start new:
tmux
start new with session name:
tmux new -s myname
function youtube(){ | |
// Setup OAuthServiceConfig | |
var oAuthConfig = UrlFetchApp.addOAuthService("youtube"); | |
oAuthConfig.setAccessTokenUrl("https://www.google.com/accounts/OAuthGetAccessToken"); | |
oAuthConfig.setRequestTokenUrl("https://www.google.com/accounts/OAuthGetRequestToken?scope=http%3A%2F%2Fgdata.youtube.com%2F"); | |
oAuthConfig.setAuthorizationUrl("https://www.google.com/accounts/OAuthAuthorizeToken"); | |
oAuthConfig.setConsumerKey("anonymous"); | |
oAuthConfig.setConsumerSecret("anonymous"); | |
// Setup optional parameters to point request at OAuthConfigService. The "twitter" |
angular.module('d3AngularApp', ['d3']) | |
.directive('d3Bars', ['$window', '$timeout', 'd3Service', | |
function($window, $timeout, d3Service) { | |
return { | |
restrict: 'A', | |
scope: { | |
data: '=', | |
label: '@', | |
onClick: '&' | |
}, |
groupBy('source) { | |
_.sortBy('links) | |
.reverse | |
.mapStream[(String,Int), (String, Int, Int, Int)] | |
(('destination, 'links) -> ('destination, 'links, 'rank, 'gap)) { destLinks => | |
destLinks.scanLeft(None: Option[(String, Int, Int, Int)]) { | |
(prevRowOut: Option[(String,Int,Int,Int)], thisRow: (String, Int)) => | |
val (dest, links) = thisRow | |
prevRowOut match { | |
case None => Some((dest, links, 1, 0)) // rank 1, gap 0 -- not exactly what you wanted... |
groupBy('source) { | |
_.sortBy('links) | |
.reverse | |
.mapStream[(String,Int), (String, Int, Int, Int)] | |
(('destination, 'links) -> ('destination, 'links, 'rank, 'gap)) { destLinks => | |
destLinks.scanLeft(None: Option[(String, Int, Int, Int)]) { | |
(prevRowOut: Option[(String,Int,Int,Int)], thisRow: (String, Int)) => | |
val (dest, links) = thisRow | |
prevRowOut match { | |
case None => Some((dest, links, 1, 0)) // rank 1, gap 0 -- not exactly what you wanted... |
from sqlalchemy.dialects import registry | |
from sqlalchemy.engine import reflection | |
from sqlalchemy.connectors.pyodbc import PyODBCConnector | |
from sqlalchemy.dialects.postgresql.base import ( | |
PGDialect, PGTypeCompiler, PGCompiler, PGDDLCompiler, DOUBLE_PRECISION, | |
INTERVAL, TIME, TIMESTAMP) | |
from sqlalchemy import MetaData | |
import sqlalchemy.types as sqltypes | |
from sqlalchemy.schema import SchemaItem | |
from sqlalchemy.sql import Select, text, bindparam |
... or Why Pipelining Is Not That Easy
Golang Concurrency Patterns for brave and smart.
By @kachayev
# -*- mode: ruby -*- | |
# vi: set ft=ruby : | |
# Vagrant on AWS Example | |
# Brian Cantoni | |
# This sample sets up 1 VM ('delta') with only Java installed. | |
# Adjustable settings | |
CFG_TZ = "US/Pacific" # timezone, like US/Pacific, US/Eastern, UTC, Europe/Warsaw, etc. |
Picking the right architecture = Picking the right battles + Managing trade-offs
Many sites have a requirement to use an enterprise-wide certificate authority. They either have a "real" signing cert that chains to a public root CA or an internal root (usually air-gapped) which only signs issuing CA certificates, one per PKI application.
Puppet does not have a currently supported configuration which fits into this model. The [existing documentation][existing] describes using an "external CA" instead of Puppet's internally generated CA (which is a combined self-signed Root and issuing CA in one), but requires that the user turn off Puppet's issuance code and leaves the whole certificate generation and distribution workflow as an "exercise to the reader".
The procedure in this document describes a supportable configuration which bridges the gap between these two positions: it is possible to use Puppet's internal signing code to issue certificates from an intermediate CA cert which was externally generated and signed. There are a