- Aug 2020
-
cluster.ciirc.cvut.cz cluster.ciirc.cvut.cz
-
Node List
How to print the info:
sinfo -o "%9n %9P %.4c %.6m %.8d %14f %G"
How to format with
xsv
:sinfo -o "%n|%P|%c|%m|%d|%f|%G" | xsv table --delimiter "|"
-
- Jun 2020
-
-
Unfortunately
I consider it rather fortunate since it allows me to clean up, as demonstrated below.
-
-
tdwi.org tdwi.org
-
"There was a 0.95 correlation. I asked them about it. They said, 'We read this article in Chain Store Age magazine that said beer and diapers are correlated, so we put beer next to diapers in all of our stores," he said. "What they did was they created the data that actually validates the data. In effect, they created the signal they used to validate the signal."
Placement of the goods is a confounder.
-
- May 2020
-
blog.fleetsmith.com blog.fleetsmith.com
-
smash-and-grab
hit-and-run
-
- Apr 2020
-
ist.cvut.cz ist.cvut.cz
-
Zaměstnanci s emailovou adresou ve formátu: jmeno.prijmeni@cvut.cz
Configuration that works in Thunderbird in English in Ubuntu:
- Incoming:
- Authentication: Normal password
- Username: bartefil
- Outgoing:
- Authentication: Normal password
- Username: bartefil
- Incoming:
-
-
-
rádia Lumen
Slovenské křesťanské rádio. Viz lumen.sk.
-
- Feb 2020
-
docs.scipy.org docs.scipy.org
-
fisk.pdf(x, c, loc, scale)
y = (x - loc) / scale return c * np.power(y, -c-1) * np.power(1 + np.power(y, -c), -2) / scale
-
- Jan 2020
-
www.retroarch.com www.retroarch.com
-
Which core is the best to emulate(some console/game)?
Emulation General Wiki contains comparisons of emulators of various platforms.
-
-
example.com example.com
-
exploitation
exploration
-
- Dec 2019
-
cw.fel.cvut.cz cw.fel.cvut.cz
-
∑y∈Ypθ(x,y)
\(p_\theta(x)\)
-
αx(y)
Estimated probability that the label of x is y
-
- Nov 2019
-
sgs.cvut.cz sgs.cvut.cz
-
více než 75% bylo vyplacenona stipendia studentů
Musí být více než 75 % z osobních nákladů vyplaceno na stipendia studentů, nebo 75 % z osobních nákladů akademiků, nebo 75 % z celkových nákladů na projekt?
-
-
cw.fel.cvut.cz cw.fel.cvut.cz
-
Deep (convolutional) networks
Recommended literature: Deep Learning Book
-
-
cw.fel.cvut.cz cw.fel.cvut.cz
-
μ
The higher mu is, the more closely aligned the true gradient and g must be.
-
comparable
[close on average]
-
stepsizeαk
learning rate
-
g(θk,sk)
Gradient estimate
-
-
cw.fel.cvut.cz cw.fel.cvut.cz
-
strict concavity
\(\lambda_i > 0, \sum \lambda_i = 1: \log \sum \lambda_i x_i > \sum \lambda_i \log x_i\)
-
Pθ0(supθ∈Θ|L(θ,Tm)−L(θ)|> )m→∞−−−−→0
Starting with m, all the following approximations are strictly contained within epsilon-wide sleeve around the true L.
-
zj
\(z^j = (x^j, y^j)\)
-
consistency
The more training data we have, the closer we get to the true optimum.
-
p(y|x) =exp[y(〈w,x〉+b)]1 + exp[〈w,x〉+b]
\(p(y|x) = \frac{p(x, y)}{p(x)} = \frac{p(x|y) p(y)}{p(x)} = ... \)
-
Generative learning
We assume a certain model architecture. We need to estimate the parameters of the model.
-
x∈Rn,y∈{0,1}withy∼Bern(α)andx|y∼N(μy,V)
Unknown parameters:
- Prior: alpha
- Posterior: mu_0, mu_1, V
-
Linear Classifier
Example of discriminative learning version 2
-
Logistic Regression
Example of discriminative learning version 1
-
Gaussian Discriminative Analysis
Example of generative learning
-
Discriminative learning(1)
Example: Softmax layer for classification - estimates class probabilities
-
max
Correction: min
-
conditional
posterior
-
maximum likelihood estimator (MLE)
Why "likelihood" rather than "probability"? If the domain is real valued, p is a PDF and summing over p values does not correspond to probability.
