it is, but the threshold for mandated debate is high. So high in fact that this doesn't really happen at all. Usually, petitions like this are mostly a PR vehicle. A lot of them is also a bit underspecific in what exactly they are requesting of what political entity.
takedown DCMA requests are US law. Very different rules might apply, much more restrictive/punitive in a lot of countries. Also, you mentioning that it is about different countries is also an odd thing: TV services usually have distribution rights for third-party material only for some countries. And last but not least, "TV channels" in a lot of countries will make broadcasting laws apply. You will need to cover for a lot of legal questions. Maybe you do already, but frankly it does not really sound like it from your answer...
Well it gets weird. Some of the TV channels here are registered here, but they hire lawyers from states to deal with “competitors” outside the country. So i get the odd DCMA request from a US lawyer for a company registered in Albania/Kosovo. I’m not even sure how that works, but I have complied with them.
An MCU is a chip in a package that just cannot interface with anything your consumer PC or notebook comes with. You'll need an adapter in any case.
That said, lots of current MCUs come with UART, I2C and/or USB bootloaders allowing to erase/program (if not disabled). This bootloader is typically included in factory ROM, not to be programmed by you or a third party.
What? Why couldn't an MCU interface with my computer? It's not like it has special electrons or something in it. I regularly program atmega chips with a cable I made that plugs into the parallel port on the back of any computer that has one. If you have a couple GPIO pins on a motherboard, you can probably program almost any MCU with with it.
The only exception is if the motherboard GPIO was say 3.3v and you had a 1.8v only MCU, but level shifters aren't exactly expensive.
I unplug my phone for a moment, or use one of several identical cables I have lying around. If this thing needs a dedicated cable then that seems just as annoying in practice as needing a dedicated "programmer" box.
Sorry, as a commenter on this pointed out, the comment I was replying to was probably talking about eMMC. For which indeed no wear levelling is specified by the JEDEC standard - it is a standard that defines the communication protocol between a device and a host system. Newer JEDEC standards define the interface to access vendor specific "health reports", the actual method of wear levelling isn't regularly disclosed by vendors.
No, it wouldn't. Your examples are mostly hints that it's actually your terminal emulator (which might also serve as your "SSH program" in cases like PuTTY) which might need a slap to behave correctly - and then your TERM environment variable and possibly LANG (UTF-8 support) should be set up correctly. tmux will work then.
A util like I propose would be able to 1) ask what term / ssh you're using, 2) ask you to demonstrate keystrokes and mice and determine if they're working, 3) offer suggestions for how to fix them.
Here in Germany, the last mentioned tier will also have looked fondly upon getting the money wired in from Ireland and may have lived with the assumption that they don't have to think about taxes at all. At least some of the "owners" of those basic, Ikea-equipped flats did not really strike me as being quite up to it. There has also grown a job market for "room service" agencies, cleaning and equipping AirBnB rental objects for many "owners". I've seen their actual check lists (think restroom cleaning checklist) pinned to the object's door.
For me it's just easier to get my head around having a new network interface presented rather than this pile of security associations and transform configurations. I can just re-use my firewalling and routing knowledge and do not have to put my mind into IPsec mode to manage this. That aside, I think it's still quite a lot easier to use IPsec tooling when you want something that plays along with certificate based multi-level trust models.
Can you please elaborate? As far as I see it, IPsec is encrypting traffic. IKE is for setup of security associations. What part of IPsec would do routing, and in this case: potentially multi-hop mesh routing?
Actually they are writing them during that time and use their staff (paid by public money), too. Whether it's copywriting, news checking for the next edition or, in fact, writing passages.