serhii.net LINKS BLOG!
In the middle of the desert you can say anything you want
Home page
Blog
Work log
Journal
About
Links home
Master
About
categories: IT
Styleformer: A Neural Language Style Transfer framework
How to Handle Secrets on the Command Line
Hypermodern Python · Claudio Jolowicz
Console Spreadsheets.
Map of my personal data infrastructure - beepb00p
lachs0r/0x0: No-bullshit file hosting and URL shortening service
Command Line Interface Guidelines
Fast and Accurate Document Detection for Scanning - Dropbox
layout-parser/modelzoo.md at master · Layout-Parser/layout-parser
[1809.08799] Chargrid: Towards Understanding 2D Documents
Creating a QR Code step by step
My code style
Project Nayuki: Recent pages
String simularity / similarity
Java Collections Tutorial
CodeOwnership
CS 111: Common Java Errors
Linux - George Ornbo
GifCities
Java Constructors
A Complete 4-Year Course Plan for an Artificial Intelligence Undergraduate Degree - Mihail Eric
Vim plugins that I use
You Should Learn Regex
Hollywood Superstitions vs. Data Science: Investigating for 99PI • Andrew and Zachary Burchill
Aatish Bhatia (nice web experiments)
A Good Vimrc
The Definitive Guide to Python import Statements - Chris Yeh
Ledger CLI cheatsheet
Linux Desktop Setup · HookRace Blog
Out of the Tar Pit - MoseleyMarks06a.pdf (Complexity)
Googletrans: Free and Unlimited Google translate API for Python — Googletrans 2.4.0 documentation
Git - Book
How to Use t-SNE Effectively
5
Yes you should understand backprop – Andrej Karpathy – Medium
Unsupervised learning of artistic styles with archetypal style analysis - the morning paper
duplicity: Features (Encrypted backup software)
Migrate from WordPress to Jekyll - has_many :codes
Generating custom photo-realistic faces using AI – Insight Data
Understanding Backpropagation - Mohit Deshpande’s Website
Machine Learning Basics — Part 4 — Anomaly Detection, Recommender Systems and Scaling
A quick complete tutorial to save and restore Tensorflow models – CV-Tricks.com
List of Public Data Sources Fit for Machine Learning - The Official Blog of BigML.com
ODDS – Outlier Detection DataSets
The Flask Mega-Tutorial Part XII: Dates and Times - miguelgrinberg.com
Distill — Latest articles about machine learning
The Curse of Dimensionality in Classification
Working Towards Better Naming - CSS-Tricks
All Posts - Holehouse.org
Linux is NOT Windows
Top 10 articles about Psychology & UX in 2017 Q4 – uxdesign.cc – UX Design Collective
Exposing Gmail’s Categories to IMAP
About — Debiania
Comprehensive Beginners Guide to Learn Data Visualization in R - Learn R
Top 50 ggplot2 Visualizations - The Master List (With Full R Code)
Data Analysis for Novice Programmers.
Part 1, Section 3: Introduction to Using Python for Data Analysis.
Stop Using word2vec - Stitch Fix Technology – Multithreaded
A PHP Function for Fetching RSS Feed and Outputing Feed Items as HTML - SysTutorials
On Generative Algorithms: Introduction · inconvergent
Software development 450 words per minute - Vincit (blind person coding via speech synth)
The Side Project Marketing Checklist
Evolved antenna - Wikipedia
Terminal PasteBin - CLI pastebin - L4D.PW
Abstractivate: Hyperproductive development
Ask HN: Why don't more open-source projects monetize? - Hacker News
Postcards from the Frontiers of Science • New paint colors invented by neural network
Understanding Git: Repositories
The Unreasonable Effectiveness of Recurrent Neural Networks
(EN) Keylogger in Hewlett-Packard Audio Driver - mod%log
Attacked Over Tor - The Hacker Factor Blog
SSH Port (Why is it port 22)
Linus Akesson personal site
How I got started with Open Source and you can do too.
OSINT Training created by Michael Bazzell - Open Source Intelligence Techniques - Buscador Social Engineering Linux Distro
0.30000000000000004 - Floating Point Math - examples of sending .1+.2 to stdout in a variety of languages
The Positioning Manual for Technical Firms - More leads for your dev shop
This is the right time to start a career in AI - + RESOURCES ON HOW TO DO IT
Three books developers should read when they graduate
(1610.08401) Universal adversarial perturbations
13 Free Training Courses on Machine Learning and Artificial Intelligence @ HackerEarth Blog
Command line Linux administration tools you should know about. - Hackr
Programmer Interrupted
Aerotwist - Music DNA
Here's What Happens When You Mix Weather, Political Data, and Machine Learning - Creators
How to enable syntax highlighting for `diff` (like...: @noahsussman: Infinite Undo
Introduction to Computer Science and Programming - Electrical Engineering and Computer Science - MIT OpenCourseWare
lame hackers guide: How I rooted Ew_Skuzzy: 1
My First Mobile Game in HTML with PhoneGap Build
Simulating Natural Systems in a Web Browser - Build New Games
BriMor Labs: Identifying TrueCrypt Volumes For Fun (and Profit?)
How to Hypnotise an Artificial Intelligence – Terence Eden's Blog
Security Engineering - A Guide to Building Dependable Distributed Systems
The CIA Rule Book on Malware Creation - Hacking Tutorials by Xeus
Google’s featured snippets are worse than fake news - The Outlinegi
Dyslexie font: optimal reading comfort - Dyslexie Font
Only 90s Web Developers Remember This
2016 Guide to User Data Security - Inversoft
Using ssh config to save settings and make your life easier – Exotic Security
The Universe of Discourse : I found the best anagram in English
digital-scurf → software → libgfshare (Sharing tool, 3-of-5 for example)
Steganography in Linux from the command line – scottlinux.com - Linux Blog
Attacking machine learning with adversarial examples
Efficient RSS reading - with Newsbeuter
i3status/contrib at master · i3/i3status
nonpop/xkblayout-state: A small command-line program to get/set the current keyboard layout.
Wykobi Computational Geometry Library
Linux Device Drivers, Third Edition
SMMRY - About (Algo to summarize text)
Squeeze disk space on a Debian system – Own your bits
vi - How do I use vim registers? - Stack Overflow
RFC 2321 - RITA -- The Reliable Internetwork Troubleshooting Agent
Alessandro Rubini - Linux / FOSS independent consultant
Generating fantasy maps
htop command in Linux - SoftPrayog
pipeseroni/pipes.sh: Animated pipes terminal screensaver
shardcore
Uncharted Atlas (@unchartedatlas) - Twitter
What is the XY problem? - Meta Stack Exchange
AES Crypt - Advanced File Encryption
generativestuff.com
h5ai · modern HTTP web server index for Apache httpd, lighttpd, nginx and Cherokee · larsjung.de
How does Chrome’s ‘incognito’ mode affect digital forensics? - Magnet Forensics Inc.
Top mentioned books on stackoverflow.com
Troy Hunt: Your affairs were never discreet – Ashley Madison always disclosed customer identities
Gossip protocol - Wikipedia
This Week In 4n6 – Your weekly roundup of Digital Forensics and Incident Response news
Level Up Your CSS Skills With These 20 Pro CSS Tips - Web Designer Wall - Design Trends and Tutorials
Ked - programming language from the People's respublic of Cork
keynav - retire your mouse. :: semicomplete.com - Jordan Sissel
SemanticScuttle - Open source social bookmarking service
Computer forensics of reddit, what's your everyday is like? : computerforensics
Browser Autofill Phishing
Click-o-Tron
Crash Course: UI Design – HH Design – Medium
GitHub - mzet-/linux-exploit-suggester
GitHub - x0rz/tweets_analyzer: Tweets metadata scraper & activity analyzer
httpbin(1): HTTP Client Testing Service
LXAppearance - LXDE.org
Principle of least astonishment - Wikipedia
DM's Esoteric Programming Languages - Piet Samples
Just another Perl hacker - Wikipedia
So, we setup a rack and some servers this week - Album on Imgur
User:Matthias Buchmeier - Wiktionary - Automatically generated Ding dictionaries
How I socially engineered my girlfriend’s proposal. – Medium
Life plus Linux: Look before you paste from a website to terminal
RegexOne - Learn Regular Expressions - Lesson X: Infinity and beyond!
RegExr: Learn, Build, & Test RegEx
The Senster - Futility Closet
The Xanadu Universe
477454 - Insulting source code - Debian Bug report logs
Colorize your stdout with xcol – Own your bits
GitHub - alols/xcape: Linux utility to configure modifier keys to act as other keys when pressed and released on their own.
The Alien Style of Deep Learning Generative Design – Intuition Machine – Medium
The First Inaugural Firefox Census Results – The Official Unofficial Firefox Blog – Medium
Ultimate-GPG-Settings · GitHub
Things you probably didn’t know you could do with Chrome’s Developer Console
BlueProximity - GNOME Bluetooth device distance detection and automatic locking tool :-)
Details • Psioπ • Hackaday.io ("Reverse engineering the keyboard,part 3)
Faster SSH Access to Remote Computers
linux - How can I get USB keyboard extra buttons working? - Super User
Stigler Diet – A Programmer's Portfolio
What I always wanted to say - ThorstensHome
9 Years of Sleep - PhobosLab
Home · angrave/SystemProgramming Wiki · GitHub
P2P Foundation
GitHub - spacejam/void: terminal-based personal organizer
Stigler Diet – Sharing Your Side Projects Online
2016 Deaths. How do they stack up? @ Dactylonomy
Luhn algorithm (checking validity of CCs, SSNs etc) - Wikipedia
Guide: reddit + RSS : raerth
JOHN HIGGS: Go Home @klfbook, You're Drunk
.bashrc Generator
Home - colah's blog - excellent explanations of probability theory, neural networks etc
Joel Grus – Polyglot Twitter Bot, Part 1: Node.js - Retweet "Make * great again"
Neural networks and deep learning book
Regex Crossword
t-SNE – Laurens van der Maaten - algorithm to decrease dimensionality
The Linux System Administrator's Guide
Visualizing Top Tweeps with t-SNE, in Javascript
What a Deep Neural Network thinks about your #selfie
Create an ANSI art MOTD
NSA-proof your emails in 2 hours
Mental disorders as networks
Keywords in Semantic Mediawiki // Working with the separator parameter // Multiple values per parameter
Linux Xmodmap Tutorial