-
-
ufal.mff.cuni.cz ufal.mff.cuni.cz
-
neural network
What does the network output?
- Value estimate (required for this assignment)
- Policy (to be introduced in later lecture)
-
-
cw.fel.cvut.cz cw.fel.cvut.cz
-
∑j=1tjlog(pj)
This expression should be negated so that the loss increases as \(p_k\) decreases.
-
negative log likelihood for the linearregression
Assumption: y is a linear function of x with Gaussian noise with the same standard deviation (sigma) in each dimension.
-
MLE
Maximum likelihood estimation
-
Lecture slides: https://cw.fel.cvut.cz/wiki/_media/courses/be4m33ssu/anns_ws19.pdf
Recommended reading:
-
-
cw.fel.cvut.cz cw.fel.cvut.cz
-
Forward Message
JD: The corresponding backward message may be one of the exam assignments.
-
Universal approximation theorem: one layer is enough
the universal approximation theorem states that a feed-forward network with a single hidden layer containing a finite number of neurons can approximate continuous functions on compact subsets of Rn, under mild assumptions on the activation function.
-
-
www.fel.cvut.cz www.fel.cvut.cz
-
Minimální výše měsíčního stipendia v prezenční formě při plnění studijních povinností je 15 000 Kč.
Skutečné údaje:
- Minimální stipendium za měsíc: 9 000 Kč. Zdroj: Příkaz rektora č. 11/2019
- Minimální stipendium za kalendářní rok: 12 x 12 000 Kč. Zdroj: Stipendijní řád - článek 6:1-3
-
- Oct 2019
-
cw.fel.cvut.cz cw.fel.cvut.cz
-
{trn,val,tst}_kernel_mat.svmlight
Python: Use the library
svmlight
. Consider usingsklrean.svm
. -
STATISTICAL MACHINE LEARNING (SML2019)1. COMPUTER LAB
Solution consists of:
- Source code (Python or Matlab)
- PDF with answers to questions (and nothing else)
-
-
cw.fel.cvut.cz cw.fel.cvut.cz
-
1nin
Alternative from Xavier: \(\frac{2}{n_{in} + n_{out}}\)
-
letwiandxibe independentrandom variables
Is it safe to assume that x_i are independent across i?
-
=
Independent across i
-
E(xi)
We may need to normalize the input.
-
αk>0is thelearning rateorstepsize
Learning rate may be further specialized e.g. for each layer.
-
θk−αk∇L(θk)
We move in the opposite direction of the gradient.
-
yk=σk(xTW)
Class confidence distribution
-
-
cw.fel.cvut.cz cw.fel.cvut.cz
-
ULLN applies
Proof: Seminar 3, Assignment 4
-
≤
- \(R(h_m) - R_{T^m}(h_m) \leq \sup_{h \in H} |R(h) - R_{T^m}(h)|\) - trivial
- \(R_{T^m}(h_H) - R(h_H) \leq \sup_{h \in H} |R(h) - R_{T^m}(h)|\) - easy to see
-
≤
\(R_{T^m}(h_m) \leq R_{T^m}(h_H)\) because \(h_m \in \argmin_{h \in H} R_{T^m}(h)\).
-
Neural Networks learned by back-propagation
Neural networks need not converge to the global minimum. \(R(h_m)\) need not equal \(R(h_H)\).
-
Vapnik-Chervonenkis dimension
\(D_{VC}(H) = max_n . \exists x \in X^n . \forall y \subseteq x . \exists h \in H . h(x) = y\)
-
`0/1(y,y′) = [[y6=y′]
We assume 0-1 misclassification loss.
-
Rn
Space of feature vectors
-
ULLN for finite hypothesis space
and bounded loss image (bounded by [a, b])
-
sup
"Uniform" because we care about all strategies in H.
-
limm→∞P(R(hm)−R(hH)≥ε)= 0
Equivalently:
\(\forall \delta > 0, \epsilon > 0. \exists m_0 \in N. \forall m \geq m_0. P(R(h_m) - R(h_H) \geq \epsilon) < \delta\)
In general:
\(lim_{m \rightarrow \infty} f(m) = 0 \Leftrightarrow \forall \delta > 0. \exists m_0 \in N. \forall m \geq m_0. f(m) < \delta\)
-
estimation error
How to reduce estimation error?
