4,544 Matching Annotations
  1. Apr 2020
    1. Vosk is a speech recognition toolkit. The best things in Vosk are: Supports 8 languages - English, German, French, Spanish, Portuguese, Chinese, Russian, Vietnamese. More to come. Works offline, even on lightweight devices - Raspberry Pi, Android, iOS Installs with simple pip3 install vosk Portable per-language models are only 50Mb each, but there are much bigger server models available. Provides streaming API for the best user experience (unlike popular speech-recognition python packages) There are bindings for different programming languages, too - java/csharp/javascript etc. Allows quick reconfiguration of vocabulary for best accuracy. Supports speaker identification beside simple speech recognition.
    2. Kaldi API for offline speech recognition on Android, iOS, Raspberry Pi and servers with Python, Java, C# and Node
    1. import all the necessary libraries into our notebook. LibROSA and SciPy are the Python libraries used for processing audio signals. import os import librosa #for audio processing import IPython.display as ipd import matplotlib.pyplot as plt import numpy as np from scipy.io import wavfile #for audio processing import warnings warnings.filterwarnings("ignore") view raw modules.py hosted with ❤ by GitHub View the code on <a href="https://gist.github.com/aravindpai/eb40aeca0266e95c128e49823dacaab9">Gist</a>. Data Exploration and Visualization Data Exploration and Visualization helps us to understand the data as well as pre-processing steps in a better way. 
    2. TensorFlow recently released the Speech Commands Datasets. It includes 65,000 one-second long utterances of 30 short words, by thousands of different people. We’ll build a speech recognition system that understands simple spoken commands. You can download the dataset from here.
    3. In the 1980s, the Hidden Markov Model (HMM) was applied to the speech recognition system. HMM is a statistical model which is used to model the problems that involve sequential information. It has a pretty good track record in many real-world applications including speech recognition.  In 2001, Google introduced the Voice Search application that allowed users to search for queries by speaking to the machine.  This was the first voice-enabled application which was very popular among the people. It made the conversation between the people and machines a lot easier.  By 2011, Apple launched Siri that offered a real-time, faster, and easier way to interact with the Apple devices by just using your voice. As of now, Amazon’s Alexa and Google’s Home are the most popular voice command based virtual assistants that are being widely used by consumers across the globe. 
    4. Learn how to Build your own Speech-to-Text Model (using Python) Aravind Pai, July 15, 2019 Login to Bookmark this article (adsbygoogle = window.adsbygoogle || []).push({}); Overview Learn how to build your very own speech-to-text model using Python in this article The ability to weave deep learning skills with NLP is a coveted one in the industry; add this to your skillset today We will use a real-world dataset and build this speech-to-text model so get ready to use your Python skills!
    1. One can imagine that this whole process may be computationally expensive. In many modern speech recognition systems, neural networks are used to simplify the speech signal using techniques for feature transformation and dimensionality reduction before HMM recognition. Voice activity detectors (VADs) are also used to reduce an audio signal to only the portions that are likely to contain speech. This prevents the recognizer from wasting time analyzing unnecessary parts of the signal.
    2. Most modern speech recognition systems rely on what is known as a Hidden Markov Model (HMM). This approach works on the assumption that a speech signal, when viewed on a short enough timescale (say, ten milliseconds), can be reasonably approximated as a stationary process—that is, a process in which statistical properties do not change over time.
    3. The first component of speech recognition is, of course, speech. Speech must be converted from physical sound to an electrical signal with a microphone, and then to digital data with an analog-to-digital converter. Once digitized, several models can be used to transcribe the audio to text.
    4. How speech recognition works, What packages are available on PyPI; and How to install and use the SpeechRecognition package—a full-featured and easy-to-use Python speech recognition library.
    5. The Ultimate Guide To Speech Recognition With Python
    1. While these particular indictments refer to credit card data, the laws do also reference authentication features. Two of the key points here are knowingly and with intent to defraud.
    2. Having said all that, I think this is completely absurd that I have to write an entire article justifying the release of this data out of fear of prosecution or legal harassment. I had wanted to write an article about the data itself but I will have to do that later because I had to write this lame thing trying to convince the FBI not to raid me.
    3. I could have released this data anonymously like everyone else does but why should I have to? I clearly have no criminal intent here. It is beyond all reason that any researcher, student, or journalist have to be afraid of law enforcement agencies that are supposed to be protecting us instead of trying to find ways to use the laws against us.
    4. For now the laws are on my side because there has to be intent to commit or facilitate a crime
    5. it reminds me of IT security best practices. Based on experience and the lessons we have learned in the history of IT security, we have come up with some basic rules that, when followed, go a long way to preventing serious problems later.
    6. As serious leaks become more common, surely we can expect tougher laws. But these laws are also making it difficult for those of us who wish to improve security by studying actual data. For years we have fought increasingly restrictive laws but the government’s argument has always been that it would only affect criminals.
    1. Data Erasure and Storage Time The personal data of the data subject will be erased or blocked as soon as the purpose of storage ceases to apply. The data may be stored beyond that if the European or national legislator has provided for this in EU regulations, laws or other provisions to which the controller is subject. The data will also be erased or blocked if a storage period prescribed by the aforementioned standards expires, unless there is a need for further storage of the data for the conclusion or performance of a contract.
    1. Devise-Two-Factor only worries about the backend, leaving the details of the integration up to you. This means that you're responsible for building the UI that drives the gem. While there is an example Rails application included in the gem, it is important to remember that this gem is intentionally very open-ended, and you should build a user experience which fits your individual application.
    1. Recently the HaveIBeenPwned API has moved to a authenticated/paid model , this does not effect the PwnedPasswords API, no payment or authentication is required.
    1. there's no reasonable way to communicate effectively with the less technically minded without acquiescing to the nontechnical misuse of the term "hacker"
    2. The more easily relabeled of the two uses of the term "hacker" is the malicious security cracker: it is not only the more recent phenomenon to acquire that label, but also the one whose meaning is most easily evoked by an alternative term. This is why, when you read an article of mine that talks about malicious security crackers, I use the term "malicious security cracker"
    3. A hacker, in the classic sense of the term, is someone with a strong interest in how things work, who likes to tinker and create and modify things for the enjoyment of doing so.
    4. When you simply accept that "hacker" means "malicious security cracker", you give up the ability to use the term to refer to anything else without potential confusion.
    5. Some claim that the term has been unrecoverably corrupted, and acquired a new meaning that we should simply accept.
    1. This list is not perfect - it's not meant to be perfect - and there will be some junk due to input data quality and some missing passwords because they weren't in the source data sets. It's simply meant to be a list of strings that pose an elevated risk if used for passwords and for that purpose, it's enormously effective.
    1. Another approach I toyed with (very transiently) was blocking entire countries from accessing the API. I was always really hesitant to do this, but when 90% of the API traffic was suddenly coming from a country in West Africa, for example, that was a pretty quick win.
    1. In 1999, "collateral damage" (German: Kollateralschaden) was named the German Un-Word of the Year by a jury of linguistic scholars. With this choice, it was criticized that the term had been used by NATO forces to describe civilian casualties during the Kosovo War, which the jury considered to be an inhuman euphemism.
    2. the classic Orwellian arguments for finding this usage objectionable
    3. it is jargon, and to the extent that people cannot decode it, it conceals what is actually going on;
    1. Well, as a home user, I also belong to an investment club with 10 members. I also have a medium size family who I like to send photo's to, and my son is on a soccer team. all those have greater than 5 people on the list. sooooooooo..... once again, the people with valid use of the internet have to 'deal' with those that abuse it.
    1. Bacterial species develops the extracellular polymeric substances (EPS) and resistance to disinfectants, antiseptics, and antibiotics in 6 to 12 hours. The biofilm then develops into mature colonies in 2 to 4 days
    1. So what will happen with these projects from now on? All of the projects above have one thing in common: they were created and maintained by passionate individuals who wanted to make positive contributions to their communities. Without these individuals and their efforts, these projects would not have become what they are today. Therefore, it is only fair that Plataformatec gives these individuals control of these projects moving forward.
    1. Patients with cardiac injury vs those without cardiac injury had shorter durations from symptom onset to follow-up (mean, 15.6 [range, 1-37] days vs 16.9 [range, 3-37] days; P = .001) and admission to follow-up (6.3 [range, 1-16] days vs 7.8 [range, 1-23] days; P = .039).
    1. Before repair of the injury is attempted, hemorrhage should be controlled; injuries to the atria can be clamped with a Satinsky vascular clamp, whereas digital pressure is used to occlude the majority of ventricular wounds. Foley catheter occlusion of larger stellate lesions is described, but even minimal traction may enlarge the original injury.

