Welcome!

Blog Feed Post

iPhone: The Missing Manual Book Review

One of the biggest misconceptions people have about my skill set is that because I can develop software for the iPhone, iPad, and Windows 8 tablets, I must know everything there is to know about using them. 90% of my time spent on a computer is spent in code, UML tools, and using basic Word functionality.

I do not play games, make photo albums, or read books on them. In other words, I am not as computer savvy as the business user or teenager that use them to connect to the world and conduct their business or coordinate a gaming session. I am very grateful for the Missing Manual series because they put everything I need to know about my devices in one place, and I don't have to spend the time looking for features.

I have listed the five parts of this Missing Manual and the chapters they contain below.

The iPhone as Phone
Chapter 1 The Guided Tour
Chapter 2 Typing, Editing & Searching
Chapter 3 Phone Calls & FaceTime
Chapter 4 Speech Recognition—and Siri
Chapter 5 Voicemail, Texting & Other Phone Tricks

Pix, Flix & Apps
Chapter 6 The iPhone as iPod
Chapter 7 Camera, Photos & Video
Chapter 8 All About Apps
Chapter 9 The Built-In Apps

The iPhone Online
Chapter 10 Getting Online
Chapter 11 The Web
Chapter 12 Email

Connections
Chapter 13 Syncing with iTunes
Chapter 14 iCloud
Chapter 15 The Corporate iPhone
Chapter 16 Settings

Appendixes
Appendix Signup & Setup
Appendix Troubleshooting & Maintenance

As with all the Missing Manuals, the book is on the Missing Manuals web site. It has links to all the sites, software, and white papers mentioned in each each chapter. They are organized by chapter so they are easy to find.

One of the cool things I really like about this book is all the crazy little features I would never find on my own. Some of them are how to invert the colors on the phone, how to have the phone speak everything on the screen, how to make free ring tones, free texting with Google Voice, all the weird stuff you can do with Siri, how to tweak Spotlight results, and much much more.

Another cool thing I like is how the author points out different ways to save money throughout the book.

This Missing Manual is in full color. Not all of them are, and for a book about using an interface like the iPhone it makes a big difference.

The index is very thorough and laid out really nice. This may seem trivial, but I am currently reading two programming books, and one of them has a horrible index, and the other has none. They are both great books, but they won't be very good references at all.

I highly recommend this book to the user that wants to know how to use all the applications and features included with the iOS 7. The most amazing thing about this book is how many topics the author covers, and they cover them in detail giving lots of screenshots so you can see what they're discussing.

If you are thinking about buying your first iPhone, this book is perfect for seeing what you'll be getting.

iPhone: The Missing Manual

iPhone: The Missing Manual

Read the original blog entry...

More Stories By Tad Anderson

Tad Anderson has been doing Software Architecture for 18 years and Enterprise Architecture for the past few.

Latest Stories
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - comp...
Qosmos has announced new milestones in the detection of encrypted traffic and in protocol signature coverage. Qosmos latest software can accurately classify traffic encrypted with SSL/TLS (e.g., Google, Facebook, WhatsApp), P2P traffic (e.g., BitTorrent, MuTorrent, Vuze), and Skype, while preserving the privacy of communication content. These new classification techniques mean that traffic optimization, policy enforcement, and user experience are largely unaffected by encryption. In respect wit...
Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is expected in the amount of information being processed, managed, analyzed, and acted upon by enterprise IT. This amazing is not part of some distant future - it is happening today. One report shows a 650% increase in enterprise data by 2020. Other estimates are even higher....
"My role is working with customers, helping them go through this digital transformation. I spend a lot of time talking to banks, big industries, manufacturers working through how they are integrating and transforming their IT platforms and moving them forward," explained William Morrish, General Manager Product Sales at Interoute, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo Silicon Valley Call for Papers is now open.
To leverage Continuous Delivery, enterprises must consider impacts that span functional silos, as well as applications that touch older, slower moving components. Managing the many dependencies can cause slowdowns. See how to achieve continuous delivery in the enterprise.
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
Kubernetes, Docker and containers are changing the world, and how companies are deploying their software and running their infrastructure. With the shift in how applications are built and deployed, new challenges must be solved. In his session at @DevOpsSummit at19th Cloud Expo, Sebastian Scheele, co-founder of Loodse, will discuss the implications of containerized applications/infrastructures and their impact on the enterprise. In a real world example based on Kubernetes, he will show how to ...
The 19th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Digital Transformation, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportuni...
SYS-CON Events announced today that eCube Systems, a leading provider of middleware modernization, integration, and management solutions, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. eCube Systems offers a family of middleware evolution products and services that maximize return on technology investment by leveraging existing technical equity to meet evolving business needs. ...
19th Cloud Expo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterpri...
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addres...
Enterprises have forever faced challenges surrounding the sharing of their intellectual property. Emerging cloud adoption has made it more compelling for enterprises to digitize their content, making them available over a wide variety of devices across the Internet. In his session at 19th Cloud Expo, Santosh Ahuja, Director of Architecture at Impiger Technologies, will introduce various mechanisms provided by cloud service providers today to manage and share digital content in a secure manner....
As the world moves toward more DevOps and Microservices, application deployment to the cloud ought to become a lot simpler. The Microservices architecture, which is the basis of many new age distributed systems such as OpenStack, NetFlix and so on, is at the heart of Cloud Foundry - a complete developer-oriented Platform as a Service (PaaS) that is IaaS agnostic and supports vCloud, OpenStack and AWS. Serverless computing is revolutionizing computing. In his session at 19th Cloud Expo, Raghav...
SYS-CON Events announced today that Venafi, the Immune System for the Internet™ and the leading provider of Next Generation Trust Protection, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Venafi is the Immune System for the Internet™ that protects the foundation of all cybersecurity – cryptographic keys and digital certificates – so they can’t be misused by bad guys in attacks...