I actually went and tested this because that's probably the only feature I tend to miss from iTunes and/or my iPod (Gen 1 touch).In a test with MP3 files the transition was not gapless, in v1.1.1. Since 1.1.1 isn't the latest version I updated to 1.2.1 and tried again but the results were the same.
... is what I went to after ditching iTunes. In addition to getting the podcast(s) I subscribe to, it plays Grooveshark and Digitally Imported in the same playlists as my local files.
This is essentially my stance as well, except I only ended up creating a gmail account in the first place because you're required to have one for (at the time) Android Market. I'm still running a mail server that I originally set up around 2000. I still have some mail from that far back as well. Although I get a moderate amount of spam the vast majority of it that I get either goes to a known "promiscuous" email address (e.g. git@mydomain) and is funneled to a separate mailbox or doesn't get past the spamassassin that I installed from my distro's package manager. YMMV.
I am in the process of switching to a more robust backend/edge system with postfix, mysql, amavis, dovecot, sieve, and some other bits all managed by modoboa. That project is currently in the prototype stage.
In the article, they describe using a directional antenna to scan an entire neighborhood from one location. In other words, this isn't novel in general as much as it is novel in that it scales to dozens or even hundreds of homes.
What's a Missle?
Same here. I use mine for secondary DNS and an MX backup. I keep mine upgraded to the latest OpenBSD and also have been very happy.
Been there, done that. I had an old system hooked up to the phone line with an FXO card and running asterisk. It had a default-deny policy -- meaning that if there wasn't an explicitly defined route that matched the incoming caller ID info the caller would get a short, snarky recording telling them to get lost and then get disconnected. If you got past that hump, the next step was "to continue in english, press 1". The next hump is a call queue where you'd hear hold music. At that point the phones inside the house would actually start to ring.
It was fun to look through the CDR list at the end of the month and look at all the calls that got dropped due to no Caller ID info. Since then the hard drive died and I've been too lazy to hash out the replacement system.
I thought it was worth noting that it took a former DOJ prosecutor and investor to "bring this guy down", and even then, it was an uphill battle.
FTK Imager from AccessData (download page) is free to download for windows and will carve partitions, files, and even file fragments from disk. It reads NTFS, HFS+, and ext2/3 filesystems. This is the same tool that's used by law enforcement when they image PCs for criminal cases.
I've seen a lot of commentary on the situation, but no real direct answers to the questions posed:
First off, it is important to understand that for the duration of time that you are compelled to attend government schools, you are essentially a slave to society's whim. Technically, activities outside of school fall outside of that school's "jurisdiction", however, this can be worked around by exploiting "loco parentis" or with cooperation from an individual's parents (or the individual if he is of legal age). Cooperation need not be voluntary.
In other words, depending upon the exact situation, the school may not have a legal right to force any type of action, however, they have many tools at their disposal to coerce cooperation. This is how most "they violated my rights" type of issues come up in a school environment.
Second, I think it is well accepted and understood that for the most part, the government has no place telling or commanding anyone to do or not to do any thing. However, once again, the government has tools at their disposal to coerce whatever they desire from whomever they choose.
As far as I'm concerned, discussions about the merits of any disciplinary action are irrelevant and simply distract from the topic at hand.
Usage: fortune -P [-f] -a [xsz] Q: file [rKe9] -v6[+] file1 ...