►
A
A
Operation
model;
okay:
we
don't
have
any
operations
for
sources,
let's
go
through
and
just
make
one
real
quick
give
my
operation.
So,
oh
no,
there
there.
It
is
different
operation
source,
okay,
convert
records
to
list
okay.
So
this
takes.
A
A
A
So
records
it's
called
source
records
right,
okay,
and
so
this
will
say,
expand
equals
records
or
result
right.
So
we
dump,
we
say:
here's
a
source
dump
all
the
records,
expand
every
record
so
that
it
enters
the
input
network
as
a
separate
item
right
now
now
we
run
those,
let's
see
so
we.
A
A
The
memory
orchestrator
and
then
we
merge
yeah,
so
we
execute
the
merge
within.
A
A
A
A
A
A
A
A
A
A
A
A
A
A
B
A
A
A
A
A
Run
our
cv
event
tool
on
everything
right.
So
how
are
we
going
to
do
that.
A
Or
we
should
say
maintained
all
right,
so
this
is
some
stuff
that
this
is
basically
so
we
presented
some
of
the
stuff
we
did
in
the
the
identifying
security
threats
working
group
about
a
year
and
a
half
ago.
I
think
it's
in
the
weekly
sync
lecture,
like
the
weekly
sync.
A
A
Somewhere,
I
think
it's
in
the
notes
you
can
find
the
recording
from
there.
B
A
Yeah,
so
basically,
what
we're
going
to
do
is
we're
going
to
just
do
a
continuation
of
that
based
on
should
I
just
like
we
talked
about,
and
so
we're
going
to
show
how
we,
you
know,
maintain
these
upstreams
over
forks
with
the
overlays
okay,
so
check
out
be
maintained
upstream.
A
A
A
C
A
So
we
had
this
shell
demo
we're
making
it
a
python
demo
we're
going
to
go
ahead
and
create
a
data
flow.
A
A
A
A
A
A
A
A
Okay
field
name
beautiful,
okay,.
C
A
A
A
A
A
A
C
A
A
A
A
A
C
C
A
A
A
A
C
C
A
A
All
right
so
we're
gonna
commit
this
so
base.
Okay,
arg
fix
type
in
unions.
C
A
Okay,
so
okay,
so
let's
just
put
this
repos
repos.py
dfw.
Let's
do
feature
gate,
df
feature
gate.