• Adidas data breach reveals customer info in vendor attack

    Published
    June 4, 2025 10:00am EDT close Windows bug leaves computer Wi-Fi vulnerable to hackers Kurt "CyberGuy" Knutsson explains how to keep your Windows computer safe and the security risks of online retail giant Temu. NEWYou can now listen to Fox News articles!
    Hackers are no longer targeting only tech giants or hospitals. Any business that collects valuable personal information, such as names, phone numbers, email addresses or even basic financial details, is now a target.Companies that rely heavily on third-party vendors or outsourced customer support are even more at risk, especially if they are not particularly strong in the technology sector.German retailer Adidas learned this the hard way. The company recently confirmed a data breach involving one of its external partners, and although it has acknowledged the issue, many important details are still missing. A hacker at workAdidas confirms vendor breach: Here’s what we knowAdidas has officially acknowledged that a third-party vendor suffered a breach, resulting in unauthorized access to consumer data. In a public notice titled "Data Security Information," the company revealed that a "third-party customer service provider" had been compromised. While the brand was initially silent on the scope, it had already been reported earlier this month that customers in Turkey and Korea had received breach notifications.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSAdidas posted this information on both its German and English websites. However, no specific region or number of affected individuals has been confirmed. The company’s statement did clarify that no payment information, such as credit card details, nor passwords were included in the breach. Instead, it involved contact details submitted by users to Adidas’ help desk in the past.Data obtained reportedly includes names, phone numbers, email addresses and dates of birth. While this might seem limited compared to financial data, this type of information can be exploited for phishing scams and identity theft.  An Adidas signWhat Adidas told customers after the breachIn the wake of the breach, Adidas began notifying potentially affected customers directly. The company's email to customers below aimed to reassure recipients and clarify what information was involved. Here is the full text of the notification sent to affected individuals.Dear customer,We are writing to inform you of an issue that we recently became aware of which may have impacted some of your data.What happenedadidas recently learned that an unauthorized external party gained access to certain customer data through a third-party customer service provider.What information was involvedThe affected data does not contain passwords, credit card or any other payment-related information. Nor have any Social Security numbers been impacted.It mainly consists of contact information relating to customers who had contacted our customer service help desk in the past. This may have included one or more of the following: name, email address, telephone number, gender and/or birth date.What we are doing Privacy and the security of your data is our priority. Upon becoming aware of this incident, adidas took proactive and immediate steps to investigate and contain the incident. This includes further enhancing security measures and resetting passwords for customer service accounts.What you can doWe are currently unaware of any harmbeing caused to our customers as a result of this incident. There are no immediate steps that you need to take. Although, as always, please remain vigilant and look out for any suspicious messages. As a reminder, adidas will never directly contact you to ask that you provide us with financial information, such as your credit card details, bank account information or passwords.Who you can contactIf you have any questions, then please contact our Customer Service team at  apologise for any inconvenience caused by this incident.adidas TeamWhat Adidas hasn’t said about the vendor hackDespite the official acknowledgment, several questions remain unanswered. Adidas has yet to clarify whether this is a single breach affecting multiple regions or several separate incidents. The lack of transparency around the name of the third-party vendor and the absence of concrete numbers or locations for affected users has created frustration among observers and possibly among customers themselves.The earlier regional reports from Turkey and Korea might suggest that this incident was either global in scale or that similar third-party vendors were independently targeted. In either case, the company's current handling of the situation has left room for speculation. Adidas claims it is in the process of informing potentially affected customers, but it has not detailed the method or timeline for this outreach.We reached out to adidas for a comment, and a representative referred us to this statement on their website. In part, the company said, "We remain fully committed to protecting the privacy and security of our consumers, and sincerely regret any inconvenience or concern caused by this incident."GET FOX BUSINESS ON THE GO BY CLICKING HERE An Adidas shoe6 critical steps to take after the Adidas data breachIf you think you were affected or just want to be cautious, here are some steps you can take right now to stay safe from the Adidas data breach:1. Scrub your data from the internet using a personal data removal service: The more exposed your personal information is online, the easier it is for scammers to use it against you. Following the Adidas breach, consider removing your information from public databases and people-search sites. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.2. Watch out for phishing scams and use strong antivirus software: With access to your email and phone number, Adidas attackers can craft convincing phishing emails pretending to be from healthcare providers or banks. These emails might include malicious links designed to install malware or steal login information. To defend yourself, use a strong antivirus program. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.3. Safeguard against identity theft and use identity theft protection: Hackers now have access to high-value information from the Adidas breach. This makes you a prime target for identity theft. You might want to consider investing in identity theft protection, which can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. Signing up for identity theft protection gives you 24/7 monitoring, alerts for unusual activity and support if your identity is stolen. See my tips and best picks on how to protect yourself from identity theft.4. Set up fraud alerts: Requesting fraud alerts notifies creditors that they need extra verification before issuing credit in your name. You can request fraud alerts through any one of the three major credit bureaus; they’ll notify the others. This adds another layer of protection without completely freezing access to credit.5. Change passwords and use a password manager: Update passwords on any accounts tied to compromised data. Use unique passwords that are hard to guess and let a password manager do the heavy lifting by generating secure ones for you. Reused passwords are an easy target after breaches. Consider password managers for convenience and security. Get more details about my best expert-reviewed password managers of 2025 here.6. Be wary of social engineering attacks: Hackers may use stolen details like names or birthdates from breaches in phone scams or fake customer service calls designed to trick you into revealing more sensitive info. Never share personal details over unsolicited calls or emails. Social engineering attacks rely on trust, and vigilance is key.Kurt’s key takeawayThe Adidas breach shows that even companies with decades of brand equity and a massive global footprint are not immune to lapses in data security. It underscores the need for companies to go beyond basic compliance and actively evaluate the cybersecurity standards of every partner in their ecosystem. Consumers are becoming increasingly aware of the trade-offs they make when sharing their personal information, and brands that fail to meet this moment may find their reputations eroding faster than they expect.CLICK HERE TO GET THE FOX NEWS APPShould retailers be penalized for neglecting basic cybersecurity practices? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    #adidas #data #breach #reveals #customer
    Adidas data breach reveals customer info in vendor attack
    Published June 4, 2025 10:00am EDT close Windows bug leaves computer Wi-Fi vulnerable to hackers Kurt "CyberGuy" Knutsson explains how to keep your Windows computer safe and the security risks of online retail giant Temu. NEWYou can now listen to Fox News articles! Hackers are no longer targeting only tech giants or hospitals. Any business that collects valuable personal information, such as names, phone numbers, email addresses or even basic financial details, is now a target.Companies that rely heavily on third-party vendors or outsourced customer support are even more at risk, especially if they are not particularly strong in the technology sector.German retailer Adidas learned this the hard way. The company recently confirmed a data breach involving one of its external partners, and although it has acknowledged the issue, many important details are still missing. A hacker at workAdidas confirms vendor breach: Here’s what we knowAdidas has officially acknowledged that a third-party vendor suffered a breach, resulting in unauthorized access to consumer data. In a public notice titled "Data Security Information," the company revealed that a "third-party customer service provider" had been compromised. While the brand was initially silent on the scope, it had already been reported earlier this month that customers in Turkey and Korea had received breach notifications.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSAdidas posted this information on both its German and English websites. However, no specific region or number of affected individuals has been confirmed. The company’s statement did clarify that no payment information, such as credit card details, nor passwords were included in the breach. Instead, it involved contact details submitted by users to Adidas’ help desk in the past.Data obtained reportedly includes names, phone numbers, email addresses and dates of birth. While this might seem limited compared to financial data, this type of information can be exploited for phishing scams and identity theft.  An Adidas signWhat Adidas told customers after the breachIn the wake of the breach, Adidas began notifying potentially affected customers directly. The company's email to customers below aimed to reassure recipients and clarify what information was involved. Here is the full text of the notification sent to affected individuals.Dear customer,We are writing to inform you of an issue that we recently became aware of which may have impacted some of your data.What happenedadidas recently learned that an unauthorized external party gained access to certain customer data through a third-party customer service provider.What information was involvedThe affected data does not contain passwords, credit card or any other payment-related information. Nor have any Social Security numbers been impacted.It mainly consists of contact information relating to customers who had contacted our customer service help desk in the past. This may have included one or more of the following: name, email address, telephone number, gender and/or birth date.What we are doing Privacy and the security of your data is our priority. Upon becoming aware of this incident, adidas took proactive and immediate steps to investigate and contain the incident. This includes further enhancing security measures and resetting passwords for customer service accounts.What you can doWe are currently unaware of any harmbeing caused to our customers as a result of this incident. There are no immediate steps that you need to take. Although, as always, please remain vigilant and look out for any suspicious messages. As a reminder, adidas will never directly contact you to ask that you provide us with financial information, such as your credit card details, bank account information or passwords.Who you can contactIf you have any questions, then please contact our Customer Service team at  apologise for any inconvenience caused by this incident.adidas TeamWhat Adidas hasn’t said about the vendor hackDespite the official acknowledgment, several questions remain unanswered. Adidas has yet to clarify whether this is a single breach affecting multiple regions or several separate incidents. The lack of transparency around the name of the third-party vendor and the absence of concrete numbers or locations for affected users has created frustration among observers and possibly among customers themselves.The earlier regional reports from Turkey and Korea might suggest that this incident was either global in scale or that similar third-party vendors were independently targeted. In either case, the company's current handling of the situation has left room for speculation. Adidas claims it is in the process of informing potentially affected customers, but it has not detailed the method or timeline for this outreach.We reached out to adidas for a comment, and a representative referred us to this statement on their website. In part, the company said, "We remain fully committed to protecting the privacy and security of our consumers, and sincerely regret any inconvenience or concern caused by this incident."GET FOX BUSINESS ON THE GO BY CLICKING HERE An Adidas shoe6 critical steps to take after the Adidas data breachIf you think you were affected or just want to be cautious, here are some steps you can take right now to stay safe from the Adidas data breach:1. Scrub your data from the internet using a personal data removal service: The more exposed your personal information is online, the easier it is for scammers to use it against you. Following the Adidas breach, consider removing your information from public databases and people-search sites. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.2. Watch out for phishing scams and use strong antivirus software: With access to your email and phone number, Adidas attackers can craft convincing phishing emails pretending to be from healthcare providers or banks. These emails might include malicious links designed to install malware or steal login information. To defend yourself, use a strong antivirus program. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.3. Safeguard against identity theft and use identity theft protection: Hackers now have access to high-value information from the Adidas breach. This makes you a prime target for identity theft. You might want to consider investing in identity theft protection, which can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. Signing up for identity theft protection gives you 24/7 monitoring, alerts for unusual activity and support if your identity is stolen. See my tips and best picks on how to protect yourself from identity theft.4. Set up fraud alerts: Requesting fraud alerts notifies creditors that they need extra verification before issuing credit in your name. You can request fraud alerts through any one of the three major credit bureaus; they’ll notify the others. This adds another layer of protection without completely freezing access to credit.5. Change passwords and use a password manager: Update passwords on any accounts tied to compromised data. Use unique passwords that are hard to guess and let a password manager do the heavy lifting by generating secure ones for you. Reused passwords are an easy target after breaches. Consider password managers for convenience and security. Get more details about my best expert-reviewed password managers of 2025 here.6. Be wary of social engineering attacks: Hackers may use stolen details like names or birthdates from breaches in phone scams or fake customer service calls designed to trick you into revealing more sensitive info. Never share personal details over unsolicited calls or emails. Social engineering attacks rely on trust, and vigilance is key.Kurt’s key takeawayThe Adidas breach shows that even companies with decades of brand equity and a massive global footprint are not immune to lapses in data security. It underscores the need for companies to go beyond basic compliance and actively evaluate the cybersecurity standards of every partner in their ecosystem. Consumers are becoming increasingly aware of the trade-offs they make when sharing their personal information, and brands that fail to meet this moment may find their reputations eroding faster than they expect.CLICK HERE TO GET THE FOX NEWS APPShould retailers be penalized for neglecting basic cybersecurity practices? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #adidas #data #breach #reveals #customer
    WWW.FOXNEWS.COM
    Adidas data breach reveals customer info in vendor attack
    Published June 4, 2025 10:00am EDT close Windows bug leaves computer Wi-Fi vulnerable to hackers Kurt "CyberGuy" Knutsson explains how to keep your Windows computer safe and the security risks of online retail giant Temu. NEWYou can now listen to Fox News articles! Hackers are no longer targeting only tech giants or hospitals. Any business that collects valuable personal information, such as names, phone numbers, email addresses or even basic financial details, is now a target.Companies that rely heavily on third-party vendors or outsourced customer support are even more at risk, especially if they are not particularly strong in the technology sector.German retailer Adidas learned this the hard way. The company recently confirmed a data breach involving one of its external partners, and although it has acknowledged the issue, many important details are still missing. A hacker at work (Kurt "CyberGuy" Knutsson)Adidas confirms vendor breach: Here’s what we knowAdidas has officially acknowledged that a third-party vendor suffered a breach, resulting in unauthorized access to consumer data. In a public notice titled "Data Security Information," the company revealed that a "third-party customer service provider" had been compromised. While the brand was initially silent on the scope, it had already been reported earlier this month that customers in Turkey and Korea had received breach notifications.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSAdidas posted this information on both its German and English websites. However, no specific region or number of affected individuals has been confirmed. The company’s statement did clarify that no payment information, such as credit card details, nor passwords were included in the breach. Instead, it involved contact details submitted by users to Adidas’ help desk in the past.Data obtained reportedly includes names, phone numbers, email addresses and dates of birth. While this might seem limited compared to financial data, this type of information can be exploited for phishing scams and identity theft.  An Adidas sign (Kurt "CyberGuy" Knutsson)What Adidas told customers after the breachIn the wake of the breach, Adidas began notifying potentially affected customers directly. The company's email to customers below aimed to reassure recipients and clarify what information was involved. Here is the full text of the notification sent to affected individuals.Dear customer,We are writing to inform you of an issue that we recently became aware of which may have impacted some of your data.What happenedadidas recently learned that an unauthorized external party gained access to certain customer data through a third-party customer service provider.What information was involvedThe affected data does not contain passwords, credit card or any other payment-related information. Nor have any Social Security numbers been impacted.It mainly consists of contact information relating to customers who had contacted our customer service help desk in the past. This may have included one or more of the following: name, email address, telephone number, gender and/or birth date.What we are doing Privacy and the security of your data is our priority. Upon becoming aware of this incident, adidas took proactive and immediate steps to investigate and contain the incident. This includes further enhancing security measures and resetting passwords for customer service accounts.What you can doWe are currently unaware of any harm (such as identity theft or fraud) being caused to our customers as a result of this incident. There are no immediate steps that you need to take. Although, as always, please remain vigilant and look out for any suspicious messages. As a reminder, adidas will never directly contact you to ask that you provide us with financial information, such as your credit card details, bank account information or passwords.Who you can contactIf you have any questions, then please contact our Customer Service team at https://www.adidas.com/us/helpWe apologise for any inconvenience caused by this incident.adidas TeamWhat Adidas hasn’t said about the vendor hackDespite the official acknowledgment, several questions remain unanswered. Adidas has yet to clarify whether this is a single breach affecting multiple regions or several separate incidents. The lack of transparency around the name of the third-party vendor and the absence of concrete numbers or locations for affected users has created frustration among observers and possibly among customers themselves.The earlier regional reports from Turkey and Korea might suggest that this incident was either global in scale or that similar third-party vendors were independently targeted. In either case, the company's current handling of the situation has left room for speculation. Adidas claims it is in the process of informing potentially affected customers, but it has not detailed the method or timeline for this outreach.We reached out to adidas for a comment, and a representative referred us to this statement on their website. In part, the company said, "We remain fully committed to protecting the privacy and security of our consumers, and sincerely regret any inconvenience or concern caused by this incident."GET FOX BUSINESS ON THE GO BY CLICKING HERE An Adidas shoe (Kurt "CyberGuy" Knutsson)6 critical steps to take after the Adidas data breachIf you think you were affected or just want to be cautious, here are some steps you can take right now to stay safe from the Adidas data breach:1. Scrub your data from the internet using a personal data removal service: The more exposed your personal information is online, the easier it is for scammers to use it against you. Following the Adidas breach, consider removing your information from public databases and people-search sites. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.2. Watch out for phishing scams and use strong antivirus software: With access to your email and phone number, Adidas attackers can craft convincing phishing emails pretending to be from healthcare providers or banks. These emails might include malicious links designed to install malware or steal login information. To defend yourself, use a strong antivirus program. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.3. Safeguard against identity theft and use identity theft protection: Hackers now have access to high-value information from the Adidas breach. This makes you a prime target for identity theft. You might want to consider investing in identity theft protection, which can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. Signing up for identity theft protection gives you 24/7 monitoring, alerts for unusual activity and support if your identity is stolen. See my tips and best picks on how to protect yourself from identity theft.4. Set up fraud alerts: Requesting fraud alerts notifies creditors that they need extra verification before issuing credit in your name. You can request fraud alerts through any one of the three major credit bureaus; they’ll notify the others. This adds another layer of protection without completely freezing access to credit.5. Change passwords and use a password manager: Update passwords on any accounts tied to compromised data. Use unique passwords that are hard to guess and let a password manager do the heavy lifting by generating secure ones for you. Reused passwords are an easy target after breaches. Consider password managers for convenience and security. Get more details about my best expert-reviewed password managers of 2025 here.6. Be wary of social engineering attacks: Hackers may use stolen details like names or birthdates from breaches in phone scams or fake customer service calls designed to trick you into revealing more sensitive info. Never share personal details over unsolicited calls or emails. Social engineering attacks rely on trust, and vigilance is key.Kurt’s key takeawayThe Adidas breach shows that even companies with decades of brand equity and a massive global footprint are not immune to lapses in data security. It underscores the need for companies to go beyond basic compliance and actively evaluate the cybersecurity standards of every partner in their ecosystem. Consumers are becoming increasingly aware of the trade-offs they make when sharing their personal information, and brands that fail to meet this moment may find their reputations eroding faster than they expect.CLICK HERE TO GET THE FOX NEWS APPShould retailers be penalized for neglecting basic cybersecurity practices? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    Like
    Love
    Wow
    Angry
    Sad
    216
    0 Yorumlar 0 hisse senetleri
  • The original Switch is still a better option than the Switch 2 – Reader’s Feature

    The original Switch is still a better option than the Switch 2 – Reader’s Feature

    GameCentral

    Published June 1, 2025 1:00am

    The Switch 1 isn’t going anywhereA reader argues that the original Switch will still be relevant even after the Switch 2 launches, and that for some it will be the preferred choice.
    I haven’t been playing games as much as I did, say, three years ago, mainly because I’ve found interest in other things, such as reading and creating content. However, I still delve into games and my love for Nintendo is still there, but I did consider parting with some of my gaming collection – which is mostly a curated list of mainly Nintendo games and consoles.
    I did see the announcement of the Switch 2 in early April and initially I was hyped for it but I think that has subsided somewhat, mainly due to the pricing of both the consoles and games; I am still going to be receiving it day one though.
    I don’t think Nintendo has done themselves any favours though and the landscape has changed, with regards to mobile gaming in general, with the advent of the Steam Deck and other options from different manufacturers which makes this a crowded market.I find myself purchasing games on Steam vs. Sony, Microsoft, and Nintendo. In fact, I ended up parting ways with my Xbox Series X and am considering the same with my PlayStation 5, as I mainly play games in portable form, with the Steam Deck and Switch being enough for me. With Nintendo it is mainly the first party titles that I would purchase on Switch 2, but it will make me think twice due to the price tag on the gamesand with Nintendo the pricing of their games don’t really go on sale that much, if at all.
    I know a lot of people are still considering getting rid of their original Switch in favour of the Switch 2, however I think it is still relevant in 2025 and beyond.
    Games, Games, Games
    With over 10,000 games, the Switch has a diverse library of titles. I love the fact the I have a big and robust library of physical games that I can play for years to come. The pricing on new games are anywhere between £25 to £50, with Zelda being the exception at £60 to £70. A lot of third party games you can pick up on sale. A lot of games are physical and most come with the game on the actual cartridge, so even in the future, if Nintendo decide to pull the eShop for the original Switch, you can still play games offline.
    Games are still being released for the original Nintendo Switch for the foreseeable future. It will stop being supported one day but there is still plenty to choose from, both used, digital, and new. I truly believe that the Switch 2 won’t be as popular as the first Switch, mainly due to pricing £60+ on games and switching their strategy on physical games, with partial downloads or game key cards, which in theory is easily shareable but having to download the entire game isn’t the most user friendly and there is still a reliance on the digital ecosystem.
    Backwards Compatibility
    Watching a YouTube video by ModernVintageGamer, I’ve come to learn that backwards compatibility with Switch 2 isn’t all it is cracked up to be. Nintendo is fully supporting backwards compatibility with most of their games, however third parties are left to patch games on their own discretion due to different system architecture in comparison to the original Switch. So it will be a bit hit and miss, more than likely they would rather release another ‘remastered’ version which they can sell to consumers again, rather than patch games. Also, bearing in mind some publishers don’t want the costs associated with patching a game.
    Different consoles
    At this stage in the original Switch’s lifecycle there are a bunch of form factors to choose from. I have all three and use them in different environments; my Switch OLED gets used at home in portable mode and connected to the TV, while the original Switch is good for family party gaming, which I take around for family gatherings.
    The Switch Lite is small and portable and that it is great for single-player games with the cross-key but also great for travelling and going on holidays. You can pick up the Switch Lite for dirt cheap now, used, and I expect prices to fall further whilst they clear stock.
    Simultaneous play
    I haven’t seen too much details around this but Nintendo did announce original Switch compatibility with the Nintendo Switch 2 to allow for simultaneous multiplayer gaming with one cartridge, so that Nintendo Switch 2 acts as the mainconsole whilst the original Switch can be used for multiplayer gaming. So in essence you can all play Mario Kart from one Switch 2 console, by having your own screen, similar to the Wii U. I think this will be valuable for me with family gatherings, as most of us have Switches.
    Cost
    So, I did mention costs for games earlier. However, as the original Switch has matured there are a plethora of cheap accessories that can be had on the cheap, compared to Switch 2, such as extra Joy-Cons, controllers, games, cheap microSD cards, plus others.
    Best Nintendo console?
    I still love my Switch, and it won’t be going anywhere, and I think it is Nintendo’s best console in the past 20 years. I have a special place in my heart for the NES, SNES, Game Boy and GameCube, as being S-tier consoles but I think the Switch could be argued as being their best console. Ask me on a random day and my answer will probably change, because Nintendo have created timeless consoles as far as I am concerned, so it is difficult to choose one. But the original Switch makes a compelling choice especially for the younger generation.

    More Trending

    By reader wetbandit

    Not everyone’s going to jump in straight awayThe reader’s features do not necessarily represent the views of GameCentral or Metro.
    You can submit your own 500 to 600-word reader feature at any time, which if used will be published in the next appropriate weekend slot. Just contact us at gamecentral@metro.co.uk or use our Submit Stuff page and you won’t need to send an email.

