Modern Software Engineering – Part 3: Documentation
“I have only made this letter longer because I have not had the time to make it shorter.” – Blaise PascalContinue reading on Better Programming »
Read moreBounds on the incomplete beta function (beta CDF)
The incomplete beta function is defined by It is called incomplete because the limit of integration doesn’t necessarily run all the way up to 1. When z = 1 the incomplete beta function is simply the beta function discussed in the previous post [1]. The incomplete beta function is proportional
Read moreUpper and lower bounds on the beta function
The beta function B(x, y) is defined by and is the normalizing constant for the beta probability distribution. It is related to the gamma function via The beta function comes up often in applications. It can be challenging to work with, however, and so estimates for the function are welcome.
Read morenth root of n!
Last week the function came up in a blog post. as the solution to the equation n! = bn. After writing that post I stumbled upon an article [1] that begins by saying, in my notation, The function b(x) … has many applications in pure and applied mathematics. The article mentions a
Read moreActivation functions and Iverson brackets
Neural network activation functions transform the output of one layer of the neural net into the input for another layer. These functions are nonlinear because the universal approximation theorem, the theorem that basically says a two-layer neural net can approximate any function, requires these functions to be nonlinear. Activation functions
Read morePrototyping a Small Guidance Select Clone With ExLLama Logits Bias
Photo by Joshua Woroniecki on UnsplashIn our last article, we dived deep into the internals of the guidance library. In this one, we will use the obtained knowledge to create a PR into the exllama repository, where we reproduce one of the functionalities of guidance.The final idea of this study is
Read moreWriting Professional Python Logs
Best practices and essential tips for effective Python logging in your projectsIn this post, we will discuss how structlog can help you write logs that assist you in your daily work and enforce certain best practices to ensure consistency in logging throughout your project.We will also explore common logging challenges and how
Read moreA Java SDK Proof of Concept for Dagger.io
A few weeks ago, I decided to dedicate some time to explore the dagger.io project. The dagger.io project defines itself as a “programmable CI/CD engine that runs your pipelines in containers” and I believe that Dagger is worth considering for at least two reasons:Firstly, cloud-based CI systems such as Github Actions,
Read moreCayley graphs in Mathematica
The previous post mentioned the group S4, the group of all permutations of a set with four elements. This post will show a way to visualize this group. The Mathematica command CayleyGraph[ SymmetricGroup[4], VertexLabels -> Placed["Name", Center], VertexSize -> 0.4] generates the graph below. This is an interesting image, but
Read morePermutations and centralizers in Mathematica
I had a fleeting thought about how little I use group theory when I realize I used it just this week. A couple days ago I needed to know which permutations of 4 elements commute with reversal. If r takes a sequence and reverses it, I need to find all permutations
Read more