No more room for your applications on your iPhone or iPod Touch?

Running out of space to place all those Applications you’ve downloaded and tried out on your iPhone or iPod Touch. Instead of using the small OS Partition which is where all the applications are saved, you can use the Media partition instead and continue on the installing spree.

Running out of space to place all those Applications you’ve downloaded and tried out on your iPhone or iPod Touch. Instead of using the small OS Partition which is where all the applications are saved, you can use the Media partition instead and continue on the installing spree.

Both the iPhone and the iPod touch include relatively limited space on the OS partition (the part of your iPhone’s memory that stores the operating system and associated files). It’s where Apple, by default, adds its factory-installed Applications but you can save space by installing your Apps on the Media partition instead (that’s the part of your your touch or phone that contains your iTunes musics and videos).

Read the full article and how-to on tuaw.com


Did you like this article?


0 Shares:
You May Also Like

ISPs Inserting Ads Into Your Pages

ISPs Inserting Ads Into Your Pages - TheWoozle writes "Some ISPs are resorting to a new tactic to increase revenue: inserting advertisements into web pages requested by their end users. They use a transparent web proxy (such as this one) to insert javascript and/or HTML with the ads into pages returned to users. Neither the content provides nor the end-users have been notified that this is taking place, and I'm sure that they weren't asked for permission either."

Read more of this story at Slashdot.

[Slasdot]
Read More

Detect insider threats with Linux auditing

Detect insider threats with Linux auditing -

Organizations of all sizes need to mitigate the risk of insider threats. Misconduct by authorized users represents a grave threat to an organization. According to the 2005 Computer Security Institute and Federal Bureau of Investigation Computer Crime and Security Survey, organizations reported that computer intrusions from inside sources accounted for nearly half of all incidents. You can secure your network perimeter with intrusion detection systems, firewalls, and virus scanners, but don't neglect to monitor authorized users. The Linux Audit daemon can help you detect violations of your security policies.

[Linux.com]
Read More

DeviceAnywhere lets devs play with 500 phones over the net

DeviceAnywhere is a company that wires cellphone hardware into servers, which are then accessible over the internet. Mainly used by software developers and for cross platform development, instead of buying all the phones you can just rent them and use them over the internet.
Talk about the ultimate iPhone hack. Mobile Complete, a software-services company, has pulled an iPhone to pieces and lashed it to a remote-controlled server. Every input and output on the dissected iPhone is electrically hooked up to the net, providing access to would-be iPhone programmers over the web.
Read More

Site dedicated to the collection of LOL/LULZ/LAWL Cats!

I found this site through Hoose, who should be posting on this site anyways. This site houses submitted LOL Cats from users on the web, there are some already famous ones located on the site already. They have a random page, that will display random LOL Cat's. http://icanhascheezburger.com/
Read More