That is a good point, but I'm not sure how well it would work over standard fractional wavelength radials on larger systems. The Marconi drawing has lighting and static charge protection from the grounded side of the voltage transformer that's being fed from the transmitter. It could be very useful for space conscious form factors, and I don't know anyone that wants a radial and whip system for a cell phone.
From Marconi's drawing, it looks more like use of a coil as either a resonant stub or shorted stub being directly fed to a phasing coil that is being fed from a voltage balun from the tank oscillator. It's a little different than traditional ones since it's wound into a coil, though.
Since shorted stub filters are inductive in nature, they typically broaden the bandwidth of the capacitive mono-pole element. Those are pretty interesting microwave tricks, but winding a stub into a coil may reduce material and size requirements where space is at a premium. It's probably a sacrifice on bandwidth of the system with the tradeoff that the stub would probably contain the RF to the center of the inductor. Maybe there's something more I'm missing here.
Well, beyond the theory, it kinda looks like a curly-que J-pole to me
Indeed, I have many times run a linux router by doing nothing but installing quagga, Net-SNMP, ipt_netflow, and I've got a lower end equivalent to some of the highest end commercial networking equipment.
Both OSPF and BGP provide the tools you need for policy based routing to various degrees, and quagga gives you that. The rest is just icing on the cake.
Ah, script tags... I agree with you completely. Programming languages merely describe a format electronic data format that can be read in by a computer program or piece of hardware affecting the state of the system in some way. They do not necessarily need to contain procedural instructions, and the definition of turing complete simply determines whether that particularly language is description enough to implement general purpose algorithms. Also, a lot of computer security issues come up from these non-TC programming languages being fed into a system and running instructions anyway.
As a theoretical example, someone's web server delivers a malicious image file that crashes the client image codec library and fools it into running code contains elsewhere in the malicious file. Doesn't matter whether that image was designed to contain procedural instructions or not if someone can fool the parser to run those instructions anyway.
The most difficult thing in the world is to know how to do a thing and to watch someone else doing it wrong, without commenting. -- T.H. White