Forgot your password?
typodupeerror

Comment Re:TypeScript? (Score 4, Informative) 39

That surprised me, too. TypeScript is a very poorly-congealed ("designed" seems a bit strong) language.

Of the two popular scripting languages - python and ruby - python probably makes more sense as you can compile into actual binaries if you want.

For speed and parallel processing, which I'd assume they'd want, they'd be better off with Tcl or Erlang, both of which are much much better suited to this sort of work.

Comment Re:advice to children (Score 0) 193

"Did you really think we want those laws observed? We want them to be broken. You'd better get it straight that it's not a bunch of boy scouts you're up against. We're after power and we mean it. There's no way to rule innocent men. The only power any government has is the power to crack down on criminals. Well, when there aren't enough criminals, one makes them. One declares so many things to be a crime that it becomes impossible for men to live without breaking laws. Who wants a nation of law-abiding citizens? What's there in that for anyone? But just pass the kind of laws that can neither be observed nor enforced or objectively interpreted - and you create a nation of law-breakers - and then you cash in on guilt." -- Ayn Rand, Atlas Shrugged

Comment How is the lack of govt information relevant? (Score 3, Insightful) 82

Assuming it's remotely true (and there's good reason for thinking it isn't), it still means the FBI director was negligent in their choice of personal email provider, that the email provider had incompetent security, and that the government's failure to either have an Internet Czar (the post exists) or to enforce high standards on Internet services are a threat to the security of the nation (since we already know malware can cross airgaps through negligence, the DoD has been hit that way a few times). The FBI director could have copied unknown quantities of malware onto government machines through lax standards, any of which could have delivered classified information over the Internet (we know this because it has also happened to the DoD).

In short, the existence of the hack is a minor concern relative to every single implication that hack has.

Comment Re:Coming soon off the back of this (Score 1) 113

Doesn't have to be a credit card. A class III user digital certificate requires a verification firm be certain of a person's identity through multiple proofs. If an age verification service issued such a certificate, but anonymised the name the certificate was issued to to the user's selected screen name, you now have a digital ID that proves your age and optionally can be used for encryption purposes to ensure your account is only reachable from devices you authorise.

Comment Re:Why? Please, why? There are so many excellent . (Score 1) 136

What "excellent film adaptation" are you talking about? There's one old animated adaptation, and that's is. There's also a movie that bears the same title, but it's apparently a coincidence: nothing except the title and names of some of main characters matches, thus I don't see how it could be relevant to Tolkien's books.

The first thing about adapting a book is reading it at least once, and Peter Jackson skipped that step.

Comment Re:Dumb precedent. Addiction is on the user. (Score 3, Insightful) 113

And those come with warnings, legal penalties on vendors who sell to known addicts or children, legal penalties for abusers, financial penalties to abusers, etc. There are cars which have their own breathalisers.

So, no, society has said that the responsibility is distributed. Which is correct.

Slashdot Top Deals

"Virtual" means never knowing where your next byte is coming from.

Working...