Skip to content

Category: Uncategorized

Preliminary Notes on the Delvish Dialect, by Bruce Sterling

  • Preliminary Notes on the Delvish Dialect, by Bruce Sterling

    I’m inventing a handy neologism (as is my wont), and I’m calling all of these Large Language Model dialects “Delvish.” […] Delvish is a language of struggle. Humans struggle to identify and sometimes to weed out texts composed in “Delvish.” Why? Because humans can deploy fast-and-cheap Delvish and then falsely claim to have laboriously written these texts with human effort, all the while demanding some expensive human credit-and-reward for this machine-generated content. Obviously this native 21st-century high-tech/lowlife misdeed is a novel form of wickedness, somehow related to plagiarism, or impersonation, or false-witness, or classroom-cheating, or “fake news,” or even dirt-simple lies and frauds, but newly chrome-plated with AI machine-jargon. These newfangled crimes need a whole set of neologisms, but in the meantime, the frowned-upon Delvish dialect is commonly Considered-Bad and is under active linguistic repression. Unwanted, spammy Delvish content has already acquired many pejorative neologisms, such as “fluff,” “machine slop,” “botshit” and “ChatGPTese.” Apparently good or bad, they’re all Delvish, though. Some “Delvish” is pretty easy to recognize, because of how it feels to the reader. The emotional affect of LLM consumer-chatbots has the tone of a servile, cringing, oddly scatterbrained university professor. This approach to the human reader is a feature, not a bug, because it is inhumanly and conspicuously “honest, helpful and harmless.”

    (tags: commentary cyberpunk language llms delvish bruce-sterling neologisms dialects)

turbopuffer

  • turbopuffer

    A new proprietary vector-search-oriented database, built statelessly on object storage (S3) with “smart caching” on SSD/RAM — “a solution that scales effortlessly to billions of vectors and millions of tenants/namespaces”. Apparently it uses a new storage engine: “an object-storage-first storage engine where object storage is the source of truth (LSM). […] In order to optimize cold latency, the storage engine carefully handles roundtrips to object storage. The query planner and storage engine have to work in concert to strike a delicate balance between downloading more data per roundtrip, and doing multiple roundtrips (P90 to object storage is around 250ms for <1MB). For example, for a vector search query, we aim to limit it to a maximum of three roundtrips for sub-second cold latency.” HN comments thread: https://news.ycombinator.com/item?id=40916786

    (tags: aws s3 storage search vectors vector-search fuzzy-search lsm databases via:hn)

Journals should retract Richard Lynn’s racist ‘research’ articles

  • Journals should retract Richard Lynn’s racist ‘research’ articles

    Richard Lynn was not the finest example of Irish science:

    Lynn, who died in 2023, was a professor at the University of Ulster and the president of the Pioneer Fund, a nonprofit foundation created in 1937 by American Nazi sympathizers to support “race betterment” and “race realism.” It has been a primary funding source of scientific racism and, for decades, Lynn was one of the loudest proponents of the unfounded idea that Western civilization is threatened by “inferior races” that are genetically predisposed to low intelligence, violence, and criminality. Lynn’s work has been repeatedly condemned by social scientists and biologists for using flawed methodology and deceptively collated data to support racism. In particular, he created deeply flawed datasets purporting to show differences in IQ culminating in a highly cited national IQ database. Many of Lynn’s papers appear in journals owned by the billion-dollar publishing giants Elsevier and Springer, including Personality and Individual Differences and Intelligence.
    The ESRI, for whom Lynn was a Research Professor in the 1960s and 70s, have quietly removed his output from their archives, thankfully. But as this article notes, his papers and faked datasets still feature in many prestigious journals. (via Ben)

    (tags: richard-lynn racists research papers elsevier iq via:bwalsh)

Three-finger salute: Hunger Games symbol adopted by Myanmar protesters

Microsoft AI CEO doesn’t understand copyright

  • Microsoft AI CEO doesn’t understand copyright

    Mustafa Suleyman, the CEO of Microsoft AI, says “the social contract for content that is on the open web is that it’s “freeware” for training AI models”, and it “is fair use”, and “anyone can copy it”. As Ed Newton-Rex of Fairly Trained notes:

    This is categorically false. Content released online is still protected by copyright. You can’t copy it for any purpose you like simply because it’s on the open web. Creators who have been told for years to publish online, often for free, for exposure, may object to being retroactively told they were entering a social contract that let anyone copy their work.
    It’s really shocking to see this. How on earth has Microsoft’s legal department not hit the brakes on this?

    (tags: ai law legal ip open-source freeware fair-use copying piracy)

Perplexity AI is susceptible to prompt injection

Microsoft Refused to Fix Flaw Years Before SolarWinds Hack

_ChatGPT is bullshit_ Ethics and Information Technology vol. 26

  • _ChatGPT is bullshit_ Ethics and Information Technology vol. 26

    Can’t argue with this paper. Abstract:

    Recently, there has been considerable interest in large language models: machine learning systems which produce human-like text and dialogue. Applications of these systems have been plagued by persistent inaccuracies in their output; these are often called “AI hallucinations”. We argue that these falsehoods, and the overall activity of large language models, is better understood as bullshit in the sense explored by Frankfurt (_On Bullshit_, Princeton, 2005): the models are in an important way indifferent to the truth of their outputs. We distinguish two ways in which the models can be said to be bullshitters, and argue that they clearly meet at least one of these definitions. We further argue that describing AI misrepresentations as bullshit is both a more useful and more accurate way of predicting and discussing the behaviour of these systems.

    (tags: ai chatgpt hallucinations bullshit funny llms papers)

Death from the Skies, Musk Edition

  • Death from the Skies, Musk Edition

    Increasing launches means increasing space junk falling from the skies:

    SpaceX has dumped 250 pounds of trash on Saskatchewan. Things you don’t want coming your way at terminal velocity include an 8 foot, 80 pound tall wall panel shaped like a spear. It turns out that Canada is an entirely other country than Texas, so this is something of an international incident, which Sam Lawler has been documenting in this epic thread over the past few months.

    (tags: space space-junk saskatchewan canada via:jwz)

How to keep using adblockers on chrome and chromium

  • How to keep using adblockers on chrome and chromium

    Google’s manifest v3 has no analouge [sic] to the webRequestBlocking API, which is neccesary for (effective) adblockers to work starting in chrome version 127, the transition to mv3 will start cutting off the use of mv2 extensions alltogether this will inevitably piss of enterprises when their extensions don’t work, so the ExtensionManifestV2Availability key was added and will presumably stay forever after enterprises complain enough You can use this as a regular user, which will let you keep your mv2 extensions even after they’re supposed to stop working.

    (tags: google chrome chromium adblockers extensions via:micktwomey privacy)

AI trained on photos from kids’ entire childhood without their consent

  • AI trained on photos from kids’ entire childhood without their consent

    Here’s the terrible thing about AI model training sets —

    LAION began removing links to photos from the dataset while also advising that “children and their guardians were responsible for removing children’s personal photos from the Internet.” That, LAION said, would be “the most effective protection against misuse.” [Hye Jung Han] told Wired that she disagreed, arguing that previously, most of the people in these photos enjoyed “a measure of privacy” because their photos were mostly “not possible to find online through a reverse image search.” Likely the people posting never anticipated their rarely clicked family photos would one day, sometimes more than a decade later, become fuel for AI engines.
    And indeed, here we are, with our family photos ingested long ago into many, many models, mainly hosted in jurisdictions outside the GDPR, and with no practical way to avoid it. Is there a genuine way to opt out, at this stage? Even if we do it for LAION, what about all the other model scrapes that have gone into OpenAI, Apple, Google, et al? Ugh, what a mess.

    (tags: privacy data-protection kids children family laion web-scraping ai models photos)

Apple’s Private Cloud Compute

  • Apple’s Private Cloud Compute

    “A new frontier for AI privacy in the cloud” — the core models are not built on user data; they’re custom, built with licensed data ( https://machinelearning.apple.com/research/introducing-apple-foundation-models ) plus some scraping of the “public web”, and hosted in Apple DCs. The quality of the core hosted models was evaluated against gpt-3.5-turbo-0125, gpt-4-0125-preview, and a bunch of open source (Mistral/Gemma) models, with favourable results on safety and harmfulness and output quality. The cloud API for devices to call out to are built with a pretty amazing set of steps to validate security and avoid PII leakage (accidental or not). User data is sent alongside each request, and securely wiped immediately afterwards. This actually looks like a massive step forward, kudos to Apple! I hope it pans out like this blog post suggests it should. At the very least it now provides a baseline that other hosted AI systems need to meet — OpenAI are screwed. Having said that there’s still a very big question about the legal issues of scraping the “public web” for training data relying on opt-outs, and where it meets GDPR rights — as with all current major AI model scrapes. But this is undoubtedly a step forward.

    (tags: ai apple security privacy pii)

Vercel charges Cara $96k for serverless API calls

I watched Nvidia’s Computex 2024 keynote and it made my blood run cold | TechRadar

  • I watched Nvidia’s Computex 2024 keynote and it made my blood run cold | TechRadar

    This article doesn’t pull any punches — “all I saw was the end of the last few glaciers on Earth and the mass displacement of people that will result from the lack of drinking water; the absolutely massive disruption to the global workforce that ‘digital humans’ are likely to produce; and ultimately a vision for the future that centers capital-T Technology as the ultimate end goal of human civilization rather than the 8 billion humans and counting who will have to live — and a great many will die before the end — in the world these technologies will ultimately produce with absolutely no input from any of us. […] I always feared that the AI data center boom was likely going to make the looming climate catastrophe inevitable, but there was something about seeing it all presented on a platter with a smile and an excited presentation that struck me as more than just tone-deaf. It was damn near revolting.”

    (tags: ai energy gpus nvidia humanity future climate-change neo-luddism)

“TIL you need to hire a prompt engineer to get actual customer support at Stripe”

  • “TIL you need to hire a prompt engineer to get actual customer support at Stripe”

    This is the kind of shit that happens when you treat technical support as just a cost centre to be automated away. Check out the last line: “I’m reaching out to the official Stripe support forum here because our account has been closed and Stripe is refusing to export our card data. We are set to lose half our revenue in recurring Stripe subscriptions with no way to migrate them and no recourse. […. omitting long tale of woe here…] Now, our account’s original closure date has come, and sure enough, our payments have been disabled. The extension was not honored. I’m sure this was an honest mistake, but I wonder if Stripe has reviewed our risk as carefully as they confirmed our extension (not very). Stripe claims to have 24/7 chat and phone support, but I wasn’t able to convince the support AI this was urgent enough to grant me access.”

    (tags: ai fail stripe support technical-support cost-centres business llms)

_Surveilling the Masses with Wi-Fi-Based Positioning Systems_

  • _Surveilling the Masses with Wi-Fi-Based Positioning Systems_

    This is pretty crazy stuff, I had no idea the WPSes were fully queryable:

    Wi-Fi-based Positioning Systems (WPSes) are used by modern mobile devices to learn their position using nearby Wi-Fi access points as landmarks. In this work, we show that Apple’s WPS can be abused to create a privacy threat on a global scale. We present an attack that allows an unprivileged attacker to amass a worldwide snapshot of Wi-Fi BSSID geolocations in only a matter of days. Our attack makes few assumptions, merely exploiting the fact that there are relatively few dense regions of allocated MAC address space. Applying this technique over the course of a year, we learned the precise locations of over 2 billion BSSIDs around the world. The privacy implications of such massive datasets become more stark when taken longitudinally, allowing the attacker to track devices’ movements. While most Wi-Fi access points do not move for long periods of time, many devices — like compact travel routers — are specifically designed to be mobile. We present several case studies that demonstrate the types of attacks on privacy that Apple’s WPS enables: We track devices moving in and out of war zones (specifically Ukraine and Gaza), the effects of natural disasters (specifically the fires in Maui), and the possibility of targeted individual tracking by proxy — all by remotely geolocating wireless access points. We provide recommendations to WPS operators and Wi-Fi access point manufacturers to enhance the privacy of hundreds of millions of users worldwide. Finally, we detail our efforts at responsibly disclosing this privacy vulnerability, and outline some mitigations that Apple and Wi-Fi access point manufacturers have implemented both independently and as a result of our work.

    (tags: geolocation location wifi wps apple google infosec privacy)

Faking William Morris, Generative Forgery, and the Erosion of Art History

Technical post-mortem on the Google/UniSuper account deletion

  • Technical post-mortem on the Google/UniSuper account deletion

    “Google operators followed internal control protocols. However, one input parameter was left blank when using an internal tool to provision the customer’s Private Cloud. As a result of the blank parameter, the system assigned a then unknown default fixed 1 year term value for this parameter. After the end of the system-assigned 1 year period, the customer’s GCVE Private Cloud was deleted. No customer notification was sent because the deletion was triggered as a result of a parameter being left blank by Google operators using the internal tool, and not due a customer deletion request. Any customer-initiated deletion would have been preceded by a notification to the customer.” Ouch.

    (tags: cloud ops google tools ux via:scott-piper fail infrastructure gcp unisuper)

Innards of MS’ new Recall app

  • Innards of MS’ new Recall app

    Some technical details on the implementation of this new built-in key- and screen-logger, bundled with current versions of Windows, via Kevin Beaumont: “Microsoft have decided to bake essentially an infostealer into base Windows OS and enable by default. From the Microsoft FAQ: “Note that Recall does not perform content moderation. It will not hide information such as passwords or financial account numbers.” Info is stored locally – but rather than something like Redline stealing your local browser password vault, now they can just steal the last 3 months of everything you’ve typed and viewed in one database.” It requires ARM based hardware with a dedicated NPU (“neural processor”). “Recall uses a bunch of services themed CAP – Core AI Platform. Enabled by default. It spits constant screenshots … into the current user’s AppData as part of image storage. The NPU processes them and extracts text, into a database file. The database is SQLite, and you can access it as the user including programmatically. It 100% does not need physical access and can be stolen.” “[The screenshots are] written into an ImageStorage folder and there’s a separate process and SqLite database for them too, it categorises what’s in them. There’s a GUI that lets you view any of them.” Data is not stored with any additional crypto, beyond disk-level encryption via BitLocker. On the upside: for non-corporate users, “there’s a tray icon and you can disable it in Settings.” But for corps: “Recall has been enabled by default globally in Microsoft Intune managed users, for businesses.”

    (tags: microsoft recall security infosec keyloggers via:kevin-beaumont sqlite)

Meredith Whittaker’s speech on winning the Helmut Schmidt Future Prize

  • Meredith Whittaker’s speech on winning the Helmut Schmidt Future Prize

    This is a superb speech, and a great summing up of where we are with surveillance capitalism and AI in 2024. It explains where surveillance-driven advertising came from, in the 1990s:

    First, even though they were warned by advocates and agencies within their own government about the privacy and civil liberties concerns that rampant data collection across insecure networks would produce, [the Clinton administration] put NO restrictions on commercial surveillance. None. Private companies were unleashed to collect and create as much intimate information about us and our lives as they wanted – far more than was permissible for governments. (Governments, of course, found ways to access this goldmine of corporate surveillance, as the Snowden documents exposed.) And in the US, we still lack a federal privacy law in 2024. Second, they explicitly endorsed advertising as the business model of the commercial internet – fulfilling the wishes of advertisers who already dominated print and TV media. 
    How that drove the current wave of AI:
    In 2012, right as the surveillance platforms were cementing their dominance, researchers published a very important paper on AI image classification, which kicked off the current AI goldrush. The paper showed that a combination of powerful computers and huge amounts of data could significantly improve the performance of AI techniques – techniques that themselves were created in the late 1980s. In other words, what was new in 2012 were not the approaches to AI – the methods and procedures. What “changed everything” over the last decade was the staggering computational and data resources newly available, and thus newly able to animate old approaches. Put another way, the current AI craze is a result of this toxic surveillance business model. It is not due to novel scientific approaches that – like the printing press – fundamentally shifted a paradigm. And while new frameworks and architectures have emerged in the intervening decade, this paradigm still holds: it’s the data and the compute that determine who “wins” and who loses.
    And how that is driving a new form of war crimes, pattern-recognition-driven kill lists like Lavender:
    The Israeli Army … is currently using an AI system named Lavender in Gaza, alongside a number of others. Lavender applies the logic of the pattern recognition-driven signature strikes popularized by the United States, combined with the mass surveillance infrastructures and techniques of AI targeting. Instead of serving ads, Lavender automatically puts people on a kill list based on the likeness of their surveillance data patterns to the data patterns of purported militants – a process that we know, as experts, is hugely inaccurate. Here we have the AI-driven logic of ad targeting, but for killing. According to 972’s reporting, once a person is on the Lavender kill list, it’s not just them who’s targeted, but the building they (and their family, neighbours, pets, whoever else) live is subsequently marked for bombing, generally at night when they (and those who live there) are sure to be home. This is something that should alarm us all. While a system like Lavender could be deployed in other places, by other militaries, there are conditions that limit the number of others who could practically follow suit. To implement such a system you first need fine-grained population-level surveillance data, of the kind that the Israeli government collects and creates about Palestinian people. This mass surveillance is a precondition for creating ‘data profiles’, and comparing millions of individual’s data patterns against such profiles in service of automatically determining whether or not these people are added to a kill list. Implementing such a system ultimately requires powerful infrastructures and technical prowess – of the kind that technically capable governments like the US and Israel have access to, as do the massive surveillance companies. Few others also have such access. This is why, based on what we know about the scope and application of the Lavender AI system, we can conclude that it is almost certainly reliant on infrastructure provided by large US cloud companies for surveillance, data processing, and possibly AI model tuning and creation. Because collecting, creating, storing, and processing this kind and quantity of data all but requires Big Tech cloud infrastructures – they’re “how it’s done” these days. This subtle but important detail also points to a dynamic in which the whims of Big Tech companies, alongside those of a given US regime, determines who can and cannot access such weaponry. The use of probabilistic techniques to determine who is worthy of death – wherever they’re used – is, to me, the most chilling example of the serious dangers of the current centralized AI industry ecosystem, and of the very material risks of believing the bombastic claims of intelligence and accuracy that are used to market these inaccurate systems. And to justify carnage under the banner of computational sophistication. As UN Secretary General Antonio Gutiérrez put it, “machines that have the power and the discretion to take human lives are politically unacceptable, are morally repugnant, and should be banned by international law.”

    (tags: pattern-recognition kill-lists 972 lavender gaza war-crimes ai surveillance meredith-whittaker)

The CVM algorithm

  • The CVM algorithm

    A new count-distinct algorithm: “We present a simple, intuitive, sampling-based space-efficient algorithm whose description and the proof are accessible to undergraduates with the knowledge of basic probability theory.” Knuth likes it! “Their algorithm is not only interesting, it is extremely simple. Furthermore, it’s wonderfully suited to teaching students who are learning the basics of computer science. (Indeed, ever since I saw it, a few days ago, I’ve been unable to resist trying to explain the ideas to just about everybody I meet.) Therefore I’m pretty sure that something like this will eventually become a standard textbook topic.” — https://cs.stanford.edu/~knuth/papers/cvm-note.pdf (via mhoye)

    (tags: algorithms approximation cardinality streaming estimation cs papers count-distinct distinct-elements)

Scaleway now offering DC sustainability metrics in real time

  • Scaleway now offering DC sustainability metrics in real time

    Via Lauri on the ClimateAction.tech slack: “Huge respect to Scaleway for offering its data centres power, water (yes, even WUE!) and utilisation stats in real-time on its website. Are you listening AWS, Azure and GCP?” Specifically, Scaleway are reporting real-time Power Usage Effectiveness (iPUE), real-time Water Usage Effectiveness (WUE), total IT kW consumed, freechilling net capacity (depending on DC), outdoor humidity and outdoor temperature for each of their datacenters on the https://www.scaleway.com/en/environmental-leadership/ page. They use a slightly confusing circular 24-hour graph format which I’ve never seen before; although I’m coming around to it, I still think I’d prefer a traditional X:Y chart format. Great to see this level of data granularity being exposed. Hopefully there’ll be a public API soon

    (tags: scaleway sustainability hosting datacenters cloud pue wue climate via:climateaction)

“Unprecedented” Google Cloud event wipes out customer account and its backups

Linux maintainers were infected for 2 years by SSH-dwelling backdoor with huge reach | Ars Technica

American Headache Society recommend CGRP therapies for “first-line” migraine treatment

  • American Headache Society recommend CGRP therapies for “first-line” migraine treatment

    This is big news for migraine treatment, and a good indicator of how reliable and safe these new treatments are, compared to the previous generation: “All migraine preventive therapies previously considered to be first-line treatments were developed for other indications and adopted later for migraine. Adherence to these therapies is often poor due to issues with efficacy and tolerability. Multiple new migraine-specific therapies have been developed based on a broad foundation of pre-clinical and clinical evidence showing that CGRP plays a key role in the pathogenesis of migraine. These CGRP-targeting therapies have had a transformational impact on the management of migraine but are still not widely considered to be first-line approaches.” [….] “The CGRP-targeting therapies should be considered as a first-line approach for migraine prevention […] without a requirement for prior failure of other classes of migraine preventive treatment.” I hope to see this elsewhere soon, too — and I’m also hoping to be prescribed my first CGRP treatments soon so I can reap the benefits myself; migraines have been no fun.

    (tags: migraine health medicine cgrp ahs headaches)

Should people with Long Covid be donating blood?

  • Should people with Long Covid be donating blood?

    Leading Long Covid and ME researchers and patient-advocates who spoke with The Sick Times largely agreed that blood donation could worsen a patient’s symptoms. However, they also cited concerns about a growing body of research that shows a variety of potential issues in the blood of people with Long Covid which could make their blood unsafe for recipients. “Based on the levels of inflammatory markers and microclots we have seen in blood samples from both Long Covid and ME/CFS, I do not think the blood is safe to be used for transfusion,” said Resia Pretorius, a leading Long Covid researcher and distinguished professor from the physiological sciences department at Stellenbosch University in South Africa.

