Launch the node TCP server for FastAGI:
~$ node path/to/fastagi.js
Add a context for FastAGI testing:
[fastagi-test]
#include <SoftwareSerial.h> | |
SoftwareSerial mySerial(2, 3); //RX, TX | |
//Ligando o Shield GSM SIM900. | |
int powerkey = 5; | |
int statuspin = 6; | |
int pinState = 0; | |
//Definindo Botao: |
double RTgoertzelFilter(int sample, double freq) { | |
static double s_prev = 0.0; | |
static double s_prev2 = 0.0; | |
static double totalpower = 0.0; | |
static int N = 0; | |
double coeff,normalizedfreq,power,s; | |
normalizedfreq = freq / SAMPLEFREQUENCY; | |
coeff = 2*cos(2*M_PI*normalizedfreq); | |
s = sample + coeff * s_prev - s_prev2; | |
s_prev2 = s_prev; |
## | |
## @author Jacky Alcine <me@jalcine.me> | |
## @see [TODO: Add URL to post about bit.ly URLs.] | |
## | |
## Add in Bit.ly URL support to pages. | |
require "bitly" | |
# Ensure use of new API. | |
Bitly.use_api_version_3 |
<html> | |
<head> | |
</head> | |
<body> | |
<form onsubmit="return false;"> | |
<input id="textfield" value="www" onchange=" | |
var basedomain = document.getElementById('basedomain').value; | |
var value = this.value; | |
var finalurl = 'http://'+value+'.'+basedomain; | |
alert('Tentado acessar: '+finalurl); |
program httpstream; | |
uses | |
Forms, | |
Ustream in 'Ustream.pas' {Fstream}; | |
{$R *.res} | |
begin | |
Application.Initialize; |
FastSerialPort0(Serial); | |
FastSerialPort2(serialGPS); | |
FastSerialPort1(serialIMU); | |
Encoder encoder(2,3); | |
void loop(){ | |
Serial.println(readGPS(true)); | |
Serial.println(readIMU()); |
#include "Arduino.h" | |
#include "DallasTemperature.h" | |
#include "EtherCard.h" | |
#include "OneWire.h" | |
#include "Wire.h" | |
#include "DS1307new.h" | |
extern HardwareSerial Serial; | |
#define thermometerPin 4 //DS18B20 wired to Digital pin 2 |
Launch the node TCP server for FastAGI:
~$ node path/to/fastagi.js
Add a context for FastAGI testing:
[fastagi-test]
Date: 17 Aug 2013 00:24:45 -0000 | |
From: "D. J. Bernstein" <djb@cr.yp.to> | |
To: cryptography@randombit.net | |
Subject: Re: [cryptography] urandom vs random | |
Aaron Toponce writes: | |
> Cryptographers don't like the idea that it's possible, even if it's | |
> excessively remote, and highly unprobable. This is why you see suggestions | |
> to use /dev/random for long term SSH, SSL and OpenPGP keys. |
<?xml version="1.0" encoding="utf-8"?> | |
<manifest xmlns:android="http://schemas.android.com/apk/res/android" | |
package="__PACKAGE__" | |
android:versionCode="1" | |
android:versionName="1.0"> | |
<supports-screens | |
android:smallScreens="true" | |
android:normalScreens="true" | |
android:largeScreens="true" |