-
I print the first 32 labels of train dataloader for teacher net and got:
`14, 8, 29, 67, 59, 49, 73, 25, 4, 76, 11, 25, 82, 6, 11, 47, 28, 43, 40, 49, 27, 92, 62, 37, 64, 22, 38, 90, 14, 16, 27, 92 `…
-
Here are some profilling I did on master, where a simple pipeline takes 9 seconds to start executing on my macbook:
```
% bin/logstash -e "input { generator { count => 1 } } output { stdout { codec =…
-
Not to take away from the interesting work that you have been spearheading towards the goal of making uniquely decodable word lists, but I wanted to raise a bit of a counter-point, as food for thought…
bwbug updated
2 years ago
-
## Context
One of the core problems of the internet in its current state is that it's difficult to properly track the evolution of a line of thought, over time. This makes it impossible to e.g. have …
nt92 updated
8 months ago
-
Are FCM messages encrypted? Could MicroG ever offer end-to-end encryption or does it depend on each app's FCM implementation?
And can we monitor the message contents?
I'm not too fond of the idea o…
-
### Prerequisite
- [X] I have searched [the existing and past issues](https://github.com/open-mmlab/mmyolo/issues) but cannot get the expected help.
- [X] I have read the [FAQ documentation](https://…
Zunon updated
7 months ago
-
-
Is it brute force or midpoint?
-
[zricethezav/gitleaks: Scan git repos (or files) for secrets using regex and entropy 🔑 (github.com)](https://github.com/zricethezav/gitleaks)
You download the executable (by navigating Releases -> …
-
## ❓ Questions and Help
### Before asking:
1. search the issues.
2. search the docs.
#### What is your question?
as the title,valid up to 27.7 but evaluate only 25
#### Code
# Download …
tjshu updated
2 years ago