Die Energy-Charts bieten interaktive Grafiken zu: Stromproduktion, Stromerzeugung, Emissionen, Klimadaten, Spotmarktpreisen, Szenarien zur Energiewende und eine umfangreiche Kartenanwendung zu: Kraftwerken, Übertragungsleitungen und Meteodaten
Willkommen! Wir möchten mit dieser Webseite einen Beitrag zur Transparenz und Versachlichung der Diskussion um die Energiewende leisten.
Die Rohdaten werden von Wissenschaftlern des Fraunhofer-Institut für Solare Energiesysteme ISE aus zahlreichen Quellen stündlich oder täglich abgerufen und für die Darstellung aufbereitet.
Basically there are 4 steps:
Rename old table
Create new table
with partitioning
Add constraint on old table for it's proposed partition ranges
Attach old table as a partition to new partition table
Sounds easy right?
What about indexes? What about Triggers?
And guess what, there are other traps to watch out for!
-- Add the check constraint
alter table public.test_partition_10_25 add constraint test_partition_10_25_constraint CHECK (id >= 10 AND id <25) NOT VALID;
update pg_constraint pgc
SET convalidated = true
FROM pg_class c
WHERE
c.oid = pgc.conrelid
AND connamespace = 'public'::regnamespace::oid
AND c.relname = 'test_partition_10_25'
AND conname = 'test_partition_10_25_constraint';
@misc{zhang2024autocoderover,
title={AutoCodeRover: Autonomous Program Improvement},
author={Yuntong Zhang and Haifeng Ruan and Zhiyu Fan and Abhik Roychoudhury},
year={2024},
eprint={2404.05427},
archivePrefix={arXiv},
primaryClass={cs.SE}
}
A SequenceInputStream represents the logical concatenation of other input streams. It starts out with an ordered collection of input streams and reads from the first one until end of file is reached, whereupon it reads from the second one, and so on, until end of file is reached on the last of the contained input streams.
pgloader will keep a separate file of rejected data, but continue trying to copy good data in your database.
pgloader also implements data reformatting, a typical example of that being the transformation of MySQL datestamps 0000-00-00 and 0000-00-00 00:00:00 to PostgreSQL NULL value
A very common workflow is to index some data based on its embeddings and then given a new query embedding retrieve the most similar examples with k-Nearest Neighbor search. For example, you can imagine embedding a large collection of papers by their abstracts and then given a new paper of interest retrieve the most similar papers to it.
TLDR in my experience it ~always works better to use an SVM instead of kNN, if you can afford the slight computational hit
["slug" being an entity attribute]
Spring Data offers an existsBy query method, which we can define in the PostRepository, as follows:
1
2
3
4
5
6
@Repository
public interface PostRepository
extends JpaRepository<Post, Long> {
boolean existsBySlug(String slug);
}
[another] option to emulate existence is using a CASE WHEN EXISTS native SQL query:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
@Repository
public interface PostRepository
extends JpaRepository<Post, Long> {
@Query(value = """
SELECT
CASE WHEN EXISTS (
SELECT 1
FROM post
WHERE slug = :slug
)
THEN 'true'
ELSE 'false'
END
""",
nativeQuery = true
)
boolean existsBySlugWithCase(@Param("slug") String slug);
}
@Repository
public interface PostRepository extends BaseJpaRepository<Post, Long> {
@Query("""
select p
from Post p
where date(p.createdOn) >= :sinceDate
"""
)
@QueryHints(
@QueryHint(name = AvailableHints.HINT_FETCH_SIZE, value = "25")
)
Stream<Post> streamByCreatedOnSince(@Param("sinceDate") LocalDate sinceDate);
}
The FETCH_SIZE JPA query hint is necessary for PostgreSQL and MySQL to instruct the JDBC Driver to prefetch at most 25 records. Otherwise, the PostgreSQL and MySQL JDBC Drivers would prefetch all the query results prior to traversing the underlying ResultSet.
When Hibernate loads an object into a Session it creates a state snapshot of the current database state of the object, so that it can perform dirty checking against the snapshot.
As a read only object will never be modified, this snapshot is not needed and memory can be saved.
I think the ~/.mozilla/firefox/XXX.default-YYY/storage/default/https+++ZZZ.com/cache/https+++domain.com/ style dirs are the storage for what's called "service workers" which is persistent code related to each website that sends notifiications even if no related tab is open.
Suppose you have a favorite website that sells something, you might register with them that you're interested in a particular kind of product. A serviceworker for that site would be in the "ZZZ" folder named after that site, the code in there would run even if you don't have a tab open for that site. It's done so you can get a notification. In other cases it's some other code that the web designers don't want to have to reload each time you visit, caching it in your storage folder saves time and network.
You can see all your service workers in the Firefox menu: Help -> More troubleshooting information -> about:serviceworkers ( or load about:serviceworkers )
If you plan to store UUID values in a Primary Key column, then you are better off using a TSID (time-sorted unique identifier).
One such implementation is offered by the Hypersistence TSID OSS library, which provides a 64-bit TSID that’s made of two parts:
a 42-bit time component
a 22-bit random component
The random component has two parts:
a node identifier (0 to 20 bits)
a counter (2 to 22 bits)
The node identifier can be provided by the tsid.node system property when bootstrapping the application:
-Dtsid.node="12"
load-module module-echo-cancel aec_args="analog_gain_control=0 digital_gain_control=0"
+
in the file:
/etc/pulse/daemon.conf
or
~/.config/pulse/daemon.conf
Uncomment the line, and set to no:
flat-volumes = no
load-module module-echo-cancel source_name=logitechsource
and then at the bottom of the file add
set-default-source logitechsource
In this case I named the source logitechsource, but you can name it whatever you want and simply either restart pulseaudio.
Caused by: java.lang.NullPointerException
at java.util.Hashtable$Entry.setValue (Hashtable.java:1286)
at org.apache.maven.model.interpolation.StringVisitorModelInterpolator$ModelVisitor.visit (StringVisitorModelInterpolator.java:1429)
Seems to be resolved in 3.8.4. I'm now seeing a proper error message:
Resolving expression: '${project.version}': Detected the following recursive expression cycle in 'project.version': [version, revision] @ org.example:foo:${revision}, /experiment/pom.xml -> [Help 2]
‘-XX:MinRAMPercentage’ JVM argument will be used to compute Java heap size only if your overall available memory’s size in the physical server (or in the container) is less than 250MB
The following table shows the values that are used when -XX:+UseContainerSupport is set:
Less than 1 GB 50% <size>
1 GB - 2 GB <size> - 512 MB
Greater than 2 GB 75% <size>
The default heap size is capped at 25 GB
The default heap size for containers takes affect only when the following conditions are met:
The application is running in a container environment.
The memory limit for the container is set.
The -XX:+UseContainerSupport option is set, which is the default behavior.
We observed that generally the embedding representation is very rich and information dense. For example, reducing the dimensionality of the inputs using SVD or PCA, even by 10%, generally results in worse downstream performance on specific tasks.
moving:
to the end of the command: ctrl-e
to the begin of the command: ctrl-a
forward a word: alt-f
backword a word: alt-b
deleting:
from current cursor position to the end of word: ald-d
from current cursor position to the begin of word: clt-w
If you upgrade your spring-boot version to >= 2.3.0 you can enable the liveness and readiness probes by adding:
management:
health:
probes:
enabled: true
You need to manually import the ServerHttpSecurity invoke.
import org.springframework.security.config.web.server.invoke
/
import org.springframework.security.config.annotation.web.invoke
A Dockerfile that performs a Jib-like build is shown below:
# Jib uses Adoptium Eclipse Temurin (formerly AdoptOpenJDK).
FROM eclipse-temurin:11-jre
# Multiple copy statements are used to break the app into layers,
# allowing for faster rebuilds after small changes
COPY dependencyJars /app/libs
COPY snapshotDependencyJars /app/libs
COPY projectDependencyJars /app/libs
COPY resources /app/resources
COPY classFiles /app/classes
# Jib's extra directory ("src/main/jib" by default) is used to add extra, non-classpath files
COPY src/main/jib /
# Jib's default entrypoint when container.entrypoint is not set
ENTRYPOINT ["java", jib.container.jvmFlags, "-cp", "/app/resources:/app/classes:/app/libs/*", jib.container.mainClass]
CMD [jib.container.args]
v1.6.0 has been released with this feature; prefix your source image configuration with docker:// to use a base image stored in the Docker daemon.