      bleeding control is first. satinsky clamp can be used for atria inj but for ventricular, mostly digital pressure is used. minimal stretch may enlarge inj (Foley)

    2. Because treatment must be instituted during the latent period between injury and onset of neurologic sequelae, diagnostic imaging is performed based on identified risk factors (Fig. 7-55).91 After identification of an injury, antithrombotics are administered if the patient does not have contraindications (intracranial hemorrhage, falling hemoglobin level with solid organ injury or complex pelvic fractures). Heparin, started without a loading dose at 15 units/kg per hour, is titrated to achieve a PTT between 40 and 50 seconds or antiplatelet agents are initiated (aspirin 325 mg/d or clopidogrel 75 mg/d). The types of antithrombotic treatment appear equivalent in published studies to date, and the duration of treatment is empirically recommended to be 6 months.

      diagnostic imaging before onset of neurologic complications while taking

    3. Early recognition and management of these injuries is paramount because patients treated with antithrombotics have a stroke rate of <1% compared with stroke rates of 20% in untreated patients.

      antithrombotics for blunt inj of carotid and vertebral art decreases stroke rates from 20 to 1%

    4. Vertebral artery injuries due to penetrating trauma are difficult to control operatively because of the artery’s protected location within the foramen transversarium. Although exposure from an anterior approach can be accomplished by removing the anterior elements of the bony canal and the tough fascia covering the artery between the elements, typically the most efficacious control of such injuries is angioembolization. Fogarty catheter balloon occlusion, however, is useful for controlling acute bleeding if encountered during neck exploration.

      penetrating traumatic vertebral art inj are better controled by angioembolization, rather than removal of ant of foramen transversarium. and Fogarty catheter baloon occlusion for acute bleeding while exploring.

    5. Sedation, osmotic diuresis, paralysis, ventricular drainage, and barbiturate coma are used in sequence, with coma induction being the last resort.
    6. CPP can be increased by either lowering ICP or raising mean arterial pressure.
    7. Penetrating injuries to the head may require operative intervention for hemorrhage control, evacuation of blood, skull fracture fixation, or debridement.
    1. Not everybody uses rubygems as their package management system. If this sounds odd to you, read https://gist.github.com/54177.
    1. When Casper filed its S-1 in January, analysts, investors, and business nerds descended on the document like vultures. Not only was it a precarious moment to take a startup public, it was the first time anyone could actually access the raw numbers under the hood of a DTC. “The economics work better if Casper sent you a mattress for free, stuffed with $300,” jabbed NYU Stern marketing professor and tech doomsayer Scott Galloway. “This appears to be Casper’s business,” tweeted number-crunching Atlantic columnist Derek Thompson. “Buy mattress at $400. Sell at $1,000. Refund/return 20% of them. Keep $400, on avg. Then spend $290 of that on ads/marketing and $270 on admin (finance, HR, IT). Lose $160. Repeat.”

      Summary of Casper's business model

    1. The handler can be a method or a Proc object passed to the :with option. You can also use a block directly instead of an explicit Proc object.

      Example of: letting you either pass a proc (as a keyword arg in this case) or as a block.

    1. If you don't receive a reply, even if you do provide all the information required to show the issue, be aware that the forums are a very busy place. There are more than 40 new threads a day asking for assistance and not every one can be freely answered.
  2. Mar 2020
    1. letting them adjust consent decisions for specific purposes and exercise other user rights at any time.

      The diagram above shows an example of this

    2. Regardless of where an organization is based (in the EU or otherwise), its website must meet regulatory obligations when processing EU/EEA citizens’ data or the business will face financial penalties.
    1. That outcome, in fact, is why the General Data Protection Regulation has been introduced. GDPR is being billed by the EU as the biggest shake-up of data privacy regulations since the birth of the web, saying it sets new standards in the wake of the recent Facebook data harvesting scandal.
    2. In Europe, access to the Los Angeles Times was blocked and those who tried to access it were offered a screen with a notice which simply read: "Unfortunately, our website is currently unavailable in most European countries.
    1. Lest U.S. companies think they will escape GDPR because they are headquartered in the U.S., Milla believes there will be fines applied to companies in the EU, the US and other jurisdictions.
    2. "users are not able to fully understand the extent of the processing operations carried out by Google and that ‘the information on processing operations for the ads personalization is diluted in several documents and does not enable the user to be aware of their extent."
    1. 27$/year

      They spell it "27$/year" instead of "$27/year". I love it that they bucked the useless convention of putting $ sign first and did it the way that makes more sense. We've all had that thought, why do we say it "27 dollars" but write it, "dollars 27". It just doesn't make sense.

    1. If other third-party tools guarantee not to use cookies, perhaps by providing specific configuration options, they too can be considered to be exempt from prior blocking. This is the case namely with YouTube, which provides a specific feature to prevent the user from being tracked through cookies.
    2. This depends on the legal jurisdiction applicable to your site. In Europe, you’re legally required to block cookie scripts until user consent is obtained. All cookies must be blocked except for those that are exempt.
    3. In Italy, the condition for Google Analytics to be eligible for “no prior consent necessary” is IP anonymization – however in France, Google Analytics doesn’t seem to be eligible for exceptions,
    1. I usually write in Google's online word processor Google Docs, even when noting the company's shortcomings. This article is different: it was drafted in a similar but more private service called Graphite Docs.
    1. Did you know accurate data reporting is often capped? Meaning once your website traffic reaches a certain limit, the data then becomes a guess rather than factual.This is where tools like Google Analytics becomes extremely limited and cashes in with their GA360 Premium suite. At Matomo, we believe all data should be reported 100% accurately, or else what’s the point?
    1. We long ago admitted that we’re poor at scheduling, so we have roosters; sundials; calendars; clocks; sand timers; and those restaurant staff who question my integrity, interrupting me with a phone call under the premise of “confirming” that I’ll stick to my word regarding my reservation.
    2. A closely-related failing to scheduling is our failure to remember, so humans are very willing to save information on their computers for later.
    1. If these asset owners regarded the “robots” as having the same status as guide dogs, blind people or default human citizens, they would undoubtedly stop imposing CAPTCHA tests and just offer APIs with reasonable limits applied.
    2. Robots are currently suffering extreme discrimination due to a few false assumptions, mainly that they’re distinctly separate actors from humans. My point of view is that robots and humans often need to behave in the same way, so it’s a fruitless and pointless endeavour to try distinguishing them.
    3. As technology improves, humans keep integrating these extra abilities into our cyborg selves
    1. Don't be discouraged when you get feedback about a method that isn't all sunshine and roses. Facets has been around long enough now that it needs to maintain a certain degree of quality control, and that means serious discernment about what goes into the library. That includes having in depth discussions the merits of methods, even about the best name for a method --even if the functionality has been accepted the name may not.

      about: merits

    1. Describe the problem fully Link to a test case showing the problem.
    2. Without this information, very likely your question will not be answered, frustrating both yourself and anyone else who does want to help, because they are unable to do so
    3. ask your question in a way that it provides enough information that it can be answered
    1. illustrates the extent to which illegal practices prevail, with vendors of CMPs turning a blind eye to — or worse, incentivising — clearly illegal configurations of their systems
    2. All of which means — per EU law — it should be equally easy for website visitors to choose not to be tracked as to agree to their personal data being processed.
    3. “Popular CMP implementation wizards still allow their clients to choose implied consent, even when they have already indicated the CMP should check whether the visitor’s IP is within the geographical scope of the EU, which should be mutually exclusive,” they note, arguing that: “This raises significant questions over adherence with the concept of data protection by design in the GDPR.”
    1. Q. Why does Rubinius not support frozen and tainted? A. Rubinius has better features; frozen and tainted are considered harmful. To elaborate... Both frozen and tainted depend on strewing checks throughout the source code. As a classic weak-link system, only one of those checks needs to be misplaced for the guarantees offered by either to fail. Since the number of checks is high, and as new code is written new checks need to be considered, the features inherently constitute unbounded complexity and unbounded risk.
    1. Now we're moving on to the next thing instead of really rolling around with this idea and trying to understand it."

      Yes, it's that deeper processing that we can aim for. Developing the kinds of critical thinking tasks that foster reflection, investigation, and redjusment.

    1. An example of reliance on legitimate interests includes a computer store, using only the contact information provided by a customer in the context of a sale, serving that customer with direct regular mail marketing of similar product offerings — accompanied by an easy-to-select choice of online opt-out.
    1. This is no different where legitimate interests applies – see the examples below from the DPN. It should also be made clear that individuals have the right to object to processing of personal data on these grounds.
    2. One of the main threads of the GDPR is providing clear and transparent information to individuals about data collected, how it is processed, and the lawful basis for this processing.
    1. How do you leverage browser cache when Google’s very own Analytics.js has it’s expiry time set to 2 hours? How do you minimize DNS requests when Google advices you to copy their tracking code, linking to an externally hosted Javascript file?If that isn’t bad enough already, Google’s advice is to avoid hosting the JavaScript file locally. And why? To ensure you get access to new features and product updates.
    1. You could try AoE (ATA over Ethernet, very fast since it's Layer 2 protocol). SSHfs is yet another option (fast setup and encrypted by default). Or iSCSI (wich is tricky to setup).
    1. I've been meaning to remind readers that I do read the comments. Some time ago, one disappointed commenter mused that others' reflections seemed to go (as I recall) "into a void," because I remained silent to each. Perhaps I was ignoring readers' remarks? I assure you that is not the case. I read them all — although on this site, for some reason, "all" means somewhat sparse — and I find them nearly all remarkable in their perceptiveness. I especially welcome, and enjoy, intelligent disagreement. I choose not to respond, however, only because of my editorial philosophy, which holds that the comment section is, rightfully, for commenters — and commenters alone. I've already had my say, and it seems to me rather rude to take another whack in reply. Whenever I'm so substantively shaky or incoherent as to make my case unpersuasively the first time around, I figure I should live with the consequences. And whenever I find criticism flawed, I figure readers — perceptive as they are — will see the flaw as well, therefore there's no need for me to rub it in. So, I beg you not to take my silence personally.
    1. Earlier this year it began asking Europeans for consent to processing their selfies for facial recognition purposes — a highly controversial technology that regulatory intervention in the region had previously blocked. Yet now, as a consequence of Facebook’s confidence in crafting manipulative consent flows, it’s essentially figured out a way to circumvent EU citizens’ fundamental rights — by socially engineering Europeans to override their own best interests.
    2. The deceitful obfuscation of commercial intention certainly runs all the way through the data brokering and ad tech industries that sit behind much of the ‘free’ consumer Internet. Here consumers have plainly been kept in the dark so they cannot see and object to how their personal information is being handed around, sliced and diced, and used to try to manipulate them.
    3. design choices are being selected to be intentionally deceptive. To nudge the user to give up more than they realize. Or to agree to things they probably wouldn’t if they genuinely understood the decisions they were being pushed to make.
    1. This might not be the most user-friendly solution. But it’s certainly creative and something different from your typical captcha systems. Pennyauth aims to verify your users by asking them to pay $0.01 per login. Payments are processed using QUID — and users can submit payment in as little time as it takes for them to grab their credit card.
    1. I would like to make an appeal to core developers: all design decisions involving involuntary session creation MUST be made with a great caution. In case of a high-load project, avoiding to create a session for non-authenticated users is a vital strategy with a critical influence on application performance. It doesn't really make a big difference, whether you use a database backend, or Redis, or whatever else; eventually, your load would be high enough, and scaling further would not help anymore, so that either network access to the session backend or its “INSERT” performance would become a bottleneck. In my case, it's an application with 20-25 ms response time under a 20000-30000 RPM load. Having to create a session for an each session-less request would be critical enough to decide not to upgrade Django, or to fork and rewrite the corresponding components.
    1. The business had a policy that you should report safety incidents when you see them. The process around that was you fill out a form and fax it to a number and someone will take action on it. The safety manager in this company saw that and decided to digitize this workflow and optimize it. Once this process was put into place, the number of safety incidents reported increased 5 times. The speed at which safety incidents were addressed increased by 60%.
    1. There is no use learning the word for “aardvark” in Swahili if you are never likely to use it. Think of words you use all the time and get familiar with them first.[2] X Research source For example, if you’re an exchange student in Russia, you might need to introduce yourself, ask for directions, and order food. While you might need to know the Swahili word for “aardvark” someday, you can learn it at a later date when the time comes.
    1. If you ever need to work with external translators, it’s a bit of a pain sending both your YML files and a bunch of views like index.en.html.erb. For one thing, you need some code to find all those files and send them, and put them back after receiving the translations. For another, your translator must respect the markup and code of the template, and know not to translate them. And if you want to use tools like WebTranslateIt, it’s easier to stick to YML.

      Good point. Better to store translations in your I18n backend in the same place as your subject translations, etc. (which by default is in YAML file).

    1. A European court in May 2014 ordered Google and other search engines operating in Europe to allow individuals the “right to be forgotten,” letting them ask sites to delist certain search results relating to their name. Since that time, Google has received more than 650,000 requests.
    1. Yes, it’s been deprecated. Why? Because too few people were using it to make it worth the time, money, and energy to maintain. In truth, although I sometimes disagree with the operator changes, I happen to agree with this one. Maintaining ALL of the synonyms takes real time and costs us real money. Supporting this operator also increases the complexity of the code base. By dropping support for it we can free up a bunch of resources that can be used for other, more globally powerful changes.
  3. Feb 2020
    1. each package has its own unique subdirectory such as /nix/store/b6gvzjyb2pg0kjfwrjmg1vfhh54ad73z-firefox-33.1/ where b6gvzjyb2pg0… is a unique identifier for the package that captures all its dependencies (it’s a cryptographic hash of the package’s build dependency graph). This enables many powerful features.

      Similar to: "Russian doll caching" that was added to Rails template caching

    1. The rational expectation and thelearning-from-price literatures argue that equilibrium prices are accurate becausethey reveal and aggregate the information of all market participants. The MarketSelection Hypothesis,MSH, proposes instead that prices become accurate becausethey eventually reflect only the beliefs of the most accurate agent. The Wisdomof the Crowd argument,WOC, however suggests that market prices are accuratebecause individual, idiosyncratic errors are averaged out by the price formationmechanism

      Three models (arguments for) drivers of market efficiency

    1. Market competition provides a mechanism for weeding out those who underperform.

      Note how this has failed in the current guilded age of the United States where it is possible for things to be "too big to fail".

