THIS GIST WAS MOVED TO TERMSTANDARD/COLORS
REPOSITORY.
PLEASE ASK YOUR QUESTIONS OR ADD ANY SUGGESTIONS AS A REPOSITORY ISSUES OR PULL REQUESTS INSTEAD!
THIS GIST WAS MOVED TO TERMSTANDARD/COLORS
REPOSITORY.
PLEASE ASK YOUR QUESTIONS OR ADD ANY SUGGESTIONS AS A REPOSITORY ISSUES OR PULL REQUESTS INSTEAD!
(by @andrestaltz)
If you prefer to watch video tutorials with live-coding, then check out this series I recorded with the same contents as in this article: Egghead.io - Introduction to Reactive Programming.
Last night, Brian Shirai unilaterally "ended" the RubySpec project, a sub-project of Rubinius (the alternative Ruby implementation which Brian was paid to work on full-time from 2007 to 2013). The blog post describing his reasons for "ending" the project led to a big discussion on Hacker News.
When a single, competing Ruby implementation tells that you its test suite is the One True Way, you should be skeptical. Charles Nutter, Ruby core committer and JRuby head honcho, spent a lot of time last night on Twitter talking to people about what this decision means. He's probably too busy and certainly too nice of a guy to write about what is a political issue in the Ruby community, so I'm going to do it on behalf of all the new or intermediate Rubyists out there that are confused by Brian's decision and what it me
about:config settings to harden the Firefox browser. Privacy and performance enhancements.
To change these settings type 'about:config' in the url bar.
Then search the setting you would like to change and modify the value. Some settings may break certain websites from functioning and
rendering normally. Some settings may also make firefox unstable.
I am not liable for any damages/loss of data.
Not all these changes are necessary and will be dependent upon your usage and hardware. Do some research on settings if you don't understand what they do. These settings are best combined with your standard privacy extensions
(HTTPS Everywhere No longer required: Enable HTTPS-Only Mode, NoScript/Request Policy, uBlock origin, agent spoofing, Privacy Badger etc), and all plugins set to "Ask To Activate".
"""Perlin noise implementation.""" | |
# Licensed under ISC | |
from itertools import product | |
import math | |
import random | |
def smoothstep(t): | |
"""Smooth curve with a zero derivative at 0 and 1, making it useful for | |
interpolating. |
import groovyx.net.http.HTTPBuilder | |
import org.apache.http.client.HttpClient | |
import org.apache.http.impl.client.DefaultHttpClient | |
import org.apache.http.impl.conn.PoolingClientConnectionManager | |
import org.apache.http.impl.conn.SchemeRegistryFactory | |
import org.apache.http.params.HttpParams | |
import javax.net.ssl.SSLContext | |
import javax.net.ssl.SSLSocket | |
import java.security.SecureRandom |
import org.bouncycastle.asn1.ASN1Encodable; | |
import org.bouncycastle.asn1.DERSequence; | |
import org.bouncycastle.asn1.x500.X500Name; | |
import org.bouncycastle.asn1.x509.BasicConstraints; | |
import org.bouncycastle.asn1.x509.Extension; | |
import org.bouncycastle.asn1.x509.GeneralName; | |
import org.bouncycastle.asn1.x509.KeyUsage; | |
import org.bouncycastle.cert.X509CertificateHolder; | |
import org.bouncycastle.cert.X509v3CertificateBuilder; | |
import org.bouncycastle.cert.jcajce.JcaX509CertificateConverter; |
;; | |
;; scheme coin - a common lisp blockchain | |
;; | |
;; Burton Samograd | |
;; 2017 | |
(load "~/quicklisp/setup.lisp") | |
(defconstant *coin-name* "Scheme Coin") |
(defun read-journal (path) | |
(with-temp-buffer | |
(insert-file-contents (concat "~/notes/journal/" path)) | |
(split-string (buffer-string) "\n" t))) | |
(defun read-first-three-lines (list) | |
(cond ((>= (length list) 4) (subseq list 1 3)) | |
((>= (length list) 1) (nthcdr 1 list)) | |
(t list))) |
package main | |
/* Binary tree based Broadcast | |
* This program demonstrates a tree based broadcast to all the peers in a network. | |
* Program starts by arranging a set of peers in a tree structure were a node is | |
* connected to exactly two nodes, it's children. This gives an almost complete binary tree. | |
* | |
* One-way flow of information: | |
* Data can only flow from top to bottom in the graph. So, if the root node initiates | |
* a broadcast. It will send the message to it's children who will then send it to their |