Friday, February 27, 2026
Home Blog

The actual fact that this text calls to thoughts a Roald Dahl quick story might be a crimson flag

0


 Victor Tangermann writing for Futurism.

 New Platform Lets You Gamble on CCTV Footage

Due to the rise of sports activities betting and prediction markets, playing
has turned from an exercise sequestered to casinos and scratch tickets
into one thing that virtually anyone with an web connection can
dive into headfirst — one thing that has consultants warning of a surge in playing habit, particularly amongst younger, impressionable minds.

Platforms like Polymarket imply that gamblers are not restricted to
betting their hard-earned money on crimson or black throughout a recreation of
roulette or mindlessly pulling the lever of a slot machine — now they
can guess on whether or not Jesus Christ will return earlier than the long-awaited launch of the online game “GTA VI,” or by what date the United States will strike Iran.

And now, a brand new playing recreation known as Rush Hour CCTV on the crypto
on line casino platform Roobet is taking the phenomenon to an much more
ludicrous conclusion. As on line casino publication Win.gg factors out,
gamblers there are betting on what number of vehicles, vehicles, buses,
bikes, or pedestrians are crossing a particular level inside a
predetermined time interval on a avenue in reside, licensed CCTV footage
being streamed from massive cities, together with Tokyo, Bangkok, New York, and
London.

It might sound banal — and it some ways it’s — however as an alternative of relying
on conventional random quantity generator mechanics (RNG) that decide
the result in slot machines, the brand new recreation depends on the actual world
as an alternative.

The sport is deceptively easy. Every spherical kicks off with a easy message: “What number of autos?”

Gamblers can then guess on what number of autos will cross a degree inside
the subsequent 55 seconds. They’ll additionally give a spread as a solution, which can
give a considerably decrease payout than guessing the precise quantity.

 

 The remainder of the article focuses appropriately on the rise of playing and playing habit, significantly amongst younger males, however there’s one other concern price noting. (For extra on that, take a look at this USA Right now article.)

Every time you possibly can guess on one thing, there’s a temptation to attempt to rig the result. One of the best-known instance is the just about universally condemned apply of fixing sporting occasions. So far as I can inform, even among the many wackiest libertarians, there’s no nice push to legalize point-shaving or to permit jockeys to guess in opposition to their very own horses. Even in comparison with different types of dishonest, throwing a recreation—and even merely ensuring your staff doesn’t cowl the unfold—is seen as particularly unacceptable.

However simply to play satan’s advocate, isn’t this stage of social opprobrium a bit extreme given the precise social hurt? Sports activities, regardless of all of the mythology we construct up round them, are essentially trivial. Traditionally, the first victims of issues like point-shaving schemes have been individuals who had been participating within the usually criminality of sports activities betting. Sure, the winners had been even much less sympathetic—skilled gamblers and arranged crime—however we’re not precisely speaking about bilking widows and orphans out of their life financial savings right here.

We are able to definitely be impressed by the ability and dedication of a performer. We are able to recognize the aesthetics of an incredible athlete (Muhammad Ali, Wayne Gretzky, my private alternative, fourth-quarter Joe Montana). However we might make an analogous case for nearly any type of leisure. It’s not exceptional for an actor who’s pissed off on the producers of a movie to ship a nasty efficiency, however I’ve by no means heard of anybody suggesting they need to be banned for all times from the flicks.

When, nevertheless, you begin betting on real-life occasions, the potential penalties of rigging the outcomes can get very massive in a short time. I can consider plenty of methods to ensure low visitors at a given intersection at a given time. None of them are issues we wish individuals doing.

Roald Dahl explored this concept—and the potential for its unintended penalties—in his traditional quick story “A Dip within the Pool.” It’s nicely price trying out. Yow will discover it in lots of anthologies on-line, together with the Web Archive, or you possibly can take a look at one of many diversifications. It was filmed for Alfred Hitchcock Presents, starring Keenan Wynn (although that model doesn’t seem like streaming). In the event you don’t thoughts ’80s videotape cinematography, I’ve embedded a model from Tales of the Sudden starring the fantastic character actor Jack Weston.

The Means We Discover, That’s What Actually Issues: Instantiating UI Elements with Distinguishing Variations

0


Entrance-end builders writer UI elements to be broadly reusable by parameterizing visible and behavioral properties. Whereas versatile, this makes instantiation more durable, as builders should motive about quite a few property values and interactions. In follow, they need to discover the element’s giant design area and supply reasonable and pure values to properties. To handle this, we introduce distinguishing variations: variations which might be each mimetic and distinct. We body distinguishing variation technology as design-space sampling, combining symbolic inference to establish visually necessary properties with an LLM-driven mimetic sampler to provide reasonable instantiations from its world data. We instantiate distinguishing variations in Celestial, a software that helps builders discover and visualize distinguishing variations. In a examine with front-end builders (n=12), members discovered these variations helpful for evaluating and mapping element design areas, reported that mimetic instantiations had been domain-relevant, and validated that Celestial reworked element instantiation from a handbook course of right into a structured, exploratory exercise.

FinOps for brokers: Loop limits, tool-call caps and the brand new unit economics of agentic SaaS

0

The agentic COGS stack

As head of AI R&D, I spend numerous time with architects and CTOs, and the dialog virtually at all times lands on a COGS breakdown that mirrors the agent’s structure:

  1. Mannequin inference: Tokens throughout planner/executor/verifier calls, normally the biggest contributor to COGS of agentic software program
  2. Instruments and unwanted side effects: Paid APIs (e.g., internet search), per-record automation charges, retries and idempotent write safeguards.
  3. Orchestration runtime: Employees, queues, state storage and sandboxed execution for code and paperwork.
  4. Reminiscence and retrieval: Embeddings, vector storage, index refresh and context-building or summarization checkpoints.
  5. Governance and observability: Tracing, analysis suites, security filters and audit retention.
  6. People within the loop: Evaluation time, escalations and assist load created by agent errors.

How does FinOps assist standardize unit economics when outcomes span actions, workflows and duties?

Gartner has cautioned that price strain can derail agentic applications, which makes unit economics a supply requirement.

In relation to most SaaS merchandise, prospects don’t purchase uncooked tokens; as an alternative, they purchase progress towards finishing their work, e.g., instances resolved, pipelines up to date, stories produced or exceptions dealt with. Unit economics turns into actionable after we measure on the boundary the place that worth is delivered, and that boundary expands as your agentic SaaS matures: from solutions within the UI, to a single authorised operation, to a multi-step course of and ultimately to a recurring accountability the agent runs end-to-end. Within the following desk, we lay out this construction and the corresponding unit metric and consequence to meter at every degree of scope.

How you can Create a FinTech App in 2026: Varieties, Necessities & Improvement Course of


How you can Create a FinTech App in 2026: Varieties, Necessities & Improvement Course of

The FinTech trade has moved from its experimental part to its present state the place clients anticipate to obtain prompt funds and see full charge transparency and expertise simple account setup and revel in safety safety that matches banking requirements. The regulatory authorities require companies to attain full compliance with the established rules. Buyers demand that corporations develop merchandise which may develop to fulfill future market demand.

The event of a FinTech utility in 2026 requires an organization to function between three totally different fields which embody finance along with expertise and regulatory requirements. Many founders select to accomplice with established fintech software program growth firm as a result of these corporations create compliance-first programs which embody security measures from their preliminary design part. 

The information offers important details about main app classes and fundamental wants and the entire growth process required for market introduction of a FinTech product.

What Sorts of FinTech Apps Can You Construct?

Person intent or product class impacts all the technological stack, regulatory obligations and integration wants.

Digital Banking Apps

Digital banks allow customers to create accounts, acquire playing cards, perform fund transfers, and monitor their monetary actions. The purposes want core banking programs and should fulfill each anti-money laundering and know-your-customer rules whereas working on reliable infrastructure. 

The purposes want to keep up fixed operation and shield person information as a result of clients use them as their essential monetary platforms.

Fee and Cash Switch Apps

Fee platforms deal with home and worldwide transfers whereas offering forex change providers and prompt steadiness updating capabilities. The technical group has established these three essential aims. 

  • The primary requirement must ship fast transaction processing. 
  • The second requirement wants to determine a safe connection between shoppers and cost programs. 
  • The third requirement must create charge buildings that clients can simply perceive. 

The system must help a excessive variety of concurrent customers. System efficiency determines person confidence on this specific group of consumers.

Lending and BNPL Apps

Lending platforms rely on three essential parts which embody credit score scoring fashions and automatic underwriting programs and AI-based danger evaluation strategies. 

The programs have to include three important components which embody Identification verification and Fraud prevention programs and Regulatory-compliant mortgage logic and Clear resolution explanations. Shopper lending markets implement their compliance necessities with notably rigorous requirements.

Funding and Buying and selling Apps

Funding platforms combine three core parts which embody real-time market information and portfolio monitoring and order execution programs. 

The system wants to keep up operational functionality throughout instances of peak utilization which happens when markets expertise excessive volatility.

Private Finance Administration Apps

PFM purposes present customers with three essential features which embody expense monitoring and price range administration and money movement prediction. 

The system makes use of open banking connectors along with behavioral information evaluation to create custom-made person insights.

Core Necessities for a FinTech App

A number of components are equally impermissible for any product.

1. Regulatory Compliance

The design of system structure follows its compliance necessities. Your utility should adjust to rules which differ between totally different geographic areas. Your utility must help the next rules: 

  • Information privateness rules
  • AML and KYC procedures
  • Fee safety requirements 
  • Open banking directives
  • Full audit trails. 

The method of retrofitting compliance necessities after a product launch results in important prices as a result of it requires full system redesign.

2. Safety-First Structure

Safety measures create belief whereas they safeguard confidential monetary info. 

Important parts embody:

  • Finish-to-end encryption
  • Safe API gateways
  • Biometric authentication
  • Danger-based multi-factor authentication
  • Actual-time fraud monitoring

Safety programs should shield customers whereas minimizing disruptive obstacles to their expertise.

3. Scalable Cloud Infrastructure

Monetary purposes attain their highest utilization instances when workers obtain their salaries and when corporations conduct their advertising and marketing actions and when monetary markets expertise unpredictable modifications. 

The cloud-native structure along with its horizontal scaling functionality offers the system with dependable efficiency in periods of elevated person exercise.

4. API-First Ecosystem

FinTech purposes set up connections to banking programs and cost processing networks and credit score reporting businesses and identification authentication providers. 

The system structure which makes use of API connections for all its parts allows each seamless system integration and future system progress.

5. Information Analytics and Monitoring

FinTech merchandise obtain success via their use of data-based decision-making. Groups ought to monitor:

  • Onboarding conversion charges
  • Drop-off factors
  • Fraud makes an attempt
  • Fee failures
  • Infrastructure efficiency

Analytics helps each progress optimization and regulatory reporting.

Step-by-Step FinTech App Improvement Course of

Correct processes are precious in eliminating dangers and decreasing time-to-market.

Step 1: Market Analysis and Validation

Begin by defining the issue, target market, monetization mannequin, and aggressive positioning. 

The group must confirm market demand via conducting interviews and testing prototypes earlier than they’ll begin constructing the entire product.

Step 2: Authorized and Regulatory Planning

Earlier than growth begins, all three points of licensing necessities and geographic restrictions and compliance obligations have to be decided. 

The authorized framework of a undertaking determines how its technical programs will likely be designed.

Step 3: Product Discovery and Technical Planning

The undertaking requires you to determine the MVP boundaries which embody person interplay paths system design and mandatory compliance procedures and system connection specs. 

The undertaking wants exact documentation which can cease scope enlargement and cut back technical obligations.

Step 4: UI and UX Design

Monetary UX requires designers to create interfaces which present customers their monetary info in simple methods and present all monetary information.

Customers anticipate:

  • Clear charge breakdowns
  • Seen transaction standing
  • Easy onboarding
  • Comprehensible error messages

Belief between individuals develops once they talk clearly and deal with their interactions in an uncomplicated method.

Step 5: Backend and Infrastructure Improvement

The principle backend parts of a system consist of those important useful components:

  • Authentication providers
  • Transaction engine
  • Compliance and AML module
  • Fraud detection system
  • Audit logging infrastructure

The design of cloud deployment permits programs to attain each versatile operations and scalable progress.

Step 6: Safety and Efficiency Testing

The testing course of requires execution of penetration checks and vulnerability assessments and cargo testing and fraud simulations earlier than the system launch. 

Monetary purposes want testing as a result of system failures result in extreme monetary loss.

Step 7: Launch and Steady Optimization

After launch, efficiency monitoring must be carried out along with fraud sample evaluation and compliance logic updates and onboarding course of enhancements. 

FinTech growth retains progressing due to altering rules and person calls for.

Why Structure Technique Determines Lengthy-Time period Success

The FinTech startups face their greatest problem as a result of their technical programs fail to maintain their enterprise operations regardless of having legitimate enterprise concepts. The system experiences three essential issues which embody rigid compliance necessities and unstable system connections and difficulties dealing with elevated person visitors. 

The group ought to develop its compliance programs via modular parts whereas establishing its computational programs via scalable architectural design as a result of this method will lower future bills and remove the necessity for in depth system renovations. The power to adapt takes precedence as a result of it holds extra worth than the requirement to finish duties quickly.

Last Ideas

The event of a FinTech utility wants strategic planning and regulatory compliance and safe utility design and everlasting product administration for its execution by 2026. The strongest FinTech merchandise mix: 

  • Seamless onboarding 
  • Embedded compliance 
  • Robust safety 
  • Actual-time efficiency 
  • Clear communication. 

Your utility establishes belief via the mixed operation of those components. Belief serves as the final word aggressive benefit within the monetary providers trade.

Gemini simply made it simpler to import pictures and movies

0


Ryan Haines / Android Authority

TL;DR

  • The Gemini app now permits you to share a number of pictures and movies from different apps utilizing Android’s share menu.
  • This capability was beforehand restricted to a single picture, and movies beforehand couldn’t be imported this fashion in any respect.
  • The change is dwell as of model 1.0.869192867 of Gemini, which is on the market now.

The Gemini app has allow you to use the attachment menu to add movies to the AI for some time now. Now, you’re additionally capable of share movies from different apps into Gemini, in addition to a number of pictures directly.

As of model 1.0.869192867 of the Gemini app, Android’s share sheet can now share each movies and a number of pictures at a time into Gemini. Beforehand, you weren’t capable of import video recordsdata from exterior Gemini in any respect, and whilst you might share a single picture from one other app into Gemini, now you’re capable of ship as much as 10 at a time.

Don’t need to miss the most effective from Android Authority?

google preferred source badge light@2xgoogle preferred source badge dark@2x

The flexibility to share a number of items of media from exterior Gemini can save a while if, for instance, you need to share a number of pictures out of your cloud storage on Google Photographs. Earlier than this newest replace, you’ll have needed to obtain all the pictures you needed to import into Gemini, open the Gemini app, after which add these pictures from inside Gemini utilizing the attachment menu.

Now, you simply choose the pictures (or movies) you need, faucet the share button, and select Gemini from the share sheet. There’s nothing stopping you from attempting to share greater than 10 items of media into Gemini in a single go, however if you happen to do, solely the primary 10 chosen will truly make the leap — all subsequent recordsdata will probably be discarded.

Model 1.0.869192867 of the Discord app is on the market on the Play Retailer proper now.

Thanks for being a part of our group. Learn our Remark Coverage earlier than posting.

Take it from the Olympics, slushy winter sports activities will be the new regular

0

The 2026 Winter Olympic Video games in Milan, Italy, was a slushy affair. And the Paralympics, which begin March 6, could also be extra of the identical.

From ice rinks to ski slopes, situations have been hotter and wetter than anticipated. Some Olympians — together with determine skaters, speedskaters and cross-country skiers — cited the slush as contributing to an uncommon rash of falls, crashes and disappointing performances.

However heat, moist situations are one thing that elite winter athletes should get used to. Local weather change is driving temperatures larger, resulting in much less snowfall and shorter intervals of protected ice on frozen our bodies of water. As competing on synthetic snow or in indoor ice arenas turns into extra frequent, what athletes study may supply the remainder of us ideas for having fun with these environments safely.

Snow-fakes

Sarah Cookler remembers the primary time she noticed a racecourse lined with simply synthetic snow. “It was within the Pyrenees Mountains in France,” she remembers. “The snow run had grass on both aspect.”

Cookler was teaching Staff USA on the Worldwide Ski Mountaineering Federation’s World Youth Cup. Ski mountaineering — also referred to as “skimo” — is a dash up and down a snow-covered mountain.

It was March 2023, nearly the tip of ski season, and the snow run was beat up and compacted. It was additionally a heat day throughout an unseasonably scorching month worldwide. “Gosh, it was in all probability round 40 to 50 levels Fahrenheit,” Cookler remembers. “The situations have been moist.”

Her staff had by no means competed on a heat, slick course.

In heat or dry winters, many ski competitions happen on synthetic snow, resembling right here at Val-Louron, a ski resort within the French Pyrenees, in March 2023. It was an unusually heat month worldwide.S. Cookler

The staff warmed up by stretching and working on the dry, yellow grass bordering the beginning line. Then they carried their skis over to the snow to prepare for the beginning whistle.

This staff trains in Utah’s Wasatch Mountains, the place winters deliver excessive snowpack and months of powder snow. “Our athletes are used to snowboarding chilly, deep, dry snow,” Cookler says.

Synthetic snow differs from the pure stuff, and Cookler’s staff had skied on less-slick synthetic snow earlier than. Cookler had coached the athletes on strategies for synthetic snow. In order they kicked off, they’d some sense of what was forward.

The 2026 Winter Olympics additionally relied closely on human-made snow. And the 2022 Winter Olympics in Beijing used the stuff solely. Watch reruns on-line and also you in all probability gained’t discover it wasn’t the actual factor, however those that skied on it have stated they may undoubtedly inform.

The colour is nearly beige, which the attention can simply pick, says snow hydrologist Noah Molotch of the College of Colorado Boulder. “It’s not yellow snow, but it surely does have a barely darker look.”

Molotch research mountain snowpack and spends loads of time snowboarding. The easiest way to grasp ski safely in synthetic snow, he says, is to know its properties. Underneath highly effective microscopes, synthetic snow seems nothing like actual flakes. Its beady form comes from the best way it’s produced.

Machines begin making these frozen bits when the air temperature is at or under –2.5° Celsius (27.5° Fahrenheit). Excessive-pressure hoses use compressed air to spray water upward, creating effective mist. The tiny droplets rapidly freeze into microbeads that highly effective blowers propel out onto the slopes. Whereas the beads are mixtures of ice and air, as snow is, they don’t maintain as a lot air as pure snowflakes, Molotch says.

In contrast to synthetic snow, pure snow is available in many shapes — from easy needles, columns and plates to advanced, stellar dendrites. Totally different combos of air temperature and humidity type flakes with completely different styles and sizes. If the air is chilly and dry, ice crystals have a tendency to remain small and compact. In humid air, ice crystals develop quickly and type intricate, fernlike branches that clump into flakes. An enormous dump of this type of snow ends in powder, the snow many skiers love.

Quicker occasions

Powder’s fluffiness makes it a softer floor on which to fall. However larger temperatures can soften the floor, forming a stiff crust over the fluffy layered snow under. When extra snow falls on prime of those layers, it creates an irregular racecourse floor, Molotch says.

Two people ski down a mountainside.
Alpine skiers race on February 20 on the Beijing 2022 Winter Olympics video games. All out of doors snow occasions there, together with this one, have been held on synthetic snow. Rivals needed to regulate for the way it behaves considerably in a different way from pure snow. Alex Pantling/Employees/Getty Pictures AsiaPac

Synthetic snow is much less prone to get rutted by skis. Its tiny beads bond collectively effectively to provide a agency floor that lasts longer than pure snow. “It tends to withstand the drive of a ski driving the load of an Olympic athlete on one edge,” Molotch says. That permits its floor to stay smoother and skis to race throughout it sooner and extra effectively.

Aggressive athletes usually examine racecourses the day earlier than they compete to allow them to match their gear to the situations. For Cookler and her staff, this meant tuning skis and selecting the best wax and skins. That is much more essential when racing on synthetic snow as a result of it “rips the wax off lots sooner and is abrasive on the skis,” Cookler says.

Athletes use a file to flatten a ski’s base and sharpen uninteresting edges to enhance management and grip. And to assist skis glide effectively, they coat the bases with wax. Skiers attempt to match the suitable wax to situations on the slope — resembling whether or not it’s moist or dry, powdery or icy. Moist snow creates a suctionlike impact on skis. So for his or her Pyrenees trek, Cookler’s staff selected a hydrophobic wax.

For the uphill segments of the race, the athletes hooked up grippy, hydrophobic climbing skins to their ski bases to maintain from sliding backward. Then they gauged what to put on for the race. “Synthetic snow is often colder than pure snow,” Cookler says. And its temperature “tends to vary much less as a result of it’s compacted.” So for that heat spring day, her staff wore its common winter race fits.

On race day, they trusted their approach and coaching. “Going downhill when snow is mushy and slushy goes to be completely different than when it’s agency and icy,” Cookler says. In slushy, synthetic snow, Cookler advises softer turns that don’t dig deep into the snow. Skiers can then preserve their skis flat, as an alternative of banking, to keep up their pace. 

More durable falls

However what athletes achieve in pace in synthetic snow, they pay for in tougher falls, Cookler says. The rationale: “There is no such thing as a give in that snow.”

Groups want to coach on any such floor as a lot as potential within the lead-up to races. A warming local weather has led to much less predictable snowfalls, so in the present day synthetic snow is outstanding in all snowboarding occasions.

A closeup image of artificial snow. The snow appears grayish white against a blue background.
This microscope picture exhibits the beadlike construction of machine-made synthetic snow, which is sprayed by cannons at ski resorts and appears nothing just like the intricate branching shapes of pure snowflakes. © KENNETH LIBBRECHT/Flickr

It’s no shock that many ski resorts additionally use snow machines. From 2014 to 2023, the Northern Hemisphere misplaced a mean of seven winter days per 12 months that ought to have been under freezing, an evaluation from Local weather Central discovered. And Europe misplaced extra freezing winter days in contrast with different areas — a mean of two weeks per 12 months.

Leisure skiers don’t all the time need to ski on the factitious white stuff. Some high-altitude resorts are in situations chilly sufficient that they by no means must make snow, although they nonetheless must shorten their seasons. Different resorts use a mixture of synthetic and pure snow. They begin making snow within the fall to construct up a base reserve in case snow comes late within the winter — or in no way.

Molotch advises skiers and snowboarders to ask resorts the place their synthetic snow runs are. Should you don’t spot a change in snow kind, the brand new situations may lead to a crash.

“I’ve a lifetime of snowboarding. And at one level I had devoted my life to it,” Molotch says. Influence on onerous snow surfaces has contributed to cartilage harm on a few of his joints. For Molotch, the possibility of a fall on synthetic snow isn’t price it. “I ski away from it,” he says.

Ice rink benefit

Aggressive ice athletes — determine skaters, hockey gamers, pace skaters and curlers — aren’t experiencing as many adjustments as snow athletes are as a result of their sports activities largely happen in indoor ice arenas. Nonetheless, ice high quality can nonetheless differ significantly. High athletes know learn whether or not that is prone to gradual them down or up their recreation.

“Once you first step on the market, you’ll be able to inform if the ice goes to be onerous or mushy,” says Kelsey Koelzer, the top coach for girls’s ice hockey at Arcadia College in Glenside, Pa. She feels mushy ice makes her exert extra effort to maneuver. The chilly, onerous ice that’s good for hockey permits gamers to skate sooner and with much less effort. “It impacts how rapidly the sport might be performed, how rapidly the puck is transferring out on the ice and how briskly goalies can transfer back and forth.”

Trendy ice rinks and arenas produce completely different ice for various sports activities. Determine skaters want softer, hotter ice, which grips their skate blades higher. Curlers choose pebbled ice that reduces floor friction and permits gamers to higher management the trajectory and pace of the curling stone. And pace skaters and hockey gamers? They ask for a tougher, colder floor — sturdy ice that’s constructed for pace.

Technicians alter the ice floor by controlling an area’s ice temperature, humidity, air temperature and ice thickness. The floor is constructed up layer by layer by spraying a millimeter (4 hundredths of an inch) of purified water with every go. Beneath the rink, a maze of pipes stuffed with coolant freezes every layer and retains the rink frozen. However indoor ice high quality can nonetheless differ, even in regional and nationwide video games the place arenas are presupposed to comply with requirements.

“There is no such thing as a consensus on what is perfect ice,” says Stefania Impellizzeri, a chemist at Toronto Metropolitan College. She was a part of a staff that surveyed managers of North American ice arenas. These arenas haven’t any scientific technique to precisely measure how they’re assembly the ice requirements set by sports activities leagues, her staff discovered.

That creates an unavoidable variation in ice high quality, which athletes should account for as they compete elsewhere, Koelzer says. “In hotter climates, it’s going to be tougher to maintain the ice as onerous as in colder climates,” she says. “The cooling models that preserve the ice frozen need to work a lot tougher.”

Altering lake ice

Whereas arenas are about ice consistency and competitors, skating on frozen ponds and lakes is about having enjoyable. However warming winters are making frozen ponds and lakes probably unstable — and unsafe.

Lake ice has been forming later and breaking apart earlier, shortening the interval for protected ice cowl, hydrologist Joshua Culpepper of York College in Toronto, Canada, and colleagues reported in 2024 in PLOS One. The staff analyzed knowledge for ice thickness in Northern Hemisphere lakes going again to 1850 and projected how situations would possibly change by the tip of this century.

Greater temperatures and altering ice high quality will seemingly result in between eight and 19 extra days of unsafe ice in early winter whereas early melting will seemingly add six to eight extra days of unsafe ice days in late winter. Globally, there may very well be a mean of 5 to 29 fewer days that lake ice will likely be protected to stroll or skate on, the staff discovered. The precise quantity will depend upon how a lot hotter northern winters turn out to be.

Maybe extra troubling, ice thickness could not function signal of how protected it’s. Some U.S. states suggest that 10 centimeters of recent, black ice is protected for individuals to stroll on. Black ice — additionally known as clear ice or blue ice — types in lakes throughout calm wind-free, freezing situations and is probably the most structurally steady.

An person ice skates on a frozen lake. The ice appears black.
When skating on a lake or pond, the floor ought to ideally be clear ice, as proven right here, and a minimal of 10 centimeters thick. Often known as black ice, it’s far stronger than white ice, which is turning into extra frequent atop northern lakes.Tom Werner/DigitalVision/Getty Pictures

White ice develops when snow falls on prime of black ice, melts, then refreezes. Thicker layers of white ice on prime of black ice may make the floor unstable — even when their whole thickness provides as much as 10 centimeters, Culpepper and colleagues reported in 2024 in Nature Critiques: Earth & Setting.

“What we’re seeing and what we’re predicting is that local weather change is contributing to extra white-ice situations,” says examine coauthor Sapna Sharma, a biologist additionally of York College.

White ice round zero levels Celsius is about 50 % weaker than black ice on the identical temperature. “So, should you’re out on a lake that had a small layer of black ice after which it snowed lots,” Culpepper says, “you want twice the advisable ice thickness [for it to be safe].”

Get pleasure from nature safely

It’s nonetheless potential to securely skate outside. It simply could take a bit extra care and warning than a century in the past.

Angelina Huang is a retired Staff USA determine skater and former gold medalist on the U.S. Nationals competitors. Huang now feels freer skating on frozen lakes than she did when she did laps on an ice rink. “It’s lots much less limiting,” she says. “A number of the lakes that I are likely to skate on stretch 10 to fifteen miles lengthy.”

Huang makes it a precedence to skate on protected, black ice and trains in self-rescue and ice data yearly. “I’m assured in my coaching,” she says. However much less skilled skaters want to search out frozen ponds or lakes which might be managed by security consultants. “That means [they] gained’t allow you to on the ice till it’s protected.” And, she emphasizes, it’s essential to by no means skate alone outside.

Sharma agrees. And should you’re going to enterprise onto lake ice, she provides, discover ways to swim in chilly water.

Koelzer hasn’t skated on a frozen pond or an outside rink in additional than a decade. However many hockey gamers do for enjoyable and nostalgia. Get pleasure from skating in nature however “all the time have your guard up,” she advises. On this warming world, snow and ice current new challenges: To relax out, you must tune in to these adjustments.


Exahash, Zettahash, Yottahash

0


Once I first heard of cryptographic hash capabilities, they have been referred to as “one-way capabilities” and appeared like a gentle curiosity. I had no concept that at some point the world would compute a mind-boggling variety of hashes each second.

As a result of Bitcoin mining requires computing hash capabilities to unravel proof-of-work issues, the world presently computes round 1,000,000,000,000,000,000,000 hashes, one zettahash, per second. Different cryptocurrencies makes use of hash capabilities for proof-of-work as properly, however they contribute a negligible quantity of hashes per second in comparison with Bitcoin.

The hashrate varies over time as a result of the problem of Bitcoin mining is regularly adjusted to maintain new blocks being produced at about one each ten minutes. As {hardware} has gotten quicker, the problem stage of mining has gotten greater. When the worth of Bitcoin drops and mining turns into much less worthwhile, the problem adjusts downward. There are different elements too, and hashrate is variable.

The prefix giga- (109) wasn’t extensively recognized till pc reminiscence and storage entered the gigabyte vary. Then the prefix prefix tera- (1012) grew to become acquainted when disk drives entered terabyte territory. The prefixes for bigger models corresponding to peta- (1015) and exa- (1018) are nonetheless not extensively recognized. The prefixes zetta- (1021) and  yotta- (1024) have been adopted in 1991 and ronna- (1027) and quetta (1030) have been adopted in 2022.

When the Bitcoin hashrate is comparatively low, it’s within the vary of a whole bunch of exahashes per second. On the time of writing the hashrate is 1.136 ZH/s, 1.136 × 1021 hashes per second. This places the hashrate per day within the tens of yottahashes and the variety of hashes per yr in tens of ronnahashes.

Associated posts

The put up Exahash, Zettahash, Yottahash first appeared on John D. Prepare dinner.

Understanding the generalized technique of moments (GMM): A easy instance

0


(newcommand{Eb}{{bf E}})This publish was written collectively with Enrique Pinzon, Senior Econometrician, StataCorp.

The generalized technique of moments (GMM) is a technique for setting up estimators, analogous to most chance (ML). GMM makes use of assumptions about particular moments of the random variables as an alternative of assumptions about the whole distribution, which makes GMM extra sturdy than ML, at the price of some effectivity. The assumptions are referred to as second circumstances.

GMM generalizes the strategy of moments (MM) by permitting the variety of second circumstances to be better than the variety of parameters. Utilizing these further second circumstances makes GMM extra environment friendly than MM. When there are extra second circumstances than parameters, the estimator is claimed to be overidentified. GMM can effectively mix the second circumstances when the estimator is overidentified.

We illustrate these factors by estimating the imply of a (chi^2(1)) by MM, ML, a easy GMM estimator, and an environment friendly GMM estimator. This instance builds on Effectivity comparisons by Monte Carlo simulation and is comparable in spirit to the instance in Wooldridge (2001).

GMM weights and effectivity

GMM builds on the concepts of anticipated values and pattern averages. Second circumstances are anticipated values that specify the mannequin parameters by way of the true moments. The pattern second circumstances are the pattern equivalents to the second circumstances. GMM finds the parameter values which can be closest to satisfying the pattern second circumstances.

The imply of a (chi^2) random variable with (d) diploma of freedom is (d), and its variance is (2nd). Two second circumstances for the imply are thus

[begin{eqnarray*}
Ebleft[Y – d right]&=& 0
Ebleft[(Y – d )^2 – 2d right]&=& 0
finish{eqnarray*}]

The pattern second equivalents are

[begin{eqnarray}
1/Nsum_{i=1}^N (y_i – widehat{d} )&=& 0 tag{1}
1/Nsum_{i=1}^Nleft[(y_i – widehat{d} )^2 – 2widehat{d}right] &=& 0 tag{2}
finish{eqnarray}]

We might use both pattern second situation (1) or pattern second situation (2) to estimate (d). In truth, beneath we use each and present that (1) gives a way more environment friendly estimator.

Once we use each (1) and (2), there are two pattern second circumstances and just one parameter, so we can not resolve this method of equations. GMM finds the parameters that get as shut as doable to fixing weighted pattern second circumstances.

Uniform weights and optimum weights are two methods of weighting the pattern second circumstances. The uniform weights use an identification matrix to weight the second circumstances. The optimum weights use the inverse of the covariance matrix of the second circumstances.

We start by drawing a pattern of a dimension 500 and use gmm to estimate the parameters utilizing pattern second situation (1), which we illustrate is the pattern because the pattern common.


. drop _all

. set obs 500
variety of observations (_N) was 0, now 500

. set seed 12345

. generate double y = rchi2(1)

. gmm (y - {d})  , devices( ) onestep

Step 1
Iteration 0:   GMM criterion Q(b) =  .82949186  
Iteration 1:   GMM criterion Q(b) =  1.262e-32  
Iteration 2:   GMM criterion Q(b) =  9.545e-35  

notice: mannequin is precisely recognized

GMM estimation 

Variety of parameters =   1
Variety of moments    =   1
Preliminary weight matrix: Unadjusted                 Variety of obs   =        500

------------------------------------------------------------------------------
             |               Sturdy
             |      Coef.   Std. Err.      z    P>|z|     [95% Conf. Interval]
-------------+----------------------------------------------------------------
          /d |   .9107644   .0548098    16.62   0.000     .8033392     1.01819
------------------------------------------------------------------------------
Devices for equation 1: _cons

. imply y

Imply estimation                   Variety of obs   =        500

--------------------------------------------------------------
             |       Imply   Std. Err.     [95% Conf. Interval]
-------------+------------------------------------------------
           y |   .9107644   .0548647      .8029702    1.018559
--------------------------------------------------------------

The pattern second situation is the product of an observation-level error operate that’s specified contained in the parentheses and an instrument, which is a vector of ones on this case. The parameter (d) is enclosed in curly braces {}. We specify the onestep choice as a result of the variety of parameters is similar because the variety of second circumstances, which is to say that the estimator is precisely recognized. When it’s, every pattern second situation might be solved precisely, and there are not any effectivity features in optimally weighting the second circumstances.

We now illustrate that we might use the pattern second situation obtained from the variance to estimate (d).


. gmm ((y-{d})^2 - 2*{d})  , devices( ) onestep

Step 1
Iteration 0:   GMM criterion Q(b) =  5.4361161  
Iteration 1:   GMM criterion Q(b) =  .02909692  
Iteration 2:   GMM criterion Q(b) =  .00004009  
Iteration 3:   GMM criterion Q(b) =  5.714e-11  
Iteration 4:   GMM criterion Q(b) =  1.172e-22  

notice: mannequin is precisely recognized

GMM estimation 

Variety of parameters =   1
Variety of moments    =   1
Preliminary weight matrix: Unadjusted                 Variety of obs   =        500

------------------------------------------------------------------------------
             |               Sturdy
             |      Coef.   Std. Err.      z    P>|z|     [95% Conf. Interval]
-------------+----------------------------------------------------------------
          /d |   .7620814   .1156756     6.59   0.000     .5353613    .9888015
------------------------------------------------------------------------------
Devices for equation 1: _cons

Whereas we can not say something definitive from just one draw, we notice that this estimate is farther from the reality and that the usual error is far bigger than these based mostly on the pattern common.

Now, we use gmm to estimate the parameters utilizing uniform weights.


. matrix I = I(2)

. gmm ( y - {d}) ( (y-{d})^2 - 2*{d})  , devices( ) winitial(I) onestep

Step 1
Iteration 0:   GMM criterion Q(b) =   6.265608  
Iteration 1:   GMM criterion Q(b) =  .05343812  
Iteration 2:   GMM criterion Q(b) =  .01852592  
Iteration 3:   GMM criterion Q(b) =   .0185221  
Iteration 4:   GMM criterion Q(b) =   .0185221  

GMM estimation 

Variety of parameters =   1
Variety of moments    =   2
Preliminary weight matrix: person                       Variety of obs   =        500

------------------------------------------------------------------------------
             |               Sturdy
             |      Coef.   Std. Err.      z    P>|z|     [95% Conf. Interval]
-------------+----------------------------------------------------------------
          /d |   .7864099   .1050692     7.48   0.000     .5804781    .9923418
------------------------------------------------------------------------------
Devices for equation 1: _cons
Devices for equation 2: _cons

The primary set of parentheses specifies the primary pattern second situation, and the second set of parentheses specifies the second pattern second situation. The choices winitial(I) and onestep specify uniform weights.

Lastly, we use gmm to estimate the parameters utilizing two-step optimum weights. The weights are calculated utilizing first-step constant estimates.


. gmm ( y - {d}) ( (y-{d})^2 - 2*{d})  , devices( ) winitial(I)

Step 1
Iteration 0:   GMM criterion Q(b) =   6.265608  
Iteration 1:   GMM criterion Q(b) =  .05343812  
Iteration 2:   GMM criterion Q(b) =  .01852592  
Iteration 3:   GMM criterion Q(b) =   .0185221  
Iteration 4:   GMM criterion Q(b) =   .0185221  

Step 2
Iteration 0:   GMM criterion Q(b) =  .02888076  
Iteration 1:   GMM criterion Q(b) =  .00547223  
Iteration 2:   GMM criterion Q(b) =  .00546176  
Iteration 3:   GMM criterion Q(b) =  .00546175  

GMM estimation 

Variety of parameters =   1
Variety of moments    =   2
Preliminary weight matrix: person                       Variety of obs   =        500
GMM weight matrix:     Sturdy

------------------------------------------------------------------------------
             |               Sturdy
             |      Coef.   Std. Err.      z    P>|z|     [95% Conf. Interval]
-------------+----------------------------------------------------------------
          /d |   .9566219   .0493218    19.40   0.000     .8599529    1.053291
------------------------------------------------------------------------------
Devices for equation 1: _cons
Devices for equation 2: _cons

All 4 estimators are constant. Beneath we run a Monte Carlo simulation to see their relative efficiencies. We’re most within the effectivity features afforded by optimum GMM. We embody the pattern common, the pattern variance, and the ML estimator mentioned in Effectivity comparisons by Monte Carlo simulation. Idea tells us that the optimally weighted GMM estimator ought to be extra environment friendly than the pattern common however much less environment friendly than the ML estimator.

The code beneath for the Monte Carlo builds on Effectivity comparisons by Monte Carlo simulation, Most chance estimation by mlexp: A chi-squared instance, and Monte Carlo simulations utilizing Stata. Click on gmmchi2sim.do to obtain this code.


. clear all
. set seed 12345
. matrix I = I(2)
. postfile sim  d_a d_v d_ml d_gmm d_gmme utilizing efcomp, substitute
. forvalues i = 1/2000 {
  2.     quietly drop _all
  3.     quietly set obs 500
  4.     quietly generate double y = rchi2(1)
  5. 
.     quietly imply y 
  6.     native d_a         =  _b[y]
  7. 
.     quietly gmm ( (y-{d=`d_a'})^2 - 2*{d}) , devices( )  ///
>       winitial(unadjusted) onestep conv_maxiter(200) 
  8.     if e(converged)==1 {
  9.             native d_v = _b[d:_cons]
 10.     }
 11.     else {
 12.             native d_v = .
 13.     }
 14. 
.     quietly mlexp (ln(chi2den({d=`d_a'},y)))
 15.     if e(converged)==1 {
 16.             native d_ml  =  _b[d:_cons]
 17.     }
 18.     else {
 19.             native d_ml  = .
 20.     }
 21. 
.     quietly gmm ( y - {d=`d_a'}) ( (y-{d})^2 - 2*{d}) , devices( )  ///
>         winitial(I) onestep conv_maxiter(200) 
 22.     if e(converged)==1 {
 23.             native d_gmm = _b[d:_cons]
 24.     }
 25.     else {
 26.             native d_gmm = .
 27.     }
 28. 
.     quietly gmm ( y - {d=`d_a'}) ( (y-{d})^2 - 2*{d}) , devices( )  ///
>        winitial(unadjusted, unbiased) conv_maxiter(200) 
 29.     if e(converged)==1 {
 30.             native d_gmme = _b[d:_cons]
 31.     }
 32.     else {
 33.             native d_gmme = .
 34.     }
 35. 
.     publish sim (`d_a') (`d_v') (`d_ml') (`d_gmm') (`d_gmme') 
 36. 
. }
. postclose sim
. use efcomp, clear 
. summarize

    Variable |        Obs        Imply    Std. Dev.       Min        Max
-------------+---------------------------------------------------------
         d_a |      2,000     1.00017    .0625367   .7792076    1.22256
         d_v |      1,996    1.003621    .1732559   .5623049   2.281469
        d_ml |      2,000    1.002876    .0395273   .8701175   1.120148
       d_gmm |      2,000    .9984172    .1415176   .5947328   1.589704
      d_gmme |      2,000    1.006765    .0540633   .8224731   1.188156

The simulation outcomes point out that the ML estimator is probably the most environment friendly (d_ml, std. dev. 0.0395), adopted by the environment friendly GMM estimator (d_gmme}, std. dev. 0.0541), adopted by the pattern common (d_a, std. dev. 0.0625), adopted by the uniformly-weighted GMM estimator (d_gmm, std. dev. 0.1415), and at last adopted by the sample-variance second situation (d_v, std. dev. 0.1732).

The estimator based mostly on the sample-variance second situation doesn’t converge for 4 of two,000 attracts; because of this there are only one,996 observations on d_v when there are 2,000 observations for the opposite estimators. These convergence failures occurred though we used the pattern common because the beginning worth of the nonlinear solver.

For a greater concept concerning the distributions of those estimators, we graph the densities of their estimates.

Determine 1: Densities of the estimators

The density plots illustrate the effectivity rating that we discovered from the usual deviations of the estimates.

The uniformly weighted GMM estimator is much less environment friendly than the pattern common as a result of it locations the identical weight on the pattern common as on the a lot much less environment friendly estimator based mostly on the pattern variance.

In every of the overidentified circumstances, the GMM estimator makes use of a weighted common of two pattern second circumstances to estimate the imply. The primary pattern second situation is the pattern common. The second second situation is the pattern variance. Because the Monte Carlo outcomes confirmed, the pattern variance gives a a lot much less environment friendly estimator for the imply than the pattern common.

The GMM estimator that locations equal weights on the environment friendly and the inefficient estimator is far much less environment friendly than a GMM estimator that locations a lot much less weight on the much less environment friendly estimator.

We show the burden matrix from our optimum GMM estimator to see how the pattern moments have been weighted.


. quietly gmm ( y - {d}) ( (y-{d})^2 - 2*{d})  , devices( ) winitial(I)

. matlist e(W), border(rows)

-------------------------------------
             | 1         | 2         
             |     _cons |     _cons 
-------------+-----------+-----------
1            |           |           
       _cons |  1.621476 |           
-------------+-----------+-----------
2            |           |           
       _cons | -.2610053 |  .0707775 
-------------------------------------

The diagonal parts present that the sample-mean second situation receives extra weight than the much less environment friendly sample-variance second situation.

Carried out and undone

We used a easy instance for example how GMM exploits having extra equations than parameters to acquire a extra environment friendly estimator. We additionally illustrated that optimally weighting the totally different moments gives necessary effectivity features over an estimator that uniformly weights the second circumstances.

Our cursory introduction to GMM is greatest supplemented with a extra formal remedy just like the one in Cameron and Trivedi (2005) or Wooldridge (2010).

Graph code appendix


use efcomp
native N = _N
kdensity d_a,     n(`N') generate(x_a    den_a)    nograph
kdensity d_v,     n(`N') generate(x_v    den_v)    nograph
kdensity d_ml,    n(`N') generate(x_ml   den_ml)   nograph
kdensity d_gmm,   n(`N') generate(x_gmm  den_gmm)  nograph
kdensity d_gmme,  n(`N') generate(x_gmme den_gmme) nograph
twoway (line den_a x_a,       lpattern(stable))        ///
       (line den_v x_v,       lpattern(sprint))         ///
       (line den_ml x_ml,     lpattern(dot))          ///
       (line den_gmm x_gmm,   lpattern(dash_dot))     ///
       (line den_gmme x_gmme, lpattern(shordash))

References

Cameron, A. C., and P. Ok. Trivedi. 2005. Microeconometrics: Strategies and purposes. Cambridge: Cambridge College Press.

Wooldridge, J. M. 2001. Purposes of generalized technique of moments estimation. Journal of Financial Views 15(4): 87-100.

Wooldridge, J. M. 2010. Econometric Evaluation of Cross Part and Panel Information. 2nd ed. Cambridge, Massachusetts: MIT Press.



What’s !essential #6: :heading, border-shape, Truncating Textual content From the Center, and Extra

0


Regardless of what’s been a sleepy couple of weeks for brand spanking new Net Platform Options, we now have a difficulty of What’s !essential that’s prrrretty jam-packed. The online group had rather a lot to say, it appears, so fasten your seatbelts!

@keyframes animations could be strings

Peter Kröner shared an fascinating reality about @keyframes animations — that they are often strings:

@keyframes "@animation" {
  /* ... */
}

#animate-this {
  animation: "@animation";
}

Yo dawg, time for a #CSS enjoyable reality: keyframe names could be strings. Why? Effectively, in case you need your keyframes to be named “@keyframes,” clearly!

#webdev

[image or embed]

— Peter Kröner (@sirpepe.bsky.social) Feb 18, 2026 at 10:33

I don’t know why you’d wish to try this, but it surely’s definitely an fascinating factor to study @keyframes after 11 years of cross-browser help!

: vs. = in fashion queries

One other hidden trick, this one from Temani Afif, has revealed that we will substitute the colon in a mode question with an equals image. Temani does an awesome job at explaining the distinction, however right here’s a fast code snippet to sum it up:

.Jay-Z {
  --Issues: calc(98 + 1);

  /* Evaluates as calc(98 + 1), shade is blueivy */
  shade: if(fashion(--Issues: 99): pink; else: blueivy);

  /* Evaluates as 99, shade is pink */
  shade: if(fashion(--Issues = 99): pink; else: blueivy);
}

In brief, = evaluates --Issues in a different way to :, despite the fact that Jay-Z undoubtably has 99 of them (he stated so himself).

Declarative s (and an up to date .visually-hidden)

David Bushell demonstrated the best way to create

s declaratively utilizing invoker instructions, a helpful characteristic that permits us to skip some J’Script in favor of HTML, and works in all net browsers as of lately.

Additionally, because of an inquisitive query from Ana Tudor, the article spawned a spin-off concerning the minimal variety of types wanted for a visually-hidden utility class. Is it nonetheless seven?

Possibly not…

Find out how to truncate textual content from the center

Wes Bos shared a intelligent trick for truncating textual content from the center utilizing solely CSS:

Somebody on reddit posted a demo the place CSS truncates textual content from the center.

They did not publish the code, so right here is my shot at it with Flexbox

[image or embed]

— Wes Bos (@wesbos.com) Feb 9, 2026 at 17:31

Donnie D’Amato tried a more-native resolution utilizing ::spotlight(), however ::spotlight() has some limitations, sadly. As Henry Wilkinson talked about, Hazel Bachrach’s 2019 name for a local resolution continues to be an open ticket, so fingers crossed!

Find out how to handle shade variables with relative shade syntax

Theo Soti demonstrated the best way to handle shade variables with relative shade syntax. Whereas not a brand new characteristic or idea, it’s frankly the most effective and most complete walkthrough I’ve ever learn that addresses these complexities.

Find out how to customise lists (the fashionable means)

In the same article for Piccalilli, Richard Rutter comprehensively confirmed us the best way to customise lists, though this one has some nuggets of what I can solely assume is trendy CSS. What’s symbols()? What’s @counter-style and extends? Richard walks you thru all the things.

Supply: Piccalilli.

Can’t get sufficient on counters? Juan Diego put collectively a complete information proper right here on CSS-Methods.

Find out how to create typescales utilizing :heading

Safari Know-how Preview 237 lately started trialing :heading/:heading(), as Stuart Robson explains. The follow-up is even higher although, because it reveals us how pow() can be utilized to write down cleaner typescale logic, though I finally settled on the old-school

components with a less complicated implementation of :heading and no sibling-index():

:root {
  --font-size-base: 16px;
  --font-size-scale: 1.5;
}

:heading {
  /* Different heading types */
}

/* Assuming solely base/h3/h2/h1 */

physique {
  font-size: var(--font-size-base);
}

h3 {
  font-size: calc(var(--font-size-base) * var(--font-size-scale));
}

h2 {
  font-size: calc(var(--font-size-base) * pow(var(--font-size-scale), 2));
}

h1 {
  font-size: calc(var(--font-size-base) * pow(var(--font-size-scale), 3));
}

Una Kravets launched border-shape

Talking of recent options, border-shape got here as a shock to me contemplating that we have already got — or will have — corner-shape. Nonetheless, border-shape is completely different, as Una explains. It addresses the problems with borders (as a result of it is the border), permits for extra shapes and even the form() operate, and general it really works in a different way behind the scenes.

trendy.css desires you to cease writing CSS prefer it’s 2015

It’s time to start out utilizing all of that trendy CSS, and that’s precisely what trendy.css desires that can assist you do. All of these superior options that weren’t supported if you first examine them, that you simply forgot about? Or those that you simply missed or skipped utterly? Effectively, trendy.css has 75 code snippets and counting, and all you need to do is copy ‘em.

Screenshot of a website titled modern.css showing browser compatibility filters and six code snippets, labeled with their category (e.g., SELECTORS or LAYOUT), difficulty level, topic, an example of outdated code to avoid, a browser support percentage, and a link to view the modern solution.

Kevin Powell additionally has some CSS snippets for you

And the commenters? They’ve some too!

Truthfully, Kevin is the one net dev talker that I really observe on YouTube, and he’s so near 1,000,000 followers proper now, so make sure that to hit ‘ol Ok-Po’s “Subscribe” button.

In case you missed it

Truly, you didn’t miss that a lot! Firefox 148 launched the form() operate, which was being held captive by a flag, however is now a baseline characteristic. Safari Know-how Preview 237 grew to become the primary to trial :heading. These are all we’ve seen from our beloved browsers within the final couple of weeks (not counting the standard flurry of smaller updates, in fact).

That being stated, Chrome, Safari, and Firefox introduced their targets for Interop 2026, revealing which Net Platform Options they intend to make constant throughout all net browsers this 12 months, which greater than makes up for the dearth of shiny options this week.

Additionally arising (however testable in Chrome Canary now, identical to border-shape) is the scrolled key phrase for scroll-state container queries. Bramus talks about scrolled scroll-state queries right here.

Bear in mind, if you happen to don’t wish to miss something, you may catch these Fast Hits because the information breaks within the sidebar of css-tricks.com.

See you in a fortnight!

Cisco Nexus Dashboard: Knowledge Dealer and Observability

0


At the moment’s information facilities depend on quite a lot of instruments to offer enhanced visibility and observability of vital software site visitors and site visitors move particulars. Using switch-based telemetry capabilities is an especially in style strategy, nevertheless it’s usually the case that packet particulars or granular site visitors filtering are desired; thus, a complementary answer is required. Cisco Nexus Dashboard Knowledge Dealer is the proper answer to ingest Switched Port Analyzer (SPAN) and/or Take a look at Entry Level (TAP) site visitors, apply filters and header modifications, present packet deduplication, after which redirect site visitors to monitoring and different instruments comparable to intrusion prevention programs (IPS) and safety incident and occasion administration (SIEM) options.

Resolution structure

The Nexus Dashboard Knowledge Dealer features a centralized administration graphical consumer interface (GUI), deployed as we speak on a number of Linux hosts for top availability, with a plan for assist on unified Nexus Dashboard. It makes use of Cisco Nexus 9000 Collection Switches, which require the cost-effective information dealer license (NX-OS Necessities), to unlock this performance. For scale-out necessities, a number of SPAN/TAP vacation spot switches could be aggregated right into a single topology. This topology is managed by the centralized information dealer answer, which directs site visitors to an information dealer swap (see Determine 1) for distribution to the specified instruments in your setting.

Determine 1. Pattern Knowledge Dealer structure

For switches that assist Nexus Dashboard Knowledge Dealer, any interface can be utilized in your manufacturing community connection ports in addition to your connections to the required instruments (any port, any performance). Interface speeds from 1 Gbps to 400 Gbps are supported, making certain satisfactory bandwidth and connectivity choices in your packet brokering wants, which meet as we speak’s demanding information heart progress.

Low-touch configuration

Figuring out and configuring the specified site visitors units and vacation spot interfaces is an underlying core requirement of the Knowledge Dealer deployment. Knowledge Dealer helps robotically configure each your information heart and campus units, whatever the existence of a centralized controller. Knowledge Dealer natively integrates with Cisco Software Centric Infrastructure (ACI) information heart materials, Cisco Catalyst Heart-based campus materials, in addition to standalone Nexus and Catalyst switches. This eliminates the handbook configuration burden, making certain correct answer configuration and fast turn-up. The operational good thing about solely requiring a single GUI for deploying the required swap configuration enhances the simplicity of a Knowledge Dealer deployment.

Clients who require packet brokering for each information heart and campus environments can relaxation assured that the only Knowledge Dealer interface will simplify the required configurations for his or her heterogeneous environments.

Resiliency and redundancy

Counting on Knowledge Dealer for always-on packet visibility is a actuality with the mechanisms included for making certain most answer uptime:

  • The varied service nodes and information dealer switches that make up the answer topology are tracked by Knowledge Dealer and, equally vital, are bypassed if Knowledge Dealer detects both a service node concern or packet dealer swap interface concern.
  • Knowledge Dealer helps symmetric hashing and load-balancing, permitting for the distribution of site visitors throughout a number of situations of a selected software.
  • If there is a matter with the aggregation swap, Knowledge Dealer can robotically program a backup path to make sure that the specified site visitors continues to be captured.
  • Knowledge Dealer incorporates a fail-safe mechanism, permitting for direct communication between ingress and egress interfaces within the occasion of a service node failure.

The above options be certain that any failures throughout the topology are addressed dynamically, requiring no human intervention and offering most uptime for steady visibility and observability.

Packet deduplication

Amassing SPAN and/or TAP from a number of sources yields the danger of duplicate site visitors being obtained by the Knowledge Dealer switches. The deduplication characteristic, supporting each Transmission Management Protocol (TCP) and Consumer Datagram Protocol (UDP), was added in NX-OS 10.4(1)F, permitting for streamlined packet dealer deployment. The deduplication perform could be carried out in-line on the Knowledge Dealer swap(es) or out-of-line by a number of devoted Knowledge Dealer switches. An vital attribute is that the deduplication perform is hardware-accelerated, guaranteeing constant answer efficiency and scalability.

A further side of deduplication is the flexibility to right-size instruments to accommodate the quantity of post-deduplication site visitors, versus redundant, duplicated site visitors.

Visibility of encapsulated site visitors

Packet brokering instruments are sometimes deployed in environments which have a number of packet encapsulation applied sciences, for instance, multi-protocol label switching (MPLS), digital extensible LAN (VXLAN), and generic routing encapsulation (GRE). An efficient software wants to have the ability to view the precise endpoint-to-endpoint site visitors throughout the encapsulated packets, thus packet-header and label-stripping capabilities are vital. Knowledge Dealer permits for header and label stripping for the aforementioned applied sciences, along with Q-in-Q and Cisco Encapsulated Distant Switched Port Analyzer (ERSPAN) site visitors, offering best-in-class visibility in your information heart, campus, and edge site visitors.

This has the additional advantage of much less processing required by evaluation instruments within the setting, leading to bandwidth and value financial savings.

NetFlow technology

Evaluation instruments have the potential of processing SPAN and TAP site visitors redirected from Knowledge Dealer, however there are quite a few instruments, comparable to Splunk, that profit from receiving both NetFlow or sFlow particulars for the specified site visitors. Knowledge Dealer can generate both NetFlow or sFlow related to SPAN or TAP site visitors, permitting for compatibility with a higher vary of instruments. Coupled with the deduplication characteristic, you’re assured of streamlined, environment friendly move visibility along with packet visibility in your information heart and different site visitors in your community.

Cisco Nexus Dashboard

The Cisco Nexus Dashboard has developed to include centralized NX-OS cloth administration, proactive day-2 operations, and cloth orchestration in a simplified, intuitive GUI. The upcoming Nexus Dashboard 4.2 launch will incorporate Knowledge Dealer, finalizing the simplified administration and operational strategy for any Cisco cloth sort. Clients preferring a separate Linux-based Knowledge Dealer deployment will proceed to have that choice.

Step into the way forward for site visitors evaluation

Attaining complete site visitors visibility with out overwhelming your evaluation instruments is the core promise of Cisco Nexus Dashboard Knowledge Dealer. By delivering a single, clever platform, it simplifies operations with a unified view of your information heart and campus, lowers whole value of possession by hardware-powered deduplication, and ensures uptime with built-in, automated resiliency. This ensures your monitoring instruments get the precise information they want—and nothing they don’t.

Able to discover how these capabilities can remodel your community operations? Dive deeper by reviewing the whole Nexus Dashboard Knowledge Dealer information sheet or discover particular configuration examples for sensible steerage. When you find yourself able to see it in motion, contact your Cisco or channel associate account group for a customized demo.