Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Well, isn't this nice (Score 2) 961

> I'll attribute most of this to personal pain... but seriously, Scott needs to dial it back a notch. When you go into threats of killing someone...

Considering what he probably experienced in the weeks leading up to the blog post, I choose to cut him some slack, and not quote that statement when describing him in the future.

Saunders, on the other hand, was downright petty to "win the debate" with Scott Adams while he was probably working out funeral arrangements. What a @#%@5.

Comment Re:People are bad (Score 4, Informative) 487

Also people don't seek principle sources. An account from the owner of the third Tesla fire incident.

http://www.teslamotors.com/blog/model-s-owner-tennessee (I think this was on slashdot a couple weeks ago...)

"This experience does not in any way make me think that the Tesla Model S is an unsafe car. I would buy another one in a heartbeat."

I expect that the current NHTSA probe is going to end up a huge win for Tesla and Musk.

Comment GNU Toolchain + vi = Sufficient (Score 1) 128

I don't understand the penchant for an IDE. It is just another layer between me and the finished product. I've ran into too many developers that have no idea how to use an actual compiler...it is terrifying!

I recommend building your toolchain from source and setting up a console build environment manually. This is probably the simplest yet most effective tutorial I've seen; coincidently, it also targets the LM3S product line:
http://kunen.org/uC/LM3S1968/part1.html

Getting a board with a good USB->JTAG part will get you a long way. I have a EK-LM3S6965 board with a FT2232 that has been rewired into a dedicated JTAG+UART dongle. That, with OpenOCD and GDB, is much more flexible than any IDE debugger. But you have to read the docs!

Comment Re:Last Sentence (Score 1) 322

It is explained in the ruling, explicitly.

Page 8: "But the following question remains: Is it reasonably clear, in the absence of compelled decryption, that Feldman actually has access to and control over the encrypted storage devices and, therefore, the files contained therein?"

Page 9: "I conclude that Feldman’s act of production, which would necessarily require his using a password of some type to decrypt the storage device, would be tantamount to telling the government something it does not already know with “reasonably particularity”—namely, that Feldman has personal access to and control over the encrypted storage devices."

Paraphrased:
> If the government has reasonable suspicion that illicit media exists, and can verify you have access to that illicit media, it can compel you to retrieve that media.
However,
> If the government has reasonable suspicion that illicit media exists, but can not verify you have access to that illicit media, it can compel you to retrieve that media.

Even if the government could access the media, it would still have to demonstrate that the defendant could also access the media. By accessing the illicit media, the defendent is demonstrating possession of the illicit media. This amounts to self-incrimination, which is protected by the Fifth amendment.

Slashdot Top Deals

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...