23 posts • joined 17 Jul 2012
TWO-THIRDS not THREE-QUARTERS
If you exclude 4.4 it's three-quarters, but if you correctly exclude both 4.3 & 4.4, it's two-thirds.
Mind you, I'd be interested in whether Google plans to release a browser fix for 2.3 upwards (98.7%) via it's Google Play Services versions-are-irrelevant system updater launched late last year.
Re: Reminds me of something
or older than that, Centurions (power extreme!)
Re: re: Anne-Lise
"If you did use VPN to do all those like you said, you've violated most of those services' T&Cs and could in theory, get yourself banned."
Nothing in the Virgin T&Cs or Acceptable Use and traffic management policies -that I can see- forbidding VPN. You agree that they may shape/throttle traffic, but nothing states you can't use VPN for all your traffic.
Especially good idea to use VPNs the entire time when Virgin openly state in their T&Cs that they read your emails and internet comms:
" h. With your permission, we may monitor email and internet communications, including without limitation, any content or material transmitted over the services.
i. We also reserve the right to monitor and control data volume and/or types of traffic transmitted via the services."
Is it art? is the wrong question
All these definitions and debates are focusing on post-hoc artistic speculation and uniqueness / recreatability tests - that's an is it art question not a who does the picture belong to.
Previously these uniqueness / artness arguments are only really debated in rip-offs, derivative works cases (as in the london buses over westminster).
If copyright is automatic upon creating the image, then the person who can prove earliest provenance, and perhaps access to higher-quality/uncropped originals/raws, or documentary evidence, has the strong case. Simple as.
How copyrighted is CCTV footage?
How copyrighted are (good?) paintings by young children with artist had a low IQ or couldn't appreciate copyright law?
How about famous dead artists who couldn't appreciate copyright law because it didn't exist then?
Doesn't sound as useful as the bidirectional ultrasound handshaking incoming for Chromecast. Still, best to do all the sensors before Apple patent them ;)
With a billion users worldwide, I wonder why they even needed to do deliberate a/b testing for this, wasn't there sufficient data of people having bad news weeks and good news weeks in their usual non-experimented logs?
More likely - 90% of TOR traffic is P2P
That would make more sense.
Apple copying again! - Android's Pry-Fi
Android has had an excellent app by Chainfire for this for some time called Pry-Fi (free & pro).
Disclaimer, no way attached to Chainfire, just an admirer of his utils.
Hope Apple don't posthumously patent
The man who designed the famous Beats by Dre headphones?
Thought we already established that was the guys at Monster
typical response - why would crims want to read my boring emails
This is the most popular response I get from people I know. They don't want scare stories, and can't be bothered with changing passwords for something they don't care enough about.
What we need is more actual anecdotes involving normal boring people ("celebs phone hacking, well they're asking for it, doesn't affect me")
Browser settings: Advanced: Set Search Engine
Browser settings: Advanced: Set Search Engine. Done.
Was that hard?
But saying that, after a factory reset, I do usually have to reverse EVERY SINGLE Google suggested setting though.
i.e. default homepage, remember passwords, remember form data*, form autofill*, user location, do not track
*yes that's 2 settings
They don't phone you, they join databases
Phone numbers are a great join-key for merging massive databases from separate vendors (as are emails). Value's not in the phone number for phoning you, but in the info other companies sell who ALSO have your phone number.
Use Play Store, don't use Unknown Sources
Still lots of fear about this - you don't need to be on Android 4.3 to be safe:
- If you only install from the official Google Play Store, you're fine - Google can scan their store server-side.
- If you don't install any apps, you're fine.
- Stay clear from Allow Install from Unknown Sources, which by default isn't enabled anyway.
- Vulnerability that trojans are installing via is a phone-side weakness, which is only a problem if the app source you're using (pirate app store, spam email or mms containing installer) isn't vetting the apps before they reach your phone.
Re: stuck on Gingerbread are budget 512mb ram and/or 320x240 screens, they just don't have the grunt needed for the newer Android releases.
Lowest spec owned by my family members is a Galaxy Ace 2 and that's on an official Jellybean 4.1.2 now.
My almost 2 year old midrange Galaxy Nexus is running 4.3 like a pro.
Reputable app stores ++
Google Play, Amazon, et al can scan their stores with updated verification.
The flaw is in the phone's cert verification, but Google Play, Amazon etc can update their server-side verification to detect any dodgy packages.
From what I understand of this particular exploit, it's detectable now that it's understood.
Cyanogenmod users will be happy to know it looks like they're busily releasing new CM7 thru CM10's.
Android phones a factor?
Since most Android phones are linked up directly via credit card and account to gmail accounts, might just be a punters being a magnitude more password hygenic (cash and phone pwnership) vs Y! + MSN accounts which often are used just for mail, or even simply low grade instant messenger accounts.
Ubuntu Phone stayed on my Nexus for almost an hour, I wanted to feel it running on my phone even though I was well-aware it was going to be mostly mockup, similar to what was demoed at CES last month.
On a slightly related note, there was a nice analysis and comparison of upcoming phone OS contenders last week, covering the progress, teams, approaches, and industry support and tips for success for Ubuntu Phone, Tizen, Sailfish OS, Firefox OS, BB10
1.8bil for broken software, at least they're being honest
"pose an unacceptable risk to the ability of the UK to safeguard national security" and "disclosure of this could be used to avoid detection".
So that's 1.8 bil on a system that once finished, relies on security through obscurity, and is expected to have known exploits and be possible to avoid.
Thought green-minded data-centers in northern countries only need an extra 1% power for cooling these days? i.e. would only need about 290KW of cooling for 29MW of compute (Yahoo Chicken-coop claimed this percentage with a datacenter they did a couple of years ago in NY IIRC)
Leveson Inquiry is all a bit pointless then
If all the texts count as publication, there's no such thing as phone hacking (text snooping) any more, and all those who had their phones hacked should be jolly well happy with this judge.
OTOH, the press should start doing more phone hacking and exposing now - probably the only thing keeping t.h.e.m. straight, when the laws are so ripe for abuse^M^M^M^M^M^M^M^M^M.
Next up, MS v Samsung?
So will Microsoft now go after Samsung for copying it's Version-numbering-'N'-suffix-method-for-naming-near-identical-products-with-EU-ban-avoiding-modifications? (Windows XP N, 7 N, etc)
Not here yet? Aim for 4K surely
1080p Sounds like by the time it's released, they'll be plenty of people using 4K screens.
"We do not need Samsung's technology which works under a totally different display system."
And how would they know? I rest my case :)
- 'Kim Kardashian snaps naked selfies with a BLACKBERRY'. *Twitterati gasps*
- Crawling from the Wreckage THE DEATH OF ECONOMICS: Aircraft design vs flat-lining financial models
- Pics Facebook's Oculus unveils 360-degree VR head tracking Crescent Bay prototype
- Bargain basement iPhone shoppers BEWARE! eBay exposes users to phishing vuln
- Apple's iPhone 6 first-day sales are MEANINGLESS, mutters analyst