- Handle CardConnect 401's
- Basic product management
| async Task Main() | |
| { | |
| // Initialize settings | |
| var transformFileSettings = new TransformFileSettings { BlobPath = "some/path", BusinessUnitId = 1 }; | |
| var uploadToBlobSettings = new UploadToBlobSettings { ContainerName = "some-container" }; | |
| var firstTask = new TransformFile(transformFileSettings, Guid.Empty); | |
| var secondTask = new UploadToBlob(uploadToBlobSettings, firstTask.TaskId); | |
| var tasks = new List<IJobExecutionTask> { firstTask, secondTask }; |
| Integration Process | |
| Initial Assessment | |
| primary goals determined -> System Evaluation | |
| System Evaluation | |
| has customer portal -> Portal Assessment | |
| no customer portal -> Feature Selection | |
| Portal Assessment |
| Home | |
| timeout -> Idle Loop | |
| Idle Loop | |
| activate -> Bot Selection | |
| Bot Selection | |
| select clean -> Clean | |
| select guide -> Guide | |
| select serve -> Serve | |
| Clean | |
| timeout -> Idle Loop |
| actionable* | |
| STAGE -> staged | |
| staged | |
| SCHEDULE -> scheduled | |
| SKIP -> skipped | |
| scheduled | |
| PROCESS -> processing | |
| CANCEL -> cancelled | |
| processing | |
| SUCCESS -> processed |
| const fetchData = () => | |
| delay( | |
| Math.floor(Math.random() * 100) % 2 === 0 ? "staged" : "scheduled", | |
| 1000 | |
| ); | |
| const actionableAccountMachine = Machine( | |
| { | |
| id: "root", | |
| initial: "idle", |
| // Available variables: | |
| // - Machine | |
| // - interpret | |
| // - assign | |
| // - send | |
| // - sendParent | |
| // - spawn | |
| // - raise | |
| // - actions |
| // Available variables: | |
| // - Machine | |
| // - interpret | |
| // - assign | |
| // - send | |
| // - sendParent | |
| // - spawn | |
| // - raise | |
| // - actions |
| { | |
| "cmd": "update", | |
| "method": "regression", | |
| "conditions": { | |
| "AR": 1, | |
| "KS": 1, | |
| "WY": 1, | |
| "SD": 0, | |
| "CA": 0, | |
| "NV": 1, |
In August 2007 a hacker found a way to expose the PHP source code on facebook.com. He retrieved two files and then emailed them to me, and I wrote about the issue:
http://techcrunch.com/2007/08/11/facebook-source-code-leaked/
It became a big deal:
http://www.techmeme.com/070812/p1#a070812p1
The two files are index.php (the homepage) and search.php (the search page)