Just the accounting you'd need to sell the thing to the government would cost you $100K. Oh, and you'd have to pay yourself or someone else to take part in the bidding process or apply for the granted, and that has to be recouped as part of the sale cost. Er... you were planning on paying yourself for your time, weren't you?
Also, there's a big difference between building a prototype from junk you scrounged and building a reproducible product. When you build a product the second copy should be exactly the same as the first but cost less. Duplicating a one-off prototype exactly usually costs more. Why? Proof of concept prototypes are cheap because you make them with surplus stuff you have lying around or can buy for fractions of a penny on the dollar. You can be opportunistic. The problem is any particular set of opportunities (e..g the $10,000 assembly you picked up at auction for $50) aren't reproducible.
I had a colleague whose first job out of school was writing up a detailed specification for a prototype midget submarine a defense research lab built for the Navy. The Navy was pleased at the low cost and so they wanted to be able to build a second one just like it. Well it turned out that a second one would have cost a hundred times as much they'd have had to pay manufacturers to reverse engineer stuff or start up production lines. It was one of the pointless, futile tasks you dump on newbie engineers before you know you can trust their work.
That's an asinine argument. Other people who should do it don't do it, so I won't do it either.
Wikileaks won't do it because Assange is a chaos-monger posing as a crusader. Wikileaks should do curate its leaks because when you possess information you act responsibly with it, e.g., don't expose people it is about to identity fraud.
The overhead to make a cell phone connection is much higher, and requires a point to point connection, thus the network will fail under that load. SMS or text messages don't require the same direct connection but can be bounced about and their lifespan is much greater, thus they can be made when the cell network is unavailable for normal calls. The downside is that text messages can go stale and the protocol does not include reception acknowledgement. Thus you can send 3 messages and get only part of them or receive them out of order. Hardwired phones that aren't VOIP are on a different system, and Satellite phones are a different animal entirely and very likely to function. Your solution of Ham and Marine radio will be a MUCH more reliable alternative to a cell phone or text in the event of an emergency and are quite forward thinking as a survival tool. The only downside to those are the limited people equipped to receive them. I've a neighbor who has both HAM and marine equipment he uses regularly.
The federal Do Not Call list should be strictly enforced.
Politicians and charities and polling are three exemptions that the politicians wrote into the DNC list. It can be as strictly enforced as you like and you'll still get calls from politicians, charities, and pollsters (even push-pollers.)
Time to close those loopholes.
The actual issue here is just that the ban singled out specific types of robocall instead of blocking them all.
The state law closed the loophole the politicians left in the federal do-not-call system. Yay for the state. Serving the interests of the citizens and not the politicians.
A federal judge has ruled that robocalls made on behalf of political candidates are protected by the First Amendment and cannot be outlawed.
It should be illegal for them to ignore the federal do-not-call list, and for them to call cell phones period. The First Amendment doesn't say I have to provide anyone a platform at my expense or my inconvenience.
The state has failed to prove that the statute at issue advances a compelling state interest
Wouldn't it be novel if a law only had to show that it advances a compelling CITIZEN interest?
GPL and BSD are both free as in speech, but the question is "for who?"
GPL maximizes freedom for the users -- nothing can take away their control over the code running on their computer.
BSD maximizes freedom for developers -- they can do whatever they want with it, including close it up and sell it.
The entire reason for Ubuntu's popularity -- not "some" of the reason, or "most" of the reason, but 100.000000000000000000% of it -- was that it worked well as a desktop by default.
Hey dumbass, maybe it's true that "it's almost never RICO," but the key word is "almost" and this case actually could fit the definition.
From your own goddamn link:
To win, a plaintiff would have to prove (1) conduct, (2) of an enterprise, (3) through a pattern, (4) of racketeering activity called "predicate acts," (5) causing injury to the plaintiffâ(TM)s "business or property."
So there you go: RICO Act violations. QED, asshole!
Only those that are required to by some laws, regulations, or an external body, such as financial or health care institutions. Everybody else cheats on infrastructure and recovery equipment. They figure the odds of 2 or more related apps going down and then combine recovery/fail over systems and equipment into one. The cell phone industry is one of the worst, they barely have enough equipment to handle 50% of their KNOWN customer load and just figure that not everyone is going to try and make a call at the same time. When we were primarily a land line market the governing FCC require them to handle at least 80% before a failure, but as we switched to mobile devices they did away with the requirements for workload almost entirely, arriving at the basic priority restoration system we have now. In the event of a emergency the cell networks are going to fail almost instantly, leaving texting as the only, unreliable alternative.
Care to offer up the advantages/reasons for RequestPolicy Continued rather then RequestPolicy?
RequestPolicy Continued is under active development, while the original RequestPolicy has been abandoned by its author.
Also, RequestPolicy Continued allows you to block or unblock several domains at once without having to exit the menu and reload the page each time.
uMatrix or RequestPolicy Continued let you block all the cross-site requests and whitelist them yourself instead of relying on a possibly-subverted third-party whitelist (like Ghostery or Adblock).
These screamingly hilarious gogs ensure owners of X Ray Gogs to be the life of any party. -- X-Ray Gogs Instructions