Submission + - SPAM: Symlinks Considered Harmful 1
Why Berkeley invented POSIX symlinks are a *terrible* idea, and should be eliminated.
[spam URL stripped]?...
Link to Original Source
Permits, Drawings, restoration, meeting the requirements for the right-of-way access and dealing with the glacial deposits of rocks etc, trenching can take over a year to return to the original condition, not accounting for the fact that the soil may not settle back the same way if there's any moisture.
I can tell you that boring is the standard by which you optimize many of these items.
Pole attachment costs can be the same or more than underground/boring if you need to upgrade or replace the poles, and it can take up to 180 days to get all the utilities on a pole to relocate, hence why google wanted one-touch make-ready rules to become the norm. They're not wrong, but the issue also is many people are illegally attached to poles, and in some of these rural areas the poles are actually the ORIGINALS from the REA expansion dating prior to the 1940s.
The goals of the county gap project and funding was to provide service to these areas. The problem is the tower may be 2-3 miles away and to hit these speeds, it requires more spectrum than is available, even if you use the RF Elements horn based antennas.
If the farm properties along the way are subdivided they can be connected for much lower cost in the future with this.
Not really, there's a few WISPs in the area already, there are logistical issues when it comes to terrain and tree cover that make it impractical.
Hard to remember things from nearly 30 years ago, but I do apologize for that.
but that fiber run is a much better investment long term, as the max data transmission of the fiber line itself is much higher than the 1gb currently offered, and all that is needed is upgrade it is better fiber transmitters and receivers at each end, as long as the ISP can also handle the increased bandwidth. As the national and global networks improve, so could the existing fiber infrastructure.
There's also this thing known as a "pole denial" - aka no, you can't attach to that pole, which requires then doing something else, either setting your own pole or doing something alternative as a result. Just like mixing technology or environments (eg: Ubuntu vs Debian, or worse a RPM vs DPKG or Windows vs *BSD) having a mix of construction types can make your life more complex. I'm trying to optimize a lot of variables at once.
If this guy is smart, he's putting in conduit underground so that later cable runs are easy, and he can rent space in them.
I'm glad you consider my plan smart.
Check the representations and warranties of the company (Article 4), particularly 4.6(a) and (b), which relate to the accuracy of its financials and SEC filings.
The accuracy of the representations and warranties are incorporated in 7.2(b) as a condition of the sale--so the buyer can use this to opt out.
Twitter has represented the number of bot accounts in its SEC filings (e.g. page 24 of its 2021 annual report).
You asked the right question, essentially, "which position benefits the rank and file users more?" I come to the opposite answer.
Vendor lock-in rarely benefits users. In this case, the creator proposal would allow rank and file users to switch social networks without having to rebuild their network from the ground up. It helps creators, but it also helps users.
I am more skeptical that it is feasible than that it would benefit users.
Unless you've seen the actual contract, I would be hesitant to claim that there is no due diligence provision.
(A due diligence provision is a provision where the purchaser examines the company purchased to see if the purchaser is getting what the seller claims. Determining the number of actual active users and users who are bots would normally be part of due diligence.)
Because due diligence provisions are standard boilerplate and don't get mentioned in news stories about contract terms. But they're omnipresent.
No, you can't downgrade SMB3.1.1 to any lower protocol with a MITM attack. That was one of the fixes in SMB3.1.1.
Google "Pre-authentication integrity in SMB 3.1.1"
SMB3 can't be downgraded or compromised by dictionary attack.
The only thing cheaper than hardware is talk.