- Handle CardConnect 401's
- Basic product management
async Task Main() | |
{ | |
// Initialize settings | |
var transformFileSettings = new TransformFileSettings { BlobPath = "some/path", BusinessUnitId = 1 }; | |
var uploadToBlobSettings = new UploadToBlobSettings { ContainerName = "some-container" }; | |
var firstTask = new TransformFile(transformFileSettings, Guid.Empty); | |
var secondTask = new UploadToBlob(uploadToBlobSettings, firstTask.TaskId); | |
var tasks = new List<IJobExecutionTask> { firstTask, secondTask }; |
Integration Process | |
Initial Assessment | |
primary goals determined -> System Evaluation | |
System Evaluation | |
has customer portal -> Portal Assessment | |
no customer portal -> Feature Selection | |
Portal Assessment |
Home | |
timeout -> Idle Loop | |
Idle Loop | |
activate -> Bot Selection | |
Bot Selection | |
select clean -> Clean | |
select guide -> Guide | |
select serve -> Serve | |
Clean | |
timeout -> Idle Loop |
actionable* | |
STAGE -> staged | |
staged | |
SCHEDULE -> scheduled | |
SKIP -> skipped | |
scheduled | |
PROCESS -> processing | |
CANCEL -> cancelled | |
processing | |
SUCCESS -> processed |
const fetchData = () => | |
delay( | |
Math.floor(Math.random() * 100) % 2 === 0 ? "staged" : "scheduled", | |
1000 | |
); | |
const actionableAccountMachine = Machine( | |
{ | |
id: "root", | |
initial: "idle", |
// Available variables: | |
// - Machine | |
// - interpret | |
// - assign | |
// - send | |
// - sendParent | |
// - spawn | |
// - raise | |
// - actions |
// Available variables: | |
// - Machine | |
// - interpret | |
// - assign | |
// - send | |
// - sendParent | |
// - spawn | |
// - raise | |
// - actions |
{ | |
"cmd": "update", | |
"method": "regression", | |
"conditions": { | |
"AR": 1, | |
"KS": 1, | |
"WY": 1, | |
"SD": 0, | |
"CA": 0, | |
"NV": 1, |
In August 2007 a hacker found a way to expose the PHP source code on facebook.com. He retrieved two files and then emailed them to me, and I wrote about the issue:
http://techcrunch.com/2007/08/11/facebook-source-code-leaked/
It became a big deal:
http://www.techmeme.com/070812/p1#a070812p1
The two files are index.php (the homepage) and search.php (the search page)