Hacker News new | past | comments | ask | show | jobs | submit login


Does the tube become less transparent because of contaminants? Over what time scale? Is this issue exacerbated before the system is operating at full temperature? Where does the sodium vapor come from? How is it provided to the system? How much is needed?

We're blessed with some kickass investors. They gave us just the right level of scrutiny. We were super clear about why we wanted to do this, we did it, and then they invested more money shortly after the first workloads starting running on metal

If you're looking for great partners, who actually have the gal to back innovation, you'd be hard pressed to do better than Redpoint (Shoutout Erica and Jordan!)


Where do you buy this, direct from Supermicro? Asking as a Dell customer… our servers are $$$

Sadly that's above the pay grade of everyone here only the rich folk that run the world get to see that on all sides :)

One idea would be to completely ignore news outlets and look at raw data imports, exports, official visits to try to identify geopolitical patterns algorithmically has anyone on HN attempted such a thing?


The article hinges on a bad assertion that

> Apple can’t rely on every device possessing enough power to perform inference locally. This means inference will be outsourced to a remote cloud machine.

If you go look at Apple's site https://www.apple.com/apple-intelligence/ and scroll down, you get:

Apple Intelligence is compatible with these devices. iPhone 16 A18 iPhone 16 Plus A18 iPhone 16 Pro Max A18 Pro iPhone 16 Pro A18 Pro iPhone 15 Pro Max A17 Pro iPhone 15 Pro A17 Pro iPad Pro M1 and later iPad Air M1 and later iPad mini A17 Pro MacBook Air M1 and later MacBook Pro M1 and later iMac M1 and later Mac mini M1 and later Mac Studio M1 Max and later Mac Pro M2 Ultra

If you don't have one of those devices, Apple did the obvious thing and disabled features on devices that don't have the hardware to do it.

While Apple has this whole private server architecture, they're not sending iMessages off device for summarization, that's happening on device.


> But maybe it's misconfiguration on side of cloudflare user because I can remember they at least had a WAF product in the past

They still have a WAF product, though I don't think anything in the standard managed ruleset will fire just on quotes, the SQLi and XSS checks are a bit more sophisticated than that.

From personal experience, they will fire a lot if someone uses a WAF-protected CMS to write a post about SQL.


> So, I think whoever came up with this hypothesis needs a refresher course on introductory biology.

If you meant to reply to me, the author of the text I posted has a Ph.D., and specifically focused on marine mammal biology.

But I suppose a refresher couldn't hurt.


Maybe the project wasn't sustainable and the team decided to move on?

It would be so nice if Perplexity gave them a few weeks to pull off what Campsite did and open source everything...


Mostly true but the exception is K-Pop, which as I understand was the creation of a project by the South eKorean government. There was a severe financial crisis in the late 1990s where the country almost went bankrupt. Desperately seeking sources of revenue, the government funded K-Pop groups which eventually become a global phenomenon (BTS et al). At least that is what some Koreans have told me.

It’s a great question. Gorsuch goes onto say

"But before seeking to impose that remedy, the coordinate branches spent years in negotiations with TikTok exploring alternatives and ultimately found them wanting. Ante, at 4. And from what I can glean from the record, that judgment was well founded."

Maybe that was one of the alternatives. I wasn’t on the task force but if I was asked to then I would have went one on one with their tech lead’s and asked them to stop collecting this.

But it seems it is greater than that. How you interact with it, your likes and dislikes can be used as a fingerprint and against you.

This fingerprint can then be used against firesteelrain some time in the prophetic future.

Gorsuch says

“To be sure, assessing exactly what a foreign adversary may do in the future implicates 'delicate' and 'complex' judgments about foreign affairs and requires 'large elements of prophecy.' Chicago & Southern Air Lines, Inc. v. Waterman S. S. Corp., 333 U. S. 103, 111 (1948) (Jackson, J., for the Court). But the record the government has amassed in these cases after years of study supplies compelling reason“

Then he says this.

“ Consider some of the alternatives. Start with our usual and preferred remedy under the First Amendment: more speech. Supra, at 2. However helpful that might be, the record shows that warning users of the risks associated with giving their data to a foreign-adversary-controlled application would do nothing to protect nonusers’ data. 2 App. 659–660; supra, at 3. Forbidding TikTok’s domestic operations from sending sensitive data abroad might seem another option. But even if Congress were to impose serious criminal penalties on domestic TikTok employees who violate a data-sharing ban, the record suggests that would do little to deter the PRC from exploiting TikTok to steal Americans’ data. See 1 App. 214 (noting threats from “malicious code, backdoor vulnerabilities, surreptitious surveillance, and other problematic activities tied to source code development” in the PRC); 2 App. 702 (“[A]gents of the PRC would not fear monetary or criminal penalties in the United States”). The record also indicates that the “size” and “complexity” of TikTok’s “underlying software” may make it impossible for law enforcement to detect violations. Id., at 688–689; see also id., at 662. Even setting all these challenges aside, any new compliance regime could raise separate constitutional concerns—for instance, by requiring the government to surveil Americans’ data to ensure that it isn’t illicitly flowing overseas. Id., at 687 (suggesting that effective enforcement of a data-export ban might involve).”


Pre-planned steps by Planner will go wrong more often than not, as it will try to guess the UI layers from its memory/training data. Its better to just ask the "next step" by giving it current state of the UI.

I have built a similar project for mobile automation [1] and the validator phase is not separate rather it's inherently baked in each step since we only ask next step based on current UI and previous actions.

My Planner sometimes goes "Oh, we are still are home screen, let's find the Uber app icon". This sort of self-correcting behaviour was not programmed but the LLM does it on its own.

1. https://github.com/BandarLabs/ClickClickClick - A framework to automate mobile use via any LLM (local/remote)


Which tools do they use to measure performance?

The intuition I developed over the years says that result is unknown, it's a race condition, all bets are off. Specially since doing N+1.

This is precisely what i'm talking about. A country of 1.4b with a film industry that gets billions in state subsidies and they best they can do is mild popularity of a few films on their physical borders.

Censorship is the enemy of art.


Amazing. Ty.

> Don't we need to have a pretty low opinion of the average american cognitive skill to feel the need to protect them from foreign propaganda for fear it would take a hold on them

that's naive. Literally leaving CNN on in your living room 3 days a week will eventually change you opinions. Our minds absorb things we hear repetitively, even if we now they might be half truths or lies.


>I'm not sure how you arrived at that interpretation of my comment but it does seem to be the one you were trying to goad out of me with your responses so you could reply with this.

What a weird comment. I goaded an interpretation out of you? I was just trying to get at why you seemingly think TikTok is different than any other social network and your response was that "There is an undercurrent of opinion on the platform that happens to align with Chinese worldviews". But I guess the bad faith button has already been pushed so not much point continuing from here.


You aren't familiar with Software Defined Chainsaws (SDC)s? It's all the rage.

I recommend against Rust.


That is true. From section 2.6 of the full-text:

> The sleep disturbances were assessed using the Athens Insomnia Scale [ 19], a self-administered psychometric questionnaire designed to evaluate sleep disorders, particularly insomnia [ 20 ]. It consists of eight items rated on a Likert scale ranging from 0 “no problem at all” to 3 “very severe” [ 20]. The total score ranges from 0 (absence of any sleep-related problems) to 24 (the most severe degree of insomnia). Severity is classified as normal for scores of 3 or less, subclinical insomnia for scores of greater than 3 but less than 6, and clinical insomnia for scores of 6 or more [19,21,22].


Section 230 has nothing to do with ISPs

There is a point where insurance changes from a thing that spreads risk to simply a pre-payment plan for a likely occurrence.

Not ATM. We use it in a lot of our stack, so we will likely pull it in in the future

I suspect it might have something to do with the prevalence of earthquakes, the likelihood of said structures being damaged in earthquakes, and building codes (I've heard) that require re-building on a regular basis.

When you build you civilization on active volcanoes having long-lasting buildings may not be a reasonable assumption.

And, yes!, they have insurance. So if you can insure buildings in volcano country, you can insure anything, anywhere, maybe?


Not saying I don't agree with you but most tech businesses that have their own "Data center" usually have a private cage in a Colo.

> Field order (the number of elements your field can hold). i.e you can store 8 * 9 * 11 elements in the field

I thought a finite field's order has to be a prime power.


Thank you! Anything you think we can do better?

Just published a blog post on this topic. We've been fortunate at SerpApi to avoid too many negative effects of this, but I think other web scraping companies were hit harder.

https://serpapi.com/blog/google-now-requires-javascript/


FWIW, we just pass the costs on from the current cloud providers. Doing this work will let us lower those egress prices!

Some of the core elements of the boot process are not source available, unfortunately.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: