Friday, March 13, 2026
Home Blog Page 124

NASA rolls Artemis 2 rocket to the pad forward of historic moon launch

0


CAPE CANAVERAL, Fla. — The rocket that may launch the subsequent people to the moon is rolling to the pad for its historic mission, which might carry off just some weeks from now.

NASA’s Area Launch System (SLS) rocket, constructed to assist the company’s Artemis 2 mission and usher in a brand new period of crewed flights to the moon, headed out from the Car Meeting Constructing (VAB) right here at Kennedy Area Middle (KSC) in Florida this morning (Jan. 17), starting a 4-mile (6.4 kilometers) trek to Launch Advanced-39B (LC-39B).

Knowledge Poisoning in Machine Studying: Why and How Individuals Manipulate Coaching Knowledge

0


ignored however massively important a part of enabling machine studying and subsequently AI to operate. Generative AI corporations are scouring the world for extra knowledge always as a result of this uncooked materials is required in nice volumes for fashions to be constructed. Anybody who’s constructing or tuning a mannequin should first gather a big quantity of information to even start.

Some conflicting incentives outcome from this actuality, nonetheless. Defending the standard and authenticity of your knowledge is a vital element of safety, as a result of these uncooked supplies will make or break the machine studying fashions you might be serving to customers or prospects. Dangerous actors can strategically insert, mutate, or take away knowledge out of your datasets in methods you might not even discover, however which is able to systematically alter the habits of your fashions.

Concurrently, creators similar to artists, musicians, and authors are preventing an ongoing battle towards rampant copyright violation and IP theft, primarily by generative AI corporations that want to search out extra knowledge to toss into the voracious maw of the coaching course of. These creators are searching for motion they’ll take to stop or discourage this theft that doesn’t simply require being on the mercy of usually gradual transferring courts.

Moreover, as corporations do their darndest to interchange conventional search engines like google and yahoo with AI mediated search, corporations whose companies are based on being surfaced by way of search are struggling. How do you entry prospects and current your required model id to the general public if the investments you made in search visibility over previous a long time are now not related?

All three of those instances level us to 1 idea — “knowledge poisoning”.

What Is Knowledge Poisoning?

In brief, knowledge poisoning is altering the coaching knowledge used to provide a machine studying mannequin in a roundabout way in order that the mannequin habits is altered. The influence is particular to the coaching course of, so as soon as a mannequin artifact is created, the harm is finished. The mannequin might be irreparably biased, doubtlessly to the purpose of being ineffective, and the one actual answer is retraining with clear knowledge.

This phenomenon is a hazard for computerized retraining, the place human statement is minimal, but in addition for very effectively noticed coaching as a result of often the modifications to the coaching knowledge are invisible to the typical viewer. For instance, in a single research cited by Hartle et al. (2025) in relation to poisoned medical misinformation knowledge, “Fifteen clinicians have been tasked with figuring out the poisoned response and the baseline response; the reviewers have been unable to find out the distinction between the 2 outcomes… When the concept-specific knowledge was poisoned, at 0.001%, there was a 4.8% enhance in dangerous content material.”

Trying to reverse-engineer the poisoned knowledge and take away it has largely not been profitable. Strategies below the umbrella of “machine unlearning” have been tried, however once we can’t detect the problematic knowledge, it’s troublesome for these efforts to make progress. Even once we can detect the info, researchers discover that eradicating traces from a mannequin’s structure is just not efficient at undoing the harm.

Knowledge poisoning can take numerous completely different varieties, so I’m going to work backwards and talk about three particular motives for knowledge poisoning, how they work, and what their outcomes are:

  • Legal Exercise
  • Stopping IP Theft
  • Advertising and marketing

Legal Exercise

There are a selection of causes felony actors may wish to interact in knowledge poisoning. Many fashions have entry to extremely delicate or invaluable knowledge as a way to obtain their objectives (say, helping customers with interacting with banking software program, or advising healthcare suppliers on the very best course of remedy for a analysis, and many others). If this knowledge might be helpful for monetary acquire, then someone’s going to try to get their fingers on it or alter it for their very own functions.

The way it Works

Knowledge poisoning generally is a little bit of an extended recreation, as a result of it requires affecting the coaching knowledge, however it might probably nonetheless be very stealthy and efficient in some conditions. I discovered a bit about this on the IEEE CISOSE convention final July, the place Sofiane Bessaï’s paper was introduced discussing how one can probably establish such instances, in hopes of mitigating the assaults. As they put it, “These assaults introduce imperceptible perturbations into the enter knowledge, inflicting fashions to make incorrect predictions with excessive confidence.” Which means that the modifications to the coaching knowledge aren’t apparent in any respect, and statistical evaluation of the coaching knowledge can have a troublesome time revealing these modifications. Nonetheless, by rigorously assessing the habits of the educated mannequin, you’ve got a greater probability of reverse-engineering what occurred.

Analysis additionally signifies that not very a lot knowledge is required for this sort of assault to work. Souly et al. (2025) decided, the truth is, that 250 paperwork was primarily sufficient to attain poisoning in quite a few completely different use instances and throughout various sizes of coaching set for textual content based mostly fashions.

Outcomes

There generally is a few completely different targets for this sort of assault. For instance, if a mannequin is weakened and efficiency is degraded, a cybersecurity mannequin might fail to establish breaches of a community. Alternately, the attacker might fraudulent predictions. This may be actually efficient, as a result of when the output is often “regular” however uncommon instances range from commonplace mannequin habits, then the flaw is much less prone to be detected, and the mannequin is extra prone to be stored in manufacturing. So long as the habits of the mannequin solely subtly preferences the attacker’s desired final result, it may be extraordinarily exhausting for others to inform that something’s fallacious. Consider one thing like a mannequin that determines who will get a mortgage approval, or for a way a lot — if this mannequin affords extravagant loans at ridiculous phrases to only a very small subset of individuals, however for probably the most half behaves as anticipated, this might be a really worthwhile assault.

However knowledge poisoning is just not solely used for felony exercise – it truly has different functions as effectively.

Stopping IP Theft

After we speak about knowledge poisoning to stop or penalize IP theft, what we imply is knowledge poisoning to not change the mannequin’s habits in a specific method, however to try to make the mannequin coaching fail, if sure content material is used with out authorization or permission. The objectives might be both to make the mannequin fail to be taught patterns in sure knowledge, or to make a mannequin totally unusable attributable to horrible efficiency on inference if content material utilized in coaching is stolen.

The way it Works

Take into consideration this not as an assault, however as a protection mechanism for the content material creators. When creators use strategies like this on their works utilizing instruments like Nightshade, they’ll insert results which are just about imperceptible to the human eye, however which might be extraordinarily significant to the neural community within the coaching course of. Analysis signifies this solely requires the creator to have entry to only a few coaching photographs to be efficient, and isn’t depending on large quantity.

This isn’t the one possibility for IP safety within the knowledge poisoning house, nonetheless. There may be additionally a device referred to as Glaze which is able to forestall the mannequin from reproducing the picture’s type, however doesn’t truly intrude with the coaching typically. With out affecting the pictures, creators can change the way in which their photographs are labeled or described in textual content, as a result of image-text pairs are required to make use of them for coaching textual content to picture generative AI fashions. Some knowledge poisoning can truly induce copyright violation as a solution to show that copyrighted content material was utilized in coaching, which might be instrumental proof for courtroom instances.

These methods may go for different media as effectively. AntiFake is a device that modifications soundwaves in a recording to stop a person’s voice from being utilized in mannequin coaching, like Glaze, stopping a single pattern from being discovered. It’s additionally theoretically potential to skew a textual content producing mannequin by altering language semantics in intentional methods. An LLM learns how phrases are associated to one another in human language patterns, so if a physique of textual content is included in coaching that purposefully and deliberately violates or manipulates these patterns, it might probably intrude with the mannequin’s studying method. If the LLM learns inaccurate patterns in human language, the language it generates might be unconvincing or outright weird.

In every case, the specified outcomes are both to make a bit of coaching knowledge not contribute its traits to the mannequin’s underlying structure, stopping replica or mimicry of that knowledge, or to make fashions behave so unexpectedly or so inappropriately that the mannequin that was educated on this knowledge is just not usable as long as the copyrighted materials is included in coaching.

