-
Implement a tracing or APM tool to the application, and work to identify performance hot spots:
[x] Research options and report (e.g. NewRelic, Honeycomb, Datadog, etc.)
[ ] look at spots where …
-
Now that @koaning has implemented `EWVar` for computing a variance that adapts to the data, we should be able to add a simple outlier detector. But first we have to decide on a contract interface. Ind…
-
BTW, do you know about the numpy "fancy indexing" and conditional indices?
They are supposed to be more efficient than normal iteration and shorter, too.
p[p>0] = p*1.6
https://www.numpy.org/de…
-
It would be really nice if we can lock some certain slots in the Hotbar so that we can never accidentally sell/drop our precious items by mistake.
I accidentally threw my runaans bow when sorting ou…
-
## Please follow the guide below
- Issues submitted without this template format will be **ignored**.
- You will be asked some questions and requested to provide some information, please read them…
-
In elasticsearch 7.x was introduced soft limit on the number of shards in a cluster https://www.elastic.co/guide/en/elasticsearch/reference/7.0/misc-cluster.html#cluster-shard-limit. As mentioned in t…
-
In the v3.9 stream share statistics were introduced for stratum mining without any consideration
for GBT and solo mining. It was believed the stats code would be robust enoug to handle
invalid or no…
-
With great interest I've read (nearly) all of the papers released by this research group. I've found the papers a great resource, as the combination of papers give a broad view on the area of automate…
-
Hi All,
I have developed anomaly detection model using sklearn Isolation Forest Algorithm, now would like to go for live inference.
can i use tensorflow service for live inference, if it possible …
-
|Developing branch|
|---------|
|[vuln-windows](https://github.com/wazuh/wazuh/tree/vuln-windows) |
The idea is to make use of the National Vulnerability Database to look for vulnerabilities in…