Gradle: jib.from.image = 'docker://docker-image'
Maven: <from><image>docker://docker-image</image></from>
Avoid Pinning to latest
You shouldn’t consume the latest tag of an image whenever a more specific alternative is available. ...
If the author doesn’t maintain latest, you could end up with a heavily outdated image ... Several container ecosystem projects now warn against using latest for this reason.
You want to be using argon2id.
A KDF is a function that takes some input (in this case the user's password) and generates a key.
Good KDFs reduce this risk by being what's technically referred to as "expensive". Rather than performing one simple calculation to turn a password into a key, they perform a lot of calculations.
However, there's another axis of expense that can be considered - memory. If the KDF algorithm requires a significant amount of RAM, the degree to which it can be performed in parallel on a GPU is massively reduced.
/store/book/author $.store.book[*].author the authors of all books in the store
//author $..author all authors
/store/* $.store.* all things in store, which are some books and a red bicycle.
/store//price $.store..price the price of everything in the store.
//book[3] $..book[2] the third book
//book[last()] $..book[(@.length-1)]
$..book[-1:] the last book in order.
//book[position()<3] $..book[0,1]
$..book[:2] the first two books
//book[isbn] $..book[?(@.isbn)] filter all books with isbn number
//book[price<10] $..book[?(@.price<10)] filter all books cheapier than 10
//* $..* all Elements in XML document. All members of JSON structure.
The purgeServerSideCache method is deprecated and calling it has no effect - you'll get a console warning about that. This method is now replaced with refreshServerSideStore
E. Pinheiro, W. Weber, and L. Barroso. Proceedings of the 5th USENIX Conference on File and Storage Technologies, page 2--2. Berkeley, CA, USA, USENIX Association, (2007)
T. Reps, S. Horwitz, and M. Sagiv. Proceedings of the 22Nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, page 49--61. New York, NY, USA, ACM, (1995)
W. Scholz, T. Thüm, S. Apel, and C. Lengauer. Proceedings of the 15th International Software Product Line Conference, Volume 2, page 7:1--7:8. New York, NY, USA, ACM, (2011)
H. Kim, J. Choi, D. Choi, H. Choi, and P. Kim. Proceedings of the 2012 ACM Research in Applied Computation Symposium, page 310--315. New York, NY, USA, ACM, (2012)
G. Mishne, and M. de Rijke. Proceedings ot the 7th International Conference on Computer-Assisted Information Retrieval (Recherche d'Information et ses Applications) - RIAO 2004, page 539--554. CID, (April 2004)
H. Traunmüller. Experiments in speech processes, volume XII of Phonetic Experimental Research at the Institute of Linguistics, The Institute of Linguistics, University of Stockholm, Stockholm, (1991)
S. Gulwani, and M. Marron. Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data, page 803--814. New York, NY, USA, ACM, (2014)
B. Sacaleanu, and G. Neumann. Proceedings of the Eighth International Conference on Language Resources and Evaluation (LREC-2012), European Language Resources Association (ELRA), (2012)
M. Schuhmacher, and S. Ponzetto. Proceedings of the 7th ACM International Conference on Web Search and Data Mining, page 543--552. New York, NY, USA, ACM, (2014)
D. Pavlovic, P. Pepper, and D. Smith. Mathematics of Program Construction, volume 6120 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, (2010)
M. Baroni, and R. Zamparelli. Proceedings of the 2010 Conference on Empirical Methods in Natural Language Processing, page 1183--1193. Stroudsburg, PA, USA, Association for Computational Linguistics, (2010)
R. Khatchadourian, P. Greenwood, A. Rashid, and G. Xu. Proceedings of the 2009 IEEE/ACM International Conference on Automated Software Engineering, page 575--579. Washington, DC, USA, IEEE Computer Society, (2009)
C. Scholz, J. Illig, M. Atzmueller, and G. Stumme. Proceedings of the 25th ACM Conference on Hypertext and Social Media, page 279--284. Santiago, Chile, ACM, (September 2014)
C. Wang, J. Han, Y. Jia, J. Tang, D. Zhang, Y. Yu, and J. Guo. Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, page 203--212. New York, NY, USA, ACM, (2010)
J. Jardine, and S. Teufel. Proceedings of the 14th Conference of the European Chapter of the Association for Computational Linguistics, page 501--510. Gothenburg, Sweden, Association for Computational Linguistics, (April 2014)
J. Illig, B. Roth, and D. Klakow. Proceedings of the 14th Conference of the European Chapter of the Association for Computational Linguistics, volume 2: Short Papers, page 100--105. Gothenburg, Sweden, Association for Computational Linguistics, (April 2014)
D. Mollá, and B. Hutchinson. Proceedings of the EACL 2003 Workshop on EvaluationInitiatives in Natural Language Processing: are evaluation methods,metrics and resources reusable?, page 43--50. Association for Computational Linguistics, (2003)
Y. Chan, and D. Roth. Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies - Volume 1, page 551--560. Stroudsburg, PA, USA, Association for Computational Linguistics, (2011)
M. Banko, M. Cafarella, S. Soderland, M. Broadhead, and O. Etzioni. Proceedings of the 20th International Joint Conference on Artifical Intelligence, page 2670--2676. San Francisco, CA, USA, Morgan Kaufmann Publishers Inc., (2007)
H. Poon, and P. Domingos. Proceedings of the 2009 Conference on Empirical Methods in Natural Language Processing: Volume 1 - Volume 1, page 1--10. Stroudsburg, PA, USA, Association for Computational Linguistics, (2009)
T. Joachims. Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, page 133--142. New York, NY, USA, ACM, (2002)
C. Danescu-Niculescu-Mizil, R. West, D. Jurafsky, J. Leskovec, and C. Potts. Proceedings of the 22nd international conference on World Wide Web, page 307--318. Republic and Canton of Geneva, Switzerland, International World Wide Web Conferences Steering Committee, (2013)
S. Cohen, K. Stratos, M. Collins, D. Foster, and L. Ungar. Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), page 223--231. Jeju Island, Korea, Association for Computational Linguistics, (July 2012)
A. Heydarnoori, K. Czarnecki, and T. Bartolomei. ECOOP 2009 – Object-Oriented Programming, volume 5653 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, (2009)
M. Bruch, T. Schäfer, and M. Mezini. Proceedings of the 2006 OOPSLA workshop on eclipse technology eXchange, page 55--59. New York, NY, USA, ACM, (2006)
Q. He, B. Chen, J. Pei, B. Qiu, P. Mitra, and L. Giles. Proceedings of the 18th ACM conference on Information and knowledge management, page 957--966. New York, NY, USA, ACM, (2009)
B. Min, X. Li, R. Grishman, and S. Ang. Proceedings of the Fifth Text Analysis Conference (TAC 2012), National Institute of Standards and Technology (NIST), (November 2012)
A. Sun, R. Grishman, W. Xu, and B. Min. Proceedings of the Fourth Text Analysis Conference (TAC 2011), National Institute of Standards and Technology (NIST), (November 2011)
E. Alfonseca, K. Filippova, J. Delort, and G. Garrido. Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics: Short Papers - Volume 2, page 54--59. Stroudsburg, PA, USA, Association for Computational Linguistics, (2012)
I. Titov, and A. Klementiev. Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies, page 1445--1455. Portland, Oregon, USA, Association for Computational Linguistics, (June 2011)
H. Poon, and P. Domingos. Proceedings of the 2009 Conference on Empirical Methods in Natural Language Processing: Volume 1 - Volume 1, page 1--10. Stroudsburg, PA, USA, Association for Computational Linguistics, (2009)
J. Kang, K. Lerman, and L. Getoor. (2013)cite arxiv:1301.6277Comment: The 2013 International Conference on Social Computing, Behavioral-Cultural Modeling, & Prediction (SBP 2013).
R. Reichart, and A. Rappoport. Proceedings of the Thirteenth Conference on Computational Natural Language Learning, page 156--164. Stroudsburg, PA, USA, Association for Computational Linguistics, (2009)
D. Tikk, Z. Bánsághi, and G. Biró. Proc. of the 6th Int. Symp. of Hungarian Researchers on Computational Intelligence (HUCI 2005), page 267--276. Budapest, Hungary, (November 2005)
H. Ji, and R. Grishman. Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies - Volume 1, page 1148--1158. Stroudsburg, PA, USA, Association for Computational Linguistics, (2011)