"Make it beautiful." Visualization of learning with Tensorboard from Google &lt;{short}&gt; &lt;{full}&gt; <div class="post__text post__text-html js-mediator-article"> <img src="https://habrastorage.org/getpro/habr/post_images/e2b/5df/8f9/e2b5df8f97f

<{full}>
"Make it beautiful." Visualization of learning with Tensorboard from Google        
    
 Beauty, as is known, requires sacrifice, but the world promises to save. A fairly fresh (2015) visualizer from Google is designed to help you understand the processes that take place in networks of in-depth training. It sounds tempting.    
 Colorful interface and loud promises were delayed to parse this design shayta, with unintuitive debugging glitches. The API is unusually meager and often updated, the examples on the network are the same (the eyes can no longer look at the        
    
 Beauty, as is known, requires sacrifice, but the world promises to save. A fairly fresh (2015) visualizer from Google is designed to help you understand the processes that take place in networks of in-depth training. It sounds tempting.    
 Colorful interface and loud promises were delayed to parse this design shayta, with unintuitive debugging glitches. The API is unusually meager and often updated, the examples on the network are the same (the eyes can no longer look at the
 
 
Beauty, as is known, requires sacrifice, but the world promises to save. A fairly fresh (2015) visualizer from Google is designed to help you understand the processes that take place in networks of in-depth training. It sounds tempting.
 
Colorful interface and loud promises were delayed to parse this design shayta, with unintuitive debugging glitches. The API is unusually meager and often updated, the examples on the network are the same (the eyes can no longer look at the <{short}>  Beauty, as is known, requires sacrifice, but the world promises to save. A fairly fresh (2015) visualizer from Google is designed to help you understand the processes that take place in networks of in-depth training. It sounds tempting. Colorful interface and loud promises were delayed to parse this design shayta, with unintuitive debugging glitches. The API is unusually meager and often updated, the examples on the network are the same (the eyes can no longer look at the   Beauty, as is known, requires sacrifice, but the world promises to save. A fairly fresh (2015) visualizer from Google ...
+ 0 -

Installing Debian with the root on the encrypted ZFS mirror

Installing Debian with the root on the encrypted ZFS mirror
 
Foreword
 
Due to the need to work in another city, I had to buy a laptop.
 
Gradually, the problem of synchronizing it with a stationary machine has ripened.
 
Despite the fact that all my projects are being conducted in the gita, not all of the code is completely mine, and I do not want to spread it on the githab.
 
To solve this problem, I started building my NAS, which will give me, in addition, additional options.
 
Having studied what OSes are now available for solving this problem, I came to the conclusion that of all the diversity, the most developed, widely used and, therefore, worked out, ...
+ 0 -

Who's there? In the European Union proposed to hide the data of the owners of domain names

Who's there? In the European Union proposed to hide the data of the owners of domain namesMay 25 in the European Union comes into force General regulations on data protection (GDPR). The decree will change the way of storing and processing personal data by companies operating in the territory of the EU. However, some of its provisions are still cause the community questions .
 
 
So, the Corporation for the Management of Domain Names and IP-addresses (ICANN) proposes to delete the information about the owners of domains (name, address, etc.) from the WHOIS, to bring the principles of the system ...
+ 0 -

Conference DEFCON 22. "Mass scanning of the Internet through open ports". Robert Graham, Paul McMillan, Dan Tantler

Conference DEFCON 22. "Mass scanning of the Internet through open ports". Robert Graham, Paul McMillan, Dan TantlerMy name is Rob Graham, I'm the head of Errata Security, which deals with Internet consulting. Today we'll talk about how to scan the entire Internet and what it's for. Until now, there were few tools to solve this problem, so we created our own tools. The Internet is small enough - it has only about 4 billion addresses.
 
 
Scanning the Internet is easy - you sit in front of the computer, start the console with the command line and enter the subnet address. And you observe how your screen is filled with data, and the lines all run and run further. As a result, you get a list of open device ports ...
+ 0 -

How to stay in TOP when changing search algorithms (guide for beginners SEO)

How to stay in TOP when changing search algorithms (guide for beginners SEO)After each update of the search engine algorithm, some SEO optimizers say that it was unsuccessful. There are more than 200 factors of site ranking. It is reasonable to assume that there are many possible updates. In this article we will tell you how search algorithms work, why they are constantly changing and how to react to it.
 
 

What are search algorithms?


 
They are based on formulas that determine the position of the site in the search results for a specific query. They are aimed at selecting the web pages that most closely correspond to the phrase entered by the user. In doing so, they ...[/h]
+ 0 -

From Japan to Singapore: a new submarine cable will connect 9 Asian countries

Consortium Southeast Asia-Japan 2 signed an agreement with the Japanese manufacturer of telecommunications equipment NEC Corporation to lay the submarine cable SJC2 with a throughput of 144 Tbit /s. The cable will connect nine countries.
 
 
About the details of the project further.
 
 
From Japan to Singapore: a new submarine cable will connect 9 Asian countries

 
/photo COMSEVENTHFLT CC
 
 

Cable characteristics


 
The length of the cable will be 10.5 km - it will connect Japan, South Korea, mainland China, Taiwan, Hong Kong, Thailand, Cambodia, Vietnam and Singapore.
 
 
SJC2 will be ...[/h]
+ 0 -

Feel the neural network or the designer of neural networks

Feel the neural network or the designer of neural networksI've been interested in neural networks for a long time, but only from a viewer's point of view - I watched the new possibilities that they give in comparison with the usual programming. But he never climbed into theory or practice. And suddenly (after the sensational news about AlphaZero) I wanted to make my neural network. After watching a few lessons on this topic on YouTube, I got into the theory a bit and got down to practice. In the end, I did even better than my neural network. It turned out the designer of neural networks and a visual aid for them (that is, you can see what is going on ...
+ 0 -

Welcome to Badoo PHP Meetup on April 7

Welcome to Badoo PHP Meetup on April 7  
 
Hello, Habr! It seems that astrologers announced a week of PHP mitapov in April :)
 
 
7 April We will conduct the first Badoo PHP Meetup in the Moscow office of the company!
 
 
We are hopelessly in love with PHP, for many years now contribute to its development and invite all interested to talk and spend Saturday with benefit in a pleasant atmosphere. In the program four reports and discussions over a cup of coffee, and in the sequel - afterparty. For those who are not in Moscow, there will be a broadcast, as well as publish recordings of speeches.
 
 
Address: Tsvetnoy Boulevard...
+ 0 -

The architecture of the application on Akili framework

The architecture of the application on Akili framework

 
Greetings! Today I would like to make out example implementation of the site architecture on the framework
Akili
. In this article, we will focus not so much on the component system as on the full implementation of the application, using routing, ajax queries, storage, etc. right out of the box, without external dependencies.
Example in the network .
 
English speaking analysis example of architecture.
 
Npm scripts .
 
Full ...
+ 0 -