►
Description
No description was provided for this meeting.
If this is YOUR meeting, an easy way to fix this is to add a description to your video, wherever mtngs.io found it (probably YouTube).
A
All
right,
can
you
hear
me,
can
you
hear
me,
okay,
the
sun's
in
my
eyes,
so
I
look
a
little
ridiculous,
but
here
we
are
it's
not
anymore
now,
so
here
we
go
so
let's
see.
A
Show
me
a
security
overlay,
I'm
trying
to
make
this
easy
for
myself,
because
hopefully
that
as
a
sentence
keeps
me
focused
because
you're
also
I'm
gonna
get
all
over
the
place.
So,
let's
see.
A
All
right,
so
what
are
we
going
to
do
today,
so
we're
going
to
just
modify
the
flow
to
add
the
security
md
file
and
then
based
off
of
dfml's
security,
md
file
and
then.
B
A
A
Right,
I'm
locking
the
discussion
thread
because
I
realize
this
is
going
to
be
too
complicated
for
me
to
dump.
So
it
can
it's
in
the
pr
and
then
it'll
be
in
the
master
branch,
and
then
discussion
will
basically
just
be
pr.
It.
B
A
A
A
A
A
A
A
A
Yeah
single
tick
right
arrow
and
then
we
can
say
space,
bang,
python,
dash
c,
and
I
think
on
this
machine.
It's
python
3,
because
there's
no
aliasing
we're
not
in
the
shell
and
we
can
do
import
sys.
So
it's
going
to
feed
it
to
it
as
standard
input
right.
So
we
can
say
import,
sys
import
date
time
and
we
can
say
so.
We
want
to
print
all
of
the
lines
and
we
can't
use
for
loops
here
so
we're
going
to
use
like
generators
and
stuff.
A
So,
okay,
so
we
do
print
and
then
let's
see
so
print
daytime
and
so
sys.std
in
right.
So
we
want
to
print
everything
from
stdn.
We
want
to
join
all
the
the
outputs
with
the
new
line.
We're
gonna
go
through
each
line.
A
In
the
standard
input
and
we're
going
to
sort
it
by.
A
Time
stamp
and
I
believe,
there's
no
two
same
timestamps.
I
don't
think
I
ever
modified
with
it
one
within
a
second
there's
one
that
was
close
that
I
was
worried
about,
but
I
think
other
than
that.
We're
good
so
and
we'll
just
word
count
dash
l
to
compare
the
difference
so
actually
we'll
see
if
the
commits
went
down
because
it
was
14
35.
So
if
we
end
up
with
less
commits
we'll
know
we
screwed
up,
so
let's
just
build
a
dictionary
right
so
sorted.
A
We'll
just
call
it
line
line,
oh
line
date,
all
right
so
line
date
and
then
line
date.
Zero
is
line
line
date.
One
is
date
right,
so
line
date.
Time
line
date
time,
not
that
this
matters,
this
line
of
code
is
being
thrown
away
right
now,
but
it's
not
because
it's
in
the
recording
so
so
sorted,
okay,
so
print
me
all
the
lines
sorted
and
then
line
so
now
date,
time
dot
date
time
and
then
let's
do
dot
stir
from
time
or
string
from
time.
A
A
A
Okay,
no,
it's
daytime.daytime
from
isoformat
line.split
negative1
right,
so
we
want
the
last
thing
we're
going
to
split
the
line
we
we.
So
we
read
over
each
line
in
the
standard
input
we
split
it
and
on
spaces,
and
then
we
grab
the
last
one,
which
is
the
date.
We
convert
it
to
a
date.
Time
object
and
we
yield
that
plus
the
line.
A
A
A
What
is
it
called
from
isaf?
No,
not
from
iso
format,
where's
the
other
one
strip.
A
A
H
time,
data
time
date
at
20,
22,
0,
4,
20,
t,
6
27,
so
4
20
at
6,
27
am
and
20
seconds
does
not
match
format.
A
A
And
here
it
is-
and
this
might
be
the
one
that
has
the
nice
helpful
message:
it
might
not:
okay,
all
right,
okay.
So
let's
see
where
are
we
at
all
right
year
with
century
as
a
decimal
number?
Okay,
so
this
example
that
I
have
on
the
blog
makes
all
of
zero
sense.
What
is
this?
Did
I
read
it
wrong?
Oh
no!
Here's
the
time
over
here,
okay,
completely
different!
That
makes
sense.
Okay,
all
right!
A
So
why
so
month,
a
zero
padded,
decimal
number,
so
percent
m
percent,
big
y
and
where's
the
day
with
zero
pad
and
then
percent
d,
all
right!
So
so
this
is
yeah.
It's
I
mean
I'm
using
the
wrong
the
wrong
formatting.
So
we
need
to
check
the
formatting
so
okay,
so
it
was
percent
big
y
right
and
then
it
was
percent
m
and
then
little
b
was
it
little
no
d.
That
was
the
problem
last
time.
Okay,.
A
Ruffles
ruffles,
okay,
I
gotta
go
check
on
ruffles.
This
is
this.
Is
that
is
still
helping?
Okay?
Is
it
still.
C
A
A
A
A
A
B
A
A
Where
is
it
because,
like
do
a
vim
command
on
files
in
an
automated
way,
so
this
one
plus
the
one
that
we
just
learned,
that's
going
to
be
fun
so
because
then
we
can
rebase
interactively.
Basically,
if,
if
if
alice
is
presented
with
a
rebase
command,
she
could
we
could.
We
could
interact
with
it
like
this
and
we
could
prototype
it
like
that
and
we're
gonna
do
and
we
can
basically
do
the
dump
discussion.
So,
let's
see
okay,
so
we
just
solved
it.
I
think
we
solved
it.
A
Here
so.
A
Let's
see
oh
yeah,
we
solved
it
okay,
so
we
must
have
solved
it,
so
that
makes
sense
okay,
so
so
we
rewrote
we
were
able
to.
We
were
able
to
rewrite
to
get
tree
based
up
the
discussion
thread.
Okay,
so
this
is
this
thing.
It
won't
even
show
me
how
many
times
it's
been
edited.
It's
like
go
yourself:
okay,
okay,
wait!
No!
This
is
the
other
thing.
Okay,
so
edited
december
9th
may
4th
april.
A
We
should
have
46
things,
and
one
of
them
should
be
labeled
december
9th,
oh,
no,
because
it's
not
on
a
career
created
at
date.
That's
where
all
these
other
files
are
there's
a
bunch
of
other
files,
okay,
okay,
so
we
need
to
do
well,
I'm
really
glad
we
automated
this
okay.
So
we
need
to
do
this
again
and
okay.
A
Okay,
so
we
really
I'm
really
glad
we
automated
all
that
okay,
so
we
need
to
do
this
again,
so
we
need
to
do
dump
discussion
and
we
need
to
add
some
gig
commands
onto
hey
all
right.
Thanks.
A
A
C
A
Def
right
good,
oh
oh,
do
do
this!
This
is
great
okay.
So
how
can
we
use
this?
Show
me
a
security
overlay,
so.
A
A
A
C
A
For
for
entry
point
registration,
so
for
entry
point
registration,
we
do
that
for
class
to
entry,
point
registration
and
then
this
is.
A
A
A
A
C
A
Security
fix
it's
not
a
security
fix
in
this
case,
but
it
could
be
so
we're
hot
packing,
we're
hot
patching
and
we're
we're
patching
we're
patching
the
source
code
effectively.
So
we're
doing
this
all
in
python
right
now,
but
we're
thinking
about
it
as
if
we're
patching
the
source
code
to
because
we
have
this
intermediate
representation
right,
that
we
can
scan
across
languages.
So
we're
going
to
take
asts
and
we're
going
to
convert
them
into
the
intermediate
representation
right
that
are
language,
specific
asts.
A
So
we
can
distribute
patches
which
are
intent
which
are
policy
right,
which
and
then,
via
our
analysis,
mechanisms,
determine
how
the
policy
is
relevant
for
the
given
thing,
we're
looking
at
and
then
apply
the
policy
to
whatever.
That
thing
is
so
basically
this
is
what's
going
to
allow
you
to
take.
Do
patching
like
this
this
this
this.
This
will
allow
us
to
do
patching
of
okay,
so
we
I
saw
so
so
redis
labs.
I
put
on
twitter
the
other
day.
A
Redis
labs
had
a
fine
piece
of
content
out
of
their
out
of
their
their
their
team
there,
and
so
why.
Why
was
that?
That
I
thought
that
was
good
and
it
was
basically,
you
know
something
something
like
json
web
tokens
considered
harmful
type
of
thing,
and
so
so.
A
A
Well,
well,
you
could
use
an
overlay
and
you
could
use
the
concept
of
an
overlay
because
it
would
allow
you
to
to
reach
into
the
parent
context
and
then
to
to
you
know
to
to
to
analyze
the
up
dab,
the
intermediate
representation
across
syntax
trees
right
and
then
say:
hey
here's,
the
data
types
that
I
care
about,
feeding,
re-serialize
the
structure,
submit
the
pull
request.
You
know,
re-serialize
the
the
intermediate
representation
back
into
the
abstract,
syntax
trees
of
the
language
of
your
choice
right
and
then
submit
the
pull
request
up.
A
Saying:
hey,
you
know:
I've
swapped
out
all
your
auth
in
your
aio
http
application.
For
you
know
this
redis
backed
thing
or
something
right
that
doesn't
you
know
that
doesn't
have
these
these
token
state
time
problems
right,
so,
okay!
So
how
would
we
do
that
right
now,
so
overlay
apply
okay,
so
overlay
apply
pathlib.path,
all
right
text
or,
let's
say
path.path.righttext.
C
A
Overlays
apply,
okay,
so
overlays
apply,
so
basically
overlays
apply
right
now,
the
they
they
are
in
effect
right
for
right
text,
so
we're
explicitly
enabling
them
okay.
So
now
what
does?
Let's
see.
B
A
C
A
B
A
A
I
might
go
inside
it's
kind
of
cold,
so
data
flow
having
overlays
applied
to
it.
Okay,
so.
B
A
A
C
A
Read
python3
dash
m
pi
doc
dash
our
no
dash
funk
tools,
dot
wraps;
okay,
maybe
just
funk
tools.
B
B
C
C
C
A
To
do,
and
then
what
was
this
code?
This
was
like
the
oh,
the
old
context,
old,
wrapper
code,
slash
yeah,
the
old
dataset
source.
A
Okay,
so
that
remember,
we
were
talking
about
that
a
while
ago,
so
calling
decorated
functions.
Okay,
so.
A
Mentioned
okay,
so
this
is
all
tag.
This
is
alice
because
that's
mentioned
in
the
thread.
B
A
Okay,
so
when
you
say
like
that,
that
makes
me
think
we're
gonna
need
some
kind
of
data
flow
for
this,
so
so
data
flow
having
overlays
applied
to
it.
A
Okay,
so
we
want
to
overlay
the
flow,
which
means
that
we
want
before
it
gets
used
for
it
to
have
okay,
so
this
can
be
done
by
adding
overlays
or
by
checking
if
a
system
contacts
overlay
value
is
set
to
something
other
than
none.
If
it
is
set
to.
A
If
it
is
set
to
overlay
set,
then
add
to
the
set,
if
it
is,
if
you
said
to.
A
B
C
A
Please
control
recommended
community
standards,
okay,
so
yeah.
So
this
says
I
suggest
aka
I,
as
in
this
out
out
so
alice.
Please
contribute
recommended
community
standards.
Overlay
operations
get
suggests
that
if
it's
installed-
and
this
is
also
installed,
then
it
should
be
applied
on
use
if
you're
running
the
default
installed
flows.
Okay,
so
I'm
gonna
forget
that
I
gotta
write
that
down
immediately
so.
A
The
applied
just
that
an
overlay
be
applied
when
default,
installed.
A
A
A
C
A
A
Overlay
right
text,
so
if
you
do
that
we're
going
to
create
an
op
out
of
you,
because
we
can
create
an
op
okay,
so
we
can
create
an
op
out
of
a
system
context
so
yeah.
We
can
create
an
operative
system
context,
so
we
can
create
an
app.
An
op
is
our
manifest.
So
it's
our
base
node
structure.
Basically,
so
we
can
create
an
op.
A
A
A
A
A
Dataflow
flow
having
overlays
applied
to
it,
so
return
wrapper,
so
this
becomes
async
with
the
system
context,
which
is.
A
C
A
A
A
Data
flow
having
overlays
applied
to
it.
Okay,
let's
just
try
that
for
now.
C
A
B
A
Okay,
return
results,
okay
data
flow
operation
or
data
flow,
having
a
release
applied
to
it.
A
Okay,
so
alright,
here
we
are
okay.
So
what's
the
original
function
so
to
grab
signature
and
map
args
into
kwrx
of
named
parameters,
then
starstruck
kw,
arcs,
expand.
A
C
A
C
B
A
Okay,
let
me
write
that
down
and
take
a
break
okay.
So
actually,
let's
do
this
first,
okay,
so
if
this
works
then
we'll
take
a
break.
B
A
A
A
A
A
B
A
C
A
C
C
A
A
A
A
A
A
A
Are
being
applied
if
any
are
okay,
the
op
the
function
will
be
run
within
a
data
flow,
slash
system
context.