    1. A Step By Step Guide to Design a Logo for Your ClientsPosted by jennytarga on February 7th, 2020Logo is a very important part of building your brand image. It is the first brick that goes into your business branding, therefore a logo design becomes very important for your business to grow big.Branding allows your brand to connect with your clients and help them remember you wherever they go. These qualities are essential for your business to grow big. Since logo design plays such importance in business, therefore, we’ve curated a step by step guide to designing a logo for your clients.Understanding Clients NeedsUnderstanding the client's needs and wants helps you in managing project time and efforts. If your client is what something else is and you are providing something else then it's not going to work. Therefore, coming up with a design that reflects the client’s brief saves you multiple revisions and additional hours of work.The client's needs can be found in the design brief he/she provides at the first meeting. This brief is the holy grail that you can never cross. Now that being said, you can add a little innovation and personalized style into the design but, within the context of the design brief.Define Brand IdentityBrand identity is how people perceive your client. It might sound simple but it is way more complex than that. Around 65% of humans are visual learners, therefore, influencing them using visual means helps your brand identity to get registered in your client’s mind faster.Defining your brand identity gives you guidelines and instructions on what to do and what not to do. There are thousands of permutations and combinations that you can use to come up with a logo design but, when you have a brand identity guide you can save yourself tons of time and brainstorming efforts. This type of branding using visuals is called Visual Branding.  Analyze CompetitorsAnalyzing competitors helps you in getting inspirations and design structures. You can learn about industry standards after analyzing the competitors and researching the industry as a whole. For research, you can use Google, Google Images and the competitor's websites.Decision on Logo StyleLogo style is your approach towards the particular design. You can use the data collected from analyzing the competitors to decide your design style.A logo style can tell you different things about the brands, therefore choose this very carefully. Some of the common logo styles are as follows-ClassicModern & minimalistic designHandmade designVintage designChoose Logo TypeThere are several different types of logos that you can use for your design project. To decide on the logotype you can use the competitor analysis as well as the design brief. You can also provide your clients with two or more different types of logo concepts. Giving them options to choose from enables you to deeply understand what they want.Choose Color PaletteColor is the most important part of a logo. The brand guide and branding process always have a defined color palette. Designers must never go out of these palette to ensure uniformity of brand designs.If the business is brand new you have to choose the color wisely. Color plays a significant role in our everyday decisions and the same applies to the brand. You can use this guide on color psychology to learn more about color psychology.Choose Right TypographyRight typography that matches the characteristics of the brand image enables the brand to express its underlying feel to the viewer.Provide the Best OptionIf you are providing the graphic design services to the clients then it becomes essential for you to design multiple options for your clients. Designing a logo can be challenging and requires years of experience. To get the best result with your designs you need to keep practicing and keep learning about new trends and techniques.Go, Design Logo Now!Use this guide to implement your design project idea into a physical design. The most important part of being a professional logo designer is to keep practicing your skills. You can always use sites like Pinterest, Dribble to get inspiration but, the most important thing is to keep practicing.

      Use this step by step guide to design a logo for your clients that they can never reject.

    1. I use this to keep information about processes that were running at any time during last five days. These are 1-min snapshots so something might get lost but I think it is good enough for me. I want to have some data available when I discover there was a peak in resource usage (I use munin for that). I haven't found a better way to keep track of past processes (tried psacct).
  4. Jan 2020
    1. to remember how to best fall down;

      Remember how our children learned to walk? Yeah, they didn't learn how to walk, they learned how to fall down.

    1. I understand this is a relational division type problem, involving having and count. These posts describe what I want to do, but I can't figure out how to apply the examples to the particular case above:
    1. Please do not make the mistake of trying to reduce the HAVING clause with a little false relational algebra to: 1 HAVING COUNT(PS1.plane_name) = COUNT(H1.plane_name) because it does not work; it will tell you that the hangar has (n) planes in it and the pilot_name is certified for (n) planes, but not that those two sets of planes are equal to each other.
    1. Thyroxine was added to their antidepressant medication, and the doses were increased to a mean of 482 ± 72 μg/day.

      This is the highest dose of levothyroxine that I've seen administered. Even treatment for thyroid cancer rarely goes beyond 300 mcg (or even 200 mcg, which is more common).

  5. www.drugwiki.net www.drugwiki.net
    1. L-T3 has proven to be 4-5 times more biologically active and to take effect more quickly than L-thyroxine (L-T4).

      Will need to check up on that. I recall T4 being less potent.

    1. a private library is not an ego-boosting appendages but a research tool. The library should contain as much of what you do not know as your financial means … allow you to put there. You will accumulate more knowledge and more books as you grow older, and the growing number of unread books on the shelves will look at you menacingly. Indeed, the more you know, the larger the rows of unread books. Let us call this collection of unread books an antilibrary.
    1. The substitution of l-T3 for l-T4 at equivalent doses (relative to the pituitary) reduced body weight and resulted in greater thyroid hormone action on the lipid metabolism, without detected differences in cardiovascular function or insulin sensitivity.

      This implies that T4 and T3 are not identical, but I want to check the study further to see if half-life comes into play. The T3 group could theoretically have higher daily thyroidergic exposure, but maintain TSH because they experience a daily dip. Multiple dosing at least partly solves this issue. Controlled release tablets would be ideal.

    1. In almost all cases the genetic basis of RTH lies in mutation of the carboxyl-terminus of the ß-thyroid hormone receptor. RTH is a dominant disorder, except in one family; most individuals are heterozygous for the mutant allele.

      So, given that thyroid hormone resistance does exist, the remaining question is whether it is common enough to explain some cases of CFS or similar conditions. Unfortunately this paper is not in english, but the abstract provides enough information to google more.

    1. ssh doesn't let you specify a command precisely, as you have done, as a series of arguments to be passed to execvp on the remote host. Instead it concatenates all the arguments into a string and runs them through a remote shell. This stands out as a major design flaw in ssh in my opinion... it's a well-behaved unix tool in most ways, but when it comes time to specify a command it chose to use a single monolithic string instead of an argv, like it was designed for MSDOS or something!
    1. Timothy Morton is Rita Shea Guffey Chair in English at Rice University in Houston. He is the author of Realist Magic: Objects, Ontology, Causality and Hyperobjects: Philosophy and Ecology after the End Of The World.

      want to read these

    1. altered thyroid gland function affects vasopressin and oxytocin release from the hypothalamo-neurohypophysial system in the state of equilibrated water metabolism

      I ought read the full study to see the proposed mechanism. The vasopressin effect is not surprising at all, but the oxytocin effect was unexpected for me. That may be because I know more about vasopressin than I do oxytocin.

    1. he ZORA Canon, our list of the 100 greatest books ever written by African American women, is one of a kind, yet it exists within a rich cultural tradition.
  6. Dec 2019
    1. Alternatively, you can use the Explore function to ask Google Sheets any number of questions about your to do list. It'll give you suggestions like "Most frequent Task" or "What percentage of Tag is [tag name]" and so on. This can give you insight into what you're working on the most and how you're spending your time, which can help you plan your workdays more productively.
    2. It's not customizable enough and there aren't enough distinct fields for inevitably complex work tasks. Google Sheets fixes that. No, it's not a to do list app, but that's why I love it. It's an app I already use. It's extremely customizable.
    1. Best to-do list app for taking control of your to-do list
    2. Games are fantastic at motivating mundane activity—how else can you explain all that time you've spent on mindless fetch quests? Habitica, formerly known as HabitRPG, tries to use principles from game design to motivate you to get things done, and it's remarkably effective
    3. The best to-do list apps
    4. Because keeping track of your tasks is an intensely personal thing, and people will reject anything that doesn't feel right pretty much instantly.
    1. For example: I wanted a way to add recurring tasks to my list, so I wrote a simple bash script called goodmorning.sh. It uses the command prompt client to quickly add a bunch of tasks to my todo list of choice. I run this script first thing in the morning every workday, and I like it better than any built-in system I’ve found for recurring tasks, because it’s fully under my control.
    1. n their book “New Power,” Henry Timms and Jeremy Heimans lay out the characteristics of old and new power.<img class="ex t u je ak" src="https://miro.medium.com/max/1862/1*jmW_5ey9vS_fNMPt5qO5Cg.png" width="931" height="522" role="presentation"/>
    1. Types of questions and where to ask: How do I? -- ask on Server Fault (tell them what tags to use -- your product tag at minimum) I got this error, why? -- ask on Server Fault I got this error and I'm sure it's a bug -- report it on your own site I have an idea/request -- report it on your own site Why do you? -- ask in your own community (support forum, etc) When will you? -- ask in your own community
    1. Basically, the standard said something, interpreters ignored it because the standard seemed illogical, but now interpreters like Bash have really confusing semantics, and no-one wants to fix it.
    1. ReST

      "ReST" instead of "REST". I like how this way matches the case of the actual phrase that it's standing in for "Representational State Transfer", so you can better tell which letters are the beginning of words (all but "e").