• 0 Posts
  • 1.01K Comments
Joined 2 years ago
cake
Cake day: June 16th, 2023

help-circle
  • Ah, you are right, wasn’t thinking. Never seen one myself, though totality was something to behold, but once even a smidge of sunlight was directly visible, seemed pretty boring to me, I would guess an annular would be similarly be pretty boring, sure an unusual shape but roughly similar to just normal sunlight…


  • So assuming 10 lbs of force, as measured 1 meter away from the hinge, you have about 44.5 Nm of torque. Assuming each door opening was about 90 degrees, then you have about 70 Joules per door operating event.

    Each door opening would have a physical theoretical max of 0.02 watt-hours.

    Assuming you spent 8 hours opening a door every 10 seconds constantly, then you have 58 watt-hours of energy at the end of the day if you had 100% efficient generators. One typical solar panel would hit that in under 15 minutes in real-world energy collection, not theoretical.


  • So yes, the law says there is some unavoidable, unusable waste heat, the question is how much of that heat is really unusable?

    For example, you have lava at around 1,000 degrees. You certainly can harvest energy from that, hit some water with it and spin a turbine.

    For the most part, once we get under 100C we run out of ideas on how to realistically harvest energy out of it, but there’s still a pretty good delta between that an ambient. The claim of this article is he has an approach to harvest energy at an even lower temperature delta.

    If it got to harvesting all of the temperature delta of a system, then we can say “not at all possible based on current understanding of physics”, but if the process leaves some waste heat unharvested, then it’s not yet violating that law. The law just says it gets less and less likely as the amount of heat in question diminishes.







  • If the code actually works and is vaguely important, I think you are right.

    If anyone ever has to fix it because it’s also broken on top of being a mess, well they aren’t quite so safe. Maybe if you are always available to fix it same day, but if you ever go on vacation and it hits the fan while you are unreachable…


  • I can’t speak to this situation, but broadly speaking I am familiar with general messed up stuff like this as well as perhaps adjusting some fine details to make the scenario relatable to an audience unfamiliar with the specifics of the real situation and/or obfuscating the details so that the person doesn’t out themselves to someone else familiar with the specifics enough to recognize.

    The broad strokes seem plausible and any oddities in details I consider to be less important and/or understandable if it was tweaked for an internet audience.


  • Of course, I don’t think they really are generally acquainted with the records, not just about hysterectomies.

    They will look if something specific comes up, but generally it’s a reference that isn’t proactively consulted, because they have a lot of patients and their record only occasionally matters.


  • I think it’s not about minimizing someone as just a vessel for a fetus, it’s about the reality that menstruation and pregnancy just have huge medical implications in general, in lab results, diagnostic approaches, and in treatment options. With such a wide variety of possible impacts, it may be easy to forget to check ‘just in time’ in very decision that might matter.

    Suppose would someone rather get asked that awkwardly once for a whole visit, or potentially get asked repeatedly as they prepare to perform particular tests, interpret results, or think about prescribing medication.

    It’s not fair that such a huge biological thing is incurred by one sex and not the other, but it is just a possibility they have to deal with.

    To refrain from asking to avoid that awkwardness increases risk of missing that situation and malpractice for failing to take that pretty basic biological reality into account.


  • jj4211@lemmy.worldtoComic Strips@lemmy.worldDoctors
    link
    fedilink
    arrow-up
    5
    ·
    edit-2
    2 hours ago

    For example, give a pregnant woman Tylenol and boom, autistic baby.

    But seriously, as far as I know, your comment is accurate, a lot of treatment options change when a fetus might be in the situation.

    If a doctor decided to neglect that possibility and harms a fetus no one was aware of, might get hit with malpractice.

    Also I know lab results might depend on either the possibility of pregnancy, or just timing of the period itself.




  • Assuming the system ecosystem is locked down, one could conceivably indicate only for retained camera data. App has camera permission but no internet and no storage premission, ok.

    Of course, realistically speaking they kind of tried that with camera modules having their indicators OS controlled, and the practical reality is that malicious use could independently operate the camera from the LED and so the lesson learned was to keep it simple and have the LED control inexorably linked to camera activation at the module level without any sophisticated OS control possible.


  • The type of problem in my experience is the biggest source of different results

    Ask for something that is consistent with very well trodden territory, and it has a good shot. However if you go off the beaten path, and it really can’t credibly generate code, it generates anyway, making up function names, file paths, rest urls and attributes, and whatever else that would sound good and consistent with the prompt, but no connection to real stuff.

    It’s usually not that that it does the wrong thing because it “misunderstood”, it is usually that it producea very appropriate looking code consistent with the request that does not have a link to reality, and there’s no recognition of when it invented non existent thing.

    If it’s a fairly milquetoast web UI manipulating a SQL backend, it tends to chew through that more reasonably (though in various results that I’ve tried it screwed up a fundamental security principle, like once I saw it suggest a weird custom certificate validation and disable default validation while transmitting sensitive data before trying to meaningfully execute the custom valiidation.



  • It’s certainly a use case that LLM has a decent shot at.

    Of course, having said that I gave it a spin with Gemini 3 and it just hallucinated a bunch of crap that doesn’t exist instead of properly identifying capable libraries or frontending media tools…

    But in principle and upon occasion it can take care of little convenience utilities/functions like that. I continue to have no idea though why some people seem to claim to be able to ‘vibe code’ up anything of significance, even as I thought I was giving it an easy hit it completely screwed it up…


  • So if it can be vibe coded, it’s pretty much certainly already a “thing”, but with some awkwardness.

    Maybe what you need is a combination of two utilities, maybe the interface is very awkward for your use case, maybe you have to make a tiny compromise because it doesn’t quite match.

    Maybe you want a little utility to do stuff with media. Now you could navigate your way through ffmpeg and mkvextract, which together handles what you want, with some scripting to keep you from having to remember the specific way to do things in the myriad of stuff those utilities do. An LLM could probably knock that script out for you quickly without having to delve too deeply into the documentation for the projects.