id
int64 2
42.1M
| by
large_stringlengths 2
15
⌀ | time
timestamp[us] | title
large_stringlengths 0
198
⌀ | text
large_stringlengths 0
27.4k
⌀ | url
large_stringlengths 0
6.6k
⌀ | score
int64 -1
6.02k
⌀ | descendants
int64 -1
7.29k
⌀ | kids
large list | deleted
large list | dead
bool 1
class | scraping_error
large_stringclasses 25
values | scraped_title
large_stringlengths 1
59.3k
⌀ | scraped_published_at
large_stringlengths 4
66
⌀ | scraped_byline
large_stringlengths 1
757
⌀ | scraped_body
large_stringlengths 1
50k
⌀ | scraped_at
timestamp[us] | scraped_language
large_stringclasses 58
values | split
large_stringclasses 1
value |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
42,045,538 | bookofjoe | 2024-11-04T20:09:10 | How the occult gave birth to science | null | https://nautil.us/how-the-occult-gave-birth-to-science-1041122/ | 3 | 0 | null | null | null | no_error | How the Occult Gave Birth to Science | 2024-10-30T22:27:38+00:00 | Dale Markowitz |
In 1936, the economist John Maynard Keynes purchased a trove of Isaac Newton’s unpublished notes. These included more than 100,000 words on the great physicist’s secret alchemical experiments. Keynes, shocked and awed, dubbed them “wholly magical and wholly devoid of scientific value.” This unexpected discovery, paired with things like Newton’s obsession with searching for encrypted messages in the Bible’s Book of David, showed that Newton “was not the first of the age of reason,” Keynes concluded. “He was the last of the magicians.”
When it came to fascination with the occult, Newton was hardly alone. Many contemporary scientists may cast aspersions on spells, mythical tales, and powers of divination. Not so for many of the early modern thinkers who laid the foundations of modern science. To them, the world teemed with the uncanny: witches, unicorns, mermaids, stars that foretold the future, base metals that could be coaxed into gold or distilled into elixirs of eternal life. These fantastical beliefs were shared by the illiterate and educated elite alike—including many of the forebears of contemporary science, including chemist Robert Boyle, who gave us modern chemistry and Boyle’s law, and biologist Carl Linnaeus, who developed the taxonomic system by which scientists classify species today. Rather than stifling discovery, their now-arcane beliefs may have helped drive them and other scientists to endure hot smoky days in the bowels of alchemical laboratories or long frigid nights on the balconies of astronomical towers.Carl Linnaeus urged the Royal Swedish Academy of Sciences to launch a hunt for mermaids.
ADVERTISEMENT
Nautilus Members enjoy an ad-free experience.
Log in
or
Join now
.
To understand the role of magic in spurring scientific progress, it helps to understand the state of learning in Europe in those times. Throughout the Middle Ages, many scholars were fixated on the idea that knowledge could only be gleaned from ancient texts. Universities taught from incomplete, often poorly translated copies of Aristotle, Ptolemy, and Galen. To stray from the giants was a crime: In 14th-century Oxford, scholars could be charged 5 shillings for contradicting Aristotle. Curiosity was considered a sin on par with lust. A powerful motivator was needed to shuck off ancient thinking.One of the first influential thinkers to break with the old ways was the 16th-century Swiss-German physician Paracelsus. The father of toxicology, known for his pioneering use of chemicals in medicine, Paracelsus was among the first of his time to champion the importance of experimentation and observation—a philosophy which would set the foundations for the scientific method. Paracelsus showed the scholars what he thought of their old books by publicly burning his copies of Galen and Avicenna. But what led him to this experiment-first approach? Perhaps it was because, to Paracelsus, experimentation was a kind of magic. His writing fuses scientific observation with the occult. To him, medicine, astrology, and alchemy were inextricably linked—different ways of unveiling sacred truths hidden in nature by God. Paracelsus considered himself a kind of magus, as he believed Moses and Solomon had been, as Newton would view himself 150 years later. Paracelsus believed, though, that divine knowledge could be gained not just by studying scripture, but also by studying nature. The alchemical workbench, the night sky—these were even surer routes to God than any dusty old textbook.SOME KIND OF MAGIC: Paracelsus believed that divine knowledge could be gained from the study of nature. Experimentation seemed, to him, to be a kind of magic, which could reveal the secrets of the world. Credit: German Vizulis / Shutterstock
ADVERTISEMENT
Nautilus Members enjoy an ad-free experience.
Log in
or
Join now
.
Paracelsus’ quasi-scientific, quasi-magical worldview would profoundly influence scientists for centuries to follow. As historian Violet Moller puts it in her new book Inside the Stargazer’s Palace, “To our rational, orderly, 21st-century minds the 16th-century map of knowledge appears messy, a paradoxical and confusing place where magic was studied alongside geometry, people searched obsessively for the philosopher’s stone and astrology was fundamental to many areas of life.” But in this mixed-up cauldron of magic and nature, real science was forged.Take the astronomer and Danish nobleman Tycho Brahe. When he lost his nose (and almost his life) in a duel, he became fascinated by Paracelsian medicine and astrology. At the time, scholars were encouraged to study stars’ positions not by gazing skyward, but by looking them up in books called ephemerides. But Brahe, who had about as much regard for established scientific norms as Paracelsus, realized these tables were inaccurate. He devoted his life to recording what would become one of the most accurate and comprehensive star catalogs of his time in Europe, developing new observation techniques and instruments along the way—including the sextant, used to measure celestial altitudes and angular distances.Like Paracelsus, Brahe was motivated by a belief that studying the cosmos could bring him closer to God. He was an avid believer in astrology and alchemy. In his book De Nova Stella, Brahe recorded his observations of the supernovae that would make him famous—not just the star’s positions and attributes, but also the tumult and misfortune he believed the new star portended. Five years later, he observed a comet so disturbing that it prompted him to send a secret report to the king and queen of Denmark, warning, “the eternal Sabbath of all creatures is at hand.”The king and queen took the astrological predictions seriously, as did many rulers of their time, who couldn’t resist the alluring idea of the wisdom provided by astrological prognostications, funding their empires with gold coaxed from mercury, or the promise of eternal life from the philosopher’s stone. So in an age before research institutes and N.S.F. grants, science was funded by rich patrons. Astrologers and alchemists were a fixture of early modern courts.
ADVERTISEMENT
Nautilus Members enjoy an ad-free experience.
Log in
or
Join now
.
Perhaps the most generous science patron of all time was Holy Roman Emperor Rudolf II. At his palace in Prague starting in the 1570s, Rudolf employed mathematicians, astrologers, instrument makers, and as many as 200 alchemists. He neglected his political duties in favor of spending time at his own alchemical bench or with the natural philosophers in his employ. The workshops in his palace were the best around. His “cabinet of curiosities” contained rare objects from the new world, including a “unicorn horn” (later revealed to be a narwhal tusk), that scientists were allowed to study. He was patron to Brahe and German astronomer and mathematician Johannes Kepler, showering them with wealth and resources, keeping them close to cast horoscopes right up until his death in 1612. In 14th-century Oxford, scholars could be charged 5 shillings for contradicting Aristotle.These investments, regardless of the occult motivations of those who contributed them, resulted in real scientific progress: Alchemy led to an interest in mining and the study of minerals, improvements in the distillation process, the design of furnaces, ventilation systems, and glass and ceramic making techniques. Interest in astrology led to better lenses, mirrors, astronomical equipment, and even clocks, which were used to time the movement of stars.Even well into the 17th century, as recognizable scientific institutions like the Royal Society sprang into existence, the supernatural held scientists in its thrall. Its president, Newton, practiced alchemy and deciphered biblical prophecy. Respected member and natural scientist Sir Kenelm Digby believed in “weapon salve”—a medical treatment that cured wounds when applied not to the wound itself, but to the weapon that had created it. Robert Boyle spent a good deal of time investigating second sight, the uncanny ability of some Scottish Highlanders to see into the future. Rene Descartes proposed a scientific explanation for cruenation—the commonly held belief that a murder victim’s corpse would spontaneously spout blood in the presence of its killer. William Harvey, known for discovering the circulation of blood in the body, once dissected a toad he thought was a witch’s familiar. As late as 1749, Linnaeus urged the Royal Swedish Academy of Sciences to launch a hunt for mermaids.
ADVERTISEMENT
Nautilus Members enjoy an ad-free experience.
Log in
or
Join now
.
To our contemporary ears, most all of this may sound fairly ridiculous. But as Edward Donlick puts it in The Clockwork Universe, “The world was so full of marvels, in other words, that the truly scientific approach was to reserve judgment about what was possible and what wasn’t, and to observe and experiment instead.” To the 17th-century scientist, anything was on the table, so long as it could be experimentally studied.Today, we know how the story ends: Belief in astrology, alchemy, and witchcraft declined in places where empiricism and skepticism became cornerstones of science. But perhaps early scientists’ fascination with the occult should remind us of other tenants of discovery: open-mindedness and curiosity. Witches, mermaids, and the philosopher’s stone may not have survived modern scrutiny, but it was curiosity about them that drove real progress and allowed early thinkers to stray from established norms. In this sense, curiosity is a kind of magic. Lead image: Yulia Serova / Shutterstock
Dale Markowitz
Posted on October 30, 2024
Dale Markowitz is a writer and software engineer based in Austin, Texas.
Get the Nautilus newsletter
Cutting-edge science, unraveled by the very brightest living thinkers.
| 2024-11-08T06:00:54 | en | train |
42,045,570 | donsupreme | 2024-11-04T20:12:57 | The Novo Nordisk scientist behind Ozempic, Wegovy weight loss research [video] | null | https://www.youtube.com/watch?v=sXbNighs5pk | 2 | 0 | null | null | null | null | null | null | null | null | null | null | train |
42,045,584 | surprisetalk | 2024-11-04T20:14:32 | Influence Agents | null | https://geohot.github.io//blog/jekyll/update/2024/11/04/influence-agents.html | 5 | 0 | [
42050176
] | null | null | null | null | null | null | null | null | null | train |
42,045,590 | unsnap_biceps | 2024-11-04T20:15:01 | Elon Musk lawyer says $1M voter giveaway winners are not random | null | https://www.reuters.com/legal/judge-weighs-challenge-elon-musks-1-million-voter-giveaway-2024-11-04/ | 28 | 10 | [
42045725,
42049357
] | null | null | http_other_error | reuters.com | null | null | Please enable JS and disable any ad blocker | 2024-11-08T15:29:18 | null | train |
42,045,601 | dd-dreams | 2024-11-04T20:16:35 | Aft – a fast file transferring program | Hey everyone! I have shown this program before, but it has changed ALOT since then.<p>I would really love to hear your feedback, suggestions and questions.<p>Source code: https://github.com/dd-dreams/aft<p>P.S. Here is a quick config file:
```<p>verbose=3<p>identifier=coolhnuser<p>``` | null | 3 | 4 | [
42051528,
42045728
] | null | null | null | null | null | null | null | null | null | train |
42,045,606 | derbOac | 2024-11-04T20:17:09 | Bug or intentional? macOS 15.1 removes ability to launch unsigned applications | null | https://www.osnews.com/story/141055/bug-or-intentional-macos-15-1-completely-removes-ability-to-launch-unsigned-applications/ | 3 | 1 | [
42045636
] | null | null | null | null | null | null | null | null | null | train |
42,045,621 | rntn | 2024-11-04T20:19:28 | Guy makes "dodgy e-bike" from 130 used vapes to make point about e-waste | null | https://arstechnica.com/gadgets/2024/11/disposable-vapes-from-a-music-festival-can-power-a-beefy-e-bike-20-miles/ | 60 | 13 | [
42046140,
42051730,
42047501,
42046868
] | null | null | null | null | null | null | null | null | null | train |
42,045,630 | wavewash | 2024-11-04T20:20:30 | Show HN: Make Animated Kamala/Trump Toons with AI Lip-Sync for Election Day Fun | We made an in browser animation tool that's simple but requires users to understand keyframe and timelines. Because there was a level of education as a barrier to the application we though it'd be fun to have a wizard create something of value that then is loaded into the animation tool as a starter project.<p>The wizard tool we created is at the link. You give a few sentances and we used a voice clone model to produce the text to speech audio which is then filtered into our lip-sync model and applied to a template scene that we have.<p>When you get dropped in to the animation tool - you're given 12 free seconds of processing time. If any of you end up with animation that goes beyond that, shoot me an email and I can load your account with more credits or if you want to purchase your credits use code DEBATE and it'll take 30% off right away. | http://blabberize.com/easystart | 2 | 0 | null | null | null | null | null | null | null | null | null | null | train |
42,045,633 | gnabgib | 2024-11-04T20:20:59 | Blood Sugar Control Is a Key Factor in Slowing Brain Aging | null | https://www.bgu.ac.il/en/news-and-articles/blood-sugar-control-is-key-factor-in-slowing-brain-aging/ | 3 | 0 | [
42046015
] | null | null | null | null | null | null | null | null | null | train |
42,045,635 | joezee | 2024-11-04T20:21:48 | Show HN: Grow on LinkedIn 10x Faster | null | https://eloquent.live/ | 2 | 0 | null | null | null | null | null | null | null | null | null | null | train |
42,045,638 | okl | 2024-11-04T20:21:55 | Wikipedia: Howard H. Aiken | null | https://en.wikipedia.org/wiki/Howard_H._Aiken | 2 | 0 | null | null | null | null | null | null | null | null | null | null | train |
42,045,658 | gnabgib | 2024-11-04T20:23:48 | Insomnia, but not lack of sleep, may hasten brain shrinkage: study | null | https://www.ucsf.edu/news/2024/10/428701/poor-sleep-midlife-linked-faster-brain-atrophy | 114 | 63 | [
42045869,
42045879,
42045968,
42045926,
42046075,
42048693,
42046091,
42046518,
42046114,
42046079,
42046100,
42046093,
42046339,
42046098,
42045993,
42045964
] | null | null | null | null | null | null | null | null | null | train |
42,045,682 | kacovvv | 2024-11-04T20:26:36 | Ask HN: Would you use AI tool that analyzes X reactions to guide your strategy? | Hey HackerNews!<p>It’s just some market research and I thought it would be great to have some input from people like you.<p>I'm exploring the concept of an AI-powered tool that would track the responses of the audience to your brand/content on X (Twitter), summon instant sentiment analysis of talks that involve your brand and provide specific recommendations regarding further action depending on audience feedback.<p>Key question: Does the communication problem apply to the managing of reactions on the social media platforms and what would you expect to pay for a tool like this?<p>I'm particularly interested in hearing from social media managers and business owners who:<p>- Maintain and develop accounts that are currently used, has to constantly monitor brand references and social media consulting/agencies too expensive.
Bookmarking, not selling anything – I wonder if this would solve any real problem. All feedback welcome!<p>Edit: So thank you to everyone for giving some time and thought into this. | null | 2 | 0 | null | null | null | null | null | null | null | null | null | null | train |
42,045,686 | throwrqX | 2024-11-04T20:27:11 | Encrypted messaging app dev leaves Australia after police visit employee's home | null | https://www.theguardian.com/australia-news/2024/nov/05/session-encrypted-messaging-app-developer-moves-out-of-australia-police-visit-switzerland | 14 | 1 | [
42046060
] | null | null | null | null | null | null | null | null | null | train |
42,045,710 | tosh | 2024-11-04T20:29:42 | Foveated Rendering | null | https://en.wikipedia.org/wiki/Foveated_rendering | 2 | 0 | null | null | null | null | null | null | null | null | null | null | train |
42,045,719 | amichail | 2024-11-04T20:30:37 | Ask HN: Can you replicate this Lock Screen bug on your MacBook Air/Pro? | Try this: (1) Lock the screen via the Apple menu; (2) press the escape key to make the Lock Screen go black; (3) press the space bar. Does the Lock Screen appear again?<p>If not, try pressing one of the brightness keys (increase or decrease) to make the Lock Screen appear again.<p>If you don’t encounter a bug, try pressing the escape key again then the space bar to bring back the Lock Screen.<p>Repeat this several times to see if the bug occurs for you. | null | 1 | 0 | null | null | null | null | null | null | null | null | null | null | train |
42,045,723 | tslmy | 2024-11-04T20:31:02 | Serverless Use Cases at Startups | null | https://sgringwe.com/2019/02/21/Serverless-use-cases-at-startups.html | 7 | 1 | [
42047090
] | null | null | null | null | null | null | null | null | null | train |
42,045,730 | yamrzou | 2024-11-04T20:32:19 | Pwnat: Punch Holes Through Firewalls/NATs Without Any Third Party | null | https://github.com/samyk/pwnat | 4 | 0 | null | null | null | no_error | GitHub - samyk/pwnat: The only tool/technique to punch holes through firewalls/NATs where multiple clients & server can be behind separate NATs without any 3rd party involvement. Pwnat is a newly developed technique, exploiting a property of NAT translation tables, with no 3rd party, port forwarding, DMZ, DNS, router admin requirements, STUN/TURN/UPnP/ICE, or spoofing. | null | samyk | pwnat - http://samy.pl/pwnat
pwnat, by Samy Kamkar, is a tool that allows any client
behind a NAT to communicate with a server behind a
separate NAT with no port forwarding and no DMZ
setup on any routers in order to directly communicate
with each other.
There is no middle man, no proxy, no third party, no UPnP
required, no spoofing, no DNS tricks. The server does
not need to know the client's IP address before connecting.
More importantly, the client can then connect to any
host or port on any remote host or to a fixed host and
port decided by the server.
Simply put, this is a proxy server that works behind a NAT,
even when the client is also behind a NAT.
You can read the paper published in IEEE and presented at
the IEEE P2P'10 Conference here
usage: ./pwnat <-s | -c> <args>
-c client mode
<args>: [local ip] <local port> <proxy host> [proxy port (def:2222)] <remote host> <remote port>
-s server mode
<args>: [local ip] [proxy port (def:2222)] [[allowed host]:[allowed port] ...]
-6 use IPv6
-v show debug output (up to 2)
-h show this help and exit
EXAMPLE
Server side allowing anyone to proxy:
Client wanting to connect to google.com:80:
./pwnat -c 8000 pwnat.server.com google.com 80
Then, browse to http://localhost:8000 to visit google!
FAQ
Ok, so does this really work?
Yes. Try it!
I'm confused. This can't work.
You should be, and it does work.
But it can't. My NAT blocks incoming packets and so will the other.
I know. But how?!
Great question! I thought you'd never ask.
Look below at HOW DOES IT WORK?
Does this use DNS for anything?
No.
Do I need to setup port forwarding or a DMZ on either end?
No.
Is there some sort of proxy or 3rd party that tunnels information between
the two NATs?
No. The connection is direct, client to server.
Will this work behind my corporate NAT and firewall?
This will work behind many NATs and firewalls, but not all.
What uses does this have?
This will allow you to tunnel any service that you want to run (http,
ssh, quake server, IRC, ftp, etc.) through your NAT, or proxy into
other remote servers.
What if one or both ends aren't behind a NAT?
Everything will work just as well. You can use pwnat to tunnel TCP
payload over UDP if you wish; no NATs are necessary.
Does the server have to specify the client host?
No! The server doesn't know the client IP address until the client
attempts to connect, penetrating the NAT using this unique method.
HOW DOES IT WORK?
My method of penetrating NATs is two-fold which I will describe below.
In order for the full tunnel to be established, the client side needs to
know the public IP address of the server, and the server needs to learn
the public IP address of the client.
However, in a true client-server model, the server doesn't know the client IP
until the client connects, and NATs will normally drop unknown incoming packets.
In pwnat, the server also does not need to know the client IP address.
Here is how the pwnat server learns the IP address of the client:
I get around this by having the client "pretend" to be a random hop on
the Internet. I'm essentially using the same technology a traceroute uses
to detect hops on the Internet, but I'm doing the reverse in order to
penetrate the NAT.
Specifically, when the server starts up, it begins sending fixed ICMP echo
request packets to the fixed address 3.3.3.3. We expect that these packets
won't be returned.
Now, 3.3.3.3 is not a host we have any access to, nor will we end up spoofing
it. Instead, when a client wants to connect, the client (which knows the server
IP address) sends an ICMP Time Exceeded packet to the server. The ICMP packet
includes the "original" fixed packet that the server was sending to 3.3.3.3.
Why? Well, we're pretending to be a hop on the Internet, politely telling the
server that its original "ICMP echo request" packet couldn't be delivered.
Your NAT, being the gapingly open device it is, is nice enough to notice that
the packet inside the ICMP time exceeded packet matches the packet the server
sent out. It then forwards the ICMP time exceeded back to the server behind
the NAT, including the full IP header from the client, thus allowing the
server to know what the client IP address is!
Server (1.2.3.4): ICMP Echo Request -> 3.3.3.3
...
Server (1.2.3.4): ICMP Echo Request -> 3.3.3.3
...
Server (1.2.3.4): ICMP Echo Request -> 3.3.3.3
...
Client (6.7.8.9): ICMP Time Exceeded (includes ICMP Echo Request to 3.3.3.3) -> 1.2.3.4
Server's NAT: Sees server's Echo Request in client's Time Exceeded packet,
sends entire packet to server because it matches server's outgoing packet
Don't believe me? Just traceroute any host behind your NAT. You'll notice
incoming packets coming in from random IP addresses your router knows
nothing about. Your router knows to send those back to you, rather than another
client on your network, based off of the data inside the ICMP time exceeded packet.
Now, the server has only learned the client IP address. We still have no
method to send any additional data. For the full communication, we use the
same method used in my previous software, chownat, to penetrate both NATs.
Example of a client behind a NAT talking to a machine NOT behind a NAT:
Machine A -> NAT A -> net -> quake server
Machine A sends a UDP packet to quake server, opening a "session".
NAT A sees this and says:
"If any UDP packets come back soon with the same host and port info,
I'm routing it to machine A."
Quake server sends UDP packets back, hits NAT A, and NAT A seeing the right
hosts and ports, sends it to machine A. Machine A and quake server are now
able to communicate without any problem.
Now here is how pwnat works now that client and server know each others IP.
Goal is: Machine A (ssh client) -> NAT A -> net -> NAT B -> Machine B (ssh server)
When you start up the pwnat server on machine B, it slowly fires off
UDP packets to machine A. Of course, NAT A is not expecting these so it
drops every one of them. Machine B does not stop.
Once you begin the pwnat client on machine A, it begins sending UDP
packets to machine B. Note: pwnat defaults source and destination
ports to 2222. Any unprivileged user can set UDP source and destination ports.
Normally the UDP packets that machine A is sending to NAT B would get dropped.
However, since machine B is sending similar packets OUT, NAT B assumes
these are responses and lets them back in. Once machine B sees these packets,
it sends handshake packets back to machine A. These packets will not get
dropped by NAT A because of the same reason: NAT A sees packets going out, and
the packets coming back to the NAT look like responses to the ones going out.
Finally, both sides are fully communicating over UDP, allowing protocols that
run over TCP to tunnel through.
Note: There is a keep-alive process on the pwnat server and client that
always keeps the UDP "session" active. The packets it sends have a 0 byte
payload and are only sent when the client is not sending data out. Otherwise,
the fastest it will possibly send the keep-alive packets is one packet every 5
seconds. If any other type of data is travelling through the tunnel, no
keep-alive packets will be transmitted.
by Samy Kamkar
pwnat is based off of udptunnel by Daniel Meekins here
| 2024-11-08T03:19:03 | en | train |
42,045,742 | jordigh | 2024-11-04T20:33:42 | Object Pools | null | https://famicom.party/book/17-objectpools/ | 3 | 0 | null | null | null | null | null | null | null | null | null | null | train |
42,045,759 | usawisehub | 2024-11-04T20:36:31 | null | null | null | 1 | null | [
42045760
] | null | true | null | null | null | null | null | null | null | train |
42,045,762 | pilingual | 2024-11-04T20:36:47 | The Best CEOs Respond | null | https://dan.bulwinkle.net/blog/the-best-ceos-respond/ | 3 | 0 | null | null | null | null | null | null | null | null | null | null | train |
42,045,766 | austinallegro | 2024-11-04T20:36:58 | Today in History: November 4, King Tutankhamen's face unveiled | null | https://www.mercurynews.com/2024/11/04/today-in-history-november-4-king-tutankhamens-face-unveiled/ | 2 | 0 | null | null | null | null | null | null | null | null | null | null | train |
42,045,773 | PaulHoule | 2024-11-04T20:38:30 | The Isotopic Limit of Recycling | null | https://www.mdpi.com/2071-1050/16/21/9149 | 2 | 0 | null | null | null | no_error | The Isotopic Limit of Recycling | null | Khalid Hattar |
Author / Affiliation / Email
Article Menu
Font Type:
Arial
Georgia
Verdana
Open AccessArticle
by
Eric Lang 1 and
Khalid Hattar 2,*
1
Department of Nuclear Engineering, University of New Mexico, Albuquerque, NM 87131, USA
2
Department of Nuclear Engineering, University of Tennessee–Knoxville, Knoxville, TN 37916, USA
*
Author to whom correspondence should be addressed.
Submission received: 31 August 2024
/
Revised: 8 October 2024
/
Accepted: 16 October 2024
/
Published: 22 October 2024
Abstract:
Despite advances in recycling technologies and practices, the world still mostly operates on a once-through materials use cycle. The once-through approach to the materials supply chain cannot work into perpetuity. The vast majority of current recycling efforts focus on mechanical or chemical separation-based techniques and are often subsequently limited on the number of times a component can be recycled or upcycled. By looking at things from a particle physics and nuclear history perspective, we propose a thought experiment to determine the physical limit of recycling and propose subsequent limits and standards to evaluate all recycling efforts. This uncommon approach to analysis demonstrates that the current limits to recycling are not physical in nature but engineering.
1. BackgroundThe availability of resources and their use and disposal have set limits on the growth of civilizations throughout human history [1]. The ability to recycle natural resources has been ubiquitous to the livelihoods of civilizations, especially in regions where necessary resources are sparse [2]. In current times, the amount of waste generated has increased over the past 50 years, contributing to the depletion of natural resources, the pollution of resources, and restricting the availability of future resources [3]. In fact, as Barles notes, the word “waste” derives from old French meaning “empty” or “desolate” [2]. However, through recycling efforts over the past few decades, we now recognize that the materials and products sent away as “waste” are clearly not “empty” and are actually full of potential for alternative use.Despite the growth of product recycling, the world still generally operates on a once-through cycle, consuming products and disposing of them without recycling. Metallic components and plastics, commonly thought to be among the most recyclable products, are routinely only recycled about 10% of the time [4], with recycling complicated by the physical state of materials to be recycled, social behavior, and recycling technologies [5]. However, the recyclability and recycling rates of materials vary widely, not because of lack of need but because of the ease of recycling. As an example, we show the recycling of common materials in Figure 1 and Table 1. Aluminum (Al) is widely recycled, with current research noting that only up to 9% of Al is lost to the environment or discarded as scrap [6,7]. Aluminum is produced in quantities upwards of 45 million tonnes per year and used extensively in various industries, including the automotive industry [8]. Focusing on Al in the automotive industry, as shown in Figure 1, Al is shredded and separated in bulk, sorted, and remelted downstream, resulting in 80–98% of Al in automobiles being recycled [7].In contrast, rare earth metals such as neodymium, scandium, yttrium, cerium, and lanthanum (among others) are crucial to modern society in advanced electronics and electromagnetic materials. Despite their supply chain issues and identification as critical minerals [9], they are among the least commonly recycled materials, with only ~1% of neodymium being recycled currently, as shown in Table 1 [10]. As an example, the recycling of neodymium in permanent magnets focuses on physical separation via demagnetization, followed by hydrometallurgical separation, leaching, or pyrometallurgical separation methods [11]. However, the amount of rare earth elements in each product and in an individual component is very small, making recycling difficult, and this may cause prices to rise [12]. Impacting recycling rates further is the lack of recycling programs, as Swain, et al. identified that there is not a well-organized rare earth waste collection and recycling system in Korea; hence, all 21.9 tons of waste are not recycled [13].As a comparison, many other elements have end-of-life recycling rates falling in between those of Al and Nd. Table 1 illustrates the end-of-life recycling rates of common elements, highlighting the variability, dependent on the element, its application, its form following application, and available industrial recycling methods. While recycling rates are high for certain elements, there is certainly room for growth; if a universal recycling method existed, these recycling rates for all elements could increase.
Table 1.
End-of-life recycling rates of select elements taken from [14].
Table 1.
End-of-life recycling rates of select elements taken from [14].
ElementRecycling RateAl42–70%Ni57–63%Ru5–15%Nd<1%
However, recycling limits have been historically lower than theoretically possible. The limits of recycling have been discussed in various contexts in the literature, from perspectives on social behaviors [5] to available technologies and processes [15] and considerations of the second law of thermodynamics [16]. While numerous factors clearly influence the current desire and ability to recycle materials and resources, ultimately, recycling is determined by the energy limits and energy required for separation [17]. However, the ultimate separation of materials can occur only on the atomistic level; the ultimate energy required for separation is the binding energy between atoms. Herein, then, we describe the potential for the separation of any and all materials, limited only by the availability of input energy, to the isotopic level, based on available technology that could enable the recycling of all materials, including complicated mixtures and alloys without harmful leachants or chemicals. The objective of this work is to provide a perspective on the ability to recycle any and all materials using isotope mass separation to encourage creative thought into the reprocessing and recycling of materials. 2. Thought ExperimentIt is clear that materials supply chain challenges should be considered with food supply, water supply, and energy supply challenges as engineering problems with global impact. This is evident in the procurement of raw materials through end-of-life disposal. In this article, we take an unconventional perspective on recycling-based particle physics and nuclear history.Such a thought experiment analyzing materials supply chain starts by first analyzing the materials balance around planet Earth. By drawing a black box system volume around the Earth and analyzing the elemental fluxes in and out, we notice there are minimal materials supply chain concerns, as can be seen in Figure 2a. Since the Paleocene period, the fluxes are generally small with an influx of small asteroids and cosmic rays and an out-flux of some spacecraft and gasses lighter than air; albeit, both fluxes are small relative to the mass of Earth. The small influx from iron-rich asteroids had a large impact on early metallurgy. Similarly, the relatively small loss of helium through the atmosphere via balloons and venting has contributed to the helium supply chain crisis, impacting many medical and scientific instruments [18]. Zooming in and considering a country-scale materials balance, as shown in Figure 2b with analysis of the amount of trade (in U.S. dollars) in and out of the United States, we observe the importance of global transport dictating materials fluxes in and out of a country on essential materials and less-common elements for advanced technological applications. The flow of elements and materials via international trade dates back to the Upper Paleolithic age and the transport of Obsidian up to 800 km [19], and it has recently had a geopolitical impact associated with the fluxes of Li and other rare earth metals’ impact on Li-ion batteries [20] and other renewable energy technologies [9]. If we continue this thought experiment down to the surface area of a large metropolitan region such as Los Angeles, as seen in Figure 2c, we can observe the itemized pathways contributing to the supply chain and the flux into and out of the region often by land, air, and sea. Any disruption of these metropolitan supply chains can have a large societal impact ranging from the rationing of toilet paper to radioactive elements (e.g., Tc-99) for medical imaging [21,22]. All of the fluxes of materials and raw elements in and out of a defined area on Earth require physical transportation on some scale (internationally, inter-communally, or intra-communally). As a result of this analysis from the Earth scale to the local scale, it is clear that for all but He and some predominantly man-made isotopes (H-3, Tc-99, etc.), the materials supply chain challenges at an elemental level are predominantly transport and separation/joining issues.To further the theoretical thought experiment, the authors now postulate that energy concerns are fully ignored. Doing so largely illuminates the transport component of the materials supply chain concerns as additional redundancy and efficiencies could be engineered into the global distribution network. This still leaves questions such as ‘How many times can a material be recycled or even upcycled?’ This limit is often set by the quality and contamination type in the supplied materials for recycling, which can be difficult to track and subsequently make it difficult to recycle. Here, then, we reframe the question to ask ‘To what extent can materials be separated for recycling?’ From a particle physics perspective, the answer to the latter question is simple. Any gas, liquid, or solid can be turned into plasma and subsequently separated into individual mass-to-charge ratios (i.e., isotopic purity) with enough energy. The energy to create a plasma and then perform electromagnetic isotope separation can be immense but is ignored in this thought experiment. The technologies for plasma formation range from Radio Frequency (RF) through sputtering to laser-based approaches and have been extensively studied and are utilized in both industrial (e.g., sputtering deposition in the semiconductor industry) and household applications (e.g., fluorescent light bulbs) [23]. Subsequently, the physics behind the separation of isotopes has been known since 1878 and is governed by the Lorentz equation [24]:
where F denotes force, q denotes the electric charge, E denotes the external electric field, v denotes the particle velocity, and B denotes the applied magnetic field. This classical and elegant equation is routinely applied in ion beam accelerator applications and, when applied to the physical limits of recycling, suggests that all materials can be physically separated down to individual isotopes (mass-to-charge ratio). Thus, again, neglecting the electricity to transport, to build and operate the plasma source, to build and operate the high Tesla magnetic fields, to subsequently rejoin into isotopically pure feedstock, and to transport to the needed site, there is no physical limit to recycling/upcycling materials. Typically, landfills are viewed as a one-way path: waste enters and does not leave. However, with the isotopic recycling of waste, there is potential to transition landfills into sources of isotopically pure feedstock, as visualized in Figure 2d.
Figure 2.
The recycling thought experiment: (a) materials balance of planet Earth; (b) trade balance of the United States [25]; (c) materials/trade in/out flow routes of a large metropolitan center (e.g., Los Angeles); (d) the hypothetical potential of large-scale electromagnetic isotope separation to change any material from landfill to an isotopically pure resource.
Figure 2.
The recycling thought experiment: (a) materials balance of planet Earth; (b) trade balance of the United States [25]; (c) materials/trade in/out flow routes of a large metropolitan center (e.g., Los Angeles); (d) the hypothetical potential of large-scale electromagnetic isotope separation to change any material from landfill to an isotopically pure resource.
By approaching the challenges of recycling and supply chain from a particle physics perspective over an economic or materials science perspective, we find that there is no physical limit to recycling. With enough energy, anything can be recycled! If we apply particle physics concepts and are willing to pay the price energetically to recycle at the nanoscale or atomic scale, we can apply the words of Professor Richard Feinman to recycling “There is plenty of room at the bottom” [26]. With this new perspective, what insight can be gained into the current methods for recycling? 3. Non-Dimensional AnalysisThis thought experiment not only requires us to view recycling from a far different perspective than is commonly addressed, but it more importantly sets theoretical standards for both the mass and energy balances considered during any recycling process. Similar to how the Carnot cycle, Rankine cycle, and similar theoretical thermodynamic processes set theoretical standards that can be utilized by any power plant from the simplest steam boiler to the largest nuclear power plant [27,28], we propose analogous standards for any proposed recycling process. Taking a mass and energy balance approach, we can create a normalized mass standard to quantify recycling purity and an energy standard to evaluate recycling effectiveness.Since we know from our thought experiment that using electromagnetic isotope separation permits recycling down to the individual isotope, we have a theoretical standard to compare all recycling processes. This can be quantified utilizing the simple non-dimensional recycling purity relationship:
Recycle Purity = Isotope concentration in recycled product/100% of only the isotope desired,
(2)
Based on this approach, the recycle purity can never be greater than 1. The closer it is to 1, the higher the isotopic purity of the recycled product. For most applications, the isotopic specificity is not required, and the limit can be relaxed to
Recycle Purity = Final element concentration in recycled product/100% of only the element desired,
(3)
Although this non-dimensional analysis is simple to understand and can be rapidly determined through one of many post-processing quality control compositional analysis techniques such as X-ray Fluorescence (XRF), Inductively Coupled Plasma Mass Spectroscopy (ICP-MS), etc. [29,30], it does have several limitations. It does not compare to the composition of the material prior to recycling; as such, it does not evaluate the efficiency of the recycling process. In contrast, it evaluates the effectiveness of the recycling process to produce complete segregation of the isotopes or elements. This analysis is also limited based on the isotopic/elemental nature of the approach. Most modern functional and structural materials utilize a combination of diverse composition and crystallographic phases to achieve the desired properties. By not considering either the initial provided or final desired type of chemical bonding or microstructure, optimizing for just this recycling purity standard might result in extremely wasteful over-upcycling during the recycling process. For example, one should never isotopically separate a 2″ × 4″ wood board into C, H, O, etc., to reassemble it into something akin to a particle board.As such, it is clear that the energetics of the recycling process must be reintroduced into the thought experiment and considered in any evaluation of the recycling process. Here, we can take a similar approach of producing a non-dimensional term based on the electromagnetic isotope separation thought experiment. To do so, we must expand our previous thought experiment. Take any proposed recycling process and the simplest necessary ion accelerator facility to separate the desired isotope and place them in a black box with only the energy needed to construct, operate, and decommission the facilities measured. Although very much a theoretical value, we feel a good estimate of such values could be determined. Based on this, a non-dimensional term for recycling effectiveness can be stated as:
Recycling Effectiveness = Total energy needed for proposed recycling process/total energy needed for magnetic isotope separation,
(4)
If the recycling effectiveness is greater than 1, then the proposed recycling process should not be performed or be completely reworked. Given the higher power demands to make and operate an ion accelerator and isotope separation magnet, we hypothesize that an economical recycling process would have a recycling effectiveness multiple orders of magnitude lower than electromagnetic isotope separation. As such, the closer to zero the recycling effectiveness, the more desirable the proposed recycling process. Also, note that the denominator is not a fixed number. It should continually decrease as electromagnetic isotope separation becomes more efficient, moving away from research-only applications. The denominator value also changes depending on the desired isotope being higher for heavier isotopes. For each isotope, this value can be calculated to determine the energy cost to operate per atom (kWh/recycled atom).These two non-dimensional terms (recycling purity and effectiveness) provide a theoretical limit and standard, respectively, for evaluating any or all proposed and active recycling processes. The greatest benefit of this analysis is that all recycling processes can be directly compared and efforts to achieve a recycling purity of one and a recycling effectiveness of zero can be emphasized. Following this thought experiment and subsequent non-dimensional analysis, one might ask, is it even possible to perform electromagnetic isotope separation at an industrial scale? In the following section, we will show that it is and has been achieved for the heaviest, and thus hardest to isotopically separate, naturally forming element on earth, uranium. 4. Experimental ValidationIndeed, isotopic separation has a rich history dating to the development of the field of nuclear science around the turn of the 20th century with the discovery of the nucleus, the neutron, radioactive decay, and nuclear fission. On a fundamental level, elements are distinguished by their distinct numbers of protons, while isotopes are distinguished by their combined number of neutrons and protons. In sum, these numbers of protons and neutrons contribute to defining an element’s atomic number and atomic mass. Nuclear scientists, dating to the early 20th century, know the importance of isotopes in determining the decay of elements and the ability to fission. The field of nuclear engineering, ranging from energy to medicine, depends on the intrinsic, unique characteristics of isotopes. For example, the discovery of nuclear fission hinged on insights into the fissionability of uranium (U) and its isotopes [31,32].The fissile nature of the U-235 isotope compared to other U isotopes garnered considerable attention during the Manhattan Project, prompting significant investment in isotope separation technologies and processes. The physical separation of U isotopes during the Manhattan Project pursued multiple routes, including centrifuge separation, electromagnetic separation, gaseous diffusion, and thermal diffusion techniques for uranium enrichment. Electromagnetic separation hinged on the research of E.L. Lawrence and the patenting of the calutron in 1932, a cyclotron that uses a magnetic field to separate charged particles based on their mass-to-charge ratio [33]. During the Manhattan Project, calutrons and electromagnetic isotope separation were widely used at the Y-12 plant at the Alpha I racetrack to enrich U, shown in Figure 3, ultimately producing 43 kg of >85 at.% enriched U-235 [34]. Since the Manhattan Project, calutrons have been used to separate about 250 isotopes of 50 elements, ranging from lithium to calcium and rhodium [35]. More recently, electromagnetic isotope separation for the production of enriched U was used in Iraq in the 1980s and 1990s [35]. Thus, electromagnetic separation of isotopes has a rich history and has been successful on a number of isotopes, primarily for nuclear applications. However, we propose that the same physics and methodologies can be applied to civilian uses, in particular the separation of elements and isotopes for the recycling of materials, including currently difficult-to-recycle materials.There are a few areas in civilian applications where electromagnetic isotope separation is utilized. One of the more mature applications of this technique is Accelerator Mass Spectroscopy (AMS). This characterization technique, a subset of which is sometimes called carbon dating, is applied to everything from archeological artifacts to works of art to determine the age of the sample [36]. Another civilian use of electromagnetic separation is the production of medical isotopes for a range of clinical applications [37]. Although both these applications have an important impact, they work at sample mass measured in the g or mg scale. To our knowledge, no electromagnetic isotope separation has been performed on the ton or even kg scale. 5. Future DirectionThis perspective has two potential impacts on the direction of the recycling field. First, it could provide a rubric and methodology to evaluate and compare any two recycling processes independent of the mechanisms used for the process, rapidly comparing and contrasting the mass and energy efficiency of any recycling process through the non-dimensional terms of recycle purity and recycling effectiveness, respectively. The thought experiment created a boundary associated with physical recycling down to the atomistic scale, thus permitting such comparison. Energy efficiency and global economics will drive how close we get to the theoretical potential set here via the isotopic electromagnetic separation approach. This energy-intensive approach might find applications in smaller specialty fields with the potential for great profits and impact, extreme difficulty in other separation processes, or both. The following are a few potential examples of how isotopic electromagnetic separation could be incorporated. This separation technique could facilitate the recycling of stored nuclear waste for medical isotopes that are essential for several lifesaving applications. It could also be considered for increasing the isotopic purity of components ranging from Focused Ion Beam (FIB) sources through metal components for future fusion energy systems being developed. This would enhance the efficiency of FIB research and processing, as well as minimize the radioactive cooling period of nuclear fusion reactor materials at the end of the component lifetime [38]. This manuscript has focused on electromagnetic separation down to the isotopic level. This separation can be performed at the molecular scale using the same process which might be a last resort in the chemical industry for the separation of gasses or liquids. In addition, isotopic electromagnetic separation incorporated as part of a larger clean landfill mining effort would have the added benefit of decreasing the environmental and health impact of landfills throughout the world [39,40]. Even if implemented, this technique complements and does not replace any of the recycling techniques already operating at an industrial scale or those currently developed across the world. If electromagnetic isotope separation was implemented at scale, even as a last resort for separation, it would provide an excellent opportunity for a nearly, sans helium, closed-loop materials society. 6. ConclusionsAs the resource needs of the world continue to grow, so too does the need to invest in the recycling and reuse of resources and materials. Earth is a planet with finite material resources, yet we predominately continue to operate on a once-through cycle of use of these materials, which is an unsustainable model. The recycling of materials has advanced over the past decades, although it is highly variable and influenced by material composition, form, and recycling processes. From this perspective, we propose a thought experiment for the recycling of materials (any form and any composition) into their constituent isotopes using electromagnetic isotope separation and discuss the subsequent insights gained from the perspective.The current limit of recycling and upcycling is the economic cost of separation, not the actual physical separation of materials, which has been shown to be possible via electromagnetic isotope separation for decades. However, this technique has, to date, only been applied to nuclear isotopes, yet clearly offers the potential for the recycling of materials, limited only by the available energy supply. Despite the potential of electromagnetic isotope recycling, we must recognize that other cheaper, more scalable recycling methodologies should also be pursued for rapid deployment and maximal impact. Nonetheless, this perspective shows that electromagnetic isotope recycling could be used for isotopically pure up-cycling or recycling of difficult-to-recycle systems. Whatever the potential future applications of this method of recycling, its adoption and use would require, just as with its first use over eight decades ago in the Manhattan Project, no new science and just an infrastructure and monetary investment.
Author ContributionsConceptualization, K.H.; methodology, E.L. and K.H.; formal analysis, E.L. and K.H.; investigation, E.L. and KH.; data curation, E.L. and K.H.; writing—original draft preparation, E.L. and K.H.; writing—review and editing, E.L. and K.H.; visualization, E.L and K.H.; supervision, K.H.; project administration, E.L. and K.H.; funding acquisition, E.L. and K.H. All authors have read and agreed to the published version of the manuscript.FundingThis work was performed, in part, at the Center for Integrated Nanotechnologies, an Office of Science User Facility operated for the U.S. Department of Energy (DOE) Office of Science by Los Alamos National Laboratory (Contract 89233218CNA000001) and Sandia National Laboratories (Contract DE-NA-0003525).Institutional Review Board StatementNot applicable.Informed Consent StatementNot applicable.Data Availability StatementThe raw data supporting the conclusions of this article will be made available by the authors upon request.AcknowledgmentsThe authors would like to thank Dan Buller, Steven Frankowski, and Miguel L. Crespillo for useful discussions.Conflicts of InterestThe authors declare no conflicts of interest.ReferencesGood, D.H.; Reuveny, R. On the Collapse of Historical Civilizations. Am. J. Agric. Econ. 2009, 91, 863–879. [Google Scholar] [CrossRef]Barles, S. History of Waste Management and the Social and Cultural Representations of Waste. In The Basic Environmental History; Springer International Publishing: Berlin/Heidelberg, Germany, 2014. [Google Scholar] [CrossRef]“National Overview: Facts and Figures on Materials, Wastes and Recycling” United States Environmental Protection Agency, Data as of November 2023. Available online: https://www.epa.gov/facts-and-figures-about-materials-waste-and-recycling/national-overview-facts-and-figures-materials (accessed on 12 August 2024).National Academies of Sciences, Engineering, and Medicine. Recycled Plastics in Infrastructure: Current Practices, Understanding, and Opportunities; The National Academies Press: Washington, DC, USA, 2023. [Google Scholar] [CrossRef]Reck, B.K.; Graedel, T.E. Challenges in Metal Recycling. Science 2012, 377, 690–695. [Google Scholar] [CrossRef]Chen, W.-Q. Recycling Rates of Aluminum in the United States. J. Ind. Ecol. 2013, 17, 926–938. [Google Scholar] [CrossRef]Cullen, J.M.; Allwood, J.M. Mapping the Global Flow of Aluminum: From Liquid Aluminum to End-Use Goods. Environ. Sci. Technol. 2013, 47, 3057–3064. [Google Scholar] [CrossRef] [PubMed]Kelly, S.; Apelian, D. Automotive Aluminum Recycling at End of Life: A Grave-to-Gate Analysis; Center for Resource Recovery and Recycling, Worcester Polytechnic Institute: Worcester, MA, USA, 2022. [Google Scholar]U.S. Geological Survey, Department of the Interior. 2022 Final List of Critical Minerals. Fed. Regist. 2022, 87, 10381–10382. [Google Scholar]Golev, A.; Scott, M.; Erskine, P.D.; Ali, S.H.; Ballantyne, G.R. Rare earths supply chains: Current status, constraints and opportunities. Resour. Policy 2014, 41, 52–59. [Google Scholar] [CrossRef]Tanaka, M.; Oki, T.; Koyama, K.; Narita, H.; Oishi, T. Chapter 255—Recycling of Rare Earths from Scrap. In Handbook on the Physics and Chemistry of Rare Earths; Elsevier: Amsterdam, The Netherlands, 2013; Volume 43, pp. 159–211. [Google Scholar] [CrossRef]Ayres, R.U.; Mendez, G.V.; Peiro, L.T. Chapter 4—Recycling Rare Metals. In Handbook of Recycling; Elsevier: Amsterdam, The Netherlands, 2014; pp. 27–38. [Google Scholar] [CrossRef]Swain, B.; Kang, L.; Mishra, C.; Ahn, J.W.; Hong, H.S. Materials flow analysis of neodymium, status of rare earth metal in the Republic of Korea. Waste Manag. 2015, 45, 351–360. [Google Scholar] [CrossRef]Graedel, T.E.; Allwood, J.; Birat, J.-P.; Buchert, M.; Hageluken, C.; Reck, B.K.; Sibley, S.F.; Sonnemann, G. What Do We Know About Metal Recycling Rates? J. Ind. Ecol. 2011, 15, 355–366. [Google Scholar] [CrossRef]Reuter, M.; van Schaik, A. Opportunities and limits of recycling: A dynamic-model-based analysis. MRS Bull. 2012, 37, 339–347. [Google Scholar] [CrossRef]Reuter, M.A. Limits of Design for Recycling and “Sustainability”: A Review. Waste Biomass Valorization 2011, 2, 183–208. [Google Scholar] [CrossRef]Craig, P.C. Energy limits on recycling. Ecol. Econ. 2001, 36, 373–384. [Google Scholar] [CrossRef]Siddhantakar, A.; Santillan-Saldivar, J.; Kippes, T.; Sonnemann, G.; Reller, A.; Young, S.B. Helium resource global supply and demand: Geopolitical supply risk analysis. Resour. Conserv. Recycl. 2023, 193, 106935. [Google Scholar] [CrossRef]Kuzmin, Y.V. Long-distance obsidian transport in prehistoric Northeast Asia. Bull. Indo-Pac. Prehistory Assoc. 2012, 32, 1–5. [Google Scholar] [CrossRef]Baum, Z.J.; Bird, R.E.; Yu, X.; Ma, J. Lithium-ion battery recycling—Overview of techniques and trends. ACS Energy Lett. 2022, 7, 712–719. [Google Scholar] [CrossRef]Seeverens, H.J.J. The economics of the molybdenum-99/technetium-99m supply chain. Dutch J. Nucl. Med. 2010, 32, 604–608. [Google Scholar]Paul, S.K.; Chowdhury, P. Strategies for managing the impacts of disruptions during COVID-19: An example of toilet paper. Glob. J. Flex. Syst. Manag. 2020, 21, 283–293. [Google Scholar] [CrossRef]Boulos, M.I.; Fauchais, P.L.; Pfender, E. The plasma state. In Handbook of Thermal Plasmas; Springer International Publishing: Cham, Switzerland, 2023; pp. 3–55. [Google Scholar]Lorentz, H.A. Electromagnetic Phenomena in a System Moving with any Velocity Smaller than That of Light. In Collected Papers; Springer: Dordrecht, The Netherlands, 1937; pp. 172–197. [Google Scholar] [CrossRef]“U.S. Trade in Goods by Selected Countries and Areas: 2024 in Millions of Dollars”. U.S. International Trade in Goods and Services (March 2024) U.S. Department of Commerce and U.S. Census Bureau Released May 2024, CB 24–70, BEA 24–18. Available online: https://www.bea.gov/news/2024/us-international-trade-goods-and-services-march-2024 (accessed on 25 August 2024).Feynman, R. There’s plenty of room at the bottom. Reson. J. Sci. Educ. 2011, 16, 890–905. [Google Scholar] [CrossRef]Zohuri, B.; McDaniel, P. Thermodynamics in Nuclear Power Plant Systems; Springer: New York, NY, USA, 2015. [Google Scholar] [CrossRef]Collins, M.W.; Stasiek, J.A.; Mikielewicz, J. Engineering Thermodynamics and the Carnot Cycle. WIT Trans. State-Art Sci. Eng. 2015, 89, 165–223. [Google Scholar]Rawat, K.; Sharma, N.; Singh, V.K. X-ray Fluorescence and Comparison with Other Analytical Methods (AAS, ICP-AES, LA-ICP-MS, IC, LIBS, SEM-EDS, and XRD). In X-Ray Fluorescence in Biological Sciences: Principles, Instrumentation, and Applications; Wiley: Abingdon, UK, 2022; pp. 1–20. [Google Scholar] [CrossRef]Smith, K.S.; Briggs, P.H.; Campbell, D.L.; Castle, C.J.; Desborough, G.A.; Eppinger, R.G., III; Fitterman, D.V.; Hageman, P.L.; Leinz, R.W.; Meeker, G.P.; et al. Tools for the rapid screening and characterization of historical metal-mining waste dumps. In Proceedings of the 2000 Billings Land Reclamation Symposium, Billings, MT, USA, 20–24 March 2000; pp. 20–24. [Google Scholar]Mietner, L.; Frisch, O.R. Disintegration of Uranium by Neutrons: A New Type of Nuclear Reaction. Nature 1939, 143, 239–240. [Google Scholar] [CrossRef]Nier, A.O.; Booth, E.T.; Dunning, J.R.; Grosse, A.V. Nuclear Fission of separated Uranium Isotopes. Phys. Rev. 1940, 57, 546. [Google Scholar] [CrossRef]Lawrence, E.O. Method and Apparatus for the Acceleration of Ions. U.S. Patent US1948384A, 20 February 1934. [Google Scholar]Yergey, A.L.; Yergey, A.K. Preparative Scale Mass Spectrometry: A Brief History of the Calutron. Am. Soc. Mass Spectrom. 1997, 8, 943–953. [Google Scholar] [CrossRef]Laughter, M.D. Profile of World Uranium Enrichment Programs—2009; ORNL/TM-2009/110; Global Nuclear Security Technology Division: Oak Ridge, TN, USA, 2009. [Google Scholar]Harris, D.R. The impact on archaeology of radiocarbon dating by accelerator mass spectrometry. Philos. Trans. R. Soc. Lond. Ser. A Math. Phys. Sci. 1987, 323, 23–43. [Google Scholar] [CrossRef]Beyer, G.J.; Ruth, T.J. The role of electromagnetic separators in the production of radiotracers for bio-medical research and nuclear medical application. Nucl. Instrum. Methods Phys. Res. Sect. B Beam Interact. Mater. At. 2003, 204, 694–700. [Google Scholar] [CrossRef]Anderton, M.D.; Lloyd, M.J.; Davis, T.P. Suppression of rhenium and osmium production in tungsten by selective isotopic enrichment. Fusion Eng. Des. 2023, 197, 114073. [Google Scholar] [CrossRef]Vrijheid, M. Health effects of residence near hazardous waste landfill sites: A review of epidemiologic literature. Environ. Health Perspect. 2000, 108, 101–112. [Google Scholar] [CrossRef]Vaverková, M.D. Landfill impacts on the environment. Geosciences 2019, 9, 431. [Google Scholar] [CrossRef]
Figure 1.
A depiction of the current recycling pathway indicating the melting, casting, forming, fabrication, end-use, and final disposal of aluminum. The image was reprinted with permission from J.M. Cullen and J.M. Allwood. “Mapping the Global Flow of Aluminum: From Liquid Aluminum to End-Use Goods”, Environmental Science & Technology 47 (2013) 3057–3064 10.1021/es304256s. Copyright 2013 American Chemical Society [7].
Figure 1.
A depiction of the current recycling pathway indicating the melting, casting, forming, fabrication, end-use, and final disposal of aluminum. The image was reprinted with permission from J.M. Cullen and J.M. Allwood. “Mapping the Global Flow of Aluminum: From Liquid Aluminum to End-Use Goods”, Environmental Science & Technology 47 (2013) 3057–3064 10.1021/es304256s. Copyright 2013 American Chemical Society [7].
Figure 3.
Picture of the Alpha Calutron track at the Y-12 Plant in Oak Ridge, TN, USA, that was used in part to perform U isotope separation for the Manhattan Project [35].
Figure 3.
Picture of the Alpha Calutron track at the Y-12 Plant in Oak Ridge, TN, USA, that was used in part to perform U isotope separation for the Manhattan Project [35].
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
MDPI and ACS Style
Lang, E.; Hattar, K.
The Isotopic Limit of Recycling. Sustainability 2024, 16, 9149.
https://doi.org/10.3390/su16219149
AMA Style
Lang E, Hattar K.
The Isotopic Limit of Recycling. Sustainability. 2024; 16(21):9149.
https://doi.org/10.3390/su16219149
Chicago/Turabian Style
Lang, Eric, and Khalid Hattar.
2024. "The Isotopic Limit of Recycling" Sustainability 16, no. 21: 9149.
https://doi.org/10.3390/su16219149
Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.
Article Metrics
| 2024-11-08T12:29:53 | en | train |
42,045,788 | null | 2024-11-04T20:41:51 | null | null | null | null | null | null | [
"true"
] | null | null | null | null | null | null | null | null | train |
42,045,804 | zakqwy | 2024-11-04T20:43:39 | The Circuit Graver, an interesting new way to fab PCBs at home | null | https://hackaday.io/project/197182-the-circuit-graver | 17 | 6 | [
42067357,
42045805,
42048154
] | null | null | null | null | null | null | null | null | null | train |
42,045,808 | yamrzou | 2024-11-04T20:44:00 | A WireGuard Bounce Server (2020) | null | https://gitlab.com/ncmncm/wireguard-bounce-server/-/blob/master/README.md | 3 | 0 | null | null | null | null | null | null | null | null | null | null | train |
42,045,813 | rossant | 2024-11-04T20:44:32 | The Law Must Respond When Science Changes | null | https://www.scientificamerican.com/article/the-law-must-respond-when-science-changes/ | 4 | 1 | [
42047355
] | null | null | null | null | null | null | null | null | null | train |
42,045,816 | pcaharrier | 2024-11-04T20:45:19 | The Constitutional Case Against Exclusionary Zoning (Texas Law Review) | null | https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4728312 | 3 | 5 | [
42048463,
42045875
] | null | null | cut_off | The Constitutional Case Against Exclusionary Zoning | null | See all articles by Joshua Braver |
65 Pages
Posted: 18 Feb 2024
Last revised: 4 Nov 2024
Date Written: February 15, 2024
Abstract
We argue that exclusionary zoning—the imposition of restrictions on the amount and types of housing that property owners are allowed to build— is unconstitutional because it violates the Takings Clause of the Fifth Amendment. Exclusionary zoning has emerged as a major political and legal issue. A broad cross-ideological array of economists and land-use scholars have concluded that it is responsible for massive housing shortages in many parts of the United States, thereby cutting off millions of people – particularly the poor and minorities - from economic and social opportunities. In the process, it also stymies economic growth and innovation, making the nation as a whole poorer. Exclusionary zoning is permitted under Euclid v. Ambler Realty, the 1926 Supreme Court decision holding that exclusionary zoning is largely exempt from constitutional challenge under the Due Process Clause of the Fourteenth Amendment, and by extension also the Takings Clause. Despite the wave of academic and public concern about the issue, so far, no modern in-depth scholarly analysis has advocated overturning or severely limiting Euclid. Nor has any scholar argued that exclusionary zoning should be invalidated under the Takings Clause, more generally. We contend Euclid should be reversed or strictly limited, and that exclusionary zoning restrictions should generally be considered takings requiring compensation. This conclusion follows from both originalism and a variety of leading living constitution theories. Under originalism, the key insight is that property rights protected by the Takings Clause include not only the right to exclude, but also the right to use property. Exclusionary zoning violates this right because it severely limits what owners can build on their land. Exclusionary zoning is also unconstitutional from the standpoint of a variety of progressive living constitution theories of interpretation, including Ronald Dworkin’s “moral reading,” representation-reinforcement theory, and the emerging “anti-oligarchy” constitutional theory. The article also considers different strategies for overruling or limiting Euclid, and potential synergies between constitutional litigation and political reform of zoning.
Keywords: Property rights, zoning, land use, Euclid, eminent domain, public use, constitutional theory, racial discrimination, racism, John Hart Ely, originalism, Takings, representation-reinforcement, Dworkin, moral reading, oligarchy, anti-oligarchy
JEL Classification: K10, K11, H11, H70, O18, J15, J60, J61
Suggested Citation:
Suggested Citation
Braver, Joshua and Somin, Ilya, The Constitutional Case Against Exclusionary Zoning (February 15, 2024). Texas Law Review, Vol. 103, No. 1, pp. 1–64 (2024), George Mason Legal Studies Research Paper No. LS 24-05, Univ. of Wisconsin Legal Studies Research Paper No. 1796, Available at SSRN: https://ssrn.com/abstract=4728312
| 2024-11-08T12:25:08 | en | train |
42,045,822 | Gast | 2024-11-04T20:46:25 | Scientists race to design craft to reach the enigmatic 'Oumuamua' (June 2024) | null | https://www.astronomy.com/science/can-we-catch-oumuamua-interstellar-interloper/ | 3 | 0 | null | null | null | null | null | null | null | null | null | null | train |
42,045,827 | todsacerdoti | 2024-11-04T20:46:59 | Atomic Attributes in Local-First Sync – Adam Wulf | null | https://adamwulf.me/2022/04/atomic-attributes-in-local-first-sync/ | 2 | 0 | null | null | null | null | null | null | null | null | null | null | train |
42,045,830 | NaOH | 2024-11-04T20:47:39 | The Saturn V FUELDRAULIC Gimbal System (1963) | null | https://www.powermotiontech.com/hydraulics/hydraulic-fluids/article/21887406/the-saturn-v-fueldraulic-gimbal-system | 2 | 0 | null | null | null | null | null | null | null | null | null | null | train |
42,045,832 | anindha | 2024-11-04T20:47:46 | null | null | null | 1 | null | [
42045833
] | null | true | null | null | null | null | null | null | null | train |
42,045,844 | esilberstein | 2024-11-04T20:49:01 | null | null | null | 1 | null | [
42045845
] | null | true | null | null | null | null | null | null | null | train |
42,045,884 | lr0 | 2024-11-04T20:55:34 | Is there a 'natural law' of evolution? | null | https://www.science.org/content/article/life-evolves-so-do-minerals-how-about-everything-else | 3 | 0 | null | null | null | no_article | null | null | null | null | 2024-11-08T02:29:38 | null | train |
42,045,890 | tholm | 2024-11-04T20:56:25 | null | null | null | 1 | null | [
42046340,
42046024
] | null | true | null | null | null | null | null | null | null | train |
42,045,892 | rntn | 2024-11-04T20:56:29 | Prime Video's new feature uses generative AI to recap what you're watching | null | https://www.aboutamazon.com/news/entertainment/amazon-prime-video-x-ray-recaps | 3 | 2 | [
42046133,
42046138
] | null | null | null | null | null | null | null | null | null | train |
42,045,912 | SlingrSolutions | 2024-11-04T20:59:42 | null | null | null | 1 | null | [
42045913
] | null | true | null | null | null | null | null | null | null | train |
42,045,922 | danielhanchen | 2024-11-04T21:00:51 | Python 3.11 is 1.25x faster than 3.10 | null | https://docs.python.org/3/whatsnew/3.11.html | 3 | 3 | [
42056110,
42045923,
42047180
] | null | null | null | null | null | null | null | null | null | train |
42,045,944 | diggan | 2024-11-04T21:03:06 | A conceptual model of ATProto and ActivityPub | null | https://fediversereport.com/a-conceptual-model-of-atproto-and-activitypub/ | 9 | 1 | [
42046028
] | null | null | no_error | A conceptual model of ATProto and ActivityPub | 2024-11-04T19:51:27+00:00 | Laurens Hof |
If you were to design an open social networking protocol, what would that look like? Which metaphors and comparisons would you use to get a general idea of how the network functions? What would you answer if people ask if your network is decentralised and federated?
This article is not a deep technical explanation about how either ActivityPub or ATProto work. Instead I want to explain to you have these two protocols have different conceptual models of what an open social network looks like. These conceptual models differ much more from each other than people expect, leading people to apply concepts that come from the ActivityPub world to the ATProto world, in a way that does not fit with the conceptual model that ATProto has.
One of the main subjects of discussion recently has been whether Bluesky is decentralised and if it is federated. I think answering these questions requires a clarity on how ATProto differs conceptually from ActivityPub. Decentralisation and federation are valued for how they impact power structures, but there are multiple ways to build other power structures in open social networks.
A bit of the summary at the top, since that might help during reading:
The conceptual model of ActivityPub resembles that of email: independent servers sending messages to each other.
The conceptual model of ATProto resembles that of the web: independent sites publish data, and indexers aggregate this data into different views and apps.
A conceptual model of ActivityPub and the fediverse
The fediverse1 is a network of independent social networking sites that use the ActivityPub protocol with each other. The conceptual model of the fediverse is that each social networking site, often called a server or instance, is it’s own network that can exist independently. You can set up your own Mastodon server, not connect to any other server, invite some of your friends, and have a fully functional social networking site.
Because each server is its own independent and complete social networking site, it means that each fediverse server is a monolith, that puts all components together in a single place. A fediverse server:
Owns your identity.
Stores your data.
Transforms protocol data into a site with a timeline that you can look at.
Most people run a fediverse server because they want their independent social networking site to join a super-network of interconnected social networking sites; the fediverse. This ‘anyone can run a fediverse server’ is the ‘decentralised’ part of the fediverse. In order for the server to communicate with the rest of the fediverse it does a fourth thing:
Communicates with the rest of the network. In ActivityPub terms: the server gives you an inbox and outbox, and messages flow between these inboxes and outboxes on other servers.
This communication between servers is the ‘federation’ part of the fediverse.
Decentralisation and Federation in the fediverse
The reason to create a super-network of independent social networking sites is one of governance. The fediverse is in many ways a response to the centralised governance under a single billionaire of the current Big Tech platforms, and creates a governance structure where each social networking site is it’s own authority; it has authoritative control over the users on their site, but no authority over any of the other ~30k independent servers.
Decentralisation and federation are crucial for the functioning of the architecture of the fediverse. Decentralisation means that anyone can set up their own social networking site, and federation means that all these independent sites can connect with each other without a single central authority. While these terms often get used as being valuable in itself, I think they should be seen as technical solutions to solve a governance problem: how can we build a social network without a single central authority? Human nature is a funny thing however, and technical solutions to limit authoritative control usually means that chokepoints simply pop up in other places; whether that’s the software that’s used 75% of users being governed by a self-styled ‘benevolent dictator for life’, or server admins having full centralised control over the users on their server.
A conceptual model of ATProto and the ATmosphere
Bluesky PBC2 is also building an open social network with the explicit goal that the network should not be owned by a single company. The protocol they use is called AT Protocol, often called ATProto. The network that is build on top of ATProto is called the ATmosphere. The approach they take to get there is quite different than the one the fediverse takes, however. The conceptual model of ATProto is that every account is it’s own independent place in the ATmosphere3, and every app is an aggregator that takes data from all the places in the ATmosphere and uses them to create their own service.
Every account has its own place to store their data, a Personal Data Server4. This PDS is a simply a database that contains all your own data on ATProto: the posts you made on Bluesky, as well as your RSVP to an event on Smoke Signal.
In turn, every application is an aggregator, similar to how Google is an aggregator of the web. An ATProto app (like Bluesky) takes the data from all the PDSes in the network5. The ‘app’ processes that data, and provides the end-user with a ‘view’ on that data. As such, these applications on ATProto are called AppViews.
In the case of Bluesky, they take all the microblogging posts stored on all the PDSes in the ATmosphere, aggregate them together. This aggregation allows Bluesky to give users the Discover feed, count the number of likes on a post, among other things. It is then presented (the ‘view’) to the user in a format that resembles Twitter6. But other AppViews are also possible: WhiteWind is a blogging platform build on ATProto: it allows you to write blogs, and if you use WhiteWind to write a blog posts, these posts are also stored in the same PDS that stores your Bluesky data. The WhiteWind application (AppView) aggregates data from the entire ATmosphere, and takes both WhiteWind-style blog posts, as well as Bluesky’s microblogs. The View WhiteWind presents on their site is blog posts, and with Bluesky’s microblogs functioning as a sort of comment section7.
In short, the conceptual model of ATProto is has some resembles to how the web works. The web has many independent websites, and indexers such as Google aggregate the websites and present it back to users in their own ‘view’. Similarly, the ATmosphere has contains of many PDSes, and AppViews aggregate this data into a product for users.
Independence, openness and power on ATProto
As the question ‘Is Bluesky decentralised and federated’ is the greatest thread in the history of forums, and the discussion is still not locked by moderators after 12,239 pages of debate, it’s worth taking a step back at what these concepts are meant to accomplish. Decentralisation and federation in the fediverse mean an open network that anyone can join without any without centralised control.
Anyone can run their own PDS and be a full part of the network, without needing any centralised permission. Anyone can run their own AppView8, and build their own product in the ATmosphere, without needing permission by any centralised authority. They can even reuse Bluesky’s data for their own purposes, like WhiteWind does. On first glance, this seems pretty decentralised.
The question of federation becomes more complicated: who can communicate with what exactly? Any AppView can communicate with the PDSes, is that federation? The PDSes cannot communicate with each other directly (so no federation?) but do so via AppViews (so maybe federation?) What about AppViews communicating with each other? Picosky and IRCsky are two different AppViews that both allow you to chat over ATProto, and see the same chat messages. Are these two AppViews federated? And how many individual parts of the system need to federate before you can describe the entire ATmosphere as federated? I don’t know the answer to all of this, but I’m personally trending towards: are we even asking the right questions here?
To make matters even more complicated; many people are not asking the question ‘is the ATmosphere decentralised’, but are wondering ‘is Bluesky decentralised’? Here the ATmosphere take a different direction than the fediverse. The answer for the ATmosphere is not: ‘there should be many versions of the Bluesky app so users can switch to another app’. Having many instances of the Bluesky app provides no real additional benefit to making the network more open and less controlled by a single point of authority.9 Instead, the conceptual model of how the ATmosphere is defending itself against an AppView turning ‘bad’, is to have competing different AppViews where people can switch to instead. Bluesky PBC hopes that there will be a hypothetical GreenCloud AppView, which does microblogging slightly differently than Bluesky. This way, people have a different app they can use, in case the Bluesky app does not suffice.
The hypothetical GreenCloud microblogging app build on ATProto does not actually exist. But the code for the Bluesky app is available as open source10, anyone can run their own Bluesky if they want to. The interesting problem here is that nobody has done so: running a competing service to Bluesky is totally possible, but why would you? It costs money, time and expertise to do so, and there is little gain to doing so.
How applicable the concepts of decentralisation and federation are to the ATmosphere is debatable, but they are used as an approximation for the core question: how is power distributed in the network? And Bluesky and the ATmosphere make it clear that technological architecture can only help so much here: Sure, you can be completely independent of Bluesky PBC on the ATmosphere, as everything is open. But in the end, 99% of users are exclusively on infrastructure owned by Bluesky PBC. No technological architecture can compensate for that kind of the power distribution.
This is not lost on Bluesky PBC and their investors either. Blockchain Capitol, lead investor in the series A, has the investment thesis that the value is in growing the ATmosphere, writing that they are “investing in more than a product but rather a vision of what social infrastructure could be”. The challenge here is clear: get more people to build products on ATProto. The sales pitch is attractive: there is a social graph with 13 million accounts that are free for the taking for any developer to build on top upon. The sales pitch is also unusual though: Bluesky PBC is asking for other organisations and companies to be their competitors so that both can contribute to a growing ecosystem. How this will work out remains an open question.
On Identity
Technological solutions to prevent control of chokepoints usually mean that these chokepoints simply pop up in different places, and the ATmosphere is no different than the fediverse in this regard. This explanation of how the ATmosphere works, is missing a crucial part: how Decentralised Identity works on ATProto. Explaining how the system in detail is the subject of my next article. And that system might just be both more centralised than people expect, more decentralised than people think, and it’s most centralising aspect might just be… a clock.
Notes
The fediverse is defined here by the Mastodon-dominant supernetwork that mostly uses ActivityPub and is mostly is used for microblogging, with some link-aggregators on Lemmy, some video on PeerTube on the side. I’m aware that this definition does not cover the entirety of the network, as well as that you can contest every word in that definition. But its a close enough approximation for how the word is used in casual day-to-day life. ↩︎For clarity, ‘Bluesky PBC’ refers to the Bluesky Public Benefit Company, while ‘Bluesky’ refers to the microblogging app made by Bluesky PBC. ↩︎See also Paul Frazee’s thread on how every user is basically a website. I hesitate to use the term website here, as that comes with certain preconceived notions of what a website is, and a PDS repository is different in some manners. Maybe over time it will turn out that the equivalence of ‘PDS repo’ with ‘website’ will makes sense to people however, I’m unsure. ↩︎Technically, a repository on a PDS, a PDS can contain the repositories for many different accounts. ↩︎This is mostly done via a Relay. Relays are an optional part of the network, and can best be seen as an extension of an AppView. This extension is in itself also flexible, multiple AppViews can use the same Relay. ↩︎The extra step here is that the AppView sends data to your client, such as the bsky.app website, the official mobile clients or a third-party client like deck.blue ↩︎Example of a WhiteWind blog that combines Bluesky’s microblogs here. ↩︎And/or run their own Relays, which multiple people are in fact doing. ↩︎This is the problem that the fediverse has; there are 10k Mastodon servers, accounting for 80% of active users, but the software is controlled by a single person. Many concurrent deployments of the same software does not reduce the amount of control that this software has, it arguably increases the control instead. ↩︎The core functionalities all are, some parts are not. ↩︎ | 2024-11-08T13:55:50 | en | train |
42,045,978 | null | 2024-11-04T21:06:55 | null | null | null | null | null | null | [
"true"
] | null | null | null | null | null | null | null | null | train |
42,045,996 | geox | 2024-11-04T21:08:42 | Japan plans automated cargo transport system to relieve shortage of drivers | null | https://apnews.com/article/japan-transport-delivery-trucking-labor-1c5b3524bce93e7e460dd735cbeab6c4 | 6 | 2 | [
42046010
] | null | null | null | null | null | null | null | null | null | train |
42,046,009 | joelanman | 2024-11-04T21:10:57 | Gov.uk Forms open source on GitHub | null | https://github.com/alphagov/forms | 38 | 3 | [
42052103,
42046059,
42055728,
42067478
] | null | null | null | null | null | null | null | null | null | train |
42,046,037 | mixeden | 2024-11-04T21:14:20 | Source Identification by Consensus-Based Optimization | null | https://synthical.com/article/Source-Identification-by-Consensus-Based-Optimization-8e006f42-f9b5-44c6-b493-703334a45bbb | 1 | 0 | null | null | null | null | null | null | null | null | null | null | train |
42,046,039 | trinsic2 | 2024-11-04T21:14:45 | Obsidian's Ownership Model | null | https://forum.obsidian.md/t/obsidian-ownership-model/91005 | 2 | 1 | [
42046040
] | null | null | null | null | null | null | null | null | null | train |
42,046,051 | toomuchtodo | 2024-11-04T21:16:10 | The West Needs Incentives to Cut Russian Nuclear Fuel Dependence | null | https://oilprice.com/Latest-Energy-News/World-News/The-West-Needs-Incentives-to-Cut-Russian-Nuclear-Fuel-Dependence.html | 3 | 0 | [
42046142
] | null | null | null | null | null | null | null | null | null | train |
42,046,094 | BitterCritter | 2024-11-04T21:22:11 | Power over Skin | null | https://hackaday.com/2024/11/04/power-over-skin-makes-powering-wearables-easier/ | 2 | 0 | null | null | null | null | null | null | null | null | null | null | train |
42,046,110 | jle | 2024-11-04T21:23:44 | Functors to Monads: A Story of Shapes | null | https://blog.jle.im/entry/functors-to-monads-a-story-of-shapes.html | 2 | 0 | null | null | null | null | null | null | null | null | null | null | train |
42,046,124 | sandwichsphinx | 2024-11-04T21:24:42 | URAvatar: Universal Relightable Gaussian Codec Avatars | null | https://arxiv.org/abs/2410.24223 | 2 | 0 | null | null | null | null | null | null | null | null | null | null | train |
42,046,134 | enriquepablo | 2024-11-04T21:25:51 | Designing a Conscious Machine | null | https://github.com/enriquepablo/book/blob/main/ch1.md | 2 | 5 | [
42047024,
42046135
] | null | null | null | null | null | null | null | null | null | train |
42,046,156 | mkotowski | 2024-11-04T21:27:19 | Did You Know? Windows Has Never Had a "System Tray" (2021) | null | https://www.howtogeek.com/685748/did-you-know-windows-has-never-had-a-system-tray/ | 7 | 4 | [
42046556,
42047533,
42047966
] | null | null | null | null | null | null | null | null | null | train |
42,046,162 | JustinGarrison | 2024-11-04T21:28:08 | Talos Linux vs. Flatcar | null | https://www.siderolabs.com/blog/talos-linux-vs-flatcar/ | 5 | 0 | null | null | null | null | null | null | null | null | null | null | train |
42,046,171 | 0x002A | 2024-11-04T21:29:05 | Richard A. Cash, who saved millions from dehydration, has died | null | https://www.nytimes.com/2024/11/02/science/richard-cash-dead.html | 3 | 0 | null | null | null | bot_blocked | nytimes.com | null | null | Please enable JS and disable any ad blocker | 2024-11-08T14:08:30 | null | train |
42,046,172 | PolarBear2024 | 2024-11-04T21:29:07 | null | null | null | 1 | null | [
42046173
] | null | true | null | null | null | null | null | null | null | train |
42,046,196 | unpredict | 2024-11-04T21:32:04 | Albertsons kills rural grocers with land use restrictions | null | https://www.thebignewsletter.com/p/how-albertsons-kills-rural-grocers | 279 | 302 | [
42046428,
42046301,
42046657,
42046314,
42047006,
42047004,
42046337,
42046528,
42046714,
42046389,
42047601,
42047450,
42046315,
42046536,
42047494,
42047362,
42047584,
42046275,
42046476,
42046282,
42046409
] | null | null | null | null | null | null | null | null | null | train |
42,046,202 | PaulHoule | 2024-11-04T21:32:51 | Everything You Need to Know About Batman: Arkham Shadow | null | https://kotaku.com/batman-arkham-shadow-vr-meta-quest-3-release-1851678256 | 1 | 0 | null | null | null | null | null | null | null | null | null | null | train |
42,046,208 | mgh2 | 2024-11-04T21:33:44 | null | null | null | 1 | null | null | null | true | null | null | null | null | null | null | null | train |
42,046,211 | yuppiepuppie | 2024-11-04T21:34:19 | A Simple Obsidian-GitHub Pages Blog Setup | null | https://andrew.grahamyooll.com/blog/Obsidian-Github-Pages-Blog-Workflow/ | 2 | 0 | null | null | null | null | null | null | null | null | null | null | train |
42,046,213 | Teever | 2024-11-04T21:34:45 | In some areas of military strength, China has surpassed America | null | https://www.economist.com/china/2024/11/04/in-some-areas-of-military-strength-china-has-surpassed-america | 19 | 23 | [
42046530,
42046887,
42047089,
42046862
] | null | null | null | null | null | null | null | null | null | train |
42,046,230 | conroy | 2024-11-04T21:36:44 | Updating Simon Willison's ReAct implementation for 2024 | null | https://riza.io/blog/willison-react-pattern | 2 | 0 | null | null | null | null | null | null | null | null | null | null | train |
42,046,235 | DailyMarketNews | 2024-11-04T21:37:03 | null | null | null | 1 | null | null | null | true | null | null | null | null | null | null | null | train |
42,046,247 | tintinnabula | 2024-11-04T21:38:05 | The Long Road to End Tuberculosis | null | https://www.asimov.press/p/end-tb | 2 | 0 | null | null | null | null | null | null | null | null | null | null | train |
42,046,295 | alvatech | 2024-11-04T21:46:36 | Perplexity CEO offers AI company's services to replace striking NYT staff | null | https://techcrunch.com/2024/11/04/perplexity-ceo-offers-ai-companys-services-to-replace-striking-nyt-staff/ | 81 | 64 | [
42046592,
42046822,
42046978,
42046748,
42046566,
42046468,
42048540,
42046779,
42046774,
42046756,
42047706,
42046423,
42046816,
42046807,
42046812,
42046426,
42046757,
42046806,
42046857,
42046501
] | null | null | null | null | null | null | null | null | null | train |
42,046,296 | leotravis10 | 2024-11-04T21:46:37 | The End of Independent Publishing and Giant Freakin Robot | null | https://www.giantfreakinrobot.com/ent/independent-ends.html | 4 | 0 | null | null | null | null | null | null | null | null | null | null | train |
42,046,297 | rbanffy | 2024-11-04T21:46:44 | The Gift That Keeps on Giving to Apple and Google – Communications of the ACM | null | https://cacm.acm.org/blogcacm/the-gift-that-keeps-on-giving-to-apple-and-google/ | 2 | 0 | null | null | null | null | null | null | null | null | null | null | train |
42,046,299 | rbanffy | 2024-11-04T21:46:54 | Programmer Collaboration Styles – By Adam Ard | null | https://rethinkingsoftware.substack.com/p/programmer-collaboration-styles | 1 | 0 | null | null | null | null | null | null | null | null | null | null | train |
42,046,316 | rbanffy | 2024-11-04T21:48:19 | Generative AI Has an E-Waste Problem | null | https://spectrum.ieee.org/e-waste | 9 | 4 | [
42046912,
42046832,
42046804,
42046951
] | null | null | no_error | Generative AI Has a Massive E-Waste Problem | 2024-11-04T13:00:04Z | Katherine Bourzac | Private investment in generative AI has grown from about US $3 billion in 2022 to $25 billion in 2023, and about 80 percent of private companies expect AI to drive their business in the next 3 years, according to Deloitte. Keeping up with the latest advancements means upgrading GPUs, CPUs, and other electronic equipment in data centers as newer, more advanced chips become available. And that, researchers project, will lead to an explosion in the production of electronic waste.A study published last week in the journal Nature Computational Science estimates that aggressive adoption of large language models (LLMs) alone will generate 2.5 million tonnes of e-waste per year by 2030.“AI doesn’t exist in a vacuum; it relies on substantial hardware resources that have tangible environmental footprints,” says study coauthor Asaf Tzachor, a sustainability and climate researcher at Reichman University, in Israel. “Awareness of the e-waste issue is crucial for developing strategies that mitigate negative environmental impacts while allowing us to reap the benefits of AI advancements,” he says.Most research on AI sustainability has focused on these models’ energy and water use and their concomitant carbon emissions. Tzachor worked with Peng Wang and Wei-Qiang Chen, both professors at the Chinese Academy of Sciences, to calculate the potential increase in e-waste associated with generative AI. The study is intended to provide an estimate of the potential scale of the problem, and the researchers hope it will spur companies to adopt more sustainable practices.The Scale of the E-Waste ProblemElectronic waste contains toxic metals and other chemicals that can leach out into the environment and cause health problems. In 2022, the world produced 62 million tonnes of e-waste in total, according to the United Nations Global E-waste Monitor. This waste stream is growing five times as fast as recycling programs, the U.N. found.In the coming years, AI could make a significant contribution to the problem. Tzachor says e-waste associated with generative AI includes discarded GPUs, CPUs, batteries used for backup power in data centers, memory modules, and printed circuit boards.The study details four potential scenarios for generative AI adoption—ranging from limited to aggressive expansion—and projects potential e-waste expansion from a 2023 baseline of 2,600 tons per year. Limited expansion of AI use would generate a total of 1.2 million tonnes of e-waste from 2023 to 2030; aggressive use would result in a total of 5 million tonnes over that period. Tzachor says given current trends, the aggressive scenario is most likely.The study isn’t comprehensive—it considers only large language models, not other forms of generative AI. Tzachor says the team focused on LLMs because they’re among the most computationally intensive. “Including other forms of AI would increase the projected e-waste figures,” Tzachor says.What Can Be Done to Reduce AI’s E-Waste?In theory, adopting more advanced chips should help server farms do more with less, and produce less waste. But each upgrade results in a net increase in the waste stream. And given current trade restrictions on semiconductors, upgrading is not always an option. Countries that don’t have access to the most advanced chips may generate more waste as a result. A one-year delay in upgrading to the latest chips will result in a 14 percent increase in e-waste, according to the study.One of the best ways to mitigate this AI waste stream is to find ways to reuse electronic equipment—what Tzachor calls downcycling. Servers that are no longer cutting edge can be repurposed for hosting websites or doing more basic data processing tasks, or they can be donated to educational institutions. Most tech companies—including Amazon, Google, and Meta—have announced sustainability goals that focus on carbon footprints and using green energy. And Microsoft has pledged to limit e-waste production from its data centers. But Tzachor says regulation may be needed to ensure adherence to the best practices around AI e-waste. “Companies should have incentives to adopt these strategies,” he says. | 2024-11-08T12:31:57 | en | train |
42,046,318 | EvaPeters | 2024-11-04T21:48:26 | Psp cost | null | https://unipaygateway.com/unipay-gateway/costs-of-becoming-a-payment-service-provider/ | 1 | 1 | [
42046319
] | null | null | null | null | null | null | null | null | null | train |
42,046,323 | saipradeep7 | 2024-11-04T21:48:59 | null | null | null | 1 | null | [
42046324
] | null | true | null | null | null | null | null | null | null | train |
42,046,326 | amadeuspagel | 2024-11-04T21:49:13 | Why are Normal Distributions Normal? [pdf] | null | https://aidanlyon.com/normal_distributions.pdf | 3 | 0 | null | null | null | null | null | null | null | null | null | null | train |
42,046,330 | iacguy | 2024-11-04T21:50:02 | Show HN: Generate OPA policies for Terraform with natural language prompts | null | https://policygenie.co/ | 1 | 0 | null | null | null | null | null | null | null | null | null | null | train |
42,046,332 | odo1242 | 2024-11-04T21:50:36 | Robinhood: Introducing the Presidential Election Market | null | https://go.robinhood.com/election | 5 | 7 | [
42046474,
42046703,
42046457,
42050494
] | null | null | null | null | null | null | null | null | null | train |
42,046,333 | johnyzee | 2024-11-04T21:50:38 | null | null | null | 1 | null | null | null | true | null | null | null | null | null | null | null | train |
42,046,352 | null | 2024-11-04T21:52:46 | null | null | null | null | null | null | [
"true"
] | null | null | null | null | null | null | null | null | train |
42,046,358 | miles | 2024-11-04T21:53:30 | FBI Warns Gmail, Outlook, AOL, Yahoo Users–Hackers Gain Access to Accounts | null | https://www.forbes.com/sites/zakdoffman/2024/11/03/fbi-warns-gmail-outlook-aol-yahoo-users-hackers-gain-access-to-accounts/ | 14 | 1 | [
42047592
] | null | null | no_error | FBI Warns Gmail, Outlook, AOL And Yahoo Users—Hackers Gain Access To Accounts | null | Zak Doffman | FBI issues new warning for Gmail, Outlook, webmail users NurPhoto via Getty Images
Updated on November 3 with new reports into passkey adoption as alternative to MFA, with new updates to widen take-up further, resolving key challenges.
“Cybercriminals are gaining access to email accounts,” the FBI warned this week, even when accounts are protected by multifactor authentication (MFA). Attacks begin when users are lured into “visiting suspicious websites or click on phishing links that download malicious software onto their computer.”
Email access itself comes by way of cookie theft. Not the devilish tracking cookies that we read so much about, and which caused havoc when Google reversed its promise to eradicate them from Chrome. These are session cookies or security cookies or “remember me” cookies. They store credentials to stop you having to log in every time you visit a website or access one of your accounts.
ForbesGoogle Issues Cookie Theft Warning—But Has A Clever New FixThe threat affects all email platforms providing web logins, albeit Gmail, Outlook, Yahoo and AOL are by far the largest. The same threat clearly impacts other accounts as well, including shopping sites and financial platforms, albeit there are now often additional protections in place, especially with financial accounts. MFA is not usually stored in the same way, and criminals use other means to steal live codes.
“Many users across the web are victimized by cookie theft malware,” Google has warned, “giving attackers access to their web accounts.” While “fundamental to the modern web... due to their powerful utility,” Google describes security cookies as “a lucrative target for attackers,” and that problem is getting worse.
“Typically, this type of cookie is generated when a user clicks the ‘Remember this device’ checkbox when logging in to a website,” the FBI explains. “If a cybercriminal obtains the Remember-Me cookie from a user’s recent login to their web email, they can use that cookie to sign-in as the user without needing their username, password, or multifactor authentication (MFA).”
Cookie theft has been much in the news recently, with ongoing efforts from Google and others to prevent such thefts from Chrome and other browsers. These latest such initiatives focus on linking cookies to devices and apps, rendering thefts useless. But we’re at an early stage and cookie theft remains a major threat.
“Cybercriminals are increasingly focused on stealing Remember-Me cookies and using them as their preferred way of accessing a victim’s email,” the FBI warns, but provides four suggested actions “to protect yourself from putting yourself at risk:
Regularly clear your cookies from your Internet browser.
Recognize the risks of clicking the ‘Remember Me’ checkbox when logging into a website.
Do not click on suspicious links or websites. Only visit sites with a secure connection (HTTPS) to protect your data from being intercepted during transmission.
Periodically monitor the recent device login history from your account settings.”
As ever, if you think you may have fallen victim to this or any other cybercrime, you can report it to the FBI’s Internet Crime Complaint Center (IC3) at www.ic3.gov.
The FBI’s latest warning on MFA compromises should in no way discourage any users from setting MFA up on all accounts where it’s available. It is the single best step you can take to secure your accounts. And allied with good housekeeping on what you download, install, click and open, it can keep your safe.
The importance of MFA has been neatly summed up with the response to Amazon finally adding MFA to its enterprise email service. “Better late than never appears to be the justification behind the near-decade delay,” reported TechRadar on Friday, “especially for one of the most basic forms of identity verification that has been standard practice for several years now,” warning “there are still hurdles to enabling MFA for WorkMail, as it will not be enabled by default and system administrators will have to manually add each user to the AWS Identity Center.”
ForbesWhy You Should Buy A New Microsoft Windows PC In 2025By Zak DoffmanThe Register echoed this sentiment. “The fact that a security service as simple as MFA was missing from something that so desperately needs it - an enterprise email platform run by one of the biggest (if not the biggest) cloud services providers in the world - is shocking, frankly.”
Any MFA is better than none—period. But there is clearly a spectrum of security, and not all solutions are the same. Passkeys are best when available—they link credentials to device security, akin to a physical security key without the hassle of using an actual physical security key. But if all you have available is an SMS one-time code, then using that is better than leaving your security password only—every time.
The good news for users is that passkeys are catching fire. According to a new report from the FIDO Alliance, “in the two years since passkeys were announced and made available for consumer use, passkey awareness has risen by 50%, from 39% familiar in 2022 to 57% in 2024.” Passkeys are far and away the easiest alternative to the combination of a username and password and the MFA you should always use when available. They stop unauthorized access to an account unless an attacker has full control over one of your secure devices, essentially purporting to be you.
“The majority of those familiar with passkeys are enabling the technology to sign in,” FIDA says. “Meanwhile, despite passwords remaining the most common way for account sign-in, usage overall has declined as alternatives rise in availability.”The surge in passkey adoptionFIDO
Putting aide the security benefits of passkeys, FIDO also points out the benefits to brands and services platforms that now offer this as an option. “42% of people have abandoned a purchase at least once in the past month because they could not remember their password,” it says, adding that “this increases to 50% for those aged 25- 34 versus just 17% for over 65s,” which raises a different issue.
Echoing the FBI warning, FIDO also says that “over half of consumers reported an increase in the number of suspicious messages they notice and an increase in scam sophistication, driven by AI. Younger generations are even more likely to agree, while older generations remain unsure how AI impacts their online security.”
FIDO’s new report shows passkey take-up is highest where linked to the ease of biometric device security. This seamless approach to securing one’s identity is the same driver behind the viral rise in Apple Pay, Google Pay and other digital wallets.
While passkeys are primarily aimed at the consumer/home market, moves are now afoot to extend this into enterprises. As 9to5mac has just reported, “the FIDO Alliance has taken a big step toward improving the usability of passkeys by introducing two new draft specs: the Credential Exchange Protocol (CXP) and the Credential Exchange Format (CXF). These proposals are designed to solve a key issue slowing the adoption of passkeys in the enterprise: vendor lock-in.”ForbesNew Microsoft Windows Attacks—Stop Doing This Now, US Government Warns UsersBy Zak DoffmanThese new specifications should create a “standardized, secure way to transfer passkeys between different password managers without removing and re-adding from each platform,” which matters more for enterprises than users already locked into their iPhone, Android or password manager ecosystem.
“By standardizing how passkeys are managed and transferred,” 9to5mac suggests, “the new specifications will help businesses and consumers have more freedom in choosing the best tools for their needs without being locked into a single ecosystem. Over time, this will drive broader adoption of passkeys, further pushing the shift away from passwords, often the weakest link in personal and organizational security.”
| 2024-11-07T09:39:21 | en | train |
42,046,371 | colek42 | 2024-11-04T21:54:47 | Shifting Compliance Left – A Letter to Compliance Teams | null | https://productgovernance.substack.com/p/shifting-compliance-left | 2 | 0 | null | null | null | null | null | null | null | null | null | null | train |
42,046,372 | AnhTho_FR | 2024-11-04T21:54:50 | Hugs [video] | null | https://www.youtube.com/watch?v=m6CGGPbwHCY | 1 | 0 | null | null | null | null | null | null | null | null | null | null | train |
42,046,378 | pandry | 2024-11-04T21:56:01 | Apple's new AI ad: Catch Up Quick [video] | null | https://www.youtube.com/watch?v=BK8bnkcT0Ng | 1 | 0 | null | null | null | null | null | null | null | null | null | null | train |
42,046,382 | null | 2024-11-04T21:56:28 | null | null | null | null | null | [
42046383
] | [
"true"
] | null | null | null | null | null | null | null | null | train |
42,046,392 | ghd_ | 2024-11-04T21:58:01 | Ask HN: Resources to prepare to a none-technical interview? | I've a "soft-skills" interview very soon with one of the most important companies in my country, what are some resources for a good interview preparation that I can use that focuses in soft skills questions, like situations, introduce yourself, etc..<p>Thanks in advance! | null | 6 | 1 | [
42049800
] | null | null | null | null | null | null | null | null | null | train |
42,046,393 | normansomething | 2024-11-04T21:58:06 | null | null | null | 1 | null | null | null | true | null | null | null | null | null | null | null | train |
42,046,399 | matt_d | 2024-11-04T21:58:31 | Function Effect Analysis – Clang 20.0.0 | null | https://clang.llvm.org/docs/FunctionEffectAnalysis.html | 1 | 0 | null | null | null | null | null | null | null | null | null | null | train |
42,046,402 | edward | 2024-11-04T21:59:12 | Claude 3.5 Haiku | null | https://simonwillison.net/2024/Nov/4/haiku/ | 4 | 1 | [
42046439,
42047177
] | null | null | null | null | null | null | null | null | null | train |
42,046,411 | rgbrgb | 2024-11-04T22:01:00 | Graphile-worker: High performance Node.js/PostgreSQL job queue | null | https://github.com/graphile/worker | 2 | 0 | null | null | null | no_error | GitHub - graphile/worker: High performance Node.js/PostgreSQL job queue (also suitable for getting jobs generated by PostgreSQL triggers/functions out into a different work queue) | null | graphile |
graphile-worker
Job queue for PostgreSQL running on Node.js - allows you to run jobs (e.g.
sending emails, performing calculations, generating PDFs, etc) "in the
background" so that your HTTP response/application code is not held up. Can be
used with any PostgreSQL-backed application. Pairs beautifully with
PostGraphile or
PostgREST.
Website at worker.graphile.org
Crowd-funded open-source software
To help us develop this software sustainably, we ask all individuals and
businesses that use it to help support its ongoing maintenance and development
via sponsorship.
Click here to find out more about sponsors and sponsorship.
And please give some love to our featured sponsors 🤩:
* Sponsors the entire Graphile suite
| 2024-11-08T12:33:47 | en | train |
42,046,418 | sandwichsphinx | 2024-11-04T22:01:37 | Learn Awk in Y Minutes | null | https://learnxinyminutes.com/docs/awk/ | 12 | 5 | [
42047235,
42055033,
42047175
] | null | null | no_error | Learn X in Y Minutes: Scenic Programming Language Tours | null | null | AWK is a standard tool on every POSIX-compliant UNIX system. It’s like
flex/lex, from the command-line, perfect for text-processing tasks and
other scripting needs. It has a C-like syntax, but without mandatory
semicolons (although, you should use them anyway, because they are required
when you’re writing one-liners, something AWK excels at), manual memory
management, or static typing. It excels at text processing. You can call to
it from a shell script, or you can use it as a stand-alone scripting language.Why use AWK instead of Perl? Readability. AWK is easier to read
than Perl. For simple text-processing scripts, particularly ones that read
files line by line and split on delimiters, AWK is probably the right tool for
the job.#!/usr/bin/awk -f
# Comments are like this
# AWK programs consist of a collection of patterns and actions.
pattern1 { action; } # just like lex
pattern2 { action; }
# There is an implied loop and AWK automatically reads and parses each
# record of each file supplied. Each record is split by the FS delimiter,
# which defaults to white-space (multiple spaces,tabs count as one)
# You can assign FS either on the command line (-F C) or in your BEGIN
# pattern
# One of the special patterns is BEGIN. The BEGIN pattern is true
# BEFORE any of the files are read. The END pattern is true after
# an End-of-file from the last file (or standard-in if no files specified)
# There is also an output field separator (OFS) that you can assign, which
# defaults to a single space
BEGIN {
# BEGIN will run at the beginning of the program. It's where you put all
# the preliminary set-up code, before you process any text files. If you
# have no text files, then think of BEGIN as the main entry point.
# Variables are global. Just set them or use them, no need to declare.
count = 0;
# Operators just like in C and friends
a = count + 1;
b = count - 1;
c = count * 1;
d = count / 1; # integer division
e = count % 1; # modulus
f = count ^ 1; # exponentiation
a += 1;
b -= 1;
c *= 1;
d /= 1;
e %= 1;
f ^= 1;
# Incrementing and decrementing by one
a++;
b--;
# As a prefix operator, it returns the incremented value
++a;
--b;
# Notice, also, no punctuation such as semicolons to terminate statements
# Control statements
if (count == 0)
print "Starting with count of 0";
else
print "Huh?";
# Or you could use the ternary operator
print (count == 0) ? "Starting with count of 0" : "Huh?";
# Blocks consisting of multiple lines use braces
while (a < 10) {
print "String concatenation is done" " with a series" " of"
" space-separated strings";
print a;
a++;
}
for (i = 0; i < 10; i++)
print "Good ol' for loop";
# As for comparisons, they're the standards:
# a < b # Less than
# a <= b # Less than or equal
# a != b # Not equal
# a == b # Equal
# a > b # Greater than
# a >= b # Greater than or equal
# Logical operators as well
# a && b # AND
# a || b # OR
# In addition, there's the super useful regular expression match
if ("foo" ~ "^fo+$")
print "Fooey!";
if ("boo" !~ "^fo+$")
print "Boo!";
# Arrays
arr[0] = "foo";
arr[1] = "bar";
# You can also initialize an array with the built-in function split()
n = split("foo:bar:baz", arr, ":");
# You also have associative arrays (indeed, they're all associative arrays)
assoc["foo"] = "bar";
assoc["bar"] = "baz";
# And multi-dimensional arrays, with some limitations I won't mention here
multidim[0,0] = "foo";
multidim[0,1] = "bar";
multidim[1,0] = "baz";
multidim[1,1] = "boo";
# You can test for array membership
if ("foo" in assoc)
print "Fooey!";
# You can also use the 'in' operator to traverse the keys of an array
for (key in assoc)
print assoc[key];
# The command line is in a special array called ARGV
for (argnum in ARGV)
print ARGV[argnum];
# You can remove elements of an array
# This is particularly useful to prevent AWK from assuming the arguments
# are files for it to process
delete ARGV[1];
# The number of command line arguments is in a variable called ARGC
print ARGC;
# AWK has several built-in functions. They fall into three categories. I'll
# demonstrate each of them in their own functions, defined later.
return_value = arithmetic_functions(a, b, c);
string_functions();
io_functions();
}
# Here's how you define a function
function arithmetic_functions(a, b, c, d) {
# Probably the most annoying part of AWK is that there are no local
# variables. Everything is global. For short scripts, this is fine, even
# useful, but for longer scripts, this can be a problem.
# There is a work-around (ahem, hack). Function arguments are local to the
# function, and AWK allows you to define more function arguments than it
# needs. So just stick local variable in the function declaration, like I
# did above. As a convention, stick in some extra whitespace to distinguish
# between actual function parameters and local variables. In this example,
# a, b, and c are actual parameters, while d is merely a local variable.
# Now, to demonstrate the arithmetic functions
# Most AWK implementations have some standard trig functions
d = sin(a);
d = cos(a);
d = atan2(b, a); # arc tangent of b / a
# And logarithmic stuff
d = exp(a);
d = log(a);
# Square root
d = sqrt(a);
# Truncate floating point to integer
d = int(5.34); # d => 5
# Random numbers
srand(); # Supply a seed as an argument. By default, it uses the time of day
d = rand(); # Random number between 0 and 1.
# Here's how to return a value
return d;
}
function string_functions( localvar, arr) {
# AWK, being a string-processing language, has several string-related
# functions, many of which rely heavily on regular expressions.
# Search and replace, first instance (sub) or all instances (gsub)
# Both return number of matches replaced
localvar = "fooooobar";
sub("fo+", "Meet me at the ", localvar); # localvar => "Meet me at the bar"
gsub("e", ".", localvar); # localvar => "M..t m. at th. bar"
# Search for a string that matches a regular expression
# index() does the same thing, but doesn't allow a regular expression
match(localvar, "t"); # => 4, since the 't' is the fourth character
# Split on a delimiter
n = split("foo-bar-baz", arr, "-");
# result: a[1] = "foo"; a[2] = "bar"; a[3] = "baz"; n = 3
# Other useful stuff
sprintf("%s %d %d %d", "Testing", 1, 2, 3); # => "Testing 1 2 3"
substr("foobar", 2, 3); # => "oob"
substr("foobar", 4); # => "bar"
length("foo"); # => 3
tolower("FOO"); # => "foo"
toupper("foo"); # => "FOO"
}
function io_functions( localvar) {
# You've already seen print
print "Hello world";
# There's also printf
printf("%s %d %d %d\n", "Testing", 1, 2, 3);
# AWK doesn't have file handles, per se. It will automatically open a file
# handle for you when you use something that needs one. The string you used
# for this can be treated as a file handle, for purposes of I/O. This makes
# it feel sort of like shell scripting, but to get the same output, the
# string must match exactly, so use a variable:
outfile = "/tmp/foobar.txt";
print "foobar" > outfile;
# Now the string outfile is a file handle. You can close it:
close(outfile);
# Here's how you run something in the shell
system("echo foobar"); # => prints foobar
# Reads a line from standard input and stores in localvar
getline localvar;
# Reads a line from a pipe (again, use a string so you close it properly)
cmd = "echo foobar";
cmd | getline localvar; # localvar => "foobar"
close(cmd);
# Reads a line from a file and stores in localvar
infile = "/tmp/foobar.txt";
getline localvar < infile;
close(infile);
}
# As I said at the beginning, AWK programs consist of a collection of patterns
# and actions. You've already seen the BEGIN pattern. Other
# patterns are used only if you're processing lines from files or standard
# input.
#
# When you pass arguments to AWK, they are treated as file names to process.
# It will process them all, in order. Think of it like an implicit for loop,
# iterating over the lines in these files. these patterns and actions are like
# switch statements inside the loop.
/^fo+bar$/ {
# This action will execute for every line that matches the regular
# expression, /^fo+bar$/, and will be skipped for any line that fails to
# match it. Let's just print the line:
print;
# Whoa, no argument! That's because print has a default argument: $0.
# $0 is the name of the current line being processed. It is created
# automatically for you.
# You can probably guess there are other $ variables. Every line is
# implicitly split before every action is called, much like the shell
# does. And, like the shell, each field can be access with a dollar sign
# This will print the second and fourth fields in the line
print $2, $4;
# AWK automatically defines many other variables to help you inspect and
# process each line. The most important one is NF
# Prints the number of fields on this line
print NF;
# Print the last field on this line
print $NF;
}
# Every pattern is actually a true/false test. The regular expression in the
# last pattern is also a true/false test, but part of it was hidden. If you
# don't give it a string to test, it will assume $0, the line that it's
# currently processing. Thus, the complete version of it is this:
$0 ~ /^fo+bar$/ {
print "Equivalent to the last pattern";
}
a > 0 {
# This will execute once for each line, as long as a is positive
}
# You get the idea. Processing text files, reading in a line at a time, and
# doing something with it, particularly splitting on a delimiter, is so common
# in UNIX that AWK is a scripting language that does all of it for you, without
# you needing to ask. All you have to do is write the patterns and actions
# based on what you expect of the input, and what you want to do with it.
# Here's a quick example of a simple script, the sort of thing AWK is perfect
# for. It will read a name from standard input and then will print the average
# age of everyone with that first name. Let's say you supply as an argument the
# name of a this data file:
#
# Bob Jones 32
# Jane Doe 22
# Steve Stevens 83
# Bob Smith 29
# Bob Barker 72
#
# Here's the script:
BEGIN {
# First, ask the user for the name
print "What name would you like the average age for?";
# Get a line from standard input, not from files on the command line
getline name < "/dev/stdin";
}
# Now, match every line whose first field is the given name
$1 == name {
# Inside here, we have access to a number of useful variables, already
# pre-loaded for us:
# $0 is the entire line
# $3 is the third field, the age, which is what we're interested in here
# NF is the number of fields, which should be 3
# NR is the number of records (lines) seen so far
# FILENAME is the name of the file being processed
# FS is the field separator being used, which is " " here
# ...etc. There are plenty more, documented in the man page.
# Keep track of a running total and how many lines matched
sum += $3;
nlines++;
}
# Another special pattern is called END. It will run after processing all the
# text files. Unlike BEGIN, it will only run if you've given it input to
# process. It will run after all the files have been read and processed
# according to the rules and actions you've provided. The purpose of it is
# usually to output some kind of final report, or do something with the
# aggregate of the data you've accumulated over the course of the script.
END {
if (nlines)
print "The average age for " name " is " sum / nlines;
}
Got a suggestion? A correction, perhaps? Open an Issue on the GitHub Repo, or make a pull request yourself!
| 2024-11-08T05:43:19 | en | train |
42,046,446 | paulpauper | 2024-11-04T22:05:09 | Update on the Mysterious Trump Buyers on Polymarket | null | https://jorgevelez.substack.com/p/the-mysterious-trump-buyers-on-polymarket-2 | 6 | 1 | [
42046712
] | null | null | no_error | Update on the Mysterious Trump Buyers on Polymarket | 2024-11-04T19:07:20+00:00 | Jorge I Velez | With one day until the 2024 United States presidential election, all eyes are on who Americans will choose as their next leader. While polls have consistently indicated this will be a close election, prediction markets have shown a more volatile story, starting after President Trump’s rally in Butler, Pennsylvania, on October 6.Since my original post on October 18, I have closely tracked flows into Polymarket, trying to determine whether someone has amassed a substantial position on Trump winning both the presidential election and the popular vote. I have concluded that this is indeed the case, and it may very well be the largest political bet in history.Mainstream media outlets have written about this mysterious buyer, his position, and his intentions. A Wall Street Journal reporter even spoke to him and revealed further details. However, I believe this trader was not entirely truthful to the reporter. Below, I explain why.How Big Is This Trader’s Position?The trader, who asked to be called Theo, revealed that he controls four accounts on Polymarket and has placed bets of roughly $40 million USDC on Trump winning the election, the popular vote, and a few smaller markets. In my research, I identified a total of 10 accounts associated with this trader, and the amount bet appears closer to $75 million. All the accounts I identified share the following characteristics:With the exception of the original Fredi9999 account, all other accounts were created in late September or October.All accounts were funded from Kraken, a centralized exchange.The deposits followed similar patterns: most deposits were either $500,000 or $1,000,000, made at specific times of the day.Except for brief activity on the night of Sunday, October 20, all accounts were inactive over weekends.The accounts placed bets on similar markets: presidential election winner, popular vote winner, winners of Pennsylvania and Michigan, and some parlay markets like presidential winner + popular vote winner.The accounts placed bets in two ways: (1) limit orders matching five-figure orders in the book, and (2) limit orders slightly outside the bid-ask spread to set a large floor on the market.Based on these patterns, I am highly confident that Theo is associated with these accounts.The 10 accounts I’ve identified as being part of the same individual / entityWhy Would Theo Lie About His Position?Theo told the Wall Street Journal reporter that he didn’t want anyone to know the extent of his bets on these markets. He also mentioned creating three additional accounts after realizing that the market was reluctant to trade against the original Fredi9999 account. The remaining six accounts were reportedly created after the market and media started focusing on these initial four accounts. I believe Theo wanted to keep increasing his position without drawing attention from the market.What Is Theo’s Intention?Theo stated to the WSJ reporter that this was simply a bet on Donald Trump firmly winning the 2024 United States Election. He also claimed he was betting the majority of his liquid assets, though this claim is questionable. My guess is that something was lost in translation; actifs liquides in French can also mean cash or cash equivalents. Perhaps he meant he had placed most of his available cash in these markets. Betting his entire liquid assets on a few illiquid, binary option markets would defy conventional financial wisdom.Before the WSJ article, I suspected Theo was likely an entity engaging in either a speculative trade of a Trump victory or a hedge against a position expected to suffer if Trump won. Financial markets have shown strong reactions in anticipation of a Trump victory. U.S. Treasuries maturing in five years or more have been volatile, and the U.S. dollar has strengthened significantly against other currencies. I considered that a European commodity firm might be placing these bets in anticipation of oil prices dropping if Trump won, as he has expressed support for increased US oil production and has taken a more favorable stance toward Russia—both potential catalysts for lower oil prices in the near term. After the WSJ came out, it was somewhat confirmed that Theo is a very wealthy ex financial professional placing a large speculative trade1.Did Theo’s Trades Distort the Market?Theo’s trades have undeniably influenced the election betting markets on Polymarket. Up until October 30, Polymarket was trading 7-10% more in favor of Trump than other markets. However, on October 30, the market began correcting these prices, despite Theo placing over $8 million in Trump bets between October 30 and November 1. This correction continued over the weekend, and as of noon on November 4, the odds on Polymarket stood at 57% for Trump and 43% for Kamala.Throughout October, Theo managed to move both this market and the presidential election market. The markets have largely corrected the moves. Why Didn’t the Polymarket Odds Correct Sooner?As Theo’s legend spread through social and mainstream media, many market participants began following these trades closely. Between October 8 and November 1, it wasn’t hard to observe that a series of accounts were placing an average of $2-3 million USDC worth of Trump bets each business day. Many Polymarket traders waited as Theo’s activity continued moving the market in Trump’s favor. As election day neared, the market finally began to align more closely with general sentiment.ConclusionTheo will go down in history among election bettors as either the greatest winner or the greatest loser in the 2024 U.S. presidential election. My biggest takeaway from this situation is that we are witnessing unprecedented levels of volume, open interest, and trade sizes, likely catching the attention of major investment firms. I believe we may be entering an era where prediction markets evolve from niche platforms for individual bets into significant markets for financial institutions to make trades, create hedges, and place speculative positions on political and other events impacting financial instruments.Update: While writing this article, Theo’s accounts deposited an additional $1.5 million USDC into Polymarket, gradually buying Trump to win both the presidential election and the popular vote.Disclaimer: I trade on Polymarket as a hobby. | 2024-11-07T23:43:20 | en | train |
42,046,454 | null | 2024-11-04T22:05:20 | null | null | null | null | null | null | [
"true"
] | true | null | null | null | null | null | null | null | train |
42,046,456 | ksluki | 2024-11-04T22:05:29 | Revolutionize Teaching: Save Time with Personalized AI Worksheets | null | https://toolsedu.com/ | 1 | 0 | null | null | null | null | null | null | null | null | null | null | train |
42,046,458 | paulpauper | 2024-11-04T22:05:40 | Causal Claims in Economics | null | https://marginalrevolution.com/marginalrevolution/2024/11/causal-claims-in-economics.html | 2 | 0 | null | null | null | null | null | null | null | null | null | null | train |
42,046,465 | bookofjoe | 2024-11-04T22:05:56 | Metabolic Bariatric Surgery in Era of GLP-1 Receptor Agonist Obesity Management | null | https://jamanetwork.com/journals/jamanetworkopen/fullarticle/2825349 | 1 | 0 | null | null | null | null | null | null | null | null | null | null | train |
42,046,481 | paulpauper | 2024-11-04T22:07:12 | The thriving business of looking good on Zoom | null | https://thehustle.co/originals/the-thriving-business-of-looking-good-on-zoom | 3 | 1 | [
42046580
] | null | null | null | null | null | null | null | null | null | train |
42,046,484 | edward | 2024-11-04T22:07:22 | Kindle Colorsoft owners complain of a yellow bar on the e-reader's screen | null | https://www.theverge.com/2024/11/2/24286289/kindle-colorsoft-yellow-bar-display-e-reader | 3 | 0 | [
42047207
] | null | null | null | null | null | null | null | null | null | train |
42,046,489 | thibautg | 2024-11-04T22:07:38 | OVCS – Open Vehicle Control System | null | https://github.com/open-vehicle-control-system/ovcs | 2 | 0 | null | null | null | null | null | null | null | null | null | null | train |
42,046,498 | paulpauper | 2024-11-04T22:08:14 | Ode to Uncertainty | null | https://www.theatlantic.com/culture/archive/2024/11/ode-to-uncertainty-election/680524/ | 1 | 0 | null | null | null | null | null | null | null | null | null | null | train |
42,046,504 | PaulHoule | 2024-11-04T22:09:06 | Design enhances porosity and structural stability for metal-organic frameworks | null | https://phys.org/news/2024-10-leveraging-skyscraper-architecture-porosity-stability.html | 1 | 0 | null | null | null | null | null | null | null | null | null | null | train |
42,046,507 | ghewgill | 2024-11-04T22:09:29 | Session messenger moves to a Swiss foundation | null | https://getsession.org/blog | 4 | 0 | [
42046795
] | null | null | no_error | Blog - Session Private Messenger | null | null | Connecting one million usersAugust 18, 2024 / Alex LintonOver 1 million people are using Session.
1 million is a moment to celebrate. A lot of people have contributed countless hours to achieving this goal. It’s a lot of users, especially for a decentralised messaging app—perhaps more than any other has ever reached. Things haven’t always come easy, nor have they been simple, but it’s achieved thanks to the persistence of every single contributor and community member.Sign-up in a flash with Session's new onboardingAugust 11, 2024 / Alex LintonSigning up with Session has always been fast—and now it’s simpler and smoother than ever. Session’s latest release contains completely overhauled onboarding, including new flows for signing up, restoring your account, and linking a new device.
Protecting a Free and Secure Internet: World Press Freedom DayMay 03, 2023 / Alex LintonStrong encryption saves lives. Journalists rely on encrypted communication tools every day to protect their safety and the safety of their sources. To promote World Press Freedom Day, we have joined our allies in privacy tech to demand the protection of secure communication and the protection of a free press.Session Release Roundup #16: Trio of ChangesOctober 19, 2022 / Kee JefferysWe’re changing the names of open groups and closed groups to Communities and Groups respectively. And you can now dress Session up in custom themes!Update: Important Changes to SessionOctober 05, 2022 / Alex LintonSome menus in Session will change in an update over the next few days. These changes are cosmetic. The underlying functionality of Session is not changing. Session Release Roundup #15: 👍😈🔥September 05, 2022 / HarrisWelcome to Session Release Roundup #15! This Release Roundup includes emoji reacts, the re-introduction of DMing people from open groups, and iOS performance upgrades.
Sim Swapping attacks: How to protect yourself from this common phone scamSeptember 05, 2022 / Wesley SukhSIM Swapping: it's a pretty scary form of hacking that even managed to catch the CEO of Twitter off guard. This article tackles the best way to avoid phishing attacks, the risk and reward of 2FA (two-factor-authentication) and tips on protecting your phone number. Interview with CoverDrop author DanAugust 07, 2022 / Kee JefferysAt PETS, Kee sat down with Dan, one of the authors of the CoverDrop paper which proposes a secure method for initial contact between journalists and sources or whistleblowers.Interview with researcher Mariano Di MartinoAugust 03, 2022 / Kee JefferysKee sat down with Mariano at the Privacy Enhancing Technology Symposium to discuss his paper on the security practices of companies which hold personal data covered by the GDPR. How to find true love on SessionJune 30, 2022 / Wesley SukhPrivacy matters to all relationships — especially when we communicate digitally. How you and your partner message, sext or chat is just be between you. Anonymity and online datingJune 27, 2022 / Alex LintonAnonymity and dating might not seem like a match made in heaven — you're probably gonna want to know who you're dating, after all. But it all comes down to safety.Session Account ID vs phone numbersJune 08, 2022 / Alex LintonAccount IDs are instant, secure, portable, and anonymous — making them the perfect alternative to phone numbers for a private messaging app.
The cost of Musk's war on spamMay 26, 2022 / Wesley SukhWill Musk's plans to rid twitter of spam ultimately lead to the death of the platform's pseudonymous identities?What happens if Twitter gets encrypted DMs?May 06, 2022 / Alex LintonAh, encryption. The lifeblood of cybersecurity. Elon Musk recently suggested adding encryption to Twitter DMs. But would that really make Twitter DMs private?How to strip metadata from your filesJanuary 07, 2022 / Alex LintonTo share a file without sharing the metadata as well—to preserve your privacy or anonymity— you’ll need to strip the file’s metadata.Calls on Session: How to opt-inDecember 20, 2021 / Alex LintonWe know there’s one important item on every Session user’s wishlist this holiday season, and that’s exactly what we’ve got — voice and video calls (sort of). No caller ID: Calls on SessionDecember 07, 2021 / Alex LintonVoice and video calls have been Session’s most requested feature ever since we launched. Here's what to expect now that voice calls are released on Session.The Matrix vs. The MetaverseNovember 09, 2021 / Alex LintonWhen Mark Zuckerberg introduced Facebook’s new brand—Meta—in an hour-long Connect 2021 presentation, I (along with others no doubt) had a nagging thought throughout: is this what our matrix looks like?Flip the switch: Global Encryption Day 2021October 21, 2021 / Alex LintonThis Global Encryption Day, the cybersecurity community is calling for people to #MakeTheSwitch to end-to-end encryption. The OPTF is proud to join the call and stand in support of encryption. Session stories: Why do you use Session? October 06, 2021 / Alex LintonThis year, ‘Send it to me on Session’ has become a part of my everyday language. If you’re in the same boat, we want to hear from you!Why are phone numbers a privacy problem?September 14, 2021 / Alex LintonPhone numbers are not private. Using your phone number can put your privacy at risk. If you’ve spent much time around the privacy movement, you’ve probably heard countless people lament the privacy shortcomings of phone numbers. On the recent Australian surveillance legislationSeptember 09, 2021 / Alex LintonRegulators are increasingly acting with open hostility towards encryption, security, and privacy. The latest chapter in this sorry story took place in our own backyard when Australia’s government passed a new bill granting increased surveillance capacities.Deleting messages and time-to-live: This message will self-destruct in…September 06, 2021 / Alex LintonDigital conversations are fundamentally different to real-world conversations. When you have a conversation over text, you’re creating a record. The record you create will persist long into the future, and it can quickly paint a high fidelity picture about your life. Privacy propaganda: The war on encryptionJune 23, 2021 / Alex LintonEncryption is vital to defending digital privacy, but it’s being painted as the villain of the tech world. Push back against the anti-encryption agenda.Your adversary: Who’s a hacker, anyway?April 20, 2021 / Alex LintonA fundamental concept underpinning the field of cybersecurity is adversaries. Adversaries are any two parties who have opposing interests.Multidevice beta: How you can use it — and help improve itFebruary 16, 2021 / adminA while back, we pulled multidevice support back into the workshop with the aim of implementing a more effective version in future, promising it would return someday. Well, today is that day, and the future is now. Multidevice is rolling out in early beta right now to an App Store or Play Store near you! …Data, data, data: Session user analytics and anonymityFebruary 10, 2021 / Alex LintonSession has been seeing massive user growth recently, with tens of thousands of active users in dozens of countries around the world. But hold on a minute — Session is also completely anonymous, with no phone numbers or other identifiers. So how do we know how many users we have, or where they are? Mobile …Session Release Roundup #10: Mega editionJanuary 28, 2021 / adminClosed groups grow to 100! Plus: Protocol changes, performance improvements, and more Hello, it’s me, haven’t seen you in a while. It’s been a few months since we last piped up, but don’t worry — we’ve been hard at work tippy-tapping away, writing, wrangling, and working on brand new code to build a bright future …Session Release Roundup #5: Staying mobileJune 26, 2020 / adminWelcome to Session Release Roundup #5! Highlights include mobile updates to prepare for the desktop refactor, and some serious speed and reliability gains.Session for beginners: Your Session starts hereJune 19, 2020 / Alex LintonThere have been a lot of reasons for people to suddenly take an interest in private messengers recently. Previously, encrypted messengers were mostly used by tech aficionados — and it shows in the way these apps are designed. But now private messengers are becoming more and more popular. Let’s go through some of the basics …Android trackers and permissions: Did I say you could do that?June 15, 2020 / Alex LintonAs netizens have become more and more tech-literate over the years, lots of people have developed their own list of ‘scam app’ red flags to look out for. This might be things as simple as poor reviews, poorly written app descriptions, or things just looking plain dodgy. Most people have been around the internet rodeo …Session Release Roundup #2: Fresh apples!May 11, 2020 / adminWelcome to Session Release Roundup #2! Highlights include a huge round of bugfixes and improvements on iOS, and news about Spanish localisation!Session Release Roundup #1: You’ve got mail!April 23, 2020 / adminWelcome to the first ever Session release roundup! In these posts, we’re going to talk about all of the newest fixes, features, and future plans for Session. Every time there’s a major Session release, we’ll put out one of these — and an accompanying email newsletter — so you can see what’s changed, and what …Verifying software downloads on Linux, Windows, and macOSApril 09, 2020 / adminDon’t care what’s behind the scenes? Skip straight to software verification tutorials for macOS, Linux, and Windows. Back in the day, software used to arrive in the form of floppy discs, MiniDiscs, and CD-ROMs. But now, it’s all about the download. Everything is downloaded: the apps you use to keep in touch with your family, …Confirming identities onlineJanuary 10, 2020 / adminStaying private online is important for everyone — but for some, it can be crucial. Learn how to confirm who you’re talking to while staying anonymous.What can someone do with your phone number?December 17, 2019 / Alex LintonPhone numbers are tied to our online identities: we use them as logins and to secure our accounts with SMS two-factor verification. But how secure are they? | 2024-11-07T20:14:12 | en | train |
42,046,521 | taylorbuley | 2024-11-04T22:10:51 | Parkinson's Law and why is it sabotaging your productivity | null | https://www.atlassian.com/blog/productivity/what-is-parkinsons-law | 2 | 0 | null | null | null | null | null | null | null | null | null | null | train |
42,046,522 | dargscisyhp | 2024-11-04T22:10:52 | Yale prof solves part of math's 'Rosetta | null | https://news.yale.edu/2024/11/01/geometry-masterpiece-yale-prof-solves-part-maths-rosetta-stone | 12 | 1 | [
42047208,
42047168
] | null | null | null | null | null | null | null | null | null | train |
42,046,596 | danboarder | 2024-11-04T22:19:49 | USFS decision to halt prescribed burns in California is history repeating | null | https://cepr.net/us-forest-service-decision-to-halt-prescribed-burns-in-california-is-history-repeating/ | 337 | 242 | [
42047085,
42050100,
42048048,
42050553,
42047119,
42047103,
42047356,
42048567,
42047257,
42047034,
42052942,
42048143,
42050795,
42050834,
42047417,
42048226,
42047251,
42047468,
42047054,
42047624,
42047361,
42047426,
42047040,
42047083,
42048117,
42048634,
42047517,
42047092,
42047075,
42047249
] | null | null | null | null | null | null | null | null | null | train |
42,046,599 | rbanffy | 2024-11-04T22:20:14 | null | null | null | 15 | null | [
42046763,
42046740,
42046776,
42046674
] | null | true | null | null | null | null | null | null | null | train |
42,046,603 | imdsm | 2024-11-04T22:21:18 | GPT-4o Advanced Voice Mode plays music during speech | null | https://twitter.com/adamkdeancto/status/1853562231600058819 | 1 | 0 | null | null | null | null | null | null | null | null | null | null | train |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.