I hereby claim:
- I am jbjonesjr on github.
- I am jbjonesjr (https://keybase.io/jbjonesjr) on keybase.
- I have a public key whose fingerprint is CC5E 3EAB E861 06D1 244C 0800 DA86 F4C3 FADD 677D
To claim this, I am signing this object:
/* | |
This is a bit of a contrived example, but attempts to show the level and relationships of data that I am working with. | |
Three-tiered snippet example. Logic: | |
A person has an office full of file cabinets and folders. They own these items. | |
Any Person has a zero to many of these Cabinets and Folders. There are also default's specified for ease of access when dealing with a person's possessions. | |
A FileCabinet of course has a group of folders that are available under it, and it is as well tied to a Person. If the Person were to be deleted(morbid), then the FileCabinet would as well. |
center: new OpenLayers.LonLat(-7837508, 4537508), | |
map: { | |
allOverlays:false, | |
maxExtent: new OpenLayers.Bounds(-20037508.3427892, -20037508.3427892, 20037508.3427892, 20037508.3427892), | |
numZoomLevels: 8, | |
maxResolution: 156543.0339, | |
controls: [new OpenLayers.Control.LayerSwitcher(), new OpenLayers.Control.TouchNavigation({ | |
dragPanOptions: { | |
enableKinetic: true | |
} |
I hereby claim:
To claim this, I am signing this object:
Using worker: ip-172-31-28-38:13050229-71f3-4afa-8a8b-255d81e6ab6d (1a0ed9e:travis:default) | |
system_info | |
Build system information | |
Build language: java | |
Build image provisioning date and time | |
Thu Feb 5 15:09:33 UTC 2015 | |
Operating System Details | |
Distributor ID: Ubuntu | |
Description: Ubuntu 12.04.5 LTS | |
Release: 12.04 |
The following debugging information was generated by Atom Beautify
on Sun Jan 17 2016 17:42:40 GMT-0500 (EST)
.
Truffle Hog find security keys: http://windowsitpro.com/security/truffle-hog-finds-security-keys-hidden-github-code
Git Prime: Smaller checkins are better https://blog.gitprime.com/check-in-frequency-and-codebase-impact-the-surprising-correlation/
Open source related links:
When building an external authentication connection to GitHub Enterprise, your options are CAS, LDAP, and SAML.
Active Directory (AD) (specifically Active Directory Federation Services (ADFS)) support both access via LDAP as well as SAML. Those should be the two primary integration solutions, reserving CAS only for a very unique usecase that you more-or-less need to custom code.
The key points to know when deciding on LDAP are:
single account
to be used amongst tools, it does require you to login to GitHub Enterprise even if your user has already been authenticated in other tools.A guide for getting started and best practices for teams new to, or improving their interactions with, GitHub
GitHub's features and capabilities
This document is meant to help new teams to GitHub familiarize themselves with the features and platform, as well as start to explore some of the best practices. While not a complete exploration, it's meant as a introduction to the key tenets of using GitHub for your business. For teams and organizations that desire more one on one support, GitHub Professional Services has many different options available to customize tools, training, and process to best meet your needs. The GitHub offerings listed in the diagram above are just a sampling of the various capabilities and we'd love to create a customized offering to meet your specific organizational needs.
Talk slow.
Welcome: Good morning! Thanks for coming to the panel. I'm Jamie Jones,