    (tags: me-cfs long-covid covid-19 blood-transfusion medicine)

UN expert attacks ‘exploitative’ world economy in fight to save planet

  • UN expert attacks ‘exploitative’ world economy in fight to save planet

    Outgoing UN special rapporteur on human rights and the environment from 2018 to 2024, David Boyd, says ‘there’s something wrong with our brains that we can’t understand how grave this is’:

    “I started out six years ago talking about the right to a healthy environment having the capacity to bring about systemic and transformative changes. But this powerful human right is up against an even more powerful force in the global economy, a system that is absolutely based on the exploitation of people and nature. And unless we change that fundamental system, then we’re just re-shuffling deck chairs on the Titanic.” “The failure to take a human rights based approach to the climate crisis – and the biodiversity crisis and the air pollution crisis – has absolutely been the achilles heel of [anti-climate-change] efforts for decades. “I expect in the next three or four years, we will see court cases being brought challenging fossil fuel subsidies in some petro-states … These countries have said time and time again at the G7, at the G20, that they’re phasing out fossil-fuel subsidies. It’s time to hold them to their commitment. And I believe that human rights law is the vehicle that can do that. In a world beset by a climate emergency, fossil-fuel subsidies violate states’ fundamental, legally binding human rights obligations.” […] Boyd said: “There’s no place in the climate negotiations for fossil-fuel companies. There is no place in the plastic negotiations for plastic manufacturers. It just absolutely boggles my mind that anybody thinks they have a legitimate seat at the table. “It has driven me crazy in the past six years that governments are just oblivious to history. We know that the tobacco industry lied through their teeth for decades. The lead industry did the same. The asbestos industry did the same. The plastics industry has done the same. The pesticide industry has done the same.”

    (tags: human-rights law david-boyd un climate-change fossil-fuels)

UniSuper members go a week with no account access after Google Cloud misconfig | Hacker News

Bridgy Fed

  • Bridgy Fed

    Bridgy Fed connects web sites, the fediverse, and Bluesky. You can use it to make your profile on one visible in another, follow people, see their posts, and reply and like and repost them. Interactions work in both directions as much as possible.

    (tags: blog fediverse mastodon social bluesky)

My (Current) Solar PV Dashboard

About a year ago, I installed a solar PV system at my home. I wound up with a set of 14 panels on my roof, which can produce a max of 5.6 kilowatts output, and a 4.8 kW Dyness battery to store any excess power.

Since my car is an EV, I already had a home car charger installed, but chose to upgrade this to a MyEnergi Zappi at the same time, as the Zappi has some good features to charge from solar power only — and part of that feature set involved adding a Harvi power monitor.

With HomeAssistant, I’ve been able to extract metrics from both the MyEnergi components and the Solis inverter for the solar PV system, and can publish those from HomeAssistant to my Graphite store, where my home Grafana can access them — and I can thoroughly nerd out on building an optimal dashboard.

I’ve gone through a couple of iterations, and here’s the current top-line dashboard graph which I’m quite happy with…

Let’s go through the components to explain it. First off, the grid power:

Grid Import sans Charging

This is power drawn from the grid, instead of from the solar PV system. Ideally, this is minimised, but generally after about 8pm at night the battery is exhausted, and the inverter switches to run the house’s power needs from the grid.

In this case, there are notable spikes just after midnight, where the EV charge is topped up by a scheduled charge on the Zappi, and then a couple of short duration load spikes of 2kW from some appliance or another over the course of the night.

(What isn’t visible on this graph is a longer spike of 2kW charging from 07:00 until about 08:40, when a scheduled charge on the Solis inverter charges the house batteries to 100%, in order to load shift — I’m on the Energia Smart Data contract, which gives cheap power between 23:00 and 08:00. Since this is just a scheduled load shift, I’ve found it clearer to leave it off, hence “sans charging”.)


Solar Generation

This is the power generated by the panels; on this day, it peaked at 4kW (which isn’t bad for an Irish slightly sunny day in April).


To Battery From Solar

Power charged from the panels to the Dyness battery. As can be seen here, during the period from 06:50 to 09:10, the battery charged using virtually all of the panels’ power output. From then on, it periodically applied short spikes of up to 1kW, presumably to maintain optimal battery operation.


From Battery

Pretty much any time the batteries are not charging, they are discharging at a low rate. So even during the day time with high solar output, there’s a little bit of battery drain going on — until 20:00 when the solar output has tailed off and the battery starts getting used up.