<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Simply Dev - Medium]]></title>
        <description><![CDATA[Best advice and techniques to become a good developer . - Medium]]></description>
        <link>https://medium.com/simply-dev?source=rss----3fd093b1f0fc---4</link>
        <image>
            <url>https://cdn-images-1.medium.com/proxy/1*TGH72Nnw24QL3iV9IOm4VA.png</url>
            <title>Simply Dev - Medium</title>
            <link>https://medium.com/simply-dev?source=rss----3fd093b1f0fc---4</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Sat, 02 May 2026 06:14:19 GMT</lastBuildDate>
        <atom:link href="https://medium.com/feed/simply-dev" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[Kubernetes Learning]]></title>
            <link>https://medium.com/simply-dev/kubernetes-learning-43027c932626?source=rss----3fd093b1f0fc---4</link>
            <guid isPermaLink="false">https://medium.com/p/43027c932626</guid>
            <category><![CDATA[kubernetes-cluster]]></category>
            <category><![CDATA[kubernetes-engine]]></category>
            <category><![CDATA[kubernetes]]></category>
            <dc:creator><![CDATA[Preeti Sharma]]></dc:creator>
            <pubDate>Sun, 19 Jul 2020 17:43:17 GMT</pubDate>
            <atom:updated>2020-07-19T17:43:17.090Z</atom:updated>
            <content:encoded><![CDATA[<h4>Kubernetes Dashboard</h4><p>I simply need to clarify such that an individual who doesn’t have any earlier information on container and clusters ought to have the option to comprehend what Kubernetes is and what it does.</p><p>To begin with, we comprehend why container.</p><p>Suppose you need to present a cycle to your child on his birthday. Presently if the cycle is conveyed to you with parts isolated and a manual that depicts how to join the parts. Indeed, you may wind up screwing things.</p><p>Rather imagine a scenario where the cycle itself is instant and packed in a container and conveyed to your street number, with no manual intercession required. Ain’t unreasonably great.</p><p>The individual pieces of the cycle are the dependencies of the project which may work in one spot and not the other.</p><p>The cycle organization is the engineer’s center point, and the customer here is the one utilizing our item.</p><p>To tackle this issue docker containers came into the image.</p><blockquote><strong>What Kubernetes is?</strong></blockquote><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*T5P8IrYFqWf6VKJJFVfATg.png" /></figure><p><em>Situation 1 ) Cricket coordinate.</em></p><p><em>Consider India and Pakistan are playing world cup last, out of nowhere a player got harmed. What occurs straightaway?</em></p><p><em>Another player replaces the harmed one. With the goal that implies all the 11 players who are playing ought to be sufficiently fit.</em></p><p><em>The 11 players in the arrangement set.</em></p><p><em>Their quality is container health.</em></p><p><em>The physio and group the board who guarantees the strength of the player and measure their wellness is Kubernetes</em></p><p><em>Every player is a compartment and Kubernetes(a team the executives ) is the orchestrator.</em></p><p><em>Two normal things that you hear in Kubernetes → services and pods</em></p><p><em>Alright, again a nontechnical conversation.</em></p><p><em>Suppose you just brought forth a little infant. Presently your family members need to meet the child, however, in the emergency clinic ward there are 1000′ s of children and they got confused.</em></p><p><em>The subsequent stage would be, to call you and request that you show who’s your infant is.</em></p><p><em>Services and pods are also similar. Service is a parent and pod is a child.</em></p><p><em>At the point when a pod gets executed or another pod is begun, the IP address of the pod continues changing and it’s not in our control. So the best way to get to the pod is through the service that has an association with the pod by means of labels.</em></p><blockquote><strong>Terms</strong></blockquote><blockquote>1 . Kubeconfig : kubeconfig file is used to find the information needed to choose the cluster and communicate with the API service of the cluster and communicate with the API server of the cluster. A file that uses access to clusters is called the kubeconfig file.</blockquote><figure><img alt="" src="https://cdn-images-1.medium.com/max/807/1*xSWeKGUGuTO5Dj6PPmhWrQ.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/271/1*CQYhfX5ztm6kZkAlWiyujQ.png" /></figure><blockquote>2. Cluster :Set of node machines for running customized applications.</blockquote><figure><img alt="" src="https://cdn-images-1.medium.com/max/975/1*ZpmkRnw-FuUsJh-XbEiNkQ.png" /></figure><blockquote>3. Context : A context element is used to group access parameter under a convinent name. It contains three parameters — — -&gt; Cluster , Namespace and user.</blockquote><figure><img alt="" src="https://cdn-images-1.medium.com/max/246/1*U3w6haR_V8O08w05ZMZfTQ.jpeg" /></figure><blockquote>4. Namespace : It is used to divide cluster resources between multiple users. It cannot be nested between one another and each resource can only be one namespace.</blockquote><blockquote>5. Users — — — — — -&gt; Service Account : It is managed by Kubernetes API and bound by namespace call through API .| Normal Users : It is maintain by outside independent service. It cannot be added to cluster through API call . Kubernets does not have object represent normal user account.</blockquote><blockquote>Kubernetes gives loads of functionality which is helpful for us. Like, Kubernetes Dashboard is a universally useful, online UI for Kubernetes groups. It permits clients to oversee applications running in the cluster as well as troubleshoot them and manage the cluster itself.</blockquote><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*rRNuGZqAL8tcAWlcrVYQLQ.gif" /></figure><p>You can use Dashboard to get an overview of applications running on your cluster, as well as for creating or modifying individual Kubernetes resources (such as Deployments, Jobs, DaemonSets, etc). For example, you can scale a Deployment, initiate a rolling update, restart a pod, or deploy new applications using a deploy wizard.</p><p>The dashboard also provides information on the state of Kubernetes resources in your cluster and on any errors that may have occurred.</p><h3>Authentication</h3><p>1.<strong> User client certificate</strong>: Tokens, proxy, HTTP, basic auth to authenticate Http request.</p><p>2. <strong>Through authenticate plugins</strong></p><p>3<strong>. HTTP request made to API server, </strong>plugins attempt to associate the attribute with the request.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*ZxXvi0VAFgIfwI1NCJuCew.jpeg" /></figure><blockquote>Every service account has a secret password/token form.</blockquote><figure><img alt="" src="https://cdn-images-1.medium.com/max/802/1*juz0Br78QOUG_q9kB3J1_g.png" /></figure><h4>kubectl create namespace</h4><p>This command is useful for creating a namespace.</p><h4>kubectl get ns</h4><p>This command is used to get the namespace.</p><h4>kubectl serviceaccount -n Preeti</h4><p>This command is used to access the node Preeti from the service account.</p><h4>kubectl describe secret tokenname -n Okgoogle</h4><p>As to check the contents of the node with the help of a secret token.</p><h4>kubectl delete</h4><p>This will delete the Kubernetes dashboard.</p><h4>kubectl delete — all kubernetes-dashboard</h4><p>It will delete all dashboard in Kubernetes.</p><h4>kubectl get po -n kubernetes-dashboard</h4><p>|&gt;service account ready</p><p>|&gt;default account</p><h4>*If anyone wants to access the cluster from outside you can use node port.</h4><h4>Kubectl edit svc Kubernetes-dashboard -n kubernetes-dashboard</h4><p>After this edit the type to nodeport such that the cluster could be accessed externally.</p><h4>Access</h4><p>Access the acquired IP on the incognito or firefox</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/302/1*zjhCuV1DZ7Dq8pyqHyT6Xg.png" /></figure><h4>Thank you</h4><blockquote>View cluster resources</blockquote><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=43027c932626" width="1" height="1" alt=""><hr><p><a href="https://medium.com/simply-dev/kubernetes-learning-43027c932626">Kubernetes Learning</a> was originally published in <a href="https://medium.com/simply-dev">Simply Dev</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Azure Machine Learning Foundation]]></title>
            <link>https://medium.com/simply-dev/azure-machine-learning-foundation-8486ab4edcb1?source=rss----3fd093b1f0fc---4</link>
            <guid isPermaLink="false">https://medium.com/p/8486ab4edcb1</guid>
            <category><![CDATA[part-1]]></category>
            <category><![CDATA[dev]]></category>
            <category><![CDATA[machine-learning]]></category>
            <category><![CDATA[udacity]]></category>
            <category><![CDATA[microsoft-azure]]></category>
            <dc:creator><![CDATA[Preeti Sharma]]></dc:creator>
            <pubDate>Sun, 19 Jul 2020 17:42:37 GMT</pubDate>
            <atom:updated>2020-07-23T05:22:54.266Z</atom:updated>
            <content:encoded><![CDATA[<h3>Part 1</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/700/1*XPXNIwGPmE4iwt6c-yyckQ.jpeg" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*uCVjc-xE2uzh2hhtKURh2w.jpeg" /></figure><blockquote>Machine Learning the most profound term of the 20th century which will also be known as the ‘demanding job’ of this era. But What’s the reality behind it being the most demanding technology?</blockquote><blockquote>One word answer <strong>data</strong>.</blockquote><h4>For example, you have rice and you want to cook biryani. The whole process of getting good rice which is our data here. And make an output say biryani out of it will take place in a process. That is known as processing, techniques, and approaches that come under machine learning.</h4><h4>Types of machine learning :</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*LhSKDPcUNVPLQDMaRJJFZw.png" /></figure><p><strong>4. Semi-Supervised:</strong></p><blockquote>→ Supervised + Unsupervised.</blockquote><blockquote>→ Less amount of data is labeled and large amount of data is unlabeled.</blockquote><blockquote>→ Self-Training: Training on the datastore multipurpose training.</blockquote><blockquote>→ Self-enable Training: Depend on the parameter training.</blockquote><figure><img alt="" src="https://cdn-images-1.medium.com/max/330/1*MPfAW5-GI360tpNapBF4CQ.png" /></figure><blockquote>Ok now we have our data, we get our output but how can we make it user-accessible or how can we evaluate our output data. Here comes into play the use of Azure Machine Learning Studio.</blockquote><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*73nOCD5Ovo5w-N2ufaRCzQ.png" /><figcaption>Azure machine learning studio</figcaption></figure><h4>Less code and more goal-oriented platform.</h4><p><strong>DataStore: </strong>As the name suggests a store that stores the dataset. The dataset could be balance or imbalance. Since we are working more on datastore. The datastore supported by Azure Machine learning service are:</p><blockquote>Blob Container</blockquote><blockquote>File share</blockquote><blockquote>DataLakes</blockquote><blockquote>SQL</blockquote><blockquote>PostgreSQL</blockquote><blockquote>Databricks(Spark)</blockquote><p><strong>Q. What’s the role of azure services here?🤔</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*0dw3OEtV5zyCNuxKqW0rtg.jpeg" /></figure><h3><strong>Azure dataset format :</strong></h3><blockquote><strong>Tabular</strong>: Creating passing no. of files</blockquote><blockquote><strong>Web URL</strong>: Reference storing files or multiple files in your dataset.</blockquote><p>Since we are working on Dataset we have to check the version as well for that we are dealing with <strong>Dataset Versioning</strong>.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/295/1*u598msNyKbZm3R6g1GcrYw.png" /></figure><h4><strong>Q. How is data Processed?</strong></h4><h3><strong>New Data → Release →Data Preparation → Features</strong></h3><p><strong>Dataset versioning</strong> means predict/taking datasets in organizations.</p><p><strong>If you have Numerical Data → Tabular Format</strong></p><p><strong>Translate text data if present → Numerical Dataset</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/600/1*ujjL5fp7smD2-fnR27RhbQ.png" /></figure><p><strong>Image Data → Matrix of top of RGB Channel of 500*500 pixels contains 3 values.🤔</strong></p><h4>Version Reference: Features or Instances</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/638/1*jqNrESRnm7Y-VqZ84qDfIQ.jpeg" /></figure><blockquote><strong>1. Feature Engineering </strong>: It means you can produce new features based on the values of existing features.It calculayes the performance . And transform the new inputs that will help us to improve the performance.</blockquote><blockquote>-&gt;<strong> 1+feature(existing)</strong></blockquote><blockquote>-&gt; <strong>training a separate machine learning model to new features.</strong></blockquote><figure><img alt="" src="https://cdn-images-1.medium.com/max/564/1*2oI5iVX6kQhrYUh0Q2kA7w.png" /></figure><h4>Tasks include in Feature Engineering are :</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/398/1*1EdtiLFVa5oAU8YhsOrA7w.jpeg" /></figure><p><strong>→</strong> <strong>Aggregation</strong>: Mean, Median, Mode.</p><p><strong>→Part-of</strong>: For e.g extracting a month from particular data.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/675/1*qlypX4rFrgxhknEZwLmd-w.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1002/1*GrMxrWP9vMZSquNKB6KHpA.png" /></figure><blockquote><strong>→ Binning</strong> : Group of entities into bin and use them for example for calculating a particular range of customer age sending either happy, sad or angry emoji for a particular purchase.</blockquote><blockquote><strong>2</strong>.<strong> Feature Selection</strong>: Select the most relevant features .</blockquote><figure><img alt="" src="https://cdn-images-1.medium.com/max/224/1*YbddA-ACp6F7i4da4dOeqA.jpeg" /><figcaption>Dimensionality Reduction</figcaption></figure><blockquote><strong>3. Dimensionality Reduction</strong>: <strong>Technique: PCA</strong>,<em> ML Models cannot accommodate large features then Principal Component Analysis. eg Customer Behaviour. 🤔</em></blockquote><h3><strong>Approaches :</strong></h3><p><strong>Principal Component Analysis (Statistical Approach)</strong></p><p><strong>T-Sne (Probabilistic Approach)</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/883/1*SNY3Z5GzsRRZnw5f0N4rnw.png" /></figure><p><strong>Feature Embedding: Feature embedding is an emerging research area that intends to transform features from the original space into a new space to support effective learning.</strong></p><h3>Terms and Concepts</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/864/1*XesDoVVKH4S90qq23dZJgQ.png" /></figure><ol><li><strong>Flagging</strong>: Deriving Boolean values from the given dataset. For example, you have to the problem statement. Calculate the average amount of purchase. You will approach by questioning Does the person have the purchase of last month??</li></ol><h4><strong>Frequency-based → Occurences → Embeddings</strong></h4><p>🤔🙄</p><p>In simple terms: Start with the problem statement, What’s the main aim we are focussed on? Go with the features with existing features.</p><h4><strong>Quiz⁉ </strong>:🙋🏼‍♀️</h4><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.pollsify.com%2Fc%2FDZOyp5&amp;dntp=1&amp;display_name=Pollsify&amp;url=https%3A%2F%2Fwww.pollsify.com%2Fc%2FDZOyp5&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=pollsify" width="800" height="550" frameborder="0" scrolling="no"><a href="https://medium.com/media/eac4bd4f96522464a59eca0f0fc85f22/href">https://medium.com/media/eac4bd4f96522464a59eca0f0fc85f22/href</a></iframe><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.pollsify.com%2Fc%2FmdNyGZ&amp;dntp=1&amp;display_name=Pollsify&amp;url=https%3A%2F%2Fwww.pollsify.com%2Fc%2FmdNyGZ&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=pollsify" width="800" height="650" frameborder="0" scrolling="no"><a href="https://medium.com/media/56f0d3fa616122a3e405500f5e739e45/href">https://medium.com/media/56f0d3fa616122a3e405500f5e739e45/href</a></iframe><h4><strong>Azure pre-built Machine Learning models</strong></h4><p><strong>Process :</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*K1D4hq54T9TwNO9TIJFyLA.jpeg" /></figure><blockquote><strong>Filter based model Selection</strong> 📳 <strong>:</strong> Identifying columns in input datset that have great distributed power.</blockquote><blockquote><strong>Preemptive feature importance :</strong> Determine the best feature to use by computing to use by computing the feature important scores.</blockquote><h4><strong>Quiz⁉🙋🏼‍♂️</strong></h4><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.pollsify.com%2Fc%2F3dgMpL&amp;dntp=1&amp;display_name=Pollsify&amp;url=https%3A%2F%2Fwww.pollsify.com%2Fc%2F3dgMpL&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=pollsify" width="800" height="650" frameborder="0" scrolling="no"><a href="https://medium.com/media/ddded0b29289b4071ad97b40aceb1c47/href">https://medium.com/media/ddded0b29289b4071ad97b40aceb1c47/href</a></iframe><figure><img alt="" src="https://cdn-images-1.medium.com/max/470/1*StL4TxtTW1ENIaQrgeqEtg.jpeg" /><figcaption><strong>Preemption</strong></figcaption></figure><p><strong>Preemption</strong> is the act of temporarily interrupting a <a href="https://en.wikipedia.org/wiki/Task_(computing)">task</a> being carried out by a <a href="https://en.wikipedia.org/wiki/Computer">computer system</a>, without requiring its cooperation, and with the intention of resuming the task at a later time. Such changes of the executed task are known as <a href="https://en.wikipedia.org/wiki/Context_switch">context switches</a>. It is normally carried out by a <a href="https://en.wikipedia.org/wiki/Protection_ring">privileged</a> task or part of the system known as a preemptive <a href="https://en.wikipedia.org/wiki/Scheduling_(computing)">scheduler</a>, which has the power to <strong>preempt</strong> or interrupt and later resume, other tasks in the system.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*Rg6zY2IPW-Qkvfkmo_PUJg.png" /></figure><p>So basically a dataset is divided into 3 parts:</p><ol><li>Training Data: The data that learn value from parameter.</li><li>Validation data: To calculate Model Performance</li><li>Test Data: Used to verify that a given set of input to a given function produces some expected result</li></ol><p>Now coming to <strong>Azure the place where all the machine learning problems will be dealt with known as Workspace.</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/670/1*NtUF6u3p7ZfHLfZRxXKxcg.png" /></figure><blockquote>The <strong>workspace</strong> is a container for working with the components of machine learning.</blockquote><blockquote><strong>Container</strong> that works with components of machine learning to organize the machine learning process.</blockquote><blockquote>Services that provide snapshot and versioning of trained models known as the <strong>model registry.</strong></blockquote><blockquote>Cloud-based workstation to provide access to various development environments known as <strong>Compute Instance</strong>.</blockquote><p>The <strong>threshold </strong>value needs to be 0 or 0.5 to make the performance better.</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.pollsify.com%2Fc%2FEZQylZ&amp;dntp=1&amp;display_name=Pollsify&amp;url=https%3A%2F%2Fwww.pollsify.com%2Fc%2FEZQylZ&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=pollsify" width="800" height="486" frameborder="0" scrolling="no"><a href="https://medium.com/media/1c8a2bb5e3ca70be497f1a4bf75393f6/href">https://medium.com/media/1c8a2bb5e3ca70be497f1a4bf75393f6/href</a></iframe><p>🤔🤔🤔🤔</p><p><strong>Solution</strong>: Rather than training multiple models or using multiple models used ensemble learning or automated learning.</p><h3>Classification</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*NfWEjsKZ8TXhn7AwlT4xfQ.jpeg" /><figcaption>Single Vs multiple multiclass classifications</figcaption></figure><blockquote><strong>Multi-class Classification:</strong> A classification task with more than two classes.Multiclass classification makes the assumption that each sample is assigned to one and only one label.</blockquote><blockquote><strong>Multi-label classification: </strong>assigns to each sample a set of target labels. This can be thought as predicting properties of a data-point that are not mutually exclusive, such as topics that are relevant for a document. A text might be about any of religion, politics, finance or education at the same time or none of these.</blockquote><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.pollsify.com%2Fc%2F35By1d&amp;dntp=1&amp;display_name=Pollsify&amp;url=https%3A%2F%2Fwww.pollsify.com%2Fc%2F35By1d&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=pollsify" width="800" height="650" frameborder="0" scrolling="no"><a href="https://medium.com/media/d7864a98ea079baabac40d622a385ec3/href">https://medium.com/media/d7864a98ea079baabac40d622a385ec3/href</a></iframe><h3><strong>Modeling</strong></h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/963/1*LQ1JDpHSqlEPMg4HKHhjIw.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/972/1*kvOYUH-FyMb-kP42XW6CBQ.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/972/1*KIyBwxOKB4E3FnEobonefg.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/552/1*6RPgI3cVt9022oFYURDZfw.jpeg" /><figcaption>predictive modeling</figcaption></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/980/1*Yb5QDvf-rcP0JV2DIvSWBA.png" /></figure><h3>Scoring</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/640/1*uj-mmwz8cAmfFLUuGFaheA.png" /></figure><p><strong>Scoring model:</strong> Score against the test data. The output of train and test data.</p><blockquote>The <strong>performance metric</strong> used here: <strong>Boosting algorithm</strong> on training data.</blockquote><blockquote>→ Model accuracy drifts over time.</blockquote><blockquote>→ The model training process does not finish after 1st position context deleting data drift</blockquote><blockquote>→ Monitor data drift alerts.</blockquote><h3>Ensemble Learning</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*3oLeg5DCKKNzcfpx6s9ddQ.jpeg" /></figure><h3>🔡👉<strong>Boosting Algorithm :</strong></h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/908/1*Sdx23NpZtoBqZ86ldyLwww@2x.png" /></figure><blockquote>→ Uses a strong learner from the weak learner.</blockquote><blockquote>→ Same input data multiple training models.</blockquote><blockquote>→ Reduce bias</blockquote><blockquote>→ Improvement in performance</blockquote><figure><img alt="" src="https://cdn-images-1.medium.com/max/630/1*U3GJSsgPlPbl4cHpDGcnSA@2x.png" /><figcaption>-Bias, Variance and test error relationship</figcaption></figure><h3>🔡👉<strong>Bagging :</strong></h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/756/1*alEu0ArH61Hfz2k2wQHNnA.png" /></figure><blockquote>→ Reducing Overfitting</blockquote><blockquote>→ Random Sampling</blockquote><blockquote>→ Reduce Variance</blockquote><blockquote>→ Equally weighted average</blockquote><h3>🔡👉Stacking :</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/300/1*_UsRNz2MiK3sCZNkzxmx6Q.png" /></figure><blockquote>Combining ouput of machine learning to have higher output.</blockquote><h4>AutoML💪 :</h4><blockquote>Roadmap</blockquote><blockquote>→ Input criteria →Score each algorithm pipeline→Parameters(Performance)</blockquote><figure><img alt="" src="https://cdn-images-1.medium.com/max/350/1*XsoQ56mnNbIWIuAgKlCNvA.png" /></figure><blockquote><strong>Input: </strong>Common aspects between entities and columns presence/absence to produce the results in unsupervised learning</blockquote><blockquote>Parameters: Inherit Data, Grouping Associates, Principal Component Analysis, clustering, feature extraction, anomly detection etc.</blockquote><h3>Clustering :</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*qw7lpCbl0xJkYrTdyw3lhw.png" /></figure><p><strong>Applications of Clustering Algorithm :</strong></p><p>Personalization and target marketing.</p><p>Document Classification</p><p>Fraud detection, House type prediction, Medical Image.</p><h3>Types:</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/327/1*Qc_71cBpDzk9mYTDV_zSvA.png" /><figcaption>Difference between Hierarchical and cluster-based</figcaption></figure><p>👉<strong>Centroid-Based: </strong>Organizes data into clusters based on the data structure.</p><p>👉<strong>Hierarchical-Based: </strong>Clusters<strong> </strong>distributed in trees form.</p><p>👉👉</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/960/1*K6zjkppruDACTrKxR5QbBQ.jpeg" /><figcaption>Distribution and density-based clustering</figcaption></figure><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.pollsify.com%2Fc%2Fp5Eyw5&amp;dntp=1&amp;display_name=Pollsify&amp;url=https%3A%2F%2Fwww.pollsify.com%2Fc%2Fp5Eyw5&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=pollsify" width="800" height="650" frameborder="0" scrolling="no"><a href="https://medium.com/media/aa601cf052d9cc18cd968f2c3cbe0dda/href">https://medium.com/media/aa601cf052d9cc18cd968f2c3cbe0dda/href</a></iframe><h3>K-Means Clustering</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*dcjRN6IM4W49-gYk82z0yg.png" /></figure><p>→ Creates up two-target.</p><p>→ Minimize the initial problem statement.</p><p>→ Centroid type of clustering.</p><p>→ It comes under the unsupervised machine learning model.</p><h3>Roadmap🗺</h3><p><strong>Initialize Centroid → Cluster Management → Move Centroids → Check for Convergence.</strong></p><h4>Points to keep in mind :</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/602/1*2jCdhSykRIxmzdo9S-JBxw.png" /></figure><blockquote>Number of centroids</blockquote><blockquote>Initialization approach</blockquote><blockquote>Distance-metric Euclidean</blockquote><blockquote>Normalize features</blockquote><blockquote>Assign label node</blockquote><blockquote>Iteration</blockquote><figure><img alt="" src="https://cdn-images-1.medium.com/max/306/1*JPi47oHgQrZpUeedPC61DQ.png" /><figcaption>Relationship between NN, DL, ML, and AI</figcaption></figure><h3>Autoencoders</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/787/1*C6Z6i1_2EJn13jVEsAOkRQ@2x.png" /><figcaption>Train to reproduce inputs</figcaption></figure><p>Due to lack of resources no. of nodes are limited. Value is the labels in which autoencoders produce output.</p><p>It is a multi-layer presentation</p><p>Produces feature vector.</p><p>The parameter to train the autoencoder is the root mean squared error. Therefore in layman, the highest possible value of metric to determine possibility is the threshold.</p><p>📝<strong>Sometimes we use deep-learning encoders instead of one-hot encoding.