digisth | 7 years ago | on: Ask HN: Resources for engineers new to system design
digisth's comments
digisth | 8 years ago | on: Pspg – Postgres Pager
https://unencumberedbyfacts.com/2016/01/04/psql-vim-happy-fa...
I've been using it for a few months, and it works great for me.
digisth | 8 years ago | on: Ask HN: What are some of the best job boards you have seen (any industry)?
For remote, remoteok.io seemed pretty good when I used it.
digisth | 8 years ago | on: Ask HN: What are some of the best job boards you have seen (any industry)?
AngelList Jobs is also a place to find interesting positions (startup-centric ones in this case, as one might expect.)
digisth | 8 years ago | on: Ask HN: Who wants to be hired? (June 2017)
Remote: OK
Willing to relocate: No
Technologies: Python, Django, Ruby, Rails, AWS, Linux
Résumé/CV: http://www.panix.com/~sth/resume2017.docx
Email: [email protected]
Interested in a backend role, especially web/data API building and/or data processing, broadly construed.
digisth | 9 years ago | on: Show HN: Kim – A Python serialization and marshaling framework
Googling turned up very little for me.
TIA
Edit: libraries mentioned in thread:
PMML, Arrow, Dill, marshmallow, pytables, parquet/fastparquet (and pickle, obviously)
digisth | 9 years ago | on: Arguments against JSON-driven development
If you're essentially going through one object at a time, then discarding them, you're may just be doing conduit data processing, and so there's little advantage to using objects. I think what's missing in this (well-written) analysis is this distinction; if you're slurping data from one place, making a few changes (or especially if you're not making any), then sticking into a DB or vice versa, OO may be the wrong choice.
Ask yourself while writing the code: "are these active, behavior-driven objects that need encapsulation and relatively sophisticated behaviors, or is this just data I'm doing some relatively simple processing on?"
digisth | 9 years ago | on: Facebook AI Research Team Open Source DeepMask and SharpMask
What really helped advance my understanding from zero to knowledgeable novice was rewriting some existing code line by line (using expanded variable names and comments), and thinking about each line and what it does as you go. It's the software development equivalent of Hunter S. Thompson re-typing The Great Gatsby just to get the feel of writing a great novel. Here's one I did based on Denny Britz's tutorial:
Britz's Original: http://www.wildml.com/2015/09/implementing-a-neural-network-...
My version: https://gist.github.com/sthware/c47824c116e6a61a56d9
HTH
digisth | 9 years ago | on: React: Mixins Considered Harmful
http://matthijshollemans.com/2015/07/22/mixins-and-traits-in...
digisth | 10 years ago | on: Ask HN: Where to begin learning about Neural Nets
Basic NNs:
http://www.wildml.com/2015/09/implementing-a-neural-network-... (a whole series, all worth reading)
https://gist.github.com/sthware/c47824c116e6a61a56d9 (my code based on the above)
http://iamtrask.github.io/2015/07/27/python-network-part2/
http://rolisz.ro/2013/04/18/neural-networks-in-python/
ML:
http://cs229.stanford.edu/materials.html
http://onlinestatbook.com/2/index.html
DL in general, RNNs, RNTS, CNNs, some others:
http://cs224d.stanford.edu/syllabus.html
http://cs231n.stanford.edu/syllabus.html
http://mattmazur.com/2015/03/17/a-step-by-step-backpropagati...
http://arxiv.org/pdf/cs/0205070.pdf
http://colah.github.io/posts/2015-08-Understanding-LSTMs/
http://karpathy.github.io/2015/05/21/rnn-effectiveness/
http://nlp.stanford.edu/~socherr/EMNLP2013_RNTN.pdf
http://www.socher.org/index.php/Main/SemanticCompositionalit... roughRecursiveMatrix-VectorSpaces
http://colah.github.io/posts/2014-03-NN-Manifolds-Topology/
http://colah.github.io/posts/2014-07-NLP-RNNs-Representation...
digisth | 10 years ago | on: Anyone Can Learn to Code an LSTM-RNN (Part 1: RNN)
http://cs224d.stanford.edu/syllabus.html
If you want something more basic to get your head around NNs, I recommend Denny Britz's "Neural Networks from Scratch":
http://www.wildml.com/2015/09/implementing-a-neural-network-...
I created a gist with a heavily commented version of his code:
digisth | 10 years ago | on: The evolving fight against sham reviews
digisth | 10 years ago | on: The evolving fight against sham reviews
- Duplicate checking (same user on different products with similar reviews, for example)
- Meta-reviews ("was this review helpful?" - can also be gamed)
- user rating averages (all highs or all lows sometimes considered a flag)
- ratio of "first product reviews" to total reviews on a per-product basis
- "Super-reviewer" status (questionable, but often a flag)
- Products with low sales ranks
- Review ring detection (IP block, post times, etc.)
- Early reviews
- Users who give high ranks, while most other reviews are low
- Positive reviews for one brand's products, and negative for others
- "Verified" purchases
A lot of these already have countermeasures, and fake reviews have already come up with counter-counter measures (like review-time staggering, using multiple IP blocks, shipping empty boxes to defeat verified purchases, etc.)
The "how to know what's trustworthy?" is the million dollar question, and it has many answers that happen to change over time. Not easy to solve.
digisth | 10 years ago | on: Twitter CEO Dorsey Apologizes to Developers
A list of general suggestions for them: https://medium.com/@sthware/suggestions-for-twitter-hellowor...
Edit: I'll add that if relations get repaired now and then broken again, I don’t think they’ll be fixable a third time. They need to get this right, IMO.
digisth | 10 years ago | on: Uber launches Uber Rush, merchant delivery service, in three cities
Another thing this implies is that that these businesses could switch from a staffed delivery service to a completely on-demand one. One of the things the businesses and their customers could see an improvement with is the case where all their delivery people are out making deliveries, and new orders come in. With this, they just make a new Rush request and get a new delivery person.
digisth | 10 years ago | on: The FBI Is Struggling to Hire Hackers Who Don't Smoke Weed (2014)
http://gizmodo.com/the-fbi-is-struggling-to-hire-hackers-who...
There's definitely still a struggle in certain circles with the idea that many people in security (and other fields) are also members of subcultures that tend to have members that use recreational drugs, have tattoos, piercings, dyed hair, etc. Getting people to work for these agencies instead of the private sector is going to be challenging for a mound of other reasons; the least these agencies should do is rescind some of these bans.
digisth | 10 years ago | on: Did I Just Give My Permission? The Hashtag as Consent
Also, there are many different kinds of uses, some commercial-y. Here are a few:
- Display on Twitter itself (retweet)
- Use in a news story, near an ad
- Display in a Twitter widget on a web site
- Embedded Instagram photos on a company gallery page
- Use in an email ad campaign
- Use on a billboard
The list of things above exist on spectrum of "commercial-ness", and reasonable people can disagree on which they think are OK and which aren't as far as obtaining advanced permission. What many would like to see are much more explicit rules or technical controls so that the ambiguities are removed.
Embed controls might not be ideal from a fair use perspective, but it's a lot better than the "let the courts figure out" situation we have now.
digisth | 10 years ago | on: Did I Just Give My Permission? The Hashtag as Consent
"You retain your rights to any Content you submit, post or display on or through the Services. By submitting, posting or displaying Content on or through the Services, you grant us a worldwide, non-exclusive, royalty-free license (with the right to sublicense) to use, copy, reproduce, process, adapt, modify, publish, transmit, display and distribute such Content in any and all media or distribution methods (now known or later developed).
Tip: This license is you authorizing us to make your Tweets on the Twitter Services available to the rest of the world and to let others do the same."
Without this, all those embedded Tweets you see everywhere (like in news stories) wouldn't be available (this is why I think these services should all give you the ability to disable embedding your post(s) like Flickr/YouTube do. It would make everything much clearer and more straightforward.)
digisth | 10 years ago | on: Did I Just Give My Permission? The Hashtag as Consent
http://www.guidethroughthelegaljungleblog.com/2014/07/copyri...
Hasn't been tested in court, though.
digisth | 10 years ago | on: Did I Just Give My Permission? The Hashtag as Consent
http://www.jdsupra.com/legalnews/an-update-on-the-legal-impl...
http://www.buzzfeed.com/jwherrman/want-to-publish-a-twitter-... -
https://pando.com/2013/01/22/how-twitters-new-embeds-will-ma...
Clear as mud.
I'd consider its level of depth somewhere in the middle between specialist books and 10k foot overview books. I recommend it to anyone that has been a software developer or DBA for 5+ years, as I think they'd get the most value out of it.