Stories
Slash Boxes
Comments

SoylentNews is people

posted by cmn32480 on Saturday July 11 2015, @07:03AM   Printer-friendly
from the i-have-the-power dept.

Man's hierarchy of needs has changed:

A man attending a performance of the Broadway play Hand to God decided that he needed a little more juice on his iPhone—just before the play started. So, because any outlet is fair game when your battery icon is flashing red, he climbed up onto the stage and plugged his phone into a prop wall with a prop outlet and walked away. Of course, the outlet—like the wall—was fake.

According to the New York Post, the crew had to stop the pre-show music and make an announcement to the audience that that sort of thing isn't allowed. One audience member copped to "loudly heckling the idiot" when the ushers removed the phone and asked him to take it back.

After Hurricane Sandy legions of iPhone and other smart phone owners camped out in the Long Island malls, recharging at outlets normally used for floor waxers. What's the most desperate scene of Dying Battery Panic Syndrome you've witnessed?


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by Gravis on Sunday July 12 2015, @12:20AM

    by Gravis (4596) on Sunday July 12 2015, @12:20AM (#208021)

    If it's a GSM phone, it has an embedded JVM with remote installation ability.

    this is incorrect! if it's a GSM phone, your SIM card likely has an embedded processor that can do stuff in cooperation with your cell phone's OS.

    I wasn't able to find out whether the same is true for CDMA.

    this has nothing to do with the protocol itself. it has everything to do with the card and you phone's OS. CDMA networks dont use SIM cards and therefore do not have a secret processor. however, there could be backdoors within the CDMA and GSM protocol but again, it would require your cell phone to cooperate with such a scheme.

    the bottom line here is that you can't trust your cell phone because you dont know what the code it's running actually does. seems like a reason for an open source cell phone that doesn't implement garbage like that.

    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2