Skip to content

Instantly share code, notes, and snippets.

Lance Roggendorff lroggendorff

View GitHub Profile
@lroggendorff
lroggendorff / meh.md
Last active Aug 29, 2015
Testing things
View meh.md

----|---- wat | nao are you kidding | me will this render | as a table

@lroggendorff
lroggendorff / magick.md
Last active Aug 29, 2015
So this is fun...
View magick.md

The setup:

In [11]: import mock

In [12]: stuff = mock.MagicMock()

In [13]: stuff.__contains__.return_value = False

In [14]: "thing" in stuff
View pickone.md

Tour Libraries

Ratings based on a four thumbs up scale. Because monkeys.

Shepherd

Documentation

👍👍

@lroggendorff
lroggendorff / load-path-nonsense.md
Created Oct 17, 2012
Local Gem Development $LOAD_PATH Shinanigans
View load-path-nonsense.md

Use bundle gem gemname to generate your gem's doc structure:

.
├── Gemfile
├── LICENSE.txt
├── README.md
├── Rakefile
├── gemname.gemspec
├── lib
│   ├── gemname
@lroggendorff
lroggendorff / example.html
Created Aug 8, 2012
The thing with the other thing
View example.html
<script>
Modernizr.load([
{
load: '//ajax.googleapis.com/ajax/libs/jquery/1.7.2/jquery.min.js',
complete: function () {
if ( !window.jQuery ) {
Modernizr.load('/scripts/jquery-1.7.2.min.js');
}
}
@lroggendorff
lroggendorff / locator-api-response.json
Created Jan 30, 2012
AIDS.gov Locator API Examples
View locator-api-response.json
{
"title": "HIV/AIDS Prevention & Service Providers",
"link": "http://locator.dev/data?zip=37206",
"updated": "2012-01-29T15:15:51-0600",
"stat": "ok",
"services": [
{
"title": "Search Results from CDC - Locate HIV/AIDS Testing Sites",
"link": "http://cdcnpin.org/hivTestLocatorFeed/feed.aspx?radius=5&zip=37206",
"author": "CDC NPIN",
View gist:877229
<script type="text/javascript" src="//www.hellobar.com/hellobar.js"></script>
<script type="text/javascript">
new HelloBar(1,9126);
</script>
<noscript>Help The Victims of the 8.9 Earthquake in Japan by Spreading Awareness and Aid. Visit http://goo.gl/wjZQz to donate.
</noscript>
View network_probs.txt
# What follows is two commands run on my Mac whilst connected to my corporate VPN
# Domain names and IP addresses masked to protect the innocent (I guess)
$ nslookup somedomain.com
Server: ##.##.##.##
Address: ##.##.##.##
Non-authoritative answer:
Name: somedomain.com
Address: ##.##.##.##
You can’t perform that action at this time.