PSE TAC-15, Tactical Assault Crossbow


TAC-15 ‘Tactical Assault Crossbow’, the sort of crossbow designed for when aliens invade from another dimension. It actually replaces the upper receiver from an AR-15 so you can swap between assault rifle and crossbow with a little tinkering. The payoff is at the end when they sell you that it comes with a picatinny rail system. For, you know, when you need a grenade launcher on your crossbow.

via PSE TAC-15, Tactical Assault Crossbow – Boing Boing Gadgets.

Wait – a Tactical Assault Crossbow?

Tactical. Assault. Crossbow. Oh man – I’m so there!!

DearCupertino: Wanna buy me?

So, if you’d like to buy it (Blog, Domain, Concept), it is for sale. I’d like to see it bought by someone like Engadget or Gizmodo, so they could turn the blog into what it should be. The blog has several hundred regular readers and even more RSS subscribers.

via DearCupertino: Wanna buy me?.

It’ll be sad to see Dear Cupertino go, but hey – it’s been a blast.

Unbelievable Things That Are Actually Real

Everything Pizza

The “Everything We Could Find” Pizza

This seems to be a Photoshop with some Japanese text thrown on, to mock a culture whose major export seems to be insanity. But the product is real and oh by the way, it’s from Pizza Hut.

It’s the Double Roll Pizza and comes with a pigs-in-blankets crust. The only thing it’s missing is some pork rinds. Maybe sprinkle some tiny cans of beer on there.

via Unbelievable things but they are real! | Crack Two.

The Bertone Mantide

Bertone Mantide

The Bertone Mantide, what Kaneda would drive – Boing Boing Gadgets.

Concept car or not – that’s hot, and I. Want. One.

English Russia » Connected


That’s the way to stay connected even when you stuck in the traffic jam in Moscow downtown. There is always some free wifi network around, just, for better coverage, you gotta leave your car a while.

via English Russia » Connected.

A Fun Fact!

Fun fact: in the old days of Macs, when the faster 68020 processor came on the market, it was put in the new Mac II. When the the 68030 processor was later introduced, Apple dictated that an “X” be added to the end of the model number. So the Mac II became the 68030 Mac IIx. Well, that naming scheme worked fine until Apple decided to upgrade the SE to a 68030. I guess Apple didn’t want to try and explain the Macintosh SEx.

via weaselsnake: The Mac SE/30: Adored by Spies and Psychopathic Geniuses Alike!.

How To Nail An Interview

What is it that certain people say or do during a job interview that makes them stand out? Why do some people struggle to find work, while others land a job in no time? I wanted to know, and the only way to find out was to experience the interview from the other side of the table. If I could be the one asking the interview questions, not answering, I could see first hand what made candidates stand out. I could then take that knowledge and cater my behavior in any future interview to give myself the best chance of getting hired.

via How To Nail An Interview.

Windows 2000 Source Code

Several days ago, two files containing Microsoft source code began circulating on the Internet. One contains a majority of the NT4 source code: this is not discussed here. The other contains a fraction of the Windows 2000 source code, reportedly about 15% of the total. This includes some networking code including winsock and inet; as well as some shell code. Some other familiar items include the event log, and some of the default screensavers.

There has been some speculation that while the bulk of the source is genuine, some of the comments have been tampered with to embarrass Microsoft. This is difficult to disprove, but I find it implausible. The embarrassing comments occur on thousands of lines, in realistic places. Furthermore, if someone had done that, it would have been easy to make the comments far more incriminating.

In the struggle to meet deadlines, I think pretty much all programmers have put in comments they might later regret, including swearwords and acerbic comments about other code or requirements. Also, any conscientious coder will put in prominent comments warning others about the trickier parts of the code. Comments like “UGLY TERRIBLE HACK” tend to indicate good code rather than bad: in bad code ugly terrible hacks are considered par for the course. It would therefore be both hypocritical and meaningless to go through the comments looking for embarrassments. But also fun, so let’s go.

via We Are Morons: a quick look at the Win2k source ||