mvn install:install-file -Dfile=spark-redis-master-assembly-0.1.0.jar -DgroupId=com.redislabs -DartifactId=spark-redis -Dversion=0.5.1 -Dpackaging=jar
Put resolvers += Resolver.mavenLocal
in your build.sbt file
name := "Wordy"
public class LimitedQueue<E> extends LinkedBlockingQueue<E> | |
{ | |
public LimitedQueue(int maxSize) | |
{ | |
super(maxSize); | |
} | |
@Override | |
public boolean offer(E e) |
sudo yum install -f libtool | |
cd autoconf-2.68 | |
chmod +x configure | |
./configure | |
chmod +x build-aux/git-version-gen | |
sudo make | |
sudo make install | |
cd .. |
Reference: Token Based Authentication for Single Page Apps
I see a lot of discussions where cookies are pitted against access tokens. While we’ve all been burned by systems that store a session ID in a cookie, and that cookie is not secured and thus gets stolen. That sucks, but its not a reason to use tokens. Its a reason to avoid non-secure, non-https cookies.
Notes for startup
var mqtt = require('mqtt');
var lodash = require('lodash');
var client = mqtt.connect({ host: 'localhost', port: 1883 });
client.on('connect', function () {
console.log('Connected')
client.subscribe('presence');
});
'use strict'; | |
class Binder {} | |
Binder.getAllMethods = function(instance, cls) { | |
return Object.getOwnPropertyNames(Object.getPrototypeOf(instance)) | |
.filter(name => { | |
let method = instance[name]; | |
return !(!(method instanceof Function) || method === cls); | |
}); |
WSDL schemes and docs: