Traceroute works by exploiting the TTL (Time To Live) field in IP packets to trace the route to a destination.
It sends UDP packets with increasing TTL values, starting at 1, to trigger ICMP 'Time Exceeded' replies from each hop.
The implementation involves creating sockets for sending UDP packets and receiving ICMP replies, with raw sockets requiring root privileges.
Key improvements include checking ICMP types to know when the destination is reached, adding timing for round-trip latency, and sending multiple probes per hop for reliability.
Limitations of traceroute include asymmetric paths, hidden MPLS tunnels, load balancers, and ICMP rate limiting that can cause '*' in output.
The Kalman Filter is an algorithm for state estimation and prediction under uncertainty, used in fields like tracking, navigation, robotics, and finance.
It operates in a predict-update loop: prediction extrapolates the state using a dynamic model, and update combines prediction with new measurements weighted by uncertainty.
Key equations include state extrapolation (using state transition matrix F), covariance extrapolation (with process noise Q), state update (with Kalman gain K), and covariance update.
The Kalman gain optimally weights prediction and measurement based on their uncertainties to minimize estimation error.
Example demonstrated a radar tracking aircraft: initialization used first measurement, prediction estimated next state, and update fused noisy second measurement to reduce uncertainty.
Process noise accounts for model inaccuracies (e.g., wind), while measurement noise reflects sensor errors; covariance matrices quantify these uncertainties.
The filter reduces estimation uncertainty by combining information, even from noisy measurements, and is optimal under assumed linear Gaussian conditions.
CitriniResearch sent Analyst #3 on a field trip to the Strait of Hormuz to gain first-hand insights during a geopolitical crisis, defying official warnings and risking detention.
The mission aimed to clarify the confusing situation for investment purposes, as traditional sources like satellite imagery and AIS data were incomplete or stale.
Analyst #3 equipped with $15,000 cash, recording gear, and language skills, signed a pledge in Oman against info gathering but proceeded covertly onto a speedboat near Iranian waters.
He observed Shahed drones and Iranian patrol boats, was intercepted by Coast Guard, detained, and had his phone confiscated, but later debriefed findings from memory.
Extreme heat is causing 'non-survivable' conditions, with heatwaves leading to thousands of deaths, and these numbers are likely underreported.
A new survivability model, accounting for temperature, humidity, and age-related cooling ability, shows that older people face deadly risks even below the wet bulb temperature limit of 35°C.
Six heatwaves (2003-2024) were analyzed, with all posing fatal threats to those over 65 in direct sun, and some, like in Larkana and Phoenix, even in shade.
The study highlights that deadly conditions are already endangering hundreds of millions, and risks are higher than previously thought as heatwaves intensify with climate change.
Older adults are more vulnerable due to reduced sweating ability, and without mitigation, further warming could make some regions uninhabitable, especially in densely populated tropical areas.
The 2011 Arab uprisings initially symbolized a shift in power to ordinary people through digital tools, but over the past 15 years, these tools have been co-opted by governments and companies to build extensive state surveillance apparatuses.
Post-2011, MENA governments invested in surveillance technologies like social media monitoring, interception systems, and cybercrime laws, creating a pre-emptive model of digital control that prioritizes state visibility over public safety.
Cybercrime laws and 'fake news' provisions have been used to criminalize online dissent, while mercenary spyware markets, exemplified by tools like Pegasus, enable governments to hack devices and surveil activists, journalists, and opponents with impunity.
Biometric data, facial recognition, and 'smart city' projects have expanded surveillance into everyday life, often targeting marginalized groups first and normalizing bulk monitoring, with AI-driven systems now repackaged for defense and security applications.
The digital authoritarianism model developed in MENA has influenced global surveillance practices, with the UN Cybercrime Convention risking to institutionalize broad surveillance powers and cross-border data-sharing for repression.
Activists and journalists face severe risks, including arrest and exile, based on digital traces, forcing them to adopt security measures like using multiple phones and encrypted communication as everyday safety becomes a burden.
Civil society and regional coalitions are advocating for bans on surveillance tech sales to autocratic governments, demanding accountability from both states and companies, and promoting tools like encryption and security training for resistance.
King Bacot, a 15-year-old freshman with significant social media following and endorsement offers, played in a Virginia state championship game for Petersburg High School, which won its first title in 52 years.
Unlike Moses Malone's era, today's high school basketball players navigate a professional-style network with opportunities for Name, Image, and Likeness (NIL) deals, early endorsements, and transfers between schools to maximize exposure and income.
The traditional path from high school to pro basketball has collapsed, with college players now earning seven figures and high school athletes moving between states and schools to access better programs, facilities, and financial opportunities.
Examples like Tyran Stokes and AJ Dybantsa illustrate the trend of high school players pursuing lucrative deals and frequent transfers, but this system can lead to exploitative situations, inconsistent education, and school closures.
Critics highlight issues in high school basketball, such as inadequate facilities, lack of proper education, and a divide between top prospects and other students, as seen in cases like Utah Prep's financial troubles and Montverde Academy's class disparities.
Personal stories, such as Yuvraj Bimwal's challenging journey from Australia to US schools and King's pressure to perform despite personal tragedies, underscore the intense demands and sacrifices young athletes face in pursuing professional dreams.
The author reflects on the irony of extensive engineering behind everyday disposable items like plastic bottles, contrasting it with the inconsistent design in personal life.
The evolution of beverage packaging from earthenware and glass in the 19th century to modern plastics, highlighting key transitions such as Coca-Cola's first glass bottling in 1899.
Coca-Cola's short-lived acrylonitrile copolymer 'Easy-Goer' bottle (1975-1977), which was banned by the FDA due to health risks from chemical leaching.
The development and rise of PET (polyethylene terephthalate) bottles, pioneered by DuPont's Nathaniel Wyeth in the 1970s, leading to lightweight, durable containers.
The bottled water boom in the 1990s, driven by brands like Aquafina and Dasani, which helped soda companies offset declining sales and optimize bottling efficiency.
Advancements in bottle lightweighting and design, such as 'Petaloid' bases and thinner walls, reducing plastic use by up to 60% since the late 1990s.
The environmental impact and recycling challenges of plastic and glass bottles, with many ending up in landfills or as low-value fill material despite recycling efforts.
The author's personal engagement with bottled water, from purchasing to reusing PET bottles, while acknowledging the transient lifespan and engineering marvel of these containers.
An inference server and macOS menu bar app built in Zig and Swift, offering a drop-in replacement for OpenAI-compatible APIs with features like chat completions, streaming, tool calling, embeddings, and logprobs.
Utilizes direct MLX-C bindings without Python for fast performance, includes KV cache reuse across requests, and supports quantized MLX-format models from HuggingFace with 7 built-in tools and extendable prompt-based skills via markdown files.
Allows real-time SSE streaming with automatic tool call detection for multi-turn reasoning, includes a native macOS app for managing models and chats, and supports various models from Google, Alibaba, Meta, and Mistral AI in different parameter sizes.
Solar plus battery systems could economically meet 90% of India's electricity demand at a cost of INR 5.06/kWh, but achieving 100% would be costlier.
To supply 90% of the 2,000 TWh demand, India would need 930 GW of solar capacity (less than a third of its potential) and about 2,560 GWh of battery storage.
During high-solar periods (Jan-Apr), batteries can shift daytime solar to meet nearly 100% of daily demand, but in monsoon months like July, output drops to 66% due to reduced solar generation.
A diversified energy mix, including wind power that peaks during monsoons, is essential for reliability, as batteries alone cannot cover extended cloudy spells.