Hacker Newsnew | past | comments | ask | show | jobs | submit | jimktrains2's commentslogin

Look up conlangs (constructed languages).

https://zompist.com/kit.html

https://conlang.org/resources/


Since you can index expressions I wonder if that's because you essentially emhave to store the value in the index anyway and that wouldn't be expected for a virtual column?


I don't really understand why this restriction would be necessary. Wouldn't the computed value just get stored in the index btree keys, exactly the same as an indexed expression?

For comparison, MySQL permits indexing of virtual columns, and indexes on expressions share the same underlying implementation to support this. In other words, in MySQL an index on an expression is literally just an index on an internally-hidden virtual column.


I've used them for common transforms such as timezones (e g. data comes in as uutc and we query everything in Chicago time) just to make querying easier.


Just like on a car, if your break pads are capable of completely stopping the wheel, but the wheel is not capable of creating enough braking force with the surface, then you slide. If you lubricate between the wheels and surface, which is essentially what leaves do on rails, no amount of at-wheel breaking power will stop you.

This is what antilock Brakes in cars prevent, they pulse the brakes to allow the tire to regain traction, preventing slippage and loss of control.


Note that a modern train also has the same system, only more so, a car would typically have 4 wheels, I think the Acela probably has like 96 or something.



As someone who only has a 5w transmitter, I avoid field day and major contests. I love doing Parks on the Air when camping, and that ends up being a lot more enjoyable.


This is the way.

QRP for FD is like going fishing without a hook. You better enjoy the scenery and getting away from home because you're not going to bring in much.


Isn't bzip used quite a bit, especially for tar files?


The Wikipedia data dumps [0] are multistream bz2. This makes them relatively easy to partially ingest, and I'm happy to be able to remove the C dependency from the Rust code I have that deals with said dumps.

[0]: https://meta.wikimedia.org/wiki/Data_dump_torrents#English_W...


If so, only by misguided users. Why would anyone choose bz2 in 2025?


To unpack an archive made from the time when bz2 was used?


Of course no one uses systems, tools and files created before 2025!


bzip2 hasn't been the best at anything in at least 20 years.


The same could be said of many things that, nonetheless, are still used by many, and will continue to be used by many for decades to come. A thing does not need to be best to justify someone wanting to make it a bit better.


I use plain old zip files almost every day.

“Best” is measured along a lot more axis than just performance. And you don’t always get to choose what format you use. It may be dictated to you by some 3rd party you can’t influence.


bzip2 is still pretty good if you want to optimize for:

  - better compression ratio than gzip
  - faster compression than many better-than-gzip competitors
  - lower CPU/RAM usage for the same compression ratio/time
This is a niche, but it does crop up sometimes. The downside to bzip2 is that it is slow to decompress, but for write-heavy workloads, that doesn't matter too much.


So? If I need to consume a resource compressed using bz2, I'm not just going to sit around and wait for them to use zstd. I'm going to break out bz2. If I can use a modern rewrite that's faster, I'll take every advantage I can get.


And then how do I loan it to a friend without the rigamarole of adding them as an authenticated user?

What if I'm not able to add them as an authenticated user or authentic myself to let them drive, e.g. I'm injured or very drunk?


I imagine the same way you share a key for a HomeKit-enabled smart lock.

The only scenarios where one is so injured and/or drunk as to not be able to complete the non-rigamarolish process of sharing a HomeKit home key either by doing it themselves or walking someone through the process are ones where the key holder is so incapacitated that they would be unable to share a physical key.

All of that is someone irrelevant because Express Mode is enabled by default, so if you are unconscious all a person has to do is pull your phone out of your pocket and use it to unlock and start your car the exact same way physical keys work in that situation. It even works if the phone's battery is dead.

https://support.apple.com/en-us/118271

Also, every implementation of CarKit Car Keys I have seen is the same as HomeKit home keys: there is a backup. Either a physical key, PIN, fob, or card.


> non-rigamarolish process of sharing a HomeKit home key

I have not used homekit, but from some searches it only seems to be a non-rigamarole process to add someone as a homekit user if the other person has an apple device? Also, is the Internet required to enroll someone?

> ones where the key holder is so incapacitated that they would be unable to share a physical key.

I don't need to be conscious or my phone have battery (or reception) to have someone take a key from my pocket.

> Also, every implementation of CarKit Car Keys I have seen is the same as HomeKit home keys: there is a backup. Either a physical key, PIN, fob, or card.

I was responding to gp who wanted none of this as it all defeats the security they desired. A 1-factor physical authentication token as a backup would be suitable for nearly all edge cases I can think of. As long as the person carries it, but then we are at worst where we are today, at best I could potentially authenticate or add someone from afar.

I'm not saying that smart locks aren't useful, just that they can't only be "smart", which I assume you would agree with since you brought up things currently having backup methods?


> And then how do I loan it to a friend without the rigamarole of adding them as an authenticated user?

By making adding an authenticated driver not a rigamarole, but easy and intuitive.

> What if I'm not able to add them as an authenticated user or authentic myself to let them drive, e.g. I'm injured or very drunk?

They call you an ambulance.


> By making adding an authenticated driver not a rigamarole, but easy and intuitive.

We'll have to agree to disagree. I don't believe that this will be possible in many situations. What if I'm not near my car? What if my phone is dead? What if my car's battery is dead and it needs jumped?

I'm also just cynical that the automakers or app developers are able to not enshittify the process.

What if when I set my wife up I added her as a user but not admin and now she can't share with someone without having to involve me, which may not be physically possible in all circumstances.

> They call you an ambulance.

You don't call an ambulance to take a drunk person home. Calling a taxi when there is someone able to drive is a waste of money and a huge inconvenience the next day to retrieve the car.

You also can't call an ambulance in the wilderness.

I also meant injured in a more broad sense. What if I just have a bad headache or migraine? I don't want to be fumbling with my phone or car electronics trying to navigate adding someone.


In the future?

They call 911, and they read the license plate number and the authorities send an override signal that turns on the car and only allows it to be driven to the nearest hospital that appears on the screen on the console. If they go off course, they have 30 seconds to get back on course before it coasts into a 5mph limp mode (to find a safe place to pull over) for 1 minute before it completely stops and shutsdown and locks them inside for the police to come get them.

Eh, the car will probably be self-driving at that point, so probably only the first half.


The last thing I want to see on any car is the ability for the government to just remotely hijack random cars. Not just because cops already and routinely abuse their privileges (imagine some crazy police officer doing that to their ex girlfriend!), but also because any such capability can and eventually will be abused by malicious actors. Think of the usual "for the lulz" trolls, organized crime rings involved in looting people, or nation-state enemies.


Aren't authorities notoriously unable to get into Apple products unless allowed?


I have my BMW key in Apple Wallet. When I was out of town and needed to share the key with another person, all I did use a standard share sheet for the key. It let it share via SMS, email, AirDrop, etc.You can revoke the key later.


Literally everything is pointless, even existence, from someone's point of view.

You don't have to understand how something amuses someone to understand that it amuses them. You also don't have to belittle people to ask them why they are amused.


https://m.youtube.com/channel/UCeRXQ_B5WZD3yjPly45myvg

This might be close, but I don't believe he offers a kit.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: