- client-py
- Synthea - synthetic patient population simulator
- Video source of the following information
- A robust data model for describing health and administrative data
- A RESTful API for interacting with taht data using JSON or XML
by Adam Wiggins [Source]
Table of Contents
If you have just been promoted to a new leadership position (or expect to be soon), then this book is for you.
The book outlines ten strategies that will shorten the time it takes you to reach what Watkins calls the breakeven point: the point at which your organization needs you as much as you need the job.
Presidential Actions
May 12, 2021
Table of Contents
#!groovy | |
import groovy.json.JsonOutput | |
import groovy.json.JsonSlurper | |
def label = "mypod-${UUID.randomUUID().toString()}" | |
podTemplate(label: label, yaml: """ | |
spec: | |
containers: | |
- name: mvn | |
image: maven:3.3.9-jdk-8-alpine |
#!/usr/bin/env groovy | |
// https://github.com/freebsd/freebsd-ci/blob/master/scripts/build/build-test.groovy | |
// http://stackoverflow.com/a/40294220 | |
// https://JENKINS_HOST/scriptApproval/ - for script approval | |
import java.util.Date | |
def isMaster = env.BRANCH_NAME == 'master' | |
def isDevelop = env.BRANCH_NAME == 'develop' |
url - https://aws.amazon.com/blogs/security/a-safer-way-to-distribute-aws-credentials-to-ec2/ | |
Finding hard-coded credentials in your code | |
Hopefully you’re excited about deploying credentials to EC2 that are automatically rotated. Now that you’re using Roles, a good security practice would be to go through your code and remove any references to AKID/Secret. We suggest running the following regular expressions against your code base: | |
Search for access key IDs: (?<![A-Z0-9])[A-Z0-9]{20}(?![A-Z0-9]). In English, this regular expression says: Find me 20-character, uppercase, alphanumeric strings that don’t have any uppercase, alphanumeric characters immediately before or after. | |
Search for secret access keys: (?<![A-Za-z0-9/+=])[A-Za-z0-9/+=]{40}(?![A-Za-z0-9/+=]). In English, this regular expression says: Find me 40-character, base-64 strings that don’t have any base 64 characters immediately before or after. | |
If grep is your preferred tool, run a recursive, Perl-compatible search using the following commands |
Table of Contents