url stringlengths 11 2.25k | text stringlengths 88 50k | ts timestamp[s]date 2026-01-13 08:47:33 2026-01-13 09:30:40 |
|---|---|---|
https://www.facebook.com/login/?next=https%3A%2F%2Fl.facebook.com%2Fl.php%3Fu%3Dhttps%253A%252F%252Fwww.instagram.com%252F%26amp%253Bh%3DAT1bONjc9mR_ysldfAUtcw_cQngO0HrqFY--hGxloUDMWcxGhNxUuBC_BaZnB6mDSKlGN7V05DxfkOCGmR96jlXsqii1T-n_fTcVDVT3MfNNucxA4SXArcLYtel72l-S-zivnidKYY3WHKsP | Facebook Facebook 이메일 또는 휴대폰 비밀번호 계정을 잊으셨나요? 새 계정 만들기 일시적으로 차단됨 일시적으로 차단됨 회원님의 이 기능 사용 속도가 너무 빠른 것 같습니다. 이 기능 사용에서 일시적으로 차단되었습니다. Back 한국어 English (US) Tiếng Việt Bahasa Indonesia ภาษาไทย Español 中文(简体) 日本語 Português (Brasil) Français (France) Deutsch 가입하기 로그인 Messenger Facebook Lite 동영상 Meta Pay Meta 스토어 Meta Quest Ray-Ban Meta Meta AI Meta AI 콘텐츠 더 보기 Instagram Threads 투표 정보 센터 개인정보처리방침 개인정보 보호 센터 정보 광고 만들기 페이지 만들기 개발자 채용 정보 쿠키 AdChoices 이용 약관 고객 센터 연락처 업로드 및 비사용자 설정 활동 로그 Meta © 2026 | 2026-01-13T09:30:39 |
https://www.timeforkids.com/k1/living-in-the-wild-k1/ | TIME for Kids | Living in the Wild | K-1 Skip to main content Search Articles by Grade level Grades K-1 Articles Grade 2 Articles Grades 3-4 Articles Grades 5-6 Articles Topics Animals Arts Ask Angela Books Business Careers Community Culture Debate Earth Science Education Election 2024 Engineering Environment Food and Nutrition Games Government History Holidays Inventions Movies and Television Music and Theater Nature News People Places Podcasts Science Service Stars Space Sports The Human Body The View Transportation Weather World Young Game Changers Your $ Financial Literacy Content Grade 4 Edition Grade 5-6 Edition For Grown-ups Resource Spotlight Also from TIME for Kids: Log In role: none user_age: none editions: The page you are about to enter is for grown-ups. Enter your birth date to continue. Month (MM) 01 02 03 04 05 06 07 08 09 10 11 12 Year (YYYY) 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949 1950 1951 1952 1953 1954 1955 1956 1957 1958 1959 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025 2026 Submit Animals Nature Living in the Wild December 12, 2025 TIME for Kids En Espanol Print CHUCHART DUANGDAW—GETTY IMAGES Some animals live in green forests. Others live in deserts. These places are called habitats. A habitat has everything an animal needs. It has shelter. It has food. And it is the right temperature for its animals. Grassland Habitat WLDAVIES—GETTY IMAGES Lions live in African grasslands. This habitat gets a little bit of rain. That helps the tall grasses grow. Polar Habitat SEPP FRIEDHUBER—GETTY IMAGES Brr! A polar habitat is icy. It is the coldest habitat. Polar bears and penguins live in polar habitats. Desert Habitat TARIQ_M_1—GETTY IMAGES Deserts are dry. Few plants grow. These camels do not need much water. They can eat whatever grows. Mountain Habitat BRIAN BONHAM—GETTY IMAGES Mountain goats live on top of the world. They have tough hooves for climbing. Their thick coat keeps them warm. Temperate Forests HAWK BUCKMAN—GETTY IMAGES Temperate forests have four seasons. They get lots of rain. Squirrels and bears live in temperate forests. So do moose. Ocean Habitat STUART WESTMORLAND—GETTY IMAGES The ocean is the biggest habitat. Animals from tiny shrimp to giant whales live here. Oceans cover most of the Earth. Freshwater Habitat EYEEM MOBILE GMBH/GETTY IMAGES Splash! Rivers and lakes are freshwater habitats. This water is not salty like the ocean. Turtles and some kinds of fish live in fresh water. Rainforest Habitat KIM SCHANDORFF—GETTY IMAGES This jaguar lives in a rainforest. A rainforest is hot and humid. It rains a lot here. More from Animals Nature Time to Eat! December 22, 2025 Animals have favorite foods. Rabbits eat plants. They eat grass and leaves. Foxes eat other animals. Some animals eat all kinds of things. Different animals have different diets. Learn about some of them here. Meat Eaters Lions are carnivores.… Audio Spanish Nature Who Eats What? December 22, 2025 Some animals eat only meat. Others eat only plants. Some eat both. How can we tell who eats what? We can use this chart. It is called a Venn diagram. The animals on the left are carnivores. Those on the… Audio Nature Animals Talk Too December 22, 2025 How do you share your thoughts? You might use words. You might use your hands. Animals do not speak the way we do. But they have lots of ways to communicate. Sounding Off This monkey has a loud voice.… Audio Spanish Nature How Animals Vote December 22, 2025 People can vote. Did you know that groups of animals can vote too? They vote on where to look for food. Or they vote on where to live. Meerkats Meerkats (above) search for food. They can vote to search faster.… Audio Share a Link Click the icon above to copy the url link to your clipboard. Paste the link into the location in which you share assignments with students. Examples might include, but are not limited to Canvas, Schoology and Edmodo. Google Classroom Click on the icon above to share the article with a class in your Google Classroom. Choose an action. Options might include creating an assignment or asking a question. Contact us Privacy policy California privacy Terms of Service Subscribe CLASSROOM INTERNATIONAL © 2026 TIME USA, LLC. All Rights Reserved. Powered by WordPress.com VIP | 2026-01-13T09:30:39 |
https://www.timeforkids.com/g56/?age=child | TIME for Kids | Articles | G5-6 Skip to main content Search Articles by Grade level Grades K-1 Articles Grade 2 Articles Grades 3-4 Articles Grades 5-6 Articles Topics Animals Arts Ask Angela Books Business Careers Community Culture Debate Earth Science Education Election 2024 Engineering Environment Food and Nutrition Games Government History Holidays Inventions Movies and Television Music and Theater Nature News People Places Podcasts Science Service Stars Space Sports The Human Body The View Transportation Weather World Young Game Changers Your $ Financial Literacy Content Grade 4 Edition Grade 5-6 Edition For Grown-ups Resource Spotlight Also from TIME for Kids: Log In role: none user_age: none editions: The page you are about to enter is for grown-ups. Enter your birth date to continue. Month (MM) 01 02 03 04 05 06 07 08 09 10 11 12 Year (YYYY) 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949 1950 1951 1952 1953 1954 1955 1956 1957 1958 1959 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025 2026 Submit Articles K-1 2 3-4 5-6 Business Cities by Design January 12, 2026 No two cities are alike. While they may feature the same elements—buildings and houses, roads and highways, parks and shopping centers—every city is arranged differently. Geography, climate, and culture are just a few of the factors that influence how a… Community Mission: Spread Kindness January 9, 2026 Join a community of kids who are making the world a better and brighter place. TFK Service Stars know that even the smallest actions can make a big impact. Mission of the Month Kindness counts! We’ll feature kids who are… Audio United States After the Fires January 9, 2026 One year ago, the Palisades and Eaton Fires devastated Los Angeles, California. Since then, community members have been working to rebuild. The fires began on January 7, 2025, and were propelled by dry conditions and wind speeds as high… Audio Technology Warning Labels Required January 8, 2026 On December 26, New York confirmed a new law to protect kids’ mental health. It requires social-media platforms to warn users under age 18 about addictive features, such as autoplay, infinite scroll, and like counts. These features entice users to… Audio World Snow Beast January 8, 2026 An enormous snow tiger watches over the Harbin Ice and Snow World on January 5. Visitors to the yearly festival in Harbin, China, marvel at giant snow and ice s… Audio Technology Tech Show and Tell January 8, 2026 Tech fans attended the Consumer Electronics Show (CES) from January 6 to 9. The yearly showcase takes place in Las Vegas, Nevada. It allows tech companies to show off their newest products. This year, many companies presented robots. For example,… Audio Business What’s Your Spark? January 8, 2026 We love hearing about your dreams, your ideas, and the things that light you up. Whether you know exactly what you want your future career to be or are still figuring it out, your answers show just how creative and… Science Stealing Stings January 7, 2026 Thieves are lurking below the surface of the oceans. They don’t wear ski masks, with only their eyes visible. In fact, they don’t have real eyes at all. These thieves are colorful sea slugs called nudibranchs, and they’re found in… Audio Spanish Community Legacy Building January 7, 2026 When Legacy Jackson was 2, she and her family spent a cold Christmas morning in downtown St. Louis, Missouri. They were handing out hot soup and warm clothes to people in need. Legacy’s mom, Kynedra Ogunnaike, says volunteering is a… Audio Community Star Power: Patrick Finnegan January 2, 2026 Meet Service Star Patrick Finnegan,12, who volunteers as a peer mediator in Savannah, Georgia. TFK Kid Reporter Madeline Martinez spoke with Patrick about his efforts. What does a peer mediator do? They oversee a conflict that two or more students… Audio World TIME Person of the Year January 2, 2026 TIME’s 2025 Person of the Year isn’t a person. It’s a group: the architects of artificial intelligence. This group includes AI innovators such as OpenAI CEO Sam Altman, Nvidia’s Jensen Huang, and Lisa Su, the CEO of Advanced Micro Devices.… Audio World Commuting in the Clouds January 1, 2026 Paris, France, unveiled a three-mile cable car route on December 13. It’s the first cable car route in the region, and the longest urban route in Europe. Commuters in the suburbs of Paris can now float over rush-hour traffic. The… Audio World Ready to Celebrate January 1, 2026 This shop in Liaoning Province, China, is one of many getting ready for Lunar New Year celebrations. February 17 will kick off the Year of the Fire Horse, which… Audio Penniless! January 1, 2026 People pick them up for good luck. They’re tossed into fountains and valued by collectors. More than 3 billion pennies were made in 2024 alone. And on November 12, 2025, the United States Mint produced its final batch. After 232… Audio Spanish Science Ancient Ice December 31, 2025 Imagine the Earth a million years ago. Was it warmer or colder? Was the air different? To find out, an international group of scientists took a peek back in time—not with a time machine, but with ancient ice. Working on… Audio Health Ask Angela: Up at Night December 31, 2025 Have questions? Angela Haupt connects with experts and shares their words of wisdom. Angela Haupt is a health and wellness editor at TIME. She talks with experts about problems readers are having, then writes articles to share what she learns.… Audio Time Off New Classics December 31, 2025 From TV shows to fashion, hits from the 1980s and’90s are popular again. Game companies are getting in on the trend. Inspired by the old-school arcade experience, new and upcoming video games are packed with kooky colors and plenty of… Audio Community Star Power: Shubham Roy-Choudhury December 19, 2025 Meet Service Star Shubham Roy-Choudhury, 14. He’s the founder of Lunar Academy, a student-led program in New Jersey. It provides free tutoring and educational resources. TFK Kid Reporter Vicky Sun spoke with Shubham about his efforts. What motivated you to… Audio Posts pagination 1 2 3 4 5 … 50 Next Contact us Privacy policy California privacy Terms of Service Subscribe CLASSROOM INTERNATIONAL © 2026 TIME USA, LLC. All Rights Reserved. Powered by WordPress.com VIP | 2026-01-13T09:30:39 |
https://www.charterworks.com/privacy-policy/#what-charter-collects | Privacy Policy Try Charter Pro for $1 Latest Topics AI DEI Flexible Work Management Societal Issues Resources Briefing Work Tech Research Playbooks Case Studies Toolkits, Scripts, and other Resources Solutions Charter Pro Charter Forum Charter Pro for Teams Advisory + Strategic Services Events Upcoming and Past The AI Download Charter Cortados Leading With AI Masterclass Skills Accelerators Strategy Briefings Webinars Workplace Summit About Try Charter Pro for $1 Sign In Privacy Policy Last Updated: December 14, 2021 1. WHAT CHARTER COLLECTS 1 2. HOW CHARTER USES YOUR INFORMATION 3 3. HOW CHARTER SHARES INFORMATION 5 4. THIRD PARTY COOKIES AND TRACKING TECHNOLOGIES 7 5. YOUR CHOICES 8 6. FOR READERS OUTSIDE THE US 9 7. OTHER INFORMATION 9 Charter Works, Inc. and its affiliates (“Charter Works,” “Charter,” “we,” “us,” or “our”) operate CharterWorks.com, deliver newsletters, host live events, and deliver other products and services (“Services”). This Privacy Policy describes the kinds of information Charter may gather when you use the Services, how Charter uses that information, when Charter might disclose that information, and how you can manage it. By using the Services, you are accepting the practices described in our Privacy Policy, including our use of cookies and similar online tools. If you do not agree to the terms of this Privacy Policy, please do not use the Services. We reserve the right to modify or amend the terms of our privacy policy from time to time without notice. Your continued use of our Services following the posting of changes to these terms will mean you accept those changes. Please note: our Services are under constant development. This Privacy Policy may therefore be modified and updated on an ongoing basis. Please check back to this page regularly. Our Privacy Policy does not govern or apply to information collected or used by Charter Works through other means or to websites maintained by other companies or organizations to which we may link or who may link to us. Please send any questions about privacy issues to privacy@charterworks.com. WHAT CHARTER COLLECTS The information we collect and the purposes for which we use it will depend on how you interact with Charter Works and the Services. Information You Provide to Us When you use the Services, you may provide us the following: Registration, Subscription or Contact Information such as e-mail address, name, phone number, shipping address, and billing information Demographic and interest information such as your age, date of birth, gender, interests, lifestyle information, and hobbies Financial and transactional information such as credit or debit card number, verification number, and expiration date, to process payments and information about your transactions and purchases with us. Please note: payment information goes to our payment processors and is not collected, processed, or stored by Charter Works. Customer service information such as questions and other messages you address to us directly through online forms, by email, over the phone, or by post, and summaries or voice recordings of your interactions with customer care Employment or Education Information such as education history, employment experience, business contact information User-generated content such as comments on articles, photos, videos, audio, any information you submit in public forums or message boards, reviews and feedback or testimonials you provide about our Services Marketing information such as information related to your preferences for receiving communications, subscribing to our publications, newsletters, and other content Survey, market research or sweepstakes information such as information gathered when you complete a survey, participate in market research, or enter a contest, sweepstakes, or game relating to the Services. Social media information if you link your account or access the Services through a third-party connection or log-in, we may have access to any information you provide to that social network depending on your privacy settings Other information any other information you choose to directly provide to us in connection with your use of the Services Information We Automatically Collect We may collect information about your use of the Services, including: Device information and identifiers : such as computer or mobile device model, IP address, other unique device identifiers, operating system version, browser type, language, and settings Usage information : such as information about the Services you use, the time, date, and duration of your use of the Services, newsletter open-rate, referral information, your interaction with content offered through the Services, search terms used, referring website, and software crash reports. We also collect information stored using cookies, mobile ad identifiers, and similar technologies set on your device. Our servers may automatically keep an activity log of your use of the Services. We may collect such usage information at the individual or aggregate level. Please see Section Four of this Privacy Policy (THIRD PARTY COOKIES AND TRACKING TECHNOLOGIES ) for more information about how we collect and use this information. Location information : such as city, state and ZIP code associated with your IP address and precise geolocation information from your devices, with your permission in accordance with your mobile device settings. Information We Receive from Third Parties We may receive information about you from third parties and combine it with information we receive from or about you, including: Information from social media networks When you interact with Charter Works a social media service or log in using social media credentials, depending on your social media settings, we may have access to your information from that social network such as your social media account ID and/or user name associated with that social media service, your profile picture, email address, friends list or information about the people and groups you are connected to and how you interact with them, and any information you have made public in connection with that social media service, Information from third party email and subscription providers and/or processors When you purchase one of our subscription products on a third-party services or stores subscription (including the Apple Store), we receive personal information from the third parties that help us process emails and subscriptions. Please note: Charter Works does not receive (or collect, process, or store) any payment card industry (“PCI”) data. Information from publicly or commercially available sources We may collect information from third parties such as consumer data resellers that make available information, collected both online and offline, such as demographic information, additional contact information, group affiliations, occupational information, and educational background, which we may combine with other information we receive from or about you. Other Information We Collect Charter also may collect other information about you, your device, or your use of the Services in ways that we describe to you at the point of collection, or otherwise, with your consent. You may choose not to provide us with certain types of information but doing so may affect your experience in using the Services. HOW CHARTER USES YOUR INFORMATION Charter uses your information to personalize and improve your experience using the Services in the ways described below, or in other ways at your direction or with your consent. To Provide the Services For example, to: Process and fulfill your transactions , including subscriptions or memberships, and enable you to login to the Services, Contact you and send you communications about the Services (including communications you request like newsletters) and share invitations to events or offers about Charter products or our third-party partners’ products Respond to you and your comments, inquiries, or requests; and transmit legal notices, policy updates, and other important information about the Services, Provide features of the Services (such as social sharing and comments) and to post content you submit, Provide customer support , administer loyalty programs, contests, promotions, or surveys, or Identify and repair errors that impair the function of the Services and to detect security incidents Protect the rights of Charter and others, detect, investigate, and prevent activities that may violate our policies or may be fraudulent, illegal; to protect, enforce, or defend the legal rights, privacy, safety, or property of Charter Works, its employees, agents, or users; or as required by law. Please note: all editorial and commercial email messages include instructions for unsubscribing from such future communications. To Deliver Personalized Content and Recommendations For example, to: Customize features of the Services, Deliver relevant content and to provide you with an enhanced experience based on your activities and interests Send you personalized newsletters , surveys, and information about products, services and promotions offered by us, our partners, and other organizations with which we work Facilitate the delivery of targeted advertising (including interest-based advertising), promotions, and offers, on behalf of ourselves and our third-party advertisers, both on our websites and elsewhere Customize content that our third-party partners deliver on the Services (e.g., personalized third-party advertising) based on your activity on the Services Create and update inferences and profiles about you that can be used for advertising and marketing on the Services, third party services and platforms, and mobile apps, or for analytics, Measure and report on the delivery of advertisements Please note: all editorial and commercial email messages include instructions for unsubscribing from such future communications. To enable us to provide these Services, we may use the information we collect to identify you across sessions, browsers, and/or devices. Please see Section Four of this Privacy Policy (THIRD PARTY COOKIES AND TRACKING TECHNOLOGIES ) for further information about our and third parties’ use of cookies and other tracking technologies and your choices related to targeted advertising. To Learn About Our Users and Improve Services We conduct analysis and research on our users’ demographics, interests, and behavior and perform statistical analysis of our users, their use of the Services, and their purchasing patterns. We do this to optimize and improve the Services, our products, and our operations. To Combine Information for All the Purposes Described Above We may use the information gathered from one aspect of the Services to enhance other aspects of Services and we may combine information gathered from multiple aspects of the Services into a single user record. We also may use or combine information that we collect offline or that we collect or receive from third-party sources for many reasons, including to enhance, expand, and check the accuracy of our records. Data collected from a particular computer, browser or device may be used with another computer, browser or device that is linked to the computer, browser, or device on which such data was collected. HOW CHARTER SHARES INFORMATION Charter’s information-sharing practices vary based on the type of information and the type of recipient. Aggregate Or De-Identified Information We may use and share deidentified information with third parties in any manner for any purposes. Subscription Providers If your subscription is provided in whole or in part by your employer or other third party, we may share with them information about your access and use of your subscription. If you have a subscription associated with a professor or school, we may notify your professor or school to confirm your subscription, access, or use. When providing information to a subscription provider, we may reveal limited amounts of your personal information such as your name or email address. Service Providers and Professional Advisors We share information with third party agents and vendors who perform functions on our behalf, including, but not limited to, web hosting, content syndication, content management, social media integration, marketing, analytics, product development, email or text message transmission, billing or payment processing, order fulfillment, auditing, and customer service. We also may disclose your personal information to professional advisors, such as lawyers, bankers, auditors, and insurers, where necessary in the course of the professional services that they render to us. Service providers and professional advisors with whom we share information will be obligated to maintain the confidentiality (as appropriate for the services) and security of personal information Charter transmits to them. Third Party Content and/or Advertising Partners Third parties that provide content, advertising, or functionality to the Services may collect or receive information about you and/or your use of the Services, using cookies, beacons, and similar technologies. Third party content and/or advertising partners may use such information to provide you with advertising that is based on your interests and to measure and analyze ad performance on our Services or other websites or platforms, and combine it with information collected across different websites, online services, and other devices. Please note: third parties’ use of your information will be based on their own privacy policies. Social Media Platforms and Services If you log in with or connect a social media service account to a Charter Works Service, certain information may be available to the social media platform, in which case the social media platform’s use of the shared information will be governed by the social media platform’s privacy policy and your privacy settings for that platform. If you do not want your personal information shared as described, please do not connect your social media platform account with your Charter Works account, and do not participate in social sharing on the Services. Providers of Co-Branded Services Charter may offer co-branded services or features, such as conferences, events, contests, sweepstakes, or other promotions together with a third party (“Co-Branded Services”). Co-Branded Services may be hosted by Charter Works or through the third party’s services. Charter may share the information you submit in connection with the Co-Branded Service with the applicable third party or the third party may receive certain information from you at the same time Charter does. Please note: a third party’s use of your information will be governed by the third party’s privacy policy. Other Users of The Services Any information (including your name, location, email address, profile information, and comments) you choose to submit through the use certain features of the Services that provide an opportunity to interact with Charter and other Charter users (e.g., community forums, Slack groups) may be publicly available. Charter is not responsible for any information you choose to submit and make public through these channels of communication. Business Transferees In the event of a corporate change in control (for instance, a sale or merger) or due diligence in contemplation thereof, Charter Works may transfer your personal information to the new party in control or the party acquiring assets. With Your Consent at Your Direction We may also share your information with your consent. The Services may link to third-party websites and services that are outside our control. We are not responsible for the security or privacy of any information collected by these third parties, which operate pursuant to their respective privacy policies. THIRD PARTY COOKIES AND TRACKING TECHNOLOGIES Cookies are small text files that are stored in your device’s browser when you visit a website that enable the business that places the cookie business to recognize a user across one or more browsing sessions, and across one or more websites. When you use the Services, we and our third-party partners use cookies, pixel tags, device IDs and other similar technologies (collectively, “Cookies”) to collect information from your browser or device for the purposes of information storage and access; personalization of the Services; measurement of and analytics regarding the use of the Services; content selection, delivery, and reporting; and advertising selection, targeting, delivery, and reporting. By using the Services, you consent to our use of cookies and similar technologies. The following types of Cookies are used in the Services: Essential Cookies Essential Cookies enable you to browse our Services and use certain features. Disabling Essential Cookies may prevent you from using certain parts of the Services. These cookies also help keep our Services safe and secure. Preference Cookies Preference Cookies store information such as your login data, if applicable, and website preferences. Disabling Preference Cookies may hinder our ability to remember certain choices you’ve previously made or personalize your browsing experience by providing you with relevant information. Preference cookies can also be used to recognize your device so that you do not have to provide the same information more than once. Performance Cookies Performance Cookies collect information about how you use the Services such as which pages you visit regularly. Performance cookies are used to provide you with a high-quality experience by doing things such as tracking page load, site response times, and error messages. Content and Advertising Cookies Content and Advertising Cookies gather information about your use of our services so we provide you with more relevant content and advertising on the Services and elsewhere online and across your devices. Content and Advertising Cookies are also used to gather feedback on customer satisfaction through surveys. They remember that you’ve visited the Services and help Chart understand usage of the Services. Some Content and Advertising cookies are from third parties that collect information about your use of our Services to provide advertising (on our Services and elsewhere, across your different devices) based on your online activities (so-called “interest-based advertising”). Charter may not have access to these cookies, although we may use statistical information arising from the cookies provided by these third parties to customize content and for the other purposes described above. Please note: Charter does not control the privacy practices of these third parties, and their practices are not covered by this Privacy Policy. YOUR CHOICES There are several ways to minimize tracking of your online activity by third parties, some of which we have summarized below. We hope you find this information to be a helpful reference. Please note: using these tools to opt out of tracking and targeting does not mean that you will not receive advertising while using our Services or on other websites. Controls for Cookies and Online Tracking Choices Since many of these opt-out tools are specific to a device or browser, you will need to opt out on every browser and device that you use. Blocking Cookies in Your Browser . Most browsers let you remove or reject cookies, including cookies used for interest-based advertising. To do this, follow the instructions in your browser settings. Many browsers accept cookies by default until you change your settings. If you wish to opt-out of Google Analytics’ tracking, use this browser add-on provided by Google . Blocking advertising ID use in your mobile settings. Your mobile device settings may provide functionality to limit use of the advertising ID associated with your mobile device for interest-based advertising purposes. For more information about how to change these settings for Apple, Android or Windows devices, see: Apple: http://support.apple.com/kb/HT4228 Android: http://www.google.com/policies/technologies/ads/ Windows: http://choice.microsoft.com/en-US/opt-out Using privacy plug-ins or browsers . You also may use a browser with privacy features, like Brave, or install browser plugins like Privacy Badger , Ghostery or uBlock Origin . These may offer tools to block or limit third-party cookies/trackers. Platform opt-outs. The following advertising platforms offer opt-out features that let you opt-out of certain uses of your information for interest-based advertising: Google and Facebook Advertising industry opt-out tools. You can use these opt-out options to limit use of your interest-based advertising by participating companies: Digital Advertising Alliance and Network Advertising Initiative . Please note: opting-out of advertising networks’ tracking and targeting does not mean that you will not receive advertising while using our Services or on other websites, nor will it prevent the receipt of interest-based advertising from third parties that do not participate in these programs. It will exclude you, however, from interest-based advertising conducted through participating networks, as provided by their policies and choice mechanisms. Accessing Your Information You can request to access, review, correct, update, delete or modify your registration or subscription profile information (if Charter maintains such information) and modify your marketing preferences (where applicable) by contacting privacy@charterworks.com. Please note: if you have subscribed or registered for multiple of our Services or subscriptions, you may need to update your information for each account separately. Emails, Newsletters, and Text Messages You may always opt-out of receiving future e-mail marketing messages and newsletters from Charter Works by following the instructions contained within the emails and newsletters, or by e-mailing us at privacy@charterworks.com. You may opt out of receiving promotions or advertising via Text Message at any time, by replying “STOP” to one of our Text Messages. Responding To Requests For your protection, we may only implement requests with respect to the personal information associated with the email address that you use to send us your request and/or on the basis of other information we use to verify you before implementing your request. Please note: we may need to retain certain information for record-keeping purposes and/or to complete any transactions you began prior to requesting such change or deletion (e.g., when you make a purchase or enter a promotion, you may not be able to change or delete the personal information provided until after the completion or cancelation of such purchase or promotion). FOR READERS OUTSIDE THE US Charter Works is a US-based news organization, so we apply US law to our privacy practices. This means that wherever you are in the world, this Privacy Policy will apply to the information you provide to Charter or we collect when you use the Services. OTHER INFORMATION Security We take reasonable security measures to protect your information, including the use of physical, technical, and administrative controls. Please understand, however, that while we try our best to safeguard your personal information once we receive it, no transmission of data over the Internet or any other public network can be guaranteed to be 100% secure. You need to help protect the privacy of your own information. You must take precautions to protect the security of any personal information that you may transmit over any home networks, wireless routers, wireless (WiFi) networks or similar devices by using encryption and other techniques to prevent unauthorized persons from intercepting or receiving any of your personal information. You are responsible for the security of your information when using unencrypted, open access, or otherwise unsecured networks. Storage The period for which we keep information varies according to the purpose for which it is used. In some cases, there are legal requirements to keep data for a minimum period. We will retain your Personal Data for the period necessary to fulfill the purposes outlined in this Privacy Policy unless a longer retention period is required or allowed by law. Children’s Information The Services are not intended for children under 13 years of age. Charter Works does not knowingly collect personal information from children under 13 years of age. If Charter Works discovers that a child under the age of 13 has provided Charter Works with personal information and we do not have parental consent, Charter Works will delete that child’s information. If you believe that company has been provided with the personal information of a child under the age of 13 without parental consent, please notify us immediately at privacy@charterworks.com Questions If you have questions about our Privacy Policy, please contact us at privacy@charterworks.com Insights Books Interviews Charter on TIME Research Connect Events Topics Artificial Intelligence Hybrid Work DEI Leadership Charter Pro Become a Member Support Sign In Search Contact Partnerships General Inquiries Company About Careers Press Newsletters Charter Briefing Charter Works Inc. © 2025 Privacy Terms of Service | 2026-01-13T09:30:39 |
https://www.charterworks.com/privacy-policy/#third-party-cookies-and-tracking-technologies | Privacy Policy Try Charter Pro for $1 Latest Topics AI DEI Flexible Work Management Societal Issues Resources Briefing Work Tech Research Playbooks Case Studies Toolkits, Scripts, and other Resources Solutions Charter Pro Charter Forum Charter Pro for Teams Advisory + Strategic Services Events Upcoming and Past The AI Download Charter Cortados Leading With AI Masterclass Skills Accelerators Strategy Briefings Webinars Workplace Summit About Try Charter Pro for $1 Sign In Privacy Policy Last Updated: December 14, 2021 1. WHAT CHARTER COLLECTS 1 2. HOW CHARTER USES YOUR INFORMATION 3 3. HOW CHARTER SHARES INFORMATION 5 4. THIRD PARTY COOKIES AND TRACKING TECHNOLOGIES 7 5. YOUR CHOICES 8 6. FOR READERS OUTSIDE THE US 9 7. OTHER INFORMATION 9 Charter Works, Inc. and its affiliates (“Charter Works,” “Charter,” “we,” “us,” or “our”) operate CharterWorks.com, deliver newsletters, host live events, and deliver other products and services (“Services”). This Privacy Policy describes the kinds of information Charter may gather when you use the Services, how Charter uses that information, when Charter might disclose that information, and how you can manage it. By using the Services, you are accepting the practices described in our Privacy Policy, including our use of cookies and similar online tools. If you do not agree to the terms of this Privacy Policy, please do not use the Services. We reserve the right to modify or amend the terms of our privacy policy from time to time without notice. Your continued use of our Services following the posting of changes to these terms will mean you accept those changes. Please note: our Services are under constant development. This Privacy Policy may therefore be modified and updated on an ongoing basis. Please check back to this page regularly. Our Privacy Policy does not govern or apply to information collected or used by Charter Works through other means or to websites maintained by other companies or organizations to which we may link or who may link to us. Please send any questions about privacy issues to privacy@charterworks.com. WHAT CHARTER COLLECTS The information we collect and the purposes for which we use it will depend on how you interact with Charter Works and the Services. Information You Provide to Us When you use the Services, you may provide us the following: Registration, Subscription or Contact Information such as e-mail address, name, phone number, shipping address, and billing information Demographic and interest information such as your age, date of birth, gender, interests, lifestyle information, and hobbies Financial and transactional information such as credit or debit card number, verification number, and expiration date, to process payments and information about your transactions and purchases with us. Please note: payment information goes to our payment processors and is not collected, processed, or stored by Charter Works. Customer service information such as questions and other messages you address to us directly through online forms, by email, over the phone, or by post, and summaries or voice recordings of your interactions with customer care Employment or Education Information such as education history, employment experience, business contact information User-generated content such as comments on articles, photos, videos, audio, any information you submit in public forums or message boards, reviews and feedback or testimonials you provide about our Services Marketing information such as information related to your preferences for receiving communications, subscribing to our publications, newsletters, and other content Survey, market research or sweepstakes information such as information gathered when you complete a survey, participate in market research, or enter a contest, sweepstakes, or game relating to the Services. Social media information if you link your account or access the Services through a third-party connection or log-in, we may have access to any information you provide to that social network depending on your privacy settings Other information any other information you choose to directly provide to us in connection with your use of the Services Information We Automatically Collect We may collect information about your use of the Services, including: Device information and identifiers : such as computer or mobile device model, IP address, other unique device identifiers, operating system version, browser type, language, and settings Usage information : such as information about the Services you use, the time, date, and duration of your use of the Services, newsletter open-rate, referral information, your interaction with content offered through the Services, search terms used, referring website, and software crash reports. We also collect information stored using cookies, mobile ad identifiers, and similar technologies set on your device. Our servers may automatically keep an activity log of your use of the Services. We may collect such usage information at the individual or aggregate level. Please see Section Four of this Privacy Policy (THIRD PARTY COOKIES AND TRACKING TECHNOLOGIES ) for more information about how we collect and use this information. Location information : such as city, state and ZIP code associated with your IP address and precise geolocation information from your devices, with your permission in accordance with your mobile device settings. Information We Receive from Third Parties We may receive information about you from third parties and combine it with information we receive from or about you, including: Information from social media networks When you interact with Charter Works a social media service or log in using social media credentials, depending on your social media settings, we may have access to your information from that social network such as your social media account ID and/or user name associated with that social media service, your profile picture, email address, friends list or information about the people and groups you are connected to and how you interact with them, and any information you have made public in connection with that social media service, Information from third party email and subscription providers and/or processors When you purchase one of our subscription products on a third-party services or stores subscription (including the Apple Store), we receive personal information from the third parties that help us process emails and subscriptions. Please note: Charter Works does not receive (or collect, process, or store) any payment card industry (“PCI”) data. Information from publicly or commercially available sources We may collect information from third parties such as consumer data resellers that make available information, collected both online and offline, such as demographic information, additional contact information, group affiliations, occupational information, and educational background, which we may combine with other information we receive from or about you. Other Information We Collect Charter also may collect other information about you, your device, or your use of the Services in ways that we describe to you at the point of collection, or otherwise, with your consent. You may choose not to provide us with certain types of information but doing so may affect your experience in using the Services. HOW CHARTER USES YOUR INFORMATION Charter uses your information to personalize and improve your experience using the Services in the ways described below, or in other ways at your direction or with your consent. To Provide the Services For example, to: Process and fulfill your transactions , including subscriptions or memberships, and enable you to login to the Services, Contact you and send you communications about the Services (including communications you request like newsletters) and share invitations to events or offers about Charter products or our third-party partners’ products Respond to you and your comments, inquiries, or requests; and transmit legal notices, policy updates, and other important information about the Services, Provide features of the Services (such as social sharing and comments) and to post content you submit, Provide customer support , administer loyalty programs, contests, promotions, or surveys, or Identify and repair errors that impair the function of the Services and to detect security incidents Protect the rights of Charter and others, detect, investigate, and prevent activities that may violate our policies or may be fraudulent, illegal; to protect, enforce, or defend the legal rights, privacy, safety, or property of Charter Works, its employees, agents, or users; or as required by law. Please note: all editorial and commercial email messages include instructions for unsubscribing from such future communications. To Deliver Personalized Content and Recommendations For example, to: Customize features of the Services, Deliver relevant content and to provide you with an enhanced experience based on your activities and interests Send you personalized newsletters , surveys, and information about products, services and promotions offered by us, our partners, and other organizations with which we work Facilitate the delivery of targeted advertising (including interest-based advertising), promotions, and offers, on behalf of ourselves and our third-party advertisers, both on our websites and elsewhere Customize content that our third-party partners deliver on the Services (e.g., personalized third-party advertising) based on your activity on the Services Create and update inferences and profiles about you that can be used for advertising and marketing on the Services, third party services and platforms, and mobile apps, or for analytics, Measure and report on the delivery of advertisements Please note: all editorial and commercial email messages include instructions for unsubscribing from such future communications. To enable us to provide these Services, we may use the information we collect to identify you across sessions, browsers, and/or devices. Please see Section Four of this Privacy Policy (THIRD PARTY COOKIES AND TRACKING TECHNOLOGIES ) for further information about our and third parties’ use of cookies and other tracking technologies and your choices related to targeted advertising. To Learn About Our Users and Improve Services We conduct analysis and research on our users’ demographics, interests, and behavior and perform statistical analysis of our users, their use of the Services, and their purchasing patterns. We do this to optimize and improve the Services, our products, and our operations. To Combine Information for All the Purposes Described Above We may use the information gathered from one aspect of the Services to enhance other aspects of Services and we may combine information gathered from multiple aspects of the Services into a single user record. We also may use or combine information that we collect offline or that we collect or receive from third-party sources for many reasons, including to enhance, expand, and check the accuracy of our records. Data collected from a particular computer, browser or device may be used with another computer, browser or device that is linked to the computer, browser, or device on which such data was collected. HOW CHARTER SHARES INFORMATION Charter’s information-sharing practices vary based on the type of information and the type of recipient. Aggregate Or De-Identified Information We may use and share deidentified information with third parties in any manner for any purposes. Subscription Providers If your subscription is provided in whole or in part by your employer or other third party, we may share with them information about your access and use of your subscription. If you have a subscription associated with a professor or school, we may notify your professor or school to confirm your subscription, access, or use. When providing information to a subscription provider, we may reveal limited amounts of your personal information such as your name or email address. Service Providers and Professional Advisors We share information with third party agents and vendors who perform functions on our behalf, including, but not limited to, web hosting, content syndication, content management, social media integration, marketing, analytics, product development, email or text message transmission, billing or payment processing, order fulfillment, auditing, and customer service. We also may disclose your personal information to professional advisors, such as lawyers, bankers, auditors, and insurers, where necessary in the course of the professional services that they render to us. Service providers and professional advisors with whom we share information will be obligated to maintain the confidentiality (as appropriate for the services) and security of personal information Charter transmits to them. Third Party Content and/or Advertising Partners Third parties that provide content, advertising, or functionality to the Services may collect or receive information about you and/or your use of the Services, using cookies, beacons, and similar technologies. Third party content and/or advertising partners may use such information to provide you with advertising that is based on your interests and to measure and analyze ad performance on our Services or other websites or platforms, and combine it with information collected across different websites, online services, and other devices. Please note: third parties’ use of your information will be based on their own privacy policies. Social Media Platforms and Services If you log in with or connect a social media service account to a Charter Works Service, certain information may be available to the social media platform, in which case the social media platform’s use of the shared information will be governed by the social media platform’s privacy policy and your privacy settings for that platform. If you do not want your personal information shared as described, please do not connect your social media platform account with your Charter Works account, and do not participate in social sharing on the Services. Providers of Co-Branded Services Charter may offer co-branded services or features, such as conferences, events, contests, sweepstakes, or other promotions together with a third party (“Co-Branded Services”). Co-Branded Services may be hosted by Charter Works or through the third party’s services. Charter may share the information you submit in connection with the Co-Branded Service with the applicable third party or the third party may receive certain information from you at the same time Charter does. Please note: a third party’s use of your information will be governed by the third party’s privacy policy. Other Users of The Services Any information (including your name, location, email address, profile information, and comments) you choose to submit through the use certain features of the Services that provide an opportunity to interact with Charter and other Charter users (e.g., community forums, Slack groups) may be publicly available. Charter is not responsible for any information you choose to submit and make public through these channels of communication. Business Transferees In the event of a corporate change in control (for instance, a sale or merger) or due diligence in contemplation thereof, Charter Works may transfer your personal information to the new party in control or the party acquiring assets. With Your Consent at Your Direction We may also share your information with your consent. The Services may link to third-party websites and services that are outside our control. We are not responsible for the security or privacy of any information collected by these third parties, which operate pursuant to their respective privacy policies. THIRD PARTY COOKIES AND TRACKING TECHNOLOGIES Cookies are small text files that are stored in your device’s browser when you visit a website that enable the business that places the cookie business to recognize a user across one or more browsing sessions, and across one or more websites. When you use the Services, we and our third-party partners use cookies, pixel tags, device IDs and other similar technologies (collectively, “Cookies”) to collect information from your browser or device for the purposes of information storage and access; personalization of the Services; measurement of and analytics regarding the use of the Services; content selection, delivery, and reporting; and advertising selection, targeting, delivery, and reporting. By using the Services, you consent to our use of cookies and similar technologies. The following types of Cookies are used in the Services: Essential Cookies Essential Cookies enable you to browse our Services and use certain features. Disabling Essential Cookies may prevent you from using certain parts of the Services. These cookies also help keep our Services safe and secure. Preference Cookies Preference Cookies store information such as your login data, if applicable, and website preferences. Disabling Preference Cookies may hinder our ability to remember certain choices you’ve previously made or personalize your browsing experience by providing you with relevant information. Preference cookies can also be used to recognize your device so that you do not have to provide the same information more than once. Performance Cookies Performance Cookies collect information about how you use the Services such as which pages you visit regularly. Performance cookies are used to provide you with a high-quality experience by doing things such as tracking page load, site response times, and error messages. Content and Advertising Cookies Content and Advertising Cookies gather information about your use of our services so we provide you with more relevant content and advertising on the Services and elsewhere online and across your devices. Content and Advertising Cookies are also used to gather feedback on customer satisfaction through surveys. They remember that you’ve visited the Services and help Chart understand usage of the Services. Some Content and Advertising cookies are from third parties that collect information about your use of our Services to provide advertising (on our Services and elsewhere, across your different devices) based on your online activities (so-called “interest-based advertising”). Charter may not have access to these cookies, although we may use statistical information arising from the cookies provided by these third parties to customize content and for the other purposes described above. Please note: Charter does not control the privacy practices of these third parties, and their practices are not covered by this Privacy Policy. YOUR CHOICES There are several ways to minimize tracking of your online activity by third parties, some of which we have summarized below. We hope you find this information to be a helpful reference. Please note: using these tools to opt out of tracking and targeting does not mean that you will not receive advertising while using our Services or on other websites. Controls for Cookies and Online Tracking Choices Since many of these opt-out tools are specific to a device or browser, you will need to opt out on every browser and device that you use. Blocking Cookies in Your Browser . Most browsers let you remove or reject cookies, including cookies used for interest-based advertising. To do this, follow the instructions in your browser settings. Many browsers accept cookies by default until you change your settings. If you wish to opt-out of Google Analytics’ tracking, use this browser add-on provided by Google . Blocking advertising ID use in your mobile settings. Your mobile device settings may provide functionality to limit use of the advertising ID associated with your mobile device for interest-based advertising purposes. For more information about how to change these settings for Apple, Android or Windows devices, see: Apple: http://support.apple.com/kb/HT4228 Android: http://www.google.com/policies/technologies/ads/ Windows: http://choice.microsoft.com/en-US/opt-out Using privacy plug-ins or browsers . You also may use a browser with privacy features, like Brave, or install browser plugins like Privacy Badger , Ghostery or uBlock Origin . These may offer tools to block or limit third-party cookies/trackers. Platform opt-outs. The following advertising platforms offer opt-out features that let you opt-out of certain uses of your information for interest-based advertising: Google and Facebook Advertising industry opt-out tools. You can use these opt-out options to limit use of your interest-based advertising by participating companies: Digital Advertising Alliance and Network Advertising Initiative . Please note: opting-out of advertising networks’ tracking and targeting does not mean that you will not receive advertising while using our Services or on other websites, nor will it prevent the receipt of interest-based advertising from third parties that do not participate in these programs. It will exclude you, however, from interest-based advertising conducted through participating networks, as provided by their policies and choice mechanisms. Accessing Your Information You can request to access, review, correct, update, delete or modify your registration or subscription profile information (if Charter maintains such information) and modify your marketing preferences (where applicable) by contacting privacy@charterworks.com. Please note: if you have subscribed or registered for multiple of our Services or subscriptions, you may need to update your information for each account separately. Emails, Newsletters, and Text Messages You may always opt-out of receiving future e-mail marketing messages and newsletters from Charter Works by following the instructions contained within the emails and newsletters, or by e-mailing us at privacy@charterworks.com. You may opt out of receiving promotions or advertising via Text Message at any time, by replying “STOP” to one of our Text Messages. Responding To Requests For your protection, we may only implement requests with respect to the personal information associated with the email address that you use to send us your request and/or on the basis of other information we use to verify you before implementing your request. Please note: we may need to retain certain information for record-keeping purposes and/or to complete any transactions you began prior to requesting such change or deletion (e.g., when you make a purchase or enter a promotion, you may not be able to change or delete the personal information provided until after the completion or cancelation of such purchase or promotion). FOR READERS OUTSIDE THE US Charter Works is a US-based news organization, so we apply US law to our privacy practices. This means that wherever you are in the world, this Privacy Policy will apply to the information you provide to Charter or we collect when you use the Services. OTHER INFORMATION Security We take reasonable security measures to protect your information, including the use of physical, technical, and administrative controls. Please understand, however, that while we try our best to safeguard your personal information once we receive it, no transmission of data over the Internet or any other public network can be guaranteed to be 100% secure. You need to help protect the privacy of your own information. You must take precautions to protect the security of any personal information that you may transmit over any home networks, wireless routers, wireless (WiFi) networks or similar devices by using encryption and other techniques to prevent unauthorized persons from intercepting or receiving any of your personal information. You are responsible for the security of your information when using unencrypted, open access, or otherwise unsecured networks. Storage The period for which we keep information varies according to the purpose for which it is used. In some cases, there are legal requirements to keep data for a minimum period. We will retain your Personal Data for the period necessary to fulfill the purposes outlined in this Privacy Policy unless a longer retention period is required or allowed by law. Children’s Information The Services are not intended for children under 13 years of age. Charter Works does not knowingly collect personal information from children under 13 years of age. If Charter Works discovers that a child under the age of 13 has provided Charter Works with personal information and we do not have parental consent, Charter Works will delete that child’s information. If you believe that company has been provided with the personal information of a child under the age of 13 without parental consent, please notify us immediately at privacy@charterworks.com Questions If you have questions about our Privacy Policy, please contact us at privacy@charterworks.com Insights Books Interviews Charter on TIME Research Connect Events Topics Artificial Intelligence Hybrid Work DEI Leadership Charter Pro Become a Member Support Sign In Search Contact Partnerships General Inquiries Company About Careers Press Newsletters Charter Briefing Charter Works Inc. © 2025 Privacy Terms of Service | 2026-01-13T09:30:39 |
https://www.postgresql.org/docs/9.5/functions-json.html | PostgreSQL: Documentation: 9.5: JSON Functions and Operators Home About Download Documentation Community Developers Support Donate Your account November 13, 2025: PostgreSQL 18.1, 17.7, 16.11, 15.15, 14.20, and 13.23 Released! Documentation → PostgreSQL 9.5 Supported Versions: Current ( 18 ) / 17 / 16 / 15 / 14 Development Versions: devel Unsupported versions: 13 / 12 / 11 / 10 / 9.6 / 9.5 / 9.4 / 9.3 / 9.2 This documentation is for an unsupported version of PostgreSQL. You may want to view the same page for the current version, or one of the other supported versions listed above instead. PostgreSQL 9.5.25 Documentation Prev Up Chapter 9. Functions and Operators Next 9.15. JSON Functions and Operators Table 9-40 shows the operators that are available for use with the two JSON data types (see Section 8.14 ). Table 9-40. json and jsonb Operators Operator Right Operand Type Description Example Example Result -> int Get JSON array element (indexed from zero, negative integers count from the end) '[{"a":"foo"},{"b":"bar"},{"c":"baz"}]'::json->2 {"c":"baz"} -> text Get JSON object field by key '{"a": {"b":"foo"}}'::json->'a' {"b":"foo"} ->> int Get JSON array element as text '[1,2,3]'::json->>2 3 ->> text Get JSON object field as text '{"a":1,"b":2}'::json->>'b' 2 #> text[] Get JSON object at specified path '{"a": {"b":{"c": "foo"}}}'::json#>'{a,b}' {"c": "foo"} #>> text[] Get JSON object at specified path as text '{"a":[1,2,3],"b":[4,5,6]}'::json#>>'{a,2}' 3 Note: There are parallel variants of these operators for both the json and jsonb types. The field/element/path extraction operators return the same type as their left-hand input (either json or jsonb ), except for those specified as returning text , which coerce the value to text. The field/element/path extraction operators return NULL, rather than failing, if the JSON input does not have the right structure to match the request; for example if no such element exists. The field/element/path extraction operators that accept integer JSON array subscripts all support negative subscripting from the end of arrays. The standard comparison operators shown in Table 9-1 are available for jsonb , but not for json . They follow the ordering rules for B-tree operations outlined at Section 8.14.4 . Some further operators also exist only for jsonb , as shown in Table 9-41 . Many of these operators can be indexed by jsonb operator classes. For a full description of jsonb containment and existence semantics, see Section 8.14.3 . Section 8.14.4 describes how these operators can be used to effectively index jsonb data. Table 9-41. Additional jsonb Operators Operator Right Operand Type Description Example @> jsonb Does the left JSON value contain the right JSON path/value entries at the top level? '{"a":1, "b":2}'::jsonb @> '{"b":2}'::jsonb <@ jsonb Are the left JSON path/value entries contained at the top level within the right JSON value? '{"b":2}'::jsonb <@ '{"a":1, "b":2}'::jsonb ? text Does the string exist as a top-level key within the JSON value? '{"a":1, "b":2}'::jsonb ? 'b' ?| text[] Do any of these array strings exist as top-level keys? '{"a":1, "b":2, "c":3}'::jsonb ?| array['b', 'c'] ?& text[] Do all of these array strings exist as top-level keys? '["a", "b"]'::jsonb ?& array['a', 'b'] || jsonb Concatenate two jsonb values into a new jsonb value '["a", "b"]'::jsonb || '["c", "d"]'::jsonb - text Delete key/value pair or string element from left operand. Key/value pairs are matched based on their key value. '{"a": "b"}'::jsonb - 'a' - integer Delete the array element with specified index (Negative integers count from the end). Throws an error if top level container is not an array. '["a", "b"]'::jsonb - 1 #- text[] Delete the field or element with specified path (for JSON arrays, negative integers count from the end) '["a", {"b":1}]'::jsonb #- '{1,b}' Note: The || operator concatenates two JSON objects by generating an object containing the union of their keys, taking the second object's value when there are duplicate keys. All other cases produce a JSON array: first, any non-array input is converted into a single-element array, and then the two arrays are concatenated. It does not operate recursively; only the top-level array or object structure is merged. Table 9-42 shows the functions that are available for creating json and jsonb values. (There are no equivalent functions for jsonb , of the row_to_json and array_to_json functions. However, the to_jsonb function supplies much the same functionality as these functions would.) Table 9-42. JSON Creation Functions Function Description Example Example Result to_json(anyelement) to_jsonb(anyelement) Returns the value as json or jsonb . Arrays and composites are converted (recursively) to arrays and objects; otherwise, if there is a cast from the type to json , the cast function will be used to perform the conversion; otherwise, a scalar value is produced. For any scalar type other than a number, a Boolean, or a null value, the text representation will be used, in such a fashion that it is a valid json or jsonb value. to_json('Fred said "Hi."'::text) "Fred said \"Hi.\"" array_to_json(anyarray [, pretty_bool]) Returns the array as a JSON array. A PostgreSQL multidimensional array becomes a JSON array of arrays. Line feeds will be added between dimension-1 elements if pretty_bool is true. array_to_json('{{1,5},{99,100}}'::int[]) [[1,5],[99,100]] row_to_json(record [, pretty_bool]) Returns the row as a JSON object. Line feeds will be added between level-1 elements if pretty_bool is true. row_to_json(row(1,'foo')) {"f1":1,"f2":"foo"} json_build_array(VARIADIC "any") jsonb_build_array(VARIADIC "any") Builds a possibly-heterogeneously-typed JSON array out of a variadic argument list. json_build_array(1,2,'3',4,5) [1, 2, "3", 4, 5] json_build_object(VARIADIC "any") jsonb_build_object(VARIADIC "any") Builds a JSON object out of a variadic argument list. By convention, the argument list consists of alternating keys and values. json_build_object('foo',1,'bar',2) {"foo": 1, "bar": 2} json_object(text[]) jsonb_object(text[]) Builds a JSON object out of a text array. The array must have either exactly one dimension with an even number of members, in which case they are taken as alternating key/value pairs, or two dimensions such that each inner array has exactly two elements, which are taken as a key/value pair. json_object('{a, 1, b, "def", c, 3.5}') json_object('{{a, 1},{b, "def"},{c, 3.5}}') {"a": "1", "b": "def", "c": "3.5"} json_object(keys text[], values text[]) jsonb_object(keys text[], values text[]) This form of json_object takes keys and values pairwise from two separate arrays. In all other respects it is identical to the one-argument form. json_object('{a, b}', '{1,2}') {"a": "1", "b": "2"} Note: array_to_json and row_to_json have the same behavior as to_json except for offering a pretty-printing option. The behavior described for to_json likewise applies to each individual value converted by the other JSON creation functions. Note: The hstore extension has a cast from hstore to json , so that hstore values converted via the JSON creation functions will be represented as JSON objects, not as primitive string values. Table 9-43 shows the functions that are available for processing json and jsonb values. Table 9-43. JSON Processing Functions Function Return Type Description Example Example Result json_array_length(json) jsonb_array_length(jsonb) int Returns the number of elements in the outermost JSON array. json_array_length('[1,2,3,{"f1":1,"f2":[5,6]},4]') 5 json_each(json) jsonb_each(jsonb) setof key text, value json setof key text, value jsonb Expands the outermost JSON object into a set of key/value pairs. select * from json_each('{"a":"foo", "b":"bar"}') key | value -----+------- a | "foo" b | "bar" json_each_text(json) jsonb_each_text(jsonb) setof key text, value text Expands the outermost JSON object into a set of key/value pairs. The returned values will be of type text . select * from json_each_text('{"a":"foo", "b":"bar"}') key | value -----+------- a | foo b | bar json_extract_path(from_json json, VARIADIC path_elems text[]) jsonb_extract_path(from_json jsonb, VARIADIC path_elems text[]) json jsonb Returns JSON value pointed to by path_elems (equivalent to #> operator). json_extract_path('{"f2":{"f3":1},"f4":{"f5":99,"f6":"foo"}}','f4') {"f5":99,"f6":"foo"} json_extract_path_text(from_json json, VARIADIC path_elems text[]) jsonb_extract_path_text(from_json jsonb, VARIADIC path_elems text[]) text Returns JSON value pointed to by path_elems as text (equivalent to #>> operator). json_extract_path_text('{"f2":{"f3":1},"f4":{"f5":99,"f6":"foo"}}','f4', 'f6') foo json_object_keys(json) jsonb_object_keys(jsonb) setof text Returns set of keys in the outermost JSON object. json_object_keys('{"f1":"abc","f2":{"f3":"a", "f4":"b"}}') json_object_keys ------------------ f1 f2 json_populate_record(base anyelement, from_json json) jsonb_populate_record(base anyelement, from_json jsonb) anyelement Expands the object in from_json to a row whose columns match the record type defined by base (see note below). select * from json_populate_record(null::myrowtype, '{"a":1,"b":2}') a | b ---+--- 1 | 2 json_populate_recordset(base anyelement, from_json json) jsonb_populate_recordset(base anyelement, from_json jsonb) setof anyelement Expands the outermost array of objects in from_json to a set of rows whose columns match the record type defined by base (see note below). select * from json_populate_recordset(null::myrowtype, '[{"a":1,"b":2},{"a":3,"b":4}]') a | b ---+--- 1 | 2 3 | 4 json_array_elements(json) jsonb_array_elements(jsonb) setof json setof jsonb Expands a JSON array to a set of JSON values. select * from json_array_elements('[1,true, [2,false]]') value ----------- 1 true [2,false] json_array_elements_text(json) jsonb_array_elements_text(jsonb) setof text Expands a JSON array to a set of text values. select * from json_array_elements_text('["foo", "bar"]') value ----------- foo bar json_typeof(json) jsonb_typeof(jsonb) text Returns the type of the outermost JSON value as a text string. Possible types are object , array , string , number , boolean , and null . json_typeof('-123.4') number json_to_record(json) jsonb_to_record(jsonb) record Builds an arbitrary record from a JSON object (see note below). As with all functions returning record , the caller must explicitly define the structure of the record with an AS clause. select * from json_to_record('{"a":1,"b":[1,2,3],"c":"bar"}') as x(a int, b text, d text) a | b | d ---+---------+--- 1 | [1,2,3] | json_to_recordset(json) jsonb_to_recordset(jsonb) setof record Builds an arbitrary set of records from a JSON array of objects (see note below). As with all functions returning record , the caller must explicitly define the structure of the record with an AS clause. select * from json_to_recordset('[{"a":1,"b":"foo"},{"a":"2","c":"bar"}]') as x(a int, b text); a | b ---+----- 1 | foo 2 | json_strip_nulls(from_json json) jsonb_strip_nulls(from_json jsonb) json jsonb Returns from_json with all object fields that have null values omitted. Other null values are untouched. json_strip_nulls('[{"f1":1,"f2":null},2,null,3]') [{"f1":1},2,null,3] jsonb_set(target jsonb, path text[], new_value jsonb [ , create_missing boolean ]) jsonb Returns target with the section designated by path replaced by new_value , or with new_value added if create_missing is true (default is true ) and the item designated by path does not exist. As with the path oriented operators, negative integers that appear in path count from the end of JSON arrays. jsonb_set('[{"f1":1,"f2":null},2,null,3]', '{0,f1}','[2,3,4]', false) jsonb_set('[{"f1":1,"f2":null},2]', '{0,f3}','[2,3,4]') [{"f1":[2,3,4],"f2":null},2,null,3] [{"f1": 1, "f2": null, "f3": [2, 3, 4]}, 2] jsonb_pretty(from_json jsonb) text Returns from_json as indented JSON text. jsonb_pretty('[{"f1":1,"f2":null},2,null,3]') [ { "f1": 1, "f2": null }, 2, null, 3 ] Note: Many of these functions and operators will convert Unicode escapes in JSON strings to the appropriate single character. This is a non-issue if the input is type jsonb , because the conversion was already done; but for json input, this may result in throwing an error, as noted in Section 8.14 . Note: While the examples for the functions json_populate_record , json_populate_recordset , json_to_record and json_to_recordset use constants, the typical use would be to reference a table in the FROM clause and use one of its json or jsonb columns as an argument to the function. Extracted key values can then be referenced in other parts of the query, like WHERE clauses and target lists. Extracting multiple values in this way can improve performance over extracting them separately with per-key operators. JSON keys are matched to identical column names in the target row type. JSON type coercion for these functions is "best effort" and may not result in desired values for some types. JSON fields that do not appear in the target row type will be omitted from the output, and target columns that do not match any JSON field will simply be NULL. Note: All the items of the path parameter of jsonb_set must be present in the target , unless create_missing is true, in which case all but the last item must be present. If these conditions are not met the target is returned unchanged. If the last path item is an object key, it will be created if it is absent and given the new value. If the last path item is an array index, if it is positive the item to set is found by counting from the left, and if negative by counting from the right - -1 designates the rightmost element, and so on. If the item is out of the range -array_length .. array_length -1, and create_missing is true, the new value is added at the beginning of the array if the item is negative, and at the end of the array if it is positive. Note: The json_typeof function's null return value should not be confused with a SQL NULL. While calling json_typeof('null'::json) will return null , calling json_typeof(NULL::json) will return a SQL NULL. Note: If the argument to json_strip_nulls contains duplicate field names in any object, the result could be semantically somewhat different, depending on the order in which they occur. This is not an issue for jsonb_strip_nulls since jsonb values never have duplicate object field names. See also Section 9.20 for the aggregate function json_agg which aggregates record values as JSON, and the aggregate function json_object_agg which aggregates pairs of values into a JSON object, and their jsonb equivalents, jsonb_agg and jsonb_object_agg . Prev Home Next XML Functions Up Sequence Manipulation Functions Policies | Code of Conduct | About PostgreSQL | Contact Copyright © 1996-2026 The PostgreSQL Global Development Group | 2026-01-13T09:30:39 |
https://www.charterworks.com/privacy-policy/#how-charter-shares-information | Privacy Policy Try Charter Pro for $1 Latest Topics AI DEI Flexible Work Management Societal Issues Resources Briefing Work Tech Research Playbooks Case Studies Toolkits, Scripts, and other Resources Solutions Charter Pro Charter Forum Charter Pro for Teams Advisory + Strategic Services Events Upcoming and Past The AI Download Charter Cortados Leading With AI Masterclass Skills Accelerators Strategy Briefings Webinars Workplace Summit About Try Charter Pro for $1 Sign In Privacy Policy Last Updated: December 14, 2021 1. WHAT CHARTER COLLECTS 1 2. HOW CHARTER USES YOUR INFORMATION 3 3. HOW CHARTER SHARES INFORMATION 5 4. THIRD PARTY COOKIES AND TRACKING TECHNOLOGIES 7 5. YOUR CHOICES 8 6. FOR READERS OUTSIDE THE US 9 7. OTHER INFORMATION 9 Charter Works, Inc. and its affiliates (“Charter Works,” “Charter,” “we,” “us,” or “our”) operate CharterWorks.com, deliver newsletters, host live events, and deliver other products and services (“Services”). This Privacy Policy describes the kinds of information Charter may gather when you use the Services, how Charter uses that information, when Charter might disclose that information, and how you can manage it. By using the Services, you are accepting the practices described in our Privacy Policy, including our use of cookies and similar online tools. If you do not agree to the terms of this Privacy Policy, please do not use the Services. We reserve the right to modify or amend the terms of our privacy policy from time to time without notice. Your continued use of our Services following the posting of changes to these terms will mean you accept those changes. Please note: our Services are under constant development. This Privacy Policy may therefore be modified and updated on an ongoing basis. Please check back to this page regularly. Our Privacy Policy does not govern or apply to information collected or used by Charter Works through other means or to websites maintained by other companies or organizations to which we may link or who may link to us. Please send any questions about privacy issues to privacy@charterworks.com. WHAT CHARTER COLLECTS The information we collect and the purposes for which we use it will depend on how you interact with Charter Works and the Services. Information You Provide to Us When you use the Services, you may provide us the following: Registration, Subscription or Contact Information such as e-mail address, name, phone number, shipping address, and billing information Demographic and interest information such as your age, date of birth, gender, interests, lifestyle information, and hobbies Financial and transactional information such as credit or debit card number, verification number, and expiration date, to process payments and information about your transactions and purchases with us. Please note: payment information goes to our payment processors and is not collected, processed, or stored by Charter Works. Customer service information such as questions and other messages you address to us directly through online forms, by email, over the phone, or by post, and summaries or voice recordings of your interactions with customer care Employment or Education Information such as education history, employment experience, business contact information User-generated content such as comments on articles, photos, videos, audio, any information you submit in public forums or message boards, reviews and feedback or testimonials you provide about our Services Marketing information such as information related to your preferences for receiving communications, subscribing to our publications, newsletters, and other content Survey, market research or sweepstakes information such as information gathered when you complete a survey, participate in market research, or enter a contest, sweepstakes, or game relating to the Services. Social media information if you link your account or access the Services through a third-party connection or log-in, we may have access to any information you provide to that social network depending on your privacy settings Other information any other information you choose to directly provide to us in connection with your use of the Services Information We Automatically Collect We may collect information about your use of the Services, including: Device information and identifiers : such as computer or mobile device model, IP address, other unique device identifiers, operating system version, browser type, language, and settings Usage information : such as information about the Services you use, the time, date, and duration of your use of the Services, newsletter open-rate, referral information, your interaction with content offered through the Services, search terms used, referring website, and software crash reports. We also collect information stored using cookies, mobile ad identifiers, and similar technologies set on your device. Our servers may automatically keep an activity log of your use of the Services. We may collect such usage information at the individual or aggregate level. Please see Section Four of this Privacy Policy (THIRD PARTY COOKIES AND TRACKING TECHNOLOGIES ) for more information about how we collect and use this information. Location information : such as city, state and ZIP code associated with your IP address and precise geolocation information from your devices, with your permission in accordance with your mobile device settings. Information We Receive from Third Parties We may receive information about you from third parties and combine it with information we receive from or about you, including: Information from social media networks When you interact with Charter Works a social media service or log in using social media credentials, depending on your social media settings, we may have access to your information from that social network such as your social media account ID and/or user name associated with that social media service, your profile picture, email address, friends list or information about the people and groups you are connected to and how you interact with them, and any information you have made public in connection with that social media service, Information from third party email and subscription providers and/or processors When you purchase one of our subscription products on a third-party services or stores subscription (including the Apple Store), we receive personal information from the third parties that help us process emails and subscriptions. Please note: Charter Works does not receive (or collect, process, or store) any payment card industry (“PCI”) data. Information from publicly or commercially available sources We may collect information from third parties such as consumer data resellers that make available information, collected both online and offline, such as demographic information, additional contact information, group affiliations, occupational information, and educational background, which we may combine with other information we receive from or about you. Other Information We Collect Charter also may collect other information about you, your device, or your use of the Services in ways that we describe to you at the point of collection, or otherwise, with your consent. You may choose not to provide us with certain types of information but doing so may affect your experience in using the Services. HOW CHARTER USES YOUR INFORMATION Charter uses your information to personalize and improve your experience using the Services in the ways described below, or in other ways at your direction or with your consent. To Provide the Services For example, to: Process and fulfill your transactions , including subscriptions or memberships, and enable you to login to the Services, Contact you and send you communications about the Services (including communications you request like newsletters) and share invitations to events or offers about Charter products or our third-party partners’ products Respond to you and your comments, inquiries, or requests; and transmit legal notices, policy updates, and other important information about the Services, Provide features of the Services (such as social sharing and comments) and to post content you submit, Provide customer support , administer loyalty programs, contests, promotions, or surveys, or Identify and repair errors that impair the function of the Services and to detect security incidents Protect the rights of Charter and others, detect, investigate, and prevent activities that may violate our policies or may be fraudulent, illegal; to protect, enforce, or defend the legal rights, privacy, safety, or property of Charter Works, its employees, agents, or users; or as required by law. Please note: all editorial and commercial email messages include instructions for unsubscribing from such future communications. To Deliver Personalized Content and Recommendations For example, to: Customize features of the Services, Deliver relevant content and to provide you with an enhanced experience based on your activities and interests Send you personalized newsletters , surveys, and information about products, services and promotions offered by us, our partners, and other organizations with which we work Facilitate the delivery of targeted advertising (including interest-based advertising), promotions, and offers, on behalf of ourselves and our third-party advertisers, both on our websites and elsewhere Customize content that our third-party partners deliver on the Services (e.g., personalized third-party advertising) based on your activity on the Services Create and update inferences and profiles about you that can be used for advertising and marketing on the Services, third party services and platforms, and mobile apps, or for analytics, Measure and report on the delivery of advertisements Please note: all editorial and commercial email messages include instructions for unsubscribing from such future communications. To enable us to provide these Services, we may use the information we collect to identify you across sessions, browsers, and/or devices. Please see Section Four of this Privacy Policy (THIRD PARTY COOKIES AND TRACKING TECHNOLOGIES ) for further information about our and third parties’ use of cookies and other tracking technologies and your choices related to targeted advertising. To Learn About Our Users and Improve Services We conduct analysis and research on our users’ demographics, interests, and behavior and perform statistical analysis of our users, their use of the Services, and their purchasing patterns. We do this to optimize and improve the Services, our products, and our operations. To Combine Information for All the Purposes Described Above We may use the information gathered from one aspect of the Services to enhance other aspects of Services and we may combine information gathered from multiple aspects of the Services into a single user record. We also may use or combine information that we collect offline or that we collect or receive from third-party sources for many reasons, including to enhance, expand, and check the accuracy of our records. Data collected from a particular computer, browser or device may be used with another computer, browser or device that is linked to the computer, browser, or device on which such data was collected. HOW CHARTER SHARES INFORMATION Charter’s information-sharing practices vary based on the type of information and the type of recipient. Aggregate Or De-Identified Information We may use and share deidentified information with third parties in any manner for any purposes. Subscription Providers If your subscription is provided in whole or in part by your employer or other third party, we may share with them information about your access and use of your subscription. If you have a subscription associated with a professor or school, we may notify your professor or school to confirm your subscription, access, or use. When providing information to a subscription provider, we may reveal limited amounts of your personal information such as your name or email address. Service Providers and Professional Advisors We share information with third party agents and vendors who perform functions on our behalf, including, but not limited to, web hosting, content syndication, content management, social media integration, marketing, analytics, product development, email or text message transmission, billing or payment processing, order fulfillment, auditing, and customer service. We also may disclose your personal information to professional advisors, such as lawyers, bankers, auditors, and insurers, where necessary in the course of the professional services that they render to us. Service providers and professional advisors with whom we share information will be obligated to maintain the confidentiality (as appropriate for the services) and security of personal information Charter transmits to them. Third Party Content and/or Advertising Partners Third parties that provide content, advertising, or functionality to the Services may collect or receive information about you and/or your use of the Services, using cookies, beacons, and similar technologies. Third party content and/or advertising partners may use such information to provide you with advertising that is based on your interests and to measure and analyze ad performance on our Services or other websites or platforms, and combine it with information collected across different websites, online services, and other devices. Please note: third parties’ use of your information will be based on their own privacy policies. Social Media Platforms and Services If you log in with or connect a social media service account to a Charter Works Service, certain information may be available to the social media platform, in which case the social media platform’s use of the shared information will be governed by the social media platform’s privacy policy and your privacy settings for that platform. If you do not want your personal information shared as described, please do not connect your social media platform account with your Charter Works account, and do not participate in social sharing on the Services. Providers of Co-Branded Services Charter may offer co-branded services or features, such as conferences, events, contests, sweepstakes, or other promotions together with a third party (“Co-Branded Services”). Co-Branded Services may be hosted by Charter Works or through the third party’s services. Charter may share the information you submit in connection with the Co-Branded Service with the applicable third party or the third party may receive certain information from you at the same time Charter does. Please note: a third party’s use of your information will be governed by the third party’s privacy policy. Other Users of The Services Any information (including your name, location, email address, profile information, and comments) you choose to submit through the use certain features of the Services that provide an opportunity to interact with Charter and other Charter users (e.g., community forums, Slack groups) may be publicly available. Charter is not responsible for any information you choose to submit and make public through these channels of communication. Business Transferees In the event of a corporate change in control (for instance, a sale or merger) or due diligence in contemplation thereof, Charter Works may transfer your personal information to the new party in control or the party acquiring assets. With Your Consent at Your Direction We may also share your information with your consent. The Services may link to third-party websites and services that are outside our control. We are not responsible for the security or privacy of any information collected by these third parties, which operate pursuant to their respective privacy policies. THIRD PARTY COOKIES AND TRACKING TECHNOLOGIES Cookies are small text files that are stored in your device’s browser when you visit a website that enable the business that places the cookie business to recognize a user across one or more browsing sessions, and across one or more websites. When you use the Services, we and our third-party partners use cookies, pixel tags, device IDs and other similar technologies (collectively, “Cookies”) to collect information from your browser or device for the purposes of information storage and access; personalization of the Services; measurement of and analytics regarding the use of the Services; content selection, delivery, and reporting; and advertising selection, targeting, delivery, and reporting. By using the Services, you consent to our use of cookies and similar technologies. The following types of Cookies are used in the Services: Essential Cookies Essential Cookies enable you to browse our Services and use certain features. Disabling Essential Cookies may prevent you from using certain parts of the Services. These cookies also help keep our Services safe and secure. Preference Cookies Preference Cookies store information such as your login data, if applicable, and website preferences. Disabling Preference Cookies may hinder our ability to remember certain choices you’ve previously made or personalize your browsing experience by providing you with relevant information. Preference cookies can also be used to recognize your device so that you do not have to provide the same information more than once. Performance Cookies Performance Cookies collect information about how you use the Services such as which pages you visit regularly. Performance cookies are used to provide you with a high-quality experience by doing things such as tracking page load, site response times, and error messages. Content and Advertising Cookies Content and Advertising Cookies gather information about your use of our services so we provide you with more relevant content and advertising on the Services and elsewhere online and across your devices. Content and Advertising Cookies are also used to gather feedback on customer satisfaction through surveys. They remember that you’ve visited the Services and help Chart understand usage of the Services. Some Content and Advertising cookies are from third parties that collect information about your use of our Services to provide advertising (on our Services and elsewhere, across your different devices) based on your online activities (so-called “interest-based advertising”). Charter may not have access to these cookies, although we may use statistical information arising from the cookies provided by these third parties to customize content and for the other purposes described above. Please note: Charter does not control the privacy practices of these third parties, and their practices are not covered by this Privacy Policy. YOUR CHOICES There are several ways to minimize tracking of your online activity by third parties, some of which we have summarized below. We hope you find this information to be a helpful reference. Please note: using these tools to opt out of tracking and targeting does not mean that you will not receive advertising while using our Services or on other websites. Controls for Cookies and Online Tracking Choices Since many of these opt-out tools are specific to a device or browser, you will need to opt out on every browser and device that you use. Blocking Cookies in Your Browser . Most browsers let you remove or reject cookies, including cookies used for interest-based advertising. To do this, follow the instructions in your browser settings. Many browsers accept cookies by default until you change your settings. If you wish to opt-out of Google Analytics’ tracking, use this browser add-on provided by Google . Blocking advertising ID use in your mobile settings. Your mobile device settings may provide functionality to limit use of the advertising ID associated with your mobile device for interest-based advertising purposes. For more information about how to change these settings for Apple, Android or Windows devices, see: Apple: http://support.apple.com/kb/HT4228 Android: http://www.google.com/policies/technologies/ads/ Windows: http://choice.microsoft.com/en-US/opt-out Using privacy plug-ins or browsers . You also may use a browser with privacy features, like Brave, or install browser plugins like Privacy Badger , Ghostery or uBlock Origin . These may offer tools to block or limit third-party cookies/trackers. Platform opt-outs. The following advertising platforms offer opt-out features that let you opt-out of certain uses of your information for interest-based advertising: Google and Facebook Advertising industry opt-out tools. You can use these opt-out options to limit use of your interest-based advertising by participating companies: Digital Advertising Alliance and Network Advertising Initiative . Please note: opting-out of advertising networks’ tracking and targeting does not mean that you will not receive advertising while using our Services or on other websites, nor will it prevent the receipt of interest-based advertising from third parties that do not participate in these programs. It will exclude you, however, from interest-based advertising conducted through participating networks, as provided by their policies and choice mechanisms. Accessing Your Information You can request to access, review, correct, update, delete or modify your registration or subscription profile information (if Charter maintains such information) and modify your marketing preferences (where applicable) by contacting privacy@charterworks.com. Please note: if you have subscribed or registered for multiple of our Services or subscriptions, you may need to update your information for each account separately. Emails, Newsletters, and Text Messages You may always opt-out of receiving future e-mail marketing messages and newsletters from Charter Works by following the instructions contained within the emails and newsletters, or by e-mailing us at privacy@charterworks.com. You may opt out of receiving promotions or advertising via Text Message at any time, by replying “STOP” to one of our Text Messages. Responding To Requests For your protection, we may only implement requests with respect to the personal information associated with the email address that you use to send us your request and/or on the basis of other information we use to verify you before implementing your request. Please note: we may need to retain certain information for record-keeping purposes and/or to complete any transactions you began prior to requesting such change or deletion (e.g., when you make a purchase or enter a promotion, you may not be able to change or delete the personal information provided until after the completion or cancelation of such purchase or promotion). FOR READERS OUTSIDE THE US Charter Works is a US-based news organization, so we apply US law to our privacy practices. This means that wherever you are in the world, this Privacy Policy will apply to the information you provide to Charter or we collect when you use the Services. OTHER INFORMATION Security We take reasonable security measures to protect your information, including the use of physical, technical, and administrative controls. Please understand, however, that while we try our best to safeguard your personal information once we receive it, no transmission of data over the Internet or any other public network can be guaranteed to be 100% secure. You need to help protect the privacy of your own information. You must take precautions to protect the security of any personal information that you may transmit over any home networks, wireless routers, wireless (WiFi) networks or similar devices by using encryption and other techniques to prevent unauthorized persons from intercepting or receiving any of your personal information. You are responsible for the security of your information when using unencrypted, open access, or otherwise unsecured networks. Storage The period for which we keep information varies according to the purpose for which it is used. In some cases, there are legal requirements to keep data for a minimum period. We will retain your Personal Data for the period necessary to fulfill the purposes outlined in this Privacy Policy unless a longer retention period is required or allowed by law. Children’s Information The Services are not intended for children under 13 years of age. Charter Works does not knowingly collect personal information from children under 13 years of age. If Charter Works discovers that a child under the age of 13 has provided Charter Works with personal information and we do not have parental consent, Charter Works will delete that child’s information. If you believe that company has been provided with the personal information of a child under the age of 13 without parental consent, please notify us immediately at privacy@charterworks.com Questions If you have questions about our Privacy Policy, please contact us at privacy@charterworks.com Insights Books Interviews Charter on TIME Research Connect Events Topics Artificial Intelligence Hybrid Work DEI Leadership Charter Pro Become a Member Support Sign In Search Contact Partnerships General Inquiries Company About Careers Press Newsletters Charter Briefing Charter Works Inc. © 2025 Privacy Terms of Service | 2026-01-13T09:30:39 |
https://www.charterworks.com/privacy-policy/#how-charter-uses-your-information | Privacy Policy Try Charter Pro for $1 Latest Topics AI DEI Flexible Work Management Societal Issues Resources Briefing Work Tech Research Playbooks Case Studies Toolkits, Scripts, and other Resources Solutions Charter Pro Charter Forum Charter Pro for Teams Advisory + Strategic Services Events Upcoming and Past The AI Download Charter Cortados Leading With AI Masterclass Skills Accelerators Strategy Briefings Webinars Workplace Summit About Try Charter Pro for $1 Sign In Privacy Policy Last Updated: December 14, 2021 1. WHAT CHARTER COLLECTS 1 2. HOW CHARTER USES YOUR INFORMATION 3 3. HOW CHARTER SHARES INFORMATION 5 4. THIRD PARTY COOKIES AND TRACKING TECHNOLOGIES 7 5. YOUR CHOICES 8 6. FOR READERS OUTSIDE THE US 9 7. OTHER INFORMATION 9 Charter Works, Inc. and its affiliates (“Charter Works,” “Charter,” “we,” “us,” or “our”) operate CharterWorks.com, deliver newsletters, host live events, and deliver other products and services (“Services”). This Privacy Policy describes the kinds of information Charter may gather when you use the Services, how Charter uses that information, when Charter might disclose that information, and how you can manage it. By using the Services, you are accepting the practices described in our Privacy Policy, including our use of cookies and similar online tools. If you do not agree to the terms of this Privacy Policy, please do not use the Services. We reserve the right to modify or amend the terms of our privacy policy from time to time without notice. Your continued use of our Services following the posting of changes to these terms will mean you accept those changes. Please note: our Services are under constant development. This Privacy Policy may therefore be modified and updated on an ongoing basis. Please check back to this page regularly. Our Privacy Policy does not govern or apply to information collected or used by Charter Works through other means or to websites maintained by other companies or organizations to which we may link or who may link to us. Please send any questions about privacy issues to privacy@charterworks.com. WHAT CHARTER COLLECTS The information we collect and the purposes for which we use it will depend on how you interact with Charter Works and the Services. Information You Provide to Us When you use the Services, you may provide us the following: Registration, Subscription or Contact Information such as e-mail address, name, phone number, shipping address, and billing information Demographic and interest information such as your age, date of birth, gender, interests, lifestyle information, and hobbies Financial and transactional information such as credit or debit card number, verification number, and expiration date, to process payments and information about your transactions and purchases with us. Please note: payment information goes to our payment processors and is not collected, processed, or stored by Charter Works. Customer service information such as questions and other messages you address to us directly through online forms, by email, over the phone, or by post, and summaries or voice recordings of your interactions with customer care Employment or Education Information such as education history, employment experience, business contact information User-generated content such as comments on articles, photos, videos, audio, any information you submit in public forums or message boards, reviews and feedback or testimonials you provide about our Services Marketing information such as information related to your preferences for receiving communications, subscribing to our publications, newsletters, and other content Survey, market research or sweepstakes information such as information gathered when you complete a survey, participate in market research, or enter a contest, sweepstakes, or game relating to the Services. Social media information if you link your account or access the Services through a third-party connection or log-in, we may have access to any information you provide to that social network depending on your privacy settings Other information any other information you choose to directly provide to us in connection with your use of the Services Information We Automatically Collect We may collect information about your use of the Services, including: Device information and identifiers : such as computer or mobile device model, IP address, other unique device identifiers, operating system version, browser type, language, and settings Usage information : such as information about the Services you use, the time, date, and duration of your use of the Services, newsletter open-rate, referral information, your interaction with content offered through the Services, search terms used, referring website, and software crash reports. We also collect information stored using cookies, mobile ad identifiers, and similar technologies set on your device. Our servers may automatically keep an activity log of your use of the Services. We may collect such usage information at the individual or aggregate level. Please see Section Four of this Privacy Policy (THIRD PARTY COOKIES AND TRACKING TECHNOLOGIES ) for more information about how we collect and use this information. Location information : such as city, state and ZIP code associated with your IP address and precise geolocation information from your devices, with your permission in accordance with your mobile device settings. Information We Receive from Third Parties We may receive information about you from third parties and combine it with information we receive from or about you, including: Information from social media networks When you interact with Charter Works a social media service or log in using social media credentials, depending on your social media settings, we may have access to your information from that social network such as your social media account ID and/or user name associated with that social media service, your profile picture, email address, friends list or information about the people and groups you are connected to and how you interact with them, and any information you have made public in connection with that social media service, Information from third party email and subscription providers and/or processors When you purchase one of our subscription products on a third-party services or stores subscription (including the Apple Store), we receive personal information from the third parties that help us process emails and subscriptions. Please note: Charter Works does not receive (or collect, process, or store) any payment card industry (“PCI”) data. Information from publicly or commercially available sources We may collect information from third parties such as consumer data resellers that make available information, collected both online and offline, such as demographic information, additional contact information, group affiliations, occupational information, and educational background, which we may combine with other information we receive from or about you. Other Information We Collect Charter also may collect other information about you, your device, or your use of the Services in ways that we describe to you at the point of collection, or otherwise, with your consent. You may choose not to provide us with certain types of information but doing so may affect your experience in using the Services. HOW CHARTER USES YOUR INFORMATION Charter uses your information to personalize and improve your experience using the Services in the ways described below, or in other ways at your direction or with your consent. To Provide the Services For example, to: Process and fulfill your transactions , including subscriptions or memberships, and enable you to login to the Services, Contact you and send you communications about the Services (including communications you request like newsletters) and share invitations to events or offers about Charter products or our third-party partners’ products Respond to you and your comments, inquiries, or requests; and transmit legal notices, policy updates, and other important information about the Services, Provide features of the Services (such as social sharing and comments) and to post content you submit, Provide customer support , administer loyalty programs, contests, promotions, or surveys, or Identify and repair errors that impair the function of the Services and to detect security incidents Protect the rights of Charter and others, detect, investigate, and prevent activities that may violate our policies or may be fraudulent, illegal; to protect, enforce, or defend the legal rights, privacy, safety, or property of Charter Works, its employees, agents, or users; or as required by law. Please note: all editorial and commercial email messages include instructions for unsubscribing from such future communications. To Deliver Personalized Content and Recommendations For example, to: Customize features of the Services, Deliver relevant content and to provide you with an enhanced experience based on your activities and interests Send you personalized newsletters , surveys, and information about products, services and promotions offered by us, our partners, and other organizations with which we work Facilitate the delivery of targeted advertising (including interest-based advertising), promotions, and offers, on behalf of ourselves and our third-party advertisers, both on our websites and elsewhere Customize content that our third-party partners deliver on the Services (e.g., personalized third-party advertising) based on your activity on the Services Create and update inferences and profiles about you that can be used for advertising and marketing on the Services, third party services and platforms, and mobile apps, or for analytics, Measure and report on the delivery of advertisements Please note: all editorial and commercial email messages include instructions for unsubscribing from such future communications. To enable us to provide these Services, we may use the information we collect to identify you across sessions, browsers, and/or devices. Please see Section Four of this Privacy Policy (THIRD PARTY COOKIES AND TRACKING TECHNOLOGIES ) for further information about our and third parties’ use of cookies and other tracking technologies and your choices related to targeted advertising. To Learn About Our Users and Improve Services We conduct analysis and research on our users’ demographics, interests, and behavior and perform statistical analysis of our users, their use of the Services, and their purchasing patterns. We do this to optimize and improve the Services, our products, and our operations. To Combine Information for All the Purposes Described Above We may use the information gathered from one aspect of the Services to enhance other aspects of Services and we may combine information gathered from multiple aspects of the Services into a single user record. We also may use or combine information that we collect offline or that we collect or receive from third-party sources for many reasons, including to enhance, expand, and check the accuracy of our records. Data collected from a particular computer, browser or device may be used with another computer, browser or device that is linked to the computer, browser, or device on which such data was collected. HOW CHARTER SHARES INFORMATION Charter’s information-sharing practices vary based on the type of information and the type of recipient. Aggregate Or De-Identified Information We may use and share deidentified information with third parties in any manner for any purposes. Subscription Providers If your subscription is provided in whole or in part by your employer or other third party, we may share with them information about your access and use of your subscription. If you have a subscription associated with a professor or school, we may notify your professor or school to confirm your subscription, access, or use. When providing information to a subscription provider, we may reveal limited amounts of your personal information such as your name or email address. Service Providers and Professional Advisors We share information with third party agents and vendors who perform functions on our behalf, including, but not limited to, web hosting, content syndication, content management, social media integration, marketing, analytics, product development, email or text message transmission, billing or payment processing, order fulfillment, auditing, and customer service. We also may disclose your personal information to professional advisors, such as lawyers, bankers, auditors, and insurers, where necessary in the course of the professional services that they render to us. Service providers and professional advisors with whom we share information will be obligated to maintain the confidentiality (as appropriate for the services) and security of personal information Charter transmits to them. Third Party Content and/or Advertising Partners Third parties that provide content, advertising, or functionality to the Services may collect or receive information about you and/or your use of the Services, using cookies, beacons, and similar technologies. Third party content and/or advertising partners may use such information to provide you with advertising that is based on your interests and to measure and analyze ad performance on our Services or other websites or platforms, and combine it with information collected across different websites, online services, and other devices. Please note: third parties’ use of your information will be based on their own privacy policies. Social Media Platforms and Services If you log in with or connect a social media service account to a Charter Works Service, certain information may be available to the social media platform, in which case the social media platform’s use of the shared information will be governed by the social media platform’s privacy policy and your privacy settings for that platform. If you do not want your personal information shared as described, please do not connect your social media platform account with your Charter Works account, and do not participate in social sharing on the Services. Providers of Co-Branded Services Charter may offer co-branded services or features, such as conferences, events, contests, sweepstakes, or other promotions together with a third party (“Co-Branded Services”). Co-Branded Services may be hosted by Charter Works or through the third party’s services. Charter may share the information you submit in connection with the Co-Branded Service with the applicable third party or the third party may receive certain information from you at the same time Charter does. Please note: a third party’s use of your information will be governed by the third party’s privacy policy. Other Users of The Services Any information (including your name, location, email address, profile information, and comments) you choose to submit through the use certain features of the Services that provide an opportunity to interact with Charter and other Charter users (e.g., community forums, Slack groups) may be publicly available. Charter is not responsible for any information you choose to submit and make public through these channels of communication. Business Transferees In the event of a corporate change in control (for instance, a sale or merger) or due diligence in contemplation thereof, Charter Works may transfer your personal information to the new party in control or the party acquiring assets. With Your Consent at Your Direction We may also share your information with your consent. The Services may link to third-party websites and services that are outside our control. We are not responsible for the security or privacy of any information collected by these third parties, which operate pursuant to their respective privacy policies. THIRD PARTY COOKIES AND TRACKING TECHNOLOGIES Cookies are small text files that are stored in your device’s browser when you visit a website that enable the business that places the cookie business to recognize a user across one or more browsing sessions, and across one or more websites. When you use the Services, we and our third-party partners use cookies, pixel tags, device IDs and other similar technologies (collectively, “Cookies”) to collect information from your browser or device for the purposes of information storage and access; personalization of the Services; measurement of and analytics regarding the use of the Services; content selection, delivery, and reporting; and advertising selection, targeting, delivery, and reporting. By using the Services, you consent to our use of cookies and similar technologies. The following types of Cookies are used in the Services: Essential Cookies Essential Cookies enable you to browse our Services and use certain features. Disabling Essential Cookies may prevent you from using certain parts of the Services. These cookies also help keep our Services safe and secure. Preference Cookies Preference Cookies store information such as your login data, if applicable, and website preferences. Disabling Preference Cookies may hinder our ability to remember certain choices you’ve previously made or personalize your browsing experience by providing you with relevant information. Preference cookies can also be used to recognize your device so that you do not have to provide the same information more than once. Performance Cookies Performance Cookies collect information about how you use the Services such as which pages you visit regularly. Performance cookies are used to provide you with a high-quality experience by doing things such as tracking page load, site response times, and error messages. Content and Advertising Cookies Content and Advertising Cookies gather information about your use of our services so we provide you with more relevant content and advertising on the Services and elsewhere online and across your devices. Content and Advertising Cookies are also used to gather feedback on customer satisfaction through surveys. They remember that you’ve visited the Services and help Chart understand usage of the Services. Some Content and Advertising cookies are from third parties that collect information about your use of our Services to provide advertising (on our Services and elsewhere, across your different devices) based on your online activities (so-called “interest-based advertising”). Charter may not have access to these cookies, although we may use statistical information arising from the cookies provided by these third parties to customize content and for the other purposes described above. Please note: Charter does not control the privacy practices of these third parties, and their practices are not covered by this Privacy Policy. YOUR CHOICES There are several ways to minimize tracking of your online activity by third parties, some of which we have summarized below. We hope you find this information to be a helpful reference. Please note: using these tools to opt out of tracking and targeting does not mean that you will not receive advertising while using our Services or on other websites. Controls for Cookies and Online Tracking Choices Since many of these opt-out tools are specific to a device or browser, you will need to opt out on every browser and device that you use. Blocking Cookies in Your Browser . Most browsers let you remove or reject cookies, including cookies used for interest-based advertising. To do this, follow the instructions in your browser settings. Many browsers accept cookies by default until you change your settings. If you wish to opt-out of Google Analytics’ tracking, use this browser add-on provided by Google . Blocking advertising ID use in your mobile settings. Your mobile device settings may provide functionality to limit use of the advertising ID associated with your mobile device for interest-based advertising purposes. For more information about how to change these settings for Apple, Android or Windows devices, see: Apple: http://support.apple.com/kb/HT4228 Android: http://www.google.com/policies/technologies/ads/ Windows: http://choice.microsoft.com/en-US/opt-out Using privacy plug-ins or browsers . You also may use a browser with privacy features, like Brave, or install browser plugins like Privacy Badger , Ghostery or uBlock Origin . These may offer tools to block or limit third-party cookies/trackers. Platform opt-outs. The following advertising platforms offer opt-out features that let you opt-out of certain uses of your information for interest-based advertising: Google and Facebook Advertising industry opt-out tools. You can use these opt-out options to limit use of your interest-based advertising by participating companies: Digital Advertising Alliance and Network Advertising Initiative . Please note: opting-out of advertising networks’ tracking and targeting does not mean that you will not receive advertising while using our Services or on other websites, nor will it prevent the receipt of interest-based advertising from third parties that do not participate in these programs. It will exclude you, however, from interest-based advertising conducted through participating networks, as provided by their policies and choice mechanisms. Accessing Your Information You can request to access, review, correct, update, delete or modify your registration or subscription profile information (if Charter maintains such information) and modify your marketing preferences (where applicable) by contacting privacy@charterworks.com. Please note: if you have subscribed or registered for multiple of our Services or subscriptions, you may need to update your information for each account separately. Emails, Newsletters, and Text Messages You may always opt-out of receiving future e-mail marketing messages and newsletters from Charter Works by following the instructions contained within the emails and newsletters, or by e-mailing us at privacy@charterworks.com. You may opt out of receiving promotions or advertising via Text Message at any time, by replying “STOP” to one of our Text Messages. Responding To Requests For your protection, we may only implement requests with respect to the personal information associated with the email address that you use to send us your request and/or on the basis of other information we use to verify you before implementing your request. Please note: we may need to retain certain information for record-keeping purposes and/or to complete any transactions you began prior to requesting such change or deletion (e.g., when you make a purchase or enter a promotion, you may not be able to change or delete the personal information provided until after the completion or cancelation of such purchase or promotion). FOR READERS OUTSIDE THE US Charter Works is a US-based news organization, so we apply US law to our privacy practices. This means that wherever you are in the world, this Privacy Policy will apply to the information you provide to Charter or we collect when you use the Services. OTHER INFORMATION Security We take reasonable security measures to protect your information, including the use of physical, technical, and administrative controls. Please understand, however, that while we try our best to safeguard your personal information once we receive it, no transmission of data over the Internet or any other public network can be guaranteed to be 100% secure. You need to help protect the privacy of your own information. You must take precautions to protect the security of any personal information that you may transmit over any home networks, wireless routers, wireless (WiFi) networks or similar devices by using encryption and other techniques to prevent unauthorized persons from intercepting or receiving any of your personal information. You are responsible for the security of your information when using unencrypted, open access, or otherwise unsecured networks. Storage The period for which we keep information varies according to the purpose for which it is used. In some cases, there are legal requirements to keep data for a minimum period. We will retain your Personal Data for the period necessary to fulfill the purposes outlined in this Privacy Policy unless a longer retention period is required or allowed by law. Children’s Information The Services are not intended for children under 13 years of age. Charter Works does not knowingly collect personal information from children under 13 years of age. If Charter Works discovers that a child under the age of 13 has provided Charter Works with personal information and we do not have parental consent, Charter Works will delete that child’s information. If you believe that company has been provided with the personal information of a child under the age of 13 without parental consent, please notify us immediately at privacy@charterworks.com Questions If you have questions about our Privacy Policy, please contact us at privacy@charterworks.com Insights Books Interviews Charter on TIME Research Connect Events Topics Artificial Intelligence Hybrid Work DEI Leadership Charter Pro Become a Member Support Sign In Search Contact Partnerships General Inquiries Company About Careers Press Newsletters Charter Briefing Charter Works Inc. © 2025 Privacy Terms of Service | 2026-01-13T09:30:39 |
https://www.charterworks.com/privacy-policy/#other-information | Privacy Policy Try Charter Pro for $1 Latest Topics AI DEI Flexible Work Management Societal Issues Resources Briefing Work Tech Research Playbooks Case Studies Toolkits, Scripts, and other Resources Solutions Charter Pro Charter Forum Charter Pro for Teams Advisory + Strategic Services Events Upcoming and Past The AI Download Charter Cortados Leading With AI Masterclass Skills Accelerators Strategy Briefings Webinars Workplace Summit About Try Charter Pro for $1 Sign In Privacy Policy Last Updated: December 14, 2021 1. WHAT CHARTER COLLECTS 1 2. HOW CHARTER USES YOUR INFORMATION 3 3. HOW CHARTER SHARES INFORMATION 5 4. THIRD PARTY COOKIES AND TRACKING TECHNOLOGIES 7 5. YOUR CHOICES 8 6. FOR READERS OUTSIDE THE US 9 7. OTHER INFORMATION 9 Charter Works, Inc. and its affiliates (“Charter Works,” “Charter,” “we,” “us,” or “our”) operate CharterWorks.com, deliver newsletters, host live events, and deliver other products and services (“Services”). This Privacy Policy describes the kinds of information Charter may gather when you use the Services, how Charter uses that information, when Charter might disclose that information, and how you can manage it. By using the Services, you are accepting the practices described in our Privacy Policy, including our use of cookies and similar online tools. If you do not agree to the terms of this Privacy Policy, please do not use the Services. We reserve the right to modify or amend the terms of our privacy policy from time to time without notice. Your continued use of our Services following the posting of changes to these terms will mean you accept those changes. Please note: our Services are under constant development. This Privacy Policy may therefore be modified and updated on an ongoing basis. Please check back to this page regularly. Our Privacy Policy does not govern or apply to information collected or used by Charter Works through other means or to websites maintained by other companies or organizations to which we may link or who may link to us. Please send any questions about privacy issues to privacy@charterworks.com. WHAT CHARTER COLLECTS The information we collect and the purposes for which we use it will depend on how you interact with Charter Works and the Services. Information You Provide to Us When you use the Services, you may provide us the following: Registration, Subscription or Contact Information such as e-mail address, name, phone number, shipping address, and billing information Demographic and interest information such as your age, date of birth, gender, interests, lifestyle information, and hobbies Financial and transactional information such as credit or debit card number, verification number, and expiration date, to process payments and information about your transactions and purchases with us. Please note: payment information goes to our payment processors and is not collected, processed, or stored by Charter Works. Customer service information such as questions and other messages you address to us directly through online forms, by email, over the phone, or by post, and summaries or voice recordings of your interactions with customer care Employment or Education Information such as education history, employment experience, business contact information User-generated content such as comments on articles, photos, videos, audio, any information you submit in public forums or message boards, reviews and feedback or testimonials you provide about our Services Marketing information such as information related to your preferences for receiving communications, subscribing to our publications, newsletters, and other content Survey, market research or sweepstakes information such as information gathered when you complete a survey, participate in market research, or enter a contest, sweepstakes, or game relating to the Services. Social media information if you link your account or access the Services through a third-party connection or log-in, we may have access to any information you provide to that social network depending on your privacy settings Other information any other information you choose to directly provide to us in connection with your use of the Services Information We Automatically Collect We may collect information about your use of the Services, including: Device information and identifiers : such as computer or mobile device model, IP address, other unique device identifiers, operating system version, browser type, language, and settings Usage information : such as information about the Services you use, the time, date, and duration of your use of the Services, newsletter open-rate, referral information, your interaction with content offered through the Services, search terms used, referring website, and software crash reports. We also collect information stored using cookies, mobile ad identifiers, and similar technologies set on your device. Our servers may automatically keep an activity log of your use of the Services. We may collect such usage information at the individual or aggregate level. Please see Section Four of this Privacy Policy (THIRD PARTY COOKIES AND TRACKING TECHNOLOGIES ) for more information about how we collect and use this information. Location information : such as city, state and ZIP code associated with your IP address and precise geolocation information from your devices, with your permission in accordance with your mobile device settings. Information We Receive from Third Parties We may receive information about you from third parties and combine it with information we receive from or about you, including: Information from social media networks When you interact with Charter Works a social media service or log in using social media credentials, depending on your social media settings, we may have access to your information from that social network such as your social media account ID and/or user name associated with that social media service, your profile picture, email address, friends list or information about the people and groups you are connected to and how you interact with them, and any information you have made public in connection with that social media service, Information from third party email and subscription providers and/or processors When you purchase one of our subscription products on a third-party services or stores subscription (including the Apple Store), we receive personal information from the third parties that help us process emails and subscriptions. Please note: Charter Works does not receive (or collect, process, or store) any payment card industry (“PCI”) data. Information from publicly or commercially available sources We may collect information from third parties such as consumer data resellers that make available information, collected both online and offline, such as demographic information, additional contact information, group affiliations, occupational information, and educational background, which we may combine with other information we receive from or about you. Other Information We Collect Charter also may collect other information about you, your device, or your use of the Services in ways that we describe to you at the point of collection, or otherwise, with your consent. You may choose not to provide us with certain types of information but doing so may affect your experience in using the Services. HOW CHARTER USES YOUR INFORMATION Charter uses your information to personalize and improve your experience using the Services in the ways described below, or in other ways at your direction or with your consent. To Provide the Services For example, to: Process and fulfill your transactions , including subscriptions or memberships, and enable you to login to the Services, Contact you and send you communications about the Services (including communications you request like newsletters) and share invitations to events or offers about Charter products or our third-party partners’ products Respond to you and your comments, inquiries, or requests; and transmit legal notices, policy updates, and other important information about the Services, Provide features of the Services (such as social sharing and comments) and to post content you submit, Provide customer support , administer loyalty programs, contests, promotions, or surveys, or Identify and repair errors that impair the function of the Services and to detect security incidents Protect the rights of Charter and others, detect, investigate, and prevent activities that may violate our policies or may be fraudulent, illegal; to protect, enforce, or defend the legal rights, privacy, safety, or property of Charter Works, its employees, agents, or users; or as required by law. Please note: all editorial and commercial email messages include instructions for unsubscribing from such future communications. To Deliver Personalized Content and Recommendations For example, to: Customize features of the Services, Deliver relevant content and to provide you with an enhanced experience based on your activities and interests Send you personalized newsletters , surveys, and information about products, services and promotions offered by us, our partners, and other organizations with which we work Facilitate the delivery of targeted advertising (including interest-based advertising), promotions, and offers, on behalf of ourselves and our third-party advertisers, both on our websites and elsewhere Customize content that our third-party partners deliver on the Services (e.g., personalized third-party advertising) based on your activity on the Services Create and update inferences and profiles about you that can be used for advertising and marketing on the Services, third party services and platforms, and mobile apps, or for analytics, Measure and report on the delivery of advertisements Please note: all editorial and commercial email messages include instructions for unsubscribing from such future communications. To enable us to provide these Services, we may use the information we collect to identify you across sessions, browsers, and/or devices. Please see Section Four of this Privacy Policy (THIRD PARTY COOKIES AND TRACKING TECHNOLOGIES ) for further information about our and third parties’ use of cookies and other tracking technologies and your choices related to targeted advertising. To Learn About Our Users and Improve Services We conduct analysis and research on our users’ demographics, interests, and behavior and perform statistical analysis of our users, their use of the Services, and their purchasing patterns. We do this to optimize and improve the Services, our products, and our operations. To Combine Information for All the Purposes Described Above We may use the information gathered from one aspect of the Services to enhance other aspects of Services and we may combine information gathered from multiple aspects of the Services into a single user record. We also may use or combine information that we collect offline or that we collect or receive from third-party sources for many reasons, including to enhance, expand, and check the accuracy of our records. Data collected from a particular computer, browser or device may be used with another computer, browser or device that is linked to the computer, browser, or device on which such data was collected. HOW CHARTER SHARES INFORMATION Charter’s information-sharing practices vary based on the type of information and the type of recipient. Aggregate Or De-Identified Information We may use and share deidentified information with third parties in any manner for any purposes. Subscription Providers If your subscription is provided in whole or in part by your employer or other third party, we may share with them information about your access and use of your subscription. If you have a subscription associated with a professor or school, we may notify your professor or school to confirm your subscription, access, or use. When providing information to a subscription provider, we may reveal limited amounts of your personal information such as your name or email address. Service Providers and Professional Advisors We share information with third party agents and vendors who perform functions on our behalf, including, but not limited to, web hosting, content syndication, content management, social media integration, marketing, analytics, product development, email or text message transmission, billing or payment processing, order fulfillment, auditing, and customer service. We also may disclose your personal information to professional advisors, such as lawyers, bankers, auditors, and insurers, where necessary in the course of the professional services that they render to us. Service providers and professional advisors with whom we share information will be obligated to maintain the confidentiality (as appropriate for the services) and security of personal information Charter transmits to them. Third Party Content and/or Advertising Partners Third parties that provide content, advertising, or functionality to the Services may collect or receive information about you and/or your use of the Services, using cookies, beacons, and similar technologies. Third party content and/or advertising partners may use such information to provide you with advertising that is based on your interests and to measure and analyze ad performance on our Services or other websites or platforms, and combine it with information collected across different websites, online services, and other devices. Please note: third parties’ use of your information will be based on their own privacy policies. Social Media Platforms and Services If you log in with or connect a social media service account to a Charter Works Service, certain information may be available to the social media platform, in which case the social media platform’s use of the shared information will be governed by the social media platform’s privacy policy and your privacy settings for that platform. If you do not want your personal information shared as described, please do not connect your social media platform account with your Charter Works account, and do not participate in social sharing on the Services. Providers of Co-Branded Services Charter may offer co-branded services or features, such as conferences, events, contests, sweepstakes, or other promotions together with a third party (“Co-Branded Services”). Co-Branded Services may be hosted by Charter Works or through the third party’s services. Charter may share the information you submit in connection with the Co-Branded Service with the applicable third party or the third party may receive certain information from you at the same time Charter does. Please note: a third party’s use of your information will be governed by the third party’s privacy policy. Other Users of The Services Any information (including your name, location, email address, profile information, and comments) you choose to submit through the use certain features of the Services that provide an opportunity to interact with Charter and other Charter users (e.g., community forums, Slack groups) may be publicly available. Charter is not responsible for any information you choose to submit and make public through these channels of communication. Business Transferees In the event of a corporate change in control (for instance, a sale or merger) or due diligence in contemplation thereof, Charter Works may transfer your personal information to the new party in control or the party acquiring assets. With Your Consent at Your Direction We may also share your information with your consent. The Services may link to third-party websites and services that are outside our control. We are not responsible for the security or privacy of any information collected by these third parties, which operate pursuant to their respective privacy policies. THIRD PARTY COOKIES AND TRACKING TECHNOLOGIES Cookies are small text files that are stored in your device’s browser when you visit a website that enable the business that places the cookie business to recognize a user across one or more browsing sessions, and across one or more websites. When you use the Services, we and our third-party partners use cookies, pixel tags, device IDs and other similar technologies (collectively, “Cookies”) to collect information from your browser or device for the purposes of information storage and access; personalization of the Services; measurement of and analytics regarding the use of the Services; content selection, delivery, and reporting; and advertising selection, targeting, delivery, and reporting. By using the Services, you consent to our use of cookies and similar technologies. The following types of Cookies are used in the Services: Essential Cookies Essential Cookies enable you to browse our Services and use certain features. Disabling Essential Cookies may prevent you from using certain parts of the Services. These cookies also help keep our Services safe and secure. Preference Cookies Preference Cookies store information such as your login data, if applicable, and website preferences. Disabling Preference Cookies may hinder our ability to remember certain choices you’ve previously made or personalize your browsing experience by providing you with relevant information. Preference cookies can also be used to recognize your device so that you do not have to provide the same information more than once. Performance Cookies Performance Cookies collect information about how you use the