Hacker News new | past | comments | ask | show | jobs | submit | azornathogron's comments login

USB-C can handle 24W on a normal thin cable because the voltage can be ramped up to provide more power at a safe current level. It's high current that makes connectors and cables heat up and creates risks, not high power overall.

Supporting that higher voltage requires hardware support on both ends and also active negotiation on both ends so the devices can agree what voltage to use. (Without that it falls back to the old USB default 5V and a much lower max power)


It's funny because from that diagram I really don't see any particular relationship between the shape and its content. You could draw a regular pyramid with three segments and write the same labels on it and it would make just as much sense to me.

If anything a regular pyramid makes more sense to me: you want the smallest/narrowest useful description at the top and then you gradually expand on it as you go down, providing more (wider) context and detail for the key information.

Edit: Of course, it's a widely used term and good to understand in that context; the Wikipedia link is useful.


I think it's about laying foundations at the beginning, not the length of the text at the beginning. The first sentence/paragraph is the foundation of everything beneath it, whereas the base of a normal pyramid is the foundation of everything above it.


> I really don't see any particular relationship between the shape and its content.

This is often the case with geometric metaphors. They catch on easily, but they rarely make a lot of sense on closer scrutiny.


Yeah, this seems to be true for most pyramid models. It's really annoying when you start to spot it.


> I thought it was demeaning that even what I create in my own private time would be owned and attributed to someone else.

I still feel this way. Well, I don't think I'd use the word demeaning, but I think it's a despicable abuse of the employee/employer power dynamic for my employer to claim ownership on my whole creative output outside of the work I'm actually paid to do.


> Either that or make following robots.txt a legal requirement [...]

A legal requirement in what jurisdiction, and to be enforced how and by whom?

I guess the only feasible legislation here is something where the victim pursues a case with a regulating agency or just through the courts directly. But how does the victim even find the culprit when the origin of the crawling is being deliberately obscured, with traffic coming from a botnet running on exploited consumer devices?


It wouldn't have to go that deep. If we made not following robots.txt illegal in certain jurisdictions, and blocked all IP addresses not from those jurisdictions, then there would presumably have to be an entity in those jurisdictions, such as a VPN provider, an illegal botnet, or a legal botnet, and you pursue legal action with those.

The VPNs and legal botnets would be heavily incentivized to not allow this to happen (and presumably already are doing traffic analysis), and illegal botnets should be shutdown anyway (some grace in the law about being unaware of it happening should of course be afforded, but once you are aware it is your responsibility to prevent your machine from committing crimes).


> illegal botnets should be shutdown anyway

Illegal botnets aren't new. Are they currently shutdown regularly? (I'm actually asking, I don't know)

> If we made not following robots.txt illegal in certain jurisdictions, and blocked all IP addresses not from those jurisdictions

That sounds kinda like the balkanization of the internet. It's not without some cost. I don't mean financially, but in terms of eroding the connectedness that is supposed to be one of the internet's great benefits.


Maybe people need to add deliberate traps on their websites. You could imagine a provider like Cloudflare injecting a randomly generated code phrase into thousands of sites and making sure to attribute it under a strict license, that is invisible so that no human sees it, and changes every few days. Presumably LLMs would learn this phrase and later be able to repeat it - getting a sufficiently high hit rate should be proof that they used illegitimately obtained data. Kinda like back in the old days when map makers included fake towns, rivers and so on in their maps so that if others copied it they could tell


Software running on my machine is not a "service", so it does not need a "Terms of Service".

Firefox Sync needs a ToS. Firefox Relay (the email masking thing) needs a ToS. Firefox web browser does not.


Localhost is an entire /8, so you have a few million possible addresses you can bind to if you want, all on whatever your preferred dev server port is.


There's a well known quote from Fred Brooks too:

""Show me your flowcharts and conceal your tables, and I shall continue to be mystified. Show me your tables, and I won’t usually need your flowcharts; they’ll be obvious.""

(Though from your description I suspect that's also not the one?)


Using concurrent GC has various advantages but in no way makes it deterministic.


True, not by itself.

But concurrent GC is the basis for making deterministic GC, since it gives you the option of scheduling GC work whenever you like rather than pausing the world.

Some concurrent GCs are also deterministic while others aren’t. I’ve written both kinds.


you have some very non-standard definition of determinism.


How so?


The work was done by DeepMind, which is in the UK. Weather in the UK is quite variable and difficult to predict (which is why the English are always talking about it).


English weather depends on wind direction:

  south-west: mild, wet
  north-west: cool, wet
  north-east: cold, dry
  south-east: hot, dry
If you also use a simple barometer, to get pressure level (say, 4 bands) and pressure change direction (rising/falling), you can be 95% accurate.

Final finesse:

  Red sky at night shepherd's delight
  Red sky in the morning shepherd's warning


It doesn't have to be git either - a few version control systems are supported. See https://go.dev/ref/mod#vcs

And it doesn't have to be the direct domain+path of the repository, it can be some URL where you put a metadata file that points to the source repo.


Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: