If you encounter the following:
GitHub rate limit reached. To increase the limit use GitHub authentication.
Run jspm endpoint config github to set this up.
Sources :
#!/bin/sh | |
set -x | |
GITLAB_URL='http://ec2-xx-xx-xx-xx.ap-northeast-1.compute.amazonaws.com:81' | |
# docker | |
sudo apt-get update | |
sudo apt-get install -y libsqlite3-dev | |
sudo apt-get install -y docker.io |
import numpy as np | |
import sklearn.datasets | |
import sklearn.ensemble | |
import xgboost | |
N_TRAIN = 60000 | |
NS_ITERATIONS = [2 ** k for k in range(8)] | |
MODELS = [ | |
('RandomForestClassifier', sklearn.ensemble.RandomForestClassifier, {'n_jobs': -1}), |
import math._ | |
1L // Long型の 1 | |
1:Long // Long型の 1 | |
127:Byte // Byte型の 127 | |
32767:Short // Short型の 32767 | |
(1+2).toLong // Long型への変換 | |
(2+3) toLong // Long型への変換 |
#!/bin/env python | |
# | |
# Usage: | |
# ./dump.py | |
# - It will stop after period specified seconds or after getting max size. | |
# - log is sent to s3 bucket. | |
# - notification | |
# > EC2 needed profile (s3 put) | |
# > You need edit INFRA s3 bucket policy. | |
# |
If you encounter the following:
GitHub rate limit reached. To increase the limit use GitHub authentication.
Run jspm endpoint config github to set this up.
Sources :
// Note: You must restart bin/webpack-watcher for changes to take effect | |
var path = require('path') | |
var webpack = require('webpack') | |
var merge = require('webpack-merge') | |
var config = require('./shared.js') | |
var devconfig = { | |
devtool: 'sourcemap', |
On your rails project root
git clone https://gist.github.com/Jwata/4e5122fa43d719400914716955872cc2 authenticity_token_to_csrf_token
rails runner ./authenticity_token_to_csrf_token/calculate.rb 'some_authenticity_token'
=> 2PqIaqHja/+PllheC7mStH2X+y/E69LlyS5AIfd9MVs= # this is the csrf token stored in your session
version_info: "0" | |
resources: | |
- "@type": type.googleapis.com/envoy.api.v2.Cluster | |
name: targetCluster | |
connect_timeout: 0.25s | |
lb_policy: ROUND_ROBIN | |
type: EDS | |
eds_cluster_config: | |
service_name: localservices | |
eds_config: |
module.exports = function (grunt) { | |
// show elapsed time at the end | |
require('time-grunt')(grunt); | |
// load all grunt tasks | |
require('load-grunt-tasks')(grunt); | |
//MODIFIED: add require for connect-modewrite | |
var modRewrite = require('connect-modrewrite'); | |
grunt.initConfig({ |
Linux kernel user namespace support provides additional security by enabling
a process--and therefore a container--to have a unique range of user and
group IDs which are outside the traditional user and group range utilized by
the host system. Potentially the most important security improvement is that,
by default, container processes running as the root
user will have expected
administrative privilege (with some restrictions) inside the container but will
effectively be mapped to an unprivileged uid
on the host.