    GameCentral
    Sign up for exclusive analysis, latest releases, and bonus community content.
    This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply. Your information will be used in line with our Privacy Policy
    #original #switch #still #better #option
    The original Switch is still a better option than the Switch 2 – Reader’s Feature
    The original Switch is still a better option than the Switch 2 – Reader’s Feature GameCentral Published June 1, 2025 1:00am The Switch 1 isn’t going anywhereA reader argues that the original Switch will still be relevant even after the Switch 2 launches, and that for some it will be the preferred choice. I haven’t been playing games as much as I did, say, three years ago, mainly because I’ve found interest in other things, such as reading and creating content. However, I still delve into games and my love for Nintendo is still there, but I did consider parting with some of my gaming collection – which is mostly a curated list of mainly Nintendo games and consoles. I did see the announcement of the Switch 2 in early April and initially I was hyped for it but I think that has subsided somewhat, mainly due to the pricing of both the consoles and games; I am still going to be receiving it day one though. I don’t think Nintendo has done themselves any favours though and the landscape has changed, with regards to mobile gaming in general, with the advent of the Steam Deck and other options from different manufacturers which makes this a crowded market.I find myself purchasing games on Steam vs. Sony, Microsoft, and Nintendo. In fact, I ended up parting ways with my Xbox Series X and am considering the same with my PlayStation 5, as I mainly play games in portable form, with the Steam Deck and Switch being enough for me. With Nintendo it is mainly the first party titles that I would purchase on Switch 2, but it will make me think twice due to the price tag on the gamesand with Nintendo the pricing of their games don’t really go on sale that much, if at all. I know a lot of people are still considering getting rid of their original Switch in favour of the Switch 2, however I think it is still relevant in 2025 and beyond. Games, Games, Games With over 10,000 games, the Switch has a diverse library of titles. I love the fact the I have a big and robust library of physical games that I can play for years to come. The pricing on new games are anywhere between £25 to £50, with Zelda being the exception at £60 to £70. A lot of third party games you can pick up on sale. A lot of games are physical and most come with the game on the actual cartridge, so even in the future, if Nintendo decide to pull the eShop for the original Switch, you can still play games offline. Games are still being released for the original Nintendo Switch for the foreseeable future. It will stop being supported one day but there is still plenty to choose from, both used, digital, and new. I truly believe that the Switch 2 won’t be as popular as the first Switch, mainly due to pricing £60+ on games and switching their strategy on physical games, with partial downloads or game key cards, which in theory is easily shareable but having to download the entire game isn’t the most user friendly and there is still a reliance on the digital ecosystem. Backwards Compatibility Watching a YouTube video by ModernVintageGamer, I’ve come to learn that backwards compatibility with Switch 2 isn’t all it is cracked up to be. Nintendo is fully supporting backwards compatibility with most of their games, however third parties are left to patch games on their own discretion due to different system architecture in comparison to the original Switch. So it will be a bit hit and miss, more than likely they would rather release another ‘remastered’ version which they can sell to consumers again, rather than patch games. Also, bearing in mind some publishers don’t want the costs associated with patching a game. Different consoles At this stage in the original Switch’s lifecycle there are a bunch of form factors to choose from. I have all three and use them in different environments; my Switch OLED gets used at home in portable mode and connected to the TV, while the original Switch is good for family party gaming, which I take around for family gatherings. The Switch Lite is small and portable and that it is great for single-player games with the cross-key but also great for travelling and going on holidays. You can pick up the Switch Lite for dirt cheap now, used, and I expect prices to fall further whilst they clear stock. Simultaneous play I haven’t seen too much details around this but Nintendo did announce original Switch compatibility with the Nintendo Switch 2 to allow for simultaneous multiplayer gaming with one cartridge, so that Nintendo Switch 2 acts as the mainconsole whilst the original Switch can be used for multiplayer gaming. So in essence you can all play Mario Kart from one Switch 2 console, by having your own screen, similar to the Wii U. I think this will be valuable for me with family gatherings, as most of us have Switches. Cost So, I did mention costs for games earlier. However, as the original Switch has matured there are a plethora of cheap accessories that can be had on the cheap, compared to Switch 2, such as extra Joy-Cons, controllers, games, cheap microSD cards, plus others. Best Nintendo console? I still love my Switch, and it won’t be going anywhere, and I think it is Nintendo’s best console in the past 20 years. I have a special place in my heart for the NES, SNES, Game Boy and GameCube, as being S-tier consoles but I think the Switch could be argued as being their best console. Ask me on a random day and my answer will probably change, because Nintendo have created timeless consoles as far as I am concerned, so it is difficult to choose one. But the original Switch makes a compelling choice especially for the younger generation. More Trending By reader wetbandit Not everyone’s going to jump in straight awayThe reader’s features do not necessarily represent the views of GameCentral or Metro. You can submit your own 500 to 600-word reader feature at any time, which if used will be published in the next appropriate weekend slot. Just contact us at gamecentral@metro.co.uk or use our Submit Stuff page and you won’t need to send an email. GameCentral Sign up for exclusive analysis, latest releases, and bonus community content. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply. Your information will be used in line with our Privacy Policy #original #switch #still #better #option
    METRO.CO.UK
    The original Switch is still a better option than the Switch 2 – Reader’s Feature
    The original Switch is still a better option than the Switch 2 – Reader’s Feature GameCentral Published June 1, 2025 1:00am The Switch 1 isn’t going anywhere (Nintendo) A reader argues that the original Switch will still be relevant even after the Switch 2 launches, and that for some it will be the preferred choice. I haven’t been playing games as much as I did, say, three years ago, mainly because I’ve found interest in other things, such as reading and creating content. However, I still delve into games and my love for Nintendo is still there, but I did consider parting with some of my gaming collection – which is mostly a curated list of mainly Nintendo games and consoles. I did see the announcement of the Switch 2 in early April and initially I was hyped for it but I think that has subsided somewhat, mainly due to the pricing of both the consoles and games; I am still going to be receiving it day one though. I don’t think Nintendo has done themselves any favours though and the landscape has changed, with regards to mobile gaming in general, with the advent of the Steam Deck and other options from different manufacturers which makes this a crowded market. [The Steam Deck has only sold around 4 million units worldwide, compared to over 150 million for the Switch, and yet it’s still the most successful of the PC handhelds – GC] I find myself purchasing games on Steam vs. Sony, Microsoft, and Nintendo. In fact, I ended up parting ways with my Xbox Series X and am considering the same with my PlayStation 5, as I mainly play games in portable form, with the Steam Deck and Switch being enough for me. With Nintendo it is mainly the first party titles that I would purchase on Switch 2, but it will make me think twice due to the price tag on the games (£60+) and with Nintendo the pricing of their games don’t really go on sale that much, if at all. I know a lot of people are still considering getting rid of their original Switch in favour of the Switch 2, however I think it is still relevant in 2025 and beyond. Games, Games, Games With over 10,000 games, the Switch has a diverse library of titles. I love the fact the I have a big and robust library of physical games that I can play for years to come. The pricing on new games are anywhere between £25 to £50, with Zelda being the exception at £60 to £70. A lot of third party games you can pick up on sale. A lot of games are physical and most come with the game on the actual cartridge, so even in the future, if Nintendo decide to pull the eShop for the original Switch, you can still play games offline. Games are still being released for the original Nintendo Switch for the foreseeable future. It will stop being supported one day but there is still plenty to choose from, both used, digital, and new. I truly believe that the Switch 2 won’t be as popular as the first Switch, mainly due to pricing £60+ on games and switching their strategy on physical games, with partial downloads or game key cards, which in theory is easily shareable but having to download the entire game isn’t the most user friendly and there is still a reliance on the digital ecosystem. Backwards Compatibility Watching a YouTube video by ModernVintageGamer, I’ve come to learn that backwards compatibility with Switch 2 isn’t all it is cracked up to be. Nintendo is fully supporting backwards compatibility with most of their games, however third parties are left to patch games on their own discretion due to different system architecture in comparison to the original Switch. So it will be a bit hit and miss, more than likely they would rather release another ‘remastered’ version which they can sell to consumers again, rather than patch games. Also, bearing in mind some publishers don’t want the costs associated with patching a game. Different consoles At this stage in the original Switch’s lifecycle there are a bunch of form factors to choose from. I have all three and use them in different environments; my Switch OLED gets used at home in portable mode and connected to the TV, while the original Switch is good for family party gaming, which I take around for family gatherings. The Switch Lite is small and portable and that it is great for single-player games with the cross-key but also great for travelling and going on holidays. You can pick up the Switch Lite for dirt cheap now, used, and I expect prices to fall further whilst they clear stock. Simultaneous play I haven’t seen too much details around this but Nintendo did announce original Switch compatibility with the Nintendo Switch 2 to allow for simultaneous multiplayer gaming with one cartridge, so that Nintendo Switch 2 acts as the main (host) console whilst the original Switch can be used for multiplayer gaming. So in essence you can all play Mario Kart from one Switch 2 console, by having your own screen, similar to the Wii U. I think this will be valuable for me with family gatherings, as most of us have Switches. Cost So, I did mention costs for games earlier. However, as the original Switch has matured there are a plethora of cheap accessories that can be had on the cheap, compared to Switch 2, such as extra Joy-Cons, controllers, games, cheap microSD cards, plus others. Best Nintendo console? I still love my Switch, and it won’t be going anywhere, and I think it is Nintendo’s best console in the past 20 years. I have a special place in my heart for the NES, SNES, Game Boy and GameCube, as being S-tier consoles but I think the Switch could be argued as being their best console. Ask me on a random day and my answer will probably change, because Nintendo have created timeless consoles as far as I am concerned, so it is difficult to choose one. But the original Switch makes a compelling choice especially for the younger generation. More Trending By reader wetbandit Not everyone’s going to jump in straight away (Nintendo) The reader’s features do not necessarily represent the views of GameCentral or Metro. You can submit your own 500 to 600-word reader feature at any time, which if used will be published in the next appropriate weekend slot. Just contact us at gamecentral@metro.co.uk or use our Submit Stuff page and you won’t need to send an email. GameCentral Sign up for exclusive analysis, latest releases, and bonus community content. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply. Your information will be used in line with our Privacy Policy
    0 Yorumlar 0 hisse senetleri
  • AI to monitor NYC subway safety as crime concerns rise

    Tech AI to monitor NYC subway safety as crime concerns rise AI-powered surveillance aims to prevent crime before it happens in Big Apple’s subway system
    Published
    May 23, 2025 6:00am EDT close 'Decoding Broken Hearts': AI used to advance heart health research Fox News anchor Bret Baier has the latest on the Murdoch Children's Research Institute's partnership with the Gladstone Institutes for the "Decoding Broken Hearts" initiative on "Special Report." Imagine having a tireless guardian watching over you during your subway commute. It notices every detail with steady focus, all with one goal in mind: keeping you safe on the subway.New York City's subway system is testing artificial intelligence to boost security and reduce crime. Michael Kemper, a 33-year NYPD veteran and the chief security officer for the Metropolitan Transportation Authority, which is the largest transit agency in the United States, is leading the rollout of AI software designed to spot suspicious behavior as it happens. The MTA says this technology represents the future of subway surveillance and reassures riders that privacy concerns are being taken seriously.JOIN THE FREE ‘CYBERGUY REPORT’: GET MY EXPERT TECH TIPS, CRITICAL SECURITY ALERTS AND EXCLUSIVE DEALS, PLUS INSTANT ACCESS TO MY FREE ‘ULTIMATE SCAM SURVIVAL GUIDE’ WHEN YOU SIGN UP! New York City subwayWHAT IS ARTIFICIAL INTELLIGENCE?How AI surveillance will work in the New York City SubwayThe AI system will analyze real-time camera feeds across subway platforms and train cars to detect unusual or potentially dangerous behaviors. Instead of identifying individuals, the technology focuses on behavior patterns that might signal trouble, such as erratic movements or confrontations. When the AI flags something suspicious, it can alert transit police to respond quickly, which could help prevent crimes before they escalate.Currently, about 40% of subway cameras are monitored live by staff. The AI aims to expand this coverage without needing additional personnel, which could enhance safety across the system. While details about the AI providers and full deployment timelines have not been shared, the MTA emphasizes that facial recognition technology will not be part of this system. This is intended to protect rider privacy. A surveillance camera mounted on a buildingCrime trends and government responseCrime in NYC subways has seen ups and downs over recent years. While major crimes dropped by about 7.7% through mid-2024, assaults have unfortunately increased. To bolster safety, New York Gov. Kathy Hochul deployed 1,000 National Guard members to support transit police efforts. AI technology is viewed as a complementary tool in this broader strategy to keep subways safe, not a standalone solution.'DELUSIONAL' NYC POLITICIANS CALLED OUT BY GUARDIAN ANGELS FOUNDER OVER SUBWAY VIOLENCE: 'SLAP IN THE FACE' A police vehicleIs AI being used in public transit elsewhere?New York is not alone in exploring AI for transit security. Cities like Los Angeles and Chicago have experimented with AI-powered cameras for tasks ranging from weapons detection to issuing parking citations. These initiatives reflect a growing interest in using technology to enhance public safety in transit environments. Entrance to NYC subwayKurt's key takeawaysWhile the promise of AI surveillance is encouraging, several questions remain unanswered. We do not yet know exactly which behaviors the system will flag or how effective it will be in practice. Perhaps more importantly, privacy advocates and civil liberties groups warn about potential biases in AI systems and the risk of false positives that could unfairly target certain groups.The MTA's decision to exclude facial recognition is a positive step, but ongoing transparency and oversight will be crucial. Michael Kemper's extensive experience leading the NYPD's Transit Bureau, where he helped reduce subway crime, adds credibility to the initiative. Still, as this technology rolls out, balancing safety with privacy and fairness will be key to earning public trust.CLICK HERE TO GET THE FOX NEWS APPWould you trust AI to watch over you in the subway or are you more concerned about your privacy? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    #monitor #nyc #subway #safety #crime
    AI to monitor NYC subway safety as crime concerns rise
    Tech AI to monitor NYC subway safety as crime concerns rise AI-powered surveillance aims to prevent crime before it happens in Big Apple’s subway system Published May 23, 2025 6:00am EDT close 'Decoding Broken Hearts': AI used to advance heart health research Fox News anchor Bret Baier has the latest on the Murdoch Children's Research Institute's partnership with the Gladstone Institutes for the "Decoding Broken Hearts" initiative on "Special Report." Imagine having a tireless guardian watching over you during your subway commute. It notices every detail with steady focus, all with one goal in mind: keeping you safe on the subway.New York City's subway system is testing artificial intelligence to boost security and reduce crime. Michael Kemper, a 33-year NYPD veteran and the chief security officer for the Metropolitan Transportation Authority, which is the largest transit agency in the United States, is leading the rollout of AI software designed to spot suspicious behavior as it happens. The MTA says this technology represents the future of subway surveillance and reassures riders that privacy concerns are being taken seriously.JOIN THE FREE ‘CYBERGUY REPORT’: GET MY EXPERT TECH TIPS, CRITICAL SECURITY ALERTS AND EXCLUSIVE DEALS, PLUS INSTANT ACCESS TO MY FREE ‘ULTIMATE SCAM SURVIVAL GUIDE’ WHEN YOU SIGN UP! New York City subwayWHAT IS ARTIFICIAL INTELLIGENCE?How AI surveillance will work in the New York City SubwayThe AI system will analyze real-time camera feeds across subway platforms and train cars to detect unusual or potentially dangerous behaviors. Instead of identifying individuals, the technology focuses on behavior patterns that might signal trouble, such as erratic movements or confrontations. When the AI flags something suspicious, it can alert transit police to respond quickly, which could help prevent crimes before they escalate.Currently, about 40% of subway cameras are monitored live by staff. The AI aims to expand this coverage without needing additional personnel, which could enhance safety across the system. While details about the AI providers and full deployment timelines have not been shared, the MTA emphasizes that facial recognition technology will not be part of this system. This is intended to protect rider privacy. A surveillance camera mounted on a buildingCrime trends and government responseCrime in NYC subways has seen ups and downs over recent years. While major crimes dropped by about 7.7% through mid-2024, assaults have unfortunately increased. To bolster safety, New York Gov. Kathy Hochul deployed 1,000 National Guard members to support transit police efforts. AI technology is viewed as a complementary tool in this broader strategy to keep subways safe, not a standalone solution.'DELUSIONAL' NYC POLITICIANS CALLED OUT BY GUARDIAN ANGELS FOUNDER OVER SUBWAY VIOLENCE: 'SLAP IN THE FACE' A police vehicleIs AI being used in public transit elsewhere?New York is not alone in exploring AI for transit security. Cities like Los Angeles and Chicago have experimented with AI-powered cameras for tasks ranging from weapons detection to issuing parking citations. These initiatives reflect a growing interest in using technology to enhance public safety in transit environments. Entrance to NYC subwayKurt's key takeawaysWhile the promise of AI surveillance is encouraging, several questions remain unanswered. We do not yet know exactly which behaviors the system will flag or how effective it will be in practice. Perhaps more importantly, privacy advocates and civil liberties groups warn about potential biases in AI systems and the risk of false positives that could unfairly target certain groups.The MTA's decision to exclude facial recognition is a positive step, but ongoing transparency and oversight will be crucial. Michael Kemper's extensive experience leading the NYPD's Transit Bureau, where he helped reduce subway crime, adds credibility to the initiative. Still, as this technology rolls out, balancing safety with privacy and fairness will be key to earning public trust.CLICK HERE TO GET THE FOX NEWS APPWould you trust AI to watch over you in the subway or are you more concerned about your privacy? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #monitor #nyc #subway #safety #crime
    WWW.FOXNEWS.COM
    AI to monitor NYC subway safety as crime concerns rise
    Tech AI to monitor NYC subway safety as crime concerns rise AI-powered surveillance aims to prevent crime before it happens in Big Apple’s subway system Published May 23, 2025 6:00am EDT close 'Decoding Broken Hearts': AI used to advance heart health research Fox News anchor Bret Baier has the latest on the Murdoch Children's Research Institute's partnership with the Gladstone Institutes for the "Decoding Broken Hearts" initiative on "Special Report." Imagine having a tireless guardian watching over you during your subway commute. It notices every detail with steady focus, all with one goal in mind: keeping you safe on the subway.New York City's subway system is testing artificial intelligence to boost security and reduce crime. Michael Kemper, a 33-year NYPD veteran and the chief security officer for the Metropolitan Transportation Authority (MTA), which is the largest transit agency in the United States, is leading the rollout of AI software designed to spot suspicious behavior as it happens. The MTA says this technology represents the future of subway surveillance and reassures riders that privacy concerns are being taken seriously.JOIN THE FREE ‘CYBERGUY REPORT’: GET MY EXPERT TECH TIPS, CRITICAL SECURITY ALERTS AND EXCLUSIVE DEALS, PLUS INSTANT ACCESS TO MY FREE ‘ULTIMATE SCAM SURVIVAL GUIDE’ WHEN YOU SIGN UP! New York City subway (Kurt "CyberGuy" Knutsson)WHAT IS ARTIFICIAL INTELLIGENCE (AI)?How AI surveillance will work in the New York City SubwayThe AI system will analyze real-time camera feeds across subway platforms and train cars to detect unusual or potentially dangerous behaviors. Instead of identifying individuals, the technology focuses on behavior patterns that might signal trouble, such as erratic movements or confrontations. When the AI flags something suspicious, it can alert transit police to respond quickly, which could help prevent crimes before they escalate.Currently, about 40% of subway cameras are monitored live by staff. The AI aims to expand this coverage without needing additional personnel, which could enhance safety across the system. While details about the AI providers and full deployment timelines have not been shared, the MTA emphasizes that facial recognition technology will not be part of this system. This is intended to protect rider privacy. A surveillance camera mounted on a building (Kurt "CyberGuy" Knutsson)Crime trends and government responseCrime in NYC subways has seen ups and downs over recent years. While major crimes dropped by about 7.7% through mid-2024, assaults have unfortunately increased. To bolster safety, New York Gov. Kathy Hochul deployed 1,000 National Guard members to support transit police efforts. AI technology is viewed as a complementary tool in this broader strategy to keep subways safe, not a standalone solution.'DELUSIONAL' NYC POLITICIANS CALLED OUT BY GUARDIAN ANGELS FOUNDER OVER SUBWAY VIOLENCE: 'SLAP IN THE FACE' A police vehicle (Kurt "CyberGuy" Knutsson)Is AI being used in public transit elsewhere?New York is not alone in exploring AI for transit security. Cities like Los Angeles and Chicago have experimented with AI-powered cameras for tasks ranging from weapons detection to issuing parking citations. These initiatives reflect a growing interest in using technology to enhance public safety in transit environments. Entrance to NYC subway (Kurt "CyberGuy" Knutsson)Kurt's key takeawaysWhile the promise of AI surveillance is encouraging, several questions remain unanswered. We do not yet know exactly which behaviors the system will flag or how effective it will be in practice. Perhaps more importantly, privacy advocates and civil liberties groups warn about potential biases in AI systems and the risk of false positives that could unfairly target certain groups.The MTA's decision to exclude facial recognition is a positive step, but ongoing transparency and oversight will be crucial. Michael Kemper's extensive experience leading the NYPD's Transit Bureau, where he helped reduce subway crime, adds credibility to the initiative. Still, as this technology rolls out, balancing safety with privacy and fairness will be key to earning public trust.CLICK HERE TO GET THE FOX NEWS APPWould you trust AI to watch over you in the subway or are you more concerned about your privacy? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Yorumlar 0 hisse senetleri
  • Android scam lets hackers use your credit card remotely

    Published
    May 20, 2025 10:00am EDT close Google's AI unleashes new powerful scam-busting features for Android The CyberGuy explains steps you can take to protect yourself from scams. Scammers are always coming up with new tricks. Just when you start feeling confident about spotting phishing emails, suspicious links and fake banking apps, they find a new angle. Lately, they have been getting more creative, turning to the built-in features of our phones to pull off their schemes. One of the latest targets is NFC, the technology behind tap-to-pay. It might seem harmless, but a new scam is using it in ways most people would never expect. An Android malware called SuperCard goes beyond just stealing your card details. It gives attackers the ability to use your card remotely for real transactions. And the worst part is that it all begins with something as simple as a text message. An Android phoneWhat makes SuperCard X different?SuperCard X stands out from other Android malware because of how it operates. As reported by researchers at Cleafy, instead of stealing usernames, passwords or verification codes, it uses a method called NFC relay. This allows attackers to copy card data from a victim's device in real time and use it elsewhere to make payments or withdraw cash. The process does not require physical access to the card or knowledge of the PIN.The malware is offered through a Malware-as-a-Service model, which means different cybercriminals can use it in their own regions. This makes the threat more scalable and harder to contain. Unlike most banking trojans, SuperCard X is not focused on one specific institution. It targets any cardholder regardless of which bank issued their card.Another key difference is how stealthy the malware is. It uses minimal permissions and does not include extra features that would make it easier to detect. This lean approach helps it avoid detection by antivirus software and allows it to operate quietly on infected devices. SuperCardX fully undetectableHow the scam worksThe fraud begins with a message sent through SMS or WhatsApp. It pretends to be from a bank and warns the recipient about a suspicious transaction. The message includes a phone number and urges the person to call to resolve the issue. This is the first step in gaining the victim's trust.Once on the phone, the attacker poses as a bank representative and walks the victim through a fake security process. This may include asking them to confirm personal details or adjust settings in their mobile banking app, such as removing spending limits on their card.Next, the attacker asks the victim to install a mobile app that is described as a tool to verify the account or enhance security. In reality, this app contains the SuperCard X malware. After the installation, the attacker instructs the victim to tap their card against the phone. The malware then captures the NFC data from the card and sends it to a second phone controlled by the attacker.Using the copied data, the attacker can make contactless payments or make ATM withdrawals almost instantly. This method allows them to steal funds quickly and leaves little opportunity for banks or victims to intervene in time. A woman scrolling on her phone8 ways you can stay safe from SuperCard X malware1) Be cautious of suspicious texts and calls. Use strong antivirus software: Fraudulent campaigns often begin with an SMS or call that seems to come from your bank. These messages usually claim there's suspicious activity on your account and urge you to click a link or dial a number to resolve the issue. However, this is a tactic used to gain access to your personal information. Always approach such messages with skepticism.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.2) Avoid installing apps from untrusted sources: One of the key ways malware like SuperCard X spreads is through deceptive apps that victims are persuaded to install. These apps often look harmless, posing as tools for security or account verification. If you receive a link to download an app via SMS, email or messaging apps like WhatsApp, do not click on it. Instead, only download apps from trusted sources, such as the Google Play Store. Additionally, carefully review app permissions and avoid granting unnecessary access, particularly to sensitive data like NFC, location or personal contacts.3) Turn off NFC when not in use: NFC, or Near Field Communication, is a useful feature that allows contactless payments and data exchanges. However, it can be exploited by attackers to capture your card information without you even realizing it. To minimize your risk of falling victim to NFC-based malware like SuperCard X, turn off NFC when you're not actively using it. On most Android devices, you can do this by going to "Settings," then "Connected Devices" or "Connection Preferences," where you’ll find the NFC toggle. By disabling NFC, your phone won't transmit data wirelessly, which helps protect your payment card information from being stolen by nearby attackers.4) Keep a close eye on your bank accounts and cards: If your device has come into contact with the SuperCard or anything similar, it’s possible your banking details are already compromised. That’s why it’s important to regularly check your transaction history for anything odd, like a small payment you don’t remember making or a charge from a strange location could be a sign of misuse. If you spot anything suspicious, report it to your bank right away. It’s also worth checking your credit reports every now and then to catch signs of identity theft before they snowball into bigger issues.5) Use a personal data removal service: If scammers have targeted you once, there's a higher chance they’ll try again, especially if your personal detailsare easily found online. Data removal services scan people-search sites and brokers, then request the removal of your info. This reduces your exposure and helps prevent future phishing or social engineering attacks.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here.6) Contact your bank and freeze your cards: If you think you’ve tapped or handled a suspicious card, or if your phone acted strangely afterward, don’t brush it off. Call your bank and let them know what happened. They can freeze your card to stop any unauthorized payments and issue a new one for added safety. You should also ask them to monitor your account more closely for a while. On top of that, place a fraud alert with a credit bureau so no one can easily open a new line of credit in your name.7) Consider enrolling in identity theft protection services: If you've been targeted by a sophisticated scam like SuperCard X, there's a chance your personal information, not just your card data, may be at risk. Identity theft companies can monitor personal information, like your Social Security number, phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft.8) Report the scam to your national cybercrime authority: Whether or not you lost money, reporting the scam helps authorities track emerging threats and warn others. You can report such fraud to the FBI’s Internet Crime Complaint Center or the Federal Trade Commission. Your report could help catch the people behind the scam or at least shut down their infrastructure.Kurt’s key takeawayThe SuperCard X malware campaign represents a significant shift in how cybercriminals are targeting individuals and financial institutions. By exploiting NFC technology and combining it with social engineering tactics, attackers have found a way to bypass traditional fraud detection systems. What's especially concerning is how quickly these attacks unfold, making them harder to detect before the damage is done. As this threat evolves, it's important for both consumers and institutions to recognize the potential risks of these multilayered fraud strategies.Do you think Google is doing enough to protect you from malware? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    #android #scam #lets #hackers #use
    Android scam lets hackers use your credit card remotely
    Published May 20, 2025 10:00am EDT close Google's AI unleashes new powerful scam-busting features for Android The CyberGuy explains steps you can take to protect yourself from scams. Scammers are always coming up with new tricks. Just when you start feeling confident about spotting phishing emails, suspicious links and fake banking apps, they find a new angle. Lately, they have been getting more creative, turning to the built-in features of our phones to pull off their schemes. One of the latest targets is NFC, the technology behind tap-to-pay. It might seem harmless, but a new scam is using it in ways most people would never expect. An Android malware called SuperCard goes beyond just stealing your card details. It gives attackers the ability to use your card remotely for real transactions. And the worst part is that it all begins with something as simple as a text message. An Android phoneWhat makes SuperCard X different?SuperCard X stands out from other Android malware because of how it operates. As reported by researchers at Cleafy, instead of stealing usernames, passwords or verification codes, it uses a method called NFC relay. This allows attackers to copy card data from a victim's device in real time and use it elsewhere to make payments or withdraw cash. The process does not require physical access to the card or knowledge of the PIN.The malware is offered through a Malware-as-a-Service model, which means different cybercriminals can use it in their own regions. This makes the threat more scalable and harder to contain. Unlike most banking trojans, SuperCard X is not focused on one specific institution. It targets any cardholder regardless of which bank issued their card.Another key difference is how stealthy the malware is. It uses minimal permissions and does not include extra features that would make it easier to detect. This lean approach helps it avoid detection by antivirus software and allows it to operate quietly on infected devices. SuperCardX fully undetectableHow the scam worksThe fraud begins with a message sent through SMS or WhatsApp. It pretends to be from a bank and warns the recipient about a suspicious transaction. The message includes a phone number and urges the person to call to resolve the issue. This is the first step in gaining the victim's trust.Once on the phone, the attacker poses as a bank representative and walks the victim through a fake security process. This may include asking them to confirm personal details or adjust settings in their mobile banking app, such as removing spending limits on their card.Next, the attacker asks the victim to install a mobile app that is described as a tool to verify the account or enhance security. In reality, this app contains the SuperCard X malware. After the installation, the attacker instructs the victim to tap their card against the phone. The malware then captures the NFC data from the card and sends it to a second phone controlled by the attacker.Using the copied data, the attacker can make contactless payments or make ATM withdrawals almost instantly. This method allows them to steal funds quickly and leaves little opportunity for banks or victims to intervene in time. A woman scrolling on her phone8 ways you can stay safe from SuperCard X malware1) Be cautious of suspicious texts and calls. Use strong antivirus software: Fraudulent campaigns often begin with an SMS or call that seems to come from your bank. These messages usually claim there's suspicious activity on your account and urge you to click a link or dial a number to resolve the issue. However, this is a tactic used to gain access to your personal information. Always approach such messages with skepticism.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.2) Avoid installing apps from untrusted sources: One of the key ways malware like SuperCard X spreads is through deceptive apps that victims are persuaded to install. These apps often look harmless, posing as tools for security or account verification. If you receive a link to download an app via SMS, email or messaging apps like WhatsApp, do not click on it. Instead, only download apps from trusted sources, such as the Google Play Store. Additionally, carefully review app permissions and avoid granting unnecessary access, particularly to sensitive data like NFC, location or personal contacts.3) Turn off NFC when not in use: NFC, or Near Field Communication, is a useful feature that allows contactless payments and data exchanges. However, it can be exploited by attackers to capture your card information without you even realizing it. To minimize your risk of falling victim to NFC-based malware like SuperCard X, turn off NFC when you're not actively using it. On most Android devices, you can do this by going to "Settings," then "Connected Devices" or "Connection Preferences," where you’ll find the NFC toggle. By disabling NFC, your phone won't transmit data wirelessly, which helps protect your payment card information from being stolen by nearby attackers.4) Keep a close eye on your bank accounts and cards: If your device has come into contact with the SuperCard or anything similar, it’s possible your banking details are already compromised. That’s why it’s important to regularly check your transaction history for anything odd, like a small payment you don’t remember making or a charge from a strange location could be a sign of misuse. If you spot anything suspicious, report it to your bank right away. It’s also worth checking your credit reports every now and then to catch signs of identity theft before they snowball into bigger issues.5) Use a personal data removal service: If scammers have targeted you once, there's a higher chance they’ll try again, especially if your personal detailsare easily found online. Data removal services scan people-search sites and brokers, then request the removal of your info. This reduces your exposure and helps prevent future phishing or social engineering attacks.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here.6) Contact your bank and freeze your cards: If you think you’ve tapped or handled a suspicious card, or if your phone acted strangely afterward, don’t brush it off. Call your bank and let them know what happened. They can freeze your card to stop any unauthorized payments and issue a new one for added safety. You should also ask them to monitor your account more closely for a while. On top of that, place a fraud alert with a credit bureau so no one can easily open a new line of credit in your name.7) Consider enrolling in identity theft protection services: If you've been targeted by a sophisticated scam like SuperCard X, there's a chance your personal information, not just your card data, may be at risk. Identity theft companies can monitor personal information, like your Social Security number, phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft.8) Report the scam to your national cybercrime authority: Whether or not you lost money, reporting the scam helps authorities track emerging threats and warn others. You can report such fraud to the FBI’s Internet Crime Complaint Center or the Federal Trade Commission. Your report could help catch the people behind the scam or at least shut down their infrastructure.Kurt’s key takeawayThe SuperCard X malware campaign represents a significant shift in how cybercriminals are targeting individuals and financial institutions. By exploiting NFC technology and combining it with social engineering tactics, attackers have found a way to bypass traditional fraud detection systems. What's especially concerning is how quickly these attacks unfold, making them harder to detect before the damage is done. As this threat evolves, it's important for both consumers and institutions to recognize the potential risks of these multilayered fraud strategies.Do you think Google is doing enough to protect you from malware? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #android #scam #lets #hackers #use
    WWW.FOXNEWS.COM
    Android scam lets hackers use your credit card remotely
    Published May 20, 2025 10:00am EDT close Google's AI unleashes new powerful scam-busting features for Android The CyberGuy explains steps you can take to protect yourself from scams. Scammers are always coming up with new tricks. Just when you start feeling confident about spotting phishing emails, suspicious links and fake banking apps, they find a new angle. Lately, they have been getting more creative, turning to the built-in features of our phones to pull off their schemes. One of the latest targets is NFC, the technology behind tap-to-pay. It might seem harmless, but a new scam is using it in ways most people would never expect. An Android malware called SuperCard goes beyond just stealing your card details. It gives attackers the ability to use your card remotely for real transactions. And the worst part is that it all begins with something as simple as a text message. An Android phone (Kurt "CyberGuy" Knutsson)What makes SuperCard X different?SuperCard X stands out from other Android malware because of how it operates. As reported by researchers at Cleafy, instead of stealing usernames, passwords or verification codes, it uses a method called NFC relay. This allows attackers to copy card data from a victim's device in real time and use it elsewhere to make payments or withdraw cash. The process does not require physical access to the card or knowledge of the PIN.The malware is offered through a Malware-as-a-Service model, which means different cybercriminals can use it in their own regions. This makes the threat more scalable and harder to contain. Unlike most banking trojans, SuperCard X is not focused on one specific institution. It targets any cardholder regardless of which bank issued their card.Another key difference is how stealthy the malware is. It uses minimal permissions and does not include extra features that would make it easier to detect. This lean approach helps it avoid detection by antivirus software and allows it to operate quietly on infected devices. SuperCardX fully undetectable (FUD | Cleafy) (Kurt "CyberGuy" Knutsson)How the scam worksThe fraud begins with a message sent through SMS or WhatsApp. It pretends to be from a bank and warns the recipient about a suspicious transaction. The message includes a phone number and urges the person to call to resolve the issue. This is the first step in gaining the victim's trust.Once on the phone, the attacker poses as a bank representative and walks the victim through a fake security process. This may include asking them to confirm personal details or adjust settings in their mobile banking app, such as removing spending limits on their card.Next, the attacker asks the victim to install a mobile app that is described as a tool to verify the account or enhance security. In reality, this app contains the SuperCard X malware. After the installation, the attacker instructs the victim to tap their card against the phone. The malware then captures the NFC data from the card and sends it to a second phone controlled by the attacker.Using the copied data, the attacker can make contactless payments or make ATM withdrawals almost instantly. This method allows them to steal funds quickly and leaves little opportunity for banks or victims to intervene in time. A woman scrolling on her phone (Kurt "CyberGuy" Knutsson)8 ways you can stay safe from SuperCard X malware1) Be cautious of suspicious texts and calls. Use strong antivirus software: Fraudulent campaigns often begin with an SMS or call that seems to come from your bank. These messages usually claim there's suspicious activity on your account and urge you to click a link or dial a number to resolve the issue. However, this is a tactic used to gain access to your personal information. Always approach such messages with skepticism.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.2) Avoid installing apps from untrusted sources: One of the key ways malware like SuperCard X spreads is through deceptive apps that victims are persuaded to install. These apps often look harmless, posing as tools for security or account verification. If you receive a link to download an app via SMS, email or messaging apps like WhatsApp, do not click on it. Instead, only download apps from trusted sources, such as the Google Play Store. Additionally, carefully review app permissions and avoid granting unnecessary access, particularly to sensitive data like NFC, location or personal contacts.3) Turn off NFC when not in use: NFC, or Near Field Communication, is a useful feature that allows contactless payments and data exchanges. However, it can be exploited by attackers to capture your card information without you even realizing it. To minimize your risk of falling victim to NFC-based malware like SuperCard X, turn off NFC when you're not actively using it. On most Android devices, you can do this by going to "Settings," then "Connected Devices" or "Connection Preferences," where you’ll find the NFC toggle. By disabling NFC, your phone won't transmit data wirelessly, which helps protect your payment card information from being stolen by nearby attackers.4) Keep a close eye on your bank accounts and cards: If your device has come into contact with the SuperCard or anything similar, it’s possible your banking details are already compromised. That’s why it’s important to regularly check your transaction history for anything odd, like a small payment you don’t remember making or a charge from a strange location could be a sign of misuse. If you spot anything suspicious, report it to your bank right away. It’s also worth checking your credit reports every now and then to catch signs of identity theft before they snowball into bigger issues.5) Use a personal data removal service: If scammers have targeted you once, there's a higher chance they’ll try again, especially if your personal details (like your phone number, address or email) are easily found online. Data removal services scan people-search sites and brokers, then request the removal of your info. This reduces your exposure and helps prevent future phishing or social engineering attacks.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here.6) Contact your bank and freeze your cards: If you think you’ve tapped or handled a suspicious card, or if your phone acted strangely afterward, don’t brush it off. Call your bank and let them know what happened. They can freeze your card to stop any unauthorized payments and issue a new one for added safety. You should also ask them to monitor your account more closely for a while. On top of that, place a fraud alert with a credit bureau so no one can easily open a new line of credit in your name.7) Consider enrolling in identity theft protection services: If you've been targeted by a sophisticated scam like SuperCard X, there's a chance your personal information, not just your card data, may be at risk. Identity theft companies can monitor personal information, like your Social Security number, phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft.8) Report the scam to your national cybercrime authority: Whether or not you lost money, reporting the scam helps authorities track emerging threats and warn others. You can report such fraud to the FBI’s Internet Crime Complaint Center or the Federal Trade Commission. Your report could help catch the people behind the scam or at least shut down their infrastructure.Kurt’s key takeawayThe SuperCard X malware campaign represents a significant shift in how cybercriminals are targeting individuals and financial institutions. By exploiting NFC technology and combining it with social engineering tactics, attackers have found a way to bypass traditional fraud detection systems. What's especially concerning is how quickly these attacks unfold, making them harder to detect before the damage is done. As this threat evolves, it's important for both consumers and institutions to recognize the potential risks of these multilayered fraud strategies.Do you think Google is doing enough to protect you from malware? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Yorumlar 0 hisse senetleri
  • Nintendo reveals free Switch 2 upgrades for your games and it's huge news for Pokemon fans

    Looking to play some of your Switch 1 games on Nintendo's new console? Then you'll be pleased to know that 12 games will get free updates, including Pokemon Scarlet and VioletTech10:31, 16 May 2025Updated 10:31, 16 May 2025Switch 2 is just weeks awayThe Nintendo Switch 2 and Mario Kart World are 20 days away, meaning in three weeks we'llhave one in our hands.While reports have suggested outlets like ours won't be able to offer detailed reviews before launch, one of the things we're most excited foris playing Switch 1 games at higher resolution and with a smoother frame rate.‌Thankfully, while some games will require paid updates, Nintendo has promised free patches for some of our favourite Switch titles. Now, as we approach launch, the company has finally revealed what we can expect from each, and it's likely to be big news for anyone looking to pick up Pokemon Scarlet and Violet.‌Scarlet and Violet disappointed at launch because of performance issuesTwelve games will see free improvements released via downloadable patches."By connecting your Nintendo Switch 2 to the internet and performing a system update, you can download free updates for selected games that may improve graphics or add support for features such as GameShare," Nintendo explains.Article continues below"The contents of these free updates will differ depending on the game."Thankfully, the company has revealed what we can expect from each. While some games will gain HDR support or the option to share experiences with other players locally via GameShare, some are getting improved resolution and frame rates.These include ARMS, Super Mario 3D World + Bowser’s Fury, and, perhaps most significantly, Pokemon Scarlet and Violet.‌Both games launched in pretty rough shape, clearly butting up against the limitations of the first Switch hardware, but the idea of it performing better could mean it's almost like a new game–not bad for a free update.We've put the full list of updates Nintendo has confirmed below.ARMS‌Visuals: optimised for the Nintendo Switch 2 display and high-resolution TVs for improved image qualityFrame rate: optimised for Nintendo Switch 2 for smoother movementHDR supportBig Brain Academy: Brain vs BrainGameShare support:‌Up to four people can play in Party Mode.Share locally or share online via GameChat.Captain Toad: Treasure Tracker is cute, but surprisingly challengingCaptain Toad: Treasure Tracker‌Visuals: Optimised for the Nintendo Switch 2 display and high-resolution TVs for improved image qualityHDR supportGameShare support:Two people can play all of the courses.Share locally or share online via GameChat‌Clubhouse Games: 51 Worldwide ClassicsGameShare support:Up to four people can play 34 gamesShare locally or share online via GameChat‌Game Builder GarageVisuals: optimised for the Nintendo Switch 2 display and high-resolution TVs for improved image qualitySupports Joy-Con 2 mouse controlsNew Super Mario Bros U Deluxe‌Visuals: optimised for the Nintendo Switch 2 display and high-resolution TVs for improved image qualityPokémon Scarlet & Pokémon VioletVisuals: optimised for the Nintendo Switch 2 display and high-resolution TVs for improved image qualityFrame rate: improved for smoother movement on Nintendo Switch 2‌Super Mario 3D World + Bowser’s FuryVisuals: optimised for the Nintendo Switch 2 display and high-resolution TVs for improved image qualityFrame rate: improved for smoother movement on Nintendo Switch 2HDR supportGameShare compatibility:‌Up to four people can play Super Mario 3D World. In Bowser’s Fury, two people can play together, with one player controlling Mario and the other controlling Bowser Jr. Share locally or share online via GameChatIt's high time we got another 3D Mario titleSuper Mario Odyssey‌Visuals: optimised for the Nintendo Switch 2 display and high-resolution TVs for improved image qualityHDR supportGameShare support:Two people can play together, with one player controlling Mario and the other controlling Cappy.Share locally or share online via GameChat.‌The Legend of Zelda: Echoes of WisdomVisuals: optimised for the Nintendo Switch 2 display and high-resolution TVs for improved image qualityHDR supportThe Legend of Zelda: Link’s AwakeningArticle continues belowVisuals: optimised for the Nintendo Switch 2 display and high-resolution TVs for improved image qualityHDR supportFor the latest breaking news and stories from across the globe from the Daily Star, sign up for our newsletters.‌‌‌
    #nintendo #reveals #free #switch #upgrades
    Nintendo reveals free Switch 2 upgrades for your games and it's huge news for Pokemon fans
    Looking to play some of your Switch 1 games on Nintendo's new console? Then you'll be pleased to know that 12 games will get free updates, including Pokemon Scarlet and VioletTech10:31, 16 May 2025Updated 10:31, 16 May 2025Switch 2 is just weeks awayThe Nintendo Switch 2 and Mario Kart World are 20 days away, meaning in three weeks we'llhave one in our hands.While reports have suggested outlets like ours won't be able to offer detailed reviews before launch, one of the things we're most excited foris playing Switch 1 games at higher resolution and with a smoother frame rate.‌Thankfully, while some games will require paid updates, Nintendo has promised free patches for some of our favourite Switch titles. Now, as we approach launch, the company has finally revealed what we can expect from each, and it's likely to be big news for anyone looking to pick up Pokemon Scarlet and Violet.‌Scarlet and Violet disappointed at launch because of performance issuesTwelve games will see free improvements released via downloadable patches."By connecting your Nintendo Switch 2 to the internet and performing a system update, you can download free updates for selected games that may improve graphics or add support for features such as GameShare," Nintendo explains.Article continues below"The contents of these free updates will differ depending on the game."Thankfully, the company has revealed what we can expect from each. While some games will gain HDR support or the option to share experiences with other players locally via GameShare, some are getting improved resolution and frame rates.These include ARMS, Super Mario 3D World + Bowser’s Fury, and, perhaps most significantly, Pokemon Scarlet and Violet.‌Both games launched in pretty rough shape, clearly butting up against the limitations of the first Switch hardware, but the idea of it performing better could mean it's almost like a new game–not bad for a free update.We've put the full list of updates Nintendo has confirmed below.ARMS‌Visuals: optimised for the Nintendo Switch 2 display and high-resolution TVs for improved image qualityFrame rate: optimised for Nintendo Switch 2 for smoother movementHDR supportBig Brain Academy: Brain vs BrainGameShare support:‌Up to four people can play in Party Mode.Share locally or share online via GameChat.Captain Toad: Treasure Tracker is cute, but surprisingly challengingCaptain Toad: Treasure Tracker‌Visuals: Optimised for the Nintendo Switch 2 display and high-resolution TVs for improved image qualityHDR supportGameShare support:Two people can play all of the courses.Share locally or share online via GameChat‌Clubhouse Games: 51 Worldwide ClassicsGameShare support:Up to four people can play 34 gamesShare locally or share online via GameChat‌Game Builder GarageVisuals: optimised for the Nintendo Switch 2 display and high-resolution TVs for improved image qualitySupports Joy-Con 2 mouse controlsNew Super Mario Bros U Deluxe‌Visuals: optimised for the Nintendo Switch 2 display and high-resolution TVs for improved image qualityPokémon Scarlet & Pokémon VioletVisuals: optimised for the Nintendo Switch 2 display and high-resolution TVs for improved image qualityFrame rate: improved for smoother movement on Nintendo Switch 2‌Super Mario 3D World + Bowser’s FuryVisuals: optimised for the Nintendo Switch 2 display and high-resolution TVs for improved image qualityFrame rate: improved for smoother movement on Nintendo Switch 2HDR supportGameShare compatibility:‌Up to four people can play Super Mario 3D World. In Bowser’s Fury, two people can play together, with one player controlling Mario and the other controlling Bowser Jr. Share locally or share online via GameChatIt's high time we got another 3D Mario titleSuper Mario Odyssey‌Visuals: optimised for the Nintendo Switch 2 display and high-resolution TVs for improved image qualityHDR supportGameShare support:Two people can play together, with one player controlling Mario and the other controlling Cappy.Share locally or share online via GameChat.‌The Legend of Zelda: Echoes of WisdomVisuals: optimised for the Nintendo Switch 2 display and high-resolution TVs for improved image qualityHDR supportThe Legend of Zelda: Link’s AwakeningArticle continues belowVisuals: optimised for the Nintendo Switch 2 display and high-resolution TVs for improved image qualityHDR supportFor the latest breaking news and stories from across the globe from the Daily Star, sign up for our newsletters.‌‌‌ #nintendo #reveals #free #switch #upgrades
    WWW.DAILYSTAR.CO.UK
    Nintendo reveals free Switch 2 upgrades for your games and it's huge news for Pokemon fans
    Looking to play some of your Switch 1 games on Nintendo's new console? Then you'll be pleased to know that 12 games will get free updates, including Pokemon Scarlet and VioletTech10:31, 16 May 2025Updated 10:31, 16 May 2025Switch 2 is just weeks away(Image: AFP via Getty Images)The Nintendo Switch 2 and Mario Kart World are 20 days away, meaning in three weeks we'll (hopefully) have one in our hands.While reports have suggested outlets like ours won't be able to offer detailed reviews before launch, one of the things we're most excited for (other than our dream Switch 2 ports) is playing Switch 1 games at higher resolution and with a smoother frame rate.‌Thankfully, while some games will require paid updates, Nintendo has promised free patches for some of our favourite Switch titles. Now, as we approach launch, the company has finally revealed what we can expect from each, and it's likely to be big news for anyone looking to pick up Pokemon Scarlet and Violet.‌Scarlet and Violet disappointed at launch because of performance issues(Image: The Pokemon Company)Twelve games will see free improvements released via downloadable patches."By connecting your Nintendo Switch 2 to the internet and performing a system update, you can download free updates for selected games that may improve graphics or add support for features such as GameShare," Nintendo explains.Article continues below"The contents of these free updates will differ depending on the game."Thankfully, the company has revealed what we can expect from each. While some games will gain HDR support or the option to share experiences with other players locally via GameShare, some are getting improved resolution and frame rates.These include ARMS, Super Mario 3D World + Bowser’s Fury, and, perhaps most significantly, Pokemon Scarlet and Violet.‌Both games launched in pretty rough shape, clearly butting up against the limitations of the first Switch hardware, but the idea of it performing better could mean it's almost like a new game–not bad for a free update.We've put the full list of updates Nintendo has confirmed below.ARMS‌Visuals: optimised for the Nintendo Switch 2 display and high-resolution TVs for improved image qualityFrame rate: optimised for Nintendo Switch 2 for smoother movement (even when playing with three or more players)HDR supportBig Brain Academy: Brain vs BrainGameShare support:‌Up to four people can play in Party Mode.Share locally or share online via GameChat.Captain Toad: Treasure Tracker is cute, but surprisingly challenging(Image: Nintendo)Captain Toad: Treasure Tracker‌Visuals: Optimised for the Nintendo Switch 2 display and high-resolution TVs for improved image qualityHDR supportGameShare support:Two people can play all of the courses.Share locally or share online via GameChat‌Clubhouse Games: 51 Worldwide ClassicsGameShare support:Up to four people can play 34 gamesShare locally or share online via GameChat‌Game Builder GarageVisuals: optimised for the Nintendo Switch 2 display and high-resolution TVs for improved image qualitySupports Joy-Con 2 mouse controlsNew Super Mario Bros U Deluxe‌Visuals: optimised for the Nintendo Switch 2 display and high-resolution TVs for improved image qualityPokémon Scarlet & Pokémon VioletVisuals: optimised for the Nintendo Switch 2 display and high-resolution TVs for improved image qualityFrame rate: improved for smoother movement on Nintendo Switch 2‌Super Mario 3D World + Bowser’s FuryVisuals: optimised for the Nintendo Switch 2 display and high-resolution TVs for improved image qualityFrame rate: improved for smoother movement on Nintendo Switch 2 (including Bowser’s Fury)HDR supportGameShare compatibility:‌Up to four people can play Super Mario 3D World. In Bowser’s Fury, two people can play together, with one player controlling Mario and the other controlling Bowser Jr. Share locally or share online via GameChatIt's high time we got another 3D Mario titleSuper Mario Odyssey‌Visuals: optimised for the Nintendo Switch 2 display and high-resolution TVs for improved image qualityHDR supportGameShare support:Two people can play together, with one player controlling Mario and the other controlling Cappy.Share locally or share online via GameChat.‌The Legend of Zelda: Echoes of WisdomVisuals: optimised for the Nintendo Switch 2 display and high-resolution TVs for improved image qualityHDR supportThe Legend of Zelda: Link’s AwakeningArticle continues belowVisuals: optimised for the Nintendo Switch 2 display and high-resolution TVs for improved image qualityHDR supportFor the latest breaking news and stories from across the globe from the Daily Star, sign up for our newsletters.‌‌‌
    0 Yorumlar 0 hisse senetleri
  • Lessons in Decision Making from the Monty Hall Problem

    The Monty Hall Problem is a well-known brain teaser from which we can learn important lessons in Decision Making that are useful in general and in particular for data scientists.

    If you are not familiar with this problem, prepare to be perplexed . If you are, I hope to shine light on aspects that you might not have considered .

    I introduce the problem and solve with three types of intuitions:

    Common — The heart of this post focuses on applying our common sense to solve this problem. We’ll explore why it fails us and what we can do to intuitively overcome this to make the solution crystal clear . We’ll do this by using visuals , qualitative arguments and some basic probabilities.

    Bayesian — We will briefly discuss the importance of belief propagation.

    Causal — We will use a Graph Model to visualise conditions required to use the Monty Hall problem in real world settings.Spoiler alert I haven’t been convinced that there are any, but the thought process is very useful.

    I summarise by discussing lessons learnt for better data decision making.

    In regards to the Bayesian and Causal intuitions, these will be presented in a gentle form. For the mathematically inclined I also provide supplementary sections with short Deep Dives into each approach after the summary.By examining different aspects of this puzzle in probability you will hopefully be able to improve your data decision making .

    Credit: Wikipedia

    First, some history. Let’s Make a Deal is a USA television game show that originated in 1963. As its premise, audience participants were considered traders making deals with the host, Monty Hall .

    At the heart of the matter is an apparently simple scenario:

    A trader is posed with the question of choosing one of three doors for the opportunity to win a luxurious prize, e.g, a car . Behind the other two were goats .

    The trader is shown three closed doors.

    The trader chooses one of the doors. Let’s call thisdoor A and mark it with a .

    Keeping the chosen door closed, the host reveals one of the remaining doors showing a goat.

    The trader chooses door and the the host reveals door C showing a goat.

    The host then asks the trader if they would like to stick with their first choice or switch to the other remaining one.

    If the trader guesses correct they win the prize . If not they’ll be shown another goat.

    What is the probability of being Zonked? Credit: Wikipedia

    Should the trader stick with their original choice of door A or switch to B?

    Before reading further, give it a go. What would you do?

    Most people are likely to have a gut intuition that “it doesn’t matter” arguing that in the first instance each door had a ⅓ chance of hiding the prize, and that after the host intervention , when only two doors remain closed, the winning of the prize is 50:50.

    There are various ways of explaining why the coin toss intuition is incorrect. Most of these involve maths equations, or simulations. Whereas we will address these later, we’ll attempt to solve by applying Occam’s razor:

    A principle that states that simpler explanations are preferable to more complex ones — William of OckhamTo do this it is instructive to slightly redefine the problem to a large N doors instead of the original three.

    The Large N-Door Problem

    Similar to before: you have to choose one of many doors. For illustration let’s say N=100. Behind one of the doors there is the prize and behind 99of the rest are goats .

    The 100 Door Monty Hall problem before the host intervention.

    You choose one door and the host reveals 98of the other doors that have goats leaving yours and one more closed .

    The 100 Door Monty Hall Problem after the host intervention. Should you stick with your door or make the switch?

    Should you stick with your original choice or make the switch?

    I think you’ll agree with me that the remaining door, not chosen by you, is much more likely to conceal the prize … so you should definitely make the switch!

    It’s illustrative to compare both scenarios discussed so far. In the next figure we compare the post host intervention for the N=3 setupand that of N=100:

    Post intervention settings for the N=3 setupand N=100.

    In both cases we see two shut doors, one of which we’ve chosen. The main difference between these scenarios is that in the first we see one goat and in the second there are more than the eye would care to see.

    Why do most people consider the first case as a “50:50” toss up and in the second it’s obvious to make the switch?

    We’ll soon address this question of why. First let’s put probabilities of success behind the different scenarios.

    What’s The Frequency, Kenneth?

    So far we learnt from the N=100 scenario that switching doors is obviously beneficial. Inferring for the N=3 may be a leap of faith for most. Using some basic probability arguments here we’ll quantify why it is favourable to make the switch for any number door scenario N.

    We start with the standard Monty Hall problem. When it starts the probability of the prize being behind each of the doors A, B and C is p=⅓. To be explicit let’s define the Y parameter to be the door with the prize , i.e, p= p=p=⅓.

    The trick to solving this problem is that once the trader’s door A has been chosen , we should pay close attention to the set of the other doors {B,C}, which has the probability of p=p+p=⅔. This visual may help make sense of this:

    By being attentive to the {B,C} the rest should follow. When the goat is revealed

    it is apparent that the probabilities post intervention change. Note that for ease of reading I’ll drop the Y notation, where pwill read pand pwill read p. Also for completeness the full terms after the intervention should be even longer due to it being conditional, e.g, p, p, where Z is a parameter representing the choice of the host .premains ⅓

    p=p+premains ⅔,

    p=0; we just learnt that the goat is behind door C, not the prize.

    p= p-p= ⅔

    For anyone with the information provided by the hostthis means that it isn’t a toss of a fair coin! For them the fact that pbecame zero does not “raise all other boats”, but rather premains the same and pgets doubled.

    The bottom line is that the trader should consider p= ⅓ and p=⅔, hence by switching they are doubling the odds at winning!

    Let’s generalise to N.

    When we start all doors have odds of winning the prize p=1/N. After the trader chooses one door which we’ll call D₁, meaning p=1/N, we should now pay attention to the remaining set of doors {D₂, …, Dₙ} will have a chance of p=/N.

    When the host revealsdoors {D₃, …, Dₙ} with goats:

    premains 1/N

    p=p+p+… + premains/N

    p=p= …=p=p= 0; we just learnt that they have goats, not the prize.

    p=p— p— … — p=/N

    The trader should now consider two door values p=1/N and p=/N.

    Hence the odds of winning improved by a factor of N-1! In the case of N=100, this means by an odds ratio of 99!.

    The improvement of odds ratios in all scenarios between N=3 to 100 may be seen in the following graph. The thin line is the probability of winning by choosing any door prior to the intervention p=1/N. Note that it also represents the chance of winning after the intervention, if they decide to stick to their guns and not switch p.The thick line is the probability of winning the prize after the intervention if the door is switched p=/N:

    Probability of winning as a function of N. p=p=1/N is the thin line; p=N/is the thick one.Perhaps the most interesting aspect of this graphis that the N=3 case has the highest probability before the host intervention , but the lowest probability after and vice versa for N=100.

    Another interesting feature is the quick climb in the probability of winning for the switchers:

    N=3: p=67%

    N=4: p=75%

    N=5=80%

    The switchers curve gradually reaches an asymptote approaching at 100% whereas at N=99 it is 98.99% and at N=100 is equal to 99%.

    This starts to address an interesting question:

    Why Is Switching Obvious For Large N But Not N=3?

    The answer is the fact that this puzzle is slightly ambiguous. Only the highly attentive realise that by revealing the goatthe host is actually conveying a lot of information that should be incorporated into one’s calculation. Later we discuss the difference of doing this calculation in one’s mind based on intuition and slowing down by putting pen to paper or coding up the problem.

    How much information is conveyed by the host by intervening?

    A hand wavy explanation is that this information may be visualised as the gap between the lines in the graph above. For N=3 we saw that the odds of winning doubled, but that doesn’t register as strongly to our common sense intuition as the 99 factor as in the N=100.

    I have also considered describing stronger arguments from Information Theory that provide useful vocabulary to express communication of information. However, I feel that this fascinating field deserves a post of its own, which I’ve published.

    The main takeaway for the Monty Hall problem is that I have calculated the information gain to be a logarithmic function of the number of doors c using this formula:

    Information Gain due to the intervention of the host for a setup with c doors. Full details in my upcoming article.

    For c=3 door case, e.g, the information gain is ⅔ bits. Full details are in this article on entropy.

    To summarise this section, we use basic probability arguments to quantify the probabilities of winning the prize showing the benefit of switching for all N door scenarios. For those interested in more formal solutions using Bayesian and Causality on the bottom I provide supplement sections.

    In the next three final sections we’ll discuss how this problem was accepted in the general public back in the 1990s, discuss lessons learnt and then summarise how we can apply them in real-world settings.

    Being Confused Is OK

    “No, that is impossible, it should make no difference.” — Paul Erdős

    If you still don’t feel comfortable with the solution of the N=3 Monty Hall problem, don’t worry you are in good company! According to Vazsonyi¹ even Paul Erdős who is considered “of the greatest experts in probability theory” was confounded until computer simulations were demonstrated to him.

    When the original solution by Steve Selvin² was popularised by Marilyn vos Savant in her column “Ask Marilyn” in Parade magazine in 1990 many readers wrote that Selvin and Savant were wrong³. According to Tierney’s 1991 article in the New York Times, this included about 10,000 readers, including nearly 1,000 with Ph.D degrees⁴.

    On a personal note, over a decade ago I was exposed to the standard N=3 problem and since then managed to forget the solution numerous times. When I learnt about the large N approach I was quite excited about how intuitive it was. I then failed to explain it to my technical manager over lunch, so this is an attempt to compensate. I still have the same day job .

    While researching this piece I realised that there is a lot to learn in terms of decision making in general and in particular useful for data science.

    Lessons Learnt From Monty Hall Problem

    In his book Thinking Fast and Slow, the late Daniel Kahneman, the co-creator of Behaviour Economics, suggested that we have two types of thought processes:

    System 1 — fast thinking : based on intuition. This helps us react fast with confidence to familiar situations.

    System 2 – slow thinking : based on deep thought. This helps figure out new complex situations that life throws at us.

    Assuming this premise, you might have noticed that in the above you were applying both.

    By examining the visual of N=100 doors your System 1 kicked in and you immediately knew the answer. I’m guessing that in the N=3 you were straddling between System 1 and 2. Considering that you had to stop and think a bit when going throughout the probabilities exercise it was definitely System 2 .

    The decision maker’s struggle between System 1 and System 2 . Generated using Gemini Imagen 3

    Beyond the fast and slow thinking I feel that there are a lot of data decision making lessons that may be learnt.Assessing probabilities can be counter-intuitive …

    or

    Be comfortable with shifting to deep thought

    We’ve clearly shown that in the N=3 case. As previously mentioned it confounded many people including prominent statisticians.

    Another classic example is The Birthday Paradox , which shows how we underestimate the likelihood of coincidences. In this problem most people would think that one needs a large group of people until they find a pair sharing the same birthday. It turns out that all you need is 23 to have a 50% chance. And 70 for a 99.9% chance.

    One of the most confusing paradoxes in the realm of data analysis is Simpson’s, which I detailed in a previous article. This is a situation where trends of a population may be reversed in its subpopulations.

    The common with all these paradoxes is them requiring us to get comfortable to shifting gears from System 1 fast thinking to System 2 slow . This is also the common theme for the lessons outlined below.

    A few more classical examples are: The Gambler’s Fallacy , Base Rate Fallacy and the The LindaProblem . These are beyond the scope of this article, but I highly recommend looking them up to further sharpen ways of thinking about data.… especially when dealing with ambiguity

    or

    Search for clarity in ambiguity

    Let’s reread the problem, this time as stated in “Ask Marilyn”

    Suppose you’re on a game show, and you’re given the choice of three doors: Behind one door is a car; behind the others, goats. You pick a door, say №1, and the host, who knows what’s behind the doors, opens another door, say №3, which has a goat. He then says to you, “Do you want to pick door №2?” Is it to your advantage to switch your choice?

    We discussed that the most important piece of information is not made explicit. It says that the host “knows what’s behind the doors”, but not that they open a door at random, although it’s implicitly understood that the host will never open the door with the car.

    Many real life problems in data science involve dealing with ambiguous demands as well as in data provided by stakeholders.

    It is crucial for the researcher to track down any relevant piece of information that is likely to have an impact and update that into the solution. Statisticians refer to this as “belief update”.With new information we should update our beliefs

    This is the main aspect separating the Bayesian stream of thought to the Frequentist. The Frequentist approach takes data at face value. The Bayesian approach incorporates prior beliefs and updates it when new findings are introduced. This is especially useful when dealing with ambiguous situations.

    To drive this point home, let’s re-examine this figure comparing between the post intervention N=3 setupsand the N=100 one.

    Copied from above. Post intervention settings for the N=3 setupand N=100.

    In both cases we had a prior belief that all doors had an equal chance of winning the prize p=1/N.

    Once the host opened one doora lot of valuable information was revealed whereas in the case of N=100 it was much more apparent than N=3.

    In the Frequentist approach, however, most of this information would be ignored, as it only focuses on the two closed doors. The Frequentist conclusion, hence is a 50% chance to win the prize regardless of what else is known about the situation. Hence the Frequentist takes Paul Erdős’ “no difference” point of view, which we now know to be incorrect.

    This would be reasonable if all that was presented were the two doors and not the intervention and the goats. However, if that information is presented, one should shift gears into System 2 thinking and update their beliefs in the system. This is what we have done by focusing not only on the shut door, but rather consider what was learnt about the system at large.

    For the brave hearted , in a supplementary section below called The Bayesian Point of View I solve for the Monty Hall problem using the Bayesian formalism.Be one with subjectivity

    The Frequentist main reservation about “going Bayes” is that — “Statistics should be objective”.

    The Bayesian response is — the Frequentist’s also apply a prior without realising it — a flat one.

    Regardless of the Bayesian/Frequentist debate, as researchers we try our best to be as objective as possible in every step of the analysis.

    That said, it is inevitable that subjective decisions are made throughout.

    E.g, in a skewed distribution should one quote the mean or median? It highly depends on the context and hence a subjective decision needs to be made.

    The responsibility of the analyst is to provide justification for their choices first to convince themselves and then their stakeholders.When confused — look for a useful analogy

    … but tread with caution

    We saw that by going from the N=3 setup to the N=100 the solution was apparent. This is a trick scientists frequently use — if the problem appears at first a bit too confusing/overwhelming, break it down and try to find a useful analogy.

    It is probably not a perfect comparison, but going from the N=3 setup to N=100 is like examining a picture from up close and zooming out to see the big picture. Think of having only a puzzle piece and then glancing at the jigsaw photo on the box.

    Monty Hall in 1976. Credit: Wikipedia and using Visual Paradigm Online for the puzzle effect

    Note: whereas analogies may be powerful, one should do so with caution, not to oversimplify. Physicists refer to this situation as the spherical cow method, where models may oversimplify complex phenomena.

    I admit that even with years of experience in applied statistics at times I still get confused at which method to apply. A large part of my thought process is identifying analogies to known solved problems. Sometimes after making progress in a direction I will realise that my assumptions were wrong and seek a new direction. I used to quip with colleagues that they shouldn’t trust me before my third attempt …Simulations are powerful but not always necessary

    It’s interesting to learn that Paul Erdős and other mathematicians were convinced only after seeing simulations of the problem.

    I am two-minded about usage of simulations when it comes to problem solving.

    On the one hand simulations are powerful tools to analyse complex and intractable problems. Especially in real life data in which one wants a grasp not only of the underlying formulation, but also stochasticity.

    And here is the big BUT — if a problem can be analytically solved like the Monty Hall one, simulations as fun as they may be, may not be necessary.

    According to Occam’s razor, all that is required is a brief intuition to explain the phenomena. This is what I attempted to do here by applying common sense and some basic probability reasoning. For those who enjoy deep dives I provide below supplementary sections with two methods for analytical solutions — one using Bayesian statistics and another using Causality.After publishing the first version of this article there was a comment that Savant’s solution³ may be simpler than those presented here. I revisited her communications and agreed that it should be added. In the process I realised three more lessons may be learnt.A well designed visual goes a long way

    Continuing the principle of Occam’s razor, Savant explained³ quite convincingly in my opinion:

    You should switch. The first door has a 1/3 chance of winning, but the second door has a 2/3 chance. Here’s a good way to visualize what happened. Suppose there are a million doors, and you pick door #1. Then the host, who knows what’s behind the doors and will always avoid the one with the prize, opens them all except door #777,777. You’d switch to that door pretty fast, wouldn’t you?

    Hence she provided an abstract visual for the readers. I attempted to do the same with the 100 doors figures.

    Marilyn vos Savant who popularised the Monty Hall Problem. Credit: Ben David on Flickr under license

    As mentioned many readers, and especially with backgrounds in maths and statistics, still weren’t convinced.

    She revised³ with another mental image:

    The benefits of switching are readily proven by playing through the six games that exhaust all the possibilities. For the first three games, you choose #1 and “switch” each time, for the second three games, you choose #1 and “stay” each time, and the host always opens a loser. Here are the results.

    She added a table with all the scenarios. I took some artistic liberty and created the following figure. As indicated, the top batch are the scenarios in which the trader switches and the bottom when they switch. Lines in green are games which the trader wins, and in red when they get zonked. The symbolised the door chosen by the trader and Monte Hall then chooses a different door that has a goat behind it.

    Adaptation of Savant’s table³ of six scenarios that shows the solution to the Monty Hall Problem

    We clearly see from this diagram that the switcher has a ⅔ chance of winning and those that stay only ⅓.

    This is yet another elegant visualisation that clearly explains the non intuitive.

    It strengthens the claim that there is no real need for simulations in this case because all they would be doing is rerunning these six scenarios.

    One more popular solution is decision tree illustrations. You can find these in the Wikipedia page, but I find it’s a bit redundant to Savant’s table.

    The fact that we can solve this problem in so many ways yields another lesson:There are many ways to skin a … problem

    Of the many lessons that I have learnt from the writings of late Richard Feynman, one of the best physics and ideas communicators, is that a problem can be solved many ways. Mathematicians and Physicists do this all the time.

    A relevant quote that paraphrases Occam’s razor:

    If you can’t explain it simply, you don’t understand it well enough — attributed to Albert Einstein

    And finallyEmbrace ignorance and be humble ‍

    “You are utterly incorrect … How many irate mathematicians are needed to get you to change your mind?” — Ph.D from Georgetown University

    “May I suggest that you obtain and refer to a standard textbook on probability before you try to answer a question of this type again?” — Ph.D from University of Florida

    “You’re in error, but Albert Einstein earned a dearer place in the hearts of people after he admitted his errors.” — Ph.D. from University of Michigan

    Ouch!

    These are some of the said responses from mathematicians to the Parade article.

    Such unnecessary viciousness.

    You can check the reference³ to see the writer’s names and other like it. To whet your appetite: “You blew it, and you blew it big!”, , “You made a mistake, but look at the positive side. If all those Ph.D.’s were wrong, the country would be in some very serious trouble.”, “I am in shock that after being corrected by at least three mathematicians, you still do not see your mistake.”.

    And as expected from the 1990s perhaps the most embarrassing one was from a resident of Oregon:

    “Maybe women look at math problems differently than men.”

    These make me cringe and be embarrassed to be associated by gender and Ph.D. title with these graduates and professors.

    Hopefully in the 2020s most people are more humble about their ignorance. Yuval Noah Harari discusses the fact that the Scientific Revolution of Galileo Galilei et al. was not due to knowledge but rather admittance of ignorance.

    “The great discovery that launched the Scientific Revolution was the discovery that humans do not know the answers to their most important questions” — Yuval Noah Harari

    Fortunately for mathematicians’ image, there were also quiet a lot of more enlightened comments. I like this one from one Seth Kalson, Ph.D. of MIT:

    You are indeed correct. My colleagues at work had a ball with this problem, and I dare say that most of them, including me at first, thought you were wrong!

    We’ll summarise by examining how, and if, the Monty Hall problem may be applied in real-world settings, so you can try to relate to projects that you are working on.

    Application in Real World Settings

    Researching for this article I found that beyond artificial setups for entertainment⁶ ⁷ there aren’t practical settings for this problem to use as an analogy. Of course, I may be wrong⁸ and would be glad to hear if you know of one.

    One way of assessing the viability of an analogy is using arguments from causality which provides vocabulary that cannot be expressed with standard statistics.

    In a previous post I discussed the fact that the story behind the data is as important as the data itself. In particular Causal Graph Models visualise the story behind the data, which we will use as a framework for a reasonable analogy.

    For the Monty Hall problem we can build a Causal Graph Model like this:

    Reading:

    The door chosen by the trader is independent from that with the prize and vice versa. As important, there is no common cause between them that might generate a spurious correlation.

    The host’s choice depends on both and .

    By comparing causal graphs of two systems one can get a sense for how analogous both are. A perfect analogy would require more details, but this is beyond the scope of this article. Briefly, one would want to ensure similar functions between the parameters.

    Those interested in learning further details about using Causal Graphs Models to assess causality in real world problems may be interested in this article.

    Anecdotally it is also worth mentioning that on Let’s Make a Deal, Monty himself has admitted years later to be playing mind games with the contestants and did not always follow the rules, e.g, not always doing the intervention as “it all depends on his mood”⁴.

    In our setup we assumed perfect conditions, i.e., a host that does not skew from the script and/or play on the trader’s emotions. Taking this into consideration would require updating the Graphical Model above, which is beyond the scope of this article.

    Some might be disheartened to realise at this stage of the post that there might not be real world applications for this problem.

    I argue that lessons learnt from the Monty Hall problem definitely are.

    Just to summarise them again:Assessing probabilities can be counter intuitive …… especially when dealing with ambiguityWith new information we should update our beliefsBe one with subjectivityWhen confused — look for a useful analogy … but tread with cautionSimulations are powerful but not always necessaryA well designed visual goes a long wayThere are many ways to skin a … problemEmbrace ignorance and be humble ‍

    While the Monty Hall Problem might seem like a simple puzzle, it offers valuable insights into decision-making, particularly for data scientists. The problem highlights the importance of going beyond intuition and embracing a more analytical, data-driven approach. By understanding the principles of Bayesian thinking and updating our beliefs based on new information, we can make more informed decisions in many aspects of our lives, including data science. The Monty Hall Problem serves as a reminder that even seemingly straightforward scenarios can contain hidden complexities and that by carefully examining available information, we can uncover hidden truths and make better decisions.

    At the bottom of the article I provide a list of resources that I found useful to learn about this topic.

    Credit: Wikipedia

    Loved this post? Join me on LinkedIn or Buy me a coffee!

    Credits

    Unless otherwise noted, all images were created by the author.

    Many thanks to Jim Parr, Will Reynolds, and Betty Kazin for their useful comments.

    In the following supplementary sections I derive solutions to the Monty Hall’s problem from two perspectives:

    Bayesian

    Causal

    Both are motivated by questions in textbook: Causal Inference in Statistics A Primer by Judea Pearl, Madelyn Glymour, and Nicholas P. Jewell.

    Supplement 1: The Bayesian Point of View

    This section assumes a basic understanding of Bayes’ Theorem, in particular being comfortable conditional probabilities. In other words if this makes sense:

    We set out to use Bayes’ theorem to prove that switching doors improves chances in the N=3 Monty Hall Problem.We define

    X — the chosen door

    Y— the door with the prize

    Z — the door opened by the host

    Labelling the doors as A, B and C, without loss of generality, we need to solve for:

    Using Bayes’ theorem we equate the left side as

    and the right one as:

    Most components are equal=P=⅓ so we are left to prove:

    In the case where Y=B, the host has only one choice, making P= 1.