- Increase number of samples m.
- Improve the learning algorithm to utilize T^m more efficiently.
- Shrink H to exclude strategies better than h_m.
Enlarging H typically leads to worse generalization, so estimation error increases.
-
R(hm)
R(h_m) is a random variable, because h_m is a random variable, because T^m is a random variable.
-
YX
All functions \(h: X \rightarrow Y\)
-
approximation error
How can we reduce approximation error?
Enlarge H so that it includes better rules.
-
-
cw.fel.cvut.cz cw.fel.cvut.cz
-
Empirical risk minimization
An empirical risk minimization (ERM) algorithm returns \(h_m \in H\) that minimizes \(R_{T^m}(h)\).
- Excess error: \(R(h_m) - R^*\)
- Estimation error: \(R(h_m) - R(h_H)\)
- Approximation error: \(R(h_H) - R^*\)
An algorithm is statistically consistent in \(H\) iff \(\forall \epsilon > 0: \lim_{m \rightarrow \infty} P(R(h_m) - R(h_H) \geq \epsilon) = 0\).
The hypothesis space \(H\) satisfies the uniform law of large numbers (ULLN) iff \(\forall \epsilon > 0: \lim_{m \rightarrow \infty} P(\sup_{h \in H} |R(h) - R_{T^m}(h)| \geq \epsilon) = 0\).
Theorem 1: If \(H\) satisfies ULLN then ERM is statistically consistent in \(H\).
Corollary 1: The ULLN is satisfied for a finite \(H\).
Generalization bound for finite hypothesis space \(H\) with \(Im(l) \subseteq [a, b]\): \(P(\max_{h \in H} |R_{T^m}(h) - R(h)| < \epsilon) \geq 1 - 2 |H| \exp(-\frac{2 m \epsilon^2}{(b - a)^2})\)
- Excess error: \(R(h_m) - R^*\)
-
Pdf
Boris:
We usually publish the slides 1 hour before the lecture.
-
-
ufal.mff.cuni.cz ufal.mff.cuni.cz
-
lunar_lander
The environment adheres to reward shaping. Each state has a hidden value and reward of an executed action is always the difference between the values of the previous and the current state. (?)
-
The tasks are evaluated automatically using the ReCodEx Code Examiner.
We can submit one or more Python source files (modules) with the
.py
file extension. -
Time limit for each test is 5 minutes.
Most likely this is too short period to perform training in ReCodEx.
-
average reward of -150
Episode terminates after 1000 steps.
-
average return of 490
There are 500 steps in each episode.
Is gamma equal to 1.0 in evaluation?
-
Assignments: Best solution counts. There is no penalty for incorrect solution submission. The students can ask for increasing the submission count limit (50 by default).
-
monte_carlo
Train either in ReCodEx or offline.
If I can't get it running in an hour, I can write to MS and ask for advice.
-
states
Generalized states: R^4:
- Cart position
- Cart velocity
- Pole angle
- Pole angular velocity
For this task the states are discretized by binning (8 bins in each dimension; 8^4 states in total).
-
--steps steps of policy evaluation/policy improvement
We improve the policy
steps
times. -
--iterations applications of the Bellman equation
After
iterations
evaluations, we improve the policy once. -
Average value per assignment: 11 points
-
I can ask for a justified deadline extension before the deadline passes.
-
-
ufal.mff.cuni.cz ufal.mff.cuni.cz
-
Bellman backup operator
Given a valuation and a state, returns the expected return provided we follow the action that maximizes the next reward plus the valuated value of the next state.
-
return
Return at time \(t\)
The smaller the discount factor, the smaller is the relative weight of the far future rewards.
-
Monte Carlo and -soft Policies
It may make sense to decrease epsilon gradually while training to explore less and exploit more (refine the policy for the successful runs).
-
Monte Carlo with Exploring Starts
Can we make the policy stochastic and choose each action with a probability that scales with its expected return?
-
greedy action
Under what conditions do we get stuck in a local optimum?
-
-
www.ciirc.cvut.cz www.ciirc.cvut.czCIIRC1
-
Český ústav robotiky a kybernetiky
-
-
cw.fel.cvut.cz cw.fel.cvut.cz
-
regularization constantC
Finite C implies forces w to be in a hypersphere of finite radius R that depends on C.
-
(w∗,b∗) = argminw∈Rn,b∈R(12‖w‖2︸︷︷︸penaltyterm+Cm∑i=1max{0,1−yi(〈w,φ(xi)〉+b)}
Algorithm used: Matlab: Interior point
https://www.mathworks.com/help/optim/ug/fmincon-interior-point-algorithm-with-analytic-hessian.html (?)
-
-
ufal.mff.cuni.cz ufal.mff.cuni.cz
-
Q=n+1Q+nα(R−nQ)
Exponential moving average
\((1 - \alpha) Q_n + \alpha R_n\)
-
Incremental Implementation
New estimate for this machine is old estimate plus relative current reward divided by number of times we tried this machine.
Cf. gradient descent
-
uniformlyrandom action with probability .ε1−εε
\epsilon: Rate of exploration
-
discrete
Non-differentiable
-
won 10 out of 11 StarCraft II games against two professional players
Unfair interface advantage
-
9h
Very high computational demands
-
ches
Can beat the previously best program after 3h of playing
-
beat 60 professional
Nickname: master
Online game server, the program did not reveal it was a bot
-
AlphaGo
Why is go interesting?
- High branching factor
- Difficult to write a good state evaluation heuristic
-
to rule them all
Plays all the games
-
human-normalized mean: 623.0%
Questionable information value because some games can be exploited a lot
-
29 games out of 49 comparable or better to professional game players
A separate agent trained for each game
-
first
1959
-
Trial and error learning
Learning in animals
-
-
pdfs.semanticscholar.org pdfs.semanticscholar.org
-
stochastic scenario
One input may have more than one label with non-zero probabilities.
-
-
cw.fel.cvut.cz cw.fel.cvut.cz
-
VGGNet
conv3-64: receptive field 3x3, stride 1, 64 output channels
To resolve boundary: pad with zeros
MP: max pooling layer. Window 2x2, stride 2, aggregate with max.
Deep layers: more channels, smaller resolution, large transitive receptive field, more abstract features
-
negative log-likelihood of class probabilities (a.k.a. cross entropy)
Surrogate loss function (or objective function) for 0-1 loss
Why? So that it is differentiable.
-
Loss function
If we used 0-1 loss, the empirical risk would be the error rate.
-
class probabilities
To choose the class, we take the class with the highest predicted probability.
-
-
cw.fel.cvut.cz cw.fel.cvut.cz
-
Empirical Risk Minimization
Optimization problem
-
Testing: confidence intervals
Filip: Is the estimation based on Hoeffding inequality commonly used in practice (research)?
A: Yes.
-
Hoeffding inequality
Strength: Valid irrespective of the underlying distribution
What distribution maximizes the error?
-
1−2e−2lε2(b−a)2=γ
This equality binds the variables \epsilon, \gamma, l and (b-a).
-
[a,b]
The variables are bounded interval by an interval \([a, b]\).
-
Example (rolling a die):μ= 3.5,zi∈[1,6],ε= 0.5.
- Left graph
- Red line: True expectation (3.5)
- Blue band: \epsilon band around assumed expectation
- Right graph:
- Red curve: Portion of experiments that estimate a mean outside the blue band in the left graph
- Blue curve: Upper bound of the empirical established by Hoeffding inequality
- Left graph
-
how the interval widthεdepends onlandδ
3 interdependent variables:
- \(\epsilon\)
- \(l\)
- \(\delta\)
3 possible tasks:
- Given l and \delta, minimize \epsilon.
- Given \epsilon and l, maximize \delta.
- Given \epsilon and \delta, minimize l.
-
(RSl(h)−ε,RSl(h)+ε)
Confidence interval
-
- Sep 2019
-
cw.fel.cvut.cz cw.fel.cvut.cz
-
NP-complete
BF:
NP complete or NP hard
-
Seminars
Theoretical assignments every other week published one week in advance.
No evaluation, just discussion.
-
Written exam
90 minutes. Assignments similar to those discussed in the labs.
-
The course will run irrespective of the number of students. The lecture format will only be held if at least approx. 5 students come consistently.
-
-
cw.fel.cvut.cz cw.fel.cvut.cz
-
maximum likelihood estimator
Boris:
You should know this already.
-
unsupervised learning
Note that the validation set must still be labeled.
-
Bayes inference rule
Note that this only works for classification.
