Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Nothing? (Score 1) 429

And to add ...

At the heart of their thinking is Heisenberg's uncertainty principle. This allows a small empty space to come into existence probabilistically due to fluctuations in what physicists call the metastable false vacuum. When this happens, there are two possibilities. If this bubble of space does not expand rapidly, it disappears again almost instantly.

So, along with quantum fluctuations of "nothing", we also have to include time with this explanation. But, according to Einstein time is an integral part of the space-time continuum...you know, that stuff that was created by the big bang...

Note to theorists, the cart goes in the back...

Comment Re:Random observation, on Google vs. Apple payment (Score 1) 265

Not to defend CurrentC (I'm not), but I read that in order to be a part of the MCX consortium a retailer had to sign a three year contract not to use any other mobile pay system. I wouldn't be surprised if this played some part in turning off Apple Pay functionality.

Not to say that would also explain why Google Wallet was accepted up until Apple Pay went live...because it doesn't...

Comment Comet? (Score 1) 84

Yet another possibility is that a comet may have hit the Earth, dumping the extra carbon-14 in the atmosphere. But astronomers have ruled that out on the basis that a comet carrying enough carbon-14 must have been over 100 km in diameter and would surely have left other evidence such as an impact crater.

Not to mention completely obliterating all higher forms of life on the planet, you know, like astronomers...

Comment Assume the worst... (Score 1) 510

...and take the control out of their hands.

It's obvious that no one in power can be trusted to NOT collect as much as they can collect. It doesn't matter whether that is a government or a business. There is only one REAL solution. Encrypt everything. And since one cannot trust proprietary solutions to NOT include a back door into the encryption scheme, the only solution is to use open source software AND for such software to be routinely audited by knowledgeable people. And for all of us to be vigilant concerning other ways to circumvent the encryption.

It seems to me that this is a declaration of an arms race between those in power and the average user. But of course, hasn't it always been that way?

Comment Re:No problems (Score 1) 388

Hmmm. It is actually interesting. Email addresses are unique to the world. No one else can create the same value @ domain unless the domain gets sold to another entity (which has not happened to @gmail.com as far as I know). If you have an email address assigned to you from a reputable source, anyone else who sets up an account with that email is already doing something wrong.

I wonder what the legal implications of this is...

Comment What happened to "networks are overloaded"? (Score 4, Insightful) 229

So, the original reason for data caps were that a few unscrupulous users were hogging all of the bandwidth and making everyone else suffer through a poor network experience...

I guess either that wasn't the real reason or AT&T doesn't mind if you have a poor network experience as long as they get more money...

Slashdot Top Deals

Anyone can make an omelet with eggs. The trick is to make one with none.

Working...