It may just be that Anthropic isn't it.
I had a company that was like a white elephant for me for a long time. Got in there, and I will say: It was one of the worst experiences I had in my career.
Not all that glitters is gold, and happiness is often only discovered when it is gone. If you can avoid those two pitfalls in life. You'll do well better than me.
The authors are observing that, if electricity prices are negative and your battery is not perfectly efficient, then you would like to charge and discharge simultaneously to get paid for wasting energy, but you can’t.
This is a silly limitation. Surely the power electronics or even just the control algorithms in a BESS could be slightly modified to consume power, get warm, and not transfer any current to or from the battery cells, effectively taking advantage of the BESS’s heat sink to sink excess power and sell that service.
More seriously, in a world with occasional negative prices, you would want your battery to be able discharge itself, without exporting power, in a controlled and power-limited manner so as to avoid overheating. And the optimization algorithms should factor this in. I wonder if real grid-scale BESS systems have this capability.
[1] https://www.analog.com/en/resources/evaluation-hardware-and-...
Note that it is equally dangerous to send paraphrased messages using the same key (which is called sending messages "in depth"). This was used to crack the Lorenz ("Tunny") cipher. Interestingly Bletchley Park hadn't gotten their hands on a Lorenz machine, they cracked it based on speculation. And it lead to the development of the first tube computer, Collosus (which influenced the ENIAC). Nowadays we use nonces to avoid sending messages in depth, but nonce reuse can be similarly disastrous for systems like AES-GCM. For example there have been Bitcoin hardware wallets that reused nonces, allowing the private key to be extracted & the Bitcoin stolen. (To be clear, cryptocurrencies and AES-GCM are completely different systems that have this one property in common.)
https://en.wikipedia.org/wiki/Cryptanalysis_of_the_Lorenz_ci...
https://www.youtube.com/watch?v=Ou_9ntYRzzw [Computerphile, 16m]
As an aside does anyone know why it's called "in depth?" I'm guessing that it's related to Bletchley Park's penchant for naming things after fish? But possibly also their techniques that involved arranging messages together and sliding a stencil over them to visually spot patterns (so they're sort of overlayed)? I tried some casual searching but it's a very generic phrase and so difficult to search. It's defined in the The 1944 Bletchley Park Cryptographic Dictionary but it doesn't give an etymology.
https://www.codesandciphers.org.uk/documents/cryptdict/crypt... [Page 28]
The computer museum also exhibits post-war computers all the way to modern machines. I'd say that museum is more for the geeks while the Bletchley Park museum is definitely worth a visit even if you're not into computers.