Нашёл прикольный ресурс — data-science-art от Allison Horst : обучающие комиксы и иллюстрации по Data Science, статистике, линейной регрессии, библиотекам и другим крутым темам.
Всё это сопровождается классной графикой, которая разбавляет сухость формул и превращает сложные темы в понятные истории.
Нашёл прикольный ресурс — data-science-art от Allison Horst : обучающие комиксы и иллюстрации по Data Science, статистике, линейной регрессии, библиотекам и другим крутым темам.
Всё это сопровождается классной графикой, которая разбавляет сухость формул и превращает сложные темы в понятные истории.
Meanwhile, a completely redesigned attachment menu appears when sending multiple photos or vides. Users can tap "X selected" (X being the number of items) at the top of the panel to preview how the album will look in the chat when it's sent, as well as rearrange or remove selected media. In the United States, Telegram's lower public profile has helped it mostly avoid high level scrutiny from Congress, but it has not gone unnoticed. You may recall that, back when Facebook started changing WhatsApp’s terms of service, a number of news outlets reported on, and even recommended, switching to Telegram. Pavel Durov even said that users should delete WhatsApp “unless you are cool with all of your photos and messages becoming public one day.” But Telegram can’t be described as a more-secure version of WhatsApp. In December 2021, Sebi officials had conducted a search and seizure operation at the premises of certain persons carrying out similar manipulative activities through Telegram channels. Channels are not fully encrypted, end-to-end. All communications on a Telegram channel can be seen by anyone on the channel and are also visible to Telegram. Telegram may be asked by a government to hand over the communications from a channel. Telegram has a history of standing up to Russian government requests for data, but how comfortable you are relying on that history to predict future behavior is up to you. Because Telegram has this data, it may also be stolen by hackers or leaked by an internal employee.
from us