weak   349

« earlier    

Opinion | Donald Trump: Man at War - The New York Times
This is all reactionary emoting by a man of poor character, one addicted to affirmation. He desperately needs to be the king-of-every-hill he sees in the mirror: He was the ladies’ man, businessman, smartest man, toughest man. There was nothing beyond him, and he didn’t have to follow the rules, he only had to follow his instincts.
trump  weak  masculinity  pathetic  impotence 
10 weeks ago by pagecarr
dreymonde/Delegated: 👷‍♀️ Closure-based delegation without memory leaks
GitHub is where people build software. More than 27 million people use GitHub to discover, fork, and contribute to over 80 million projects.
weak  ios  memory  swift 
march 2018 by phatblat
SecLists/Passwords at master · danielmiessler/SecLists
SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads, and many more.
list  security  #project-magic  password  passwords  resource  tester  weak  wordlists 
february 2018 by cog1tar3
Snorkel: A System for Fast Training Data Creation
Snorkel is a system for rapidly creating, modeling, and managing training data, currently focused on accelerating the development of structured or "dark" data extraction applications for domains in which large labeled training sets are not available or easy to obtain.
IE  unstructured  data  weak  distant  supervision  relation  extraction 
december 2017 by foodbaby
DeepDive
DeepDive is a system to extract value from dark data. Like dark matter, dark data is the great mass of data buried in text, tables, figures, and images, which lacks structure and so is essentially unprocessable by existing software. DeepDive helps bring dark data to light by creating structured data (SQL tables) from unstructured information (text documents) and integrating such data with an existing structured database. DeepDive is used to extract sophisticated relationships between entities and make inferences about facts involving those entities. DeepDive helps one process a wide variety of dark data and put the results into a database. With the data in a database, one can use a variety of standard tools that consume structured data; e.g., visualization tools like Tableau or analytics tools like Excel.
IE  unstructured  data  weak  distant  supervision  relation  extraction 
december 2017 by foodbaby
TypeScript 2.4: Weak Type Detection | Marius Schulz
TypeScript 2.4 introduced the concept of weak types. Here's how weak type detection can help you avoid silent bugs.
typescript  tutorial  weak  weak-type  getting-started  howto 
december 2017 by jimthedev
Twitter
As a long a woman who has been this story sounds . Some in
sexually  harassed  weak  people  Media  from twitter_favs
november 2017 by Palafo

« earlier    

related tags

!course-topics  #project-magic  1st  2009  2016  aims  album  algorithm  all  amnesty  analysts  and  antenna  apple  apps  arc  argue  argument  arithmetic  article  atlas  audio  audit  avoid  awaymsgused  be  blocks  blog  bluetooth  book  border  bouncex  bump  bumpout  c#  c  cacao  callback  cbc  cc  cern  chamber  check  cipher  ciphers  ciphersuite  clinton  closure  closures  code  coding  collection  compare  configuration  conversion  conversions  copy_later_ideas_maybe  correlation  critical  crowd_sourcing  cryptography  cvd  cycle  cycles  czur  dance  data  deadwater  debate  define  definition  delegate  delegation  dev  developer  development  diabetes  discussions  distant  dock  docs  documentation  dont  douchebag  dread  duck  dup  dynamic  eap5  echo  electromagnetic  ember  erd  et16  events  exercise  existential  experiments  explained  exploit  extensions  extraction  facebook  failure  fallacies  fastfood  fileprivate  fix  food  forces  foundation  fundamental  gc  gcc  gdp  generator  getting-started  girl  github  gladwell  gnu  go  golang  good  great  greatest  growth  guard  hack  harassed  hillary  hip  hips:  hole  howto  iboutlet  ideas  identifying  ie  ifttt  implicit  impotence  in  industrial  infineon  infographic  information  interactions  internal  interview  invasivecode  ios  iosdev  iraq  is:repo  isil  islamic  island  its  ja  java  javascript  jboss  job  judgement  key  keygen  kvo  lang:swift  language  learn  least  lhc  library  link  list  llvm  m...  mac  macworld  man  management  mansplaining  map  maps  marco  masculinity  media  medium  memory-leak  memory-management  memory  memorymanagement  model  multithreading  need  networking  night  nights  nuclear  obama  obamanation  obesity  objc  objective-c  of  open  optimization  optional  paris  particle  party  pass-by-reference  pass-by-value  password  passwords  pathetic  people  performance  phantom  philosophy  phone’s  physics  pleasure  pointers  positions  powerf  private  pro  productivity  programming  proof  protocols  public  python  quarter  rave  recovery  redhat  reference  referencecounting  references  rehab  relation  relationship  resource  retail  retain-cycle  revisionist  revolution  rhi  rsa  rubio  ruby  sales  scanner  scene  science  sec  second  secular  security  self  sexually  shared  signal  silver  sim  singapore  slide  small  smbc  software  sound  soup  ssbs  ssh  ssl  stackoverflow  stagnation  standard  state  static  status  stocks  storyboards  strategy  straw  strengthen  strengthening  strong  subatomic  supervision  swfit  swif  swift  swiftlang  symbols  system  technology  term  termpering  terrorism  tester  the  think  thought  thread  tips  tiredformat  tls  to  tpm  trump  tutorial  type  typed  types  typescript  typing  unowned  unstructured  up  us  user_generated_content  vain  versus  video  virus  vs  vulnerability  wanna  ways  weak-type  weaken  weakmap  weakmaps  weakness  weakself  wealth  weekend  weekends  wet  wikipedia  withholding  wobbly  wordlists  wordpress  words  work  writing  you  your 

Copy this bookmark:



description:


tags: