Skip to content

TechRepublic

Trending Now

Threat Intelligence: The Key to Higher Security Operation Performance
Resource

Threat Intelligence: The Key to Higher Security Operation Performance

Detecting and Responding to a Ransomware Attack
Resource

Detecting and Responding to a Ransomware Attack

data science image.
Image: Wright Studio/Shutterstock
Article

KNIME vs Alteryx: Data science software comparison

kaspersy info on phishing kits.
Image: iStock/jauhari1
Article

Voice phishing attacks reach all-time high

  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium

Account Information

Join or sign in

Register for your free TechRepublic membership or if you are already a member, sign in using your preferred method below.

Use Facebook
Use Linkedin

Join or sign in

We recently updated our Terms and Conditions for TechRepublic Premium. By clicking continue, you agree to these updated terms.

Welcome back!

Invalid email/username and password combination supplied.

Reset password

An email has been sent to you with instructions on how to reset your password.

Welcome to TechRepublic!

Username must be unique. Password must be a minimum of 6 characters and have any 3 of the 4 items: a number (0 through 9), a special character (such as !, $, #, %), an uppercase character (A through Z) or a lowercase (a through z) character (no spaces).

Loading
Open source

Boot to Gecko

By Chris Duckett March 25, 2012, 10:41 AM PDT

Image
1
of 23
Previous Next

b2g-lockscreen.png
b2g-lockscreen.png
Boot to Gecko

Boot to Gecko

Boot to Gecko

ntThe lock screen that welcomes users to Boot to Gecko. To access the home screen underneath, an upward flick is required.
nt(Credit: Chris Duckett/TechRepublic)

Boot to Gecko

Boot to Gecko: home screen

Boot to Gecko: home screen

ntThe first page of the home screen for B2G. There’s quite the Firefox motif happening here.
nt(Credit: Chris Duckett/TechRepublic)

Boot to Gecko

Boot to Gecko: home screen

Boot to Gecko: home screen

ntPage two of the HTML-based applications available.
nt(Credit: Chris Duckett/TechRepublic)

Boot to Gecko

Boot to Gecko: home screen

Boot to Gecko: home screen

ntThe final page of the home screen.
nt(Credit: Chris Duckett/TechRepublic)

Boot to Gecko

Boot to Gecko: on a call

Boot to Gecko: on a call

nt(Credit: Chris Duckett/TechRepublic)

Boot to Gecko

Boot to Gecko: messages

Boot to Gecko: messages

ntInside the Messages application of the system, we had to run this off a web server and inside a desktop browser to get the dummy data to appear. This area was blank in our emulator.
nt(Credit: Chris Duckett/TechRepublic)

Boot to Gecko

Book to Gecko: message thread

Book to Gecko: message thread

nt(Credit: Chris Duckett/TechRepublic)

Boot to Gecko

Boot to Gecko: browser

Boot to Gecko: browser

ntThe browser is similar to the current Aurora builds of Firefox for Mobile, this is a much better and cleaner experience than the Firefox builds currently available on Android handsets.
nt(Credit: Chris Duckett/TechRepublic)

Boot to Gecko

Boot to Gecko: browser

Boot to Gecko: browser

ntOne “problem” with the browser is that sites will often return their mobile versions to it — this can be both a blessing and a curse depending on which site you are requesting.
nt(Credit: Chris Duckett/TechRepublic)

Boot to Gecko

Boot to Gecko: contacts

Boot to Gecko: contacts

ntA bit of polish on this interface would be nice.
nt(Credit: Chris Duckett/TechRepublic)

Boot to Gecko

Boot to Gecko: video list

Boot to Gecko: video list

ntThis listing screen is typical of the listing screens for media items throughout B2G.
nt(Credit: Chris Duckett/TechRepublic)

Boot to Gecko

Boot to Gecko: video playback

Boot to Gecko: video playback

ntThis shot shows video playback in the simulator. Performance on the simulator is terrible, but is more than adequate when viewed via a desktop browser — no doubt a result of the processing power available to the different viewing techniques.
nt(Credit: Chris Duckett/TechRepublic)

Boot to Gecko

Boot to Gecko: Facebook

Boot to Gecko: Facebook

ntThanks to running in the Android emulator, Facebook recommends we install the Facebook for Android application — best of luck with that.
nt(Credit: Chris Duckett/TechRepublic)

