On 2016年12月22日 22時38分, subhabangal...@gmail.com wrote:
I am getting the error:
UnicodeDecodeError: 'utf8' codec can't decode byte 0x96 in position 15: invalid
start byte
The following is a reflex of mine, whenever I encounter Python 2 Unicode errors:
import sys
reload(sys)
sys.setdefaultencod
Peter Pearson writes:
> I don't know any definition of "matrix range" that fits this description.
> Is it possible that someone means "rank"?
Yes, the rank is the dimension of the range unless I'm mistaken. I
think rank is what was meant.
To find the rank with Gaussian elimination, I guess you
On Sat, 24 Dec 2016 02:27:05 -0800 (PST), raulmaqueda6...@gmail.com wrote:
> I do not know how to do this exercise, does anyone help me?
>
> Define the matrix_range (m) function that returns the range of an
> array calculated by the Gaussian method.
>
> It should work with any number of rows and c
> What version of the sqlite3 libraries do you have? See
> https://github.com/ghaering/pysqlite/issues/85 for example.
>
> --
> regards,
> kushal
I was using the system default for Centos 6 which is 3.6.20. I loaded a
parallel version and now got 3.6 to build. Thanks!
--
https://mail.python.o
raulmaqueda6...@gmail.com wrote:
> I do not know how to do this exercise, does anyone help me?
If you have a specific, precise question, that's one thing.
Otherwise:
http://lmgtfy.com/?q=Academic+Dishonesty
Phil
--
AH#61 Wolf#14 BS#89 bus#1 CCB#1 SENS KOTC#4
h...@philb.ca http:/
Thank you Peter and Christ.
It is was a white space and the fix fixed it.
Many thanks.
On Friday, December 23, 2016 5:26 PM, Peter Otten <__pete...@web.de> wrote:
Val Krem via Python-list wrote:
> Here is the first few lines of the data
>
>
> s1.csv
> size,w1,h1
> 512,214,26
> 123,250,34
>
thinkwell writes:
> I'm trying to build Python 3.6 on Centos 6, and am successful in doing
> so, except for the sqlite3 library. I started with a brand new install
> of Centos 6 and installed devtoolset-2 to build with a newer
> compiler. But whether with default compiler or 4.82, I get the
> fol
raulmaqueda6...@gmail.com wrote:
> I do not know how to do this exercise, does anyone help me?
>
> Define the matrix_range (m) function that returns the range of an array
> calculated by the Gaussian method.
>
> It should work with any number of rows and columns. No punctuation will be
> given t
El sábado, 24 de diciembre de 2016, 11:27:16 (UTC+1), raulmaq...@gmail.com
escribió:
> I do not know how to do this exercise, does anyone help me?
>
> Define the matrix_range (m) function that returns the range of an array
> calculated by the Gaussian method.
>
> It should work with any number
I do not know how to do this exercise, does anyone help me?
Define the matrix_range (m) function that returns the range of an array
calculated by the Gaussian method.
It should work with any number of rows and columns. No punctuation will be
given to deliveries that do not respect this requirem
Chris Angelico writes:
> as a sysadmin, I have lots of control over the hashing, and very
> little on passwords. I could enforce a minimum password length, but I
> can't prevent password reuse, and I can't do much about the other
> forms of weak passwords.
Right, 2FA helps with re-use, and diffic
"Frank Millman" wrote in message news:o3lcfk$pah$1...@blaine.gmane.org...
By the way, I have realised how I ended up getting sidetracked by Blake2 in
the first place.
If you call up the online documentation for Python3.6 and select modules>h>
hashlib, it takes you straight to
15.2. hashl
"Steve D'Aprano" wrote in message
news:585d57d5$0$1587$c3e8da3$54964...@news.astraweb.com...
There is a stdlib PBKDF2. If you want to avoid third-party dependencies,
use that.
https://docs.python.org/3.4/library/hashlib.html#hashlib.pbkdf2_hmac
Thanks for the pointer.
From the docs - 15
On Sat, Dec 24, 2016 at 7:08 PM, Paul Rubin wrote:
> Chris Angelico writes:
>> Correct. However, weak passwords are ultimately the user's
>> responsibility, where the hashing is the server's responsibility.
>
> No, really, the users are part of the system and therefore the system
> designer must
Chris Angelico writes:
> Correct. However, weak passwords are ultimately the user's
> responsibility, where the hashing is the server's responsibility.
No, really, the users are part of the system and therefore the system
designer must take the expected behavior of actual users into account.
The
Steve D'Aprano writes:
> You say that as if two-factor auth was a panacea.
Of course it's not a panacea, but it helps quite a lot.
> That's the sort of thinking that leads to: ...
Beyond that, web browsers are the new Microsoft Windows with all of its
security holes and bloat and upgrade treadm
Steve D'Aprano :
> https://www.schneier.com/blog/archives/2005/10/scandinavian_at_1.html
EDITED TO ADD: Here's a related story. The Bank of New Zealand
suspended Internet banking because of phishing concerns. Now there's
a company that is taking the threat seriously.
That's the troub
17 matches
Mail list logo