- Genism: https://github.com/RaRe-Technologies/gensim
- Scikit learn: https://github.com/scikit-learn/scikit-learn
- nltk: https://github.com/nltk/nltk
- nlpaug: https://github.com/makcedward/nlpaug
- Tensorflow: https://github.com/tensorflow/tensorflow
- pytorch: https://github.com/pytorch/pytorch
- mt5: https://huggingface.co/transformers/model_doc/mt5.html
- multilingual-t5: https://github.com/google-research/multilingual-t5
- textattack: https://github.com/QData/TextAttack
from flask import Flask, g, jsonify | |
import werkzeug, os | |
from werkzeug.utils import secure_filename | |
import psycopg2 | |
from psycopg2 import pool | |
def get_db(): | |
print ('GETTING CONN') | |
if 'db' not in g: |
#program to utilise 48 different sample voices from Sonatina Symphonic Library | |
#written by Robin Newman, March 2016 | |
#requires Sonatina Symphonic Library from http://sso.mattiaswestlund.net/download.html | |
#requires Sonic Pi ver 2.10 | |
#plays 19 voice Frere Jqeus round! | |
#tested on Pi2, Pi3, Mac OSX and Windows 10. | |
#updated to handle new thread structure in SP2.11dev | |
use_debug false | |
#path to library samples folder (including trailing /) | |
path='~/Desktop/Sonatina Symphonic Orchestra/Samples/' |
A personal diary of DataFrame munging over the years.
Convert Series datatype to numeric (will error if column has non-numeric values)
(h/t @makmanalp)
The attack detailed below has stopped (for the time being) and almost all network access for almost all customers have been restored. We're keeping this post and the timeline intact for posterity. Unless the attack resumes, we'll post a complete postmortem within 48 hours (so before Wednesday, March 26 at 11:00am central time).
Criminals have laid siege to our networks using what's called a distributed denial-of-service attack (DDoS) starting at 8:46 central time, March 24 2014. The goal is to make Basecamp, and the rest of our services, unavailable by flooding the network with bogus requests, so nothing legitimate can come through. This attack was launched together with a blackmail attempt that sought to have us pay to avoid this assault.
Note that this attack targets the network link between our servers and the internet. All the data is safe and sound, but nobody is able to get to it as long as the attack is being successfully executed. This is like a bunch of people
require 'rubygems' | |
require 'httpi' | |
require 'curb' | |
# at some point before the request is made you'll need a kerberos ticket | |
# i.e., kinit -k -t ticket_path | |
image_path = "/tmp/some_image.jpg" | |
url = URI.escape("https://some_ssl_spnego_url.com/upload_file_here") |
#Model | |
@user.should have(1).error_on(:username) # Checks whether there is an error in username | |
@user.errors[:username].should include("can't be blank") # check for the error message | |
#Rendering | |
response.should render_template(:index) | |
#Redirecting | |
response.should redirect_to(movies_path) |
There is a long standing issue in Ruby where the net/http library by default does not check the validity of an SSL certificate during a TLS handshake. Rather than deal with the underlying problem (a missing certificate authority, a self-signed certificate, etc.) one tends to see bad hacks everywhere. This can lead to problems down the road.
From what I can see the OpenSSL library that Rails Installer delivers has no certificate authorities defined. So, let's go fetch some from the curl website. And since this is for ruby, why don't we download and install the file with a ruby script?