How TO – Lightbox
Learn how to create a modal image gallery (lightbox) with CSS and JavaScript.
Learn how to create a modal image gallery (lightbox) with CSS and JavaScript.
Since WP 5.3 it is enough to use this function:
wp_get_registered_image_subsizes();
Framework Laptop 13 is a thin, light, fast 13.5” notebook that is simple to customize, upgrade, and repair, so it stays yours for longer.
Removal and disposal of a swollen battery can be dangerous, but leaving a swollen battery inside a device can also cause serious harm. Read all warnings carefully and proceed at your own risk. All batteries are hazardous waste and must be disposed of properly.
Rclone is a command-line program to manage files on cloud storage. It is a feature-rich alternative to cloud vendors’ web storage interfaces. Over 70 cloud storage products support rclone including S3 object stores, business & consumer file storage services, as well as standard transfer protocols.
SQLite es el DBMS más común del mundo, incluido en todos los sistemas operativos populares.
SQLite no tiene servidor.
Para quienes desarrollan, SQLite está integrado directamente en la aplicación.
Para todos los demás, existe una conveniente consola de base de datos (REPL), que se proporciona como un solo archivo (sqlite3.exe en Windows, sqlite3 en Linux / macOS).
1. Avoid var Keyword: A Relic of the Past
Before ES6, the var keyword was the primary way to declare variables. However, it had some quirks and limitations that often led to unexpected results and made debugging more challenging.
In modern JavaScript, we generally avoid using var and instead opt for let and const, which offer more predictable and block-scoped behavior, making your code easier to understand and maintain.
2. let: Variables That Can Change
Use the let keyword to declare variables whose values you might need to change later in your code.
3. const: Constants for Unchanging Values:
If you have a value that shouldn’t change throughout your program, use the const keyword.
A good rule of thumb is to use const by default and only switch to let if you know you’ll need to reassign the variable’s value later.
Is that an unpopular opinion? It’s always been my favorite track on abbey road. You never give me your money, the end and she came in throught the bathroom window are the three tracks from the medley that never get old for me while golden slumbers and carry that weight’s big impact from the first listen diminished greatly in repeated listenings. Same goes for let it be, the song not the album.
In contrast to the White Album and Let It Be, Abbey Road – released in September 1969 – found The Beatles operating relatively cohesively; attempting to pull together, in step with one another if not exactly on the same page. « Abbey Road was really unfinished songs all stuck together, » bemoaned John Lennon. « None of the songs had anything to do with each other, no thread at all.”
It was the final collection of songs The Beatles recorded together…
nmap
is a network mapping tool. It works by sending various network messages to the IP addresses in the range we’re going to provide it with it. It can deduce a lot about the device it is probing by judging and interpreting the type of responses it gets.
Let’s kick off a simple scan with nmap
. We’re going to use the -sn
(scan no port) option. This tells nmap
to not probe the ports on the devices for now. It will do a lightweight, quick scan.
Even so, it can take a little time for nmap
to run. Of course, the more devices you have on the network, the longer it will take. It does all of its probing and reconnaissance work first and then presents its findings once the first phase is complete. Don’t be surprised when nothing visible happens for a minute or so.
The IP address we’re going to use is the one we obtained using the ip
command earlier, but the final number is set to zero. That is the first possible IPAddress on this network. The « /24 » tells nmap
to scan the entire range of this network. The parameter « 192.168.4.0/24 » translates as « start at IP address 192.168.4.0 and work right through all IP addresses up to and including 192.168.4.255 ».
Note we are using sudo
.
sudo nmap -sn 192.168.4.0/24
…we’ll show you how to use the command “dmidecode” to get the information about your motherboard, as well as how to use the command “lshw” to get more information about your system
In May 2024, over 65,000 developers responded to our annual survey about coding, the technologies and tools they use and want to learn, AI, and developer experience at work. Check out the results and see what’s new for Stack Overflow users.
It’s more than a movie site and it’s more than baseball.
It’s the feelings that touch you and the memories you recall as you immerse yourself into this field and this farm. Old and young alike – you’ll find yourself grinning from ear to ear as you step onto this magic field in Dyersville, Iowa.
OpenAI’s large language models (sometimes referred to as GPT’s) process text using tokens, which are common sequences of characters found in a set of text. The models learn to understand the statistical relationships between these tokens, and excel at producing the next token in a sequence of tokens.
You can think of tokens as the “letters” that make up the “words” and “sentences” that AI systems use to communicate.
A helpful rule of thumb is that one token generally corresponds to ~4 characters of text for common English text. This translates to roughly ¾ of a word (so 100 tokens ~= 75 words).
The process of breaking text down into tokens is called tokenization. This allows the AI to analyze and “digest” human language into a form it can understand. Tokens become the data used to train, improve, and run the AI systems.
Why Do Tokens Matter? There are two main reasons tokens are important to understand:
Strategies for Managing Tokens
Because tokens are central to how LLMs work, it’s important to learn strategies to make the most of them:
To somewhat expand on the earlier answers here, there are a number of details which are commonly overlooked.
subprocess.run()
over subprocess.check_call()
and friends over subprocess.call()
over subprocess.Popen()
over os.system()
over os.popen()
text=True
, aka universal_newlines=True
.shell=True
or shell=False
and how it changes quoting and the availability of shell conveniences.sh
and BashThis thoroughly revised guide demonstrates how the flexibility of the command line can help you become a more efficient and productive data scientist. You’ll learn how to combine small yet powerful command-line tools to quickly obtain, scrub, explore, and model your data. To get you started, author Jeroen Janssens provides a Docker image packed with over 100 Unix power tools.
DK: ¿Tú qué piensas de la enseñanza religiosa en los colegios?JMP:
Uf. Hombre, yo es que soy muy tradicional, no en el sentido banal de la palabra, sino que yo me considero parte de una cadena, entonces yo creo que los seres humanos tienen que sentirse partícipes de una comunidad. Y lo que le da sentido a las comunidades en términos históricos es la religión, entonces yo creo que un español debe ser instruido en la religión católica.
DK: Un español musulmán, por ejemplo.JMP:
Un español…
DK: Un español puede ser musulmán, y protestante, y judío… musulmanes y judíos ha habido en España casi más años que católicos, ¿no?JMP:
Sí, pero todo nuestro arte, toda nuestra literatura… todo es católico.
DK: Entonces tú piensas que un español musulmán debería recibir clases de religión católica.JMP:
Sí, pero no en sentido catequético.
DK: Bueno, como se hace ahora en los colegios.JMP:
No, no, pero eso es una lección, un derecho de los padres a elegir la religión en la que desean que sus hijos sean formados.
DK: Ese derecho no existe en la religión musulmana, por ejemplo, mientras que para la católica sí es un derecho efectivo en todos los colegios.JMP:
Sí, pero bueno, también es una religión mayoritaria. Pero bueno, yo la pondría para todo el mundo.
DK: Obligatoria para todo el mundo.JMP:
Sí. Sí. Pero no en términos confesionales, en términos de instrucción, o sea, que la gente sepa qué es la eucaristía, que sepa lo que es la virginidad de María…
DK: Historia de las religiones…JMP:
Pero bueno, es que no es lo mismo.
DK: ¿De verdad crees en serio que está bien que le expliquen al hijo de un musulmán español lo que es la virginidad de la Virgen, la eucaristía y todo eso?JMP:
Sí, porque ese niño podrá leerse un auto sacramental de Calderón de la Barca y entenderlo. O podrá leerse un soneto de Lope de Vega y entenderlo. Es una forma de hacerlo partícipe de una tradición cultural, de una tradición artística, de una tradición… Yo creo que sí. Pero en esto no veamos un deseo de imponer religión o una determinada religión a la gente, no, es deseo de hacerla partícipe de nuestra historia.
A hedge fund is an investment fund where capital from various institutional and individual investors is combined and put toward a range of assets, including derivatives, stocks, bonds, commodities and foreign currencies, with the aim of optimizing returns.
Hedge funds, in general, operate as limited partnerships, professionally managed by fund managers who pool money from investors. However, participation in hedge funds, including those dealing with cryptocurrencies, is typically limited to high-net-worth individuals who can bear higher management fees and associated risks.
Crypto hedge funds generate revenue through an annual management fee, typically ranging from 1% to 4% of the invested amount. In addition, investors may also be obligated to pay a percentage of earned profits as performance fees to the managing team.
Crypto hedge funds employ a combination of systematic and discretionary investment strategies to effectively navigate the crypto landscape. The systematic approach relies on computer transaction processing models, offering a structured framework, reducing emotional influences and providing consistency. However, the risk lies in the potential vulnerability of these algorithms to unforeseen market conditions.
L’équipe des Imaginations Fertiles vous partage sa boîte à outils !
Retrouvez ici des documents vierges & disponibles pour vous aider dans le développement de votre projet.
Vous montez un tiers-lieu ? Vous questionnez vos usagers ? Vous animez des temps d’intelligence collective ? Vous souhaitez découvrir le design de service ?
L’équipe des Imaginations Fertiles peut vous accompagner dans vos projets, n’hésitez pas à nous faire part de vos besoins !
Outils et ressources pour les tiers-lieux qui développent une offre de formation professionnelle
PiNG est une structure aux mutliples facettes. À la fois association d’éducation populaire ressource sur les cultures numériques à l’échelle régionale et nationale; animatrice de deux tiers-lieux à Nantes (l’atelier partagé du Breil et le fablab Plateforme C), et organisme de formation, depuis plusieurs années.
C’est au croisement de ces facettes que cet article ressource va se concentrer, dans la perspective de fournir aux tiers-lieux en Pays de la Loire et à l’échelle nationale, un retour d’expérience orienté « opérationnel » sur des outils et des astuces permettant de développer une offre de formation ayant vocation à s’inscrire en conformité des exigences du référentiel national qualité en matière de formation professionnelle. En bref, si le mot « qualiopi » vous est familier, vous êtes au bon endroit pour glaner quelques ressources contexualisées avec une activité de tiers-lieu!
The Beatles: Get Back is a documentary television series directed and produced by Peter Jackson. It covers the making of the Beatles’ 1970 album Let It Be (which had the working title of Get Back) and draws largely from unused footage and audio material originally captured for and recycled original footage from the 1970 documentary of the album by Michael Lindsay-Hogg. The docuseries has a total runtime of nearly eight hours, consisting of three episodes, each of duration between two and three hours covering about one week each, together covering 21 days of studio time.
George Lucas began developing a Han Solo prequel in 2012 and commissioned Lawrence Kasdan to write the screenplay. After Lucas sold Lucasfilm to The Walt Disney Company in 2012, Kasdan was hired to write Star Wars: The Force Awakens (2015), leaving his son Jonathan to complete the Solo script. Principal photography began in January 2017 at Pinewood Studios, with directors Phil Lord and Christopher Miller. Both were fired in June 2017 following creative differences with Lucasfilm, and Howard was hired as their replacement. Solo is one of the most expensive films ever made, with a budget of at least $275 million.
The series explores themes related to free will and determinism, as well as Silicon Valley.
I love the WordPress Rest API and switching more and more from theme development to a headless WP approach, with an nice front-end framework. Right now I’m favoring Nuxt.js, which is build on Vue.js (check out wuxt, my very own dockerized nuxt/wp development environment).
For using WPs full strength with the Rest API I’ve collected/build a useful snippet library with WordPress Rest API extensions. I’ll try to maintain the following list as development goes on. All of the following extensions can be embedded in the functions.php
file. If you wondering about the wuxt_ prefix, I’ve got the code from my Wuxt project and the prefix is as good as anyone.
Ordering posts by menu_order doesn’t work out of the box with the WP REST API. To enable this you need to add a filter to rest_{post_type}_collection_params
for each post type you want to order by menu_order.
Detecting the Safari browser: The user-agent of the Safari browser is “Safari”. This value is passed to indexOf() method to detect this value in the user-agent string. One additional check is required in the case of the Safari browser as the user-agent of the Chrome browser also includes the Safari browser’s user-agent. If both the user-agents of Chrome and Safari are in the user-agent, it means that the browser is Chrome, and hence the Safari browser value is discarded.
When considering using the user agent string to detect which browser is being used, your first step is to try to avoid it if possible. Start by trying to identify why you want to do it.
interact.js takes a slightly different approach compared to most drag and drop libraries. To give you as much control as possible, it tries to provide a simple, flexible API that gives you all the pointer event data you’ll need to move elements around.
The library doesn’t even do any moving at all! This is great because you decide exactly what feedback your users get. You can drag elements, draw on a canvas or (if you really need to) scroll the page.
A vanilla JavaScript library to create a draggable & resizable dialog popup without any frameworks or libraries (e.g. jQuery UI).
To move, drag from the title bar of the dialog box.
To resize, drag from any edge or any corner of the dialog box.
Technically they’re all machine learning models, but checkpoints are usually referred to just as models. All models are static, meaning they only know what they were trained on. In order for them to learn something new, they have to be (re)trained again, also known as finetuning.
Their differences in very rough terms:
Checkpoints are the big models that make images on their own.
Loras and all their variations like Lycoris are « mini models » that plug into a checkpoint and alter their outputs. They let checkpoints make styles, characters and concepts that the base checkpoint they’re used on doesn’t know or didn’t know very well.
Hypernetworks are an older and not as good implementation of the same paper and same concept as Loras.
Textual Inversions are sort of bookmarks or compilations of what a model already knows, they don’t necessarily teach something new but rearrange stuff that a model already knows in a way that it didn’t know how to arrange by itself.
SD 1.x, SD 2.x and SDXL are both different base checkpoints and also different model architectures. Think of them maybe as non backwards compatible consoles if that’s easier to understand. SD 1.5 is say both the NES itself but also one game for it. All SD 1.x based models are compatible with SD 1.x Loras and models for extensions like ControlNet. SD 2.X is the SNES, it’s a different architecture so 1.x models won’t be compatible with it, same for SDXL if you say that’s like the N64.
ControlNet models are also machine learning models that inject into the Stable Diffusion process and control the denoising process, they’re used with an image made by preprocessor. That image is be used to guide and control that denoising process, also hence the name.
All these models come in safetensors format. Safetensors is the standard for machine learning models, since they only contain the necessary data for diffusion, hence their name. .ckpt is the old model format that’s outdated, because it’s an unsafe format that can contain and execute malicious code.
Pruned models are models that have unnecessary weights and data removed. Weights are part of what the model learned in order to denoise noise to make an image. Say a model has a weight for alien = 0.00000000000000000001, it’s so minimal that it won’t do anything, but it’s still taking up space. Now multiply that for a lot of more useless weights, pruning removes all of them so only the relevant data is left.
FP16 models are smaller than FP32 models because they have lower precision, it’s basically like calculating pi with less numbers, you’ll get close enough results, almost exactly the same in most cases, but still not as precise. Yet the images from FP16 models are also not that different or worse, and A1111 converts models to FP16 by default when loading them anyway, for faster speed.
To use a model, place them in their specific folder inside the UI you’re using. For A1111 they go in stable-diffusion-webui\models in self explanatory folders for Lora, etc. and in stable-diffusion-webui\models\Stable-diffusion for checkpoints.
Both checkpoints and Loras can be used either for poses or for styles, depending on what they were trained on. Pose Loras are a thing for example.
The reason for your results is because you’re using SD 1.5 as a checkpoint. The base SD 1.5 checkpoint is almost a year old and the Lora you’re using was trained using not only newer checkpoints, but also checkpoints trained better on anime. I recommend a newer anime checkpoint for the image you’re trying to make. The base model field on Civitai models is really more like base architecture. Also it’s recommended to not go below 512 in resolution for SD 1.x models and not below 1024 for SDXL models.