This document has moved!
It's now here, in The Programmer's Compendium. The content is the same as before, but being part of the compendium means that it's actively maintained.
|# Author: Dagang Wei (github.com/weidagang)|
|# Created: 2016-11-19|
|# Last modified: 2016-11-27|
|# License: MIT|
|# Self link: https://gist.github.com/weidagang/1b001d0e55c4eff15ad34cc469fafb84|
|# This code demonstrates the core algorithm for distributed MVCC based cross-row|
|# transactions. The algorithm is built on top of a distributed key-value database|
|# Source: http://www.powershellmagazine.com/2013/07/18/pstip-how-to-switch-off-display-with-powershell/|
|# Turn display off by calling WindowsAPI.|
|# SendMessage(HWND_BROADCAST,WM_SYSCOMMAND, SC_MONITORPOWER, POWER_OFF)|
|# HWND_BROADCAST 0xffff|
|# WM_SYSCOMMAND 0x0112|
|# SC_MONITORPOWER 0xf170|
|# POWER_OFF 0x0002|
Let's solve the following physics problem using Symbolism, a computer algebra library for C#.
One strategy in a snowball fight is to throw a first snowball at a high angle over level ground. While your opponent is watching the first one, you throw a second one at a low angle and timed to arrive at your opponent before or at the same time as the first one.
Assume both snowballs are thrown with a speed of 25.0 m/s.
The first one is thrown at an angle of 70.0° with respect to the horizontal.
有幸拜读了《【原创】深度分析Twitter Heron》 ( http://www.longda.us/?p=529 )一文，十分感动国内社区对Heron的关注。但此文中有诸多重要问题值得商榷，我谨在此行文指出，还望能够帮助大家更好的理解Heron。转载烦请注明出处：https://gist.github.com/maosongfu/c3aeb1bb5eb7b39fcdc5
You got your hands on some data that was leaked from a social network and you want to help the poor people.
Luckily you know a government service to automatically block a list of credit cards.
The service is a little old school though and you have to upload a CSV file in the exact format. The upload fails if the CSV file contains invalid data.
The CSV files should have two columns, Name and Credit Card. Also, it must be named after the following pattern: