Comment Re:Don't expect the cop to know how much was stole (Score 2) 1010
The judgement of the responding officer was to file a report. Sensible enough. The arrest happened a week later.
RTFA. This opinion is not applicable.
The judgement of the responding officer was to file a report. Sensible enough. The arrest happened a week later.
RTFA. This opinion is not applicable.
Also, "I win this debate" while the opponent is in mourning. Classy.
> I'll attribute most of this to personal pain... but seriously, Scott needs to dial it back a notch. When you go into threats of killing someone...
Considering what he probably experienced in the weeks leading up to the blog post, I choose to cut him some slack, and not quote that statement when describing him in the future.
Saunders, on the other hand, was downright petty to "win the debate" with Scott Adams while he was probably working out funeral arrangements. What a @#%@5.
Also people don't seek principle sources. An account from the owner of the third Tesla fire incident.
http://www.teslamotors.com/blog/model-s-owner-tennessee (I think this was on slashdot a couple weeks ago...)
"This experience does not in any way make me think that the Tesla Model S is an unsafe car. I would buy another one in a heartbeat."
I expect that the current NHTSA probe is going to end up a huge win for Tesla and Musk.
[aol.com] Sounds like a phishing scam.
People keep building banks, and other people keep robbing them. So yes, recurring problem.
For those curious, there are currently 12 million bitcoin in existence, with a net value of about $4.3 billion.
Source: http://coinmarketcap.com/
Our Nook Tablet ran the stock software for nearly a year. It was terrible. I finally gave up on them rolling out a decent update and installed Cyanogenmod back in December.
It is an excellent bit of hardware, but management got in the way of the software. Too little to late; good bye Barnes and Noble
The GNU toolchain does not support most microcontrollers.
This is only true if you don't know what a linker script is.
If you write your own ldscript, the GNU toolchain supports just about every microcontroller on the market.
I don't understand the penchant for an IDE. It is just another layer between me and the finished product. I've ran into too many developers that have no idea how to use an actual compiler...it is terrifying!
I recommend building your toolchain from source and setting up a console build environment manually. This is probably the simplest yet most effective tutorial I've seen; coincidently, it also targets the LM3S product line:
http://kunen.org/uC/LM3S1968/part1.html
Getting a board with a good USB->JTAG part will get you a long way. I have a EK-LM3S6965 board with a FT2232 that has been rewired into a dedicated JTAG+UART dongle. That, with OpenOCD and GDB, is much more flexible than any IDE debugger. But you have to read the docs!
Bleh, the second paraphrase should read:
> If the government has reasonable suspicion that illicit media exists, but can not verify you have access to that illicit media, it can not compel you to retrieve that media.
Incorrect. The government knows that the specified files are (or were) on the storage device at some point. What it lacks is evidence that the defendant is capable of accessing that storage.
It is explained in the ruling, explicitly.
Page 8: "But the following question remains: Is it reasonably clear, in the absence of compelled decryption, that Feldman actually has access to and control over the encrypted storage devices and, therefore, the files contained therein?"
Page 9: "I conclude that Feldman’s act of production, which would necessarily require his using a password of some type to decrypt the storage device, would be tantamount to telling the government something it does not already know with “reasonably particularity”—namely, that Feldman has personal access to and control over the encrypted storage devices."
Paraphrased:
> If the government has reasonable suspicion that illicit media exists, and can verify you have access to that illicit media, it can compel you to retrieve that media.
However,
> If the government has reasonable suspicion that illicit media exists, but can not verify you have access to that illicit media, it can compel you to retrieve that media.
Even if the government could access the media, it would still have to demonstrate that the defendant could also access the media. By accessing the illicit media, the defendent is demonstrating possession of the illicit media. This amounts to self-incrimination, which is protected by the Fifth amendment.
The FAA does not do anything important. I don't even know why that agency exists.
He has not acquired a fortune; the fortune has acquired him. -- Bion