    In the case where Y=A, the host has two choices, making P= 1/2.

    From here:

    Quod erat demonstrandum.

    Note: if the “host choices” arguments didn’t make sense look at the table below showing this explicitly. You will want to compare entries {X=A, Y=B, Z=C} and {X=A, Y=A, Z=C}.

    Supplement 2: The Causal Point of View

    The section assumes a basic understanding of Directed Acyclic Graphsand Structural Causal Modelsis useful, but not required. In brief:

    DAGs qualitatively visualise the causal relationships between the parameter nodes.

    SCMs quantitatively express the formula relationships between the parameters.

    Given the DAG

    we are going to define the SCM that corresponds to the classic N=3 Monty Hall problem and use it to describe the joint distribution of all variables. We later will generically expand to N.We define

    X — the chosen door

    Y — the door with the prize

    Z — the door opened by the host

    According to the DAG we see that according to the chain rule:

    The SCM is defined by exogenous variables U , endogenous variables V, and the functions between them F:

    U = {X,Y}, V={Z}, F= {f}

    where X, Y and Z have door values:

    D = {A, B, C}

    The host choice is fdefined as:

    In order to generalise to N doors, the DAG remains the same, but the SCM requires to update D to be a set of N doors Dᵢ: {D₁, D₂, … Dₙ}.

    Exploring Example Scenarios

    To gain an intuition for this SCM, let’s examine 6 examples of 27:

    When X=YP= 0; cannot choose the participant’s door

    P= 1/2; is behind → chooses B at 50%

    P= 1/2; is behind → chooses C at 50%When X≠YP= 0; cannot choose the participant’s door

    P= 0; cannot choose prize door

    P= 1; has not choice in the matterCalculating Joint Probabilities

    Using logic let’s code up all 27 possibilities in python

    df = pd.DataFrame++, "Y":++)* 3, "Z":* 9})

    df= None

    p_x = 1./3

    p_y = 1./3

    df.loc= 0

    df.loc= 0.5

    df.loc= 0

    df.loc= 0

    df.loc= 1

    df= df* p_x * p_y

    print{df.sum}")

    df

    yields

    Resources

    This Quora discussion by Joshua Engel helped me shape a few aspects of this article.

    Causal Inference in Statistics A Primer / Pearl, Glymour & Jewell— excellent short text bookI also very much enjoy Tim Harford’s podcast Cautionary Tales. He wrote about this topic on November 3rd 2017 for the Financial Times: Monty Hall and the game show stick-or-switch conundrum

    Footnotes

    ¹ Vazsonyi, Andrew. “Which Door Has the Cadillac?”. Decision Line: 17–19. Archived from the originalon 13 April 2014. Retrieved 16 October 2012.

    ² Steve Selvin to the American Statistician in 1975.³Game Show Problem by Marilyn vos Savant’s “Ask Marilyn” in marilynvossavant.com: “This material in this article was originally published in PARADE magazine in 1990 and 1991”

    ⁴Tierney, John. “Behind Monty Hall’s Doors: Puzzle, Debate and Answer?”. The New York Times. Retrieved 18 January 2008.

    ⁵ Kahneman, D.. Thinking, fast and slow. Farrar, Straus and Giroux.

    ⁶ MythBusters Episode 177 “Pick a Door”Watch Mythbuster’s approach

    ⁶Monty Hall Problem on Survivor Season 41Watch Survivor’s take on the problem

    ⁷ Jingyi Jessica LiHow the Monty Hall problem is similar to the false discovery rate in high-throughput data analysis.Whereas the author points about “similarities” between hypothesis testing and the Monty Hall problem, I think that this is a bit misleading. The author is correct that both problems change by the order in which processes are done, but that is part of Bayesian statistics in general, not limited to the Monty Hall problem.
    The post Lessons in Decision Making from the Monty Hall Problem appeared first on Towards Data Science.
    #lessons #decision #making #monty #hall
    🚪🚪🐐 Lessons in Decision Making from the Monty Hall Problem
    The Monty Hall Problem is a well-known brain teaser from which we can learn important lessons in Decision Making that are useful in general and in particular for data scientists. If you are not familiar with this problem, prepare to be perplexed . If you are, I hope to shine light on aspects that you might not have considered . I introduce the problem and solve with three types of intuitions: Common — The heart of this post focuses on applying our common sense to solve this problem. We’ll explore why it fails us and what we can do to intuitively overcome this to make the solution crystal clear . We’ll do this by using visuals , qualitative arguments and some basic probabilities. Bayesian — We will briefly discuss the importance of belief propagation. Causal — We will use a Graph Model to visualise conditions required to use the Monty Hall problem in real world settings.Spoiler alert I haven’t been convinced that there are any, but the thought process is very useful. I summarise by discussing lessons learnt for better data decision making. In regards to the Bayesian and Causal intuitions, these will be presented in a gentle form. For the mathematically inclined I also provide supplementary sections with short Deep Dives into each approach after the summary.By examining different aspects of this puzzle in probability you will hopefully be able to improve your data decision making . Credit: Wikipedia First, some history. Let’s Make a Deal is a USA television game show that originated in 1963. As its premise, audience participants were considered traders making deals with the host, Monty Hall . At the heart of the matter is an apparently simple scenario: A trader is posed with the question of choosing one of three doors for the opportunity to win a luxurious prize, e.g, a car . Behind the other two were goats . The trader is shown three closed doors. The trader chooses one of the doors. Let’s call thisdoor A and mark it with a . Keeping the chosen door closed, the host reveals one of the remaining doors showing a goat. The trader chooses door and the the host reveals door C showing a goat. The host then asks the trader if they would like to stick with their first choice or switch to the other remaining one. If the trader guesses correct they win the prize . If not they’ll be shown another goat. What is the probability of being Zonked? Credit: Wikipedia Should the trader stick with their original choice of door A or switch to B? Before reading further, give it a go. What would you do? Most people are likely to have a gut intuition that “it doesn’t matter” arguing that in the first instance each door had a ⅓ chance of hiding the prize, and that after the host intervention , when only two doors remain closed, the winning of the prize is 50:50. There are various ways of explaining why the coin toss intuition is incorrect. Most of these involve maths equations, or simulations. Whereas we will address these later, we’ll attempt to solve by applying Occam’s razor: A principle that states that simpler explanations are preferable to more complex ones — William of OckhamTo do this it is instructive to slightly redefine the problem to a large N doors instead of the original three. The Large N-Door Problem Similar to before: you have to choose one of many doors. For illustration let’s say N=100. Behind one of the doors there is the prize and behind 99of the rest are goats . The 100 Door Monty Hall problem before the host intervention. You choose one door and the host reveals 98of the other doors that have goats leaving yours and one more closed . The 100 Door Monty Hall Problem after the host intervention. Should you stick with your door or make the switch? Should you stick with your original choice or make the switch? I think you’ll agree with me that the remaining door, not chosen by you, is much more likely to conceal the prize … so you should definitely make the switch! It’s illustrative to compare both scenarios discussed so far. In the next figure we compare the post host intervention for the N=3 setupand that of N=100: Post intervention settings for the N=3 setupand N=100. In both cases we see two shut doors, one of which we’ve chosen. The main difference between these scenarios is that in the first we see one goat and in the second there are more than the eye would care to see. Why do most people consider the first case as a “50:50” toss up and in the second it’s obvious to make the switch? We’ll soon address this question of why. First let’s put probabilities of success behind the different scenarios. What’s The Frequency, Kenneth? So far we learnt from the N=100 scenario that switching doors is obviously beneficial. Inferring for the N=3 may be a leap of faith for most. Using some basic probability arguments here we’ll quantify why it is favourable to make the switch for any number door scenario N. We start with the standard Monty Hall problem. When it starts the probability of the prize being behind each of the doors A, B and C is p=⅓. To be explicit let’s define the Y parameter to be the door with the prize , i.e, p= p=p=⅓. The trick to solving this problem is that once the trader’s door A has been chosen , we should pay close attention to the set of the other doors {B,C}, which has the probability of p=p+p=⅔. This visual may help make sense of this: By being attentive to the {B,C} the rest should follow. When the goat is revealed it is apparent that the probabilities post intervention change. Note that for ease of reading I’ll drop the Y notation, where pwill read pand pwill read p. Also for completeness the full terms after the intervention should be even longer due to it being conditional, e.g, p, p, where Z is a parameter representing the choice of the host .premains ⅓ p=p+premains ⅔, p=0; we just learnt that the goat is behind door C, not the prize. p= p-p= ⅔ For anyone with the information provided by the hostthis means that it isn’t a toss of a fair coin! For them the fact that pbecame zero does not “raise all other boats”, but rather premains the same and pgets doubled. The bottom line is that the trader should consider p= ⅓ and p=⅔, hence by switching they are doubling the odds at winning! Let’s generalise to N. When we start all doors have odds of winning the prize p=1/N. After the trader chooses one door which we’ll call D₁, meaning p=1/N, we should now pay attention to the remaining set of doors {D₂, …, Dₙ} will have a chance of p=/N. When the host revealsdoors {D₃, …, Dₙ} with goats: premains 1/N p=p+p+… + premains/N p=p= …=p=p= 0; we just learnt that they have goats, not the prize. p=p— p— … — p=/N The trader should now consider two door values p=1/N and p=/N. Hence the odds of winning improved by a factor of N-1! In the case of N=100, this means by an odds ratio of 99!. The improvement of odds ratios in all scenarios between N=3 to 100 may be seen in the following graph. The thin line is the probability of winning by choosing any door prior to the intervention p=1/N. Note that it also represents the chance of winning after the intervention, if they decide to stick to their guns and not switch p.The thick line is the probability of winning the prize after the intervention if the door is switched p=/N: Probability of winning as a function of N. p=p=1/N is the thin line; p=N/is the thick one.Perhaps the most interesting aspect of this graphis that the N=3 case has the highest probability before the host intervention , but the lowest probability after and vice versa for N=100. Another interesting feature is the quick climb in the probability of winning for the switchers: N=3: p=67% N=4: p=75% N=5=80% The switchers curve gradually reaches an asymptote approaching at 100% whereas at N=99 it is 98.99% and at N=100 is equal to 99%. This starts to address an interesting question: Why Is Switching Obvious For Large N But Not N=3? The answer is the fact that this puzzle is slightly ambiguous. Only the highly attentive realise that by revealing the goatthe host is actually conveying a lot of information that should be incorporated into one’s calculation. Later we discuss the difference of doing this calculation in one’s mind based on intuition and slowing down by putting pen to paper or coding up the problem. How much information is conveyed by the host by intervening? A hand wavy explanation is that this information may be visualised as the gap between the lines in the graph above. For N=3 we saw that the odds of winning doubled, but that doesn’t register as strongly to our common sense intuition as the 99 factor as in the N=100. I have also considered describing stronger arguments from Information Theory that provide useful vocabulary to express communication of information. However, I feel that this fascinating field deserves a post of its own, which I’ve published. The main takeaway for the Monty Hall problem is that I have calculated the information gain to be a logarithmic function of the number of doors c using this formula: Information Gain due to the intervention of the host for a setup with c doors. Full details in my upcoming article. For c=3 door case, e.g, the information gain is ⅔ bits. Full details are in this article on entropy. To summarise this section, we use basic probability arguments to quantify the probabilities of winning the prize showing the benefit of switching for all N door scenarios. For those interested in more formal solutions using Bayesian and Causality on the bottom I provide supplement sections. In the next three final sections we’ll discuss how this problem was accepted in the general public back in the 1990s, discuss lessons learnt and then summarise how we can apply them in real-world settings. Being Confused Is OK “No, that is impossible, it should make no difference.” — Paul Erdős If you still don’t feel comfortable with the solution of the N=3 Monty Hall problem, don’t worry you are in good company! According to Vazsonyi¹ even Paul Erdős who is considered “of the greatest experts in probability theory” was confounded until computer simulations were demonstrated to him. When the original solution by Steve Selvin² was popularised by Marilyn vos Savant in her column “Ask Marilyn” in Parade magazine in 1990 many readers wrote that Selvin and Savant were wrong³. According to Tierney’s 1991 article in the New York Times, this included about 10,000 readers, including nearly 1,000 with Ph.D degrees⁴. On a personal note, over a decade ago I was exposed to the standard N=3 problem and since then managed to forget the solution numerous times. When I learnt about the large N approach I was quite excited about how intuitive it was. I then failed to explain it to my technical manager over lunch, so this is an attempt to compensate. I still have the same day job . While researching this piece I realised that there is a lot to learn in terms of decision making in general and in particular useful for data science. Lessons Learnt From Monty Hall Problem In his book Thinking Fast and Slow, the late Daniel Kahneman, the co-creator of Behaviour Economics, suggested that we have two types of thought processes: System 1 — fast thinking : based on intuition. This helps us react fast with confidence to familiar situations. System 2 – slow thinking : based on deep thought. This helps figure out new complex situations that life throws at us. Assuming this premise, you might have noticed that in the above you were applying both. By examining the visual of N=100 doors your System 1 kicked in and you immediately knew the answer. I’m guessing that in the N=3 you were straddling between System 1 and 2. Considering that you had to stop and think a bit when going throughout the probabilities exercise it was definitely System 2 . The decision maker’s struggle between System 1 and System 2 . Generated using Gemini Imagen 3 Beyond the fast and slow thinking I feel that there are a lot of data decision making lessons that may be learnt.Assessing probabilities can be counter-intuitive … or Be comfortable with shifting to deep thought We’ve clearly shown that in the N=3 case. As previously mentioned it confounded many people including prominent statisticians. Another classic example is The Birthday Paradox , which shows how we underestimate the likelihood of coincidences. In this problem most people would think that one needs a large group of people until they find a pair sharing the same birthday. It turns out that all you need is 23 to have a 50% chance. And 70 for a 99.9% chance. One of the most confusing paradoxes in the realm of data analysis is Simpson’s, which I detailed in a previous article. This is a situation where trends of a population may be reversed in its subpopulations. The common with all these paradoxes is them requiring us to get comfortable to shifting gears from System 1 fast thinking to System 2 slow . This is also the common theme for the lessons outlined below. A few more classical examples are: The Gambler’s Fallacy , Base Rate Fallacy and the The LindaProblem . These are beyond the scope of this article, but I highly recommend looking them up to further sharpen ways of thinking about data.… especially when dealing with ambiguity or Search for clarity in ambiguity Let’s reread the problem, this time as stated in “Ask Marilyn” Suppose you’re on a game show, and you’re given the choice of three doors: Behind one door is a car; behind the others, goats. You pick a door, say №1, and the host, who knows what’s behind the doors, opens another door, say №3, which has a goat. He then says to you, “Do you want to pick door №2?” Is it to your advantage to switch your choice? We discussed that the most important piece of information is not made explicit. It says that the host “knows what’s behind the doors”, but not that they open a door at random, although it’s implicitly understood that the host will never open the door with the car. Many real life problems in data science involve dealing with ambiguous demands as well as in data provided by stakeholders. It is crucial for the researcher to track down any relevant piece of information that is likely to have an impact and update that into the solution. Statisticians refer to this as “belief update”.With new information we should update our beliefs This is the main aspect separating the Bayesian stream of thought to the Frequentist. The Frequentist approach takes data at face value. The Bayesian approach incorporates prior beliefs and updates it when new findings are introduced. This is especially useful when dealing with ambiguous situations. To drive this point home, let’s re-examine this figure comparing between the post intervention N=3 setupsand the N=100 one. Copied from above. Post intervention settings for the N=3 setupand N=100. In both cases we had a prior belief that all doors had an equal chance of winning the prize p=1/N. Once the host opened one doora lot of valuable information was revealed whereas in the case of N=100 it was much more apparent than N=3. In the Frequentist approach, however, most of this information would be ignored, as it only focuses on the two closed doors. The Frequentist conclusion, hence is a 50% chance to win the prize regardless of what else is known about the situation. Hence the Frequentist takes Paul Erdős’ “no difference” point of view, which we now know to be incorrect. This would be reasonable if all that was presented were the two doors and not the intervention and the goats. However, if that information is presented, one should shift gears into System 2 thinking and update their beliefs in the system. This is what we have done by focusing not only on the shut door, but rather consider what was learnt about the system at large. For the brave hearted , in a supplementary section below called The Bayesian Point of View I solve for the Monty Hall problem using the Bayesian formalism.Be one with subjectivity The Frequentist main reservation about “going Bayes” is that — “Statistics should be objective”. The Bayesian response is — the Frequentist’s also apply a prior without realising it — a flat one. Regardless of the Bayesian/Frequentist debate, as researchers we try our best to be as objective as possible in every step of the analysis. That said, it is inevitable that subjective decisions are made throughout. E.g, in a skewed distribution should one quote the mean or median? It highly depends on the context and hence a subjective decision needs to be made. The responsibility of the analyst is to provide justification for their choices first to convince themselves and then their stakeholders.When confused — look for a useful analogy … but tread with caution We saw that by going from the N=3 setup to the N=100 the solution was apparent. This is a trick scientists frequently use — if the problem appears at first a bit too confusing/overwhelming, break it down and try to find a useful analogy. It is probably not a perfect comparison, but going from the N=3 setup to N=100 is like examining a picture from up close and zooming out to see the big picture. Think of having only a puzzle piece and then glancing at the jigsaw photo on the box. Monty Hall in 1976. Credit: Wikipedia and using Visual Paradigm Online for the puzzle effect Note: whereas analogies may be powerful, one should do so with caution, not to oversimplify. Physicists refer to this situation as the spherical cow method, where models may oversimplify complex phenomena. I admit that even with years of experience in applied statistics at times I still get confused at which method to apply. A large part of my thought process is identifying analogies to known solved problems. Sometimes after making progress in a direction I will realise that my assumptions were wrong and seek a new direction. I used to quip with colleagues that they shouldn’t trust me before my third attempt …Simulations are powerful but not always necessary It’s interesting to learn that Paul Erdős and other mathematicians were convinced only after seeing simulations of the problem. I am two-minded about usage of simulations when it comes to problem solving. On the one hand simulations are powerful tools to analyse complex and intractable problems. Especially in real life data in which one wants a grasp not only of the underlying formulation, but also stochasticity. And here is the big BUT — if a problem can be analytically solved like the Monty Hall one, simulations as fun as they may be, may not be necessary. According to Occam’s razor, all that is required is a brief intuition to explain the phenomena. This is what I attempted to do here by applying common sense and some basic probability reasoning. For those who enjoy deep dives I provide below supplementary sections with two methods for analytical solutions — one using Bayesian statistics and another using Causality.After publishing the first version of this article there was a comment that Savant’s solution³ may be simpler than those presented here. I revisited her communications and agreed that it should be added. In the process I realised three more lessons may be learnt.A well designed visual goes a long way Continuing the principle of Occam’s razor, Savant explained³ quite convincingly in my opinion: You should switch. The first door has a 1/3 chance of winning, but the second door has a 2/3 chance. Here’s a good way to visualize what happened. Suppose there are a million doors, and you pick door #1. Then the host, who knows what’s behind the doors and will always avoid the one with the prize, opens them all except door #777,777. You’d switch to that door pretty fast, wouldn’t you? Hence she provided an abstract visual for the readers. I attempted to do the same with the 100 doors figures. Marilyn vos Savant who popularised the Monty Hall Problem. Credit: Ben David on Flickr under license As mentioned many readers, and especially with backgrounds in maths and statistics, still weren’t convinced. She revised³ with another mental image: The benefits of switching are readily proven by playing through the six games that exhaust all the possibilities. For the first three games, you choose #1 and “switch” each time, for the second three games, you choose #1 and “stay” each time, and the host always opens a loser. Here are the results. She added a table with all the scenarios. I took some artistic liberty and created the following figure. As indicated, the top batch are the scenarios in which the trader switches and the bottom when they switch. Lines in green are games which the trader wins, and in red when they get zonked. The symbolised the door chosen by the trader and Monte Hall then chooses a different door that has a goat behind it. Adaptation of Savant’s table³ of six scenarios that shows the solution to the Monty Hall Problem We clearly see from this diagram that the switcher has a ⅔ chance of winning and those that stay only ⅓. This is yet another elegant visualisation that clearly explains the non intuitive. It strengthens the claim that there is no real need for simulations in this case because all they would be doing is rerunning these six scenarios. One more popular solution is decision tree illustrations. You can find these in the Wikipedia page, but I find it’s a bit redundant to Savant’s table. The fact that we can solve this problem in so many ways yields another lesson:There are many ways to skin a … problem Of the many lessons that I have learnt from the writings of late Richard Feynman, one of the best physics and ideas communicators, is that a problem can be solved many ways. Mathematicians and Physicists do this all the time. A relevant quote that paraphrases Occam’s razor: If you can’t explain it simply, you don’t understand it well enough — attributed to Albert Einstein And finallyEmbrace ignorance and be humble ‍ “You are utterly incorrect … How many irate mathematicians are needed to get you to change your mind?” — Ph.D from Georgetown University “May I suggest that you obtain and refer to a standard textbook on probability before you try to answer a question of this type again?” — Ph.D from University of Florida “You’re in error, but Albert Einstein earned a dearer place in the hearts of people after he admitted his errors.” — Ph.D. from University of Michigan Ouch! These are some of the said responses from mathematicians to the Parade article. Such unnecessary viciousness. You can check the reference³ to see the writer’s names and other like it. To whet your appetite: “You blew it, and you blew it big!”, , “You made a mistake, but look at the positive side. If all those Ph.D.’s were wrong, the country would be in some very serious trouble.”, “I am in shock that after being corrected by at least three mathematicians, you still do not see your mistake.”. And as expected from the 1990s perhaps the most embarrassing one was from a resident of Oregon: “Maybe women look at math problems differently than men.” These make me cringe and be embarrassed to be associated by gender and Ph.D. title with these graduates and professors. Hopefully in the 2020s most people are more humble about their ignorance. Yuval Noah Harari discusses the fact that the Scientific Revolution of Galileo Galilei et al. was not due to knowledge but rather admittance of ignorance. “The great discovery that launched the Scientific Revolution was the discovery that humans do not know the answers to their most important questions” — Yuval Noah Harari Fortunately for mathematicians’ image, there were also quiet a lot of more enlightened comments. I like this one from one Seth Kalson, Ph.D. of MIT: You are indeed correct. My colleagues at work had a ball with this problem, and I dare say that most of them, including me at first, thought you were wrong! We’ll summarise by examining how, and if, the Monty Hall problem may be applied in real-world settings, so you can try to relate to projects that you are working on. Application in Real World Settings Researching for this article I found that beyond artificial setups for entertainment⁶ ⁷ there aren’t practical settings for this problem to use as an analogy. Of course, I may be wrong⁸ and would be glad to hear if you know of one. One way of assessing the viability of an analogy is using arguments from causality which provides vocabulary that cannot be expressed with standard statistics. In a previous post I discussed the fact that the story behind the data is as important as the data itself. In particular Causal Graph Models visualise the story behind the data, which we will use as a framework for a reasonable analogy. For the Monty Hall problem we can build a Causal Graph Model like this: Reading: The door chosen by the trader is independent from that with the prize and vice versa. As important, there is no common cause between them that might generate a spurious correlation. The host’s choice depends on both and . By comparing causal graphs of two systems one can get a sense for how analogous both are. A perfect analogy would require more details, but this is beyond the scope of this article. Briefly, one would want to ensure similar functions between the parameters. Those interested in learning further details about using Causal Graphs Models to assess causality in real world problems may be interested in this article. Anecdotally it is also worth mentioning that on Let’s Make a Deal, Monty himself has admitted years later to be playing mind games with the contestants and did not always follow the rules, e.g, not always doing the intervention as “it all depends on his mood”⁴. In our setup we assumed perfect conditions, i.e., a host that does not skew from the script and/or play on the trader’s emotions. Taking this into consideration would require updating the Graphical Model above, which is beyond the scope of this article. Some might be disheartened to realise at this stage of the post that there might not be real world applications for this problem. I argue that lessons learnt from the Monty Hall problem definitely are. Just to summarise them again:Assessing probabilities can be counter intuitive …… especially when dealing with ambiguityWith new information we should update our beliefsBe one with subjectivityWhen confused — look for a useful analogy … but tread with cautionSimulations are powerful but not always necessaryA well designed visual goes a long wayThere are many ways to skin a … problemEmbrace ignorance and be humble ‍ While the Monty Hall Problem might seem like a simple puzzle, it offers valuable insights into decision-making, particularly for data scientists. The problem highlights the importance of going beyond intuition and embracing a more analytical, data-driven approach. By understanding the principles of Bayesian thinking and updating our beliefs based on new information, we can make more informed decisions in many aspects of our lives, including data science. The Monty Hall Problem serves as a reminder that even seemingly straightforward scenarios can contain hidden complexities and that by carefully examining available information, we can uncover hidden truths and make better decisions. At the bottom of the article I provide a list of resources that I found useful to learn about this topic. Credit: Wikipedia Loved this post? Join me on LinkedIn or Buy me a coffee! Credits Unless otherwise noted, all images were created by the author. Many thanks to Jim Parr, Will Reynolds, and Betty Kazin for their useful comments. In the following supplementary sections I derive solutions to the Monty Hall’s problem from two perspectives: Bayesian Causal Both are motivated by questions in textbook: Causal Inference in Statistics A Primer by Judea Pearl, Madelyn Glymour, and Nicholas P. Jewell. Supplement 1: The Bayesian Point of View This section assumes a basic understanding of Bayes’ Theorem, in particular being comfortable conditional probabilities. In other words if this makes sense: We set out to use Bayes’ theorem to prove that switching doors improves chances in the N=3 Monty Hall Problem.We define X — the chosen door Y— the door with the prize Z — the door opened by the host Labelling the doors as A, B and C, without loss of generality, we need to solve for: Using Bayes’ theorem we equate the left side as and the right one as: Most components are equal=P=⅓ so we are left to prove: In the case where Y=B, the host has only one choice, making P= 1. In the case where Y=A, the host has two choices, making P= 1/2. From here: Quod erat demonstrandum. Note: if the “host choices” arguments didn’t make sense look at the table below showing this explicitly. You will want to compare entries {X=A, Y=B, Z=C} and {X=A, Y=A, Z=C}. Supplement 2: The Causal Point of View The section assumes a basic understanding of Directed Acyclic Graphsand Structural Causal Modelsis useful, but not required. In brief: DAGs qualitatively visualise the causal relationships between the parameter nodes. SCMs quantitatively express the formula relationships between the parameters. Given the DAG we are going to define the SCM that corresponds to the classic N=3 Monty Hall problem and use it to describe the joint distribution of all variables. We later will generically expand to N.We define X — the chosen door Y — the door with the prize Z — the door opened by the host According to the DAG we see that according to the chain rule: The SCM is defined by exogenous variables U , endogenous variables V, and the functions between them F: U = {X,Y}, V={Z}, F= {f} where X, Y and Z have door values: D = {A, B, C} The host choice is fdefined as: In order to generalise to N doors, the DAG remains the same, but the SCM requires to update D to be a set of N doors Dᵢ: {D₁, D₂, … Dₙ}. Exploring Example Scenarios To gain an intuition for this SCM, let’s examine 6 examples of 27: When X=YP= 0; cannot choose the participant’s door P= 1/2; is behind → chooses B at 50% P= 1/2; is behind → chooses C at 50%When X≠YP= 0; cannot choose the participant’s door P= 0; cannot choose prize door P= 1; has not choice in the matterCalculating Joint Probabilities Using logic let’s code up all 27 possibilities in python df = pd.DataFrame++, "Y":++)* 3, "Z":* 9}) df= None p_x = 1./3 p_y = 1./3 df.loc= 0 df.loc= 0.5 df.loc= 0 df.loc= 0 df.loc= 1 df= df* p_x * p_y print{df.sum}") df yields Resources This Quora discussion by Joshua Engel helped me shape a few aspects of this article. Causal Inference in Statistics A Primer / Pearl, Glymour & Jewell— excellent short text bookI also very much enjoy Tim Harford’s podcast Cautionary Tales. He wrote about this topic on November 3rd 2017 for the Financial Times: Monty Hall and the game show stick-or-switch conundrum Footnotes ¹ Vazsonyi, Andrew. “Which Door Has the Cadillac?”. Decision Line: 17–19. Archived from the originalon 13 April 2014. Retrieved 16 October 2012. ² Steve Selvin to the American Statistician in 1975.³Game Show Problem by Marilyn vos Savant’s “Ask Marilyn” in marilynvossavant.com: “This material in this article was originally published in PARADE magazine in 1990 and 1991” ⁴Tierney, John. “Behind Monty Hall’s Doors: Puzzle, Debate and Answer?”. The New York Times. Retrieved 18 January 2008. ⁵ Kahneman, D.. Thinking, fast and slow. Farrar, Straus and Giroux. ⁶ MythBusters Episode 177 “Pick a Door”Watch Mythbuster’s approach ⁶Monty Hall Problem on Survivor Season 41Watch Survivor’s take on the problem ⁷ Jingyi Jessica LiHow the Monty Hall problem is similar to the false discovery rate in high-throughput data analysis.Whereas the author points about “similarities” between hypothesis testing and the Monty Hall problem, I think that this is a bit misleading. The author is correct that both problems change by the order in which processes are done, but that is part of Bayesian statistics in general, not limited to the Monty Hall problem. The post 🚪🚪🐐 Lessons in Decision Making from the Monty Hall Problem appeared first on Towards Data Science. #lessons #decision #making #monty #hall
    TOWARDSDATASCIENCE.COM
    🚪🚪🐐 Lessons in Decision Making from the Monty Hall Problem
    The Monty Hall Problem is a well-known brain teaser from which we can learn important lessons in Decision Making that are useful in general and in particular for data scientists. If you are not familiar with this problem, prepare to be perplexed . If you are, I hope to shine light on aspects that you might not have considered . I introduce the problem and solve with three types of intuitions: Common — The heart of this post focuses on applying our common sense to solve this problem. We’ll explore why it fails us and what we can do to intuitively overcome this to make the solution crystal clear . We’ll do this by using visuals , qualitative arguments and some basic probabilities (not too deep, I promise). Bayesian — We will briefly discuss the importance of belief propagation. Causal — We will use a Graph Model to visualise conditions required to use the Monty Hall problem in real world settings.Spoiler alert I haven’t been convinced that there are any, but the thought process is very useful. I summarise by discussing lessons learnt for better data decision making. In regards to the Bayesian and Causal intuitions, these will be presented in a gentle form. For the mathematically inclined I also provide supplementary sections with short Deep Dives into each approach after the summary. (Note: These are not required to appreciate the main points of the article.) By examining different aspects of this puzzle in probability you will hopefully be able to improve your data decision making . Credit: Wikipedia First, some history. Let’s Make a Deal is a USA television game show that originated in 1963. As its premise, audience participants were considered traders making deals with the host, Monty Hall . At the heart of the matter is an apparently simple scenario: A trader is posed with the question of choosing one of three doors for the opportunity to win a luxurious prize, e.g, a car . Behind the other two were goats . The trader is shown three closed doors. The trader chooses one of the doors. Let’s call this (without loss of generalisability) door A and mark it with a . Keeping the chosen door closed, the host reveals one of the remaining doors showing a goat (let’s call this door C). The trader chooses door and the the host reveals door C showing a goat. The host then asks the trader if they would like to stick with their first choice or switch to the other remaining one (which we’ll call door B). If the trader guesses correct they win the prize . If not they’ll be shown another goat (also referred to as a zonk). What is the probability of being Zonked? Credit: Wikipedia Should the trader stick with their original choice of door A or switch to B? Before reading further, give it a go. What would you do? Most people are likely to have a gut intuition that “it doesn’t matter” arguing that in the first instance each door had a ⅓ chance of hiding the prize, and that after the host intervention , when only two doors remain closed, the winning of the prize is 50:50. There are various ways of explaining why the coin toss intuition is incorrect. Most of these involve maths equations, or simulations. Whereas we will address these later, we’ll attempt to solve by applying Occam’s razor: A principle that states that simpler explanations are preferable to more complex ones — William of Ockham (1287–1347) To do this it is instructive to slightly redefine the problem to a large N doors instead of the original three. The Large N-Door Problem Similar to before: you have to choose one of many doors. For illustration let’s say N=100. Behind one of the doors there is the prize and behind 99 (N-1) of the rest are goats . The 100 Door Monty Hall problem before the host intervention. You choose one door and the host reveals 98 (N-2) of the other doors that have goats leaving yours and one more closed . The 100 Door Monty Hall Problem after the host intervention. Should you stick with your door or make the switch? Should you stick with your original choice or make the switch? I think you’ll agree with me that the remaining door, not chosen by you, is much more likely to conceal the prize … so you should definitely make the switch! It’s illustrative to compare both scenarios discussed so far. In the next figure we compare the post host intervention for the N=3 setup (top panel) and that of N=100 (bottom): Post intervention settings for the N=3 setup (top) and N=100 (bottom). In both cases we see two shut doors, one of which we’ve chosen. The main difference between these scenarios is that in the first we see one goat and in the second there are more than the eye would care to see (unless you shepherd for a living). Why do most people consider the first case as a “50:50” toss up and in the second it’s obvious to make the switch? We’ll soon address this question of why. First let’s put probabilities of success behind the different scenarios. What’s The Frequency, Kenneth? So far we learnt from the N=100 scenario that switching doors is obviously beneficial. Inferring for the N=3 may be a leap of faith for most. Using some basic probability arguments here we’ll quantify why it is favourable to make the switch for any number door scenario N. We start with the standard Monty Hall problem (N=3). When it starts the probability of the prize being behind each of the doors A, B and C is p=⅓. To be explicit let’s define the Y parameter to be the door with the prize , i.e, p(Y=A)= p(Y=B)=p(Y=C)=⅓. The trick to solving this problem is that once the trader’s door A has been chosen , we should pay close attention to the set of the other doors {B,C}, which has the probability of p(Y∈{B,C})=p(Y=B)+p(Y=C)=⅔. This visual may help make sense of this: By being attentive to the {B,C} the rest should follow. When the goat is revealed it is apparent that the probabilities post intervention change. Note that for ease of reading I’ll drop the Y notation, where p(Y=A) will read p(A) and p(Y∈{B,C}) will read p({B,C}). Also for completeness the full terms after the intervention should be even longer due to it being conditional, e.g, p(Y=A|Z=C), p(Y∈{B,C}|Z=C), where Z is a parameter representing the choice of the host . (In the Bayesian supplement section below I use proper notation without this shortening.) p(A) remains ⅓ p({B,C})=p(B)+p(C) remains ⅔, p(C)=0; we just learnt that the goat is behind door C, not the prize. p(B)= p({B,C})-p(C) = ⅔ For anyone with the information provided by the host (meaning the trader and the audience) this means that it isn’t a toss of a fair coin! For them the fact that p(C) became zero does not “raise all other boats” (probabilities of doors A and B), but rather p(A) remains the same and p(B) gets doubled. The bottom line is that the trader should consider p(A) = ⅓ and p(B)=⅔, hence by switching they are doubling the odds at winning! Let’s generalise to N (to make the visual simpler we’ll use N=100 again as an analogy). When we start all doors have odds of winning the prize p=1/N. After the trader chooses one door which we’ll call D₁, meaning p(Y=D₁)=1/N, we should now pay attention to the remaining set of doors {D₂, …, Dₙ} will have a chance of p(Y∈{D₂, …, Dₙ})=(N-1)/N. When the host reveals (N-2) doors {D₃, …, Dₙ} with goats (back to short notation): p(D₁) remains 1/N p({D₂, …, Dₙ})=p(D₂)+p(D₃)+… + p(Dₙ) remains (N-1)/N p(D₃)=p(D₄)= …=p(Dₙ₋₁) =p(Dₙ) = 0; we just learnt that they have goats, not the prize. p(D₂)=p({D₂, …, Dₙ}) — p(D₃) — … — p(Dₙ)=(N-1)/N The trader should now consider two door values p(D₁)=1/N and p(D₂)=(N-1)/N. Hence the odds of winning improved by a factor of N-1! In the case of N=100, this means by an odds ratio of 99! (i.e, 99% likely to win a prize when switching vs. 1% if not). The improvement of odds ratios in all scenarios between N=3 to 100 may be seen in the following graph. The thin line is the probability of winning by choosing any door prior to the intervention p(Y)=1/N. Note that it also represents the chance of winning after the intervention, if they decide to stick to their guns and not switch p(Y=D₁|Z={D₃…Dₙ}). (Here I reintroduce the more rigorous conditional form mentioned earlier.) The thick line is the probability of winning the prize after the intervention if the door is switched p(Y=D₂|Z={D₃…Dₙ})=(N-1)/N: Probability of winning as a function of N. p(Y)=p(Y=no switch|Z)=1/N is the thin line; p(Y=switch|Z)=N/(N-1) is the thick one. (By definition the sum of both lines is 1 for each N.) Perhaps the most interesting aspect of this graph (albeit also by definition) is that the N=3 case has the highest probability before the host intervention , but the lowest probability after and vice versa for N=100. Another interesting feature is the quick climb in the probability of winning for the switchers: N=3: p=67% N=4: p=75% N=5=80% The switchers curve gradually reaches an asymptote approaching at 100% whereas at N=99 it is 98.99% and at N=100 is equal to 99%. This starts to address an interesting question: Why Is Switching Obvious For Large N But Not N=3? The answer is the fact that this puzzle is slightly ambiguous. Only the highly attentive realise that by revealing the goat (and never the prize!) the host is actually conveying a lot of information that should be incorporated into one’s calculation. Later we discuss the difference of doing this calculation in one’s mind based on intuition and slowing down by putting pen to paper or coding up the problem. How much information is conveyed by the host by intervening? A hand wavy explanation is that this information may be visualised as the gap between the lines in the graph above. For N=3 we saw that the odds of winning doubled (nothing to sneeze at!), but that doesn’t register as strongly to our common sense intuition as the 99 factor as in the N=100. I have also considered describing stronger arguments from Information Theory that provide useful vocabulary to express communication of information. However, I feel that this fascinating field deserves a post of its own, which I’ve published. The main takeaway for the Monty Hall problem is that I have calculated the information gain to be a logarithmic function of the number of doors c using this formula: Information Gain due to the intervention of the host for a setup with c doors. Full details in my upcoming article. For c=3 door case, e.g, the information gain is ⅔ bits (of a maximum possible 1.58 bits). Full details are in this article on entropy. To summarise this section, we use basic probability arguments to quantify the probabilities of winning the prize showing the benefit of switching for all N door scenarios. For those interested in more formal solutions using Bayesian and Causality on the bottom I provide supplement sections. In the next three final sections we’ll discuss how this problem was accepted in the general public back in the 1990s, discuss lessons learnt and then summarise how we can apply them in real-world settings. Being Confused Is OK “No, that is impossible, it should make no difference.” — Paul Erdős If you still don’t feel comfortable with the solution of the N=3 Monty Hall problem, don’t worry you are in good company! According to Vazsonyi (1999)¹ even Paul Erdős who is considered “of the greatest experts in probability theory” was confounded until computer simulations were demonstrated to him. When the original solution by Steve Selvin (1975)² was popularised by Marilyn vos Savant in her column “Ask Marilyn” in Parade magazine in 1990 many readers wrote that Selvin and Savant were wrong³. According to Tierney’s 1991 article in the New York Times, this included about 10,000 readers, including nearly 1,000 with Ph.D degrees⁴. On a personal note, over a decade ago I was exposed to the standard N=3 problem and since then managed to forget the solution numerous times. When I learnt about the large N approach I was quite excited about how intuitive it was. I then failed to explain it to my technical manager over lunch, so this is an attempt to compensate. I still have the same day job . While researching this piece I realised that there is a lot to learn in terms of decision making in general and in particular useful for data science. Lessons Learnt From Monty Hall Problem In his book Thinking Fast and Slow, the late Daniel Kahneman, the co-creator of Behaviour Economics, suggested that we have two types of thought processes: System 1 — fast thinking : based on intuition. This helps us react fast with confidence to familiar situations. System 2 – slow thinking : based on deep thought. This helps figure out new complex situations that life throws at us. Assuming this premise, you might have noticed that in the above you were applying both. By examining the visual of N=100 doors your System 1 kicked in and you immediately knew the answer. I’m guessing that in the N=3 you were straddling between System 1 and 2. Considering that you had to stop and think a bit when going throughout the probabilities exercise it was definitely System 2 . The decision maker’s struggle between System 1 and System 2 . Generated using Gemini Imagen 3 Beyond the fast and slow thinking I feel that there are a lot of data decision making lessons that may be learnt. (1) Assessing probabilities can be counter-intuitive … or Be comfortable with shifting to deep thought We’ve clearly shown that in the N=3 case. As previously mentioned it confounded many people including prominent statisticians. Another classic example is The Birthday Paradox , which shows how we underestimate the likelihood of coincidences. In this problem most people would think that one needs a large group of people until they find a pair sharing the same birthday. It turns out that all you need is 23 to have a 50% chance. And 70 for a 99.9% chance. One of the most confusing paradoxes in the realm of data analysis is Simpson’s, which I detailed in a previous article. This is a situation where trends of a population may be reversed in its subpopulations. The common with all these paradoxes is them requiring us to get comfortable to shifting gears from System 1 fast thinking to System 2 slow . This is also the common theme for the lessons outlined below. A few more classical examples are: The Gambler’s Fallacy , Base Rate Fallacy and the The Linda [bank teller] Problem . These are beyond the scope of this article, but I highly recommend looking them up to further sharpen ways of thinking about data. (2) … especially when dealing with ambiguity or Search for clarity in ambiguity Let’s reread the problem, this time as stated in “Ask Marilyn” Suppose you’re on a game show, and you’re given the choice of three doors: Behind one door is a car; behind the others, goats. You pick a door, say №1, and the host, who knows what’s behind the doors, opens another door, say №3, which has a goat. He then says to you, “Do you want to pick door №2?” Is it to your advantage to switch your choice? We discussed that the most important piece of information is not made explicit. It says that the host “knows what’s behind the doors”, but not that they open a door at random, although it’s implicitly understood that the host will never open the door with the car. Many real life problems in data science involve dealing with ambiguous demands as well as in data provided by stakeholders. It is crucial for the researcher to track down any relevant piece of information that is likely to have an impact and update that into the solution. Statisticians refer to this as “belief update”. (3) With new information we should update our beliefs This is the main aspect separating the Bayesian stream of thought to the Frequentist. The Frequentist approach takes data at face value (referred to as flat priors). The Bayesian approach incorporates prior beliefs and updates it when new findings are introduced. This is especially useful when dealing with ambiguous situations. To drive this point home, let’s re-examine this figure comparing between the post intervention N=3 setups (top panel) and the N=100 one (bottom panel). Copied from above. Post intervention settings for the N=3 setup (top) and N=100 (bottom). In both cases we had a prior belief that all doors had an equal chance of winning the prize p=1/N. Once the host opened one door (N=3; or 98 doors when N=100) a lot of valuable information was revealed whereas in the case of N=100 it was much more apparent than N=3. In the Frequentist approach, however, most of this information would be ignored, as it only focuses on the two closed doors. The Frequentist conclusion, hence is a 50% chance to win the prize regardless of what else is known about the situation. Hence the Frequentist takes Paul Erdős’ “no difference” point of view, which we now know to be incorrect. This would be reasonable if all that was presented were the two doors and not the intervention and the goats. However, if that information is presented, one should shift gears into System 2 thinking and update their beliefs in the system. This is what we have done by focusing not only on the shut door, but rather consider what was learnt about the system at large. For the brave hearted , in a supplementary section below called The Bayesian Point of View I solve for the Monty Hall problem using the Bayesian formalism. (4) Be one with subjectivity The Frequentist main reservation about “going Bayes” is that — “Statistics should be objective”. The Bayesian response is — the Frequentist’s also apply a prior without realising it — a flat one. Regardless of the Bayesian/Frequentist debate, as researchers we try our best to be as objective as possible in every step of the analysis. That said, it is inevitable that subjective decisions are made throughout. E.g, in a skewed distribution should one quote the mean or median? It highly depends on the context and hence a subjective decision needs to be made. The responsibility of the analyst is to provide justification for their choices first to convince themselves and then their stakeholders. (5) When confused — look for a useful analogy … but tread with caution We saw that by going from the N=3 setup to the N=100 the solution was apparent. This is a trick scientists frequently use — if the problem appears at first a bit too confusing/overwhelming, break it down and try to find a useful analogy. It is probably not a perfect comparison, but going from the N=3 setup to N=100 is like examining a picture from up close and zooming out to see the big picture. Think of having only a puzzle piece and then glancing at the jigsaw photo on the box. Monty Hall in 1976. Credit: Wikipedia and using Visual Paradigm Online for the puzzle effect Note: whereas analogies may be powerful, one should do so with caution, not to oversimplify. Physicists refer to this situation as the spherical cow method, where models may oversimplify complex phenomena. I admit that even with years of experience in applied statistics at times I still get confused at which method to apply. A large part of my thought process is identifying analogies to known solved problems. Sometimes after making progress in a direction I will realise that my assumptions were wrong and seek a new direction. I used to quip with colleagues that they shouldn’t trust me before my third attempt … (6) Simulations are powerful but not always necessary It’s interesting to learn that Paul Erdős and other mathematicians were convinced only after seeing simulations of the problem. I am two-minded about usage of simulations when it comes to problem solving. On the one hand simulations are powerful tools to analyse complex and intractable problems. Especially in real life data in which one wants a grasp not only of the underlying formulation, but also stochasticity. And here is the big BUT — if a problem can be analytically solved like the Monty Hall one, simulations as fun as they may be (such as the MythBusters have done⁶), may not be necessary. According to Occam’s razor, all that is required is a brief intuition to explain the phenomena. This is what I attempted to do here by applying common sense and some basic probability reasoning. For those who enjoy deep dives I provide below supplementary sections with two methods for analytical solutions — one using Bayesian statistics and another using Causality. [Update] After publishing the first version of this article there was a comment that Savant’s solution³ may be simpler than those presented here. I revisited her communications and agreed that it should be added. In the process I realised three more lessons may be learnt. (7) A well designed visual goes a long way Continuing the principle of Occam’s razor, Savant explained³ quite convincingly in my opinion: You should switch. The first door has a 1/3 chance of winning, but the second door has a 2/3 chance. Here’s a good way to visualize what happened. Suppose there are a million doors, and you pick door #1. Then the host, who knows what’s behind the doors and will always avoid the one with the prize, opens them all except door #777,777. You’d switch to that door pretty fast, wouldn’t you? Hence she provided an abstract visual for the readers. I attempted to do the same with the 100 doors figures. Marilyn vos Savant who popularised the Monty Hall Problem. Credit: Ben David on Flickr under license As mentioned many readers, and especially with backgrounds in maths and statistics, still weren’t convinced. She revised³ with another mental image: The benefits of switching are readily proven by playing through the six games that exhaust all the possibilities. For the first three games, you choose #1 and “switch” each time, for the second three games, you choose #1 and “stay” each time, and the host always opens a loser. Here are the results. She added a table with all the scenarios. I took some artistic liberty and created the following figure. As indicated, the top batch are the scenarios in which the trader switches and the bottom when they switch. Lines in green are games which the trader wins, and in red when they get zonked. The symbolised the door chosen by the trader and Monte Hall then chooses a different door that has a goat behind it. Adaptation of Savant’s table³ of six scenarios that shows the solution to the Monty Hall Problem We clearly see from this diagram that the switcher has a ⅔ chance of winning and those that stay only ⅓. This is yet another elegant visualisation that clearly explains the non intuitive. It strengthens the claim that there is no real need for simulations in this case because all they would be doing is rerunning these six scenarios. One more popular solution is decision tree illustrations. You can find these in the Wikipedia page, but I find it’s a bit redundant to Savant’s table. The fact that we can solve this problem in so many ways yields another lesson: (8) There are many ways to skin a … problem Of the many lessons that I have learnt from the writings of late Richard Feynman, one of the best physics and ideas communicators, is that a problem can be solved many ways. Mathematicians and Physicists do this all the time. A relevant quote that paraphrases Occam’s razor: If you can’t explain it simply, you don’t understand it well enough — attributed to Albert Einstein And finally (9) Embrace ignorance and be humble ‍ “You are utterly incorrect … How many irate mathematicians are needed to get you to change your mind?” — Ph.D from Georgetown University “May I suggest that you obtain and refer to a standard textbook on probability before you try to answer a question of this type again?” — Ph.D from University of Florida “You’re in error, but Albert Einstein earned a dearer place in the hearts of people after he admitted his errors.” — Ph.D. from University of Michigan Ouch! These are some of the said responses from mathematicians to the Parade article. Such unnecessary viciousness. You can check the reference³ to see the writer’s names and other like it. To whet your appetite: “You blew it, and you blew it big!”, , “You made a mistake, but look at the positive side. If all those Ph.D.’s were wrong, the country would be in some very serious trouble.”, “I am in shock that after being corrected by at least three mathematicians, you still do not see your mistake.”. And as expected from the 1990s perhaps the most embarrassing one was from a resident of Oregon: “Maybe women look at math problems differently than men.” These make me cringe and be embarrassed to be associated by gender and Ph.D. title with these graduates and professors. Hopefully in the 2020s most people are more humble about their ignorance. Yuval Noah Harari discusses the fact that the Scientific Revolution of Galileo Galilei et al. was not due to knowledge but rather admittance of ignorance. “The great discovery that launched the Scientific Revolution was the discovery that humans do not know the answers to their most important questions” — Yuval Noah Harari Fortunately for mathematicians’ image, there were also quiet a lot of more enlightened comments. I like this one from one Seth Kalson, Ph.D. of MIT: You are indeed correct. My colleagues at work had a ball with this problem, and I dare say that most of them, including me at first, thought you were wrong! We’ll summarise by examining how, and if, the Monty Hall problem may be applied in real-world settings, so you can try to relate to projects that you are working on. Application in Real World Settings Researching for this article I found that beyond artificial setups for entertainment⁶ ⁷ there aren’t practical settings for this problem to use as an analogy. Of course, I may be wrong⁸ and would be glad to hear if you know of one. One way of assessing the viability of an analogy is using arguments from causality which provides vocabulary that cannot be expressed with standard statistics. In a previous post I discussed the fact that the story behind the data is as important as the data itself. In particular Causal Graph Models visualise the story behind the data, which we will use as a framework for a reasonable analogy. For the Monty Hall problem we can build a Causal Graph Model like this: Reading: The door chosen by the trader is independent from that with the prize and vice versa. As important, there is no common cause between them that might generate a spurious correlation. The host’s choice depends on both and . By comparing causal graphs of two systems one can get a sense for how analogous both are. A perfect analogy would require more details, but this is beyond the scope of this article. Briefly, one would want to ensure similar functions between the parameters (referred to as the Structural Causal Model; for details see in the supplementary section below called The Causal Point of View). Those interested in learning further details about using Causal Graphs Models to assess causality in real world problems may be interested in this article. Anecdotally it is also worth mentioning that on Let’s Make a Deal, Monty himself has admitted years later to be playing mind games with the contestants and did not always follow the rules, e.g, not always doing the intervention as “it all depends on his mood”⁴. In our setup we assumed perfect conditions, i.e., a host that does not skew from the script and/or play on the trader’s emotions. Taking this into consideration would require updating the Graphical Model above, which is beyond the scope of this article. Some might be disheartened to realise at this stage of the post that there might not be real world applications for this problem. I argue that lessons learnt from the Monty Hall problem definitely are. Just to summarise them again: (1) Assessing probabilities can be counter intuitive …(Be comfortable with shifting to deep thought ) (2) … especially when dealing with ambiguity(Search for clarity ) (3) With new information we should update our beliefs (4) Be one with subjectivity (5) When confused — look for a useful analogy … but tread with caution (6) Simulations are powerful but not always necessary (7) A well designed visual goes a long way (8) There are many ways to skin a … problem (9) Embrace ignorance and be humble ‍ While the Monty Hall Problem might seem like a simple puzzle, it offers valuable insights into decision-making, particularly for data scientists. The problem highlights the importance of going beyond intuition and embracing a more analytical, data-driven approach. By understanding the principles of Bayesian thinking and updating our beliefs based on new information, we can make more informed decisions in many aspects of our lives, including data science. The Monty Hall Problem serves as a reminder that even seemingly straightforward scenarios can contain hidden complexities and that by carefully examining available information, we can uncover hidden truths and make better decisions. At the bottom of the article I provide a list of resources that I found useful to learn about this topic. Credit: Wikipedia Loved this post? Join me on LinkedIn or Buy me a coffee! Credits Unless otherwise noted, all images were created by the author. Many thanks to Jim Parr, Will Reynolds, and Betty Kazin for their useful comments. In the following supplementary sections I derive solutions to the Monty Hall’s problem from two perspectives: Bayesian Causal Both are motivated by questions in textbook: Causal Inference in Statistics A Primer by Judea Pearl, Madelyn Glymour, and Nicholas P. Jewell (2016). Supplement 1: The Bayesian Point of View This section assumes a basic understanding of Bayes’ Theorem, in particular being comfortable conditional probabilities. In other words if this makes sense: We set out to use Bayes’ theorem to prove that switching doors improves chances in the N=3 Monty Hall Problem. (Problem 1.3.3 of the Primer textbook.) We define X — the chosen door Y— the door with the prize Z — the door opened by the host Labelling the doors as A, B and C, without loss of generality, we need to solve for: Using Bayes’ theorem we equate the left side as and the right one as: Most components are equal (remember that P(Y=A)=P(Y=B)=⅓ so we are left to prove: In the case where Y=B (the prize is behind door B ), the host has only one choice (can only select door C ), making P(X=A, Z=C|Y=B)= 1. In the case where Y=A (the prize is behind door A ), the host has two choices (doors B and C ) , making P(X=A, Z=C|Y=A)= 1/2. From here: Quod erat demonstrandum. Note: if the “host choices” arguments didn’t make sense look at the table below showing this explicitly. You will want to compare entries {X=A, Y=B, Z=C} and {X=A, Y=A, Z=C}. Supplement 2: The Causal Point of View The section assumes a basic understanding of Directed Acyclic Graphs (DAGs) and Structural Causal Models (SCMs) is useful, but not required. In brief: DAGs qualitatively visualise the causal relationships between the parameter nodes. SCMs quantitatively express the formula relationships between the parameters. Given the DAG we are going to define the SCM that corresponds to the classic N=3 Monty Hall problem and use it to describe the joint distribution of all variables. We later will generically expand to N. (Inspired by problem 1.5.4 of the Primer textbook as well as its brief mention of the N door problem.) We define X — the chosen door Y — the door with the prize Z — the door opened by the host According to the DAG we see that according to the chain rule: The SCM is defined by exogenous variables U , endogenous variables V, and the functions between them F: U = {X,Y}, V={Z}, F= {f(Z)} where X, Y and Z have door values: D = {A, B, C} The host choice is f(Z) defined as: In order to generalise to N doors, the DAG remains the same, but the SCM requires to update D to be a set of N doors Dᵢ: {D₁, D₂, … Dₙ}. Exploring Example Scenarios To gain an intuition for this SCM, let’s examine 6 examples of 27 (=3³) : When X=Y (i.e., the prize is behind the chosen door ) P(Z=A|X=A, Y=A) = 0; cannot choose the participant’s door P(Z=B|X=A, Y=A) = 1/2; is behind → chooses B at 50% P(Z=C|X=A, Y=A) = 1/2; is behind → chooses C at 50%(complementary to the above) When X≠Y (i.e., the prize is not behind the chosen door ) P(Z=A|X=A, Y=B) = 0; cannot choose the participant’s door P(Z=B|X=A, Y=B) = 0; cannot choose prize door P(Z=C|X=A, Y=B) = 1; has not choice in the matter(complementary to the above) Calculating Joint Probabilities Using logic let’s code up all 27 possibilities in python df = pd.DataFrame({"X": (["A"] * 9) + (["B"] * 9) + (["C"] * 9), "Y": ((["A"] * 3) + (["B"] * 3) + (["C"] * 3) )* 3, "Z": ["A", "B", "C"] * 9}) df["P(Z|X,Y)"] = None p_x = 1./3 p_y = 1./3 df.loc[df.query("X == Y == Z").index, "P(Z|X,Y)"] = 0 df.loc[df.query("X == Y != Z").index, "P(Z|X,Y)"] = 0.5 df.loc[df.query("X != Y == Z").index, "P(Z|X,Y)"] = 0 df.loc[df.query("Z == X != Y").index, "P(Z|X,Y)"] = 0 df.loc[df.query("X != Y").query("Z != Y").query("Z != X").index, "P(Z|X,Y)"] = 1 df["P(X, Y, Z)"] = df["P(Z|X,Y)"] * p_x * p_y print(f"Testing normalisation of P(X,Y,Z) {df['P(X, Y, Z)'].sum()}") df yields Resources This Quora discussion by Joshua Engel helped me shape a few aspects of this article. Causal Inference in Statistics A Primer / Pearl, Glymour & Jewell (2016) — excellent short text book (site) I also very much enjoy Tim Harford’s podcast Cautionary Tales. He wrote about this topic on November 3rd 2017 for the Financial Times: Monty Hall and the game show stick-or-switch conundrum Footnotes ¹ Vazsonyi, Andrew (December 1998 — January 1999). “Which Door Has the Cadillac?” (PDF). Decision Line: 17–19. Archived from the original (PDF) on 13 April 2014. Retrieved 16 October 2012. ² Steve Selvin to the American Statistician in 1975.[1][2] ³Game Show Problem by Marilyn vos Savant’s “Ask Marilyn” in marilynvossavant.com (web archive): “This material in this article was originally published in PARADE magazine in 1990 and 1991” ⁴Tierney, John (21 July 1991). “Behind Monty Hall’s Doors: Puzzle, Debate and Answer?”. The New York Times. Retrieved 18 January 2008. ⁵ Kahneman, D. (2011). Thinking, fast and slow. Farrar, Straus and Giroux. ⁶ MythBusters Episode 177 “Pick a Door” (Wikipedia) Watch Mythbuster’s approach ⁶Monty Hall Problem on Survivor Season 41 (LinkedIn, YouTube) Watch Survivor’s take on the problem ⁷ Jingyi Jessica Li (2024) How the Monty Hall problem is similar to the false discovery rate in high-throughput data analysis.Whereas the author points about “similarities” between hypothesis testing and the Monty Hall problem, I think that this is a bit misleading. The author is correct that both problems change by the order in which processes are done, but that is part of Bayesian statistics in general, not limited to the Monty Hall problem. The post 🚪🚪🐐 Lessons in Decision Making from the Monty Hall Problem appeared first on Towards Data Science.
    0 Yorumlar 0 hisse senetleri
  • #333;">BOYAMIC 2 Rebuilds Mobile Audio with AI and Onboard Capture

    Wireless mics fail when they rely too much on perfect conditions.
    BOYAMIC 2 fixes that by making every part of the system self-contained.
    Each transmitter records on its own.
    Each receiver controls levels, backups, and signal without needing an app.
    Noise is filtered in real time.
    Recording keeps going even if the connection drops.
    Designer: BOYAMIC
    There’s no need for a separate recorder or post-edit rescue.
    The unit handles gain shifts, background interference, and voice clarity without user intervention.
    Everything shows on screen.
    Adjustments happen through physical controls.
    Files are saved directly to internal memory.
    This system is built to capture clean audio without depending on external gear.
    It records immediately, adapts instantly, and stores everything without breaking the workflow.
    Industrial Design and Physical Form
    Each transmitter is small but solid.
    It’s 40 millimeters tall with a ridged surface that helps with grip and alignment.
    The finish reduces glare and makes handling easier.
    You can clip it or use the built-in magnet.
    Placement is quick, and it stays put.
    The record button is recessed, so you won’t hit it by mistake.
    An LED shows when it’s active.
    The mic capsule stays exposed but protected, avoiding interference from hands or clothing.
    Nothing sticks out or gets in the way.
     
    The receiver is built around a screen and a knob.
    The 1.1-inch display shows battery, signal, gain, and status.
    The knob adjusts volume and selects settings.
    It works fast, without touchscreen lag.
    You can see and feel every change.
    Connections are spaced cleanly.
    One side has a USB-C port.
    The other has a 3.5 mm jack.
    A plug-in port supports USB-C or Lightning.
    The mount is fixed and locks into rigs without shifting.
    The charging case holds two transmitters and one receiver.
    Each has its own slot with magnetic contacts.
    Drop them in, close the lid, and they stay in place.
    LEDs on the case show power levels.
    There are no loose parts, exposed pins, or extra steps.
    Every shape and control supports fast setup and clear operation.
    You can press, turn, mount, and move without second-guessing.
    The design doesn’t try to be invisible; it stays readable, durable, and direct.
    Signal Processing and Audio Control
    BOYAMIC 2 uses onboard AI to separate voice from background noise.
    The system was trained on over 700,000 real-world sound samples.
    It filters traffic, crowds, wind, and mechanical hum in real time.
    Depending on the environment, you can toggle between strong and weak noise reduction.
    Both modes work directly from the transmitter or through the receiver.
    The mic uses a 6mm condenser capsule with a 48 kHz sample rate and 24-bit depth.
    The signal-to-noise ratio reaches 90 dB.
    Two low-cut filter options, at 75 Hz and 150 Hz, handle low-end rumble.
    These are effective against HVAC, engine hum, or low vibration.
    Gain is managed with automatic control.
    The system boosts quiet voices and pulls back when sound gets too loud.
    Built-in limiters stop clipping during spikes.
    A safety track records a second copy at -12 dB for backup.
    This makes it harder to lose a usable take even when volume jumps suddenly.
    Each setting is adjustable on screen.
    You don’t need a mobile app to access basic controls.
    Everything runs live and updates immediately.
    There are no delays or sync problems during capture.
    Recording and Storage
    Each transmitter records internally without needing the receiver.
    Files are saved in 32-bit float or 24-bit WAV formats.
    Internal storage is 8 GB.
    That gives you about ten hours of float audio or fifteen hours of 24-bit.
    When full, the system loops and overwrites older files.
    Recording continues even if the connection drops.
    Every session is split into timestamped chunks for fast transfer.
    You can plug the transmitter into any USB-C port and drag the files directly.
    No software is needed.
    This setup protects against signal loss, battery drops, or app crashes.
    The mic stays live, and the recording stays intact.
    Each transmitter runs for up to nine hours without noise cancellation or recording.
    With both features on, the runtime is closer to six hours.
    The receiver runs for about fifteen hours.
    The charging case holds enough power to recharge all three units twice.
    The system uses 2.4 GHz digital transmission.
    Its range can reach up to 300 meters in open areas.
    With walls or obstacles, it drops to around 60 meters.
    Latency stays at 25 milliseconds, even at long distances.
    You get reliable sync and stable audio across open ground or indoor spaces.
    Charging is handled through the included case or by direct USB-C.
    Each device takes under two hours to recharge fully.
    Compatibility and Multi-Device Support
    The system supports cameras, smartphones, and computers.
    USB-C and Lightning adapters are included.
    A 3.5 mm TRS cable connects the receiver to most cameras or mixers.
    While recording, you can charge your phone through the receiver, which is useful for long mobile shoots.
    One transmitter can send audio to up to four receivers at once, which helps with multi-angle setups or backup channels.
    The receiver also supports stereo, mono, and safety track modes.
    Based on your workflow, you choose how audio is split or merged.
    Settings can be changed from the receiver screen or through the BOYA app.
    The app adds firmware updates, custom EQ profiles, and gain presets for different camera brands.
    But the core controls don’t depend on it.The post BOYAMIC 2 Rebuilds Mobile Audio with AI and Onboard Capture first appeared on Yanko Design.
    #0066cc;">#boyamic #rebuilds #mobile #audio #with #and #onboard #capture #wireless #mics #fail #when #they #rely #too #much #perfect #conditionsboyamic #fixes #that #making #every #part #the #system #selfcontainedeach #transmitter #records #its #owneach #receiver #controls #levels #backups #signal #without #needing #appnoise #filtered #real #timerecording #keeps #going #even #connection #dropsdesigner #boyamictheres #need #for #separate #recorder #postedit #rescuethe #unit #handles #gain #shifts #background #interference #voice #clarity #user #interventioneverything #shows #screenadjustments #happen #through #physical #controlsfiles #are #saved #directly #internal #memorythis #built #clean #depending #external #gearit #immediately #adapts #instantly #stores #everything #breaking #workflowindustrial #design #formeach #small #but #solidits #millimeters #tall #ridged #surface #helps #grip #alignmentthe #finish #reduces #glare #makes #handling #easieryou #can #clip #use #builtin #magnetplacement #quick #stays #putthe #record #button #recessed #you #wont #hit #mistakean #led #activethe #mic #capsule #exposed #protected #avoiding #from #hands #clothingnothing #sticks #out #gets #waythe #around #screen #knobthe #11inch #display #battery #statusthe #knob #adjusts #volume #selects #settingsit #works #fast #touchscreen #lagyou #see #feel #changeconnections #spaced #cleanlyone #side #has #usbc #portthe #other #jacka #plugin #port #supports #lightningthe #mount #fixed #locks #into #rigs #shiftingthe #charging #case #holds #two #transmitters #one #receivereach #own #slot #magnetic #contactsdrop #them #close #lid #stay #placeleds #show #power #levelsthere #loose #parts #pins #extra #stepsevery #shape #control #setup #clear #operationyou #press #turn #move #secondguessingthe #doesnt #try #invisible #readable #durable #directsignal #processing #controlboyamic #uses #noisethe #was #trained #over #realworld #sound #samplesit #filters #traffic #crowds #wind #mechanical #hum #timedepending #environment #toggle #between #strong #weak #noise #reductionboth #modes #work #receiverthe #6mm #condenser #khz #sample #rate #24bit #depththe #signaltonoise #ratio #reaches #dbtwo #lowcut #filter #options #handle #lowend #rumblethese #effective #against #hvac #engine #low #vibrationgain #managed #automatic #controlthe #boosts #quiet #voices #pulls #back #loudbuiltin #limiters #stop #clipping #during #spikesa #safety #track #second #copy #backupthis #harder #lose #usable #take #jumps #suddenlyeach #setting #adjustable #screenyou #dont #app #access #basic #controlseverything #runs #live #updates #immediatelythere #delays #sync #problems #capturerecording #storageeach #internally #receiverfiles #32bit #float #wav #formatsinternal #storage #gbthat #gives #about #ten #hours #fifteen #24bitwhen #full #loops #overwrites #older #filesrecording #continues #dropsevery #session #split #timestamped #chunks #transferyou #plug #any #drag #files #directlyno #software #neededthis #protects #loss #drops #crashesthe #recording #intacteach #nine #cancellation #recordingwith #both #features #runtime #closer #six #hoursthe #enough #recharge #all #three #units #twicethe #ghz #digital #transmissionits #range #reach #meters #open #areaswith #walls #obstacles #meterslatency #milliseconds #long #distancesyou #get #reliable #stable #across #ground #indoor #spacescharging #handled #included #direct #usbceach #device #takes #under #fullycompatibility #multidevice #supportthe #cameras #smartphones #computersusbc #lightning #adapters #includeda #trs #cable #connects #most #mixerswhile #charge #your #phone #which #useful #shootsone #send #four #receivers #once #multiangle #setups #backup #channelsthe #also #stereo #mono #modesbased #workflow #choose #how #mergedsettings #changed #boya #appthe #adds #firmware #custom #profiles #presets #different #camera #brandsbut #core #depend #itthe #post #first #appeared #yanko
    BOYAMIC 2 Rebuilds Mobile Audio with AI and Onboard Capture
    Wireless mics fail when they rely too much on perfect conditions. BOYAMIC 2 fixes that by making every part of the system self-contained. Each transmitter records on its own. Each receiver controls levels, backups, and signal without needing an app. Noise is filtered in real time. Recording keeps going even if the connection drops. Designer: BOYAMIC There’s no need for a separate recorder or post-edit rescue. The unit handles gain shifts, background interference, and voice clarity without user intervention. Everything shows on screen. Adjustments happen through physical controls. Files are saved directly to internal memory. This system is built to capture clean audio without depending on external gear. It records immediately, adapts instantly, and stores everything without breaking the workflow. Industrial Design and Physical Form Each transmitter is small but solid. It’s 40 millimeters tall with a ridged surface that helps with grip and alignment. The finish reduces glare and makes handling easier. You can clip it or use the built-in magnet. Placement is quick, and it stays put. The record button is recessed, so you won’t hit it by mistake. An LED shows when it’s active. The mic capsule stays exposed but protected, avoiding interference from hands or clothing. Nothing sticks out or gets in the way.   The receiver is built around a screen and a knob. The 1.1-inch display shows battery, signal, gain, and status. The knob adjusts volume and selects settings. It works fast, without touchscreen lag. You can see and feel every change. Connections are spaced cleanly. One side has a USB-C port. The other has a 3.5 mm jack. A plug-in port supports USB-C or Lightning. The mount is fixed and locks into rigs without shifting. The charging case holds two transmitters and one receiver. Each has its own slot with magnetic contacts. Drop them in, close the lid, and they stay in place. LEDs on the case show power levels. There are no loose parts, exposed pins, or extra steps. Every shape and control supports fast setup and clear operation. You can press, turn, mount, and move without second-guessing. The design doesn’t try to be invisible; it stays readable, durable, and direct. Signal Processing and Audio Control BOYAMIC 2 uses onboard AI to separate voice from background noise. The system was trained on over 700,000 real-world sound samples. It filters traffic, crowds, wind, and mechanical hum in real time. Depending on the environment, you can toggle between strong and weak noise reduction. Both modes work directly from the transmitter or through the receiver. The mic uses a 6mm condenser capsule with a 48 kHz sample rate and 24-bit depth. The signal-to-noise ratio reaches 90 dB. Two low-cut filter options, at 75 Hz and 150 Hz, handle low-end rumble. These are effective against HVAC, engine hum, or low vibration. Gain is managed with automatic control. The system boosts quiet voices and pulls back when sound gets too loud. Built-in limiters stop clipping during spikes. A safety track records a second copy at -12 dB for backup. This makes it harder to lose a usable take even when volume jumps suddenly. Each setting is adjustable on screen. You don’t need a mobile app to access basic controls. Everything runs live and updates immediately. There are no delays or sync problems during capture. Recording and Storage Each transmitter records internally without needing the receiver. Files are saved in 32-bit float or 24-bit WAV formats. Internal storage is 8 GB. That gives you about ten hours of float audio or fifteen hours of 24-bit. When full, the system loops and overwrites older files. Recording continues even if the connection drops. Every session is split into timestamped chunks for fast transfer. You can plug the transmitter into any USB-C port and drag the files directly. No software is needed. This setup protects against signal loss, battery drops, or app crashes. The mic stays live, and the recording stays intact. Each transmitter runs for up to nine hours without noise cancellation or recording. With both features on, the runtime is closer to six hours. The receiver runs for about fifteen hours. The charging case holds enough power to recharge all three units twice. The system uses 2.4 GHz digital transmission. Its range can reach up to 300 meters in open areas. With walls or obstacles, it drops to around 60 meters. Latency stays at 25 milliseconds, even at long distances. You get reliable sync and stable audio across open ground or indoor spaces. Charging is handled through the included case or by direct USB-C. Each device takes under two hours to recharge fully. Compatibility and Multi-Device Support The system supports cameras, smartphones, and computers. USB-C and Lightning adapters are included. A 3.5 mm TRS cable connects the receiver to most cameras or mixers. While recording, you can charge your phone through the receiver, which is useful for long mobile shoots. One transmitter can send audio to up to four receivers at once, which helps with multi-angle setups or backup channels. The receiver also supports stereo, mono, and safety track modes. Based on your workflow, you choose how audio is split or merged. Settings can be changed from the receiver screen or through the BOYA app. The app adds firmware updates, custom EQ profiles, and gain presets for different camera brands. But the core controls don’t depend on it.The post BOYAMIC 2 Rebuilds Mobile Audio with AI and Onboard Capture first appeared on Yanko Design.
    المصدر: www.yankodesign.com
    #boyamic #rebuilds #mobile #audio #with #and #onboard #capture #wireless #mics #fail #when #they #rely #too #much #perfect #conditionsboyamic #fixes #that #making #every #part #the #system #selfcontainedeach #transmitter #records #its #owneach #receiver #controls #levels #backups #signal #without #needing #appnoise #filtered #real #timerecording #keeps #going #even #connection #dropsdesigner #boyamictheres #need #for #separate #recorder #postedit #rescuethe #unit #handles #gain #shifts #background #interference #voice #clarity #user #interventioneverything #shows #screenadjustments #happen #through #physical #controlsfiles #are #saved #directly #internal #memorythis #built #clean #depending #external #gearit #immediately #adapts #instantly #stores #everything #breaking #workflowindustrial #design #formeach #small #but #solidits #millimeters #tall #ridged #surface #helps #grip #alignmentthe #finish #reduces #glare #makes #handling #easieryou #can #clip #use #builtin #magnetplacement #quick #stays #putthe #record #button #recessed #you #wont #hit #mistakean #led #activethe #mic #capsule #exposed #protected #avoiding #from #hands #clothingnothing #sticks #out #gets #waythe #around #screen #knobthe #11inch #display #battery #statusthe #knob #adjusts #volume #selects #settingsit #works #fast #touchscreen #lagyou #see #feel #changeconnections #spaced #cleanlyone #side #has #usbc #portthe #other #jacka #plugin #port #supports #lightningthe #mount #fixed #locks #into #rigs #shiftingthe #charging #case #holds #two #transmitters #one #receivereach #own #slot #magnetic #contactsdrop #them #close #lid #stay #placeleds #show #power #levelsthere #loose #parts #pins #extra #stepsevery #shape #control #setup #clear #operationyou #press #turn #move #secondguessingthe #doesnt #try #invisible #readable #durable #directsignal #processing #controlboyamic #uses #noisethe #was #trained #over #realworld #sound #samplesit #filters #traffic #crowds #wind #mechanical #hum #timedepending #environment #toggle #between #strong #weak #noise #reductionboth #modes #work #receiverthe #6mm #condenser #khz #sample #rate #24bit #depththe #signaltonoise #ratio #reaches #dbtwo #lowcut #filter #options #handle #lowend #rumblethese #effective #against #hvac #engine #low #vibrationgain #managed #automatic #controlthe #boosts #quiet #voices #pulls #back #loudbuiltin #limiters #stop #clipping #during #spikesa #safety #track #second #copy #backupthis #harder #lose #usable #take #jumps #suddenlyeach #setting #adjustable #screenyou #dont #app #access #basic #controlseverything #runs #live #updates #immediatelythere #delays #sync #problems #capturerecording #storageeach #internally #receiverfiles #32bit #float #wav #formatsinternal #storage #gbthat #gives #about #ten #hours #fifteen #24bitwhen #full #loops #overwrites #older #filesrecording #continues #dropsevery #session #split #timestamped #chunks #transferyou #plug #any #drag #files #directlyno #software #neededthis #protects #loss #drops #crashesthe #recording #intacteach #nine #cancellation #recordingwith #both #features #runtime #closer #six #hoursthe #enough #recharge #all #three #units #twicethe #ghz #digital #transmissionits #range #reach #meters #open #areaswith #walls #obstacles #meterslatency #milliseconds #long #distancesyou #get #reliable #stable #across #ground #indoor #spacescharging #handled #included #direct #usbceach #device #takes #under #fullycompatibility #multidevice #supportthe #cameras #smartphones #computersusbc #lightning #adapters #includeda #trs #cable #connects #most #mixerswhile #charge #your #phone #which #useful #shootsone #send #four #receivers #once #multiangle #setups #backup #channelsthe #also #stereo #mono #modesbased #workflow #choose #how #mergedsettings #changed #boya #appthe #adds #firmware #custom #profiles #presets #different #camera #brandsbut #core #depend #itthe #post #first #appeared #yanko
    WWW.YANKODESIGN.COM
    BOYAMIC 2 Rebuilds Mobile Audio with AI and Onboard Capture
    Wireless mics fail when they rely too much on perfect conditions. BOYAMIC 2 fixes that by making every part of the system self-contained. Each transmitter records on its own. Each receiver controls levels, backups, and signal without needing an app. Noise is filtered in real time. Recording keeps going even if the connection drops. Designer: BOYAMIC There’s no need for a separate recorder or post-edit rescue. The unit handles gain shifts, background interference, and voice clarity without user intervention. Everything shows on screen. Adjustments happen through physical controls. Files are saved directly to internal memory. This system is built to capture clean audio without depending on external gear. It records immediately, adapts instantly, and stores everything without breaking the workflow. Industrial Design and Physical Form Each transmitter is small but solid. It’s 40 millimeters tall with a ridged surface that helps with grip and alignment. The finish reduces glare and makes handling easier. You can clip it or use the built-in magnet. Placement is quick, and it stays put. The record button is recessed, so you won’t hit it by mistake. An LED shows when it’s active. The mic capsule stays exposed but protected, avoiding interference from hands or clothing. Nothing sticks out or gets in the way.   The receiver is built around a screen and a knob. The 1.1-inch display shows battery, signal, gain, and status. The knob adjusts volume and selects settings. It works fast, without touchscreen lag. You can see and feel every change. Connections are spaced cleanly. One side has a USB-C port. The other has a 3.5 mm jack. A plug-in port supports USB-C or Lightning. The mount is fixed and locks into rigs without shifting. The charging case holds two transmitters and one receiver. Each has its own slot with magnetic contacts. Drop them in, close the lid, and they stay in place. LEDs on the case show power levels. There are no loose parts, exposed pins, or extra steps. Every shape and control supports fast setup and clear operation. You can press, turn, mount, and move without second-guessing. The design doesn’t try to be invisible; it stays readable, durable, and direct. Signal Processing and Audio Control BOYAMIC 2 uses onboard AI to separate voice from background noise. The system was trained on over 700,000 real-world sound samples. It filters traffic, crowds, wind, and mechanical hum in real time. Depending on the environment, you can toggle between strong and weak noise reduction. Both modes work directly from the transmitter or through the receiver. The mic uses a 6mm condenser capsule with a 48 kHz sample rate and 24-bit depth. The signal-to-noise ratio reaches 90 dB. Two low-cut filter options, at 75 Hz and 150 Hz, handle low-end rumble. These are effective against HVAC, engine hum, or low vibration. Gain is managed with automatic control. The system boosts quiet voices and pulls back when sound gets too loud. Built-in limiters stop clipping during spikes. A safety track records a second copy at -12 dB for backup. This makes it harder to lose a usable take even when volume jumps suddenly. Each setting is adjustable on screen. You don’t need a mobile app to access basic controls. Everything runs live and updates immediately. There are no delays or sync problems during capture. Recording and Storage Each transmitter records internally without needing the receiver. Files are saved in 32-bit float or 24-bit WAV formats. Internal storage is 8 GB. That gives you about ten hours of float audio or fifteen hours of 24-bit. When full, the system loops and overwrites older files. Recording continues even if the connection drops. Every session is split into timestamped chunks for fast transfer. You can plug the transmitter into any USB-C port and drag the files directly. No software is needed. This setup protects against signal loss, battery drops, or app crashes. The mic stays live, and the recording stays intact. Each transmitter runs for up to nine hours without noise cancellation or recording. With both features on, the runtime is closer to six hours. The receiver runs for about fifteen hours. The charging case holds enough power to recharge all three units twice. The system uses 2.4 GHz digital transmission. Its range can reach up to 300 meters in open areas. With walls or obstacles, it drops to around 60 meters. Latency stays at 25 milliseconds, even at long distances. You get reliable sync and stable audio across open ground or indoor spaces. Charging is handled through the included case or by direct USB-C. Each device takes under two hours to recharge fully. Compatibility and Multi-Device Support The system supports cameras, smartphones, and computers. USB-C and Lightning adapters are included. A 3.5 mm TRS cable connects the receiver to most cameras or mixers. While recording, you can charge your phone through the receiver, which is useful for long mobile shoots. One transmitter can send audio to up to four receivers at once, which helps with multi-angle setups or backup channels. The receiver also supports stereo, mono, and safety track modes. Based on your workflow, you choose how audio is split or merged. Settings can be changed from the receiver screen or through the BOYA app. The app adds firmware updates, custom EQ profiles, and gain presets for different camera brands. But the core controls don’t depend on it.The post BOYAMIC 2 Rebuilds Mobile Audio with AI and Onboard Capture first appeared on Yanko Design.
    0 Yorumlar 0 hisse senetleri
  • #333;">These Vegetables Require Less Water Than Most
    Everything is more expensive this year, and that likely includes utilities like your water bill.
    While growing vegetables in your yard can be enchanting and empowering, it isn’t very efficient (compared to farms) in terms of water usage.
    There are a number of ways to become more efficient and sustainable, including using drip irrigation, but another way is to only plant vegetables that don't need too much water to begin with.
    Watering at the root is keyBefore I get to the specific vegetables, it's important to go over a few general watering tips.Remember that vegetables get hydration through their roots, which live underground.
    Watering from above, like a hose or sprinkler, has problems: you’re getting the plants wet more than the roots, which creates conditions for disease spread; you’re watering less precisely, therefore wasting water; and the impact of the water against the dirt causes droplets to bounce back up with whatever fungus or viruses are in the dirt, also spreading disease.
    Watering gently and consistently at ground level with drip irrigation is the best option for both the plant and your wallet. To ensure you’re watering efficiently, group plants with similar watering needs together in your garden, so you can set the drip appropriately to water less. But even more important is remembering that roots grow over time.
    A new seedling has shallow roots, whereas an end-of-season plant has deeply established roots.
    More roots means that the plant can absorb more water from deeper underground.
    Less roots means less hydration from the soil, so more water is needed at a shallower depth.
    (Though some vegetables, like corn and lettuce, will always be shallow rooted, and thus aren’t good candidates for less water.)Hothouse plantsAccording to Oregon State University, a tomato plant's need for watering is negated by the deep roots the plants establish over the season.
    As above, you want to water sufficiently early in the season as roots are established while taking care not to over water, which will result in those roots staying close to the surface.
    If the plant needs water, those roots will grow deeper in search of moisture.
    Reducing water greatly, if not cutting it off entirely mid-season, shouldn’t harm your harvest.
    The lack of surface water will reduce disease spread, and tomatoes will ripen if you reduce their watering.
    It’s not only tomatoes, either: Squash, which includes zucchini, summer and winter squash, as well as melons, eggplants, and hot peppers all behave the same in terms of water needs and roots. Beans





    Credit: Amanda Blum


    Most beans, particularly pole beans, have adapted to drought conditions over time.
    As such, they can survive and produce flowers and fruit with minimal moisture.
    Beans require water to germinate, so if you direct sow, ensure the seeds have consistent moisture levels.
    Once germinated, you can reduce (but not eliminate) water.
    Since beans have such a short season (usually 60 days or less), they require less water simply by existing for less time.
    Less moisture is going to reduce common bean problems like powdery mildew, a quickly spreading surface fungus.Chard and okra





    Credit: Amanda Blum


    For some heat hardier vegetables like chard and okra, they still require water, but do better with weekly or every-other-weekly deep watering, as opposed to daily drip.
    Okra is native to drier climates and prefers less water.
    The deep roots of the plant allow it to draw enough water from the soil to sustain itself.
    Chard and kale can use their huge leaves to shade the ground, which is an effective form of moisture retention.
    Occasional deep waterings will be enough for the plant to continue growing.Blueberries prefer less moistureI know, blueberries are a fruit and not a vegetable, but I felt compelled to include the advice here anyway.
    Consider it a bonus tip.
    A few years ago, Micah Geiselman, a blueberry farmer from Morning Shade Farm in Canby came to inspect my many bushes, and he had surprising advice: “People over-water their blueberries,” he explained to me.
    They appreciate good drainage and do better with less water. I’ve since changed the elevation of my blueberries to ensure better drainage and moved watering lines further away—the results were astounding.
    I experienced better yields, but the berries themselves were plumper and better tasting.
    This isn’t conclusive, of course, since there are too many variables to account for, but I take the advice of a blueberry expert seriously. 
    #666;">المصدر: https://lifehacker.com/home/these-vegetables-require-less-water?utm_medium=RSS" style="color: #0066cc; text-decoration: none;">lifehacker.com
    #0066cc;">#these #vegetables #require #less #water #than #most #everything #more #expensive #this #year #and #that #likely #includes #utilities #like #your #billwhile #growing #yard #can #enchanting #empowering #isnt #very #efficient #compared #farms #terms #usagethere #are #number #ways #become #sustainable #including #using #drip #irrigation #but #another #way #only #plant #don039t #need #too #much #begin #withwatering #the #root #keybefore #get #specific #it039s #important #over #few #general #watering #tipsremember #hydration #through #their #roots #which #live #undergroundwatering #from #above #hose #sprinkler #has #problems #youre #getting #plants #wet #creates #conditions #for #disease #spread #precisely #therefore #wasting #impact #against #dirt #causes #droplets #bounce #back #with #whatever #fungus #viruses #also #spreading #diseasewatering #gently #consistently #ground #level #best #option #both #walletto #ensure #efficiently #group #similar #needs #together #garden #you #set #appropriately #lessbut #even #remembering #grow #timea #new #seedling #shallow #whereas #endofseason #deeply #established #rootsmore #means #absorb #deeper #undergroundless #soil #needed #shallower #depththough #some #corn #lettuce #will #always #rooted #thus #arent #good #candidates #waterhothouse #plantsaccording #oregon #state #university #tomato #plant039s #negated #deep #establish #seasonas #want #sufficiently #early #season #while #taking #care #not #result #those #staying #close #surfaceif #search #moisturereducing #greatly #cutting #off #entirely #midseason #shouldnt #harm #harvestthe #lack #surface #reduce #tomatoes #ripen #wateringits #either #squash #zucchini #summer #winter #well #melons #eggplants #hot #peppers #all #behave #same #rootsbeans #credit #amanda #blum #beans #particularly #pole #have #adapted #drought #timeas #such #they #survive #produce #flowers #fruit #minimal #moisturebeans #germinate #direct #sow #seeds #consistent #moisture #levelsonce #germinated #eliminate #watersince #short #usually #days #simply #existing #timeless #going #common #bean #powdery #mildew #quickly #funguschard #okra #heat #hardier #chard #still #better #weekly #everyotherweekly #opposed #daily #dripokra #native #drier #climates #prefers #waterthe #allow #draw #enough #sustain #itselfchard #kale #use #huge #leaves #shade #effective #form #retentionoccasional #waterings #continue #growingblueberries #prefer #moisturei #know #blueberries #vegetable #felt #compelled #include #advice #here #anywayconsider #bonus #tipa #years #ago #micah #geiselman #blueberry #farmer #morning #farm #canby #came #inspect #many #bushes #had #surprising #people #overwater #explained #methey #appreciate #drainage #waterive #since #changed #elevation #moved #lines #further #awaythe #results #were #astoundingi #experienced #yields #berries #themselves #plumper #tastingthis #conclusive #course #there #variables #account #take #expert #seriously
    These Vegetables Require Less Water Than Most
    Everything is more expensive this year, and that likely includes utilities like your water bill. While growing vegetables in your yard can be enchanting and empowering, it isn’t very efficient (compared to farms) in terms of water usage. There are a number of ways to become more efficient and sustainable, including using drip irrigation, but another way is to only plant vegetables that don't need too much water to begin with. Watering at the root is keyBefore I get to the specific vegetables, it's important to go over a few general watering tips.Remember that vegetables get hydration through their roots, which live underground. Watering from above, like a hose or sprinkler, has problems: you’re getting the plants wet more than the roots, which creates conditions for disease spread; you’re watering less precisely, therefore wasting water; and the impact of the water against the dirt causes droplets to bounce back up with whatever fungus or viruses are in the dirt, also spreading disease. Watering gently and consistently at ground level with drip irrigation is the best option for both the plant and your wallet. To ensure you’re watering efficiently, group plants with similar watering needs together in your garden, so you can set the drip appropriately to water less. But even more important is remembering that roots grow over time. A new seedling has shallow roots, whereas an end-of-season plant has deeply established roots. More roots means that the plant can absorb more water from deeper underground. Less roots means less hydration from the soil, so more water is needed at a shallower depth. (Though some vegetables, like corn and lettuce, will always be shallow rooted, and thus aren’t good candidates for less water.)Hothouse plantsAccording to Oregon State University, a tomato plant's need for watering is negated by the deep roots the plants establish over the season. As above, you want to water sufficiently early in the season as roots are established while taking care not to over water, which will result in those roots staying close to the surface. If the plant needs water, those roots will grow deeper in search of moisture. Reducing water greatly, if not cutting it off entirely mid-season, shouldn’t harm your harvest. The lack of surface water will reduce disease spread, and tomatoes will ripen if you reduce their watering. It’s not only tomatoes, either: Squash, which includes zucchini, summer and winter squash, as well as melons, eggplants, and hot peppers all behave the same in terms of water needs and roots. Beans Credit: Amanda Blum Most beans, particularly pole beans, have adapted to drought conditions over time. As such, they can survive and produce flowers and fruit with minimal moisture. Beans require water to germinate, so if you direct sow, ensure the seeds have consistent moisture levels. Once germinated, you can reduce (but not eliminate) water. Since beans have such a short season (usually 60 days or less), they require less water simply by existing for less time. Less moisture is going to reduce common bean problems like powdery mildew, a quickly spreading surface fungus.Chard and okra Credit: Amanda Blum For some heat hardier vegetables like chard and okra, they still require water, but do better with weekly or every-other-weekly deep watering, as opposed to daily drip. Okra is native to drier climates and prefers less water. The deep roots of the plant allow it to draw enough water from the soil to sustain itself. Chard and kale can use their huge leaves to shade the ground, which is an effective form of moisture retention. Occasional deep waterings will be enough for the plant to continue growing.Blueberries prefer less moistureI know, blueberries are a fruit and not a vegetable, but I felt compelled to include the advice here anyway. Consider it a bonus tip. A few years ago, Micah Geiselman, a blueberry farmer from Morning Shade Farm in Canby came to inspect my many bushes, and he had surprising advice: “People over-water their blueberries,” he explained to me. They appreciate good drainage and do better with less water. I’ve since changed the elevation of my blueberries to ensure better drainage and moved watering lines further away—the results were astounding. I experienced better yields, but the berries themselves were plumper and better tasting. This isn’t conclusive, of course, since there are too many variables to account for, but I take the advice of a blueberry expert seriously. 
    المصدر: lifehacker.com
    #these #vegetables #require #less #water #than #most #everything #more #expensive #this #year #and #that #likely #includes #utilities #like #your #billwhile #growing #yard #can #enchanting #empowering #isnt #very #efficient #compared #farms #terms #usagethere #are #number #ways #become #sustainable #including #using #drip #irrigation #but #another #way #only #plant #don039t #need #too #much #begin #withwatering #the #root #keybefore #get #specific #it039s #important #over #few #general #watering #tipsremember #hydration #through #their #roots #which #live #undergroundwatering #from #above #hose #sprinkler #has #problems #youre #getting #plants #wet #creates #conditions #for #disease #spread #precisely #therefore #wasting #impact #against #dirt #causes #droplets #bounce #back #with #whatever #fungus #viruses #also #spreading #diseasewatering #gently #consistently #ground #level #best #option #both #walletto #ensure #efficiently #group #similar #needs #together #garden #you #set #appropriately #lessbut #even #remembering #grow #timea #new #seedling #shallow #whereas #endofseason #deeply #established #rootsmore #means #absorb #deeper #undergroundless #soil #needed #shallower #depththough #some #corn #lettuce #will #always #rooted #thus #arent #good #candidates #waterhothouse #plantsaccording #oregon #state #university #tomato #plant039s #negated #deep #establish #seasonas #want #sufficiently #early #season #while #taking #care #not #result #those #staying #close #surfaceif #search #moisturereducing #greatly #cutting #off #entirely #midseason #shouldnt #harm #harvestthe #lack #surface #reduce #tomatoes #ripen #wateringits #either #squash #zucchini #summer #winter #well #melons #eggplants #hot #peppers #all #behave #same #rootsbeans #credit #amanda #blum #beans #particularly #pole #have #adapted #drought #timeas #such #they #survive #produce #flowers #fruit #minimal #moisturebeans #germinate #direct #sow #seeds #consistent #moisture #levelsonce #germinated #eliminate #watersince #short #usually #days #simply #existing #timeless #going #common #bean #powdery #mildew #quickly #funguschard #okra #heat #hardier #chard #still #better #weekly #everyotherweekly #opposed #daily #dripokra #native #drier #climates #prefers #waterthe #allow #draw #enough #sustain #itselfchard #kale #use #huge #leaves #shade #effective #form #retentionoccasional #waterings #continue #growingblueberries #prefer #moisturei #know #blueberries #vegetable #felt #compelled #include #advice #here #anywayconsider #bonus #tipa #years #ago #micah #geiselman #blueberry #farmer #morning #farm #canby #came #inspect #many #bushes #had #surprising #people #overwater #explained #methey #appreciate #drainage #waterive #since #changed #elevation #moved #lines #further #awaythe #results #were #astoundingi #experienced #yields #berries #themselves #plumper #tastingthis #conclusive #course #there #variables #account #take #expert #seriously
    LIFEHACKER.COM
    These Vegetables Require Less Water Than Most
    Everything is more expensive this year, and that likely includes utilities like your water bill. While growing vegetables in your yard can be enchanting and empowering, it isn’t very efficient (compared to farms) in terms of water usage. There are a number of ways to become more efficient and sustainable, including using drip irrigation, but another way is to only plant vegetables that don't need too much water to begin with. Watering at the root is keyBefore I get to the specific vegetables, it's important to go over a few general watering tips.Remember that vegetables get hydration through their roots, which live underground. Watering from above, like a hose or sprinkler, has problems: you’re getting the plants wet more than the roots, which creates conditions for disease spread; you’re watering less precisely, therefore wasting water; and the impact of the water against the dirt causes droplets to bounce back up with whatever fungus or viruses are in the dirt, also spreading disease. Watering gently and consistently at ground level with drip irrigation is the best option for both the plant and your wallet. To ensure you’re watering efficiently, group plants with similar watering needs together in your garden, so you can set the drip appropriately to water less. But even more important is remembering that roots grow over time. A new seedling has shallow roots, whereas an end-of-season plant has deeply established roots. More roots means that the plant can absorb more water from deeper underground. Less roots means less hydration from the soil, so more water is needed at a shallower depth. (Though some vegetables, like corn and lettuce, will always be shallow rooted, and thus aren’t good candidates for less water.)Hothouse plantsAccording to Oregon State University, a tomato plant's need for watering is negated by the deep roots the plants establish over the season. As above, you want to water sufficiently early in the season as roots are established while taking care not to over water, which will result in those roots staying close to the surface. If the plant needs water, those roots will grow deeper in search of moisture. Reducing water greatly, if not cutting it off entirely mid-season, shouldn’t harm your harvest. The lack of surface water will reduce disease spread, and tomatoes will ripen if you reduce their watering. It’s not only tomatoes, either: Squash, which includes zucchini, summer and winter squash, as well as melons, eggplants, and hot peppers all behave the same in terms of water needs and roots. Beans Credit: Amanda Blum Most beans, particularly pole beans, have adapted to drought conditions over time. As such, they can survive and produce flowers and fruit with minimal moisture. Beans require water to germinate, so if you direct sow, ensure the seeds have consistent moisture levels. Once germinated, you can reduce (but not eliminate) water. Since beans have such a short season (usually 60 days or less), they require less water simply by existing for less time. Less moisture is going to reduce common bean problems like powdery mildew, a quickly spreading surface fungus.Chard and okra Credit: Amanda Blum For some heat hardier vegetables like chard and okra, they still require water, but do better with weekly or every-other-weekly deep watering, as opposed to daily drip. Okra is native to drier climates and prefers less water. The deep roots of the plant allow it to draw enough water from the soil to sustain itself. Chard and kale can use their huge leaves to shade the ground, which is an effective form of moisture retention. Occasional deep waterings will be enough for the plant to continue growing.Blueberries prefer less moistureI know, blueberries are a fruit and not a vegetable, but I felt compelled to include the advice here anyway. Consider it a bonus tip. A few years ago, Micah Geiselman, a blueberry farmer from Morning Shade Farm in Canby came to inspect my many bushes, and he had surprising advice: “People over-water their blueberries,” he explained to me. They appreciate good drainage and do better with less water. I’ve since changed the elevation of my blueberries to ensure better drainage and moved watering lines further away—the results were astounding. I experienced better yields, but the berries themselves were plumper and better tasting. This isn’t conclusive, of course, since there are too many variables to account for, but I take the advice of a blueberry expert seriously. 
    0 Yorumlar 0 hisse senetleri