This seems rather inefficient, and also surprising that Claude Code was even needed for this.
This seems rather inefficient, and also surprising that Claude Code was even needed for this.
Defense Department data also allow hurricane forecasters to see
hurricanes as they form, and monitor them in real-time.
For example, hurricane experts can see where the center of a
newly formed storm is, which allows them to figure out as
early as possible what direction it is likely to go, and whether
the storm might hit land. That's important for people in harm's way,
who need as much time as possible to decide whether to evacuate,
and to prepare their homes for wind and water.
The public paid for this data. Deliberately siloing the data to insure it can't save American lives wouldn't just be theft, it would be an act indistinguishable from evil.Dead Comment
Deep Strike was only run on only the public feed and not a quad feed as is preferred.
> I don’t feel special or unique as this an “award” given to thousands of people, and in little Sweden alone there are like a hundred people awarded. It does not seem to be a particular high bar to be welcomed into this club.
> John Day has been involved in research and development of computer networks since 1970, when his group at the University of Illinois was the 12th node on ARPANet (precursor to the Internet) and has developed and designed protocols for everything from the data link layer to the application layer. Also making fundamental contributions to research on distributed databases. He managed the development of the OSI reference model, naming and addressing, and a major contributor to the upper-layer architecture. He was a major contributor to the development of network management architecture, working in the area since 1984 and building and deploying LAN products and a network management system, a decade ahead of comparable systems. Mr. Day has published Patterns in Network Architecture: A Return to Fundamentals (Prentice Hall, 2008), which has been characterized (embarrassingly) as “the most important book on network protocols in general and the Internet in particular ever written.” The book analyzes the fundamental flaws in the Internet and proposes what appears to be the only path forward. Today Mr. Day splits his time between making this new path a reality and teaching at Boston University. Mr. Day is also a recognized scholar in the history of cartography focusing on 17thC China, and is past President of the Boston Map Society.
Here is an excerpt from the token bucket section:
> It seems there’s no way to do a token bucket with the main Redis primitives such as SET, EXPIRE, and INCR. It would require two variables and the client has to read one before choosing how to update the second, which would require pausing the whole database while a client carries this out. So what people do is execute code in Redis. This is done using modules or scripts. Using a module here is dubious: You’re now just loading a C program (shared library) into Redis; why not just load it into an actual computer? So let’s look at “scripts” instead. Scripts are pieces of Lua code executed in Redis.
shows brief example
> Now it’s probably time to ask ourselves why we are here. We wanted a rate limiter and now we’re learning a niche programming language just to execute some code in a database that has nothing relevant to our task but a roundabout way of storing an int into RAM. This concludes my quest to discover how or why rate limiters are implemented in Redis.
This highlights the overall technical depth of the article and should inform you of how authoritative it should be considered.