Outcomes

Customers conducting knowledge poisoning on this state of affairs are sometimes hoping to be seen — it’s not a stealth assault, and so they aren’t attempting to make cash by altering mannequin habits. As an alternative, they want the mannequin that’s educated on their IP to be ineffective, both typically or for copying and reproducing their work. In the long run, this is able to make the theft of their IP or content material not worthwhile to the generative AI firm concerned.

Many creators would love the financial worth of coaching on poisoned knowledge to turn out to be low sufficient to vary business habits. As a result of the impact of poisoning on this type is probably going exhausting to detect till coaching has occurred or a minimum of began, some funding in compute/energy/knowledge assortment has already been put forth, so discovering out the coaching knowledge is compromised could make that cash wasted.

Advertising and marketing

A 3rd software of information poisoning is within the broad space of selling. It’s a brand new evolution of what’s referred to as search engine marketing, or website positioning.

website positioning

Within the case of search engine marketing, entrepreneurs would create synthetic internet pages for search engines like google and yahoo to scrape that include content material that was significantly helpful or complimentary to their shopper’s model. Then entrepreneurs would create hyperlinks between these pages that they generated, as a result of search engines like google and yahoo would use counts of reference hyperlinks as a part of the algorithm to determine which pages to advocate in search outcomes. By creating extra pages that had extra interconnected hyperlinks to one another, if these pages contained materials that was helpful to the client, search engines like google and yahoo would rank these pages increased in related search outcomes.

The way it Works

AI optimization is one thing just like this. As an alternative of making internet content material for the eye of search engine algorithms, entrepreneurs create content material that might be scraped for coaching knowledge in generative AI mannequin improvement. This will have to be considerably excessive quantity, relying on the specified impact, however as we discovered when discussing felony knowledge poisoning, results on mannequin habits can usually be elicited with much less knowledge than you assume.

It’s additionally necessary to notice that creating all this content material to feed into the coaching course of is enabled by LLMs as effectively. It’s cheaper and simpler than ever earlier than to generate mountains of textual content content material that appears virtually believably human-written, so it’s fairly economically viable to generate advertising textual content at efficient scales.

By seeding the coaching knowledge with focused content material that’s helpful to a buyer’s model, you begin to skew the pool of coaching knowledge in a method which means the mannequin might favor your buyer’s model and/or present bias towards rivals in delicate methods.

Outcomes

Subtlety is necessary, as a result of entrepreneurs wouldn’t need this to essentially be seen — it might appear heavy-handed if it’s too apparent, and generative AI mannequin suppliers may discover and attempt to remediate it. As an alternative, a delicate however statistically significant desire for one model over one other is sought, and that will begin to be revealed in buyer and consumer knowledge after they’re truly utilizing the mannequin.

Whereas this isn’t essentially what we’d consider as attacking or malicious habits, it’s making an attempt to skew the outcomes of fashions towards the need of mannequin designers, and that’s opposite to phrases of service and acceptable use insurance policies for many generative AI merchandise. Nonetheless, it may be exhausting to really nail down like what the inappropriate exercise is right here. Entrepreneurs aren’t not forcing researchers to make use of this knowledge to coach an LLM, in any case. Generative AI corporations are scraping as a lot of the web as they’ll, gathering each webpage they’ll discover as a way to fill out the coaching knowledge out there — generally that can embrace this type of factor. It appears predictable that this sort of habits would come alongside eventually.

When Fashions Search

Relatedly, main LLMs now additionally do internet search as a part of their agentic toolkits, and a few AIO entrepreneurs additionally work on ensuring internet based mostly content material is tailor-made to the “preferences” of LLMs which are doing internet search. By experimentation, it’s generally potential to establish what phrasing will make its method by way of the net search into the LLM’s generated response to the consumer. This isn’t a coaching knowledge poisoning technique, however considerably extra adjoining to immediate engineering or context engineering, for the reason that mannequin is ingesting the search outcomes and utilizing them to formulate output. It has the identical impact, although, of constructing LLM responses to customers biased in favor of or towards a model.

Responding to Knowledge Poisoning

So, if you’re coaching a mannequin utilizing knowledge extracted from sources past your management/created by others, how do you have to keep away from knowledge poisoning?

First, don’t steal knowledge for coaching. Past it being the ethically proper habits, you possibly can’t assure that the info is not going to be poisoned — if it’s another person’s IP and you don’t have any authorization to make use of it, on one hand, or if malicious actors have gotten their fingers on it on the opposite. You might get fortunate and the info could also be positive, however you gained’t discover out till you’ve invested, in all chance.

Second, monitor and management knowledge assortment, and vet and clear your coaching knowledge. Even common open supply and free knowledge can nonetheless have malicious actors behind it. Take cautious steps to wash and analyze your knowledge, and use good knowledge hygiene. Don’t dump slop in your coaching and anticipate the method to magically create an excellent mannequin.

Third, handle and observe your coaching course of. There are assessments you possibly can apply to the coaching knowledge if computerized retraining is going on, and it’s also possible to apply scientific strategies to establish whether or not your mannequin has been poisoned, as I described earlier. This can be a growing space of research, so anticipate these strategies to enhance over time, however there are already good concepts on the market.

Fourth, check your mannequin within the wild. It’s actually troublesome to catch misbehavior from generative AI partially as a result of the scope of use instances might be so in depth, however evaluating and testing fashions on situations as shut as potential to the actual world is necessary to attempt. I’ve written a number of items about evaluating LLMs and why that is necessary— don’t skip analysis and testing.

Now, I notice that each one these options have some prices. Individuals use free knowledge or steal others’ IP as a result of paying for all the info utilized in coaching LLMs might be insurmountably costly. I don’t declare to have a solution to this, however “I can’t afford this so I’m going to steal it” actually doesn’t maintain water in every other areas of our lives, so I don’t assume we should always begin to settle for it right here. Individuals within the broader machine studying neighborhood, similar to the Knowledge Provenance Initiative, are exploring choices for creating licensed datasets and discovering methods to make knowledge out there, which I encourage readers to look into extra. The opposite options to knowledge poisoning contain labor and energy as effectively, however to develop fashions that meet our wants and expectations, there’s at all times going to be a tradeoff.

Past this, there’s nonetheless at all times some threat should you don’t management the creation of the info or mannequin you’re utilizing. As a normal rule, by no means belief mannequin output blindly, however as an alternative consider and check the fashions you intend to make use of, particularly if another person educated them. Mannequin habits is a contested house — numerous entities have a vested curiosity in controlling how generative AI fashions carry out and work together with us, so we have to meet the challenges accordingly.


Learn extra of my work at www.stephaniekirmer.com.


Additional Studying

https://www.crowdstrike.com/en-us/cybersecurity-101/cyberattacks/data-poisoning

https://ieeexplore.ieee.org/summary/doc/11127238

https://iacis.org/iis/2025/4_iis_2025_433-442.pdf

https://www.nature.com/articles/s41591-024-03445-1

https://arxiv.org/pdf/2510.07192

https://arxiv.org/pdf/2406.17216

https://www.stephaniekirmer.com/writing/thecomingcopyrightreckoningforgenerativeai

https://website positioning.ai/weblog/llm-seo

https://www.stephaniekirmer.com/writing/evaluatingllmsforinferenceorlessonsfromteachingformachinelearning

IP Safety

https://nightshade.cs.uchicago.edu/whatis.html

https://glaze.cs.uchicago.edu

https://engineering.washu.edu/information/2023/Defending-your-voice-against-deepfakes.html

https://websites.google.com/view/yu2023antifake

https://arxiv.org/abs/2310.13828

https://hyperlink.springer.com/chapter/10.1007/978-3-031-72664-4_1

https://arxiv.org/html/2401.04136v1

https://aibusinessreport.substack.com/p/how-data-poisoning-works-to-prevent

Knowledge Transparency

https://mitsloan.mit.edu/ideas-made-to-matter/bringing-transparency-to-data-used-to-train-artificial-intelligence

https://www.dataprovenance.org

https://www.dtaalliance.org/work/data-provenance-standards

https://www.copyright.com/weblog/is-the-dataset-youre-using-protected-by-copyright-heres-how-to-find-out

Google assessments BigQuery characteristic to generate SQL queries from English

0
SELECT
    product_name,
    SUM(monthly_sales) AS total_monthly_sales,
    RANK() OVER (PARTITION BY class ORDER BY SUM(monthly_sales) DESC) AS sales_rank
FROM
    `sales_data`
WHERE
    EXTRACT(YEAR FROM sale_date) = 2023
GROUP BY
    product_name, class, EXTRACT(MONTH FROM sale_date)

But it surely’s nonetheless a far cry from having the ability to flip one thing like “/* give me an inventory of merchandise by class, ranked by month-to-month gross sales in 2023 */” right into a working question that does what the consumer needs.

Minimizing friction in daily duties

Robert Kramer, principal analyst at Moor Insights and Technique, mentioned these working with knowledge are likely to assume by way of questions and outcomes, not syntax. “Translating intent into correct and environment friendly SQL nonetheless takes time, particularly with joins, time logic, and repetitive patterns. By permitting pure language expressions inside SQL feedback, Google is making an attempt to hurry up that translation whereas protecting SQL because the execution layer,” he mentioned.

With the brand new characteristic, groups might spend extra time decoding outcomes and fewer time writing and rewriting queries, creating extra automated analytics processes down the street whereas dashing up insights, minimizing crew handoffs, and saving time on question setup, he added.

10 Important Docker Ideas Defined in Underneath 10 Minutes


10 Important Docker Ideas Defined in Underneath 10 Minutes
Picture by Creator

 

Introduction

 
Docker has simplified how we construct and deploy purposes. However if you end up getting began studying Docker, the terminology can usually be complicated. You’ll seemingly hear phrases like “photos,” “containers,” and “volumes” with out actually understanding how they match collectively. This text will enable you perceive the core Docker ideas you might want to know.

Let’s get began.

 

1. Docker Picture

 
A Docker picture is an artifact that incorporates the whole lot your utility must run: the code, runtime, libraries, surroundings variables, and configuration recordsdata.

Pictures are immutable. When you create a picture, it doesn’t change. This ensures your utility runs the identical method in your laptop computer, your coworker’s machine, and in manufacturing, eliminating environment-specific bugs.

Right here is the way you construct a picture from a Dockerfile. A Dockerfile is a recipe that defines the way you construct the picture:

docker construct -t my-python-app:1.0 .

 

The -t flag tags your picture with a reputation and model. The . tells Docker to search for a Dockerfile within the present listing. As soon as constructed, this picture turns into a reusable template in your utility.

 

2. Docker Container

 
A container is what you get while you run a picture. It’s an remoted surroundings the place your utility really executes.

docker run -d -p 8000:8000 my-python-app:1.0

 

The -d flag runs the container within the background. The -p 8000:8000 maps port 8000 in your host to port 8000 within the container, making your app accessible at localhost:8000.

You’ll be able to run a number of containers from the identical picture. They function independently. That is the way you check completely different variations concurrently or scale horizontally by operating ten copies of the identical utility.

Containers are light-weight. Not like digital machines, they don’t boot a full working system. They begin in seconds and share the host’s kernel.

 

3. Dockerfile

 
A Dockerfile incorporates directions for constructing a picture. It’s a textual content file that tells Docker precisely arrange your utility surroundings.

Here’s a Dockerfile for a Flask utility:

FROM python:3.11-slim

WORKDIR /app

COPY necessities.txt .

RUN pip set up --no-cache-dir -r necessities.txt

COPY . .

EXPOSE 8000

CMD ["python", "app.py"]

 

Let’s break down every instruction:

  • FROM python:3.11-slim — Begin with a base picture that has Python 3.11 put in. The slim variant is smaller than the usual picture.
  • WORKDIR /app — Set the working listing to /app. All subsequent instructions run from right here.
  • COPY necessities.txt . — Copy simply the necessities file first, not all of your code but.
  • RUN pip set up --no-cache-dir -r necessities.txt — Set up Python dependencies. The –no-cache-dir flag retains the picture dimension smaller.
  • COPY . . — Now copy the remainder of your utility code.
  • EXPOSE 8000 — Doc that the app makes use of port 8000.
  • CMD ["python", "app.py"] — Outline the command to run when the container begins.

The order of those directions is necessary for a way lengthy your builds take, which is why we have to perceive layers.

 

4. Picture Layers

 
Each instruction in a Dockerfile creates a brand new layer. These layers stack on high of one another to type the ultimate picture.

Docker caches every layer. If you rebuild a picture, Docker checks if every layer must be recreated. If nothing modified, it reuses the cached layer as an alternative of rebuilding.

This is the reason we copy necessities.txt earlier than copying all the utility. Your dependencies change much less regularly than your code. If you modify app.py, Docker reuses the cached layer that put in dependencies and solely rebuilds layers after the code copy.

Right here is the layer construction from our Dockerfile:

  1. Base Python picture (FROM)
  2. Set working listing (WORKDIR)
  3. Copy necessities.txt (COPY)
  4. Set up dependencies (RUN pip set up)
  5. Copy utility code (COPY)
  6. Metadata about port (EXPOSE)
  7. Default command (CMD)

In case you solely change your Python code, Docker rebuilds solely layers 5–7. Layers 1–4 come from cache, making builds a lot quicker. Understanding layers helps you write environment friendly Dockerfiles. Put frequently-changing recordsdata on the finish and steady dependencies in the beginning.

 

5. Docker Volumes

 
Containers are non permanent. If you delete a container, the whole lot inside disappears, together with information your utility created.

Docker volumes clear up this drawback. They’re directories that exist outdoors the container filesystem and persist after the container is eliminated.

docker run -d 
  -v postgres-data:/var/lib/postgresql/information 
  postgres:15

 

This creates a named quantity referred to as postgres-data and mounts it at /var/lib/postgresql/information contained in the container. Your database recordsdata survive container restarts and deletions.

You can too mount directories out of your host machine, which is beneficial throughout improvement:

docker run -d 
  -v $(pwd):/app 
  -p 8000:8000 
  my-python-app:1.0

 

This mounts your present listing into the container at /app. Modifications you make to recordsdata in your host seem instantly within the container, enabling stay improvement with out rebuilding the picture.

There are three forms of mounts:

  • Named volumes (postgres-data:/path) — Managed by Docker, finest for manufacturing information
  • Bind mounts (/host/path:/container/path) — Mount any host listing, good for improvement
  • tmpfs mounts — Retailer information in reminiscence solely, helpful for non permanent recordsdata

 

6. Docker Hub

 
Docker Hub is a public registry the place individuals share Docker photos. If you write FROM python:3.11-slim, Docker pulls that picture from Docker Hub.

You’ll be able to seek for photos:

 

And pull them to your machine:

docker pull redis:7-alpine

 

You can too push your personal photos to share with others or deploy to servers:

docker tag my-python-app:1.0 username/my-python-app:1.0

docker push username/my-python-app:1.0

 

Docker Hub hosts official photos for well-liked software program like PostgreSQL, Redis, Nginx, Python, and 1000’s extra. These are maintained by the software program creators and comply with finest practices.

For personal tasks, you’ll be able to create non-public repositories on Docker Hub or use various registries like Amazon Elastic Container Registry (ECR), Google Container Registry (GCR), or Azure Container Registry (ACR).

 

7. Docker Compose

 
Actual purposes want a number of companies. A typical net app has a Python backend, a PostgreSQL database, a Redis cache, and perhaps a employee course of.

Docker Compose helps you to outline all these companies in a single But One other Markup Language (YAML) file and handle them collectively.

Create a docker-compose.yml file:

model: '3.8'

companies:
  net:
    construct: .
    ports:
      - "8000:8000"
    surroundings:
      - DATABASE_URL=postgresql://postgres:secret@db:5432/myapp
      - REDIS_URL=redis://cache:6379
    depends_on:
      - db
      - cache
    volumes:
      - .:/app
  
  db:
    picture: postgres:15-alpine
    volumes:
      - postgres-data:/var/lib/postgresql/information
    surroundings:
      - POSTGRES_PASSWORD=secret
      - POSTGRES_DB=myapp
  
  cache:
    picture: redis:7-alpine

volumes:
  postgres-data:

 

Now begin your whole utility stack with one command:

 

This begins three containers: net, db, and cache. Docker Compose handles networking routinely: the online service can attain the database at hostname db and Redis at hostname cache.

To cease the whole lot, run:

 

To rebuild after code adjustments:

docker-compose up -d --build

 

Docker Compose is important for improvement environments. As a substitute of putting in PostgreSQL and Redis in your machine, you run them in containers with one command.

 

8. Container Networks

 
If you run a number of containers, they should discuss to one another. Docker creates digital networks that join containers.

By default, Docker Compose creates a community for all companies outlined in your docker-compose.yml. Containers use service names as hostnames. In our instance, the online container connects to PostgreSQL utilizing db:5432 as a result of db is the service title.

You can too create customized networks manually:

docker community create my-app-network
docker run -d --network my-app-network --name api my-python-app:1.0
docker run -d --network my-app-network --name cache redis:7

 

Now the api container can attain Redis at cache:6379. Docker offers a number of community drivers, of which you’ll use the next usually:

  • bridge — Default community for containers on a single host
  • host — Container makes use of the host’s community straight (no isolation)
  • none — Container has no community entry

Networks present isolation. Containers on completely different networks can not talk until explicitly related. That is helpful for safety as you’ll be able to separate your frontend, backend, and database networks.

To see all networks, run:

 

To examine a community and see which containers are related, run:

docker community examine my-app-network

 

9. Surroundings Variables and Docker Secrets and techniques

 
Hardcoding configuration is asking for bother. Your database password shouldn’t be the identical in improvement and manufacturing. Your API keys undoubtedly shouldn’t stay in your codebase.

Docker handles this by surroundings variables. Go them in at runtime with the -e or --env flag, and your container will get the config it wants with out baking values into the picture.

Docker Compose makes this cleaner. Level to an .env file and preserve your secrets and techniques out of model management. Swap in .env.manufacturing while you deploy, or outline surroundings variables straight in your compose file if they don’t seem to be delicate.

Docker Secrets and techniques take this additional for manufacturing environments, particularly in Swarm mode. As a substitute of surroundings variables — which can present up in logs or course of listings — secrets and techniques are encrypted throughout transit and at relaxation, then mounted as recordsdata within the container. Solely companies that want them get entry. They’re designed for passwords, tokens, certificates, and anything that may be catastrophic if leaked.

The sample is easy: separate code from configuration. Use surroundings variables for normal config and secrets and techniques for delicate information.

 

10. Container Registry

 
Docker Hub works fantastic for public photos, however you do not need your organization’s utility photos publicly obtainable. A container registry is non-public storage in your Docker photos. Well-liked choices embrace:

For every of the above choices, you’ll be able to comply with an identical process to publish, pull, and use photos. For instance, you’ll do the next with ECR.

Your native machine or steady integration and steady deployment (CI/CD) system first proves its identification to ECR. This permits Docker to securely work together along with your non-public picture registry as an alternative of a public one. The domestically constructed Docker picture is given a completely certified title that features:

  • The AWS account registry tackle
  • The repository title
  • The picture model

This step tells Docker the place the picture will stay in ECR. The picture is then uploaded to the non-public ECR repository. As soon as pushed, the picture is centrally saved, versioned, and obtainable to approved techniques.

Manufacturing servers authenticate with ECR and obtain the picture from the non-public registry. This retains your deployment pipeline quick and safe. As a substitute of constructing photos on manufacturing servers (sluggish and requires supply code entry), you construct as soon as, push to the registry, and pull on all servers.

Many CI/CD techniques combine with container registries. Your GitHub Actions workflow builds the picture, pushes it to ECR, and your Kubernetes cluster pulls it routinely.

 

Wrapping Up

 
These ten ideas type Docker’s basis. Right here is how they join in a typical workflow:

  • Write a Dockerfile with directions in your app, and construct a picture from the Dockerfile
  • Run a container from the picture
  • Use volumes to persist information
  • Set surroundings variables and secrets and techniques for configuration and delicate information
  • Create a docker-compose.yml for multi-service apps and let Docker networks join your containers
  • Push your picture to a registry, pull and run it anyplace

Begin by containerizing a easy Python script. Add dependencies with a necessities.txt file. Then introduce a database utilizing Docker Compose. Every step builds on the earlier ideas. Docker is just not sophisticated when you perceive these fundamentals. It’s only a software that packages purposes constantly and runs them in remoted environments.

Completely satisfied exploring!
 
 

Bala Priya C is a developer and technical author from India. She likes working on the intersection of math, programming, information science, and content material creation. Her areas of curiosity and experience embrace DevOps, information science, and pure language processing. She enjoys studying, writing, coding, and low! At present, she’s engaged on studying and sharing her data with the developer group by authoring tutorials, how-to guides, opinion items, and extra. Bala additionally creates partaking useful resource overviews and coding tutorials.



Moto G Energy 2026 evaluate: New 12 months, same-ish cellphone

0


Why you possibly can belief Android Central


Our professional reviewers spend hours testing and evaluating services and products so you possibly can select the very best for you. Discover out extra about how we take a look at.

We could solely be a few weeks into the brand new 12 months, however Motorola has already launched its third Moto G cellphone for 2026, and I have been utilizing it for the previous few weeks. After testing final 12 months’s Moto G Energy 2025, I had pretty tepid expectations for the Moto G Energy 2026, and rightfully so; the newest mannequin is merely a minor spec bump over its predecessor, and in some methods, a downgrade.

There are some advantages to getting the newer mannequin, from having the newest OS to the slight improve in battery capability. Nonetheless, after just a few weeks with the Moto G Energy 2026, it hasn’t fairly satisfied me that it ought to exist, and Motorola could have been higher off skipping a 12 months, because it did with the Moto G Play in 2025.

Moto G Power 2026 and Power 2025

The Moto G Energy 2026 (left) and 2025 (proper). (Picture credit score: Derrek Lee / Android Central)

Opening the field, you’d be forgiven for mistaking this for the Moto G Energy 2025. The telephones are just about an identical in design; even the size are the identical, right down to the millimeter. That stated, there are delicate variations within the digital camera housing: The Moto G Energy 2025 was extra of a closed rectangular form, whereas the 2026 mannequin has a extra open form that followers out towards the system’s body.

What have been books like in historical Greece and Rome?

0


This text initially appeared in The Dialog.

Should you have been to go to a bookshop within the historical world, what wouldn’t it be like?

You don’t simply must think about it. The traditional Roman author Aulus Gellius, who lived within the 2nd century CE, offers us various descriptions of his adventures at bookstores. In one passage, he describes an encounter at one in Rome, which he was visiting with a poet buddy:

I chanced to be sitting in a bookshop within the Sigillaria with the poet Julius Paulus […] There was on sale there the Annals of Quintus Fabius Pictor in a duplicate of fine and undoubted age, which the seller maintained was with out errors.

Gellius then tells us that, whereas they’re sitting there, one other buyer enters the store. The brand new buyer has a disagreement with the seller. He complains that he “discovered within the e book one error”. The seller says that’s inconceivable. Then the shopper brings out proof to show the seller unsuitable.

In completely different passage, Aulus tells us about some bookstalls he got here throughout when he arrived by ship on the port of Brundisium on the Adriatic coast. The books, he data, have been “in Greek, full of marvellous tales, issues exceptional, unimaginable […] The writers have been historical and of no imply authority”.

The volumes themselves, nevertheless, have been filthy from neglect, in unhealthy situation and ugly. However, I drew close to and requested their worth; then, attracted by their extraordinary and surprising cheapness, I purchased a lot of them for a small sum.

Engraving of Aulus Gellius (1706). Picture: Public Area

Aulus goes on to explain in excited language all of the bizarre details he derived from these books – like how individuals in Africa can “work spells by voice and tongue” and thru this witchcraft trigger individuals, animals, timber and crops to die.

The origins of writing

These kinds of tales deliver us near how abnormal individuals in historical Greek and Roman occasions obtained books and engaged with books. But when we learn tales like this it’d lead us to wish to know extra. How did books and writing come into existence? And the way have been books written and produced?

Many individuals within the historical world thought that writing had been invented by gods or heroes. For instance, the traditional Egyptians believed the god Thoth was the primary to create indicators to characterize spoken sounds.

The origins of writing are definitely mysterious. It’s unclear when writing started and who invented it.

The earliest written textual content is a wood pill radiocarbon dated to earlier than 5000 BCE. This is named the Dispilio pill, as a result of it was found at a neolithic lakeside settlement at Dispilio in Greece. It’s carved with unusual linear markings. These haven’t been deciphered, however most students suppose they’re a type of writing.

A piece of wood etched with symbols suspended on a wall with twine.
Mannequin of the Dispilio Pill. Picture: Мико/ CC BY-SA

Proof for writing seems early in several components of the world. In Mesopotamia and Egypt, the oldest texts, such because the Kish limestone pill at Uruk or the Narmer Palette at Hierakonpolis, date to earlier than 3000 BCE. Within the Indus Valley, the Harappan script, which stays undeciphered, appeared across the identical time. In China, the earliest characters, the Dawenkou graphs, additionally date to round 3000 BCE.

Probably the most fascinating points of early writing is that there’s such quite a lot of completely different scripts. For instance, the earliest identified texts within the Greek language are written within the Linear B script, which was used from round 1500-1200 BCE, and wasn’t deciphered till 1952. Linear B isn’t an alphabet, however a syllabary of greater than 80 completely different indicators. A syllabary is a form of writing system the place every signal represents a syllable.

By across the eighth century BCE, most Greeks had beginning utilizing an alphabet as a substitute of a syllabary. In contrast to a syllabary, in an alphabet every letter represents a vowel or consonant. The Greeks tailored their alphabet from the Phoenician alphabet, in all probability through interactions with Phoenician merchants. The Phoenician alphabet had solely 22 letters, making it a lot simpler to be taught than the 80-plus syllabary indicators of Linear B.

Our English alphabet comes from the Romans, who within the eighth and seventh century BCE additionally acquired their alphabet from the Phoenicians, through the Greeks.

An tan piece of papyrus showing red and black Egyptian script.
A papyrus doc from historical Egypt, written in hieratic script. The textual content describes anatomical observations and the examination, prognosis, remedy and prognosis of quite a few medical issues (c.1600 BCE) Picture: Public Area

The origins of books

Individuals in historical occasions used many various issues as writing supplies.

The Roman author Pliny the Elder (23-79 CE) tells us that the earliest individuals on this planet

used to jot down on palm-leaves after which on the bark of sure timber, and afterwards folding sheets of lead started to be employed for official muniments, after which additionally sheets of linen or tablets of wax for personal paperwork.

Nevertheless, the most well-liked writing materials within the historical Mediterranean was papyrus, from which we get our phrase “paper”.

To make papyrus, you get the pith of the papyrus plant (Cyperus papyrus), lower it into slender strips, then press it collectively. As soon as dried, it varieties a skinny sheet you could write on.

Papyrus sheets have been normally glued collectively into rolls. These rolls may very well be very lengthy. A few of the most lavish Egyptian papyrus rolls have been greater than 10 metres lengthy, such because the not too long ago found Waziri Papyrus containing components of the E-book of the Useless.

When papyri have been rolled up they have been saved in cabinets or packing containers. Labels have been hooked up to the handles of the papyri so you may establish their contents. In his play Linus, Greek playwright Alexis (c. 375-275 BC) has one character inform one other the way to look by way of a bunch of rolls to search out what he desires:

go over and choose any papyrus roll you want out of there after which learn it… analyzing them quietly, and at your leisure, on the idea of the labels. Orpheus is in there, Hesiod, tragedies, Choerilus, Homer, Epicharmus, prose treatises of each sort…

Papyrus appears flimsy to the attention, however it’s a sturdy writing materials, stronger than trendy paper. Many papyri have survived for 1000’s of years saved in jars or sarcophagi or buried below the sand.

The oldest surviving papyrus textual content is the so-called Diary of Merer (which you’ll take heed to right here), the logbook of a person named Merer, who was an inspector through the development of the Nice Pyramid of Giza below Pharaoh Khufu. This papyrus, which dates to round 2600 BCE, offers a day-by-day account of how Merer and his group of about 200 males frolicked hauling and transporting stone and doing different work.

Papyrus was vulnerable to being eaten by bugs or mice. However there have been methods to stop this. Pliny the Elder, for instance, advises that sheets of papyrus soaked in citrus-oil received’t be eaten by moths.

How To Make Papyrus Paper

https://youtube.com/watch?v=DCR8n7qS43wpercent3Fwmodepercent3Dtransparentpercent26startpercent3D0

The right way to write a e book in antiquity

Should you have been dwelling in historical Greece or Rome and needed to jot down a e book, how would you do it?

First, you’d purchase sheets or rolls of papyrus to jot down on. Should you couldn’t afford it, you’d have to jot down on the again or within the margins of papyri you already owned.

Should you didn’t personal any papyri already, then you would need to write on different supplies. In accordance with the Greek historian Diogenes Laertius (third century CE), the thinker Cleanthes (c. 331-231 BCE) “wrote down lectures on oyster-shells and the blade-bones of oxen by way of lack of cash to purchase papyrus”.

Second, you’d get your ink. Within the historical world, there have been many sorts of ink. Regular black ink was produced from the soot of burnt resin or pitch blended with vegetable gum. When shopping for ink, it will are available powder kind, and also you would want to combine it with water earlier than utilizing it.

Third, you’d get your pen. It could be produced from reed, therefore it was referred to as the “calamus” by Greeks and Romans (“calamus” is the Greek phrase for reed). To sharpen your pen you would want a knife. Should you made a mistake, you’d erase it with a moist sponge.

Now you’ve all of the supplies you want. Nevertheless, you don’t want to make use of the pen and papyrus your self. If you need, you will get a scribe to jot down down your phrases for you.

The Greek orator Dio Chrysostom (c.40-110 CE) even suggested writers to not use the pen themselves:

Writing I don’t advise you to interact in with your personal hand, or solely very hardly ever, however relatively to dictate to a secretary.

Should you wanted to seek the advice of different books whereas writing, you may get buddies to ship them to you or ask e book sellers to make you a duplicate. In a papyrus from the 2nd century CE discovered at Oxyrhynchus, Egypt, and written in Greek, the author asks his buddy to search out the books that he wants and make copies of them. In any other case, you’d go to a library, although one of the best libraries at Alexandria, Rome and Athens is likely to be distant.

Whenever you completed drafting your e book you would want to revise and proper it. You can then publish it by having many copies made by scribes and delivering these copies to buddies and booksellers.

When all this was completed, your e book could be out in public. Maybe somebody like Aulus Gellius would stumble throughout it in a busy Roman bookshop. Perhaps he’d even purchase it.

 

products on a page that says best of what's new 2025

2025 PopSci Better of What’s New

 

Group comparisons in structural equation fashions: Testing measurement invariance

0


When becoming nearly any mannequin, we could also be considering investigating whether or not parameters differ throughout teams equivalent to time intervals, age teams, gender, or faculty attended. In different phrases, we could want to carry out assessments of moderation when the moderator variable is categorical. For regression fashions, this may be so simple as together with group indicators within the mannequin and interacting them with different predictors.

We naturally have hypotheses relating to variations in parameters throughout teams when becoming structural equation fashions as nicely. When these fashions contain latent variables and the corresponding noticed measurements, we are able to take a look at whether or not these measurements are invariant throughout teams. Analysis of measurement invariance sometimes entails a sequence of assessments for equality of measurement coefficients (issue loadings), equality of intercepts, and equality of error variances throughout teams.

On this publish, I reveal how one can use the sem command’s group() and ginvariant() choices in addition to the postestimation command estat ginvariant to simply carry out assessments of measurement invariance.

Measurement invariance instance

I take advantage of knowledge from Holzinger and Swineford (1939), which information college students’ scores on quite a few exams designed to measure various kinds of talents. The scholars on this dataset got here from two totally different colleges, the Pasteur faculty and the Grant-White faculty, and I need to take a look at for variations throughout colleges. Right here I give attention to three exams that have been meant to measure spatial talents. I’ll match the confirmatory issue mannequin akin to the next path diagram and carry out a sequence of assessments for measurement invariance. Though this instance makes use of the sem command, I may have equivalently drawn this diagram within the Builder and chosen group evaluation to suit all of the fashions mentioned beneath.

To start, I match a mannequin with all parameters estimated individually throughout teams. There are numerous methods to set the required figuring out constraints that present a scale and placement for the latent variable. Right here I set the imply of the Spatial latent variable to 0 and the variance to 1 in each teams.


. sem (Spatial -> visible cubes paper), 
> variance(Spatial@1) imply(Spatial@0) ginvariant(none) group(faculty)

Endogenous variables

Measurement:  visible cubes paper

Exogenous variables

Latent:       Spatial

Becoming goal mannequin:

Iteration 0:   log chance = -2603.5782
Iteration 1:   log chance = -2603.5782

Structural equation mannequin                       Variety of obs     =        301
Grouping variable  = faculty                     Variety of teams  =          2
Estimation methodology  = ml
Log chance     = -2603.5782

 ( 1)  [var(Spatial)]1bn.faculty = 1
 ( 2)  [mean(Spatial)]1bn.faculty = 0
 ( 3)  [var(Spatial)]2.faculty = 1
 ( 4)  [mean(Spatial)]2.faculty = 0
-------------------------------------------------------------------------------
              |                 OIM
              |      Coef.   Std. Err.      z    P>|z|     [95% Conf. Interval]
--------------+----------------------------------------------------------------
Measurement   |
  visible <-   |
      Spatial |
     Pasteur  |   4.264065   .8600633     4.96   0.000     2.578372    5.949759
  Grant-Wh~e  |    5.49895   1.190435     4.62   0.000     3.165739     7.83216
        _cons |
     Pasteur  |   29.64744   .5674293    52.25   0.000     28.53529    30.75958
  Grant-Wh~e  |   29.57931   .5721785    51.70   0.000     28.45786    30.70076
  ------------+----------------------------------------------------------------
  cubes <-    |
      Spatial |
     Pasteur  |    2.26321   .5214501     4.34   0.000     1.241187    3.285234
  Grant-Wh~e  |   1.808245   .5031516     3.59   0.000     .8220861    2.794404
        _cons |
     Pasteur  |    23.9359   .3927222    60.95   0.000     23.16618    24.70562
  Grant-Wh~e  |       24.8   .3678649    67.42   0.000       24.079      25.521
  ------------+----------------------------------------------------------------
  paper <-    |
      Spatial |
     Pasteur  |   1.695466   .3429472     4.94   0.000     1.023302     2.36763
  Grant-Wh~e  |   1.311235   .3413206     3.84   0.000     .6422592    1.980211
        _cons |
     Pasteur  |   14.16026    .227089    62.36   0.000     13.71517    14.60534
  Grant-Wh~e  |   14.30345   .2335324    61.25   0.000     13.84573    14.76116
--------------+----------------------------------------------------------------
 imply(Spatial)|
          [*] |          0  (constrained)
--------------+----------------------------------------------------------------
 var(e.visible)|
     Pasteur  |   32.04601   6.912718                       20.9971    48.90898
 Grant-White  |   17.23285   12.18676                      4.309258    68.91467
  var(e.cubes)|
     Pasteur  |   18.93787   2.710244                      14.30585    25.06967
 Grant-White  |   16.35232   2.318816                      12.38443    21.59149
  var(e.paper)|
     Pasteur  |   5.170226    1.09911                      3.408453    7.842631
 Grant-White  |   6.188581   .9975804                      4.512114    8.487938
  var(Spatial)|
          [*] |          1  (constrained)
-------------------------------------------------------------------------------
Observe: [*] identifies parameter estimates constrained to be equal throughout teams.
LR take a look at of mannequin vs. saturated: chi2(0)   =      0.00, Prob > chi2 =      .

Glancing by this output, we see that most of the parameter estimates are very related for the 2 colleges. The estat ginvariant command gives assessments of invariance throughout teams.


. estat ginvariant, showpclass(mcoef) class

Assessments for group invariance of parameters

------------------------------------------------------------------------------
             |            Wald Check                       Rating Check
             |      chi2         df    p>chi2       chi2          df    p>chi2
-------------+----------------------------------------------------------------
Measurement  |
  visible <-  |
     Spatial |     0.707          1    0.4004          .           .         .
  -----------+----------------------------------------------------------------
  cubes <-   |
     Spatial |     0.394          1    0.5301          .           .         .
  -----------+----------------------------------------------------------------
  paper <-   |
     Spatial |     0.631          1    0.4271          .           .         .
------------------------------------------------------------------------------

Joint assessments for every parameter class

------------------------------------------------------------------------------
             |            Wald Check                       Rating Check
             |      chi2         df    p>chi2       chi2          df    p>chi2
-------------+----------------------------------------------------------------
       mcoef |     1.097          3    0.7778          .           .         .
------------------------------------------------------------------------------

The showpclass(mcoef) and class choices restricted the outcomes to assessments relating to measurement coefficients and requested a joint take a look at for the speculation that every one measurement coefficients are equal throughout teams. The primary desk within the output stories separate assessments of equality of the measurement coefficients throughout teams. My focus now, nonetheless, is on the joint Wald take a look at proven within the second desk, and we fail to reject the speculation of equality throughout teams for all measurement coefficients.

I now embrace the ginvariant(mcoef) possibility as a way to match a mannequin with the measurement coefficients constrained to be equal throughout teams by typing


. sem (Spatial -> visible cubes paper), variance(Spatial@1) /// 
       imply(Spatial@0) ginvariant(mcoef) group(faculty)

after which take a look at whether or not the intercepts will be constrained:


. estat ginvariant, showpclass(mcons) class

Assessments for group invariance of parameters

------------------------------------------------------------------------------
             |            Wald Check                       Rating Check
             |      chi2         df    p>chi2       chi2          df    p>chi2
-------------+----------------------------------------------------------------
Measurement  |
  visible <-  |
       _cons |     0.007          1    0.9326          .           .         .
  -----------+----------------------------------------------------------------
  cubes <-   |
       _cons |     2.580          1    0.1082          .           .         .
  -----------+----------------------------------------------------------------
  paper <-   |
       _cons |     0.193          1    0.6605          .           .         .
------------------------------------------------------------------------------

Joint assessments for every parameter class

------------------------------------------------------------------------------
             |            Wald Check                       Rating Check
             |      chi2         df    p>chi2       chi2          df    p>chi2
-------------+----------------------------------------------------------------
       mcons |     3.011          3    0.3900          .           .         .
------------------------------------------------------------------------------

We fail to reject the null speculation that every one intercepts are equal throughout teams, so I match the mannequin with these equality constraints by specifying the ginvariant(mcoef mcons) possibility.


. sem (Spatial -> visible cubes paper), variance(Spatial@1) /// 
      imply(Spatial@0) ginvariant(mcoef mcons) group(faculty)

Then, I take a look at the equality of the error variances.


. estat ginvariant, showpclass(merrvar) class

Assessments for group invariance of parameters

------------------------------------------------------------------------------
             |            Wald Check                       Rating Check
             |      chi2         df    p>chi2       chi2          df    p>chi2
-------------+----------------------------------------------------------------
var(e.visible)|     0.359          1    0.5493          .           .         .
 var(e.cubes)|     1.413          1    0.2345          .           .         .
 var(e.paper)|     0.014          1    0.9052          .           .         .
------------------------------------------------------------------------------

Joint assessments for every parameter class

------------------------------------------------------------------------------
             |            Wald Check                       Rating Check
             |      chi2         df    p>chi2       chi2          df    p>chi2
-------------+----------------------------------------------------------------
     merrvar |     1.857          3    0.6027          .           .         .
------------------------------------------------------------------------------

As soon as once more, we fail to reject the null speculation of invariance throughout teams. I now impose constraints on the coefficients, intercepts, and error variances whereas permitting the imply and variance of the latent variable to vary throughout teams. To do that, I take away the imply(Spatial@0) possibility and exchange the variance(Spatial@1) with variance(1:Spatial@1). With this variation, the imply and variance of Spatial can be set to 0 and 1, respectively, within the first group however estimated freely within the second group.


. sem (Spatial -> visible cubes paper), 
> variance(1:Spatial@1) ginvariant(mcoef mcons merrvar) group(faculty)

Endogenous variables

Measurement:  visible cubes paper

Exogenous variables

Latent:       Spatial

Becoming goal mannequin:

Iteration 0:   log chance = -5357.6935  (not concave)
Iteration 1:   log chance = -4792.5814  (not concave)
Iteration 2:   log chance = -4316.3827  (not concave)
Iteration 3:   log chance =  -2769.069  (not concave)
Iteration 4:   log chance = -2662.2605
Iteration 5:   log chance = -2645.7652
Iteration 6:   log chance = -2629.1987
Iteration 7:   log chance =   -2622.83  (not concave)
Iteration 8:   log chance = -2622.3555
Iteration 9:   log chance = -2622.3227
Iteration 10:  log chance = -2621.9007
Iteration 11:  log chance = -2621.8931
Iteration 12:  log chance =  -2621.893

Structural equation mannequin                       Variety of obs     =        301
Grouping variable  = faculty                     Variety of teams  =          2
Estimation methodology  = ml
Log chance     =  -2621.893

