Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
Note: You can take 10% off all Slashdot Deals with coupon code "slashdot10off." ×

Comment Re:40 years and I still can't solve it (Score 2) 105

I can solve it, and I can say for sure that if you only rotate one edge piece, the whole puzzle will be unsolvable.

Back in grade school, I used to solve people's cubes for them. When I got to the point where it was solved except for the unsolvable part, it would be obvious what had happened. I would show them where they pieces or stickers had been changed and offer to change it back for them.

Comment Re:You're holding it wrong (Score 1) 238

If it was a we-all-have-iPhones-and-you-are-the-odd-one-out situation, then the texts may be going through, or accompanied by, apple's proprietary text network, similar to the Blackberry messenger system. I seem to remember when I initially set up my jailbroken, unlocked iPhone, it was asking for my iTunes account information and said something about a separate messaging network.

Frequently, the iPhone itself decides how it wants to send your messages. It could well be that the sender's iPhone knows which contacts can receive the apple-enhanced messages. The phone then decides to just send you a regular SMS since you can't receive the apple-enhanced messages. My iPhone is on a text-and-voice plan with no cellular data and I can never tell whether my text is from someone who sent it to multiple recipients.

Comment Re:Regarding the 'too late' part of the equation (Score 1) 184

Hey Mods. It has been awhile since I have been on here because the conversation has been going downhill. This is one example. Your +1 bonus when you have excellent karma should be used only when you have a really excellent point. Otherwise, mod it down! Just my moderation advice. Worth as much as you paid for it.

Comment Re:Government warnings?? (Score 1) 100

In the second paragraph on page 4, Mr. Mandia says that over 90% of the private enterprises don't know their networks have been compromised until they learned from the FBI, DoD, or some other third party (emphasis added). However, in the last paragraph of page 5, he says that over 90% of the breaches his company responds to are first detected by the government.

The "some other third party" phrase seems more realistic to me unless he deals mostly with government agencies themselves.

Image

Man Has Nokia Phone Embedded In False Limb Screenshot-sm 171

judgecorp writes "A British man born with one arm has a Nokia phone dock embedded in his prosthetic limb. Apparently, Apple refused to have an iPhone suitably customized for the job. From the article: 'Mr Prideaux, of Wedmore, Somerset, said: "I think this is the first time this has ever been done in the world - and it is brilliant. I can now take calls and make texts just by using my one hand, while the phone sits inside my arm. The phone slots smoothly and securely within my limb and is easily removable, when required. I think this would help a lot of people with prosthetic arms - especially those who were not born with the disability. People who have had motorbike crashes and soldiers who have lost limbs - they could all benefit from this."'"

The possession of a book becomes a substitute for reading it. -- Anthony Burgess

Working...