%%{ init: { 'flowchart': { 'curve': 'stepAfter' } } }%%
flowchart TD
A["A"]
A---B[B]
A---C[C]
A---D[D]
{ | |
"id":1, | |
"data": "one" | |
} |
# Comparing pandas DateOffset strings directly one another is not available | |
# as a method of the DateOffset class in python. The reason is straightforward: | |
# offsets are "timestamp context" dependent. | |
# For example 1M can be either 28D, 29D, 30D, or 31D so there is no way to compare | |
# *exactly * DateOffset strings with each other out of context. | |
# To alleviate this, here below you can find a reference implementation | |
# for an approximate comparison assuming months of 30 days, and years of 365 days. |
mkdir -p tests/libs | |
cd tests/libs | |
git submodule add [email protected]:bats-core/bats-core bats | |
git submodule add [email protected]:bats-core/bats-support bats-support | |
git submodule add [email protected]:bats-core/bats-assert bats-assert | |
# try the following three steps | |
git submodule update --init --recursive |
#!/bin/bash | |
for con in natbusa "natbusa 5G"; | |
do | |
echo ipv6.method ignore connection: \"$con\" | |
nmcli con modify "$con" ipv6.method ignore | |
done; |
Slogan: | |
Data Pipelines as a Service. | |
Subtitle | |
Delivering turn-key data pipelines to process data from Source to APIs. | |
Vision: | |
Data pipelines are complex. They are often tough to setup and maintain. But a data pipeline is a mean to an end not a goal in itself. Most company are stuck at endless engineering cycles with very limited output for what business is concerned. Our vision is to let you concentrate on the golden nuggets hidden in your data rather then spending time and effort in setting up complex toolchains. Select and instantiate our data pipeline templates and jump start your data-driven journey! | |
Offering: |
Bucket policy is an access policy available for you to grant anonymous permissions to your Minio resources. Bucket policy uses JSON-based access policy language.
This section presents a few examples of typical use cases for bucket policies. To test these policies, you need to replace these strings with your bucket name. For more information please read Amazon S3 access policy language
The following example policy grants the s3:GetObject
permission to any public anonymous users. This permission allows anyone to read the object data under testbucket
, which is useful for when you have publicly readable assets. A typical example is website assets stored in testbucket
.
Type: bucket
{
press F12 on the Dell startup screen
- disable safe boot
- Change SATA Operation from "RAID On" to "AHCI"
- Enable Legacy Boot as well as UEFI
Instructions are here: https://www.ubuntu.com/download/desktop
I hereby claim:
- I am natbusa on github.
- I am natbusa (https://keybase.io/natbusa) on keybase.
- I have a public key ASCoyuEqzz31jia6w-mBBuacJo6kypp6ETntB9kn4tOqqwo
To claim this, I am signing this object: