Membrane applied sciences have made up basically all new desalination capability in recent times; the final main thermal plant constructed within the Gulf got here on-line in 2018. Many reverse osmosis crops nonetheless depend on fossil fuels, however they’re extra environment friendly. Since then, membrane applied sciences have added greater than 15 million cubic meters of day by day capability—sufficient to produce water to thousands and thousands of individuals.
Capability has expanded shortly in recent times; between 2006 and 2024, nations throughout the Center East collectively spent over $50 billion constructing and upgrading desalination services, and practically that a lot working them.
Immediately, there are practically 5,000 desalination crops operational throughout the Center East.
And searching forward, progress is constant. Between 2024 and 2028, day by day capability is predicted to develop from about 29 million cubic meters to 41 million cubic meters.
Uneven vulnerabilities
Some nations depend on the expertise greater than others. Iran, for instance, makes use of desalination for about 3% of its municipal recent water. The nation has entry to groundwater and a few floor water, together with rivers, although these sources are being stretched skinny by agriculture and excessive drought.
Different nations within the area, significantly the Gulf nations (Bahrain, Qatar, Kuwait, the United Arab Emirates, Saudi Arabia, and Oman), have rather more restricted water sources and rely closely on desalination. Throughout these six nations, all however the UAE get greater than half their ingesting water from desalination, and for Bahrain, Qatar, and Kuwait the determine is greater than 90%.
“The Gulf nations are a lot, rather more susceptible to assaults on their desalination crops than Iran is,” says David Michel, a senior affiliate within the world meals and water safety program on the Middle for Strategic and Worldwide Research.
There are literally thousands of desalination services throughout the area, so the system wouldn’t collapse if a small quantity have been taken offline, Michel says. Nonetheless, in recent times there’s been a pattern towards bigger, extra centralized crops.
A important vulnerability within the Ninja Kinds File Uploads premium add-on for WordPress permits importing arbitrary information with out authentication, which may result in distant code execution.
Recognized as CVE-2026-0740, the problem is presently exploited in assaults. Based on WordPress safety firm Defiant, its Wordfence firewall blocked greater than 3,600 assaults over the previous 24 hours.
With over 600,000 downloads, Ninja Kinds is a well-liked WordPress kind builder that lets customers create kinds with out coding utilizing a drag-and-drop interface. Its File Add extension, included in the identical suite, serves 90,000 prospects.
With a important severity score of 9.8 out of 10, the CVE-2026-0740 vulnerability impacts Ninja Kinds File Add variations as much as 3.3.26.
Based on Wordfence researchers, the flaw is attributable to an absence of validation of file varieties/extensions on the vacation spot filename, permitting an unauthenticated attacker to add arbitrary information, together with PHP scripts, and likewise manipulate filenames to allow path traversal.
“The perform doesn’t embrace any file kind or extension checks on the vacation spot filename earlier than the transfer operation within the weak model,” Wordfence explains.
“Because of this not solely protected information might be uploaded, however it’s also doable to add information with a .php extension.”
“Since no filename sanitization is utilized, the malicious parameter additionally facilitates path traversal, permitting the file to be moved even to the webroot listing.”
“This makes it doable for unauthenticated attackers to add arbitrary malicious PHP code after which entry the file to set off distant code execution on the server.”
The potential repercussions of exploitation are dire, together with the deployment of net shells and full web site takeover.
Discovery and fixes
The vulnerability was found by safety researcher Sélim Lanouar (whattheslime), who submitted it to Wordfence’s bug bounty program on January 8.
Following validation, Wordfence disclosed the complete particulars to the seller on the identical day and pushed momentary mitigations through firewall guidelines to its prospects.
After patch critiques and a partial repair on February 10, the seller launched a whole repair in model 3.3.27, accessible since March 19.
Provided that Wordfence is detecting hundreds of exploitation makes an attempt every day, customers of Ninja Kinds File Add are strongly really useful to prioritize upgrading to the most recent model.
Automated pentesting proves the trail exists. BAS proves whether or not your controls cease it. Most groups run one with out the opposite.
This whitepaper maps six validation surfaces, reveals the place protection ends, and gives practitioners with three diagnostic questions for any instrument analysis.
Scientists are all the time pushing the boundaries of photo voltaic cell effectivity – how a lot of the obtainable sunshine will get became electrical energy – and a brand new method to the expertise has resulted in an astonishingly excessive 130 p.c ‘quantum yield‘.
It is vital to notice that this can be a quantum-level power return, so we’re not speaking a few photo voltaic panel changing daylight into electrical energy at a 130 p.c price. Nonetheless, the breakthrough is an effectivity enchancment when it comes to how usually a selected occasion happens per photon absorbed by the system.
To interrupt by the 100% barrier, the brand new method splits the power harvested from a single incoming mild photon into two, which then powers two excited states (often known as excitons) within the receiving materials.
Tetracene and molybdenum (Mo) have been mixed with singlet fission. (Sifuentes-Samanamud et al., J. Am. Chem. Soc., 2026)
It is a course of often known as singlet fission, and because the worldwide crew behind the analysis explains, it prevents extra power from being misplaced as warmth.
That loss is a part of the explanation that photo voltaic cells usually max out at across the 33 p.c mark when it comes to total effectivity, a restriction often known as the Shockley-Queisser restrict.
“We now have two fundamental methods to interrupt by this restrict,” says chemist Yoichi Sasaki, from Kyushu College in Japan.
“One is to transform lower-energy infrared photons into higher-energy seen photons. The opposite, what we discover right here, is to make use of singlet fission to generate two excitons from a single exciton photon.”
The researchers used an natural molecule referred to as tetracene to behave because the splitting materials right here, by which singlet fission can work. Its properties make it appropriate for splitting one high-energy packet into two lower-energy packets by electron excitation.
Singlet fission is not a fully new idea, although, and is just half of the story right here. A significant stumbling block in earlier experiments had been giving singlet fission sufficient time to work earlier than the power was misplaced or transferred elsewhere.
That is the place the metallic factor molybdenum is available in, once more chosen for its explicit properties. By mixing it with tetracene, the crew was capable of catch the break up excitons within the molybdenum compound.
On the tiniest quantum stage, the molybdenum acts as what’s referred to as a spin-flip emitter. First, it locks in power, after which it makes use of a quantum spin-flip to show the invisible states into mild. That gave the crew the breakthrough consequence: 1.3 molybdenum-based steel complexes excited per photon absorbed.
“The power will be simply ‘stolen’ by a mechanism referred to as Förster resonance power switch (FRET) earlier than multiplication happens,” says Sasaki.
“We due to this fact wanted an power acceptor that selectively captures the multiplied triplet excitons after fission.”
It is value emphasizing once more that these are early lab assessments. The following steps are to transform the liquid resolution used right here right into a stable kind that may be fitted to a photo voltaic panel, reliably and successfully – which the researchers themselves admit will probably be fairly a problem.
There’s additionally the difficulty of the molybdenum complexes hanging onto the power lengthy sufficient for it to be helpful, in addition to capturing it within the first place. This “decay course of” is one thing else the research addresses.
Nonetheless, these future sensible considerations should not take away from the joy of the analysis: It clearly units out a path in the direction of photo voltaic panels that may go above and past the effectivity limits of immediately, and there are a number of ways in which this proof-of-concept will be tweaked and experimented with going ahead.
With photo voltaic power a significant a part of decreasing our reliance on fossil fuels and slowing down local weather change, having the ability to considerably enhance conversion charges on photo voltaic panels would doubtlessly be transformative for the power trade – particularly when paired with new power storage mechanisms.
“This work represents a major step towards growing exciton/photon amplification supplies by combining singlet fission supplies with transition-metal complexes, advancing the appliance of singlet fission past typical limitations,” write the researchers of their paper.
I’ve a sure, barely embarrassing fondness for James Coburn’s Flint movies. Not precisely good, however full of excellent stuff, touchdown someplace between the heights of Coburn’s The President’s Analyst and the depths of Dean Martin’s Matt Helm movies. (Together with the Cisco Child, the Matt Helm movies have the excellence of being about as far in tone from their supply materials as you’re more likely to discover. The unique Donald Hamilton novels — as archetypical of the Gold Medal line as John D. MacDonald’s — are among the darkest books you’ll discover within the spy-fi catalog, portray a far bleaker image than, for instance, the The Ipcress File.)
As movies, the primary installment, Our Man Flint, is the higher of the 2. The second, In Like Flint (a slightly daring allusion to a scandalous incident involving Errol Flynn), was a troubled manufacturing saddled with a satiric tackle ladies’s lib that has aged like room-temperature milk. Nonetheless, it had some glorious set items. Rumor has it that among the motion sequences have been directed by the stunt coordinator, which tends to work out nicely.
One of many great issues about each films is the scores by Jerry Goldsmith. Our Man Flint options some very early work from the younger nephew of the studio’s music director, a child named Randy Newman. In Like Flint, by comparability, options the music “Zowie Face,” with very good music by Goldsmith and completely painful lyrics by Leslie Bricusse. That one misstep apart, it might be my favourite of the 2 soundtracks.
Each scores handle to perform brilliantly on two ranges, concurrently serving as first-rate spy film music whereas additionally performing as intelligent parodies of the style—propulsive, creative, and memorable when performed straight, witty, self-referential, and genuinely humorous when winking on the joke.
I can’t consider one other movie composer who may pull this off, and I by no means get bored with listening to him do it.
Me and Caitlin Myers are again with our trusted robotic command line interface undercover agent with a license to kill, Claude Code! This week we proceed our dwell analysis mission finding out the closure of abortion clinics throughout Texas beneath Home Invoice 2 and its impact on county marriage certificates, or the circulate of latest marriages. Within the earlier weeks, recall Claude Code helped discover, pull, retailer domestically marriage certificates — with individuals’s names and chosen demographics for goodness sake! — after which construct a panel dataset. However Claude additionally helped us attempt to perceive what was happening with these date when some irregularities had been noticed. And to fulfill by seemingly limitless itch, Claude additionally made us “stunning decks” in response to my rhetoric of decks philosophy at my MixtapeTools repository that incorporates abilities I commonly use. And the deck had stunning photos in it.
This week we prolong that train and make maps of Texas with extra knowledge as we proceed urgent forward to find out the connection, probably causal, of elevated journey distance on the circulate of individuals into marriage. Thanks once more for tuning in. Inform your pals, household, your previous second grade instructor, Ms. Lacy, your barista, the children subsequent door who generally play their music too loud about this superb podcast with Caitlin Myers at Middlebury School, and me, Scott Cunningham, at Baylor College.
Now and again, I stumble onto an outdated challenge of mine, or worse, another person’s, and I’m reminded simply how chaotic CSS can recover from time. In most of those circumstances, the !essential key phrase appears to be concerned in a method or one other. And it’s straightforward to know why builders depend on it. It offers an instantaneous repair and forces a rule to take priority within the cascade.
That’s to not say !essential doesn’t have its place. The issue is that after you begin utilizing it, you’re now not working with the cascade; you’re bypassing it. This will shortly get out of hand in bigger tasks with a number of folks engaged on them, the place every new override makes the following one more durable.
Cascade layers, specificity tips, smarter ordering, and even some intelligent selector hacks can usually substitute !essential with one thing cleaner, extra predictable, and much much less embarrassing to elucidate to your future self.
Let’s speak about these options.
Specificity and !essential
Selector specificity is a deep rabbit gap, and never the objective of this dialogue. That stated, to know why !essential exists, we have to have a look at how CSS decides which guidelines apply within the first place. I wrote a transient overview on specificity that serves as place to begin. Chris additionally has a concise piece on it. And when you actually wish to go deep into all the sting circumstances, Frontend Masters has a thorough breakdown.
In brief, CSS offers every selector a sort of “weight.” When two guidelines goal the identical factor, the rule with larger specificity wins. If the specificity is equal, the rule declared later within the stylesheet takes priority.
Inline kinds (fashion="...") are the heaviest.
ID selectors (#header) are stronger than courses or kind selectors.
Class, attribute, and pseudo-class selectors (.btn, [type="text"], :hover) carry medium weight.
Sort selectors and pseudo-elements (div, p, ::earlier than) have the bottom weight. Though, the * selector is even decrease with a specificity of 0-0-0 in comparison with kind selectors which have a specificity of 0-0-1.
Inline kinds being the heaviest additionally explains why they’re usually frowned upon and never thought of “clear” CSS since they bypass a lot of the regular construction we attempt to keep.
!essential adjustments this habits. It skips regular specificity and supply order, pushing that declaration to the highest inside its origin and cascade layer:
p {
colour: purple !essential;
}
#essential p {
colour: blue;
}
Though #essential p is extra particular, the paragraph will seem purple as a result of the !essential declaration overrides it.
Why !essential could be problematic
Right here’s the standard lifecycle of !essential in a challenge involving a number of builders:
“Why isn’t this working? Add !essential. Okay, fastened.”
Then another person comes alongside and tries to alter that very same part. Their rule doesn’t apply, and after some digging, they discover the !essential. Now they’ve a selection:
take away it and threat breaking one thing else,
or add one other !essential to override it.
And since nobody is totally positive why the primary one was added, the safer transfer usually seems like including one other one. This will shortly spiral uncontrolled in bigger tasks.
On a extra technical notice, the basic downside with !essential is that it breaks the supposed order of the cascade. CSS is designed to resolve conflicts predictably by means of specificity and supply order. Later guidelines override earlier ones, and extra particular selectors override much less particular ones.
A typical place the place this turns into apparent is theme switching. Think about the instance beneath:
Even inside a darkish theme, the button stays purple. This ends in the stylesheet turning into more durable to cause about, as a result of the cascade is now not predictable.
In massive groups, particularly, this ends in upkeep and debugging turning into more durable. None of this implies !essential ought to by no means be used. There are reliable circumstances for it, particularly in utility courses, accessibility overrides, or person stylesheets. However when you’re utilizing it as your go-to methodology to resolve a selector/styling battle, it’s normally an indication that one thing else within the cascade wants consideration.
Let’s have a look at options.
Cascade layers
Cascade layers are a extra superior function of CSS, and there’s a lot of principle on them. For the needs of this dialogue, we’ll deal with how they assist you keep away from !essential. If you wish to be taught extra, Miriam Suzanne wrote a full information on CSS Cascade Layers on it that goes into appreciable element.
In brief, cascade layers allow you to outline specific precedence teams in your CSS. As an alternative of counting on selector specificity, you determine up entrance which class of kinds ought to take priority. You possibly can outline your layer order up entrance:
@layer reset, defaults, elements, utilities;
This establishes precedence from lowest to highest. Now you’ll be able to add kinds into these layers:
Though [data-color="brand"] has decrease specificity than a:any-link, the utilities layer takes priority as a result of it was outlined later within the layer stack.
It’s price noting that specificity nonetheless works inside a layer. However between layers, layer order is given precedence.
With cascade layers, you’ll be able to prioritize complete classes of kinds as an alternative of particular person guidelines. For instance, your “overrides” layer at all times takes priority over your “base” layer. This form of architectural considering, as an alternative of reactive fixing saves a variety of complications down the road.
One quite common instance is integrating third-party CSS. If a framework ships with extremely particular selectors, you are able to do this:
Now your part kinds robotically override the framework kinds, no matter their selector specificity, so long as the framework isn’t utilizing !essential.
And whereas we’re speaking about it, it’s good to notice that utilizing !essentialwith cascade layers is definitely counterintuitive. That’s as a result of !essential really reverses the layer order. It’s now not a fast method to bounce to the highest of the priorities — however an built-in a part of our cascade layering; a manner for decrease layers to insist that a few of their kinds are important.
So, if we have been to order a set of layers like this:
utilities (strongest)
elements
defaults (least highly effective)
Utilizing !essential flips issues on their head:
!essential defaults (strongest)
!essential elements
!essential utilities
regular utilities
regular elements
regular defaults (least highly effective)
Discover what occurs there: it generates three new, reversed essential layers that supersede the unique three layers whereas reversing all the order.
The :is() pseudo
The :is() pseudo-class is attention-grabbing as a result of it takes the specificity of its most particular argument. Say you’ve a part that should match the load of a extra particular selector elsewhere within the codebase:
/* someplace in your kinds */
#sidebar a {
colour: grey;
}
/* your part */
.nav-link {
colour: blue;
}
Quite than utilizing !essential, you’ll be able to bump .nav-link up by wrapping it in :is() with a extra particular argument:
:is(#some_id, .nav-link) {
colour: blue;
}
Now this has id-level specificity whereas matching solely .nav-link. It’s price noting that the selector inside :is() doesn’t need to match an precise factor. We’re utilizing #some_id purely to extend specificity on this case.
Word: If #some_id really exists in your markup, this selector would additionally match that factor. So it might be finest to make use of an id not getting used to keep away from unintended effects.
On the flip aspect, :the place() does the other. It at all times resolves to a specificity of (0,0,0), it doesn’t matter what’s inside it. That is helpful for reset or base kinds the place you need something downstream to override simply.
Doubling up a selector
A fairly simple manner of accelerating a selectors specificity is repeating the selector. That is normally accomplished with courses. For instance:
You’d usually not wish to do that too usually as it will possibly develop into a readability nightmare.
Reordering
CSS resolves ties in specificity by supply order, so a rule that comes later is prioritized. That is straightforward to miss, particularly in bigger stylesheets the place kinds are unfold throughout a number of information.
If a extra generic rule retains overriding a extra focused one and the specificity is similar, test whether or not the generic rule is being loaded after yours. Flipping the order can repair the battle without having to extend specificity.
That is additionally why it’s price desirous about stylesheet group from the beginning. A typical sample is to go from generic to particular (resets and base kinds first, then structure, then elements, then utilities).
When utilizing !essential does make sense
In any case that, it’s price being clear: !essential does have reliable use circumstances. Chris mentioned this some time again too, and the feedback are price a learn too.
The most typical case is utility courses. For instance, the entire level of courses like .visually-hidden is that they do one factor, in all places. On this circumstances, you don’t desire a extra particular selector quietly undoing it elsewhere. The identical is true for state courses like .disabled or generic part kinds like .button.
Third-party overrides are one other frequent situation. !essential can be utilized right here to both override inline kinds being set in JavaScript or regular kinds in a stylesheet that you would be able to’t edit.
From an accessibility viewpoint, !essential is irreplaceable for person stylesheets. Since these are utilized on all webpages and there’s just about no method to assure if the stylesheets’ selectors will at all times have the very best specificity, !essential is mainly the one dependable manner to ensure your kinds at all times get priority.
One other good instance is in terms of respecting a person’s browser preferences, comparable to lowering movement:
The distinction between good and unhealthy use of !essential actually comes all the way down to intent. Are you utilizing it since you perceive the CSS Cascade and have made a name that this declaration ought to at all times apply? Or are you utilizing it as a band-aid? The latter will inevitably trigger points down the road.
In at this time’s fast-paced retail atmosphere, downtime isn’t simply inconvenient, it’s expensive. When a handheld scanner fails throughout peak buying hours or a cell laptop disconnects in the course of a Purchase On-line, Choose Up In-Retailer (BOPIS) transaction, the impression extends to buyer satisfaction, worker productiveness, and in the end, the underside line.
The strategic partnership between Cisco and Zebra Applied sciences, which incorporates Cisco Wi-fi and ThousandEyes integrations with Zebra cell computer systems and scanners, is addressing these challenges head-on, delivering deeper visibility and management for retail organizations.
The Problem: The Visibility Hole
Retail IT groups have lengthy confronted a irritating problem. They’re accountable for sustaining seamless operations throughout shops, warehouses, and distribution facilities, and they’ve operated with restricted visibility into the very gadgets that energy these operations. The 2026 Cisco State of Wi-fi Report shines a light-weight on this, revealing how 86% of retail wi-fi professionals state an absence of visibility impacts their potential to handle operations, with consumer and software visibility gaps inflicting probably the most issues.
When a Zebra cell laptop or scanner experiences connectivity points, troubleshooting turns into an train in educated guesswork. Was it a roaming drawback? Battery depletion? A firmware bug? The solutions too usually stay locked inside the gadgets themselves, forcing IT groups into reactive, time-consuming diagnostic processes.
This visibility hole interprets straight into enterprise impression. In retail, each minute of machine downtime, disrupted connectivity, or software degradation can imply delayed customer support, deserted transactions, incomplete stock counts, or disrupted achievement operations. For organizations working on razor-thin margins, these inefficiencies can accumulate rapidly.
The native integrations between Zebra, Cisco Wi-fi, and Cisco ThousandEyes are constructed to deal with these challenges by real-time intelligence and end-to-end assurance. Let’s take a more in-depth look.
Cisco Wi-fi and Zebra: Most Effectivity By means of Deep Actual-time Visibility
The distinctive integration between Cisco Wi-fi and Zebra Applied sciences essentially adjustments how retailers can decrease the unfavorable enterprise impacts attributable to lack of visibility into the gadgets and environments driving a lot of their operations. By surfacing Zebra-specific telemetry straight inside the Meraki Dashboard, retail IT groups now have fast entry to important machine intelligence together with machine mannequin, OS model, serial numbers, and, maybe most importantly, detailed disassociation motive codes.
This final functionality represents an enormous leap in troubleshooting effectivity. As a substitute of generic “disconnected” notifications, the system now reveals precisely why a tool left the community: deliberate roaming, low-signal dropout, or handbook disconnect. This granular perception transforms troubleshooting from artwork to science, enabling IT groups to determine patterns, proactively handle points, and resolve issues in minutes quite than hours. And all of that is accomplished with out requiring any end-point software program, which means much less to handle for IT groups.
For retail operations, this native integration means associates outfitted with Zebra gadgets can keep steady connectivity throughout important duties, corresponding to processing returns, conducting stock audits, or fulfilling on-line orders. The result’s improved operational effectivity, enhanced buyer experiences, and diminished IT help burden.
Determine 1. Meraki Dashboard natively integrates and shows consumer analytics from Zebra gadgets
Cisco ThousandEyes and Zebra: Finish-to-end Assurance by Proactive Insights
Everybody thinks cell monitoring is nearly whether or not an app is up or down. We imagine it’s about what customers truly expertise—each faucet, each delay, each community hop. Whereas others measure surface-level efficiency, the Cisco + Zebra resolution, powered by ThousandEyes Cellular Endpoint Agent, captures true end-user expertise straight from the machine—throughout networks, purposes, and areas—by proactive testing the place issues truly happen. By repeatedly simulating actual person journeys from Zebra scanners and cell computer systems, IT and helpdesk groups acquire close to real-time visibility throughout the complete digital supply chain, from machine and Wi-Fi or cell connectivity to Web well being and software efficiency.
With out this stage of proactive, device-driven perception, you’re blind to what your customers truly really feel. Points cover within the final mile, throughout unmanaged or unreliable networks, and in real-world situations which might be inconceivable to duplicate in managed environments. That is particularly important in frontline retail, warehouses, and cell supply operations, the place connectivity could also be poor or non-existent and staff depend on a number of cloud-based techniques for stock, transactions, and buyer engagement. With out visibility the place it issues most, groups chase false leads, outages take longer to resolve, and buyer expertise suffers earlier than points are even detected.
With the mixing of ThousandEyes Cellular Endpoint Brokers on Zebra gadgets, as efficiency points unfold, technicians will be alerted and rapidly zero in on well being scores and key metrics to visually decide the supply of the issue, whether or not on the machine, community, or software stage, dramatically accelerating decision instances.
“For a lot of organizations, their most crucial operations occur on the edge—on handheld gadgets utilized in provide chains, manufacturing flooring, buyer onboarding, and parcel supply. If any a part of that digital chain breaks, it straight impacts income and buyer achievement. With ThousandEyes Cellular Endpoint Agent on Zebra gadgets, we offer end-to-end visibility from the machine to the community and cloud providers all the way in which to the applying, serving to companies rapidly determine and resolve points earlier than they disrupt important operations.”
Determine 2. ThousandEyes Cellular Endpoint Expertise shows end-end well being from the Zebra cell machine to the applying.
Enterprise Outcomes That Matter
For retail organizations embracing digital transformation, a complete method such because the one provided by the Cisco and Zebra partnership ensures that know-how enablement interprets into tangible enterprise outcomes quite than operational complications.
“Our partnership with Cisco is targeted on serving to prospects unlock better worth from the gadgets they deploy throughout shops, warehouses, and subject operations. By combining Zebra’s machine telemetry with Cisco Wi-fi analytics and ThousandEyes end-to-end visibility, we’re enabling organizations to achieve the operational perception wanted to help staff productiveness and guarantee constant efficiency throughout their complete digital atmosphere.”
— Rowan Fuller, International Partnerships Chief, Zebra Applied sciences
Past technological capabilities, these integrations can ship measurable enterprise worth:
Decreased Downtime: Quicker troubleshooting means much less disruption to back and front of home operations, straight defending income and buyer satisfaction.
Improved Productiveness: Associates spending extra time serving prospects and fewer time coping with malfunctioning gadgets or ready for IT help.
Proactive Administration: Sample recognition enabling IT groups to determine and handle points, corresponding to updating firmware for particular machine batches or addressing protection gaps specifically retailer areas, earlier than they impression operations.
Scalable Operations: As retail organizations develop their footprint or machine deployments, complete visibility ensures constant efficiency throughout all areas with out proportionally growing IT assets.
The Way forward for Retail Expertise
These integrations signify greater than a level resolution; they function a basis for enhanced predictive upkeep and clever automation. As retail continues evolving towards extra linked, data-driven operations, partnerships just like the one between Cisco and Zebra present the infrastructure for sustainable aggressive benefit.
For retail IT leaders evaluating know-how investments, the query isn’t whether or not to embrace this stage of visibility, it’s how rapidly they’ll deploy it to seize the operational and monetary advantages.
“Slurm’s open-source basis presents safeguards akin to clear code, forking capacity, and neighborhood governance, however SchedMD’s management offers Nvidia comfortable energy somewhat than laborious lock-in,” stated Manish Rawat, semiconductor analyst at TechInsights. Rawat stated Nvidia might subtly form the roadmap, prioritising GPU-aware scheduling and topology optimisations that favour its personal {hardware}, and that integration timelines already confirmed sooner help for the CUDA ecosystem in comparison with options akin to AMD’s ROCm or Intel’s oneAPI – creating what he described as a “best-supported path impact.”
What’s Slurm, and why does it matter
Slurm, initially developed at Lawrence Livermore Nationwide Laboratory, runs on roughly 60% of the world’s supercomputers. The software program is in lively use at main AI firms, together with Meta Platforms, French AI startup Mistral, and Anthropic for components of AI mannequin coaching, Reuters reported.
Authorities supercomputers used for climate forecasting and nationwide safety analysis additionally rely upon it. Nvidia acquired Slurm developer SchedMD in December 2025 and described the deal as a push to strengthen its open-source ecosystem and assist customers undertake newer AI methods alongside conventional supercomputing work.
How typically do you end up dealing with small, repetitive duties in your laptop that quietly devour precious time?
Extra typically than we notice, proper? Nonetheless, with instruments like Claude, such duties may be automated by merely describing what you need as a substitute of executing each step manually.
On this weblog, we look at how Claude Code allows process automation, the vary of actions it might probably carry out, and the way it contributes to extra environment friendly and streamlined computing experiences.
Summarize this text with ChatGPT Get key takeaways & ask questions
What’s Claude Code?
Claude Code is a command-line interface (CLI) instrument that acts as an agentic extension of the Claude 3.5 Sonnet mannequin. Not like normal web-based interfaces, Claude Code lives immediately inside your improvement atmosphere.
It’s designed to know the context of your native information, execute terminal instructions, and handle git operations autonomously however below human supervision.
It successfully serves as a “coworker” that may navigate your laptop’s file system to unravel issues, fairly than simply suggesting snippets of code in a browser window.
Key Functionalities: The instrument is constructed round a number of core capabilities that distinguish it from conventional IDE extensions:
System and File Entry: It will possibly learn, write, and create information throughout your listing construction, permitting it to carry out large-scale refactors or complicated knowledge migrations.
Terminal Execution: It has the authority to run shell instructions, which implies it might probably set up dependencies, run construct scripts, and execute take a look at suites to confirm its personal work.
Git Integration: It will possibly examine git standing, stage modifications, and even draft commit messages that precisely mirror the logic of the modifications it has made.
Contextual Consciousness: By indexing your native atmosphere, it understands the relationships between totally different information and modules, making certain that its ideas are technically sound inside your particular undertaking structure.
How Does Claude Code Work?
The operational logic of Claude Code follows a “Agentic Loop.” When a person gives a immediate, the instrument doesn’t merely generate textual content; it initiates a cycle of interpretation, motion, and verification.
Immediate Interpretation: The AI analyzes the person’s pure language request to establish the aim.
Planning: It breaks down the aim right into a sequence of actionable steps, comparable to “Learn file X,” “Establish the bug,” and “Run the take a look at script.”
Motion & Execution: Utilizing its integration with the terminal and APIs, it executes these steps. If a process requires trying to find data, it could use web-search capabilities to search out documentation or libraries.
Self-Correction: If a command fails, for example, if a take a look at returns an error, the agent analyzes the output and adjusts its plan in real-time. This mirrors how Clawdbot makes use of AI brokers to resolve duties by iterating till the target is met.
Security and Permission Dealing with- Automation on a neighborhood machine carries inherent dangers. Claude Code addresses this via a sturdy security layer. It operates on a “human-in-the-loop” mannequin the place important actions, comparable to executing a shell command or writing to a file, require specific person approval. This ensures that the person stays the last word authority, stopping the AI from making unauthorized system modifications.
For those who want a visible introduction to those ideas, watching the Newbie’s Information to Claude AI is extremely beneficial.
For professionals seeking to transfer past merely using instruments like Claude Code to really architecting them, the
JHU Certificates Program in Agentic AI affords a structured pathway. This 16-week on-line program from Johns Hopkins College focuses explicitly on the foundational logic driving fashionable autonomous methods.
Be taught the structure of clever agentic methods. Construct brokers that understand, plan, study, and act utilizing Python-based tasks and cutting-edge agentic architectures.
By participating in hands-on Python tasks to construct a “Sensible Information Processing Agent” and an “Automated Analysis Agent,” contributors develop sensible expertise in multi-agent orchestration and symbolic reasoning.
This complete strategy ensures learners can efficiently design methods that transition from easy conversational fashions to purposeful, safe process executors.
Step-by-Step Information to Automating Duties with Claude Code
Think about having a tireless assistant dwelling proper inside your laptop. It will possibly set up messy scholar obtain folders, write grading scripts, or repair your code autonomously. That’s what Claude Code, an AI coding agent that runs immediately in your command line.
Usually, this requires a paid month-to-month subscription. However as we speak, we’re going to present you 100% free workaround utilizing neighborhood instruments that redirect Claude’s mind to free AI fashions. Let’s get your autonomous assistant arrange!
Earlier than beginning, you may as well discover the Introduction to Claude free course to know the essential interface.
Git for Home windows: Claude Code makes use of this to run instructions. Throughout set up, simply preserve clicking “Subsequent” to just accept all defaults.
OpenRouter Account: To get your free API key (helps Gemini, Llama, and extra).
Command Immediate Home windows: One to run the “Engine” and one to “Speak” to the AI.
Step 1: Declare Your Free AI API Key
To energy our assistant with out paying Anthropic’s charges, we are going to use OpenRouter, a platform that hosts dozens of free AI fashions.
Go to OpenRouter.ai and click on “Signal Up” (you should use your Google account).
Identify it, like “Claude Code Free”, and click on Create.
Copy the important thing instantly (it can begin with sk-or-v1-…).
Paste it into a short lived notepad doc to avoid wasting this key.
Step 2: Set up Claude Code & The Router
Now we are going to use your laptop’s Terminal (Mac) or PowerShell (Home windows) to put in the official app and the neighborhood “translator” instrument.
1. Open your command line: -Mac Customers: Press Command + House, sort Terminal, and hit Enter. –Home windows Customers: Press the Home windows Key, sort PowerShell, right-click it, and choose “Run as Administrator”.
2. Copy and paste the next command precisely as written, then press Enter:
npm set up -g @anthropic-ai/claude-code @musistudio/claude-code-router
3. Anticipate the loading bars to complete. This installs each the official Claude Code app and the claude-code-router bundle.
Step 3: Create Your Configuration Folders
We have to create a hidden folder in your laptop the place the AI router will search for its directions. – For Mac/Linux Customers: Run this command in your Terminal:
mkdir -p ~/.claude-code-router ~/.claude
– For Home windows Customers: Let’s create this folder visually!
Press the Home windows Key + R in your keyboard to open the “Run” field.
Sort %USERPROFILE% and press Enter. This opens your foremost person folder (e.g., C:UsersYourName).
Proper-click on any empty white area inside this folder.
Click on New > Folder, title this new folder: .claude-code-router(Be sure you embody the interval on the very starting!) and press Enter.
Step 4: Write the Configuration File
Now we inform the router which free fashions to make use of. We are going to use Google’s lightning-fast Gemini 2.0 Flash mannequin, which OpenRouter gives at no cost.
Open the Notepad app in your Home windows laptop.
Copy the precise code block beneath and paste it into your clean Notepad doc:
Within the left-hand menu of the save window, discover your foremost Consumer folder, and double-click the .claude-code-router folder you simply created in Step 3 to open it.
Change the “Save as sort” dropdown on the backside from “Textual content Paperwork (.txt)” to “All Information (.*)”.
Identify the file precisely: config.json
Click on Save.
Essential Notice: Go away the textual content “OPENROUTER_API_KEY” precisely as it’s written within the code above. Do not paste your precise OpenRouter key into this Notepad file.
We are going to safe your actual key within the subsequent step!
Step 5: Securely Set Your API Key
Now we have to take that OpenRouter key you saved in Step 1 and inject it securely into your laptop. This enables our router to search out your key with out leaving it uncovered in normal textual content information.
For Mac Customers: -Open your Terminal. -Copy the command beneath, however change YOUR_KEY_HERE along with your precise OpenRouter key (ensure you preserve the quote marks!):
Press Enter. Lastly, run this command to lock within the modifications instantly: supply ~/.zshrc
For Home windows Customers:
Click on your Home windows Begin button, sort cmd, and open the usual Command Immediate app.
Copy the command beneath, however change YOUR_KEY_HERE along with your precise OpenRouter key (ensure you preserve the quote marks round your key!):
setx OPENROUTER_API_KEY "YOUR_KEY_HERE"
Paste that into your Command Immediate and press Enter.
You need to see a message pop up that claims “SUCCESS: Specified worth was saved.”
CRITICAL STEP: Shut the Command Immediate window utterly. Your laptop is not going to acknowledge the brand new key till you open a contemporary window within the subsequent step!
Step 6: The Every day Workflow (Bringing the AI to Life)
To make use of your free AI assistant, you will need to at all times run two separate command home windows on the identical time.
Half 1: Begin
Open a contemporary Command Immediate (Home windows) or Terminal (Mac).
Sort the next and press Enter:
What to anticipate: You will note a line that claims: Loaded JSON config from: C:Customers…config.json.
Vital: The window will then appear to be it has stopped shifting. That is regular! It means the code is operating silently within the background. Don’t shut this window. Simply reduce it.
Half 2: Begin
1. Open a second, separate Command Immediate or Terminal window.
2. Navigate to the folder the place you need the AI to work (for instance, your Paperwork): Home windows: cd %USERPROFILEpercentDocuments, Mac: cd ~/Paperwork
3. Launch the AI interface by typing:
4. Press Enter. Wait about 5–10 seconds. You will note a welcome message and a immediate that appears like claude >. You at the moment are formally utilizing Claude Code at no cost!
Your First Automation Take a look at
As soon as the claude > immediate seems in your second window, let’s give it its first job. Sort this command and hit Enter:
“Examine the information on this folder and create a brand new textual content file named ‘Success.txt’ that claims ‘Claude Code is formally operating at no cost!’ inside it.”
End result:
Execution: Claude will analyze your request and clarify what it’s about.
Permission: It is going to ask, “Would you want me to create Success.txt?” Sort y and hit Enter.
The End result: Claude will verify the file is created. Examine your Paperwork folder, you’ll discover your new file there!
Professional-Suggestions for Home windows Customers
Since Home windows may be tough, embody these three ideas on the backside of your put up to make it really “Final.”
The “Bash Not Discovered” Repair: If Claude says it might probably’t discover Git-Bash, run this command in your terminal as an Administrator:
The “Command Not Acknowledged” Repair: If ccr or claude will not run, shut all terminal home windows and open a model new one. Home windows wants a “refresh” to see newly put in instruments.
Examine Your Key: For those who get an “Unauthorized” error, re-run Step 5 to make sure your OpenRouter API key was saved appropriately.
Different Varieties of Duties Claude Code Can Automate
1. Growth Duties: The system effortlessly handles writing and debugging complicated code, utterly automating testing workflows and producing repetitive setup scripts, which immediately showcase the unimaginable AI purposes in software program improvement.
2. Information Processing: It excels at parsing huge CSV and JSON information mechanically, executing complicated knowledge cleansing pipelines, and structuring unstructured textual content into organized codecs with out requiring you to make use of heavy spreadsheet purposes.
3. System Monitoring and Upkeep: Claude Code can proactively monitor system efficiency, monitor useful resource utilization, and automate routine upkeep duties comparable to clearing cache, managing logs, and figuring out pointless background processes. This reduces handbook intervention and helps preserve optimum system well being over time.
4. Net and API Automation: It will possibly work together with internet platforms and APIs to automate duties like fetching knowledge from web sites, submitting types, integrating third-party providers, and syncing data throughout purposes. This allows customers to construct highly effective automation workflows with out manually dealing with a number of instruments or interfaces.
If you’re a enterprise chief aiming to leverage these capabilities, the AI Brokers for Enterprise Purposes on-line course by Texas McCombs is an distinctive alternative.
This program helps you learn to establish, design, and implement AI agent options that drive important organizational effectivity. You’ll uncover sensible methods to automate complicated enterprise workflows, improve operational decision-making, and safely and securely lead enterprise-wide technical transformations.
Advantages of Utilizing Claude Code
Saves Time On Repetitive Duties: It drastically cuts down the hours spent manually typing normal instructions, permitting you to immediately generate information, folders, and fundamental code templates in mere seconds.
Reduces Guide Errors: By counting on a extremely exact machine to execute complicated syntax, you utterly eradicate the minor typographical errors that usually crash software program methods and trigger huge frustration.
Makes Automation Accessible: It utterly removes the necessity for deep, expert-level coding information, permitting common professionals to construct customized automations just by typing plain English directions into their laptop terminal:
To grasp the broader financial affect of those productiveness good points, watching the extremely detailed Generative AI Defined: An Overview of LLMs and Their Enterprise Influence video will present invaluable business context.
Greatest Practices for Efficient Automation
Whereas these instruments are extremely highly effective, they have to be used responsibly to forestall unintentional knowledge loss or system errors. Studying how builders adapt to generative AI safely is essential for long-term success.
Write Clear and Particular Prompts: You have to at all times give the system precise, extremely detailed directions, leaving completely zero room for obscure interpretations that would lead the AI to change the improper system information.
Take a look at Automation in Protected Environments: You need to constantly run new, unverified scripts in remoted take a look at folders first, making certain that any sudden errors don’t completely corrupt your necessary, reside working directories.
Overview Generated Code Earlier than Execution: You have to rigorously learn each single line of code the assistant proposes earlier than hitting the verify button, making certain the system strictly follows your supposed technical logic.
If you’re seeking to grasp the creation of those methods your self, taking the Constructing Clever AI Brokers free course provides you with a incredible technical overview. Afterwards, you may discover quite a lot of thrilling undertaking concepts to construct your portfolio.
Conclusion
By organising Claude Code via the free routing strategies detailed above, you may immediately eradicate tedious system chores, streamline complicated file dealing with, and considerably speed up your software program improvement lifecycle. Nonetheless, the true energy of this expertise depends completely on how effectively you information it.
By combining these superior automation instruments with strict human oversight and clear strategic intent, you may remodel your common laptop into an extremely highly effective, hyper-efficient digital workstation.
Google Chrome introduces vertical tabs and an enhanced immersive studying mode as new productiveness options in its newest browser replace.
Macworld stories that vertical tabs permit customers to stack tabs alongside the window’s aspect for higher group and administration.
The improved studying mode creates a distraction-free, full-page interface by eradicating adverts and pictures for targeted content material consumption.
Google introduced on Tuesday two new options for its Chrome browser. Each options have been designed to assist customers be extra productive whereas utilizing the browser.
The primary new characteristic is the flexibility to show tabs vertically within the browser, alongside the aspect of the window. The default is to show tabs alongside the highest, however to change to vertical view, right-click on the Chrome window, and also you’ll discover a new Present Tabs Vertically choice. Choose it, and the tabs transfer to the aspect and stack slightly than occupy a horizontal bar above the primary window.
Safari has the same characteristic within the sidebar, but it surely doesn’t change the highest tab bar.
Tips on how to show tabs vertically in Google Chrome.
Google
The second characteristic is an enhancement to studying mode, which shows a webpage freed from photographs, movies, adverts, and different parts and reveals solely textual content with hyperlinks. Earlier than the replace, the studying mode web page appeared alongside the precise, full webpage. Now, studying mode is offered in a full-page interface. The Immersive Reader mode is much like Safari’s Reader (View > Present Reader), although Safari’s is ready to show photographs.
Google Chrome’s Immersive Studying Mode seems as its personal webpage as an alternative of splitting the view between it and the precise web site.
Google
The brand new options can be found within the newest model of Google Chrome. If you have already got Chrome, you’ll be able to set up the replace by way of Chrome > About Chrome.