This gist is updated daily via cron job and lists stats for npm packages:
- Top 1,000 most depended-upon packages
- Top 1,000 packages with largest number of dependencies
- Top 1,000 packages with highest PageRank score
include $(GOROOT)/src/Make.inc | |
GOFMT=gofmt -spaces=true -tabindent=false -tabwidth=4 | |
all: | |
$(GC) jsontest.go | |
$(LD) -o jsontest.out jsontest.$O | |
format: | |
$(GOFMT) -w jsontest.go |
#include <unistd.h> | |
#include <node.h> | |
#include <string.h> | |
#include <v8.h> | |
using namespace v8; | |
unsigned long long count = 0; | |
// native blocking/compute intensive function |
#Identify pupils. Based on beta 1 | |
import numpy as np | |
import cv2 | |
import time | |
cap = cv2.VideoCapture(0) #640,480 | |
w = 640 | |
h = 480 |
#!/bin/bash | |
sysctl net.core.rmem_default=268435456 | |
sysctl net.core.wmem_default=268435456 | |
sysctl net.core.rmem_max=268435456 | |
sysctl net.core.wmem_max=268435456 | |
sysctl net.core.netdev_max_backlog=100000 | |
sysctl "net.ipv4.tcp_rmem=4096 16384 134217728" | |
sysctl "net.ipv4.tcp_wmem=4096 16384 134217728" | |
sysctl "net.ipv4.tcp_mem=786432 1048576 268435456" |
package main | |
import ( | |
"io/ioutil" | |
"log" | |
"strings" | |
"net/http" | |
"encoding/json" | |
"fmt" | |
"time" |
package main | |
import ( | |
"fmt" | |
"gopkg.in/mgo.v2" | |
"gopkg.in/mgo.v2/bson" | |
"time" | |
) | |
type Content struct { |
Proposal for a lightning talk at the Reactive 2016.
Keep calm and like/retweet it on Twitter and star this Gist to vote on this talk.
I work at Grammarly. We like React and happily use it in our applications. However, sometimes something goes wrong and bugs creep into the code. Here comes testing. It helps make us confident about the quality of our code.
Go Ethereum (geth
) is a software for Ethereum. geth doesn't provide secure networking and it should do this, as this kind of built-in functionality would increase complexity and add attack surface to critical blockchain node software. Fortunately, in UNIX world, you can easily combine different tools to work together. The solution to this particular problem is to use VPN/tunneling software for secure connections. The tunnel will expose the server local connections to your own computer. The most popular tool for this (available in every OS by default, nowadays including Windows) is [Secure Shell (SSH)][1].
Note this question only addresses issues how to
[If you are not familiar with SSH please first read SSH tutorial how to safely do passwordless logins using SSH keys][2].
Start a node on server. When the node starts it binds its RPC port to localhost
(127.0.0.1
in IPv4, ::1
in IPv6). This is so-called loopback connection that you can only access from the computer itself and not from external netwo