Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:Boot time? (Score 1) 169

All depends on the apps -- there's buggy apps out there that, even though they work, tend to slow down things over time. We already know that Apple does _not_ vet the code of apps (only how they work upon inspection), so it's not too surprising.

Comment Re:Boot time? (Score 1) 169

That's your own personal experience. I know a few iPhone owners, ones who tinker with their phones (non-jailbraking) as much as I'm guessing an Android owner would, who restart their phones every few days, if not every day.

Comment Re:Boot time? (Score 1) 169

Yes, Android is the same. However, comparing your iPod Touch to an Android phone isn't exactly accurate -- it would be more accurate to compare it to an iPhone, which has restarts that happen far more often than "months apart." It also takes a similiar amount of time to start up.

Comment Re:Use of Caps Lock key (Score 2) 968

"For modern web-based applications, you are correct that there is little or no reason for the Caps Lock key."

Bingo. The Chrome laptop is a specialized piece of hardware for use with web applications -- we won't be using "antiquated legacy systems" on it. If one needs that functionality, don't buy a Chrome laptop.

Comment Re:Not that hard to kill facebook's tracking (Score 1) 273

You'd think that, but with a loose geolocating of your IP address combined with profile information such as the types of fonts you have installed, your user-agent string, screen resolution, etc. (all information transmitted by your browser), they've pretty much got us narrowed down to whatever computer/location we're at, even if you sandbox with another browser.

Comment Re:Hopefully... (Score 1) 229

If I understand it correctly, even if you know the password to access a WPA-encrypted wifi network, you still can't access other people's data -- you have to capture their "handshake" with the router in addition, and that takes a bit of questionable activity. This is different from WEP, where, I'm pretty sure, if you had the password, all accessed computers' data was visible to everyone else.

Now, I could be wrong, so someone with more knowledge about this please speak up!

Slashdot Top Deals

Thus spake the master programmer: "After three days without programming, life becomes meaningless." -- Geoffrey James, "The Tao of Programming"

Working...