Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:Bloatware is big business (Score 1) 98

This sounds like, Google not realizing how much saying and power they have.

I haven't heard anything of "Virtual pre-installed apps", but as long as vendors have choice, they will go the old way.
Which Android version has virtual preinstalls?

If forced by Google, Vendors would have choice to comply or fork (but without google services which is still pretty necessary for many non-chinese).
So, that choice would also become choice of customers - either buy android device (from which you can remove bloatware), or something else that is not 100% compatible. I don't see any harm in having more choices, but most vendors would choose to stick with android

Comment Re:At last (Score 1) 185

I still believe those commenters more than any journalist covering topic.

From source publication:

In our chip-to-chip teleportion experiments, the quantum states were transmitted from chip A (transmitter, where the multiphoton states
are created) to chip B (receiver, where the teleported states are reconstructed). The two chips are coherently linked by a single-mode optical
fiber, using the path-polarisation conversion technique. The chip-to-chip experimental details and results are provided in section 4.2

Doesn't sound neither instantaneous, nor communication without connection.

Comment Re:Seems like this drives under-reporting income (Score 1) 187

My first thought, that is basically chicken and egg problem.
It seems they want to start with forcing businesses to accept bank cards, and thus declare income, as there are probably more people receiving some legal income, than businesses operating legally.
Theoretically more and more businesses would be forced to have card readers, thus increasing their legal income, and forcing to pay more in legal salaries.

Comment Re:Arguments for Secure Shell (Score 1) 43

Shell access does come with execution privileges, so basically you are allowing to run untrusted code locally. The first thing about system security is to control code execution. While you can restrict ssh user from code execution, it would be more comfortable for admins to have separate service that only allows tunnel without any code execution.

Slashdot Top Deals

All life evolves by the differential survival of replicating entities. -- Dawkins

Working...