Programming problem collection website by
Ciro Santilli 35 Updated 2025-03-28 +Created 2025-03-20
They do some really fun hardcore mathy stuff over there!
Ciro Santilli interned at Inria Centre at Université Côte d'Azur in the early 2010's. It was a disaster, largely his own fault, but also due to our broken educational system. But they do have awesome things as well.
Applied mathematics research institute by
Ciro Santilli 35 Updated 2025-03-28 +Created 2025-03-20
IT Audit: Explanation on the Example Case by
kris25schr 0 Updated 2025-03-20 +Created 2025-03-20
IT Audit can be defined as the examination of the organization’s IT infrastructure, its policies, applications, technologies, and data management. One of the main aims of the information technology audits is the verification of the reliability of the IT systems, identification of the potential security aspects, adherence to the regulations, and finding the areas for improvement. Among the examples we can showcase the next project: an IT audit for the paint manufacturer. Here, IT auditors conducted the assessment of the organization’s infrastructure, and distribution of the business expenses, evaluated the distribution of the responsibilities in the IT department, analyzed the applications landscape, and as an outcome provided IT audit report with the list of the identified issues/inconsistencies and optimization points.
chudovo.de/projects/it-pruefung-fuer-den-farbenhersteller/
chudovo.de/projects/it-pruefung-fuer-den-farbenhersteller/
Welcome to my home page!
HOW TO HIRE A GENUINE HACKER / REVENANT CYBER HACKER
The intricate of online investments, and falling victim to a scam is a harsh reality that many, including myself, have faced. My name is Cindy Ewing, and my encounter with REVENANT CYBER HACKER has been extraordinary, warranting a detailed recounting for the benefit of those who might find themselves in similar distress. A few months ago, I ventured into the world of forex trading, lured by the promise of substantial returns. My platform seemed genuine, backed by convincing testimonials and professional presentations. It wasn’t until I tried to withdraw my supposed profits that the facade began to crumble. My emails went unanswered, and I soon realized that I had been duped out of a staggering USD 210,000.52. The shock and despair were overwhelming, but I knew I had to act quickly. Desperation drove me to the internet, searching for any solution that could help recover my funds. Amidst the sea of advice and services, one name kept resurfacing: REVENANT CYBER HACKER. The testimonials were glowing, filled with stories of successful recoveries and praises for their expertise. Skeptical yet hopeful, I decided to take a leap of faith. The initial consultation was thorough, as I laid out my predicament in detail. The expert I spoke with assured me that they had encountered and successfully resolved cases similar to mine. Their confidence was reassuring, and I felt a glimmer of hope for the first time since discovering the scam. REVENANT CYBER HACKER’s approach was methodical and transparent. They explained the steps they would take to track and retrieve my lost funds, keeping me informed throughout the process. Their communication was impeccable, with regular updates that provided both comfort and clarity. What stood out was their use of advanced technological tools and techniques. They meticulously analyzed the scam platform’s digital footprint, identifying the trails left by the fraudulent operators. Their expertise in cyber forensics was evident as they navigated the complex web of blockchain transactions and unmasked the hidden paths my money had taken. True to their word, within 48 hours, I received a notification that my lost funds had been returned to my wallet. The moment was surreal; seeing the amount reflected in my account was like a dream come true. The sense of relief and gratitude I felt was indescribable. REVENANT CYBER HACKER had delivered on their promise, restoring not only my money but also my faith in the possibility of justice. REVENANT CYBER HACKER handles each case with a blend of technical proficiency and genuine compassion, understanding the emotional and financial toll such scams take on victims. For anyone who finds themselves ensnared by fraudulent investment schemes, I cannot recommend REVENANT CYBER HACKER highly enough. Their service is not just about recovering lost funds; it’s about restoring hope and providing a lifeline in a time of need. My experience stands as a testament to their remarkable capabilities and dedication to helping those wronged in the digital realm. REVENANT CYBER HACKER exemplifies the best of what a recovery service should be: efficient, trustworthy, and profoundly effective. They turned my nightmare into a narrative of recovery .For any kind of crypto recovery contact REVENANT CYBER HACKER via: Email : revenantcyberhacker ( @ ) gmail (. ) com
Telegram: revenantcyberhacker
WhatsApp: + 1 (208) 425-8584
WhatsApp: + 1 (913) 820-0739
Website:www.revenantcyberhacker.org
Telegram: revenantcyberhacker
WhatsApp: + 1 (208) 425-8584
WhatsApp: + 1 (913) 820-0739
Website:www.revenantcyberhacker.org
Welcome to my home page!
Disputes with neighbours can escalate quickly, affecting your peace of mind. Our no win no fee solicitors neighbour disputes specialise in resolving boundary, noise, and property disputes efficiently. We assess your case, negotiate on your behalf, and take legal action if necessary—all without upfront fees. You only pay if we win, ensuring you receive expert legal support risk-free. Contact us today for a free consultation.
legalassist.co.uk/how-your-boundary-disputes-can-be-resolved/
legalassist.co.uk/how-your-boundary-disputes-can-be-resolved/
MUYERN TRUST HACKER: Recovering Stolen Crypto and Securing Accounts Efficiently by
Peter prus 0 2025-03-19
MUYERN TRUST HACKER: Recovering Stolen Crypto and Securing Accounts Efficiently: tele gr am: muyerntrusthackertech.
Welcome to my home page!
Welcome to my home page!
Welcome to my home page!
This is a small fork of activatedgeek/LeNet-5 by Ciro Santilli adding better integration and automation for:
- extracting MNIST images as PNG
- ONNX CLI inference taking any image files as input
- a Python
tkinter
GUI that lets you draw and see inference live - running on GPU
Install on Ubuntu 24.10:
sudo apt install protobuf-compiler
cd lenet
virtualenv -p python3 .venv
. .venv/bin/activate
pip install -r requirements-python-3-12.txt
Download and extract MNIST train, test accuracy, and generate the ONNX Extract MNIST images as PNG:Infer some individual images using the ONNX:Draw on a GUI and see live inference using the ONNX:TODO: the following are missing for this to work:
lenet.onnx
:./train.py
./extract_pngs.py
./infer.py data/MNIST/png/test/0/*.png
./draw.py
- start a background task. This we know how to do: stackoverflow.com/questions/1198262/tkinter-locks-python-when-an-icon-is-loaded-and-tk-mainloop-is-in-a-thread/79502287#79502287
- get bytes from the canvas: all methods are ugly: stackoverflow.com/questions/9886274/how-can-i-convert-canvas-content-to-an-image
Raised $1B at $5B valuation on September 2024, then $2B at $30B on March 2025. Lol!
From their website:
Superintelligence is within reach.
Our singular focus means no distraction by management overhead or product cycles, and our business model means safety, security, and progress are all insulated from short-term commercial pressures.
Kinesin Motor Protein 3D Animation by Art of the cell
. Source. Pinned article: ourbigbook/introduction-to-the-ourbigbook-project
Welcome to the OurBigBook Project! Our goal is to create the perfect publishing platform for STEM subjects, and get university-level students to write the best free STEM tutorials ever.
Everyone is welcome to create an account and play with the site: ourbigbook.com/go/register. We belive that students themselves can write amazing tutorials, but teachers are welcome too. You can write about anything you want, it doesn't have to be STEM or even educational. Silly test content is very welcome and you won't be penalized in any way. Just keep it legal!
We have two killer features:
- topics: topics group articles by different users with the same title, e.g. here is the topic for the "Fundamental Theorem of Calculus" ourbigbook.com/go/topic/fundamental-theorem-of-calculusArticles of different users are sorted by upvote within each article page. This feature is a bit like:
- a Wikipedia where each user can have their own version of each article
- a Q&A website like Stack Overflow, where multiple people can give their views on a given topic, and the best ones are sorted by upvote. Except you don't need to wait for someone to ask first, and any topic goes, no matter how narrow or broad
This feature makes it possible for readers to find better explanations of any topic created by other writers. And it allows writers to create an explanation in a place that readers might actually find it.Figure 1. Screenshot of the "Derivative" topic page. View it live at: ourbigbook.com/go/topic/derivative - local editing: you can store all your personal knowledge base content locally in a plaintext markup format that can be edited locally and published either:This way you can be sure that even if OurBigBook.com were to go down one day (which we have no plans to do as it is quite cheap to host!), your content will still be perfectly readable as a static site.
- to OurBigBook.com to get awesome multi-user features like topics and likes
- as HTML files to a static website, which you can host yourself for free on many external providers like GitHub Pages, and remain in full control
Figure 2. You can publish local OurBigBook lightweight markup files to either OurBigBook.com or as a static website.Figure 3. Visual Studio Code extension installation.Figure 4. Visual Studio Code extension tree navigation.Figure 5. . You can also edit articles on the Web editor without installing anything locally. Video 3. Edit locally and publish demo. Source. This shows editing OurBigBook Markup and publishing it using the Visual Studio Code extension.Video 4. OurBigBook Visual Studio Code extension editing and navigation demo. Source. - Internal cross file references done right:
- Infinitely deep tables of contents:
Figure 6. Dynamic article tree with infinitely deep table of contents.Live URL: ourbigbook.com/cirosantilli/chordateDescendant pages can also show up as toplevel e.g.: ourbigbook.com/cirosantilli/chordate-subclade
All our software is open source and hosted at: github.com/ourbigbook/ourbigbook
Further documentation can be found at: docs.ourbigbook.com
Feel free to reach our to us for any help or suggestions: docs.ourbigbook.com/#contact