docs.getpelican.com
Pelican 3.6.3 — Pelican 3.6.3 documentation
http://docs.getpelican.com/en/stable
Importing an existing site. Frequently Asked Questions (FAQ). Contributing and feedback guidelines. Some history about Pelican. Pelican 3.6.3. Pelican 3.6.3. Pelican is a static site generator, written in Python. Write your content directly with your editor of choice in reStructuredText. Includes a simple CLI tool to (re)generate your site. Easy to interface with distributed version control systems and web hooks. Completely static output is easy to host anywhere. Ready to get started? How to use plugins.
docs.getpelican.com
Pelican internals — Pelican 3.6.3 documentation
http://docs.getpelican.com/en/3.6.3/internals.html
Importing an existing site. Frequently Asked Questions (FAQ). Contributing and feedback guidelines. How to implement a new reader? How to implement a new generator? Some history about Pelican. This section describe how Pelican works internally. As you’ll see, it’s quite simple, but a bit of documentation doesn’t hurt. :). You can also find in the. Some history about Pelican. Section an excerpt of a report the original author wrote with some software design information. And is very easy to learn, so don&#...
benalpert.com
What I did at Khan Academy, 2012 edition – Ben Alpert
http://benalpert.com/2012/08/24/what-i-did-at-khan-academy-2012.html
What I did at Khan Academy, 2012 edition. August 24, 2012. This week marks the end of my second summer working at Khan Academy. Inspired by David Hu’s internship post-mortem. And Jamie Wong’s end-of-summer braindump. Here’s a summary of what I worked on this summer. This summer I worked mainly on our people helping people team (abbreviated PHP, of course) on improving the community and encouraging discussion around the content on our site, with an emphasis on Q&A. Which we launched earlier this year.
neokraft.net
Expérience pour commentaires - ici & ailleurs
https://neokraft.net/2010/12/21/commentaires
Je fais une petite expérience. J'ai fait un changement assez conséquent sur ce site pour ne plus avoir besoin d'un outil de publication directement accessible en ligne avec tous les problèmes que ça comporte. Je voulais pouvoir publier des fichiers statiques et conserver un historique de l'apparence du site. Avec un soupçon de Jinja. Et quelques recettes Fabric. J'ai maintenant une collection de fichiers HTML que je mets en ligne avec rsync. Un service permettant d'ajouter la fonction. Bonne année ».
lomelisan.wordpress.com
El Mega Tutorial de Flask, Parte II: Plantillas – lomelisan
https://lomelisan.wordpress.com/2015/05/31/el-mega-tutorial-de-flask-parte-ii-plantillas
El Mega Tutorial de Flask, Parte II: Plantillas. El tutorial a continuación es la traducción libre realizada por el autor de este blog, del post escrito en inglés. Por lo que aunque pueda variar algo respecto al original, no se realizó ningún aporte cuantitativo al mismo(en todo caso se reduce a usuarios GNU/Linux exclusivamente). Y ha sido el propio Miguel el que con sus respuestas ha ayudado ha aportar mayor información respecto al original. Usando el microframework Flask. Parte I: Hola Mundo! Parte XV...
winael.github.io
Winael's Blog - Internet of Things
http://winael.github.io/tag/internet-of-things.html
UAVIA dévoile les premiers drones 100% télécommandés; propulsés par Ubuntu". Published: mar. 08 décembre 2015. In Internet des objets. Tags: Internet of Things. Snappy Ubuntu Core prend litteralement son envol en France avec UAVIA, une entreprise francilienne, qui a entrepris de construire avec Snappy, le premier drone 100% pilotable depuis une adresse IP. Une nouvelle page est tournée, et ce grâce à Snappy Ubuntu Core. UAVIA dévoile les premiers drones 100% télécommandés; propulsés par Ubuntu. Les drone...
benalpert.com
Preventing XSS attacks when embedding JSON in HTML – Ben Alpert
http://benalpert.com/2012/08/03/preventing-xss-json.html
Preventing XSS attacks when embedding JSON in HTML. August 3, 2012. At Khan Academy, we recently took the time to go through our 200 Jinja2. Templates and turn on autoescape to reduce the likelihood of falling prey to an XSS attack. This gave us an excuse to audit all of our pages for injection holes: Here’s one hole Jamie Wong. Pointed out that you might run into when using Ruby’s. Suppose you’re writing a web app and you want to pass down an untrusted string. Where’s the security hole? Will be interpre...