"The requirement on Charter to overbuild competitors will harm consumers in two ways...First, it will harm Charter's customers by preventing Charter from investing its resources most efficiently, such as by upgrading its networks to higher speeds.
Second, it will harm customers of local, small providers when these customers are satisfied with their existing service."
LMFAO. No, we don't actually eat small providers or drive them out of the market like it's our after-school hobby or anything. We wouldn't want that.
Add Philadelphia to the long list of cities that finally admit way too late, when they knew all along (in fact, way before deals were anywhere near done) that Verizon ripped them off on fiber promises and a lot of other stuff.
I saw similar happen with police ostensibly there to... uh, watch?.. an intersection, after the power had gone. Not sure what the plan was there... Or maybe the whole idea was to scare people and then yell at them.
For one, all those sorts of things, like AV scans, that should delay while the system is in use, need a better definition of "in use" and ways to detect that. What some applications and operating systems consider to be "idle" is beyond the pale.
The larger problem here is that the Congressional record should be... a record. Publicly accessible. Just like court records should be. And most other things. One should need FOIA only in more extreme circumstances, where there is some actual argument to be made over what might be private or reasonably classified.
And Ayyadurai's claims about "negligent hiring" basically accuse Biddle of being a drug addict and, potentially, mentally unstable.
This is a perfect example of argumentum ad hominem, for everyone who likes to use the concept incorrectly. Strictly bonus.
In Hindu mythology, isn't Shiva the name of The Destroyer?
Yeah, Vishnu (The Preserver) is more in line with current email retention laws. But Shiva The destroyer is more in line with actual practice.
If this filing isn't simply binned, i hope the case goes a little way toward informing some groups that the guy is full of himself. Not that it would stop some of the crowds, who will claim reality has been manipulated to conspire against someone who is a minority in the States. (Which is frequently true, and it's sad that this idiot is hijacking that for his own self-aggrandizement.)
The problem. Hmmm, not exactly huge, but why should they have special treatment?
Anyone else trying to do the same would be flagged as abusive by servers.
Spook agencies already slurp data their own way. Maybe they should actually be using data gained by their methods rather than every possible convenience of access ever.
You know they are mostly bothering people who don't do anything other than have an opinion, and only certain sorts, at that. They behave like everyone else who is "vigilant" about "terrorism", freaking out over someone doing algebra, but go ahead and publicly demonstrate for white, christian, right-wing insurrection and that is hunky-dory. Gee, make a lifelong career of it. (Whether the run files on them or not, they aren't the ones who mysteriously end up on no-fly lists, etc.)
More broadly, no on - not agencies or marketing arms of companies, properly minimize or anonymize and protect any data. Twitter firehose would be neither, by nature. And a very small percentage of the use of this sort of mass data is anything positive. And it could be. So why give access to such data to such poor stewards.