</strong></p><h3>Specialized case of machine learning</h3><p>👉<strong>Specialized case | Approach</strong></p><blockquote>Similarity Learning | Supervised</blockquote><blockquote>Test Classification | Supervised(Classification)</blockquote><blockquote>Feature Learning | Supervised (Classification), Unsupervised(Clustering)</blockquote><blockquote>Anomaly Detection | Supervised(Classification), Unsupervised(Clustering)</blockquote><blockquote>Forecasting(time-series) future-prediction | Supervised</blockquote><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.pollsify.com%2Fc%2FgZ2reZ&amp;dntp=1&amp;display_name=Pollsify&amp;url=https%3A%2F%2Fwww.pollsify.com%2Fc%2FgZ2reZ&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=pollsify" width="800" height="453" frameborder="0" scrolling="no"><a href="https://medium.com/media/3e208860a9e3279ed56653620c401a55/href">https://medium.com/media/3e208860a9e3279ed56653620c401a55/href</a></iframe><h3>Similarity Learning</h3><p><strong>Recommendation System: It means recommend something to the user according to his/her preferences.</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/850/1*pwTJcwxuRIH_l5JRHRoQlA.png" /></figure><blockquote><strong>1</strong>. <strong>Content-Based</strong>: Used features of both users and items.</blockquote><blockquote><strong>2. Collaborative-Based Filtering</strong>: Only identifies for users and items specifically not their properties.<strong><em>Subdivision</em></strong>: Get information on rating. <strong>Implicit</strong>: History of purchases, <strong>Explicit </strong>: Giving rating status like 4/5.</blockquote><h4><strong>Code for reference :</strong></h4><p><a href="https://colab.research.google.com/drive/1dg4SD0wygFVQ0BmRndmtQx8Ga2BaeH8B">Google Colaboratory</a></p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2F2TRCPR4cy8o%3Ffeature%3Doembed&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D2TRCPR4cy8o&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2F2TRCPR4cy8o%2Fhqdefault.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/15e8d1e78370d8540cd48feadd82f37a/href">https://medium.com/media/15e8d1e78370d8540cd48feadd82f37a/href</a></iframe><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.pollsify.com%2Fc%2FV5oAMZ&amp;dntp=1&amp;display_name=Pollsify&amp;url=https%3A%2F%2Fwww.pollsify.com%2Fc%2FV5oAMZ&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=pollsify" width="800" height="520" frameborder="0" scrolling="no"><a href="https://medium.com/media/574b2b30c9a51126227d8548f1b5ea3c/href">https://medium.com/media/574b2b30c9a51126227d8548f1b5ea3c/href</a></iframe><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.pollsify.com%2Fc%2FAZDy3d&amp;dntp=1&amp;display_name=Pollsify&amp;url=https%3A%2F%2Fwww.pollsify.com%2Fc%2FAZDy3d&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=pollsify" width="800" height="486" frameborder="0" scrolling="no"><a href="https://medium.com/media/e04ca4cf5a0be8b6790bbcde12fd6024/href">https://medium.com/media/e04ca4cf5a0be8b6790bbcde12fd6024/href</a></iframe><h4>Forecasting :</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*LkbrbyxFAKlrawdTjfZVsw.png" /></figure><p>The time series dataset considers under this method. It deals with the prediction in the context of the ordered dataset. It is a form of the multivariate regression.</p><p><strong>Algorithm</strong>: ARIMA</p><p><strong>Prophet</strong>: For e.g if the disease will not likely to occur but it occurs in the other scenarios.</p><h3><strong>Deployment</strong></h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/976/1*DfXal6NgkljDqt22UDIqzg.png" /></figure><ol><li><strong>Creating Clusters</strong></li><li><strong>Inferencing Clustering</strong></li><li><strong>Compute Instance</strong>: Modelling process and how they interact when used together.</li></ol><h3><strong>Operationality Models</strong></h3><p>Automation via end-to-end pipelines through training models of compute instance. Azure Machine Learning Training Clusters are used for multi-nodes.</p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.pollsify.com%2Fc%2F85m4Rd&amp;dntp=1&amp;display_name=Pollsify&amp;url=https%3A%2F%2Fwww.pollsify.com%2Fc%2F85m4Rd&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=pollsify" width="800" height="750" frameborder="0" scrolling="no"><a href="https://medium.com/media/e901b9ad22eb5d1126e918f708a3bd2a/href">https://medium.com/media/e901b9ad22eb5d1126e918f708a3bd2a/href</a></iframe><h4><strong>Training Clusters :</strong></h4><blockquote><strong>Multimode clusters : </strong>For training and batch clusters (influencing process). Can autoscale when submitting , support GPU and TPU. Resources are required in batch-scoring.</blockquote><blockquote>For machine learning python code.</blockquote><h4>Methods:</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/966/1*QXdi3m11Q5LCwAWNZNzA5g.png" /></figure><blockquote>1. <strong>Real-time inferencing /influence clusters : </strong>Model<strong> </strong>training process may be compute-intensive with training time sthat can span across many hours , days or even weeks.A trained model is used to amke decisions on new data. The entities about new data is given ased on training. Making new decisions on new dat on- demand known as <strong>local inferencing</strong>.</blockquote><blockquote>2.<strong> Batch Inferencing : </strong>Making predictions on large existing data.Recurring on the datastore . Dat to be used assigned at the start. It’ s advantage is high throughotput and scalable targets.</blockquote><blockquote>3. Compute Target, Azure Kubernetes Service, Azure ML cluster</blockquote><h4>Trained model packaged in containers :</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*oGPzfS5MQ9bp84gZC0dHyw.png" /><figcaption>model-deployment to AKS</figcaption></figure><p>🙄🤔…</p><p>👉We know that <strong>Model = Algorithm+data+Hyperparametres</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/576/1*5KwhR6i7TfqALo0OIPIgbA.png" /><figcaption>Custom Vision Architecture</figcaption></figure><h4><strong>Deploying a training Model</strong></h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/591/1*f0jBeWQotNcxSK2XI0pXkA.png" /><figcaption>Deploying a credit risk model</figcaption></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/272/1*nzVp2P5oLXkIzadTkAO8GA.png" /></figure><blockquote>👉Get the model file.</blockquote><blockquote>👉Create the scoring script</blockquote><blockquote>👉Optionally create a schema file describing the web service</blockquote><blockquote>👉Create a real-time scoring web service</blockquote><blockquote>👉Call the web service from your application</blockquote><blockquote>👉Repeat the process from the training module.</blockquote><h3>Advantages of deploying on Azure</h3><ol><li>Fast Response Time</li><li>Autoscaling</li><li>FPGA’s</li><li>Azure Python SDK</li><li>Azure ML environment.</li></ol><h4>🙋‍♀️⁉QUIZ</h4><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.pollsify.com%2Fc%2FrLy3Pd&amp;dntp=1&amp;display_name=Pollsify&amp;url=https%3A%2F%2Fwww.pollsify.com%2Fc%2FrLy3Pd&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=pollsify" width="800" height="850" frameborder="0" scrolling="no"><a href="https://medium.com/media/caae1c316babb995c722d6639cd5516e/href">https://medium.com/media/caae1c316babb995c722d6639cd5516e/href</a></iframe><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.pollsify.com%2Fc%2FRZekP5&amp;dntp=1&amp;display_name=Pollsify&amp;url=https%3A%2F%2Fwww.pollsify.com%2Fc%2FRZekP5&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=pollsify" width="800" height="750" frameborder="0" scrolling="no"><a href="https://medium.com/media/f2b8f9bc39cf2b8e525802c90d7fc753/href">https://medium.com/media/f2b8f9bc39cf2b8e525802c90d7fc753/href</a></iframe><p>I swear that’s the end part😅….</p><h3>Responsible AI</h3><p><strong>Modern AI</strong>: It tells us about the application</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/374/1*LIyE2Kd0g1XdqxEQAUq2Jw.png" /></figure><h4><strong>Some examples and use-cases</strong></h4><blockquote><strong>Increasing Inequality</strong>: Features of medical dataset bias against the poor.</blockquote><blockquote><strong>Web optimization</strong>: Physical attacks by email.</blockquote><blockquote><strong>Unwanted Bias</strong>: Women are considered a weak gender in comparison to men.</blockquote><blockquote><strong>Adversarial Attack</strong>: Cars self-driving signs.</blockquote><blockquote><strong>Killer Drone:</strong> Harmful to humans.</blockquote><blockquote><strong>Deep fake</strong>: Harmful to data.</blockquote><blockquote><strong>Data Poisoning</strong>: Manipulating data of training</blockquote><h3>Approaches</h3><p><strong>Direct Explainer</strong>: Use a specific explainer for a specific model explanation.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*k0rIQvQvNGHxThNfJ6w50w.png" /></figure><blockquote>→SHAP Tree: Tree explainer.</blockquote><blockquote>→ Shap deep tree to explain deep.</blockquote><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*wDx8GrGoX43lzhpZDW_Wbw.png" /></figure><p><strong>Meta Explainer</strong>: Tabular Explainer, Image Explainer, Text explainer. Explain use to create local and global visualization productions.</p><p><strong>Fault Approach</strong>: State-of-art approach created by Microsoft. Analyses can be seen through the dashboard.</p><h3>The end :</h3><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.pollsify.com%2Fc%2F45bKDL&amp;dntp=1&amp;display_name=Pollsify&amp;url=https%3A%2F%2Fwww.pollsify.com%2Fc%2F45bKDL&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=pollsify" width="800" height="450" frameborder="0" scrolling="no"><a href="https://medium.com/media/a258153ecd3a437071085c4a937cd351/href">https://medium.com/media/a258153ecd3a437071085c4a937cd351/href</a></iframe><p>Feel free to shoot any queries:</p><p><a href="https://www.linkedin.com/in/preeti-sharma-155a85181/">https://www.linkedin.com/in/preeti-sharma-155a85181/</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=8486ab4edcb1" width="1" height="1" alt=""><hr><p><a href="https://medium.com/simply-dev/azure-machine-learning-foundation-8486ab4edcb1">Azure Machine Learning Foundation</a> was originally published in <a href="https://medium.com/simply-dev">Simply Dev</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[sudo apt install Remote Work 101]]></title>
            <link>https://medium.com/simply-dev/sudo-apt-install-remote-work-101-1439930db1d6?source=rss----3fd093b1f0fc---4</link>
            <guid isPermaLink="false">https://medium.com/p/1439930db1d6</guid>
            <category><![CDATA[remote-working]]></category>
            <category><![CDATA[open-source]]></category>
            <category><![CDATA[covid19]]></category>
            <category><![CDATA[resources]]></category>
            <category><![CDATA[trends]]></category>
            <dc:creator><![CDATA[Champion Runner]]></dc:creator>
            <pubDate>Sun, 21 Jun 2020 16:41:18 GMT</pubDate>
            <atom:updated>2020-06-21T13:54:25.231Z</atom:updated>
            <content:encoded><![CDATA[<p>This article is all about the experiences I have got during this pandemic period and it tells everything about remote work and how times have changed and it’s a new “<strong>Era</strong>”.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/863/1*BgaEF1NQpV4IP-OQ9vHYOA.jpeg" /></figure><p>Being a Software Developer I realized this during my undergrad that education today is all available online and the one who can access “<strong>Data</strong>” in a more simplified and smart form is the ultimate winner. All you need is the required “<strong>Skillset</strong>” which is a never-ending process and you need to keep learning. But one thing this Pandemic has made us realize is that time will pass by no matter what the situation is starting from the term “<strong>Lockdown</strong>” which I heard for the first time in my life during early <strong>March of 2020</strong> and life has changed since then to the date when <strong>George Floyd </strong>died and things got messed up in the USA. Many famous filmstars died during these past 2–3 months and a huge human species have been affected by this virus. Giving time to family and friends which was not a part of our schedule or priorities post COVID19 has become an important part of our daily routines now.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/800/1*Gftka0gOMQbsrVS0mAXvkg.jpeg" /></figure><p>Ample amount of resources and information is being provided through internet by different organizations for “Millions” of students and “Billions” of employees sitting at home to upskill themselves in order to handle the situation being created due to COVID19 and upgarde or switch there fields with ease .</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/637/1*fxczCxwOSly-19t5BjB4Mg.png" /><figcaption>GitHub CEO</figcaption></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*LvjgZeO_1r_3uP27DHH4Mg.png" /><figcaption>Twitter</figcaption></figure><p>People have started investing in their <strong>Home Offices </strong>but most of them are just looking at the fancy side and ordering the stuff online. If you really want a remote home office setup you can have one in the least budget and low prices depending on your use case.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/800/1*J0yrdzhNK8b1M3z2x-QEcw.jpeg" /></figure><p>Growth in Social Media engagements has increased over the months because of the large amount of data being shared and news due to situations going on all over the world . Share market has been affected alot in every field.But this period has also made us more aware about our crutial times and environment in some ways.</p><p>There has been a shift in the <strong>Open Source</strong> culture starting from the Remote Online Conferences and introduction to a large number of Packages and Libraries and <strong>Research</strong> domains because of low funding many of the research students and projects have got affected. A large number of employees and developers have lost their jobs. Many of them shifted their careers towards Freelancing and permanent remote roles.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/311/1*ZBKXddCl8kTI5YBgsvOMuw.jpeg" /><figcaption><a href="https://hey.com/">https://hey.com/</a></figcaption></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/320/1*8g4E5b4e1YjtoplpJFSlJQ.png" /><figcaption><a href="https://virus.cafe/">https://virus.cafe/</a></figcaption></figure><p>Many organizations have started investing in Online Virtual platforms and products and there have been an important part of this new <strong>Remote</strong> <strong>culture</strong> of the new “<strong>Era</strong>” , creating an ease and large amount of information and engagements possible now whcih were a bit difficult or required investments to make them in person when things were cool.</p><p>We all have got this and no matter happends next be strong and stay safe.</p><p>Some useful resources.</p><p><a href="https://lab.github.com/">lab.github.com</a></p><p><a href="https://blog.unacademy.com/20-000-free-live-classes-stepping-up-in-the-face-of-the-covid-19-threat-7c05dc880403">blog.unacademy.com</a></p><p><a href="https://www.guvi.in/courses">www.guvi.in</a></p><p><a href="https://unity.com/products/learn-premium">unity.com</a> Premium Courses</p><p><a href="https://blog.coursera.org/coursera-together-free-online-learning-during-covid-19/">blog.coursera.org</a></p><iframe src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FF8_ME4VwTiw%3Ffeature%3Doembed&amp;display_name=YouTube&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DF8_ME4VwTiw&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FF8_ME4VwTiw%2Fhqdefault.jpg&amp;key=a19fcc184b9711e1b4764040d3dc5c07&amp;type=text%2Fhtml&amp;schema=youtube" width="854" height="480" frameborder="0" scrolling="no"><a href="https://medium.com/media/8742e840f0cba8ea08ee41a8aba65fe9/href">https://medium.com/media/8742e840f0cba8ea08ee41a8aba65fe9/href</a></iframe><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=1439930db1d6" width="1" height="1" alt=""><hr><p><a href="https://medium.com/simply-dev/sudo-apt-install-remote-work-101-1439930db1d6">sudo apt install Remote Work 101</a> was originally published in <a href="https://medium.com/simply-dev">Simply Dev</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Do more with rails console by configuring ~/.irbrc ]]></title>
            <link>https://medium.com/simply-dev/do-more-with-rails-console-by-configuring-irbrc-e5c25284305d?source=rss----3fd093b1f0fc---4</link>
            <guid isPermaLink="false">https://medium.com/p/e5c25284305d</guid>
            <category><![CDATA[productivity]]></category>
            <category><![CDATA[ruby-on-rails]]></category>
            <category><![CDATA[ruby]]></category>
            <dc:creator><![CDATA[Rishi Pithadiya]]></dc:creator>
            <pubDate>Sun, 21 Jun 2020 09:24:25 GMT</pubDate>
            <atom:updated>2021-05-15T16:30:19.544Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*YHw2d81w98pfxntQ_b4U8w.png" /></figure><blockquote>It´s better to wait for a productive programmer to become available than it is to wait for the first available programmer to become productive. — <a href="http://stevemcconnell.com/">Steve McConnell</a></blockquote><h4><strong>What is ~/.irbrc file? 🔖</strong></h4><ul><li>After work with multiple Rails apps, you might have some methods and preferred ways of working with them.</li><li>i.e. you&#39;re using few generalized methods or configuration your IRB session(rails console) in a single project and want to have the same methods &amp; configuration on other projects you’re working on, you can add those methods &amp; configuration in your <em>~/.irbrc</em> file.</li><li>You can create <em>~/.irbrc</em> file in your root directory if it’s not present.</li></ul><h4>Things you can include in your <em>~/.irbrc</em> file 🗄</h4><ul><li>Configurations which need to be used in all Rails Apps</li><li>Methods which need to be used in all Rails Apps</li><li>Require/load specific file(s) or Gem(s)</li><li>Hacky convenience methods that help you play with your objects</li></ul><h4>My .irbrc file 🧮</h4><iframe src="" width="0" height="0" frameborder="0" scrolling="no"><a href="https://medium.com/media/31a5c1e152bd0bb6fdb82081712017fd/href">https://medium.com/media/31a5c1e152bd0bb6fdb82081712017fd/href</a></iframe><h4>How to search awesome .irbrc file created by other devs 📭</h4><p>Just click on the following URL and it’ll list all <em>~/.irbrc</em> files created by other GitHub developers, you can create your file and add everything you need if you find anything useful -</p><ul><li><a href="https://gist.github.com/search?l=Ruby&amp;q=irbrc">https://gist.github.com/search?l=Ruby&amp;q=irbrc</a></li></ul><h4>References 📌</h4><ul><li><a href="https://docs.ruby-lang.org/en/2.2.0/IRB.html">https://docs.ruby-lang.org/en/2.2.0/IRB.html</a></li><li><a href="https://www.justinweiss.com/articles/fast-consistent-setup-for-your-ruby-and-rails-projects/">https://www.justinweiss.com/articles/fast-consistent-setup-for-your-ruby-and-rails-projects/</a></li><li><a href="https://github.com/kpumuk/dotfiles/blob/master/irbrc">https://github.com/kpumuk/dotfiles/blob/master/irbrc</a></li></ul><h3>Found this post useful? please click the 👏 button and share it to help others find it! Feel free to leave a comment below.</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/600/1*5yFkMc7nKMZsj_PZpbfw6w.gif" /></figure><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=e5c25284305d" width="1" height="1" alt=""><hr><p><a href="https://medium.com/simply-dev/do-more-with-rails-console-by-configuring-irbrc-e5c25284305d">Do more with rails console by configuring ~/.irbrc 🎉</a> was originally published in <a href="https://medium.com/simply-dev">Simply Dev</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Pytorch: Tensor-operations]]></title>
            <link>https://medium.com/simply-dev/pytorch-tensor-operations-210ad241f4f0?source=rss----3fd093b1f0fc---4</link>
            <guid isPermaLink="false">https://medium.com/p/210ad241f4f0</guid>
            <dc:creator><![CDATA[Preeti Sharma]]></dc:creator>
            <pubDate>Fri, 05 Jun 2020 08:34:59 GMT</pubDate>
            <atom:updated>2020-06-04T08:12:28.610Z</atom:updated>
            <content:encoded><![CDATA[<blockquote>What’s <strong>Pytorch</strong></blockquote><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*oLcN6Vlpa-PrxnRYJGnXDQ.png" /></figure><blockquote>PyTorch is an open-source machine learning library based on the Torch library, used for applications such as computer vision and natural language processing, primarily developed by Facebook’s AI Research lab. It is free and open-source software released under the Modified BSD license.</blockquote><p>Since Pytorch is an opensource machine learning library it contains various other libraries as sub-domain. So, for the ease of learning, we are using here tensors.</p><blockquote>A PyTorch Tensor is fundamentally equivalent to a numpy cluster: it knows nothing about profound learning or computational charts or angles, and is only a conventional n-dimensional exhibit to be utilized for subjective numeric calculation.</blockquote><p>The greatest contrast between a NumPy array and a PyTorch Tensor is that a PyTorch Tensor can run on either CPU or GPU. To run the procedure on the GPU, simply cast the Tensor to a Cuda datatype.</p><p>Tensor contains some operations and functionalities which make it easier for us to understand the computations happening in the array. But firstly</p><h3>How tensor is different from other data types of n-dimensions??</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/800/1*V83L4ydCdk21tXjP22VjXQ.jpeg" /></figure><blockquote>Here we are using pytorch library with torch.tensor() functionalities such that it will help to take all the inputs vectors, matrices, 3d-arrays, numpy arrays. And help to apply mathematics on it and convert it in tensor form .</blockquote><figure><img alt="" src="https://cdn-images-1.medium.com/max/891/1*kcTPIyRkFD7uTKsGulHS3A.png" /></figure><h3>Functions we can incorporate in torch.tensor() matrix.</h3><p>An short introduction about PyTorch and about the chosen functions.</p><ul><li>function 1 : math functions like torch.rand(), torch.abs_() and torch.allclose</li><li>function 2 : torch.as_strided (layout functions)</li><li>function 3 : In these the functions deals with the individual elements instead of clusters.</li><li>function 4 : It deals with subtensors such as storage_offset() function.</li><li>function 5 : symeifg(eigenvalue functions)</li></ul><blockquote>Function 1 — Some of the math functions we used here to play with the tensor inputs.</blockquote><blockquote>1. tensor = torch.rand ((no.of rows, no. of columns)),</blockquote><blockquote>2. torch.abs_(input, alpha=1)</blockquote><blockquote>3. torch.allclose(input, other, rtol=1e-05, atol=1e-08, equal_nan=False)</blockquote><blockquote>First import all the libraries required .</blockquote><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*g3UbQ2nT150j6Hfjpd714g.png" /></figure><h4>Example 1:</h4><p><a href="https://colab.research.google.com/drive/1a5skL8J6hTYxdFOqVTrDhhwx8TeuPPoA#scrollTo=qEfa9qHsu1VD&amp;line=3&amp;uniqifier=1">Google Colaboratory</a></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*xQMDnN96T2coUed0QHiwlg.png" /></figure><blockquote>First here we are using rand() to have random items in the corresponding dimensions and store it in tensor . Then creating a new tensor by function new_tensor() making gradiend_descent value as false. And we are multiplying it with tensor such that current new tensor z will take dimension of previous tensor. We can check the length of tensor z with .shape method. And can also do permutation on indices with .permute.</blockquote><h3>Example2</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*rFfU8-rgUaTn8O-jWInA_w.png" /></figure><blockquote>Here we are using abs_() function to convert all the tensor value positive , then here we are using .add_ to add input number to each item of tensor with alpha value to be 1.</blockquote><h3>Example3 :</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*kBPg6lK2zWOJr_Zl7YG9pg.png" /></figure><blockquote>In allclose function all of this represents: input (Tensor) — first tensor to compare</blockquote><blockquote>other (Tensor) — second tensor to compare</blockquote><blockquote>atol (float, optional) — absolute tolerance. Default: 1e-08</blockquote><blockquote>rtol (float, optional) — relative tolerance. Default: 1e-05</blockquote><blockquote>equal_nan (bool, optional) — if True, then two NaN s will be considered equal. Default: False</blockquote><blockquote>argsort function is used to output all the elements in tensors in sorted order. And converting the output to asin_ will provides support for the inverse sine function in PyTorch. It expects the input to be in the range [-1, 1] and gives the output in radian form. It returns nan if the input does not lie in the range [-1, 1]. The input type is tensor and if the input contains more than one element, element-wise inverse sine is computed.</blockquote><p>Ok, we understand this much we want to understand it visually for better understanding.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/507/1*1W0KSjEFD_TqZA05_66CwQ.png" /></figure><h4>Moving on to Next Function</h4><h3>Function 2–1.torch.as_strided , 2.torch.bincount, 3 . torch.diag_embed</h3><ol><li>In torch.as_strided function it will Create a view of an existing torch.Tensor input with specified size, stride and storage_offset.</li><li>In bin count function each tensor value has some weight associated with it such that input will contain the range of tensor and weight means how far the tensor will be that’s why the last element is the dimension associated with weights as a tensor input.</li><li>In diag_embed in the tensor, the inputs will be added along the diagonal only.</li></ol><figure><img alt="" src="https://cdn-images-1.medium.com/max/272/1*finDHg6vlRXlkZoEhcCaTw.jpeg" /><figcaption>Embedding of layers across the elements</figcaption></figure><h4>Example1</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*l4vakzOLwWH0cJaYP8p8qw.png" /></figure><blockquote>Here bernoulli_() function will Fill each location of self with an independent sample from Bernoulli(p). self can have an integral data type.</blockquote><figure><img alt="" src="https://cdn-images-1.medium.com/max/850/1*Xtmbe7_QHYa1FS_CWCgH2A.png" /><figcaption>Sample of randomly generated tensors from Bernoulli</figcaption></figure><h4>Example2</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/1001/1*bZRqkKty-Tmr2-i9h4CioQ.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/578/1*OoIviwrwftzvK5rfZeyIKQ.jpeg" /><figcaption>The multi-aspect streaming tensor analysis will encapsulate bin count reference</figcaption></figure><blockquote>Here the function bincount() take two tensors one would be the input which is a tensor tells the range of input values and weights which tells how much max value of the tensor and minlength tells that only 1-d tensor input is to be taken.</blockquote><h4>Example3</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*k1xJo4SjTzJjjSjj9bOicA.png" /></figure><blockquote>Makes a tensor whose diagonals of certain 2D planes (determined by dim1 and dim2) are filled by input. To encourage making bunched corner to corner frameworks, the 2D planes shaped by the last two components of the returned tensor are picked as a matter of course.</blockquote><blockquote>The contention offset controls which diagonal to consider:</blockquote><blockquote>Whenever offset = 0, it is the principle diagonal.</blockquote><blockquote>Whenever offset &gt; 0, it is over the principle diagonal.</blockquote><blockquote>Whenever offset &lt; 0, it is beneath the principle corner to corner.</blockquote><blockquote>The size of the new grid will be determined to make the predetermined diagonal of the size of the last information measurement. Note that for balance other than 00 , the request for dim1 and dim2 matters. Taking them is identical to changing the indication of offset.</blockquote><h3>Function 3–1. torch.erfinv, 2. torch.spilt() 3. torch.sparse_mask</h3><blockquote>Erfinv will deal with inverse error function of input element. As the name suggest .split function will split the function into chunks and then apply its functionality on them. sparse_mask take input value and convert it along with the mask input into list.</blockquote><figure><img alt="" src="https://cdn-images-1.medium.com/max/522/1*1CE-wqERX523O37j6Q8wnw.png" /><figcaption>Each input associated with weights</figcaption></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*zkz8BBGWL2Kqn9Ov5Gu00A.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*kMywaHIKn22Dl4R73tTb0g.jpeg" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*4RPkx9_66v_gnF1raai1iQ.png" /></figure><blockquote>Returns another SparseTensor with values from Tensor info iltered by indices of mask and values are ignored. input and mask must have the same shape.</blockquote><blockquote>Parameters</blockquote><blockquote>input (Tensor) — an info Tensor</blockquote><blockquote>cover (SparseTensor) — a SparseTensor which we channel input dependent on its lists</blockquote><figure><img alt="" src="https://cdn-images-1.medium.com/max/230/1*WGZOrXzcJQ1XJJ8CzCO3VA.png" /></figure><h3>Function 4 -</h3><ol><li>storage_offset() : It deals with the subtensors.</li><li>stride: It deals with the dimensions present as arguments.</li><li>sum: It will sum up the elements in the matrix.</li></ol><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*RkNDLGT4twr-70sL1UQGFw.png" /><figcaption>The whole process of PyTorch dealing with subtensors</figcaption></figure><h3>Example1</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*oSeyH3viaN0kGN19moIQow.png" /></figure><h3>Example2</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*APCYRIHgFUcoACdRUb7PdQ.png" /></figure><h3>Example3</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*vUtSCGxNizvl_u5zK4Gq7g.png" /></figure><h3>Function 5 — Here we are using functions taking eigenvalue and eigenvectors</h3><p>Basically here the concept of an upper triangular matrix is applied on the vector.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*mTZnjYHXLrtuBf3kjglPog.png" /></figure><p>Thank you</p><h3>References:</h3><p>Google</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=210ad241f4f0" width="1" height="1" alt=""><hr><p><a href="https://medium.com/simply-dev/pytorch-tensor-operations-210ad241f4f0">Pytorch: Tensor-operations</a> was originally published in <a href="https://medium.com/simply-dev">Simply Dev</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Detecting Geometrical Shapes in an image using OpenCV]]></title>
            <link>https://medium.com/simply-dev/detecting-geometrical-shapes-in-an-image-using-opencv-bad67c40174f?source=rss----3fd093b1f0fc---4</link>
            <guid isPermaLink="false">https://medium.com/p/bad67c40174f</guid>
            <category><![CDATA[python]]></category>
            <category><![CDATA[opencv-python]]></category>
            <category><![CDATA[image-processing]]></category>
            <category><![CDATA[shape-detection]]></category>
            <category><![CDATA[programming]]></category>
            <dc:creator><![CDATA[Simarpreet Singh]]></dc:creator>
            <pubDate>Sat, 23 May 2020 07:52:19 GMT</pubDate>
            <atom:updated>2020-06-21T08:52:55.886Z</atom:updated>
            <content:encoded><![CDATA[<p><a href="https://www.quora.com/How-do-I-detect-geometrical-shapes-in-an-image-using-OpenCV">How to detect geometrical shapes in an image using OpenCV?</a></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/604/1*DF7tlYcFvoRqpTARqVqn4g.jpeg" /></figure><p>Well I was just exploring OpenCV library of python in this quarantine , and going through that, I came across term <strong><em>Contour.</em></strong></p><blockquote><em>Contours can be explained simply as a curve joining all the continuous points (along the boundary), having the same color or intensity. The contours are a useful tool for shape analysis and object detection and recognition.</em></blockquote><p>And got to learn how we can use it to find geometrical shapes in an image.</p><p>Let’s start how it goes.</p><ul><li><strong><em>(</em></strong><a href="https://medium.com/p/bad67c40174f#9708"><strong><em>For Code , click here</em></strong></a><strong><em>)</em></strong></li></ul><p><strong>Approach :</strong> The approach we would use to detect the shape of a given polygon will be based on classifying the detected shape on the basis of a number of sides it has. For example, if the detected polynomial has 3 sides, then it could be considered as a triangle, if the polynomial has 4 sides then it could be classified as a square or a rectangle, and so on.</p><p>Let’s find how to do it</p><ol><li><strong>Importing libraries</strong></li></ol><pre>import numpy as np<br>import cv2 </pre><iframe src="" width="0" height="0" frameborder="0" scrolling="no"><a href="https://medium.com/media/28aec5337045acdef551c9787d12d2c8/href">https://medium.com/media/28aec5337045acdef551c9787d12d2c8/href</a></iframe><p><em>2. </em><strong><em>Import image and convert to grayscale image.</em></strong></p><p><strong><em>3. Applying thresholding on image and then finding contours.</em></strong></p><pre>img = cv2.imread(&#39;shapes.PNG&#39;)<br>imgGry = cv2.cvtColor(img, cv2.COLOR_BGR2GRAY)<br><br>_, thrash = cv2.threshold(imgGry, 240 , 255, cv2.CHAIN_APPROX_NONE)<br>contours , _ = cv2.findContours(thrash, cv2.RETR_TREE, cv2.CHAIN_APPROX_NONE)</pre><iframe src="" width="0" height="0" frameborder="0" scrolling="no"><a href="https://medium.com/media/491b0982829b7b7e1e3bb749f8575346/href">https://medium.com/media/491b0982829b7b7e1e3bb749f8575346/href</a></iframe><p><em>“ ret ” </em>collects a value, which according to OTSU<a href="https://www.quora.com/profile/Simar-Preet-Singh-8#hHxPp">[1]</a> method , is the best value for thresholding the image.</p><blockquote><em>Thresholding is a technique in </em><strong><em>OpenCV</em></strong><em>, which is the assignment of pixel values in relation to the </em><strong><em>threshold</em></strong><em> value provided. In thresholding, each pixel value is compared with the </em><strong><em>threshold</em></strong><em> value. If the pixel value is smaller than the </em><strong><em>threshold</em></strong><em>, it is set to 0, otherwise, it is set to a maximum value (generally 255).</em></blockquote><p>and for “<em> thrash </em>”: its the threshold value of image</p><blockquote><strong>What is threshold value of an image?</strong></blockquote><blockquote><strong><em>Threshold</em></strong><em> is some fixed </em><strong><em>value</em></strong><em> which draws a boundary line between two set of data. Binary (Bi-valued) </em><strong><em>Image</em></strong><em> means, only bi or two intensity </em><strong><em>values</em></strong><em> can be used to represent the whole </em><strong><em>image</em></strong><em>. </em><strong><em>In image</em></strong><em> processing generally, we say a </em><strong><em>image</em></strong><em> binary when, it consists only black and white pixels.</em></blockquote><p><em>Next:</em></p><p>While using <strong><em>cv2.findContour()</em></strong>, we are receiving contours and hierarchy. Actually we got three arrays, first is the image, second is our contours, and one more output which we named as <strong>hierarchy.</strong></p><p>Normally we use the <strong>cv2.findContours()</strong> function to detect objects in an image, right ? Sometimes objects are in different locations. But in some cases, some shapes are inside other shapes, just like nested figures. In this case, we call the outer one as <strong>parent</strong> and inner one as <strong>child</strong>. This way, contours in an image has some relationship to each other. And we can specify how one contour is connected to each other, like, is it a child of some other contour, or is it a parent, etc. Representation of this relationship is called the <strong>Hierarchy</strong>.</p><p><strong>Contours </strong>: <strong><em>Contours</em></strong> can be explained simply as a curve joining all the continuous points (along the boundary), having same color or intensity. The <strong>contours</strong> are a useful tool for shape analysis and object detection and recognition.</p><p><strong><em>4. Next step:</em></strong></p><ul><li>a)Start the loop in range of contours and iterate through it .</li><li>b)Printing the polynomial name according to no. of contours together by using <strong><em>approxPolyDPfunction()</em></strong>.</li></ul><iframe src="" width="0" height="0" frameborder="0" scrolling="no"><a href="https://medium.com/media/f8020e8483a2dac76cf65bda30f856f3/href">https://medium.com/media/f8020e8483a2dac76cf65bda30f856f3/href</a></iframe><p>Short overview of functions used in this block:</p><p><strong><em>approxPolyDP()</em> :</strong>This function calculates and approximates a polygonal curve with specified precision</p><blockquote><strong>approxPolyDP()</strong> approximates a contour shape to another shape with less number of vertices depending upon the precision we specify. It is an implementation of <a href="http://en.wikipedia.org/wiki/Ramer-Douglas-Peucker_algorithm">Douglas-Peucker algorithm</a>. Check the wikipedia page for algorithm and demonstration.</blockquote><p>example of how approxpolyDp() works.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/607/0*mkGxCvPJZLv2U3fk.jpg" /></figure><p><strong>drawContours(): </strong>Draws the contours outlines or filled color .</p><blockquote>To draw the contours, cv2.drawContours function is used. It can also be used to draw any shape provided you have its boundary points. Its first argument is source image, second argument is the contours which should be passed as a Python list, third argument is index of contours (useful when drawing individual contour. To draw all contours, pass -1) and remaining arguments are color, thickness etc.</blockquote><p><a href="https://opencv-python-tutroals.readthedocs.io/en/latest/py_tutorials/py_imgproc/py_contours/py_contours_begin/py_contours_begin.html"><strong>BoundingRect()</strong></a><strong> : </strong>It gives the boundary points of the rectangle.</p><p><strong>putText() : </strong>It puts the text over the image.</p><p>5. Show<strong><em> the image and close all windows</em></strong></p><iframe src="" width="0" height="0" frameborder="0" scrolling="no"><a href="https://medium.com/media/203f95f39a57d13fa492a3711f03c6ca/href">https://medium.com/media/203f95f39a57d13fa492a3711f03c6ca/href</a></iframe><p>and our Program runs successfully.</p><p>Image used :</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/361/0*-Z0nGGI02DVLUtfA" /></figure><p>Output of code:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/364/0*7nEs6DoTJqqeFYcD" /></figure><p><strong>Whole code available 👇:</strong></p><iframe src="" width="0" height="0" frameborder="0" scrolling="no"><a href="https://medium.com/media/e08d291ecf304350ce8ab1b4b5960f32/href">https://medium.com/media/e08d291ecf304350ce8ab1b4b5960f32/href</a></iframe><p>Github link to this repo <strong>👇</strong>:</p><p><a href="https://github.com/simarpreetsingh-019/openCV-Learning/blob/master/Mini%20projects/detecting_geometrical_shapes.py">simarpreetsingh-019/openCV-Learning</a></p><p>Thanks for reading! I hope you enjoyed the article and gained some additional insights. If you did, feel free to leave a clap! Constructive feedback is appreciated. Feel free to reach out to me <a href="https://www.linkedin.com/in/simarpreet-singh-22958517b">here</a> or simarpreetsingh.019@gmail.com</p><p>That’s all for this time , see you soon with another post.</p><p>Simarpreet Singh , signing off.</p><p>ਸਤਿ ਸ਼ੀ੍ ਅਕਾਲ 🙏</p><h3>References:</h3><ol><li><a href="https://opencv-python-tutroals.readthedocs.io/en/latest/py_tutorials/py_imgproc/py_contours/py_table_of_contents_contours/py_table_of_contents_contours.html">https://opencv-python-tutroals.readthedocs.io/en/latest/py_tutorials/py_imgproc/py_contours/py_table_of_contents_contours/py_table_of_contents_contours.html</a></li></ol><p>2. Wikipedia</p><p>#Python3 #Detecting_Shapes #ImageProcessing #OpenCV</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=bad67c40174f" width="1" height="1" alt=""><hr><p><a href="https://medium.com/simply-dev/detecting-geometrical-shapes-in-an-image-using-opencv-bad67c40174f">Detecting Geometrical Shapes in an image using OpenCV</a> was originally published in <a href="https://medium.com/simply-dev">Simply Dev</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[What is Canny Edge Detection?]]></title>
            <link>https://medium.com/simply-dev/what-is-canny-edge-detection-cfefa272a8d0?source=rss----3fd093b1f0fc---4</link>
            <guid isPermaLink="false">https://medium.com/p/cfefa272a8d0</guid>
            <category><![CDATA[python]]></category>
            <category><![CDATA[opencv]]></category>
            <category><![CDATA[canny-edge-detection]]></category>
            <category><![CDATA[image-processing]]></category>
            <dc:creator><![CDATA[Simarpreet Singh]]></dc:creator>
            <pubDate>Sat, 23 May 2020 07:51:37 GMT</pubDate>
            <atom:updated>2020-05-23T07:51:37.341Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/987/0*eZT8V5qNeSiXiXBn.png" /></figure><p>Hola people. While utilising this <em>quarantine</em> time, I am exploring a very famous python package and library : <strong>‘ OpenCV ’, </strong>a library for doing operations related to or on the images, and learning about various function this library contains. Canny Edge algorithm is one of it.</p><h3>Theory</h3><h4><strong>Canny Edge Detection</strong></h4><p>It is an edge detection operator that uses a multi-stage algorithm to detect a wide range of edges in images . It was developed by John F. Canny ,an Australian computer scientist, back in 1986.</p><blockquote><em>The </em><strong><em>Canny edge detector</em></strong><em> is an </em><a href="https://en.wikipedia.org/wiki/Edge_detection"><em>edge detection</em></a><em> operator that uses a multi-stage algorithm to detect a </em><strong><em>wide range of edges</em></strong><em> in images. It was developed by </em><a href="https://en.wikipedia.org/wiki/John_F._Canny"><em>John F. Canny</em></a><em> in 1986. Canny also produced a computational theory of edge detection explaining why the technique works. (</em><a href="https://en.wikipedia.org/wiki/Canny_edge_detector"><em>Wikipedia</em></a><em>)</em></blockquote><ul><li><em>The Canny edge detection algorithm is composed of 5 steps:</em></li></ul><ol><li><strong>Noise reduction</strong>;</li><li><strong>Gradient calculation;</strong></li><li><strong>Non-maximum suppression;</strong></li><li><strong>Double threshold;</strong></li><li><strong>Edge Tracking by Hysteresis.</strong></li></ol><p>lets us discuss the idea about how it works</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/640/1*kGb0q5qEHfW0MSklhOxE4A.jpeg" /></figure><h3>1). Input image</h3><p>We give the image to the method in RGB, before starting the main processing of methods; we need to have some pre-processing to prepare the given image to the methods. These will be explained in the next steps clearly.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/643/1*ybrw5KmwvLvzLjLCVFcYcA.jpeg" /></figure><h3>2). converting the image to grayscale</h3><p>In this step we convert the RGB image to grayscale, we can use the built-in function for passing this step.</p><h3>3). Smoothing the image</h3><p>Smoothing of image is the next step of the image for noise reduction;Gradient is the first order derivatives of image for each direction. It is cause of edges that seems more and the edges look thick. The gradient can be computed using central difference: it is preprocessing work to prepare the image for edge detection. we use the blur filtering of Gaussian to smoothing the image. Convolve the input image with Gaussian kernel(filter) in order to remove high-freq noises of the image.</p><h3>4). Image gradient</h3><p>Gradient is the function of the partial derivatives. I applied to the image convolution process with Sobel filters to obtain this partial derivative. The code for convolution has been written in the ‘convolution.m’. I have applied Sobel filters to convolution function in vertical and horizontal axes of image.</p><h3>5). non-maximum suppression</h3><p>This step is deciding whether a point is a local maximum of the interpolated gradient magnitude in the direction of the gradient or not, this step has a significant effect on the performance of edge. In this step the pixel is compared with its two neighbors of the pixel, if the compared pixel is larger than neighbor we do not change the pixel, otherwise, this pixel is not maximum value hence, we set the zero to that pixel.</p><h3>6). Tracking the edge by hysteresis</h3><p>In this step we choose two type of threshold, high and low threshold value. Afterward, each pixel of image is compared with two different threshold value. If the pixel is larger than the high threshold, this pixel mark with 255 in the final image. If the pixel between high threshold and low threshold. If the pixel is smaller than low-threshold image, mark as black with 0 (black) value in the resulting image.</p><h3>7). Final Results</h3><p>After passing all of the mentioned steps, we will give the final result from the method. after comparing the results with the built-in function of Matlab for edge detection, we can reach an agreement that this result is very similar to that function, all in all built-in function has higher performance due to choose the good threshold of the algorithm.</p><figure><img alt="this shows all the results of function we are using, from grayscale image, SobelX, SobelY, Sobel’s combination, Laplacian." src="https://cdn-images-1.medium.com/max/1024/1*Nnk9r-qIk7F3-PpLbDsYbA.jpeg" /></figure><p>These are all the results of functions we used and discussed above.</p><p>&lt;script src=”<a href="https://gist.github.com/simarpreetsingh-019/cc90a76bba7989c27a5b522607cc419a.js">https://gist.github.com/simarpreetsingh-019/cc90a76bba7989c27a5b522607cc419a.js</a>&quot;&gt;&lt;/script&gt;</p><iframe src="" width="0" height="0" frameborder="0" scrolling="no"><a href="https://medium.com/media/cdee8caf7fe5efe02dd828c261ce8687/href">https://medium.com/media/cdee8caf7fe5efe02dd828c261ce8687/href</a></iframe><p>link for above code :point_right:</p><p><a href="https://github.com/simarpreetsingh-019/CannyEdgedetection/blob/master/CannyEdgeDetection.py">simarpreetsingh-019/CannyEdgedetection</a></p><h4>Let us see some mathematics behind this.</h4><h4>1). Noise Reduction</h4><p>Since the mathematics involved behind the scene are mainly based on derivatives (cf. Step 2: Gradient calculation), edge detection results are highly sensitive to image noise.</p><p>One way to get rid of the noise on the image, is by applying Gaussian blur to smooth it. To do so, image convolution technique is applied with a Gaussian Kernel (3x3, 5x5, 7x7 etc…). The kernel size depends on the expected blurring effect. Basically, the smallest the kernel, the less visible is the blur. In our example, we will use a 5 by 5 Gaussian kernel.</p><p>The equation for a Gaussian filter kernel of size (2<em>k</em>+1)×(2<em>k</em>+1) is given by:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/60/0*SvPMNZWqMc7G5qEn" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/525/0*0COqwg6Xw3dwEY7_.png" /></figure><p>Gaussian filter kernel equation</p><iframe src="" width="0" height="0" frameborder="0" scrolling="no"><a href="https://medium.com/media/6bfebd5962d839dd7f2d08132a08b7c6/href">https://medium.com/media/6bfebd5962d839dd7f2d08132a08b7c6/href</a></iframe><h3><strong>2). Finding Intensity Gradient of the Image</strong></h3><p>Smoothened image is then filtered with a Sobel kernel in both horizontal and vertical direction to get first derivative in horizontal direction (</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/21/0*7f5ZdBHnTKNwTxbf.png" /></figure><p>) and vertical direction (</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/21/0*yzZAK8--AJcd9Oh6.png" /></figure><p>).</p><p>From these two images, we can find edge gradient and direction for each pixel as follows:</p><p>Gradient direction is always perpendicular to edges. It is rounded to one of four angles representing vertical, horizontal and two diagonal directions.</p><h4><strong>3). Non-maximum Suppression</strong></h4><p>After getting gradient magnitude and direction, a full scan of image is done to remove any unwanted pixels which may not constitute the edge. For this, at every pixel, pixel is checked if it is a local maximum in its neighborhood in the direction of gradient.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/450/0*4xzPYbzLAxDZdCzW.jpg" /></figure><p>Point A is on the edge ( in vertical direction). Gradient direction is normal to the edge. Point B and C are in gradient directions. So point A is checked with point B and C to see if it forms a local maximum. If so, it is considered for next stage, otherwise, it is suppressed ( put to zero).</p><p>In short, the result you get is a binary image with “thin edges”.</p><h4><strong>4). Hysteresis Thresholding</strong></h4><p>This stage decides which are all edges are really edges and which are not. For this, we need two threshold values, <em>minVal</em> and <em>maxVal</em>. Any edges with intensity gradient more than <em>maxVal</em> are sure to be edges and those below <em>minVal</em> are sure to be non-edges, so discarded. Those who lie between these two thresholds are classified edges or non-edges based on their connectivity. If they are connected to “sure-edge” pixels, they are considered to be part of edges. Otherwise, they are also discarded.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/450/0*5DNEp8-h-A4r4sJc.jpg" /></figure><p>The edge A is above the <em>maxVal</em>, so considered as “sure-edge”. Although edge C is below <em>maxVal</em>, it is connected to edge A, so that also considered as valid edge and we get that full curve. But edge B, although it is above <em>minVal</em> and is in same region as that of edge C, it is not connected to any “sure-edge”, so that is discarded. So it is very important that we have to select <em>minVal</em> and <em>maxVal</em> accordingly to get the correct result.</p><p>This stage also removes small pixels noises on the assumption that edges are long lines.</p><p>So what we finally get is strong edges in the image.</p><p>// Code using in built function is provided above.</p><p><strong>code using mathematics: </strong>:point_right:</p><p><a href="https://github.com/simarpreetsingh-019/CannyEdgedetection/blob/master/Canny_Edge_maths.py">simarpreetsingh-019/CannyEdgedetection</a></p><p><strong>code using built-in functions :</strong> :point_right:</p><p><a href="https://github.com/simarpreetsingh-019/CannyEdgedetection/blob/master/CannyEdgeDetection.py">simarpreetsingh-019/CannyEdgedetection</a></p><p>That’s all for this time.</p><p>Simarpreet Singh , signing off.</p><p>— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — —</p><h3>References:</h3><ol><li><a href="https://opencv-python-tutroals.readthedocs.io/en/latest/py_tutorials/py_imgproc/py_canny/py_canny.html">https://opencv-python-tutroals.readthedocs.io/en/latest/py_tutorials/py_imgproc/py_canny/py_canny.html</a></li></ol><p>2. Github</p><p>— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — —</p><p>#Python3 #CannyEdgeDetction #ImageProcessing #OpenCV</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=cfefa272a8d0" width="1" height="1" alt=""><hr><p><a href="https://medium.com/simply-dev/what-is-canny-edge-detection-cfefa272a8d0">What is Canny Edge Detection?</a> was originally published in <a href="https://medium.com/simply-dev">Simply Dev</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Dependency Analytics by RedHat]]></title>
            <link>https://medium.com/simply-dev/dependency-analytics-by-redhat-d4682d9c0795?source=rss----3fd093b1f0fc---4</link>
            <guid isPermaLink="false">https://medium.com/p/d4682d9c0795</guid>
            <category><![CDATA[open-source]]></category>
            <category><![CDATA[linux]]></category>
            <category><![CDATA[trending]]></category>
            <category><![CDATA[red-hat-summit]]></category>
            <category><![CDATA[analytics]]></category>
            <dc:creator><![CDATA[Champion Runner]]></dc:creator>
            <pubDate>Mon, 20 Apr 2020 09:52:07 GMT</pubDate>
            <atom:updated>2020-03-14T08:56:23.646Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/362/1*mAbgKehreNn4nvH5ecJjLg.png" /></figure><p><strong>About Red Hat</strong></p><p>Red Hat has become associated to a large extent with its enterprise OS Red Hat Linux, Red Hat also offers RHV <a href="https://en.wikipedia.org/wiki/Red_Hat_Virtualization">Red Hat Virtualization</a>. It is standardized across environments, develop cloud-native applications and automate, secure and manage complex environments.</p><h3>This post is about some new projects by Openshift under Red Hat</h3><p>I would like to discuss some of the main points I have personally experienced when I saw this project while I was in Singapore for a Summit and I came to know Aagam Shah, who is a Data Scientist at Red Hat.</p><p><strong>Dependency Analytics</strong></p><p>This is the project it’s actually for Visual Studio, It gives insights about your application dependencies: Security, License compatibility and AI-based guidance to choose appropriate dependencies for your application.</p><p>This extension supports projects that use Maven, based on the Node ecosystem and Python. The team is also extending it for other languages as well if you want you can contribute to the Repos mentioned below and extension support under Go language is in progress.</p><ul><li>Flags a security vulnerability(CVE) and suggests a remedial version</li><li>Shows Github popularity metrics along with the latest version</li><li>Suggests a project level license, check for conflicts between dependency licenses</li><li>AI-based guidance for additional, alternative dependencies</li></ul><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*WY1i5fPHJtXULViE.gif" /></figure><p>So once you install this extension, It scans your application for security vulnerabilities.So below are the features and functions explained with a demo</p><p>Right-click on a manifest file(pom.xml/package.json) and choose the ‘Dependency Report ‘ to display it. This report gives insights into your dependencies</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*8zYe-ayZCzzBbVQ0.gif" /></figure><p>For Multi-Module Maven Application</p><p>right-click on root pom.xml in the editor and choose ‘Dependency Analytics Report’</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*V9Bo0E_UqlmudAqo.gif" /></figure><p>It creates a folder target in the workspace which is used for processing of manifest files, needed for generating stack reports. So kindly add-in .gitignore.</p><p><strong>My views and experience — It is a very good extension and is a very good Open Source project for young developers and it accesses only your manifests and license files.</strong></p><p><strong>There are certain issues that experienced but I have seen that they have already been reported as an issue by there team on Github so I hope they will get fixed .</strong></p><p><strong>Some more official sources where you can more updates or can even fix some Bugs</strong></p><p><a href="https://marketplace.visualstudio.com/items?itemName=redhat.fabric8-analytics">https://marketplace.visualstudio.com/items?itemName=redhat.fabric8-analytics</a></p><p><a href="https://github.com/fabric8-analytics/fabric8-analytics-vscode-extension">https://github.com/fabric8-analytics/fabric8-analytics-vscode-extension</a></p><p><a href="https://github.com/fabric8-analytics">https://github.com/fabric8-analytics</a></p><p><a href="https://youtu.be/mnedVZ29Mlw">https://youtu.be/mnedVZ29Mlw</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=d4682d9c0795" width="1" height="1" alt=""><hr><p><a href="https://medium.com/simply-dev/dependency-analytics-by-redhat-d4682d9c0795">Dependency Analytics by RedHat</a> was originally published in <a href="https://medium.com/simply-dev">Simply Dev</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[What is COVID-19 and what you need to know about it?]]></title>
            <link>https://medium.com/simply-dev/what-is-covid-19-and-what-you-need-to-know-about-it-63bb727f4e92?source=rss----3fd093b1f0fc---4</link>
            <guid isPermaLink="false">https://medium.com/p/63bb727f4e92</guid>
            <category><![CDATA[help]]></category>
            <category><![CDATA[trending]]></category>
            <category><![CDATA[globalization]]></category>
            <category><![CDATA[corona]]></category>
            <category><![CDATA[health]]></category>
            <dc:creator><![CDATA[Champion Runner]]></dc:creator>
            <pubDate>Mon, 20 Apr 2020 09:48:15 GMT</pubDate>
            <atom:updated>2020-03-17T18:06:30.237Z</atom:updated>
            <content:encoded><![CDATA[<h3><strong>Coronavirus disease (COVID-19)</strong></h3><p>is a virus that can lead to misleading deaths in a large amount, but one can take precautions in order to protect themselves from getting infected.</p><p>Coronaviruses are a family of viruses that cause disease in animals. Seven, including the new virus, have made the jump to humans, but most just cause cold-like symptoms.</p><p>On <strong>December 31, 2019</strong>, the World Health Organization (<a href="https://www.who.int/health-topics/coronavirus"><strong>WHO</strong></a>) was informed of an outbreak of “pneumonia of unknown cause” detected in Wuhan City, Hubei Province, China — the seventh-largest city in China with 11 million residents. As of January 23, there are over <a href="https://twitter.com/Echinanews/status/1220507165737144320"><strong>800 cases</strong></a> of 2019-nCoV confirmed globally, including cases in at least 20 regions in China and nine countries/territories. The first reported infected individuals, some of whom showed symptoms as early as <a href="http://www.cidrap.umn.edu/news-perspective/2020/01/report-thailands-coronavirus-patient-didnt-visit-outbreak-market"><strong>December 8</strong></a>, were discovered to be among stallholders from the Wuhan South China Seafood Market. Subsequently, the wet market was closed on Jan 1. The virus causing the outbreak was quickly determined to be a <a href="https://www.who.int/china/news/detail/09-01-2020-who-statement-regarding-cluster-of-pneumonia-cases-in-wuhan-china"><strong>novel coronavirus</strong></a>. On January 10, gene sequencing further determined it to be the new Wuhan coronavirus, namely <a href="https://www.who.int/health-topics/coronavirus"><strong>2019-nCoV</strong></a>, a beta coronavirus, related to the Middle Eastern Respiratory Syndrome virus (<strong>MERS-CoV</strong>) and the Severe Acute Respiratory Syndrome virus (<strong>SARS-CoV</strong>). However, the mortality and transmissibility of 2019-nCoV are still unknown, and likely to vary from those of the prior referenced coronaviruses.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/977/1*auewOYWowtRjENApfazmNA.png" /><figcaption>Visualization of infected people around the world</figcaption></figure><p><strong>Coronavirus COVID-19 Global Cases by the Center for Systems Science and Engineering (CSSE) at Johns Hopkins University (JHU)</strong></p><p><a href="https://www.arcgis.com/apps/opsdashboard/index.html#/bda7594740fd40299423467b48e9ecf6">https://www.arcgis.com/apps/opsdashboard/index.html#/bda7594740fd40299423467b48e9ecf6</a></p><p>In a world of polarising distrust and trade tensions, the spread of coronavirus disease (COVID-19), both within nations and internationally, is aided and abetted by misinformation that circumnavigates the planet in microseconds. Such misinformation is not all malevolent, although its impact can be devastating. Some have sought to limit misinformation about COVID-19 on social media by pressuring corporations, such as Facebook, Weibo, and Twitter, to censor bad actors — an approach that has not stopped conspiracy theorists, trolls, and liars.</p><p>If financial markets are jittery about the flow of information and disruption to production and supply chains with the global spread of COVID-19 and governments are seeking to avoid panic among their populaces, they need to invest in bastions of truth — or, at least, in those that attempt to identify information based on scientific principles.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*P1z5hh62w0Y-QLNA.png" /><figcaption>A dashboard created by Johns Hopkins</figcaption></figure><p>Many trades, businesses and capitals are facing huge losses in the market and the share market is currently dropping rapidly, you can read about this in the following news article <a href="https://www.bbc.com/news/business-51903195">https://www.bbc.com/news/business-5190319</a>.</p><p>Companies have started shutting down the office campuses for a few weeks and employees are currently assigned work from home, Social gatherings are being affected all the educational and professional institutions are shut down for some time, Gymnasiums and public arenas are being shut.</p><h3>Myths about the Corona Virus</h3><p>Many rumors have been spread through social media and the internet that coronavirus gets inactive or gets killed at high temperature, as a result, the citizens of countries with high temperatures and climate are thinking that they won’t get affected, But this is not true. No scientific study proves that the above-claimed statement is true or false.</p><p>Other is that people have started wearing masks rather than giving more importance to personal hygiene and avoid social interactions.</p><h3>The Bad Businessmen</h3><p>Some people have started holding the huge stock of hand sanitizers, toilet paper rolls, and pollution masks. Many such citizens have been arrested and one such case was as mentioned below in the Hixson United States. <a href="https://www.nytimes.com/2020/03/14/technology/coronavirus-purell-wipes-amazon-sellers.html?referringSource=articleShare">https://www.nytimes.com/2020/03/14/technology/coronavirus-purell-wipes-amazon-sellers.html?referringSource=articleShare</a></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*f-PjmSmSwBdHPwNsVqL-2w.png" /><figcaption><a href="https://covid19dashboards.com/growth-bayes/">https://covid19dashboards.com/growth-bayes/</a></figcaption></figure><p><strong>Thanks to technology</strong></p><p><strong>1 </strong>Online banking and wallets saved thousands of lives since most of the transactions done online would have been done using cash (that might have been transferred through an infected person).</p><p><strong>2</strong> Advanced research and development, many countries have set up the COVID-19 checkup centers and health organizations are working on producing the vaccine soon.</p><p><strong>3 </strong>Thanks to social media (that has created the awareness) and live report and visualization tools.</p><h3>The need for the ours</h3><p>Some of the citizens have tried to create awareness in whatever way possible, here are some of the informative tweets that you need to see</p><h3>Yano on Twitter</h3><p>If you&#39;e still hanging with friends, going to restaurants/bars, and acting like this isn&#39;t a big deal, get your shit together. The following thread is taken from an Italian citizen. As they put it: &quot;To the rest of the world, you have no idea what&#39;s coming.&quot; MUST READ👇</p><h3>DHH on Twitter</h3><p>Do you know of a tech company that&#39;s asking people who could work from home to come to the office? Reply to this thread, so we can track these irresponsible organizations, and remember their names even after this is over.</p><h3>What do you need to do now?</h3><p><strong>1 Stay indoors</strong></p><p><strong>2 Avoid touching your face</strong></p><p><strong>3 Avoid Social interactions and travels</strong></p><p><strong>4 Keep yourself clean and wash your hands frequently.</strong></p><p><strong>5 Don’t panic and keep yourself updated about the issue.</strong></p><p><strong>6 Take work from home or a week off from work (if remote work is not possible)</strong></p><h3>Some of the major resources</h3><ul><li><a href="https://www.who.int/">World Health Organization (WHO)</a></li><li><a href="https://www.cdc.gov/">Centers for Disease Control and Prevention</a></li><li><a href="https://systems.jhu.edu/research/public-health/ncov/">ncov - CSSE</a></li><li><a href="https://covid19dashboards.com/">COVID-19 Dashboards</a></li></ul><p><a href="https://ncov.dxy.cn/ncovh5/view/pneumonia?scene=2&amp;clicktime=1579582238&amp;enterid=1579582238&amp;from=singlemessage&amp;isappinstalled=0">https://ncov.dxy.cn/ncovh5/view/pneumonia?scene=2&amp;clicktime=1579582238&amp;enterid=1579582238&amp;from=singlemessage&amp;isappinstalled=0</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=63bb727f4e92" width="1" height="1" alt=""><hr><p><a href="https://medium.com/simply-dev/what-is-covid-19-and-what-you-need-to-know-about-it-63bb727f4e92">What is COVID-19 and what you need to know about it?</a> was originally published in <a href="https://medium.com/simply-dev">Simply Dev</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Status of Tech conferences due to COVID-19]]></title>
            <link>https://medium.com/simply-dev/status-of-tech-conferences-due-to-covid-19-8ba06a18fb94?source=rss----3fd093b1f0fc---4</link>
            <guid isPermaLink="false">https://medium.com/p/8ba06a18fb94</guid>
            <category><![CDATA[covid19]]></category>
            <category><![CDATA[coronavirus]]></category>
            <category><![CDATA[conference]]></category>
            <category><![CDATA[tech]]></category>
            <category><![CDATA[trends]]></category>
            <dc:creator><![CDATA[Champion Runner]]></dc:creator>
            <pubDate>Mon, 20 Apr 2020 09:43:16 GMT</pubDate>
            <atom:updated>2020-04-20T09:51:17.932Z</atom:updated>
            <content:encoded><![CDATA[<h3>Tech conferences canceled, postponed, or going virtual</h3><ul><li><a href="https://summit.adobe.com/na/">Adobe Summit</a> (Mar. 29-Apr. 2 in Las Vegas) — <strong>In-person canceled; online-only event</strong></li><li><a href="https://developer.apple.com/wwdc20/">Apple WWDC</a> (June) — <strong>In-person canceled; online-only event</strong></li><li><a href="https://www.arubanetworks.com/atmosphere/">Aruba Networks Atmosphere 2020</a> (Mar. 23–26) — <strong>In-person canceled; online-only event</strong></li><li><a href="https://www.atlassian.com/company/events/summit">Atlassian Summit 2020</a> (Mar. 31-Apr. 2 in Las Vegas) — <strong>In-person canceled; online-only event</strong></li><li><a href="https://www.blackhat.com/asia-20/">Black Hat Asia 2020</a> (Mar. 31-Apr. 3 in Singapore) — <strong>Postponed until Sep. 29-Oct. 2</strong></li><li><a href="https://cansecwest.com/">CanSecWest</a> (Mar. 18–20 in Vancouver) — Held as scheduled</li><li><a href="https://www.ciscolive.com/us.html">Cisco Live</a> (May 31- Jun. 4 in Las Vegas) — <strong>In-person canceled; online-only event</strong></li><li><a href="https://www.ciscolive.com/apjc.html">Cisco Live Melbourne</a> (Mar. 3–6 in Melbourne) — <strong>Canceled</strong></li><li><a href="https://www.defcon.org/html/defcon-china-2/dc-cn-2-index.html">DEF CON China</a> (Apr. 17–19 in Beijing) — <strong>Postponed TBD</strong></li><li><a href="https://www.delltechnologiesworld.com/index.htm">Dell World</a> (May 4–7 in Las Vegas) — <strong>In-person canceled; online-only event</strong></li><li><a href="https://momentum.docusign.com/">DocuSign Momentum</a> (Mar. 4 in San Francisco) — <strong>In-person canceled; online-only event</strong></li><li><a href="https://www.domo.com/domopalooza">Domopalooza</a> (Mar. 18–19 in Salt Lake City, UT) — <strong>In-person canceled; online-only event</strong></li><li><a href="https://events.drupal.org/minneapolis2020">DrupalCon</a> (May 18–22 in in Minneapolis, MN) — <strong>Postponed TBD</strong></li><li><a href="https://www.e3expo.com/">E3</a> (Jun. 9–11 in Las Angeles) — <strong>Canceled</strong></li><li><a href="https://emtechasia.com/">EmTech Asia</a> (Mar. 24–26 in Singapore) — <strong>Postponed to Aug. 4–5</strong></li><li><a href="https://www.enterpriseconnect.com/orlando">Enterprise Connect 2020</a> (Mar. 30-Apr. 2 in Orlando) — <strong>Postponed to Aug 3–6 in San Francisco</strong></li><li><a href="https://www.esri.com/en-us/about/events/devsummit/overview">ESRI Developer Summit</a> (Mar. 10) — <strong>In-person canceled; online-only event</strong></li><li><a href="https://www.f5.com/agility">F5 Agility 2020</a> (Mar. 16–19 in Orlando, FL) — <strong>In-person canceled; online-only event</strong></li><li><a href="https://www.f8.com/">Facebook F8</a> (May 6–8 in San Jose, CA) — <strong>Canceled</strong></li><li>Facebook Global Marketing Summit (Mar. 9–12 in San Francisco) — <strong>Canceled</strong></li><li><a href="https://dtgsummit.com/">Future Vision: DTG Summit 2020</a> (May 6 in London) — <strong>Postponed until Oct. 5</strong></li><li><a href="https://www.gdconf.com/">Game Developers Conference (GDC)</a> (Mar. 16–20 in San Francisco) — <strong>Postponed to Summer 2020</strong></li><li><a href="https://go.forrester.com/event/cx-sydney/">Forrester CX Sydney</a> (Apr. 29–30 in Sydney) — <strong>In-person canceled; online-only event Apr. 20</strong></li><li><a href="https://go.forrester.com/event/cx-north-america/">Forrester CX North America</a> (Jun. 16–18 in New York) — <strong>In-person canceled; online-only event Jun. 16–18</strong></li><li><a href="https://summit.siriusdecisions.com/">Forrester SiriusDecisions Summit</a> (May 3–6 in Austin, TX) — <strong>In-person canceled; online-only event May 4</strong></li><li><a href="https://www.gartner.com/en/conferences/na/symposium-us">Gartner CIO Symposium/ITxPo</a> (Oct. 18–22 in Orlando) — Being held as scheduled</li><li><a href="https://www.gartner.com/en/conferences/emea/data-analytics-uk">Gartner Data &amp; Analytics Summit</a> (Mar. 9–11 in London — <strong>Postponed</strong></li><li><a href="https://www.gartner.com/en/conferences/na/data-analytics-us">Gartner Data &amp; Analytics Summit</a> (Mar. 23–26 in Grapevine, TX) — <strong>Postponed</strong></li><li><a href="https://cloud.withgoogle.com/next/sf">Google Cloud Next</a> (Apr. 6–8 in San Francisco) — <strong>In-person canceled; online-only event</strong></li><li><a href="https://events.google.com/io/">Google I/O</a> (May 12–14 in Mountain View, CA) — <strong>Canceled</strong></li><li><a href="https://newsinitiative.withgoogle.com/">Google News Initiative Summit</a> (Late Apr. in Sunnyvale, CA) — <strong>Canceled</strong></li><li><a href="https://www.hpe.com/events/discover/">HPE Discover</a> (Jun. 23–25 in Las Vegas) — Being held as scheduled</li><li><a href="http://inforum.infor.com/">Infor Inforum 2020</a> (Sep. 14–16 in Las Vegas) — Being held as scheduled</li><li><a href="https://www.ingrammicrocloud.com/press-releases/ingram-micro-cloud-postpones-cloud-summit-2020-early-2021/">Ingram Micro Cloud Cloud Summit 2020</a> (May 12–14 in Miami Beach, FL) — <strong>Postponed until early 2021</strong></li><li><a href="https://tmt.knect365.com/iot-world/coronavirus-updates/">IoT World Developer Conference</a> (Apr. 6–9, 2020 in San Jose, CA) — <strong>Postponed until Aug. 10–13</strong></li><li><a href="https://thesascon.com/">Kaspersky’s Security Analyst Summit</a> (April 6–9 in Barcelona) — <strong>Postponed until Fall 2020</strong></li><li><a href="https://www.microsoft.com/en-us/build">Microsoft Build</a> (May 19–21 in Seattle) — <strong>In-person canceled; online-only event</strong></li><li><a href="https://www.microsoft.com/en-us/ignite">Microsoft Ignite</a> (Sep. 21–25 in New Orleans) — Being held as scheduled</li><li><a href="https://www.wslconf.dev/">Microsoft WSLConf</a> (March 10–11 in Redmond, WA) — <strong>In-person canceled; online-only event</strong></li><li><a href="https://mvp.microsoft.com/summit">Microsoft MVP Global Summit</a> (Mar. 15–20 in Bellevue &amp; Redmond, WA) — <strong>In-person canceled; online-only event</strong></li><li><a href="https://www.mwcbarcelona.com/">Mobile World Congress MWC Barcelona (GSMA)</a> (Feb. 24–27 in Barcelona) — <strong>Canceled</strong></li><li><a href="https://www.mspworldconference.com/">MSPWorld</a> (Mar. 15–17 in New Orleans) — <strong>Rescheduled for June 2020</strong></li><li><a href="https://www.mwcamericas.com/">Mobile World Congress MWC Americas (GSMA)</a> (Oct. 28–30 in Los Angeles) — Being held as scheduled</li><li><a href="https://nabshow.com/2020/attend/onsite-services/coronavirus-update-and-resources/">NAB Show — National Association of Broadcasters</a> (Apr. 18–22 in Las Vegas) — <strong>Canceled; possible rescheduled for Fall</strong></li><li><a href="https://www.nvidia.com/en-us/gtc/">Nvidia GTC — GPU Technology Conference</a> (Mar. 22–26 in San Jose, CA) — <strong>In-person canceled; online-only event</strong></li><li><a href="https://conferences.oreilly.com/strata-data-ai/stai-ca">O’Reilly Strata Data &amp; AI Conference</a> (Mar. 15–18, San Jose, CA) — <strong>Postponed; Merged with Strata Data &amp; AI (Sep. 14–17); online-only</strong></li><li><a href="https://odsc.com/boston/">ODSC East 2020 — Open Data Science Conference</a> (Apr. 13–17 in Boston) — <strong>In-person canceled; online-only event</strong></li><li><a href="https://www.ofcconference.org/en-us/home/about/covid-19-faq/">OFC 2020</a> (Mar. 8–12 in San Diego, CA) — Held as scheduled</li><li><a href="https://www.oktane20.com/">Oktane Live</a> — (Mar. 30-Apr. 2) <strong>Online-only event</strong></li><li><a href="https://www.oracle.com/code-one/">Oracle Code One</a> (Sep. 21–24 in Las Vegas) — Being held as scheduled</li><li><a href="https://www.oracle.com/modern-business-experience/">Oracle Modern Business Experience</a> (Mar. 23–26 in Chicago) — <strong>Postponed until Sep. 21–24 to coincide with OpenWorld</strong></li><li><a href="https://www.oracle.com/openworld/">Oracle OpenWorld</a> (Sep. 21–24 in Las Vegas) — Being held as scheduled</li><li><a href="https://conferences.oreilly.com/oscon/oscon-or">OSCON</a> (Jul. 13–16 in Portland) — <strong>In-person cancelled; online-only TBD</strong></li><li><a href="https://www.pbwsummit.com/">Paris Blockchain Week Summit</a> (Mar. 31-Apr. 1 in Paris) — <strong>Postponed until Dec. 9–10</strong></li><li><a href="https://www.perconalive.com/">Percona Live Open Source Database Conference</a> (May 18–20 in Austin, TX) — <strong>Postponed; new date TBD</strong></li><li><a href="https://www.zerodayinitiative.com/blog/2020/3/12/regarding-pwn2own-vancouver">Pwn2Own</a> (March 12 in Vancouver) — <strong>In-person canceled, online-only event</strong></li><li><a href="https://www.qualtrics.com/x4summit/">Qualtrics X4 Summit</a> (Mar. 10–13 in Salt Lake City, UT) — <strong>Postponed to early Fall 2020</strong></li><li><a href="https://events.recode.net/events/code-conference-2020/">Recode Code Conference 2020</a> (May 26–28 in Beverly Hills, CA) — <strong>Rescheduled; Sep. 8–10</strong></li><li><a href="https://www.redhat.com/en/summit">Red Hat Summit 2020</a> (Apr. 27–29 in San Francisco) <strong>— In-person canceled; online-only event</strong></li><li><a href="https://www.techrepublic.com/article/rsa-what-its-like-to-attend-the-first-tech-conference-after-the-coronavirus-epidemic/">RSA Conference</a> (Feb. 24–28 in San Francisco) — Held as planned (IBM, AT&amp;T, Verizon, and other vendors withdrew)</li><li><a href="http://www.cloudsoftwareassociation.com/saas-connect/">SaaS Connect</a> — Cloud Software Association (Apr. 15–16 in San Francisco) — <strong>Postponed until Oct. 5–6</strong></li><li><a href="https://www.saastrannual.com/">SaaStr Annual 2020</a> — (Mar. 10–12 in San Jose, CA) — <strong>Canceled; rescheduled Sep. 2020, SF Bay Area</strong></li><li><a href="https://www.salesforce.com/au/events/worldtour/syd20/overview/">Salesforce World Tour Sydney</a> (Mar. 4 in Sydney) — <strong>In-person canceled; online-only event</strong></li><li><a href="https://fusion.concur.com/fusion-orlando-announcement">SAP Ariba LIVE</a> (Mar. 16–18 in Las Vegas) <strong>— Canceled</strong></li><li><a href="https://fusion.concur.com/fusion-orlando-announcement">SAP Concur Fusion</a> (Mar. 9–12 in Orlando) — <strong>In-person canceled; online-only event</strong></li><li><a href="https://fusion.concur.com/fusion-orlando-announcement">SAP NOW</a> (Mar.) — <strong>Canceled</strong></li><li><a href="https://events.sap.com/sapandasug/en/home">SAP SAPPHIRE NOW</a> (May 12–14 in Orlando) — <strong>In-person canceled; online-only event</strong></li><li><a href="https://www.sas.com/en_us/events/sas-global-forum.html">SAS Global Forum</a> (Mar. 29-Apr. 1 in Washington, DC) — <strong>In-person canceled; online-only event</strong></li><li><a href="https://unite.shopify.com/">Shopify Unite 2020 developers conference</a> (May 6–8 in Toronto) — <strong>In-person canceled; online-only event</strong></li><li><a href="https://www.sxsw.com/">SXSW</a> (Mar. 12–22 in Austin, Texas) — <strong>Canceled</strong></li><li><a href="http://inside.thenextweb.com/186795-tnw-reschedules-2020-event-to-october-1-2">TNW Conference</a> (Jun, 18–19 in Amsterdam) — <strong>Postponed until Oct. 1–2</strong></li><li><a href="https://www.vmworld.com/en/us/index.html">VMworld</a> (Aug. 31-Sep. 3 in San Francisco) — Being held as scheduled.</li><li><a href="https://events.linuxfoundation.org/lf-member-summit/"><strong>Linux Foundation Member Summit</strong></a><strong>:</strong> March 10 to March 12, Lake Tahoe, Calif. — <strong>Canceled</strong></li><li><a href="https://netdevconf.info/0x14/news.html?coronavirus-update4"><strong>Netdev 0x14</strong></a>: March 17 to March 20, Vancouver — <strong>Virtual.</strong></li><li><a href="https://events.linuxfoundation.org/agl-amm/"><strong>Automotive Grade Linux</strong></a><strong>:</strong> March 18 to March 19, Honolulu <strong>— Canceled</strong></li><li><a href="https://www.susecon.com/"><strong>SUSECon</strong></a><strong>: </strong>March 23 to March 27, Dublin, Ireland — <strong>Virtual</strong></li><li><a href="https://www.meetup.com/All-Things-Open-RTP-Meetup/events/268913303"><strong>March Open Source RTP meetup</strong></a><strong>: </strong>March 24, Durham, NC- <strong>Still running.</strong></li><li><a href="https://connect.linaro.org/linaro-tech-days/"><strong>Linaro Connect</strong></a>: March 24–25, Budapest, Hungary — <strong>Virtual</strong></li><li><a href="https://events.linuxfoundation.org/kubecon-cloudnativecon-europe/"><strong>KubeCon</strong></a><strong>:</strong> March 30 to April 2, Amsterdam — <strong>Postponed until July/August</strong></li><li><a href="https://odsc.com/"><strong>Open Data Science Conference</strong></a><strong>:</strong> April 13 to April 18, Boston — <strong>Still running</strong></li><li><a href="https://events.linuxfoundation.org/open-networking-edge-summit-north-america/attend/novel-coronavirus-update/"><strong>Open Networking &amp; Edge Summit</strong></a><strong>:</strong> April 20 to April 21, LA <strong>— Postponed to the fall</strong></li><li><a href="https://www.redhat.com/en/summit"><strong>Red Hat Summit</strong></a><strong>:</strong> April 27 to April 29, San Francisco <strong>— Virtual</strong></li><li><a href="https://www.linuxfestnorthwest.org/conferences/2020"><strong>LinuxFest Northwest</strong></a><strong>: </strong>April 24 to April 26, Bellingham, Wash. <strong>— Still running</strong></li><li><a href="https://events.linuxfoundation.org/lsfmm/"><strong>Linux Storage, Filesystem &amp; Memory Management Summit</strong></a><strong>:</strong> April 27 to April 29, Palm Springs, Calif. — <strong>Still running</strong></li><li><a href="https://www.datastax.com/accelerate"><strong>DataStax Accelerate:</strong></a><strong> </strong>May 11–13, San Francisco — <strong>Virtual.</strong></li><li><a href="https://events.redislabs.com/redisconf20/"><strong>RedisConf</strong></a>: May 12–14, San Francisco — <strong>Virtual.</strong></li><li><a href="https://www.openstack.org/events/opendev-ptg-2020/"><strong>OpenDev + PTG</strong></a><strong> </strong>(formerly OpenStack Summit): June 8 to June 11, Vancouver — <strong>Still running</strong></li><li><a href="http://southeastlinuxfest.org/"><strong>SouthEast LinuxFest</strong></a><strong>:</strong> June 12 to June 14 <strong>— Still running</strong></li><li><a href="https://events.linuxfoundation.org/open-source-summit-north-america/"><strong>Open Source Summit North America</strong></a><strong>:</strong> June 22 to June 24, Austin, Texas — <strong>Still running</strong></li><li><a href="https://www.cloudfoundry.org/events/summit/austin-2020/"><strong>Cloud Foundry Summit</strong></a><strong>: </strong>June 25, Austin, Texas <strong>— Still running</strong></li><li><strong>FIRST CTI</strong> — March 9 to March 11, Zurich — Current status: <a href="https://www.first.org/events/symposium/zurich2020/">Canceled</a>.</li></ul><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*76KSie833sq6FAYtnbS7Ng.jpeg" /></figure><p><strong>Resources</strong></p><ul><li><a href="https://github.com/Ishaan28malik/Virtual-Conf-List">Ishaan28malik/Virtual-Conf-List</a></li><li><a href="https://en.wikipedia.org/wiki/List_of_events_affected_by_the_2019%E2%80%9320_coronavirus_pandemic">List of events affected by the 2019-20 coronavirus pandemic</a></li></ul><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=8ba06a18fb94" width="1" height="1" alt=""><hr><p><a href="https://medium.com/simply-dev/status-of-tech-conferences-due-to-covid-19-8ba06a18fb94">Status of Tech conferences due to COVID-19</a> was originally published in <a href="https://medium.com/simply-dev">Simply Dev</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
    </channel>
</rss>