C/C++ has no module system to speak of. Libraries are packaged in a whole menagerie of ways and shapes, with different build systems and different ways of linking and including various parts of them.
Try building something with SDL on Windows if you want to see this for yourself.
> The battery itself is projected to last about six months without being connected to power.
It seems like a lot of the security of the device depends on active scanning (e.g. the LDS clamshell mesh, the IMU, the temp sensor, etc.), which stops working after 6 months. Is the vector of a malicious actor taking the device and waiting 6 months before breaking in considered not worth protecting against?
The Kademlia/Bittorrent DHT protocol still requires an initial node to bootstrap access the DHT. In Bittorrent, a set of known-good nodes is encoded into the .torrent file (or clients can use previously-discovered nodes they might happen to know about, or router.bittorrent.com as a last-resort fallback).
Designer & author of the JSON OT algorithm that underlies ShareJS/ShareDB here. I do not have a formal proof for any of the properties of the algorithm, but we have extensively fuzzed it and are confident in its correctness. I believe a proof of correctness is possible, merely tedious.
Fantastic essay. Listening in this way is an important part of Nonviolent Communication[1], which I'd highly recommend as further reading if this resonated with you.
I've recently started reading Nonviolent Communication[1]. I am in awe of some of the examples in the book. It must take years of practice to be such an effective communicator.
Noticed that too. Incredibly tone deaf. Kind of like a CEO saying "If I ever had to worry about cleaning my house, I'd choose e-Maids!!"
EDIT: And just to soften/clarify, I think the service sounds like a great idea--there is plenty of room for any attempt to make the horrible hiring process work better.
Just terrible wording on that quote--<head shake>!
update: they arrived