How to optimize loading time of Emacs faster than 1 second?
ChatGPT:
There are several ways to optimize the startup time of Emacs, here are a few things you can try:
Use emacs -q: This starts emacs with no init file, which can help you identify if any packages or settings in your init file are causing slow startup.
Use emacs --debug-init: This starts emacs with the --debug-init flag, which can help you identify any errors in your init file that might be causing slow startup.
Use use-package: This is a package that can help you manage and optimize your packages. It allows you to lazy-load packages, which means that packages are only loaded when they are needed, rather than at startup.
Use straight.el package manager: This package manager optimizes package loading by compiling packages ahead-of-time and using a local cache, which can speed up package loading times.
Use gc-cons-threshold: This variable controls the amount of memory that Emacs will use before triggering garbage collection. By default, it's set to 800000 bytes. You can increase this value to reduce the number of garbage collection cycles and thus speed up the startup time.
Optimize your init file: Make sure your init file is well-organized and free of unnecessary settings or packages. You can also use the benchmark-init package to measure the time it takes for different parts of your init file to load and identify any slow parts.
Use profiler package: This package can help you to identify bottlenecks in your init file by profiling the execution time of various functions.
Use precompiled bytecode: This allows you to precompile your .el files to .elc files, which can speed up the loading process. you can use emacs -batch -f batch-byte-compile to precompile all your .el files.
It's important to note that these steps can help you optimize your emacs startup time, but it's not always possible to get emacs to start up in less than 1 second. The time required to load emacs depends on many factors, such as the speed of your computer and the number of packages you have installed.
ChatGPT:
There are several ways to optimize the startup time of Emacs, here are a few things you can try:
Use emacs -q: This starts emacs with no init file, which can help you identify if any packages or settings in your init file are causing slow startup.
Use emacs --debug-init: This starts emacs with the --debug-init flag, which can help you identify any errors in your init file that might be causing slow startup.
Use use-package: This is a package that can help you manage and optimize your packages. It allows you to lazy-load packages, which means that packages are only loaded when they are needed, rather than at startup.
Use straight.el package manager: This package manager optimizes package loading by compiling packages ahead-of-time and using a local cache, which can speed up package loading times.
Use gc-cons-threshold: This variable controls the amount of memory that Emacs will use before triggering garbage collection. By default, it's set to 800000 bytes. You can increase this value to reduce the number of garbage collection cycles and thus speed up the startup time.
Optimize your init file: Make sure your init file is well-organized and free of unnecessary settings or packages. You can also use the benchmark-init package to measure the time it takes for different parts of your init file to load and identify any slow parts.
Use profiler package: This package can help you to identify bottlenecks in your init file by profiling the execution time of various functions.
Use precompiled bytecode: This allows you to precompile your .el files to .elc files, which can speed up the loading process. you can use emacs -batch -f batch-byte-compile to precompile all your .el files.
It's important to note that these steps can help you optimize your emacs startup time, but it's not always possible to get emacs to start up in less than 1 second. The time required to load emacs depends on many factors, such as the speed of your computer and the number of packages you have installed.
Go slowly and simplify your task with Pandas .pdf
700.3 KB
15 pandas functions for 90% of your work : cheatsheet with examples pdf
#notes #pandas #cheatsheet
@pyguru
#notes #pandas #cheatsheet
@pyguru
🔥1
Forwarded from Chrome's Cavern (Monochrome)
This media is not supported in your browser
VIEW IN TELEGRAM
Here's something that I just found. if you wanna run a video inside a terminal and not on a video player (for random reason) then its actually pretty simple.
You can also use
mpv --vo=tct <your video file/youtube url etc etc
>
You can also use
--no-config if you wanna skip mpv from loading your config as well.🔥1
🎉 Free Cybersecurity Certifications 🧨
1. NSE 1,2 & 3
[https://training.fortinet.com]
2. Introduction to Cybersecurity
[https://netacad.com/courses/cybersecurity/introduction-cybersecurity]
3. Cybersecurity Essentials
[https://netacad.com/courses/cybersecurity/cybersecurity-essentials]
4. Networking Essentials
[https://netacad.com/courses/networking/networking-essentials]
5. Android Bug Bounty Hunting: Hunt Like a Rat
[https://codered.eccouncil.org/course/android-bug-bounty-hunting-hunt-like-a-rat]
6. Ethical Hacking Essentials (EHE)
[https://codered.eccouncil.org/course/ethical-hacking-essentials]
7. Website Hacking Techniques
[https://codered.eccouncil.org/course/website-hacking-techniques]
8. Digital Forensics Essentials (DFE)
[https://codered.eccouncil.org/course/digital-forensics-essentials]
9. Network Defense Essentials (NDE)
[https://codered.eccouncil.org/course/network-defense-essentials]
10. Introduction to Dark Web, Anonymity, and Cryptocurrency
[https://codered.eccouncil.org/course/introduction-to-dark-web-anonymity-and-cryptocurrency]
11. Certified in Cybersecurity℠ - CC
[https://isc2.org/Certifications/CC]
12. 20+ Free AWS Certs Related to Cybersecurity
[https://explore.skillbuilder.aws/pages/16/learner-dashboard]
1. NSE 1,2 & 3
[https://training.fortinet.com]
2. Introduction to Cybersecurity
[https://netacad.com/courses/cybersecurity/introduction-cybersecurity]
3. Cybersecurity Essentials
[https://netacad.com/courses/cybersecurity/cybersecurity-essentials]
4. Networking Essentials
[https://netacad.com/courses/networking/networking-essentials]
5. Android Bug Bounty Hunting: Hunt Like a Rat
[https://codered.eccouncil.org/course/android-bug-bounty-hunting-hunt-like-a-rat]
6. Ethical Hacking Essentials (EHE)
[https://codered.eccouncil.org/course/ethical-hacking-essentials]
[
8. Digital Forensics Essentials (DFE)
[https://codered.eccouncil.org/course/digital-forensics-essentials]
9. Network Defense Essentials (NDE)
[https://codered.eccouncil.org/course/network-defense-essentials]
10. Introduction to Dark Web, Anonymity, and Cryptocurrency
[https://codered.eccouncil.org/course/introduction-to-dark-web-anonymity-and-cryptocurrency]
11. Certified in Cybersecurity℠ - CC
[https://isc2.org/Certifications/CC]
12. 20+ Free AWS Certs Related to Cybersecurity
[https://explore.skillbuilder.aws/pages/16/learner-dashboard]
Netacad
Introduction to Cybersecurity
Learn cybersecurity basics to protect your personal digital life and the biggest security challenges companies face today.
🔥1
This media is not supported in your browser
VIEW IN TELEGRAM
This made my day 😍
Surprisingly Unknown Linux Tools
https://www.youtube.com/watch?v=s0qx0UFw4MQ
https://www.youtube.com/watch?v=s0qx0UFw4MQ
YouTube
Linux Tools: A ℂ𝕠𝕞𝕗𝕪 Guide
In today's behemoth of a video, Denshi tries his luck at a grab-bag of Linux tools that both casual and advanced users may find useful.
Submit fanart at alex@denshi.org
00:00 Preface and Fanart
00:36 Intro
01:34 Network Manager Applet
02:32 cbatticon
03:07…
Submit fanart at alex@denshi.org
00:00 Preface and Fanart
00:36 Intro
01:34 Network Manager Applet
02:32 cbatticon
03:07…
Search Engine for Hackers
1. Censys.io
2. Shodan.io
3. Viz.Greynoise.io/table
4. Zoomeye.org
5. Fofa.so
6. Onyphe.io
7. App.binaryedge.io
8. Hunter.io
9. Wigle.net
10. Ghostproject.fr
#recontools #links
1. Censys.io
2. Shodan.io
3. Viz.Greynoise.io/table
4. Zoomeye.org
5. Fofa.so
6. Onyphe.io
7. App.binaryedge.io
8. Hunter.io
9. Wigle.net
10. Ghostproject.fr
#recontools #links
Forwarded from Computer Science and Programming (Abdulaziz Gaibullayev)
This media is not supported in your browser
VIEW IN TELEGRAM
Gen-1: The Next Step Forward for Generative AI
Use words and images to generate new videos out of existing
Introducing Gen-1: a new AI model that uses language and images to generate new videos out of existing ones.
