Skip to content

Instantly share code, notes, and snippets.

View trestletech's full-sized avatar

Jeff Allen trestletech

View GitHub Profile
@TimSC
TimSC / vlcsms.c
Created November 20, 2012 22:59
Using libvlc to extract raw frames and audio from media via smem
//To compile:
//cc vlcsms.c -o vlcsms -lvlc
//This source is by Tim Sheerman-Chase and it is released as public domain.
#include <stdio.h>
#include <stdint.h>
#include <stdlib.h>
#include <unistd.h>
#include <inttypes.h>
#include <vlc/vlc.h>
@trestletech
trestletech / .gitignore
Last active December 11, 2015 02:29
Import My PivotalTracker Stories into Astrid
setup.sh
token
@marcionicolau
marcionicolau / ace-shiny.css
Created January 16, 2013 12:22
knitr shiny example - by yihui
#proxy {
position: absolute;
top: 0;
right: 0;
display: none;
}
#notebook {
position: absolute;
width: 600px;
<style>
.twitter-btn {
font: normal normal normal 13px/26px 'Helvetica Neue',Arial,sans-serif;
height: 28px;
border-radius: 4px;
max-width: 100%;
box-sizing: border-box;
position: relative;
background-color: #F8F8F8;
@trestletech
trestletech / .gitignore
Last active March 3, 2016 20:25
Quick test proxy in node that just passes all traffic through with an additional auth header, as if the request had been authenticated.
node_modules
@trestletech
trestletech / server.R
Last active July 10, 2020 14:49
Shiny app used for debugging Shiny Server Pro Auth
library(shiny)
shinyServer(function(input, output, session) {
output$shinyVer <- reactive({
packageVersion("shiny")
})
output$rmarkdownVer <- reactive({
packageVersion("rmarkdown")
})
@debasishg
debasishg / gist:8172796
Last active November 11, 2024 07:10
A collection of links for streaming algorithms and data structures

General Background and Overview

  1. Probabilistic Data Structures for Web Analytics and Data Mining : A great overview of the space of probabilistic data structures and how they are used in approximation algorithm implementation.
  2. Models and Issues in Data Stream Systems
  3. Philippe Flajolet’s contribution to streaming algorithms : A presentation by Jérémie Lumbroso that visits some of the hostorical perspectives and how it all began with Flajolet
  4. Approximate Frequency Counts over Data Streams by Gurmeet Singh Manku & Rajeev Motwani : One of the early papers on the subject.
  5. [Methods for Finding Frequent Items in Data Streams](http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.187.9800&amp;rep=rep1&amp;t
@trestletech
trestletech / .gitignore
Last active August 29, 2015 14:04
VM for Go
.vagrant
pkg
src
bin
@atoponce
atoponce / gist:07d8d4c833873be2f68c34f9afc5a78a
Last active September 7, 2024 18:11 — forked from tqbf/gist:be58d2d39690c3b366ad
Cryptographic Best Practices

Cryptographic Best Practices

Putting cryptographic primitives together is a lot like putting a jigsaw puzzle together, where all the pieces are cut exactly the same way, but there is only one correct solution. Thankfully, there are some projects out there that are working hard to make sure developers are getting it right.

The following advice comes from years of research from leading security researchers, developers, and cryptographers. This Gist was [forked from Thomas Ptacek's Gist][1] to be more readable. Additions have been added from