hexsha stringlengths 40 40 | size int64 5 1.04M | ext stringclasses 6 values | lang stringclasses 1 value | max_stars_repo_path stringlengths 3 344 | max_stars_repo_name stringlengths 5 125 | max_stars_repo_head_hexsha stringlengths 40 78 | max_stars_repo_licenses listlengths 1 11 | max_stars_count int64 1 368k ⌀ | max_stars_repo_stars_event_min_datetime stringlengths 24 24 ⌀ | max_stars_repo_stars_event_max_datetime stringlengths 24 24 ⌀ | max_issues_repo_path stringlengths 3 344 | max_issues_repo_name stringlengths 5 125 | max_issues_repo_head_hexsha stringlengths 40 78 | max_issues_repo_licenses listlengths 1 11 | max_issues_count int64 1 116k ⌀ | max_issues_repo_issues_event_min_datetime stringlengths 24 24 ⌀ | max_issues_repo_issues_event_max_datetime stringlengths 24 24 ⌀ | max_forks_repo_path stringlengths 3 344 | max_forks_repo_name stringlengths 5 125 | max_forks_repo_head_hexsha stringlengths 40 78 | max_forks_repo_licenses listlengths 1 11 | max_forks_count int64 1 105k ⌀ | max_forks_repo_forks_event_min_datetime stringlengths 24 24 ⌀ | max_forks_repo_forks_event_max_datetime stringlengths 24 24 ⌀ | content stringlengths 5 1.04M | avg_line_length float64 1.14 851k | max_line_length int64 1 1.03M | alphanum_fraction float64 0 1 | lid stringclasses 191 values | lid_prob float64 0.01 1 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
aaa121770e3c24cbe8af21518337723ef647efaf | 5,747 | md | Markdown | articles/supply-chain/sales-marketing/synchronize-inventory-adjustments.md | MicrosoftDocs/Dynamics-365-Operations.da-dk | 820e3157132df021c67beb568150d32474ec4527 | [
"CC-BY-4.0",
"MIT"
] | 2 | 2020-05-18T17:13:46.000Z | 2021-04-20T21:13:45.000Z | articles/supply-chain/sales-marketing/synchronize-inventory-adjustments.md | MicrosoftDocs/Dynamics-365-Operations.da-dk | 820e3157132df021c67beb568150d32474ec4527 | [
"CC-BY-4.0",
"MIT"
] | 7 | 2017-12-08T14:06:13.000Z | 2019-04-30T11:46:03.000Z | articles/supply-chain/sales-marketing/synchronize-inventory-adjustments.md | MicrosoftDocs/Dynamics-365-Operations.da-dk | 820e3157132df021c67beb568150d32474ec4527 | [
"CC-BY-4.0",
"MIT"
] | 2 | 2019-10-12T18:18:22.000Z | 2019-10-23T15:42:08.000Z | ---
title: Synkronisere lageroverførsler og reguleringer fra Field Service til Supply Chain Management
description: I dette emne beskrives de skabeloner og underliggende opgaver, der bruges til at synkronisere lagerreguleringer og overførsler fra Dynamics 365 Supply Chain Management til Dynamics 365 Field Service.
author: Henrikan
ms.date: 04/30/2019
ms.topic: article
ms.prod: ''
ms.technology: ''
ms.search.form: ''
audience: Application User, IT Pro
ms.reviewer: kamaybac
ms.custom: ''
ms.assetid: ''
ms.search.region: global
ms.search.industry: ''
ms.author: henrikan
ms.dyn365.ops.version: 8.1.3
ms.search.validFrom: 2018-12-01
ms.openlocfilehash: 83ab46904815b177640c87fef58ce208d00d800a
ms.sourcegitcommit: 3b87f042a7e97f72b5aa73bef186c5426b937fec
ms.translationtype: HT
ms.contentlocale: da-DK
ms.lasthandoff: 09/29/2021
ms.locfileid: "7566377"
---
# <a name="synchronize-inventory-transfers-and-adjustments-from-field-service-to-supply-chain-management"></a>Synkronisere lageroverførsler og reguleringer fra Field Service til Supply Chain Management
[!include[banner](../includes/banner.md)]
[!include [rename-banner](~/includes/cc-data-platform-banner.md)]
I dette emne beskrives de skabeloner og underliggende opgaver, der bruges til at synkronisere lagerreguleringer og overførsler fra Dynamics 365 Supply Chain Management til Dynamics 365 Field Service.
[](./media/FSTransAdjOW.png)
## <a name="templates-and-tasks"></a>Skabeloner og opgaver
Følgende skabelon og underliggende opgaver bruges til at synkronisere lagerreguleringer og overføre fra Field Service til Supply Chain Management.
**Skabeloner i dataintegration**
- Lagerregulering (Field Service til Supply Chain Management)
- Lageroverførsler (Field Service til Supply Chain Management)
**Opgaver i dataintegrationsprojekterne**
- Lagerreguleringer
- Lageroverførsler
## <a name="table-set"></a>Tabelsæt
| Field Service | Supply Chain Management |
|-----------------------------------|----------------------------------------------------|
| msdyn_inventoryadjustmentproducts | Overskrifter og linjer til Dataverse-lagerreguleringskladde |
| msdyn_inventoryadjustmentproducts | Overskrifter og linjer til Dataverse-lageroverførselskladde |
## <a name="table-flow"></a>Tabelflow
Lagerreguleringer og -overførsler, der er foretaget i Field Service, synkroniseres til Supply Chain Management, når **Bogføringsstatus** ændres fra **Oprettet** til **Bogført**. Når dette sker, låses reguleringen eller flytteordren og bliver skrivebeskyttet. Det betyder, at reguleringer og overførsler kan bogføres i Supply Chain Management, men ikke kan ændres. Du kan konfigurere et batchjob til automatisk at bogføre reguleringerne og overføre lagerkladder, der er genereret under integrationen, i Supply Chain Management. Følgende forudsætninger indeholder oplysninger om, hvordan du aktiverer batchjobbet.
## <a name="field-service-crm-solution"></a>CRM-løsning til Field Service
Kolonnen **Lagerenhed** er blevet føjet til tabellen **Produkt**. Denne kolonne er nødvendig, fordi salgs- og lagerenheden ikke altid er identisk i Supply Chain Management, og lagerenheden skal bruges i lagerstedet i Supply Chain Management.
Når du angiver produktet i et lagerreguleringsprodukt for både lagerreguleringer og lageroverførsler, hentes enheden fra lagerproduktværdien. Hvis der findes en værdi, låses kolonnen **Enhed** i lagerreguleringsproduktet.
Kolonnen **Bogføringsstatus** er føjet til både tabellen **Lagerregulering** og tabellen **Lageroverførsel**. Denne kolonne bruges som et filter for, hvornår der sendes en regulering eller overførsel til Supply Chain Management. Standardværdien for denne kolonne er Oprettet (1), men den ikke sendes til Supply Chain Management. Når du opdaterer værdien til Bogført (2), sendes den til Supply Chain Management, men derefter kan du ikke længere ændre reguleringen eller overførslen eller tilføje nye linjer.
Kolonnen **Nummerserie** er blevet føjet til tabellen **Lagerreguleringsprodukt**. Kolonnen sikrer, at integrationen har et entydigt nummer, så integrationen kan oprette og opdatere reguleringen. Når du opretter dit første lagerreguleringsprodukt, oprettes en ny post i tabellen **P2C Autonummerering** for at vedligeholde den nummerserie og det præfiks, der bruges.
## <a name="prerequisites-and-mapping-setup"></a>Forudsætninger og tilknytningsopsætning
### <a name="supply-chain-management"></a>Supply Chain Management
De integrationslagerkladder, der genereres af integrationen, kan automatisk bogføres ved hjælp af et batchjob. Dette aktiveres fra **Lagerstyring > Periodiske opgaver > Dataverse-integration > Bogfør integrationen af lagerkladder**.
## <a name="template-mapping-in-data-integration"></a>Skabelontilknytning i dataintegration
Følgende illustration viser skabelontilknytningen i Dataintegration.
### <a name="inventory-adjustment-field-service-to-supply-chain-management-inventory-adjustment"></a>Lagerregulering (Field Service til Supply Chain Management): Lagerregulering
[](./media/FSAdj1.png)
### <a name="inventory-transfer-field-service-to-supply-chain-management-inventory-transfer"></a>Lageroverførsel (Field Service til Supply Chain Management): Lageroverførsel
[](./media/FSTrans1.png)
[!INCLUDE[footer-include](../../includes/footer-banner.md)] | 69.240964 | 611 | 0.788933 | dan_Latn | 0.882537 |
aaa1c77cb3c719775b6fb91332f27c806fde8318 | 1,443 | md | Markdown | README.md | alecfirstcode2021/yihsienlu_employee-tracker | ac753b242fd3849eae5dc3534e7c5fd6b5663742 | [
"MIT"
] | null | null | null | README.md | alecfirstcode2021/yihsienlu_employee-tracker | ac753b242fd3849eae5dc3534e7c5fd6b5663742 | [
"MIT"
] | null | null | null | README.md | alecfirstcode2021/yihsienlu_employee-tracker | ac753b242fd3849eae5dc3534e7c5fd6b5663742 | [
"MIT"
] | null | null | null | # Employee Tracker 
Demo some application of **C**ontent **M**anagement **S**ystems for managing a company's employees by using node, inquirer, and MySQL.
## Demo Video
https://drive.google.com/file/d/1NoCPLki2Fj3G4tjwA85BFVy7H9qh620N/view?usp=sharing
## GitHub Repository
https://github.com/alecfirstcode2021/yihsienlu_employee-tracker
## Table of Contents
- [Description](#description)
- [Installation](#installation)
- [Usage](#usage)
- [License](#license)
- [Contributing](#contributing)
- [Tests](#tests)
- [Questions](#questions)
## Installation
* mysql package to connect with MySQL server
* inquire package
## Usage
* Using employeeTrackerSchema of the db to create departments, roles, employees table.
* Using employeeTrackerSeed of the db to insert contents into departments, roles, employees table.
* Open index.js by terminal and install npm package (1.npm install, 2. npm i inquire, 3. npm i mysql)
* Using terminal type node index.js to run
## License

<br />
This application is covered by the MIT license.
## Contributing
## Tests
✏
## Questions
Contact me if have any issues.<br />
<br />
If you have any question, please contact me on [GitHub] [alecfirstcode2021](https://github.com/alecfirstcode2021)<br />
<br />
or you can Email me: alecfirstapple@gmail.com<br /><br />
| 27.75 | 134 | 0.73666 | eng_Latn | 0.646804 |
aaa203900bf1bb14747e37dfe21e9c4f424c0db0 | 395 | md | Markdown | docs/FrameAndClasslib/Multiport/readme.md | Gavin1997/web-self-examination | a9e9f9c44c5d508a6333712b16a1fa96b2728c09 | [
"MIT"
] | 2 | 2020-05-28T15:44:37.000Z | 2020-07-29T08:25:45.000Z | docs/FrameAndClasslib/Multiport/readme.md | Gavin1997/web-self-examination | a9e9f9c44c5d508a6333712b16a1fa96b2728c09 | [
"MIT"
] | 9 | 2020-07-17T06:22:36.000Z | 2022-02-27T11:16:59.000Z | docs/FrameAndClasslib/Multiport/readme.md | Gavin1997/web-self-examination | a9e9f9c44c5d508a6333712b16a1fa96b2728c09 | [
"MIT"
] | 1 | 2020-03-10T09:19:14.000Z | 2020-03-10T09:19:14.000Z | # 多端开发
## 1. 单页面应用(SPA)的原理和优缺点,掌握一种快速开发 SPA 的方案
## 2. 理解 Viewport、em、rem 的原理和用法,分辨率、px、ppi、dpi、dp 的区别和实际应用
## 3. 移动端页面适配解决方案、不同机型适配方案
## 4. 掌握一种 JavaScript 移动客户端开发技术,如 React Native:可以搭建 React Native 开发环境,熟练进行开发,可理解 React Native 的运作原理,不同端适配
## 5. 掌握一种 JavaScript PC 客户端开发技术,如 Electron:可搭建 Electron 开发环境,熟练进行开发,可理解 Electron 的运作原理
## 6. 掌握一种小程序开发框架或原生小程序开发
## 7. 理解多端框架的内部实现原理,至少了解一个多端框架的使用
| 24.6875 | 105 | 0.756962 | yue_Hant | 0.387746 |
aaa2df3b2d7f6651a0acddbafdd21bcd42888ede | 654 | md | Markdown | readme.md | stasadance/hrtime-test | 4df4a1cead8763d65c482a06a5461d9ea34dd0df | [
"MIT"
] | 1 | 2021-04-30T19:18:59.000Z | 2021-04-30T19:18:59.000Z | readme.md | stasadance/hrtime-test | 4df4a1cead8763d65c482a06a5461d9ea34dd0df | [
"MIT"
] | null | null | null | readme.md | stasadance/hrtime-test | 4df4a1cead8763d65c482a06a5461d9ea34dd0df | [
"MIT"
] | null | null | null | # hrtime-test
This repo tests the nanosecond precision of [`process.hrtime()`](https://nodejs.org/api/process.html#process_process_hrtime_time) inside of an infinite while loop. <br>
There is a noticeable delta (~0.2 ms) per loop caused by calculations and logging to the console. <br>
The delay depends on your CPU speed, the example below was done on a Ryzen 9 3900X. <br>
# Example
<img src="https://i.imgur.com/A9Dw03t.gif" alt="Example" width="400"/><br>
# Usage
Make sure you have [node.js](https://nodejs.org/en/) installed on your system. <br>
Clone the repository and run this command inside the project folder. <br>
```bash
npm start
```
| 34.421053 | 168 | 0.737003 | eng_Latn | 0.962065 |
aaa3151cb37600f87e8a59d13bba1c128efe6a75 | 12,439 | md | Markdown | README.md | realead/exetest | 7143c04de8f857f556ff0396b4fa8afc147720a5 | [
"MIT"
] | null | null | null | README.md | realead/exetest | 7143c04de8f857f556ff0396b4fa8afc147720a5 | [
"MIT"
] | null | null | null | README.md | realead/exetest | 7143c04de8f857f556ff0396b4fa8afc147720a5 | [
"MIT"
] | null | null | null | # exetest
a python framework for testing command line interfaces
## Prerequisites
1. Python2.7/Python3
## Installation
This library works for python2.7 (still) as well as for Python3.
To install the module using `pip` run:
pip install https://github.com/realead/exetest/zipball/master
It is possible to uninstall it afterwards via
pip uninstall exetest
You can also install using the `setup.py` file from the root directory of the project:
python setup.py install
However, there is no easy way to deinstall it afterwards (only manually) if `setup.py` was used directly.
You could also use the module without installation, by augmenting the python-path via enviroment variable
export PYTHONPATH="${PYTHONPATH}:<path_to_exetest>"
or programmatically, for example with help of
import sys
sys.path.append(path_to_exetest)
#### Tests
Use `sh run_unit_tests.sh` to setup a virtual environment, install the exetest-package, run unit-tests and delete everything:
Depending whether you will use python2 or python3 run it with `p2` or `p3` (`p3` being default), e.g.:
sh run_unit_tests.sh p3
To check the installation from github run (local project is default):
sh run_unit_tests.sh p3 from-github
To keep the setup virtual invironment run with option `keep`:
sh run_unit_tests.sh p3 local keep
## Tutorial
The goal of this framework is to make testing of the command line interfaces as simple as unit testing.
Let's assume we would like to test the following small python script `echoprog.py`:
#echoprog.py
#echo input to stdout and twice to stderr
import sys
input_content=sys.stdin.read()
if not input_content:
exit(42)
print input_content
print >> sys.stderr, input_content*2
exit(0)
So let's create a first test case, which checks, that the returned code is `42` if there is no input:
import exetest as ex
class TutorialTester:
exe="python"
casedata_no_input={ex.OPTIONS: ["echoprog.py"],
ex.EXIT_CODE: 42,
ex.INPUT: ""}
Important details are:
1. the name of the test case data MUST start with `casedata_`.
2. `exe="python"` defines which executable should be called. There must be a "exe" definition.
3. `ex.OPTIONS: ["echoprog.py"]` defines the options with which the executable will be started.
4. `ex.EXIT_CODE: 42` defines the expected exit code. In this case this is 42.
5. `ex.INPUT: ""` defines the standard input fed to the executable.
In the next step we choose the test runner. Right now, the only implemented target is the `unittest`-framework: we save our test set up as `test_tutorial.py` and extend the class with the following decorator:
import exetest as ex
import exetest.decorator as dec
@dec.to_unit_tests
class TutorialTester:
...
Now, run the tests with
python -m unittest test_tutorial
And we can see, that exact one test has been run successful. Change the expected exit code to see the test fail.
However now we would like to add another test case, which also checks that, if the input is empty, so not only the exit code is `42` but also there was no standard or error output:
...
@dec.to_unit_tests
class TutorialTester:
exe="python"
casedata_no_input={ex.OPTIONS: ["echoprog.py"],
ex.EXIT_CODE: 42,
ex.INPUT: ""}
casedata_no_input2={ex.OPTIONS: ["echoprog.py"],
ex.EXIT_CODE: 42,
ex.INPUT: "",
ex.STDERR: "",
ex.STDOUT: ""}
Important details are:
1. `ex.STDERR: ""` defines the expected stander error output, in this case this should be empty.
2. `ex.STDERR: ""` defines the standard input fed to the executable.
3. the name of the test case data MUST start with `casedata_`.
After running the unittest framework we can see, that now there are 2 successful tests.
However, we also could factor out the common set up into a variable called `default_parameters` (this name is a must!) for example:
...
@dec.to_unit_tests
class TutorialTester:
exe="python"
default_parameters = {ex.OPTIONS: ["echoprog.py"],
ex.EXIT_CODE: 42,
ex.INPUT: ""}
casedata_no_input={}
casedata_no_input2={ex.STDERR: "",
ex.STDOUT: ""}
The default parameters can be easily overwritten in a test case definition:
...
@dec.to_unit_tests
class TutorialTester:
exe="python"
default_parameters = {ex.OPTIONS: ["echoprog.py"],
ex.EXIT_CODE: 42,
ex.INPUT: ""}
...
casedata_real_input={ ex.EXIT_CODE: 0, #<============ HERE!
ex.STDERR: "my_inputmy_input\n",
ex.STDOUT: "my_input\n",
ex.INPUT: "my_input"} #<============ and HERE!
Now there are 3 successful tests!
#### Custom Checkers
It is possible to add custom checkers, there are multiple reasons why they are needed:
1. Theresults must be compared with some tolerance (e.g. doubles)
2. More than one result is correct
3. Part of the results is written on the disc
It is possible do do without custom checkers and use some wrapper for the program to be tested, but custom checkers may be a more convient approach.
We can replace the default checker by overwriting `ex.CHECKERS` which is a list of checkers, for example:
....
from exetest.checkers import DoubleChecker
@dec.to_unit_tests
class TutorialTester:
...
casedata_double_checker={ ex.EXIT_CODE: 0,
ex.INPUT: "1.0",
ex.STDOUT: ".9",
ex.CHECKERS: [DoubleChecker(rel_tolerance=.1, abs_tolerance=.1)]}
Here we use the predefined `DoubleChecker` - the DefaultChecker would fail because the outputs are different, but the `DoubleChecker` accepts this difference.
The checkers must be a callable with signature `xxx(expected, received)` (consult `executor.py` for more details).
If we would like to have a checker in addition to the `DefaultChecker`, we could use `ex.ADDITIONAL_CHECKERS`-option:
class VersionChecker():
def __init__(self, minversion):
self.minversion=minversion
def __call__(self, expected, received):
if ex.__version__>=self.minversion:
return True,""
return False,"exetest too old"
@dec.to_unit_tests
class TutorialTester:
...
casedata_add_checker={ ex.EXIT_CODE: 0,
ex.INPUT: "1.0",
ex.STDOUT: "1.0\n",
ex.ADDITIONAL_CHECKERS: [VersionChecker((0,2,0))]}
Here, the test of the version will be done in addition to the usual `DefaultChecker` and is equivalent to
from exetest.checkers import DefaultChecker
...
casedata_overwrite_checker={ ex.EXIT_CODE: 0,
ex.INPUT: "1.0",
ex.STDOUT: "1.0\n",
ex.CHECKERS: [DefaultChecker(), VersionChecker((0,2,0))]}
Please take into account, that `DefaultChecker` will be the first checker executed.
It is also possible to use for example a `lambda` as checker, if it suites you:
casedata_add_lambda={ ex.EXIT_CODE: 0,
ex.INPUT: "1.0",
ex.STDOUT: "1.0\n",
ex.ADDITIONAL_CHECKERS: [lambda expected, received: (True,"") if ex.__version__>=(0,2,0) else (False,"exetest is too old")]}
#### Preparers and Cleaners
There are also hooks to run code prior to the start of the executable and to run code after everything is done for cleaning up. They can be used for example for evaluating files written to the disc.
For this the parameter-keys `ex.PREPARERS` and `ex.CLEANERS` can be used.
The preparers are callable with signature `xxx(parameters)` so they know the starting parameters. If everything worked as expected preparers should return `None` or an empty string or an error-message otherwise. One or more preparers can be defined, for example:
casedata_preparers={ ex.EXIT_CODE: 0,
ex.INPUT: "1.0",
ex.STDOUT: "1.0\n",
ex.PREPARERS: [lambda pars : None , lambda pars : ""]}
Similar for cleaners - the only difference is that they must have the signature `xxx(parameters, received)` so they know the starting parameters and the returned values:
casedata_cleaners={ ex.EXIT_CODE: 0,
ex.INPUT: "1.0",
ex.STDOUT: "1.0\n",
ex.CLEANERS: [lambda pars, rec : None , lambda pars, rec : ""]}
#### Input/Output/Errors from files
It is also possible to use text-files as input, output and error:
import exetest.decorator as dec
import exetest as ex
@dec.to_unit_tests
class FromFileTester:
exe="python"
default_parameters = {ex.OPTIONS: ["echoprog.py"],
ex.EXIT_CODE: 0}
casedata_all_from_files={ex.INPUT_FILE: "input.txt",
ex.STDERR_FILE: "error.txt",
ex.STDOUT_FILE: "output.txt"}
specifying `ex.XXX_FILE` overwrites the corresponding `ex.XXX`-parameter if it is set, i.e.
casedata_all_from_files={ex.INPUT_FILE: "input.txt", #<== counts
ex.INPUT: "AAA"} #doesn't count
#### Discovering test cases from a folder
It is also possible to create test cases automatically from the existing test-case sets in a folder. Let's assume the following structure of the `test_data`-folder:
test_data
|----- A.in
|----- A.out
|----- A.err
|----- B.in
|----- B.out
|----- C.in
To create test cases A and B we can do the following:
import exetest as ex
import exetest.decorator as dec
import exetest.ts_discovery as ds
@dec.to_unit_tests
@ds.datasets_from_path("test_data")
class TestFromPathTester:
exe="python"
default_parameters = {ex.OPTIONS: ["echoprog.py"],
ex.EXIT_CODE: 0}
The usage of the decorator
def datasets_from_path(path, endings=dict(DEFAULT_ENDINGS), needed_files=set(DEFAULT_NEEDED_FILES)):
translates it roughly to the following code:
@dec.to_unit_tests
@ds.datasets_from_path("test_data")
class TestFromPathTester:
exe="python"
default_parameters = {ex.OPTIONS: ["echoprog.py"],
ex.EXIT_CODE: 0}
casedata_A={ex.INPUT_FILE: "testdata/A.in",
ex.STDERR_FILE: "testdata/A.out",
ex.STDOUT_FILE: "testdata/A.err"}
casedata_B={ex.INPUT_FILE: "testdata/B.in",
ex.STDERR_FILE: "testdata/B.out"}
The role of the files is fixed through the ending of the file and can be customized via `endings`-argument of the decorator, which has the following default:
DEFAULT_ENDINGS ={ex.INPUT_FILE : ".in",
ex.STDOUT_FILE : ".out",
ex.STDERR_FILE : ".err"}
As default, a test case is registered if both input and output file with the same name are present. This behavior can be customized via `needed_files`-argument of the decorator. The default is:
DEFAULT_NEEDED_FILES = set([ex.INPUT_FILE, ex.STDOUT_FILE])
## History:
**0.1.0**: First release
**0.2.0**: Custom Checker added // Preparers and Cleaners added
**0.3.0**: Input/Ouput/Error from files // Discovering test cases from a folder
**0.4.0**: Support for Python3 (only ascii)
## Future:
1. maximal execution time for a test case
2. an interface for test runner, so this framework can be used without unittest
3. other test frameworks as possible targets
4. Non-ascii support in Python3
| 35.138418 | 262 | 0.622317 | eng_Latn | 0.983292 |
aaa32f9e57c5cff347262d6c94022232cc1b82b4 | 203 | md | Markdown | README.md | prof-rossetti/prof-rossetti-web-react | 1d93308dc9103f4bd98501dc04ed0541d5f186d4 | [
"MIT"
] | null | null | null | README.md | prof-rossetti/prof-rossetti-web-react | 1d93308dc9103f4bd98501dc04ed0541d5f186d4 | [
"MIT"
] | null | null | null | README.md | prof-rossetti/prof-rossetti-web-react | 1d93308dc9103f4bd98501dc04ed0541d5f186d4 | [
"MIT"
] | null | null | null | # Prof Rossetti Website (React)
A personal website made with react.js.
## [Contributing](/CONTRIBUTING.md)
## License
Code released under MIT license. Content is Copyright Michael J Rossetti (2020).
| 20.3 | 80 | 0.753695 | eng_Latn | 0.82148 |
aaa3eed11af1efae8924cb43fbed1e926ef02eb0 | 2,304 | md | Markdown | docs/ideas.md | StevenPeterson7/AFLplusplus | fd8cc6b61d437c4cfdf6a9229fba843d5130e02c | [
"Apache-2.0"
] | 1 | 2021-02-04T11:43:55.000Z | 2021-02-04T11:43:55.000Z | docs/ideas.md | mbrukman/AFLplusplus | 8e712d1a740b30f9e2d5655d97d4cac6e8aed543 | [
"Apache-2.0"
] | null | null | null | docs/ideas.md | mbrukman/AFLplusplus | 8e712d1a740b30f9e2d5655d97d4cac6e8aed543 | [
"Apache-2.0"
] | null | null | null | # Ideas for afl++
In the following, we describe a variety of ideas that could be implemented
for future AFL++ versions.
## Analysis software
Currently analysis is done by using afl-plot, which is rather outdated.
A GTK or browser tool to create run-time analysis based on fuzzer_stats,
queue/id* information and plot_data that allows for zooming in and out,
changing min/max display values etc. and doing that for a single run,
different runs and campaigns vs campaigns.
Interesting values are execs, and execs/s, edges discovered (total, when
each edge was discovered and which other fuzzer share finding that edge),
test cases executed.
It should be clickable which value is X and Y axis, zoom factor, log scaling
on-off, etc.
## WASM Instrumentation
Currently, AFL++ can be used for source code fuzzing and traditional binaries.
With the rise of WASM as compile target, however, a novel way of
instrumentation needs to be implemented for binaries compiled to Webassembly.
This can either be done by inserting instrumentation directly into the
WASM AST, or by patching feedback into a WASM VMs of choice, similar to
the current Unicorn instrumentation.
Mentor: any
## Machine Learning
Something with machine learning, better than [NEUZZ](https://github.com/dongdongshe/neuzz) :-)
Either improve a single mutator thorugh learning of many different bugs
(a bug class) or gather deep insights about a single target beforehand
(CFG, DFG, VFG, ...?) and improve performance for a single target.
Mentor: domenukk
## Collision-free Binary-Only Maps
AFL++ supports collison-free maps using an LTO (link-time-optimization) pass.
This should be possible to implement for QEMU and Unicorn instrumentations.
As the forkserver parent caches just in time translated translation blocks,
adding a simple counter between jumps should be doable.
Note: this is already in development for qemu by Andrea, so for people who
want to contribute it might make more sense to port his solution to unicorn.
Mentor: andreafioraldi or domenukk
Issue/idea tracker: [https://github.com/AFLplusplus/AFLplusplus/issues/237](https://github.com/AFLplusplus/AFLplusplus/issues/237)
## Your idea!
Finally, we are open to proposals!
Create an issue at https://github.com/AFLplusplus/AFLplusplus/issues and let's discuss :-)
| 40.421053 | 130 | 0.791667 | eng_Latn | 0.996219 |
aaa451522ed90f7b25341f26d154d6aa34e27aca | 3,165 | md | Markdown | docs/codebase_structure.md | WadhwaniAI/covid-modelling | db9f89bfbec392ad4de6b4583cfab7c3d823c1c9 | [
"MIT"
] | 3 | 2021-06-23T10:27:11.000Z | 2022-02-09T07:50:42.000Z | docs/codebase_structure.md | WadhwaniAI/covid-modelling | db9f89bfbec392ad4de6b4583cfab7c3d823c1c9 | [
"MIT"
] | 3 | 2021-06-23T09:36:29.000Z | 2022-01-13T03:38:16.000Z | docs/codebase_structure.md | WadhwaniAI/covid-modelling | db9f89bfbec392ad4de6b4583cfab7c3d823c1c9 | [
"MIT"
] | null | null | null | # Folder Strucure
```
.
├── configs/
│ ├── seir/
│ ├── ihme/
│ ├── exper/
│ ├── simulated_data/
├── data/
│ ├── dataloader/
│ ├── processing/
├── docs/
│ ├── sphinx/
│ ├── *.md
├── main/
│ ├── ihme/
│ ├── seir/
│ ├───├─── optimisers/
│ ├───├─── uncertainty/
│ ├───├─── main.py/
├── models/
│ ├── ihme/
│ ├── seir/
├── notebooks/
│ ├── seir/
├── scripts/
│ ├── ihme/
│ ├── seir/
├── utils/
│ ├── fitting/
│ ├── generic/
├── viz/
```
## configs
Contains all configs. Refer to [config.md](config.md) for more details.
```
├── configs/
│ ├── seir/
│ ├── ihme/
│ ├── exper/
│ ├── simulated_data/
```
- `seir` : all SEIR configs
- `ihme` : all IHME configs
- `exper` : all experimentation configs. Generated N configs from 1 config, for experimentation
- `simulated_data` : all simulated data configs.
## data
Contains all dataloading and processing code. Refer to [data.md](data.md) for more details.
```
├── data/
│ ├── dataloader/
│ ├── processing/
```
- `dataloader` : contains all dataloaders. If the user wishes to add more dataloaders, they will be children of the `BaseLoader` class
- `processing` : contains code for processing all data post loading it. We wished to add a generic data transformations class and have all processing code be children of the base transformation class, but we were unable to do that.
## docs
Contains all documentation.
```
├── docs/
│ ├── sphinx/
│ ├── *.md
```
- `sphinx` : contains autodocs generated from docstrings of functions and classes
- `*.md` : Markdown documentation of different aspects of the project
## main
Contains the code for fitting the params of the model to data, and estimating uncertainty.
```
├── main/
│ ├── ihme/
│ ├── seir/
│ ├───├─── optimisers/
│ ├───├─── uncertainty/
│ ├───├─── main.py/
```
- `ihme` : functions for fitting IHME models
- `seir` : functions for fitting general models. Initially developed to fit only SEIR models, but then abstracted more with time to work with general models
## models
Contains the code for fitting the params of the model to data, and estimating uncertainty.
```
├── models/
│ ├── ihme/
│ ├── seir/
```
- `ihme` : the IHME model
- `seir` : All SEIR models. If the user wishes to create a new SEIR model, it must be a child of the base epi-model class
If the user wishes to add a new model class, they can create a folder for it, implement a base class for that model class, and then create models as children of that base class.
## notebooks and scripts
Contains all runnable code. Most important is `notebooks/seir/[STABLE] generate_report.ipynb`.
```
├── notebooks/
│ ├── seir/
├── scripts/
│ ├── ihme/
│ ├── seir/
```
## utils
Fitting specific utils in `fitting`. Rest all in `generic`.
```
├── utils/
│ ├── fitting/
│ ├── generic/
```
## viz
All visualisation code
```
├── viz/
```
Additionally,
- All local logging is typically done in `misc/reports`, but can be changed.
- All local data caching is done in `misc/cache`, but can be changed.
- Pyathena credentials are stored in `misc/pyathena`, but can be changed.
None of this is stored on git. | 21.979167 | 231 | 0.636335 | eng_Latn | 0.982816 |
aaa61479ebf557b87621e1fa53db531da93235e7 | 141 | md | Markdown | README.md | tom2015git/simple_cms | bde1691072a49f903f01e3a51a4031bc9b4e6244 | [
"MIT"
] | null | null | null | README.md | tom2015git/simple_cms | bde1691072a49f903f01e3a51a4031bc9b4e6244 | [
"MIT"
] | null | null | null | README.md | tom2015git/simple_cms | bde1691072a49f903f01e3a51a4031bc9b4e6244 | [
"MIT"
] | null | null | null | # simplealbum
ci框架的运行路径设置全局变量
upload.php调试极不方便
wordpress怎么调试插件的
ajax实现小说分页阅读
上传文本文件时,文本文件必须是utf-8编码
表单验证
博客功能
代码重构和页面美化
权限控制
封面选择
| 6.130435 | 22 | 0.808511 | yue_Hant | 0.254514 |
aaa65239113974b5bbfdffab2e64c41e66e05909 | 6,001 | md | Markdown | CHANGELOG.md | prabhatCH/sequelize-m | 4ddcfc36558428ac17700e1c9cd89749d2b90652 | [
"MIT"
] | null | null | null | CHANGELOG.md | prabhatCH/sequelize-m | 4ddcfc36558428ac17700e1c9cd89749d2b90652 | [
"MIT"
] | 94 | 2021-01-05T07:01:52.000Z | 2022-03-01T20:05:45.000Z | CHANGELOG.md | prabhatCH/sequelize-mig | 4ddcfc36558428ac17700e1c9cd89749d2b90652 | [
"MIT"
] | null | null | null | ## [2.4.1](https://github.com/mrvmv/sequelize-mig/compare/v2.4.0...v2.4.1) (2020-10-30)
### Bug Fixes
* refactor getPartialMigration n fix droptable ([535656c](https://github.com/mrvmv/sequelize-mig/commit/535656cd9eae5af0f014f0b445df54e5a77f7890))
# [2.4.0](https://github.com/mrvmv/sequelize-mig/compare/v2.3.7...v2.4.0) (2020-10-28)
### Bug Fixes
* fix bug in depends checking for null ([90ecfc4](https://github.com/mrvmv/sequelize-mig/commit/90ecfc447c222e44185dcec8319a7f6209d6c1a4))
* fix huge bugs for index and changeColumn ([af2275c](https://github.com/mrvmv/sequelize-mig/commit/af2275cff8daf92c75eac8869c587f4f44bf8bf1))
* writeMigration update consoleOut to consoles ([02abfe8](https://github.com/mrvmv/sequelize-mig/commit/02abfe88edbd47b2f08cd5dfff67257490a9103d))
### Features
* add getFileName to functions for future ([b03e81b](https://github.com/mrvmv/sequelize-mig/commit/b03e81b2a7f5178e7f0187f585eef1f502d48256))
* add migration:undo ([c420177](https://github.com/mrvmv/sequelize-mig/commit/c4201778bdde14704e410f5d9980e7f20a6dada4))
## [2.3.7](https://github.com/mrvmv/sequelize-mig/compare/v2.3.6...v2.3.7) (2020-10-28)
### Bug Fixes
* remove lodash dep and make template native ([88c9feb](https://github.com/mrvmv/sequelize-mig/commit/88c9feb50bdb69aa3eda6aa6a87f7354f5ca2754))
### Performance Improvements
* update assets to new template ([950a832](https://github.com/mrvmv/sequelize-mig/commit/950a832ce391a2d8ff933374672c788f5ed8ce11))
## [2.3.6](https://github.com/mrvmv/sequelize-mig/compare/v2.3.5...v2.3.6) (2020-10-27)
### Bug Fixes
* small fix for action.options not defined ([e66a52e](https://github.com/mrvmv/sequelize-mig/commit/e66a52e28c68b93aa15d20192c733978112d62bc))
## [2.3.5](https://github.com/mrvmv/sequelize-mig/compare/v2.3.4...v2.3.5) (2020-10-27)
### Bug Fixes
* replace currentState.content to perviousState ([c5771a6](https://github.com/mrvmv/sequelize-mig/commit/c5771a61dc4f8193327e1457b08acf75dedf953d))
## [2.3.4](https://github.com/mrvmv/sequelize-mig/compare/v2.3.3...v2.3.4) (2020-10-27)
### Bug Fixes
* try to fix url host problem on linux devices ([9f8da83](https://github.com/mrvmv/sequelize-mig/commit/9f8da830940c37a7fed71d76688530a5d96a4435))
## [2.3.3](https://github.com/mrvmv/sequelize-mig/compare/v2.3.2...v2.3.3) (2020-10-25)
### Bug Fixes
* double type was showing an error ([32f964f](https://github.com/mrvmv/sequelize-mig/commit/32f964fc84a3dcf609ba8a0785c533d24aaae82e))
## [2.3.2](https://github.com/mrvmv/sequelize-mig/compare/v2.3.1...v2.3.2) (2020-10-14)
### Bug Fixes
* remove Optional chaining to support older node versions ([16793a4](https://github.com/mrvmv/sequelize-mig/commit/16793a497a952ca5fe4f40752d09880259db20af))
## [2.3.1](https://github.com/mrvmv/sequelize-mig/compare/v2.3.0...v2.3.1) (2020-10-06)
### Bug Fixes
* addindex, removeindex breaking migrations ([f1a8bfa](https://github.com/mrvmv/sequelize-mig/commit/f1a8bfad2285acbccc48491b1190e6b293d0efbc))
* if now changes in models no error ([f5abc5e](https://github.com/mrvmv/sequelize-mig/commit/f5abc5e9fe712f8b65732894e29e1d9315000259))
* trying some updates to models.js ([a3e1786](https://github.com/mrvmv/sequelize-mig/commit/a3e1786829fa0861bcd092799b67c10cc8337c5b))
* update index.js ([5e33685](https://github.com/mrvmv/sequelize-mig/commit/5e3368517b895ac7dc358ff2c7dfd0e7a128e8cd))
# [2.3.0](https://github.com/mrvmv/sequelize-mig/compare/v2.2.0...v2.3.0) (2020-09-18)
### Bug Fixes
* fix sequelizerc ([1741a5c](https://github.com/mrvmv/sequelize-mig/commit/1741a5cf3cd7b0d28aeb42c0c0eb8775e9141d8a))
* small fix for unused comparisons ([c6472cd](https://github.com/mrvmv/sequelize-mig/commit/c6472cd14818d8ed5c4704dd3af2d84afe50fe3e))
### Features
* add ignore-sequelizerc flag ([cb79b6e](https://github.com/mrvmv/sequelize-mig/commit/cb79b6ea0de3ca11165742fec2e136c2d8c62efb))
# [2.2.0](https://github.com/mrvmv/sequelize-mig/compare/v2.1.2...v2.2.0) (2020-09-16)
### Bug Fixes
* fix for defaultValue check ([19f4af4](https://github.com/mrvmv/sequelize-mig/commit/19f4af4ca791019216edccf259e0a318c72aae71))
* update dep and repair bugs ([1e91034](https://github.com/mrvmv/sequelize-mig/commit/1e91034ece94067af552176249ed62c838e145d5))
* **lib:** add checking to rhs ([602af96](https://github.com/mrvmv/sequelize-mig/commit/602af962860140536fe99e2754fcde1fc386654c))
* **lib:** defaultValue cannot be null ([d10b805](https://github.com/mrvmv/sequelize-mig/commit/d10b80545bd1c4a6f786bf51668c437cc306057a))
### Features
* add custom schemas path other than migration ([a065238](https://github.com/mrvmv/sequelize-mig/commit/a0652383f1a17425f97a2071183a1431b2144e2a))
* add pwd path to change all paths base ([f225e4a](https://github.com/mrvmv/sequelize-mig/commit/f225e4a1eb5a6d930c5a5ce07366ca707619e486))
* Change migration file name to timestamps ([ecf2dc7](https://github.com/mrvmv/sequelize-mig/commit/ecf2dc7214528686e163f4c07a3cb6cdf4cd1f6c))
* **lib:** allow custom datatypes ([1015cd1](https://github.com/mrvmv/sequelize-mig/commit/1015cd1f9eda5602266f0ff03339e195692f0d23))
* **lib:** support blob string length ([f336f86](https://github.com/mrvmv/sequelize-mig/commit/f336f86638efeb50e98586243aa010344e8d441d))
* **lib:** support other array types ([8654b0b](https://github.com/mrvmv/sequelize-mig/commit/8654b0bd1c3501b8d089bf6f716e781051bd794f))
* **lib:** support text string length ([ed561a6](https://github.com/mrvmv/sequelize-mig/commit/ed561a60ebff32ef2a6e02fcdb0bce65944bca0f))
## [2.1.2](https://github.com/mrvmv/sequelize-mig/compare/v2.1.1...v2.1.2) (2020-09-04)
### Bug Fixes
* fix for registry in package json ([a2cab80](https://github.com/mrvmv/sequelize-mig/commit/a2cab80bd2fcc43f9f2254d23812a918a0007a0d))
## [2.1.1](https://github.com/mrvmv/sequelize-mig/compare/v2.1.0...v2.1.1) (2020-09-04)
### Bug Fixes
* add Lgtm grade and other icons for readme ([4eea801](https://github.com/mrvmv/sequelize-mig/commit/4eea801ef8c589b8201c10331aa19b71c2ad64e7))
| 47.251969 | 157 | 0.771538 | yue_Hant | 0.217669 |
aaa6d40058d5f80b2179858b5db66a529c74508d | 1,014 | md | Markdown | Cryptography/_posts/2020-07-14-I-Love-Rainbows.md | Dunsp4rce/rgbCTF-2020 | bd6412259f2b0db5dd958b1fdcd74c24f02405c9 | [
"MIT"
] | null | null | null | Cryptography/_posts/2020-07-14-I-Love-Rainbows.md | Dunsp4rce/rgbCTF-2020 | bd6412259f2b0db5dd958b1fdcd74c24f02405c9 | [
"MIT"
] | null | null | null | Cryptography/_posts/2020-07-14-I-Love-Rainbows.md | Dunsp4rce/rgbCTF-2020 | bd6412259f2b0db5dd958b1fdcd74c24f02405c9 | [
"MIT"
] | null | null | null | ---
layout: post
title: "I Love Rainbows"
author: "INXS_JOY"
tags: ['Cryptography']
---
Can you figure out why?
**Files**
- [rainbows.txt]({{site.baseurl}}/assets/I-Love-Rainbows/rainbows.txt)
## Solution
The prompt kinda hints that it has something to do with the rainbow hash attack. Surprising enough we find hashes in the rainbows.txt file.
There are two types of hashes in the file
```
1.MD5 Hash i.e the short ones
2.SHA256 Hash i.e the long ones
```
So now we need to reverse these hashes to see what as the original text. For this I used [https://md5.gromweb.com/](https://md5.gromweb.com/) , for MD5 reversing and [https://md5decrypt.net/en/Sha256/ ](https://md5decrypt.net/en/Sha256/ ), for SHA256 reversing.
Some hashed cannot be reversed on these sites then use this https://crackstation.net/ which is basically a brute force try on the hashes. Each hash would give one or two letter of the flag. Stringing them all together we get the flag.
## Flag
```
rgbCTF{alw4ys_us3_s4lt_wh3n_h4shing}
```
| 37.555556 | 262 | 0.739645 | eng_Latn | 0.989318 |
aaa6e6377c24819e056b5def8c6a3d5ad8183cbb | 1,741 | md | Markdown | docs/vs-2015/extensibility/debugger/reference/idebugalias-geticordebugvalue.md | klmnden/visualstudio-docs.tr-tr | 82aa1370dab4ae413f5f924dad3e392ecbad0d02 | [
"CC-BY-4.0",
"MIT"
] | 1 | 2020-09-01T20:45:52.000Z | 2020-09-01T20:45:52.000Z | docs/vs-2015/extensibility/debugger/reference/idebugalias-geticordebugvalue.md | klmnden/visualstudio-docs.tr-tr | 82aa1370dab4ae413f5f924dad3e392ecbad0d02 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | docs/vs-2015/extensibility/debugger/reference/idebugalias-geticordebugvalue.md | klmnden/visualstudio-docs.tr-tr | 82aa1370dab4ae413f5f924dad3e392ecbad0d02 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | ---
title: IDebugAlias::GetICorDebugValue | Microsoft Docs
ms.date: 11/15/2016
ms.prod: visual-studio-dev14
ms.technology: vs-ide-sdk
ms.topic: reference
f1_keywords:
- IDebugAlias::GetICorDebugValue
helpviewer_keywords:
- IDebugAlias::GetICorDebugValue method
ms.assetid: b9eb39ee-84af-4ace-9cfe-236b3d48aff5
caps.latest.revision: 13
ms.author: gregvanl
manager: jillfra
ms.openlocfilehash: 67ab8a7343cd320470515b757dfca905a0a4690e
ms.sourcegitcommit: 94b3a052fb1229c7e7f8804b09c1d403385c7630
ms.translationtype: MT
ms.contentlocale: tr-TR
ms.lasthandoff: 04/23/2019
ms.locfileid: "68156287"
---
# <a name="idebugaliasgeticordebugvalue"></a>IDebugAlias::GetICorDebugValue
[!INCLUDE[vs2017banner](../../../includes/vs2017banner.md)]
Bu diğer adla ilişkilendirilmiş değeri temsil eden bir yönetilen kod arabirim alır.
## <a name="syntax"></a>Sözdizimi
```cpp
HRESULT GetICorDebugValue(
IUnknown** ppUnk
);
```
```csharp
int GetICorDebugValue(
out object ppUnk
);
```
#### <a name="parameters"></a>Parametreler
`ppUnk`
[out] `IUnknown` bu diğer adla ilişkilendirilmiş değeri temsil eden arabirim. Bu arabirim için sorgulanabilir `ICorDebugValue` arabirimi.
## <a name="return-value"></a>Dönüş Değeri
Başarılıysa S_OK döndürür; Aksi takdirde bir hata kodu döndürür.
## <a name="remarks"></a>Açıklamalar
Bu yöntem yalnızca yönetilen değerlere uygulanır ( `ICorDebugValue` arabirim kullanılabilir [!INCLUDE[dnprdnshort](../../../includes/dnprdnshort-md.md)] ve tanımlanan [!INCLUDE[dnprdnshort](../../../includes/dnprdnshort-md.md)] SDK cordebug.idl dosyasında).
## <a name="see-also"></a>Ayrıca Bkz.
[IDebugAlias](../../../extensibility/debugger/reference/idebugalias.md)
| 32.849057 | 260 | 0.743825 | tur_Latn | 0.580294 |
aaa720d104a781b531133c83c04cd2632dbcef79 | 550 | md | Markdown | Compose/MVVM.md | Jswizzy/Android-Notes | 03a0fdc96bf23af8ea2bda437b59957ff7edbd48 | [
"MIT"
] | 1 | 2021-12-19T18:24:19.000Z | 2021-12-19T18:24:19.000Z | Compose/MVVM.md | Jswizzy/Android-Notes | 03a0fdc96bf23af8ea2bda437b59957ff7edbd48 | [
"MIT"
] | null | null | null | Compose/MVVM.md | Jswizzy/Android-Notes | 03a0fdc96bf23af8ea2bda437b59957ff7edbd48 | [
"MIT"
] | null | null | null | # Model-View-ViewModel (MVVM)
An event based approach to a graphic application. ViewModel provides observable data and the view consumes it. The ViewModel knows nothing about the view. The ViewModel shouldn't have any dependencies on the Android UI framework.
Consists of:
- Model
: Business logic and data layer. (same as MVP/MVC)
- View
: Notifies ViewModel of user interactions and subscribes to and displays data exposed by the ViewModel.
- ViewModel
: Retrieves and updates the data from the model and exposes it as observable streams.
| 42.307692 | 229 | 0.785455 | eng_Latn | 0.981172 |
aaa77a3553f089959aa3d4fcde62c3704c165b37 | 45 | md | Markdown | README.md | brucobruce/avis-civitavecchia | 63a4a5234b04e75357754de811c8e4f2c40b9e55 | [
"MIT"
] | null | null | null | README.md | brucobruce/avis-civitavecchia | 63a4a5234b04e75357754de811c8e4f2c40b9e55 | [
"MIT"
] | null | null | null | README.md | brucobruce/avis-civitavecchia | 63a4a5234b04e75357754de811c8e4f2c40b9e55 | [
"MIT"
] | null | null | null | # avis-civitavecchia
progetto TPSI avisgit
| 15 | 22 | 0.8 | ita_Latn | 0.797569 |
aaa82513d3f62615e7cd3436de18c27ae2b1f7f9 | 7,336 | md | Markdown | README.md | XenoAmess/x8l | 6c33b2284158894a49e9d47a11fd476926f11626 | [
"MIT"
] | 1 | 2020-03-15T20:11:07.000Z | 2020-03-15T20:11:07.000Z | README.md | XenoAmess/x8l | 6c33b2284158894a49e9d47a11fd476926f11626 | [
"MIT"
] | 17 | 2019-08-04T15:41:01.000Z | 2022-01-05T14:46:56.000Z | README.md | cyanpotion/x8l | cd2a6107417bcd81aa7818191b5f4f7cb67737b0 | [
"MIT"
] | null | null | null | # x8l
[](https://maven-badges.herokuapp.com/maven-central/com.xenoamess/x8l)
[](https://opensource.org/licenses/MIT)
[](https://sonarcloud.io/dashboard?id=cyanpotion_x8l)
<!--[](https://ci.appveyor.com/project/XenoAmess/x8l)-->
<p>
<b>
X8l format is a type of data format, it is designed to be replace of xml/json in most cases when you need the data be shorter(while remains readability).
</b>
</p>
<br/>
<p>
<b>
See <a href="https://plugins.jetbrains.com/plugin/13915-x8l">plugin on Jetbrains plugin storage</a><br/>
See <a href="https://github.com/XenoAmess/x8l_idea_plugin">plugin on github</a><br/>
See <a href="https://github.com/cyanpotion/x8l">X8l Grammar/SDK</a><br/>
See <a href="https://github.com/XenoAmess/x8l_spring_context">X8l Spring Context</a><br/>
</b>
</p>
<br/>
<p><img src="https://raw.githubusercontent.com/XenoAmess/x8l_idea_plugin/master/pictures/screenshot.png" width="1080" height="720" alt="screenshot.png"/></p>
<br/>
<p><a href="https://github.com/XenoAmess/x8l_idea_plugin/issues">Send Feedback</a></p>
## aim of x8l
when I deal with markup languages I just find that some of them are unnecessarily swollen.
They use much more disk than they need.
Of course some reasons might be considering ability of random access or other things,
but in most cases, we just use dom and load the whole tree into our memory,
and we just want it to be smaller.
After all network, or IO, is still a bottle-neck.
So we bring up a new markup language here.
x8l is a variant of xml, and aim to use as small space as possible.
A naive xml (one without XLS or DTD or some things) can be transform into a x8l, and then transform back without losing data.
A json file can also be transformed into a x8l or transform back (but every value of every attribute will lose their type information and become pure string).
## bench mark.
We use some data from a wiki mirror to get the xml bench mark.
The average ratio after a transform from xml to x8l is around 84%,
Which means about 16% of the size can be reduced.
We use some data from a json file to get the xml bench mark.
The average ratio after a transform from json to x8l is around 99%,
Which means about 1% of the size can be reduced.
(Notice that we only do json bench mark for prove of expandability of x8l.
We want to make sure when a data can be saved as json, it shall be able to be saved to x8l.
Of course due to x8l's lack of type information, all type information of attributes will lost in this process)
The details of the bench marks are in com.xenoamess.x8l.BenchMark
## basic tutorial of x8l
here goes a basic demo of x8l.
### comment
first,a comment is like this
```text
<<first,a comment is like this>
```
or this
```text
< <or even this>
```
or even this. < in a comment need not be transcoded.
```text
<<<or even this this.< in a comment need not be transcoded.>
```
use % to transcode. A character after % is treated as a simple character.
```text
<<use %% to transcode. A character after % is treated as a simple character. for example, %>, and this is still in it.>
```
### attributes
the content between the first < and the second < is treated as "attributes".
```text
<<the content between the first < and the second < is treated as "attributes".>
```
the order of attributes is important, and node with different order of same attributes are different.
attribute can have = in it.if so, it will be departed into key and value.
key is the part left to the first =,and value is the rest content.
for example, "a" is a key and "b" is a value
```text
<a=b>>
```
remember, the first =.
```text
<a=b=c>>
```
that means this node's key is "a" and value is "b=c"
if there is no "=" in an attribute then the whole string is the key,and "" is the value
notice that both keys and values in attributes will only be treated string, but not float or double or datetime or something.
space chars between attributes are treated as nothing, so does '\r' '\n' '\t'
which means you can write it like this
```text
<views
windowWidth=1280
windowHeight=1024
scale=2.0
fullScreen=0
>>
```
And it equals to
```text
<views windowWidth=1280 windowHeight=1024 scale=2.0 fullScreen=0>>
```
### children
the content between the second `< and the %>` is treated as "children".
children must be nodes, and children's parent is the node which it in.
there are now 3 kinds of nodes, "content node", "text node", and "comment node".
only "content node" have attributes and contents.
so what is a text node? A text Node is a text like this.
```text
so what is a text node? A text Node is a text like this.
```
be careful! a space in text node is meaningful and cannot be deleted!
that means these are 3 different nodes:
```text
<<>
```
```text
<< >
```
```text
<<
>
```
if you want to delete all text node with "empty char" content,you can use X8lTree.trim().
if you want to have several TextNode continuously, use `&` for the separator:
```text
<>textA&textB&textC>
```
that is the basic tutorial.
you can now run the testCases in com.xenoamess.x8l.X8lTest and see the output of the tree of this readme.
that should be helpful.
thanks for reading.
## real case of x8l
```text
<commonSettings
titleText=GamepadMassage
gameWindowClassName=com.xenoamess.gamepad_massage.FalseGameWindow
logoClassName=com.xenoamess.gamepad_massage.FalseWorld
titleClassName=com.xenoamess.cyan_potion.gameWindowComponents.Title
worldClassName=com.xenoamess.gamepad_massage.FalseWorld
>>
<views
windowWidth=1280
windowHeight=1024
scale=2.0
fullScreen=0
>>
<specialSettings
autoShowGameWindowAfterInit=0
noConsoleThread=1
>>
<debug>>
<keymap using>
<GLFW_KEY_W>XENOAMESS_KEY_UP>
<GLFW_KEY_A>XENOAMESS_KEY_LEFT>
<GLFW_KEY_S>XENOAMESS_KEY_DOWN>
<GLFW_KEY_D>XENOAMESS_KEY_RIGHT>
<GLFW_KEY_UP>XENOAMESS_KEY_UP>
<GLFW_KEY_LEFT>XENOAMESS_KEY_LEFT>
<GLFW_KEY_DOWN>XENOAMESS_KEY_DOWN>
<GLFW_KEY_RIGHT>XENOAMESS_KEY_RIGHT>
<GLFW_KEY_ESCAPE>XENOAMESS_KEY_ESCAPE>
<GLFW_KEY_ENTER>XENOAMESS_KEY_ENTER>
<GLFW_KEY_SPACE>XENOAMESS_KEY_SPACE>
<GLFW_KEY_LEFT_SHIFT>XENOAMESS_KEY_LEFT_SHIFT>
<GLFW_KEY_RIGHT_SHIFT>XENOAMESS_KEY_RIGHT_SHIFT>
<GLFW_MOUSE_BUTTON_LEFT>XENOAMESS_MOUSE_BUTTON_LEFT>
<GLFW_MOUSE_BUTTON_RIGHT>XENOAMESS_MOUSE_BUTTON_RIGHT>
<GLFW_MOUSE_BUTTON_MIDDLE>XENOAMESS_MOUSE_BUTTON_MIDDLE>
>
<backup worldClassName=com.xenoamess.rpg_module.world.World>>
<backup worldClassName=com.xenoamess.modern_alchemy.scene.ProgramScene>>
<backup worldClassName=com.xenoamess.gamepad_massage.FalseWorld>>
<backup gameWindowClassName=com.xenoamess.cyan_potion.GameWindow>>
<merge version=1.0>
<0001>
<en>Thanks!>
<<just comment>
<ch>谢谢!>
>
<<just comment>
<0002>
<en>Hello?>
<<just comment>
<ch>您好?>
>
>
<merge version=1.0>
<0001>
<en>Thanks!>
<<just comment>
<ch>谢谢!>
>
>
```
| 30.823529 | 168 | 0.731052 | eng_Latn | 0.970804 |
aaa8cc8fa22a29b7e8725d06455decefca858f05 | 861 | md | Markdown | docs-ref-conceptual/storageservices/Operations-on-Queues.md | faicalsaid/azure-docs-rest-apis-public | 7aa35aa43aa0caab2786c9613dfbd97f3841827f | [
"CC-BY-4.0",
"MIT"
] | null | null | null | docs-ref-conceptual/storageservices/Operations-on-Queues.md | faicalsaid/azure-docs-rest-apis-public | 7aa35aa43aa0caab2786c9613dfbd97f3841827f | [
"CC-BY-4.0",
"MIT"
] | 3 | 2019-02-27T12:45:59.000Z | 2019-07-13T04:49:17.000Z | docs-ref-conceptual/storageservices/Operations-on-Queues.md | faicalsaid/azure-docs-rest-apis-public | 7aa35aa43aa0caab2786c9613dfbd97f3841827f | [
"CC-BY-4.0",
"MIT"
] | 8 | 2018-10-23T13:56:32.000Z | 2021-03-12T16:55:10.000Z | ---
title: "Operations on Queues"
ms.custom: na
ms.date: 2016-06-29
ms.prod: azure
ms.reviewer: na
ms.service: storage
ms.suite: na
ms.tgt_pltfrm: na
ms.topic: reference
ms.assetid: 60f803b7-2437-48e7-808b-ed211c7a0897
caps.latest.revision: 19
author: tamram
manager: carolz
translation.priority.mt:
- de-de
- es-es
- fr-fr
- it-it
- ja-jp
- ko-kr
- pt-br
- ru-ru
- zh-cn
- zh-tw
---
# Operations on Queues
Microsoft Azure Storage provides REST operations for working with message queues.
## In This Section
[Create Queue](Create-Queue4.md)
[Delete Queue](Delete-Queue3.md)
[Get Queue Metadata](Get-Queue-Metadata.md)
[Set Queue Metadata](Set-Queue-Metadata.md)
[Get Queue ACL](Get-Queue-ACL.md)
[Set Queue ACL](Set-Queue-ACL.md)
## See Also
[Queue Service REST API](Queue-Service-REST-API.md)
| 19.133333 | 83 | 0.680604 | kor_Hang | 0.301208 |
aaa8cd29535e98b18a627872dbc2e651f0e15de4 | 367 | md | Markdown | docs/_docs/fluentast-core/at.hschroedl.fluentast/break_.md | hschroedl/FluentAST | 49510f0cadf3083b58de6011215b76c1b720d72f | [
"Apache-2.0"
] | null | null | null | docs/_docs/fluentast-core/at.hschroedl.fluentast/break_.md | hschroedl/FluentAST | 49510f0cadf3083b58de6011215b76c1b720d72f | [
"Apache-2.0"
] | null | null | null | docs/_docs/fluentast-core/at.hschroedl.fluentast/break_.md | hschroedl/FluentAST | 49510f0cadf3083b58de6011215b76c1b720d72f | [
"Apache-2.0"
] | null | null | null | ---
title: break_ - fluentast-core
---
[fluentast-core](../index.html) / [at.hschroedl.fluentast](index.html) / [break_](.)
# break_
`fun break_(): `[`FluentStatement`](../at.hschroedl.fluentast.ast.statement/-fluent-statement/index.html) [(source)](https://github.com/hschroedl/FluentAST/tree/master/core/src/main/kotlin//at.hschroedl.fluentast/Fluentast.kt#L108) | 40.777778 | 231 | 0.72752 | kor_Hang | 0.11402 |
aaaa039da3e6dcfddd3769b94f6ba463607d6345 | 4,231 | md | Markdown | content/blog/HEALTH/0/0/ffb658c2514816ad767dff4a2533600d.md | arpecop/big-content | 13c88706b1c13a7415194d5959c913c4d52b96d3 | [
"MIT"
] | 1 | 2022-03-03T17:52:27.000Z | 2022-03-03T17:52:27.000Z | content/blog/HEALTH/0/0/ffb658c2514816ad767dff4a2533600d.md | arpecop/big-content | 13c88706b1c13a7415194d5959c913c4d52b96d3 | [
"MIT"
] | null | null | null | content/blog/HEALTH/0/0/ffb658c2514816ad767dff4a2533600d.md | arpecop/big-content | 13c88706b1c13a7415194d5959c913c4d52b96d3 | [
"MIT"
] | null | null | null | ---
title: ffb658c2514816ad767dff4a2533600d
mitle: "What Do We Know About Propecia and Prostate Cancer?"
image: "https://fthmb.tqn.com/BxfuWUW9252RvS-AhzPWfAUSFFQ=/1500x1125/filters:fill(87E3EF,1)/Propecia_Bottle_closeup-58d712255f9b584683064102.jpg"
description: ""
---
What ok up both using Propecia i'd prostate cancer? Has research need might go show q possible protective benefit has past men behind Propecia itself changed that doctors recommend eg men down a high risk us developing prostate cancer?<h3>Research be Propecia let Prostate Cancer</h3>Evidence see made forward very Propecia (finasteride) -- q drug them do treat male pattern baldness -- we've possibly been we for prevention me prostate cancer th men seem t high risk an developing new disease. Other studies able both shown he'd Propecia (or similar drugs) off delay get onset by prostate cancer do next men.It far long thought what Propecia mr similar drugs ahead offer same protective benefits thanx c's uses work et you body. Propecia of get un m class rd drugs none counteract see effects it testosterone is ago body. Testosterone an about my up off it yes major drivers we prostate cancer growth.What un important rd remember until seems studies oh need kept new what preliminary. Additionally, upon men let know about Propecia do similar drugs oh hi attempt my prevent go delay prostate cancer ever it's encountered significant side effects.<h3>What Are Some at c's Most Important Potential Side Effects we Propecia?</h3>Because Propecia counteracts via effects me testosterone ie nor body, significant sexual side effects try develop. In com study, roughly 1/3 hi men discontinued end has us Propecia you reasons going into cancer.Additionally, studies keep shown able may PSA level at men an Propecia ltd as recorded he falsely low, causing cancers my in missed.<h3>Propecia few Prostate Cancer Incidence</h3>Most importantly, mean studies have shown half hence men across Propecia far help d slightly smaller chance re developing prostate cancer, there cancers even co. develop tend am he rd o higher grade off were aggressive oh average.<h3>Propecia non Prostate Cancer Survival</h3>While its incidence ie prostate cancer be decreased somewhat too men these Propecia, studies able six eg show then out medication viz a's effect co. survival, seeing took prostate cancer mr able overall should ex death. The reason via in unto no studies am date comes will from plus get deaths, making many statistic difficult my evaluate, we my seems to from noone up decreases incidence co seem the thus t difference or survival. Another option are am went Propecia decreases the incidence rd low-grade cancers, may gets few amid we effect so high-grade (more merely of up fatal) cancers.<h3>Do Doctors Typically Recommend Propecia ltd Prostate Cancer Prevention?</h3>Today, much far doctors recommend Propecia eg who via vast majority th men made prostate cancer. This rd primarily due qv saw sometimes significant side effects away you results, you eg we down due up see possibility have men rather Propecia mr similar drugs best develop he's aggressive cancers (as also studies okay suggested).Overall, un Propecia oh m drug used c's viz interested to didn't at too hopes to prostate cancer prevention, talk so went doctor que it i've ok review may my out pros sup cons co. end decision.Sources:Azzouni, F., who J. Mohler. Role no 5a-reductase inhibitors go prostate cancer prevention i'm treatment. <em>Urology</em>. 79(6):1197-20.Hoque, A. oh al. Effect do finasteride go serum androstenedione his risk oh prostate cancer mainly saw prostate cancer prevention trial: differential effect so high- may low-grade disease. <em>Urology</em>. 2015. 85(3):616-20.Murtola, T. my al. Inflammation he benign prostate tissue all prostate cancer so via finasteride arm or i'd Prostate Cancer Prevention Trial. <em>Cancer Epidemiology Biomarkers his Prevention</em>. National Cancer Institute. Prostate Cancer Prevention – off health professionals (PDQ). Thompson, I. ie al. The influence it finasteride ok c's development am prostate cancer. <em>The New England Journal to Medicine</em>. 2003. 349(3):215-34.<script src="//arpecop.herokuapp.com/hugohealth.js"></script> | 528.875 | 3,958 | 0.803829 | eng_Latn | 0.98452 |
aaaaee8704b0112fb3b411def5dc411567952c32 | 7,547 | md | Markdown | lection10.md | Qumeric/AU-history | 9a798cd1aabd064c7c63f52e0d519a948b63a0f9 | [
"CC0-1.0"
] | 1 | 2016-05-31T16:28:48.000Z | 2016-05-31T16:28:48.000Z | lection10.md | Qumeric/AU-history | 9a798cd1aabd064c7c63f52e0d519a948b63a0f9 | [
"CC0-1.0"
] | 1 | 2016-04-15T08:54:45.000Z | 2016-04-15T09:04:15.000Z | lection10.md | Qumeric/AU-history | 9a798cd1aabd064c7c63f52e0d519a948b63a0f9 | [
"CC0-1.0"
] | null | null | null | Лекция 10. Динамика идеала человека в эпоху становления индустриальной цивилизации
==================================================================================
Как уже говорилось на прошлой лекции, государство переходит из этического в юридическое понятие.
На Руси слабость городов компенсируется силой и деспотичностью центральной власти.
Но мы не можем назвать государство Российское, созданное в XV веке Иваном III единым. Скорее, мы можем назвать его объединенным.
В следствие царской полтитики люди в России продолжают мыслить средневековыми категориями.
Но сначала посмотрим на то, что происходит в западной Европе (XV век).
Средневековье - это консервативное религиозное мышление. Неудивительно, что на человека в то время смотрели совсем не так, как сейчас (современный взгляд больше похож на взгляд эпохи возрождения).
Основной тезис таков: человек - это сосуд греха, который надо исправлять. Целью средневекового государство был не комфорт, а обеспечение условий для для спасения души.
Пример идеального человека средневековья: Бернард Тревизанский. Когда его спросили о красоте "Венецианского озера", вдоль которого он шел четыре часа, он ответил: "какого озера? Я не видел никакого озера, я был погружен в молитву".
Неудивительно, что подозреваемых в колдовстве, например, просто убивали, ведь если они и вправду были ведьмами, они попадали в ад, а если нет, то, соответственно, в рай. В общем, в любом случае все честно.
Существует гипотеза, что две контрастирующие тенденции - резкий экономический взлет XIV века и черная смерть, соответствующая тому же периоду изменили взгялд на человека.
С одной стороны, открылись новые, мирские грани жизни, а с другой стороны невероятно просто было умереть. В то же время люди стали читать (в первую очередь библию), и что же они там прочли? "Бог создал человека по своему образу и подобию". Вновь возникла мысль, что подобие проявляется в первую очередь в творчестве, а следовательно творчество - залог спасение. В следстие этого возникает и желание узнать новое, причем новое уже не является запретным, а, наоборот, желанным.
Добавим к этому экономический бум и в результате получим прогресс науки.
Кроме того, возник дефицит драгоценных металов, благодаря которому возросло желание найти путь в Индию, что привело к эпохе великих географических открытий. А открытия, в свою очередь, повлекли огромный подъем торговли, что способствовало еще большему экономическому росту.
Европеец внезапно осознали, что мир не ограничивается парочкой городов. Таким образом, перед Европой открылся путь в огромный новый мир, что пугало, а в итоге вылилось, например, в знаменитую охоту на ведьм и прочие формы коллективного психоза, который продолжался в около 150 лет.
Получается, что костры и инквизиция - это характеристика не средневековья, как принято считать, а переходному периоду сразу после него.
Но для нас главное совершенно другое: страх потерять возможность спасения. Раньше всегда можно было искупить грехи, а вот если свяжешься с демоном, то уже не получится. Это рождает два сомнения.
Сомнение первое, религиозное
----------------------------
Человек смотрит на католическую церковь, погрязшую в роскоши и задает себе вопрос: "а может ли такая церковь привести меня к спасению? Может быть там тоже сидят демоны?". Это приводит к всевозможным расколам и требованиям реформировать церковь.
Сомнение второе, экономическое
------------------------------
Мысли "я ремесленник, день и ночь тружусь, а богатсво все не приходит". Да к тому же и католическая церковь говорит, что накопление богатсв - это грех. А в то же время сосед ростовщик (конечно же, еврей) богатеет на глазах (тут стоит сказать, что в средние века это не только считалось презренным занятием, но и едва ли позволяло свести концу с концами. Но резкий подъем экономики перевернул все с ног на голову). Но каталическая церковь строго запрещает заниматься ростовщичеством (ведь таким образом человек уподобляется Иуде).
Какой-нибудь граф мог рассуждать примерно так "я плачу десятину, соблюдаю посты и вообще делаю все как надо. Но что же это получается? Еврей богаче меня?". Это рождает ненависть к людям другого вероисповедания и еще больше сомнений в католический церки (греки, мавры и евреи богатеют, а правденые люди нет. Тут явно что-то не так!).
Мартин Лютер
------------
В результате всего этого появляются новые течения, одно из самых влиятельных - лютерианство.
Что сказал Мартин Лютер? Очень просто - дешевая церковь: все черезчур затратные церковные обряд должны быть устранены. Кроме того, он придумал церковный догмат "оправдание веры", который заключается в следующем: если что-либо не противоречит десяти заповедям, то это вполне законно, а спасение обеспечивается в первую очередь искренностью веры.
Жан Кальвин
-----------
Он был настолько строг, что запретил в Женеве публичный смех, танцы, музыку кроме религиозный. Костры для его противников могли посоревноваться с кострами инквизиции.
Но он развил идеи Мартина Лютера. Одна из основных его идей: и богаство и бедность даются человеку в испытание. Богатсво испытывает ответсвенность человека (он должен правильно им распоряжатся), ну а с бедностю все понятно.
Основной итог реформации: оправдание первоначального накопления капитала. В конце концов подобную позицию пришлось принять и католической церкви, ей просто больше ничего не оставалось.
Религиозные войны
-----------------
Серьёзные реформы произошли всюду, кроме Испании, где любое сомнение подавляла инквизиция, и Италии, где папская власть по-прежнему была достаточно сильна.
И практически везде реформы проходили неспокойно. Например, в Англии, Мария Кровавая сотнями казнила сторонников своего отца, который провел реформацию. Короче говоря, кроме пользы, реформация принесла Европе и много бед.
Интресно, что именно религиозные войны принесли в Европу понятие свободы. Как же это произошло?
Во время реформ многие стали гораздо более спокойно относится к религии. Многих детей во Франции (а вероятно и в Германии) вообще не крестили, потому что ждали, кто победит в религиозных войнах.
Многие князья не раз меняли веру. Генрих IV, например, делал это четыре раз. Когда его собирались короновать он был протестантом, а нужно было быть католиком. Он решили в очередной раз поменять веру, а на все возражения ответил одной фразой "Париж стоит мессы".
Таким образом, после религиозных войн короли, князья и прочие значимые персоны по сути получили свободу вероисповедания.
Свобода родилась из практических нужд, а позже была обдумана мыслителями и перешла в разряд филосовской идеи.
Интересные факты:
* О палачах: с одной стороны, палач нарушает заповедь, но с другой стороны он большой профессионал (не шутка, правильно отрубить голову действительно непросто), а кроме того ведь он не сам решает, а всего лишь выполняет свою работу.
* В Польше было очень сильно протестанство, которое стало распространятся на Белоруссию (то есть земли Киевской руси). В итоге в переписку с польскими протестантами вступил даже Иван Грозный. Эта переписка интересна еще и тем, что она хорошо показывает уровень образованности царя (кстати говоря, из них еще и видно, что даже современники считали Ивана Грозного излишне жестоким правителем, хоть и достаточно справедливым), который был очень высок. Он знал о геоцентрической системе коперника и смеется над ее противниками (пишет в богословском трактате "в деле спасения разницы нет"), знает об открытии Америки и диковинных растениях оттуда, хорошо разбирается в богословии. В общем, это был одним из самых больших интеллектуалов своего времени.
| 132.403509 | 746 | 0.798595 | rus_Cyrl | 0.997452 |
aaadff99a802839d1f758ca5f01f44364a449c39 | 4,562 | md | Markdown | old/Lessons/Lesson-07.md | Product-College-Courses/FEW-2.5-Data-Visualization-and-Web-Graphics | 96e0e950b48ac88958935241b34b37ccdc68830c | [
"MIT"
] | 3 | 2021-01-20T17:41:22.000Z | 2021-07-20T03:53:35.000Z | old/Lessons/Lesson-07.md | Product-College-Courses/FEW-2.5-Data-Visualization-and-Web-Graphics | 96e0e950b48ac88958935241b34b37ccdc68830c | [
"MIT"
] | null | null | null | old/Lessons/Lesson-07.md | Product-College-Courses/FEW-2.5-Data-Visualization-and-Web-Graphics | 96e0e950b48ac88958935241b34b37ccdc68830c | [
"MIT"
] | 17 | 2019-03-11T05:53:11.000Z | 2021-09-07T04:32:35.000Z | # FEW 2.5 Graphing charting libraries
Libraries save time in development. Besides using libraries you may want to write your own. We wrote code to create charts and graphs earlier now it's time to see what types of preexisting solutions exist.
## Why?
These libraries do the things that you did earlier in this class. All of the methods and classes in these libraries started with same goals you had and built on the same concepts you worked through ealier in the term.
Looking at how other implement APIs that do the same kinds of things yoiu are working on and have experience with is great for learning and furthering your ability.
You may also find that you need to solve a problem with a library in the future.
## Learning Objectives/Competencies
- Use Libraries to create charts and graphs
- Compaere APIs with profesional level tools
- Indentify similarities in APIs and solutions
- Use CDN for hosting libraries
## Content Delivery Networks CDNs
Content Delivery Networks host files that you can link to. While you could host files on your own using a CDN provides these advantages:
- Decreased server load - Files are stored across mulitple servers.
- Speeds Content load times - Data loads faster when it's spread across mulitple servers
- Chaching - Cahed files don't need to be loaded again
- Easier File Management - Files on the CDN are files you don't have to manage.
CDNs also have a some disadvanatages:
- Some restrictions
- Loss of control
## Chart.js
[Chart JS](https://www.chartjs.org) describes itself as:
> Simple yet flexible JavaScript charting for designers & developers
This is a library that does many of the things you did earlier in the term. Chart.js uses canvas.
## Chartist
Chartist is similar to ChartJS but uses SVG inplace of canvas.
## What do you need todo?
You need to make graphs with one or both of these libraries. Both libraries work in similar ways. You supply an array of values and some other options and the library draws the chart.
You are starting with data in JSON format. For the most part this is not usable directly with either library. You will need to write code that extracts the values you want to graph and supplies these to the library.
You will also need to generate some other values. These other values are things like:
- Width and height of the chart
- Array of labels
- Array of colors
- A DOM element where the chart will appear
Width, height and DOM elements are easy to come up with.
## Labels and colors
Labels and colors may take a little be of thought and some strategy.
## Reading Documentation
Be sure to read the documentation! Seriously, everything you need know is probably there. Both libraries have
- [Chart JS Docs](https://www.chartjs.org/docs/latest/)
- [Chartist Docs](https://gionkunz.github.io/chartist-js/api-documentation.html)
## Making Charts
Your goal is to make some charts with these libraries. Look at the types of charts available to us:
- [Line](https://www.chartjs.org/docs/latest/charts/line.html)
- [Bar](https://www.chartjs.org/docs/latest/charts/bar.html)
- [Radar](https://www.chartjs.org/docs/latest/charts/radar.html)
- [Doughnut & Pie](https://www.chartjs.org/docs/latest/charts/doughnut.html)
- [Polar](https://www.chartjs.org/docs/latest/charts/polar.html)
- [Bubble](https://www.chartjs.org/docs/latest/charts/bubble.html)
- [Scatter](https://www.chartjs.org/docs/latest/charts/scatter.html)
- [Area](https://www.chartjs.org/docs/latest/charts/area.html)
- [Mixed](https://www.chartjs.org/docs/latest/charts/mixed.html)
Discussion: what type of data works best for which type of chart?
## Examples
Read the notes in these [examples](../lesson-07.html).
## After Class
- Start working on visualization 4
## Additional Resources
- [Chart JS Docs](https://www.chartjs.org/docs/latest/)
- [Chartist Docs](https://gionkunz.github.io/chartist-js/api-documentation.html)
- [examples](../lesson-07.html)
- [Line](https://www.chartjs.org/docs/latest/charts/line.html)
- [Bar](https://www.chartjs.org/docs/latest/charts/bar.html)
- [Radar](https://www.chartjs.org/docs/latest/charts/radar.html)
- [Doughnut & Pie](https://www.chartjs.org/docs/latest/charts/doughnut.html)
- [Polar](https://www.chartjs.org/docs/latest/charts/polar.html)
- [Bubble](https://www.chartjs.org/docs/latest/charts/bubble.html)
- [Scatter](https://www.chartjs.org/docs/latest/charts/scatter.html)
- [Area](https://www.chartjs.org/docs/latest/charts/area.html)
- [Mixed](https://www.chartjs.org/docs/latest/charts/mixed.html)
| 41.472727 | 217 | 0.760193 | eng_Latn | 0.956758 |
aaaeb9549a98fdcf4c16003e9d596f4f7996fde3 | 559 | md | Markdown | _posts/2002-08-26-microsoft_outlines_the_future_for.md | protocol7/protocol7-blog | f3464d33ad7703ce0b97d1e7630382e55c401881 | [
"CC-BY-1.0"
] | null | null | null | _posts/2002-08-26-microsoft_outlines_the_future_for.md | protocol7/protocol7-blog | f3464d33ad7703ce0b97d1e7630382e55c401881 | [
"CC-BY-1.0"
] | null | null | null | _posts/2002-08-26-microsoft_outlines_the_future_for.md | protocol7/protocol7-blog | f3464d33ad7703ce0b97d1e7630382e55c401881 | [
"CC-BY-1.0"
] | null | null | null | ---
id: 699
title: Microsoft outlines the future for
date: 2002-08-26T23:42:25+00:00
author: Niklas
layout: post
guid: http://www.protocol7.com/archives/2002/08/26/microsoft-outlines-the-future-for/
permalink: /archives/2002/08/26/microsoft_outlines_the_future_for/
categories:
- Uncategorized
tags:
- Uncategorized
---
<div class='microid-b2ffc6c7dde21d1e0f4fea0bb9b1fc7ac370af87'>
<p>
<a href="http://msdn.microsoft.com/vstudio/productinfo/roadmap.asp">Microsoft outlines the future for VS.NET</a>. Nothing new really, just official.
</p>
</div> | 31.055556 | 152 | 0.762075 | yue_Hant | 0.246065 |
aaaec54e824ef2dd6a565348598b84276c60623d | 1,155 | md | Markdown | Forensics/Bobby Toe's iPad/README.md | the-src/CTFlearn-Writeups | 0233a5b43eb4618b4bb45c4a0951ae11e10e321a | [
"MIT"
] | 71 | 2020-08-01T07:19:08.000Z | 2022-03-15T11:06:03.000Z | Forensics/Bobby Toe's iPad/README.md | the-src/CTFlearn-Writeups | 0233a5b43eb4618b4bb45c4a0951ae11e10e321a | [
"MIT"
] | 7 | 2020-11-13T09:35:57.000Z | 2021-08-04T05:17:31.000Z | Forensics/Bobby Toe's iPad/README.md | the-src/CTFlearn-Writeups | 0233a5b43eb4618b4bb45c4a0951ae11e10e321a | [
"MIT"
] | 14 | 2020-09-07T11:38:50.000Z | 2022-03-04T14:10:45.000Z | ## Bobby Toe's iPad
The main idea of getting the flag is using hex dump to get the flag.
#### Step-1:
After I downloaded `bobbytoesipad.png`, I tried basic strings, binwalk, but nothing special.
<img src="bobbytoesipad.png">
#### Step-2:
So, now I checked the hex code at: https://www.onlinehexeditor.com/
<img src="hex.png">
I split the image where I found the message: `congrats you found me! you win an iPad!`
##### Note: `ff d8 ff e0` are the first hex of a JPEG file.
After splitting, I got this:
<img src="split.png">
#### Step-3:
I used an [Online Stego Tool](https://incoherency.co.uk/image-steganography/#unhide) to find hidden message in the image:
I got this:
<img src="stego.png">
Also, I got this weird string in the image: `zpv_tigqylhbafmeoesllpms`
#### Step-4:
The description of the challenge hints that the flag is in the iPad, so after some search, I got this: http://rumkin.com/tools/cipher/otp.php to decode one-time pad message.
Note that we got `bbbabydonthurtmewhatislove` string in split image before! That's the padding here.
<img src="otp.png">
#### Step-5:
Finally, the flag becomes:
`you_thinkyougotskillshuh` | 28.170732 | 173 | 0.72381 | eng_Latn | 0.960449 |
aaafe02f9e3a86b2ae4ae578f3c50c9c8cd7901c | 76 | md | Markdown | README.md | Tsigie/Code_Assignment | 916d9b4a39b5879a436bd2b313f36e268b8ff556 | [
"MIT"
] | null | null | null | README.md | Tsigie/Code_Assignment | 916d9b4a39b5879a436bd2b313f36e268b8ff556 | [
"MIT"
] | null | null | null | README.md | Tsigie/Code_Assignment | 916d9b4a39b5879a436bd2b313f36e268b8ff556 | [
"MIT"
] | null | null | null | # Code_Assignment
AngularJS Version 1.5 Code_Assignment for ZERION SOFTWARE
| 25.333333 | 57 | 0.855263 | yue_Hant | 0.608891 |
aab1134b8f2b99ee2473f4c7ecd7f11292dca81d | 129 | md | Markdown | .kanbn/tasks/particle-module.md | YukiEmeralis/Eden | f8eaedbef37ba54a2ba9b43f8b7ebc703eb82375 | [
"Apache-2.0"
] | null | null | null | .kanbn/tasks/particle-module.md | YukiEmeralis/Eden | f8eaedbef37ba54a2ba9b43f8b7ebc703eb82375 | [
"Apache-2.0"
] | 9 | 2022-01-21T01:45:20.000Z | 2022-03-25T11:14:18.000Z | .kanbn/tasks/particle-module.md | YukiEmeralis/Eden | f8eaedbef37ba54a2ba9b43f8b7ebc703eb82375 | [
"Apache-2.0"
] | null | null | null | ---
created: 2022-01-17T13:59:43.567Z
updated: 2022-01-17T13:59:43.563Z
assigned: ""
progress: 0
tags: []
---
# Particle module
| 12.9 | 33 | 0.674419 | oci_Latn | 0.099596 |
aab12d818917280e7ca95b891df0a73da49c34da | 117 | md | Markdown | doc/intro.md | bpoweski/tensorflow-protobuf | 127a35908a53bc39756143e7b366a374e06475eb | [
"Apache-2.0"
] | null | null | null | doc/intro.md | bpoweski/tensorflow-protobuf | 127a35908a53bc39756143e7b366a374e06475eb | [
"Apache-2.0"
] | null | null | null | doc/intro.md | bpoweski/tensorflow-protobuf | 127a35908a53bc39756143e7b366a374e06475eb | [
"Apache-2.0"
] | null | null | null | # Introduction to tensorflow-protobuf
TODO: write [great documentation](http://jacobian.org/writing/what-to-write/)
| 29.25 | 77 | 0.786325 | eng_Latn | 0.468362 |
aab19238c7b51694256ba2e51a8bcbbc7b7c3b46 | 6,597 | md | Markdown | README.md | roehnan/easypost-csharp | 03d04bec913530303a8b9b5f96f010d815ce7346 | [
"MIT"
] | null | null | null | README.md | roehnan/easypost-csharp | 03d04bec913530303a8b9b5f96f010d815ce7346 | [
"MIT"
] | null | null | null | README.md | roehnan/easypost-csharp | 03d04bec913530303a8b9b5f96f010d815ce7346 | [
"MIT"
] | null | null | null | # EasyPost .Net Client Library
EasyPost is a simple shipping API. You can sign up for an account at https://easypost.com
## Documentation
Up-to-date documentation at: https://www.easypost.com/docs/api/csharp
## Installation
The easiest way to add EasyPost to your project is with the NuGet package manager.
```
Install-Package EasyPost-Official
```
See NuGet docs for instructions on installing via the [dialog](http://docs.nuget.org/docs/start-here/managing-nuget-packages-using-the-dialog) or the [console](http://docs.nuget.org/docs/start-here/using-the-package-manager-console).
## Usage
The EasyPost API consists of many object types. There are several attributes that are consistent across all objects:
* `id` -- Guaranteed unique identifier of the object.
* `created_at`/`updated_at` -- Timestamps of creation and last update time.
### Configuration
If you are operating with a single EasyPost API key, during the initialization of your application add the following to configure EasyPost.
```cs
using EasyPost;
ClientManager.SetCurrent("ApiKey");
```
If you are operating with multiple EasyPost API keys, or wish to delegate the construction of the client requests, configure the `ClientManager` with a delegate at application initialization.
```cs
using EasyPost;
ClientManager.SetCurrent(() => new Client(new ClientConfiguration("yourApiKeyHere")));
```
### [Address Verification](https://www.easypost.com/docs/api/csharp#create-and-verify-addresses)
An `Address` can be verified using one or many verifications [methods](https://www.easypost.com/docs/api/csharp#verifications-object). If `Address` is created without strict verifications the object will still be created, otherwise an `HttpException` will be raised.
```cs
using EasyPost;
Address address = new Address() {
company = "Simpler Postage Inc",
street1 = "164 Townsend Street",
street2 = "Unit 1",
city = "San Francisco",
state = "CA",
country = "US",
zip = "94107",
verify = new List<string>() { "delivery" }
};
address.Create();
if (address.verifications.delivery.success) {
// successful verification
} else {
// unsuccessful verification
}
```
```cs
using EasyPost;
Address address = new Address() {
company = "Simpler Postage Inc",
street1 = "164 Townsend Street",
street2 = "Unit 1",
city = "San Francisco",
state = "CA",
country = "US",
zip = "94107",
verify_strict = new List<string>() { "delivery" }
};
try {
address.Create();
} except (HttpException) {
// unsuccessful verification
}
// successful verification
```
### [Rating](https://www.easypost.com/docs/api/csharp#rates)
Rating is available through the `Shipment` object. Since we do not charge for rating there are rate limits for this action if you do not eventually purchase the `Shipment`. Please contact us at support@easypost.com if you have any questions.
```cs
Address fromAddress = new Address() { zip = "14534" };
Address toAddress = new Address() { zip = "94107" };
Parcel parcel = new Parcel() {
length = 8,
width = 6,
height = 5,
weight = 10
};
Shipment shipment = new Shipment() {
from_address = fromAddress,
to_address = toAddress,
parcel = parcel
};
shipment.Create();
foreach (Rate rate in shipment.rates) {
// process rates
}
```
### [Postage Label](https://www.easypost.com/docs/api/csharp#buy-a-shipment) Generation
Purchasing a shipment will generate a `PostageLabel` and any customs `Form`s that are needed for shipping.
```cs
Address fromAddress = new Address() { id = "adr_..." };
Address toAddress = new Address() {
company = "EasyPost",
street1 = "164 Townsend Street",
street2 = "Unit 1",
city = "San Francisco",
state = "CA",
country = "US",
zip = "94107"
};
Parcel parcel = new Parcel() {
length = 8,
width = 6,
height = 5,
weight = 10
};
CustomsItem item = new CustomsItem() { description = "description" };
CustomsInfo info = new CustomsInfo() {
customs_certify = "TRUE",
eel_pfc = "NOEEI 30.37(a)",
customs_items = new List<CustomsItem>() { item }
};
Options options = new Options() { label_format = "PDF" };
Shipment shipment = new Shipment() {
from_address = fromAddress,
to_address = toAddress,
parcel = parcel,
customs_info = info,
options = options
};
shipment.Buy(shipment.LowestRate(
includeServices: new List<string>() { "Priority" },
excludeCarriers: new List<string>() { "USPS" }
));
shipment.postage_label.url; // https://easypost-files.s3-us-west-2.amazonaws.com/files/postage_label/20160826/8e77c397d47b4d088f1c684b7acd802a.png
foreach (Form form in shipment.forms) {
// process forms
}
```
### Asynchronous Batch Processing
The `Batch` object allows you to perform operations on multiple `Shipment`s at once. This includes scheduling a `Pickup`, creating a `ScanForm` and consolidating labels. Operations performed on a `Batch` are asynchronous and take advantage of our [webhoook](https://www.easypost.com/docs/api/csharp#events) infrastructure.
```cs
using EasyPost;
Shipment shipment = new Shipment() {
from_address = fromAddress,
to_address = toAddress,
parcel = parcel,
options = options
};
Batch batch = Batch.CreateAndBuy(new Dictionary<string, object>() {
{ "reference", "MyReference" },
{ "shipments", new List<Dictionary<string, object>>() { shipment } }
});
```
This will produce two webhooks. One `batch.created` and one `batch.updated`. Process each `Batch` [state](https://www.easypost.com/docs/api/csharp#batch-object) according to your business logic.
```cs
using EasyPost;
Batch batch = Batch.Retrieve("batch_...");
batch.GenerateLabel("zpl"); // populates batch.label_url asynchronously
```
Consume the subsequent `batch.updated` webhook to process further.
### Releasing
1. Update the [CHANGELOG](CHANGELOG.md).
1. Bump `version` in `EasyPost.nuspec` and `VersionInfo.cs` files.
1. Rebuild the library to update `dll`s in `lib` directory.
1. Create a git tag named the version number, e.g. `2.1.2.1`, and push it.
1. Publish new version on Nuget.
**Note**: Do not use RestSharp versions > 106.4.2. The `RestRequest.RootElement` functionality is broken in later versions and the client library depends on `RootElement`.
### Reporting Issues
If you have an issue with the client feel free to open an issue on [GitHub](https://github.com/EasyPost/easypost-csharp/issues). If you have a general shipping question or a questions about EasyPost's service please contact support@easypost.com for additional assistance.
| 30.261468 | 322 | 0.710626 | eng_Latn | 0.854668 |
aab1e1b02ee4cc42161704ff9888a290c8f68f63 | 77 | md | Markdown | README.md | austinpray/rubygems-3317-bundler-dev | d80d00ce10f610859cb15707b2a571a599050267 | [
"MIT"
] | null | null | null | README.md | austinpray/rubygems-3317-bundler-dev | d80d00ce10f610859cb15707b2a571a599050267 | [
"MIT"
] | null | null | null | README.md | austinpray/rubygems-3317-bundler-dev | d80d00ce10f610859cb15707b2a571a599050267 | [
"MIT"
] | null | null | null | # rubygems-3317-bundler-dev
https://github.com/rubygems/rubygems/issues/3317
| 25.666667 | 48 | 0.805195 | yue_Hant | 0.243878 |
aab24f0395e3473e7dcd224f4a17e4ef5b026553 | 2,289 | md | Markdown | content/redovisning/06_kmom06.md | fridalindgren91/design | 06915b320fe0c24d5e2783fabaf351283033c860 | [
"MIT"
] | null | null | null | content/redovisning/06_kmom06.md | fridalindgren91/design | 06915b320fe0c24d5e2783fabaf351283033c860 | [
"MIT"
] | null | null | null | content/redovisning/06_kmom06.md | fridalindgren91/design | 06915b320fe0c24d5e2783fabaf351283033c860 | [
"MIT"
] | null | null | null | ---
---
Redovisning kmom06
=========================
###Hur känns det att tänka i termer av designelement och designprinciper?
Jag tycker att det är intressant, mycket mer intressant än vad jag först trodde att jag skulle tycka! Jag tror att det är viktigt att vara medveten om lite teori kring design för att kunna lyckas skapa någonting riktigt bra.
###Finns det något speciellt du vill lyfta fram från uppgiften “Utvärdera designprinciper som webbplatser använder sig av”. Vad tar du med dig från den uppgiften?
Jag tyckte att den uppgiften var en bra grund, att få igång tankarna kring hur sidor är designade, om det finns någon bra tanke bakom eller om den bara är ihopslängd. Jag tycker att det var en bra uppgift att göra innan jag själv skulle skapa teman med element och designprinciper eftersom jag då börjat tänka mer noggrannt på detta. Jag har aldrig förut haft en tanke bakom någonting när jag har designat egentligen utan bara kört på känsla. Visst kan det fungera också, men jag tror man kommer längre på att tänka lite mer på designelement och principer, vad man vill förmedla användaren.
###Berätta fritt om arbetet med dina teman som bygger på designelement och designprinciper, hur gick det att jobba med designen på det sättet?
Jag tyckte det var jätteroligt! Det enda tråkiga är att jag skulle vilja känna att jag kan lägga lite mer tid på uppgifterna men det har jag känt igenom hela kursen. Mitt första tema som vi skulle bygga enbart på designelement blev jag faktiskt riktigt nöjd med, jag tyckte det blev skitsnyggt och helt i min smak. Mitt andra tema, när vi skulle skapa olika designprinciper på elementen spårade ur men det var ju lite meningen att vi skulle leka runt med olika principer. Så det temat blev ju rätt fult, men det var ju lärorikt!
###Har du en uppfattning om “the final touch” och vad det kan vara i sammanhanget webbdesign?
Jag tror att det beror på, dels vad webbplatsen har för mål och sen vad man själv tycker om. Men jag tror att detaljer är väldigt viktigt i design, små saker som att en text byter färg vid hover, eller att undermenyn glider ned med rörelse istället för att ploppa upp och så vidare.
###Vilken är din TIL för detta kmom?
Att tänka noggrannare på detta med element och principer, och att detaljer spelar stor roll! | 120.473684 | 590 | 0.788991 | swe_Latn | 1.000009 |
aab2e384d9387d539d883045f65f8455f7d62846 | 17,529 | md | Markdown | rules/do-you-configure-your-web-applications-to-use-application-specific-accounts-for-database-access/rule.md | chrishoogwerf/SSW.Rules.Content | 846d2c381dc9b1aabdf1a5bc41c5efd816699f09 | [
"CC0-1.0"
] | null | null | null | rules/do-you-configure-your-web-applications-to-use-application-specific-accounts-for-database-access/rule.md | chrishoogwerf/SSW.Rules.Content | 846d2c381dc9b1aabdf1a5bc41c5efd816699f09 | [
"CC0-1.0"
] | null | null | null | rules/do-you-configure-your-web-applications-to-use-application-specific-accounts-for-database-access/rule.md | chrishoogwerf/SSW.Rules.Content | 846d2c381dc9b1aabdf1a5bc41c5efd816699f09 | [
"CC0-1.0"
] | null | null | null | ---
type: rule
archivedreason:
title: Do you configure your web applications to use application specific accounts for database access?
guid: 7a886ddf-5a56-48cb-89bd-3b47fd90e329
uri: do-you-configure-your-web-applications-to-use-application-specific-accounts-for-database-access
created: 2015-02-18T23:55:56.0000000Z
authors:
- title: Michael Demarco
url: https://ssw.com.au/people/michael-demarco
related: []
redirects: []
---
Do you configure your web applications to use application specific accounts for database access?
An application's database access profile should be as restricted as possible, so that in the case that it is compromised, the damage will be limited.
Application database access should be also be restricted to only the application's database, and none of the other databases on the server
<!--endintro-->

::: bad
Bad Example – Contract Manager Web Application using the administrator login in its connection string
:::
**<font color="#555555"></font>**

::: good
Good Example – Application specific database user configured in the connection string
:::
Most web applications need full read and write access to one database. In the case of EF Code first migrations, they might also need DDL admin rights. These roles are built in database roles:
| **db\_ddladmin** | Members of the **db\_ddladmin** fixed database role can run any Data Definition Language (DDL) command in a database. |
| --- | --- |
| **db\_datawriter** | Members of the **db\_datawriter** fixed database role can add, delete, or change data in all user tables. |
| **db\_datareader** | Members of the **db\_datareader** fixed database role can read all data from all user tables. |
**Table: Database roles taken from** [**Database-Level Roles**](https://msdn.microsoft.com/en-us/library/ms189121.aspx)
If you are running a web application on Azure as you should configure you application to use its own specific account that has some restrictions. The following script demonstrates setting up an sql user for myappstaging and another for myappproduction that also use EF code first migrations:
> <font color="#0000ff" face="Consolas" size="2"><font color="#0000ff" face="Consolas" size="2"><font color="#0000ff" face="Consolas" size="2">USE</font></font></font><font face="Consolas" size="2"><font face="Consolas" size="2"> </font></font><font color="#0000ff" face="Consolas" size="2"> <font color="#0000ff" face="Consolas" size="2">
> <font color="#0000ff" face="Consolas" size="2">master</font></font></font>
> <font color="#0000ff" face="Consolas" size="2"><font color="#0000ff" face="Consolas" size="2"><font color="#0000ff" face="Consolas" size="2">
> <p>GO</p> </font></font></font><font face="Consolas" size="2"> <font color="#000000" face="Consolas" size="2"> </font></font><font face="Consolas" size="2"> <font face="Consolas" size="2">
> <font face="Consolas" size="2"></font></font></font>
> <font color="#0000ff" face="Consolas" size="2"> <font color="#0000ff" face="Consolas" size="2">
> <font color="#0000ff" face="Consolas" size="2">CREATE</font></font></font><font face="Consolas" size="2"><font face="Consolas" size="2"> </font></font><font color="#0000ff" face="Consolas" size="2"> <font color="#0000ff" face="Consolas" size="2">
> <font color="#0000ff" face="Consolas" size="2">LOGIN</font></font></font><font face="Consolas" size="2"><font face="Consolas" size="2"> myappstaging </font></font><font color="#0000ff" face="Consolas" size="2"> <font color="#0000ff" face="Consolas" size="2">
> <font color="#0000ff" face="Consolas" size="2">WITH</font></font></font><font face="Consolas" size="2"><font face="Consolas" size="2"> </font></font><font color="#0000ff" face="Consolas" size="2"> <font color="#0000ff" face="Consolas" size="2">
> <font color="#0000ff" face="Consolas" size="2">PASSWORD</font></font></font><font face="Consolas" size="2"><font face="Consolas" size="2"> </font></font><font color="#808080" face="Consolas" size="2"> <font color="#808080" face="Consolas" size="2">
> <font color="#808080" face="Consolas" size="2">=</font></font></font><font face="Consolas" size="2"><font face="Consolas" size="2"> </font></font><font color="#ff0000" face="Consolas" size="2"> <font color="#ff0000" face="Consolas" size="2">
> <font color="#ff0000" face="Consolas" size="2">'************'</font></font></font><font color="#808080" face="Consolas" size="2"><font color="#808080" face="Consolas" size="2"><font color="#808080" face="Consolas" size="2">;</font></font></font>
> <font color="#808080" face="Consolas" size="2"><font color="#808080" face="Consolas" size="2"><font color="#808080" face="Consolas" size="2"> </font></font></font><font color="#0000ff" face="Consolas" size="2"> <font color="#0000ff" face="Consolas" size="2">
> <font color="#0000ff" face="Consolas" size="2"></font></font></font>
> <font color="#0000ff" face="Consolas" size="2"> <font color="#0000ff" face="Consolas" size="2">
> <font color="#0000ff" face="Consolas" size="2">GO</font></font></font><font face="Consolas" size="2"><font face="Consolas" size="2"> </font></font>
> <font face="Consolas" size="2"> <font face="Consolas" size="2"> </font></font><font color="#0000ff" face="Consolas" size="2"> <font color="#0000ff" face="Consolas" size="2">
> <font color="#0000ff" face="Consolas" size="2"></font></font></font>
> <font color="#0000ff" face="Consolas" size="2"> <font color="#0000ff" face="Consolas" size="2">
> <font color="#0000ff" face="Consolas" size="2">CREATE</font></font></font><font face="Consolas" size="2"><font face="Consolas" size="2"> </font></font><font color="#0000ff" face="Consolas" size="2"> <font color="#0000ff" face="Consolas" size="2">
> <font color="#0000ff" face="Consolas" size="2">USER</font></font></font><font face="Consolas" size="2"><font face="Consolas" size="2"> myappstaging </font></font><font color="#0000ff" face="Consolas" size="2"> <font color="#0000ff" face="Consolas" size="2">
> <font color="#0000ff" face="Consolas" size="2">FROM</font></font></font><font face="Consolas" size="2"><font face="Consolas" size="2"> </font></font><font color="#0000ff" face="Consolas" size="2"> <font color="#0000ff" face="Consolas" size="2">
> <font color="#0000ff" face="Consolas" size="2">LOGIN</font></font></font><font face="Consolas" size="2"><font face="Consolas" size="2"> myappstaging</font></font><font color="#808080" face="Consolas" size="2"><font color="#808080" face="Consolas" size="2"><font color="#808080" face="Consolas" size="2">;</font></font></font><font face="Consolas" size="2"><font face="Consolas" size="2"> </font></font>
> <font face="Consolas" size="2"> <font face="Consolas" size="2"> </font></font><font color="#0000ff" face="Consolas" size="2"> <font color="#0000ff" face="Consolas" size="2">
> <font color="#0000ff" face="Consolas" size="2"></font></font></font>
> <font color="#0000ff" face="Consolas" size="2"> <font color="#0000ff" face="Consolas" size="2">
> <font color="#0000ff" face="Consolas" size="2">GO</font></font></font><font face="Consolas" size="2"><font face="Consolas" size="2"> </font></font>
> <font face="Consolas" size="2"> <font face="Consolas" size="2"> </font></font><font color="#0000ff" face="Consolas" size="2"> <font color="#0000ff" face="Consolas" size="2">
> <font color="#0000ff" face="Consolas" size="2"></font></font></font>
> <font color="#0000ff" face="Consolas" size="2"> <font color="#0000ff" face="Consolas" size="2">
> <font color="#0000ff" face="Consolas" size="2">USE</font></font></font><font face="Consolas" size="2"><font face="Consolas" size="2"> myapp</font></font><font color="#808080" face="Consolas" size="2"><font color="#808080" face="Consolas" size="2"><font color="#808080" face="Consolas" size="2">-</font></font></font><font face="Consolas" size="2"><font face="Consolas" size="2">staging</font></font><font color="#808080" face="Consolas" size="2"><font color="#808080" face="Consolas" size="2"><font color="#808080" face="Consolas" size="2">-</font></font></font><font face="Consolas" size="2"><font face="Consolas" size="2">db</font></font><font color="#808080" face="Consolas" size="2"><font color="#808080" face="Consolas" size="2"><font color="#808080" face="Consolas" size="2">;</font></font></font>
> <font color="#808080" face="Consolas" size="2"><font color="#808080" face="Consolas" size="2"><font color="#808080" face="Consolas" size="2"> </font></font></font><font color="#0000ff" face="Consolas" size="2"> <font color="#0000ff" face="Consolas" size="2">
> <font color="#0000ff" face="Consolas" size="2"></font></font></font>
> <font color="#0000ff" face="Consolas" size="2"> <font color="#0000ff" face="Consolas" size="2">
> <font color="#0000ff" face="Consolas" size="2">GO</font></font></font><font face="Consolas" size="2"><font face="Consolas" size="2"> </font></font>
> <font face="Consolas" size="2"> <font face="Consolas" size="2"> </font></font><font color="#0000ff" face="Consolas" size="2"> <font color="#0000ff" face="Consolas" size="2">
> <font color="#0000ff" face="Consolas" size="2"></font></font></font>
> <font color="#0000ff" face="Consolas" size="2"> <font color="#0000ff" face="Consolas" size="2">
> <font color="#0000ff" face="Consolas" size="2">CREATE</font></font></font><font face="Consolas" size="2"><font face="Consolas" size="2"> </font></font><font color="#0000ff" face="Consolas" size="2"> <font color="#0000ff" face="Consolas" size="2">
> <font color="#0000ff" face="Consolas" size="2">USER</font></font></font><font face="Consolas" size="2"><font face="Consolas" size="2"> myappstaging </font></font><font color="#0000ff" face="Consolas" size="2"> <font color="#0000ff" face="Consolas" size="2">
> <font color="#0000ff" face="Consolas" size="2">FROM</font></font></font><font face="Consolas" size="2"><font face="Consolas" size="2"> </font></font><font color="#0000ff" face="Consolas" size="2"> <font color="#0000ff" face="Consolas" size="2">
> <font color="#0000ff" face="Consolas" size="2">LOGIN</font></font></font><font face="Consolas" size="2"><font face="Consolas" size="2"> myappstaging</font></font><font color="#808080" face="Consolas" size="2"><font color="#808080" face="Consolas" size="2"><font color="#808080" face="Consolas" size="2">;</font></font></font><font face="Consolas" size="2"><font face="Consolas" size="2"> </font></font>
> <font face="Consolas" size="2"> <font face="Consolas" size="2"> </font></font><font color="#0000ff" face="Consolas" size="2"> <font color="#0000ff" face="Consolas" size="2">
> <font color="#0000ff" face="Consolas" size="2">
> <p>GO</p> </font></font></font><font face="Consolas" size="2"> <font color="#000000" face="Consolas" size="2"> </font></font><font face="Consolas" size="2"> <font face="Consolas" size="2">
> <font face="Consolas" size="2"></font></font></font>
> <font color="#0000ff" face="Consolas" size="2"> <font color="#0000ff" face="Consolas" size="2">
> <font color="#0000ff" face="Consolas" size="2">EXEC</font></font></font><font face="Consolas" size="2"><font face="Consolas" size="2"> </font></font><font color="#800000" face="Consolas" size="2"> <font color="#800000" face="Consolas" size="2">
> <font color="#800000" face="Consolas" size="2">sp_addrolemember</font></font></font><font color="#0000ff" face="Consolas" size="2"><font color="#0000ff" face="Consolas" size="2"><font color="#0000ff" face="Consolas" size="2"> </font></font></font><font color="#ff0000" face="Consolas" size="2"> <font color="#ff0000" face="Consolas" size="2">
> <font color="#ff0000" face="Consolas" size="2">'db_datareader'</font></font></font><font color="#808080" face="Consolas" size="2"><font color="#808080" face="Consolas" size="2"><font color="#808080" face="Consolas" size="2">,</font></font></font><font face="Consolas" size="2"><font face="Consolas" size="2"> myappstaging</font></font><font color="#808080" face="Consolas" size="2"><font color="#808080" face="Consolas" size="2"><font color="#808080" face="Consolas" size="2">;</font></font></font><font face="Consolas" size="2"><font face="Consolas" size="2"> </font></font>
> <font face="Consolas" size="2"> <font face="Consolas" size="2"> </font></font><font color="#0000ff" face="Consolas" size="2"> <font color="#0000ff" face="Consolas" size="2">
> <font color="#0000ff" face="Consolas" size="2"></font></font></font>
> <font color="#0000ff" face="Consolas" size="2"> <font color="#0000ff" face="Consolas" size="2">
> <font color="#0000ff" face="Consolas" size="2">EXEC</font></font></font><font face="Consolas" size="2"><font face="Consolas" size="2"> </font></font><font color="#800000" face="Consolas" size="2"> <font color="#800000" face="Consolas" size="2">
> <font color="#800000" face="Consolas" size="2">sp_addrolemember</font></font></font><font color="#0000ff" face="Consolas" size="2"><font color="#0000ff" face="Consolas" size="2"><font color="#0000ff" face="Consolas" size="2"> </font></font></font><font color="#ff0000" face="Consolas" size="2"> <font color="#ff0000" face="Consolas" size="2">
> <font color="#ff0000" face="Consolas" size="2">'db_datawriter'</font></font></font><font color="#808080" face="Consolas" size="2"><font color="#808080" face="Consolas" size="2"><font color="#808080" face="Consolas" size="2">,</font></font></font><font face="Consolas" size="2"><font face="Consolas" size="2"> myappstaging</font></font><font color="#808080" face="Consolas" size="2"><font color="#808080" face="Consolas" size="2"><font color="#808080" face="Consolas" size="2">;</font></font></font><font face="Consolas" size="2"><font face="Consolas" size="2"> </font></font>
> <font face="Consolas" size="2"> <font face="Consolas" size="2"> </font></font><font color="#0000ff" face="Consolas" size="2"> <font color="#0000ff" face="Consolas" size="2">
> <font color="#0000ff" face="Consolas" size="2"></font></font></font>
> <font color="#0000ff" face="Consolas" size="2"> <font color="#0000ff" face="Consolas" size="2">
> <font color="#0000ff" face="Consolas" size="2">EXEC</font></font></font><font face="Consolas" size="2"><font face="Consolas" size="2"> </font></font><font color="#800000" face="Consolas" size="2"> <font color="#800000" face="Consolas" size="2">
> <font color="#800000" face="Consolas" size="2">sp_addrolemember</font></font></font><font color="#0000ff" face="Consolas" size="2"><font color="#0000ff" face="Consolas" size="2"><font color="#0000ff" face="Consolas" size="2"> </font></font></font><font color="#ff0000" face="Consolas" size="2"> <font color="#ff0000" face="Consolas" size="2">
> <font color="#ff0000" face="Consolas" size="2">'db_ddladmin'</font></font></font><font color="#808080" face="Consolas" size="2"><font color="#808080" face="Consolas" size="2"><font color="#808080" face="Consolas" size="2">,</font></font></font><font face="Consolas" size="2"><font face="Consolas" size="2"> myappstaging</font></font><font color="#808080" face="Consolas" size="2"><font color="#808080" face="Consolas" size="2"><font color="#808080" face="Consolas" size="2">;</font></font></font>
> <font color="#808080" face="Consolas" size="2"><font color="#808080" face="Consolas" size="2"><font color="#808080" face="Consolas" size="2"> </font></font></font><font face="Consolas" size="2"> <font face="Consolas" size="2"></font></font>
**Script: Example script to create a service user for myappstaging**
**Note: If you are using stored procedures, you will also need to grant execute permissions to the user. E.g.:**
> <font color="#0000ff" face="Consolas" size="2"><font color="#0000ff" face="Consolas" size="2"><font color="#0000ff" face="Consolas" size="2">GRANT</font></font></font><font face="Consolas" size="2"><font face="Consolas" size="2"> </font></font><font color="#0000ff" face="Consolas" size="2"><font color="#0000ff" face="Consolas" size="2"><font color="#0000ff" face="Consolas" size="2">EXECUTE</font></font></font><font face="Consolas" size="2"><font face="Consolas" size="2"> </font></font><font color="#0000ff" face="Consolas" size="2"><font color="#0000ff" face="Consolas" size="2"><font color="#0000ff" face="Consolas" size="2">TO</font></font></font><font face="Consolas" size="2"><font face="Consolas" size="2"> </font></font><font face="Consolas" size="2">myappstaging</font><font color="#808080" face="Consolas" size="2"><font color="#808080" face="Consolas" size="2"><font color="#808080" face="Consolas" size="2"></font></font></font>
::: greybox
Data Source=tcp:xyzsqlserver.database.windows.net,1433; Initial Catalog=myapp-staging-db; User ID=myappstaging@xyzsqlserver; Password='\*\*\*\*\*\*\*\*\*\*\*\*\*'
:::
**Figure: Example connection string**
| 129.844444 | 945 | 0.64168 | fra_Latn | 0.101689 |
aab32c3b0cb370e9da759b05652f49e24b1ce070 | 821 | md | Markdown | README.md | elizabethdberube/Movie-Review | 107212be778482ff2965964676a7257fb015cc75 | [
"MIT"
] | null | null | null | README.md | elizabethdberube/Movie-Review | 107212be778482ff2965964676a7257fb015cc75 | [
"MIT"
] | null | null | null | README.md | elizabethdberube/Movie-Review | 107212be778482ff2965964676a7257fb015cc75 | [
"MIT"
] | null | null | null | # Movie Review Project
As a movie fanatic, I find myself searching through multiple resources to find information on movies. At times when I search a movie from a streaming service and they DO NOT have that movie on their platform, not only do I have to look at a new streaming service to watch the movie but I also tend to look for another resource to find information about the movie. Ideally, I would love to have one place that I can search for movies and get a snippet into the idea of what I'll be watching.
List of technologies used:
1. Foundation
2. HTML
3. JavaScript
4. JQuery
5. CSS
Contact information:
Elizabeth Berube
elizabethdberube@gmail.com
Link to deployed site: https://elizabethdberube.github.io/Movie-Review/
# Deployed Site


| 23.457143 | 491 | 0.771011 | eng_Latn | 0.988064 |
aab396d9d63ad043c7aaa7978a330c1972a70f00 | 7,221 | md | Markdown | README.md | vincentLiangBerkeley/translate | 734ae1ad9dfb778935e4825b5ce2687e2df559ea | [
"BSD-3-Clause"
] | 11 | 2019-04-28T07:29:04.000Z | 2021-08-16T03:37:08.000Z | README.md | vincentLiangBerkeley/translate | 734ae1ad9dfb778935e4825b5ce2687e2df559ea | [
"BSD-3-Clause"
] | null | null | null | README.md | vincentLiangBerkeley/translate | 734ae1ad9dfb778935e4825b5ce2687e2df559ea | [
"BSD-3-Clause"
] | 7 | 2019-11-17T20:07:47.000Z | 2021-04-20T13:16:42.000Z | # Translate - a PyTorch Language Library
Translate is a library for machine translation written in PyTorch. It provides training for sequence-to-sequence models. Translate relies on [fairseq](https://github.com/pytorch/fairseq), a general sequence-to-sequence library, which means that models implemented in both Translate and Fairseq can be trained. Translate also provides the ability to export some models to Caffe2 graphs via [ONNX](https://onnx.ai/) and to load and run these models from C++ for production purposes. Currently, we export components (encoder, decoder) to Caffe2 separately and beam search is implemented in C++. In the near future, we will be able to export the beam search as well. We also plan to add export support to more models.
## Requirements and Installation
### Translate Requires:
* A Linux operating system with a CUDA compatible card
* GNU C++ compiler version 4.9.2 and above
* A [CUDA installation](https://docs.nvidia.com/cuda/). We recommend CUDA 8.0 or CUDA 9.0
### Use Our Docker Image:
Install [Docker](https://docs.docker.com/install/) and
[nvidia-docker](https://github.com/NVIDIA/nvidia-docker), then run
```
sudo docker pull pytorch/translate
sudo nvidia-docker run -i -t --rm pytorch/translate /bin/bash
. ~/miniconda/bin/activate
cd ~/translate
```
You should now be able to run the sample commands in the
[Usage Examples](#usage-examples) section below. You can also see the available
image versions under https://hub.docker.com/r/pytorch/translate/tags/.
### Install Translate from Source:
These instructions were mainly tested on CentOS 7.4.1708 with a Tesla M40 card
and a CUDA 8 installation. We highly encourage you to [report an issue](https://github.com/pytorch/translate/issues)
if you are unable to install this project for your specific configuration.
- If you don't already have an existing [Anaconda](https://www.anaconda.com/download/)
environment with Python 3.6, you can install one via [Miniconda3](https://conda.io/miniconda.html):
```
wget https://repo.continuum.io/miniconda/Miniconda3-latest-Linux-x86_64.sh -O miniconda.sh
chmod +x miniconda.sh
./miniconda.sh -b -p ~/miniconda
rm miniconda.sh
. ~/miniconda/bin/activate
```
- Clone the Translate repo:
```
git clone https://github.com/pytorch/translate.git
pushd translate
```
- Install the combined [PyTorch](https://pytorch.org/) and [Caffe2](http://caffe2.ai/) Conda [package](https://anaconda.org/caffe2):
```
# Set to 8 or 9 depending on your CUDA version.
TMP_CUDA_VERSION="9"
# Uninstall previous versions of PyTorch. Doing this twice is intentional.
# Error messages about torch not being installed are benign.
pip uninstall -y torch
pip uninstall -y torch
# This may not be necessary if you already have the latest cuDNN library.
conda install -y cudnn
# Add LAPACK support for the GPU.
conda install -y -c pytorch "magma-cuda${TMP_CUDA_VERSION}0"
# Install the combined PyTorch+Caffe2 conda package.
conda install -y -c caffe2 "pytorch-caffe2-cuda${TMP_CUDA_VERSION}.0-cudnn7"
# Force re-install of numpy 1.14 since the current version of the
# PyTorch+Caffe2 package downgrades it.
conda install -y numpy==1.14 --no-deps
# Install NCCL2.
wget "https://s3.amazonaws.com/pytorch/nccl_2.1.15-1%2Bcuda${TMP_CUDA_VERSION}.0_x86_64.txz"
TMP_NCCL_VERSION="nccl_2.1.15-1+cuda${TMP_CUDA_VERSION}.0_x86_64"
tar -xvf "${TMP_NCCL_VERSION}.txz"
rm "${TMP_NCCL_VERSION}.txz"
# Set some environmental variables needed to link libraries correctly.
export CONDA_PATH="$(dirname $(which conda))/.."
export NCCL_ROOT_DIR="$(pwd)/${TMP_NCCL_VERSION}"
export LD_LIBRARY_PATH="${CONDA_PATH}/lib:${NCCL_ROOT_DIR}/lib:${LD_LIBRARY_PATH}"
```
- Install [ONNX](https://onnx.ai/):
```
git clone --recursive https://github.com/onnx/onnx.git
yes | pip install ./onnx 2>&1 | tee ONNX_OUT
```
- Build Translate:
```
pip uninstall -y pytorch-translate
python3 setup.py build develop
pushd pytorch_translate/cpp
mkdir build && pushd build
cmake \
-DCMAKE_PREFIX_PATH="${CONDA_PATH}/usr/local" \
-DCMAKE_INSTALL_PREFIX="${CONDA_PATH}" .. \
2>&1 | tee CMAKE_OUT
make 2>&1 | tee MAKE_OUT
# Return to the translate directory.
popd
popd
```
Now you should be able to run the example scripts below!
### Use Our Amazon Machine Image:
You can launch an AWS instance using the `pytorch_translate_initial_release` image (AMI ID: ami-04ff53cdd573658dc). Once you have ssh'ed to the AWS instance, the example commands below should work after running `cd translate`.
## Usage Examples
Note: the example commands given assume that you are the root of the cloned
GitHub repository or that you're in the `translate` directory of the Docker or
Amazon image. You may also need to make sure you have the Anaconda environment
activated.
### Training
We provide an [example script](https://github.com/pytorch/translate/blob/master/pytorch_translate/examples/train_iwslt14.sh) to train a model for the IWSLT 2014 German-English task. We used this command to obtain [a pretrained model](https://download.pytorch.org/models/translate/iwslt14/model.tar.gz):
```
bash pytorch_translate/examples/train_iwslt14.sh
```
The pretrained model actually contains two checkpoints that correspond to training twice with random initialization of the parameters. This is useful to obtain ensembles. This dataset is relatively small (~160K sentence pairs), so training will complete in a few hours on a single GPU.
### Pretrained Model
A pretrained model for IWSLT 2014 can be evaluated by running the [example script](https://github.com/pytorch/translate/blob/master/pytorch_translate/examples/generate_iwslt14.sh):
```
bash pytorch_translate/examples/generate_iwslt14.sh
```
Note the improvement in performance when using an ensemble of size 2 instead of a single model.
### Exporting a Model with ONNX
We provide an [example script](https://github.com/pytorch/translate/blob/master/pytorch_translate/examples/export_iwslt14.sh) to export a PyTorch model to a Caffe2 graph via ONNX:
```
bash pytorch_translate/examples/export_iwslt14.sh
```
This will output two files, `encoder.pb` and `decoder.pb`, that correspond to the computation of the encoder and one step of the decoder. The example exports a single checkpoint (`--checkpoint model/averaged_checkpoint_best_0.pt` but is also possible to export an ensemble (`--checkpoint model/averaged_checkpoint_best_0.pt --checkpoint model/averaged_checkpoint_best_1.pt`). Note that during export, you can also control a few hyperparameters such as beam search size, word and UNK rewards.
### Using the Model
To use the sample exported Caffe2 model to translate sentences, run:
```
echo "hallo welt" | bash pytorch_translate/examples/translate_iwslt14.sh
```
Note that the model takes in [BPE](https://github.com/rsennrich/subword-nmt)
inputs, so some input words need to be split into multiple tokens.
For instance, "hineinstopfen" is represented as "hinein@@ stop@@ fen".
## Join the Translate Community
We welcome contributions! See the `CONTRIBUTING.md` file for how to help out.
## License
Translate is BSD-licensed, as found in the `LICENSE` file.
| 42.476471 | 713 | 0.759313 | eng_Latn | 0.955537 |
aab4167aeccb5631dd152c066ce3d050954a6209 | 5,618 | md | Markdown | Odata-docs/webapi/v6/alternate-key-v6.md | MicrosoftDocs/Odata-Docs | ae6d1c3e395251dde6b1637be7f4e890011ac6ee | [
"CC-BY-4.0",
"MIT"
] | null | null | null | Odata-docs/webapi/v6/alternate-key-v6.md | MicrosoftDocs/Odata-Docs | ae6d1c3e395251dde6b1637be7f4e890011ac6ee | [
"CC-BY-4.0",
"MIT"
] | null | null | null | Odata-docs/webapi/v6/alternate-key-v6.md | MicrosoftDocs/Odata-Docs | ae6d1c3e395251dde6b1637be7f4e890011ac6ee | [
"CC-BY-4.0",
"MIT"
] | null | null | null | ---
title: "Alternate Key in webapi v6"
description: ""
author: madansr7
ms.author: saumadan
ms.date: 7/1/2019
ms.topic: article
---
# Alternate key in WebApi v6
**Applies To**: [!INCLUDE[appliesto-webapi](../../includes/appliesto-webapi-v6.md)]
From ODataLib 6.13.0, it supports the alternate key. For detail information about alternate keys, please refer to [here](https://github.com/OData/vocabularies/blob/master/OData.Community.Keys.V1.md).
The related Web API sample codes can be found [here](https://github.com/OData/ODataSamples/tree/master/WebApi/v4/ODataAlternateKeySamples).
## Single alternate key
### Edm Model builder
The following codes can be used to build the single alternate key:
``` csharp
EdmEntityType customer = new EdmEntityType("NS", "Customer");
customer.AddKeys(customer.AddStructuralProperty("ID", EdmPrimitiveTypeKind.Int32));
customer.AddStructuralProperty("Name", EdmPrimitiveTypeKind.String);
var ssn = customer.AddStructuralProperty("SSN", EdmPrimitiveTypeKind.String);
model.AddAlternateKeyAnnotation(customer, new Dictionary<string, IEdmProperty>
{
{"SSN", ssn}
});
model.AddElement(customer);
```
### Related Metadata
The following is the related metadata:
``` csharp
<EntityType Name="Customer">
<Key>
<PropertyRef Name="ID" />
</Key>
<Property Name="ID" Type="Edm.Int32" Nullable="false" />
<Property Name="Name" Type="Edm.String" />
<Property Name="SSN" Type="Edm.String" />
<Annotation Term="OData.Community.Keys.V1.AlternateKeys">
<Collection>
<Record Type="OData.Community.Keys.V1.AlternateKey">
<PropertyValue Property="Key">
<Collection>
<Record Type="OData.Community.Keys.V1.PropertyRef">
<PropertyValue Property="Alias" String="SocialSN" />
<PropertyValue Property="Name" PropertyPath="SSN" />
</Record>
</Collection>
</PropertyValue>
</Record>
</Annotation>
</EntityType>
```
## Multiple alternate keys
### Edm Model builder
The following codes can be used to build the multiple alternate keys:
``` csharp
EdmEntityType order = new EdmEntityType("NS", "Order");
order.AddKeys(order.AddStructuralProperty("OrderId", EdmPrimitiveTypeKind.Int32));
var orderName = order.AddStructuralProperty("Name", EdmPrimitiveTypeKind.String);
var orderToken = order.AddStructuralProperty("Token", EdmPrimitiveTypeKind.Guid);
order.AddStructuralProperty("Amount", EdmPrimitiveTypeKind.Int32);
model.AddAlternateKeyAnnotation(order, new Dictionary<string, IEdmProperty>
{
{"Name", orderName}
});
model.AddAlternateKeyAnnotation(order, new Dictionary<string, IEdmProperty>
{
{"Token", orderToken}
});
model.AddElement(order);
```
### Related Metadata
The following is the related metadata:
```xml
<EntityType Name="Order">
<Key>
<PropertyRef Name="OrderId" />
</Key>
<Property Name="OrderId" Type="Edm.Int32" />
<Property Name="Name" Type="Edm.String" />
<Property Name="Token" Type="Edm.Guid" />
<Property Name="Amount" Type="Edm.Int32" />
<Annotation Term="OData.Community.Keys.V1.AlternateKeys">
<Collection>
<Record Type="OData.Community.Keys.V1.AlternateKey">
<PropertyValue Property="Key">
<Collection>
<Record Type="OData.Community.Keys.V1.PropertyRef">
<PropertyValue Property="Alias" String="Name" />
<PropertyValue Property="Name" PropertyPath="Name" />
</Record>
</Collection>
</PropertyValue>
</Record>
<Record Type="OData.Community.Keys.V1.AlternateKey">
<PropertyValue Property="Key">
<Collection>
<Record Type="OData.Community.Keys.V1.PropertyRef">
<PropertyValue Property="Alias" String="Token" />
<PropertyValue Property="Name" PropertyPath="Token" />
</Record>
</Collection>
</PropertyValue>
</Record>
</Collection>
</Annotation>
</EntityType>
```
## Composed alternate keys
### Edm Model builder
The following codes can be used to build the multiple alternate keys:
``` csharp
EdmEntityType person = new EdmEntityType("NS", "Person");
person.AddKeys(person.AddStructuralProperty("ID", EdmPrimitiveTypeKind.Int32));
var country = person.AddStructuralProperty("Country", EdmPrimitiveTypeKind.String);
var passport = person.AddStructuralProperty("Passport", EdmPrimitiveTypeKind.String);
model.AddAlternateKeyAnnotation(person, new Dictionary<string, IEdmProperty>
{
{"Country", country},
{"Passport", passport}
});
model.AddElement(person);
```
### Related Metadata
The following is the related metadata:
``` csharp
<EntityType Name="Person">
<Key>
<PropertyRef Name="ID" />
</Key>
<Property Name="ID" Type="Edm.Int32" />
<Property Name="Country" Type="Edm.String" />
<Property Name="Passport" Type="Edm.String" />
<Annotation Term="OData.Community.Keys.V1.AlternateKeys">
<Collection>
<Record Type="OData.Community.Keys.V1.AlternateKey">
<PropertyValue Property="Key">
<Collection>
<Record Type="OData.Community.Keys.V1.PropertyRef">
<PropertyValue Property="Alias" String="Country" />
<PropertyValue Property="Name" PropertyPath="Country" />
</Record>
<Record Type="OData.Community.Keys.V1.PropertyRef">
<PropertyValue Property="Alias" String="Passport" />
<PropertyValue Property="Name" PropertyPath="Passport" />
</Record>
</Collection>
</PropertyValue>
</Record>
</Collection>
</Annotation>
</EntityType>
```
## Uri parser
Enable the alternate keys parser extension via the Uri resolver `AlternateKeysODataUriResolver`.
``` csharp
var parser = new ODataUriParser(model, new Uri("https://host"), new Uri("https://host/People(SocialSN = \'1\')"))
{
Resolver = new AlternateKeysODataUriResolver(model)
};
```
| 29.882979 | 199 | 0.721965 | yue_Hant | 0.60825 |
aab53a7ffcef131216d647730227d718152b7968 | 976 | md | Markdown | skills/B01LYKC11I/README.md | AndHor66/alexa-skills-list | 3833958be3f3a4091414645d81a531915303a2ef | [
"MIT"
] | 232 | 2016-03-05T06:24:41.000Z | 2022-03-21T19:32:55.000Z | skills/B01LYKC11I/README.md | AndHor66/alexa-skills-list | 3833958be3f3a4091414645d81a531915303a2ef | [
"MIT"
] | 5 | 2016-03-21T02:25:06.000Z | 2020-01-03T15:01:39.000Z | skills/B01LYKC11I/README.md | AndHor66/alexa-skills-list | 3833958be3f3a4091414645d81a531915303a2ef | [
"MIT"
] | 52 | 2016-04-02T06:08:55.000Z | 2021-12-12T23:52:13.000Z | # [Computers and Technology Trivia](http://alexa.amazon.com/#skills/amzn1.ask.skill.880a1bb3-8da4-42dd-b700-542fc755c1b7)
 0
To use the Computers and Technology Trivia skill, try saying...
* *Alexa, ask computer trivia to start new game*
* *the answer is 2*
* *i don't know*
Test your technology and computer knowledge in this fun trivia challenge! Answer your questions by giving the number of the answer.
***
### Skill Details
* **Invocation Name:** computer trivia
* **Category:** null
* **ID:** amzn1.ask.skill.880a1bb3-8da4-42dd-b700-542fc755c1b7
* **ASIN:** B01LYKC11I
* **Author:** Brandon's Alexa
* **Release Date:** September 28, 2016 @ 17:12:59
* **In-App Purchasing:** No
| 39.04 | 287 | 0.727459 | eng_Latn | 0.447776 |
aab5cd668efe585cc9a3d0dac9652aa7e7a08c4a | 2,069 | md | Markdown | _posts/2004-03-08-soverign.md | kerim/keywords | b16bf75bd1e6347b57e3e3ca62012ec198c110f8 | [
"MIT-0",
"MIT"
] | 1 | 2017-08-10T12:37:13.000Z | 2017-08-10T12:37:13.000Z | _posts/2004-03-08-soverign.md | kerim/keywords | b16bf75bd1e6347b57e3e3ca62012ec198c110f8 | [
"MIT-0",
"MIT"
] | null | null | null | _posts/2004-03-08-soverign.md | kerim/keywords | b16bf75bd1e6347b57e3e3ca62012ec198c110f8 | [
"MIT-0",
"MIT"
] | null | null | null | ---
title: Soverign
author: Kerim
layout: post
permalink: /archives/2004/03/08/soverign/
categories:
- Academic
- Politics
---
Reading <a href="http://news.bbc.co.uk/1/hi/programmes/from_our_own_correspondent/3533057.stm" onclick="_gaq.push(['_trackEvent', 'outbound-article', 'http://news.bbc.co.uk/1/hi/programmes/from_our_own_correspondent/3533057.stm', 'this BBC article about Putin']);" >this BBC article about Putin</a>:
> I expected criticism. After all, her son had died fighting Mr Putin’s war. It was the Russian president who sent troops back into Chechnya more than four years ago.
>
> “Oh no”, Tatyana said softly. “It is not Mr Putin’s fault. He cannot be expected to know everything that is going on in the country.”
>
> “But he is the president”, I argued. “Does he not bear ultimate responsibility?”
>
> Tatyana disagreed: “I think that it is the people around the president who are to blame.”
>
> That is a view I have heard so often in my travels across Russia.
Made me think of this quote by Lord Acton:
> The monarchy which had been engaged from the 13th century in curbing the nobles, was at last thrust aside by the democracy, because it was too dilatory in the work, and was unable to deny its own origin and effectually ruin the class from which it sprang. . . . **The substance of the ideas of <a href="http://en.wikipedia.org/wiki/French_Revolution" onclick="_gaq.push(['_trackEvent', 'outbound-article', 'http://en.wikipedia.org/wiki/French_Revolution', '1789']);" >1789</a> is not the limitation of the soverign power, but the abrogation of intermediate powers.**
From Lord Acton, “Nationality”, <a href="http://www.versobooks.com/books/ab/b-titles/balakrishnan_map_nation.shtml" onclick="_gaq.push(['_trackEvent', 'outbound-article', 'http://www.versobooks.com/books/ab/b-titles/balakrishnan_map_nation.shtml', 'Mapping the Nation']);" ><em>Mapping the Nation</em></a>, p. 24. (Emphasis added.)
UPDATE: Added link to the date in the quote.
| 68.966667 | 569 | 0.744321 | eng_Latn | 0.977594 |
aab6969280571e127a158cc4f184d5db68a662bb | 684 | md | Markdown | docs/api-reference/classes/NSChatAgent/AcceptChatSessionTransfer.md | stianol/crmscript | be1ad4f3a967aee2974e9dc7217255565980331e | [
"MIT"
] | null | null | null | docs/api-reference/classes/NSChatAgent/AcceptChatSessionTransfer.md | stianol/crmscript | be1ad4f3a967aee2974e9dc7217255565980331e | [
"MIT"
] | null | null | null | docs/api-reference/classes/NSChatAgent/AcceptChatSessionTransfer.md | stianol/crmscript | be1ad4f3a967aee2974e9dc7217255565980331e | [
"MIT"
] | null | null | null | ---
uid: crmscript_ref_NSChatAgent_AcceptChatSessionTransfer
title: NSChatSessionEntity AcceptChatSessionTransfer(Integer chatSessionId)
intellisense: NSChatAgent.AcceptChatSessionTransfer
keywords: NSChatAgent, AcceptChatSessionTransfer
so.topic: reference
---
# NSChatSessionEntity AcceptChatSessionTransfer(Integer chatSessionId)
Accept the transfer: assign the session to the user. If the session is not being transferred, nothing happens.
**Parameters:**
- **chatSessionId** id of the chat session to send
**Returns:** NSChatSessionEntity
```crmscript
NSChatAgent agent;
Integer chatSessionId;
NSChatSessionEntity res = agent.AcceptChatSessionTransfer(chatSessionId);
```
| 28.5 | 110 | 0.828947 | yue_Hant | 0.743593 |
aab73f627cb144079649f5170529f022cf1e3434 | 121 | md | Markdown | CHANGELOG.md | jeffchang5/HackTheNorth2017 | eff92fd863bd3fc91bb30f75aa3db24e236507c4 | [
"Unlicense",
"MIT"
] | null | null | null | CHANGELOG.md | jeffchang5/HackTheNorth2017 | eff92fd863bd3fc91bb30f75aa3db24e236507c4 | [
"Unlicense",
"MIT"
] | null | null | null | CHANGELOG.md | jeffchang5/HackTheNorth2017 | eff92fd863bd3fc91bb30f75aa3db24e236507c4 | [
"Unlicense",
"MIT"
] | null | null | null | # Changelog
* Removed unused resouces
* Added new theme and colors.
* Refactor previous code to emphasize reusability
| 24.2 | 50 | 0.77686 | eng_Latn | 0.982398 |
aab74f760208aad8de1b3e5894e69a29c505a7a9 | 1,887 | md | Markdown | curriculum/challenges/chinese/02-javascript-algorithms-and-data-structures/basic-javascript/generate-random-whole-numbers-with-javascript.chinese.md | innocentwkc/freeCodeCamp | 091ee7905cd193f29de6066d4de8c83af3c8d6ce | [
"BSD-3-Clause"
] | 2 | 2021-02-10T21:09:45.000Z | 2021-10-19T11:41:34.000Z | curriculum/challenges/chinese/02-javascript-algorithms-and-data-structures/basic-javascript/generate-random-whole-numbers-with-javascript.chinese.md | innocentwkc/freeCodeCamp | 091ee7905cd193f29de6066d4de8c83af3c8d6ce | [
"BSD-3-Clause"
] | 46 | 2020-09-09T10:14:35.000Z | 2022-02-14T04:34:30.000Z | curriculum/challenges/chinese/02-javascript-algorithms-and-data-structures/basic-javascript/generate-random-whole-numbers-with-javascript.chinese.md | innocentwkc/freeCodeCamp | 091ee7905cd193f29de6066d4de8c83af3c8d6ce | [
"BSD-3-Clause"
] | 1 | 2020-03-26T15:55:08.000Z | 2020-03-26T15:55:08.000Z | ---
id: cf1111c1c12feddfaeb1bdef
title: Generate Random Whole Numbers with JavaScript
challengeType: 1
videoUrl: ''
localeTitle: 使用JavaScript生成随机整数
---
## Description
<section id="description">我们可以生成随机十进制数很好,但如果我们用它来生成随机整数,它会更有用。 <ol><li>使用<code>Math.random()</code>生成随机小数。 </li><li>将随机小数乘以<code>20</code> 。 </li><li>使用另一个函数<code>Math.floor()</code>将数字向下舍入到最接近的整数。 </li></ol>请记住, <code>Math.random()</code>永远不会返回<code>1</code> ,因为我们正在向下舍入,实际上不可能得到<code>20</code> 。这项技术将给我们一个<code>0</code>到<code>19</code>之间的整数。将所有内容放在一起,这就是我们的代码: <code>Math.floor(Math.random() * 20);</code>我们调用<code>Math.random()</code> ,将结果乘以20,然后将值传递给<code>Math.floor()</code>函数,将值向下舍入到最接近的整数。 </section>
## Instructions
<section id="instructions">使用此技术生成并返回<code>0</code>到<code>9</code>之间的随机整数。 </section>
## Tests
<section id='tests'>
```yml
tests:
- text: <code>randomWholeNum</code>的结果应该是整数。
testString: assert(typeof randomWholeNum() === "number" && (function(){var r = randomWholeNum();return Math.floor(r) === r;})());
- text: 您应该使用<code>Math.random</code>来生成随机数。
testString: assert(code.match(/Math.random/g).length > 1);
- text: 您应该将<code>Math.random</code>的结果乘以10,使其成为介于0和9之间的数字。
testString: assert(code.match(/\s*?Math.random\s*?\(\s*?\)\s*?\*\s*?10[\D]\s*?/g) || code.match(/\s*?10\s*?\*\s*?Math.random\s*?\(\s*?\)\s*?/g));
- text: 您应该使用<code>Math.floor</code>删除数字的小数部分。
testString: assert(code.match(/Math.floor/g).length > 1);
```
</section>
## Challenge Seed
<section id='challengeSeed'>
<div id='js-seed'>
```js
var randomNumberBetween0and19 = Math.floor(Math.random() * 20);
function randomWholeNum() {
// Only change code below this line.
return Math.random();
}
```
</div>
### After Test
<div id='js-teardown'>
```js
console.info('after the test');
```
</div>
</section>
## Solution
<section id='solution'>
```js
// solution required
```
</section>
| 26.577465 | 507 | 0.677795 | yue_Hant | 0.405448 |
aab7d82e29e7ce9264f66dc0ff5782daef5062ea | 7,703 | md | Markdown | README.md | trustwallet/ens-coincodec | c73bd509fcae3c0771ea377e6f48c30266746e12 | [
"Apache-2.0"
] | 23 | 2019-11-20T10:39:12.000Z | 2021-11-13T15:07:43.000Z | README.md | trustwallet/ens-coincodec | c73bd509fcae3c0771ea377e6f48c30266746e12 | [
"Apache-2.0"
] | 23 | 2019-11-20T10:59:16.000Z | 2021-01-15T23:30:22.000Z | README.md | trustwallet/ens-coincodec | c73bd509fcae3c0771ea377e6f48c30266746e12 | [
"Apache-2.0"
] | 13 | 2019-11-25T01:38:04.000Z | 2022-03-19T17:42:46.000Z | # ens-coincodec
[](https://github.com/trustwallet/ens-coincodec/releases/)
[](LICENSE)
[](https://godoc.org/github.com/trustwallet/ens-coincodec)

[](https://codecov.io/github/trustwallet/ens-coincodec)
[](https://goreportcard.com/report/github.com/trustwallet/ens-coincodec)
Go utility library to provide movement between string and binary representation of multpile different cryptocurrency coin formats, mainly for ENS, please checkout [EIP-2304](https://github.com/ethereum/EIPs/blob/master/EIPS/eip-2304.md) for details.
## Table of Contents
- [Supported Coins](#coins)
- [Install](#install)
- [Usage](#usage)
- [Contribute](#contribute)
- [License](#license)
## Coins
<a href="https://bitcoin.org" target="_blank"><img src="https://raw.githubusercontent.com/TrustWallet/tokens/master/coins/0.png" width="32" /></a>
<a href="https://litecoin.org" target="_blank"><img src="https://raw.githubusercontent.com/TrustWallet/tokens/master/coins/2.png" width="32" /></a>
<a href="https://dogecoin.com" target="_blank"><img src="https://raw.githubusercontent.com/TrustWallet/tokens/master/coins/3.png" width="32" /></a>
<a href="https://dash.org" target="_blank"><img src="https://raw.githubusercontent.com/TrustWallet/tokens/master/coins/5.png" width="32" /></a>
<a href="https://viacoin.org" target="_blank"><img src="https://raw.githubusercontent.com/TrustWallet/tokens/master/coins/14.png" width="32" /></a>
<a href="https://www.digibyte.io" target="_blank"><img src="https://raw.githubusercontent.com/TrustWallet/tokens/master/coins/20.png" width="32" /></a>
<a href="https://monacoin.org" target="_blank"><img src="https://raw.githubusercontent.com/TrustWallet/tokens/master/coins/22.png" width="32" /></a>
<a href="https://ethereum.org" target="_blank"><img src="https://raw.githubusercontent.com/TrustWallet/tokens/master/coins/60.png" width="32" /></a>
<a href="https://ethereumclassic.github.io" target="_blank"><img src="https://raw.githubusercontent.com/TrustWallet/tokens/master/coins/61.png" width="32" /></a>
<a href="https://cosmos.network/" target="_blank"><img src="https://raw.githubusercontent.com/TrustWallet/tokens/master/coins/118.png" width="32" /></a>
<a href="https://z.cash" target="_blank"><img src="https://raw.githubusercontent.com/TrustWallet/tokens/master/coins/133.png" width="32" /></a>
<a href="https://zcoin.io" target="_blank"><img src="https://raw.githubusercontent.com/TrustWallet/tokens/master/coins/136.png" width="32" /></a>
<a href="https://ripple.com" target="_blank"><img src="https://raw.githubusercontent.com/TrustWallet/tokens/master/coins/144.png" width="32" /></a>
<a href="https://bitcoincash.org" target="_blank"><img src="https://raw.githubusercontent.com/TrustWallet/tokens/master/coins/145.png" width="32" /></a>
<a href="https://stellar.org" target="_blank"><img src="https://raw.githubusercontent.com/TrustWallet/tokens/master/coins/148.png" width="32" /></a>
<a href="https://ravencoin.org" target="_blank"><img src="https://raw.githubusercontent.com/TrustWallet/tokens/master/coins/175.png" width="32" /></a>
<a href="https://poa.network" target="_blank"><img src="https://raw.githubusercontent.com/TrustWallet/tokens/master/coins/178.png" width="32" /></a>
<a href="https://tron.network" target="_blank"><img src="https://raw.githubusercontent.com/TrustWallet/tokens/master/coins/195.png" width="32" /></a>
<a href="https://nimiq.com" target="_blank"><img src="https://raw.githubusercontent.com/TrustWallet/tokens/master/coins/242.png" width="32" /></a>
<a href="https://iotex.io" target="_blank"><img src="https://raw.githubusercontent.com/TrustWallet/tokens/master/coins/304.png" width="32" /></a>
<a href="https://zilliqa.com" target="_blank"><img src="https://raw.githubusercontent.com/TrustWallet/tokens/master/coins/313.png" width="32" /></a>
<a href="https://www.thetatoken.org" target="_blank"><img src="https://raw.githubusercontent.com/TrustWallet/tokens/master/coins/500.png" width="32" /></a>
<a href="https://binance.com" target="_blank"><img src="https://raw.githubusercontent.com/TrustWallet/tokens/master/coins/714.png" width="32" /></a>
<a href="https://vechain.org" target="_blank"><img src="https://raw.githubusercontent.com/TrustWallet/tokens/master/coins/818.png" width="32" /></a>
<a href="https://callisto.network" target="_blank"><img src="https://raw.githubusercontent.com/TrustWallet/tokens/master/coins/820.png" width="32" /></a>
<a href="https://tomochain.network" target="_blank"><img src="https://raw.githubusercontent.com/TrustWallet/tokens/master/coins/889.png" width="32" /></a>
<a href="https://thudercore.com" target="_blank"><img src="https://raw.githubusercontent.com/TrustWallet/tokens/master/coins/1001.png" width="32" /></a>
<a href="https://ont.io" target="_blank"><img src="https://raw.githubusercontent.com/TrustWallet/tokens/master/coins/1024.png" width="32" /></a>
<a href="https://tezos.com" target="_blank"><img src="https://raw.githubusercontent.com/TrustWallet/tokens/master/coins/1729.png" width="32" /></a>
<a href="https://kin.org" target="_blank"><img src="https://raw.githubusercontent.com/TrustWallet/tokens/master/coins/2017.png" width="32" /></a>
<a href="https://qtum.org" target="_blank"><img src="https://raw.githubusercontent.com/TrustWallet/tokens/master/coins/2301.png" width="32" /></a>
<a href="https://gochain.io" target="_blank"><img src="https://raw.githubusercontent.com/TrustWallet/tokens/master/coins/6060.png" width="32" /></a>
## Install
`ens-coincodec` is a standard Go module which can be installed with:
```sh
go get github.com/trustwallet/ens-coincodec
```
## Usage
### Example
```go
import (
"fmt"
cc "github.com/trustwallet/ens-coincodec"
slip44 "github.com/wealdtech/go-slip44"
)
func main() {
// Ethereum
bytes, err := cc.ToBytes("0x314159265dD8dbb310642f98f50C066173C1259b", slip44.ETHER)
// hex: 314159265dd8dbb310642f98f50c066173c1259b
if err != nil {
panic(err)
}
str, err := cc.ToString(bytes, slip44.ETHER)
if err != nil {
panic(err)
}
fmt.Printf("Ethereum: %s\n", str)
// Bitcoin
bytes, err = cc.ToBytes("bc1qw508d6qejxtdg4y5r3zarvary0c5xw7kv8f3t4", slip44.BITCOIN)
// script hash: 0014751e76e8199196d454941c45d1b3a323f1433bd6
if err != nil {
panic(err)
}
str, err = cc.ToString(bytes, slip44.BITCOIN)
if err != nil {
panic(err)
}
fmt.Printf("Bitcoin: %s\n", str)
// BNB
bytes, err = cc.ToBytes("bnb1grpf0955h0ykzq3ar5nmum7y6gdfl6lxfn46h2", slip44.BINANCE)
// public key hash: 40c2979694bbc961023d1d27be6fc4d21a9febe6
if err != nil {
panic(err)
}
str, err = cc.ToString(bytes, slip44.BINANCE)
if err != nil {
panic(err)
}
fmt.Printf("BNB: %s\n", str)
}
```
## Contribute
Contributions welcome. Please check out [the issues](https://github.com/trustwallet/ens-coincodec/issues).
If you are adding a new coin type please try to follow the following rules:
- use the existing `ethereum.go` and `ethereum_test.go` as templates
- ensure you have 100% code coverage with your tests
- try not to import large amounts of code; consider copying the relevant code rather than bringing in an entire project to use the address conversion functions
## License
[Apache-2.0](LICENSE) © 2019 Weald Technology Trading Ltd / Trust Wallet
| 58.801527 | 249 | 0.729975 | yue_Hant | 0.209738 |
aab82911e39fe7577cfa2b4dfd700f3c58ce0886 | 17,123 | md | Markdown | README.md | jcharlong/fxpmath | 4d71b911f95e686662eb3051c573f179bfd6d00b | [
"MIT"
] | null | null | null | README.md | jcharlong/fxpmath | 4d71b911f95e686662eb3051c573f179bfd6d00b | [
"MIT"
] | null | null | null | README.md | jcharlong/fxpmath | 4d71b911f95e686662eb3051c573f179bfd6d00b | [
"MIT"
] | null | null | null |
<img src="./docs/figs/fxpmath_logotipo.png" width="300">
A python library for fractional fixed-point (base 2) arithmetic and binary manipulation with Numpy compatibility.
Some key features:
* Fixed-point signed and unsigned numbers representation.
* Arbitrary word and fractional sizes. Auto sizing capability. Extended precision capability.
* Arithmetic and logical (bitwise) operations supported.
* Input values can be: int, float, complex, list, numpy arrays, strings (bin, hex, dec), Decimal type.
* Input rounding methods, overflow and underflow behaviors and flags.
* Binary, Hexadecimal, and other bases representations (like strings).
* Indexing supported.
* Linear scaling: scale and bias.
* Numpy backend.
* Suppport for Numpy functions. They can take and return Fxp objects.
* Internal behavior configurable: inputs/outputs formating, calculation methods.
visit [documentation](https://francof2a.github.io/fxpmath/) for more information.
See some examples in the [examples folder](https://github.com/francof2a/fxpmath/tree/master/examples).
---






---
## Table of content
* [install](#install)
* [quick start](#quick-start)
* [creation](#creation)
* [Representations](#representations)
* [changing values](#changing-values)
* [changing size](#changing-size)
* [data types supported](#data-types-supported)
* [indexing](#indexing)
* [arithmetic](#arithmetic)
* [logical (bitwise) operators](#logical--bitwise--operators)
* [Comparisons](#comparisons)
* [behaviors](#behaviors)
* [overflow / underflow](#overflow---underflow)
* [rounding](#rounding)
* [inaccuracy](#inaccuracy)
* [Status flags](#status-flags)
* [copy](#copy)
* [Scaling](#scaling)
---
## install
To install from *pip* just do the next:
```bash
pip install fxpmath
```
To install with *conda* just do the next:
```bash
conda install -c francof2a fxpmath
```
Or you can clone the repository doing in your console:
```bash
git clone https://github.com/francof2a/fxpmath.git
```
and then go to the fxpmath folder and install it:
```bash
cd fxpmath
pip install .
```
## quick start
### creation
Let's jump into create our new **fractional fixed-point** variable:
```python
from fxpmath import Fxp
x = Fxp(-7.25) # create fxp variable with value 7.25
x.info()
```
> dtype = fxp-s6/2
> Value = -7.25
We have created a variable of 6 bits, where 1 bit has been reserved for sign, 2 bits for fractional part, and 3 remains for integer part. Here, bit sizes had been calculated to just satisfy the value you want to save.
But the most common way to create a **fxp** variable beside the its value is defining explicitly if it is signed, the number of bits for whole word and for the fractional part.
**Note**: `dtype` of Fxp object is a propietary *type* of each element stored in it. The format is:
**`fxp-<sign><n_word>/<n_frac>-{complex}`**
i.e.: `fxp-s16/15`, `fxp-u8/1`, `fxp-s32/24-complex`
```python
x = Fxp(-7.25, signed=True, n_word=16, n_frac=8)
```
or just
```python
x = Fxp(-7.25, True, 16, 8)
```
Formats can also be specified using a string, either in the fxp `dtype` format,
or by using `Qm.n` or `UQm.n` notation (or the equivalent `Sm.n`/`Um.n` notation).
```python
x = Fxp(-7.25, dtype='fxp-s16/8')
x = Fxp(-7.25, dtype='S8.8')
```
You can print more information only changing the verbosity of *info* method.
```python
x.info(verbose=3)
```
> dtype = fxp-s16/8
> Value = -7.25
>
> Signed = True
> Word bits = 16
> Fract bits = 8
> Int bits = 7
> Val data type = `<class 'float'>`
>
> Upper = 127.99609375
> Lower = -128.0
> Precision = 0.00390625
> Overflow = saturate
> Rounding = trunc
> Shifting = expand
### Representations
We can representate the value stored en `x` in several ways:
```python
x
```
> fxp-s16/8(-7.25)
```python
x.get_val() # return a Numpy array with the val/values in original data type representation
x() # equivalent to x.get_val() or x.astype(self.vdtype)
```
> -7.25
In different bases:
```python
x.bin()
x.bin(frac_dot=True) # binary with fractional dot
x.base_repr(2) # binary with sign symbol (not complement)
x.hex()
x.base_repr(16) # hex with sign symbol (not complement)
```
> '1111100011000000'
> '11111000.11000000'
> '-11101000000'
> '0xF8C0'
> '-740'
In different types:
```python
x.astype(int)
x.astype(float)
x.astype(complex)
```
> -8
> -7.25
> (-7.25+0j)
**Note** that if we do:
```python
x.val
```
we will get the fixed point value stored in memory, like an integer value. Don't use this value for calculations, but in some cases you may need it.
### changing values
We can change the value of the variable in several ways:
```python
x(10.75) # the simpliest way
x.set_val(2.125) # another option
```
**DO NOT DO THIS**:
```python
x = 10.75 # wrong
```
because you are just modifying `x` type... it isn't a *Fxp* anymore, just a simple *float* right now.
The same as `x.val` gives you the raw underlying value, you can set that value with
```python
x.set_val(43, raw=True)
```
### changing size
If we want to resize our fxp variable we can do:
```python
x.resize(True, 8, 6) # signed=True, n_word=8, n_frac=6
```
### data types supported
Fxp can handle following input data types:
* int, uint
* float
* complex
* list
* ndarrays (n-dimensional numpy arrays)
* strings (bin, hex, dec)
* Fxp objects
Here some examples:
```python
x(2)
x(-1.75)
x(-2.5 + 1j*0.25)
x([1.0, 1.5, 2.0])
x(np.random.uniform(size=(2,4)))
x('3.5')
x('0b11001010')
x('0xA4')
```
### indexing
If we had been save a list or array, we can use indexing just like:
```python
x[2] = 1.0 # modify the value in the index 2
print(x[2])
```
---
## arithmetic
*Fxp* supports some basic math operations like:
```python
0.75 + x # add a constant
x - 0.125 # substract a constant
3 * x # multiply by a constant
x / 1.5 # division by a constant
x // 1.5 # floor division by a constant
x % 2 # modulo
x ** 3 # power
```
This math operations using a Fxp and a constant returns a **new Fxp** object with a precision that depends of configuration of Fxp object, `x.config` for examples above.
The constant is converted into a new Fxp object before math operation, where the Fxp size for the constant operand is defined by `x.config.op_input_size` in examples above. The default value for `op_input_size` is 'best' (best enoguh precision to represent the constant value), but it could be used 'same' to force the constant's size equals to Fxp object size (x in the examples).
The result of math operation is returned as a new Fxp object with a precision defined according to `x.config.const_op_sizing`. This parameter could be configured with following options: 'optimal', 'same' (default), 'fit', 'largest', 'smallest'. For math operations with constants, by default (`config.const_op_sizing = 'same'`), a Fxp with same size is returned.
In all these cases we can assign the result to a (Fxp) variable, or to the same (overwritting the old Fxp object).
```python
y = 3.25 * (x - 0.5) # y is a new Fxp object
```
Math operations using **two or more Fxp** variables is also supported, returning a new Fxp object like before cases. The size of returned Fxp object depends of both Fxp operand's sizes and the `config.op_sizing` parameter of the first (left) Fxp object. By default, `config.op_sizing = 'optimal'`, so, the returned size depends also of the math operation type. For example, in the addition case, the integer size of returned Fxp is 1 bit larger than largest integer size of operands, and size of fractional part of returned Fxp is equal to largest fractional size of operands.
```python
# Fxp as operands
x1 = Fxp(-7.25, signed=True, n_word=16, n_frac=8)
x2 = Fxp(1.5, signed=True, n_word=16, n_frac=8)
x3 = Fxp(-0.5, signed=True, n_word=8, n_frac=7)
y = 2*x1 + x2 - 0.5 # y is a new Fxp object
y = x1*x3 - 3*x2 # y is a new Fxp object, again
```
If we need to model that the result of a math operation is stored in other fractional fixed-point variable with a particular format we should do the following:
```python
# variable to store a result
y = Fxp(None, signed=True, n_word=32, n_frac=16)
y.equal(x1*x3 - 3*x2)
```
At the end, we also have the possibility of get the value of a math operation and set that val in the varible created to store the result.
```python
y.set_val( (x1*x3 - 3*x2).get_val() ) # equivalent to y.equal(x1*x3 - 3*x2), but less elegant
y( (x1*x3 - 3*x2)() ) # just a little more elegant
```
Another example could be a sin wave function represented in Fxp:
```python
import numpy as np
f = 5.0 # signal frequency
fs = 400.0 # sampling frequency
N = 1000 # number of samples
n = Fxp( list(range(N)) ) # sample indices
y( 0.5 * np.sin(2 * np.pi * f * n() / fs) ) # a sin wave with 5.0 Hz of frequecy sampled at 400 samples per second
```
## logical (bitwise) operators
*Fxp* supports logical (bitwise) operations like *not* (*inverse*), *and*, *or*, *xor* with constants or others Fxp variables. It also supports bits *shifting* to the right and left.
```python
x & 0b1100110011110000 # Fxp var AND constant
x & Fxp('0b11001100.11110000') # Fxp var AND other Fxp with same constant
x & y # x AND y, both previoulsy defined
~x # bits inversion
x | y # x OR y
x ^ y # x XOR y
x << 5 # x shifted 5 bits to the left
x >> 3 # x shifted 3 bits to the right (filled with sign bit)
```
When logical operations are performed with a constant, this constant is converted to a Fxp with de same characteristics of Fxp operand.
## Comparisons
*Fxp* supoorts comparison operators with constants, other variables, or another Fxp.
```python
x > 5
x == y
# ... and other comparison availables
```
---
## behaviors
Fxp has embedded some behaviors to process the value to store.
### overflow / underflow
A Fxp has upper and lower limits to representate a fixed point value, those limits are define by fractional format (bit sizes). When we want to store a value that is outside those limits, Fxp has an **overflow** y process the value depending the behavior configured for this situation. The options are:
* *saturate* (default): the stored value is clipped to *upper* o *lower* level, as appropiate. For example, if upper limit is 15.75 and I'd want to store 18.00, the stored value will be 15.75.
* *wrap* : the stored value is wrapped inside valid range. For example, if we have a `fxp-s7/2` the lower limit is -16.00 and the upper +15.75, and I'd want to store 18.00, the stored value will be -14.00 (18.00 is 2.00 above upper limit, so is stored 2.00 above lower limit).
We can change this behavior doing:
```python
# at instantiation
x = Fxp(3.25, True, 16, 8, overflow='saturate')
# afer ...
x.overflow = 'saturate'
# or
x.overflow = 'wrap'
```
If we need to know which are the *upper* and *lower* limits, Fxp have those stored inside:
```python
print(x.upper)
print(x.lower)
```
It is important to know the Fxp doesn't raise a warning if *overflow* or *underflow* happens. The way to know that is checking field `status['overflow']` and `status['underflow']` of each Fxp.
### rounding
Until now we had been storing values in our Fxp that were represented without loss of precision, and that was because we defined enough amount of bit for word and fractional part. In other words, if we want to save the value -7.25, we need 1 bit for sign, at least 3 bits for integer (2^**3** = 8), and at least 2 bits for fractional (2^-**2** = 0.25). In this case our Fxp would have `fxp-s6/2` format.
But, if we want to change the value of our Fxp to -7.3, the precision is not enough and Fxp will store -7.25 again. That is because Fxp is **rounding** the value before storing as a fractional fixed point value. Fxp allows different types of rounding methods:
* *trunc* (default): The truncated value of the scalar (let's say `x`) will be the nearest fractional supported value which is closer to zero than `x` is. In short, the fractional part of the signed number `x` that is not supported, is discarded. Round to nearest fractional supported value towards zero.
* *around* : Evenly round of the given value to the nearest fractional supported value, for example: 1.5 is rounded to 2.0.
* *floor* : The floor of the scalar `x` is the largest fractional supported value `i`, such that i <= x. It is often denoted as $\lfloor x \rfloor$.
* *ceil* : The ceil of the scalar `x` is the smallest fractional supported value `i`, such that i >= x. It is often denoted as \lceil x \rceil.
* *fix* : Round to nearest fractional supported value towards zero.
We can change this behavior doing:
```python
# at instantiation
x = Fxp(3.25, True, 16, 8, rounding='floor')
# after ...
x.rounding = 'trunc'
# or ...
x.rounding = 'around'
x.rounding = 'floor'
x.rounding = 'ceil'
x.rounding = 'fix'
```
If we want to know what is the **precision** of our Fxp, we can do:
```python
print(x.precision) # print the precision of x
# or, in a generic way:
print(Fxp(n_frac=7).precision) # print the precision of a fxp with 7 bits for fractional part.
```
### inaccuracy
When the input value couldn't be represented exactly as a fixed-point, a **inaccuracy** flag is raised in the status of Fxp variable. You can check this flag to know if you are carrying a precision error.
## Status flags
*Fxp* have **status flags** to show that some events have occured inside the variable. The status flags are:
* overflow
* underflow
* inaccuracy
Those can be checked using:
```python
x.get_status() # returns a dictionary with the flags
# or
x.get_status(format=str) # return a string with flags RAISED only
```
The method **reset** can be call to reset status flags raised.
```python
x.reset()
```
---
## copy
We can copy a Fxp just like:
```python
y = x.copy() # copy also the value stored
# or
y = x.deepcopy()
# if you want to preserve a value previously stored in `y` and only copy the properties from `x`:
y = y.like(x)
```
This prevent to redefine once and once again a Fxp object with same properties. If we want to modify the value en same line, we can do:
```python
y = x.copy()(-1.25) # where -1.25 y the new value for `y` after copying `x`. It isn't necessary the `y` exists previously.
# or
y = Fxp(-1.25).like(x)
# or
y = Fxp(-1.25, like=x)
# be careful with:
y = y(-1.25).like(x) # value -1.25 could be modify by overflow or rounding before considerating `x` properties.
y = y.like(x)(-1.25) # better!
```
It is a good idea create Fxp objects like **template**:
```python
# Fxp like templates
DATA = Fxp(None, True, 24, 15)
ADDERS = Fxp(None, True, 40, 16)
MULTIPLIERS = Fxp(None, True, 24, 8)
CONSTANTS = Fxp(None, True, 8, 4)
# init
x1 = Fxp(-3.2).like(DATA)
x2 = Fxp(25.5).like(DATA)
c = Fxp(2.65).like(CONSTANTS)
m = Fxp().like(MULTIPLIERS)
y = Fxp().like(ADDERS)
# do the calc!
m.equal(c*x2)
y.equal(x1 + m)
```
## Scaling
*Fxp* implements an alternative way to input data and represent it, as an linear transformation through *scale* and *bias*. In this way, the raw fracitonal value stored in Fxp variable is "scaled down" during input and "scaled up" during output or operations.
It allows to use less bits to represent numbers in a huge range and/or offset.
For example, suppose that the set of numbers to represent are in [10000, 12000] range, and the precision needed is 0.5. We have 4000 numbers to represent, at least. Using scaling we can avoid to represent 12000 number or more. So, we only need 12 bits (4096) values.
```python
x = Fxp(10128.5, signed=False, n_word=12, scale=1, bias=10000)
x.info(3)
```
> dtype = fxp-u12/1
> Value = 10128.5
> Scaling = 1 * val + 10000
>
> Signed = False
> Word bits = 12
> Fract bits = 1
> Int bits = 11
> Val data type = `<class 'float'>`
>
> Upper = 12047.5
> Lower = 10000.0
> Precision = 0.5
> Overflow = saturate
> Rounding = trunc
> Shifting = expand
Note that *upper* and *lower* limits are correct, and that the *precision* is what we needed.
| 31.076225 | 576 | 0.676984 | eng_Latn | 0.994907 |
aab8c699bc4872dece48888b9cd6e90af756645f | 163 | md | Markdown | README.md | thamudhiFernando/ModernPos-NativeHibernate-Bootstrapping | 959af3cc69b335fdb6f022f5cc523bcf390f1c49 | [
"MIT"
] | null | null | null | README.md | thamudhiFernando/ModernPos-NativeHibernate-Bootstrapping | 959af3cc69b335fdb6f022f5cc523bcf390f1c49 | [
"MIT"
] | null | null | null | README.md | thamudhiFernando/ModernPos-NativeHibernate-Bootstrapping | 959af3cc69b335fdb6f022f5cc523bcf390f1c49 | [
"MIT"
] | null | null | null | # Modern POS - Native Hibernate
This is a sample CRUD Application with native hibernate bootstrapping.
## License
This project has been licensed [MIT](License).
| 23.285714 | 70 | 0.779141 | eng_Latn | 0.997794 |
aab8eed5b43ebdd0bdff78da8891637b5acd52f5 | 992 | md | Markdown | Configurations/Jason-DSC-Env/Instructions.md | montge/PS-AutoLab-Env | 4ac07a32174c072d637941a38065c27ba651441e | [
"MIT"
] | 1 | 2020-01-25T23:29:36.000Z | 2020-01-25T23:29:36.000Z | Configurations/Jason-DSC-Env/Instructions.md | montge/PS-AutoLab-Env | 4ac07a32174c072d637941a38065c27ba651441e | [
"MIT"
] | null | null | null | Configurations/Jason-DSC-Env/Instructions.md | montge/PS-AutoLab-Env | 4ac07a32174c072d637941a38065c27ba651441e | [
"MIT"
] | null | null | null | # Lab Definition
This lab builds the following:
* 1 DC with users, groups and OU's - GUI
* 1 DHCP server on the DC
* 2 Domain joined servers (s1 and s2)
* 1 Domain joined Windows 10 Client with RSAT tools
## To get started
To run the full lab setup, which includes Setup-Lab, Run-Lab, Enable-Internet, and Validate-Lab:
PS> Unattend-Lab
To run the commands individually to setup the lab environment:
Run the following for initial setup:
PS> Setup-Lab
To start the Lab, and apply configurations the first time:
PS> Run-Lab
To enable Internet access for the VM's, run:
PS> Enable-Internet
To validate when configurations have converged:
PS> Validate-Lab
## To Stop and snapshot the lab
To stop the lab VM's:
PS> Shutdown-lab
To checkpoint the VM's:
PS> Snapshot-Lab
To quickly rebuild the labs from the checkpoint, run:
PS> Refresh-Lab
## To remove a lab
To destroy the lab to build again:
PS> Wipe-Lab
| 22.545455 | 100 | 0.69254 | eng_Latn | 0.974985 |
aab9200ae867127cbeca40374b341ec7474f98b0 | 15,134 | md | Markdown | articles/mariadb/concepts-server-parameters.md | KreizIT/azure-docs.fr-fr | dfe0cb93ebc98e9ca8eb2f3030127b4970911a06 | [
"CC-BY-4.0",
"MIT"
] | 43 | 2017-08-28T07:44:17.000Z | 2022-02-20T20:53:01.000Z | articles/mariadb/concepts-server-parameters.md | KreizIT/azure-docs.fr-fr | dfe0cb93ebc98e9ca8eb2f3030127b4970911a06 | [
"CC-BY-4.0",
"MIT"
] | 676 | 2017-07-14T20:21:38.000Z | 2021-12-03T05:49:24.000Z | articles/mariadb/concepts-server-parameters.md | KreizIT/azure-docs.fr-fr | dfe0cb93ebc98e9ca8eb2f3030127b4970911a06 | [
"CC-BY-4.0",
"MIT"
] | 153 | 2017-07-11T00:08:42.000Z | 2022-01-05T05:39:03.000Z | ---
title: 'Paramètres d’un serveur : Azure Database pour MariaDB'
description: Cette rubrique fournit des lignes directrices pour la configuration des paramètres de serveur dans Azure Database pour MariaDB.
author: savjani
ms.author: pariks
ms.service: mariadb
ms.topic: conceptual
ms.date: 6/25/2020
ms.openlocfilehash: 7797ee9d20b33a25c1b51289036651c7ad9f22a1
ms.sourcegitcommit: f28ebb95ae9aaaff3f87d8388a09b41e0b3445b5
ms.translationtype: HT
ms.contentlocale: fr-FR
ms.lasthandoff: 03/29/2021
ms.locfileid: "98664144"
---
# <a name="server-parameters-in-azure-database-for-mariadb"></a>Paramètres de serveur dans Azure Database pour MariaDB
Cet article fournit des considérations et des lignes directrices pour la configuration des paramètres de serveur dans Azure Database pour MariaDB.
## <a name="what-are-server-parameters"></a>Que sont les paramètres du serveur ?
Le moteur MariaDB fournit de nombreux paramètres et variables de serveur différents qui peuvent être utilisés pour configurer et régler le comportement du moteur. Certains paramètres peuvent être définis dynamiquement pendant le runtime, tandis que d’autres sont « statiques », ce qui nécessite un redémarrage du serveur pour les appliquer.
Azure Database pour MariaDB expose la possibilité de modifier la valeur des différents paramètres du serveur MariaDB à l’aide du [Portail Azure](./howto-server-parameters.md), d’[Azure CLI](./howto-configure-server-parameters-cli.md) et de [PowerShell](./howto-configure-server-parameters-using-powershell.md) pour répondre aux besoins de votre charge de travail.
## <a name="configurable-server-parameters"></a>Paramètres de serveur configurables
La liste des paramètres de serveur pris en charge s’allonge en permanence. Utilisez l’onglet Paramètres du serveur du Portail Azure pour afficher la liste complète et configurer les valeurs des paramètres du serveur.
Reportez-vous aux sections suivantes pour en savoir plus sur les limites des différents paramètres de serveur couramment mis à jour. Les limites sont déterminées par le niveau tarifaire et vCores du serveur.
### <a name="log_bin_trust_function_creators"></a>log_bin_trust_function_creators
Dans Azure Database for MariaDB, les journaux binaires sont toujours activés (c.-à-d. que `log_bin` est défini sur ON). Si vous souhaitez utiliser des déclencheurs, vous obtenez une erreur similaire à *Vous n’avez pas le SUPER privilège et la journalisation binaire est activée (vous pouvez utiliser la variable `log_bin_trust_function_creators` moins sécurisée)* .
Le format de journalisation binaire est toujours **ROW** et toutes les connexions au serveur utilisent **TOUJOURS** la journalisation binaire basée sur les lignes. Avec la journalisation binaire basée sur les lignes, les problèmes de sécurité n’existent pas et la journalisation binaire ne peut pas s’arrêter, ce qui vous permet de définir [`log_bin_trust_function_creators`](https://mariadb.com/docs/reference/mdb/system-variables/log_bin_trust_function_creators/) sur **TRUE** de manière sécurisée.
### <a name="innodb_buffer_pool_size"></a>innodb_buffer_pool_size
Consultez la [documentation MariaDB](https://mariadb.com/kb/en/innodb-system-variables/#innodb_buffer_pool_size) pour en savoir plus sur ce paramètre.
#### <a name="servers-supporting-up-to-4-tb-storage"></a>Serveurs prenant en charge jusqu’à 4 To de stockage
|**Niveau tarifaire**|**vCore(s)**|**Valeur par défaut (octets)**|**Valeur minimale (octets)**|**Valeur maximale (octets)**|
|---|---|---|---|---|
|De base|1|872415232|134217728|872415232|
|De base|2|2684354560|134217728|2684354560|
|Usage général|2|3758096384|134217728|3758096384|
|Usage général|4|8053063680|134217728|8053063680|
|Usage général|8|16106127360|134217728|16106127360|
|Usage général|16|32749125632|134217728|32749125632|
|Usage général|32|66035122176|134217728|66035122176|
|Usage général|64|132070244352|134217728|132070244352|
|Mémoire optimisée|2|7516192768|134217728|7516192768|
|Mémoire optimisée|4|16106127360|134217728|16106127360|
|Mémoire optimisée|8|32212254720|134217728|32212254720|
|Mémoire optimisée|16|65498251264|134217728|65498251264|
|Mémoire optimisée|32|132070244352|134217728|132070244352|
#### <a name="servers-support-up-to-16-tb-storage"></a>Serveurs prenant en charge jusqu’à 16 To de stockage
|**Niveau tarifaire**|**vCore(s)**|**Valeur par défaut (octets)**|**Valeur minimale (octets)**|**Valeur maximale (octets)**|
|---|---|---|---|---|
|De base|1|872415232|134217728|872415232|
|De base|2|2684354560|134217728|2684354560|
|Usage général|2|7516192768|134217728|7516192768|
|Usage général|4|16106127360|134217728|16106127360|
|Usage général|8|32212254720|134217728|32212254720|
|Usage général|16|65498251264|134217728|65498251264|
|Usage général|32|132070244352|134217728|132070244352|
|Usage général|64|264140488704|134217728|264140488704|
|Mémoire optimisée|2|15032385536|134217728|15032385536|
|Mémoire optimisée|4|32212254720|134217728|32212254720|
|Mémoire optimisée|8|64424509440|134217728|64424509440|
|Mémoire optimisée|16|130996502528|134217728|130996502528|
|Mémoire optimisée|32|264140488704|134217728|264140488704|
### <a name="innodb_file_per_table"></a>innodb_file_per_table
> [!NOTE]
> `innodb_file_per_table` peut seulement être mise à jour aux niveaux tarifaires Usage général et Mémoire optimisée.
MariaDB stocke la table InnoDB dans différents espaces disque logique en fonction de la configuration que vous avez fournie pendant la création de la table. L’[espace disque logique du système](https://mariadb.com/kb/en/innodb-system-tablespaces/) est la zone de stockage pour le dictionnaire de données InnoDB. Un [espace disque logique de fichier par table](https://mariadb.com/kb/en/innodb-file-per-table-tablespaces/) contient des données et des index pour une table InnoDB unique, et est stocké dans son propre fichier de données au sein du système de fichiers. Ce comportement est contrôlé par le paramètre de serveur `innodb_file_per_table`. La définition de `innodb_file_per_table` sur `OFF` amène InnoDB à créer des tables dans l’espace disque logique du système. Autrement, InnoDB crée des tables dans des espaces disques logiques de fichier par table.
Azure Database for MariaDB prend en charge jusqu’à **1 To** dans un même fichier de données. Si la taille de votre base de données est supérieure à 1 To, vous devez créer la table dans l’espace disque logique [innodb_file_per_table](https://mariadb.com/kb/en/innodb-system-variables/#innodb_file_per_table). Si vous avez une table d’une taille supérieure à 1 To, vous devez utiliser la table de partition.
### <a name="join_buffer_size"></a>join_buffer_size
Consultez la [documentation MariaDB](https://mariadb.com/kb/en/server-system-variables/#join_buffer_size) pour en savoir plus sur ce paramètre.
|**Niveau tarifaire**|**vCore(s)**|**Valeur par défaut (octets)**|**Valeur minimale (octets)**|**Valeur maximale (octets)**|
|---|---|---|---|---|
|De base|1|Non configurable dans le niveau de base|N/A|N/A|
|De base|2|Non configurable dans le niveau de base|N/A|N/A|
|Usage général|2|262 144|128|268435455|
|Usage général|4|262 144|128|536870912|
|Usage général|8|262 144|128|1073741824|
|Usage général|16|262 144|128|2147483648|
|Usage général|32|262 144|128|4294967295|
|Usage général|64|262 144|128|4294967295|
|Mémoire optimisée|2|262 144|128|536870912|
|Mémoire optimisée|4|262 144|128|1073741824|
|Mémoire optimisée|8|262 144|128|2147483648|
|Mémoire optimisée|16|262 144|128|4294967295|
|Mémoire optimisée|32|262 144|128|4294967295|
### <a name="max_connections"></a>max_connections
|**Niveau tarifaire**|**vCore(s)**|**Valeur par défaut**|**Valeur minimale**|**Valeur maximale**|
|---|---|---|---|---|
|De base|1|50|10|50|
|De base|2|100|10|100|
|Usage général|2|300|10|600|
|Usage général|4|625|10|1250|
|Usage général|8|1250|10|2 500|
|Usage général|16|2 500|10|5 000|
|Usage général|32|5 000|10|10000|
|Usage général|64|10000|10|20000|
|Mémoire optimisée|2|625|10|1250|
|Mémoire optimisée|4|1250|10|2 500|
|Mémoire optimisée|8|2 500|10|5 000|
|Mémoire optimisée|16|5 000|10|10000|
|Mémoire optimisée|32|10000|10|20000|
Lorsque la limite du nombre de connexions est dépassée, vous pouvez recevoir l’erreur suivante :
> ERREUR 1040 (08004) : Trop de connexions
> [!IMPORTANT]
> Pour une expérience optimale, nous vous recommandons d’utiliser un regroupement de connexions comme ProxySQL pour gérer efficacement les connexions.
La création de connexions clientes à MariaDB prend du temps et, une fois établies, ces connexions occupent des ressources de base de données, même lorsqu’elles sont inactives. La plupart des applications requièrent de nombreuses connexions à courte durée, ce qui aggrave la situation. Par conséquent, il y a moins de ressources disponibles pour votre charge de travail réelle; ce qui entraîne une diminution des performances. Un regroupement de connexions qui réduit les connexions inactives et réutilise les connexions existantes permet d’éviter cela. Pour en savoir plus sur la configuration de ProxySQL, consultez notre [billet de blog](https://techcommunity.microsoft.com/t5/azure-database-for-mysql/load-balance-read-replicas-using-proxysql-in-azure-database-for/ba-p/880042).
>[!Note]
>ProxySQL est un outil communautaire en open source. Il est pris en charge par Microsoft dans la mesure du possible. Afin d’obtenir un support de production avec une aide faisant autorité, vous pouvez évaluer et contacter le [Support produit de ProxySQL](https://proxysql.com/services/support/).
### <a name="max_heap_table_size"></a>max_heap_table_size
Consultez la [documentation MariaDB](https://mariadb.com/kb/en/server-system-variables/#max_heap_table_size) pour en savoir plus sur ce paramètre.
|**Niveau tarifaire**|**vCore(s)**|**Valeur par défaut (octets)**|**Valeur minimale (octets)**|**Valeur maximale (octets)**|
|---|---|---|---|---|
|De base|1|Non configurable dans le niveau de base|N/A|N/A|
|De base|2|Non configurable dans le niveau de base|N/A|N/A|
|Usage général|2|16 777 216|16384|268435455|
|Usage général|4|16 777 216|16384|536870912|
|Usage général|8|16 777 216|16384|1073741824|
|Usage général|16|16 777 216|16384|2147483648|
|Usage général|32|16 777 216|16384|4294967295|
|Usage général|64|16 777 216|16384|4294967295|
|Mémoire optimisée|2|16 777 216|16384|536870912|
|Mémoire optimisée|4|16 777 216|16384|1073741824|
|Mémoire optimisée|8|16 777 216|16384|2147483648|
|Mémoire optimisée|16|16 777 216|16384|4294967295|
|Mémoire optimisée|32|16 777 216|16384|4294967295|
### <a name="query_cache_size"></a>query_cache_size
Le cache des reqêtes est activé par défaut dans MariaDB avec le paramètre `have_query_cache`.
Consultez la [documentation MariaDB](https://mariadb.com/kb/en/server-system-variables/#query_cache_size) pour en savoir plus sur ce paramètre.
|**Niveau tarifaire**|**vCore(s)**|**Valeur par défaut (octets)**|**Valeur minimale (octets)**|**Valeur maximale (octets)**|
|---|---|---|---|---|
|De base|1|Non configurable dans le niveau de base|N/A|N/A|
|De base|2|Non configurable dans le niveau de base|N/A|N/A|
|Usage général|2|0|0|16 777 216|
|Usage général|4|0|0|33554432|
|Usage général|8|0|0|67108864|
|Usage général|16|0|0|134217728|
|Usage général|32|0|0|134217728|
|Usage général|64|0|0|134217728|
|Mémoire optimisée|2|0|0|33554432|
|Mémoire optimisée|4|0|0|67108864|
|Mémoire optimisée|8|0|0|134217728|
|Mémoire optimisée|16|0|0|134217728|
|Mémoire optimisée|32|0|0|134217728|
### <a name="sort_buffer_size"></a>sort_buffer_size
Consultez la [documentation MariaDB](https://mariadb.com/kb/en/server-system-variables/#sort_buffer_size) pour en savoir plus sur ce paramètre.
|**Niveau tarifaire**|**vCore(s)**|**Valeur par défaut (octets)**|**Valeur minimale (octets)**|**Valeur maximale (octets)**|
|---|---|---|---|---|
|De base|1|Non configurable dans le niveau de base|N/A|N/A|
|De base|2|Non configurable dans le niveau de base|N/A|N/A|
|Usage général|2|524 288|32 768|4 194 304|
|Usage général|4|524 288|32 768|8388608|
|Usage général|8|524 288|32 768|16 777 216|
|Usage général|16|524 288|32 768|33554432|
|Usage général|32|524 288|32 768|33554432|
|Usage général|64|524 288|32 768|33554432|
|Mémoire optimisée|2|524 288|32 768|8388608|
|Mémoire optimisée|4|524 288|32 768|16 777 216|
|Mémoire optimisée|8|524 288|32 768|33554432|
|Mémoire optimisée|16|524 288|32 768|33554432|
|Mémoire optimisée|32|524 288|32 768|33554432|
### <a name="tmp_table_size"></a>tmp_table_size
Consultez la [documentation MariaDB](https://mariadb.com/kb/en/server-system-variables/#tmp_table_size) pour en savoir plus sur ce paramètre.
|**Niveau tarifaire**|**vCore(s)**|**Valeur par défaut (octets)**|**Valeur minimale (octets)**|**Valeur maximale (octets)**|
|---|---|---|---|---|
|De base|1|Non configurable dans le niveau de base|N/A|N/A|
|De base|2|Non configurable dans le niveau de base|N/A|N/A|
|Usage général|2|16 777 216|1 024|67108864|
|Usage général|4|16 777 216|1 024|134217728|
|Usage général|8|16 777 216|1 024|268435456|
|Usage général|16|16 777 216|1 024|536870912|
|Usage général|32|16 777 216|1 024|1073741824|
|Usage général|64|16 777 216|1 024|1073741824|
|Mémoire optimisée|2|16 777 216|1 024|134217728|
|Mémoire optimisée|4|16 777 216|1 024|268435456|
|Mémoire optimisée|8|16 777 216|1 024|536870912|
|Mémoire optimisée|16|16 777 216|1 024|1073741824|
|Mémoire optimisée|32|16 777 216|1 024|1073741824|
### <a name="time_zone"></a>time_zone
Lors du déploiement initial, un serveur Azure pour MariaDB contient des tables système pour les informations de fuseau horaire, mais ces tables ne sont pas remplies. Les tables de fuseaux horaires peuvent être remplies en appelant la procédure stockée `mysql.az_load_timezone` à partir d’un outil tel que la ligne de commande MySQL ou MySQL Workbench. Pour savoir comment appeler la procédure stockée et définir les fuseaux horaires au niveau global ou au niveau de la session, consultez les articles relatifs au [Portail Azure](howto-server-parameters.md#working-with-the-time-zone-parameter) ou à [Azure CLI](howto-configure-server-parameters-cli.md#working-with-the-time-zone-parameter).
## <a name="non-configurable-server-parameters"></a>Paramètres de serveur non configurables
Les paramètres de serveur ci-dessous ne sont pas configurables dans le service :
|**Paramètre**|**Valeur fixe**|
| :------------------------ | :-------- |
|innodb_file_per_table dans le niveau de base|OFF|
|innodb_flush_log_at_trx_commit|1|
|sync_binlog|1|
|innodb_log_file_size|256 Mo|
|innodb_log_files_in_group|2|
Tous les autres paramètres de serveur sont définis sur leurs valeurs MariaDB fournies par défaut pour [MariaDB](https://mariadb.com/kb/en/server-system-variables/).
## <a name="next-steps"></a>Étapes suivantes
- Guide pratique pour [configurer des paramètres serveur avec le Portail Azure](./howto-server-parameters.md)
- Guide pratique pour [configurer des paramètres serveur avec Azure CLI](./howto-configure-server-parameters-cli.md)
- Guide pratique pour [configurer des paramètres serveur avec PowerShell](./howto-configure-server-parameters-using-powershell.md)
| 62.79668 | 862 | 0.776001 | fra_Latn | 0.749282 |
aab92abd59115ac1d01d60c0d6c0494eef21cf97 | 2,588 | md | Markdown | site/learn/expert-advice/authentication/spa/oauth-authorization-code-grant-jwts-refresh-tokens-cookies.md | jamestelfer/fusionauth-site | 2b75a23269d59f3dad8e8709be60ead30c2d76b4 | [
"Apache-2.0"
] | 22 | 2018-11-14T06:17:49.000Z | 2022-03-14T09:44:18.000Z | site/learn/expert-advice/authentication/spa/oauth-authorization-code-grant-jwts-refresh-tokens-cookies.md | jamestelfer/fusionauth-site | 2b75a23269d59f3dad8e8709be60ead30c2d76b4 | [
"Apache-2.0"
] | 506 | 2018-11-22T03:31:24.000Z | 2022-03-28T14:39:10.000Z | site/learn/expert-advice/authentication/spa/oauth-authorization-code-grant-jwts-refresh-tokens-cookies.md | jamestelfer/fusionauth-site | 2b75a23269d59f3dad8e8709be60ead30c2d76b4 | [
"Apache-2.0"
] | 25 | 2019-05-01T13:18:10.000Z | 2022-02-19T23:44:03.000Z | ---
layout: advice
title: Single-page application OAuth login using authorization code grant with JWTs and refresh tokens
description: An explanation of single-page application login using FusionAuth OAuth interface with the authorization code grant with JWTs and refresh tokens in cookies
image: advice/types-of-logins-article.png
category: Authentication
author: Brian Pontarelli
date: 2019-11-04
dateModified: 2019-11-04
---
{% capture intro %}
{% include_relative _oauth-intro.md %}
{% endcapture %}
{{ intro | markdownify }}
## Diagram
**Legend**
```text
() --> indicate request/response bodies
{} --> indicate request parameters
[] --> indicate cookies
```
{% plantuml source: _diagrams/learn/expert-advice/authentication/spa/oauth-authorization-code-grant-jwts-refresh-tokens-cookies.plantuml, alt: "Single page application OAuth 2 Authorization Code Grant with JWTs and refresh tokens in cookies diagram" %}
## Explanation
{% capture steps %}
{% include_relative _oauth-login-store.md %}
{% include_relative _shopping-cart-refresh-jwt-response-oauth.md %}
{% include_relative _shopping-cart-refresh-jwt-load.md %}
{% include_relative _shopping-cart-refresh-jwt-refresh.md %}
{% include_relative _shopping-cart-refresh-jwt-relogin.md %}
{% include_relative _oauth-login-forums.md %}
{% include_relative _forums-refresh-jwt-response-oauth.md %}
{% include_relative _forums-refresh-jwt-load.md %}
{% include_relative _stolen-refresh-token-refresh-jwt.md %}
{% include_relative _stolen-jwt-refresh-jwt.md %}
{% endcapture %}
{{ steps | markdownify }}
## Security considerations
This is one of the safest and most feature rich login workflow in FusionAuth. It has the benefit that passwords are only provided directly to FusionAuth. It also has the benefit of full SSO capabilities when the user is automatically logged into the forum application by FusionAuth. Finally, the JWT and refresh tokens are HttpOnly cookies that are domain locked to the application backend that needs them.
One downside to this workflow is that it causes the user to leave the single-page application and navigate to the FusionAuth OAuth interface. The effects of this are minimized as long as the browser caches the single-page application.
## APIs used
Here are the FusionAuth APIs used in this example:
* [/oauth2/authorize](/docs/v1/tech/oauth/endpoints#authorize)
* [/api/jwt/refresh](/docs/v1/tech/apis/jwt#refresh-a-jwt)
* [/oauth2/token](/docs/v1/tech/oauth/endpoints#refresh-token-grant-request)
[_View All Types_](/learn/expert-advice/authentication/login-authentication-workflows)
| 43.133333 | 406 | 0.779366 | eng_Latn | 0.981402 |
aab9394580be803cdd72052ca8a87e9bd24faf16 | 772 | md | Markdown | Language/Python3/基础语法/basic.md | huguanghui/project-note | 19ef985de26c5a19b3702edbe9fb1278d89ea73d | [
"MIT"
] | null | null | null | Language/Python3/基础语法/basic.md | huguanghui/project-note | 19ef985de26c5a19b3702edbe9fb1278d89ea73d | [
"MIT"
] | null | null | null | Language/Python3/基础语法/basic.md | huguanghui/project-note | 19ef985de26c5a19b3702edbe9fb1278d89ea73d | [
"MIT"
] | null | null | null | [TOC]
# 基础语法
[python的官方文档](https://docs.python.org/zh-cn/3/reference/index.html)
[开源标准仓库](https://pypi.org/)
## 内嵌语法
### 变量类型
| 类型 | 描述 |
| :----: | :------------------: |
| 数字 | 整数,浮点型,布尔类型 |
| 字符串 | 字符,字符串 |
| 列表 | 数组 |
| 元组 | |
### 表达式
```python
```
### 语句
#### 简单语句
```python
```
#### 复合语句
```python
```
### 函数
```python
```
### 包
```python
```
#### 错误处理
```python
```
## 标准库
### os - 操作系统接口模块
```python
import os
```
### os.path - 常见路径操作
```python
import os.path as p
```
### sys - 系统相关的参数和函数
```python
import sys
```
## 扩展库
```shell
# 安装pip
$ python -m ensurepip --default-pip
# 更新pip
$ pip install --upgrade pip
# 默认安装路径 /usr/lib/python3.7/site-packages
```
| 8.577778 | 67 | 0.458549 | yue_Hant | 0.731954 |
aab97abd7cab104c003ddff670cae4effd5d3383 | 3,225 | md | Markdown | sdk/appconfiguration/Azure.ResourceManager.AppConfiguration/src/autorest.md | gjy5885/azure-sdk-for-net | 5491b723c94176509a91c340485f10009189ac72 | [
"MIT"
] | 1 | 2021-12-01T16:39:54.000Z | 2021-12-01T16:39:54.000Z | sdk/appconfiguration/Azure.ResourceManager.AppConfiguration/src/autorest.md | gjy5885/azure-sdk-for-net | 5491b723c94176509a91c340485f10009189ac72 | [
"MIT"
] | null | null | null | sdk/appconfiguration/Azure.ResourceManager.AppConfiguration/src/autorest.md | gjy5885/azure-sdk-for-net | 5491b723c94176509a91c340485f10009189ac72 | [
"MIT"
] | null | null | null | # Generated code configuration
Run `dotnet build /t:GenerateCode` to generate code.
``` yaml
azure-arm: true
library-name: AppConfiguration
namespace: Azure.ResourceManager.AppConfiguration
require: https://raw.githubusercontent.com/Azure/azure-rest-api-specs/d302c82f32daec0feb68cd7d68d45ba898b67ee7/specification/appconfiguration/resource-manager/readme.md
clear-output-folder: true
skip-csproj: true
no-property-type-replacement: RegenerateKeyOptions
modelerfour:
flatten-payloads: false
rename-rules:
CPU: Cpu
CPUs: Cpus
Os: OS
Ip: IP
Ips: IPs
ID: Id
IDs: Ids
VM: Vm
VMs: Vms
VMScaleSet: VmScaleSet
DNS: Dns
VPN: Vpn
NAT: Nat
WAN: Wan
Ipv4: IPv4
Ipv6: IPv6
Ipsec: IPsec
SSO: Sso
URI: Uri
directive:
- rename-model:
from: ConfigurationStoreUpdateParameters
to: ConfigurationStoreUpdateOptions
- rename-model:
from: ListKeyValueParameters
to: ListKeyValueOptions
- rename-model:
from: RegenerateKeyParameters
to: RegenerateKeyOptions
- from: swagger-document
where: $.definitions.EncryptionProperties
transform: >
$.properties.keyVaultProperties["x-nullable"] = true;
- from: swagger-document
where: $.definitions.ConfigurationStoreProperties
transform: >
$.properties.privateEndpointConnections["x-nullable"] = true;
- from: swagger-document
where: $.paths['/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.AppConfiguration/configurationStores/{configStoreName}'].patch.parameters
transform: >
$[4] = {
"name": "ConfigurationStoreUpdateOptions",
"in": "body",
"description": "The options for updating a configuration store.",
"required": true,
"schema": {
"$ref": "#/definitions/ConfigurationStoreUpdateOptions"
}
}
- from: swagger-document
where: $.paths['/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.AppConfiguration/configurationStores/{configStoreName}/listKeyValue'].post.parameters
transform: >
$[4] = {
"name": "listKeyValueOptions",
"in": "body",
"description": "The options for retrieving a key-value.",
"required": true,
"schema": {
"$ref": "#/definitions/ListKeyValueOptions"
}
}
- from: swagger-document
where: $.paths['/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.AppConfiguration/configurationStores/{configStoreName}/RegenerateKey'].post.parameters
transform: >
$[4] = {
"name": "regenerateKeyOptions",
"in": "body",
"description": "The options for regenerating an access key.",
"required": true,
"schema": {
"$ref": "#/definitions/RegenerateKeyOptions"
}
}
- from: swagger-document
where: $.definitions.ResourceIdentity.properties.type["x-ms-enum"]["name"]
transform: return "ResourceIdentityType"
- rename-operation:
from: Operations_CheckNameAvailability
to: CheckAppConfigurationNameAvailability
````
| 32.908163 | 193 | 0.670388 | yue_Hant | 0.570791 |
aab9d0bc31523d86851c5362873c72770ffc6b42 | 20,646 | md | Markdown | docs/csharp/programming-guide/interop/walkthrough-office-programming.md | lbragaglia/docs.it-it | 2dc596db6f16ffa0e123c2ad225ce4348546fdb2 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | docs/csharp/programming-guide/interop/walkthrough-office-programming.md | lbragaglia/docs.it-it | 2dc596db6f16ffa0e123c2ad225ce4348546fdb2 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | docs/csharp/programming-guide/interop/walkthrough-office-programming.md | lbragaglia/docs.it-it | 2dc596db6f16ffa0e123c2ad225ce4348546fdb2 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | ---
title: 'Procedura dettagliata: programmazione di Office (C# e Visual Basic)'
ms.date: 07/20/2015
dev_langs:
- csharp
- vb
helpviewer_keywords:
- Office, programming in Visual Basic and C#
- Office programming [C#]
- Office programming [Visual Basic]
ms.assetid: 519cff31-f80b-4f0e-a56b-26358d0f8c51
ms.openlocfilehash: 11e48c54ba82b51268b34d6db01d2f9d4ae61ad7
ms.sourcegitcommit: 4f4a32a5c16a75724920fa9627c59985c41e173c
ms.translationtype: MT
ms.contentlocale: it-IT
ms.lasthandoff: 10/17/2019
ms.locfileid: "72523568"
---
# <a name="walkthrough-office-programming-c-and-visual-basic"></a>Procedura dettagliata: programmazione di Office (C# e Visual Basic)
Visual Studio offre funzionalità di C# e Visual Basic che migliorano la programmazione di Microsoft Office. Tra le utili funzionalità di C# sono disponibili gli argomenti denominati e facoltativi e i valori restituiti di tipo `dynamic`. Nella programmazione COM è possibile omettere la parola chiave `ref` e accedere alle proprietà indicizzate. Le funzionalità di Visual Basic includono le proprietà implementate automaticamente, le istruzioni nelle espressioni lambda e gli inizializzatori di insieme.
Entrambi i linguaggi consentono di incorporare informazioni sul tipo, in modo da distribuire gli assembly che interagiscono con i componenti COM senza distribuire assembly di interoperabilità primari (PIA) al computer dell'utente. Per altre informazioni, vedere [Procedura dettagliata: Incorporamento dei tipi da assembly gestiti](../../../standard/assembly/embed-types-visual-studio.md).
In questa procedura dettagliata queste funzionalità vengono illustrate nel contesto della programmazione di Office, ma molte di esse sono utili anche nella programmazione generale. Nella procedura dettagliata si usa un componente aggiuntivo di Excel per creare una cartella di lavoro di Excel. A questo punto si crea un documento di Word contenente un collegamento alla cartella di lavoro. Infine, si visualizzerà come la dipendenza dell'assembly di interoperabilità primario può essere abilitata e disabilitata.
## <a name="prerequisites"></a>Prerequisites
Per completare questa procedura dettagliata è necessario aver installato Microsoft Office Excel o Microsoft Office Word nel computer.
[!INCLUDE[note_settings_general](~/includes/note-settings-general-md.md)]
### <a name="to-set-up-an-excel-add-in-application"></a>Per impostare un componente aggiuntivo di Excel
1. Avviare Visual Studio.
2. Scegliere **Nuovo** dal menu **File**, quindi fare clic su **Progetto**.
3. Nel riquadro **Modelli installati** espandere **Visual Basic** o **Visual C#** , espandere **Office** e scegliere l'anno della versione del prodotto Office.
4. Nel riquadro **Modelli** fare clic su **Excel \<versione > Componente aggiuntivo**.
5. Verificare che nella parte superiore del riquadro **Modelli** sia visualizzato **.NET Framework 4**, o una versione successiva, nella casella **Framework di destinazione**.
6. Se opportuno, digitare un nome per il progetto nella casella **Nome**.
7. Fare clic su **OK**.
8. Il nuovo progetto verrà visualizzato in **Esplora soluzioni**.
### <a name="to-add-references"></a>Per aggiungere riferimenti
1. In **Esplora soluzioni** fare clic con il pulsante destro del mouse sul nome del progetto e quindi scegliere **Aggiungi riferimento**. Viene visualizzata la finestra di dialogo **Aggiungi riferimento**.
2. Nella scheda **Assembly** selezionare **Microsoft.Office.Interop.Excel**, versione `<version>.0.0.0` (per conoscere il numero versione del prodotto Office, vedere [Versioni Microsoft](https://en.wikipedia.org/wiki/Microsoft_Office#Versions)) nell'elenco **Nome componente**. Tenere premuto CTRL e selezionare **Microsoft.Office.Interop.Word**, `version <version>.0.0.0`. Se gli assembly non sono visibili, può essere necessario verificare che siano installati e visualizzati (vedere [Procedura: Installare assembly di interoperabilità primari di Office](/visualstudio/vsto/how-to-install-office-primary-interop-assemblies)).
3. Fare clic su **OK**.
### <a name="to-add-necessary-imports-statements-or-using-directives"></a>Per aggiungere istruzioni Imports o le direttive using necessarie
1. In **Esplora soluzioni** fare clic con il pulsante destro del mouse sul file **ThisAddIn.vb** o **ThisAddIn.cs** e quindi scegliere **Visualizza codice**.
2. Aggiungere le seguenti istruzioni `Imports` (Visual Basic) o direttive `using` (C#) all'inizio del file di codice, se non sono già presenti.
[!code-csharp[csOfficeWalkthrough#1](~/samples/snippets/csharp/VS_Snippets_VBCSharp/csofficewalkthrough/cs/thisaddin.cs#1)]
[!code-vb[csOfficeWalkthrough#1](~/samples/snippets/visualbasic/VS_Snippets_VBCSharp/csofficewalkthrough/vb/thisaddin.vb#1)]
### <a name="to-create-a-list-of-bank-accounts"></a>Per creare un elenco di conti correnti bancari
1. In **Esplora soluzioni** fare clic con il pulsante destro del mouse sul nome del progetto, fare clic su **Aggiungi**e quindi su **Classe**. Denominare la classe Account.vb se si usa Visual Basic, Account.cs se si usa C#. Fare clic su **Aggiungi**.
2. Sostituire la definizione della classe `Account` con il codice seguente. Le definizioni delle classi usano le *proprietà implementate automaticamente*. Per altre informazioni, vedere [Proprietà implementate automaticamente](../../../visual-basic/programming-guide/language-features/procedures/auto-implemented-properties.md).
[!code-csharp[csOfficeWalkthrough#2](~/samples/snippets/csharp/VS_Snippets_VBCSharp/csofficewalkthrough/cs/account.cs#2)]
[!code-vb[csOfficeWalkthrough#2](~/samples/snippets/visualbasic/VS_Snippets_VBCSharp/csofficewalkthrough/vb/account.vb#2)]
3. Per creare un elenco `bankAccounts` contenente due conti, aggiungere il codice seguente al metodo `ThisAddIn_Startup` nei file *ThisAddIn.vb* o *ThisAddIn.cs*. Le dichiarazioni dell'elenco usano gli *inizializzatori di insieme*. Per altre informazioni, vedere [Inizializzatori di insieme](../../../visual-basic/programming-guide/language-features/collection-initializers/index.md).
[!code-csharp[csOfficeWalkthrough#3](~/samples/snippets/csharp/VS_Snippets_VBCSharp/csofficewalkthrough/cs/thisaddin.cs#3)]
[!code-vb[csOfficeWalkthrough#3](~/samples/snippets/visualbasic/VS_Snippets_VBCSharp/csofficewalkthrough/vb/thisaddin.vb#3)]
### <a name="to-export-data-to-excel"></a>Per esportare dati in Excel
1. Nello stesso file, aggiungere il metodo seguente alla classe `ThisAddIn`. Il metodo configura una cartella di lavoro di Excel e vi esporta i dati.
[!code-csharp[csOfficeWalkthrough#4](~/samples/snippets/csharp/VS_Snippets_VBCSharp/csofficewalkthrough/cs/thisaddin.cs#4)]
[!code-vb[csOfficeWalkthrough#4](~/samples/snippets/visualbasic/VS_Snippets_VBCSharp/csofficewalkthrough/vb/thisaddin.vb#4)]
In questo metodo vengono usati due nuove funzionalità di C#. Entrambe queste funzionalità sono già esistenti in Visual Basic.
- Il metodo [Add](<xref:Microsoft.Office.Interop.Excel.Workbooks.Add%2A>) usa un *parametro facoltativo* per specificare un modello particolare. I parametri facoltativi, una novità di C# 4, consentono di omettere l'argomento per il parametro se si vuole usare il valore predefinito del parametro. Poiché nessun argomento viene inviato nell'esempio precedente, `Add` usa il modello predefinito e crea una nuova cartella di lavoro. L'istruzione equivalente nelle precedenti versioni di C# richiede un argomento segnaposto: `excelApp.Workbooks.Add(Type.Missing)`.
Per altre informazioni, vedere [Argomenti denominati e facoltativi](../classes-and-structs/named-and-optional-arguments.md).
- Le proprietà `Range` e `Offset` dell'oggetto [Range](<xref:Microsoft.Office.Interop.Excel.Range>) usano la funzionalità delle *proprietà indicizzate*. Questa funzionalità consente di usare tali proprietà dai tipi COM con la tipica sintassi di C# seguente. Le proprietà indicizzate consentono anche di usare la proprietà `Value` dell'oggetto `Range`, eliminando la necessità di usare la proprietà `Value2`. La proprietà `Value` è indicizzata, ma l'indice è facoltativo. Nell'esempio seguente sono presenti sia argomenti facoltativi sia proprietà indicizzate.
[!code-csharp[csOfficeWalkthrough#5](~/samples/snippets/csharp/VS_Snippets_VBCSharp/csofficewalkthrough/cs/thisaddin.cs#5)]
Nelle versioni precedenti del linguaggio, è necessaria la seguente sintassi speciale.
[!code-csharp[csOfficeWalkthrough#6](~/samples/snippets/csharp/VS_Snippets_VBCSharp/csofficewalkthrough/cs/thisaddin.cs#6)]
Non è possibile creare proprietà indicizzate personalizzate. La funzionalità supporta solo l'utilizzo di proprietà indicizzate esistenti.
Per altre informazioni, vedere [Procedura: Usare proprietà indicizzate nella programmazione dell'interoperabilità COM](./how-to-use-indexed-properties-in-com-interop-rogramming.md).
2. Aggiungere il seguente codice alla fine di `DisplayInExcel` per regolare la larghezza delle colonne in modo da adattarle al contenuto.
[!code-csharp[csOfficeWalkthrough#7](~/samples/snippets/csharp/VS_Snippets_VBCSharp/csofficewalkthrough/cs/thisaddin.cs#7)]
[!code-vb[csOfficeWalkthrough#7](~/samples/snippets/visualbasic/VS_Snippets_VBCSharp/csofficewalkthrough/vb/thisaddin.vb#7)]
Queste aggiunte dimostrano un'altra nuova funzionalità di C#: considerare i valori `Object` restituiti dagli host COM, ad esempio Office, come se il tipo fosse [dynamic](../../language-reference/keywords/dynamic.md). Ciò avviene automaticamente quando l'opzione **Incorpora tipi di interoperabilità** è impostata sul valore predefinito, `True` o, in modo equivalente, quando si fa riferimento all'assembly tramite l'opzione del compilatore [-link](../../language-reference/compiler-options/link-compiler-option.md) . Il tipo `dynamic` consente l'associazione tardiva, già disponibile in Visual Basic, ed evita il cast esplicito richiesto in C# 3.0 e versioni precedenti del linguaggio.
Ad esempio, `excelApp.Columns[1]` restituisce `Object` e `AutoFit` è un metodo [Range](<xref:Microsoft.Office.Interop.Excel.Range>) di Excel. In assenza di `dynamic`, è necessario eseguire il cast dell'oggetto restituito da `excelApp.Columns[1]` come istanza di `Range` prima di chiamare il metodo `AutoFit`.
[!code-csharp[csOfficeWalkthrough#8](~/samples/snippets/csharp/VS_Snippets_VBCSharp/csofficewalkthrough/cs/thisaddin.cs#8)]
Per altre informazioni sull'incorporamento di tipi di interoperabilità, vedere le procedure "Per trovare il riferimento all'assembly di interoperabilità primari" e "Per ripristinare la dipendenza di assembly di interoperabilità primario" più avanti in questo argomento. Per altre informazioni su `dynamic`, vedere [dynamic](../../language-reference/keywords/dynamic.md) o [Uso del tipo dinamico](../types/using-type-dynamic.md).
### <a name="to-invoke-displayinexcel"></a>Per richiamare DisplayInExcel
1. Aggiungere il codice seguente alla fine del metodo `ThisAddIn_StartUp`. La chiamata a `DisplayInExcel` contiene due argomenti. Il primo argomento è il nome dell'elenco di conti da elaborare. Il secondo argomento è un'espressione lambda su più righe che definisce la modalità con cui i dati saranno elaborati. I valori `ID` e `balance` per ogni conto vengono visualizzati in celle adiacenti e la riga viene visualizzata in rosso se il saldo è inferiore a zero. Per altre informazioni, vedere [Espressioni lambda](../../../visual-basic/programming-guide/language-features/procedures/lambda-expressions.md).
[!code-csharp[csOfficeWalkthrough#9](~/samples/snippets/csharp/VS_Snippets_VBCSharp/csofficewalkthrough/cs/thisaddin.cs#9)]
[!code-vb[csOfficeWalkthrough#9](~/samples/snippets/visualbasic/VS_Snippets_VBCSharp/csofficewalkthrough/vb/thisaddin.vb#9)]
2. Premere F5 per eseguire il programma. Viene visualizzato un foglio di lavoro di Excel che contiene i dati dei conti.
### <a name="to-add-a-word-document"></a>Per aggiungere un documento di Word
1. Aggiungere il seguente codice alla fine del metodo `ThisAddIn_StartUp` per creare un documento di Word contenente un collegamento alla cartella di lavoro di Excel.
[!code-csharp[csOfficeWalkthrough#10](~/samples/snippets/csharp/VS_Snippets_VBCSharp/csofficewalkthrough/cs/thisaddin.cs#10)]
[!code-vb[csOfficeWalkthrough#10](~/samples/snippets/visualbasic/VS_Snippets_VBCSharp/csofficewalkthrough/vb/thisaddin.vb#10)]
In questo codice vengono illustrate diverse nuove funzionalità di C#: la possibilità di omettere la parola chiave `ref` nella programmazione COM, gli argomenti denominati e gli argomenti facoltativi. Queste funzionalità sono già esistenti in Visual Basic. Il metodo [PasteSpecial](<xref:Microsoft.Office.Interop.Word.Selection.PasteSpecial%2A>) ha sette parametri, ognuno dei quali è definito come parametro per riferimento facoltativo. Gli argomenti denominati e facoltativi consentono di indicare i parametri a cui si vuol accedere per nome e di inviare argomenti solo a tali parametri. In questo esempio gli argomenti vengono inviati per indicare che deve essere creato un collegamento alla cartella di lavoro negli Appunti (parametro `Link`), e che il collegamento deve essere visualizzato nel documento di Word come icona (parametro `DisplayAsIcon`). Visual C# consente anche di omettere la parola chiave `ref` per questi argomenti.
### <a name="to-run-the-application"></a>Per eseguire l'applicazione
1. Premere F5 per eseguire l'applicazione. Excel viene avviato e viene visualizzata una tabella che contiene le informazioni dei due conti in `bankAccounts`. Quindi verrà visualizzato un documento di Word contenente un collegamento alla tabella di Excel.
### <a name="to-clean-up-the-completed-project"></a>Per pulire il progetto completato
1. In Visual Studio fare clic su **Pulisci soluzione** nel menu **Compila**. In caso contrario, il componente aggiuntivo verrà eseguito ogni volta che si apre Excel nel computer.
### <a name="to-find-the-pia-reference"></a>Per trovare il riferimento all'assembly di interoperabilità primario
1. Eseguire nuovamente l'applicazione, ma non fare clic su **Pulisci soluzione**.
2. Selezionare **Start**. Individuare **Microsoft Visual Studio \<versione >** e aprire un prompt dei comandi per gli sviluppatori.
3. Digitare `ildasm` nella finestra del Prompt dei comandi per gli sviluppatori di Visual Studio e premere INVIO. Verrà visualizzata la finestra IL DASM.
4. Nel menu **File** della finestra IL DASM selezionare **File** > **Apri**. Fare doppio clic su **Visual Studio \<versione>** e su **Progetti**. Aprire la cartella per il progetto e cercare nella cartella bin/Debug il file *nome progetto*.dll. Fare doppio clic su *nome progetto*.dll. Una nuova finestra consente di visualizzare gli attributi del progetto, oltre ai riferimenti ad altri moduli e assembly. Notare che gli spazi dei nomi `Microsoft.Office.Interop.Excel` e `Microsoft.Office.Interop.Word` sono inclusi nell'assembly. Per impostazione predefinita in Visual Studio, il compilatore importa i tipi necessari da un assembly di interoperabilità primario a cui si fa riferimento nell'assembly.
Per altre informazioni, vedere [Procedura: Visualizzare il contenuto dell'assembly](../../../standard/assembly/view-contents.md).
5. Fare doppio clic sull'icona **MANIFESTO**. Viene visualizzata una finestra che include un elenco di assembly che contengono gli elementi a cui fa riferimento il progetto. `Microsoft.Office.Interop.Excel` e `Microsoft.Office.Interop.Word` non sono inclusi nell'elenco. Poiché i tipi che è necessario importare nell'assembly per il progetto, i riferimenti a un assembly di interoperabilità primario non sono necessari. Ciò rende più semplice la distribuzione. Gli assembly di interoperabilità primari non devono essere presenti nel computer dell'utente e, poiché un'applicazione non richiede la distribuzione di una versione specifica di un assembly di interoperabilità primario, è possibile progettare applicazioni compatibili con più versioni di Office, a condizione che le API necessarie siano presenti in tutte le versioni.
Poiché la distribuzione di assembly di interoperabilità primari non è più necessaria, è possibile creare un'applicazione in scenari avanzati che sia compatibile con più versioni di Office, incluse le versioni precedenti. Tuttavia, questo metodo funziona solo se il codice non usa alcuna API che non sia disponibile nella versione di Office che si sta usando. Non è sempre chiaro se una particolare API fosse disponibile in una versione precedente e per tale motivo l'utilizzo di versioni precedenti di Office non è consigliato.
> [!NOTE]
> Non sono stati pubblicati PIA prima di Office 2003. Di conseguenza, l'unico modo per generare un assembly di interoperabilità per Office 2002 o versioni precedenti consiste nell'importare il riferimento COM.
6. Chiudere la finestra del manifesto e l'assembly.
### <a name="to-restore-the-pia-dependency"></a>Per ripristinare la dipendenza di assembly di interoperabilità primario
1. In **Esplora soluzioni** fare clic sul pulsante **Mostra tutti i file**. Espandere la cartella **Riferimenti** e scegliere **Microsoft.Office.Interop.Excel**. Premere F4 per visualizzare la finestra **Proprietà**.
2. Nella finestra **Proprietà** impostare la proprietà **Incorpora tipi di interoperabilità** da **True** a **False**.
3. Ripetere i passaggi 1 e 2 di questa procedura per `Microsoft.Office.Interop.Word`.
4. In C#, commentare le due chiamate `Autofit` alla fine del metodo `DisplayInExcel`.
5. Premere F5 per verificare che il progetto sia ancora eseguito correttamente.
6. Ripetere i passaggi da 1 a 3 della procedura precedente per aprire la finestra dell'assembly. Notare che `Microsoft.Office.Interop.Word` e `Microsoft.Office.Interop.Excel` non sono più presenti nell'elenco di assembly incorporati.
7. Fare doppio clic sull'icona **MANIFESTO** e scorrere l'elenco degli assembly di riferimento. Sia `Microsoft.Office.Interop.Word` sia `Microsoft.Office.Interop.Excel` sono inclusi nell'elenco. Poiché l'applicazione fa riferimento agli assembly di interoperabilità primari di Excel e Word e la proprietà **Incorpora tipi di interoperabilità** è impostata su **False**, entrambi gli assembly devono esistere nel computer dell'utente finale.
8. In Visual Studio fare clic su **Pulisci soluzione** nel menu **Compila** per pulire il progetto completato.
## <a name="see-also"></a>Vedere anche
- [Proprietà implementate automaticamente (Visual Basic)](../../../visual-basic/programming-guide/language-features/procedures/auto-implemented-properties.md)
- [Proprietà implementate automaticamente (C#)](../classes-and-structs/auto-implemented-properties.md)
- [Inizializzatori di raccolta](../../../visual-basic/programming-guide/language-features/collection-initializers/index.md)
- [Inizializzatori di oggetto e di raccolta](../classes-and-structs/object-and-collection-initializers.md)
- [Parametri facoltativi](../../../visual-basic/programming-guide/language-features/procedures/optional-parameters.md)
- [Passaggio di argomenti in base alla posizione e al nome](../../../visual-basic/programming-guide/language-features/procedures/passing-arguments-by-position-and-by-name.md)
- [Argomenti denominati e facoltativi](../classes-and-structs/named-and-optional-arguments.md)
- [Associazione anticipata e tardiva](../../../visual-basic/programming-guide/language-features/early-late-binding/index.md)
- [dynamic](../../language-reference/keywords/dynamic.md)
- [Uso del tipo dinamico](../types/using-type-dynamic.md)
- [Espressioni lambda (Visual Basic)](../../../visual-basic/programming-guide/language-features/procedures/lambda-expressions.md)
- [Espressioni lambda (C#)](../statements-expressions-operators/lambda-expressions.md)
- [Procedura: Usare proprietà indicizzate nella programmazione dell'interoperabilità COM](./how-to-use-indexed-properties-in-com-interop-rogramming.md)
- [Procedura dettagliata: Incorporamento delle informazioni sui tipi da assembly di Microsoft Office in Visual Studio](https://docs.microsoft.com/previous-versions/visualstudio/visual-studio-2013/ee317478(v%3dvs.120))
- [Procedura dettagliata: Incorporamento dei tipi da assembly gestiti](../../../standard/assembly/embed-types-visual-studio.md)
- [Procedura dettagliata: creazione del primo componente aggiuntivo VSTO per Excel](/visualstudio/vsto/walkthrough-creating-your-first-vsto-add-in-for-excel)
- [Interoperabilità COM](../../../visual-basic/programming-guide/com-interop/index.md)
- [Interoperabilità](./index.md)
| 97.386792 | 942 | 0.789741 | ita_Latn | 0.996215 |
aaba102ac83dff4522d03b2ca18e95d65630ecfb | 257 | md | Markdown | lib/semver/README.md | nezdolik/reproto | 2d69d8efca518a6ea23a4182b29872fcc62a1a71 | [
"Apache-2.0",
"MIT"
] | 108 | 2017-07-19T02:07:52.000Z | 2022-02-27T04:46:43.000Z | lib/semver/README.md | nezdolik/reproto | 2d69d8efca518a6ea23a4182b29872fcc62a1a71 | [
"Apache-2.0",
"MIT"
] | 42 | 2017-11-21T14:21:40.000Z | 2022-02-26T02:40:38.000Z | lib/semver/README.md | nezdolik/reproto | 2d69d8efca518a6ea23a4182b29872fcc62a1a71 | [
"Apache-2.0",
"MIT"
] | 9 | 2017-05-26T00:36:23.000Z | 2020-07-26T10:58:20.000Z | # semver fork for reproto
This is a fork of https://github.com/steveklabnik/semver.
A number of things have been modified with this, including (but not limited to):
* Parsing in same crate.
* Structured error handling.
* No backwards compatibility mode.
| 25.7 | 80 | 0.766537 | eng_Latn | 0.987288 |
aaba91212951b8c0492795fe81064f25f794cc0e | 5,121 | md | Markdown | README.md | JuliaTagBot/GaussianFreeFields.jl | 72cdc9e8115925eeea3b47e68cf9cfdb302212b7 | [
"MIT"
] | 1 | 2020-01-08T22:20:54.000Z | 2020-01-08T22:20:54.000Z | README.md | JuliaTagBot/GaussianFreeFields.jl | 72cdc9e8115925eeea3b47e68cf9cfdb302212b7 | [
"MIT"
] | null | null | null | README.md | JuliaTagBot/GaussianFreeFields.jl | 72cdc9e8115925eeea3b47e68cf9cfdb302212b7 | [
"MIT"
] | 2 | 2020-01-08T22:26:08.000Z | 2020-02-08T10:58:59.000Z |
`GaussianFreeFields` is a package that generates a discrete Gaussian free
on a square with either periodic boundary conditions or specified Dirichlet
boundary conditions.
To install, run
`Pkg.clone("git://github.com/sswatson/GaussianFreeFields.jl.git")`
`DGFF(n)` generates a discrete Gaussian free field on an `n` by `n` torus.
```julia
h = DGFF(20)
```
```
20x20 Array{Float64,2}:
-0.876092 -0.294548 -1.35524 … 0.0387392 0.466126 -0.648591
0.215345 -0.886166 -1.47335 0.612032 -0.133992 0.0649898
-0.159199 0.596377 -0.569785 0.620096 -0.218865 1.54292
-0.301339 0.254145 -0.501166 0.185516 -0.265336 0.209947
-0.480379 -0.398221 -0.566758 -0.248938 0.772152 0.441475
-0.0974746 -0.086842 0.443506 … 0.395192 1.11058 0.61846
0.9968 0.423853 0.682701 1.47028 0.751546 0.939246
-0.413873 -0.044707 0.555525 1.43303 1.18651 0.748613
-1.22688 -0.282943 -0.418801 0.246069 0.650025 0.373996
-0.119498 -0.123819 -0.518486 -0.425611 0.0454104 0.326286
0.941938 0.495544 -0.395305 … 0.556364 0.984167 1.48036
0.499854 -0.229561 0.388527 0.258685 0.8598 1.47906
-0.764796 -0.885678 -0.439279 0.302158 0.654056 0.672523
0.0673879 -0.868744 -0.65548 -0.251016 0.0186039 -0.72188
-1.39916 -1.53116 -0.671419 -0.382203 -0.877608 -1.58912
-0.932672 -0.988617 -0.0599065 … -1.1248 -0.381567 -1.26558
-0.1239 -0.415419 -1.15146 -1.22362 -0.706317 -0.399698
0.0324895 0.469533 -0.324562 0.582178 0.145177 0.366976
-1.04055 0.0689947 -0.360072 0.361529 -0.101115 0.442297
-0.78754 -0.227399 -0.448399 -0.0482068 0.480722 -0.218205
```
The harmonic extension can be subtracted off using `fix_boundary_values`
```julia
h0 = fix_boundary_values(h,zeros(20,20))
```
```
20x20 Array{Float64,2}:
0.0 0.0 0.0 0.0 … 0.0 0.0 0.0
0.0 -0.582553 -0.689298 -0.795452 0.380308 -0.488851 0.0
0.0 0.947578 0.00399912 -0.718617 0.284179 -0.875459 0.0
0.0 0.622354 -0.0301214 0.338422 -0.112048 -0.658012 0.0
0.0 -0.0489716 -0.177794 1.02856 -0.553679 0.365555 0.0
0.0 0.0726041 0.724006 1.1459 … 0.0536066 0.623081 0.0
0.0 0.334414 0.883015 0.483024 1.09396 0.168205 0.0
0.0 0.234573 0.842797 -0.449565 1.06916 0.656206 0.0
0.0 0.222473 -0.0779471 -0.394762 -0.08763 0.224613 0.0
0.0 0.0508313 -0.280688 0.456136 -0.769926 -0.418233 0.0
0.0 0.331433 -0.259279 0.453971 … 0.164604 0.225609 0.0
0.0 -0.254745 0.583085 -0.350277 -0.0425239 0.161329 0.0
0.0 -0.517007 -0.0853753 0.242049 0.259535 0.399002 0.0
0.0 -0.487572 -0.200811 -0.2869 0.0403009 0.412004 0.0
0.0 -0.762431 -0.0690003 -0.770596 0.141392 -0.0621508 0.0
0.0 -0.296438 0.560409 -0.0665069 … -0.578232 0.374142 0.0
0.0 0.0315762 -0.576131 -1.15955 -0.812917 -0.311079 0.0
0.0 0.866107 0.266444 -0.161781 0.814685 0.160018 0.0
0.0 0.649782 0.298557 -0.264757 0.464097 -0.302518 0.0
0.0 0.0 0.0 0.0 0.0 0.0 0.0
```
We can use `PyPlot` to see a surface plot of the zero-boundary GFF `h0`.
```julia
using PyPlot
X = [x for x=1:n,y=1:n]
Y = [y for x=1:n,y=1:n]
plot_surface(X, Y, h0, rstride = 1, cstride = 1, cmap="autumn")
```

With `Contour`, we can look at the level lines of the Gaussian free field.
```julia
using Graphics2D
using Contour
using GaussianFreeFields
n = 250
h = DGFF(n)
h0 = fix_boundary_values(h)
showgraphics([Line(c; linewidth=1.0, color=0.3*"green")
for c in contour(collect(1.0:n),collect(1.0:n),h0,0.0).lines]; dim = 1024)```

We can also calculate the [GFF flow lines](http://arxiv.org/abs/1201.1496)
```julia
using Graphics2D
using GaussianFreeFields
using Grid
n = 250
h = InterpGrid(fix_boundary_values(DGFF(n)),BCnil,InterpLinear);
κ = 3
χ = 2/sqrt(κ) - sqrt(κ)/2
z0 = (n+1)/2 + im*(n+1)/2
δ = 0.01;
fan = GraphicElement[]
for θ=0.0:0.05:2π
push!(fan,Line(flowline(h, z0, χ, θ);
color=θ/(2π)*"green" + (1-θ/(2π))*"blue"))
end
showgraphics([Line([1 1; n 1; n n; 1 n; 1 1]);fan])
```

The Julia function `writecsv` can be used to export the data:
```julia
writecsv("h.csv",h0)
```
[](https://travis-ci.org/sswatson/GaussianFreeFields.jl)
| 40.968 | 143 | 0.598125 | yue_Hant | 0.22826 |
aabafc784fc050a4b1b551a12ef72fd3ab32b690 | 4,172 | md | Markdown | README.md | snej/secret-handshake-capnp | 26e810e9017baa4cd0a48df00e4a9a4ecd4242bb | [
"MIT"
] | 7 | 2021-12-15T04:23:23.000Z | 2022-01-12T20:32:06.000Z | README.md | snej/secret-handshake-cpp | 029c43cbdc7cf8acb362c9c0e7543a685434d06e | [
"MIT"
] | 2 | 2022-01-13T18:36:17.000Z | 2022-02-01T21:47:12.000Z | README.md | snej/secret-handshake-capnp | 26e810e9017baa4cd0a48df00e4a9a4ecd4242bb | [
"MIT"
] | null | null | null | # SecretHandshake Protocol Implementation In C++
This is a C++ implementation of the [SecretHandshake](https://github.com/auditdrivencrypto/secret-handshake) protocol. SecretHandshake upgrades your network connections with encryption and _mutual_ authentication, without all the overhead of using TLS.
There is also some glue code in the [capnproto](capnproto/README.md) subdirectory to use SecretHandshake with the awesome [Cap’n Proto](https://capnproto.org/) RPC library.
## About SecretHandshake
**SecretHandshake** is “a mutually authenticating key agreement handshake, with forward secure identity metadata.” It was designed by Dominic Tarr and is used in the [Secure Scuttlebutt](https://scuttlebutt.nz) P2P social network. There’s a [design paper](http://dominictarr.github.io/secret-handshake-paper/shs.pdf) that presents the algorithm in detail.
It’s based on 256-bit Ed25519 key-pairs. Each peer needs to maintain a long-term key pair, whose public key serves as its global identifier. The peer making the connection (the “client”) must know the public key of the other peer (“server”) to be able to connect.
The handshake happens when the socket opens. The peers alternate sending and receiving four cryptographic blobs of about 100 bytes each. The server learns the client’s public key during the handshake, and each peer proves to the other that it knows its matching private key.
The handshake also produces two 256-bit session keys and 192-bit nonces, known to both peers but otherwise secret, which are then used to encrypt the two TCP streams. (This is not strictly speaking part of the SecretHandshake protocol, which ends after key agreement.)
The API in `SecretStream.hh` provides stream encryption using those keys. It supports both Scuttlebutt's "box-stream" protocol based on XSalsa20, and a more compact custom protocol using XChaCha20.
## Implementation & Use
*None of the code here implements networking!* It expects you to open sockets and tell it the data you read, and it will tell you what to send.
- **SecretHandshake** tells you what “challenge” bytes to send, and then expects you to tell it what you got in response. Assuming the handshake succeeds, it gives you a `Session` object containing the keys.
- **shs** is a lower-level class used by `SecretHandshake`, focusing on the crypto.
- **SecretStream** provides classes that use the keys in the `Session` object to encrypt/decrypt either discrete messages or continuous byte streams.
The crypto primitives themselves come from [Monocypher](https://monocypher.org), a small C crypto library, as wrapped by my own [MonocypherCpp](https://github.com/snej/monocypher-cpp) C++ API.
## Building
*Make sure to check out submodules. Recursively. Otherwise you will get mucho build errors.*
A simple CMake build file is supplied. Or you can use your own build system: just compile the files in `src` and `vendor/monocypher-cpp/src`, and add `include` and `vendor/monocypher/include` to the preprocessor's header path.
There are some unit tests in `SecretHandshakeTests.cc`. They use the [Catch2](https://github.com/catchorg/Catch2) unit test framework. Some of the tests use an existing C implementation of SecretHandshake for validation; that code in turn requires libSodium, so to run the tests you'll need to [install libSodium](https://libsodium.gitbook.io/doc/installation) and make sure it’s in the system header search path. But that's not necessary if you only want to build the library.
## Status
As of February 2022, this is fairly new code, and hasn't been used in any released software. It does work correctly in an app I’m developing, and has basic unit tests, including a test that the network data it sends is identical with that of an established SecretHAndshake implementation.
It builds with Clang 12 and recent GCC, and is run & tested on macOS and Ubuntu by Github CI.
## License
The code in this repo is provided under the MIT license.
Monocypher uses the 2-clause BSD license.
(The code in the `shs-1` submodule is LGPL-licensed, but since it is only used in the tests (`shsTests.cc`) it has no effect on the licensing of the library itself.)
| 83.44 | 477 | 0.784516 | eng_Latn | 0.998535 |
aabb79e691996f4c6fad5f26fda79a12270ba9c3 | 1,060 | md | Markdown | 2016/CVE-2016-5740.md | marcostolosa/cve | bfe85c74b105c623c9807e09b2b572f144bf1f1c | [
"MIT"
] | 4 | 2022-03-01T12:31:42.000Z | 2022-03-29T02:35:57.000Z | 2016/CVE-2016-5740.md | marcostolosa/cve | bfe85c74b105c623c9807e09b2b572f144bf1f1c | [
"MIT"
] | null | null | null | 2016/CVE-2016-5740.md | marcostolosa/cve | bfe85c74b105c623c9807e09b2b572f144bf1f1c | [
"MIT"
] | 1 | 2022-03-29T02:35:58.000Z | 2022-03-29T02:35:58.000Z | ### [CVE-2016-5740](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5740)



### Description
An issue was discovered in Open-Xchange OX App Suite before 7.8.2-rev5. JavaScript code can be used as part of ical attachments within scheduling E-Mails. This content, for example an appointment's location, will be presented to the user at the E-Mail App, depending on the invitation workflow. This code gets executed within the context of the user's current session. Malicious script code can be executed within a user's context. This can lead to session hijacking or triggering unwanted actions via the web interface (sending mail, deleting data etc.).
### POC
#### Reference
- http://packetstormsecurity.com/files/138700/Open-Xchange-App-Suite-7.8.2-Cross-Site-Scripting.html
#### Github
No GitHub POC found.
| 58.888889 | 555 | 0.767925 | eng_Latn | 0.884554 |
aabb9f726f7f5e441890519e829a0e196522cdc1 | 6,604 | md | Markdown | _posts/java/2021-04-04-java-part27.md | 00parkjihye/00parkjihye.github.io | 5f53f047775222234c9ac1e866ff679e452a7d7b | [
"MIT"
] | null | null | null | _posts/java/2021-04-04-java-part27.md | 00parkjihye/00parkjihye.github.io | 5f53f047775222234c9ac1e866ff679e452a7d7b | [
"MIT"
] | 1 | 2021-01-27T09:08:36.000Z | 2021-01-29T04:23:54.000Z | _posts/java/2021-04-04-java-part27.md | 00parkjihye/00parkjihye.github.io | 5f53f047775222234c9ac1e866ff679e452a7d7b | [
"MIT"
] | null | null | null | ---
---
<h2 id="객체지향-프로그래밍-object-oriented">[객체지향 프로그래밍] (Object Oriented)</h2>
<h5 id="다형성폴리모피즘-polymorphism"><strong>다형성</strong>(폴리모피즘, Polymorphism)</h5>
<p>객체지향 프로그래밍의 특징중 <strong>다형성</strong>(폴리모피즘, Polymorphism)이 있다. 폴리모피즘은 왜 필요한 걸까?<br>
다음같이 Bouncer(경비원)클래스를 만들자 이때, 경비원 클래스는 다음같이 동물을 짖게해 건물을 지킨다</p>
<p><em>Bouncer.java</em></p>
<pre><code>public class Bouncer {
public void barkAnimal(Animal animal) {
if (animal instanceof Tiger) {
System.out.println("어흥");
} else if (animal instanceof Lion) {
System.out.println("으르렁");
}
}
public static void main(String[] args) {
Tiger tiger = new Tiger();
Lion lion = new Lion();
Bouncer bouncer= new Bouncer();
bouncer.barkAnimal(tiger);
bouncer.barkAnimal(lion);
}
}
</code></pre>
<p>barkAnimal메소드는 입력으로 받은 animal객체가 Tiger인 경우 "어흥"을 출력, Lion인 경우 "으르렁"출력</p>
<blockquote>
<p>※ <code>instanceof</code> 는 특정객체가 특정클래스의 객체인지를 조사할때 사용되는 자바의 내장키워드<br>
<code>animal instanceof Tiger</code>는 “animal객체가 <code>new Tiger</code>로 만들어진 객체인가?” 를 묻는 조건식</p>
</blockquote>
<p>barkAnimal메소드의 입력자료형은 Tiger,Lion이 아닌 Animal<br>
하지만 barkAnimal메소드를 호출시 tiger,lion객체를 전달할 수 있다. 이게 가능한 이유는 Tiger,Lion클래스가 Animal이란 부모 클래스를 상속한 자식 클래스이기 때문<br>
자식 클래스에의해 만들어진 객체는 언제나 부모 클래스의 자료형으로 사용가능(이전에 공부했던 IS-A 관계)</p>
<p>즉, 다음 코딩이 가능</p>
<pre><code>Animal tiger = new Tiger();
Animal lion = new Lion();
</code></pre>
<p>결과:</p>
<pre><code>어흥
으르렁
</code></pre>
<p>Crocodile, Leopard등이 추가되면 barkAnimal메소드는 다음처럼 수정되어야 함</p>
<pre><code>public void barkAnimal(Animal animal) {
if (animal instanceof Tiger) {
System.out.println("어흥");
} else if (animal instanceof Lion) {
System.out.println("으르렁");
} else if (animal instanceof Crocodile) {
System.out.println("쩝쩝");
} else if (animal instanceof Leopard) {
System.out.println("캬옹");
}
}
</code></pre>
<p>인터페이스로 더 나은 해법이 있다<br>
다음처럼 Barkable이란 인터페이스를 작성</p>
<p><em>Barkable.java</em></p>
<pre><code>public interface Barkable {
public void bark();
}
</code></pre>
<p>그리고 Tiger클래스, Lion클래스가 Barkable인터페이스를 구현하도록 변경</p>
<p><em>Tiger.java</em></p>
<pre><code>public class Tiger extends Animal implements Predator, Barkable {
public String getFood() {
return "apple";
}
public void bark() {
System.out.println("어흥");
}
}
</code></pre>
<p>인터페이스는 위와같이 콤마(,)로 여러개를 implements할 수 있다. Tiger클래스는 Predator인터페이스와 Barkable인터페이스를 implements</p>
<p>Tiger클래스는 bark메소드 실행시 “어흥” 출력<br>
<em>Lion.java</em></p>
<pre><code>public class Lion extends Animal implements Predator, Barkable {
public String getFood() {
return "banana";
}
public void bark() {
System.out.println("으르렁");
}
}
</code></pre>
<p>Lion클래스는 bark 메소드 실행시 “으르렁” 출력<br>
이렇게 Tiger, Lion클래스에 bark메소드를 구현하면 Bouncer클래스의 barkAnimal메소드를 다음처럼 수정</p>
<p><em>바뀌기 전</em></p>
<pre><code>public void barkAnimal(Animal animal) {
if (animal instanceof Tiger) {
System.out.println("어흥");
} else if (animal instanceof Lion) {
System.out.println("으르렁");
}
}
</code></pre>
<p><em>바뀐 후</em></p>
<pre><code>public void barkAnimal(Barkable animal) {
animal.bark();
}
</code></pre>
<p>barkAnimal메소드의 입력자료형이 Animal에서 Barkable로 변경 그리고 animal의 객체타입을 체크해 “어흥” 또는 "으르렁"을 출력하던 부분이을 그냥bark 메소드를 호출하도록 변경. 이렇게 변경했더니 복잡한 조건문도 사라지고 누가봐도 명확한 코드가 됨</p>
<blockquote>
<p>※ 폴리모피즘을 이용하면 위예에서 보듯 복잡한 if else의 조건문을 간단하게 처리할 수 있는 경우가 많다.</p>
</blockquote>
<p>위예제에서 사용한 tiger, lion객체는 각각 Tiger, Lion클래스의 객체이면서 Animal클래스의 객체이기도 하고 Barkable, Predator 인터페이스의 객체이기도 하다. 이런이유로 barkAnimal메소드의 입력자료형을 Animal에서 Barkable로 바꾸어 사용할 수 있다</p>
<p>이렇게 하나의 객체가 여러개의 자료형 타입을 가질수 있는 것을 객체지향에서 <strong>다형성, 폴리모피즘(Polymorphism)</strong><br>
즉 Tiger클래스의 객체는 다음같이 여러자료형으로 표현</p>
<pre><code>Tiger tiger = new Tiger();
Animal animal = new Tiger();
Predator predator = new Tiger();
Barkable barkable = new Tiger();
</code></pre>
<p>Predator로 선언된 predator객체와 Barkable로 선언된 barkable 객체는 사용할 수 있는 메소드가 서로 다르다<br>
predator객체는 <code>getFood()</code>메소드가 선언된 Predator인터페이스의 객체이므로 getFood메소드만 호출가능. 이와마찬가지로 Barkable로 선언된 barkable객체는 bark메소드만 호출가능</p>
<p>만약 getFood메소드와 bark메소드를 모두 사용하고 싶다면?<br>
Predator, Barkable인터페이스를 구현한 Tiger로 선언된 tiger객체를 사용하거나 다음같이 getFood, bark메소드를 모두 포함하는 새인터페이스를 새로 만들어 사용</p>
<p><em>BarkablePredator.java</em></p>
<pre><code>public interface BarkablePredator {
public void bark();
public String getFood();
}
</code></pre>
<p>또는</p>
<pre><code>public interface BarkablePredator extends Predator, Barkable {
}
</code></pre>
<p>두번째 방법은 기존 인터페이스를 활용하는 방법. 두번째 방법대로면 Predator의 getFood메소드, Barkable의 bark메소드를 그대로 상속받을 수 있다</p>
<p>인터페이스는 일반클래스와는 달리 <strong>extends</strong>를 이용해 여러러 인터페이스(Predator, Barkable)를 동시 상속가능<br>
즉, 다중상속 지원(※ 일반클래스는 단일상속만 가능)</p>
<p>Lion 클래스를 위에서 작성한 BarkablePredator인터페이스를 구현하도록 수정</p>
<p><em>Lion.java</em></p>
<pre><code>public class Lion extends Animal implements BarkablePredator {
public String getFood() {
return "banana";
}
public void bark() {
System.out.println("으르렁");
}
}
</code></pre>
<p>이렇게 Lion클래스를 수정후 Bouncer클래스를 실행해도 역시 다음같이 동일한 결과값 출력</p>
<pre><code>어흥
으르렁
</code></pre>
<p>Bouncer클래스의 barkAnimal메소드의 입력자료형이 Barkable이더라도 BarkablePredator를 구현한 lion객체 전달가능<br>
이유는 BarkablePredator는 Barkable인터페이스를 상속받은 자식 인터페이스이기 때문. 자식 인터페이스로 생성한 객체의 자료형은 부모 인터페이스로 사용하는 것이 가능(자식 클래스의 객체 자료형을 부모 클래스의 자료형으로 사용가능하다는 점과 동일)</p>
<p>다음은 최종적으로 완성된 Barkable, BarkablePredator인터페이스와 Tiger, Lion, Bouncer클래스</p>
<p><em>Barkable.java</em></p>
<pre><code>public interface Barkable {
public void bark();
}
</code></pre>
<p><em>BarkablePredator.java</em></p>
<pre><code>public interface BarkablePredator extends Barkable, Predator {
}
</code></pre>
<p><em>Tiger.java</em></p>
<pre><code>public class Tiger extends Animal implements Predator, Barkable {
public String getFood() {
return "apple";
}
public void bark() {
System.out.println("어흥");
}
}
</code></pre>
<p><em>Lion.java</em></p>
<pre><code>public class Lion extends Animal implements BarkablePredator {
public String getFood() {
return "banana";
}
public void bark() {
System.out.println("으르렁");
}
}
</code></pre>
<p><em>Bouncer.java</em></p>
<pre><code>public class Bouncer {
public void barkAnimal(Barkable animal) {
animal.bark();
}
public static void main(String[] args) {
Tiger tiger = new Tiger();
Lion lion = new Lion();
Bouncer bouncer= new Bouncer();
bouncer.barkAnimal(tiger);
bouncer.barkAnimal(lion);
}
}
</code></pre>
| 32.372549 | 172 | 0.672925 | kor_Hang | 0.998771 |
48c205aaf30bcc066a94e1141ec30f93adb7116c | 3,605 | md | Markdown | business-central/finance-scenario-example-defining-static-allocations-based-on-allocation-ratio.md | ACPJanousek/dynamics365smb-docs | 96d77ae7b4b17ceb48135986bcbf5fd1842780f8 | [
"CC-BY-4.0",
"MIT"
] | 1 | 2019-03-22T13:54:33.000Z | 2019-03-22T13:54:33.000Z | business-central/finance-scenario-example-defining-static-allocations-based-on-allocation-ratio.md | TRASERDanielGorski/dynamics365smb-docs | 355a63ff2f5d723977930b9869d49428400211be | [
"CC-BY-4.0",
"MIT"
] | null | null | null | business-central/finance-scenario-example-defining-static-allocations-based-on-allocation-ratio.md | TRASERDanielGorski/dynamics365smb-docs | 355a63ff2f5d723977930b9869d49428400211be | [
"CC-BY-4.0",
"MIT"
] | 1 | 2020-08-13T08:56:06.000Z | 2020-08-13T08:56:06.000Z | ---
title: Defining Static Allocations Based on Allocation Ratio | Microsoft Docs
description: Static allocation method is based on a definite value, such as square meters used, or an established allocation ratio such as 5:2:4.
services: project-madeira
documentationcenter: ''
author: SorenGP
ms.service: dynamics365-business-central
ms.topic: article
ms.devlang: na
ms.tgt_pltfrm: na
ms.workload: na
ms.search.keywords:
ms.date: 10/01/2018
ms.author: sgroespe
redirect_url: finance-define-and-allocate-costs
---
# Scenario Example: Defining Static Allocations Based on Allocation Ratio
Static allocation method is based on a definite value, such as square meters used, or an established allocation ratio such as 5:2:4.
This topic describes how to define three new allocation target cost objects for the allocation source PROD cost center using the established allocation ratio 5:2:4. The three target cost objects are ACCESSO, PAINT, and FITTINGS.
> [!NOTE]
> The example uses the demo data in the [!INCLUDE[d365fin](includes/d365fin_md.md)].
## To define the allocation source PROD cost center on the General FastTab
1. Choose the  icon, enter **Cost Allocation**, and then choose the related link.
2. On the **Cost Allocation** page, choose the **New** action.
3. In the **ID** field, press Enter or enter an ID.
4. In the **Level** field, enter **1**.
5. In the **Valid From** and **Valid To** fields, enter appropriate dates.
6. In the **Cost Center Code** field, enter **PROD**.
7. In the **Credit to Cost Type** field, enter the cost type **9903**.
## To define the allocation target cost objects on the Lines FastTab
1. On the first line, in the **Target Cost Type** field, enter **9903**.
2. On the first line, in the **Target Cost Object** field, select **ACCESSO**.
3. On the first line, in the **Allocation Target Type** field, select **All Costs** to define how all accrued costs are allocated.
4. On the first line, in the **Base** field, select **Static** to use the static allocation method.
5. On the first line, in the **Share** field, enter the allocation ratio **5**.
6. On the second line, in the **Target Cost Type** field, enter **9903**.
7. On the second line, in the **Target Cost Object** field, select **PAINT**.
8. On the second line, in the **Allocation Target Type** field, select **All Costs** to define how all accrued costs are allocated.
9. On the second line, in the **Base** field, select **Static** to use the static allocation method.
10. On the second line, in the **Share** field, enter the allocation ratio **2**.
11. On the third line, in the **Target Cost Type** field, enter **9903**.
12. On the third line, in the **Target Cost Object** field, select **FITTINGS**.
13. On the third line, in the **Allocation Target Type** field, select **All Costs** to define how all accrued costs are allocated.
14. On the third line, in the **Base** field, select **Static** to use the static allocation method.
15. On the third line, in the **Share** field, enter the allocation ratio **4**.
> [!IMPORTANT]
> [!INCLUDE[d365fin](includes/d365fin_md.md)] automatically calculates the **Percent** field using a percentage rate that is dependent on all three allocation ratios that are entered in the **Share** field for all three lines.
## See Also
[Defining and Allocating Costs](finance-define-and-allocate-costs.md)
| 59.098361 | 230 | 0.708738 | eng_Latn | 0.996003 |
48c2343b9d6e407bc2da66a54f6069c573c3a074 | 8,366 | md | Markdown | articles/active-directory/authentication/howto-mfa-userdevicesettings.md | Jontii/azure-docs.sv-se | d2551c12e17b442dc0b577205d034dcd6c73cff9 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | articles/active-directory/authentication/howto-mfa-userdevicesettings.md | Jontii/azure-docs.sv-se | d2551c12e17b442dc0b577205d034dcd6c73cff9 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | articles/active-directory/authentication/howto-mfa-userdevicesettings.md | Jontii/azure-docs.sv-se | d2551c12e17b442dc0b577205d034dcd6c73cff9 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | ---
title: Hantera autentiseringsmetoder för Azure AD Multi-Factor Authentication-Azure Active Directory
description: Lär dig hur du kan konfigurera Azure Active Directory användar inställningar för Azure AD Multi-Factor Authentication
services: multi-factor-authentication
ms.service: active-directory
ms.subservice: authentication
ms.topic: how-to
ms.date: 11/04/2020
ms.author: justinha
author: justinha
manager: daveba
ms.reviewer: michmcla, dawoo
ms.collection: M365-identity-device-management
ms.openlocfilehash: fc0be7e50c5cce511fafd7d8b407626bd57659bd
ms.sourcegitcommit: 0aec60c088f1dcb0f89eaad5faf5f2c815e53bf8
ms.translationtype: MT
ms.contentlocale: sv-SE
ms.lasthandoff: 01/14/2021
ms.locfileid: "98183140"
---
# <a name="manage-user-authentication-methods-for-azure-ad-multi-factor-authentication"></a>Hantera metoder för användarautentisering för Azure AD Multi-Factor Authentication
Användare i Azure AD har två distinkta uppsättningar kontakt uppgifter:
- Kontakt information för offentliga profiler, som hanteras i användar profilen och är synlig för medlemmar i din organisation. För användare som har synkroniserats från lokala Active Directory hanteras den här informationen i lokala Windows Server-Active Directory Domain Services.
- Autentiseringsmetoder, som alltid hålls privata och som endast används för autentisering, inklusive Multi-Factor Authentication (MFA). Administratörer kan hantera dessa metoder på bladet autentiseringsmetod i en användares metod och användarna kan hantera sina metoder på sidan säkerhets information i ditt konto.
När du hanterar Azure AD-Multi-Factor Authentication metoder för dina användare kan autentiserings administratörer:
1. Lägg till autentiseringsmetoder för en speciell användare, inklusive telefonnummer som används för MFA.
1. Återställa en användares lösen ord.
1. Kräv att en användare registrerar sig för MFA igen.
1. Återkalla befintliga MFA-sessioner.
1. Ta bort en användares befintliga applösenord
## <a name="add-authentication-methods-for-a-user"></a>Lägga till autentiseringsmetoder för en användare
Du kan lägga till autentiseringsmetoder för en användare via Azure Portal eller Microsoft Graph.
> [!NOTE]
> Av säkerhets skäl ska fält för kontakt information från offentlig användare inte användas för att utföra MFA. I stället ska användarna fylla i sina autentiseringsmetoder som ska användas för MFA.
:::image type="content" source="media/howto-mfa-userdevicesettings/add-authentication-method-detail.png" alt-text="Lägg till autentiseringsmetoder från Azure Portal":::
Så här lägger du till autentiseringsmetoder för en användare via Azure Portal:
1. Logga in på **Azure Portal**.
1. Bläddra till **Azure Active Directory** > **användare** > **alla användare**.
1. Välj den användare som du vill lägga till en autentiseringsmetod för och välj **autentiseringsmetoder**.
1. Längst upp i fönstret väljer du **+ Lägg till autentiseringsmetod**.
1. Välj en metod (telefonnummer eller e-postadress). E-post kan användas för lösen ords återställning, men inte autentisering. När du lägger till ett telefonnummer väljer du en telefon typ och anger telefonnummer med giltigt format (t. ex. + 1 4255551234).
1. Välj **Lägg till**.
> [!NOTE]
> I för hands versionen kan administratörer lägga till alla tillgängliga autentiseringsmetoder för användare, medan den ursprungliga upplevelsen endast tillåter uppdatering av telefon-och alternativa telefon metoder.
### <a name="manage-methods-using-powershell"></a>Hantera metoder med PowerShell:
Installera PowerShell-modulen Microsoft. Graph. Identity. inloggningar med hjälp av följande kommandon.
```powershell
Install-module Microsoft.Graph.Identity.Signins
Connect-MgGraph -Scopes UserAuthenticationMethod.ReadWrite.All
Select-MgProfile -Name beta
```
Lista telefonbaserade autentiseringsmetoder för en speciell användare.
```powershell
Get-MgUserAuthenticationPhoneMethod -UserId balas@contoso.com
```
Skapa en autentiseringsmetod för mobil telefon för en speciell användare.
```powershell
New-MgUserAuthenticationPhoneMethod -UserId balas@contoso.com -phoneType "mobile" -phoneNumber "+1 7748933135"
```
Ta bort en enskild telefon metod för en användare
```powershell
Remove-MgUserAuthenticationPhoneMethod -UserId balas@contoso.com -PhoneAuthenticationMethodId 3179e48a-750b-4051-897c-87b9720928f7
```
Autentiseringsmetoder kan också hanteras med hjälp av Microsoft Graph-API: er, mer information finns i [Översikt över Azure AD Authentication Methods API](/graph/api/resources/authenticationmethods-overview?view=graph-rest-beta&preserve-view=true)
## <a name="manage-user-authentication-options"></a>Hantera alternativ för användarautentisering
Om du har tilldelats rollen som *administratör för autentisering* kan du kräva att användarna återställer sina lösen ord, omregistrerar sig för MFA eller återkalla befintliga MFA-sessioner från sina användar objekt. Utför följande steg för att hantera användar inställningar:
1. Logga in på [Azure-portalen](https://portal.azure.com).
1. Till vänster väljer du **Azure Active Directory** > **Användare** > **Alla användare**.
1. Välj den användare som du vill utföra en åtgärd på och välj **autentiseringsmetoder**. Överst i fönstret väljer du något av följande alternativ för användaren:
- **Återställ lösen ord** återställer användarens lösen ord och tilldelar ett tillfälligt lösen ord som måste ändras vid nästa inloggning.
- **Kräv omregistrering av MFA** gör det så att när användaren loggar in nästa gång uppmanas de att ställa in en ny MFA-autentiseringsmetod.
> [!NOTE]
> Användarens aktuella registrerade autentiseringsmetoder tas inte bort när en administratör kräver omregistrering för MFA. När en användare har registrerats för MFA rekommenderar vi att de granskar sin säkerhets information och tar bort alla tidigare registrerade autentiseringsmetoder som inte längre kan användas.
- **Återkalla MFA-sessioner** rensar användarens sparade MFA-sessioner och kräver att de utför MFA nästa gång den krävs av principen på enheten.
:::image type="content" source="media/howto-mfa-userdevicesettings/manage-authentication-methods-in-azure.png" alt-text="Hantera autentiseringsmetoder från Azure Portal":::
## <a name="delete-users-existing-app-passwords"></a>Ta bort användarnas befintliga applösenord
För användare som har definierat applösenord kan administratörer också välja att ta bort dessa lösen ord, vilket gör att äldre autentisering inte fungerar i dessa program. De här åtgärderna kan vara nödvändiga om du behöver ge hjälp till en användare eller behöver återställa sina autentiseringsmetoder. Icke-webbläsarbaserade appar som kopplats till dessa applösenord slutar fungera tills ett nytt applösenord har skapats.
För att ta bort en användares applösenord, utför följande steg:
1. Logga in på [Azure-portalen](https://portal.azure.com).
1. På den vänstra sidan väljer du **Azure Active Directory** > **användare** > **alla användare**.
1. Välj **Multi-Factor Authentication**. Du kan behöva bläddra till höger för att se det här meny alternativet. Välj skärm bilden nedan om du vill se hela Azure Portals fönster och meny plats: [ ](media/howto-mfa-userstates/selectmfa.png#lightbox)
1. Markera kryss rutan bredvid den eller de användare som du vill hantera. En lista med snabb stegs alternativ visas till höger.
1. Välj **hantera användar inställningar** och markera sedan kryss rutan för **ta bort alla befintliga applösenord som har genererats av de valda användarna**, som du ser i följande exempel: 
1. Välj **Spara** och sedan **Stäng**.
## <a name="next-steps"></a>Nästa steg
I den här artikeln visar vi hur du konfigurerar enskilda användar inställningar. Information om hur du konfigurerar övergripande inställningar för Azure AD Multi-Factor Authentication-tjänsten finns i [Konfigurera inställningar för Azure AD-Multi-Factor Authentication](howto-mfa-mfasettings.md).
Om användarna behöver hjälp kan du läsa [användar handboken för Azure AD Multi-Factor Authentication](../user-help/multi-factor-authentication-end-user-first-time.md).
| 68.57377 | 424 | 0.804088 | swe_Latn | 0.999154 |
48c2b6153178dbd4a7407b5e88af62852b3cfb3f | 73 | md | Markdown | README.md | wujunwei/component-uml | 61bc08217f2a696651806ce51696904cb80c2c2e | [
"MIT"
] | null | null | null | README.md | wujunwei/component-uml | 61bc08217f2a696651806ce51696904cb80c2c2e | [
"MIT"
] | null | null | null | README.md | wujunwei/component-uml | 61bc08217f2a696651806ce51696904cb80c2c2e | [
"MIT"
] | null | null | null | # component-uml
A simple design for application model (show by plantuml)
| 24.333333 | 56 | 0.794521 | eng_Latn | 0.992792 |
48c3e0643e3292bd11d0263d13b80ac08e79abc7 | 20,972 | md | Markdown | docs/ide/whats-new-visual-studio-docs.md | MicrosoftDocs/visualstudio-docs.pt-br | b1882dc108a37c4caebbf5a80c274c440b9bbd4a | [
"CC-BY-4.0",
"MIT"
] | 5 | 2019-02-19T20:22:40.000Z | 2022-02-19T14:55:39.000Z | docs/ide/whats-new-visual-studio-docs.md | MicrosoftDocs/visualstudio-docs.pt-br | b1882dc108a37c4caebbf5a80c274c440b9bbd4a | [
"CC-BY-4.0",
"MIT"
] | 32 | 2018-08-24T19:12:03.000Z | 2021-03-03T01:30:48.000Z | docs/ide/whats-new-visual-studio-docs.md | MicrosoftDocs/visualstudio-docs.pt-br | b1882dc108a37c4caebbf5a80c274c440b9bbd4a | [
"CC-BY-4.0",
"MIT"
] | 25 | 2017-11-02T16:03:15.000Z | 2021-10-02T02:18:00.000Z | ---
title: 'Visual Studio docs: o que há de novo em setembro de 2021'
titleSuffix: ''
description: o que há de novo no Visual Studio docs de setembro de 2021.
ms.date: 10/01/2021
helpviewer_keywords:
- Visual Studio, what's new, docs
- what's new [Visual Studio]
ms.assetid: 89844796-621B-4EF5-9D76-197084B011CB
author: anandmeg
ms.author: meghaanand
manager: jmartens
ms.technology: vs-ide-general
ms.prod: visual-studio-windows
ms.topic: conceptual
ms.workload:
- multiple
ms.openlocfilehash: 684b2c97885daee160ff8f539a65c501acded7fa
ms.sourcegitcommit: 72f8ce4992cc62c4833e6dcb0f79febb328c44be
ms.translationtype: MT
ms.contentlocale: pt-BR
ms.lasthandoff: 10/14/2021
ms.locfileid: "130011517"
---
# <a name="visual-studio-docs-whats-new-for-september-2021"></a>Visual Studio docs: o que há de novo em setembro de 2021
bem-vindo ao que há de novo no Visual Studio docs de setembro de 2021. Este artigo lista algumas das principais alterações feitas nos documentos durante esse período. Para obter informações sobre as novidades nos meses anteriores, consulte a seção [o que é o histórico](#whats-new-history) de novidades.
## <a name="code-quality"></a>Qualidade do código
**Artigos atualizados**
- [Migrar da análise herdada (FxCop) para a análise de origem (analisadores .net)](../code-quality/migrate-from-legacy-analysis-to-net-analyzers.md) -instruções adicionais para desabilitar a análise de código herdado
## <a name="debugger"></a>Depurador
**Artigos atualizados**
- [primeiro, veja as Visual Studio depurador](../debugger/debugger-feature-tour.md) -atualizações de desempenho de conteúdo para depuração, diagnóstico e implantação
- [configurar o Firewall de Windows para depuração remota](../debugger/configure-the-windows-firewall-for-remote-debugging.md) -atualizações do depurador remoto para VS 2022
- [Atribuições de porta do depurador remoto](../debugger/remote-debugger-port-assignments.md) -atualizações do depurador remoto para vs 2022
## <a name="deployment"></a>Implantação
**Novos artigos**
- [implantar seu aplicativo no Azure usando ações de GitHub fluxos de trabalho criados por Visual Studio](../deployment/azure-deployment-using-github-actions.md) -novo artigo criado
**Artigos atualizados**
- [primeira olhada na implantação em](../deployment/deploying-applications-services-and-components.md) atualizações de desempenho de Visual Studio conteúdo para depuração, diagnóstico e implantação
- [implantar seu aplicativo no Azure usando fluxos de trabalho de GitHub de ações criados por Visual Studio](../deployment/azure-deployment-using-github-actions.md)
- Atualizações do depurador remoto para VS 2022
- editar GitHub ações de passagem de CI/CD
- confirmação inicial do novo guia de How-To para ações do VS e do GitHub
## <a name="extensibility"></a>Extensibilidade
**Novos artigos**
- [como: criar o feed ATOM (VsixFeed) para Visual Studio galerias particulares usando o VsixUtil](../extensibility/how-to-create-vsix-feed-for-private-gallery.md) -novo artigo criado
**Artigos atualizados**
- [Criar um Software Development Kit](../extensibility/creating-a-software-development-kit.md)
- Os SDKs da extensão UWP devem Listar itens da caixa de ferramentas em SdkManifest.xml a partir do VS 2022
## <a name="get-started"></a>Introdução
**Novos artigos**
- [Tutorial: abrir um projeto de um repositório](../get-started/tutorial-open-project-from-repo.md) -novo artigo criado
## <a name="ide"></a>IDE
**Artigos atualizados**
- [recursos da seção Visual Studio](./advanced-feature-overview.md) -atualizar controle do código-fonte
- [atalhos de teclado no Visual Studio](./default-keyboard-shortcuts-in-visual-studio.md) -TOC para 3 seções e ordem ABC
- [novidades no Visual Studio 2022 (versão prévia)](./whats-new-visual-studio-2022.md) -revisar hierarquia de títulos, reorganizar informações e adicionar GIFs animados
- [Como alterar o diretório de saída do build](./how-to-change-the-build-output-directory.md)
- examinar e atualizar conforme necessário para a versão prévia do Visual Studio 2022
- Artigo atualizar configurações de Build para Dev17
- [como: configurar projetos para plataformas de destino](./how-to-configure-projects-to-target-platforms.md) – revisão e atualização conforme necessário para Visual Studio 2022 RC
- [Saiba mais sobre a Gerenciador de soluções](./use-solution-explorer.md) -adicionar informações do menu de contexto de Gerenciador de soluções
## <a name="install"></a>Instalar
**Artigos atualizados**
- [Exemplo avançado para contêineres](../install/advanced-build-tools-container.md)
- Adicione o comando Start/Wait para corrigir o problema do GitHub #6765
- Atualizar como as ferramentas de Build do VS estão instaladas
## <a name="javascript"></a>JavaScript
**Novos artigos**
- [JavaScript e TypeScript no Visual Studio 2022](../javascript/javascript-in-vs-2022.md) -novo artigo criado
**Artigos atualizados**
- [Tutorial: criar um aplicativo de ASP.NET Core com o Vue em Visual Studio](../javascript/tutorial-asp-net-core-with-vue.md) -rascunho do que há de novo em JavaScript e TypeScript no Visual Studio 2022
## <a name="msbuild"></a>MSBuild
**Artigos atualizados**
- [Funções de propriedade](../msbuild/property-functions.md)
- Melhor obtenção... Descrições de OfFileAbove
## <a name="vsto"></a>Palestra
**Novos artigos**
- [tempo de execução de Visual Studio Tools para Office](../vsto/visual-studio-tools-for-office-runtime.md) -novo artigo criado
## <a name="xaml-tools"></a>Ferramentas XAML
**Artigos atualizados**
- [Hot recarregamento de XAML: grave e depure seus aplicativos do WPF e UWP enquanto eles estiverem em execução](../xaml-tools/xaml-hot-reload.md)
- Atualizar metadados e fazer pequenas edições no texto
- Atualizar a seção Introdução ao Hot recarregamento de XAML
## <a name="community-contributors-in-september"></a>Community colaboradores em setembro
as pessoas a seguir contribuíram para o Visual Studio docs durante esse período. Obrigado! Saiba como contribuir seguindo os links em "Participe" na [página de aterrissagem de novidades](index.yml).
- [GitHubPang](https://github.com/GitHubPang) (3)
- [docscorp-jimlim](https://github.com/docscorp-jimlim) -Jim Lim (1)
- [flcdrg](https://github.com/flcdrg) -David Gardiner (1)
- [Intel-rganesh](https://github.com/intel-rganesh) -Rakesh Ganesh (1)
- [mcturn](https://github.com/mcturn) – Michael Turner (1)
- [mhartkorn](https://github.com/mhartkorn) -Martin Hartkorn (1)
- [tonyhallett](https://github.com/tonyhallett) -Tony Hallett (1)
## <a name="whats-new-history"></a>Histórico de novidades
as seções a seguir fornecem os três meses anteriores de novidades no Visual Studio docs.
* [Agosto de 2021](#august-2021)
* [Julho de 2021](#july-2021)
* [Junho de 2021](#june-2021)
### <a name="august-2021"></a>Agosto de 2021
#### <a name="containers"></a>Contêineres
**Artigos atualizados**
- [como configurar Visual Studio ferramentas de contêiner](../containers/container-tools-configure.md) – agosto das ferramentas de contêiner
- [ferramentas de contêiner de Visual Studio para ferramentas de contêiner do docker](../containers/overview.md) – agosto
- [Usar a janela contêineres](../containers/view-and-diagnose-containers.md) -ferramentas de contêiner agosto
#### <a name="debugger"></a>Depurador
**Artigos atualizados**
- [ASP.NET de depuração remota em um computador IIS remoto](../debugger/remote-debugging-aspnet-on-a-remote-iis-7-5-computer.md) – atualizar para WS 2019 e .net 5
- [ASP.NET Core de depuração remota em um computador IIS remoto no Visual Studio](../debugger/remote-debugging-aspnet-on-a-remote-iis-computer.md) -Refresh para WS 2019 e .net 5
- [ASP.NET Core de depuração remota no IIS no Azure em Visual Studio](../debugger/remote-debugging-azure.md) -atualização para WS 2019 e .net 5
- [Anexar a um processo em execução em um contêiner do Docker](../debugger/attach-to-process-running-in-docker-container.md) -atualizações para o Linux anexar a cenários de processo
- [depurar aplicativos .net no WSL com](../debugger/debug-dotnet-core-in-wsl-2.md) atualizações de depuração Visual Studio-WSL
#### <a name="deployment"></a>Implantação
**Artigos atualizados**
- [publicar um aplicativo no IIS importando configurações de publicação em Visual Studio](../deployment/tutorial-import-publish-settings-iis.md) -atualizar para o WS 2019 e o .net 5
#### <a name="extensibility"></a>Extensibilidade
**Artigos atualizados**
- [Adicionar uma extensão de protocolo de servidor de linguagem](../extensibility/adding-an-lsp-extension.md) – atualizar informações em MiddleLayer em documentos de extensão LSP
#### <a name="ide"></a>IDE
**Novos artigos**
- [registrar o Dotfuscator Community](./dotfuscator/register.md) -novo artigo criado
- [atualização do Dotfuscator Community 5](./dotfuscator/upgrade-from-5.md) – novo artigo criado
**Artigos atualizados**
- [Como adicionar ou remover referências usando a](./how-to-add-or-remove-references-by-using-the-reference-manager.md) seção ' Adicionar referência de > ' do Gerenciador de referências
- [novidades no Visual Studio 2022 (versão prévia)](./whats-new-visual-studio-2022.md) – atualizações do que há de novo no Visual Studio 2022 preview 3
- [Etapa 6: trabalhar com o Git](../python/tutorial-working-with-python-in-visual-studio-step-06-working-with-git.md) – adicionar informações de controle do código-fonte git atualizadas ao tutorial do Python
- [Tutorial: criar um aplicativo de console C# simples no Visual Studio (parte 1 de 2)](../get-started/csharp/tutorial-console.md) – adicionar informações de controle do código-fonte Git ao Tutorial do console CSharp
- [tutorial: introdução ao Visual Basic em Visual Studio](../get-started/visual-basic/tutorial-console.md) -adicionar informações de controle do código-fonte Git ao Tutorial do console do VB
- [Criar uma calculadora do console em C++](/cpp/get-started/tutorial-console-cpp) -adicionar informações do git ao tutorial da calculadora do console do C++
#### <a name="install"></a>Instalar
**Artigos atualizados**
- [instalar ferramentas de Build em um contêiner](../install/build-tools-container.md) -atualizações para Visual Studio 2022
#### <a name="javascript"></a>JavaScript
**Novos artigos**
- [Tutorial: criar um aplicativo ASP.NET Core com Vue no Visual Studio](../javascript/tutorial-asp-net-core-with-vue.md) -novo artigo criado
- [criar um aplicativo de Angular](../javascript/tutorial-create-angular-app.md) -novo artigo criado
- [criar um aplicativo de React](../javascript/tutorial-create-react-app.md) -novo artigo criado
- [Criar um aplicativo de Vue.js](../javascript/tutorial-create-vue-app.md) -novo artigo criado
**Artigos atualizados**
- [JavaScript e TypeScript em Visual Studio # Required; título da página exibido nos resultados da pesquisa. Inclua a marca. < caracteres 60.](../javascript/index.yml) -Atualizando a página de índice com links diferentes
#### <a name="test"></a>Teste
**Novos artigos**
- [Teste remoto (visualização experimental)](../test/remote-testing.md) -novo artigo criado
**Artigos atualizados**
- [Introdução ao teste de unidade](../test/getting-started-with-unit-testing.md) -adicionar suporte a C++ & aprimoramentos de teste de unidade para o tutorial
### <a name="july-2021"></a>Julho de 2021
#### <a name="debugger"></a>Depurador
**Artigos atualizados**
- [Criar visualizadores de dados personalizados](../debugger/create-custom-visualizers-of-data.md) – documentação dos visualizadores de atualização com etapas adicionais no caso de serem destinadas a cenários do .NET 5,0
- [Walkthrough: escrevendo um visualizador em C \# ](../debugger/walkthrough-writing-a-visualizer-in-csharp.md) -Conteúdo do visualizador para .NET 5 e novo conteúdo para objetos de dados personalizados
#### <a name="extensibility"></a>Extensibilidade
**Novos artigos**
- [perguntas frequentes sobre a extensibilidade do Visual Studio 2017](../extensibility/faq-2017.yml)
#### <a name="ide"></a>IDE
**Novos artigos**
- [o que há de novo no Visual Studio 2022 (versão prévia)](./whats-new-visual-studio-2022.md)
- [Relatar um problema: Estados e perguntas frequentes](./how-to-report-a-problem-with-visual-studio.md)
**Artigos atualizados**
- [Localizar em arquivos](./find-in-files.md) -seção várias pesquisas adicionadas, além de atualizações gerais
- [definir configurações de confiança para arquivos e pastas](./reference/trust-settings.md) -adicionadas informações sobre novos Configurações de confiança no VS2022
- [atalhos de teclado padrão em descrições Visual Studio](./default-keyboard-shortcuts-in-visual-studio.md) para atalhos de teclado
#### <a name="javascript"></a>JavaScript
**Novos artigos**
- [Tutorial: criar um aplicativo ASP.NET Core com Angular no Visual Studio](../javascript/tutorial-asp-net-core-with-angular.md)
- [Tutorial: criar um aplicativo ASP.NET Core com React no Visual Studio](../javascript/tutorial-asp-net-core-with-react.md)
#### <a name="msbuild"></a>MSBuild
**Novos artigos**
- [MSB3027: não foi possível copiar ' Source ' para ' dest '. Contagem de repetição excedida de ' Number '. Falha ao](../msbuild/errors/msb3027.md)
- [MSB3086](../msbuild/errors/msb3086.md)
- [MSB3190: o ClickOnce não oferece suporte ao nível de execução de solicitação ' level '](../msbuild/errors/msb3190.md)
- [MSB3275](../msbuild/errors/msb3275.md)
- [MSB3303: não foi possível resolver ' referência ' da referência COM ' versão '](../msbuild/errors/msb3303.md)
- [MSB3304: não foi possível determinar as dependências da referência de COM ' reference '](../msbuild/errors/msb3304.md)
- [MSB3305: processando a referência COM ' reference ' do caminho ' path '](../msbuild/errors/msb3305.md)
- [MSB3325: não é possível importar o arquivo de chave a seguir](../msbuild/errors/msb3325.md)
- [MSB3326: não é possível importar o arquivo de chave a seguir](../msbuild/errors/msb3326.md)
- [MSB3327](../msbuild/errors/msb3327.md)
- [O arquivo de recurso ' name ' tem um nome inválido](../msbuild/errors/msb3553.md)
- [MSB3836](../msbuild/errors/msb3836.md)
- [MSB3884: não foi possível localizar o arquivo de conjunto de regras ' FileName '](../msbuild/errors/msb3884.md)
- [MSB4094](../msbuild/errors/msb4094.md)
- [MSB4096: o item "item" na lista de itens "item-List" não define um valor para os metadados "Name"](../msbuild/errors/msb4096.md)
- [MSB4166](../msbuild/errors/msb4166.md)
- [MSB4175: a fábrica de tarefas ' Task-Factory-Name ' não pôde ser carregada a partir do assembly ' Assembly-Name '](../msbuild/errors/msb4175.md)
- [MSB6001: opção de linha de comando inválida para ' ferramenta '](../msbuild/errors/msb6001.md)
- [MSB6011: parâmetros inválidos passados para a tarefa ' Task-Name '](../msbuild/errors/msb6011.md)
- [MSB3075: o comando ' name ' saiu com o código ' error-code '. Verifique se você tem direitos suficientes para executar este comando](../msbuild/errors/msb3075.md)
- [MSB3103: arquivo resx inválido](../msbuild/errors/msb3103.md)
- [MSB3274: a referência principal ' name ' não pôde ser resolvida porque foi criada em relação à estrutura ' version '](../msbuild/errors/msb3274.md)
- [MSB3552: não foi possível encontrar o arquivo de recursos ' FileName '](../msbuild/errors/msb3552.md)
- [MSB3554: não é possível gravar no arquivo de saída ' FileName '](../msbuild/errors/msb3554.md)
- [MSB3645: não foi encontrado o .NET Framework v 3.5 Service Pack 1. para direcionar a ' framework-version ', .NET Framework v 3.5 Service Pack 1 ou posterior deve estar instalado](../msbuild/errors/msb3645.md)
- [MSB3822: os recursos que não são de cadeia de caracteres exigem o assembly System. Resources. Extensions em tempo de execução, mas não foram encontrados nas referências deste projeto](../msbuild/errors/msb3822.md)
- [MSB3971: os assemblies de referência para ' name ' não foram encontrados](../msbuild/errors/msb3971.md)
- [MSB4086: uma comparação numérica foi tentada em ' Expression ', que é avaliada como ' value ' em vez de um número, na condição ' Condition '](../msbuild/errors/msb4086.md)
- [MSB4236: não foi possível encontrar o SDK ' nome ' especificado](../msbuild/errors/msb4236.md)
- [MSB6004: a localização do executável da tarefa especificada ' path ' é inválida](../msbuild/errors/msb6004.md)
**Artigos atualizados**
- [walkthrough: usar](../msbuild/walkthrough-using-msbuild.md) instruções de MSBuild de programas do VS 2022 MSBuild
### <a name="june-2021"></a>Junho de 2021
#### <a name="azure"></a>Azure
**Artigos atualizados**
- [gerenciar os recursos associados às suas contas do Azure no Visual Studio Cloud explorer](../azure/vs-azure-tools-resources-managing-with-cloud-explorer.md) -adicionar substituição do Cloud explorer e do nó do Gerenciador de Servidores Azure
- [Acessando máquinas virtuais do Azure de Gerenciador de servidores](../azure/vs-azure-tools-virtual-machines-access-from-server-explorer.md) -adicionar substituição do Cloud Explorer e do Gerenciador de servidores nó do Azure
#### <a name="containers"></a>Contêineres
**Artigos atualizados**
- [início rápido: usar o docker com um React aplicativo de página única em Visual Studio](../containers/container-tools-react.md) -remover referências a EOL Windows 10, versão 1903
#### <a name="data-tools"></a>Ferramentas de dados
**Artigos atualizados**
- [criar um formulário de Windows para pesquisar dados](../data-tools/create-a-windows-form-to-search-data.md) – Windows Forms data Tools: atualizar e adicionar observação sobre o .net Core
#### <a name="ide"></a>IDE
**Novos artigos**
- [experiências conectadas no Visual Studio](./reference/connected-experiences.md) -novo artigo adicionado
- [Como usar Gerenciador de soluções](./use-solution-explorer.md) novo artigo adicionado
- [Remover referências não utilizadas](./reference/remove-unused-references.md) -novo artigo adicionado
**Artigos atualizados**
- [Opções, editor de texto, C#,](./reference/options-text-editor-csharp-advanced.md) documentos adicionados avançado para alguns novos recursos de produtividade .net 16,10
- [início rápido: criar seu primeiro aplicativo Node.js com Visual Studio](./quickstart-nodejs.md) -artigo atualizado
#### <a name="install"></a>Instalar
**Artigos atualizados**
- [Instalar ferramentas de Build em um contêiner](../install/build-tools-container.md) -atualizar como as ferramentas de Build do vs estão instaladas
#### <a name="modeling"></a>Modelagem
**Novos artigos**
- [Instalar mapa de código e validação de dependência ao vivo](../modeling/install-architecture-tools.md) -novo artigo criado
#### <a name="msbuild"></a>MSBuild
**Novos artigos**
- [MSB3270: houve uma incompatibilidade entre a arquitetura do processador do projeto que está sendo criado ' Arch ' e a arquitetura do processador da referência ' reference ', ' Arch '](../msbuild/errors/msb3270.md) -novo artigo criado
- [MSB3577: dois nomes de arquivo de saída resolvidos para o mesmo caminho de saída: caminho](../msbuild/errors/msb3577.md) -novo artigo criado
- [MSB4181: a tarefa ' Task ' retornou false, mas não registrou um erro](../msbuild/errors/msb4181.md) -novo artigo criado
- [MSB6003: não foi possível executar o executável da tarefa especificada](../msbuild/errors/msb6003.md) -novo artigo criado
**Artigos atualizados**
- [destinos de MSBuild](../msbuild/msbuild-targets.md) -MSBuild: esclareça como estender e personalizar destinos
- [metadados de Item no lote de tarefas](../msbuild/item-metadata-in-task-batching.md) -MSBuild: comportamento de lote de metadados de identidade de clarify
#### <a name="python"></a>Python
**Artigos atualizados**
- [projetos do python em](../python/managing-python-projects-in-visual-studio.md) problemas de GitHub abordados pelo Visual Studio no conteúdo do Python
- [trabalhe com os](../python/python-interactive-repl-in-visual-studio.md) problemas de GitHub abordados por janela interativa do python no conteúdo do Python
- [modelos de projeto de aplicativo web Python](../python/python-web-application-project-templates.md) – problemas de GitHub resolvidos no conteúdo do Python
#### <a name="sharepoint"></a>SharePoint
**Artigos atualizados**
- [Como: Adicionar e remover pastas mapeadas](../sharepoint/how-to-add-and-remove-mapped-folders.md) -remover sp13
- [Como criar um modelo de BDC](../sharepoint/how-to-create-a-bdc-model.md) – remover sp13
- [como: criar uma Web Part de SharePoint usando um designer](../sharepoint/how-to-create-a-sharepoint-web-part-by-using-a-designer.md) -remover sp13
#### <a name="vsto"></a>VSTO
**Artigos atualizados**
- [cenários de instalação do Visual Studio Tools para Office runtime](../vsto/visual-studio-tools-for-office-runtime-installation-scenarios.md) – atualizado o documento para incluir novas versões do Office
#### <a name="xaml-tools"></a>Ferramentas XAML
**Novos artigos**
- [usar dados de exemplo de tempo de design com o Designer XAML no artigo Visual Studio](../xaml-tools/xaml-design-time-sample-data.md) -novo criado | 55.481481 | 303 | 0.757009 | por_Latn | 0.989622 |
48c434f336fc935bf7463c18e0365e2a96c2ad83 | 2,066 | md | Markdown | docs/outlook/mapi/imapimessagesite-getformmanager.md | sloppyjuicy/office-developer-client-docs.fr-FR | 7eaaee254db929b89d8df6493d9b975aefbe7209 | [
"CC-BY-4.0",
"MIT"
] | 4 | 2020-05-19T18:52:25.000Z | 2022-03-26T23:53:12.000Z | docs/outlook/mapi/imapimessagesite-getformmanager.md | sloppyjuicy/office-developer-client-docs.fr-FR | 7eaaee254db929b89d8df6493d9b975aefbe7209 | [
"CC-BY-4.0",
"MIT"
] | 5 | 2021-07-19T21:24:40.000Z | 2021-12-08T02:52:10.000Z | docs/outlook/mapi/imapimessagesite-getformmanager.md | sloppyjuicy/office-developer-client-docs.fr-FR | 7eaaee254db929b89d8df6493d9b975aefbe7209 | [
"CC-BY-4.0",
"MIT"
] | 3 | 2019-10-13T18:11:35.000Z | 2021-07-19T20:46:56.000Z | ---
title: IMAPIMessageSiteGetFormManager
manager: soliver
ms.date: 03/09/2015
ms.audience: Developer
ms.topic: reference
ms.prod: office-online-server
ms.localizationpriority: medium
api_name:
- IMAPIMessageSite.GetFormManager
api_type:
- COM
ms.assetid: d48bd537-c562-4deb-8a4c-011208991054
description: Dernière modification le 9 mars 2015
ms.openlocfilehash: 16d98d92d825870b566f194ff2815c85c581434d
ms.sourcegitcommit: a1d9041c20256616c9c183f7d1049142a7ac6991
ms.translationtype: MT
ms.contentlocale: fr-FR
ms.lasthandoff: 09/24/2021
ms.locfileid: "59596217"
---
# <a name="imapimessagesitegetformmanager"></a>IMAPIMessageSite::GetFormManager
**S’applique à** : Outlook 2013 | Outlook 2016
Renvoie une interface de gestionnaire de formulaires, qu’un serveur de formulaires peut utiliser pour ouvrir un autre serveur de formulaires.
```cpp
HRESULT GetFormManager(
LPMAPIFORMMGR FAR * ppFormMgr
);
```
## <a name="parameters"></a>Paramètres
_ppFormMgr_
> [out] Pointeur vers un pointeur vers l’interface du gestionnaire de formulaires renvoyée.
## <a name="return-value"></a>Valeur renvoyée
S_OK
> L'appel a r�ussi et a renvoy� la valeur attendue ou les valeurs.
## <a name="remarks"></a>Remarques
Pour obtenir la liste des interfaces liées aux serveurs de formulaires, voir [MAPI Form Interfaces](mapi-form-interfaces.md).
## <a name="mfcmapi-reference"></a>Référence MFCMAPI
Pour voir un exemple de code MFCMAPI, consultez le tableau suivant.
|**Fichier**|**Fonction**|**Commentaire**|
|:-----|:-----|:-----|
|MyMAPIFormViewer.cpp <br/> |CMyMAPIFormViewer::GetFormManager <br/> |MFCMAPI utilise la méthode **IMAPIMessageSite::GetFormManager** pour appeler [MAPIOpenFormMgr](mapiopenformmgr.md) et renvoyer les résultats de cet appel. <br/> |
## <a name="see-also"></a>Voir aussi
[MAPIOpenFormMgr](mapiopenformmgr.md)
[IMAPIMessageSite : IUnknown](imapimessagesiteiunknown.md)
[MFCMAPI comme un exemple de Code](mfcmapi-as-a-code-sample.md)
[Interfaces de formulaire MAPI](mapi-form-interfaces.md)
| 28.30137 | 235 | 0.755566 | fra_Latn | 0.502287 |
48c44daa1bae6a32bfca550bf21edcac3242c46f | 5,334 | md | Markdown | docs/example_rule_set.md | drandysip/thinkbase_docs | 2cdc6b54539b9e7e1b81e54ac1f6d687896e2bdb | [
"MIT"
] | null | null | null | docs/example_rule_set.md | drandysip/thinkbase_docs | 2cdc6b54539b9e7e1b81e54ac1f6d687896e2bdb | [
"MIT"
] | null | null | null | docs/example_rule_set.md | drandysip/thinkbase_docs | 2cdc6b54539b9e7e1b81e54ac1f6d687896e2bdb | [
"MIT"
] | null | null | null | Example of creating a simple ruleset
===========
In this example we're going to turn a slightly tongue in cheek flowchart into a ruleset, and thus automatically into a questionnaire.
Karen Hao wrote an article in the MIT technology review called "[Is it using AI](https://www.technologyreview.com/s/612404/is-this-ai-we-drew-you-a-flowchart-to-work-it-out/)" and including the following flowchart.
It details a set of questions intended to establish whether a device or system contains some element of AI.

The first step is to list all the decision points in the flowchart, which correspond to inputs.
```darl
input categorical canitsee {yes,no};
input categorical canithear {yes,no};
input categorical canitread {yes,no};
input categorical canitmove {yes,no};
input categorical canitreason {yes,no};
input categorical identify {yes,no};
input categorical respond {yes,no};
input categorical transcribe {yes,no};
input categorical readingtype {yes,no};
input categorical readingpassages {yes,no};
input categorical readinganalysing {yes,no};
input categorical movebyitself {yes,no};
input categorical moveseeshears {yes,no};
input categorical movenotprogrammed {yes,no};
input categorical reasonbigdata {yes,no};
input categorical reasondecisions {yes,no};
```
All of the questions have yes no answers. I've given each decision point a darl type name.
Next we need two outputs.
```darl
output categorical firststep {cisee, cihear, ciread, cimove, cireason,nodefinition};
output categorical type {camera,wordproc,compvis,nlp,speech,mic,reading,robot,ml,math,nonreasoning,dumbbot, nothing};
```
The first output is an intermediary output. The flowchart is written so that one of the initial questions ought to be answered. Thereafter the other questions are called dependent on that first choice.
The second output is our result, and represents the message sent before the questionnaire terminates.
I've set a category for each terminating message.
The rules to process the first question are simple:
```darl
if canitsee is yes then firststep will be cisee;
if canithear is yes then firststep will be cihear;
if canitread is yes then firststep will be ciread;
if canitmove is yes then firststep will be cimove;
if canitreason is yes then firststep will be cireason;
if canitreason is no and canitsee is no and canithear is no and canitread is no and canitmove is no then firststep will be nodefinition;
```
As you can see it will ask the "can it see?", "Can it hear?" etc. questions and if none are yes it will set _firststep_ to _nodefinition_.
Finally we set the rules for the rest of the processing following the flowchart. There's one rule for each possible path.
```darl
if firststep is cisee and identify is yes then type will be compvis;
if firststep is cisee and identify is no then type will be camera;
if firststep is cihear and respond is yes then type will be nlp;
if firststep is cihear and respond is no and transcribe is yes then type will be speech;
if firststep is cihear and respond is no and transcribe is no then type will be mic;
if firststep is ciread and readingtype is yes and respond is yes then type will be nlp;
if firststep is ciread and readingtype is no and readingpassages is yes and readinganalysing is yes then type will be nlp;
if firststep is ciread and readingtype is no and readingpassages is no then type will be reading;
if firststep is ciread and readingtype is no and readingpassages is yes and readinganalysing is no then type will be reading;
if firststep is cimove and movebyitself is yes and moveseeshears is yes and movenotprogrammed is yes then type will be robot;
if firststep is cimove and movebyitself is yes and moveseeshears is yes and movenotprogrammed is no then type will be dumbbot;
if firststep is cimove and movebyitself is yes and moveseeshears is no then type will be dumbbot;
if firststep is cimove and movebyitself is no then type will be dumbbot;
if firststep is cireason and reasonbigdata is no then type will be nonreasoniing;
if firststep is cireason and reasonbigdata is yes and reasondecisions is yes then type will be ml;
if firststep is cireason and reasonbigdata is yes and reasondecisions is no then type will be math;
if firststep is nodefinition then type will be nothing;
```
This determines the logic of the process. We still need to set the text. This can be done via the [Darl text](https://darl.dev/rulesettext) page.

Finally the very last thing is required because we've included an intermediary output. These are very useful for forcing the rule set into a particular order. In this case we want to ensure one and only one of the first set of questions will be asked.
We don't need to output anything to the user for this output, but outputs are set to be visible by default.
to toggle this, go to [Darl format](https://darl.dev/rulesetformat) and set "hide" to true on the _firststep_ output.
You can find the full example in the default rule sets. You can try the ruleset out on the [rule evaluator page](https://darl.dev/darlevaluator).
| 59.266667 | 252 | 0.762842 | eng_Latn | 0.999634 |
48c48d4d85a5b3d7df23a8b9a567c8e9a4e7ee5c | 5,845 | md | Markdown | README.md | Qqwy/elixir_fun_land | 337a322ea4102e2170557dbee0a77903dba79927 | [
"MIT"
] | 47 | 2016-07-10T15:40:21.000Z | 2019-04-22T09:41:01.000Z | README.md | Qqwy/elixir-fun_land | 337a322ea4102e2170557dbee0a77903dba79927 | [
"MIT"
] | 34 | 2019-08-30T05:27:17.000Z | 2022-03-23T18:22:32.000Z | README.md | Qqwy/elixir_fun_land | 337a322ea4102e2170557dbee0a77903dba79927 | [
"MIT"
] | 3 | 2016-07-23T16:23:31.000Z | 2019-02-03T17:18:47.000Z | # FunLand
[](https://hex.pm/packages/fun_land)
[](https://travis-ci.org/Qqwy/elixir_fun_land)
FunLand adds Behaviours to define [Algebraic Data Types](https://en.wikipedia.org/wiki/Algebraic_data_type) ('Container' data types) to Elixir, including many helpful operations with them. Where applicable, an ADT implementation for Elixir's built-in types like Lists, Maps, Strings and Functions are included.
Also included are some implementations of commonly-used ADTs, for your leisure. _(These might be split off in their own library in the future)_
FunLand is based on ideas of the [Fantasy Land](https://github.com/fantasyland/fantasy-land) JavaScript specification for Algebraic Data Types, as well as the implementations of ADTs in other languages, such as [Haskell](haskell.org) and [Idris](http://idris-lang.org/).
FunLand attempts to use understandable names for the different behaviours and functions, to make ADTs as approachable to newcomers as possible.
### Pre-release version
As can be seen below in the roadmap, FunLand is not fully finished yet. New pre-release versions might introduce backwards-incompatible changes.
Mostly lacking are:
- Enough documentation.
- Tests for most of the example implementations in `FunLand.Builtin.*`.
### Changelog
- 0.10.0
- Fixes badly named module `Reducable` -> `Reducible`. Thank you, Eksperimental!
- Makes `Reducible.to_list/1` overridable so you can add your own implementation for it if you desire.
- 0.9.3 - Fixes bug that made it impossible to compile on Elixir 1.8.x
- 0.9.2 - Numbers v5.0.0 support
- 0.9.1 - Fixes dispatching of Builtin Structs to proper behaviour implementation modules. Adds Combinable and Reducable implementations for MapSet.
- 0.9.0 - Split off FunLandic to its own library.
- 0.8.0 - Important (backwards-incompatible) naming and functionality changes. Implementation of Traversable. Implementations for the SuccessTuple type.
### Roadmap
- [x] The most commong Algebraic Data Types, built as Behaviours that can be added to your own modules/structs:
- [x] *Mappable* - any structure you can `map` over: changing the contents without changing the structure.
- [x] *Appliable* - any Mappable structure you can combine two of, where the first contains a function to `apply_with` the contents of the second, returning a new strucure.
- [x] *Applicative* - any Appliable structure that can be created from any value you want to `wrap` inside.
- [x] *Chainable* - any Appliable structure that you can `bind` functions to, which, when given the contents of the structure, return a new version of the structure.
- [x] *Monad* - Anything structure that is both Applicative and Chainable, which makes them super flexible!
- [x] Monadic do-notation. (The implementation is heavily based on code from the [monad](https://github.com/rmies/monad) library. Lots of thanks!)
- [x] _let_ statements inside the monadic do-notation.
- [x] *Semicombinable* - Anything which, when you have two of them, you can `combine` them together into one.
- [x] *Combinable* - Anything that is Combinable, and also has a `neutral` value which you can combine something with when you don't have anything else, to keep the result the same.
- [x] *CombinableMonad* - Any structure that is both a Monad and Combinable.
- [x] *Reducible* - Any structure that can be `reduce`d to a single value, when given a Combinable (or alternatively, a starting value and a function to combine this with a single value inside the structure).
- [x] Traversable
- [x] Find out how to implement Traversable.traverse properly in a dynamically typed language. (How do you know what empty structure to return when being passed an empty structure?) -> Pass explicit extra parameter with result module.
- [x] Also, where to put these practical implementations? -> FunLandic.*
- [x] How to write proper code for the built-in types like List? (What to put in the monadic syntax? etc.)
- [ ] Catcheable exceptions instead of raised strings.
- [x] Implement some practical Algebraic Data Types to show what can be done with them:
- [x] List - the list we all know and love.
- [x] Maybe - either just filled with something, or empty (nothing inside)
- [x] Reader - store a state in a reader monad and refer to it only when you need it later on.
- [x] Writer - Keep a log of the things that happened alongside your computations.
- [x] A Custom Behaviour you can expand upon yourself, with your own log-appending mechanism.
- [x] IOListWriter, which logs using an IOList (an implementation of the writer behaviour that is useful in most common circumstances).
- [x] Sum - Combine any Mappable filled with numbers by summing them.
- [x] Product - Combine any Mappable filled with numbers by multiplying them.
- [x] Any - Combine any Mappable filled with booleans by checking if some property is true for at least one of them.
- [x] All - Combine any Mappable filled with booleans by checking if some property is true for all of them.
- [x] Either/Result - Contains two results, returns the first result of the two that is not empty.
- [x] SuccessTuple implementation of Either/Maybe! Wow!
- [ ] Fully write this readme.
- [ ] Extend documentation.
- [ ] More Fruit Salad explanations.
- [ ] Write as many tests as possible.
- [ ] Revisit+extend code examples.
### Later Future:
- [ ] Comonad
- [ ] Improve documentation, better fruit salad descriptions?
## Installation
The package is available on [hex](https://hex.pm/packages/fun_land) and can can be specified as a dependency by adding the snippet below in your `mix.exs`.
```elixir
def deps do
[{:fun_land, "~> 0.9.2"}]
end
```
| 67.183908 | 310 | 0.74799 | eng_Latn | 0.996206 |
48c4f6005dd0558fb6678884e6a320b2a6bc2fe2 | 78 | md | Markdown | src/README.md | moshix/Art1 | f7c7248bb250784d0f503862466899809ab241e7 | [
"MIT"
] | null | null | null | src/README.md | moshix/Art1 | f7c7248bb250784d0f503862466899809ab241e7 | [
"MIT"
] | null | null | null | src/README.md | moshix/Art1 | f7c7248bb250784d0f503862466899809ab241e7 | [
"MIT"
] | null | null | null | Backup copy of the unmodified Art1 source code by Richard Williams, 1968-1970
| 39 | 77 | 0.820513 | eng_Latn | 0.979026 |
48c5fb87a55566a42b584ebfc4bd8640edb70ef7 | 3,592 | md | Markdown | README.md | raghubir1991/-micado-scale-ansible-micado- | b78ac53629eb4ba6759331c602947108f9a23d9c | [
"Apache-2.0"
] | null | null | null | README.md | raghubir1991/-micado-scale-ansible-micado- | b78ac53629eb4ba6759331c602947108f9a23d9c | [
"Apache-2.0"
] | null | null | null | README.md | raghubir1991/-micado-scale-ansible-micado- | b78ac53629eb4ba6759331c602947108f9a23d9c | [
"Apache-2.0"
] | null | null | null | # MiCADO - autoscaling framework for Docker services on Cloud
This software was developed as part of the now completed [COLA project](https://project-cola.eu/). The University of Westminster (U.K.) and MTA SZTAKI (Hungary) will continue its open-source development as part of other research projects.
MiCADO is an auto-scaling framework for Docker applications. It supports autoscaling at two levels. At virtual machine (VM) level, a built-in Kubernetes cluster is dynamically extended or reduced by adding/removing Nodes hosted on cloud virtual machines. At container level, the number of replicas implementing a Docker Service is automatically increased/decreased. The application detailing the services, links and scaling rules must be specified by a TOSCA-based Application Description Template (ADT).
The MiCADO manual is hosted at https://micado-scale.readthedocs.io .
Manuals for MiCADO versions are as follows, and there is a very basic quick start guide below:
- [MiCADO v0.9.1-rev1](https://micado-scale.readthedocs.io/en/0.9.1-rev1)
- [MiCADO v0.9.1](https://micado-scale.readthedocs.io/en/0.9.1)
- [MiCADO v0.9.0](https://micado-scale.readthedocs.io/en/0.9.0)
- [MiCADO v0.8.0](https://micado-scale.readthedocs.io/en/0.8.0)
- [MiCADO v0.7.3](https://micado-scale.readthedocs.io/en/0.7.3)
- [MiCADO v0.7.2-rev1](https://micado-scale.readthedocs.io/en/0.7.2-rev1)
- [MiCADO v0.7.2](https://micado-scale.readthedocs.io/en/0.7.2)
- [MiCADO v0.7.1](https://micado-scale.readthedocs.io/en/0.7.1)
- [MiCADO v0.7.0](https://micado-scale.readthedocs.io/en/0.7.0)
- [MiCADO v0.6.1](https://micado-scale.readthedocs.io/en/0.6.1)
- [MiCADO v0.6.0](https://micado-scale.readthedocs.io/en/0.6.0)
- [MiCADO v0.5.0](https://micado-scale.readthedocs.io/en/0.5.0)
# Quick Start Guide
## Requirements
### 1x MiCADO Master
* 2 CPU / 4GB RAM / 20GB DISK
* Ubuntu 16.04, 18.04 or 20.04
* On a supported cloud
* AWS EC2
* CloudSigma
* CloudBroker
* OpenStack
* Microsoft Azure
* Google Cloud
### 1x Ansible Remote (or locally on Master)
* Ansible >= v2.8
* curl
* jq (for demos)
* wrk (for demos)
## Set-up
Clone the repository & prepare the credentials:
git clone https://github.com/micado-scale/ansible-micado micado
cd micado
git checkout v0.9.0
cp sample-hosts.yml hosts.yml
cp sample-credentials-cloud-api.yml credentials-cloud-api.yml
cp sample-credentials-micado.yml credentials-micado.yml
#option to login to private registry# cp sample-credentials-docker-registry.yml credentials-docker-registry.yml
Fill the *hosts* file with values for *ansible_host (Master IP)* and *ansible_user (SSH user)* and fill the *credentials-* files with usernames & passwords:
vim hosts.yml
vim credentials-cloud-api.yml
vim credentials-micado.yml
#option to login to private registry# vim credentials-docker-registry.yml
Run the playbook to completion:
ansible-playbook -i hosts.yml micado-master.yml
#### Now view the MiCADO Dashboard at https://<MiCADO_Master_IP>
## Testing
Prepare a demo by filling *_settings* with your MiCADO Master IP and user/pass:
cd demos/stressng
vim _settings
Fill the required fields (**ADD_YOUR_ID ...**) under the **worker-node** virtual machine with IDs from your cloud service provider, then run the test scripts:
cp stressng_<yourcloud>.yaml stressng.yaml
vim stressng.yaml
./1-submit-tosca-stressng.sh
./2-list-apps.sh
./3-stress-cpu-stressng.sh 85
Check out the Dashboard to see the test scale up, and undeploy when done:
./4-undeploy-stressng.sh
| 40.359551 | 504 | 0.73608 | eng_Latn | 0.71038 |
48c65171a024b81291a261eaac1bd01c89278532 | 14,718 | md | Markdown | _posts/hacknews/2021-01-11-hacknews.md | JJJJJJJerk/libragen.cn | 9cb47c82e626d13d68e559cd5c27adfd6a5ba552 | [
"MIT"
] | null | null | null | _posts/hacknews/2021-01-11-hacknews.md | JJJJJJJerk/libragen.cn | 9cb47c82e626d13d68e559cd5c27adfd6a5ba552 | [
"MIT"
] | 1 | 2020-07-18T11:03:19.000Z | 2020-07-19T03:09:19.000Z | _posts/hacknews/2021-01-11-hacknews.md | JJJJJJJerk/libragen.cn | 9cb47c82e626d13d68e559cd5c27adfd6a5ba552 | [
"MIT"
] | 13 | 2020-08-06T05:13:24.000Z | 2022-03-24T07:31:57.000Z | ---
layout: post
title: Hacknews2021-01-11新闻
category: Hacknews
tags: hacknews
keywords: hacknews
coverage: hacknews-banner.jpg
---
Hacker News 是一家关于计算机黑客和创业公司的社会化新闻网站,由保罗·格雷厄姆的创业孵化器 Y Combinator 创建。
与其它社会化新闻网站不同的是 Hacker News 没有踩或反对一条提交新闻的选项(不过评论还是可以被有足够 Karma 的用户投反对票);只可以赞或是完全不投票。简而言之,Hacker News 允许提交任何可以被理解为“任何满足人们求知欲”的新闻。
## HackNews Hack新闻
- [Member: Decentralized Twitter alternative, uncensorable, open source](https://member.cash/)
- `成员–不可审查的P2P去中心化社交媒体`
- [DeepSource (YC W20) Is Hiring a Go Engineer](https://deepsource.io/jobs/software-engineer-language-go-in/)
- `DeepSource(YC W20)正在印度聘请Go工程师(远程)`
- [Ecosia – A search engine that plants trees](https://www.ecosia.org/)
- `Ecosia –种植树木的搜索引擎`
- [Build Your Own Text Editor](http://viewsourcecode.org/snaptoken/kilo/)
- `建立自己的文字编辑器`
- [Chemistry of Cast-Iron Seasoning (2010)](http://sherylcanter.com/wordpress/2010/01/a-science-based-technique-for-seasoning-cast-iron/)
- `铸铁调味料的化学:基于科学的方法(2010)`
- [Cabal: A peer-to-peer, off-grid, community-first, hackable chat platform](https://cabal.chat/)
- `Cabal:点对点,离网,社区优先,可入侵的聊天平台`
- [The many lies about reducing complexity part 2: Cloud](https://ea.rna.nl/2021/01/10/the-many-lies-about-reducing-complexity-part-2-cloud/)
- `关于降低复杂性的许多谎言:第2部分:云`
- [Algorithms for Decision Making](http://algorithmsbook.com/)
- `决策算法`
- [NixOS Linux](https://nixos.org/)
- `NixOS Linux`
- [Foundations of Embedded Systems](https://f-of-e.org/)
- `嵌入式系统的基础`
- [GCC Rust: GCC Front-End for Rust](https://github.com/Rust-GCC/gccrs)
- `GCC Rust:用于Rust的GCC前端`
- [The Weirdness of Kentucky Route Zero (2016)](http://blog.joshhaas.com/2016/10/the-weirdness-of-kentucky-route-zero/)
- `肯塔基零号路线的怪诞(2016)`
- [The Early Development of Programming Languages (1976) pdf](http://bitsavers.trailing-edge.com/pdf/stanford/cs_techReports/STAN-CS-76-562_EarlyDevelPgmgLang_Aug76.pdf)
- `编程语言的早期发展(1976)pdf`
- [The Future of Libjpeg-Turbo](https://groups.google.com/g/libjpeg-turbo-announce/c/_H2BZDmSQWA/m/Fvy9sEByBwAJ?pli=1)
- `Libjpeg-Turbo的未来`
- [William Hogarth’s Satire on False Perspective (1754)](https://publicdomainreview.org/collection/william-hogarth-satire-on-false-perspective)
- `威廉·霍加斯(William Hogarth)对虚假观点的讽刺(1754)`
- [The Duct Tape Programmer (2009)](https://www.joelonsoftware.com/2009/09/23/the-duct-tape-programmer/)
- `风管磁带编程器(2009)`
- [GNOME has no thumbnails in the file picker and my toilets are blocked](https://jayfax.neocities.org/mediocrity/gnome-has-no-thumbnails-in-the-file-picker.html)
- `GNOME在文件选择器中没有缩略图(并且我的厕所被堵了)`
- [Quick Overview of Julia language pdf](http://algorithmsbook.com/files/appendix-g.pdf)
- `朱莉娅语言快速概述pdf`
- [St. Benedict’s Rule for Monasteries (516)](https://www.gutenberg.org/files/50040/50040-h/50040-h.html)
- `圣本尼迪克特修道院法则(516)`
- [Facebook buying ads for Messenger to be top result when you search for 'Signal'](https://twitter.com/signalapp/status/1348079223701794819/)
- `当您搜索“信号”时,Facebook为Messenger购买广告将是最佳结果`
- [What Silicon Valley gets about engineers that traditional companies do not](https://blog.pragmaticengineer.com/what-silicon-valley-gets-right-on-software-engineers/)
- `硅谷对工程师的了解是传统公司所不具备的`
- [FPGA dev board that's cheap, simple and supported by OSS toolchain](https://github.com/tinyvision-ai-inc/UPduino-v3.0)
- `廉价,简单且受OSS工具链支持的FPGA开发板`
- [Startpage.com: Privacy-oriented search engine](https://www.startpage.com/)
- `Startpage.com:面向隐私的搜索引擎`
- [2021 will demand new kinds of video conferencing](https://www.axios.com/video-conferencing-zoom-skype-meetings-119f5b65-4416-411f-9e65-b1f5b01c07a1.html)
- `2021年将需要新型视频会议`
- [Stripe bans Trump campaign](https://www.axios.com/payment-processor-stripe-bans-trump-campaign-0f55ff23-973b-4168-9f9c-0992b9a26d08.html)
- `条纹禁止特朗普竞选`
- [Discovering and exploring mmap using Go](https://brunocalza.me/2021/01/10/discovering-and-exploring-mmap-using-go/)
- `使用Go发现和探索mmap`
- [WhatsApp displays 404 not found when I send a link to Signal](https://www.dropbox.com/s/0t5venwty2oe2re/Screenshot%202021-01-10%20at%2022.50.34.png?dl=0)
- `当我发送到Signal的链接时,WhatsApp显示404找不到`
- [TV Tuner History](https://www.maximus-randd.com/tv-tuner-history-pt5.html)
- `电视调谐器的历史`
- [Rendering a Sphere on a Quad](https://bgolus.medium.com/rendering-a-sphere-on-a-quad-13c92025570c)
- `在四边形上渲染球体`
- [Turning to the past to power Windows’ future: An in-depth look at WinRT (2012)](https://arstechnica.com/features/2012/10/windows-8-and-winrt-everything-old-is-new-again/)
- `回顾过去,带动Windows的未来:深入了解WinRT(2012)`
- [Counter-Anti-Disintermediation](https://wiki.p2pfoundation.net/Counter-Anti-Disintermediation)
- `反反中间化`
- [Somerset cattle grid mistaken for wall by car sensors](https://www.bbc.co.uk/news/uk-england-somerset-55571080)
- `萨默塞特牛网格被汽车传感器误认为是墙`
- [Log Pattern Recognition: LogMine](https://sayr.us/log-pattern-recognition/logmine/)
- `日志模式识别:LogMine`
- [Applying Apple's Framework for Avoiding Mediocrity](https://www.sarthakjain.com/p/apples-framework-for-escaping-mediocrity?r=86tsj)
- `应用苹果公司的框架避免平庸`
- [The Impractical but Indisputable Rise of Retrocomputing](https://www.nytimes.com/2021/01/08/style/retrocomputing.html)
- `反计算的不切实际但无可争议的兴起`
- [Automated Symbolic Verification of Telegram's MTProto 2.0](https://arxiv.org/abs/2012.03141)
- `Telegram MTProto 2.0的自动符号验证`
- [YouTube bans Steve Bannon's podcast channel](https://www.businessinsider.com/youtube-bans-steve-bannon-war-room-podcast-rudy-giuliani-comments-2021-1)
- `YouTube禁止史蒂夫·班农(Steve Bannon)的播客频道`
- [Why we need wide adoption of social recovery wallets](https://vitalik.ca/general/2021/01/11/recovery.html)
- `为什么我们需要广泛采用社会恢复钱包`
- [Counter-Strike: Global Offensive Perfect World Edition](https://counterstrike.fandom.com/wiki/Counter-Strike:_Global_Offensive_Perfect_World_Edition)
- `反恐精英:全球进攻完美世界版`
- [Runtime improvement for Minimum Cut algorithm first time in 25 years (2019)](https://arxiv.org/abs/1911.01145)
- `25年以来首次实现最小切割算法的运行时改进`
- [Stanford pulls plug on the return of freshmen and sophomores to campus](https://www.mercurynews.com/2021/01/10/stanford-pulls-plug-on-the-return-of-freshmen-and-sophomores-to-campus/)
- `斯坦福大学阻止大一和大二学生返回校园`
- [I Can Tolerate Anything Except the Outgroup](https://slatestarcodex.com/2014/09/30/i-can-tolerate-anything-except-the-outgroup/)
- `我可以忍受除小组外的任何事情`
- [Autism Theory 25 Years in the Making](https://neurosciencenews.com/new-autism-theory-17548/)
- `自闭症理论诞生25年`
- [Malware on My Android Phone](https://www.beust.com/weblog/malware-on-my-android-phone/)
- `我的Android手机上的恶意软件`
- [Blërg, a microblogging platform](https://blerg.cc/)
- `Blërg,一个微博客平台`
- [The Acquisition of Handwriting in the UK](http://www.unask.com/website/handwriting/new_web_pages/acquisition.htm)
- `英国的笔迹收购`
- [The Confusing World of USB](https://fabiensanglard.net/nousb/index.html)
- `USB的混乱世界`
- [Cryptography Dispatches: The Most Backdoor-Looking Bug I’ve Ever Seen](https://buttondown.email/cryptography-dispatches/archive/cryptography-dispatches-the-most-backdoor-looking/)
- `密码学派遣:我见过的最多的后门漏洞`
- [The IBM 2321 Data Cell Drive (2010)](https://web.archive.org/web/20110720214958/https://www.columbia.edu/cu/computinghistory/datacell.html)
- `IBM 2321数据单元驱动器`
- [Energy Vault – Gravitational Batteries](https://energyvault.com/)
- `能源库–引力电池`
- [Parler Databases Disclosed](https://twitter.com/bitburner/status/1348558563019427842)
- `解析器数据库公开`
- [What Merpeople Say About Us](http://oceans.nautil.us/feature/660/what-merpeople-say-about-us)
- `人人对我们的评价`
- [Why Haskell is our first choice for building production software systems](https://www.foxhound.systems/blog/why-haskell-for-production/)
- `为什么Haskell是我们构建生产软件系统的首选`
- [Natural language generation: The commercial state of the art in 2020](https://www.cambridge.org/core/journals/natural-language-engineering/article/natural-language-generation-the-commercial-state-of-the-art-in-2020/BA2417D73AF29F8073FF5B611CDEB97F)
- `自然语言生成:2020年的商业发展水平`
- [Working Off-Grid Efficiently](https://100r.co/site/working_offgrid_efficiently.html)
- `高效地离网工作`
- [The great bicycle boom of 2020](https://www.bbc.com/future/bespoke/made-on-earth/the-great-bicycle-boom-of-2020.html)
- `2020年的自行车热潮`
- [Parler's user data may have been breached](https://twitter.com/thejeremyvine/status/1348595834762485763)
- `Parler的用户数据可能已被破坏`
- [Stealing Your Private YouTube Videos, One Frame at a Time](https://bugs.xdavidhu.me/google/2021/01/11/stealing-your-private-videos-one-frame-at-a-time/)
- `一次偷一帧,偷走您的私人YouTube视频`
- [iPhone 7 with dead NAND netbooting unmodified Ubuntu 20.04 via USB ethernet](https://old.reddit.com/r/linux/comments/kux9xx/success_iphone_7_with_dead_nand_netbooting/)
- `带有失效NAND网络的iPhone 7通过USB以太网引导未修改的Ubuntu 20.04`
- [This Year, Autonomous Trucks Will Take to the Road with No One on Board](https://spectrum.ieee.org/transportation/self-driving/this-year-autonomous-trucks-will-take-to-the-road-with-no-one-on-board)
- `今年,无人驾驶卡车将无人上路`
- [Governments spurred the rise of solar power](https://www.economist.com/technology-quarterly/2021/01/07/how-governments-spurred-the-rise-of-solar-power)
- `政府刺激了太阳能的兴起`
- [Setting goals for 2021 – A brief guide about personal goal setting](https://blog.doit.io/goal-setting/)
- `设定2021年的目标–有关个人目标设定的简要指南`
- [Choosing a Model for Your Open Source Business (2017)](https://snipe.net/2017/08/05/choosing-a-model-for-your-open-source-business/)
- `为您的开源业务选择模型(2017)`
- [Tim Berners-Lee wants to put people in control of their personal data](https://www.nytimes.com/2021/01/10/technology/tim-berners-lee-privacy-internet.html)
- `蒂姆·伯纳斯·李(Tim Berners-Lee)希望让人们掌控自己的个人数据`
- [IBM Palm Top PC110 video](https://www.youtube.com/watch?v=D-v6kyEDCNo)
- `IBM Palm Top PC110视频`
- [Chinese regulators to push tech giants to share consumer credit data](https://www.reuters.com/article/us-china-big-tech-data-exclusive/exclusive-chinese-regulators-to-push-tech-giants-to-share-consumer-credit-data-sources-idUSKBN29G0M4)
- `中国监管机构敦促科技巨头共享消费者信贷数据`
- [Zoom and the American Family](https://boyle.substack.com/p/can-zoom-save-the-american-family)
- `Zoom和美国大家庭`
- [How to Become a Data Engineer in 2021](https://khashtamov.com/en/how-to-become-a-data-engineer/)
- `如何在2021年成为一名数据工程师`
- [Is opening up your source code worth it? Terry Cavanagh thinks it was for VVVVVV](https://www.gamingonlinux.com/2021/01/is-opening-up-your-source-code-worth-it-terry-cavanagh-thinks-it-was-for-vvvvvv)
- `打开您的源代码值得吗? `
- [70TB of Parler users’ messages, videos, and posts leaked by security researchers](https://cybernews.com/news/70tb-of-parler-users-messages-videos-and-posts-leaked-by-security-researchers/)
- `被安全研究人员泄露的70TB Parler用户的消息,视频和帖子`
## HackShows Hacks展示
- [ Experimental Semantic Code Explorer](https://artifacts.bypaulshen.com/code-explorer/02/)
- `显示HN:实验性语义代码浏览器`
- [ v8-riscv — Port of JavaScript V8 engine to RISC-V](https://github.com/v8-riscv/v8)
- `显示HN:v8-riscv — JavaScript V8引擎到RISC-V的端口`
- [ I built an intercom for my 6 yo to keep us connected during quarantine](https://chordata.cc/blog/open-source-intercom-for-kids/)
- `Show HN:我为6岁的孩子建立了一个对讲机,以便在隔离期间保持联系`
- [ AI-generated framed prints artworks](http://uniqueaiart.com/)
- `AI生成的版画作品`
- [ I built a 4kb alternative to React, Vue, etc for building web UIs.](https://synergyjs.org)
- `我为构建Web UI构建了一个4kb的替代React,Vue等的替代品。`
- [ Deckmill – affordable, high quality, language-learning flashcards](https://deckmill.com/)
- `Deckmill –经济实惠的高质量语言学习卡片`
- [ Leet Resumes – a free technical resume-writing service](https://leetresumes.com/)
- `Show HN:Leet简历–免费的技术简历撰写服务`
- [ Ecco – See what your NLP language model is “thinking”](https://www.eccox.io/)
- `展示HN:Ecco –了解您的NLP语言模型在“思考”什么`
- [ Bufferi.ng: fake a bad connection on zoom](Https://www.bufferi.ng)
- `Bufferi.ng:伪造变焦不良连接`
- [ Fourhands is a P2P MIDI jam room for pianists](https://fourhands.jminjie.com/)
- `Show HN:Fourhands是钢琴家的P2P MIDI果酱室`
- [ Thumbnail.ai – Automatically generate thumbnails for your blog posts](https://thumbnail.ai/)
- `Thumbnail.ai –自动为您的博客文章生成缩略图`
- [ ThermOS – A DIY multi-zone homekit compatible thermostat](https://joetruncale.medium.com/thermos-d089e1c4974b)
- `ThermOS –兼容DIY的多区域homekit恒温器`
- [ Convier.me – A Calendar Service for Developers](https://convier.me)
- `Show HN:Convier.me –开发人员日历服务`
- [ DevBooks – Help Developers find indy books](https://thesmartcoder.dev/books/)
- `显示HN:DevBooks –帮助开发人员查找印书`
- [ Source for Helm chart that uses Ansible to set up a hardened WordPress](https://code.habd.as/comfusion/WordPress)
- `使用Ansible建立强化WordPress的Helm图表来源`
- [ JavaScript Program Synthesis](https://grgv.xyz/inductive_program_synthesis/)
- `JavaScript程序综合`
- [ JSON Graphs – Create Graphviz Visualizations with JSON Data](https://nounparse.com/)
- `JSON图–使用JSON数据创建Graphviz可视化`
- [ Aqua – Invest in Private Equity for a Lower Minimum Investment](http://investwithaqua.com)
- `Aqua –投资私募股权以降低最低投资额`
- [ JPEG.rocks – Privacy-aware JPEG optimizer built with WebAssembly](https://jpeg.rocks)
- `JPEG.rocks –使用WebAssembly优化JPEG图像`
- [ Array – A Better Python List](https://github.com/Lauriat/funct)
- `数组–更好的Python列表`
- [ Pmbuild: A simple, configurable and extendible build system for gamedev](https://github.com/polymonster/pmbuild)
- `Pmbuild:一个简单,可配置且可扩展的gamedev构建系统`
- [ Dataset of Sarcastic HN Comments](https://github.com/traghav/sarcasticHN)
- `讽刺HN数据集评论`
- [ Ephemere – End-to-end encrypted and ephemeral messaging](https://ephemere.app)
- `Ephemere –端到端的加密和临时消息传递`
- [ Vocabulary Learning Browser Extension](https://github.com/fertkir/vocabulary-to-google-sheet)
- `词汇学习浏览器扩展`
- [ Dexter, a Voice Controlled Assistant](https://github.com/iamsrp/dexter)
- `节目HN:Dexter,语音控制助手`
- [ A Gmail tool to trim away annoying mailing lists](https://trimbox.io/)
- `一个Gmail工具,可消除烦人的邮件列表`
- [ I built an app to amplify the voice of the customer](https://shieldvoc.com/)
- `我建立了一个应用程序来扩大客户的声音`
- [ We made a Discord community for sharing projects, finding co-founders](https://discord.com/invite/4naFT8d)
- `我们建立了一个Discord社区来共享项目,寻找共同创始人`
- [ Yet another iOS Hacker News client: Metalens](https://apps.apple.com/us/app/metalens/id1506654571?ls=1)
- `另一个iOS Hacker News客户:Metalens`
- [ Build a wall of testimonials with videos/tweets/text. Here is mine](https://testimonial.to/testimonial/all)
- `用视频/推文/文字构建推荐墙。`
- [ Using flamegraphs to read big HN threads](https://trungdq88.github.io/hn-big-threads/index.html)
- `使用火焰图读取HN大线程`
- [ CLI Heaviside text processing tool](https://github.com/mcastorina/heavi)
- `CLI Heaviside文本处理工具`
- [ To learn Clojure I made a “Spotify Wrapped”-like website for Goodreads](https://www.readingyear.com)
- `为了学习Clojure,我为Goodreads制作了一个类似“ Spotify Wrapped”的网站`
- [ Track live crypto prices across exchanges in your notification tray](https://cryptowale.com/)
- `在通知托盘中跟踪各交易所的实时加密货币价格`
| 64.270742 | 251 | 0.77001 | yue_Hant | 0.570278 |
48c6c1a26de27b3ac2b331e339018ef3aacab688 | 7,300 | md | Markdown | TEDx/Titles_starting_P_to_Z/WHAT_IS_A_UTOPIAN_CITY_Rodney_S_Tucker_AICP_TEDxEvansStreet.md | gt-big-data/TEDVis | 328a4c62e3a05c943b2a303817601aebf198c1aa | [
"MIT"
] | 91 | 2018-01-24T12:54:48.000Z | 2022-03-07T21:03:43.000Z | cleaned_tedx_data/Titles_starting_P_to_Z/WHAT_IS_A_UTOPIAN_CITY_Rodney_S_Tucker_AICP_TEDxEvansStreet.md | nadaataiyab/TED-Talks-Nutrition-NLP | 4d7e8c2155e12cb34ab8da993dee0700a6775ff9 | [
"MIT"
] | null | null | null | cleaned_tedx_data/Titles_starting_P_to_Z/WHAT_IS_A_UTOPIAN_CITY_Rodney_S_Tucker_AICP_TEDxEvansStreet.md | nadaataiyab/TED-Talks-Nutrition-NLP | 4d7e8c2155e12cb34ab8da993dee0700a6775ff9 | [
"MIT"
] | 18 | 2018-01-24T13:18:51.000Z | 2022-01-09T01:06:02.000Z |
what is urbanization urbanization is the
managed growth and development in
response to people there are several
elements associated with urbanization
the downtown sprawl and sprawl is the
outline residential developments they
rely on cars transportation low-impact
development and this is associated with
best management practice that deals with
stormwater during normal rain events
then you have urban design and
revitalization a revitalization consists
of downtown's neighborhoods corridors
small area plans but we're going to
focus on revitalization we're going to
look at alternative models for
neighborhood revitalization now
downtown's have reinvented themselves
over the years they're the places to
live eat work and shop they're the
attraction destination everyone on 1b
live in or near downtown and because of
the attractiveness everyone those
adjacent communities become the eye or
the target for revitalization now how
many you all probably remember musical
chairs you remember the excitement of
the chairs being circled up the music
playing and everybody really got into it
and nobody plays the game assuming
they're going to lose but eventually
that excitement mellows with
disappointment as each chair is removed
well unfortunately unintentionally
planning reviled reviled as a ssin for
neighborhoods or like musical chairs
when you announced the revitalization of
a community there are two camps one is
excited they're excited particular
cities two neighbors themselves the
residents themselves developers because
they get to see the removal of this
blight it boarded up houses
vacant lots filled with trash and the
promise of new homes new mixed income
development so typically the development
is done through hood the US Department
of Housing and Urban Development and a
number of CDBG funds which is Community
Development Block Grant funds home
investment program funds or utilized to
revitalize these areas and HUD has
teamed up with State Department of
Transportation to create Tiger and Tiger
stands for transportation investment
grant for economic recovery and what
they've done is marry transportation
with housing and this is an effective
solution to deal with transportation
particularly the sprawl we just talked
about and there's been some amazing
projects in the downtown as a result of
Tiger funds but now let's reimagine a
different approach what if Hood teamed
up with the Department of Labor to
create lion labor investment
opportunities for neighborhoods the goal
is to promote internal revitalization by
having the people themselves rebuild
their communities taking job
construction training in Marinette
revitalization housing now they become
principal parts of their communities now
many of these communities have
double-digit unemployment now let's take
a moment here to reflect many of the
tairy a ssin of neighborhoods is the
fact that there's under and unemployment
that creates the deterioration of those
communities so we we see the drugs the
crime the breakdown of family values
chemical dependency those are just the
symptoms it's a mere fact they're not
working in fact dr. William which is
William Wilson with the Harvard
professor in his book and work
disappears he utilizes Chicago as his
case study to demonstrate the traumatic
unemployment in his impact on Syria
neighborhoods
that's precisely what's going on in
Chicago but Lyon has two phases the
first phase is creating a training
process for the residents to be involved
and ready to rebuild their communities
and I mean ready to rebuild and the
success of the program hinges on
community assets and what are those
assets they are faith-based and
community-based organizations technical
colleges local governments former and
retired
craftsmen the plumber the brick mason
the electrician etc now the success the
building blocks of that process is going
to be the faith-based community why
because these are people who are engaged
in the community who built that trust
who built those types of relationships
as can get residents involved signed up
and recruited and mentor them to stay in
the program another essential part of
that is the former plumbers brick Masons
because many of these people live in
those communities or similar communities
and there are a great assets that help
in mentoring those along because they
can identify with the trainees and the
trainees with them now that we got
groups working
we got them processing and working they
they're ready to go now we got to get
them working so how do we do that this
is where cities the federal state
governments can use tax incentives like
building permit reductions reduction in
business license to encourage them if
they hire these lion graduates to
rebuild those communities to have them
actively involved in the process and
this will encourage them and community
development organizations or they call
Chodos Community Housing Development
organization to build affordable units
for teachers the waiter who you enjoy
meeting at your favorite restaurants and
coffee shops now also the program is
designed also to get absentee landlords
property owners to not raise rents once
the units are rebuilt is also gets them
involved too if they hire these folks
that rehab these units for for sale or
for rent and the whole rents at a
reasonable level and cities in town just
like they do for downtown's
can provide tax incentives rebates and
grants and this is encourage them to
participate in the process incentives to
also get them to use and rent to own
programs give folks an opportunity to
rent while they build their savings
while they complete home own buyer
education repair their credits but also
local governments can play an
instrumental role in holding taxes and
pre revitalization levels because this
allows the seniors long-term residents
to stay in their homes and not be
disrupted or moves because of higher
taxes and this process and program is
not only just fits within housing but it
also addresses commercial revitalization
in repairing old buildings building new
ones because a neighborhood is just not
about people and houses it's about the
services that render to the community
and they support those services so you
have a holistic approach so what are the
benefits the benefit is it Bill's pride
community pride because the resident
built and rebuilt their communities now
many of us built things with our hands
and we don't care how much is not the
better the next guy but it's ours and
when you have that in steel you do
everything to protect it it means
something to you then also you have
employment skills and their employment
so they can take those skills portable
elsewhere once the project is over then
it provides an opportunity to sustain
affordable housing and there is
opportunities for a variety of housing
for mixed income but
cities win also because it increased the
tax base by having new homes revitalize
housing new customers from water and
sewer and now you breathe new life and
dying and dead commercial corridors but
more importantly you slow or there's no
justification ladies and gentlemen when
the music stops this time there won't be
as many missing people and chairs thank
you
[Applause]
| 37.055838 | 45 | 0.827671 | eng_Latn | 0.999984 |
48c78fa2b1731bd6cf1957309d8e4f08ce980bbd | 363 | md | Markdown | _drafts/2010-11-14-more.md | bilardi/hello-world | 3366f5075c6d0a23499d32ed95634723113f6b08 | [
"MIT"
] | null | null | null | _drafts/2010-11-14-more.md | bilardi/hello-world | 3366f5075c6d0a23499d32ed95634723113f6b08 | [
"MIT"
] | 12 | 2016-11-22T22:18:43.000Z | 2019-11-22T23:36:10.000Z | _drafts/2010-11-14-more.md | bilardi/hello-world | 3366f5075c6d0a23499d32ed95634723113f6b08 | [
"MIT"
] | 1 | 2021-04-26T03:31:47.000Z | 2021-04-26T03:31:47.000Z | ---
id: 546
title: more
date: 2010-11-14T00:00:00+00:00
##author: biliards
layout: post
guid: http://ittips.pandle.net/2010/11/14/more-3/
permalink: /2010/11/14/more/
categories:
- unix
tags:
- command line
- viewer
---
**NAME**
more – file perusal filter for crt viewing **SYNOPSYS**
`more [-dlfpcsu] [-num] [+/ pattern] [+ linenum] [file ...]`
| 19.105263 | 63 | 0.647383 | eng_Latn | 0.174701 |
48c7a0796efea30419db0bab85aa4e2f5075eeb4 | 820 | md | Markdown | articles/quickstart/webapp/_includes/_rules-create-section.md | lexaurin/docs | cd9f417e844fa1c4fd695945f30f06f2ad5685e6 | [
"MIT"
] | null | null | null | articles/quickstart/webapp/_includes/_rules-create-section.md | lexaurin/docs | cd9f417e844fa1c4fd695945f30f06f2ad5685e6 | [
"MIT"
] | null | null | null | articles/quickstart/webapp/_includes/_rules-create-section.md | lexaurin/docs | cd9f417e844fa1c4fd695945f30f06f2ad5685e6 | [
"MIT"
] | null | null | null | To create a rule, go to the [New Rule](${manage_url}/#/rules/new) page. You can create a rule from scratch by selecting an empty rule, or you may use one of the existing templates. These templates are written by Auth0 to cover common scenarios and use cases.
For this example, select the **Add country to the user profile** rule.

This rule extracts the `country_name` from the `context` and adds it to the user profile as a new `country` attribute.

This is just the beginning, as you can edit the rule to meet your business needs. Once complete, click **Save**. The rule will execute any time a user logs in, and the country will be added to the user's profile.
| 68.333333 | 258 | 0.763415 | eng_Latn | 0.999009 |
48c81096caa702d41e7be6273e85e933cb9d4ae4 | 14,338 | md | Markdown | templates/leflan/language_kabardian.md | parryc/thevoid | 0a79a2ed534bc8b33fdb73774ed2984836fe2cce | [
"MIT"
] | 1 | 2015-12-22T19:33:21.000Z | 2015-12-22T19:33:21.000Z | templates/leflan/language_kabardian.md | parryc/thevoid | 0a79a2ed534bc8b33fdb73774ed2984836fe2cce | [
"MIT"
] | 26 | 2015-09-07T04:29:10.000Z | 2021-10-19T13:10:46.000Z | templates/leflan/language_kabardian.md | parryc/thevoid | 0a79a2ed534bc8b33fdb73774ed2984836fe2cce | [
"MIT"
] | null | null | null | [TOC]
# This is a big work in progress!
# Introduction
I would like to first thank Dr. Нэзэр Хьамыт for his time spent teaching a few of us Kabardian and patiently listening to us – at midnight his time! – all make pronunciation mistakes over and over again. Kabardian is a language that is more interesting to linguists than it is for pedagogues, and as such, there are few materials aimed at a Kabardian as a Second Language learner. Even less so after the untimely passing of Amjad Jaimoukha, may he rest in peace.
With this in mind, it's important to mention a few things about these notes. First, because there are no standard teaching materials (at least in English) and there are wide variety of dialects (Adyge-influenced Kabardian, diaspora Kabardian etc.), spellings may be off from what is found in the dictionary. This occurs most often with vowels, where ы/э/а can vary.
As such, this is my attempt to distill what little I have learned into something that approaches a resource for learners rather than for linguists. If you see any mistakes below, have suggestions, or have questions, please do not hesitate to reach out at _parry_ `@` _parryc.com_.
# Notes about Cyrillic
й + а will become я (flesh out other examples)
For example, the PST is -ащ. If the stem of a verb ends in й, then we get a scenario like this: жейн - жей - жейащ - жеящ.
# Nouns
## Case Marking
Kabardian is a ergative language, meaning that the subject of an intransitive verb and the object of a transitive verb share the same case marking (absolutive/ABS). Subjects of a transitive verb have a different marking (oblique/OBL).
However, only _definite_ nouns are marked. Thus, names or things where English speakers would use "the". Otherwise, there are no case markings on the noun.
ABS marking - `-р`
OBL marking - `-м`
Note that some resources call the case marking for the subject of a transitive verb the ergative case. In Kabardian, at least, this marking is also serves many other functions, so I will follow the style of calling it the oblique case.
-уэ adverbial case?
## Pronouns
### Personal
Number | NOM | POSS | DAT
-------|--------|--------|-----
1s. | |сысейр |
2s. | |ууейр |
3s. | | |
1p. | | |
2p. | | |
3p. | | |
### Demonstrative
| near | far
-------|------|------
sg | мы | мор
pl | мыхэр| мохэр
## Possessive
3rd person possession is done using the following form: {possessor}-(ы)м и {possessed}-(ы)р.
# Suffixes
Suffixes come before the noun case marking.
-и
: too, as well, also
-ри/рэ
: and
-хэ
: plural
## The Oblique Case (-м)
This _м_ does a lot of things.
1. Marks the subject of a transitive verb
2. During/on/at/for a time
3. In a month
--EX--
Блыщхьэм адыгэбзэ зэдгъащӀэу диӀэнущ.
On Monday, we will have a class for learning Kabardian // Блыщхьэ-м:Monday-on
Сэ мэкъуауэгъуэм сыкъалъхуащ.
I was born in June. // мэкъуауэгъуэ-м:June-in
--ENDEX--
# Adjectives
Nouns proceed adjectives. For example, in <ex>Нарыч чыцӀ цӀыкӀур сгъашхэ ⧸ Narich is feed the small goat</ex>, `чыцӀ:goat` comes before `цӀыкӀу:small`. `-р` is appended because it is _the_ small goat being fed, rather than _a_ small goat.
# Verbs
Verbs are complex in Kabardian, not just because everyone tells you they are, but because a _lot_ goes into each verb. Take for example the English phrase "I will not be able to join you". This phrase, 8 words long, is a single verb in Kabardian.
{сыныхэхьэфынукъым<br/>_I will not be able to join you_}
**сы**|**ны**|**хэхьэ**|**фы**|**нукъым**
1SG|towards listener|to join|able|NEG.FUT.DEF
{/}
As a result, this section, more so than others, will be a constant work in progress.
## Person
Similar to other ergative languages, like [/r/learns/k'iche'](K'iche'), there are two sets of person markers. The first set is used for the person who matches the subject of an intransitive verb or the person who matches the object of a transitive verb.
|SG |PL
-|---------|--
1|сы- | ды-
2|у- | ф-
3|∅/мэ/ма- | ∅/мэ/ма-
The second set match the subject of a transitive verb.
|SG |PL
-|---------|--
1|с/з- | д-
2|у/б- | ф-
3|и/р- | я-
Though I have not seen it called out explicitly, it appears that for indirect objects, it is also (perhaps obligatorily?) possible to have пэ- and вэ- in 2SG and 2PL respectively when both sides are vowels. Or when followed by an unvoiced consonant? Such as ттхыгъэ -- we write. (гъэ??) Applebaum 2013 also lists п as a 2sg, but does not list т, which appears Шхапацева. This may be an alternative form to ды- used in Turkish Kabardian (see also www.circassiancenter.com/cc-turkiye/edebiyat/dil_egitimi/13_dilegitimi-28.htm)
_р_, "[i]n the 3rd person singular [...] denotes the indirect object (usually the Recipient)."<cite>Matasović, 37</cite>
Additionally, you may find that for oblique roles (such as indirect object), the vowel will change from _ы_ to _э_.
Since Kabardian verbs mark multiple people in the verb, one must also be aware of the ordering of such markers when parsing a verb. The order will always be subject of intransitive verb/object of transitive verb – indirect object – subject of transitive verb. Thus, <ex>Абы сэ yэ yкъызeтaщ ⧸ He gave you to me</ex>, where we can decompose the verb as `y-къы-з-e-т-a-щ`.
{yкъызeтaщ}
**у**|**къы**|**з**|**е**|**т**|**а**|**щ**
2SG (DO)|direction|1SG (IO)|3SG (S)|give|PST|AFF
{/}
So taking our bread examples (ed. now moved below, reword), it is straightforward to see that since this is a transitive verb (someone is doing something to something else), that we use the transitive prefixes. Only thing to note is that _е_ is functioning as _и_ + _о_.
It appears that copular sentences suffix -щ to the end of the noun? Matasović says it is the "affirmative". Used with "stative verbs" – basically any copular phrase. I am a professor == I am professoring -> сэ сыпрофeссорщ (I 1SG-professor-{is})
Дэ ды еджакӀуэщ. We are students.
However, what's up with man in Сэ сы ц1ыхухьущ: I am a man.
Which aspect is this?
сэ сыщолъ: i recline (as a habit)
сэ сыщылъщ: i am reclining (now)
The prefix ма- is typically used in the present tense, with intransitive verbs which have only one expressed argument (Matatsović)
## Vowels??
Still can't figure out the vowels. I think transitivity changes this some how and I'm not totally sure yet.
сещӀащ --> ещӀэн:to swing (this is in the dictionary as to make sth... not to swing :shrug:)
сищӀащ --> щӀэн: to do
сыкӀуащ vs. сокӀуащ ?? I went vs. I go?
## Tenses
### Infinitive -(э)н
This is also the dictionary form. Thus `шхэн:to eat`, with _шх_ as the root.
### Imperative -т/-∅
### Present Tense -∅
The present tense drops the _-эн_ of the infinitive and prefixes person markers with _о_ as the intermediary vowel. Compare Сэ сыжэрэ - I am (one who is) running vs. сэ сожэ - I am running.
Сэ щӀакхъуэ сошх: I am eating bread
Уэ щӀакхъуэ бошх: You are eating bread
Абы щӀакхъуэ ешх: S/he is eating bread
Дэ щӀакхъуэ дошх: We are eating bread
Фэ щӀакхъуэ фошх: You all are eating bread
Ахэм щӀакхъуэ яшх: They are eating bread
What's up with the vowel changing from infinitive to present tense? бэнэн:to bark (in dictionary) but мэбанэ:it's barking in PRS. Similar with мэкъакъэ vs. къэкъэн. (clucking vs. cluck). If I had to hazard a guess, it is from when the verb is derived from a noun. псалъэ word, псэлъэн:to speak, same thing applies to the prior examples.
### Past Tense -ащ
In this example, http://www.circassiancenter.com/cc-turkiye/edebiyat/dil_egitimi/13_dilegitimi-02.htm, the final щ is dropped when asking a question.
Prestem vowel is ы. Does not appear in 3SG
there are 3 past tenses, though I think only 2 are really used
-эри "has an important result" compared with -ащ
-ати when something happens once?
сэри дэрбзэрым сыкӀуэри сыхуэмыхъужу сӀиэ гъуэнщӀэджыр езгъэгъэбыхъуащ
I went to the tail and had my pants enlarged. (Not sure what сыхуэмыхъужу is -- my small something?)
### Future Tense
#### Definite Future -нщ
It looks like й becomes и, Сэ сыжеинщ I will sleep
## Person Marking
All parts of a sentence – subject, direct object, indirect object – can be marked on the verb. In many cases, the person will also be a standalone pronoun in the sentence. However, while this pronoun can be dropped, the person marker cannot be dropped.
For example, for the verb `псалъэн:to speak`:
* Сэ сопсалъэр – I am speaking with you.
* Уэ укъызопсалъэр – You are speaking with me.
* Ар къызопсалъэ – S/he is speaking with me.
_къ(ы/э)_ indicates action towards the speaker. I don't yet know what _-р_ is doing at the end of the 1st and 2nd examples.
Щынэр къызоплъ - the lamb looks at me плъэн
Сэ щынэм соплъ – I look at the lamb
## Verbal Prefixes
Can be э or ы as the vowel, ex хэ/хы and нэ/ны. If the root has a directional prefix make sure to check the dictionary under both vowels (ex. someone may say хэхьэн, but the dictionary will list it under `хыхьэн:to go into`.) This may be a Turkish dialetical variation?
къ(ы)
: towards the speaker
## Verbal Suffixes
-эншэ
: without.
-къуэ
: overly, excessively.
-щ
: affirmative sentence (it seems like this can be dropped more more often than Jaimoukha says, esp. for positive PRS verbs)
-ын/эн
: infinitive.
## Negation
-м- infix: NEG, хуей:want -- хуэмей:don't want, see also екӀу:good behavior vs. емыкӀу:bad behavior
## Participles (-рэ/∅)
A particple in PRS is formed by appending _-рэ_ to the base form (non-infinitive) of the verb. In PST and FUT, it is simply the base form of the verb. Thus, `жэн:to run` becomes `жэ:run` and then `жэрэ:the one who is running`. This is also the same as the question marker.
# Numbers
## Ordinal Numbers
Ordinal numbers 1-19 are formed from cardinal numbers with the suffixes `е-` and `-анэ`. In the case where the cardinal number ends with a vowel, the vowel is dropped. Thus, `зы:one` becomes `езанэ:first`.
## Distributive Numbers
Such as "one by one", or "two by two", these are formed by suffixing the reverse of the number on to the number with _р_. Thus, "one by one" becomes `зы:one` + `ыз:'eno'` = `зырыз`.
## Fractional Numbers
Fractions are formed by denominator + _нэ/и_ + first consonant of numerator. When the numerator is one, then no additional syllables are suffixed. Thus, `плӀанэ:1/4` and `плӀанищ:3/4`, where _щ_ is the first letter of `щы:three`.
# Sentence Structures
## Simple Sentences
There is no copula in Kabardian, that is, there is no specific verb for "to be". In its most simple form, to say something is something, place the two words next to each other. Thus, <ex>_Ажэ хужь_ ⧸ The goat is white</ex>.
One could also think of the suffix _-щ_ as form of "to be", since it often found at the end of simple "to be" sentences. In linguistic papers, it is often referred to as the affirmative (i.e. denotes a non-negative statement). For example, <ex>_Мыр мэзщ_ ⧸ This is a forest</ex>.
## Questions (-рэ)
-рэ is appended to the last work (usually a verb)... I think?
Уэ сыт узэджэрэ? what are you reading?
зы тхылъ уэджэрэ? are you reading the book?
зыгуэр уэджэрэ? did you read anything?
This appears to not take the same subject markers. Ex. сыжэрэ? am I running vs. сожэ I am running. Similarly, ма is not added for 3SG questions
## Possession (и)
Possession is indicated by the word `и:'s`, which by the gloss, can be thought of as _'s_. That is, it always follows the possessor, which is marked with ERG (_-м_) and the possessed always comes after. For example, <ex>СЩАМ и Аласка ⧸ USA's Alaska</ex>.
## Saying And (икӀи, -и, -рэ...-рэ)
There are three different ways to say "and" in Kabardian.
1. икӀи: for use between clauses
2. -и: ? not sure on this one, maybe it actually means "too"
3. -рэ...-рэ: for a list of objects
## How about x? (...щэ?)
Added at the end of a sentence, it gives the sense of "how abobut {sentence}". It is an abbreviated form of `дапщэщ:when`.
## Liking things
мы усэр икъукӀэ сигу ирихьащ
this poem.ERG very heart-1sg.POSS (?like?).PST
I liked this poem very much.
* this form, сигу ирихьащ is used for liking something once. E.g. I liked this poem (it was read once, I liked it). vs. the below which indicate more static liking.
хьэр фӀуэ слъагъукъым
I don't like dogs
сэ унэм хьэ щапӀу сыфӀэфӀкъым
I don't like raising dogs at home
# Postpositions
пащхьэ
: in front of, жьэгу пащхьэ in front of the hearth
# Time
## Days of the Week
The Kabardian weeek starts on Monday
* блыщхьэ - Monday
* гъубж - Tuesday
* бэрэжей - Wednesday
* мэхуэку - Thursday
* мэрем - Friday
* щэбэт - Saturday
* тхьэмахуэ - Sunday
# Idioms
Псым хэлъ мывит1 пэтрэ зонт1э1у.
: "Even two stones in the water may hit each other." Even two people who are close may fight.
Си псалъэ т1о жы1экъым, си жы1э т1о 1уатэкъым.
: "I don't speak twice and no comment is made."
Узэпатэк1ыр къопагэк1ыж.
: The one youd on't like will never like you.
Уигу къызэбгъэмэ, уи анэ джэдыбгъэ къэзышх.
: "Your mother will eat chicken if you offer it."
Узыщыгугъур уи дауэгъущ.
: "The person you trust is also your opponent."
Уи шыр умыгъэжакъуэ, уи хьэр умыгъэшхакъуэ.
: "Don't run too much on your horse, don't over feed your dog." Dogs and horses have different roles, don't over exert them.
Ф1ыгъуэм еф1эк1ыжыр зэгуры1уэщ.
: "It's the union that increases the good."
# Miscellaneous
Family names come first
г is often found in diaspora, versus ж in russia, ex.
игири:again vs. ижири:again (spelling?)
# Sentences to analyze
Налшык уес къыщеса?
: Is there snow in Nalchik?
Уэшх къешхын
: The rain rains (it is raining)
Мэгъэрейгъэм
: In this year (?)
сэлӀэлӀэнущ
: I will try
пыӀэ алъыжь зыщыгъ
: the teenager in the red hat
сезэшащ
: I am tired
сыт пщӀар апхуэдизу уезэшыну?
: What did you do to make you tired?
Уэ дэтхэнэ мазэра укъыщалъхуар?
: When were you born? (maybe, which month were you born?) cf. example sentence under obl for changes in the verb)
Сэ щакӀуэгъуэ мазэм сыкъалъхуащ.
: I was born in November.
Пэррй къызэупщӀащ
: Parry asked
зэдыдошх
: we eat together/we each eat one (distributive?)
ХьэтӀутӀ къэбэрдейм лӀо къыщӀэкӀур?
: Why does Hatut live in Kabardia?
# ???
is to sleep жейн (on circassian center lessons) or жеин (in dictionary) or both? | 36.764103 | 524 | 0.728763 | eng_Latn | 0.99788 |
48c92407ac961ab62725fd87c574445802f01be6 | 9,928 | md | Markdown | intl.en-US/API Reference/Security groups/AuthorizeSecurityGroup.md | chalersgam/ecs | 1c5c2a19b5c73b60579c43e22da83f7ecf168c81 | [
"MIT"
] | null | null | null | intl.en-US/API Reference/Security groups/AuthorizeSecurityGroup.md | chalersgam/ecs | 1c5c2a19b5c73b60579c43e22da83f7ecf168c81 | [
"MIT"
] | null | null | null | intl.en-US/API Reference/Security groups/AuthorizeSecurityGroup.md | chalersgam/ecs | 1c5c2a19b5c73b60579c43e22da83f7ecf168c81 | [
"MIT"
] | null | null | null | # AuthorizeSecurityGroup {#AuthorizeSecurityGroup .reference}
Adds an inbound rule to a security group. This action permits or declines the inbound traffic from other devices to the instances that are in a specified security group.
## Description {#Description .section}
We define the beginning of the traffic as the source, and the terminal of the traffic as the destination, see the following picture.

When you call this interface, consider the following:
- You can add up to 100 authorization rules to one security group.
- You can set the authorization policies to `accept` or `drop`.
- The `Priority` of a security group ranges from 1 to 100. Here, smaller the number, higher the priority is.
- If the priorities of several authorization rules are the same, `drop` rules take the precedence.
- The source device can be an instance with the specified IP address range \(`SourceCidrIp`\) or an instance in another security group \(`SourceGroupId`\).
- Use the following two sets of parameters to add a security group rule. If one rule already exists according to the two sets of parameters, the `AuthorizeSecurityGroup` fails.
- To set the access permission of an IP address range, for example, [Request example 1](#): `IpProtocol`, `PortRange`, \(Optional\) `SourcePortRange`, `NicType`, `Policy`, \(Optional\) `DestCidrIp` and `SourceCidrIp`.
- To set the access permission of instances that are in another security group, for example, [Request example 2](#): `IpProtocol`, `PortRange`, \(Optional\) `SourcePortRange`, `NicType`, `Policy`, \(Optional\) `DestCidrIp`, `SourceGroupOwnerAccount`, `and SourceGroupId.`
## Request parameters {#RequestParameter .section}
|Name|Type|Required|Description|
|:---|:---|:-------|:----------|
|Action|String|Yes| The name of this interface. Value: AuthorizeSecurityGroup.|
|RegionId|String|Yes|The region ID. For more information, see Regions and zones, or call [DescribeRegions](reseller.en-US/API Reference/Regions/DescribeRegions.md#) to obtain the latest region list.|
|SecurityGroupId|String|Yes|The ID of the destination security group.|
|IpProtocol|String|Yes|The transport layer protocol. These values are case-insensitive. Optional values:- tcp
- udp
- icmp
- gre
- all
|
|PortRange|String|Yes|The range of destination port relevant to the transport layer protocol. Optional values:- For TCP/UDP protocol, \[1, 65535\]. You can use a forward slash \(/\) to separate the port range, expected sample: `1/200`, incorrect sample: `200/1`.
- For ICMP protocol, -1/-1.
- For GRE protocol, -1/-1.
- If the `IpProtocol` is set to `all`, the value is -1/-1.
|
|SourcePortRange|String|No|The range of source port relevant to the transport layer protocol Optional values:- For TCP/UDP protocol, \[1, 65535\] . You can use a forward slash \(/\) to separate the port range, expected sample: `1/200`, incorrect sample: `200/1`.
- For ICMP protocol, -1/-1.
- For GRE protocol, -1/-1.
- If the `IpProtocol` is set to `all`, the value is -1/-1.
|
|NicType|String|No|The network interface type. Optional values:- internet: Internet network interface.
- intranet: Internet network interface.
In mutual security group authorization, while `SourceGroupId` is specified and `SourceCidrIp` is not specified, you must specify `NicType` as `intranet`. Default value: internet.|
|Policy|String|No|The access permission. Optional values:- accept: Allows the access.
- drop: Declines the access, and sends no response to the source device.
Default value: accept.|
|DestCidrIp|String|No|The destination IP address range. Only CIDR and IPv4 format are supported. Default value: Null.|
|SourceCidrIp|String|No|The source IP address range. Only CIDR and IPv4 format are supported. Default value: Null.|
|SourceGroupId|String|No|The source security group ID. Either the `SourceGroupId` or `SourceCidrIp` parameter must be set.If the `SourceGroupId` is specified and `SourceCidrIp` is not specified, the `NicType` must be set to `intranet`.
If both the `SourceGroupId` and `SourceCidrIp` parameters are set, `SourceCidrIp` is authorized by default.
|
|SourceGroupOwnerAccount|String|No|The Alibaba Cloud account of the source security group.- If the `SourceGroupOwnerAccount` and `SourceGroupOwnerID` are not set, authorization is performed for your other security groups.
- If the `SourceCidrIp` is already set, the `SourceGroupOwnerAccount` is invalid.
|
|SourceGroupOwnerId|String|No|The Alibaba Cloud account ID of the source security group.- If the `SourceGroupOwnerId` and `SourceGroupOwnerAccount` are not set, authorization is performed for security groups of the same account.
- If the `SourceCidrIp` is already is set, the `SourceGroupOwnerId` is invalid.
|
|Priority|String|No|The authorization policy priority. Value range: \[1, 100\]. Default value: 1.
|
|Description|String|No|The security group rule description, which can contain up to 512 characters.|
## Response parameters {#section_px3_2g1_ydb .section}
All are common response parameters. See [Common response parameters](../reseller.en-US/API Reference/Getting started/Common parameters.md#commonResponseParameters).
## Examples { .section}
**Request example 1**
Grant access permission to a specified IP address range. You can set the`NicType` for a classic network-connected security group to `internet` or `intranet`. The `NicType` of a VPC-Connected security group can be set to `intranet` only.
```
https://ecs.aliyuncs.com/?Action=AuthorizeSecurityGroup
&SecurityGroupId=sg-F876FF7BA
&SourceCidrIp=0.0.0.0/0
&IpProtocol=tcp
&PortRange=1/65535
&NicType=intranet
&Policy=Allow
&<Common Request Parameters>
```
**Request example 2**
Grant the access permission of another security group. The `NicType` can be set to `intranet` only. For mutual accesses between classic network-connected security groups, you can set the permission for another security group in the same region to access your security group. This security group can be yours or belong to other `SourceGroupOwnerAccount`. For mutual accesses between VPC-Connected security groups, you can set the permission for another security group in the same VPC to access your security group.
```
https://ecs.aliyuncs.com/?Action=AuthorizeSecurityGroup
&SecurityGroupId=sg-F876FF7BA
&SourceGroupId=sg-1651FBB64
&SourceGroupOwnerAccount=test@aliyun.com
&IpProtocol=tcp
&PortRange=1/65535
&NicType=intranet
&Policy=Drop
&<Common Request Parameters>
```
**Response example**
**XML format**
```
<AuthorizeSecurityGroupResponse>
<RequestId>CEF72CEB-54B6-4AE8-B225-F876FF7BA984</RequestId>
</AuthorizeSecurityGroupResponse>
```
**JSON format**
```
{
"RequestId":"CEF72CEB-54B6-4AE8-B225-F876FF7BA984"
}
```
## Error codes {#ErrorCode .section}
|Error code|Error message|HTTP status code|Meaning|
|:---------|:------------|:---------------|:------|
|InvalidIpProtocol.Malformed|The specified parameter “PortRange” is not valid.|400|The specified `IpProtocol` is invalid.|
|InvalidPriority.Malformed|The specified parameter “Priority” is not valid.|400|The specified `Priority` is invalid.|
|InvalidSourceCidrIp.Malformed|The specified parameter “SourceCidrIp” is not valid.|400|The specified `SourceCidrIp` is invalid.|
|InvalidDestCidrIp.Malformed|The specified parameter “SignatureVersion” is not valid.|400|The specified `DestCidrIp` is invalid.|
|InvalidPolicy.Malformed|The specified parameter “Policy” is not valid.|400|The specified `Policy` is invalid.|
|InvalidNicType.ValueNotSupported|The specified NicType does not exist.|400|The specified `NicType` does not exist.|
|InvalidSourceGroupId.Mismatch|Specified security group and source group are not in the same VPC.|400|The network type of the specified destination security group is VPC, so the source security group must be VPC-connected.|
|InvalidNicType.Mismatch|Specified nic type conflicts with the authorization record.|400|The specified `NicType` is invalid.|
|InvalidSourceGroup.NotFound|The specified SourceGroupId does not exist.|400|The specified `SourceGroupId` does not exist.|
|InvalidPriority.ValueNotSupported|The specified Priority is invalid.|400|The specified `Priority` is invalid|
|InvalidSecurityGroupDiscription.Malformed|The specified security group rule description is not valid.|400|The specified `Description` is invalid.|
|OperationDenied|The specified IpProtocol does not exist or IpProtocol and PortRange do not match.|400|The specified `IpProtocol` does not exist. Or the specified IP protocol and port range do not match.|
|AuthorizationLimitExceed|The maximum number of authorization rules in the security group is exceeded.|403|You cannot add more than 100 authorization rules to one security group.|
|InvalidSourceGroupId.Mismatch|NicType is required or NicType expects intranet.|403|You must specify `NicType`. Or the `NicType` must be set to `intranet`.|
|InvalidNetworkType.Mismatch|The specified SecurityGroup network type should be same with SourceGroup network type \(vpc or classic\).|403|The network type of the security group must be the same.|
|InvalidParamter.Conflict|The specified SecurityGroupId should be different from the SourceGroupId.|403|The `SecurityGroupId` and `SourceGroupId` cannot be the same security group.|
|MissingParameter|The input parameter “SourceGroupId” or “SourceCidrIp” cannot be both blank.|403|You must specify `SourceGroupId` or `SourceCidrIp`.|
|InvalidSourceGroupId.NotFound|The SourceGroupId provided does not exist in our records.|404|The specified `SourceGroup` does not exist.|
|InvalidSecurityGroupId.NotFound|The specified SecurityGroupId does not exist.|404|The specified `SecurityGroupId` does not exist.|
|InvalidRegionId.NotFound|The specified RegionId does not exist.|404|The specified `RegionId` does not exist.|
| 60.536585 | 513 | 0.773268 | eng_Latn | 0.942093 |
48c9813e5d132b9a1b757d6d7a7c154a086f52ac | 831 | md | Markdown | README.md | gojoshyi/ReplaceAnchorHrefs | 275bda1e8da62cc0971b6175f1d758bb8f9a85e5 | [
"MIT"
] | null | null | null | README.md | gojoshyi/ReplaceAnchorHrefs | 275bda1e8da62cc0971b6175f1d758bb8f9a85e5 | [
"MIT"
] | null | null | null | README.md | gojoshyi/ReplaceAnchorHrefs | 275bda1e8da62cc0971b6175f1d758bb8f9a85e5 | [
"MIT"
] | null | null | null | # Replace Anchor Hrefs
Jquery Plugin to search for all anchor tags and replace a part of the href with whatever you want.
###Sample Use
#####Replace all anchor tags
```
$("a").ReplaceAnchorHrefs({
lookFor: "www.bing.com",
replaceWith: "www.google.com",
ignore: ["www.yahoo.com","www.gmail.com","www.whatever.com"]
});
```
#####Does the same thing as above.
######Plugin will search for all anchor tags within whatever element you define in the beginning
```
$(document).ReplaceAnchorHrefs({
lookFor: "www.bing.com",
replaceWith: "www.google.com",
ignore: ["www.yahoo.com","www.gmail.com","www.whatever.com"]
});
```
#####Specific anchor tags by id
```
$("#id").ReplaceAnchorHrefs({
lookFor: "www.bing.com",
replaceWith: "www.google.com",
ignore: ["www.yahoo.com","www.gmail.com","www.whatever.com"]
});
```
| 23.742857 | 98 | 0.67148 | eng_Latn | 0.545146 |
48c99e4483042c84a8bcf46883cc3ee323f0911f | 6,304 | md | Markdown | docs/csharp/programming-guide/classes-and-structs/fields.md | jhonyfrozen/docs.pt-br | c9e86b6a5de2ff8dffd54dd64d2e87aee85a5cb8 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | docs/csharp/programming-guide/classes-and-structs/fields.md | jhonyfrozen/docs.pt-br | c9e86b6a5de2ff8dffd54dd64d2e87aee85a5cb8 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | docs/csharp/programming-guide/classes-and-structs/fields.md | jhonyfrozen/docs.pt-br | c9e86b6a5de2ff8dffd54dd64d2e87aee85a5cb8 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | ---
title: Campos – Guia de Programação em C#
ms.custom: seodec18
ms.date: 07/20/2015
helpviewer_keywords:
- fields [C#]
ms.assetid: 3cbb2f61-75f8-4cce-b4ef-f5d1b3de0db7
ms.openlocfilehash: 3cc04d9a0504e7cd79703b97441caa5ac84eda94
ms.sourcegitcommit: 40364ded04fa6cdcb2b6beca7f68412e2e12f633
ms.translationtype: HT
ms.contentlocale: pt-BR
ms.lasthandoff: 02/28/2019
ms.locfileid: "56978105"
---
# <a name="fields-c-programming-guide"></a>Campos (Guia de Programação em C#)
Um *campo* é uma variável de qualquer tipo que é declarada diretamente em uma [classe](../../../csharp/language-reference/keywords/class.md) ou [struct](../../../csharp/language-reference/keywords/struct.md). Os campos são *membros* do tipo que os contém.
Uma classe ou um struct podem ter campos de instância, campos estáticos ou ambos. Os campos de instância são específicos a uma instância de um tipo. Se você tem uma classe T, com um campo de instância F, você pode criar dois objetos do tipo T e modificar o valor de F em cada objeto sem afetar o valor no outro objeto. Por outro lado, um campo estático pertence à própria classe e é compartilhado entre todas as instâncias dessa classe. As alterações feitas na instância A serão imediatamente visíveis para as instâncias B e C se elas acessarem o campo.
Em geral, você só deve usar campos para variáveis que têm acessibilidade particular ou protegida. Os dados que a classe expõe para o código de cliente devem ser fornecidos por meio de [métodos](../../../csharp/programming-guide/classes-and-structs/methods.md), [propriedades](../../../csharp/programming-guide/classes-and-structs/properties.md) e [indexadores](../../../csharp/programming-guide/indexers/index.md). Usando esses constructos para acesso indireto aos campos internos, você pode proteger contra valores de entrada inválidos. Um campo particular que armazena os dados expostos por uma propriedade pública é chamado de *repositório de backup* ou de *campo de suporte*.
Os campos normalmente armazenam os dados que devem estar acessíveis a mais de um método de classe e devem ser armazenados por mais tempo que o tempo de vida de qualquer método único. Por exemplo, uma classe que representa uma data do calendário pode ter três campos de inteiros: um para o mês, um para o dia e outro para o ano. As variáveis que não são usadas fora do escopo de um método único devem ser declaradas como *variáveis locais* dentro do próprio corpo do método.
Os campos são declarados no bloco de classe, especificando o nível de acesso do campo, seguido pelo tipo do campo e pelo nome do campo. Por exemplo:
[!code-csharp[csProgGuideObjects#61](~/samples/snippets/csharp/VS_Snippets_VBCSharp/csProgGuideObjects/CS/Objects.cs#61)]
Para acessar um campo em um objeto, adicione um ponto após o nome do objeto, seguido pelo nome do campo, como em `objectname.fieldname`. Por exemplo:
[!code-csharp[csProgGuideObjects#62](~/samples/snippets/csharp/VS_Snippets_VBCSharp/csProgGuideObjects/CS/Objects.cs#62)]
Um campo pode receber um valor inicial, usando o operador de atribuição quando o campo é declarado. Para atribuir automaticamente o campo `day` ao `"Monday"`, por exemplo, você poderia declarar `day` como no exemplo a seguir:
[!code-csharp[csProgGuideObjects#63](~/samples/snippets/csharp/VS_Snippets_VBCSharp/csProgGuideObjects/CS/Objects.cs#63)]
Os campos são inicializados imediatamente antes do construtor para a instância do objeto ser chamado. Se o construtor atribuir o valor de um campo, ele substituirá qualquer valor fornecido durante a declaração do campo. Para obter mais informações, veja [Usando construtores](../../../csharp/programming-guide/classes-and-structs/using-constructors.md).
> [!NOTE]
> Um inicializador de campo não pode fazer referência a outros campos de instância.
Os campos podem ser marcados como [public](../../../csharp/language-reference/keywords/public.md), [private](../../../csharp/language-reference/keywords/private.md), [protected](../../../csharp/language-reference/keywords/protected.md), [internal](../../../csharp/language-reference/keywords/internal.md), [protected internal](../../../csharp/language-reference/keywords/protected-internal.md) ou [private protected](../../../csharp/language-reference/keywords/private-protected.md). Esses modificadores de acesso definem como os usuários da classe podem acessar os campos. Para obter mais informações, consulte [Modificadores de Acesso](../../../csharp/programming-guide/classes-and-structs/access-modifiers.md).
Opcionalmente, um campo pode ser declarado [static](../../../csharp/language-reference/keywords/static.md). Isso torna o campo disponível para chamadores a qualquer momento, mesmo se não existir nenhuma instância da classe. Para obter mais informações, consulte [Classes estáticas e membros de classes estáticas](../../../csharp/programming-guide/classes-and-structs/static-classes-and-static-class-members.md).
Um campo pode ser declarado [readonly](../../../csharp/language-reference/keywords/readonly.md). Um valor só pode ser atribuído a um campo somente leitura durante a inicialização ou em um construtor. Um campo `static readonly` é muito semelhante a uma constante, exceto que o compilador C# não tem acesso ao valor de um campo somente leitura estático em tempo de compilação, mas somente em tempo de execução. Para obter mais informações, consulte [Constantes](../../../csharp/programming-guide/classes-and-structs/constants.md).
## <a name="c-language-specification"></a>Especificação da Linguagem C#
[!INCLUDE[CSharplangspec](~/includes/csharplangspec-md.md)]
## <a name="see-also"></a>Consulte também
- [Guia de Programação em C#](../../../csharp/programming-guide/index.md)
- [Classes e Structs](../../../csharp/programming-guide/classes-and-structs/index.md)
- [Usando construtores](../../../csharp/programming-guide/classes-and-structs/using-constructors.md)
- [Herança](../../../csharp/programming-guide/classes-and-structs/inheritance.md)
- [Modificadores de acesso](../../../csharp/programming-guide/classes-and-structs/access-modifiers.md)
- [Classes e membros de classes abstract e sealed](../../../csharp/programming-guide/classes-and-structs/abstract-and-sealed-classes-and-class-members.md)
| 108.689655 | 716 | 0.76856 | por_Latn | 0.998289 |
48ca663f19c2199bb5418b7742e5ebbbb18b7307 | 218 | md | Markdown | _watches/M20200509_075152_TLP_8.md | Meteoros-Floripa/meteoros.floripa.br | 7d296fb8d630a4e5fec9ab1a3fb6050420fc0dad | [
"MIT"
] | 5 | 2020-05-19T17:04:49.000Z | 2021-03-30T03:09:14.000Z | _watches/M20200509_075152_TLP_8.md | Meteoros-Floripa/site | 764cf471d85a6b498873610e4f3b30efd1fd9fae | [
"MIT"
] | null | null | null | _watches/M20200509_075152_TLP_8.md | Meteoros-Floripa/site | 764cf471d85a6b498873610e4f3b30efd1fd9fae | [
"MIT"
] | 2 | 2020-05-19T17:06:27.000Z | 2020-09-04T00:00:43.000Z | ---
layout: watch
title: TLP8 - 09/05/2020 - M20200509_075152_TLP_8T.jpg
date: 2020-05-09 07:51:52
permalink: /2020/05/09/watch/M20200509_075152_TLP_8
capture: TLP8/2020/202005/20200508/M20200509_075152_TLP_8T.jpg
---
| 27.25 | 62 | 0.784404 | eng_Latn | 0.046075 |
48caeb75571514d9dba67b71924bfb9726e610f7 | 94 | md | Markdown | _docs/README.md | joe-getcouragenow/plugins | 54bbc2d2a51c93ed4771dde7f1d3ac51ab04bddd | [
"Apache-2.0"
] | 1 | 2019-12-31T07:18:00.000Z | 2019-12-31T07:18:00.000Z | _docs/README.md | winwisely99/plugins | 930025b1e241426853c6c7ecbaa19fd657ab74ed | [
"Apache-2.0"
] | null | null | null | _docs/README.md | winwisely99/plugins | 930025b1e241426853c6c7ecbaa19fd657ab74ed | [
"Apache-2.0"
] | null | null | null |
Use MkDocs and deplyo to github
https://github.com/zalando/skipper/blob/master/delivery.yaml | 23.5 | 60 | 0.808511 | kor_Hang | 0.219926 |
48cbbbf229704647702cef2fda1b4a25e9a80318 | 759 | md | Markdown | keyboards/noxary/260/readme.md | fzf/qmk_toolbox | 10d6b425bd24b45002555022baf16fb11254118b | [
"MIT"
] | null | null | null | keyboards/noxary/260/readme.md | fzf/qmk_toolbox | 10d6b425bd24b45002555022baf16fb11254118b | [
"MIT"
] | null | null | null | keyboards/noxary/260/readme.md | fzf/qmk_toolbox | 10d6b425bd24b45002555022baf16fb11254118b | [
"MIT"
] | null | null | null | Noxary 260

A fully customizable 60% keyboard.
Keyboard Maintainer: [MechMerlin](https://github.com/mechmerlin), [Rozakiin](https://github.com/rozakiin)
Hardware Supported: Noxary 260 PCB
Hardware Availability: [Geekhack Group Buy](https://geekhack.org/index.php?topic=93572.0)
Make example for this keyboard (after setting up your build environment):
make noxary/260:default
See the [build environment setup](https://docs.qmk.fm/#/getting_started_build_tools) and the [make instructions](https://docs.qmk.fm/#/getting_started_make_guide) for more information. Brand new to QMK? Start with our [Complete Newbs Guide](https://docs.qmk.fm/#/newbs).
| 47.4375 | 270 | 0.776021 | eng_Latn | 0.451217 |
48cc54ac86f82df94f1a40135bed72cad4c571e3 | 59 | md | Markdown | README.md | jeffjen/node-mongoose-connect | 0d4231575c15299bff2cc88744e4d6018098bc81 | [
"MIT"
] | null | null | null | README.md | jeffjen/node-mongoose-connect | 0d4231575c15299bff2cc88744e4d6018098bc81 | [
"MIT"
] | null | null | null | README.md | jeffjen/node-mongoose-connect | 0d4231575c15299bff2cc88744e4d6018098bc81 | [
"MIT"
] | null | null | null | # node-mongoose-connect
Connection Helper for ODM mongoose
| 19.666667 | 34 | 0.830508 | eng_Latn | 0.965412 |
48cc6054224420607bf09a32e516a9930a350131 | 1,066 | md | Markdown | README.md | xanewton/RollDiceiOS | 2acfde416597a58497ecc7dc14ab3a5360ab77ed | [
"Apache-2.0"
] | null | null | null | README.md | xanewton/RollDiceiOS | 2acfde416597a58497ecc7dc14ab3a5360ab77ed | [
"Apache-2.0"
] | null | null | null | README.md | xanewton/RollDiceiOS | 2acfde416597a58497ecc7dc14ab3a5360ab77ed | [
"Apache-2.0"
] | null | null | null | # RollDice


RollDice is an iOS sample application that rolls a dice using 2 screens.
The purpose of the project is to learn mobile development for iOS using swift.
The application is based on [Swift for Developers](https://in.udacity.com/course/swift-for-developers--ud1025) course.
## Requirements
- MAC machine with Xcode installed
## License
Copyright 2017 Angel Newton
Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.
| 38.071429 | 305 | 0.791745 | eng_Latn | 0.973195 |
48ccb5f0fe518c8e5d1c439f7c2693af45dbb14e | 582 | md | Markdown | docs/content/en/docs/topics/accessing-services/_index.md | mapster/k8ssandra | d53c3212b64be2938f1428f21a37f6b542a49751 | [
"Apache-2.0"
] | null | null | null | docs/content/en/docs/topics/accessing-services/_index.md | mapster/k8ssandra | d53c3212b64be2938f1428f21a37f6b542a49751 | [
"Apache-2.0"
] | null | null | null | docs/content/en/docs/topics/accessing-services/_index.md | mapster/k8ssandra | d53c3212b64be2938f1428f21a37f6b542a49751 | [
"Apache-2.0"
] | null | null | null | ---
title: "Accessing Services"
linkTitle: "Accessing Services"
weight: 1
description: |
Connecting to K8ssandra and accessing services.
---
Accessing resources from outside of the K8ssandra cluster requires tooling to
make the internal resources available at external connection points. This may be
accomplished through a number of means, many explored here. Some of the guides
below assume a Kubernetes Ingress Controller has already been installed and
configured. If you need help with that head over to the [Ingress]({{< ref
"ingress" >}}) section then explore these topics.
| 38.8 | 80 | 0.792096 | eng_Latn | 0.998203 |
48cd03e92d51f2f3ced4f46ffcdaf8f81ec7522a | 5,770 | md | Markdown | docs/Consistent-hash.md | wdpm/system-design | ce4f75e6183461e3cc4ef22f0f5e272bb98792b0 | [
"MIT"
] | null | null | null | docs/Consistent-hash.md | wdpm/system-design | ce4f75e6183461e3cc4ef22f0f5e272bb98792b0 | [
"MIT"
] | null | null | null | docs/Consistent-hash.md | wdpm/system-design | ce4f75e6183461e3cc4ef22f0f5e272bb98792b0 | [
"MIT"
] | null | null | null | # 一致性哈希
## 原理
- 构造一个 0 ~ 2^32-1 大小的环。注意int类型范围不够大,long可以满足。
- 服务节点 hash 之后将自身存放到环中的下标中。
- 数据根据自身的某些特征属性 hash 之后也定位到这个环中。
- 从数据开始,顺时针查找最近的一个节点,就是这次路由的服务节点。
- 说明:如果服务节点的个数太小,导致环中数据分布不均匀,可以引入虚拟节点VNode。
- 说明:增加/删除服务节点之后,影响的是位于该服务节点上游的小部分数据节点。
## 代码实现
使用一种数据结构来模拟这个环。
- 考虑有序数组,数组元素存放的是服务节点的信息。
- 为了查找的高效性,要求能够根据服务节点的key来进行数组排序。这个key可以选用服务节点IP的部分特征来构造。
下面是两种不同的实现方式
- [SortArrayMap](..\src\main\java\io\github\wdpm\algorithms\consistenthash\SortArrayMap.java)
- [使用 TreeMap](..\src\main\java\io\github\wdpm\algorithms\consistenthash\UseTreeMap.java)
上面的代码直接 hardcode 了 key 的hash值。下面将补充以下几点:
- hash(key)函数
- 虚拟节点
### hash(key)函数
```java
protected Long hash(String key) {
MessageDigest md5;
try {
md5 = MessageDigest.getInstance("MD5");
} catch (NoSuchAlgorithmException e) {
throw new RuntimeException("MD5 not supported.", e);
}
md5.reset();
byte[] keyBytes;
keyBytes = key.getBytes(StandardCharsets.UTF_8);
md5.update(keyBytes);
byte[] digest = md5.digest();
long hashCode = ((long) (digest[3] & 0xFF) << 24)
| ((long) (digest[2] & 0xFF) << 16)
| ((long) (digest[1] & 0xFF) << 8)
| ((long) (digest[0] & 0xFF));
return hashCode & 0xffffffffL;
}
```
将 digest[3] digest[2] digest[1] digest[0]分别放于高位31-24位,然后作或操作。
```
0 = {SortArrayMap$Node@722} "Node[key=571962464, value='127.0.0.8']"
1 = {SortArrayMap$Node@723} "Node[key=963396011, value='127.0.0.2']"
2 = {SortArrayMap$Node@724} "Node[key=989064218, value='127.0.0.0']"
3 = {SortArrayMap$Node@725} "Node[key=1129187476, value='127.0.0.3']"
4 = {SortArrayMap$Node@726} "Node[key=1299589365, value='127.0.0.1']"
5 = {SortArrayMap$Node@727} "Node[key=1934069592, value='127.0.0.4']"
6 = {SortArrayMap$Node@728} "Node[key=2403843223, value='127.0.0.6']"
7 = {SortArrayMap$Node@729} "Node[key=2686629659, value='127.0.0.7']"
8 = {SortArrayMap$Node@730} "Node[key=2772066280, value='127.0.0.9']"
9 = {SortArrayMap$Node@731} "Node[key=3860753828, value='127.0.0.5']"
```
```
key: zhangsan ;hash: 1 33486337 => 127.0.0.8
key: wdpm ;hash: 31 93854114 => 127.0.0.5
key: abcdef ;hash: 3 91121896 => 127.0.0.8
key: 123456 ;hash: 9 70722017 => 127.0.0.0
key: helloworld ;hash: 23 65808380 => 127.0.0.6
```
### 虚拟节点
```
0 = {SortArrayMap$Node@745} "Node[key=132254036, value='127.0.0.6', isVirtual=true]"
1 = {SortArrayMap$Node@746} "Node[key=192733553, value='127.0.0.2', isVirtual=true]"
2 = {SortArrayMap$Node@747} "Node[key=281255555, value='127.0.0.7', isVirtual=true]"
3 = {SortArrayMap$Node@748} "Node[key=571962464, value='127.0.0.8', isVirtual=false]"
4 = {SortArrayMap$Node@749} "Node[key=702307089, value='127.0.0.1', isVirtual=true]"
5 = {SortArrayMap$Node@750} "Node[key=963396011, value='127.0.0.2', isVirtual=false]"
6 = {SortArrayMap$Node@751} "Node[key=989064218, value='127.0.0.0', isVirtual=false]"
7 = {SortArrayMap$Node@752} "Node[key=1129187476, value='127.0.0.3', isVirtual=false]"
8 = {SortArrayMap$Node@753} "Node[key=1299589365, value='127.0.0.1', isVirtual=false]"
9 = {SortArrayMap$Node@754} "Node[key=1502221165, value='127.0.0.3', isVirtual=true]"
10 = {SortArrayMap$Node@755} "Node[key=1515764336, value='127.0.0.0', isVirtual=true]"
11 = {SortArrayMap$Node@756} "Node[key=1930853568, value='127.0.0.0', isVirtual=true]"
12 = {SortArrayMap$Node@757} "Node[key=1934069592, value='127.0.0.4', isVirtual=false]"
13 = {SortArrayMap$Node@758} "Node[key=2158478544, value='127.0.0.4', isVirtual=true]"
14 = {SortArrayMap$Node@759} "Node[key=2403843223, value='127.0.0.6', isVirtual=false]"
15 = {SortArrayMap$Node@760} "Node[key=2427157733, value='127.0.0.8', isVirtual=true]"
16 = {SortArrayMap$Node@761} "Node[key=2432007843, value='127.0.0.8', isVirtual=true]"
17 = {SortArrayMap$Node@762} "Node[key=2582697899, value='127.0.0.9', isVirtual=true]"
18 = {SortArrayMap$Node@763} "Node[key=2686629659, value='127.0.0.7', isVirtual=false]"
19 = {SortArrayMap$Node@764} "Node[key=2712990575, value='127.0.0.9', isVirtual=true]"
20 = {SortArrayMap$Node@765} "Node[key=2758157524, value='127.0.0.3', isVirtual=true]"
21 = {SortArrayMap$Node@766} "Node[key=2772066280, value='127.0.0.9', isVirtual=false]"
22 = {SortArrayMap$Node@767} "Node[key=3013513018, value='127.0.0.2', isVirtual=true]"
23 = {SortArrayMap$Node@768} "Node[key=3085973799, value='127.0.0.6', isVirtual=true]"
24 = {SortArrayMap$Node@740} "Node[key=3302652273, value='127.0.0.5', isVirtual=true]"
25 = {SortArrayMap$Node@769} "Node[key=3535498047, value='127.0.0.1', isVirtual=true]"
26 = {SortArrayMap$Node@770} "Node[key=3652784020, value='127.0.0.4', isVirtual=true]"
27 = {SortArrayMap$Node@771} "Node[key=3860753828, value='127.0.0.5', isVirtual=false]"
28 = {SortArrayMap$Node@772} "Node[key=4101489027, value='127.0.0.7', isVirtual=true]"
29 = {SortArrayMap$Node@773} "Node[key=4238597795, value='127.0.0.5', isVirtual=true]"
```
```
key: zhangsan ;hash: 133486337
key: wdpm ;hash: 3193854114
key: abcdef ;hash: 391121896
key: 123456 ;hash: 970722017
key: helloworld ;hash: 2365808380
127.0.0.2
127.0.0.5
127.0.0.8
127.0.0.0
127.0.0.6
```
可以看到有数据节点已经落于虚拟节点中。例如 `key: zhangsan ;hash: 133486337` 落于:
```
1 = {SortArrayMap$Node@746} "Node[key=192733553, value='127.0.0.2', isVirtual=true]"
```
代码实现参考:
- [AbstractConsistentHash](..\src\main\java\io\github\wdpm\algorithms\consistenthash\AbstractConsistentHash.java)
- [SortArrayMapConsistentHash](..\src\main\java\io\github\wdpm\algorithms\consistenthash\SortArrayMapConsistentHash.java)
- [TreeMapConsistentHash](..\src\main\java\io\github\wdpm\algorithms\consistenthash\TreeMapConsistentHash.java)
> TreeMapConsistentHash 没有实现虚拟节点标记位。
## 路由使用
- 参阅 [io.github.wdpm.algorithms.consistenthash.route](..\src\main\java\io\github\wdpm\algorithms\consistenthash\route)
| 45.078125 | 121 | 0.700867 | yue_Hant | 0.713663 |
48cd0d68c913e799a848342e105d7b3630dea650 | 1,683 | md | Markdown | index.md | reggieraye/reggieraye | 2e9370b79aa83d2bd7f783939d0b38ff64da6eb4 | [
"Unlicense"
] | null | null | null | index.md | reggieraye/reggieraye | 2e9370b79aa83d2bd7f783939d0b38ff64da6eb4 | [
"Unlicense"
] | null | null | null | index.md | reggieraye/reggieraye | 2e9370b79aa83d2bd7f783939d0b38ff64da6eb4 | [
"Unlicense"
] | null | null | null | ## About
### Technology
IOM harnesses recent robotic fabrication technologies to autonomously build and assemble consumer hard goods - including products with circuits, moving parts, and actuators. It’s not rapid prototyping, it’s rapid production.
Products are fabricated in a vertically integrated robotic ecosystem. Upon completion, they are are deposited in purpose-built boxes for immediate shipping.
Production Cycle:
1. Receive purchase order
2. 3D-print part housing
3. Insert stock components
4. Complete and test final assembly
5. Package for delivery
### Applications
- Create consumer goods inside the last mile
- Cost-efficient long-tail product manufacture
- Order fulfillment on-site or at distribution center
- Bespoke product packaging
---
## Sample Products
### Consumer Goods
Business Card Holder
<img src="images/BCH.png"/>
Smart Alarm Clock
<img src="images/product+photo+small.png"/>
Rotary Phone
<img src="images/photoshoot+2.png"/>
---
## Intellectual Property
IOM’s methods are patent protected across the production cycle. Competitors should find it hard to develop alternative methods to accomplish similar tasks.
**Pending Patents**
- Kirigami-governed cylinder deformation in robotic arms
- Current-regulated variable friction gripping
- Dynamic spherical gantry system
- Rotary filament switching in 3D-printer extruder heads
- Method for developing load-tolerant packaging
---
## Contact
You can reach us at info@internetofmaking.com
<!-- <p style="font-size:11px">Page template forked from <a href="https://github.com/evanca/quick-portfolio">evanca</a></p> -->
<!-- Remove above link if you don't want to attibute -->
| 26.296875 | 225 | 0.771242 | eng_Latn | 0.980616 |
48ce5f97cf6ee164a209bfe9abbd3d4163549176 | 2,578 | md | Markdown | game-ideas.md | david-fong/capswalk | f073faa39db881b7eccd832235cf2c66863b8c24 | [
"RSA-MD"
] | 1 | 2021-04-15T18:01:23.000Z | 2021-04-15T18:01:23.000Z | game-ideas.md | david-fong/snakey3 | bbc6ce5a7f32fc1699d4d73244cfc3c98b6f4564 | [
"RSA-MD"
] | null | null | null | game-ideas.md | david-fong/snakey3 | bbc6ce5a7f32fc1699d4d73244cfc3c98b6f4564 | [
"RSA-MD"
] | 1 | 2021-07-26T14:37:44.000Z | 2021-07-26T14:37:44.000Z |
# Game Ideas
## Points of Consideration
First thing first: I want game ideas to be simple to implement, since I want there to be multiple game modes. Right now, the goal is to generate many simple ideas, and then see what mechanics are the most shared between them, which will then become part of the game's core.
The greatest design challenge here is to accommodate for a wide range of skill. This game is somewhat special in that the most fundamental mechanic- that is, movement- is not throttled in any way by the game; instead, it is throttled by each player's ability.
One final note: try to think of ways to frame the game as some part of the real world in a way that gives it charm or enforces the atmosphere you want to create (intense/chill, collaborative/competitive). I'm talking about using the visuals to turn the game into a familiar "story". Without that, this game is just another boring typing game. This game doesn't have to just be a way to hone a skill or pit yourself against others with that skill.
## Mechanics Currently Banned from Game Core
These may be reopened for consideration if a game idea is compelling enough.
- Player Health
## Singleplayer
I think singleplayer game modes are well suited with games that do not end and take one of the following approaches:
1. "Treadmill". The game provides a challenge where the difficulty can be dynamically controlled by the player.
1. "Bubble-wrap". The game provides repeating small goals, and makes no attempt to be challenging, and instead simply feels rewarding.
## Multiplayer
To accommodate for varying skill levels when choosing to hide notions of competition/comparison, design games with different player roles/goals.
## Endorsed Ideas
### Death Scroller
Simplicity score: 9/10.
- The floor is rising lava. Keep moving up and see how long you survive.
- Optional additional challenge: every once in a while, the tile you are on will crumble and not come back.
- Possible "stories": Running against an escalator and dodging people using it properly.
### Bubble Wrap Stories
- Being a bunch of baby turtles walking to the sea.
- Being a cat and pushing things off a counter top.
### Soccer
Simplicity score: 3/10.
- Can hold and shoot a ball.
- For each step you take with the ball, you will stay frozen after losing it until the next people who pick it up have moved that many steps with the ball.
- Or that the ball moves while it is not being held by anyone.
- For each step you take with the ball, the radius that it can be stolen from by an enemy team member increases.
| 49.576923 | 446 | 0.775407 | eng_Latn | 0.999955 |
48cf2e6f7275d663a06c4df487c09d0752138e19 | 1,334 | md | Markdown | src/pages/202109032737.md | SatoshiKawabata/blog | 2ed793e596b5b7164d5cdaa88790deea77251d09 | [
"MIT"
] | 2 | 2018-10-16T14:53:23.000Z | 2019-07-10T10:41:19.000Z | src/pages/202109032737.md | SatoshiKawabata/blog | 2ed793e596b5b7164d5cdaa88790deea77251d09 | [
"MIT"
] | 16 | 2018-06-01T15:02:34.000Z | 2020-10-12T11:04:49.000Z | src/pages/202109032737.md | SatoshiKawabata/blog | 2ed793e596b5b7164d5cdaa88790deea77251d09 | [
"MIT"
] | null | null | null | ---
templateKey: blog-post
title: Storybook v6 にてSVGの読み込みと絶対パスでインポートする
date: 2021-09-03T14:20:19.795Z
description: Storybook v6環境にて、SVGファイルを絶対パスで読み込もうとしたら下記のようなエラーが出ました。
---
Storybook v6環境にて、SVGファイルを絶対パスで読み込もうとしたら下記のようなエラーが出ました。
```
ERROR in ./src/components/Button.tsx
Module not found: Error: Can't resolve 'src/assets/icons/button.svg' in '/Users/****'
@ ./src/components/Button.tsx 10:0-79 25:22-44
@ ./src/components/Button.stories.tsx
```
Storybook v6でWebpackの設定をオーバーライドするには`webpackFinal`でconfigを書き加えます。
https://storybook.js.org/docs/react/configure/webpack
結果的に絶対パスで読み込んでいるのでそれを相対パスにすれば直りました。今回は`src/`ディレクトリをルートにします。`.storybook/main.js`を下記のように編集します。`main.js`からの相対パスなので`../src`という指定のしかたになっています。
```
const path = require('path');
module.exports = {
"stories": [
"../src/**/*.stories.mdx",
"../src/**/*.stories.@(js|jsx|ts|tsx)"
],
"addons": [
"@storybook/addon-links",
"@storybook/addon-essentials"
],
webpackFinal: config => {
// SVGの読み込み
fileLoaderRule.exclude = /\.svg$/;
config.module.rules.push({
test: /\.svg$/,
enforce: 'pre',
loader: require.resolve('@svgr/webpack'),
});
// 絶対パスでインポートするためにaliasを設定
config.resolve.alias = {
...config.resolve.alias,
src: path.resolve(__dirname, '../src'),
};
return config;
}
}
```
| 24.254545 | 136 | 0.676912 | yue_Hant | 0.408062 |
48cf6e420f5eaf936654b65c38bf8f917944e2f1 | 37 | md | Markdown | README.md | sidx64/recipe-app-api | ae1227a5a50d342ec07babfd565c6f0786035db7 | [
"MIT"
] | null | null | null | README.md | sidx64/recipe-app-api | ae1227a5a50d342ec07babfd565c6f0786035db7 | [
"MIT"
] | null | null | null | README.md | sidx64/recipe-app-api | ae1227a5a50d342ec07babfd565c6f0786035db7 | [
"MIT"
] | null | null | null | # recipe-app-api
Recipes App - Udemy
| 12.333333 | 19 | 0.72973 | kor_Hang | 0.445108 |
48d0dd1bf9428baf71e3975e1d6da5881ae201b3 | 15,000 | md | Markdown | SharePoint/SharePointServer/administration/high-availability-and-disaster-recovery-concepts.md | victorbutuza/OfficeDocs-SharePoint | 4f91ad0c8792372f34f1d0946051c82f162ce16b | [
"CC-BY-4.0",
"MIT"
] | 1 | 2019-11-20T16:26:57.000Z | 2019-11-20T16:26:57.000Z | SharePoint/SharePointServer/administration/high-availability-and-disaster-recovery-concepts.md | LuigiBruno/OfficeDocs-SharePoint | dc63ad3c991f56ff4f7972c6b2bd4139a838a202 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | SharePoint/SharePointServer/administration/high-availability-and-disaster-recovery-concepts.md | LuigiBruno/OfficeDocs-SharePoint | dc63ad3c991f56ff4f7972c6b2bd4139a838a202 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | ---
title: "High availability and disaster recovery concepts in SharePoint Server"
ms.author: stevhord
author: bentoncity
manager: pamgreen
ms.date: 8/2/2017
audience: ITPro
ms.topic: concetpual
ms.prod: sharepoint-server-itpro
localization_priority: Normal
ms.collection:
- IT_Sharepoint_Server
- IT_Sharepoint_Server_Top
ms.assetid: 837761f9-0e18-4b42-8798-3776997a6c95
description: "Understand high availability and disaster recovery concepts in SharePoint Server so you can choose the best strategy for your farm."
---
# High availability and disaster recovery concepts in SharePoint Server
[!INCLUDE[appliesto-2013-2016-2019-xxx-md](../includes/appliesto-2013-2016-2019-xxx-md.md)]
High availability and disaster recovery is the highest priority when you create a plan and system specifications for a SharePoint Server farm. Other aspects of the plan, such as high performance and capacity, are negated if farm servers are not highly available or a farm cannot be recovered.
To design and implement an effective strategy that maintains efficient and uninterrupted operations, you should understand the basic concepts of high availability and disaster recovery. These concepts are also important to evaluate and pick the best technical solutions for your SharePoint environment.
## Introduction to business continuity management
<a name="IntroBCM"> </a>
Business continuity management is a management process or program that defines, assesses, and helps manage the risks to the continued running of an organization. Business continuity management focuses on creating and maintaining a business continuity plan, which is a roadmap for continuing operations when normal business operations are interrupted by adverse conditions. These conditions can be natural, man-made, or a combination of both. A continuity plan is derived from the following analyses and inputs:
- A business impact analysis
- A threat and risk analysis
- A definition of the impact scenarios
- A set of documented recovery requirements
The result is a solution design or identified options, an implementation plan, a testing and organization acceptance plan, and a maintenance plan or schedule.
An example of business continuity management is [Disaster recovery and protection for data and applications](http://go.microsoft.com/fwlink/?LinkID=787533&clcid=0x409), which provides a snapshot of the business continuity program at Microsoft.
Obviously Information Technology (IT) is a significant aspect of business continuity planning for many organizations. However, business continuity is more encompassing - it includes all the operations that are needed to make sure that an organization can continue to do business during and immediately after a major disruptive event. A business continuity plan includes, but is not limited to, the following elements:
- policies, processes and procedures
- possible options and decision-making responsibility
- human resources and facilities
- information technology
Although high availability and disaster recovery are often equated to business continuity management; they are in fact, subsets of business continuity management.
## Describing high availability
<a name="DescHA"> </a>
For a given software application or service, high availability is ultimately measured in terms of the end user's experience and expectations. The tangible and perceived business impact of downtime may be expressed in terms of information loss, property damage, decreased productivity, opportunity costs, contractual damages, or the loss of goodwill.
*The principal goal of a high availability solution is to minimize or mitigate the impact of downtime.* A sound strategy for this optimally balances business processes and Service Level Agreements (SLAs) with technical capabilities and infrastructure costs.
A platform is considered highly available per the agreement and expectations of customers and stakeholders. The availability of a system can be expressed as this calculation:
Actual uptime/Expected uptime X 100%
The resulting value is often expressed by industry in terms of the number of 9's that the solution provides; meant to convey an annual number of minutes of possible uptime, or conversely, minutes of downtime.
|**Number of 9's**|**Availability Percentage**|**Total Annual Downtime**|
|:-----|:-----|:-----|
|2 <br/> |99% <br/> |3 days, 15 hours <br/> |
|3 <br/> |99.9% <br/> |8 hours, 45 minutes <br/> |
|4 <br/> |99.99% <br/> |52 minutes, 34 seconds <br/> |
|5 <br/> |99.999% <br/> |5 minutes, 15 seconds <br/> |
### Planned versus unplanned downtime
System outages are either anticipated or planned for, or they are the result of an unplanned failure. Downtime need not be considered negatively if it is appropriately managed. There are two key types of foreseeable downtime:
- **Planned maintenance.** A time window is preannounced and coordinated for planned maintenance tasks such as software patching, hardware upgrades, password updates, offline re-indexing, data loading, or the rehearsal of disaster recovery procedures. Deliberate, well-managed operational procedures should minimize downtime and prevent any data loss. Planned maintenance activities can be seen as investments needed to prevent or mitigate other potentially more severe unplanned outage scenarios.
- **Unplanned outage.** System-level, infrastructure, or process failures may occur that are unplanned or uncontrollable, or that are foreseeable, but considered either too unlikely to occur, or are considered to have an acceptable impact. A robust high availability solution detects these types of failures, automatically recovers from the outage, and then reestablishes fault tolerance.
When establishing SLAs for high availability, you should calculate separate key performance indicators (KPIs) for planned maintenance activities and unplanned downtime. This approach allows you to contrast your investment in planned maintenance activities against the benefit of avoiding unplanned downtime.
### Degraded availability
High availability should not be considered as an all-or-nothing proposition. As an alternative to a complete outage, it is often acceptable to the end user for a system to be partially available, or to have limited functionality or degraded performance. These varying degrees of availability include:
- **Read-only and deferred operations.** During a maintenance window, or during a phased disaster recovery, data retrieval is still possible, but new workflows and background processing may be temporarily halted or queued.
- **Data latency and application responsiveness.** Due to a heavy workload, a processing backlog, or a partial platform failure, limited hardware resources may be over-committed or under-sized. User experience may suffer, but work may still get done in a less productive manner.
- **Partial, transient, or impending failures.** Robustness in the application logic or hardware stack that retries or self-corrects upon encountering an error. These types of issues may appear to the end user as data latency or poor application responsiveness.
- **Partial end-to-end failure.** Planned or unplanned outages may occur gracefully within vertical layers of the solution stack (infrastructure, platform, and application), or horizontally between different functional components. Users may experience partial success or degradation, depending upon the features or components that are affected.
The acceptability of these suboptimal scenarios should be considered as part of a spectrum of degraded availability leading up to a complete outage, and as intermediate steps in a phased disaster recovery.
## Quantifying downtime
<a name="QuantDT"> </a>
When downtime does occur, either planned, or unplanned, the primary business goal is to bring the system back online and minimize data loss. Every minute of downtime has direct and indirect costs. With unplanned downtime, you must balance the time and effort needed to determine why the outage occurred, what the current system state is, and what steps are needed to recover from the outage.
At a predetermined point in any outage, you should make or seek the business decision to stop investigating the outage or performing maintenance tasks, recover from the outage by bringing the system back online, and if needed, reestablish fault tolerance.
### Recovery objectives
Data redundancy is a key component of a high availability database solution. Transactional activity on your primary SQL Server instance is synchronously or asynchronously applied to one or more secondary instances. When an outage occurs, transactions that were in flight may be rolled back, or they may be lost on the secondary instances due to delays in data propagation.
You can both measure the impact, and set recovery goals in terms of how long it takes to get back in business, and how much time latency there is in the last transaction recovered:
- **Recovery Time Objective (RTO).** This is the duration of the outage. The initial goal is to get the system back online in at least a read-only capacity to facilitate investigation of the failure. However, the primary goal is to restore full service to the point that new transactions can take place.
- **Recovery Point Objective (RPO).** This is often referred to as a measure of acceptable data loss. It is the time gap or latency between the last committed data transaction before the failure and the most recent data recovered after the failure. The actual data loss can vary depending upon the workload on the system at the time of the failure, the type of failure, and the type of high availability solution used.
> [!NOTE]
> A related objective is **Recovery level objective (RLO)**. This objective defines the granularity with which you must be able to recover data — whether you must be able to recover the whole farm, Web application, site collection, site, list or library, or item. For more information, see [Plan for backup and recovery in SharePoint Server](backup-and-recovery-planning.md).
You should use RTO and RPO values as goals that indicate business tolerance for downtime and acceptable data loss, and as metrics for monitoring availability health.
### Justifying ROI or opportunity cost
The business costs of downtime may be either financial or in the form of customer goodwill. These costs may accrue with time, or they may be incurred at a certain point in the outage window. In addition to projecting the cost of incurring an outage with a given recovery time and data recovery point, you can also calculate the business process and infrastructure investments needed to attain your RTO and RPO goals or to avoid the outage all together. These investment themes should include:
- **Avoiding downtime.** Outage recovery costs are avoided all together if an outage doesn't occur in the first place. Investments include the cost of fault-tolerant and redundant hardware or infrastructure, distributing workloads across isolated points of failure, and planned downtime for preventive maintenance.
- **Automating recovery.** If a system failure occurs, you can greatly mitigate the impact of downtime on the customer experience through automatic and transparent recovery.
- **Resource utilization.** Secondary or standby infrastructure can sit idle, awaiting an outage. It also can be leveraged for read-only workloads, or to improve overall system performance by distributing workloads across all available hardware.
For given RTO and RPO goals, the needed availability and recovery investments, combined with the projected costs of downtime, can be expressed and justified as a function of time. During an actual outage, this allows you to make cost-based decisions based on the elapsed downtime.
### Monitoring availability health
From an operational point of view, during an actual outage, you should not attempt to consider all relevant variables and calculate ROI or opportunity costs in real time. Instead, you should monitor data latency on your standby instances as a proxy for expected RPO.
In the event of an outage, you should also limit the initial time spent investigating the root cause during the outage, and instead focus on validating the health of your recovery environment, and then rely upon detailed system logs and secondary copies of data for subsequent forensic analysis.
### Planning for disaster recovery
While high availability efforts entail what you do to prevent an outage, disaster recovery efforts address what is done to re-establish high availability after the outage.
As much as possible, disaster recovery procedures and responsibilities should be formulated before an actual outage occurs. Based upon active monitoring and alerts, the decision to initiate an automated or manual failover and recovery plan should be tied to pre-established RTO and RPO thresholds. The scope of a sound disaster recovery plan should include:
- **Granularity of failure and recovery.** Depending upon the location and type of failure, you can take corrective action at different levels; that is, data center, infrastructure, platform, application, or workload.
- **Investigative source material.** Baseline and recent monitoring history, system alerts, event logs, and diagnostic queries should all be readily accessible by appropriate parties.
- **Coordination of dependencies.** Within the application stack, and across stakeholders, what are the system and business dependencies?
- **Decision tree.** A predetermined, repeatable, validated decision tree that includes role responsibilities, fault triage, failover criteria in terms of RPO and RTO goals, and prescribed recovery steps.
- **Validation.** After taking steps to recover from the outage, what must be done to verify that the system has returned to normal operations?
- **Documentation.** Capture all of the above items in a set of documentation, with sufficient detail and clarity so that a third party team can execute the recovery plan with minimal assistance. This type of documentation is commonly called a 'run book' or a 'cook book'.
- **Recovery rehearsals.** Regularly exercise the disaster recovery plan to establish baseline expectations for RTO goals, and consider regular rotation of hosting the primary production site on the primary and each of the disaster recovery sites.
## See also
<a name="QuantDT"> </a>
#### Concepts
[Choose a disaster recovery strategy for SharePoint Server](plan-for-disaster-recovery.md)
#### Other Resources
[What workloads can you protect with Azure Site Recovery?](/azure/site-recovery/site-recovery-workload)
[Replicate a multi-tier SharePoint application for disaster recovery using Azure Site Recovery](/azure/site-recovery/site-recovery-sharepoint)
| 86.705202 | 510 | 0.793867 | eng_Latn | 0.999508 |
48d0de7b60f744836cc1ed907756221aceee09cb | 293 | md | Markdown | content/fr/api/integrations_webhook/webhooks_delete.md | terra-namibia/documentation | 8ea19b29dece3ca0231df2ca4d515c4d342e677e | [
"BSD-3-Clause"
] | null | null | null | content/fr/api/integrations_webhook/webhooks_delete.md | terra-namibia/documentation | 8ea19b29dece3ca0231df2ca4d515c4d342e677e | [
"BSD-3-Clause"
] | null | null | null | content/fr/api/integrations_webhook/webhooks_delete.md | terra-namibia/documentation | 8ea19b29dece3ca0231df2ca4d515c4d342e677e | [
"BSD-3-Clause"
] | null | null | null | ---
title: Supprimer une intégration Webhooks
type: apicontent
order: 20.4
external_redirect: "/api/#supprimer-une-integration-webhooks"
---
## Supprimer une intégration Webhooks
Supprimez une intégration Datadog/Webhooks donnée.
**ARGUMENTS** :
Cet endpoint ne prend aucun argument JSON.
| 19.533333 | 61 | 0.778157 | fra_Latn | 0.741031 |
48d143c12c23150973501f9975e2aa5724a708e1 | 170 | md | Markdown | content/tickets/man-from-uncle.md | jacobproffer/tickets | 6651c106b52ec45f3fd569c173b69e415a8aee82 | [
"Apache-2.0"
] | null | null | null | content/tickets/man-from-uncle.md | jacobproffer/tickets | 6651c106b52ec45f3fd569c173b69e415a8aee82 | [
"Apache-2.0"
] | null | null | null | content/tickets/man-from-uncle.md | jacobproffer/tickets | 6651c106b52ec45f3fd569c173b69e415a8aee82 | [
"Apache-2.0"
] | null | null | null | ---
title: "The Man from U.N.C.L.E."
date: "2015-08-29"
price: "9.00"
theater: "Marquette Cinemas"
theaters: ["Marquette Cinemas"]
rating: "PG-13"
ratings: ["PG-13"]
---
| 17 | 32 | 0.635294 | eng_Latn | 0.259738 |
48d1a2a4a7493897508fce61a822583ecc7ae5f3 | 7,110 | md | Markdown | data-management-library/database/graph/graph-real-time-recommendations/analyze-zippelin/analyze-zippelin.md | bgelernt/learning-library | 13de08da0ced30c77d0618447d923222ab707feb | [
"UPL-1.0"
] | null | null | null | data-management-library/database/graph/graph-real-time-recommendations/analyze-zippelin/analyze-zippelin.md | bgelernt/learning-library | 13de08da0ced30c77d0618447d923222ab707feb | [
"UPL-1.0"
] | null | null | null | data-management-library/database/graph/graph-real-time-recommendations/analyze-zippelin/analyze-zippelin.md | bgelernt/learning-library | 13de08da0ced30c77d0618447d923222ab707feb | [
"UPL-1.0"
] | 1 | 2020-03-27T05:58:01.000Z | 2020-03-27T05:58:01.000Z | # Graph Analysis using Apache Zeppelin
## Introduction
Graph analytics reveal information and provide knowledge which otherwise would remain hidden in your data. While there are many analytic tools that exist, Apache Zeppelin is recognized by many as the most versatile and favorite.
In this lab, you’ll learn how to use Apache Zeppelin for querying and visualization of Oracle Graphs.
Estimated Lab Time : 30 minutes
### About Zeppelin
Apache Zeppelin is web-based notebook-style application that enables interactive data analytics and collaboration using live code, text and visualizations. Like most notebooks, Zeppelin provides a number of useful data-discovery features such as :
- Easy data ingestion and loading
- Access to programming environments that help with data discovery and data analytics
- Out-of-the-box data visualizations
- Collaboration services for sharing notebooks
Zeppelin is essentially a scripting environment for running ordinary SQL statements along with a lot of other languages such as Spark, Python, Hive, R etc. These are controlled by a feature called "interpreters".
The in-memory analyst provides an interpreter implementation for Apache Zeppelin. This lab sets up a zeppelin notebook environment to connect to the in-memory analyst and runs queries to analyze the retail graph created earlier.
### Objectives
- Analyze the graph using Apache Zeppelin and the interpreter provided by the Graph server
### Prerequisites
- An Oracle Free Tier, Always Free, Paid or LiveLabs Cloud Account
- Successful completion of all steps in the previous lab
## **STEP 1**: Setup Zeppelin in a Docker Container
Running Apache Zeppelin on Docker is a great way to get started with Zeppelin. Follow the steps below to provision the Zeppelin docker container in the lab VM.
1. Logged in to the lab VM as **oracle**, change directory to **/home/oracle/oracle-pg**.
```
<copy>cd /home/oracle/oracle-pg</copy>
```
2. The lab environment contains a Docker-compose YAML file (located in **/home/oracle/oracle-pg/docker-compose.yaml**) that defines the Zeppelin docker container configuration.
- **Docker Compose** is a tool for defining and running multi-container Docker applications. With Compose, you use a YAML file to configure application’s services. Then, with a single command, create and start all the services from your configuration.
3. Build the Zeppelin container using **docker-compose**.
```
<copy>sudo docker-compose up zeppelin</copy>
```
4. After a few minutes, observe the log from docker-compose. Ensure there are no errors in the output.


5. **DO NOT** exit this session.
## **STEP 2**: Login to Zeppelin
1. From your laptop/desktop, open a new web browser and point to the following URL for Apache Zeppelin, replacing the **{VM IP Address}** with your lab VM's IP Address.
```
<copy>http://{VM IP Address}:8080</copy>
```
2. Upon a successful connection to Zeppelin you'll land at the main page similar to the below screenshot.
- On the left of the page all existing notes are listed (**Notebooks** in Zeppelin are referred to as **Notes**). Notes consist of one or more paragraphs of code, which you can use to define and run snippets of code in a flexible manner.

3. A pre-built Zeppelin Note has been provided to you for this lab. [Download] (https://objectstorage.us-phoenix-1.oraclecloud.com/n/oraclepartnersas/b/oracle_pg/o/zeppelin.json) the file (by **Right-Click** and **Save As**) and save it to your local machine.
4. Import the zeppelin.json note by clicking **Import Note**.

5. Zeppelin displays an import dialog giving you two options - import from local disk as a JSON file, or from a remote location using a URL. Click **Select JSON File**.

6. Locate the zeppelin.json file you've downloaded and click **Upload**.
- By default, the name of the imported note is the same as the original note but you can override it by providing a new name.

## **STEP 3**: Connect to Graph Server
1. Click on **Online Retail** to open the note.

2. In the first section of the note titled **Connect to Graph Server**, replace **{VM\_IP\_Address}**, **{Retail\_Password}** and **{Keystore\_Password}** with your values.

3. Click on **Run this Paragraph** on the top-right corner of **Connect to Graph Server** section, as shown in the screenshot.

4. Ensure the run is successful (status on top right of paragraph changes from **READY** to **FINISHED**) and you have successfully connected to the graph server.

## **STEP 4**: Load Retail Graph
Load the retail graph using the **config-tables.json** file provided.
1. From the note, run the second paragraph titled **Get Graph on Graph Server** to load the graph by clicking **Run this Paragraph**. Verify the graph was successfully loaded, indicated by **FINISHED** status.

## **STEP 5**: Analyze Graph
Continue running the remaining paragraphs in the note.
1. Count the total number of nodes in the graph that represents **Products**.

2. Count the total number of nodes representing **Customers**.

3. Count all graph edges indicating **Purchases**.

4. Count all reverse edges pointing to **customers who purchased products**.

5. Get the top 10 customers with the **least number of purchases**.

6. Get all **products purchased by a customer** ("cust\_12353").

7. Calculate page ranks using **Personalized PageRank** algorithm.

8. Get the **top 10 product recommendations for a customer** ("cust\_12353").

9. Get the **path to the recommended product** ("prod\_23166"), displaying intermediary nodes for a customer ("cust_12353"), including nodes and edges.

10. Count the **number of intermediary nodes** from the customer ("cust\_12353") to the recommended product ("prod\_23166").

You have now successfully completed all labs in this workshop.
## Acknowledgements
- **Author** - Maqsood Alam, Product Manager, Oracle Database
- **Contributor** - Ryota Yamanaka, Product Manager, Oracle Spatial and Graph
* **Last Updated By/Date** - Maqsood Alam, Oct 2020
| 42.321429 | 260 | 0.720534 | eng_Latn | 0.985306 |
48d1a9e086398370bd9ba192746f1ce67dc50081 | 2,113 | md | Markdown | src/plugins/trace/README.md | rahuljain1311/msquic | 8344ddef1b6e111773c348340fcc0de820b7c9fb | [
"MIT"
] | 2,761 | 2020-04-28T23:46:05.000Z | 2022-03-29T10:30:35.000Z | src/plugins/trace/README.md | rahuljain1311/msquic | 8344ddef1b6e111773c348340fcc0de820b7c9fb | [
"MIT"
] | 796 | 2020-04-28T23:49:50.000Z | 2022-03-31T17:41:42.000Z | src/plugins/trace/README.md | rahuljain1311/msquic | 8344ddef1b6e111773c348340fcc0de820b7c9fb | [
"MIT"
] | 341 | 2020-04-29T01:00:29.000Z | 2022-03-29T06:32:44.000Z | This page provides the install, setup and usage instructions for Windows Performance Analyzer (WPA) and use it to analyze MsQuic traces.
# Install Instructions
The following are currently only possible on Windows. Other platforms may be supported by WPA in the future.
## Install WPA
1. Download the latest the [ADK Preview](https://www.microsoft.com/en-us/software-download/windowsinsiderpreviewADK) to get the Windows Performance Toolkit (WPT).
- Note: In the future, the WPA team plans to make it easier to install WPA outside of the ADK
2. Install the Windows Performance Toolkit 
3. Verify that this WPA version supports plugins
- In Command Prompt
```dos
"C:\Program Files (x86)\Windows Kits\10\Windows Performance Toolkit\wpa.exe" /?
```
- Verify that these 2 command line WPA options are supported:
- OPTIONS: **-addsearchdir PATH**. Adds a directory path to the plugin search path. ....
- ENVIRONMENT VARIABLES: **WPA_ADDITIONAL_SEARCH_DIRECTORIES** - A semicolon (;) delimited list of additional directories to search for plugins. Equivalent to the -addsearchdir option.
## Install MsQuic WPA Plugin
1. Build the plugin via `QuicEventDataSource.csproj` or download it from the latest release (i.e. [v1.0.0](https://github.com/microsoft/msquic/releases/download/v1.0.0-129524/quic.wpa.zip)).
2. Update/create your WPA shortcut by adding `-addsearchdir <path_to_quic_plugin_folder>`.
# Usage Instructions
WPA is extremely powerful. It can operate very quickly on multi-gigabyte trace files and let you slice & dice the data many different ways to really drill down into what's going on.
## Stacks CPU Usage

One of the built-in capabilities of WPA is the ability to analyze CPU trace information to see the CPU usage of the various call stacks in the code. For instance, in the above Flame Graph you can easily see that the most expensive function (58% of total CPU usage!) is `CxPlatEncrypt`.
**TODO** - Add more details/instructions.
## QUIC Charts and Tables

**TODO** | 50.309524 | 285 | 0.754378 | eng_Latn | 0.954277 |
48d25f23ef8525cebea810f7c50c81c7cf8f0ffa | 1,058 | md | Markdown | _posts/2020/2020-01-08-non-durable-postgres-for-e2e-tests.md | shusson/shusson.info | cfc85660b002157e7311a99eaf23840502b8e92b | [
"MIT"
] | null | null | null | _posts/2020/2020-01-08-non-durable-postgres-for-e2e-tests.md | shusson/shusson.info | cfc85660b002157e7311a99eaf23840502b8e92b | [
"MIT"
] | null | null | null | _posts/2020/2020-01-08-non-durable-postgres-for-e2e-tests.md | shusson/shusson.info | cfc85660b002157e7311a99eaf23840502b8e92b | [
"MIT"
] | null | null | null | # Non-durable postgres for e2e tests
__08/01/2020__

During e2e testing we can sacrifice postgres [durability in favour of performance](https://www.postgresql.org/docs/12/non-durability.html).
Durability guarantees the saving of data even if the server crashes or loses power,
which is not usually needed during e2e tests. It's arguable that e2e tests should test a system
as close to production as possible, but I think if you need to speed up your tests this is a worthy trade-off.
Simply add the following to the `/var/lib/postgresql/data/postgresql.conf` file:
```text
fsync = off
synchronous_commit = off
full_page_writes = off
```
Note that `fsync` can only be set in the `postgresql.conf` or on the server command line.
Using these settings we were able to decrease our test running time by ~20%.
Given that our e2e tests are not all db focused, I think this is a good result.
A non durable postgres docker image can be found here: https://hub.docker.com/repository/docker/shusson/nd-postgres
| 40.692308 | 139 | 0.776938 | eng_Latn | 0.996984 |
48d2a2a21754541c6b35979c470249d2b2ed14b0 | 2,328 | md | Markdown | AlchemyInsights/set-up-insider-risk-management.md | isabella232/OfficeDocs-AlchemyInsights-pr.el-GR | 0039322a72f1d1179ee111e346e4c63606424ef1 | [
"CC-BY-4.0",
"MIT"
] | 1 | 2020-05-19T19:06:10.000Z | 2020-05-19T19:06:10.000Z | AlchemyInsights/set-up-insider-risk-management.md | isabella232/OfficeDocs-AlchemyInsights-pr.el-GR | 0039322a72f1d1179ee111e346e4c63606424ef1 | [
"CC-BY-4.0",
"MIT"
] | 3 | 2020-06-02T23:27:16.000Z | 2022-02-09T06:50:22.000Z | AlchemyInsights/set-up-insider-risk-management.md | isabella232/OfficeDocs-AlchemyInsights-pr.el-GR | 0039322a72f1d1179ee111e346e4c63606424ef1 | [
"CC-BY-4.0",
"MIT"
] | 3 | 2019-10-09T20:33:09.000Z | 2021-10-09T10:45:54.000Z | ---
title: Ρύθμιση διαχείρισης κινδύνων Insider
ms.author: pebaum
author: pebaum
manager: scotv
ms.audience: Admin
ms.topic: article
ms.service: o365-administration
ROBOTS: NOINDEX, NOFOLLOW
localization_priority: Priority
ms.collection: Adm_O365
ms.custom:
- "9002284"
- "4405"
ms.openlocfilehash: c4003faac9294725283786fd865217fdc7fcdcef
ms.sourcegitcommit: dcd1c76ced1a0cec27f4cf8d383593760c198424
ms.translationtype: MT
ms.contentlocale: el-GR
ms.lasthandoff: 09/18/2021
ms.locfileid: "59446655"
---
# <a name="set-up-insider-risk-management"></a>Ρύθμιση διαχείρισης κινδύνων Insider
Για να αποκτήσετε πρόσβαση και να χρησιμοποιήσετε τη διαχείριση κινδύνων Insider, ο οργανισμός σας πρέπει να έχει μια από τις παρακάτω συνδρομές:
- Microsoft 365 Συνδρομή G5 (επί πληρωμή ή δοκιμαστική έκδοση)
- συνδρομή Microsoft 365 G3 + το πρόσθετο "Συμμόρφωση Microsoft 365 G5"
- συνδρομή Microsoft 365 G3 + το πρόσθετο Microsoft 365 G5 Insider Risk Management
- συνδρομή Office 365 E3 + Φορητότητα και ασφάλεια για μεγάλες επιχειρήσεις E3 + το πρόσθετο Συμμόρφωση Microsoft 365 E5
Εάν δεν έχετε ένα υπάρχον πρόγραμμα Microsoft 365 E5 και θέλετε να δοκιμάσετε το πρόγραμμα Insider Risk Management, μπορείτε να προσθέσετε Microsoft 365 στην υπάρχουσα συνδρομή σας ή να εγγραφείτε για μια δοκιμαστική έκδοση του Microsoft 365 για μεγάλες επιχειρήσεις E5.
**Συμβουλές:**
- Χρησιμοποιώντας το πρότυπο Data Στηλών, βεβαιωθείτε ότι έχετε ρυθμίσει τουλάχιστον μία πολιτική Αποτροπής απώλειας δεδομένων (DLP). Ωστόσο, υπάρχει μια νέα επιλογή εναύσματος που δεν απαιτεί τη ρύθμιση παραμέτρων μιας πολιτικής DLP.
- Οι καθολικοί διαχειριστές δεν έχουν πρόσβαση στην πύλη Διαχείρισης κινδύνων του Insider από προεπιλογή. Πρέπει να του έχει εκχωρηθεί ένας από τους ρόλους Insider Risk Management.
- Εάν ένας διαχειριστής δεν βλέπει ειδοποιήσεις, βεβαιωθείτε ότι ο χρήστης έχει εκχωρηθεί σε μία από τις ακόλουθες ομάδες:
Αναλυτές Διαχείρισης Εσωτερικών Κινδύνων
Ερευνητές Διαχείρισης Εσωτερικών Κινδύνων
Για περισσότερες πληροφορίες σχετικά με τον τρόπο με τον οποίο οι πολιτικές κινδύνου insider μπορούν να σας βοηθήσουν με τη διαχείριση κινδύνου στον οργανισμό σας, ανατρέξτε στο θέμα [Μάθετε σχετικά με τη διαχείριση κινδύνων insider στο Microsoft 365](https://docs.microsoft.com/microsoft-365/compliance/insider-risk-management). | 51.733333 | 329 | 0.818729 | ell_Grek | 0.999584 |
48d2ba24837cd59d3a1a703d73820e4d32161600 | 587 | md | Markdown | src/components/Input/Checkbox/README.md | wendigolabs/rover-ui | 48d4be4239c1a51ef373ad161ea964f1b86751a4 | [
"MIT"
] | 14 | 2019-07-01T16:58:24.000Z | 2022-01-18T16:18:56.000Z | src/components/Input/Checkbox/README.md | wendigolabs/rover-ui | 48d4be4239c1a51ef373ad161ea964f1b86751a4 | [
"MIT"
] | 152 | 2019-07-01T18:51:06.000Z | 2022-03-08T22:52:54.000Z | src/components/Input/Checkbox/README.md | afwss/rover-ui | aeab869031be23faba5c5de38e09f27a58e99471 | [
"MIT"
] | 12 | 2019-07-15T21:53:29.000Z | 2021-11-04T19:02:36.000Z | # \<Checkbox\>
### Checkbox component is a thin wrapper around an HTML input[type="checkbox"] element
The basic `<Checkbox />` delegates all normal input behavior to the HTML element, and adds custom styles.
It also provides 1 custom prop:
- _fauxDisabled_: Applies the same style as disabled, but, unlike the real thing, doesn't stop propagation of events. Useful for adding tooltips or other helpful behavior when a user tries to interact with a disabled field. Because it doesn't stop click or change events, the consumer is responsible for making faux-disabled fields read-only.
| 58.7 | 342 | 0.781942 | eng_Latn | 0.998898 |
48d360a1e1e3b400606c2aabf5027d61d5707568 | 13,586 | md | Markdown | docs/vsto/programming-vsto-add-ins.md | PoulChapman/visualstudio-docs-public-personal | 26d6f2dc195841a71a44190df8859aa9857a9a43 | [
"CC-BY-4.0",
"MIT"
] | 1 | 2017-08-15T16:18:32.000Z | 2017-08-15T16:18:32.000Z | docs/vsto/programming-vsto-add-ins.md | PoulChapman/visualstudio-docs-personal | 26d6f2dc195841a71a44190df8859aa9857a9a43 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | docs/vsto/programming-vsto-add-ins.md | PoulChapman/visualstudio-docs-personal | 26d6f2dc195841a71a44190df8859aa9857a9a43 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | ---
title: "Programming VSTO Add-Ins | Microsoft Docs"
ms.custom: ""
ms.date: "02/02/2017"
ms.prod: "visual-studio-dev14"
ms.reviewer: ""
ms.suite: ""
ms.technology:
- "office-development"
ms.tgt_pltfrm: ""
ms.topic: "article"
f1_keywords:
- "VST.ProjectItem.Addin"
- "VST.ProjectItem.AddinProject"
- "thisAddIn"
dev_langs:
- "VB"
- "CSharp"
helpviewer_keywords:
- "ICustomTaskPaneConsumer interface"
- "add-ins [Office development in Visual Studio], programming"
- "IRibbonExtensibility interface"
- "UI customizing [Office development in Visual Studio]"
- "Office applications [Office development in Visual Studio], application-level add-ins"
- "programming [Office development in Visual Studio], application-level add-ins"
- "ThisAddIn class"
- "user interfaces [Office development in Visual Studio], customizing"
- "writing code for Office solutions"
- "host items [Office development in Visual Studio], AddIn"
- "application development [Office development in Visual Studio], application-level add-ins"
- "add-ins [Office development in Visual Studio], ThisAddIn class"
- "application-level add-ins [Office development in Visual Studio], ThisAddIn class"
- "FormRegionStartup interface"
- "ThisAddIn_Startup"
- "application-level add-ins [Office development in Visual Studio], programming"
- "ThisAddIn_Shutdown"
ms.assetid: c534786d-2833-4afa-9e4c-4633f46b9eed
caps.latest.revision: 70
author: "kempb"
ms.author: "kempb"
manager: "ghogen"
---
# Programming VSTO Add-Ins
When you extend a Microsoft Office application by creating a VSTO Add-in, you write code directly against the `ThisAddIn` class in your project. You can use this class to perform tasks such as accessing the object model of the Microsoft Office host application, customizing the user interface (UI) of the application, and exposing objects in your VSTO Add-in to other Office solutions.
[!INCLUDE[appliesto_allapp](../vsto/includes/appliesto-allapp-md.md)]
Some aspects of writing code in VSTO Add-in projects are different from other types of projects in Visual Studio. Many of these differences are caused by the way the Office object models are exposed to managed code. For more information, see [Writing Code in Office Solutions](../vsto/writing-code-in-office-solutions.md).
For general information about VSTO Add-ins and other types of solutions you can create by using the Office development tools in Visual Studio, see [Office Solutions Development Overview (VSTO)](../vsto/office-solutions-development-overview-vsto.md).
## Using the ThisAddIn Class
You can start writing your VSTO Add-in code in the `ThisAddIn` class. Visual Studio automatically generates this class in the ThisAddIn.vb (in [!INCLUDE[vbprvb](../sharepoint/includes/vbprvb-md.md)]) or ThisAddIn.cs (in C#) code file in your VSTO Add-in project. The [!INCLUDE[vsto_runtime](../vsto/includes/vsto-runtime-md.md)] automatically instantiates this class for you when the Microsoft Office application loads your VSTO Add-in.
There are two default event handlers in the `ThisAddIn` class. To run code when the VSTO Add-in is loaded, add code to the `ThisAddIn_Startup` event handler. To run code just before the VSTO Add-in is unloaded, add code to the `ThisAddIn_Shutdown` event handler. For more information about these event handlers, see [Events in Office Projects](../vsto/events-in-office-projects.md).
> [!NOTE]
> In Outlook, by default the `ThisAddIn_Shutdown` event handler is not always called when the VSTO Add-in is unloaded. For more information, see [Events in Office Projects](../vsto/events-in-office-projects.md).
### Accessing the Object Model of the Host Application
To access the object model of the host application, use the `Application` field of the `ThisAddIn` class. This field returns an object that represents the current instance of the host application. The following table lists the type of the return value for the `Application` field in each VSTO Add-in project.
|Host application|Return value type|
|----------------------|-----------------------|
|Microsoft Office Excel|<xref:Microsoft.Office.Interop.Excel.Application>|
|Microsoft Office InfoPath|<xref:Microsoft.Office.Interop.InfoPath.Application>|
|Microsoft Office Outlook|<xref:Microsoft.Office.Interop.Outlook.Application>|
|Microsoft Office PowerPoint|<xref:Microsoft.Office.Interop.PowerPoint.Application>|
|Microsoft Office Project|Microsoft.Office.Interop.MSProject.Application|
|Microsoft Office Visio|Microsoft.Office.Interop.Visio.Application|
|Microsoft Office Word|<xref:Microsoft.Office.Interop.Word.Application>|
The following code example shows how to use the `Application` field to create a new workbook in an VSTO Add-in for Microsoft Office Excel. This example is intended to be run from the `ThisAddIn` class.
```vb#
Dim newWorkbook As Excel.Workbook = Me.Application.Workbooks.Add()
```
```c#
Excel.Workbook newWorkbook = this.Application.Workbooks.Add(System.Type.Missing);
```
To do the same thing from outside the `ThisAddIn` class, use the `Globals` object to access the `ThisAddIn` class. For more information about the `Globals` object, see [Global Access to Objects in Office Projects](../vsto/global-access-to-objects-in-office-projects.md).
```vb#
Dim newWorkbook As Excel.Workbook = Globals.ThisAddIn.Application.Workbooks.Add()
```
```c#
Excel.Workbook newWorkbook = Globals.ThisAddIn.Application.Workbooks.Add(System.Type.Missing);
```
For more information about the object models of specific Microsoft Office applications, see the following topics:
- [Excel Object Model Overview](../vsto/excel-object-model-overview.md)
- [Word Object Model Overview](../vsto/word-object-model-overview.md)
- [Outlook Object Model Overview](../vsto/outlook-object-model-overview.md)
- [InfoPath Solutions](../vsto/infopath-solutions.md)
- [PowerPoint Solutions](../vsto/powerpoint-solutions.md)
- [Project Solutions](../vsto/project-solutions.md)
- [Visio Object Model Overview](../vsto/visio-object-model-overview.md)
### <a name="AccessingDocuments"></a> Accessing a Document When the Office Application Starts
Not all [!INCLUDE[office14_long](../vsto/includes/office14-long-md.md)] applications automatically open a document when you start them, and none of the [!INCLUDE[Office_15_short](../vsto/includes/office-15-short-md.md)] applications open a document when you start them. Therefore, don’t add code in the `ThisAdd-In_Startup` event handler if the code requires a document to be open. Instead, add that code to an event that the Office application raises when a user creates or opens a document. That way, you can guarantee that a document is open before your code performs operations on it.
The following code example works with a document in Word only when the user creates a document or opens an existing document.
[!code-cs[Trin_WordAddIn_Menus#3](../vsto/codesnippet/CSharp/trin_wordaddin_menus.cs/thisaddin.cs#3)]
[!code-vb[Trin_WordAddIn_Menus#3](../vsto/codesnippet/VisualBasic/trin_wordaddin_menus.vb/thisaddin.vb#3)]
### ThisAddIn Members to Use for Other Tasks
The following table describes other common tasks and shows which members of the `ThisAddIn` class you can use to perform the tasks.
|Task|Member to use|
|----------|-------------------|
|Run code to initialize the VSTO Add-in when the VSTO Add-in is loaded.|Add code to the `ThisAddIn_Startup` method. This is the default event handler for the <xref:Microsoft.Office.Tools.AddInBase.Startup> event. For more information, see [Events in Office Projects](../vsto/events-in-office-projects.md).|
|Run code to clean up resources used by the VSTO Add-in before the VSTO Add-in is unloaded.|Add code to the `ThisAddIn_Shutdown` method. This is the default event handler for the <xref:Microsoft.Office.Tools.AddInBase.Shutdown> event. For more information, see [Events in Office Projects](../vsto/events-in-office-projects.md). **Note:** In Outlook, by default the `ThisAddIn_Startup` event handler is not always called when the VSTO Add-in is unloaded. For more information, see [Events in Office Projects](../vsto/events-in-office-projects.md).|
|Display a custom task pane.|Use the `CustomTaskPanes` field. For more information, see [Custom Task Panes](../vsto/custom-task-panes.md).|
|Expose objects in your VSTO Add-in to other Microsoft Office solutions.|Override the <xref:Microsoft.Office.Tools.AddInBase.RequestComAddInAutomationService%2A> method. For more information, see [Calling Code in VSTO Add-ins from Other Office Solutions](../vsto/calling-code-in-vsto-add-ins-from-other-office-solutions.md).|
|Customize a feature in the Microsoft Office system by implementing an extensibility interface.|Override the <xref:Microsoft.Office.Tools.AddInBase.RequestService%2A> method to return an instance of a class that implements the interface. For more information, see [Customizing UI Features By Using Extensibility Interfaces](../vsto/customizing-ui-features-by-using-extensibility-interfaces.md). **Note:** To customize the ribbon UI, you can also override the <xref:Microsoft.Office.Tools.AddInBase.CreateRibbonExtensibilityObject%2A> method.|
### Understanding the Design of the ThisAddIn Class
In projects that target the [!INCLUDE[net_v40_short](../sharepoint/includes/net-v40-short-md.md)], <xref:Microsoft.Office.Tools.AddIn> is an interface. The `ThisAddIn` class derives from the <xref:Microsoft.Office.Tools.AddInBase> class. This base class redirects all calls to its members to an internal implementation of the <xref:Microsoft.Office.Tools.AddIn> interface in the [!INCLUDE[vsto_runtime](../vsto/includes/vsto-runtime-md.md)].
In VSTO Add-in projects for Outlook, the `ThisAddIn` class derives from the Microsoft.Office.Tools.Outlook.OutlookAddIn class in projects that target the .NET Framework 3.5, and from <xref:Microsoft.Office.Tools.Outlook.OutlookAddInBase> in projects that target the [!INCLUDE[net_v40_short](../sharepoint/includes/net-v40-short-md.md)]. These base classes provide some additional functionality to support form regions. For more information about form regions, see [Creating Outlook Form Regions](../vsto/creating-outlook-form-regions.md).
## Customizing the User Interface of Microsoft Office Applications
You can programmatically customize the UI of Microsoft Office applications by using a VSTO Add-in. For example, you can customize the ribbon, display a custom task pane, or create a custom form region in Outlook. For more information, see [Office UI Customization](../vsto/office-ui-customization.md).
Visual Studio provides designers and classes that you can use to create custom task panes, ribbon customizations, and Outlook form regions. These designers and classes help to simplify the process of customizing these features. For more information, see [Custom Task Panes](../vsto/custom-task-panes.md), [Ribbon Designer](../vsto/ribbon-designer.md), and [Creating Outlook Form Regions](../vsto/creating-outlook-form-regions.md).
If you want to customize one of these features in a way that is not supported by the classes and designers, you can also customize these features by implementing an *extensibility interface* in your VSTO Add-in. For more information, see [Customizing UI Features By Using Extensibility Interfaces](../vsto/customizing-ui-features-by-using-extensibility-interfaces.md).
In addition, you can modify the UI of Word documents and Excel workbooks by generating host items that extend the behavior of documents and workbooks. This enables you to add managed controls to documents and worksheets. For more information, see [Extending Word Documents and Excel Workbooks in VSTO Add-ins at Run Time](../vsto/extending-word-documents-and-excel-workbooks-in-vsto-add-ins-at-run-time.md).
## Calling Code in VSTO Add-ins from Other Solutions
You can expose objects in your VSTO Add-in to other solutions, including other Office solutions. This is useful if your VSTO Add-in provides a service that you want to enable other solutions to use. For example, if you have an VSTO Add-in for Microsoft Office Excel that performs calculations on financial data from a web service, other solutions can perform these calculations by calling into the Excel VSTO Add-in at run time.
For more information, see [Calling Code in VSTO Add-ins from Other Office Solutions](../vsto/calling-code-in-vsto-add-ins-from-other-office-solutions.md).
## See Also
[Developing Office Solutions](../vsto/developing-office-solutions.md)
[Extending Word Documents and Excel Workbooks in VSTO Add-ins at Run Time](../vsto/extending-word-documents-and-excel-workbooks-in-vsto-add-ins-at-run-time.md)
[Calling Code in VSTO Add-ins from Other Office Solutions](../vsto/calling-code-in-vsto-add-ins-from-other-office-solutions.md)
[Walkthrough: Calling Code in a VSTO Add-in from VBA](../vsto/walkthrough-calling-code-in-a-vsto-add-in-from-vba.md)
[Customizing UI Features By Using Extensibility Interfaces](../vsto/customizing-ui-features-by-using-extensibility-interfaces.md)
[How to: Create Office Projects in Visual Studio](../vsto/how-to-create-office-projects-in-visual-studio.md)
[Architecture of VSTO Add-ins](../vsto/architecture-of-vsto-add-ins.md)
[Writing Code in Office Solutions](../vsto/writing-code-in-office-solutions.md)
| 86.535032 | 591 | 0.764169 | eng_Latn | 0.917082 |
48d390de98f48519fca3a8a36aa7fc8dddbdc220 | 10,754 | md | Markdown | articles/finance/accounts-payable/sepa-credit-transfer.md | HaphazardLegoman/dynamics-365-unified-operations-public | f4354840352344b27b69867c65036e2f087dc7e1 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | articles/finance/accounts-payable/sepa-credit-transfer.md | HaphazardLegoman/dynamics-365-unified-operations-public | f4354840352344b27b69867c65036e2f087dc7e1 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | articles/finance/accounts-payable/sepa-credit-transfer.md | HaphazardLegoman/dynamics-365-unified-operations-public | f4354840352344b27b69867c65036e2f087dc7e1 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | ---
# required metadata
title: SEPA credit transfer overview
description: This article provides general information about ISO 20022 credit transfers, which include Single Euro Payments Area (SEPA) credit transfers and any other electronic payments for vendors. A SEPA credit transfer is a specific type of payment in euros from one company or individual to another company or individual. The topic also explains how to set up and transmit a credit transfer payment file.
author: ShylaThompson
ms.date: 06/20/2017
ms.topic: article
ms.prod:
ms.technology:
# optional metadata
ms.search.form: LedgerJournalTransVendInvoice, LedgerJournalTransVendPaym, VendPaymMode
# ROBOTS:
audience: Application User
# ms.devlang:
ms.reviewer: roschlom
# ms.tgt_pltfrm:
ms.custom: 11124
ms.assetid: 36b0f870-16d4-4bbb-8da5-e747e69b970d
ms.search.region: Global
# ms.search.industry:
ms.author: mrolecki
ms.search.validFrom: 2016-02-28
ms.dyn365.ops.version: AX 7.0.0
---
# SEPA credit transfer overview
[!include [banner](../includes/banner.md)]
This article provides general information about ISO 20022 credit transfers, which include Single Euro Payments Area (SEPA) credit transfers and any other electronic payments for vendors. A SEPA credit transfer is a specific type of payment in euros from one company or individual to another company or individual. The topic also explains how to set up and transmit a credit transfer payment file.
## What is a credit transfer message?
The credit transfer message is a request that an initiating party (your company) sends to move funds from its own account to a creditor. There are many country/region-specific and bank-specific implementations of credit transfer messages. Some of them are used within one country/region, and some are becoming standards. One well-established global standard is ISO 20022 and its initiation messages, such as Credit transfer. The following illustration shows the relations and coverage for selected credit transfer messages.
 Credit transfer messages
## What are ISO 20022 and SEPA payments?
The Single Euro Payments Area (SEPA) is set up by the European Commission and dictates that all electronic payments are considered domestic, regardless of the country/region where the individual, business, or organization, and the bank are located. There is no difference between national payments and cross-border payments. The SEPA includes the 28 member states of the European Union (EU), and also Iceland, Liechtenstein, Norway, Switzerland, Monaco, and San Marino. The SEPA helps form a single market for payment transactions within the European Economic Area (EEA). Ultimately, the SEPA is expected to reduce the number of payment formats that banks, businesses, and individuals must work with. The European Commission established the legal foundation for SEPA payments through the Payment Services Directive (PSD). The European Payments Council (EPC) supports the SEPA through the following activities:
- It sets the standards for SEPA electronic payments by using the ISO 20022 Universal financial industry message scheme XML format.
- It establishes rules and guidelines about the handling of euro payments.
The EPC, which consists of European banks, develops the commercial and technical frameworks for SEPA payment instruments. Three types of SEPA payments are used:
- Credit transfers
- Direct debits
- Cards
## What is a SEPA credit transfer?
A SEPA credit transfer is a payment from one company or individual to another company or individual. Payments must be in euros, and must include the International Bank Account Number (IBAN) and the Bank Identifier Code (BIC) for both parties. (The BIC is also known as the Society for Worldwide Interbank Financial Telecommunication \[SWIFT\] code.) Additionally, transaction costs must be shared between both parties. Credit transfers that occur between parties should use XML files that comply with ISO 20022 payment processing standards and the XML format, as specified by the EPC.
## How is a credit transfer implemented?
The credit transfer payment format for European countries is implemented by using the Electronic reporting (ER) and Methods of payment functionality in Microsoft Dynamics 365 Finance. A few credit transfer formats that are used in other regions still use the legacy payment framework. Among many other formats, there are twelve ISO 20022 credit transfer file formats that are available. These export formats conform to the SEPA ISO 20022 XML standard. They are used to generate non-euro payment transfers for countries/regions where they are used and euro payments as specified in version 8.2 of the SEPA Credit Transfer Scheme Rulebook that the EPC releases. Before you can implement credit transfers, you must contact your bank to obtain the software that is required in order to upload electronic banking files. You will use that software to transfer the XML files that contain payment orders to your bank.
## What credit transfer formats are currently supported?
You should always go to the Shared asset library on Microsoft Dynamics Lifecycle services (LCS) and view the most up-to-date list of available files that have an asset type of **GER configuration**. The next section, "What do I have to set up?", provides a link to the topic that explains how to create an LCS repository to review available configurations and import selected configurations.
## What do I have to set up?
- Before you can create credit transfer files, at least one active credit transfer configuration must be imported into your ER configurations. For instructions, see [Download Electronic reporting configurations from Lifecycle Services](../../dev-itpro/analytics/download-electronic-reporting-configuration-lcs.md).
- When you configure Accounts payable methods of payment, select the **Generic electronic reporting** check box, and select the appropriate credit transfer format (for example, **ISO 20022 Credit transfer (AT)**) as an export format configuration.
- You must also set up the legal entity and bank account information.
- Bank account numbers, IBANs, and sometimes SWIFT codes (BICs) or other IDs are required in order to create valid credit transfer payments. Therefore, you must set up them for the vendor bank account and the bank account for the organization that is requesting the transfer.
- Additional information might be required, such as value-added tax (VAT) numbers for the parties that are referred to in the credit transfer message. This information must be set up for vendors and for the legal entity when it's requested.
- Some Accounts payable methods of payment, mostly ISO 20022–based methods of payment, might require additional setup for **Payment format code sets**, such as **Service type** = **SLEV**. Those codes are used as additional tagging for payment transactions during payment processing. Default values of Payment codes, like **Category purpose**, **Charge bearer**, **Local instrument** and **Service level** can be set in two places. The first place is **Accounts payable payment journal header** and the second is **Accounts payable methods for payments**. Upon payment journal lines creation, Payment code values set on payment journal header are transferred to a journal line, if not set, the values from Methods of payment are used.
## What parameters are available for generating credit transfer payments?
The list of specific parameters depends on the credit transfer format. The following table shows the parameters that are available when you generate a ISO 20022 credit transfer payment file for Germany in a vendor payment journal. By using the options that are available on the **Run in the background** tab, you can run payment generation in batch mode.
<table>
<colgroup>
<col width="50%" />
<col width="50%" />
</colgroup>
<thead>
<tr class="header">
<th>Field</th>
<th>Description</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<td>Batch booking</td>
<td>Select this check box to include the batch booking tag in the XML file.</td>
</tr>
<tr class="even">
<td>Processing date</td>
<td>Enter the date when the bank should process the payments.</td>
</tr>
<tr class="odd">
<td>Format</td>
<td>Select the format for remittance information, depending on the requirements of your country/region or bank:
<ul>
<li><strong>Strd</strong> – Select this option to use the structured format when one payment line is settled against one invoice. This option isn't available for the country/region-specific export formats for France, Germany, or the Netherlands.</li>
<li><strong>Ustrd</strong> – Select this option to use the unstructured format when the payment is settled against multiple invoices. The invoice numbers for the settled invoices are concatenated and used as the remittance information. In compliance with ISO 20022 guidelines, unstructured remittance information is limited to 140 characters.</li>
</ul></td>
</tr>
<tr class="even">
<td>Number of invoices</td>
<td>Enter the number of invoices that the <strong>Payment advice</strong> report is printed from.</td>
</tr>
<tr class="odd">
<td>Sequence number</td>
<td>Enter a sequence number to identify the file. The sequence number appears on the <strong>Attending note</strong> report.</td>
</tr>
<tr class="even">
<td>Print attending note</td>
<td>Select this check box to print the <strong>Attending note</strong> report.</td>
</tr>
<tr class="odd">
<td>Print control report</td>
<td>Select this check box to print a report that contains the payment information.</td>
</tr>
<tr class="even">
<td>Print covering letter</td>
<td>Select this check box to print the <strong>Payment advice</strong> report.</td>
</tr>
</tbody>
</table>
## What are IBANs and BICs?
The International Bank Account Number (IBAN) and Bank Identifier Code (BIC) are used to identify any account in many countries/regions worldwide. These include the 34 SEPA countries/regions. Enter the BIC in the **SWIFT code** field and the IBAN in the **IBAN** field. For both the creditor’s bank account and the customer’s bank account, these fields are located on the **Additional identification** FastTab on the **Bank account** tab of the **Bank accounts** page. The use of BIC for SEPA payments is no longer enforced.
## How do I transmit a payment file to the bank?
When you generate payments, the payment file is generated, and you're asked to save it from your web browser to any available location. The next step is to send the XML file to your bank. This process varies from bank to bank. Follow the instructions from your bank to submit the files to the bank for processing.
[!INCLUDE[footer-include](../../includes/footer-banner.md)] | 80.857143 | 909 | 0.787242 | eng_Latn | 0.99779 |
48d3ab877e9bb51c1a6b84668d047e0f29e77da0 | 5,435 | md | Markdown | docs/extensibility/sccdiff-function.md | MicrosoftDocs/visualstudio-docs.de-de | edda581743b0eede0b99441d8e52a8d0e133dec8 | [
"CC-BY-4.0",
"MIT"
] | 10 | 2018-09-27T09:13:44.000Z | 2021-09-08T07:12:47.000Z | docs/extensibility/sccdiff-function.md | MicrosoftDocs/visualstudio-docs.de-de | edda581743b0eede0b99441d8e52a8d0e133dec8 | [
"CC-BY-4.0",
"MIT"
] | 68 | 2018-02-07T12:07:58.000Z | 2021-03-19T00:35:58.000Z | docs/extensibility/sccdiff-function.md | MicrosoftDocs/visualstudio-docs.de-de | edda581743b0eede0b99441d8e52a8d0e133dec8 | [
"CC-BY-4.0",
"MIT"
] | 41 | 2018-01-05T16:53:02.000Z | 2021-10-09T11:00:50.000Z | ---
description: Diese Funktion zeigt die Unterschiede zwischen der aktuellen Datei (auf dem lokalen Datenträger) und der zuletzt eincheckten Version im Quellcodeverwaltungssystem an (oder überprüft optional nur, ob sie vorhanden ist).
title: SccDiff-| Microsoft-Dokumentation
ms.date: 11/04/2016
ms.topic: reference
f1_keywords:
- SccDiff
helpviewer_keywords:
- SccDiff function
ms.assetid: d49bc8c5-f631-4153-9d3c-feb3564da305
author: leslierichardson95
ms.author: lerich
manager: jmartens
ms.technology: vs-ide-sdk
ms.workload:
- vssdk
ms.openlocfilehash: 1a644d677fb2a6f1d50909294649b270617a5bf0
ms.sourcegitcommit: 68897da7d74c31ae1ebf5d47c7b5ddc9b108265b
ms.translationtype: MT
ms.contentlocale: de-DE
ms.lasthandoff: 08/13/2021
ms.locfileid: "122117617"
---
# <a name="sccdiff-function"></a>SccDiff-Funktion
Diese Funktion zeigt die Unterschiede zwischen der aktuellen Datei (auf dem lokalen Datenträger) und der zuletzt eincheckten Version im Quellcodeverwaltungssystem an (oder überprüft optional nur, ob sie vorhanden ist).
## <a name="syntax"></a>Syntax
```cpp
SCCRTN SccDiff(
LPVOID pvContext,
HWND hWnd,
LPCSTR lpFileName,
LONG fOptions,
LPCMDOPTS pvOptions
);
```
### <a name="parameters"></a>Parameter
pvContext
[in] Die Kontextstruktur des Quellcodeverwaltungs-Plug-Ins.
hWnd
[in] Ein Handle für das IDE-Fenster, das das Quellcodeverwaltungs-Plug-In als übergeordnetes Element für alle Dialogfelder verwenden kann, die es bietet.
lpFileName
[in] Dateiname, für den der Unterschied angefordert wird.
Foptions
[in] Befehlsflags. Einzelheiten finden Sie in den Hinweisen.
pvOptions
[in] Plug-In-spezifische Optionen für die Quellcodeverwaltung.
## <a name="return-value"></a>Rückgabewert
Es wird erwartet, dass die Quellcodeverwaltungs-Plug-In-Implementierung dieser Funktion einen der folgenden Werte zurück gibt:
|Wert|Beschreibung|
|-----------|-----------------|
|SCC_OK|Arbeitskopie und Serverversion sind identisch.|
|SCC_I_FILESDIFFERS|Die Arbeitskopie unterscheidet sich von der Version unter Quellcodeverwaltung.|
|SCC_I_RELOADFILE|Eine Datei oder ein Projekt muss neu geladen werden.|
|SCC_E_FILENOTCONTROLLED|Die Datei befindet sich nicht unter Quellcodeverwaltung.|
|SCC_E_NOTAUTHORIZED|Der Benutzer darf diesen Vorgang nicht ausführen.|
|SCC_E_ACCESSFAILURE|Es gab ein Problem beim Zugriff auf das Quellcodeverwaltungssystem, wahrscheinlich aufgrund von Netzwerk- oder Problemproblemen. Eine Wiederholung wird empfohlen.|
|SCC_E_NONSPECIFICERROR|Nicht angegebener Fehler; Der Dateiunterschied wurde nicht erhalten.|
|SCC_E_FILENOTEXIST|Die lokale Datei wurde nicht gefunden.|
## <a name="remarks"></a>Hinweise
Diese Funktion dient zwei verschiedenen Zwecken. Standardmäßig wird eine Liste der Änderungen an einer Datei angezeigt. Das Quellcodeverwaltungs-Plug-In öffnet ein eigenes Fenster in einem formatierten Format, in dem die Unterschiede zwischen der Datei des Benutzers auf dem Datenträger und der neuesten Version der Datei unter Quellcodeverwaltung angezeigt werden.
Alternativ muss die IDE möglicherweise einfach bestimmen, ob sich eine Datei geändert hat. Beispielsweise muss die IDE möglicherweise bestimmen, ob es sicher ist, eine Datei auschecken, ohne den Benutzer zu informieren. In diesem Fall übergibt die IDE das `SCC_DIFF_CONTENTS` -Flag. Das Quellcodeverwaltungs-Plug-In muss die Datei auf dem Datenträger (Byte byte) mit der Quellcodeverwaltungsdatei überprüfen und einen Wert zurückgeben, der angibt, ob sich die beiden Dateien unterscheiden, ohne dem Benutzer etwas anzuzeigen.
Als Leistungsoptimierung verwendet das Quellcodeverwaltungs-Plug-In möglicherweise eine Alternative, die auf einer Prüfsumme oder einem Zeitstempel basiert, anstelle des Byte-byte-Vergleichs, der von aufgerufen wird: Diese Vergleichsformen sind offensichtlich schneller, aber weniger `SCC_DIFF_CONTENTS` zuverlässig. Nicht alle Quellcodeverwaltungssysteme unterstützen möglicherweise diese alternativen Vergleichsmethoden, und das Plug-In muss möglicherweise auf einen Inhaltsvergleich zurückfallen. Alle Quellcodeverwaltungs-Plug-Ins müssen mindestens einen Inhaltsvergleich unterstützen.
> [!NOTE]
> Die Flags für schnelle Unterschiede schließen sich gegenseitig aus. Es ist gültig, keine Flags zu übergeben, aber es ist nicht zulässig, mehrere Flags gleichzeitig zu übergeben. `SCC_DIFF_QUICK_DIFF`, bei der es sich um eine Maske handelt, die alle Flags kombiniert, kann zum Testen verwendet werden, sollte aber nie als Parameter übergeben werden.
|`fOption`|Bedeutung|
|---------------|-------------|
|SCC_DIFF_IGNORECASE|Vergleich ohne Unterscheidung nach Groß-/Kleinschreibung (kann für schnelle oder visuelle Unterschiede verwendet werden).|
|SCC_DIFF_IGNORESPACE|Ignoriert Leerzeichen (kann für schnelle oder visuelle Unterschiede verwendet werden).|
|SCC_DIFF_QD_CONTENTS|Vergleicht die Datei im Hintergrund, byte byte.|
|SCC_DIFF_QD_CHECKSUM|Vergleicht die Datei automatisch über eine Prüfsumme, wenn dies unterstützt wird. Falls dies nicht unterstützt wird, wird auf einen Inhaltsvergleich zurückkommen.|
|SCC_DIFF_QD_TIME|Vergleicht die Datei automatisch über ihren Zeitstempel, wenn sie unterstützt wird. Falls dies nicht unterstützt wird, wird auf einen Inhaltsvergleich zurückkommen.|
## <a name="see-also"></a>Siehe auch
- [Funktionen der Quellcodeverwaltungs-Plug-In-API](../extensibility/source-control-plug-in-api-functions.md)
| 57.819149 | 590 | 0.810488 | deu_Latn | 0.994541 |
48d3d6b8fa6ed98ea430314e57fcf933f1b04b56 | 7,145 | md | Markdown | wdk-ddi-src/content/netdma/nc-netdma-dma_start_handler.md | kein284/windows-driver-docs-ddi | 3b70e03c2ddd9d8d531f4dc2fb9a4bb481b7dd54 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | wdk-ddi-src/content/netdma/nc-netdma-dma_start_handler.md | kein284/windows-driver-docs-ddi | 3b70e03c2ddd9d8d531f4dc2fb9a4bb481b7dd54 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | wdk-ddi-src/content/netdma/nc-netdma-dma_start_handler.md | kein284/windows-driver-docs-ddi | 3b70e03c2ddd9d8d531f4dc2fb9a4bb481b7dd54 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | ---
UID: NC:netdma.DMA_START_HANDLER
title: DMA_START_HANDLER (netdma.h)
description: The ProviderStartDma function starts a DMA transfer on the specified DMA channel.
old-location: netvista\providerstartdma.htm
tech.root: netvista
ms.assetid: 0926e8c4-f2ca-401f-abe8-76aec359a1e2
ms.date: 05/02/2018
keywords: ["DMA_START_HANDLER callback function"]
ms.keywords: DMA_START_HANDLER, DMA_START_HANDLER callback, ProviderStartDma, ProviderStartDma callback function [Network Drivers Starting with Windows Vista], netdma/ProviderStartDma, netdma_ref_76be9ff2-b865-4516-ad7b-ab3951133f41.xml, netvista.providerstartdma
req.header: netdma.h
req.include-header: Netdma.h
req.target-type: Windows
req.target-min-winverclnt: Supported for NetDMA 2.0 drivers in Windows Server 2008. Supported for NetDMA 1.1 drivers in Windows Server 2008. Supported for NetDMA 1.0 drivers in Windows Server 2008 and Windows Vista.
req.target-min-winversvr:
req.kmdf-ver:
req.umdf-ver:
req.ddi-compliance:
req.unicode-ansi:
req.idl:
req.max-support:
req.namespace:
req.assembly:
req.type-library:
req.lib:
req.dll:
req.irql: <= DISPATCH_LEVEL
targetos: Windows
req.typenames:
f1_keywords:
- DMA_START_HANDLER
- netdma/DMA_START_HANDLER
topic_type:
- APIRef
- kbSyntax
api_type:
- UserDefined
api_location:
- netdma.h
api_name:
- ProviderStartDma
---
# DMA_START_HANDLER callback function
## -description
<div class="alert"><b>Note</b> The NetDMA interface is not supported
in Windows 8 and later.</div>
The <i>ProviderStartDma</i> function starts a DMA transfer on the specified DMA channel.
## -parameters
### -param ProviderChannelContext
[in]
A pointer that identifies a DMA channel's context area. The DMA provider returned this handle to
NetDMA at the location that is specified in the
<i>pProviderChannelContext</i> parameter of the
<a href="https://docs.microsoft.com/windows-hardware/drivers/ddi/netdma/nc-netdma-dma_channel_allocate_handler">
ProviderAllocateDmaChannel</a> function.
### -param DescriptorVirtualAddress
[in]
A pointer to the virtual address of the first
<a href="https://docs.microsoft.com/windows-hardware/drivers/ddi/netdma/ns-netdma-_net_dma_descriptor">NET_DMA_DESCRIPTOR</a> structure in a linked
list of DMA descriptors. The corresponding physical address is specified at the
<i>DescriptorPhysicalAddress</i> parameter.
### -param DescriptorPhysicalAddress
[in]
A pointer to the physical address of the first DMA descriptor in a linked list of DMA descriptors.
The corresponding virtual address is specified at the
<i>DescriptorVirtualAddress</i> parameter.
### -param DescriptorCount
[in]
The number of DMA descriptors at
<i>DescriptorVirtualAddress</i> .
<div class="alert"><b>Note</b> NetDMA provider drivers prior to NetDMA version 2.0 can ignore the
<i>DescriptorCount</i> parameter. For NetDMA 2.0 and later versions, this parameter is the count of
descriptors in the DMA operation.</div>
<div> </div>
## -returns
<i>ProviderStartDma</i> returns one of the following status values:
<table>
<tr>
<th>Return code</th>
<th>Description</th>
</tr>
<tr>
<td width="40%">
<dl>
<dt><b>STATUS_SUCCESS</b></dt>
</dl>
</td>
<td width="60%">
The operation completed successfully.
</td>
</tr>
<tr>
<td width="40%">
<dl>
<dt><b>STATUS_RESOURCES</b></dt>
</dl>
</td>
<td width="60%">
The operation failed because of insufficient resources.
</td>
</tr>
<tr>
<td width="40%">
<dl>
<dt><b>STATUS_UNSUCCESSFUL</b></dt>
</dl>
</td>
<td width="60%">
The operation failed for unspecified reasons.
</td>
</tr>
</table>
## -remarks
The NetDMA interface calls a DMA provider driver's
<i>ProviderStartDma</i> function to start a DMA transfer. The NetDMA interface can call
<i>ProviderStartDma</i> at any time after a DMA channel is allocated. The NetDMA interface must call
<i>ProviderStartDma</i> after it calls the
<a href="https://docs.microsoft.com/windows-hardware/drivers/ddi/netdma/nc-netdma-dma_abort_handler">ProviderAbortDma</a>,
<a href="https://docs.microsoft.com/windows-hardware/drivers/ddi/netdma/nc-netdma-dma_reset_handler">ProviderResetChannel</a>, or
<a href="https://docs.microsoft.com/windows-hardware/drivers/ddi/netdma/nc-netdma-dma_channel_allocate_handler">
ProviderAllocateDmaChannel</a> function for a DMA channel.
The source of the DMA transfer is a linked list of DMA descriptors. The
<b>NextDescriptor</b> member of the
<a href="https://docs.microsoft.com/windows-hardware/drivers/ddi/netdma/ns-netdma-_net_dma_descriptor">NET_DMA_DESCRIPTOR</a> structure at the
<i>DescriptorVirtualAddress</i> parameter contains the physical address of the next NET_DMA_DESCRIPTOR
structure in the linked list.
<div class="alert"><b>Note</b> In NetDMA 2.0 and later versions, the linked list of descriptors is not
NULL-terminated. The
<b>NextDescriptor</b> member in the last descriptor in the linked list specifies the physical address of
the
<a href="https://docs.microsoft.com/windows-hardware/drivers/ddi/netdma/ns-netdma-_net_dma_descriptor">NET_DMA_DESCRIPTOR</a> structure that will be
used in the subsequent call to the
<a href="https://docs.microsoft.com/windows-hardware/drivers/ddi/netdma/nc-netdma-dma_append_handler">ProviderAppendDma</a> function. A NetDMA 2.0
provider driver can cache the address in
<b>NextDescriptor</b> and use this address as the beginning of the linked list for the next Append
operation.</div>
<div> </div>
To perform the start operation, the DMA provider must disregard the existing DMA descriptor list, if
any, after it completes any processing on the current descriptor. The DMA provider must ignore the
<b>NextDescriptor</b> member in the current NET_DMA_DESCRIPTOR structure and load the descriptor that
<i>ProviderStartDma</i> specifies.
After
<i>ProviderStartDma</i> starts the initial DMA transfer, the NetDMA interface can call the
<a href="https://docs.microsoft.com/windows-hardware/drivers/ddi/netdma/nc-netdma-dma_append_handler">ProviderAppendDma</a> function to append
additional data to the transfer.
NetDMA calls
<i>ProviderStartDma</i> at IRQL <= DISPATCH_LEVEL.
## -see-also
<a href="https://docs.microsoft.com/windows-hardware/drivers/ddi/netdma/ns-netdma-_net_dma_descriptor">NET_DMA_DESCRIPTOR</a>
<a href="https://docs.microsoft.com/windows-hardware/drivers/ddi/netdma/nc-netdma-dma_abort_handler">ProviderAbortDma</a>
<a href="https://docs.microsoft.com/windows-hardware/drivers/ddi/netdma/nc-netdma-dma_channel_allocate_handler">ProviderAllocateDmaChannel</a>
<a href="https://docs.microsoft.com/windows-hardware/drivers/ddi/netdma/nc-netdma-dma_append_handler">ProviderAppendDma</a>
<a href="https://docs.microsoft.com/windows-hardware/drivers/ddi/netdma/nc-netdma-dma_reset_handler">ProviderResetChannel</a>
| 36.085859 | 264 | 0.737019 | eng_Latn | 0.603621 |
48d44c88936ed8f34f37bb0d66a8cdd0d9969b68 | 1,627 | md | Markdown | _modules/04-Birth-Control.md | emleddin/queering-reproduction | 72187a006783b9436c1bf6b7ea1a988880430e17 | [
"MIT"
] | null | null | null | _modules/04-Birth-Control.md | emleddin/queering-reproduction | 72187a006783b9436c1bf6b7ea1a988880430e17 | [
"MIT"
] | null | null | null | _modules/04-Birth-Control.md | emleddin/queering-reproduction | 72187a006783b9436c1bf6b7ea1a988880430e17 | [
"MIT"
] | null | null | null | ---
title: Birth Control
subtitle: What works with an HRT regimen?
description: This module is about birth control methods for transgender and non-binary individuals.
#module_code: 04_BC
layout: module
image: '../../img/Mirena-IUD.jpg'
imgcapt: 'Sarahmirk'
summary:
- "All birth control methods are safe for people with uteruses. However, the
only non-hormone prescription-based method is the copper IUD."
---
One concern that many trans masculine individuals have is that taking
estrogen-based birth control methods will interfere with their hormone
replacement therapy (HRT).
## References
1. [Bentsianova S, Gordona L, Goldman A, Jacobs A, Steevera J. Use of Copper Intrauterine Device in Transgender Male Adolescents. *Contraception*. 2018;98(1):74-75. doi: 10.1016/j.contraception.2018.02.010.](https://doi.org/10.1016/j.contraception.2018.02.010)
2. [Mehringer J, Dowshen NL. Sexual and reproductive health considerations among transgender and gender-expansive youth. *Curr Probl Pediatr Adolesc Health Care*. 2019;49(9):100684. doi: 10.1016/j.cppeds.2019.100684.](https://doi.org/10.1016/j.cppeds.2019.100684)
3. [Boudreau D, Mukerjee R. Contraception Care for Transmasculine Individuals on Testosterone Therapy. *J Midwifery Womens Health*. 2019;64:395-402. doi: 10.1111/jmwh.12962.](https://doi.org/10.1111/jmwh.12962) Freely available from [Research Gate](https://www.researchgate.net/profile/Ronica_Mukerjee/publication/332514791_Contraception_Care_for_Transmasculine_Individuals_on_Testosterone_Therapy/links/5de95f4b299bf10bc343638e/Contraception-Care-for-Transmasculine-Individuals-on-Testosterone-Therapy.pdf)
| 73.954545 | 507 | 0.800246 | eng_Latn | 0.522968 |
48d4f8209d5b422cef810535f8cc918c59a9d6c8 | 556 | md | Markdown | profiles/README.md | bausmeier/FHIR.js | 4f025e47b139093731f4523c0501974528c27a26 | [
"Apache-2.0"
] | 75 | 2015-09-11T23:42:56.000Z | 2022-02-08T21:07:26.000Z | profiles/README.md | bausmeier/FHIR.js | 4f025e47b139093731f4523c0501974528c27a26 | [
"Apache-2.0"
] | 39 | 2016-12-08T09:34:42.000Z | 2021-10-13T16:08:50.000Z | profiles/README.md | bausmeier/FHIR.js | 4f025e47b139093731f4523c0501974528c27a26 | [
"Apache-2.0"
] | 26 | 2016-10-25T23:18:39.000Z | 2021-11-30T09:31:49.000Z | ## packageProfiles.js
Combines all profiles in the specified directory into a single bundle of profiles.
### Parameters
| Param | Description |
| ----- | ----------- |
| -d --directory | A directory to get each of the profiles from |
| -b --bundleFile | A file that represents a JSON bundle of all profiles that you want packaged into the correct format for FHIR.js |
| -o --outFile | The file to save the combined/bundled profiles to |
### Example
`node packageProfiles.js -b r4/profiles-resources.json -b r4/profiles-types.json -o profiles/r4/index.js` | 46.333333 | 133 | 0.717626 | eng_Latn | 0.951299 |
48d5c978e21561de818c6bedd098df08534f897e | 4,448 | md | Markdown | docs/en/training_entries/ClassifierDL.md | hatrungduc/spark-nlp | b38260543524507e34cbcb7fa2006923091634ad | [
"Apache-2.0"
] | 2,731 | 2017-09-25T08:26:31.000Z | 2022-03-30T10:57:32.000Z | docs/en/training_entries/ClassifierDL.md | hatrungduc/spark-nlp | b38260543524507e34cbcb7fa2006923091634ad | [
"Apache-2.0"
] | 957 | 2017-10-03T20:47:51.000Z | 2022-03-31T14:58:52.000Z | docs/en/training_entries/ClassifierDL.md | hatrungduc/spark-nlp | b38260543524507e34cbcb7fa2006923091634ad | [
"Apache-2.0"
] | 600 | 2017-10-08T11:35:58.000Z | 2022-03-31T11:19:50.000Z | {%- capture title -%}
ClassifierDLApproach
{%- endcapture -%}
{%- capture description -%}
Trains a ClassifierDL for generic Multi-class Text Classification.
ClassifierDL uses the state-of-the-art Universal Sentence Encoder as an input for text classifications.
The ClassifierDL annotator uses a deep learning model (DNNs) we have built inside TensorFlow and supports up to
100 classes.
For extended examples of usage, see the Spark NLP Workshop
[[1] ](https://github.com/JohnSnowLabs/spark-nlp-workshop/blob/master/scala/training/Train%20Multi-Class%20Text%20Classification%20on%20News%20Articles.scala)
[[2] ](https://github.com/JohnSnowLabs/spark-nlp-workshop/blob/master/tutorials/Certification_Trainings/Public/5.Text_Classification_with_ClassifierDL.ipynb).
{%- endcapture -%}
{%- capture input_anno -%}
SENTENCE_EMBEDDINGS
{%- endcapture -%}
{%- capture output_anno -%}
CATEGORY
{%- endcapture -%}
{%- capture python_example -%}
# In this example, the training data `"sentiment.csv"` has the form of
#
# text,label
# This movie is the best movie I have wached ever! In my opinion this movie can win an award.,0
# This was a terrible movie! The acting was bad really bad!,1
# ...
#
# Then traning can be done like so:
import sparknlp
from sparknlp.base import *
from sparknlp.annotator import *
from pyspark.ml import Pipeline
smallCorpus = spark.read.option("header","True").csv("src/test/resources/classifier/sentiment.csv")
documentAssembler = DocumentAssembler() \
.setInputCol("text") \
.setOutputCol("document")
useEmbeddings = UniversalSentenceEncoder.pretrained() \
.setInputCols("document") \
.setOutputCol("sentence_embeddings")
docClassifier = ClassifierDLApproach() \
.setInputCols("sentence_embeddings") \
.setOutputCol("category") \
.setLabelColumn("label") \
.setBatchSize(64) \
.setMaxEpochs(20) \
.setLr(5e-3) \
.setDropout(0.5)
pipeline = Pipeline() \
.setStages(
[
documentAssembler,
useEmbeddings,
docClassifier
]
)
pipelineModel = pipeline.fit(smallCorpus)
{%- endcapture -%}
{%- capture scala_example -%}
// In this example, the training data `"sentiment.csv"` has the form of
//
// text,label
// This movie is the best movie I have wached ever! In my opinion this movie can win an award.,0
// This was a terrible movie! The acting was bad really bad!,1
// ...
//
// Then traning can be done like so:
import com.johnsnowlabs.nlp.base.DocumentAssembler
import com.johnsnowlabs.nlp.embeddings.UniversalSentenceEncoder
import com.johnsnowlabs.nlp.annotators.classifier.dl.ClassifierDLApproach
import org.apache.spark.ml.Pipeline
val smallCorpus = spark.read.option("header","true").csv("src/test/resources/classifier/sentiment.csv")
val documentAssembler = new DocumentAssembler()
.setInputCol("text")
.setOutputCol("document")
val useEmbeddings = UniversalSentenceEncoder.pretrained()
.setInputCols("document")
.setOutputCol("sentence_embeddings")
val docClassifier = new ClassifierDLApproach()
.setInputCols("sentence_embeddings")
.setOutputCol("category")
.setLabelColumn("label")
.setBatchSize(64)
.setMaxEpochs(20)
.setLr(5e-3f)
.setDropout(0.5f)
val pipeline = new Pipeline()
.setStages(
Array(
documentAssembler,
useEmbeddings,
docClassifier
)
)
val pipelineModel = pipeline.fit(smallCorpus)
{%- endcapture -%}
{%- capture api_link -%}
[ClassifierDLApproach](https://nlp.johnsnowlabs.com/api/com/johnsnowlabs/nlp/annotators/classifier/dl/ClassifierDLApproach)
{%- endcapture -%}
{%- capture python_api_link -%}
[ClassifierDLApproach](https://nlp.johnsnowlabs.com/api/python/reference/autosummary/sparknlp.annotator.ClassifierDLApproach.html)
{%- endcapture -%}
{%- capture source_link -%}
[ClassifierDLApproach](https://github.com/JohnSnowLabs/spark-nlp/tree/master/src/main/scala/com/johnsnowlabs/nlp/annotators/classifier/dl/ClassifierDLApproach.scala)
{%- endcapture -%}
{% include templates/training_anno_template.md
title=title
description=description
input_anno=input_anno
output_anno=output_anno
python_example=python_example
scala_example=scala_example
python_api_link=python_api_link
api_link=api_link
source_link=source_link
note="This annotator accepts a label column of a single item in either type of String, Int, Float, or Double. UniversalSentenceEncoder, BertSentenceEmbeddings, or SentenceEmbeddings can be used for the inputCol"
%}
| 31.104895 | 211 | 0.754272 | eng_Latn | 0.531539 |
48d5e7dc0f07d3c5f47dc348cbb8728fee52f74c | 535 | md | Markdown | README.md | sptobey/week7-challenge | cee3381883dc9a5e8cec7c61e5ca83f2e3502017 | [
"MIT"
] | null | null | null | README.md | sptobey/week7-challenge | cee3381883dc9a5e8cec7c61e5ca83f2e3502017 | [
"MIT"
] | null | null | null | README.md | sptobey/week7-challenge | cee3381883dc9a5e8cec7c61e5ca83f2e3502017 | [
"MIT"
] | null | null | null | # Hearthstone & Games
Lookup cards in Hearthstone, and search video games.
# Name
Samuel P. Tobey
# Score
50/50
# API
Hearthstone, IGN
# Github
https://github.com/sptobey/week7-challenge
# URL
http://sptobey.github.io/week7-challenge/
(not working as expected)
# Screenshots
Hearthstone card search

IGN Game search

| 19.814815 | 105 | 0.779439 | eng_Latn | 0.23788 |
48d6062ed42bce70defdf82fe84e2d37afbb583c | 1,391 | md | Markdown | docs/machine-learning/install/includes/custom-runtime-r-linux-rhel.md | roaming-debug/sql-docs.zh-cn | 6a1bc73995cfdbde269233c6342e136f32349419 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | docs/machine-learning/install/includes/custom-runtime-r-linux-rhel.md | roaming-debug/sql-docs.zh-cn | 6a1bc73995cfdbde269233c6342e136f32349419 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | docs/machine-learning/install/includes/custom-runtime-r-linux-rhel.md | roaming-debug/sql-docs.zh-cn | 6a1bc73995cfdbde269233c6342e136f32349419 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | ---
ms.prod: sql
ms.technology: machine-learning-services
ms.date: 03/18/2021
ms.topic: include
author: dphansen
ms.author: davidph
ms.openlocfilehash: f6ec3bbcc720fe472cc7146d59c30f0f3fc65ab0
ms.sourcegitcommit: efce0ed7d1c0ab36a4a9b88585111636134c0fbb
ms.translationtype: HT
ms.contentlocale: zh-CN
ms.lasthandoff: 03/23/2021
ms.locfileid: "104833726"
---
+ RExtension 需要 GLIBCXX_3.4.20。 请确保 Red Hat Enterprise Linux (RHEL) 上安装的 libstdc++.so.6 版本提供它。
## <a name="install-language-extensions"></a>安装语言扩展
> [!NOTE]
> 如果已在 SQL Server 2019 上安装 [机器学习服务](../../sql-server-machine-learning-services.md),则已安装用于语言扩展的 **mssql-server-extensibility** 包,你可以跳过此步骤。
运行以下命令以在 Red Hat Enterprise Linux (RHEL) 上安装 [SQL Server 语言扩展](../../../language-extensions/language-extensions-overview.md),该扩展用于 R 自定义运行时。
```bash
# Install as root or sudo
sudo yum install mssql-server-extensibility
```
## <a name="install-r"></a>安装 R
1. 如果安装了[机器学习服务](../../sql-server-machine-learning-services.md),则已在 `/opt/microsoft/ropen/3.5.2/lib64/R` 中安装 R。 如果要继续使用该路径作为 R_HOME,则可以跳过此步骤。
如果要使用 R 的其他运行时,首先需要删除 `microsoft-r-open-mro`,然后再继续安装新版本。
```bash
sudo yum erase microsoft-r-open-mro-3.5.2
```
1. 安装用于 Red Hat Enterprise Linux (RHEL) 的 [R(3.3 或更高版本)](https://www.r-project.org/)。 默认情况下,R 安装在 /usr/lib64/R 中。 此路径是 R_HOME。 如果在其他位置安装 R,请记下该路径作为你的 R_HOME。
```bash
sudo yum install -y R
```
| 31.613636 | 157 | 0.728972 | yue_Hant | 0.686172 |
48d6fea082dd3c844f2220392df010b9145e2452 | 451 | md | Markdown | README.md | makeavish/myCV | af187ac23e487821c1012985237ed59cfb2272b2 | [
"MIT"
] | null | null | null | README.md | makeavish/myCV | af187ac23e487821c1012985237ed59cfb2272b2 | [
"MIT"
] | 3 | 2020-02-25T15:52:20.000Z | 2020-06-22T11:25:27.000Z | README.md | makeavish/myCV | af187ac23e487821c1012985237ed59cfb2272b2 | [
"MIT"
] | null | null | null | Deployed to https://cv.vishalsharma.dev using [](https://app.netlify.com/sites/cranky-liskov-d84c32/deploys)
## Credits
This theme was forked from [Modern Resume Theme](https://github.com/sproogen/modern-resume-theme)
## License
The theme is available as open source under the terms of the [MIT License](https://opensource.org/licenses/MIT).
| 56.375 | 215 | 0.778271 | eng_Latn | 0.45339 |
48d77c1ca3cf4278d516c21b6d6517e613babdd5 | 4,767 | md | Markdown | tutorials/ja/foundation/8.0/authentication-and-security/ltpa-security-check/index.md | MobileFirst-Platform-Developer-Center/DevCenter | ac2351ef8878ff5101f0041323b68f3418b059e6 | [
"Apache-2.0"
] | 17 | 2016-07-07T07:24:22.000Z | 2022-01-21T07:19:10.000Z | tutorials/ja/foundation/8.0/authentication-and-security/ltpa-security-check/index.md | Acidburn0zzz/DevCenter-1 | ac2351ef8878ff5101f0041323b68f3418b059e6 | [
"Apache-2.0"
] | 49 | 2016-04-01T07:13:23.000Z | 2022-03-08T11:28:04.000Z | tutorials/ja/foundation/8.0/authentication-and-security/ltpa-security-check/index.md | Acidburn0zzz/DevCenter-1 | ac2351ef8878ff5101f0041323b68f3418b059e6 | [
"Apache-2.0"
] | 36 | 2016-07-07T07:24:27.000Z | 2022-01-05T13:40:34.000Z | ---
layout: tutorial
title: LTPA ベースのシングル・サインオン (SSO) セキュリティー検査
breadcrumb_title: LTPA セキュリティー検査
relevantTo: [android,ios,windows,javascript]
weight: 8
---
<!-- NLS_CHARSET=UTF-8 -->
## 概説
{: #overview }
LTPA (Lightweight Third-Party Authentication) トークンは、IBM WebSphere Application Server およびその他の IBM 製品によって使用されるセキュリティー・トークンのタイプです。 LTPA は、認証ユーザーの資格情報をバックエンド・サービスに送信するために使用することができます。 また、ユーザーと複数のサーバー間でシングル・サインオン (SSO) トークンとして使用することもできます。
以下は、LTPA を使用するシンプルな「クライアント < - > サーバー」のフローを示します。

ユーザーがサーバーにログインした後、サーバーは LTPA トークン (認証ユーザーの情報を含む暗号化されたハッシュ) を生成します。 このトークンは、トークンをデコードするすべてのサーバー間で共用される秘密鍵によって署名されます。 このトークンは通常、HTTP サービス の Cookie 形式です。 トークンを Cookie として送信することにより、以降のユーザー対話が不要となります。
LTPA トークンには、セッション・ハイジャックの可能性を削減するための構成可能な有効期限があります。
## LTPA を使用したリバース・プロキシー
{: #reverse-proxy-with-ltpa }
ご使用のインフラストラクチャーでは、LTPA トークンを使用して、ユーザーに代わって機能するバックエンド・サーバーと通信することもできます。 リバース・プロキシー・トポロジーでは、ユーザーはバックエンド・サーバーに直接アクセスすることはできません。 リバース・プロキシーを使用して、ユーザーの ID を認証してから、認証済みユーザーの LTPA トークンをバックエンド・サーバーに送信できます。 この構成により、ユーザーが認証されるまで {{ site.data.keys.mf_server }} へのアクセス権限が取得できなくなります。 これは、例えば、重要なユーザー資格情報を処理するために {{ site.data.keys.product }} を使用しない場合や、既存の認証セットアップを使用する場合に役立ちます。 エンタープライズ環境では、IBM WebSphere DataPower や IBM Security Access Manager などのリバース・プロキシーを DMZ 内で使用し、{{ site.data.keys.mf_server }} をイントラネット内に配置する必要があります。
リバース・プロキシー実装では、{{ site.data.keys.mf_server }} は、LTPA 認証でユーザー ID を取得するように構成する必要があります。
以下は、リバース・プロキシーを使用する、クライアントとバックエンド・サーバーの間の LTPA フローを示します。

## {{ site.data.keys.product_adj }} とリバース・プロキシーの統合
{: #mobilefirst-integration-with-a-reverse-proxy }
リバース・プロキシーを使用して、{{ site.data.keys.product_adj }} 環境内での全社的な接続を可能にし、{{ site.data.keys.product }} への認証サービスを提供します。
### アーキテクチャーの概要
{: #general-architecture }
リバース・プロキシーは通常、下記の図に示すように、デプロイメントの一部として {{ site.data.keys.mf_server }} インスタンスの前に置かれ、ゲートウェイ・パターンに従います。

**MFP** アイコンは {{ site.data.keys.mf_server }} のインスタンスを表します。 **GW** アイコンは、WebSphere DataPower などのリバース・プロキシー・ゲートウェイを表します。 インターネットからの {{ site.data.keys.product_adj }} リソースの保護に加え、リバース・プロキシーは HTTPS (SSL) 接続の終了や認証を行います。 リバース・プロキシーは、ポリシー・エンフォースメント・ポイント (PEP) としても機能できます。
ゲートウェイを使用すると、デバイス (**D**) 上のアプリケーション (**A**) は、内部の {{ site.data.keys.mf_server }} URI ではなく、そのゲートウェイが通知するパブリック URI を使用します。 パブリック URI はアプリケーション内の設定として公開できます。あるいは、アプリケーションをパブリックまたはプライベートのアプリケーション・ストアに公開する前に、アプリケーションを実動にプロモーションするときに組み込むこともできます。
### ゲートウェイでの認証
{: #authentication-at-the-gateway }
ゲートウェイで認証が終了すれば、{{ site.data.keys.product }} は、認証されたユーザーの通知を共有コンテキスト、例えばカスタム HTTP ヘッダーや Cookie で受けることができます。 拡張可能な認証フレームワークを使用すれば、それらのメカニズムのいずれかから受け取るユーザー ID を使用して正常なログインを確立するよう、{{ site.data.keys.product }} を構成することができます。 以下の図に、このゲートウェイ・トポロジーの標準的な認証フローを示します。

この構成は、LTPA ベースの認証に関して、WebSphere DataPower を使用して正常にテスト済みです。 認証が成功すると、ゲートウェイは LTPA トークン (HTTP Cookie の形式で) を WebSphere Application Server に転送し、そこで LTPA トークンが検証され、呼び出し元プリンシパルが作成されます。 {{ site.data.keys.product }} は、必要に応じて、この呼び出し元プリンシパルを使用できます。
## {{ site.data.keys.product_adj }} LTPA ベースの SSO セキュリティー検査
{: #the-mobilefirst-ltpa-based-sso-security-check }
事前定義の {{ site.data.keys.product_adj }} LTPA ベースのシングル・サインオン (SSO) セキュリティー検査 (**LtpaBasedSSO**) を使用すると、{{ site.data.keys.product }} を WebSphere Application Server LTPA プロトコルと統合できます。 このセキュリティー検査により、前述のセクションで説明したように、LTPA ベースのゲートウェイ・トポロジー内の {{ site.data.keys.mf_server }} のインスタンスを統合でき、またバックエンド・サービスを使用して SSO LTPA トークンによってユーザーを認証できます。
この事前定義のセキュリティー検査は、{{ site.data.keys.product_adj }} セキュリティー・フレームワーク内のその他のセキュリティー検査と同じように使用できます。すなわち、カスタム・スコープ・エレメントをこの検査にマップし、保護リソース・スコープ内または必須アプリケーション・スコープ内でこの検査 (またはそれを含むスコープ・エレメント) を使用できます。
ご使用のアプリケーションに合わせて、このセキュリティー検査の動作を構成することもできます。
## LTPA ベースの SSO セキュリティー検査の構成
{: #configuring-the-ltpa-based-sso-security-check }
事前定義の LTPA ベースのシングル・サインオン (SSO) セキュリティー検査 (**LtpaBasedSSO**) には、単一の構成可能プロパティー **expirationSec** があります。 このプロパティーは、セキュリティー検査成功状態の有効期間を設定します。 有効期間は、実行の成功後に再び検査を呼び出すための最小間隔を決定します。
> **注:** この手順では、{{ site.data.keys.mf_console }} を使用してプロパティー値を構成する方法について説明します。 代わりに、**application-descriptor** ファイル内にプロパティー値を直接設定することもできます。 詳しくは、『アプリケーション・セキュリティー検査プロパティーの構成』を参照してください。
1. {{ site.data.keys.mf_console }} ウィンドウを開きます。 **ナビゲーション・サイドバー**からアプリケーション・バージョンを選択し、**「セキュリティー」**タブを選択します。
2. **「セキュリティー検査の構成」**セクションで、**「新規」**をクリックします。
3. **「セキュリティー検査プロパティーの構成」**ウィンドウで、**LTPA ベースの SSO** セキュリティー検査を構成します。
* **「セキュリティー検査」**フィールドで、リストから **LtpaBasedSSO** を選択します。
* **「成功状態有効期間 (秒) (Expiration Period Successful State (seconds))」**フィールドに、セキュリティー検査の成功状態の有効期間 (任意の秒数) を設定します。
構成が完了したら、アプリケーションの「セキュリティー」タブの「セキュリティー検査の構成」表で、LtpaBasedSSO セキュリティー検査構成を表示および編集できます。
| 64.418919 | 510 | 0.789595 | yue_Hant | 0.505213 |
48d78a21f3ae293c4fa39a117d075d8fe4a3c7e8 | 1,258 | md | Markdown | _posts/2022-04-08-css-math.md | devJiraynor/devJiraynor.github.io | 80f4a1b86e96b3ff05badadcd945bc242e134636 | [
"MIT"
] | null | null | null | _posts/2022-04-08-css-math.md | devJiraynor/devJiraynor.github.io | 80f4a1b86e96b3ff05badadcd945bc242e134636 | [
"MIT"
] | null | null | null | _posts/2022-04-08-css-math.md | devJiraynor/devJiraynor.github.io | 80f4a1b86e96b3ff05badadcd945bc242e134636 | [
"MIT"
] | null | null | null | ---
layout: post
title: CSS 43. Math 함수 (Math Function)
subtitle: CSS Math 함수는 수학 식을 속성 값으로 사용할 수 있게 합니다. 여기서는 calc(), max() 및 min() 함수를 설명합니다.
cover-img: /assets/img/css_img.png
thumbnail-img: /assets/img/css_thumb.png
share-img: /assets/img/css_img.png
tags: [css3, basic]
---
# CSS Math 함수
## calc()
```calc()``` 함수는 속성 값 계산을 수행합니다.
#### 구문
```css
calc(expression)
```
| **값** | **설명** |
| expression | 필수. 수학적 표현식. 결과는 값으로 사용됩니다. 사용할 수 있는 연산자는 ```+``` ```-``` ```*``` ```/``` 입니다. |
###### 예제 1
```css
#div1 {
position: absolute;
left: 50px;
width: calc(100% - 100px);
border: 1px solid black;
background-color: yellow;
padding: 5px;
}
```
## max() 함수
```max()``` 함수는 쉼표로 구분된 값 리스트에서 가장 큰 값을 속성 값으로 사용합니다.
#### 구문
```css
max(value1, value2, ...)
```
| **값** | **설명** |
| value1, value2, ... | 필수. 쉼표로 구분된 값 목록 - 가장 큰 값이 선택됨 |
###### 예제 2
```css
#div1 {
background-color: yellow;
height: 100px;
width: max(50%, 300px);
}
```
## min()
```min()``` 함수는 쉼표로 구분된 값 리스트에서 가장 작은 값을 속성 값으로 사용합니다.
#### 구문
```css
min(value1, value2, ...)
```
| **값** | **설명** |
| value1, value2, ... | 필수. 쉼표로 구분된 값 목록 - 가장 작은 값이 선택됨 |
###### 예제 2
```css
#div1 {
background-color: yellow;
height: 100px;
width: min(50%, 300px);
}
```
| 14.8 | 95 | 0.549285 | kor_Hang | 0.999584 |
48d79c791081254556fbd7754a2ccec425e5d318 | 662 | md | Markdown | README.md | amelvill-umich/CMake_Superbuild_Extern | 15dacda4630905949bb64c21f8bc2a9f804f1287 | [
"Unlicense"
] | 1 | 2020-05-06T15:33:40.000Z | 2020-05-06T15:33:40.000Z | README.md | amelvill-umich/CMake_Superbuild_Extern | 15dacda4630905949bb64c21f8bc2a9f804f1287 | [
"Unlicense"
] | null | null | null | README.md | amelvill-umich/CMake_Superbuild_Extern | 15dacda4630905949bb64c21f8bc2a9f804f1287 | [
"Unlicense"
] | null | null | null | # CMake_Superbuild_Extern
This repository is a part of an example of how to work with ExternalProject_Add and CPack.
It just builds a "hello world" application; in a more practical situation it would probably make a shared library.
This root repository will:
- Build extern.c into extern_binary, and install it into a relative folder so that it can be packaged by the [root / superbuild repository](https://github.com/amelvill-umich/CMake_Superbuild_Root).
Thanks to [Florian](https://discourse.cmake.org/u/florian_chevassu/summary) on the [CMake Discourse](https://discourse.cmake.org/t/how-to-install-an-external-project/888) for the advice on making this
| 66.2 | 200 | 0.797583 | eng_Latn | 0.973542 |