-
inf
Is this infimum?
-
how strong can they deviate from each other?
Example: For 0-1 loss, using Chebyshev inequality, using the loss bound of 1, we get the bound: $$\frac{1}{\epsilon^2 m}$$
-
drawn fromp(x,y)
The evaluation distribution must match the application distribution. In other words, we evaluate the inference with respect to p.
-
i.i.d.
independent identically distributed
-
R(h)
In case of 0-1 loss in classification, this is the error rate of h.
-
E(x,y)∼p
Expectation
-
minimises the loss
The distribution of (x, y) will be specified later.
-
related by an unknownjoint p.d.f.p(x,y)
We assume that x and y are interdependent.
-
loss function`:Y×Y →R+
Simplest loss for classification: 0-1 loss: l(a,b) = 1 iff a != b
-
real valued variable
possibly a vector
-
-
cw.fel.cvut.cz cw.fel.cvut.cz
-
Labs/Seminars: Thursday 9:15-10:45, 11:00-12:30 and 12:45-14:15, all in KN:E-112
Capacity: 30 people
-
Boris:
Don't hesitate to contact us.
Don't hesitate to ask questions during the lectures.
Immediately after each lecture we will go to the cafeteria where you can contact us privately.
-
-
cw.fel.cvut.cz cw.fel.cvut.cz
-
practical labs
Each task: Around 10 points plus up to 3 bonus points
-
before the class
Boris:
a week ahead
-
Seminar
Introductory lab session. Neither theoretical, nor practical.
-
- Aug 2019
-
cluster.ciirc.cvut.cz cluster.ciirc.cvut.cz
-
public key
To have a personal certificate generated by CIIRC, follow the instructions in the wiki.
-
Everyone with CIIRC account can access master node of the cluster via ssh at cluster.ciirc.cvut.cz
Credentials: CTU username and CIIRC password
-
-
internal.ciirc.cvut.cz internal.ciirc.cvut.cz
-
Ubuntu
Which version of Ubuntu is this guide intended for?
-
- Jul 2019
-
vprover.github.io vprover.github.io
-
All other usage is reserved.
Does this mean that modification of Vampire for research purposes is prohibited?
-
-
wwwconference.org wwwconference.org
-
max
According to the paper (Cohen 1998), maximizing the permutation score is an NP-hard problem. The paper proposes a 2-approximation greedy algorithm.
-
-
www.inference.vc www.inference.vc
-
latent representation
-
- Jun 2019
-
on.ipaslovakia.sk on.ipaslovakia.sk
-
Juraj Rosa
Bratr Marka Rosy z GoodAI
-
- May 2019
-
users.cs.duke.edu users.cs.duke.edu
-
\Uk7!U"shouldbe\U7!Uk"
The inverse is true. The text contains "U -> U^k".
-
-
www.tptp.org www.tptp.org
-
Problem Generators
-
-
qtube.eu qtube.eu
-
Moc emocí, málo informací a argumentů.
-
Vyber si niečo, za čím sa budeš hnať, až dokým ťa nezradí vlastné telo.
Myslím, že tento postoj je zároveň součástí ideologie autora tohoto textu.
-
Ľudí, ktorí chápu že spôsob, akým funguje naša spoločnosť, je chorý! Ľudí, ktorí vidia riešenia, nie problémy! Ľudí, ktorí kladú zaujímavé otázky a majú zaujímavé odpovede! Ľudí, ktorí sa neboja povedať svoj názor v spoločnosti, ktorá nové názory odsudzuje, no zároveň je na nich závislá!!!
Apel na emoce
-
si môžeme písať čo chceme
Tohle mi připomíná manipulativní heslo Parlamentních listů:
Nikdo nám nediktuje, o čem smíme psát.
Kritická analýza: Jeden svět na školách
-
Nikto nás nevlastní.
Zatím se mi zdá, že qTube vlastní níže podepsaný autor tohoto textu.
-
Epidémia depresie, ktorú zažívajú “rozvinuté štáty” je spôsobená nezdravým spôsobom myslenia a inherentne nesprávnymi konceptami, ktoré považujeme za pravdivé.
Chybí zdroje.
-
Ak nás za našu kontroverziu a excentrické vystupovanie odsúdite, je to v poriadku. Je to spôsob, ktorým filtrujeme tých správnych ľudí.
Co když vás odsoudím za manipulativní rétoriku?
-
-
www.techlib.cz www.techlib.cz
-
HP Color LaserJet 6040 MFP
Color LaserJet cm6040 MFP
Viz screenshot v bodu 6 níže.
-
System -> Správa -> Tisk
Ubuntu 18: Settings -> Devices -> Printers -> Additional Printer Settings...
Zdroj: Ask Ubuntu
-
Server -> Nová -> Tiskárna
Ubuntu 18: Add
-
- Apr 2019
-
www.spiked-online.com www.spiked-online.com
-
Of course, it’s okay for them to fly – Emma Thompson jetted first-class from LA to London to lecture us plebs about all our eco-destructive holidaymaking.
This reminds me of the numerous shots of Al Gore at an airport or on an airplane in the 2006 environmentalist film An Inconvenient Truth.
-
-
www.fel.cvut.cz www.fel.cvut.cz
-
13136
Katedra počítačů
-
13133
Katedra kybernetiky
-
-
vprover.github.io vprover.github.ioVampire1
-
SMT
-
-
www.tptp.org www.tptp.org
-
a property of a person that is true for Andrew but not for Betty
Such property is implicit:
= @ andrew
-
thf(heated_coffee_mix,axiom, ! [S: syrup] : ( ( heated_mix @ coffee @ S ) = coffee ) ).
A heated mixture of coffee and any syrup is still coffee.
-
thf(hot_mixture,axiom, ! [B: beverage,S: syrup] : ( hot @ ( heated_mix @ B @ S ) ) ).
A heated mixture is hot!
-
thf(heated_mix_type,type,heated_mix: beverage > syrup > beverage).
A heated mix is the application of heat to the mixture of a beverage with a syrup.
-
thf(heated_mix,axiom, heated_mix = ( ^ [B: beverage,S :syrup] : ( heat @ ( mix @ B @ S ))) ).
A heated mix is the application of heat to the mixture of a beverage with a syrup.
-
thf(mix_type,type,mix: beverage > syrup > beverage).
A mixture of a beverage with a syrup is a beverage.
-
thf(heat_type,type,heat: beverage > beverage ).
A heated beverage is a beverage.
-
thf(coffee_type,type,coffee: beverage).
Coffee is a beverage.
-
-
en.wikipedia.org en.wikipedia.org
-
IMDB list: Vatican Best Films List
-
-
www.topcoder.com www.topcoder.com
-
Nondeterministic Polynomial (NP)
Judging from the context, the author meant "NP hard".
-
-
gamedev.cuni.cz gamedev.cuni.cz
-
various items to various characters
one item to one character
-
Magic Dance Dance Carpet
-
- Mar 2019
-
www.topcoder.com www.topcoder.com
-
Learning Challenge 1
-
-
www.topcoder.com www.topcoder.com
-
same density
The density in the current test cases is no more than 0.2.
-
You can call the function solveDA(rule, da_params) multiple times
According to songzy12, it is necessary to call the function at least once to get a score. See discussion in the forum.
-
The edge weights are all 1.
There may be multiple edges between any pair of nodes.
I think you should accept multiple edges between the same pair of nodes.
-
T = (actual execution time of your script) - (DA API wait time) + (only the annealing time within DA)
"Total execution time(ms)" in the email is the time we are using for scoring that counts towards 180 sec. limit.
-- Meaning "Total execution time(ms)" in the email is the T, and "DA API wait time" is already excluded from there.
-
-
www1.cenia.cz www1.cenia.cz
-
nařízení vlády č. 341/2017 Sb.
-
-
hashcodejudge.withgoogle.com hashcodejudge.withgoogle.com
-
582Prague Pandas800521
Source code: github.com/filipbartek/hashcode2019qualification
-
- Feb 2019
-
tc3-japan.github.io tc3-japan.github.io
-
Each column-j cannot have any duplicate number
Moreover, this constraint ensures that each column has at least one number of each in \(K\). The constraint ensures that each column contains each number in \(K\) exactly once.
-
- Jan 2019
-
vyhodny-software.cz vyhodny-software.cz
-
Část A: Vytvoření bootovacího USB
Instrukce v této sekci jsou platné pouze pro Windows. Pokud máte Linux, následujte instrukce v jednom z následujících návodů:
-
-
www.livenowthrivelater.co.uk www.livenowthrivelater.co.uk
-
it is most likely that these effects come from the breathing techniques
Why do you think so?
