http://www.saulshanabrook.com/post/80761618102/searching-for-gp
- Download gp-bibliography.bib and put it in the same directory
pip install bibtexparser
python most_published.py
$ curl -X GET http://firetail.superfeedr.com/stream -u'[email protected]:teststream' -D- | |
HTTP/1.1 200 OK | |
Content-Type: application/json | |
Connection: close | |
Server: Firetail Proxy | |
["subscribe",{"result":"success","topic":"http://superfeedr.com/track/music"}] | |
["publish",{"postedTime":1291337246,"title":"Homeland Security conducts website piracy crackdown","permalinkUrl":"http://www.electronista.com/articles/10/11/27/p2p.web.domains.among.over.70.shut.down/","id":"http://www.electronista.com/articles/10/11/27/p2p.web.domains.among.over.70.shut.down/","summary":"Immigration and Customs Enforcement, a division of the Department of Homeland Security has shut down a number of online music and movie file sharing websites according to a NYTimes report.","updated":1291337246}] | |
["publish",{"postedTime":1291323741,"title":"I dont care if you’re old or new I would love to get to know you.Just leave it in my ask...","permalinkUrl":"http://smileveronicasmile.tumblr.com/post/2073857085","id":"http://smileveronicasmile |
require 'rubygems' | |
require 'aws/s3' | |
# Change the access key and secret to your amazon credentials | |
AWS::S3::Base.establish_connection!( | |
:access_key_id => 'ACCESS_KEY_ID', | |
:secret_access_key => 'SECRET' | |
) | |
# Change this to your S3 bucket name | |
WEBSITE_BUCKET_NAME = "YOUR_BUCKET_NAME" |
http://www.saulshanabrook.com/post/80761618102/searching-for-gp
pip install bibtexparser
python most_published.py
Controlling your nodebot using a USB cable is great and all, and obviously you could shell out and grab a sparkcore or some other dedicated controller but what if you've got a standard arduino and you want to take an existing nodebot wireless?
Bluetooth is an option and there's this excellent JohnnyFive wiki entry that will help you there. Bluetooth can be a bit flaky though and it's range is pretty lousy. You can also look at things like XBees and what not using point to point serial, but these are expensive and very fiddly to get working.
Really, what we want is a method of transferring data over a nice, simple, standard method, requiring little configuration, low cost and we can utilise a whole stack of the code we've already produced.
Enter the WiFi232 module. These little beauties are [available from AliExpress for $12 each](http://www.aliexpress.com/item/USR-WIFI232-T-wifi-to-uart-tt
Note: These are rough notes and there may be some variance as versions of raspbian get updated but should be pretty reliable as a guide.
This gist provides some instructions and config in order to have your Raspberry PI automatically connect to a roamed network, however if it fails to discover an available network it will set itself up as a wireless access point for you to connect to.
#!/bin/sh | |
adb shell "mount -o rw,remount /system" | |
adb shell "stop b2g" | |
adb shell "echo \"ro.moz.wifi.p2p_supported=1\" >> /system/build.prop" | |
adb shell "mount -o ro,remount /system" | |
adb reboot |
$fs=1; | |
$fa=1; | |
servo_l = 24; | |
servo_w = 13; | |
servo_h = 21; | |
bolt_hole_diameter = 4.5; | |
servo_axis_diameter = 4; |
Short version: I strongly do not recommend using any of these providers. You are, of course, free to use whatever you like. My TL;DR advice: Roll your own and use Algo or Streisand. For messaging & voice, use Signal. For increased anonymity, use Tor for desktop (though recognize that doing so may actually put you at greater risk), and Onion Browser for mobile.
This mini-rant came on the heels of an interesting twitter discussion: https://twitter.com/kennwhite/status/591074055018582016
No, seriously, don't. You're probably reading this because you've asked what VPN service to use, and this is the answer.
Note: The content in this post does not apply to using VPN for their intended purpose; that is, as a virtual private (internal) network. It only applies to using it as a glorified proxy, which is what every third-party "VPN provider" does.
function GraphNode(kmer) { | |
this.id = GraphNode.ID++; | |
this.kmer=kmer; | |
this.rightNodes = []; | |
} | |
GraphNode.ID=0; | |
/* insert new node on the right */ | |
GraphNode.prototype.append = function(nodeR) { |