Comment Wait... bad summary? (Score 5, Insightful) 209
Isn't the issue over the ANNOTATIONS and not the laws?
What am I missing?
Isn't the issue over the ANNOTATIONS and not the laws?
What am I missing?
Hard to do when the players are the ones that make the rules to start with.
We need to replace the whole team. Scorched earth.
Except they can still do something about it....
Page 5:
"... internet service must be consistent with our acceptable use policies for residential services and network management system"
Pretty much leaves the door open to whatever they want to do about it.
This social media S--T they keep pushing.
These DICE links and plugs that we keep getting from Nerval's Lobster?
C# isn't declining in popularity from where I sit - Slashdot is.
Why do I come here?
Funny? I can't tell.
What I can see is that you came to Slashdot with MAFIAA dribble and your message got lost down in the troll section.
Thanks for playing!
Tracking.
Now they know who you are and where your going.
Every time someone links to Florian god kills a kitten.
Please spare us.....
Florian Mueller is not an expert.
He is a troll, plain and simple.
Burn that name into memory and as soon as you hit that name in any article stop reading it.
That is all I can suggest to avoid permanent brain damage from reading his blathering.
No,... so they could defend themselves.
It's an anti-apple story because they lost?
I guess we should have it one way only: Apple always wins and we all lose?
Meh..... go hang with Florian... your both good at insulting people.
Because it's Florian, and yes - he is a troll.
Only Ice Cream Sandwich is up in the air, not all Android source code.
The title implies that it was all taken down, which is simply not true.
as well as unlimited access to mobile Web, search, email, apps, and more.
You answered your own question...
They are not limiting your ACCESS, just your speed.
I hate these bloodsuckers as much as the next guy but let's keep it honest - even if they don't do the same.
1. 'hacker' writes paid for application, gets said app accepted to the market.
2. 'hacker' then commands his droves of exploited iDevices to purchase said app.
3. 'hacker' profits.
Keep up the good work! But please don't ask me to help.