Sep 11, 2013

Aug - 28 2013 | By

Notifications of new show notes and edits are tweeted at:
– They're tagged with #Zentech.
– When what's said is unclear to me (or I'm unfamiliar with a topic) I tend to quote (" ") verbatim.
– Editor's comments are delimited by < >

Paul was in the studio and Glenn joined in by phone from Sacramento

Glenn noted how cool it was today in Sac, leading Paul to mention a network of citizen-run weather stations. Go to for more info.
<As an example, I use this one, which is local to me here in Sac>

Apple announced new products yesterday. The lower-cost model 5C iPhone is targeted for the Chinese market.
– It comes in 5 colors and you can get those same 5 colors as a cover choice for the phone.
– It has the same A6 processor as the iPhone 5.
– It's a little slimmer and has a different battery.
– It's $529 to purchase it outright for an unlocked version. <Of course, the various carriers have contract plans.>

Also debuting was the iPhone 5S. The improvement Glenn liked was its 64bit processor, apparently a first in smartphone technology. The 5S entry model is $629.
<There was much buzz about its fingerprint reader, too.
Here are some articles about the phones…
Apple Unveils Faster iPhone, and a Cheaper One, Too
Highlights and Analysis of Apple’s iPhone Event
Surprising Enhancements to Apple’s iPhone Line, by David Pogue>

The KVMR program director Steve Baker, under pretense of announcing breaking news, wished Paul a happy birthday. He turned 57. Several staff members sang the traditional birthday song.

Paul said that the new iPhones come with a new version of the operating system: iOS7. He said iOS7 will not work on iPhone 3GS or earlier. Eventually, owners of these early models will not be able to install apps — the apps will require iOS7.

Glenn noted that Mikail <the resident Apple fan> thinks Android is a "bit ahead of the game at this point".

Paul said Android & Apple products have their own "ecosystems". Apple has the iCloud, which synchronizes content across different Apple hardware. Android has Google Contacts, Gmail, Google Plus, etc.

He said that, with some effort, you can get your music list from iTunes to work Android. Alternately, you can use Google Music to store up to 20,000 songs. Also, you can cache songs on the Android device for listening when you're not on the web.

Paul went on to say that "you can actually login to iCloud and see your photo stream using Windows 7 or higher". It's not built-in to Win7 — you have to download iTunes and login with your Apple ID. Supposedly, you will also be able use iCloud to synch your contacts, events, etc. using Outlook.

Talk turned to top level domains (.com, .net, .org…). See the above link to IANA (Internet Assigned Numbers Authority) for various domains. You can register your own personal web address using one of endings in the list by typing into your address bar the letters 'nic.' followed by the top level domain you're interested in. If you want an address ending in .it, for example, type If you look further down the IANA list, you'll see domain names in foreign languages.

Glenn acknowledged the 911 tragedy on this anniversary.
Paul put up a link above to a Wikipedia article about the event.

Paul had used Mac computers for a while and then bought one about 3 years ago. He's not an early adopter and tends get a model that's a generation behind. In that light, he appealed to listeners wanting to sell their off-contract iPhone 4 or 5 to contact him <zen at kvmr dot org>.

Paul then talked about EXIF photo data. It's the meta data that's stored in the image file along with the picture and contains info about aperture, focus, shutter speed, etc. that was used to make the photo.
<EXIF was discussed on the 2-27-13 show>

At one time, Paul got a bunch of pictures that didn't come from a camera, but from a scanner. He wanted to add EXIF data to them and found the tool to do it. See the above link for EXIFTOOL. It does batch processing to do a bunch of photos at once and runs from the command line, where you type in the commands like the old DOS operating system.

Batch processing is difficult to do in many graphical <GUI> programs. Paul asked listeners to suggest graphical programs that can do a similar job.

He also said iPhoto has some advance search ability where you can display photos based on certain criteria like the camera that was used, a particular location, a certain date and many other attributes in the EXIF data.

Paul noted that EXIFTOOL works with sound files like .mp3, too. To find out more go a Google search using the words: iphoto search options.

The Mac also has a little-known command interface. Go to the magnifying glass in the upper right & type in the word: terminal. Then hit enter and the terminal program will run and will provide the command line interface. More specifically, what you'll be looking at is a Darwin Unix prompt (loosely based on BSD Unix), where you type in your commands.

Paul had a problem circumventing the user password on a Windows 8 computer. Newer computers have firmware called UEFI (Unified Extensible Firmware Interface), which prevents booting Linux from a CD, He had gotten used to booting Linux and then accessing the Windows files without having to run Windows itself.
<UEFI was discussed on the 3-13-13 show>

The solution involved using the system recovery environment, which is accessible during a bootup by holding down a particular key. It's available in Vista, Windows 7 and Windows 8. In that environment, there's a place to report your problem to Microsoft and it lets you use Notepad for typing your comments. Once Notepad is running, go to the File menu & click open. Now you'll see a list of files (that Notepad assumes you want to open).

It isn't well known that this window, with the list of files, has some of the properties of the file Explorer: you can rename, delete and even move files (right click on a file). Having gained access to the files in this way, Paul was able to rename 2 files and, thereafter, boot from a Linux CD.

Paul asked listeners if anyone knows of any benefit to using Windows 8. Does it do something that nothing else can? Apparently he's had a problem locating the Control Panel and also getting Microsoft Security Essentials running (it's now called by its previous name Windows Defender). Paul thought the free Security Essentials program, though present on the Win8 machines, is turned off so as not to compete with commercial anti-virus programs that OEM vendors might want to install on their systems.

A caller wanted to know how to tether his Verizon Android phone to his computer.
– It should be possible, it's build into Android, though the carrier can turn off that feature on a phone if they don't want you to do it.
– Glenn read on the web that Verizon charges for their Mobile Broadband Connect tethering feature. So instead, look for an app to download that provides tethering. Check Google's app store.
– Glenn suggested using a data monitoring app to keep track of your data usage, if your cellular plan has a data usage allotment.
– Try going to Settings -> Data Usage to see how much traffic went over wi-fi, Bluetooth and for data usage. It even tells you how much data each app used.
– Go to PC World and search for "android tether verizon" to find the article Glenn was reading. The article also lists some apps you can use for tethering.
– Paul suggested having a talk only plan for the phone and getting a mi-fi unit for your data. Such a unit will use a 3G or 4G cellular connection and provide a wi-fi signal for up to 5 people. Paul said he's heard good reports on the IGo phone plan that gives you talk and text <txt> for about $20 per month that you can supplement with a mi-fi unit.

Paul briefly mentioned the in-ear monitor called Musicians Ear. See the above link.

Katie wrote in asking how to transfer her operating system from one Dell laptop to another.
– There's no way to do it. She'll have to reinstall the OS from scratch on the second computer.
– To reactivate the key on the 2nd machine, call Dell, Dell is pretty good about that.
– From the symptoms she stated, it sounds like someone may have removed the hard drive, supposedly to secure any personal information.

Last updated 10:37 PM 9/11/2013

Leave a Reply