Yopy 3700 Product Review
Why is the Yopy faster than a C700 even though it has a slower CPU? The answer lies in the software. Unlike the Zauruses and the Simpad, which are based on Qtopia/OPIE, the Yopy uses the X Window System and the mobile GNOME environment. Keeping in mind the X-only iPAQ distribution, Yopy is the third PDA environment to use the Linux kernel. The drawback is the GNOME mobile environment is GTK-based, making the whole collection of Zaurus software incompatible with Yopy.
The Yopy interface is not very different from OPIE or Microsoft Windows. It offers a start menu, a list of opened windows, icons for active peripherals and a clock. An on-screen keyboard and a graffiti zone make it possible to enter characters if one does not like the 49-key keyboard.
The PIM is one of the most important pieces of software in a PDA, and, as with the Zaurus, the Yopy PIM was not well thought-out or designed. A nice PIM add-on is the possibility of using the Yopy 3700 embedded Web server to update or enter PIM information from the desktop computer. Yet it would be nice to be able to keep a local copy of the PIM data.
For Windows desktops, MyPIMS is provided on the software CD-ROM. Although it is a good application, there is no possibility to synchronize the device with Outlook; the former Yopy 3000 could. The only options are third-party, non-free software or iCalendar formatted imports.
The default applications included in the 3700 mostly are the standard one. The control center has good icons and is easy to use. And the ability to run X applications is a big plus.
On the Internet side, there is no Web browser but Dillo. Dillo is not as good as Opera or Netfront or even KHTML, but the e-mail application is powerful.
Some applications stand above the others: the GQMpeg MP3 player, VLC client and Grecord make it possible to use the Yopy as an MP3 player, a portable video device (if you have a Wi-Fi stream or a big memory card) and a dictaphone. gpaint is fast and responsive. It may be a result of both the touchscreen and the GNOME mobile environment, but this paint application is intuitive and easy to use for taking small notes.
Yopy Office, on the other hand, is not very good. QPresent is the worst; QCell is better. Hancom Mobile Word here performs exactly as it does in the Zaurus version.
Overall, there are far fewer free and non-free applications available for the Yopy than there are for the Zaurus, mainly due to the distribution choice. It also is not easy to connect the Yopy to a Linux machine, and there is no Java environment. I would have preferred a Qtopia/OPIE-based distribution, if only for the amount of software available.
The boot process of Linuxpy, the Yopy default distribution, is far more verbose than that of Zaurus, and the Web server available by default are convenient options. The ability to export, display and recompile X11 applications also makes the Yopy an attractive choice. But the Yopy does not perform as good as the Zaurus on the PDA side, mostly due to the lack of application and the PIM problems.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Ubuntu Online Summit
- Devuan Beta Release
- The Qt Company's Qt Start-Up
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- The US Government and Open-Source Software
- May 2016 Issue of Linux Journal
- The Death of RoboVM
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- BitTorrent Inc.'s Sync
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide