This template is analogous to the traditional for(i = 0; i < x; i++) loop in NiFi Data flow.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# | |
# to use this, run `docker-compose up` in the directory holding this gist. | |
# or wget/curl the file and pipe it it into `docker-compose up` | |
# | |
version: "3.5" | |
services: | |
reverse-proxy: |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# .bash_profile | |
# Copy this file on the desired machine. | |
# This script will change your iterm tab color and the background for that tab. | |
# Requirements | |
# - iterm as terminal | |
# - a profile named Prod in iterm. You can configure it how ever you want. A profile can be found in Preferences -> Profiles | |
Analytics track you, but they also keep local files really useful for forensics to gather evidence against you.
Because of course, you need to know if people actually use it when it's developed by a PR firm.
Google Analytics tracks a lot of your moves and stored locally in a cache then uploaded to Google servers. Every action is logged.
Caveat
The tables in this cheatsheet only make sense after you study all thes mentioned data structures and algorithms below.
Do not memorize them, learn how the underlying algorithms work, read the source.
This cheat sheet is just a quick reference to give an broad brush strokes overview of how the most frequently-used data structures and algorithms relate to each other, in terms of time and space complexity.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import org.junit.Before; | |
import org.junit.Test; | |
import java.util.HashMap; | |
import java.util.Map; | |
public class CRMClientTest { | |
private CRMClient crmClient; | |
private StubbedClientHandler clientHandler; |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/** | |
* Author: Ian Gallagher <[email protected]> | |
* | |
* This code utilizes jBCrypt, which you need installed to use. | |
* jBCrypt: http://www.mindrot.org/projects/jBCrypt/ | |
*/ | |
public class Password { | |
// Define the BCrypt workload to use when generating password hashes. 10-31 is a valid value. | |
private static int workload = 12; |