Hacker Newsnew | past | comments | ask | show | jobs | submit | Izkata's commentslogin

Emptying into the dock instead of having to empty the robot's dustbin weekly and almost everything involving mopping in combined units is within that time range. Lidar mapping was also pretty rare a decade ago, Neato was the first and it took a while before others did it too, then there was apps for controlling no-go zones using those maps instead of variations of virtual walls, if they had anything like that at all.

Roomba was living off of name recognition for most of that period and was far behind in adopting any of it.


There are ones that integrate into your furniture, a bit like a dishwasher - plumbing included.

Robot arms are obvious next step. Tidying up kids toys would be god sent, but unless speed improves my kids will DDOS it in seconds.


Roborock has a model with robot arms. Quite pricy at the moment though.

Poor reviews so far. Needs iteration or two to perfect it.

I got roomba with self emptying dock back in 2018 or so (i think the only one who had it before was ecovacs). same model also came with virtual walls.

> It’s really only suitable for lurking

If you're not just lurking, log in and reddit doesn't block you.


> I provided a range of leader:worker income/power ratios from 1:0 to 1:1 with no commentary whatsoever on outcomes

For a slight perspective change, the thing that leads to what they mentioned: They're saying you forgot about the range 1:1 to 0:1.


> They're saying you forgot about the range 1:1 to 0:1.

Color me intrigued! Tell me more about these slave-CEOs serving at the beck and call of empowered workers. I didn't merely forget about the 1:1 to 0:1 range, it's an Outside-Context scenario. I confess I have never encountered - or thought about - organizations with inverted hierarchies. Do you have any specific example of such a thing?


When unions gain too much power and the company can no longer respond effectively to market forces (particularly with hiring/firing), leading to the collective ruin they were talking about.

this doesn't happen because the union is very much interested in keeping the company afloat

It does happen just like bloated management also makes a company less flexible even though managers don't want the company to fail.

They wouldn't intentionally push it to fail, but they could easily push it very close to failing and then something else pushes it over the edge, happens time and time again.


Do you have some recent examples?

I was under the impression that in recent times unions had been mostly disbanded, with any remaining being in government that can't fail like a business can. You might have a fair point that we've started seeing a return of them in the last few years (article being an example of such), but it seems much too soon to see them rise up to have the power spoken of in this thread. That only happens as the union becomes more and more comfortable pushing back.

Am I misinformed — that unions have actually been popular in the private sector over the past long while in order to trigger what you speak of recently?


The union is interested in keeping the union afloat. If the union sees no other opportunity it can become interested in keeping the company float, but you have not made the case for your statement to be a truism.

Consider an actors union — actor unions have famously walked away from companies without much regard for the longevity of the company they walked away from on numerous occasions. They know in that line of work there is always another company looking to hire them, so there isn't a whole lot of incentive to care about individual companies.


Someone read their Ayn Rand...

> I confess I have never encountered - or thought about - organizations with inverted hierarchies

Managers tend to make less than pop stars etc, the range exists. On some engineering teams the non-technical manager makes less than the engineers.

Being a manager doesn't mean you are well paid, he is just a bureaucrat managing the relations to those who want your services.


This is far from the best way to do it, but this is a much easier to understand example of how it could be done without having to read about math:

There's a type of token called a JWT that's really common nowadays, which is composed of 3 parts: Metadata describing encryption for the third part, the actual base64-encoded data, and the encrypted signature. The second part would include "is over 18" and "expiration date" to limit reuse/abuse, and is trivially decoded by anyone to confirm there's no personal information in there.

You'd get this token from your government site and copy/paste it into the site needing verification. The government site would provide a standard public key that can be used with the third part of the JWT to confirm it hasn't been tampered with (verification is built-in to JWT libraries). There would only be one public key that rarely changes, allowing the site to cache it, preventing the government site from correlating users based on timestamps - they never see the JWT from the other site (verification is done locally), and the other site would only need to pull the public key once for however many thousands of people use it.

...that said technical issues aside, I kinda feel like this would be the most acceptable version simply because it doesn't require the average user to trust the math - they could go to a JWT-decoding website and look at it themselves.


How would you prevent the token from being used by a different person than it was issued to? This is the online equivalent of getting your older cousin to buy you alcohol from the store using their own valid ID

How do you prevent your house key being used by a different person, that it was not issued to?

I don’t get the analogy. I keep my house keys out of the hands of people I don’t want in. In this case, the age verification is being circumvented by someone simply asking another person to perform it on their behalf.

I guess the practical answer is that it’s impossible because there’s always the option to have an adult perform the verification and then hand over the device to the minor


Yes, the analogy is the burglar getting into the house by asking you to open your door for them. Adults are permitted to decide such a thing, because they know the risks and are expected to be able to reason about that. When an adult has decided, then there is no problem, as far as age verification is concerned. We have regulations when adults are in fact not able to decide such a thing "correctly".

We already have penalties for adults mistreating children by exposing them to dangerous things, but this is orthogonal to age verification.


Why do you want the online process to be more secure than the one using physical IDs?

Mostly because online process can scale a lot further and faster. An older cousin can only walk into a store to buy so much alcohol but a stolen token can be reused a million times in a second.

> and how hard it is in English to distinguish between "I have zero want for x" and "I have negative want for x"

"I do not want to X"

"I want to not X"

These are both pretty natural English constructions, though the second is usually used as a retort for clarification after saying the first but meaning the second.



SwiftKey has this one where you can erase the wrong word and try to correct it, and it instead adds two words: the one you erased and the second attempt after it.

When I told a co-worker about https://pypi.org/project/voluptuous/ he immediately searched for the name alone, got really wide-eyed and closed the tab, then told us not to do the same.

There was a markdown library called upskirt, the authors were bullied into renaming it. They called it Misaka, because that's an anime character that uses shorts under her skirt.

"Mac OS through email" was what popped into my mind. No idea how that would work.

> For example, I've seen people write code which relies heavily on design patterns but then that same code uses an O(n^2) nested loop to find items that are common between two arrays. There is a simple 'pattern' you can use to store the items of the first array in a Set or HashMap and then finding common items is O(n) because Set and HashMap lookups are O(1)... Very useful pattern but I don't believe it has a name. I use it literally ALL the time. The idea of storing intermediate state in some kind of HashMap is a game-changer IMO but there's no name for that pattern of coding.

This is a "hash join" in relational databases. You can see it in the query planner output of at least postgres.


> The display property should be called display-type.

More importantly to me, "display" has been overloaded with two meanings: Display of the element this rule applies to/how it interacts with surrounding elements (none, block, inline, inline-block) and display of the contents of this element (flex, grid).

Which is why we now also have inline-flex and inline-grid.

Edit: Apparently we can now arbitrarily combine inline/block and flex/grid as two values to "display", no idea when this happened: https://developer.mozilla.org/en-US/docs/Web/CSS/Reference/P...


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: