Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Repeat after me... (Score 2) 315

He's not splitting hairs...

HTML doesn’t really “do” anything in the sense that a programming language does. HTML contains no programming logic. It doesn’t have common conditional statements such as If/Else. It can’t evaluate expressions or do any math. It doesn’t handle events or carry out tasks. You can’t declare variables and you can’t write functions. It doesn’t modify or manipulate data in any way. HTML can’t take input and produce output. Think of it this way: you can’t compute the sum of 2 + 2 in HTML; that’s not what it’s for. This is because HTML is not a programming language.

Comment Re:So am I. Specifically, violated how? (Score 1) 928

No first amendment rights were violated. But, it appears that extortion may have been committed:

In Colorado: 18-3-207. Criminal extortion – aggravated extortion

(1) A person commits criminal extortion if:

(a) The person, without legal authority and with the intent to induce another person against that other person’s will to perform an act or to refrain from performing a lawful act, makes a substantial threat to confine or restrain, cause economic hardship or bodily injury to, or damage the property or reputation of, the threatened person or another person; and

(b) The person threatens to cause the results described in paragraph (a) of this subsection (1) by:

(I) Performing or causing an unlawful act to be performed; or

(II) Invoking action by a third party, including but not limited to, the state or any of its political subdivisions, whose interests are not substantially related to the interests pursued by the person making the threat.

(1.5) A person commits criminal extortion if the person, with the intent to induce another person against that other person’s will to give the person money or another item of value, threatens to report to law enforcement officials the immigration status of the threatened person or another person.

(2) A person commits aggravated criminal extortion if, in addition to the acts described in subsection (1) of this section, the person threatens to cause the results described in paragraph (a) of subsection (1) of this section by means of chemical, biological, or harmful radioactive agents, weapons, or poison.

(3) For the purposes of this section, “substantial threat” means a threat that is reasonably likely to induce a belief that the threat will be carried out and is one that threatens that significant confinement, restraint, injury, or damage will occur.

(4) Criminal extortion, as described in subsections (1) and (1.5) of this section, is a class 4 felony. Aggravated criminal extortion, as described in subsection (2) of this section, is a class 3 felony.

Comment Re:Fox News? (Score 1) 682

So, unless there is some compelling reason to think that the drive was corrupted purposefully, or the recovery was disingenuous, then all you have here is SOP for any IT department (fix what's broke).

Hmm, all the IT departments I've worked for always had an SOP to fix what's broke, then store the broken hard drive rather than toss it. Sometimes we end up having to send the drives off to a clean-lab recovery outfit to grab important stuff.

Is it necessarily a conspiracy that the IRS IT Department tossed a drive? No. Is it something that at the very list indicates a need for a policy change? Possibly.

Comment Secure against Cylons (Score 2) 142

You'll see things here that look odd, even antiquated to modern eyes, like phones with cords, awkward manual valves, computers that, well, barely deserve the name. It was all designed to operate against an enemy who could infiltrate and disrupt even the most basic computer systems. Galactica is a reminder of a time when we were so frightened by our enemies that we literally looked backward for protection...

Comment Re: Fishy (Score 1) 566

> ... the amount of reputation harm that Microsoft would endure would literally be crippling.

I'm not so sure. After all, Microsoft seems to have survived despite virtually each of its cryptographic solutions having serious vulnerabilities, often breakable in a trivial manner. Kerberos, encryption of Microsoft Office documents, PPTP VPN, NTLM authentication protocol, SysKey, EFS encryption in Windows 2000, RNG implementations in Windows 2000/XP/Vista, and so on...

Comment Re:Most gun ban advocates aren't rational about it (Score 1) 584

I'd like to point out that there are a LOT of unhinged gun control proponents out there as well. Like the guy who suggested dragging Republicans behind a truck until they "see the light on gun control". Or the guy who explicitly threatened to kill recall activists taking signatures in Colorado. It may be less publicized, but it's there: http://twitchy.com/2012/12/16/...

They're armed too. And they have funny ideas about what a right means. And they are also paranoid! Oh and they're pandered to by a major political party.

I won't lump all gun control proponents in with the likes of them. But rest assured, both sides of this fight have unhinged crazies. And they're both just as dangerous...

Comment Re:Gun nuts (Score 1) 1374

The purpose of a handgun magazine capable of holding more than 10 rounds is simple: it allows you to fire more rounds before having to reload. Some would try to say this is more dangerous somehow, but after watching a man fire 12 shots from a 6-shot revolver in about 3 seconds, I have to wonder why...

A military sniper rifle is simply a hunting rifle, just built with better quality control and a camouflage paint job. Seriously: the most popular hunting rifle and the most popular military sniper rifle are both Remington Model 700's...

The purpose of "any military weapon" is impossible to say, seeing as there is such a wide variety. Or are you saying a bayonet and a landmine fulfill the same purpose?

Same with the bombs: flash-bangs and nukes are both technically bombs, with completely different purposes.

"assault grips" is a new one for me, but I guess you're talking about pistol grips and secondary vertical grips. The purpose is simple: to allow an ergonomic hold of the weapon, providing better aiming and control. Same as non-"assault" grips...

Comment Re:Gun nuts (Score 1) 1374

I'm not being purposefully obtuse, I'm trying to illustrate that the only true purpose of a firearm rests with the intent of the user.

The 1911 was designed as a military sidearm. Nowadays, it's rarely used by the military (except some special forces units), but it's the most popular "race gun" (competitive rapid-fire target shooting) at the ranges these days.
The SKS rifle, with it's built-in bayonet, was obviously built with the intention of being a battle rifle. But for the last few decades, it's seen more use as a poor man's deer and hog gun.
The trusty old shotgun was originally meant as a hunting gun, until some WWI soldiers figured out they worked well in trench warfare
Military sniper rifles are literally just hunting rifles, just with tighter quality controls and a camouflage paint job.

You also hold fundamentally conflicting views. You seem to think that a "self defense" gun is reasonable, but a gun designed to "hurt people" isn't. Isn't the whole "hurt people" thing sort of necessary for the "self defense" part?

If some guns and gun equipment are bad because they were supposedly designed to "kill humans", then why do we issue said equipment to law enforcement officers? It's not the police's job to run around killing people, right?

Slashdot Top Deals

"If I do not want others to quote me, I do not speak." -- Phil Wayne

Working...