Those of us that live in northern climates above 600 feet and will see our land values skyrocket.... thank the rest of you.
Uneducated people like you are what cause others to not learn.
I really suggest you buy books and learn, you would be very surprised at how simple modern medicine really is.
I am betting you cant even sew your own stitches.
Leftists harassing cops - fun times. Now that I know this site might as well be Kos, it's time to go forever.
And if he was to prescribe a standard antibiotic, you can buy them yourself at a pet supply.
The same antibiotics used for fish are the same that you are given. Exactly the same, just different labels and no prescription required.
Hospital bills are null and void if they are not easily read and understood by someone with a 10th grade education. If they are unable or unwilling to do a full explanation then the bill is invalid and does not have to be paid and can not be reported to credit reporting or sold to collections.
Maybe that will get the morons running hospitals off their asses.
Ya hey dere, Dem hosers sure like their Hitler policies eh?
Yup, if it wasn't Microsoft, all kinds of other companies could have dominated the desktop market. IBM (OS/2), Quarterdeck (DESQview/X), Apple (Mac OS), NeXT (NeXT), any number of *nix companies (X11), and others.
Microsoft got big because they got the consumers interested, and questionable deals with vendors.
Plenty of people only know the tunnel-vision version of computer history and they believe Microsoft is it. They either don't remember (or are too young to have seen) software boxes (ahh, the good ol' days) had logos to indicate which OS they worked on so you could pick the right one.
Nope, wrote it myself, asshole. But thanks!
Saying "We're sure he had..." without evidence is not evidence. They have to have the evidence that he actually *did* have what is claimed.
That's the hard part. They have to gather the evidence to get the conviction. Without evidence, they can't get a conviction. At least if you have a competent attorney. If you have a crappy one, you'll get the 5 years because they talked you into taking a pre-trial plea agreement. That's how innocent people go to jail.
They already have options that they worked on back in 1993.
putting QWERTY on the screen is stupid, you have to use a different input method, the clock face is the one that makes a lot of sense.
Because making it look for ANY device means I can insert another USB device and then disconnect yours.
Please explain how civil strife in nation-states like Syria where there is little American much like the Secretary of State's influence are Hillary Clinton's fault.
Please explain how you can be so fucking obtuse as to wave away the example of Libya (which she enthusiastically supported) and her vote in favor of the Iraq War AUMF.
On second thought, don't bother. You have nothing interesting to say and are conveniently ignoring the points that don't line up with your world view.
It's only outdated if you don't want a dedicated device for time. Some of us do want or need such a device, preferably one that doesn't need to be recharged every 24 hours, do a bunch of shit we don't care about, and occupy half of our lower arms. A nice looking watch is also a fashion statement; I'm not talking Rolex level (although you can certainly do that), just something that looks halfway decent and goes with most of your wardrobe.
There's still a market for dedicated devices. What does a smartwatch give me? Don't need it for fitness, it will never compete with a decent runner's watch for durability and ease of use. Don't want it for time, my real watch is less cumbersome and has a battery life measured in years. Can't do anything productive (e-mails, shopping lists, etc.) with it that I can't do better with my smartphone. Directions? That might be an argument, but again, how is the watch better than my phone? I've gotten around foreign cities where I don't speak the local language using my phone and Google Maps. Where's the game changer in doing the same with my watch?
Just set up a script on the machine looking for a specific USB device, start shutdown if the device is not present. This is pretty common stuff, hell my old Lenovo laptop has a smartcard slot in it that would do the same thing if the card was removed.
In fact if you look you can find the same thing all over the place for the last decade on many hacking sites, even back in the late 90's this kind of stuff was on the "scene" I had back to back modems in telcom rooms inside boxes that if the box was opened it dumped 110V into the modem logic boards so that when discovered they would self destruct.
Most "hackers" today probably dont even own a buttset.
...and your comment represents the absolutely fundamental misunderstanding that pervades this discussion.
The truth no one wants to hear:
The distinction is no longer the technology or the place, but the person(s) using a capability: the target. In a free society based on the rule of law, it is not the technological capability to do a thing, but the law, that is paramount.
Gone are the days where the US targeted foreign communications on distant shores, or cracked codes used only by our enemies. No one would have questioned the legitimacy of the US and its allies breaking the German or Japanese codes or exploiting enemy communications equipment during WWII. The difference today is that US adversaries -- from terrorists to nation-states -- use many of the same systems, services, networks, operating systems, devices, software, hardware, cloud services, encryption standards, and so on, as Americans and much of the rest of the world. They use iPhones, Windows, Dell servers, Android tablets, Cisco routers, Netgear wireless access points, Twitter, Facebook, WhatsApp, Gmail, and so on.
US adversaries now often use the very same technologies we use. The fact that Americans or others also use them does not suddenly or magically mean that no element of the US Intelligence Community should ever target them. When a terrorist in Somalia is using Hotmail or an iPhone instead of a walkie-talkie, that cannot mean we pack our bags and go home. That means that, within clear and specific legal authorities and duly authorized statutory missions of the Intelligence Community, we aggressively pursue any and all possible avenues, within the law, that allow us to intercept and exploit the communications of foreign intelligence targets.
If they are using hand couriers, we target them. If they are using walkie-talkies, we target them. If they are using their own custom methods for protecting their communications, we target them. If they are using HF radios, VSATs, satellite phones, or smoke signals, we target them. If they are using Gmail, Windows, OS X, Facebook, iPhone, Android, SSL, web forums running on Amazon Web Services, etc., we target them -- within clear and specific legal frameworks that govern the way our intelligence agencies operate, including with regard to US Persons.
That doesn't mean it's always perfect; that doesn't mean things are not up for debate; that doesn't mean everyone will agree with every possible legal interpretation; that doesn't mean that some may not fundamentally disagree with the US approach to, e.g., counterterrorism. But the intelligence agencies do not make the rules, and while they may inform issues, they do not define national policy or priorities.
Without the authorities granted by the FISA Amendments Act of 2008 (FAA), the United States cannot target non-US Persons who are foreign intelligence targets if their communications enters, traverses, or otherwise touches the United States, a system within the United States, or, arguably, a system or network operated by a US corporation (i.e., a US Person) anywhere in the world. FAA in particular is almost exclusively focused on non-US Persons outside the US, who now exist in the same global web of digital communications as innocent Americans.
Without FAA, the very same Constitutional protections and warrant requirements reserved for US Persons would extend to foreign nations and foreign terrorists simply by using US networks and services â" whether intentionally or not. Without FAA, an individualized warrant would be required to collect on a foreign intelligence target using, say, Facebook, Gmail, or Yahoo!, or even exclusively foreign providers if their communications happens to enter the United States, as 70% of international internet traffic does. If you do not think there is a problem with this, there might be an even greater and more basic misunderstanding about how foreign SIGINT and cyber activities fundamentally must work.
If you believe NSA should not have these capabilities, what you are saying is that you do not believe the United States should be able to target foreign intelligence targets outside the United States who, by coincidence or by design, ever utilize or enter US systems and services. If you believe the solution is an individualized warrant every time the US wishes to target a foreign adversary using Gmail, then you are advocating the protection of foreign adversaries with the very same legal protections reserved for US citizens -- while turning foreign SIGINT, which is not and never has been subject to those restrictions, on its head.
These are the facts and realities of the situation. Any government capability is imperfect, and any government capability can be abused. But the United States is the only nation on earth which has jammed intelligence capabilities into as sophisticated and extensive a legal framework as we have. When the intelligence committees of both houses of Congress, multiple executive agencies under two diametrically opposite Presidential administrations, armies of lawyers within offices of general counsel and and inspectors general, and federal judges on the very court whose only purpose is to protect the rights of Americans under the law and the Constitution in the context of foreign intelligence collection are all in agreement, then you have the judgment of every mechanism of our free civil society.
Or we could just keep laying our intelligence sources, methods, techniques, and capabilities bare to our enemies.
âMany forms of Government have been tried and will be tried in this world of sin and woe. No one pretends that democracy is perfect or all-wise. Indeed, it has been said that democracy is the worst form of government except all those other forms that have been tried from time to time." - Winston Churchill (1874-1965), Speech in the House of Commons, November 11, 1947
"The necessity of procuring good Intelligence is apparent and need not be further urged â" all that remains for me to add, is, that you keep the whole matter as secret as possible. For upon Secrecy, Success depends in most Enterprises of the kind, and for want of it, they are generally defeated, however well planned and promising a favourable issue.â â" George Washington, our nation's first spymaster, in a letter to Colonel Elias Dayton, 26 July 1777