Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Um... (Score 1) 145

You cherry-picked your quote. When TFS explicitly says "that's not allowed, presumably because Apple doesn't want iOS to serve as a drone controller", I don't think you can really accuse the GP of cherry-picking to make his point.

Oh, yes I can, your forgot to bold the all-important word apparently - which indicates the statement is speculation by the writer of TFS. Apple says you can't have an app that uses GPS to automatically control a real-world aircraft or automobile. I think that GPS and automatically control are the operative words - for liability reasons. The parrot is manually controlled, hence is not a counter-example as professed by the OP.

Comment Re:Um... (Score 1) 145

So Apple really just doesn't want you to use an iPhone as the onboard GPS controlled brain of an autonomous drone, which is a shame, because it would be perfect for that.

Except for the part about liability where someone gets hit by said drone and sues the deep pocket - Apple.

Comment Re:alternative store (Score 2) 145

None of this would be an issue if Apple would allow for alternative stores. Even these could be filtered to some point.

Apple can run their store however they want, but having to jailbreak my phone to install a competitor to iTunes seems like anti competitive behavior.

It's not an issue. Go buy an Android phone or Windows phone.

Comment Re:Similar Apps? (Score 2) 145

Repeated Submission of Similar Apps Submitting several apps that are essentially the same ties up the App Review process and risks the rejection of your apps. Improve your review experience â" and the experience of your future users â" by thoughtfully combining your apps into one.

This would explain why there's 500 flashlight/text-scrolling/mirror apps.

Reading comprehension fail. The rejection reason is a single developer submitting multiple apps that are essentially the same.

Programming

Here's Why Apple Rejected Your iOS App 145

Nerval's Lobster writes Everybody knows that Apple runs a tight ship when it comes to approving iOS apps for its App Store, rejecting software because it features porn, allows gambling, installs types of executable code, etc. But Apple also denies apps for some pretty esoteric reasons, many of which are only just coming to light. Want to have an App that uses GPS to automatically control a real-world aircraft or automobile? Sorry, that's not allowed, presumably because Apple doesn't want iOS to serve as a drone controller. (Imagine the liability issues.) Also, apps that report your location to emergency services are forbidden, as well as any that misspell Apple product names ("iTunz" will never make it through, no matter how much you beg). Even if Apple's not sharing the exact reason why it just rejected your app from its store (what the heck does "Not enough lasting value" mean?), you can check out Apple's own page on the top reasons for iOS app rejections."
Government

Steve Ballmer Gets Billion-Dollar Tax Write-Off For Being Basketball Baron 255

McGruber (1417641) writes "According to a report published by The Financial Times (paywalled), ex-Microsoft CEO Billionaire Steve Ballmer will be able to write off about a billion dollars of his basketball team's purchase price from the taxable income he makes over the next 15 years. "Under an exception in US law, buyers of sports franchises can use an accounting treatment known as goodwill against their other taxable income. This feature is commonly used by tax specialists to structure deals for sports teams. Goodwill is the difference between the purchase price of an asset and the actual cash and other fixed assets belonging to the team."

Comment Re:Some good points about this... (Score 1) 720

At a drive through, being able to fire up an app, hit "send" and have the actual order I want would be nice. I tend not to hit fast foot places, but it would be nice to get something that is somewhat close to what I ordered at the pickup window

You assume that the problem is in the ordering. A lot of fast food places now have a display that shows your order so you can verify it was taken correctly. These robots are not making the sandwiches or stuffing the bags so your food matching what you order will likely not change.

Crime

Tracking a Bitcoin Thief 64

An anonymous reader writes A small group of researchers were able to publish an investigative report on the hacking of a popular Bitcoin exchange earlier this year by the name of CryptoRush.in. Close to a million dollars stolen in crypto currency lead the group to discover evidence, track down the attacker and put together a timeline of what exactly happened. A captivating read for a community desensitized by thefts, hackings and lack of reporting. With pictures, and logs to prove it all.
The Internet

The Inevitable Death of the Internet Troll 571

HughPickens.com writes James Swearingen writes at The Atlantic that the Internet can be a mean, hateful, and frightening place — especially for young women but human behavior and the limits placed on it by both law and society can change. In a Pew Research Center survey of 2,849 Internet users, one out of every four women between 18 years old and 24 years old reports having been stalked or sexually harassed online. "Like banner ads and spam bots, online harassment is still routinely treated as part of the landscape of being online," writes Swearingen adding that "we are in the early days of online harassment being taken as a serious problem, and not simply a quirk of online life." Law professor Danielle Citron draws a parallel between how sexual harassment was treated in the workplace decades ago and our current standard. "Think about in the 1960s and 1970s, what we said to women in the workplace," says Citron. "'This is just flirting.' That a sexually hostile environment was just a perk for men to enjoy, it's just what the environment is like. If you don't like it, leave and get a new job." It took years of activism, court cases, and Title VII protection to change that. "Here we are today, and sexual harassment in the workplace is not normal," said Citron. "Our norms and how we understand it are different now."

According to Swearingen, the likely solution to internet trolls will be a combination of things. The expansion of laws like the one currently on the books in California, which expands what constitutes online harassment, could help put the pressure on harassers. The upcoming Supreme Court case, Elonis v. The United States, looks to test the limits of free speech versus threatening comments on Facebook. "Can a combination of legal action, market pressure, and societal taboo work together to curb harassment?" asks Swearingen. "Too many people do too much online for things to stay the way they are."
Government

Michigan Latest State To Ban Direct Tesla Sales 256

An anonymous reader writes As many expected, Michigan Governor Michigan Governor Rick Snyder signed a bill that bans Tesla Motors from selling cars directly to buyers online in the state. When asked what Tesla's next step will be, Diarmuid O'Connell, vice president of business development, said it was unclear if the company would file a lawsuit. "We do take at their word the representations from the governor that he supports a robust debate in the upcoming session," O'Connell said. "We've entered an era where you can buy products and services with much greater value than a car by going online."
Android

Delivering Malicious Android Apps Hidden In Image Files 113

An anonymous reader writes "Researchers have found a way to deliver a malicious app to Android users by hiding it into what seems to be an encrypted image file, which is then delivered via a legitimate, seemingly innocuous wrapper app. Fortinet malware researcher Axelle Apvrille and reverse engineer Ange Albertini created a custom tool they dubbed AngeCryption, which allows them to encrypt the payload Android application package (APK) and make it look like an image (PNG, JPG) file . They also had to create another APK that carries the "booby-trapped" image file and which can decrypt it to unveil the malicious APK file and install it. A malicious app thusly encrypted is nearly invisible to reverse engineers, and possibly even to AV solutions and Google's Android Bouncer." (Here's the original paper, from researchers Axelle Apvrille and Ange Albertini.)

Slashdot Top Deals

A morsel of genuine history is a thing so rare as to be always valuable. -- Thomas Jefferson

Working...