Link to Original Source
Slashdot videos: Now with more Slashdot!
We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).
Link to Original Source
or just use 184.108.40.206 and 220.127.116.11.. or 18.104.22.168 and 22.214.171.124.
it's not necessarily the regexp comparisons, but that DOM manipulation is pretty slow in Firefox.
a lot of the time this can point to patent issues
So what you're saying is that the US patent system is anti-competitive and harmful to consumers?
so if you spend millions/billions developing a microchip, then sell a phone that uses it..
you'd be okay if I just opened up the first phone that rolled off the assembly line and duplicated your chip? then started selling clones for a tenth of what you charge?
that's what happens when there's no [reasonable] patent protection for hardware. see: China.
The cheap tablets and handhelds that you can buy everywhere else in the world just aren't in the US. It seems fishy.
a lot of the time this can point to patent issues. there might be chipsets (often the radios or something else fairly narrow) that prevent legitimate US import.
I'm having trouble finding it now, but sometime in the last few years there was a pretty major seizure by Customs in a situation like this. I believe it was related to this, if memory serves.
Why this is being given such legal scrutiny. Its akin to driving down the street with a tape recorder and parabolic mic, recording whatever conversations people might be having as part of a population density study, and accidentally recording someone in their front yard yelling their cc# into the phone. It should fall under general privacy law: if you dont spend the time/energy to setup encryption of some form, dont expect privacy (same as if you dont try to block peeping toms, or if you go sunbathing nude in your front yard next to the street, dont be surprised to find yourself posted to
What if I sniff all the guests' network traffic in a hotel? (via ARP spoofing or otherwise)
There's certainly no warnings presented in any OS when you plug in ethernet and grab an IP, and the average computer user certainly doesn't know that it's possible to do this.. so, how do you feel about that?
When Microsoft's Kin was released a month ago, it came with the usual sequence of tittilating leaks (project Pink), a swell of coverage leading to liveblogging of the release press conference, and an advertising blitz impressive in its scope. Since it's supposed to be a social phone of course it has numerous fansites including Facebook and Twitter. Of course there's a Wikipe
An unmodified, unrestricted Android OS phone would be a selling point in and of itself.
There is, http://en.wikipedia.org/wiki/Android_Dev_Phone - you can buy it directly from Google. Sign up as an Android developer for $25 (one-time fee that gets you access to submit apps for the Market, required to purchase the phone unfortunately). The latest version of the phone is actually just a completely unlocked HTC Magic; it costs $399 from Google (no contract subsidy here obviously.)
If you're interested in a "solution" (only workable to tech savvy folk, really) for from-carrier devices you can pick up any Android device you'd like, root it (attain su via exploits, there are one-click scripts for every popular device) and install whatever OS version you'd like on it. XDA-Developers forum has hundreds of custom Android "ROMs" that have been developed by regular users with no more access than the phone they bought and the Android SDK.
You can install a regular 'vanilla' release of Android OS from source and customize (or not customize) to your heart's content.
maybe a better practice would be to store a thumbnail size image of the screenshot.
They _are_ only storing a thumbnail; the article just sucks.
# ls -l | wc -l
# du -h .
Here, I uploaded the largest one out of the 62 for your review.
It’s not the SD card, and people stating otherwise are lying. That is part of my point.
I really wish you and that commodore64 kid would leave the Slashdot I know and love with your paranoid delusional trolling.
# find . -name *.jpg | grep -v -e customize -e contacts -e wallpaper -e DCIM | more
[snipped for brevity, more of the same follows]
when there's no SD card, the phone might choose to use this embedded storage (or might choose to use it for other reasons).. it's not really the same as the "internal storage" (which is wiped in a factory reset).
this is a simple oversight on the part of HTC and/or the Android team - not making it more obvious, on devices that have eMMC (very few models of which exist yet), that this is another persistent area of storage that needs to be treated like the SD card when it comes to privacy concerns.
there is no conspiracy here, just innocent mistakes in a massive contribution-driven software project.
Why accept the obvious answer when you can assume the paranoid answer?
Wonder what those are used for?
Are they ever read? Sent anywhere? Are they permanent (always taking up space), or are they rotated out?
Is there any particular reason I should care?
They're used to make thumbnails for bookmarked pages (and maybe frequently-visited in some versions, I don't have access to >2.1 now.)
This is exactly like the start page in Chrome, where it shows thumbs of recent pages.. they're at an infinitely small resolution. The entire screen on the EVO is only 480x800px wide, and they cram like a 9-thumb grid in 50% of the screen.
I wish I could downmod this submission.
>>>as you're typing them in, they show each letter for a second or so then it becomes an asterisk
No. They don't.
do you have his phone?
you're climbing up my "most obnoxiously narcissistic posters" list.
every android device i've used has exhibited this password-masking behavior. it's common for mobile devices with low-confidence keyboards.
see your parent post's sig, please.
H&R Block's mainframe system has computed that all of the the offers on Deal or No Deal are bunk, you're always statistically better off sticking with your case through most of the game... but they're still unsure whether you should take Howie's offer to switch your case with the last one left in the hands of the models.
That's interesting to me for a couple reasons.
I loathe that show. I'm not part of the anti-pop-TV brigade, I just find it incredibly boring. I tell my wife it's like watching someone throw dice against the wall for 42 minutes (DVR!), interspersed with crap dialogue.
Having admittedly never thought about the last two cases scenario (the one you started with, and a final model's case). I would have thought that the probability maths behind this would be pretty simple.. do you have a link for that H&R block conclusion? I'd find their reasoning for it being unclear interesting.
My math is as follows.
- You pick one of the  cases at the beginning. Instead of focusing on amounts let's call one a "winning" case (top prize), all the others losers.
- This means you have a 25/26 (P=0.96) chance of selecting a loser.
- If you open the 24 cases on the stage, and one remains in addition to the one you're holding, and you haven't 'cleared' (opened) the winning case.. you're now left with a 1/2 (P=.50) chance at picking the winner.
This is part of the reason the show bores the crap out of me.