-
An example of why testing should always be blinded!
How exactly would that help in this case?
-
- Dec 2018
-
portal.mpsv.cz portal.mpsv.cz
-
16. Jak vysoká bude podpora v nezaměstnanosti a jak dlouho ji mohu pobírat?
maximální výše PvN činí 0,58násobek průměrné mzdy v národním hospodářství za první až třetí čtvrtletí kalendářního roku předcházející kalendářnímu roku, ve kterém byla podána žádost o PvN.
Zdroj: Základní poučení
Průměrná mzda v národním hospodářství v roce 2017: 28 761 Kč
Zdroj: Sdělení MPSV
Maximum v roce 2018: 0,58 * 28 761 = 16 681,38 Kč
-
- Aug 2018
-
www.ceskaposta.cz www.ceskaposta.cz
-
odměnu za předložení zboží a zastupování v celním řízení
-
- Jul 2018
-
drmemory.org drmemory.org
-
the Dr. Memory directory inside your profile directory
%APPDATA%\Dr. Memory
Tags
Annotators
URL
-
-
tedfelix.com tedfelix.com
-
Add Users To "audio" Group
Why should I add myself to "audio" group?
Tags
Annotators
URL
-
- May 2018
-
github.com github.com
-
Hollywood principle
-
-
-
You can not only apply it to classes, but also to software components and microservices.
The principle can also be applied to source code files.
-
- Apr 2018
-
www.duolingo.com www.duolingo.com
-
plural
singular
-
- Feb 2018
-
blogs.msdn.microsoft.com blogs.msdn.microsoft.com
-
edge probes
It seems that the edge probe is a special case of the value probe.
-
-
www.draconianoverlord.com www.draconianoverlord.com
-
you’ll need to know up front that you want your commit applied into multiple places, so that you can place it on its own branch
More specifically, you'll need to know up front all the places you want your patch commit applied into so that you can determine where to start the patch branch from.
-
if you can anticipate where a commit may/will be need to applied
This is an important assumption.
The way I understand it, cherry picking is intended to be used in case of unanticipated migration of code.
-
its own branch
The patch branch should start at a common ancestor of all the target branches. Since the broken code is in all the target branches, it must be in at least one of their common ancestors.
If we don't start from a common ancestor and merge the patch into all the target branches, at least one of the target branches will get some extra change along with the patch.
-
- Jan 2018
-
www.quora.com www.quora.com
-
call to a function defined in a DLL file
Is it really possible to get an "undefined variable" compilation error from a function defined in a DLL?
First of all, the calls to the DLL are only resolved by the linker. Second, I don't think the linker analyzes the definitions of the functions at all. Third, I don't think there are any "variables" in native binary code; there are just memory addresses and registers in play.
-
-
holos.cz holos.cz
-
zavolám za 24 hod. jak se mi daří.
Komu?
-
- Dec 2017
-
chris.beams.io chris.beams.io
-
picking one and sticking to it is far better than the chaos that ensues when everybody does their own thing
-
-
www.penwatch.net www.penwatch.net
-
The PowerShell equivalent to the Unix which command is called get-command.
Also try the command
where
in Windows command prompt. It does not only run in PowerShell.
Tags
Annotators
URL
-
- Nov 2017
-
agilemanifesto.org agilemanifesto.org
-
Individuals and interactions over processes and tools
Do not give up personal interaction in favor of a tool-supported process. "Když tomu nerozumím, tak se jdu zeptat."
-
-
blog.lenss.nl blog.lenss.nl
-
/dev/sda
On my computer the device with the unused space is
/dev/sdb
. You can see it in the graphical utility Disks.
-
-
blog.jdpfu.com blog.jdpfu.com
-
Chipset – ICH9 this is important
Why?
-
-
docs.vmware.com docs.vmware.com
-
/dev/cdrom on /mnt/cdrom type iso9660 (ro,nosuid,nodev)
VMware Workstation Player 12:
/dev/sr0 on /media/ubuntu/VMware Tools type iso9660 (ro,nosuid,nodev,relatime,uid=1000,gid=1000,iocharset=utf8,mode=0400,dmode=0500,uhelper=udisks2)
-
-
docs.vmware.com docs.vmware.com
-
The name to use to register the guest operating system
What does this mean?
-