buttons, while not perfect, offer very good tactile feedback and response. Additionally, the hard buttons have been remapped so that a lot of legacy titles are broken. Example: up and down on the LD d-pad function as usual. I didn't think it could be, but it appears that at least one class of Blazer reset has gone away.
In the past, when I tried to access websites that had "invalid" SSL certs e. I can now access the two sites I use on a regular basis, both of which used to reset my LD. Must have been a strage bug to have been in the WiFiLib. So an entire major category of software games! How did p1 screw that up? A bigger question -why did not one major review mention this???? What the heck's up Ryan??
WHy was this not mentioned??? Surreal man, just surreal! Does MS have plants working at p1? It is the only credible explanation - more believeable than p1 or anybody being that incompetant. The manager may revoke the credential after a fixed period of time, i. The manager may revoke the credential responsive to a completion event indicating that the requestor is no longer using the credential. Embodiments of the subject matter and the operations described in this specification can be implemented in digital electronic circuitry, or in computer software, firmware, or hardware, including the structures disclosed in this specification and their structural equivalents, or in combinations of one or more of them.
Embodiments of the subject matter described in this specification can be implemented as one or more computer programs, i. The program instructions can be encoded on an artificially generated propagated signal, e. A computer-readable storage medium can be, or be included in, a computer-readable storage device, a computer-readable storage substrate, a random or serial access memory array or device, or a combination of one or more of them. Moreover, while a computer-readable storage medium is not a propagated signal, a computer-readable storage medium can be a source or destination of computer program instructions encoded in an artificially generated propagated signal.
The computer-readable storage medium can also be, or be included in, one or more separate physical components or media e. The operations described in this specification can be implemented as operations performed by a data processing apparatus on data stored on one or more computer-readable storage devices or received from other sources.
The apparatus can include special purpose logic circuitry, e. The apparatus can also include, in addition to hardware, code that creates an execution environment for the computer program in question, e. The apparatus and execution environment can realize various different computing model infrastructures, such as web services, distributed computing and grid computing infrastructures. The systems described can include or share one or more data processing apparatuses, computing devices, or processors.
A computer program also known as a program, software, software application, script, or code can be written in any form of programming language, including compiled or interpreted languages, declarative or procedural languages, and it can be deployed in any form, including as a stand alone program or as a module, component, subroutine, object, or other unit suitable for use in a computing environment.
A computer program may, but need not, correspond to a file in a file system. A program can be stored in a portion of a file that holds other programs or data e. A computer program can be deployed to be executed on one computer or on multiple computers that are located at one site or distributed across multiple sites and interconnected by a communication network. Processors suitable for the execution of a computer program include, by way of example, both general and special purpose microprocessors, and any one or more processors of any kind of digital computer.
Generally, a processor will receive instructions and data from a read only memory or a random access memory or both. The essential elements of a computer are a processor for performing actions in accordance with instructions and one or more memory devices for storing instructions and data.
Generally, a computer will also include, or be operatively coupled to receive data from or transfer data to, or both, one or more mass storage devices for storing data, e.
However, a computer need not have such devices. Moreover, a computer can be embedded in another device, e. Devices suitable for storing computer program instructions and data include all forms of non volatile memory, media and memory devices, including by way of example semiconductor memory devices, e. The processor and the memory can be supplemented by, or incorporated in, special purpose logic circuitry.
To provide for interaction with a user, embodiments of the subject matter described in this specification can be implemented on a computer having a display device, e. Other kinds of devices can be used to provide for interaction with a user as well; for example, feedback provided to the user can be any form of sensory feedback, e.
In addition, a computer can interact with a user by sending documents to and receiving documents from a device that is used by the user; for example, by sending web pages to a web browser on a user's client device in response to requests received from the web browser. Embodiments of the subject matter described in this specification can be implemented in a computing system that includes a back end component, e.
The components of the system can be interconnected by any form or medium of digital data communication, e. The computing systems described can include clients and servers. A client and server are generally remote from each other and typically interact through a communication network.
The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. In some embodiments, a server transmits data e. Data generated at the client device e. While this specification contains many specific embodiment details, these should not be construed as limitations on the scope of any inventions or of what may be claimed, but rather as descriptions of features specific to particular embodiments of particular inventions.
Certain features described in this specification in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable sub-combination. Moreover, although features may be described above as acting in certain combinations and even initially claimed as such, one or more features from a claimed combination can in some cases be excised from the combination, and the claimed combination may be directed to a sub-combination or variation of a sub-combination.
Similarly, while operations are depicted in the drawings in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results.
In certain circumstances, multitasking and parallel processing may be advantageous. Moreover, the separation of various system components in the embodiments described above should not be understood as requiring such separation in all embodiments, and it should be understood that the described program components and systems can generally be integrated in a single software product or packaged into multiple software products.
Where technical features in the drawings, detailed description or any claim are followed by reference signs, the reference signs have been included for the sole purpose of increasing the intelligibility of the drawings, detailed description, and claims. Accordingly, neither the reference signs nor their absence have any limiting effect on the scope of any claim elements. Thus, particular embodiments of the subject matter have been described. Other embodiments are within the scope of the following claims.
What is claimed is: 1. A method of facilitating management of cloud-based service instances, the method comprising: receiving, by a cloud management service configured to communicate with a multi-tenant computing cloud, a request to perform an action on a cloud-based service instance hosted in the multi-tenant computing cloud, the request authenticated as originating from a requestor;. The method of claim 1 , wherein the access entity permissions are restricted to allow access only to the established cloud service instance.
The method of claim 1 , wherein the cloud-based service instance is associated with a resource pool comprising one or more cloud-based service instances and the access entity permissions are restricted to only accessing cloud-based service instances in the resource pool. The method of claim 1 , wherein the cloud-based service instance provides one of a database, a load balancer, a message queue, a communication channel, and data storage.
The method of claim 1 , wherein the cloud-based service instance is a virtual service provided in the multi-tenant computing cloud. The method of claim 1 , further comprising establishing, by the cloud management service, responsive to determining that the request is allowable by the requestor, a custom access entity with permissions sufficient to perform the request,.
The method of claim 1 , further comprising establishing the cloud-based service instance by submitting, by the cloud management service to multi-tenant computing cloud, instructions to create, start, instantiate, discover, identify, duplicate, import, configure, or generate, the cloud-based service instance.
The method of claim 7 , further comprising establishing the access entity with permissions to access the established cloud service instance separately from establishing the cloud-based service instance.
A system for facilitating management of cloud-based service instances, the system comprising: one or more servers including one or more hardware processors configured to communicate with at least one multi-tenant computing cloud; and.
The system of claim 9 , wherein the access entity permissions are restricted to allow access only to the established cloud service instance. The system of claim 9 , wherein the cloud-based service instance is associated with a resource pool comprising one or more cloud-based service instances and the access entity permissions are restricted to only accessing cloud-based service instances in the resource pool.
The system of claim 9 , wherein the cloud-based service instance provides one of a database, a load balancer, a message queue, a communication channel, and data storage. The system of claim 9 , wherein the cloud-based service instance is a virtual service provided in the multi-tenant computing cloud.
The system of claim 9 , the instructions further comprising instructions that, when executed by the one or more hardware processors, cause the one or more servers to: establish, responsive to determining that the request is allowable by the requestor, a custom access entity with permissions sufficient to perform the request,. The system of claim 9 , wherein the instructions further comprising instructions that, when executed by the one or more hardware processors, cause the one or more servers to establish the cloud-based service instance by submitting, by the cloud management service to multi-tenant computing cloud, instructions to create, start, instantiate, discover, identify, duplicate, import, configure, or generate, the cloud-based service instance.
The system of claim 15 , wherein the instructions further comprising instructions that, when executed by the one or more hardware processors, cause the one or more servers to establish the access entity with permissions to access the established cloud service instance separately from establishing the cloud-based service instance.
A method of facilitating management of cloud-based service instances, the method comprising: receiving, by a cloud management service configured to communicate with a multi-tenant computing cloud, a request for direct access to a cloud-based service instance hosted in the multi-tenant computing cloud, the request authenticated as originating from a requestor;.
The method of claim 17 , wherein the access entity permissions are restricted to allow access only to the established cloud service instance. The method of claim 17 , wherein the cloud-based service instance is associated with a resource pool comprising one or more cloud-based service instances and the access entity permissions are restricted to only accessing cloud-based service instances in the resource pool.
The method of claim 17 , wherein the cloud-based service instance provides one of a database, a load balancer, a message queue, a communication channel, and data storage.
The method of claim 17 , wherein the cloud-based service instance is a virtual service provided in the multi-tenant computing cloud. The method of claim 17 , further comprising establishing, by the cloud management service, responsive to determining that the request is allowable by the requestor, a custom access entity with permissions sufficient to perform the request,. The method of claim 17 , further comprising establishing the cloud-based service instance by submitting, by the cloud management service to multi-tenant computing cloud, instructions to create, start, instantiate, discover, identify, duplicate, import, configure, or generate, the cloud-based service instance.
The method of claim 23 , further comprising establishing the access entity with permissions to access the established cloud service instance separately from establishing the cloud-based service instance. The system of claim 25 , wherein the access entity permissions are restricted to allow access only to the established cloud service instance. The system of claim 25 , wherein the cloud-based service instance is associated with a resource pool comprising one or more cloud-based service instances and the access entity permissions are restricted to only accessing cloud-based service instances in the resource pool.
The system of claim 25 , wherein the cloud-based service instance provides one of a database, a load balancer, a message queue, a communication channel, and data storage. The system of claim 25 , wherein the cloud-based service instance is a virtual service provided in the multi-tenant computing cloud.
The system of claim 25 , the instructions further comprising instructions that, when executed by the one or more hardware processors, cause the one or more servers to: establish, responsive to determining that the request is allowable by the requestor, a custom access entity with permissions sufficient to perform the request,. The system of claim 25 , wherein the instructions further comprising instructions that, when executed by the one or more hardware processors, cause the one or more servers to establish the cloud-based service instance by submitting, by the cloud management service to multi-tenant computing cloud, instructions to create, start, instantiate, discover, identify, duplicate, import, configure, or generate, the cloud-based service instance.
The system of claim 31 , wherein the instructions further comprising instructions that, when executed by the one or more hardware processors, cause the one or more servers to establish the access entity with permissions to access the established cloud service instance separately from establishing the cloud-based service instance. USP true Systems and methods for establishing cloud-based instances with independent permissions. USB1 en.
0コメント