A really nice example. I tracked the data acquisition and fit an ordinary charging curve. For anyone interested, a 25 line script w/ data is here: https://pastebin.com/R0b1XSV0
Some insights:
- The peak DC voltage seems to be around 1.15 kV.
- The time constant is around 440 s. If you were to assume a simple RC-circuit with a constant voltage source (which it probably isnt), you would end at around 100 Ohm for the resistor.
- The start of the charging curve is not at the same time as in the video indicating that some voltage was already present from experiments before the video
Also, I am pretty sure it is not inductive coupling but capacitive because of several reasons:
- It doesn't look like a coax cable but more like an ordinary thick wire.
- I am pretty sure he didn't ground the cable at the far end and thus did not create a loop necessary for induction. And if he were, inductive coupling with ground in between would result in a very large voltage drop
- If it were inductive: A single loop covering that little area would need way more turns than just one.
This seems to have been reverted only moments ago. Perhaps a disgruntled person from HN trying to force learned false history on Wikipedia?
Please watch the video from Technology Connections linked above to understand why a) Phoebus was indeed a cartel but b) which did not have as nefarious purposes as has been later claimed by e.g. populist TV documentaries such as "The Light Bulb Conspiracy".
I believe you that the efficiency argument played a role when they decided to reduce the life expectancy of the light bulbs. The cartel doing 'cartel-things' aside, the 1000h-limit probably was a good decision even though I think that they ultimately did not do it for the consumer.
The citation for that sentence does back up the assertion: there's a quote from someone in the source saying that the cartel didn't meaningfully increase efficiency but did shorten lifespans. Whether you trust a media studies professor who has 'studied the cartel's documents' is another question though.
Hah, this isn't surprising: An internal leaked Google document (https://news.ycombinator.com/item?id=35813322) a couple days ago pretty much pushed the idea. Still interesting to see the action follow so short afterwards.
Three quotes from the document:
- "Owning the Ecosystem: Letting Open Source Work for Us"
- "Google should establish itself a leader in the open source community, taking the lead by cooperating with, rather than ignoring, the broader conversation."
- "Open source alternatives can and will eventually eclipse them [OpenAI] unless they change their stance. In this respect, at least, we can make the first move."
EDIT: Misread "open to use" as "open source" and figured it was behind a signup. Sorry, my fault + maybe wishful thinking.
This seems entirely unrelated to that leaked document?
This has nothing to do with open-source, and Google Bard was announced and released in beta way before that document.
There must be something available in Europe, I remember then-chancellor Rishi Sunak getting some stick for having a £200 heated mug with Bluetooth. Of course, now he's running the place.
There are services in US which will gladly give you an address in US and forward to almost all countries in the world. Search for "us package forwarding"
Whenever I see that C++ added some language extension, I can't help but think about Bjarne Stroustrup's "Remember the Vasa" Paper [1] and wonder if he had meant this type of complexity he warned against...
> Boot chain is typically Firmware → shim → grub ...
Is this really true? Or just when using Red Hat systems? I don't know too much about the boot chain, but I always thought that after the ROM stage, usually GRUB would take over directly from the UEFI.
Shim is there for Secure Boot. Microsoft refused to sign grub (GPL-3), but signed the shim (BSD-2), so shim has its own key store and verifies grub signed by respective distros.
If you don't use Secure Boot, UEFI firmware can boot directly to grub.
You can technically do away with GRUB or similar, too, and have the UEFI boot directly the kernel+initrd image via efistub.
This will, of course, not be signed by MS, so if you use SecureBoot, you need to handle your own signing. Set up is not automatic AFAIK, but once you've created your keys, signed MS's boot key (if you need dual boot), replaced the UEFI's key with yours and set up your package manager to sign every kernel update, everything works well enough. Haven't had a single issue with this in 4 years of running on "enterprise" HP laptops.
When using UEFI secure boot you typically boot into the shim (signed with a certificate OOB-trusted on almost all PCs), which verifies the integrity of grub and then passes on control to that.
Without secure boot, I don’t think there is any need for the shim, but if it’s still used or not in those cases, I do not know.
It is ironic that the very link [1] you provided proves you wrong. The top 5 countries of origin doing IP scanning in the last seven days are China (120k), India (67k), US (52), Iran (44k), and Russia (27k).
I see your point. But then how is the accusation 'west scans internet' connected to 'see this map of countries of origin'? Because I thought he would back up this claim with this source/second paragraph.
If other people (and arguably other govt's) are scanning too, then saying 'west scans internet' seems somewhat superficial. Not that I deny western state actors scanning the internet, its just that everybody does it.
Meh, the context was a western gov scanning the internet.
We tend to hold them to a higher standard than the ones who much more shamelessly operate pseudo-blackhat hacking teams. The west at least tries to maintain a sheen of legality. Or morality. Or whatever.
