Tumgik
#engineering assessment
Text
Tumblr media
Renovation Project - Melia/Hyatt Regency Grand Reserve Puerto Rico
Following damage to the Melia resort WGPITTS assisted Monarch Capital in the acquisition and construction management of the $32 million renovation of the Melia Resort and conversion to the 700,000 sf 400 room Hyatt Regency Grand Reserve, Rio Grande Puerto Rico. The acquisition entailed a full engineering assessment of the facility including all structural damage, power distribution, water testing, mechanical, electrical, plumbing systems, kitchen equipment, mold studies, thermal and moisture Testing roofing assessments and the associated cost to complete and repair all components.
0 notes
ya-gurl-emily · 23 days
Text
The awesome thing about college is that being there is miserable, and not being there is worse.
Nifty!
2 notes · View notes
snaildotexe · 1 year
Text
Software Technical Interview Review List
Data Structures
Arrays (and Java List vs ArrayList)
String
Stack
Queue
LinkedList
Algorithms
Sorting (Bubblesort, Mergesort, Quicksort)
Recursion & Backtracking
Linear and Binary Search
String/Array algos
Tree traversal
Dynamic Programming
Graph algos (DFS, BFS, Dijksta's and Kruskals)
OOP fundamentals
Polymorphism
Inheritance
Encapsulation
Data abstraction
SOLID and GRASP
Explanations & example questions:
Strings and Arrays [ 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 ]
Stacks and Queues [ 1 | 2 ]
LinkedList [ 1 | 2 ]
Sorting & searching [ 1 | 2 | 3 | 4 | 5 | 6 | 7 ]
Recursion and Backtracking [ 1 | 2 | 3 | 4 ]
Dynamic Programming [ 1 | 2 | 3 | 4]
Graphs [ 1 | 2 | 3 ]
Tree [ 1 | 2 ]
General DS&A info and questions [ 1 | 2 | 3 | 4 | 5 ]
OOP review & questions [ 1 | 2 | 3 ]
11 notes · View notes
sallytwo · 4 months
Text
the ship disaster dreams are fine most of the time but you do NOTTTTT !!!! bring my best friend into this. don’t do that!!!!
3 notes · View notes
designernishiki · 1 year
Text
anyway. nishiki and majima are both borderline and i could do a whole case study on either of them about it. send tweet
#im pretty flexible about most hcs regarding mental disorders and such but this take is one im like pretty fucking steadfast on#and I could write. an absurd amount about it. cause psychoanalyzing the shit out of characters is literally like. what I do for a living#and I have a weird special interest in abnormal psych and the dsm-5 in my closet and a psychologist for a mother and etc#but yeah so#inquire further at your own risk because I will talk. I will talk a lot#the only issue with majima is that I can’t evaluate his childhood and family life and just. his fundamental years of development in general#which is a pretty big deal when it comes to assessing for any personality disorder#nishiki oh yeah I absolutely can. but yeah we know basically nothing about majimas fundamental years. all I can really do is reverse#engineer so to speak based on how he is as an adult and what causes a person to do the things he does / be the way he is / etc#but of course that’d all be very very loose and hypothetical. FASCINATING to think about to me but obviously would have to be taken with a#huge grain of salt and be considered very very speculative#but I can say for sure that he didn’t have a stable and perfect home life/family life growing up I think that’s pretty safe to assume#anything more detailed than that is way more speculative but. yeah. I don’t think he was just. Normal. up until he was 20#his identity issues run way too deep for me to accept that concept#anyway I need to shut up#majima#nishiki#rambling
11 notes · View notes
nnctales · 6 months
Text
Exploring the Diverse Landscape of Surveys: Unveiling Different Types
Introduction Civil engineering, as a discipline, relies heavily on accurate and comprehensive data to design, plan, and construct various infrastructure projects. Surveys play a crucial role in gathering this essential information, providing engineers with the data needed to make informed decisions. There are several types of surveys in civil engineering, each serving a unique purpose. In this…
Tumblr media
View On WordPress
2 notes · View notes
kohakhearts · 3 months
Text
ugh the third-party sharing setting is so stupid. idk if it's actually related or if this happened somewhere else along the line, but when i just went to change it, my other opted-in privacy settings had been toggled off. thanks tumblr! awesome! i love that!!
1 note · View note
pallases · 1 year
Text
okay i finally found a longer screw that fits and upside down test makes me think this gear combo seems more promising. i have however not yet tested it to see if it can actually drive bc the room i was in was abt to have a class come wrdhdjgn but fingers crossed so hard i will actually have a breakdown if this does not work 😭😭
3 notes · View notes
geologicllc · 2 years
Text
Tumblr media
GeoLogic LLC
GeoLogic is an independent geological consulting and engineering firm, proud to serve a wide spectrum of clientele, from foresters to attorneys, appraisers, economic geologists, and large equity firms.
Address: 4372 Shallowford Industrial Parkway, Marietta, GA 30066, USA Phone: 770-824-4212 Website: https://geologicllc.net/
4 notes · View notes
cdrforaustralia · 2 years
Text
Professional CDR Report Writers Available in Australia
Tumblr media
If you want your report to count, get it accepted by the Engineers Australia
If you want your report to count, get it accepted by the EA. Professional CDR Report Writers Available in Australia CDRforAustralia is staffed by professional writers, engineers, and IT specialists that work together to guarantee that your CDR report is error-free, original, and specific to your needs in order to earn you a passing grade from Engineers Australia. Read more
2 notes · View notes
agilebrains · 1 day
Text
Tumblr media
JIRA Administrator Projects
Excel as a JIRA Administrator with our specialized projects training. Master user management, workflow customization, and advanced configurations to optimize JIRA for seamless project management. Elevate your skills today!
Visit Our Website:
Address - PHILADELPHIA, Pennsylvania PA
0 notes
nengineerings · 1 day
Text
TRAFFIC ANALYST NEAR ME
A Traffic Impact Study consultant from N Engineering evaluates the effects of proposed developments on local traffic. Our experts provide comprehensive analyses, identify potential issues, and recommend solutions to ensure safe, efficient traffic flow. Visit nengineering.com for professional guidance on traffic impact assessments and to ensure your project complies with all regulatory requirements.
Tumblr media
0 notes
jcmarchi · 27 days
Text
New tool empowers users to fight online misinformation
New Post has been published on https://thedigitalinsider.com/new-tool-empowers-users-to-fight-online-misinformation/
New tool empowers users to fight online misinformation
Tumblr media Tumblr media
Most people agree that the spread of online misinformation is a serious problem. But there is much less consensus on what to do about it.
Many proposed solutions focus on how social media platforms can or should moderate content their users post, to prevent misinformation from spreading.
“But this approach puts a critical social decision in the hands of for-profit companies. It limits the ability of users to decide who they trust. And having platforms in charge does nothing to combat misinformation users come across from other online sources,” says Farnaz Jahanbakhsh SM ’21, PhD ’23, who is currently a postdoc at Stanford University.
She and MIT Professor David Karger have proposed an alternate strategy. They built a web browser extension that empowers individuals to flag misinformation and identify others they trust to assess online content.
Their decentralized approach, called the Trustnet browser extension, puts the power to decide what constitutes misinformation into the hands of individual users rather than a central authority. Importantly, the universal browser extension works for any content on any website, including posts on social media sites, articles on news aggregators, and videos on streaming platforms.
Through a two-week study, the researchers found that untrained individuals could use the tool to effectively assess misinformation. Participants said having the ability to assess content, and see assessments from others they trust, helped them think critically about it.
“In today’s world, it’s trivial for bad actors to create unlimited amounts of misinformation that looks accurate, well-sourced, and carefully argued. The only way to protect ourselves from this flood will be to rely on information that has been verified by trustworthy sources. Trustnet presents a vision of how that future could look,” says Karger.
Jahanbakhsh, who conducted this research while she was an electrical engineering and computer science (EECS) graduate student at MIT, and Karger, a professor of EECS and a member of the Computer Science and Artificial Intelligence Laboratory (CSAIL), detail their findings in a paper presented this week at the ACM Conference on Human Factors in Computing Systems.
Fighting misinformation
This new paper builds off their prior work about fighting online misinformation. The researchers built a social media platform called Trustnet, which enabled users to assess content accuracy and specify trusted users whose assessments they want to see.
But in the real world, few people would likely migrate to a new social media platform, especially when they already have friends and followers on other platforms. On the other hand, calling on social media companies to give users content-assessment abilities would be an uphill battle that may require legislation. Even if regulations existed, they would do little to stop misinformation elsewhere on the web.
Instead, the researchers sought a platform-agnostic solution, which led them to build the Trustnet browser extension.
Extension users click a button to assess content, which opens a side panel where they label it as accurate, inaccurate, or question its accuracy. They can provide details or explain their rationale in an accompanying text box.
Users can also identify others they trust to provide assessments. Then, when the user visits a website that contains assessments from these trusted sources, the side panel automatically pops up to show them.
In addition, users can choose to follow others beyond their trusted assessors. They can opt to see content assessments from those they follow on a case-by-case basis. They can also use the side panel to respond to questions about content accuracy.
“But most content we come across on the web is embedded in a social media feed or shown as a link on an aggregator page, like the front page of a news website. Plus, something we know from prior work is that users typically don’t even click on links when they share them,” Jahanbakhsh says.
To get around those issues, the researchers designed the Trustnet Extension to check all links on the page a user is reading. If trusted sources have assessed content on any linked pages, the extension places indictors next to those links and will fade the text of links to content deemed inaccurate.
One of the biggest technical challenges the researchers faced was enabling the link-checking functionality since links typically go through multiple redirections. They were also challenged to make design decisions that would suit a variety of users.
Differing assessments
To see how individuals would utilize the Trustnet Extension, they conducted a two-week study where 32 individuals were tasked with assessing two pieces of content per day.
The researchers were surprised to see that the content these untrained users chose to assess, such as home improvement tips or celebrity gossip, was often different from content assessed by professionals, like news articles. Users also said they would value assessments from people who were not professional fact-checkers, such as having doctors assess medical content or immigrants assess content related to foreign affairs.
“I think this shows that what users need and the kinds of content they consider important to assess doesn’t exactly align with what is being delivered to them. A decentralized approach is more scalable, so more content could be assessed,” Jahanbakhsh says.
However, the researchers caution that letting users choose whom to trust could cause them to become trapped in their own bubble and only see content that agrees with their views.
This issue could be mitigated by identifying trust relationships in a more structured way, perhaps by suggesting a user follow certain trusted assessors, like the FDA.
In the future, Jahanbakhsh wants to further study structured trust relationships and the broader implications of decentralizing the fight against misinformation. She also wants to extend this framework beyond misinformation. For instance, one could use the tool to filter out content that is not sympathetic to a certain protected group.
“Less attention has been paid to decentralized approaches because some people think individuals can’t assess content,” she says. “Our studies have shown that is not true. But users shouldn’t just be left helpless to figure things out on their own. We can make fact-checking available to them, but in a way that lets them choose the content they want to see.”
0 notes
softlabsgroup05 · 2 months
Text
Tumblr media
Discover the process for integrating AI into existing software systems with our simplified workflow. Follow stages including system analysis, AI model selection, integration planning, development, testing, and deployment. Simplify the integration of AI capabilities into your software for enhanced functionality. Perfect for software developers, architects, and IT professionals. Stay updated with Softlabs Group for more insights into AI integration strategies!
0 notes
safetycourses2022 · 3 months
Text
Tumblr media
0 notes
marciodpaulla-blog · 3 months
Text
Cybersecurity Report: Protecting DHS Employees from Scams Targeting Personal Devices
🔒 DHS Cybersecurity Alert! 🔒 Scammers targeting personal devices threaten national security. Our new report reveals these risks & offers robust solutions - MFA, security software, cybersecurity training & more. Safeguard yourself & critical operations!
Introduction The digital age has ushered in an era of unprecedented connectivity and technological advancements, but it has also given rise to a new breed of threats that transcend traditional boundaries. Cybercriminals are constantly evolving their tactics, exploiting vulnerabilities in both organizational systems and personal devices to gain unauthorized access, steal sensitive data, and…
Tumblr media
View On WordPress
1 note · View note