(by @andrestaltz)
If you prefer to watch video tutorials with live-coding, then check out this series I recorded with the same contents as in this article: Egghead.io - Introduction to Reactive Programming.
/** | |
* 1. Append one of these blocks to adblockpluschrome/lib/devtools.js... | |
*/ | |
// Desktop notification, relentless type, no links | |
require("notifications").notifications.addNotification({ | |
id: (new Date() | 0).toString(), | |
type: "relentless", | |
title: "Notification title", | |
message: "Notification message" |
(by @andrestaltz)
If you prefer to watch video tutorials with live-coding, then check out this series I recorded with the same contents as in this article: Egghead.io - Introduction to Reactive Programming.
# | |
# Script to dump all pyo's on a Telit 862GPS over the serial port as hex. | |
# (Useful as the unit takes SO long to compile .pyo's.) | |
# | |
# | |
# Copyright 2011 Dave Barker | |
# | |
**** MOVED https://github.com/kzar/telit-862-python-tools **** |
#!/usr/bin/python | |
# Script to send Python scripts to the Round solutions development board | |
# (Designed for use with the GSM862-GPS and RS-EB-S3 Rev 3) | |
# | |
# Idea is that you connect to the Unit through the serial port provided | |
# using the screen command. You then use this script to have the commands | |
# and your code sent to screen automatically. | |
# (For help with screen read this: | |
# http://www.tigoe.net/pcomp/resources/archives/avr/000749.shtml ) |
#!/usr/bin/env ruby | |
# Dave's Tetris clone, Dave Barker 2010 | |
# (Requires rubygame, rsdl, sdl, sdl_graphics, sdl_ttf and ruby >= 1.9) | |
# (Make sure you put Chalkduster.ttf if working directory) | |
# This program is free software: you can redistribute it and/or modify | |
# it under the terms of the GNU General Public License as published by | |
# the Free Software Foundation, either version 3 of the License, or |
import base64 | |
import hashlib | |
import hmac | |
import simplejson as json | |
def base64_url_decode(inp): | |
padding_factor = (4 - len(inp) % 4) % 4 | |
inp += "="*padding_factor | |
return base64.b64decode(unicode(inp).translate(dict(zip(map(ord, u'-_'), u'+/')))) |