There are four kinds of hackers
- Kickass- working for NSA, and apparently China in hacking Google, and Russia in hacking Clintonian Dynasty from Castle Rock. Not to forget Israelis who did Stuxnet
- Dumbass- FBI paying a lot to decrypt an iPhone and using Wikileaks data to make statements a week BEFORE elections
- Wiseass- CIA describing Russian hack efforts AFTER elections
Meanwhile in Moscow and St Petersburg and Romania, old friends are meeting over glasses of vodka and asking each other whether they did the “Trump” hack and if they got paid in gold, diamonds or casino chips
- Abort (A): Terminate the operation/program and return to the system command prompt. In hindsight this was not a good idea as the program would not do any cleanup (such as completing writing of other files). “Abort” was necessary because early DOS did not implement “Fail”. It may have remained necessary for poorly written software for which “Fail” would have caused a loop that would have repeatedly invoked the critical error handler with no other way to exit.
- Retry (R): DOS would attempt the operation again. “Retry” made sense if the user could rectify the problem. To continue the example above, if the user simply forgot to close the drive latch, they could close it, retry, and the system would continue where it left off.
- Ignore (I) (older versions of DOS): Return success status to the calling program/routine, despite the failure of the operation. For instance, a disk read error could be ignored and DOS would return whatever data was in the read buffer, which might contain some of the correct data from the disk. Attempting to use results after an “Ignore” was an undefined behavior. “Ignore” did not appear in cases where it was impossible for the data to be used; for instance, a missing disk could not be ignored because that would require DOS to construct and return some kind of file descriptor that worked in further “read” calls. This is not available if DOS cannot read any sector from the first sector of a floppy disk or a partition of a hard disk to the last sector of the root directory.
- Fail (F) (DOS 3.3 and later): Return failure status to the calling program/routine. “Fail” returned an error code to the program, similar to other errors such as file not found. The program could then gracefully recover from the problem.
In the lines above replace DOS with LOVER, and you have the algorithm
If you look closely at https://www.youtube.com/watch?v=M2K_2MQij9Q at this point India can finally catch Dawood Ibrahim
not including political parties or state governments here is a list of top 5 unethical companies in India in terms of controversies
- Company 1 -cant say because they bought ads on my media channel
- Company 2- censored because they are friends to the government
- Company 3- threatened with goondas as well as law suits
- Company 4- included only so we can play with it’s stock price
- Company 5- a company on its way down and no friends to help
That is how the way the financial media reports news on companies in India. This is because unlike the United States , our SEBI ( equivalent to SEC) does not investigate insider trading with the same zeal as Preet Bharara does.
Sorry for the spam.
Based on the open source project at http://ggplot.yhathq.com/ here is small training ppt created by one of our wonderful summer interns Sarah
Hat Tip to http://www.amazon.com/Grammar-Graphics-Statistics-Computing/dp/0387245448
Leland Wilkinson the inventor of Grammar of Graphics now works for Tableau Software
Dear Mr CEO
I am sorry but I need to go. I tried to be your sexy data scientist but you would really not know. I cant make bricks without clay. I cant make models without data. I can do cluster analysis but trust me you dont want me to make an algorithm for cluster analysis. Stop saying algorithm so often.
We need databases to store data. There are many kinds of data and there are many kinds of database. There are no right or wrong answers. There is no perfect software. At best we optimize our software hardware and our people for our constraints of time, money and business refresh speed.
Please dont be paranoid. Trust some people, but read more often. Don’t trust too much on technology vendors. They have a job to do. Don’t trust consultants too much. They have to eat bread. Use the Delphi method to reach consensus. But there is a cost to perfect information.
R and Python and SAS do the same thing in different manners. Yes, there is a cost benefit to every software. Open source is not free. Paid software is not the best. People matter. Analytics and models and statistics require more subjectivity than you have been told.
Please pay invoices on time
The Sexiest Data Scientist