Yah this sounds like a leaky microwave interfering with the 2.4GHz band. I've had it happen with older microwaves in university housing interfering with the ubiquiti APs that they had on site.
Wouldn't this just be a classic case of survivorship bias? For every Amazon and Facebook there could be a number of companies that did similar things and fell apart.
Good code quality doesn’t guarantee success. However, those two data points indicate it may be necessary if not sufficient. There are only 4-5 tech companies operating at that scale with proven business models. Google and Microsoft being the primary others.
The fear for many likely doesn't even come from the book of Revelation but rather from a popular Christian series of novels based on one person's interpretation of Revelation. I'd bet most people afraid of the mark of the beast haven't even read Revelation.
> The fear for many likely doesn't even come from the book of Revelation but rather from a popular Christian series of novels based on one person's interpretation of Revelation.
If you are referring to the Left Behind series by LaHaye & Jenkins, they are two people, and the fear was widespread in the community before that series became popular; the relevant interpretation in the book is based on what were already widespread concepts.
> I'd bet most people afraid of the mark of the beast haven't even read Revelation.
I dunno, the segment in which the fear is concentrated is pretty much the same segment that fetishizes personal reading of the Bible, so I suspect you'd be surprised.
OTOH, I don't think for most of them there is a relationship between independent reflection on the source material and it's context and the fear being discussed, it's definitely something that is usually taken on the same type of top down interpretive authority that the Protestantism was in significant part a reaction against existing in Catholicism.
"The second beast [...] forced all people, great and small, rich and poor, free and slave, to receive a mark on their right hands or on their foreheads."
Revelation 13:15-16
There are still aim bots in lol because there are aimed skill shots for most of the champions. Scripting is abilities is probably the main method of cheating though.
This anti cheat software is for their new game valorant which is a counter strike like shooter.
I know you reference your introductory notebook throughout your docs but I think it would be helpful to include some of the plots inline in your docs.
Seeing that this lib is built on top of statsmodels my first response was that I'll just keep using statsmodels. However the simplicity of the diagnostic plots actually seems really nice value add. Showcasing those plots right in your docs might make it more attractive to people checking out your project for the first time.
- Leverage vs residuals squared plot (there's an influence plot but not something similar to Stata's lvr2plot)
Even the most common metric I use for assessing models – root MSE – isn't stored in the Statsmodels object summary. To assess an OLS model in Statsmodels I'd find I do so much repetitive code, yet in Stata the commands are fairly succinct.
Other things I also added to make encoding of variables easier:
- InteractionEncoder
- DummyEncoder (to cover different ways of treating missing values)
The more I thought about these missing features, the more I thought they can be wrapped up in a more coherent way. :-)
Is it worth formatting my external flash media as exFAT at this point if I find myself dual booting often? NTFS on Ubuntu is pretty well covered so that has been what I have been using. But if exFAT support is improving I'm wondering if it is worth switching over.
This is an interesting theory. Probably one of the more plausible ones. I imagine some sort of biological or toxicological attack could cause some sound processing related symptoms.
On the wild end of things one could imagine it being a combination of sonic and chemical attack where the an innocuous chemical structure became active as a result of high frequency sound.
The article mentions that the hackers stole 500MB? The number seems small given the scale of storage in modern computers but I guess 500MB could account for a large number of documents that contain confidential info.