• 1 Post
  • 18 Comments
Joined 1 year ago
cake
Cake day: August 14th, 2023

help-circle

  • I don’t know why you’re framing this as solely a demand problem, or why you think the elasticity of demand won’t extend to negative prices. Negative prices tend to show up only during periods of very high supply, due to a confluence of factors like weather, so supply is part of it (low or even negative prices can induce producers to curtail production). There’s nothing special about the number zero.

    And negative prices therefore take the place of disposal: oversupply and the need to expand real resources taking that energy off of the grid in that particular moment. That’s demand, too: incentivizing people to do what needs to be done, and get rid of that excess energy by disposing it or whatever.







  • If you’re looking for a proof:

    Our base 10 system represents numbers by having little multipliers in front of each power of 10. So a number like 1234 is 1 x 10^3 + 2 x 10^2 + 3 x 10^1 + 4 x 10^0 .

    Note that 10 is just (3 x 3) + 1. So for any 2 digit number, you’re looking at the first digit times (9 + 1), plus the second digit. Or:

    (9 times the first digit) + (the first digit) + (the second digit).

    Well we know that 9 times the first digit is definitely divisible by both 3 and 9. And we know that adding two divisible-by-n numbers is also divisible by n.

    So we can ignore that first term (9 x first digit), and just look to whether first digit plus second digit is divisible. If it is, then you know that the original big number is divisible.

    And when you extend this concept out to 3, 4, or more digit numbers, you see that it holds for every power of 10, and thus, every possible length of number. For both 9 and 3.






  • They did, eventually. The first PlayStation was relatively easy to pirate for (with a mod chip), but it took a while for that stuff to become available. Someone had to go and manufacture the chips, or reverse engineer the check.

    By the time that scene matured, Sega released the Dreamcast right into a more sophisticated piracy scene that could apply lessons learned to the Dreamcast right away.

    On paper, Sega had more sophisticated copy protection than the first PlayStation did. But it also released 4 years later.


  • you could go to your local library and carry a USB stick.

    I don’t remember it this way. Nothing else came close to the portable storage capacity of CD (and thus CD-R and CD-RW). The iomega zip drive was still a popular medium, allowing rewritable 100mb or 250mb cartridge. That was the preferred way to get big files to and from a computer lab when I was an engineering student in 2000.

    USB flash drives had just been released in 2000, and their capacity was measured in like 8/16/32mb, nowhere near enough to meaningfully move CD images.

    Then again, as a college student with on-campus broadband on the completely unregulated internet (back when HTTP and the WWW weren’t necessarily considered the most important protocols on the internet), it was all about shared FTP logins PMed over IRC to download illegal shit. The good stuff never touched an actual website.





  • Things might be different by now, but when I was researching this I decided on the Yale x Nest.

    It’s more secure than a keyed lock in the following ways:

    • Can’t be picked (no physical keyhole).
    • Codes can be revoked or time-gated (for example, you can set the dog walker’s code to work only at the time of day they’re expected to come by).
    • Guest codes can be set to provide real-time notifications when used.
    • The lock keeps a detailed log of every time it’s used.
    • The lock can be set to automatically lock the door after a certain amount of time.

    It’s less secure than a physical traditional lock in the following ways:

    • Compromise of a keycode isn’t as obvious as losing a key, so you might not change a compromised keycode the same way you might change a lost key.
    • People can theoretically see a code being punched in, or intercept compromised communications to use it.
    • Compromised app or login could be used to assign new codes or remotely unlock

    It’s basically the same level of security in the following ways:

    • The deadbolt can still be defeated with the same physical weaknesses that a typical deadbolt has: blunt force, cutting with a saw, etc.
    • The windows and doors are probably just generally weak around your house, to where a determined burglar can get in no matter what lock you use.
    • Works like normal without power or network connection (just can’t be remotely unlocked or reprogrammed to add/revoke codes if not online)

    Overall, I’d say it’s more secure against real-world risk, where the weakest link tends to be the people you share your keys with.