Hacker Newsnew | past | comments | ask | show | jobs | submit | evaXhill's commentslogin

This seems like an interesting approach and automating visitor qualification is definitely useful. But quick question though, once you drop in that “single line” of code, how soon can a team expect to see their first qualified leads?


You’ll see results as soon as your first qualified visitors arrive. Our agent evaluates every unique visitor, researches and qualifies B2B prospects based on your custom criteria, and starts showing you qualified leads in real time.


From personal experience (London based), I’ve seen a least 2 meta x rayban shops in high traffic areas, which never seem to be empty. Adding to that, recently on social media someone expressed a similar sentiment until they saw what the glasses themselves look like, then realized they looked like ordinary glasses and are undistinguishable if the recording light is covered by black masking tape


> are undistinguishable if the recording light is covered by black masking tape

Is that a viable thing? I thought they'd put in a check so that they wouldn't record if the light was covered.

I hope there's a way to distinguish these from regular RayBans so I don't have to avoid everyone wearing RayBans at all.


They did. The second iteration alluded to, introduced in September 2023, makes them inoperable for photos/videos if the recording light is covered.


Yeah I don't know that I would know if I saw them, just don't know anyone with them / what they're up to with them.


Unfortunately I’ve seen some use it for rage baiting purposes then catching peoples reaction without the knowledge that they are being filmed, but on the bright side I guess it’s useful for travelling without looking like an obnoxious tourist/influencer with their phones out constantly


Good post, bit too “mathy” but makes me think of “Asynchronous computing @Facebook: Driving efficiency and developer productivity at Facebook scale”. Where they touch on capacity optimization (queuing + time shifting), capacity regulation along with user delay tolerance (bc not all jobs, even at the same priority level, are equal)


I think the issue with the math is that it doesn't read well.

For example, the paragraphs around the paragraph with "compute the exact Poisson tail (or use a Chernoff bound)" and that paragraph itself could be better illustrated with lines of math instead of mostly language.

I think you do need some math if you want to approach this probabilistically, but I agree that might not be the most accessible approach, and a hard threshold calculation is more accessible and maybe just as good.


For something like this, annotated graphs and examples (IMO) work a lot better than formulas in explaining the problem and solution.

Particularly because distributed computer systems aren't pure math problems to be solved. Load often comes from usage which is often closer to random inputs rather than predicable variables. Further, how load is processed depends on a bunch of things from the OS scheduler to the current load on the network.

It can be hard to really intuitively understand that a bottlenecked system processes the same load slower than an unbound system.


> Asynchronous computing @Facebook: Driving efficiency and developer productivity ... optimization (queuing + time shifting), capacity regulation along with user delay tolerance ...

  We can infer a more detailed priority by understanding how long each of these asynchronous requests can be delayed ... For each job to be executed, we try to execute it as close as possible to its delay tolerance.

  ... we defer jobs with a long delay tolerance so that the workload is spread over a longer time window. Queueing plays an important role in selecting the most urgent job to execute first.

  ...  Time shifting ... optimize capacity in Async:

  1. Predictive compute collects the data people used yesterday. Predicated on which data people may need, it precomputes before peak hours and stores the data in cache ... This moves the computing lift from peak hours to off-peak hours and trades a little cache miss for better efficiency. 

  2. Deferred compute ... schedules a job as part of user request handling but runs at much later time. For instance, the "people you may know" list is processed during off-peak hours, then shown when people are online (generally during peak hours). 
https://engineering.fb.com/2020/08/17/production-engineering... / https://archive.vn/A87hl


> Asynchronous computing @Facebook

I feel tha I'm missing something obvious. Isn't this doc reinventing the wheel in terms of what very basic task queue systems do? It describes task queues and task prioritization, and how it supports tasks that cache user data. What am I missing?


Yes, what is described in the blog post is (by now) a fairly established way to deal with task queues at scale (if you're familiar with those kinds of systems, but not everyone is).


Really great introductory article on color space in general, I really appreciate that they touched on perceptual uniformity and how we all perceive colors differently. It’s great to find out that applications like Oklab came out recently to fix this by manipulating the distances between colors to try compensate for human perception while also being more straightforward to calculate so that it can be used in real-time applications. Also the UI of this blog post was so aesthetically pleasing, that it was worth burning my retinas with the light mode


Not that surprising that things have gotten to this point, just a few days ago schools in Florida were testing a new drone defense system against shootings. Between see-through backpacks, armed teachers, metal detectors, and other things you’d think it would be more easier to severely restrict firearm access to under 21 year olds and make the parents criminally liable if they are found to have facilitated access in any way in the wake of a shooting. But yeah i guess dipping into online conversations and immediately notifying both school officials and law enforcement is a good solution (/j)


‘Berény is likely to have painted Sleeping Lady with Black Vase from 1927 to 1928, by which time he had returned to Budapest, in his native Hungary, from Berlin where he had fled following World War I.The painting was last seen in public in 1928 when it exhibited at the Ernst Museum before being sold.The buyer is likely to have been Jewish and left the country in the lead up to or during World War II. Hungary was turbulent during this period and the painting was considered lost’. Sad to see a painting with such history ending up in a private collection, also considering that its some of Bereny’s best work too


The quantity & quality of a child's diet determines how fast they age & their health later in life, its just crazy that US children now get 2/3rds of their energy from ultra-processed foods that are designed to be hyper-palatable & maintain hunger. Unfortunately, there’s just a lot of misinformation out there as it relates to diet (food pyramid being one of the most egregious examples). For one, although most ultra processed foods are bad, some can be actually beneficial for those with medical issues.


‘Considering the pool of available IPv4 addresses has been exhausted for quite a while now, and was running out for public use years ago’ I thought it was logical that most systems that have adopted IPv6. Crazy to think that it turns out it wasn’t, but shout out to apple and their stringent dev requirements bc they require support IPv6-only networks.


The pool is not exhausted, the IPv6 cabal realized after 20 years that actively fighting against freeing up more space was the only way they could drive adoption.

If we just stop listing 240/4 as a bogon we could be allocating from it in a few years.


Wow, that would get us a whole... 6 months of extra runway!


This seems great! Would love to join however I can only seem to find the 2008 and 2012 pdf of The Art of Multiprocessor Programming for free, is there a link for the 2020 version?


It’s not a free book. I believe that comment was a gentle nudge to remind people they actually need to buy it to support the author.


Thanks! I was just confirming because the older versions were available for free, but I do agree


While I do believe its important to replace legacy and bloated tech in the military to make it more efficient (esp less costly), I doubt the ROI will be able to make up for it/ will be hard to measure effectively considering how hard it is to conduct fully transparent audits. Even if they say that the new agreement would consolidate existing software contracts and lead to “significant cost efficiencies across mission-critical programs.” Also what happened to reducing the gov. deficit?? Very confusing


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: