I hereby claim:
- I am vmalloc on github.
- I am vmalloc (https://keybase.io/vmalloc) on keybase.
- I have a public key whose fingerprint is C73F 6BEC 873D 2C13 6C9F E0B2 0464 700A 8589 A747
To claim this, I am signing this object:
| import time | |
| import argparse | |
| import urllib2 | |
| import lxml.etree | |
| import subprocess | |
| parser = argparse.ArgumentParser() | |
| parser.add_argument("--sleep", default=1, type=int) | |
| parser.add_argument("server") |
| #!/usr/bin/env sh | |
| ## | |
| # This is script with usefull tips taken from: | |
| # https://github.com/mathiasbynens/dotfiles/blob/master/.osx | |
| # | |
| # install it: | |
| # curl -sL https://raw.github.com/gist/2108403/hack.sh | sh | |
| # |
| (defun dash-current-symbol () | |
| (interactive) | |
| (browse-url (format "dash://%s" (current-word))) | |
| ) | |
| (global-set-key (kbd "C-c d") 'dash-current-symbol) |
| def retries(num_retries): | |
| """ | |
| Generates a sequence of retry attempt objects, helping you write nicer retry code: | |
| Example usage: | |
| for retry in retries(num_retries): | |
| if not retry.first: | |
| logging.debug("Retrying...") | |
| try: | |
| some_operation() |
| #! /usr/bin/python | |
| # -*- mode: python -*- | |
| from cStringIO import StringIO | |
| from collections import OrderedDict | |
| import argparse | |
| import requests | |
| import subprocess | |
| import sys | |
| import tempfile |
| #! /bin/bash -x -e | |
| ## Example usage: | |
| # $ ./experiment_with numpy matplotlib | |
| UUID=`echo $* | sha1sum | awk '{print $1}'` | |
| VENV_DIR=/tmp/temp_venv_$UUID | |
| devpi use |
I hereby claim:
To claim this, I am signing this object:
~/.config/karabiner/karabiner.json).complex_modifications. It will have a key rules that takes a list ("rules": [...]).{
"description": "Change Caps Lock + I/J/K/L to Arrow Keys",