Fast on Linux and Windows, and supports 3-way merging! Diffinity and Meld are a couple of other viable options.
winget install KDE.KDiff3
Fast on Linux and Windows, and supports 3-way merging! Diffinity and Meld are a couple of other viable options.
winget install KDE.KDiff3
Command | Description |
---|---|
rg pattern |
Search pattern in current dir recursively |
rg pattern utils.py |
Search in a single file utils.py |
rg pattern src/ |
Search in dir src/ recursively |
rg '^We' test.txt |
Regex searching support (lines starting with We) |
rg -F '(test)' |
Search literally, i.e., without using regular expression |
rg -i pattern |
Search pattern and ignore case (case-insensitive search) |
rg -S pattern |
Smart case search (match case of pattern) |
rg pattern -g '*.py' |
File globbing (search in certain files), can be used multiple times |
""" | |
Toy demonstration of chain-of-thought and consensus prompting using OpenAI API. | |
© Riley Goodside 2022 | |
""" | |
import os | |
import re | |
from statistics import mode |
""" | |
Built on top of this gist by @karpathy: | |
https://gist.github.com/karpathy/00103b0037c5aaea32fe1da1af553355 | |
stable diffusion dreaming over text prompts | |
creates hypnotic moving videos by smoothly walking randomly through the sample space | |
example way to run this script: | |
$ python stable_diffusion_walk.py --prompts "['blueberry spaghetti', 'strawberry spaghetti']" --seeds 243,523 --name berry_good_spaghetti |
// **************************************** | |
// Azure Bicep main template | |
// This bicep template demonstrates provisioning Azure function that implements OpenAPI specifications. | |
// Optinally this Azure Function endp-point can be published to an existing API Management - witin a Product | |
// Last Update : 17-Feb-2022 | |
// **************************************** | |
targetScope = 'resourceGroup' | |
param functionRuntime string = 'dotnet' | |
param logAnalyticsWorkspaceName string = 'la-${uniqueString(resourceGroup().id)}' |
Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-2021-44228)
$subscription = 'dd0d4271-9b26-4c37-a025-1284a43a4385'; | |
$observations = @{}; | |
foreach ($resourceGroupName in @('taskcluster-staging-workers-us-central')) { | |
$observations[$resourceGroupName] = @{}; | |
while (($vms = @(Get-AzVm -ResourceGroupName $resourceGroupName -Status)) -or ($vms.Length -gt 0)) { | |
Write-Output -InputObject ('{0} virtual machines observed in {1}' -f $vms.Length, $resourceGroupName); | |
foreach ($vm in $vms) { | |
$name = $vm.Name; | |
if (-not $observations[$resourceGroupName].ContainsKey($name)) { | |
$observations[$resourceGroupName][$name] = @{}; |
{ | |
"name": "workshop-setup", | |
"version": "1.0.0", | |
"description": "This is the common setup script for most of my workshops", | |
"bin": "./setup.js" | |
} |