Mountain Lion (10.8) has three main difference compared to Lion (10.7):
- XCode 4.4 does not install Command Line Tools by default
- X11 isn't available anymore
- The installed version of OpenSSL has some bugs
module BootstrapPaginationHelper | |
class LinkRenderer < WillPaginate::ActionView::LinkRenderer | |
protected | |
def page_number(page) | |
unless page == current_page | |
link(page, page, :rel => rel_value(page)) | |
else | |
link(page, "#", :class => 'active') | |
end |
var _ga = _ga || {}; | |
var _gaq = _gaq || []; | |
_ga.trackSocial = function(opt_pageUrl, opt_trackerName) { | |
twttr.ready(function (twttr) { | |
_ga.trackTwitter(opt_pageUrl, opt_trackerName); | |
}); | |
}; | |
_ga.trackTwitter = function(opt_pageUrl, opt_trackerName) { | |
var trackerName = _ga.buildTrackerName_(opt_trackerName); | |
try { |
# The following should prevent an ArgumentError "invalid %-encoding (...%)" exception from being raised for malformed URLs. | |
# To use this code simply drop this in your rails app initializers. | |
# See: https://github.com/rack/rack/issues/337 | |
# Taken from: http://stackoverflow.com/a/11162317/1075006 | |
module URI | |
major, minor, patch = RUBY_VERSION.split('.').map { |v| v.to_i } |
(function(wndw) { | |
var Browsers, OS, Platform, Versions, browser_name, browser_version, os, platform; | |
Versions = { | |
Firefox: /firefox\/([\d\w\.\-]+)/i, | |
IE: /msie\s([\d\.]+[\d])/i, | |
Chrome: /chrome\/([\d\w\.\-]+)/i, | |
Safari: /version\/([\d\w\.\-]+)/i, | |
Ps3: /([\d\w\.\-]+)\)\s*$/i, | |
Psp: /([\d\w\.\-]+)\)?\s*$/i | |
}; |
SELECT p.id_product, p.active, pl.name, GROUP_CONCAT(DISTINCT(cl.name) SEPARATOR ",") as categories, p.price, p.id_tax_rules_group, p.wholesale_price, p.reference, p.supplier_reference, p.id_supplier, p.id_manufacturer, p.upc, p.ecotax, p.weight, p.quantity, pl.description_short, pl.description, pl.meta_title, pl.meta_keywords, pl.meta_description, pl.link_rewrite, pl.available_now, pl.available_later, p.available_for_order, p.date_add, p.show_price, p.online_only, p.condition, p.id_shop_default | |
FROM ps_product p | |
LEFT JOIN ps_product_lang pl ON (p.id_product = pl.id_product) | |
LEFT JOIN ps_category_product cp ON (p.id_product = cp.id_product) | |
LEFT JOIN ps_category_lang cl ON (cp.id_category = cl.id_category) | |
LEFT JOIN ps_category c ON (cp.id_category = c.id_category) | |
LEFT JOIN ps_product_tag pt ON (p.id_product = pt.id_product) | |
WHERE pl.id_lang = 1 | |
AND cl.id_lang = 1 | |
AND p.id_shop_default = 1 |
// tries to execute the uri:scheme | |
function uriSchemeWithHyperlinkFallback(uri, href) { | |
// set up a timer and start it | |
var start = new Date().getTime(), | |
end, | |
elapsed; | |
// attempt to redirect to the uri:scheme | |
// the lovely thing about javascript is that it's single threadded. | |
// if this WORKS, it'll stutter for a split second, causing the timer to be off |
<!doctype html> | |
<html> | |
<body> | |
<style> | |
body, html { | |
height: 100%; | |
width: 100%; | |
} | |
</style> | |
<div id=mapcontainer style="width: 100%; height: 100%;"></div> |
<?php | |
/* separar el nombre completo en espacios */ | |
$tokens = explode(' ', trim($full_name)); | |
/* arreglo donde se guardan las "palabras" del nombre */ | |
$names = array(); | |
/* palabras de apellidos (y nombres) compuetos */ | |
$special_tokens = array('da', 'de', 'del', 'la', 'las', 'los', 'mac', 'mc', 'van', 'von', 'y', 'i', 'san', 'santa'); | |
$prev = ""; |
The attack detailed below has stopped (for the time being) and almost all network access for almost all customers have been restored. We're keeping this post and the timeline intact for posterity. Unless the attack resumes, we'll post a complete postmortem within 48 hours (so before Wednesday, March 26 at 11:00am central time).
Criminals have laid siege to our networks using what's called a distributed denial-of-service attack (DDoS) starting at 8:46 central time, March 24 2014. The goal is to make Basecamp, and the rest of our services, unavailable by flooding the network with bogus requests, so nothing legitimate can come through. This attack was launched together with a blackmail attempt that sought to have us pay to avoid this assault.
Note that this attack targets the network link between our servers and the internet. All the data is safe and sound, but nobody is able to get to it as long as the attack is being successfully executed. This is like a bunch of people