https://research.runwayml.com/gen1
⭐️ Project:
https://research.runwayml.com/gen1
✅ Paper:
https://arxiv.org/abs/2302.03011
📌Request form:
https://docs.google.com/forms/d/e/1FAIpQLSfU0O_i1dym30hEI33teAvCRQ1i8UrGgXd4BPrvBWaOnDgs9g/viewform
👉@computer_science_and_programming
Use words and images to generate new videos out of existing
Introducing Gen-1: a new AI model that uses language and images to generate new videos out of existing ones.
https://research.runwayml.com/gen1
⭐️ Project:
https://research.runwayml.com/gen1
✅ Paper:
https://arxiv.org/abs/2302.03011
📌Request form:
https://docs.google.com/forms/d/e/1FAIpQLSfU0O_i1dym30hEI33teAvCRQ1i8UrGgXd4BPrvBWaOnDgs9g/viewform
👉@computer_science_and_programming
Free University Courses/Materials for CyberSecurity
1)Internet History, Technology, and Security: https://online.umich.edu/courses/internet-history-technology-and-security/
2)Network and Computer Security: https://ocw.mit.edu/courses/6-857-network-and-computer-security-spring-2014/pages/lecture-notes-and-readings/
3)Computer Networks: https://ocw.mit.edu/courses/6-829-computer-networks-fall-2002/
4)Cybersecurity Management: https://itmasters.edu.au/free-short-course-cybersecurity-management/
5)CISSP: https://itmasters.edu.au/free-short-course-cissp-updated/
6)Short Course for Penetration Testing: https://itmasters.edu.au/free-short-course-pen-testing/
7)Cloud Computing: https://www.coursera.org/specializations/cloud
8)Hardware Security: https://www.coursera.org/learn/hardware-security
9)CryptoGraphy: https://www.coursera.org/learn/crypto?action=enroll
10)Cybersecurity Risk Management: https://www.edx.org/course/cybersecurity-risk-management
11) Network Security: https://www.edx.org/course/network-security-2
12)Introduction to Computer Science: https://www.edx.org/course/introduction-computer-science-harvardx-cs50x
13)Introduction to Cybersecurity: https://www.edx.org/course/introduction-to-cybersecurity
14)Programming with Python: https://www.edx.org/course/cs50s-introduction-to-programming-with-python
15) )Network Security Foundation: https://www.edx.org/course/network-security-foundations
16)Cybersecurity Fundamentals: https://www.edx.org/course/cybersecurity-fundamentals
17)Intro To Cyber Attacks: https://www.classcentral.com/course/intro-cyber-attacks-9667
1)Internet History, Technology, and Security: https://online.umich.edu/courses/internet-history-technology-and-security/
2)Network and Computer Security: https://ocw.mit.edu/courses/6-857-network-and-computer-security-spring-2014/pages/lecture-notes-and-readings/
3)Computer Networks: https://ocw.mit.edu/courses/6-829-computer-networks-fall-2002/
4)Cybersecurity Management: https://itmasters.edu.au/free-short-course-cybersecurity-management/
5)CISSP: https://itmasters.edu.au/free-short-course-cissp-updated/
6)Short Course for Penetration Testing: https://itmasters.edu.au/free-short-course-pen-testing/
7)Cloud Computing: https://www.coursera.org/specializations/cloud
8)Hardware Security: https://www.coursera.org/learn/hardware-security
9)CryptoGraphy: https://www.coursera.org/learn/crypto?action=enroll
10)Cybersecurity Risk Management: https://www.edx.org/course/cybersecurity-risk-management
11) Network Security: https://www.edx.org/course/network-security-2
12)Introduction to Computer Science: https://www.edx.org/course/introduction-computer-science-harvardx-cs50x
13)Introduction to Cybersecurity: https://www.edx.org/course/introduction-to-cybersecurity
14)Programming with Python: https://www.edx.org/course/cs50s-introduction-to-programming-with-python
15) )Network Security Foundation: https://www.edx.org/course/network-security-foundations
16)Cybersecurity Fundamentals: https://www.edx.org/course/cybersecurity-fundamentals
17)Intro To Cyber Attacks: https://www.classcentral.com/course/intro-cyber-attacks-9667
online.umich.edu
Internet History, Technology, and Security
The impact of technology and networks on our lives, culture, and society continues to increase. The very fact that you can take this course from anywhere in the world requires a technological infrastructure that was designed, engineered, and built over the…