Welcome!

Wearables Authors: Pat Romanski, Liz McMillan, Yeshim Deniz, Jnan Dash, Roger Strukhoff

Related Topics: Wearables, Mobile IoT, Microservices Expo, Agile Computing

Wearables: Book Review

Book Review | iPhone: The Missing Manual

The book that should have been in the box!

One of the biggest misconceptions people have about my skill set is that because I can develop software for the iPhone, iPad, and Windows 8 tablets, I must know everything there is to know about using them. 90% of my time spent on a computer is spent in code, UML tools, and using basic Word functionality.

I do not play games, make photo albums, or read books on them. In other words, I am not as computer savvy as the business user or teenager that use them to connect to the world and conduct their business or coordinate a gaming session. I am very grateful for the Missing Manual series because they put everything I need to know about my devices in one place, and I don't have to spend the time looking for features.

I have listed the five parts of this Missing Manual and the chapters they contain below.

The iPhone as Phone
Chapter 1 The Guided Tour
Chapter 2 Typing, Editing & Searching
Chapter 3 Phone Calls & FaceTime
Chapter 4 Speech Recognition—and Siri
Chapter 5 Voicemail, Texting & Other Phone Tricks

Pix, Flix & Apps
Chapter 6 The iPhone as iPod
Chapter 7 Camera, Photos & Video
Chapter 8 All About Apps
Chapter 9 The Built-In Apps

The iPhone Online
Chapter 10 Getting Online
Chapter 11 The Web
Chapter 12 Email

Connections
Chapter 13 Syncing with iTunes
Chapter 14 iCloud
Chapter 15 The Corporate iPhone
Chapter 16 Settings

Appendixes
Appendix Signup & Setup
Appendix Troubleshooting & Maintenance

As with all the Missing Manuals, the book is on the Missing Manuals web site. It has links to all the sites, software, and white papers mentioned in each each chapter. They are organized by chapter so they are easy to find.

One of the cool things I really like about this book is all the crazy little features I would never find on my own. Some of them are how to invert the colors on the phone, how to have the phone speak everything on the screen, how to make free ring tones, free texting with Google Voice, all the weird stuff you can do with Siri, how to tweak Spotlight results, and much much more.

Another cool thing I like is how the author points out different ways to save money throughout the book.

This Missing Manual is in full color. Not all of them are, and for a book about using an interface like the iPhone it makes a big difference.

The index is very thorough and laid out really nice. This may seem trivial, but I am currently reading two programming books, and one of them has a horrible index, and the other has none. They are both great books, but they won't be very good references at all.

I highly recommend this book to the user that wants to know how to use all the applications and features included with the iOS 7. The most amazing thing about this book is how many topics the author covers, and they cover them in detail giving lots of screenshots so you can see what they're discussing.

If you are thinking about buying your first iPhone, this book is perfect for seeing what you'll be getting.

iPhone: The Missing Manual

iPhone: The Missing Manual

More Stories By Tad Anderson

Tad Anderson has been doing Software Architecture for 18 years and Enterprise Architecture for the past few.

IoT & Smart Cities Stories
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settl...
Contextual Analytics of various threat data provides a deeper understanding of a given threat and enables identification of unknown threat vectors. In his session at @ThingsExpo, David Dufour, Head of Security Architecture, IoT, Webroot, Inc., discussed how through the use of Big Data analytics and deep data correlation across different threat types, it is possible to gain a better understanding of where, how and to what level of danger a malicious actor poses to an organization, and to determin...
@CloudEXPO and @ExpoDX, two of the most influential technology events in the world, have hosted hundreds of sponsors and exhibitors since our launch 10 years ago. @CloudEXPO and @ExpoDX New York and Silicon Valley provide a full year of face-to-face marketing opportunities for your company. Each sponsorship and exhibit package comes with pre and post-show marketing programs. By sponsoring and exhibiting in New York and Silicon Valley, you reach a full complement of decision makers and buyers in ...
There are many examples of disruption in consumer space – Uber disrupting the cab industry, Airbnb disrupting the hospitality industry and so on; but have you wondered who is disrupting support and operations? AISERA helps make businesses and customers successful by offering consumer-like user experience for support and operations. We have built the world’s first AI-driven IT / HR / Cloud / Customer Support and Operations solution.
LogRocket helps product teams develop better experiences for users by recording videos of user sessions with logs and network data. It identifies UX problems and reveals the root cause of every bug. LogRocket presents impactful errors on a website, and how to reproduce it. With LogRocket, users can replay problems.
Data Theorem is a leading provider of modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere. The Data Theorem Analyzer Engine continuously scans APIs and mobile applications in search of security flaws and data privacy gaps. Data Theorem products help organizations build safer applications that maximize data security and brand protection. The company has detected more than 300 million application eavesdropping incidents and currently secu...
Rafay enables developers to automate the distribution, operations, cross-region scaling and lifecycle management of containerized microservices across public and private clouds, and service provider networks. Rafay's platform is built around foundational elements that together deliver an optimal abstraction layer across disparate infrastructure, making it easy for developers to scale and operate applications across any number of locations or regions. Consumed as a service, Rafay's platform elimi...
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always looking for insights on how to mitigate the security risks of implementing and using cloud solutions. Based on the presentation topics covered at the conference, as well as the general discussions heard between sessio...
Growth hacking is common for startups to make unheard-of progress in building their business. Career Hacks can help Geek Girls and those who support them (yes, that's you too, Dad!) to excel in this typically male-dominated world. Get ready to learn the facts: Is there a bias against women in the tech / developer communities? Why are women 50% of the workforce, but hold only 24% of the STEM or IT positions? Some beginnings of what to do about it! In her Day 2 Keynote at 17th Cloud Expo, Sandy Ca...
New competitors, disruptive technologies, and growing expectations are pushing every business to both adopt and deliver new digital services. This ‘Digital Transformation’ demands rapid delivery and continuous iteration of new competitive services via multiple channels, which in turn demands new service delivery techniques – including DevOps. In this power panel at @DevOpsSummit 20th Cloud Expo, moderated by DevOps Conference Co-Chair Andi Mann, panelists examined how DevOps helps to meet the de...