gg=G
=
, the indent command can take motions. So, gg
to get the start of the file, =
to indent, G
to the end of the file, gg=G
.http://stackoverflow.com/questions/506075/how-do-i-fix-the-indentation-of-an-entire-file-in-vi
A repository of notes; by noto, for noto. Made public so noto can read it from anywhere. It won't make any sense to you.
gg=G
=
, the indent command can take motions. So, gg
to get the start of the file, =
to indent, G
to the end of the file, gg=G
..flv
extension. The file will be in location with randomly chosen directory names, e.g., /private/var/folders/Lb/Lbis5JtsGb0VIR-vYYdZ4E+++TI/TemporaryItems/FlashTmp0
.$ sudo find /private/var/folders -name 'FlashTmp*'
/private/var/folders/Lb/Lbis5JtsGb0VIR-vYYdZ4E+++TI/TemporaryItems/FlashTmp0
$ sudo cp /private/var/folders/Lb/Lbis5JtsGb0VIR-vYYdZ4E+++TI/TemporaryItems/FlashTmp0 ~/Desktop/movie.flv
$ sudo chmod 644 ~/Desktop/movie.flv
1 | bkblk | the BK is not in the way |
2 | bknwy | the BK is not in the BR's way |
3 | bkon8 | the BK is on rank 8 in a position to aid the BR |
4 | bkona | the BK is on file A in a position to aid the BR |
5 | bkspr | the BK can support the BR |
6 | bkxbq | the BK is not attacked in some way by the pro- moted WP |
7 | bkxcr | the BK can attack the critical square (b7) |
8 | bkxwp | the BK can attack the WP |
9 | blxwp | B attacks the WP (BR in direction x = -1 only) |
10 | bxqsq | one or more Black pieces control the queening square |
11 | cntxt | the WK is on an edge and not on a8 |
12 | dsopp | the kings are in normal opposition |
13 | dwipd | the WK distance to intersect point is too great |
14 | hdchk | there is a good delay because there is a hidden check |
15 | katri | the BK controls the intersect point |
16 | mulch | B can renew the check to good advantage |
17 | qxmsq | the mating square is attacked in some way by the promoted WP |
18 | r2ar8 | the BR does not have safe access to file A or rank 8 |
19 | reskd | the WK can be reskewered via a delayed skewer |
20 | reskr | the BR alone can renew the skewer threat |
21 | rimmx | the BR can be captured safely |
22 | rkxwp | the BR bears on the WP (direction x = -1 only) |
23 | rxmsq | the BR attacks a mating square safely |
24 | simpl | a very simple pattern applies |
25 | skach | the WK can be skewered after one or more checks |
26 | skewr | there is a potential skewer as opposed to fork |
27 | skrxp | the BR can achieve a skewer or the BK attacks the WP |
28 | spcop | there is a special opposition pattern present |
29 | stlmt | the WK is in stalemate |
30 | thrsk | there is a skewer threat lurking |
31 | wkcti | the WK cannot control the intersect point |
32 | wkna8 | the WK is on square a8 |
33 | wknck | the WK is in check |
34 | wkovl | the WK is overloaded |
35 | wkpos | the WK is in a potential skewer position |
36 | wtoeg | the WK is one away from the relevant edge |
I wanted to demonstrate that distance-based methods should have a hard time distinguishing some classes (say the libras UCI data set) and not others (say the iris UCI data set) with a visualization. S.R. suggested:
Steps to do this in MATLAB:
G is now a Nx2 matrix (N=number of samples). The rest of the process involves plotting the lines to connect neighbors. You can do that in MATLAB, but I don't know a particularly fast way.
:cnoreabbr html runtime! syntax/2html.vim