I hereby claim:
- I am aramgutang on github.
- I am kotot (https://keybase.io/kotot) on keybase.
- I have a public key ASA5hK0bwW_C6w_RzrBUT_W7Rn9rjNwX8j5wPTQ9ANGCvwo
To claim this, I am signing this object:
#!/usr/bin/env python | |
""" | |
Use pip to get a list of local packages to check against one or more package | |
indexes for updated versions. | |
""" | |
import pip | |
import sys, xmlrpclib | |
from cStringIO import StringIO | |
from distutils.version import StrictVersion, LooseVersion | |
from subprocess import Popen, PIPE |
""" | |
My answer was: "1 vowel; 3-5 digits; letters in ascending order, but sequence | |
can restart after first 2 if rest of letters are unique. #googlenexus #pattern" | |
Though it may seem a bit iffy, this is the most specific pattern I could find | |
that would validate all strings marked as "yes" and invalidate all strings | |
marked as "no". After 5 hours, I'm not prepared to explore this puzzle any | |
further. | |
The following code verifies that my solution holds true. |
drop table load_list; | |
create table load_list ( | |
ll_file varchar, | |
ll_graph varchar, | |
ll_state int default 0, -- 0 not started, 1 going, 2 done | |
ll_started datetime, | |
ll_done datetime, | |
ll_host int, | |
ll_work_time integer, | |
ll_error varchar, |
# The semaphore alphabet. | |
# The first character represents number of flags held straight up, and so on, going clockwise. | |
# Info taken from: http://en.wikipedia.org/wiki/Flag_semaphore | |
alpha = { | |
'00002000': ' ', | |
'10100000': '#', | |
'00001100': 'A', | |
'00001010': 'B', | |
'00001001': 'C', | |
'10001000': 'D', |
#!/bin/bash | |
. /etc/rc.conf | |
. /etc/rc.d/functions | |
. /etc/conf.d/virtuoso | |
VIRTUOSO_DATA=${VIRTUOSO_DATA-/var/lib/virtuoso/db} | |
VIRTUOSO_CONF=${VIRTUOSO_CONF-${VIRTUOSO_DATA}/virtuoso.ini} | |
VIRTUOSO_ARGS=${VIRTUOSO_ARGS-} | |
#!/usr/bin/env bash | |
while [ 1 ]; do | |
# The --password-store=basic is there to avoid the KDE Wallet access | |
# request dialog on start-up. | |
google-chrome --password-store=basic --app=http://www.ingress.com/intel?ll=-33.781201,150.619812\&z=10 & | |
# Get the process ID, so we can kill it later | |
chrome_pid=$! | |
sleep 3 | |
# Get the X window ID of the process we just started so we can resize it. |
I hereby claim:
To claim this, I am signing this object: