|
|
|
|
You should go "play with the data". |
|
|
|
|
Dev |
April 3, 2014, 8:02 p.m. |
|
|
|
Charles Babbage |
Errors using inadequate data are much less than those using no data at all. |
Stephen Cambone |
There is a reasonable concern that posting raw data can be misleading for those who are not trained in its use and who do not have the broader perspective within which to place a particular piece of data that is raw. |
Eddie Van Halen |
Obviously you have to have rhythm. If you have rhythm, then you can play anything you need. If you have rhythm and you love music, then play and play and play until you get to where you want to get. If you can pay the rent, great. If you can't, then you'd better be having fun. |
Eddie Van Halen |
If you want to be a rock star or just be famous, then run down the street naked, you'll make the news or something. But if you want music to be your livelihood, then play, play, play and play! And eventually you'll get to where you want to be. |
Niger Innis |
I do not believe that Darren Wilson should've been charged, but Brown should not have lost his life. Brown and Trayvon Martin should've gotten their butts kicked badly. They should've been handled physically, but they should not have been killed. |
Jim Dale |
You've got to love the villain if you have to play him. You've got to find something that you can live with in yourself if you're going to play the villain in a play on stage. |
Yolanda Adams |
Education helps you to be a well-rounded person, period. It teaches you how to take in information and data, process it, and use it for life building. Education was key in my family. You were going to college. |
Bill James |
Baseball does become slow sometimes. It's totally unnecessary. The - you can play baseball fast. You can play it slow, and for some reason, we have chosen to play it slow, you know, which is unfortunate, but nothing you can do about. |
Nick D'Aloisio |
There is a generation of skimmers. It's not that they don't want to read in-depth content, but they want to evaluate what the content is before they commit time. Especially on a mobile phone - you don't have the phone, or cellular data, or screen size to be reading full-length content. |
Stephen Cambone |
When you live in a networked environment, it's possible to separate data from applications. |
|
|
"What's that band everyone is into? Sound play? Clown Play? ... Cold PLay!"
|
|
|
|
In 1977, about a decade into the show’s run, Arthur Greenwald and another writer named Barry Head cracked open a bottle of scotch while on a break, and coined the term Freddish. They later created an illustrated manual called “Let’s Talk About Freddish,” a loving parody of the demanding process of getting all the words just right for Rogers. “What Fred understood and was very direct and articulate about was that the inner life of children was deadly serious to them,” said Greenwald.
Per the pamphlet, there were nine steps for translating into Freddish:
“State the idea you wish to expres...
|
|
|
|
Maybe I should make some youtube videos. I would make one about the real concerns of AI, one about basic data science and data analysis, and one that is an introduction to neural networks.
|
|
|
|
i bet i could scrape the images using scrapebox with free proxies to save on costs. the only reason i used paid proxies for the data is because i want to be sure that it's US data to get US results for each product id. and theyre more reliable
This post is a comment.
|
|
|
|
To perform a man-on-the-side attack, the NSA observes a target?s Internet traffic using its global network of covert ?accesses? to data as it flows over fiber optic cables or satellites. When the target visits a website that the NSA is able to exploit, the agency?s surveillance sensors alert the TURBINE system, which then ?shoots? data packets at the targeted computer?s IP address within a fraction of a second.
In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target?s computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the ...
This post is a comment.
|
|
|
|
I had some weird dream about chicken nuggets that I can't really remember but I had a friend and she was eating chicken nuggets with me and her dog and then her dog learned how to talk and transformed into a person. There was another part of the dream where I had a friend that was in a play and I was talking to him about it and he was talking like he knew nothing about it. It was like he wasn't the same person that was in the play.
|
|
|
|
the old captchas where you typed in strange words were part of a larger book translation scheme. you were typing in what you thought these physical books words were and it compared them to their data or other peoples data to decipher them in pieces. i thought this was for google books but not sure
This post is a comment.
|
|
|
|
now that my list of product ids is in the millions and ive used about 40gb of proxy bandwidth scraping maybe 50k pages from that data, i have to carefully weigh out how much i want to spend on proxies (spent about $30) on this experiment that could result in just a simple takedown notice to stop the method. granted i can always reuse and modify this data. but i guarantee if you had a million page site based directly around real ecommerce products you would make good money if it stays up
|
|
|
|
Amazon Opens Up Its Internal Machine Learning Training To Everyone
Amazon announced Monday that it's making the machine learning courses it uses to train its engineers available to everybody for free. The course is tailored to four major groups -- developers, data scientists, data platform engineers and business professionals -- and it offers both foundational level lessons as well as more advanced instruction.
https://aws.amazon.com/blogs/machine-learning/amazons-own-machine-learning-unive...
|
|
|
|
Netflix Has Saved Every Choice You've Ever Made In 'Black Mirror: Bandersnatch'
According to a technology policy researcher, Netflix records all the choices you make in Black Mirror's Bandersnatch episode. "Michael Veale, a technology policy researcher at University College London, wanted to know what data Netflix was collecting from Bandersnatch," reports Motherboard. "People had been speculating a lot on Twitter about Netflix's motivations," Veale told Motherboard in an email. "I thought it would be a fun test to show people how you can use data protection law to ask real questions you have." From the report: The law Veale used is Europe's General Data Protection Regulation (GDPR). The ...
|
|