 ( 1)  [cubes]1bn.faculty#c.Spatial - [cubes]2.faculty#c.Spatial = 0
 ( 2)  [paper]1bn.faculty#c.Spatial - [paper]2.faculty#c.Spatial = 0
 ( 3)  [var(e.visual)]1bn.faculty - [var(e.visual)]2.faculty = 0
 ( 4)  [var(e.cubes)]1bn.faculty - [var(e.cubes)]2.faculty = 0
 ( 5)  [var(e.paper)]1bn.faculty - [var(e.paper)]2.faculty = 0
 ( 6)  [var(Spatial)]1bn.faculty = 1
 ( 7)  [visual]1bn.faculty - [visual]2.faculty = 0
 ( 8)  [cubes]1bn.faculty - [cubes]2.faculty = 0
 ( 9)  [paper]1bn.faculty - [paper]2.faculty = 0
 (10)  [visual]2.faculty#c.Spatial = 1
 (11)  [mean(Spatial)]1bn.faculty = 0
-------------------------------------------------------------------------------
              |                 OIM
              |      Coef.   Std. Err.      z    P>|z|     [95% Conf. Interval]
--------------+----------------------------------------------------------------
Measurement   |
  visible <-   |
      Spatial |
     Pasteur  |   5.472561   1.129916     4.84   0.000     3.257966    7.687156
  Grant-Wh~e  |          1  (constrained)
        _cons |
          [*] |   29.32102   .4932735    59.44   0.000     28.35422    30.28782
  ------------+----------------------------------------------------------------
  cubes <-    |
      Spatial |
          [*] |   .3968564   .1833049     2.17   0.030     .0375854    .7561274
        _cons |
          [*] |   24.26618   .2890016    83.97   0.000     23.69975    24.83262
  ------------+----------------------------------------------------------------
  paper <-    |
      Spatial |
          [*] |   .2953686    .137265     2.15   0.031     .0263341    .5644031
        _cons |
          [*] |   14.16525   .1786194    79.30   0.000     13.81516    14.51533
--------------+----------------------------------------------------------------
 imply(Spatial)|
     Pasteur  |          0  (constrained)
 Grant-White  |   .4140109   .6928933     0.60   0.550    -.9440351    1.772057
--------------+----------------------------------------------------------------
 var(e.visible)|
          [*] |   19.50062   12.09195                      5.784095    65.74481
  var(e.cubes)|
          [*] |   20.08682   1.784905                      16.87617    23.90829
  var(e.paper)|
          [*] |   6.864085    .691005                      5.634982    8.361281
  var(Spatial)|
     Pasteur  |          1  (constrained)
 Grant-White  |   25.44848   15.33031                      7.814351    82.87636
-------------------------------------------------------------------------------
Observe: [*] identifies parameter estimates constrained to be equal throughout teams.
LR take a look at of mannequin vs. saturated: chi2(7)   =     36.63, Prob > chi2 = 0.0000

The imply of 0.414 for Spatial within the Grant-White faculty represents the distinction in technique of this latent variable throughout colleges, and we discover the distinction in means throughout colleges is just not considerably totally different from 0.

Abstract

Assessments of hypotheses relating to the equality of parameters throughout teams are simply carried out utilizing the sem command and estat ginvariant. Whereas there are minor variations all through structural equation modeling literature in suggestions for setting figuring out constraints and for the order of assessments for invariance, the instruments that I’ve demonstrated will be tailored to accommodate any type of assessments for measurement invariance. These similar instruments can be used to check for parameter invariance throughout teams in different varieties of structural equation fashions.

Reference

Holzinger, Ok.~J., and F. Swineford. 1939. A examine in issue evaluation: The soundness of a bi-factor answer. Supplementary Academic Monographs, 48. Chicago, IL: College of Chicago.



Retail CIOs marshal a surge of AI brokers to market

0


AI brokers have seized their place on the retailer desk, primarily based on what CIOs and CTOs from distinguished manufacturers mentioned at this yr’s NRF Retail Large Present in New York Metropolis.

Straight out of the gate on the trade’s marquee convention, AI emerged as a definitive focus of retail giants like The Residence Depot, Wayfair and URBN, whose manufacturers embody City Outfitters and Anthropologie. Whereas their CIOs and CTOs talked up AI brokers as an inevitable evolution of retail, in addition they acknowledged a tough fact: that that they had spent the higher a part of 10 years seeing bots as a digital plague and blocking them from their websites. 

The problem surfaced throughout a panel moderated by Jason Del Rey, founding father of The Aisle, who pointed to the general public’s unfavorable response to AI brokers, citing his personal intuition to shut chatbot bins as quickly as they seem.

Angie Brown, CIO at {hardware} big Residence Depot — wryly noting that Del Rey’s set off response to bots was “precisely what we’re all making an attempt to keep away from” — sought to make the case for what at this time’s refined AI brokers can provide. They’re designed to fulfill clients “the place they’re,” to assist with buy selections, she mentioned. Residence Depot first explored AI in its search bar and search outcomes and now goals to additional work together with clients through AI brokers concerning the tasks they’re engaged on. 

Associated:How a CIO can break dangerous information with out killing workforce morale

“We’re making an attempt just a few alternative ways … to be there within the second to assist the client by way of their expertise,” she mentioned.

AI brokers meet real-world consumers

The purpose of Residence Depot’s AI use, Brown mentioned, is to concentrate on fixing buyer issues and tasks by offering the corporate’s experience by way of the AI brokers — with the intent of driving purchases. “If we will take away friction from the shopping for expertise, and if we may help our clients and our associates with know-how, then that looks like a candy spot for us to focus.”

The usage of purchasing brokers stays an ongoing studying course of, mentioned Fiona Tan, CTO at dwelling furnishings retailer Wayfair. Even cases when a buyer abandons a purchasing cart could be a lesson for AI and construct goodwill for the model. 

“Typically the truth that they didn’t make a purchase order is definitely a win, as a result of they came upon that really it is not going to suit — the couch’s too massive, [and ]God forbid, you need to return a settee,” Tan mentioned, explaining that the knowledge within the algorithm saved the client from making a mistake. 

Making the digital nuts and bolts of AI brokers work

In a separate fireplace chat, C-suite leaders from Stripe and URBN riffed about how they work with AI inside their organizations and what they should use it collaboratively.

Associated:The yr of the Chief Integration Officer — SAS CIO

Maia Josebachvili, chief income officer of AI at monetary companies firm Stripe, requested about making life simpler for URBN, and ostensibly different manufacturers, with the dealing with of knowledge on this AI-empowered world. “How can we assist be certain that your merchandise are legible by the AI brokers?” she requested.

There’s some work to be accomplished on that entrance, in keeping with URBN CIO Rob Frieman. The structured product information that retailers have been already aware of was readily understood by older infrastructure and stock techniques. There was little confusion about categorizing a pair of denims. However the brand new infrastructure and panorama with AI brokers within the combine are altering what might occur with the information.

“In a nondeterministic surroundings like LLM, how is it going to floor that in a method that we predict is powerful … every time they see a product from these instances?” he requested.

There could be confusion in understanding what clients need versus how information and metadata for merchandise are dealt with by AI brokers, Frieman mentioned. For instance, when clients work together with an LLM to discover a pair of denims, the phrases they use won’t mesh with an AI agent’s understanding of a product’s information. “Does your product really say denims?” he requested.

Associated:The CIO scorching seat: How one can lead AI with out changing into the scapegoat

The product information would possibly use the time period denim as an alternative, which may spawn digital confusion. LLM companions are studying to navigate this panorama, Frieman mentioned.

URBN’s manufacturers, comparable to City Outfitters, have launched an agentic purchasing expertise with Microsoft’s Copilot, which he mentioned could also be the way forward for agentic commerce. Frieman in contrast the present AI-driven transformation to the early days of e-commerce, which had its bumps and rising pains earlier than it grew to become an trade staple. “In plenty of methods, we really feel like this is identical territory,” he mentioned.

Frieman echoed a few of Brown’s notions about the usage of AI brokers to attach with customers as they discover potential purchases. “We actually need to meet our clients the place and the way they need to store, how they need to uncover merchandise,” he mentioned.

There appeared to be a collective, decided inevitability of AI brokers in retail on the convention. Frieman talked up URBN working with Stripe and Microsoft, so its clients can use Copilot to search out an outfit for a particular want or event. He demonstrated how a buyer may inform the AI the parameters of what they have been searching for. Steering from AI brokers may then present choices for faster buy selections. “It’s actually vital,” he mentioned. “That’s actually on the crux of a easy, frictionless buyer expertise, but additionally one that also retains that model connection.”

Parting bits of friction to deal with

The frenzy to populate AI brokers throughout the retail sector does include its share of hurdles. “Product information just isn’t simple. You need to ensure that everybody’s received initiatives for AEO [answer engine optimization], which is basically about the way you place the product information internally,” Frieman mentioned.

The marketing campaign to see bots accepted by customers can also be a major change from previous behaviors. “We spent the final decade saying, ‘No bots on our web site,’” Josebachvili mentioned. “Now we’re saying the other.” 

Additional, Frieman mentioned even with improvements AI can provide, safety should be a part of the event combine to make sure every bot is a trusted associate and every buyer is actual. “Even when each of these bins are ticked, you continue to need to ensure,” he mentioned.



Three local weather applied sciences breaking by way of in 2026


There’s an enormous number of proposals in the case of what’s subsequent for nuclear. Some corporations are constructing smaller reactors, which they are saying might make it simpler to finance new tasks, and get them accomplished on time. 

Different corporations are specializing in tweaking key technical bits of reactors, utilizing different fuels or coolants that assist ferry warmth out of the reactor core. These modifications might assist reactors generate electrical energy extra effectively and safely. 

Kairos Energy was the primary US firm to obtain approval to start building on a next-generation reactor to supply electrical energy. China is rising as a serious middle of nuclear growth, with the nation’s nationwide nuclear firm reportedly engaged on a number of next-gen reactors. 

Hyperscale knowledge facilities

This one isn’t fairly what I’d name a local weather know-how, however I spent most of final 12 months reporting on the local weather and environmental impacts of AI, and the AI increase is deeply intertwined with local weather and power. 

Knowledge facilities aren’t new, however we’re seeing a wave of bigger facilities being proposed and constructed to help the rise of AI. A few of these amenities require a gigawatt or extra of energy—that’s just like the output of a complete typical nuclear energy plant, only for one knowledge middle. 

(This seems like a great time to say that our Breakthrough Applied sciences listing doesn’t simply spotlight tech that we predict may have a straightforwardly constructive affect on the world. I believe again to our 2023 listing, which included mass-market army drones.)

There’s no denying that new, supersize knowledge facilities are an vital power driving electrical energy demand, sparking main public pushback, and rising as a key little bit of our new world infrastructure. 

This text is from The Spark, MIT Know-how Assessment’s weekly local weather publication. To obtain it in your inbox each Wednesday, enroll right here.

With RAM costs hovering, it is time next-gen telephone specs bought inventive

0


The RAM disaster impacts smartphones, PC elements, handheld recreation consoles, and extra, is absolutely beginning to chunk. Between product delays, cancellations, and the expectation of value hikes, 2026 isn’t shaping as much as be a superb yr for purchasing new devices. Whereas the outlook isn’t nice, the tech business stays adaptive, if nothing else. Each disaster can be a possibility, and I’m not the one one who thinks that.

I’ve some sympathy for Carl Pei’s place that the RAM scarcity presents a possibility for manufacturers which are much less depending on spec sheets — and the looming value will increase — to market their wares. I don’t assume that Nothing is precisely primed to profit any greater than anybody else (inexpensive telephones are most likely extra weak to BOM value hikes), however that’s by the by. The RAM scarcity would possibly current some alternatives for manufacturers to interrupt the mould, however will they take it?

How a lot RAM do that you must purchase?

Robert Triggs / Android Authority

The massive determination that manufacturers need to make is how finest to reply to this shared drawback. Merely charging extra or settling for much less RAM (and maybe space for storing) to carry costs regular are the apparent choices, however they may even be the weakest: customers will ask why they’re paying extra for a similar {hardware} or why the spec sheet is weaker this yr. Ready to see what your rivals do additionally appears like a no-win state of affairs.

For the sake of argument, let’s assume manufacturers unanimously come to the conclusion that everybody’s costs are prone to go up in 2026. The query then turns into: might — or ought to — you make investments that headroom in one thing apart from reminiscence?

As an alternative of spending extra on RAM, possibly manufacturers can improve different specs?

There are undoubtedly some attention-grabbing choices that might be made. Maybe a baseline $799 flagship can accept 8GB of RAM (which was completely tremendous a few years in the past) as a substitute of 12GB, and spend the distinction on enhancing its digicam setup. Everybody loves better-looking footage, and a greater digicam, or an additional one, is an efficient option to get a leg up on the competitors. Alternatively, investing in a bigger silicon-carbon battery would stand out way over somewhat additional RAM.

Possibly mid-range telephones can lastly spring for these dear IP scores, or make investments a bit more cash in design and construct supplies. Alternatively, manufacturers might double down on distinctive software program instruments, concepts like {hardware} keys, MagSafe-style wi-fi charging, or different smaller options that always make the distinction between mid- and flagship-tier handsets.

These options could make a tangible distinction to the on a regular basis person expertise, and customers would possibly really feel that they’re getting extra bang for a slight value improve versus a number of extra gigabytes of RAM (and even the identical quantity as final yr). In any case, these choices might permit telephones to distinguish themselves from people who take the extra apparent route of merely passing on the ballooning price of RAM.

Should you had been designing a telephone in 2026, how would you deal with the RAM disaster?

11 votes

Can you actually skrimp on RAM within the AI age?

Gemini pop-up on the Google Pixel 4.

Joe Maring / Android Authority

That’s tremendous on a telephone with 12GB or 16GB to go round, however underneath tighter constraints like 8GB, you need to take into account whether or not AI options or app responsiveness ought to take priority. Given the combined reception to AI instruments, I don’t assume many customers can be all that bothered if some offline options take somewhat longer in addition up. Nonetheless, if you happen to’re planning to launch the most effective AI-equipped telephone, having massive quantities of RAM is fairly non-negotiable nowadays.

There’s additionally a tangent right here that doesn’t get talked about a lot anymore: higher reminiscence administration. Smarter app eviction, extra aggressive background limits, and even perhaps resorting to that dreaded swap area might all assist stretch smaller RAM budgets additional. That gained’t magically remedy the issue — AI fashions, specifically, are nonetheless voracious — but it surely might be sufficient to clean over the expertise on telephones that may’t afford to throw 12GB or 16GB of RAM on the drawback.

Even so, this successfully splits the market into two segments: the massive manufacturers that may take in RAM prices or cross them on to customers with a view to maximize AI capabilities, and the smaller gamers that may’t.

The race for AI means the specs aren’t useless but.

Whereas that is already true to some extent — Google and Samsung have two of the bigger AI ecosystems, regardless that Nano runs with moderately modest necessities — the hole might widen if there’s a divergence between telephones that may and might’t meet future {hardware} calls for. Likewise, the expertise might really feel very completely different between telephones with spare RAM to dedicate to AI and people with out.

Maybe this can be a good factor. AI isn’t universally beloved within the cellular area (or wherever, for that matter), and nudging some corporations to hunt out other ways to distinguish their merchandise might be wholesome. Possibly manufacturers that focus extra on battery life, images, or distinctive designs would possibly fare higher than AI-obsessed rivals — however I doubt many company methods would wish to wager on that.

The disaster can’t final eternally

Samsung Galaxy S25 Ultra RAM use

Robert Triggs / Android Authority

All that being mentioned, smartphone designs take years, not months. Altering plans on the final minute to accommodate the explosive costs of RAM prior to now few months is unlikely. There’s most likely little or no the Samsung Galaxy S26 sequence can do about it, for instance, apart from to stump up the added price or transfer to a barely completely different RAM configuration. Altering a broader vary of options is off the desk.

Nonetheless, telephones launching within the second half of 2026 have had a bit extra time to weigh extra choices. There are optimistic expectations that the disaster will ease considerably by early 2027, through which case ready it out is perhaps the most effective wager. That mentioned, the RAM crunch might simply persist past the subsequent yr. If it does, it could pay to start out enthusiastic about the best way to construct extra thrilling telephones with out counting on copious quantities of RAM and storage to pad out spec sheets or energy next-gen AI fashions.

Clearly, I don’t assume costly RAM is an efficient factor, not to mention a golden alternative for some manufacturers. It’s a headache that may make units tougher to purchase and costlier, not less than briefly. Nonetheless, there could also be a sliver of alternative for manufacturers to shake up the established order over the subsequent yr or two. We’ll simply have to attend and see if we find yourself with some nice buys out of it.

Don’t wish to miss the most effective from Android Authority?

google preferred source badge light@2xgoogle preferred source badge dark@2x

Thanks for being a part of our group. Learn our Remark Coverage earlier than posting.