1. A robot telemarketer who denies she is a robot.
"Over the course of the next hour, several TIME reporters called her back, working to uncover the mystery of her bona fides. Her name, she said, was Samantha West, and she was definitely a robot, given the pitch perfect repetition of her answers. Her goal was to ask a series of questions about health coverage—'Are you on Medicare?' etc.—and then transfer the potential customer to a real person, who could close the sale."
2. The Telecrapper 2000 Telemarketer Interception System, a robot for messing with telemarketers.
"The user creates a setup text file (called a "hit list") that declares all of the Caller ID strings (numbers and/or names) he considers "annoying" and wants intercepted on the first ring. When a call on the users "hit list" arrives, the computer intercepts the call and picks up the extension. This feature alone is very valuable. It gives the ability to identify legitimate calls anywhere in the house by simply waiting to hear a second ring.
As if that feature wasn't enough, the TC2K then plays a wave file over the extension for the telemarketer to hear. The user can declare a list of wave files, in a specific order, that he wishes to be played to calls on his "hit list". The first wave file is played immediately after picking up the extension, the TC2K then waits for the telemarketer to respond, then the TC2K waits for silence (for the telemarketer to finish speaking), then plays the next wave file on the list. The cycle of play wave file, wait for response, wait for silence is repeated for each wave file the user has declared in his setup text file. This way the TC2K can carry on a "virtual" conversation with the telemarketer and the content of that conversation is completely up to the user. All the user needs to do is record his own set of wave files to be played and declare them in a setup file."
Bonus: this is the best example.
3. At least one telecom carrier has realized it's subsidizing Apple and Samsung.
"'When you're growing the business initially, you have to do aggressive device subsidies to get people on the network,' he said. 'But as you approach 90 percent penetration, you move into maintenance mode. That means more device upgrades. And the model has to change. You can't afford to subsidize devices like that.'"

4. The Flir Skywatch deployable surveillance tower (which I saw in person in Oakland last night).
"Applications:
- Force Protection/Military
- Border Protection
- Port Security
- Consequence management
- Disaster response
- Crowd management and control
- Flight line protection and surveillance
- Parking lot surveillance and traffic management
- Crowd control
- Emergency response
- VIP/Dignitary protection
- High Level Security Arenas
- Long range surveillance"
5. There are more than 6,000 languages online, but very few are used online.
"Only about 170 languages, or 2 percent, are vital or thriving online. Another 140 (1.7 percent) are borderline cases. The remaining 96 percent (over 6,000) are still or 'digitally dead.'"
