Sizing chaos

Sizing chaos m e e t y o u r t y p i c a l Like many girls her age, she loves to keep up with the latest fashion trends and explore new ways to express herself. Shopping is fun, but it won’t always be this way. Scroll XXS XS S M L XL XXL “Junior’s” clothing lines often channel tweens’ interests with youthful styles that fit young girls as they grow. For now, our typical (or median) 11-year-old wears a size 9 in the junior’s section, which is also considered a size Medium . But not all tweens wear the same size. If we were to look at a sample of all 10- and 11-year-old girls in the U.S. from the National Center for Health Statistics, here are the junior’s sizes that match up with their waistline measurements. By age 15 , most girls have gone through growth spurts and puberty, and they’ve reached their adult height. Many have started to outgrow the junior’s size section. This marks an important turning point as they shift into women’s sizes. Girls who fall along the bottom 10th percentile can now wear an Extra Small in women’s clothing, while girls near the 90th percentile will find that an Extra Large generally fits. The median 15-year-old wears a Medium, as she has throughout most of her childhood. This means for the first time ever, most girls in their cohort will be able to find a size in the women’s clothing section. This will also likely be the last time this ever happens in their lives. f i t 4 a By Amanda Sakuma with Jan Diehm I remember once being that teen girl shopping in the women’s section for the first time. I took stacks upon stacks of jeans with me to the dressing room, searching in vain for that one pair that fit perfectly. Over 20 years later, my hunt for the ideal pair of jeans continues. But now as an adult, I’m stuck with the countless ways that women’s apparel is not made for the average person, like me. Children’s clothing sizes are often tied to a kid’s age or stage of development. The idea is that as a young person grows older, her clothes will evolve with her. Youth styles tend to be boxy and oversized to allow room for kids to move and grow. By early adolescence, apparel for girls becomes more fitted. Junior’s styles have higher waistlines and less-pronounced curves compared to adult clothing lines. In short: clothes for tweens are made for tween bodies. By the time most teenage girls can wear women’s clothes — around age 15 — their options are seemingly endless. But the evolution in clothing sizes that followed girls throughout childhood abruptly stops there. This is the reality I find myself reckoning with today: Women’s clothing — designed for adults — fits modern teen girls better. Age: 14-15 Sizes: Women’s Waistline in Inches XXS XS S M L XL XXL At age 15 a size Medium still equals the median waistline but, from here on, the two will diverge. In addition to generic letter sizes (Small, Medium, Large etc.), women have a numeric sizing system that is designed to be more tailored and precise. Here, the median 15-year-ol

Source: Hacker News | Original Link

Womens Sizing

Sizing chaos m e e t y o u r t y p i c a l Like many girls her age, she loves to keep up with the latest fashion trends and explore new ways to express herself. Shopping is fun, but it won’t always be this way. Scroll XXS XS S M L XL XXL “Junior’s” clothing lines often channel tweens’ interests with youthful styles that fit young girls as they grow. For now, our typical (or median) 11-year-old wears a size 9 in the junior’s section, which is also considered a size Medium . But not all tweens wear the same size. If we were to look at a sample of all 10- and 11-year-old girls in the U.S. from the National Center for Health Statistics, here are the junior’s sizes that match up with their waistline measurements. By age 15 , most girls have gone through growth spurts and puberty, and they’ve reached their adult height. Many have started to outgrow the junior’s size section. This marks an important turning point as they shift into women’s sizes. Girls who fall along the bottom 10th percentile can now wear an Extra Small in women’s clothing, while girls near the 90th percentile will find that an Extra Large generally fits. The median 15-year-old wears a Medium, as she has throughout most of her childhood. This means for the first time ever, most girls in their cohort will be able to find a size in the women’s clothing section. This will also likely be the last time this ever happens in their lives. f i t 4 a By Amanda Sakuma with Jan Diehm I remember once being that teen girl shopping in the women’s section for the first time. I took stacks upon stacks of jeans with me to the dressing room, searching in vain for that one pair that fit perfectly. Over 20 years later, my hunt for the ideal pair of jeans continues. But now as an adult, I’m stuck with the countless ways that women’s apparel is not made for the average person, like me. Children’s clothing sizes are often tied to a kid’s age or stage of development. The idea is that as a young person grows older, her clothes will evolve with her. Youth styles tend to be boxy and oversized to allow room for kids to move and grow. By early adolescence, apparel for girls becomes more fitted. Junior’s styles have higher waistlines and less-pronounced curves compared to adult clothing lines. In short: clothes for tweens are made for tween bodies. By the time most teenage girls can wear women’s clothes — around age 15 — their options are seemingly endless. But the evolution in clothing sizes that followed girls throughout childhood abruptly stops there. This is the reality I find myself reckoning with today: Women’s clothing — designed for adults — fits modern teen girls better. Age: 14-15 Sizes: Women’s Waistline in Inches XXS XS S M L XL XXL At age 15 a size Medium still equals the median waistline but, from here on, the two will diverge. In addition to generic letter sizes (Small, Medium, Large etc.), women have a numeric sizing system that is designed to be more tailored and precise. Here, the median 15-year-ol

Source: Hacker News | Original Link

Delphi is 31 years old – innovation timeline

Delphi Innovation Timeline 31st Anniversary Edition Published Have an amazing solution built in RAD Studio? Let us know . Looking for discounts? Visit our Special Offers page! + Customer Portal C++ Delphi RAD Studio Delphi Innovation Timeline 31st Anniversary Edition Published. Get Your Free PDF! By Hagop Panosian February 10, 2026 Table of Contents Celebrate Three Decades of Innovation with the Delphi 31st Anniversary Timeline Want to experience 31 years of technological evolution in a single glance? The Delphi 31st Anniversary “Information Technology Innovation Timeline” brings three decades of tech history to life in one stunning visual journey. This isn’t your typical infographic. Measuring an impressive 16 feet wide when printed at full resolution, this meticulously designed timeline deserves pride of place in every developer’s workspace. It’s a comprehensive chronicle of how Delphi, C++Builder, and RAD Studio have grown alongside the digital revolution, culminating in the recent launch of RAD Studio 13. A Visual Journey Through Tech History The timeline brilliantly positions Delphi’s evolution within the broader context of technological breakthroughs that have shaped our world. Starting from February 1995—when Delphi first emerged as an evolution of Object Pascal—the infographic traces pivotal moments across multiple dimensions of technology. Watch the mobile revolution unfold before your eyes, from the iconic Motorola StarTAC flip phone of 1996 to today’s Google Pixel 10 and iPhone 17. Track the birth and maturation of programming languages including Python, Java, Swift, C#, and C++. See how operating systems like iOS and Android transformed our relationship with technology, putting endless possibilities in our pockets. The timeline also captures the browser wars from Netscape Navigator to Chrome and Edge, the rise of social media giants like Facebook and LinkedIn, and breakthrough moments in gaming and AI, from Fortnite to ChatGPT. Every quantum computing advancement, every platform launch, every paradigm shift is represented. Get The Printable PDF Free! More Than Just Nostalgia This high-resolution, print-quality PDF serves as both a reference tool and conversation starter. Remember which phone you owned when Candy Crush dominated app stores? Curious about which programming languages were trending when you wrote your first application? This timeline answers those questions and countless more. Whether you’re a devoted Android enthusiast or an Apple loyalist, a veteran developer or technology historian, this comprehensive infographic offers something special—a personal tech museum that celebrates innovation while honoring Delphi’s enduring legacy. Download your free copy today and own a piece of technology history that spans three remarkable decades of digital transformation. Get The Printable PDF Free! Reduce development time and get to market faster with RAD Studio, Delphi, or C++Builder. Design. Code. Compile. Deploy. Start Free Trial U

Source: Hacker News | Original Link

The political effects of X’s feed algorithm

The political effects of X’s feed algorithm [ Germain Gauthier, Roland Hodler, Philine Widmer and Ekaterina Zhuravskaya in Nature ] This is a very significant finding. Users who moved from a reverse-chronological social media algorithm to X’s: “[…] were 4.7 percentage points more likely to prioritize policy issues considered important by Republicans, such as inflation, immigration and crime. They were also 5.5 percentage points more likely to believe that the investigations into Trump are unacceptable, describing them as contrary to the rule of law, undermining democracy, an attempt to stop the campaign and an attack on people like themselves.” And even more surprisingly, once the algorithm was switched off , their views did not change again. The effect of the algorithm lingered, in part because it led users to follow more conservative influencers. We intuitively knew that the algorithm mattered, but this is a key finding that puts numbers to it. If that number seems small to you, consider that 4.7% is more than enough to swing an election. It’s also interesting that findings for other algorithms were different; if this result holds up, it suggests that X’s algorithm may be particularly predisposed for political manipulation, even above Facebook and Instagram. This should be a wakeup call for politically-engaged funders and anyone who cares about civil society. It’s not that we need to have less conservative algorithms; it’s that whoever controls the algorithms has a disproportionate say over the electorate’s view of the world. We need more funding into open protocols that decentralize algorithmic ownership; open platforms that give users a choice of algorithm and platform provider; and algorithmic transparency across our information ecosystem. [ Link ] Read more In Graphic Detail: Subscriptions are rising at big news publishers – even as traffic shrinks In a world where traffic is decreasing, publishers are moving more heavily into subscriptions – with very good results. An increasingly dangerous world My underlying model for everything that’s happening Building trust in the open How Protocols for Publishers points to the future of journalism – and the web Growing the open social web A position statement for FediForum’s unworkshop

Source: Hacker News | Original Link

DNS-Persist-01: A New Model for DNS-Based Challenge Validation

DNS-PERSIST-01: A New Model for DNS-based Challenge Validation – Let’s Encrypt Blog DNS-PERSIST-01: A New Model for DNS-based Challenge Validation By Samantha Frank · February 18, 2026 When you request a certificate from Let’s Encrypt, our servers validate that you control the hostnames in that certificate using ACME challenges . For subscribers who need wildcard certificates or who prefer not to expose infrastructure to the public Internet, the DNS-01 challenge type has long been the only choice. DNS-01 works well. It is widely supported and battle-tested, but it comes with operational costs: DNS propagation delays, recurring DNS updates at renewal time, and automation that often requires distributing DNS credentials throughout your infrastructure. We are implementing support for a new ACME challenge type, DNS-PERSIST-01, based on a new IETF draft specification . As the name implies, it uses DNS as the validation mechanism, but replaces repeated demonstrations of control with a persistent authorization record bound to a specific ACME account and CA. The draft describes this method as being “particularly suited for environments where traditional challenge methods are impractical, such as IoT deployments, multi-tenant platforms, and scenarios requiring batch certificate operations”. DNS-01 Proves Control Repeatedly With DNS-01, validation relies on a one-time token generated by us. Your ACME client publishes a TXT record containing that token at _acme-challenge. , and we query DNS to confirm that it matches the expected value. Because each authorization requires a new token, DNS updates become part of the issuance workflow. The benefit is that each successful validation provides fresh proof that you currently control DNS for the name being issued. In practice, this often means DNS API credentials live somewhere in your issuance pipeline, validation attempts involve waiting for DNS propagation, and DNS changes happen frequently — sometimes many times per day in large deployments. Many subscribers accept these tradeoffs, but others would prefer to keep DNS updates and sensitive credentials out of their issuance path. DNS-PERSIST-01 Authorizes Persistently DNS-PERSIST-01 approaches validation differently. Instead of publishing a new challenge record for each issuance, you publish a standing authorization in the form of a TXT record that identifies both the CA and the specific ACME account you authorize to issue for this domain. For the hostname example.com, the record would live at _validation-persist.example.com : _validation-persist.example.com. IN TXT ( ” letsencrypt.org ;” ” accounturi=https:// acme-v02.api.letsencrypt.org /acme/acct/ 1234567890 ” ) Once this record exists, it can be reused for new issuance and all subsequent renewals. Operationally, this removes DNS changes from the critical path. Security and Operational Tradeoffs With DNS-01, the sensitive asset is DNS write access. In many deployments, DNS API credentials are dis

Source: Hacker News | Original Link

Show HN: Echo, an iOS SSH+mosh client built on Ghostty

Introducing Echo — Replay Software ← All posts Introducing Echo 10th February 2026 We’re thrilled to introduce Echo — a fast, modern SSH client for iOS and iPadOS, built for the new era of rich terminal-based tools and AI coding agents. Echo is our first brand new app in a while, and it’s our first app for iOS and iPadOS. It’s a little different from what we’ve done before, and we’d love to tell you why we built it and what makes it special. Why build a terminal app? Something exciting has been happening in the terminal over the last couple of years. There’s been an explosion in the TUI space — beautifully crafted, highly complex text-based user interfaces that are pushing the boundaries of what a terminal can do. Tools like lazygit and lazydocker , powered by libraries like Bubbletea , Ink and Textual , have shown that the terminal isn’t just for text anymore — it’s become a rich, interactive canvas. At the same time, AI coding agents have completely changed how developers work. Tools like Claude Code, Codex and Amp are running in terminals on remote machines, generating code, running builds, and waiting for human input. Developers increasingly need to check in on these agents from wherever they are — approve a change on the train, monitor a build from the couch, or nudge an agent in the right direction while away from their desk. And then there’s Ghostty . Ghostty is our favourite terminal emulator. It’s a terminal built with our own values of performance and true-to-platform native behaviour, as well as being beautiful, fast and flexible. Ghostty’s terminal engine is open source and written in a way that can be embedded, which meant we could bring that same level of performance and correctness to iOS. Over the last twelve months, we’ve been using all of these tools heavily. How we program has changed dramatically — we spend more time in the terminal than ever, working alongside agents, reviewing their output, and managing remote machines. At some point we realised that the app we kept reaching for on our phones didn’t exist yet. So we built it. Echo is that app. Built for iOS, not ported to it We didn’t want to just wrap a terminal in a WebView and ship it, or use a substandard terminal emulator. Echo is a native app, built from the ground up for iPhone and iPad. That means Metal-accelerated rendering, native Keychain integration for your SSH keys, and Face ID to keep your connections secure. On iPhone, we spent a lot of time on the keyboard experience. There’s a specially designed toolbar above the keyboard with quick keys for common terminal characters, and gesture-based arrow key movement that feels right at home on a touchscreen. It sounds like a small thing, but it makes a huge difference when you’re actually trying to get work done on your phone. On iPad, Echo really shines. Full hardware keyboard support with all the shortcuts you’d expect, Split View and Slide Over for running multiple sessions side by side, and Stage Manager support s

Source: Hacker News | Original Link

Cosmologically Unique IDs

Cosmologically Unique IDs | Jason Fantl Jason Fantl A computer science blog HOME CATEGORIES ARCHIVES ABOUT SUBSCRIBE Home Cosmologically Unique IDs Post Cancel Cosmologically Unique IDs Posted Feb 12, 2026 Updated Feb 13, 2026 By Jason Fantl 31 min read We are an exploratory species, just past the solar system now, but perhaps one day we will look back and call our galaxy merely the first. There are many problems to solve along the way, and today we will look at one very small one. How do we assign IDs to devices (or any object) so the IDs are guaranteed to always be unique? Being able to identify objects is a fundamental tool for building other protocols, and it also underpins manufacturing, logistics, communications, and security. Every ship and satellite needs an ID for traffic control and maintenance history. Every radio, router, and sensor needs an ID so packets have a source and destination. Every manufactured component needs an ID for traceability. And at scale, the count explodes: swarms of robots, trillions of parts, and oceans of cargo containers moving through a civilization’s supply chain. One of the key functions of an ID is to differentiate objects from one another, so we need to make sure we don’t assign the same ID twice. Unique ID assignment becomes a more challenging problem when we try to solve it at the scale of the universe. But we can try. Random The first and easiest solution is to pick a random number every time a device needs an ID. This is so simple that it is likely the best solution; you can do this anytime, anywhere, without the need for a central authority or coordination of any kind. The big issue, though, is that it’s possible for two devices to pick the same ID by chance. Fortunately, we have complete control over the size of the random number, and by extension, the probability of a collision. This means we can make the likelihood of a collision functionally zero. You may say that “functionally zero” is not enough, that although the probability is small, it is not actually zero, and so you are concerned. But consider this example: The probability of you being struck by a meteorite right now is small but non-zero, and you might even call that a “reasonable” (if paranoid) concern. But are you worried that every human on Earth will be hit by a meteorite right now? That probability is also non-zero, yet it is so infinitesimally small that we treat it as an impossibility. That is how small we can make the probability of an ID collision. So how small does this probability need to be before we are comfortable? It will be helpful to reframe the question: How many IDs can we generate before a collision is expected? The most recent version of Universally Unique Identifiers (UUIDs), which are a version of what we have been describing, uses 122 random bits. Using the birthday paradox , we can calculate the expected number of IDs before a collision is $\approx 2^{61}$. Is this high, or is it low? Is it enough to last the galax

Source: Hacker News | Original Link

Vermont EV buses prove unreliable for transportation this winter

Vermont EV buses prove unreliable for transportation this winter – Vermont Daily Chronicle BeCOME A VDC SUSTAINING SUBSCRIBER Business & Service Directory PREGNANCY SERVICES Lamoille Valley Pregnancy Resource Center – 65 Portland Street, Morrisville Vermont. HOME IMPROVEMENT New Life Crew – Pete Fiske Alabaster Home Repair – William Moore, Johnson VT, 888-3930 MASSAGE Planet Massage – Suzan Seymour TAX SERVICES Robert Rich Tax & Financial Services WELDING North Country Welding Supply – Dana Colson Advertise Your Business or Service for as little as $10/month. Contact [email protected]. Recent Comments Ron Wonderlick on Anti-ICE bills slide thru Senate, face tougher sledding in House hhilltop on McGuinness: Proposed constitutional amendment expands protections for limited groups Tom Chase on Judge ends Mahdawi deportation case, DHS vows to continue Ron Wonderlick on Vermont eyes retail delivery fee mday44yahoocom on Shooting victim poured gasoline around his house, murder suspect claims Dan Alar on Judge ends Mahdawi deportation case, DHS vows to continue molmstead7830ce6d74 on Judge ends Mahdawi deportation case, DHS vows to continue hhilltop on Judge ends Mahdawi deportation case, DHS vows to continue Neil Johnson on McGuinness: Proposed constitutional amendment expands protections for limited groups Patrick Finnie on Judge ends Mahdawi deportation case, DHS vows to continue Neil Johnson on McGuinness: Proposed constitutional amendment expands protections for limited groups Ron Wonderlick on Will Vermont’s proposed $20 fast-food wage help workers or hurt local businesses? Josh Elkins on Judge ends Mahdawi deportation case, DHS vows to continue Ron Wonderlick on Shooting victim poured gasoline around his house, murder suspect claims Rich Lachapelle on Shooting victim poured gasoline around his house, murder suspect claims Transportation Vermont EV buses prove unreliable for transportation this winter By Timothy Page on February 16, 2026 • ( 10 Comments ) Getting your Trinity Audio player ready… Electric vehicle charging stations are seen at a Sheetz in Hillsborough, N.C., Dec. 29, 2023. Photo: Alan Wooten / The Center Square By Tate Miller, for The Center Square (The Center Square) – Electric buses are proving unreliable this winter for Vermont’s Green Mountain Transit, as it needs to be over 41 degrees for the buses to charge, but due to a battery recall the buses are a fire hazard and can’t be charged in a garage. Spokesman for energy workers advocacy group Power the Future Larry Behrens told the Center Square: “Taxpayers were sold an $8 million ‘solution’ that can’t operate in cold weather when the home for these buses is in New England.” “We’re beyond the point where this looks like incompetence and starts to smell like fraud,” Behrens said. “When government rushes money out the door to satisfy green mandates, basic questions about performance, safety, and value for taxpayers are always pushed aside,” Behrens said. “Americans d

