Emptying into the dock instead of having to empty the robot's dustbin weekly and almost everything involving mopping in combined units is within that time range. Lidar mapping was also pretty rare a decade ago, Neato was the first and it took a while before others did it too, then there was apps for controlling no-go zones using those maps instead of variations of virtual walls, if they had anything like that at all.
Roomba was living off of name recognition for most of that period and was far behind in adopting any of it.
> They're saying you forgot about the range 1:1 to 0:1.
Color me intrigued! Tell me more about these slave-CEOs serving at the beck and call of empowered workers. I didn't merely forget about the 1:1 to 0:1 range, it's an Outside-Context scenario. I confess I have never encountered - or thought about - organizations with inverted hierarchies. Do you have any specific example of such a thing?
When unions gain too much power and the company can no longer respond effectively to market forces (particularly with hiring/firing), leading to the collective ruin they were talking about.
It does happen just like bloated management also makes a company less flexible even though managers don't want the company to fail.
They wouldn't intentionally push it to fail, but they could easily push it very close to failing and then something else pushes it over the edge, happens time and time again.
I was under the impression that in recent times unions had been mostly disbanded, with any remaining being in government that can't fail like a business can. You might have a fair point that we've started seeing a return of them in the last few years (article being an example of such), but it seems much too soon to see them rise up to have the power spoken of in this thread. That only happens as the union becomes more and more comfortable pushing back.
Am I misinformed — that unions have actually been popular in the private sector over the past long while in order to trigger what you speak of recently?
The union is interested in keeping the union afloat. If the union sees no other opportunity it can become interested in keeping the company float, but you have not made the case for your statement to be a truism.
Consider an actors union — actor unions have famously walked away from companies without much regard for the longevity of the company they walked away from on numerous occasions. They know in that line of work there is always another company looking to hire them, so there isn't a whole lot of incentive to care about individual companies.
This is far from the best way to do it, but this is a much easier to understand example of how it could be done without having to read about math:
There's a type of token called a JWT that's really common nowadays, which is composed of 3 parts: Metadata describing encryption for the third part, the actual base64-encoded data, and the encrypted signature. The second part would include "is over 18" and "expiration date" to limit reuse/abuse, and is trivially decoded by anyone to confirm there's no personal information in there.
You'd get this token from your government site and copy/paste it into the site needing verification. The government site would provide a standard public key that can be used with the third part of the JWT to confirm it hasn't been tampered with (verification is built-in to JWT libraries). There would only be one public key that rarely changes, allowing the site to cache it, preventing the government site from correlating users based on timestamps - they never see the JWT from the other site (verification is done locally), and the other site would only need to pull the public key once for however many thousands of people use it.
...that said technical issues aside, I kinda feel like this would be the most acceptable version simply because it doesn't require the average user to trust the math - they could go to a JWT-decoding website and look at it themselves.
How would you prevent the token from being used by a different person than it was issued to? This is the online equivalent of getting your older cousin to buy you alcohol from the store using their own valid ID
I don’t get the analogy. I keep my house keys out of the hands of people I don’t want in. In this case, the age verification is being circumvented by someone simply asking another person to perform it on their behalf.
I guess the practical answer is that it’s impossible because there’s always the option to have an adult perform the verification and then hand over the device to the minor
Yes, the analogy is the burglar getting into the house by asking you to open your door for them. Adults are permitted to decide such a thing, because they know the risks and are expected to be able to reason about that. When an adult has decided, then there is no problem, as far as age verification is concerned. We have regulations when adults are in fact not able to decide such a thing "correctly".
We already have penalties for adults mistreating children by exposing them to dangerous things, but this is orthogonal to age verification.
Mostly because online process can scale a lot further and faster. An older cousin can only walk into a store to buy so much alcohol but a stolen token can be reused a million times in a second.
> and how hard it is in English to distinguish between "I have zero want for x" and "I have negative want for x"
"I do not want to X"
"I want to not X"
These are both pretty natural English constructions, though the second is usually used as a retort for clarification after saying the first but meaning the second.
SwiftKey has this one where you can erase the wrong word and try to correct it, and it instead adds two words: the one you erased and the second attempt after it.
When I told a co-worker about https://pypi.org/project/voluptuous/ he immediately searched for the name alone, got really wide-eyed and closed the tab, then told us not to do the same.
There was a markdown library called upskirt, the authors were bullied into renaming it. They called it Misaka, because that's an anime character that uses shorts under her skirt.
> For example, I've seen people write code which relies heavily on design patterns but then that same code uses an O(n^2) nested loop to find items that are common between two arrays. There is a simple 'pattern' you can use to store the items of the first array in a Set or HashMap and then finding common items is O(n) because Set and HashMap lookups are O(1)... Very useful pattern but I don't believe it has a name. I use it literally ALL the time. The idea of storing intermediate state in some kind of HashMap is a game-changer IMO but there's no name for that pattern of coding.
This is a "hash join" in relational databases. You can see it in the query planner output of at least postgres.
> The display property should be called display-type.
More importantly to me, "display" has been overloaded with two meanings: Display of the element this rule applies to/how it interacts with surrounding elements (none, block, inline, inline-block) and display of the contents of this element (flex, grid).
Which is why we now also have inline-flex and inline-grid.
Roomba was living off of name recognition for most of that period and was far behind in adopting any of it.
reply