Boot to Gecko

Boot to Gecko: marketplace

Boot to Gecko: marketplace

ntThe marketplace does not function and merely shows this mock page.
nt(Credit: Chris Duckett/TechRepublic)

Boot to Gecko

Boot to Gecko: music list

Boot to Gecko: music list

nt(Credit: Chris Duckett/TechRepublic)

Boot to Gecko

Boot to Gecko: music playback

Boot to Gecko: music playback

ntThe familiar HTML5 audio controls are present when playing an audio file.
nt(Credit: Chris Duckett/TechRepublic)

Boot to Gecko

Boot to Gecko: Zimbra

Boot to Gecko: Zimbra

ntZimbra is one of the surprising inclusions in the build. Much like the Gmail and Google calendar “applications” available, it links out to the standard mobile web login for the platform.
nt(Credit: Chris Duckett/TechRepublic)

Boot to Gecko

Boot to Gecko: settings list

Boot to Gecko: settings list

nt(Credit: Chris Duckett/TechRepublic)

Boot to Gecko

Boot to Gecko: screen settings

Boot to Gecko: screen settings

ntThe number of options in the settings pages are minimal as the system is still coming together.
nt(Credit: Chris Duckett/TechRepublic)

Boot to Gecko

Boot to Gecko: Cut the Rope

Boot to Gecko: Cut the Rope

ntB2G includes a link to the Microsoft-promoted Cut the Rope. This is a good example of HTML-based gaming.
nt(Credit: Chris Duckett/TechRepublic)

Boot to Gecko

Boot to Gecko: Penguin Pop

Boot to Gecko: Penguin Pop

ntOn the flipside, this decidedly uncrisp game of Penguin Pop provides an example of an HTML-based game with pixellated graphics.
nt(Credit: Chris Duckett/TechRepublic)

Boot to Gecko

Boot to Gecko: landscape

Boot to Gecko: landscape

ntAn example of the work in progress that B2G is, can be found by rotating the home screen in the emulator and having the home screen remain static.
nt(Credit: Chris Duckett/TechRepublic)

Boot to Gecko

Boot to Gecko: clock timer

Boot to Gecko: clock timer

nt(Credit: Chris Duckett/TechRepublic)

  • Open source
  • Account Information

    Share with Your Friends

    Boot to Gecko

    Your email has been sent

Share: Boot to Gecko
Image of Chris Duckett
By Chris Duckett
Some would say that it is a long way from software engineering to journalism, others would correctly argue that it is a mere 10 metres according to the floor plan. During his first five years with CBS Interactive, Chris started his journalistic adven
  • Account Information

    Contact Chris Duckett

    Your message has been sent

  • |
  • See all of Chris's content

TechRepublic Premium

  • TechRepublic Premium

    How to recruit and hire an Operations Research Analyst

    Recruiting an Operations Research Analyst with the right combination of technical expertise and experience will require a comprehensive screening process. This Hiring Kit provides an adjustable framework your business can use to find, recruit and ultimately hire the right person for the job.This hiring kit from TechRepublic Premium includes a job description, sample interview questions ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Quick glossary: Industrial Internet of Things

    The digital transformation required by implementing the industrial Internet of Things (IIoT) is a radical change from business as usual. This quick glossary of 30 terms and concepts relating to IIoT will help you get a handle on what IIoT is and what it can do for your business.. From the glossary’s introduction: While the ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Software Procurement Policy

    Procuring software packages for an organization is a complicated process that involves more than just technological knowledge. There are financial and support aspects to consider, proof of concepts to evaluate and vendor negotiations to handle. Navigating through the details of an RFP alone can be challenging, so use TechRepublic Premium’s Software Procurement Policy to establish ...

    Published:  April 14, 2022, 5:00 PM PDT Modified:  April 16, 2022, 1:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    How to recruit and hire a Security Analyst

    Recruiting a Security Analyst with the right combination of technical expertise and experience will require a comprehensive screening process. This hiring kit from TechRepublic Premium includes a job description, sample interview questions and a basic want ad that you can customize for your business to find, interview, recruit and hire the best candidates for a ...

    Downloads
    Published:  April 14, 2022, 5:00 PM PDT Modified:  April 16, 2022, 2:00 PM PDT Read More See more TechRepublic Premium

Services

  • About Us
  • Membership
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2022 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice