Buying a $40,000 vehicle to save on $50 taxi rides doesn't seem to offer a good ROI.
Say you're right, that the self-driving car was $40k. According to Toyota's website, **BASE** price for a Prius is $24k. So, if you were even contemplating a new car purchase, you'd only really have to justify the extra $16k for the self-driving option.
$16k at $50/taxi ride is 320 rides that you'd have to eliminate for the feature to pay for itself. If you only use the self-drive feature when you're going out drinking, and go drinking one night per week, the feature pays for itself in 320 weeks. That's 6.15 years. (6 years, 8 weeks) -- Certainly not an unreasonable expectation of the car's useful lifetime. Last several cars I've had lasted > 10 years before they either died or were replaced for other reasons.
Wouldn't it just point to their mobile phone instead, which is contracted to a real name and credit card / money?
Not directly. And in many cases, not at all.
A smartphone that has been connected to a WiFi network will default to sending ALL internet traffic over WiFi instead of the cellular network. So, it'll be just like your netbook.
So, if the RIAA/MPAA wanted to file a "John Doe" lawsuit based on torrent tracker records, they'd see that the public IP used on the connection was on the network owned by, say, AT&T. They serve AT&T with a subpoena, and find out that, at the time in question, that IP was assigned to "Mom & Pop Coffee Shop".
At this point, they either name the owner of "Mom & Pop Coffee Shop" directy in their lawsuit and call it good, or they contact them and demand records on who that IP was assigned to.... Records which probably don't exist. In which case, they'll probably say "fuck it" and name the coffee shop in the suit anyway.
The larger chains that contract to third-parties to manage their customer-pointing WiFi (like Starbucks) may actually retain those MAC address records (and email addresses, if their capture page collects them)
US law requires that cellphone network carriers accept emergency calls, even from non-active cellphones. So if you turn the thing on and it can see a tower, you can use it to make a 911 call. No account, no contract, no cost.
Some charity organizations, like domestic abuse shelters, are giving out donated inactivated cellphones to people who don't have one of their own so that no matter where they are, if they get into trouble, they can at least dial 911.
A little quality time with your search engine of choice should turn up any number of places that you can take your old phones (preferably WITH chargers) to be donated. Hell, you carrier's local storefront probably has a dropbox. -- Just make sure you ask first whether they donate the working phones or just send the whole shebang out to the scrappers.
Having a built-in recovery routine in the bootloader can at least avoid a nasty trip for repair
The recovery environment doesn't have to be built into the bootloader. You just have to be able to bootstrap it via the bootloader. This is, after all, how Android phones work. (At least, on my HTC EVO)
If you go to the company's website and actually look at the board and the better photos on the starter kit entry, you'll note that the cables are all standard 10-pin ribbons. In other words, the same kind of cables that are used for connecting serial ports to motherboards, but without removing one of the wires from the ribbon.
If something more Arduino-like is what you want, look at their Fez Panda-II. It's $39.95 and has Arduino-compatible headers.
Both boards are built around a 72 MHz ARM7 that just happens to have Microsoft's
Some of us enjoyed our electives and are happy we took them.
An "Elective" is, by definition, not "Compulsory".
"You must take N credits worth of courses from X department/dicipline" qualifies as "Elective". You can pick and choose which specific courses you take.
"You must take the 'Race and Ethnicity' course" leaves you with no choice in the matter.
1. A temporary restraining order and preliminary injunction that prohibits the Defendants (a) from using Coreflood to engage in wire fraud, bank fraud, or unauthorized interception of electronic communications, and (b) from running Coreflood on any computers not owned by the Defendants, by authorizing the operation of a substitute command and control server to give effect to the Court's orders;
2. A permanent injunction that requires the Defendants to uninstall Coreflood on any computers not owned by the Defendants and authorizes the operation of a substitute command and control server to give effect to the Court's orders; and
3. Such other relief as the Court deems just and proper.
So, what they asked for was:
Maybe I'm just waving a tinfoil hat, but would you be surprised if, sometime in the future, it comes out that either
As was pointed out in the comment I originally replied to, if you allow your phone to interact with an Exchange server, you end up giving the Exchange admins the ability to do a LOT of things to your phone without your knowledge.
Including, erasing everything saved on the phone.
I am not willing to give up that level of control.
If I'm on call, or if my employer wants to replace my desk phone with a cellular one to make it easier to reach me, or they want me to be able to read and respond to email from my phone, I'm perfectly happy carrying two phones.
But if I'm on my own time and I'm not on call, the work phone goes on a shelf, and it may or may not get turned off in the process.
Thankfully I do not have to read my company mail on my phone for a living. If I had to, I would have paid for one of those HTCs without giving it a second thought.
If the company you work for requires that you be able to read your email on your cellphone, they damn well be providing you a cellphone to do it with.
Since you didn't include a link to the text of the act in question, here is the text of the Espionage Act of 1917.
Section 1, paragraph (e) pretty clearly applies to the person who leaked all of the documents in question.
Section 1, paragraph (d) MIGHT have applied to Wikileaks... EXCEPT for the fact that they provided the State Department with copies of all of the documents that had been leaked, prior to publication.
What's more, not only are they redacting the documents prior to publication, they're redacting the documents EVEN MORE HEAVILY than the declassified versions being published by the Department of Defense.
So, yeah. Granted, IANAL, but I'd say that doesn't apply.
How can you work when the system's so crowded?