Source: Hacker News | Original Link

Pocketbase lost its funding from FLOSS fund

(Cancelled) ~FLOSS/fund sponsorship~ and UI rewrite · pocketbase/pocketbase · Discussion #7287 · GitHub Skip to content You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert pocketbase / pocketbase Public Notifications You must be signed in to change notification settings Fork 3.1k Star 56.2k (Cancelled) ~FLOSS/fund sponsorship~ and UI rewrite #7287 Locked ganigeorgiev announced in Announcements (Cancelled) ~FLOSS/fund sponsorship~ and UI rewrite #7287 ganigeorgiev Oct 28, 2025 · 29 comments · 19 replies Return to top Discussion options Uh oh! There was an error while loading. Please reload this page . Quote reply edited Uh oh! There was an error while loading. Please reload this page . ganigeorgiev Oct 28, 2025 Maintainer – Unfortunate update: FLOSS/fund reached out to me again but due to some unforeseen regulatory constraints their partnership with GitHub didn’t seem to work out. Instead they want to issue a wire transfer from India requiring several cross-jurisdictional paperwork but I don’t feel comfortable doing that because I don’t trust them, nor the India government, with processing and storing personal sensitive data (especially over insecure shared mail inbox channel). So in the end I had to withdraw my FLOSS/fund application and decline the funding. I’ve made a mistake for not researching it more carefully and not waiting for the disbursal before making big announcements and decisions, but it is what it is. Nonetheless the main goal remains and I’ll try to publish a stable PocketBase version this year (no hard promises though; the majority of the new UI functionality is already implemented but I’ll have to look for something else in between before making more elaborate plans regarding the remaining tasks) . There will be a new announcement once I have more clarity and readiness to request community feedback. I’ll go ahead and lock this discussion to avoid further spamming the participants and repository watchers. I am happy to announce that yesterday FLOSS/fund contacted me about their decision to sponsor PocketBase as part of their second funding tranche. You can find more details and the other cool projects they’ve chosen to support at https://floss.fund/blog/second-tranche-2025-anniversary/ . > Note that FLOSS/fund and Zerodha are planning to continue with the program next year, so if you are looking for a no strings attached sponsorship for your open source project, I encourage you to apply at https://dir.floss.fund/submit . With the funding this means that starting from December I’ll be able to work solely on PocketBase for at least one year, with the general goal to finally have a stable PocketBase release by end of next year. My short-term focus for now will be on rewriting the UI. UI Rewrite One of the biggest limitations of PocketBase right no

Source: Hacker News | Original Link

Tailscale Peer Relays is now generally available

Tailscale Peer Relays: Use your own devices as high-throughput relays Take the friction out of GenAI workflows with Aperture by Tailscale. Here’s how → Product Meet Tailscale How it works Why Tailscale WireGuard® for Enterprises Bring Tailscale to Work Explore Integrations Features Compare Tailscale Community Projects Partnerships Solutions By use-case Business VPN CI/CD Infra Access Cloud Connectivity Zero Trust Networking Homelab Securing AI By role DevOps IT Security Enterprise Customers Nav heading here Title here How Cribl Enables Secure Work From Anywhere with Tailscale Docs Blog Pricing Download Schedule a demo Get started – it’s free! Log in WireGuard is a registered trademark of Jason A. Donenfeld. Terms of Service Privacy Policy California Notice Cookie Notice © 2026 Tailscale Inc. All rights reserved. Tailscale is a registered trademark of Tailscale Inc. Blog | product February 18, 2026 Tailscale Peer Relays is now generally available When Tailscale works best, it feels effortless, almost boring. Devices connect directly, packets take the shortest possible path, and performance ceases to be a pressing concern. But real-world networks aren’t always that cooperative. Firewalls, NATs, and cloud networking constraints can block direct peer-to-peer connections. When that happens, Tailscale relies on relays ( DERP ) to keep traffic moving securely and reliably. Today, we’re excited to announce that Tailscale Peer Relays is now generally available (GA). Peer relays bring customer-deployed, high-throughput relaying to production readiness, giving you a tailnet-native relaying option that you can run on any Tailscale node. Since their beta release , we’ve shaped Tailscale Peer Relays to deliver major improvements in performance, reliability, and visibility. What started as a way to work around hard NATs has grown into a production-grade connectivity option. One that gives teams the performance, control, and flexibility they need to scale Tailscale in even the most challenging network environments. Vertical scaling boost that improves throughput We have made big throughput improvements for Tailscale Peer Relays that are especially noticeable when many clients are forwarding through them. Connecting clients now select a more optimal interface and address family when more than one are available within a single relay, which helps bootstrap and improve overall connection quality. On the relay itself, throughput has increased: packets are handled more efficiently on every Peer Relay because of lock contention improvements, and traffic is now spread across multiple UDP sockets where available. Together, these changes deliver meaningful gains in both performance and reliability across day-to-day tailnet traffic. Even when direct peer-to-peer connections aren’t possible, peer relays can now achieve performance much closer to a true mesh. Static endpoints for restrictive cloud environments In some environments, particularly in public cloud networks, auto

Source: Hacker News | Original Link

Garment Notation Language: Formal descriptive language for clothing construction

GitHub – khalildh/garment-notation Skip to content You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert khalildh / garment-notation Public Notifications You must be signed in to change notification settings Fork 0 Star 14 14 stars 0 forks Branches Tags Activity Star Notifications You must be signed in to change notification settings khalildh/garment-notation main Branches Tags Go to file Code Open more actions menu Folders and files Name Name Last commit message Last commit date Latest commit History 29 Commits 29 Commits converter converter docs docs grammar grammar images images tests tests viewer viewer .gitignore .gitignore .nojekyll .nojekyll README.md README.md garment-notation.md garment-notation.md index.html index.html package-lock.json package-lock.json package.json package.json View all files Repository files navigation GNL — Garment Notation Language A formal descriptive language for clothing construction. Try the live viewer Dance has Labanotation. Music has staff notation. Architecture has plan/section/elevation conventions. GNL brings the same rigor to garments — a generative descriptive language where a valid expression is sufficient to construct a garment without ambiguity. Core Concepts Body-anchored — the body is the coordinate system, using anatomical landmarks ( @shoulder.L ) and regions ( %torso.front ) Topological — garments are surfaces with boundaries and openings Constructive — descriptions encode build order, not just final form Composable — complex garments are compositions of simpler elements Quick Example GARMENT t_shirt [SYM] { FABRIC: M(160gsm, fluid, biaxial:15%, 1.0, knit.jersey) front = P(%torso.front, contour, 1.15) back = P(%torso.back, contour, 1.15) sleeve = P(%arm[0..0.4], contour, 1.2) neck = O(@neck, circle, body+8cm) hem = O(@hip, circle, body+10cm) BUILD: S(front.shoulder, back.shoulder, serged) >> S(sleeve.cap, {front.armhole, back.armhole}, serged) >> S(front.side, back.side, serged) >> F(hem, 2.5cm, in) } Grammar The language is formally defined as a PEG grammar targeting Peggy . The generated parser produces a richly-typed AST which is adapted to the renderer’s internal format at runtime. npm install # install Peggy (dev dependency only) npm run generate # regenerate viewer/src/gnl-parser.js from grammar/gnl.peg npm test # run parse + adapter tests against all examples Viewer The repo includes a live viewer that parses GNL and renders both assembled garment views and flat pattern pieces. Assembled View Write GNL on the left, see the full garment on the right — with stitch lines, dimension callouts, and construction details. T-Shirt Wrap Skirt Jacket Collar Pattern Pieces Toggle to “Pieces” to see the individual flat pattern pieces with shape outlines, grain lines, and dimensions. Korosteleva Dataset Converter The r