Do you think the Chinese government tells their citizens that they are shamelessly "operating pseudo-blackhat hacking teams"? No, of course not, just like yout Government doesn't tell you that either. The only reason you think the West is the only trying to maintain "a sheen of legality" is that their voice is the only one you're listening to.
Uhh I don't live in a country with a great firewall. The intel agencies get criticized very heavily in my information bubble. The shady stuff the NSA does is pretty well known. It's in movies all the time too, so I'm sure the mainstream even understands that.
And yet despite all the messed up stuff they do every day they still get held to a higher standard.
The accusation was never made that the west scans the internet. "organizations that scan the entire internet and feed the data to western governments." As an analogy, the west buys iPhones, but it doesn't necessarily manufacture them.
Right, also the source IP of a port scan doesn't say anything about who has initiated that scan. If I were a state actor, I'd do my port scanning from machines in a different jurisdiction for sure.
No, you can't. They have a long, well-established history of concealing their undercover agents. The fact that this is not perfect doesn't mean that they don't make the effort, or that you're doing anything other than fooling yourself if you think that all traffic by a national intelligence agency comes from the netblocks assigned to those countries.
Yeah, could be. But still that does not support the argument of "feed the data to western governments".
When you say: "Look, the people from village A north are stealing apples from the city orchard. Here is a list of apple thieves and the direction (N,E,S,W) from which they came." And this list shows that it appears to be majorly the directions E,S,W (so not directly from village A). Then how is this an argument?
It just shows that everybody steals apples, making the accusation "villagers of A are to blame" superficial. That's the point it tried to make.
> But there are also other reasons your conclusion is wrong I think
I would be interested on why my conclusion is wrong. At best, one could draw nothing from the data as it does not show any relation to state actors. And if this conclusion is drawn, then why did `mike_d` blame the western state actors in the first place?
Think for a second about this: Did you think that the link `mike_d` provided supported the argument "... feed the data to western governments" with the emphasis on 'western'?
I think the solely reason why JPEG XL did not go off is simple: It had no lobby. No large tech company actively promotes it and so, many people hadn't heard of it. Ironically, the deprecation of it in chrome made me aware of it in the first place.
Technically, JPEG XL may be a superior contestant. But from a 'social' point of view? Disastrous, especially considering it already has "JPEG" in it. (To be fair, its also quite young...)
I really hope JPEG XL gets more traction because it seems like a really good successor to the old namesake.
Personally, the name always turned me off. I saw the option in photoshop when saving files, but my thinking went "jpg bad, jpg XL is a weird name, must be a minor incremental improvement over jpg".
I don't particularly like the name either, but it already had a name before it existed — that's the way JPEG works, the ones who write the Call for Proposals give it a name, not the ones who actually bring the proposals and design the new codec.
Anyway, I think "jxl" will in practice be the more common way to refer to JPEG XL images, and the full name will at some point become a matter of etymology and trivia questions.
Now imagine that you saw a presentation couple years back with all the nice features that smart people packed in… and here is what it came to, parlor games basically.
Maybe a nimbler PR approach would help, but then we know that standards like websql are shutdown over nothing, even though sqlite eating the world alive…
> That leads us to the end of Hans Niemann’s foray into cycling – his dalliance with the sport that is mostly remarkable for how unremarkable it is. And that’s fine. Kids start riding, and kids stop. Kids win races and kids don’t. Kids come up with brash stories on the playground. Sometimes kids are told they’re special at something, and some of them probably internalise it and let the lines between truth and fiction blur.
Actually that para jumped out at me too. But more for style. As a kid and late into my adult hood I really sucked at writing. The kind of suckiness where you are deluded about your prowess based on length of prose!
Then I found Roy Peter Clark's Writing Tools book. Full of snack sized tips that can be used independently. Heavy curtains lifted for me. I felt regret shame and optimism all at the same time.
Reason I bring this up is one technique that got stamped in my mind was variation in sentence length to build suspense and action. This article (this para in particular) to me seemed like a masterclass in that!
Iain Treloar, the author of this story, is a fantastic journalist and writer. If you're interested in reading more of his work, I recommend the following:
Yeah, it's quite a well written paragraph in terms of style. Really good story-telling. And it starts so innocent as well, building up something rather mundane with trivial short and repeating sentences. And then, bang, hints at an explanation of Niemanns behaviour with that of a spoilt brat.
Some insights:
- The peak DC voltage seems to be around 1.15 kV.
- The time constant is around 440 s. If you were to assume a simple RC-circuit with a constant voltage source (which it probably isnt), you would end at around 100 Ohm for the resistor.
- The start of the charging curve is not at the same time as in the video indicating that some voltage was already present from experiments before the video
Also, I am pretty sure it is not inductive coupling but capacitive because of several reasons:
- It doesn't look like a coax cable but more like an ordinary thick wire.
- I am pretty sure he didn't ground the cable at the far end and thus did not create a loop necessary for induction. And if he were, inductive coupling with ground in between would result in a very large voltage drop - If it were inductive: A single loop covering that little area would need way more turns than just one.