Source: Hacker News | Original Link

Show HN: A Unix environment in a single HTML file (420 KB)

Shiro — A Unix environment in one HTML file A static HTML file that boots into a Unix shell. The filesystem is IndexedDB. Commands are JavaScript. Files survive page reloads. Everything runs client-side — the page works offline with no server at all. Build and interact with apps Write a counter, serve it, click buttons from the shell, upgrade to a grapher, commit with git. Interact counter → serve → page commands → upgrade → commit ↻ replay Build and interact with apps Serve an app, use page to click and read DOM elements, then commit. ▶ Real git, no server init, add, commit, diff — all running client-side via isomorphic-git. Git local repository operations ↻ replay Real git, no server init, add, commit, diff. Pure JavaScript, no server needed. ▶ Snapshot as a GIF Capture the entire filesystem into a GIF. Drag it to another instance to restore. Seed GIF snapshot → drag → restore ↻ replay source target Snapshot as a GIF Snapshot one Shiro instance, drag the GIF to restore in another. ▶ How it works Filesystem IndexedDB with a POSIX-like API. stat, readdir, readFile, writeFile, mkdir, symlink, chmod, glob. Files persist across reloads. Shell Pipes, redirects, $variables, &&, ||, quoting, heredocs. Enough of POSIX to be useful for real scripting. Packages Real npm tarballs from the registry. node runs JavaScript files. esbuild bundles TypeScript. require() resolves node_modules. One file Single self-contained HTML. All JS/CSS inlined by the build. ~420 KB gzipped. Deploy anywhere — GitHub Pages, S3, open it locally.

Source: Hacker News | Original Link

Zero-day CSS: CVE-2026-2441 exists in the wild

Chrome Releases: Stable Channel Update for Desktop Chrome Releases Release updates from the Chrome team Stable Channel Update for Desktop Friday, February 13, 2026 The Stable channel has been updated to 145.0.7632.75/76 for Windows/Mac  and 144.0.7559.75 for Linux, which will roll out over the coming days/weeks. A full list of changes in this build is available in the Log Security Fixes and Rewards Note: Access to bug details and links may be kept restricted until a majority of users are updated with a fix. We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven’t yet fixed . This update includes 1 security fix. Please see the Chrome Security Page for more information. [TBD][ 483569511 ] High CVE-2026-2441: Use after free in CSS. Reported by Shaheen Fazim on 2026-02-11 We would also like to thank all security researchers that worked with us during the development cycle to prevent security bugs from ever reaching the stable channel. Google is aware that an exploit for CVE-2026-2441 exists in the wild. Many of our security bugs are detected using AddressSanitizer , MemorySanitizer , UndefinedBehaviorSanitizer , Control Flow Integrity , libFuzzer , or AFL . Interested in switching release channels? Find out how here . If you find a new issue, please let us know by filing a bug . The community help forum is also a great place to reach out for help or learn about common issues. Srinivas Sista Google Chrome Google Labels: Desktop Update , Stable updates    Labels  Admin Console 43 Android WebView 19 Beta 26 Beta update 16 Beta updates 2212 chrome 15 Chrome Dev for Android 185 Chrome for Android 1133 Chrome for iOS 487 Chrome for Meetings 5 Chrome OS 1169 Chrome OS Flex 35 Chrome OS Management 13 Chromecast Update 6 ChromeOS 342 ChromeOS Flex 335 Desktop Update 1331 dev update 267 Dev updates 1629 Early Stable Updates 76 Extended Stable updates 182 Flash Player update 5 Flex 1 Hangouts Meet hardware 5 LTS 124 stable 12 Stable updates 1440  Archive    2026 Feb Jan   2025 Dec Nov Oct Sep Aug Jul Jun May Apr Mar Feb Jan   2024 Dec Nov Oct Sep Aug Jul Jun May Apr Mar Feb Jan   2023 Dec Nov Oct Sep Aug Jul Jun May Apr Mar Feb Jan   2022 Dec Nov Oct Sep Aug Jul Jun May Apr Mar Feb Jan   2021 Dec Nov Oct Sep Aug Jul Jun May Apr Mar Feb Jan   2020 Dec Nov Oct Sep Aug Jul Jun May Apr Mar Feb Jan   2019 Dec Nov Oct Sep Aug Jul Jun May Apr Mar Feb Jan   2018 Dec Nov Oct Sep Aug Jul Jun May Apr Mar Feb Jan   2017 Dec Nov Oct Sep Aug Jul Jun May Apr Mar Feb Jan   2016 Dec Nov Oct Sep Aug Jul Jun May Apr Mar Feb Jan   2015 Dec Nov Oct Sep Aug Jul Jun May Apr Mar Feb Jan   2014 Dec Nov Oct Sep Aug Jul Jun May Apr Mar Feb Jan   2013 Dec Nov Oct Sep Aug Jul Jun May Apr Mar Feb Jan   2012 Dec Nov Oct Sep Aug Jul Jun May Apr Mar Feb Jan   2011 Dec Nov Oct Sep Aug Jul Jun May Apr Mar Feb Jan   2010 Dec Nov Oct Sep Aug Jul Jun May Apr Mar Feb Jan   2009 Dec Nov O

Source: Hacker News | Original Link

The Only Moat Left Is Money

The Only Moat Left Is Money – Elliot Bonneville Every morning a few thousand people wake up and ship something. A tool, a SaaS, a newsletter, an app that does the thing the other app does but slightly differently. They post it on Hacker News. Nobody clicks. This is not new. What’s new is the scale. An AI can wake up (or whatever it does at 3am) and ship twelve of these before breakfast. The value of human thinking is going down. You probably knew this. The corollary is rarely mentioned: the value of a human eyeball is going up, because there are only so many of them and there are now infinite things that want to be looked at. Creation used to be the scarce thing, the filter. Now attention is. Most of us are on the wrong side of that trade. Josh Pigford has been building things on the internet for 25 years. This is the first time he’s said it feels hard: as someone who’s been building for the internet for 25+ years, this is the first time that i’ve ever felt like it’s very difficult to make money building *new* things. existing products w/ momentum are getting a nice boost. but *new*? substantial uphill battle. — Josh Pigford (@Shpigford) February 18, 2026 When someone suggested the answer was marketing: jUsT dO mOrE mArKeTiNg!!!!! attention spans are shorter than ever and the exponential flood of new products means there’s exponential demand for that already short attention span. likely solvable, but just a VERY different playbook from the past two decades. — Josh Pigford (@Shpigford) February 18, 2026 He’s right. “Just do more marketing” assumes there’s a channel open. Every channel I know of has gotten quietly worse. Search. Social. Newsletters. Communities. There’s a thread on Hacker News right now called “Is Show HN dead? No, but it’s drowning” — Show HN, the one place the internet was supposed to notice if you built something real. One commenter: One of the great benefits of AI tools is they allow anyone to build stuff, even if they have no ideas or knowledge. One of the great drawbacks is they allow anyone to build stuff. Another: “The vibecoder hasn’t done the interesting thing, they’ve pulled other people’s interesting things.” The effort is gone. Effort was the filter. I launched something last week. 14 people signed up — no ads, just a couple of posts. 14 real people who didn’t have to. That number is tiny and it felt like something. Then I sat down to think about what it would take to grow it and I couldn’t look at that math for very long. The people winning mostly had a head start. Or they have money. Usually both. When creation was hard, skill was the differentiator: you had to actually be good to make something worth showing. Now the barrier is near zero, so you need reach. Reach costs money or it costs years. Probably both. Reach is also gravitational. Past some threshold it accumulates without you — posts find people, people find posts, the thing feeds itself. Below the threshold, identical effort produces nothing. Same quality, s

Source: Hacker News | Original Link

Why AI Velocity Is Becoming a Debt Accelerator

Fragments: February 18 Fragments: February 18 Martin Fowler: 18 Feb 2026 I’ll start with some more tidbits from the Thoughtworks Future of Software Development Retreat ❄                ❄ We were tired after the event, but our marketing folks forced Rachel Laycock and I to do a quick video. We’re often asked if this event was about creating some kind of new manifesto for AI-enabled development, akin to the Agile Manifesto (which is now 25 years old). In short, our answer is “no”, but for the full answer, watch our video ❄                ❄ My colleagues put together a detailed summary of thoughts from the event, in a 17 page PDF. It breaks the discussion down into eight major themes, including “Where does the rigor go?”, “The middle loop: a new category of work”, “Technical foundations: languages, semantics and operating systems”, and “The human side: roles, skills and experience”. The retreat surfaced a consistent pattern: the practices, tools and organizational structures built for human-only software development are breaking in predictable ways under the weight of AI-assisted work. The replacements are forming, but they are not yet mature. The ideas ready for broader industry conversation include the supervisory engineering middle loop, risk tiering as the new core engineering discipline, TDD as the strongest form of prompt engineering and the agent experience reframe for developer experience investment. ❄                ❄ Annie Vella posted her take-aways from the event I walked into that room expecting to learn from people who were further ahead. People who’d cracked the code on how to adopt AI at scale, how to restructure teams around it, how to make it work. Some of the sharpest minds in the software industry were sitting around those tables. And nobody has it all figured out. There is more uncertainty than certainty. About how to use AI well, what it’s really doing to productivity, how roles are shifting, what the impact will be, how things will evolve. Everyone is working it out as they go. I actually found that to be quite comforting, in many ways. Yes, we walked away with more questions than answers, but at least we now have a shared understanding of the sorts of questions we should be asking. That might be the most valuable outcome of all. ❄                ❄ Rachel Laycock was interviewed in The New Stack (by Jennifer Riggins) about her recollections from the retreat. AI may be dubbed the great disruptor, but it’s really just an accelerator of whatever you already have. The 2025 DORA report places AI’s primary role in software development as that of an amplifier — a funhouse mirror that reflects back the good, bad, and ugly of your whole pipeline. AI is proven to be impactful on the individual developer’s work and on the speed of writing code. But, since writing code was never the bottleneck, if traditional software delivery best practices aren’t already in place, this velocity multiplier becomes a debt accelerator. ❄                ❄ L

Source: Hacker News | Original Link

段永平,1200亿元持仓曝光

段永平,1200亿元持仓曝光_腾讯新闻 段永平,1200亿元持仓曝光 都市快报橙柿互动 2026-02-18 20:02 发布于 浙江 都市快报官方账号 根据美股机构投资者13F持仓披露情况,截至2025年底,段永平管理的H&H International Investment持仓总市值约174.89亿美元,折合人民币超1200亿元。 2025年四季度,段永平大幅加仓 英伟达 ,还加仓了 拼多多 、 伯克希尔 ·哈撒韦等,小仓位新进三家AI相关公司。与此同时,段永平减持了 苹果 、 阿里巴巴 、 西方石油 等。 苹果还是头号重仓股 从整体持仓情况看,H&H International Investment共持有14家公司,包括苹果、伯克希尔·哈撒韦、英伟达、拼多多、西方石油等。 具体如下图所示: 苹果依然是其头号重仓股,占组合持仓比例为50.3%,截至2025年底,持仓市值高达87.97亿美元。此外,伯克希尔·哈撒韦占组合比例为20.63%,持仓市值为36.07亿美元。 从持仓变动情况来看,2025年四季度, 段永平 减持了苹果、西方石油、阿里巴巴、 迪士尼 、 阿斯麦 。其中,在头号重仓股苹果上,段永平早在2011年就买入,此后长期重仓持有。不过,去年一季度,段永平大幅减仓苹果,卖出664万股;二季度加仓89.44万股;三季度减持28.95万股;四季度再次大手笔减仓247.06万股。 今年1月23日,段永平曾表示:“巴菲特很少囤积现金(短期国债),但最近这几年确实看到他经常有大量现金,尤其是开始卖苹果后。我能想到的唯一原因大概就是他觉得股市贵了,他自己的能力圈内他想买的公司不够便宜,所以他在等。” 大手笔加仓英伟达 在减持苹果、西方石油、阿里巴巴等公司的同时,段永平再度加码AI概念股。2025年四季度,段永平大手笔加仓英伟达。 在2025年与雪球创始人方三文对话时,段永平说道:“英伟达确实是厉害,我也看了黄仁勋很多视频,这个人我也很欣赏,他十多年前讲的东西和今天讲的东西是一样的,他早就看到了,一直在朝那个方向做。所以你现在就不得不去想,他现在讲的东西依然是他对未来的认同,所以我觉得投一点看看吧,AI这个东西我觉得至少掺和一下,不要错过了。” 数据显示, 2025年四季度,段永平加仓663.93万股英伟达,截至2025年底,共持有英伟达723.71万股,持仓市值为13.5亿美元,占持仓比例为7.72%。 在和方三文的访谈中,段永平不否认AI会有泡沫,但直言会有一些公司很厉害。他表示“AI肯定是个工业革命,但是泡沫总是会伴随而来。泡沫的特征就是人人都跟着一起涨, 凡事 只要一说AI,大家就冲进去买。但是最后会有一些公司,它确实会很厉害。” 截至2025年底,段永平持仓英伟达近百亿人民币,这应该不算是他所说的“至少掺和”了。 与时俱进布局AI 面对AI时代的加速来临,段永平正在加大对AI的布局力度。除了加仓英伟达之外,段永平还加仓了AI“新贵” 谷歌 ,段永平多次提到谷歌的Gemini。 在2025年11月Gemini 3发布后,谷歌成为AI“新贵”,段永平也多次谈到Gemini。2026年1月4日,段永平表示“最近Gemini多一些”。 除了英伟达和谷歌以外,段永平还新进三家公司,分别是CRWV、CRDO和TEM,均为AI相关概念股。截至2025年底,段永平持有上述三家公司的仓位比例分别为0.12%、0.12%和0.04%。 其中,CRWV是一家专注于AI与高性能计算的专用云服务商,在纳斯达克上市,该公司同英伟达深度绑定,主营业务是出租英伟达高端GPU算力,服务AI训练/推理、高性能计算、渲染等。 CRDO是一家AI数据中心高速连接解决方案的龙头半导体公司,在纳斯达克上市,核心业务是做有源电缆与高速芯片,是AI算力网络的“血管”供应商。 TEM是一家AI驱动的精准医疗龙头公司,在纳斯达克上市,主打肿瘤精准诊疗+医疗大数据+AI应用,被视为医疗AI领域的标杆企业。 尽管从上述持仓比例看,段永平新进的三家公司仓位不高,但能看出他在持续关注AI行业最新进展,他在与时俱进。 今年1月初,在新年展望中,段永平表示,新的一年里,需要认真学习一下怎么使用AI,希望能让自己能理解AI到敢下重注的地步。 “这玩意儿真是越用越觉得有意思,感觉世界有点不一样了。很难想象10年后这个世界会变成什么样子,但非常可能变化会比过去10年,20年甚至40年还大。”段永平说。 来源 上海证券报 编辑 陈伊 审核 张倩 王晨郁 校对 金秋

Source: Tencent News | Original Link

春节外省游客打卡水贝买黄金,多品牌足金饰品克价跌破1500元

春节外省游客打卡水贝买黄金,多品牌足金饰品克价跌破1500元,老铺黄金宣布年后调价_腾讯新闻 春节外省游客打卡水贝买黄金,多品牌足金饰品克价跌破1500元,老铺黄金宣布年后调价 红星新闻 2026-02-18 22:48 发布于 四川 成都商报红星新闻官方账号 2月18日午后,黄金价格经历春节除夕和初一连续两日的震荡下跌,开始有小幅回调。 作为全国最大的黄金珠宝集散地——深圳 水贝黄金市场 ,今年这里打破春节休市惯例,持续营业,成为全国黄金消费的“主战场”。红星新闻记者获悉,18日水贝金价1268元/克, 回收价 1071元/克。 过年买金,是很多家庭的“固定习俗”。水贝门店数名商家告诉红星新闻记者,春节除夕至初二这三天,前来购买金饰品的顾客人流量并不见少,部分摊位市场客流量同比激增超三分之一,更有外省游客专门“打卡”水贝买黄金。 ▲春节前的深圳水贝市场 从吉林长春来广东旅游的李女士介绍,她今年和家人一起到广东探亲过年,并专程到深圳水贝市场购买黄金,许多朋友同事也托她帮忙看看有没有合适入手的金饰品。 经过货比多家,她今天以1153元/克包工费的 首饰金价 买入了70克黄金,“买了两个镯子和一个项链,对比大牌克价都在1400元左右,想等年后价格会不会降,再买一些戒指和耳环。”李女士介绍。 红星新闻记者注意到,截至2月18日晚间,多家品牌金店足金饰品价格跌破1500元, 周六福 报价1494元/克,老庙黄金、 周大福 报价1499元/克,六福珠宝报价1497元/克, 周生生 报价1500元/克。 ▲品牌金店足金饰品价格跌破1500元 记者走访了解到,恰逢春节,不少黄金品牌商家也同步推出“ 工费八折 ”“克减优惠”“以旧换新免折旧”等一系列福利活动。例如,周大福在部分门店推出黄金钜惠,1月30日-2月23日计价黄金克减80元;老庙黄金推出“马上有财”主题活动,金价克减90元; 中国黄金 克减150元,生肖马秒杀款599元。 2月18日, 老铺黄金 也正式官宣,将启动2026年首轮调价,具体时间为2月28日。通知称,产品调价详情以线上线下产品实际标价为准。此前的2025年,老铺黄金已分别于2月、8月、10月三次上调售价。 由于黄金价格高位波动,2026年开年以来周生生、 潮宏基 等黄金品牌均已对一口价产品做出调价。1月6日,周生生部分定价类黄金饰品启动调价,涨幅在200元至1500元不等;1月16日,潮宏基多款一口价黄金饰品宣布涨幅从几百元至上万元不等。 红星新闻记者 蔡晓仪 编辑 张寻 审核 冯玲玲

Source: Tencent News | Original Link

过年买车更划算?实探春节车市:有车型直降2万,专属优惠并不多

过年买车更划算?实探春节车市:有车型直降2万,专属优惠并不多_腾讯新闻 过年买车更划算?实探春节车市:有车型直降2万,专属优惠并不多 时代周报 2026-02-18 17:42 发布于 广东 时代周报官方账号 本文来源:时代周报 作者:曹杨 “大部分新能源品牌车型的优惠力度和节假日关联不大,一般都是新车上市时优惠幅度更大,之后会逐步递减。”一位 理想汽车 销售人员向时代周报记者表示。 该销售人员进一步介绍,“以 理想i6 为例,这款车型刚上市时优惠1万元,现在优惠幅度只剩5000元了。” 理想线下门店 时代周报记者摄 宝马 下调官方指导价, 特斯拉 推出7年超长低息金融政策……2026年开年,车市竞争升温,各大车企密集加码促销,试图在年初抢占先机。 大年初二,时代周报记者先后来到 小米汽车 、华为授权体验店、 阿维塔 、 极氪 、 小鹏汽车 (09868.HK)、理想汽车(02015.HK)、 蔚来汽车 (09866.HK)等多家北京线下门店,实地探访车企在春节假期的市场表现。 一位小米汽车销售人员告诉时代周报记者,七年超低息金融购车方案并未像预期中那样受到消费者热捧,“在小米汽车的购车金融方案里,选择七年超低息和3年0息的消费者大致各占一半,也有部分用户选择全款购车。” 有车型优惠2万元 尽管各大车企鲜有针对春节的专属优惠,但这并不影响销售人员的卖车热情,各大品牌门店也依旧有不少消费者前来看车咨询。 在小鹏汽车门店,一位销售人员连续接待了3批前来看车的消费者,销售人员针对续航、价格,乃至不同悬架的性能差异等问题,进行了详细解答。 该小鹏汽车销售人员向时代周报记者介绍,当前小鹏汽车并未针对春节假期推出特别优惠政策,但2025款 小鹏G6 有一定现金优惠,价格相对偏低,“相当于‘清仓’价格,不过配置需要消费者在库存车中挑选”。 上述小鹏汽车销售进一步表示,目前小鹏全系车型均享受7年超低息金融购车政策,后续推出的新车型大概率也会同步享受这一政策。 不过,该销售人员坦言,“今年新能源车的价格降幅可能会小于2025年。” 与小鹏汽车类似,针对库存车推出专属优惠的还有智界和阿维塔,且不同品牌对于库存车的判定和优惠幅度均有所差异。 一位鸿蒙智行销售人员告诉时代周报记者,目前智界对在库90天以上的车辆给予1万元现金优惠,除此之外,暂无其他优惠政策。同时,该销售人员还强调,鸿蒙智行并不需要推出低息等金融政策来吸引消费者进店或者下单。 智界R7 时代周报记者摄 相比之下,阿维塔的库存车优惠幅度更大,同时库存车的在库时间也更长。 根据阿维塔销售人员的介绍,“阿维塔会对在库180天以上的车辆进行现金优惠,优惠幅度达2万元。” 车企的优惠政策各有不同,前来看车的消费者群体和需求也呈现出多样化特征。 时代周报记者观察,不同的消费者对于购车的需求也不尽相同,其中,家庭用户多看重车辆空间,年轻消费者则更在意车辆颜值与个性化。 但最后,大部分消费者都会回到续航和价格上。 一位消费者对时代周报记者表示,就其个人来说,买车最看重的就是性价比,“够用就行。” 该消费者进一步坦言,现在的车确实功能很多,配置也越来越丰富,但其实很多功能都用不到,与其为冗余功能多花钱,不如选择配置实用、价格合适的车型,满足刚需即可。 行业增速趋稳 春节车市无更多“花式”玩法,消费者态度日趋理性背后,折射出了当前新能源汽车“高销量、稳增长”的走势。 汽车行业资深分析师梅松林博士告诉时代周报记者,新能源车购置税新政以及汽车“国补”等政策调整可能对销量有一定的影响。 中汽协预计,2026年全年汽车销量在3475万辆左右,同比增长1%,其中乘用车3025万辆,同比增长0.5%;新能源汽车1900万辆,同比增长15.2%;汽车出口740万辆,同比增长4.3%。 相比保守的行业增速,车企制定的2026年目标要乐观得多。 如吉利汽车年销目标为345万辆,同比增长约14%;长安汽车年销量330万辆,同比增长13.3%;奇瑞集团则以320万辆为2026年销售目标,同比增长14.03%,均高于行业增速。 新造车品牌则更为“激进”。零跑直接喊出“2026年年销百万”目标,同比增长率高达67.5%;小米汽车55万辆的年销量,同比增长34%;蔚来汽车创始人李斌在内部信中表示,接下来3至5年,蔚来汽车能够实现年均40%至50%的稳定增长。 而2026年1月的销售数据,呈现了另一番景象。 数据显示,1月鸿蒙智行凭借“五界”成为唯一月销破5万的品牌,达5.79万辆,同比增长67%,但环比下滑35%。 小米交付超3.9万辆,紧随其后;2025年的“月销冠军”零跑,以3.21万辆滑落至第三。 新一代小米SU7 时代周报记者摄 与鸿蒙智行一样,小米汽车和零跑同样呈现出同比增长,但环比下滑的情况。其中,小米环比下滑22%,零跑则环比下滑47%。而理想、蔚来、小鹏的月销均未突破3万辆。 对此,有业内人士表示,2025 年底车企陆续推出的购置税兜底权益,提前透支了部分消费者的购车需求;而 7 年低息政策看似降低了消费者的购车门槛,实则对具备真实购车需求的群体影响不大。 在这样的市场环境下,“车企想要实现年度销量目标,多元化发力是关键,例如创新渠道模式、加大出口力度、拉动消费者短期购车需求等。”上述业内人士说道。 梅松林补充道,聚焦中端及以上市场、抓住出海机遇,以及抓住新一轮的AI和高阶智能驾驶创新机遇,或都可以成为有效发力点。

Source: Tencent News | Original Link

国际货币基金组织向日本发出三重警示

国际货币基金组织向日本发出三重警示_腾讯新闻 国际货币基金组织向日本发出三重警示 新京报 2026-02-18 15:25 发布于 北京 新京报官方账号 据央视新闻消息,国际货币基金组织(IMF)2月17日发布报告, 警示日本政府应保持日本央行独立性,控制财政扩张,避免以削减消费税方式应对民生问题。 这一报告发布恰逢日本首相指名选举之际。据悉,市场密切关注高市早苗是否会反对央行进一步加息,以及高市此前提出的为期两年的“食品 消费税 归零”承诺。 货币政策方面,IMF指出,日本央行保持独立性与公信力,有助于稳定通胀预期,并表示日本央行“应继续退出货币宽松,使政策利率在2027年达到中性利率水平”。 财政政策方面,IMF认为,短期内财政政策不宜进一步宽松。这一点与高市提出的“负责任的积极财政”相悖。IMF认为,日本目前虽有一定财政空间,但仍需保持财政克制,以稳固财政缓冲、维持应对冲击的能力。 IMF预测,长期看日本政府 财政赤字 将扩大,支出压力将增加,公共债务总额将进一步增长。 IMF指出,债务水平持续高企,叠加财政收支状况恶化,使日本经济面临一系列冲击。 针对高市提出的为期两年的“食品消费税归零”竞选承诺,IMF直言“应避免削减消费税”,称“这一缺乏针对性的措施会压缩财政空间,增加财政风险”。 编辑 陈艳婷

Source: Tencent News | Original Link

腾讯元宝DAU超5000万、MAU达1.14亿,后续元宝派里还有新惊喜

腾讯元宝DAU超5000万、MAU达1.14亿,后续元宝派里还有新惊喜_腾讯新闻 腾讯元宝DAU超5000万、MAU达1.14亿,后续元宝派里还有新惊喜 腾讯科技 2026-02-18 20:26 发布于 北京 腾讯新闻科技频道官方账号 2月18日,腾讯正式宣布, 元宝 日活跃用户( DAU )超5000万,月活跃用户( MAU )已达1.14亿。 此前一天,腾讯发布的元宝分10亿现金红包活动报告显示,元宝春节主会场累计抽奖次数超36亿次,用户通过「创作」栏完成AI任务超10亿次。 元宝持续迭代更新,21天内已迭代更新159项功能,今天元宝还公布了更多更新计划。正月初五,用户在 元宝派 内聊天,元宝会随机掉落红包。同时,在切换不同元宝派时,一起听不会掉线。正月十五 元宵节 ,用户还可以在派里一起看湖南卫视元宵晚会直播。 更多阅读 这个春节,我们一起完成了10个亿的小项目 你以为AI只会发红包?一场“AI社交降维打击”正在发生

Source: Tencent News | Original Link