Services such as which pages you visit regularly. Performance cookies are used to provide you with a high-quality experience by doing things such as tracking page load, site response times, and error messages. Content and Advertising Cookies Content and Advertising Cookies gather information about your use of our services so we provide you with more relevant content and advertising on the Services and elsewhere online and across your devices. Content and Advertising Cookies are also used to gather feedback on customer satisfaction through surveys. They remember that you’ve visited the Services and help Chart understand usage of the Services. Some Content and Advertising cookies are from third parties that collect information about your use of our Services to provide advertising (on our Services and elsewhere, across your different devices) based on your online activities (so-called “interest-based advertising”). Charter may not have access to these cookies, although we may use statistical information arising from the cookies provided by these third parties to customize content and for the other purposes described above. Please note: Charter does not control the privacy practices of these third parties, and their practices are not covered by this Privacy Policy. YOUR CHOICES There are several ways to minimize tracking of your online activity by third parties, some of which we have summarized below. We hope you find this information to be a helpful reference. Please note: using these tools to opt out of tracking and targeting does not mean that you will not receive advertising while using our Services or on other websites. Controls for Cookies and Online Tracking Choices Since many of these opt-out tools are specific to a device or browser, you will need to opt out on every browser and device that you use. Blocking Cookies in Your Browser . Most browsers let you remove or reject cookies, including cookies used for interest-based advertising. To do this, follow the instructions in your browser settings. Many browsers accept cookies by default until you change your settings. If you wish to opt-out of Google Analytics’ tracking, use this browser add-on provided by Google . Blocking advertising ID use in your mobile settings. Your mobile device settings may provide functionality to limit use of the advertising ID associated with your mobile device for interest-based advertising purposes. For more information about how to change these settings for Apple, Android or Windows devices, see: Apple: http://support.apple.com/kb/HT4228 Android: http://www.google.com/policies/technologies/ads/ Windows: http://choice.microsoft.com/en-US/opt-out Using privacy plug-ins or browsers . You also may use a browser with privacy features, like Brave, or install browser plugins like Privacy Badger , Ghostery or uBlock Origin . These may offer tools to block or limit third-party cookies/trackers. Platform opt-outs. The following advertising platforms offer opt-out features that let you opt-out of certain uses of your information for interest-based advertising: Google and Facebook Advertising industry opt-out tools. You can use these opt-out options to limit use of your interest-based advertising by participating companies: Digital Advertising Alliance and Network Advertising Initiative . Please note: opting-out of advertising networks’ tracking and targeting does not mean that you will not receive advertising while using our Services or on other websites, nor will it prevent the receipt of interest-based advertising from third parties that do not participate in these programs. It will exclude you, however, from interest-based advertising conducted through participating networks, as provided by their policies and choice mechanisms. Accessing Your Information You can request to access, review, correct, update, delete or modify your registration or subscription profile information (if Charter maintains such information) and modify your marketing preferences (where applicable) by contacting privacy@charterworks.com. Please note: if you have subscribed or registered for multiple of our Services or subscriptions, you may need to update your information for each account separately. Emails, Newsletters, and Text Messages You may always opt-out of receiving future e-mail marketing messages and newsletters from Charter Works by following the instructions contained within the emails and newsletters, or by e-mailing us at privacy@charterworks.com. You may opt out of receiving promotions or advertising via Text Message at any time, by replying “STOP” to one of our Text Messages. Responding To Requests For your protection, we may only implement requests with respect to the personal information associated with the email address that you use to send us your request and/or on the basis of other information we use to verify you before implementing your request. Please note: we may need to retain certain information for record-keeping purposes and/or to complete any transactions you began prior to requesting such change or deletion (e.g., when you make a purchase or enter a promotion, you may not be able to change or delete the personal information provided until after the completion or cancelation of such purchase or promotion). FOR READERS OUTSIDE THE US Charter Works is a US-based news organization, so we apply US law to our privacy practices. This means that wherever you are in the world, this Privacy Policy will apply to the information you provide to Charter or we collect when you use the Services. OTHER INFORMATION Security We take reasonable security measures to protect your information, including the use of physical, technical, and administrative controls. Please understand, however, that while we try our best to safeguard your personal information once we receive it, no transmission of data over the Internet or any other public network can be guaranteed to be 100% secure. You need to help protect the privacy of your own information. You must take precautions to protect the security of any personal information that you may transmit over any home networks, wireless routers, wireless (WiFi) networks or similar devices by using encryption and other techniques to prevent unauthorized persons from intercepting or receiving any of your personal information. You are responsible for the security of your information when using unencrypted, open access, or otherwise unsecured networks. Storage The period for which we keep information varies according to the purpose for which it is used. In some cases, there are legal requirements to keep data for a minimum period. We will retain your Personal Data for the period necessary to fulfill the purposes outlined in this Privacy Policy unless a longer retention period is required or allowed by law. Children’s Information The Services are not intended for children under 13 years of age. Charter Works does not knowingly collect personal information from children under 13 years of age. If Charter Works discovers that a child under the age of 13 has provided Charter Works with personal information and we do not have parental consent, Charter Works will delete that child’s information. If you believe that company has been provided with the personal information of a child under the age of 13 without parental consent, please notify us immediately at privacy@charterworks.com Questions If you have questions about our Privacy Policy, please contact us at privacy@charterworks.com Insights Books Interviews Charter on TIME Research Connect Events Topics Artificial Intelligence Hybrid Work DEI Leadership Charter Pro Become a Member Support Sign In Search Contact Partnerships General Inquiries Company About Careers Press Newsletters Charter Briefing Charter Works Inc. © 2025 Privacy Terms of Service | 2026-01-13T09:30:39 |
https://shanghai.dacheng.com/News_2/703.html | 大成律师担任预重整临时管理人、破产管理人的威某汽车科技集团有限公司等四家关联企业申请破产重整案入选最高院入库参考案例-北京大成(上海)律师事务所 --> 首页 关于我们 关于我们 获奖案例 新闻资讯 大成资讯 大成业绩 大成活动 大成荣誉 业务领域 专业分类 行业覆盖 寻找律师 大成研究 实践指南 政策解析 专业通讯 新法速递 案例评析 时事评论 党群文化 党建 群团 人物 工作机会 EN 新闻资讯 新闻资讯 大成资讯 大成业绩 大成活动 大成荣誉 大成律师担任预重整临时管理人、破产管理人的威某汽车科技集团有限公司等四家关联企业申请破产重整案入选最高院入库参考案例 发布日期:2025-10-30 大成律师作为威某汽车科技集团有限公司等四家关联企业的预重整临时管理人、破产管理人,由上海办公室陈峰律师团队、路少红律师团队担任预重整临时管理人和破产管理人成员,路少红律师担任联合管理人负责人,该案近期成功入选最高院入库参考案例并被全文刊登在2025年10月30日的《人民法院报》第8版和最高人民法院微信公众号。威某汽车重整案是我国“新势力车企”重整第一案,具有行业标杆性和引导性意义。威某汽车是我国最早的一批新势力造车企业,曾与蔚来、理想、小鹏一起被称为“造车新势力四小龙”,作为曾经领先的新能源汽车产品及出行方案提供商,曾经多次蝉联新势力造车品牌销冠,威某汽车主要量产并对外销售了E5、EX5、W6三款车型,累计销售约12万辆,涉及约12万车主、1000余名员工、300余家供应商、100余家经销商。在威某汽车陷入危机后,在上海温州两地政府专班的大力支持和上海三中院的积极指导下,大成律师作为管理人积极履职,最终促使重整计划获得债权人的高票通过,复工复产和重整计划执行工作正在有序顺利开展过程中。 一、基本情况 入库编号:2025-08-2-422-002入库参考案例特点:新能源车企重整程序中对车主权益的保障关键词:民事 申请破产重整 新能源车企 实质合并重整 车主权益保障 二、基本案情 威某汽车科技集团有限公司(以下简称威某汽车集团)成立于2012年5月,注册资本人民币60亿元(币种下同),曾经是获得工信部许可具备整车生产资质的国内新能源造车新势力头部企业之一,在浙江温州和湖北黄冈拥有两处整车生产基地,已对外销售新能源汽车12万辆。威某汽车集团与腾某云等三家互联网运营服务商签订服务协议,为车主提供网络信息数据专项车联网服务。后威某汽车集团因资金链断裂陷入经营困境,于2022年底停业停产。 2023年10月,上海市第三中级人民法院裁定受理威某汽车集团的预重整申请。经债务人推荐,法院指定某律师事务所担任临时管理人。预重整期间,法院指导临时管理人依法保护广大车主权益,重点保障车联网服务不中断,并保障必要售后网点正常运营。临时管理人协调威某汽车集团确定留守人员65名,以维持售后、车联网、财务及工厂最基本的运转,安排专人全天候接听并回复车主售后来电。同年12月29日,法院裁定受理威某汽车集团重整申请,并随机摇号产生某会计师事务所,与临时管理人组成联合管理人。联合管理人接受指定后,与腾某云等车联网运营服务商洽谈续签服务协议,并在当地政府支持下协调某企业垫付车联网服务费,保障车联网服务正常进行。2024年1月15日,联合管理人发布共益债投资招募公告和重整投资招募公告。经多轮接洽,最终成功招募到投资人。联合管理人与投资人签订《共益债借款协议》,约定投资人自2025年1月起按照每月258万元垫付车联网服务费,并在破产程序中依法认定为共益债。 2024年3月29日,本案举行第一次债权人会议。同年6月28日,经债务人申请,法院裁定将重整计划草案提交期限延长至9月28日。9月27日,联合管理人申请将威某智慧出行科技(上海)股份有限公司、苏州威某智慧出行科技有限公司、威某汽车制造温州有限公司纳入本案实质合并重整,并提交重整计划草案。经听证,法院于2024年12月10日裁定对上述三家关联企业与威某汽车集团进行实质合并重整。 2025年1月21日,本案召开实质合并重整后的债权人会议,审议重整计划草案并进行表决,各表决组均表决通过。其中担保债权组5户,同意户数占比60%,同意债权金额占该组债权总额的68.55%;普通债权组501户,同意户数占比74.85%,同意债权金额占该组债权总额的83.48%;出资人组12户,同意股权占比76.29%。重整计划明确将某企业及投资人前期垫付的车联网服务费合计3424万元确定为共益债,在重整计划裁定批准后12个月内予以全额现金清偿。同年4月3日,法院裁定批准重整计划并终止实质合并重整程序。此后,投资人复工复产团队全面接管威某汽车集团各项日常经营,从研产供销全链条构建信息化保障体系。一是将原车主的账户数据、车辆绑定信息迁移至新系统,确保APP功能无缝衔接,同时提供离线应急方案;二是对停产车型的关键部件实施定向补货,保障易损件的维修需求;三是研发系统软件持续更新,为原车型提供系统升级服务,保障车机功能、智能驾驶辅助系统的稳定性。 三、裁判理由 威某汽车集团经预重整清产核资,在品牌、生产资质、市场运营及产业链等方面具备较大的重整价值。因威某汽车集团及其关联企业成员之间存在法人人格高度混同、区分各关联企业成员财产成本过高、不实质合并将严重损害全体债权人公平清偿利益的情形,应依法适用实质合并重整程序。本案的焦点问题为如何在新能源车企重整程序中保障车主权益,具体包括如下两个方面: 1.关于维修保养义务的履行。威某汽车集团及其关联企业作为新能源汽车的生产商和销售商,无论依照《中华人民共和国民法典》《中华人民共和国消费者权益保护法》《中华人民共和国产品质量法》的相关规定,还是按照其与广大车主签订的销售合同的约定,都应当对生产、销售的汽车提供维修、保养等售后服务,确保消费者在购车后能够安全使用汽车,且该维修保养义务应贯穿企业预重整、实质合并重整及重整计划执行的全过程。消费者因支付全部购车款而已履行完毕合同义务,故案涉汽车销售合同不属于《中华人民共和国企业破产法》第十八条规定的双方均未履行完毕的合同,管理人不享有挑拣履行权。因此,管理人应当积极履职,协助威某汽车集团及其关联企业制定并执行预重整、实质合并重整及重整后的售后服务方案,全方位保障车主合法权益。 2.关于车联网费用作为共益债的认定。共益债是破产程序中为维护全体债权人共同利益,保障债务人持续运营或资产增值而产生的债务。案涉新能源车联网服务关乎机动车行驶安全和汽车行业对车控数据交互的监管要求,尽管威某汽车集团及其关联企业陷入经营困境,但确保车机联网服务不中断既是维护广大车主正当用车权益的需要,也是维护车企品牌价值和债务人持续营业能力的关键。因企业自身资金枯竭,管理人充分运用共益债法定优先性吸引新资金,通过先协调某企业垫付车联网费用,后在重整程序中招募共益债投资人提供借款支付车联网费用的方式,摆脱车联网断网风险,有利于盘活债务人资产,推动重整成功。重整计划依法作为共益债优先清偿,符合企业破产法第四十二条及其司法解释的规定。 充分考虑上述因素后形成的《重整计划草案》,依照企业破产法有关审议表决程序提交表决。按照表决规则,各债权人组和出资人组均表决通过。威某汽车集团及其关联企业严重资不抵债,重整计划将原出资人股权全部让渡给重整投资人,对出资人的权益调整公平、公正。债权清偿方案亦符合企业破产法第一百一十三条法定顺位分配规则,重整计划复工复产及后续经营方案具有一定可行性,人民法院依法予以批准。 四、裁判要旨 1.在新能源车企破产重整程序中,应当将支持履行维修保养义务作为保护车主权益的重要方面,依法构建从预重整、实质合并重整到复工复产的全链条、全过程保障机制,确保新能源汽车售后、车联网等服务保障措施的可行性与持续性。 2.新能源车企破产重整程序中,与车主权益相关的必要支出,如为维持车联网服务、保障售后运营等产生的垫付费用,因直接服务于推进企业重整程序和保护车主核心权益,属于为全体债权人共同利益而发生的债务,符合企业破产法有关共益债务的规定,应当纳入共益债范围予以优先清偿。 五、关联索引 《中华人民共和国企业破产法》第42条第4项、第86条、第113条 《最高人民法院关于适用〈中华人民共和国企业破产法〉若干问题的规定(三)》(法释〔2019〕3号,2020年修正)第2条第1款 其他程序:上海市第三中级人民法院(2023)沪03破1041号民事裁定(2023年12月29日) 其他程序:上海市第三中级人民法院(2023)沪03破1041号之六民事裁定(2024年12月10日) 其他程序:上海市第三中级人民法院(2023)沪03破1041号之九民事裁定(2025年4月3日) 上一篇: 大成律师助力浦东创投完成对骄英医疗A+轮投资 返回列表 下一篇: 大成助力汉星管理收购千一智能控制权 相关律师 +86 21-5878-5888 关于我们 新闻资讯 业务领域 寻找律师 大成研究 诚挚感谢为大成上海官网提供照片的同仁们! Copyright © 2024大成版权所有 保留所有权利 All Rights Reserved 2024 京ICP备18048582号-2 京公网安备:11010502053550号 Beijing Dacheng Law Offices, LLP (“大成”) is an independent law firm, and not a member or affiliate of Dentons. 大成 is a partnership law firm organized under the laws of the People's Republic of China, and is Dentons' Preferred Law Firm in China, with offices in more than 50 locations throughout China. Dentons Group (a Swiss Verein) (“Dentons”) is a separate international law firm with members and affiliates in more than 160 locations around the world, including Hong Kong SAR, China. For more information, please see dacheng.com/legal-notices or dentons.com/legal-notices. | 2026-01-13T09:30:39 |
http://www.php.net/mcrypt_encrypt | PHP: mcrypt_encrypt - Manual update page now Downloads Documentation Get Involved Help Search docs Getting Started Introduction A simple tutorial Language Reference Basic syntax Types Variables Constants Expressions Operators Control Structures Functions Classes and Objects Namespaces Enumerations Errors Exceptions Fibers Generators Attributes References Explained Predefined Variables Predefined Exceptions Predefined Interfaces and Classes Predefined Attributes Context options and parameters Supported Protocols and Wrappers Security Introduction General considerations Installed as CGI binary Installed as an Apache module Session Security Filesystem Security Database Security Error Reporting User Submitted Data Hiding PHP Keeping Current Features HTTP authentication with PHP Cookies Sessions Handling file uploads Using remote files Connection handling Persistent Database Connections Command line usage Garbage Collection DTrace Dynamic Tracing Function Reference Affecting PHP's Behaviour Audio Formats Manipulation Authentication Services Command Line Specific Extensions Compression and Archive Extensions Cryptography Extensions Database Extensions Date and Time Related Extensions File System Related Extensions Human Language and Character Encoding Support Image Processing and Generation Mail Related Extensions Mathematical Extensions Non-Text MIME Output Process Control Extensions Other Basic Extensions Other Services Search Engine Extensions Server Specific Extensions Session Extensions Text Processing Variable and Type Related Extensions Web Services Windows Only Extensions XML Manipulation GUI Extensions Keyboard Shortcuts ? This help j Next menu item k Previous menu item g p Previous man page g n Next man page G Scroll to bottom g g Scroll to top g h Goto homepage g s Goto search (current page) / Focus search box mcrypt_generic » « mcrypt_enc_self_test PHP Manual Function Reference Cryptography Extensions Mcrypt Mcrypt Functions Change language: English German Spanish French Italian Japanese Brazilian Portuguese Russian Turkish Ukrainian Chinese (Simplified) Other mcrypt_encrypt (PHP 4 >= 4.0.2, PHP 5, PHP 7 < 7.2.0, PECL mcrypt >= 1.0.0) mcrypt_encrypt — Encrypts plaintext with given parameters Warning This function has been DEPRECATED as of PHP 7.1.0 and REMOVED as of PHP 7.2.0. Relying on this function is highly discouraged. Description mcrypt_encrypt ( string $cipher , string $key , string $data , string $mode , string $iv = ? ): string | false Encrypts the data and returns it. Parameters cipher One of the MCRYPT_ciphername constants, or the name of the algorithm as string. key The key with which the data will be encrypted. If the provided key size is not supported by the cipher, the function will emit a warning and return false data The data that will be encrypted with the given cipher and mode . If the size of the data is not n * blocksize, the data will be padded with ' \0 '. The returned crypttext can be larger than the size of the data that was given by data . mode One of the MCRYPT_MODE_modename constants, or one of the following strings: "ecb", "cbc", "cfb", "ofb", "nofb" or "stream". iv Used for the initialization in CBC, CFB, OFB modes, and in some algorithms in STREAM mode. If the provided IV size is not supported by the chaining mode or no IV was provided, but the chaining mode requires one, the function will emit a warning and return false . Return Values Returns the encrypted data as a string or false on failure. Examples Example #1 mcrypt_encrypt() Example <?php # --- ENCRYPTION --- # the key should be random binary, use scrypt, bcrypt or PBKDF2 to # convert a string into a key # key is specified using hexadecimal $key = pack ( 'H*' , "bcb04b7e103a0cd8b54763051cef08bc55abe029fdebae5e1d417e2ffb2a00a3" ); # show key size use either 16, 24 or 32 byte keys for AES-128, 192 # and 256 respectively $key_size = strlen ( $key ); echo "Key size: " . $key_size . "\n" ; $plaintext = "This string was AES-256 / CBC / ZeroBytePadding encrypted." ; # create a random IV to use with CBC encoding $iv_size = mcrypt_get_iv_size ( MCRYPT_RIJNDAEL_128 , MCRYPT_MODE_CBC ); $iv = mcrypt_create_iv ( $iv_size , MCRYPT_RAND ); # creates a cipher text compatible with AES (Rijndael block size = 128) # to keep the text confidential # only suitable for encoded input that never ends with value 00h # (because of default zero padding) $ciphertext = mcrypt_encrypt ( MCRYPT_RIJNDAEL_128 , $key , $plaintext , MCRYPT_MODE_CBC , $iv ); # prepend the IV for it to be available for decryption $ciphertext = $iv . $ciphertext ; # encode the resulting cipher text so it can be represented by a string $ciphertext_base64 = base64_encode ( $ciphertext ); echo $ciphertext_base64 . "\n" ; # === WARNING === # Resulting cipher text has no integrity or authenticity added # and is not protected against padding oracle attacks. # --- DECRYPTION --- $ciphertext_dec = base64_decode ( $ciphertext_base64 ); # retrieves the IV, iv_size should be created using mcrypt_get_iv_size() $iv_dec = substr ( $ciphertext_dec , 0 , $iv_size ); # retrieves the cipher text (everything except the $iv_size in the front) $ciphertext_dec = substr ( $ciphertext_dec , $iv_size ); # may remove 00h valued characters from end of plain text $plaintext_dec = mcrypt_decrypt ( MCRYPT_RIJNDAEL_128 , $key , $ciphertext_dec , MCRYPT_MODE_CBC , $iv_dec ); echo $plaintext_dec . "\n" ; ?> The above example will output: Key size: 32 ENJW8mS2KaJoNB5E5CoSAAu0xARgsR1bdzFWpEn+poYw45q+73az5kYi4j+0haevext1dGrcW8Qi59txfCBV8BBj3bzRP3dFCp3CPQSJ8eU= This string was AES-256 / CBC / ZeroBytePadding encrypted. See Also mcrypt_decrypt() - Decrypts crypttext with given parameters mcrypt_module_open() - Opens the module of the algorithm and the mode to be used Found A Problem? Learn How To Improve This Page • Submit a Pull Request • Report a Bug + add a note User Contributed Notes 2 notes up down 61 scott at paragonie dot com ¶ 10 years ago If you're writing code to encrypt/encrypt data in 2015, you should use openssl_encrypt() and openssl_decrypt(). The underlying library (libmcrypt) has been abandoned since 2007, and performs far worse than OpenSSL (which leverages AES-NI on modern processors and is cache-timing safe). Also, MCRYPT_RIJNDAEL_256 is not AES-256, it's a different variant of the Rijndael block cipher. If you want AES-256 in mcrypt, you have to use MCRYPT_RIJNDAEL_128 with a 32-byte key. OpenSSL makes it more obvious which mode you are using (i.e. 'aes-128-cbc' vs 'aes-256-ctr'). OpenSSL also uses PKCS7 padding with CBC mode rather than mcrypt's NULL byte padding. Thus, mcrypt is more likely to make your code vulnerable to padding oracle attacks than OpenSSL. Finally, if you are not authenticating your ciphertexts (Encrypt Then MAC), you're doing it wrong. Further reading: https://paragonie.com/blog/2015/05/using-encryption-and-authentication-correctly https://paragonie.com/blog/2015/05/if-you-re-typing-word-mcrypt-into-your-code-you-re-doing-it-wrong up down 25 jesse at pctest dot com ¶ 21 years ago Solving 3DES incompatibilities with .NET's TripleDESCryptoServiceProvider mcrypt's 3DES only accepts 192 bit keys, but Microsoft's .NET and many other tools accept both 128 and 192 bit keys. If your key is too short, mcrypt will 'helpfully' pad null characters onto the end, but .NET refuses to use a key where the last third is all null (this is a Bad Key). This prevents you from emulating mcrypt's "short key" behaviour in .NET. How to reconcile this? A little DES theory is in order 3DES runs the DES algorithm three times, using each third of your 192 bit key as the 64 bit DES key Encrypt Key1 -> Decrypt Key2 -> Encrypt Key3 and both .NET and PHP's mcrypt do this the same way. The problem arises in short key mode on .NET, since 128 bits is only two 64 bit DES keys The algorithm that they use then is: Encrypt Key1 -> Decrypt Key2 -> Encrypt Key1 mcrypt does not have this mode of operation natively. but before you go and start running DES three times yourself, here's a Quick Fix <?php $my_key = "12345678abcdefgh" ; // a 128 bit (16 byte) key $my_key .= substr ( $my_key , 0 , 8 ); // append the first 8 bytes onto the end $secret = mcrypt_encrypt ( MCRYPT_3DES , $my_key , $data , MCRYPT_MODE_CBC , $iv ); //CBC is the default mode in .NET ?> And, like magic, it works. There's one more caveat: Data padding mcrypt always pads data will the null character but .NET has two padding modes: "Zeros" and "PKCS7" Zeros is identical to the mcrypt scheme, but PKCS7 is the default. PKCS7 isn't much more complex, though: instead of nulls, it appends the total number of padding bytes (which means, for 3DES, it can be a value from 0x01 to 0x07) if your plaintext is "ABC", it will be padded into: 0x41 0x42 0x43 0x05 0x05 0x05 0x05 0x05 You can remove these from a decrypted string in PHP by counting the number of times that last character appears, and if it matches it's ordinal value, truncating the string by that many characters: <?php $block = mcrypt_get_block_size ( 'tripledes' , 'cbc' ); $packing = ord ( $text { strlen ( $text ) - 1 }); if( $packing and ( $packing < $block )){ for( $P = strlen ( $text ) - 1 ; $P >= strlen ( $text ) - $packing ; $P --){ if( ord ( $text { $P }) != $packing ){ $packing = 0 ; } } } $text = substr ( $text , 0 , strlen ( $text ) - $packing ); ?> And to pad a string that you intend to decrypt with .NET, just add the chr() value of the number of padding bytes: <?php $block = mcrypt_get_block_size ( 'tripledes' , 'cbc' ); $len = strlen ( $dat ); $padding = $block - ( $len % $block ); $dat .= str_repeat ( chr ( $padding ), $padding ); ?> That's all there is to it. Knowing this, you can encrypt, decrypt, and duplicate exactly any .NET 3DES behaviour in PHP. + add a note Mcrypt Functions mcrypt_​create_​iv mcrypt_​decrypt mcrypt_​enc_​get_​algorithms_​name mcrypt_​enc_​get_​block_​size mcrypt_​enc_​get_​iv_​size mcrypt_​enc_​get_​key_​size mcrypt_​enc_​get_​modes_​name mcrypt_​enc_​get_​supported_​key_​sizes mcrypt_​enc_​is_​block_​algorithm mcrypt_​enc_​is_​block_​algorithm_​mode mcrypt_​enc_​is_​block_​mode mcrypt_​enc_​self_​test mcrypt_​encrypt mcrypt_​generic mcrypt_​generic_​deinit mcrypt_​generic_​init mcrypt_​get_​block_​size mcrypt_​get_​cipher_​name mcrypt_​get_​iv_​size mcrypt_​get_​key_​size mcrypt_​list_​algorithms mcrypt_​list_​modes mcrypt_​module_​close mcrypt_​module_​get_​algo_​block_​size mcrypt_​module_​get_​algo_​key_​size mcrypt_​module_​get_​supported_​key_​sizes mcrypt_​module_​is_​block_​algorithm mcrypt_​module_​is_​block_​algorithm_​mode mcrypt_​module_​is_​block_​mode mcrypt_​module_​open mcrypt_​module_​self_​test mdecrypt_​generic Copyright © 2001-2026 The PHP Documentation Group My PHP.net Contact Other PHP.net sites Privacy policy ↑ and ↓ to navigate • Enter to select • Esc to close • / to open Press Enter without selection to search using Google | 2026-01-13T09:30:39 |
https://www.timeforkids.com/k1/topics/people/ | TIME for Kids | People | Topic | K-1 Skip to main content Search Articles by Grade level Grades K-1 Articles Grade 2 Articles Grades 3-4 Articles Grades 5-6 Articles Topics Animals Arts Ask Angela Books Business Careers Community Culture Debate Earth Science Education Election 2024 Engineering Environment Food and Nutrition Games Government History Holidays Inventions Movies and Television Music and Theater Nature News People Places Podcasts Science Service Stars Space Sports The Human Body The View Transportation Weather World Young Game Changers Your $ Financial Literacy Content Grade 4 Edition Grade 5-6 Edition For Grown-ups Resource Spotlight Also from TIME for Kids: Log In role: none user_age: none editions: The page you are about to enter is for grown-ups. Enter your birth date to continue. Month (MM) 01 02 03 04 05 06 07 08 09 10 11 12 Year (YYYY) 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949 1950 1951 1952 1953 1954 1955 1956 1957 1958 1959 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025 2026 Submit People Community Senses Connect Us September 26, 2025 Our senses help us connect with others. Use them to show friends you care. You can use your ears to listen. You can use your arms to hug. There are lots of ways! Which will you try first? High Five!… Audio Spanish Community Be a Good Listener September 26, 2025 Friends share stories. They say how they are feeling. Good friends listen carefully. You listen with your ears. But how do you pay attention? People may listen in different ways. Here are some tips. Tune in. Listen your friend’s… Audio Science A Dino-Mite Job March 28, 2024 Myria Perez is a paleontologist. She works at the Smithsonian National Museum of Natural History. It is in Washington, D.C. Perez told TIME for Kids about her job. 1. What do you love most about your work? I like that… Audio Technology Machine Learning March 6, 2024 Missy Cummings was one of the Navy’s first female fighter pilots. She did it from 1988 to 1999. “I knew many people who died in aircraft accidents,” she told TIME for Kids. “Always because of poor human-technology interaction.” … Audio Business In the News September 29, 2023 Reporters keep people informed. They gather facts. They write news stories. They help us understand what is going on in the world. Here is how reporters do their job. Reporters do research. Reporters read the latest news. That helps… Audio Spanish Science Types of Scientists September 22, 2023 There are many kinds of scientists. Each is an expert in a type of science. Some study animals. Others study the Earth or space. Read about four scientists. Planetary Scientist Jennifer Heldmann studies planets. She is looking for water… Audio Spanish Arts The Sound of Music September 8, 2023 Meet Gustavo Dudamel. He loves music. He is the leader of an orchestra. Learn about his work. Follow My Lead Gustavo Dudamel is a conductor. That is a person who leads an orchestra. Friendly Faces Dudamel is also a… Audio Spanish Environment For the Planet March 10, 2023 From an early age, Jane Goodall has worked with wildlife. She cares about protecting the environment. She hopes to inspire young people to do the same. Goodall loves animals. She has studied chimpanzees and their habitat. She learned that… Audio Spanish Arts Sharing Stories March 3, 2023 Writers work on more than books. They help create stories all around us. Here are three professional writers and their jobs. On the Screen (Above) Taneka Stotts loved cartoons as a kid. Now she is a screenwriter. She writes scripts… Audio Community Jobs at School August 19, 2022 A school has lots of people working in it. Each person has an important job. Read about some of these jobs below. Getting Kids to School Safely Crossing guards guide students across the street. Bus drivers take students to school.… Audio Spanish Posts pagination 1 2 3 4 Next Contact us Privacy policy California privacy Terms of Service Subscribe CLASSROOM INTERNATIONAL © 2026 TIME USA, LLC. All Rights Reserved. Powered by WordPress.com VIP | 2026-01-13T09:30:39 |
https://www.php.net/manual/ru/function.tidy-get-output.php | PHP: tidy_get_output - Manual update page now Downloads Documentation Get Involved Help Search docs Getting Started Introduction A simple tutorial Language Reference Basic syntax Types Variables Constants Expressions Operators Control Structures Functions Classes and Objects Namespaces Enumerations Errors Exceptions Fibers Generators Attributes References Explained Predefined Variables Predefined Exceptions Predefined Interfaces and Classes Predefined Attributes Context options and parameters Supported Protocols and Wrappers Security Introduction General considerations Installed as CGI binary Installed as an Apache module Session Security Filesystem Security Database Security Error Reporting User Submitted Data Hiding PHP Keeping Current Features HTTP authentication with PHP Cookies Sessions Handling file uploads Using remote files Connection handling Persistent Database Connections Command line usage Garbage Collection DTrace Dynamic Tracing Function Reference Affecting PHP's Behaviour Audio Formats Manipulation Authentication Services Command Line Specific Extensions Compression and Archive Extensions Cryptography Extensions Database Extensions Date and Time Related Extensions File System Related Extensions Human Language and Character Encoding Support Image Processing and Generation Mail Related Extensions Mathematical Extensions Non-Text MIME Output Process Control Extensions Other Basic Extensions Other Services Search Engine Extensions Server Specific Extensions Session Extensions Text Processing Variable and Type Related Extensions Web Services Windows Only Extensions XML Manipulation GUI Extensions Keyboard Shortcuts ? This help j Next menu item k Previous menu item g p Previous man page g n Next man page G Scroll to bottom g g Scroll to top g h Goto homepage g s Goto search (current page) / Focus search box tidy_warning_count » « tidy_error_count Руководство по PHP Справочник функций Другие базовые модули Tidy Tidy Язык: English German Spanish French Italian Japanese Brazilian Portuguese Russian Turkish Ukrainian Chinese (Simplified) Other tidy_get_output (PHP 5, PHP 7, PHP 8, PECL tidy >= 0.5.2) tidy_get_output — Возвращает строку, представляющую разобранную tidy-разметку Описание tidy_get_output ( tidy $tidy ): string Получить строку с восстановленным html. Список параметров tidy Объект Tidy . Возвращаемые значения Возвращает разобранную tidy-разметку. Примеры Пример #1 Пример использования tidy_get_output() <?php $html = '<p>параграф</i>' ; $tidy = tidy_parse_string ( $html ); $tidy -> cleanRepair (); echo tidy_get_output ( $tidy ); ?> Результат выполнения приведённого примера: <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 3.2//EN"> <html> <head> <title></title> </head> <body> <p>параграф</p> </body> </html> Нашли ошибку? Инструкция • Исправление • Сообщение об ошибке + Добавить Примечания пользователей 1 note up down 1 jon+php_net at phpsitesolutions dot com ¶ 17 years ago If you don't feel like going procedural to get the HTML output, you can simple use this alternative: <?php $html = <<<HTML <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" " http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd "> <html xmlns=" http://www.w3.org/1999/xhtml " xml:lang="en" lang="en"> <head><title>title</title></head> <body> <p>paragraph <br /> text</p> </body></html> HTML; $tidy = new tidy ; $tidy -> parseString ( $html ); $tidy -> cleanRepair (); echo $tidy -> html ()-> value ; ?> You can even more simply access the HTML output via this: <?php echo $tidy -> value ; ?> + Добавить Tidy ob_​tidyhandler tidy_​access_​count tidy_​config_​count tidy_​error_​count tidy_​get_​output tidy_​warning_​count Copyright © 2001-2026 The PHP Documentation Group My PHP.net Contact Other PHP.net sites Privacy policy ↑ and ↓ to navigate • Enter to select • Esc to close • / to open Press Enter without selection to search using Google | 2026-01-13T09:30:39 |
https://github.com/python/cpython/pull/7750 | [3.6] bpo-33859: Fix spelling mistakes in docs. (GH-7691). by tirkarthi · Pull Request #7750 · python/cpython · GitHub Skip to content Navigation Menu Toggle navigation Sign in Appearance settings Platform AI CODE CREATION GitHub Copilot Write better code with AI GitHub Spark Build and deploy intelligent apps GitHub Models Manage and compare prompts MCP Registry New Integrate external tools DEVELOPER WORKFLOWS Actions Automate any workflow Codespaces Instant dev environments Issues Plan and track work Code Review Manage code changes APPLICATION SECURITY GitHub Advanced Security Find and fix vulnerabilities Code security Secure your code as you build Secret protection Stop leaks before they start EXPLORE Why GitHub Documentation Blog Changelog Marketplace View all features Solutions BY COMPANY SIZE Enterprises Small and medium teams Startups Nonprofits BY USE CASE App Modernization DevSecOps DevOps CI/CD View all use cases BY INDUSTRY Healthcare Financial services Manufacturing Government View all industries View all solutions Resources EXPLORE BY TOPIC AI Software Development DevOps Security View all topics EXPLORE BY TYPE Customer stories Events & webinars Ebooks & reports Business insights GitHub Skills SUPPORT & SERVICES Documentation Customer support Community forum Trust center Partners Open Source COMMUNITY GitHub Sponsors Fund open source developers PROGRAMS Security Lab Maintainer Community Accelerator Archive Program REPOSITORIES Topics Trending Collections Enterprise ENTERPRISE SOLUTIONS Enterprise platform AI-powered developer platform AVAILABLE ADD-ONS GitHub Advanced Security Enterprise-grade security features Copilot for Business Enterprise-grade AI features Premium Support Enterprise-grade 24/7 support Pricing Search or jump to... Search code, repositories, users, issues, pull requests... --> Search Clear Search syntax tips Provide feedback --> We read every piece of feedback, and take your input very seriously. Include my email address so I can be contacted Cancel Submit feedback Saved searches Use saved searches to filter your results more quickly --> Name Query To see all available qualifiers, see our documentation . Cancel Create saved search Sign in Sign up Appearance settings Resetting focus You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert {{ message }} python / cpython Public Uh oh! There was an error while loading. Please reload this page . Notifications You must be signed in to change notification settings Fork 33.9k Star 71k Code Issues 5k+ Pull requests 2.1k Actions Projects 31 Security Uh oh! There was an error while loading. Please reload this page . Insights Additional navigation options Code Issues Pull requests Actions Projects Security Insights [3.6] bpo-33859: Fix spelling mistakes in docs. (GH-7691). #7750 New issue Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community. Sign up for GitHub By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement . We’ll occasionally send you account related emails. Already on GitHub? Sign in to your account Jump to bottom Merged serhiy-storchaka merged 1 commit into python : 3.6 from tirkarthi : backport-c151f78-3.6 Jun 16, 2018 Merged [3.6] bpo-33859: Fix spelling mistakes in docs. (GH-7691). #7750 serhiy-storchaka merged 1 commit into python : 3.6 from tirkarthi : backport-c151f78-3.6 Jun 16, 2018 Conversation 0 Commits 1 Checks 0 Files changed Uh oh! There was an error while loading. Please reload this page . Conversation This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode characters Show hidden characters Copy link Member tirkarthi commented Jun 16, 2018 • edited by bedevere-bot Loading Uh oh! There was an error while loading. Please reload this page . (cherry picked from commit c151f78 ) Co-authored-by: Xtreak tirkarthi@users.noreply.github.com https://bugs.python.org/issue33859 --> Sorry, something went wrong. Uh oh! There was an error while loading. Please reload this page . --> All reactions [3.6] bpo-33859: Fix spelling mistakes in docs. ( pythonGH-7691 ). … 124114f (cherry picked from commit c151f78 ) Co-authored-by: Xtreak <tirkarthi@users.noreply.github.com> bedevere-bot added skip news docs Documentation in the Doc dir labels Jun 16, 2018 the-knights-who-say-ni added the CLA signed label Jun 16, 2018 bedevere-bot mentioned this pull request Jun 16, 2018 bpo-33859: Fix spelling mistakes in docs #7691 Merged bedevere-bot added the awaiting review label Jun 16, 2018 serhiy-storchaka approved these changes Jun 16, 2018 View reviewed changes bedevere-bot added awaiting merge and removed awaiting review labels Jun 16, 2018 serhiy-storchaka merged commit c5ff553 into python : 3.6 Jun 16, 2018 bedevere-bot removed the awaiting merge label Jun 16, 2018 --> Sign up for free to join this conversation on GitHub . Already have an account? Sign in to comment --> Reviewers serhiy-storchaka serhiy-storchaka approved these changes --> Assignees No one assigned Labels docs Documentation in the Doc dir skip news --> Projects None yet --> Milestone No milestone --> Development Successfully merging this pull request may close these issues. Uh oh! There was an error while loading. Please reload this page . 4 participants Add this suggestion to a batch that can be applied as a single commit. This suggestion is invalid because no changes were made to the code. Suggestions cannot be applied while the pull request is closed. Suggestions cannot be applied while viewing a subset of changes. Only one suggestion per line can be applied in a batch. Add this suggestion to a batch that can be applied as a single commit. Applying suggestions on deleted lines is not supported. You must change the existing code in this line in order to create a valid suggestion. Outdated suggestions cannot be applied. This suggestion has been applied or marked resolved. Suggestions cannot be applied from pending reviews. Suggestions cannot be applied on multi-line comments. Suggestions cannot be applied while the pull request is queued to merge. Suggestion cannot be applied right now. Please check back later. Footer © 2026 GitHub, Inc. Footer navigation Terms Privacy Security Status Community Docs Contact Manage cookies Do not share my personal information You can’t perform that action at this time. | 2026-01-13T09:30:39 |
https://aws.amazon.com/blogs/networking-and-content-delivery/drive-application-performance-with-application-load-balancer-target-optimizer/ | Drive application performance with Application Load Balancer Target Optimizer | Networking & Content Delivery Skip to Main Content Filter: All English Contact us AWS Marketplace Support My account Search Filter: All Sign in to console Create account AWS Blogs Home Blogs Editions Networking & Content Delivery Drive application performance with Application Load Balancer Target Optimizer by James Wenzel and Ashish Kumar on 20 NOV 2025 in Announcements , Elastic Load Balancing , Launch , Networking & Content Delivery , News Permalink Share AWS Application Load Balancer is an HTTP request load balancer designed to provide scalability through load distribution and high availability through target health detection and unhealthy target isolation. Today, we are excited to introduce ALB Target Optimizer, a powerful new feature through which ALB delivers optimal concurrency to each target. In this post, we will dive deep into how Target Optimizer works, discuss its benefits and walk through an example of how you can set it up. ALB distributes incoming requests among targets based on the configured load balancing algorithm, round robin by default. The number of concurrent requests delivered to each target can vary a lot based on the incoming client load, the amount of time it takes the backend application to process the request, the number of targets, and the load balancing algorithm. Many applications have difficulty processing too many concurrent requests. Some specialized applications, such as Large Language Models, often can only process 1 or 2 concurrent requests at a time. Traditional load balancing algorithms like round robin cannot ensure exactly 1 or 2 concurrent requests, affecting application performance for such specialized applications. Target Optimizer allows you to accurately control how many concurrent requests an application instance receives, enabling high-efficiency load balanced applications while still maintaining low latency and high availability. In the next section, we will look at the key benefits it provides. Key benefits Target Optimizer provides the following benefits: Limit concurrent requests: Target Optimizer lets you enforce a given maximum on the number of concurrent requests on a target. You can use this capability to fine-tune your application stack so that targets receive only the number of requests they can process. Optimize load balancing for low concurrency: You can use Target Optimizer for large applications and models that run at very low concurrency, where each application instance can only process a small number (e.g. 1-5) of requests at a time. With Target Optimizer, you can enforce as low as one concurrent request per target. This is perfect for applications that need strict control over concurrent requests. Reduce error-rate and latency: Without Target Optimizer, some targets could get excessive requests creating hot spots, while others could be underutilized. Hot-spotted targets get more requests than they have the capacity to process, causing clients to see errors and retry requests which adds latency. With Target Optimizer, ALB uniformly distributes the load. This eliminates errors caused by hot spots, therefore eliminating the need for client retries. Drive target utilization: With Target Optimizer, a target that completes a request immediately sends a signal indicating its readiness to ALB for the next request. This allows the targets to stay busy without becoming overloaded. Use heterogeneous targets: With Target Optimizer, you can register targets of different capacities with a target group. You can configure each target to receive requests proportional to its capacity. Prerequisites In this post, we assume that readers are familiar with the fundamentals of ALB, such as creating an ALB, creating listeners, adding rules and associating target groups. This is necessary to understand what Target Optimizer is and how it generally works. We also assume readers are familiar with running containers. This will be useful to understand the example we walk through. Introducing Target Optimizer Target optimizer augments ALB capabilities by addressing challenges that emerge with large applications or models that are compute-intensive and where an application instance can process only few requests concurrently. Inference workloads such as image generation models, large language models, etc. may run on expensive GPU hardware that can be easily impacted by small inefficiencies in load distribution. Let’s look at how ALB works and how these inefficiencies may emerge with commonplace load balancing algorithms like round robin, weighed round robin, and least outstanding requests (LoR). High-availability and redundancy are built into ALB by design. Under the hood, ALB consists of multiple independent nodes spread across multiple different AZs. Any node can answer an incoming request. Each ALB node makes independent routing decisions based on the load balancing algorithm chosen when the ALB was configured, and without regard to the target’s current capacity. This can lead to the below non-ideal situations for low concurrency workloads: A target can end up receiving more requests than it has capacity to process. This can lead to an increase in 5XX errors, in latency, and a negative impact on the target’s health if appropriate error handling is missing. Targets can become unevenly utilized when request processing times vary. For example, requests that need image generation may take longer to complete than requests that need a plain-text response. Under normal circumstances, there can be inconsistent performance which can lead to under-utilization on some targets and increased errors on others. Each ALB node is independent and has its own view of the load on a target. Since more than one node may be interacting with a single target, an ALB node is unaware of the total load on each target. This can lead to increased errors, especially when each target has capacity to process only a small number of requests at a time. Target Optimizer addresses these challenges by involving targets in load distribution. Rather than a ‘push’ model where the ALB forwards requests to targets based solely on the output of an algorithm, Target Optimizer enables a ‘pull’ model where targets ask the ALB to forward requests to them. You configure the maximum number of concurrent requests that a target can receive from the ALB. If a target has fewer requests than your configured maximum number, it lets the ALB know, and the ALB makes it eligible for processing another incoming request. The ALB forwards a request only when asked by a target. Since the target receives a request only when it can process it, the request has a much lower chance of being rejected or having to be retried by the client and a higher chance of being fulfilled. Also, since a target immediately asks the ALB for another request when one completes, Target Optimizer ensures utilization of the target fleet is high. In the next section, we will see how Target Optimizer works. Target Optimizer ALB agent Target Optimizer works with the help of an agent, provided by AWS, that runs on the target. You deploy the agent to run on the host of the application target, which then acts as a gatekeeper to your application. Using the agent, you can specify the maximum number of concurrent requests that you want the ALB to send to that application instance. The agent serves as a proxy between the ALB and the application. It establishes long-lived communication channels with the ALB nodes on which it sends metrics and other control data. The agent tracks the number of requests the target is processing. When the number of requests falls below the configured maximum number, the agent sends a signal to one of the ALB nodes asking for another request. Now that we understand how Target Optimizer works, we will give a high-level overview of how to set it up, followed by walking through a step-by-step example. Figure 1: The Target Optimizer agent is an inline proxy between the ALB and target application Setting up Target Optimizer Target Optimizer can be set up easily using three steps outlined below. We’ll cover the steps in more detail in an example later. For more information, refer to the ALB User Guide . Step 1: Install and configure the ALB agent on your targets: In this first step, you install the agent on the targets where your application resides. Since the agent serves as a proxy, you configure it by providing the port on which it will receive traffic from the ALB and the port which it will proxy traffic to. You also configure the maximum concurrent requests that you want the ALB to send to that application instance. If your application is running on Amazon Elastic Container Service and Amazon Elastic Kubernetes Service, you run the agent as a sidecar with your application container. Step 2: Create a target group with Target Optimizer enabled: You create a new target group and specify a ‘target control port’ for it. This is the port on which the agent exchanges control data with the ALB. You then register the targets created in Step 1 with this target group. Once registered, the ALB establishes control channels with the agents running on the targets. Step 3: Shift traffic to the new target group: Once your new ‘target-optimized’ target group is ready; you then modify the listener rules on your ALB to shift a portion of traffic to it. Now let’s demonstrate these steps in the section below. Setup Example These steps are for Linux-based machine. Step 1: Install and configure the Target Optimizer agent on your targets In this step, we will launch and configure EC2 instances that we will later add to our ‘target-optimized’ target group. 1.1 Create a new EC2 instance and install Docker on it: sudo yum install docker sudo service docker start 1.2 Pull the latest agent container: docker pull public.ecr.aws/aws-elb/target-optimizer/target-control-agent:latest 1.3 Run the agent container with the following variables: TARGET_CONTROL_DATA_ADDRESS: The agent will receive application traffic from the ALB on this socket (IP:port). The port in this socket is what you will configure for your target group. TARGET_CONTROL_CONTROL_ADDRESS: The ALB establishes control channels with agents on this socket for management traffic. The port in the socket is what you configure as the target control port for the target group in Step 2. TARGET_CONTROL_DESTINATION_ADDRESS: The agent will proxy traffic to this socket. Your target application should listen on this socket. TARGET_CONTROL_MAX_CONCURRENCY: The maximum number of concurrent requests that the target will receive from the ALB. It can be between 0-1000. The default is 1. docker run -d \ --name target-optimizer-agent \ --restart unless-stopped \ --network host \ -e TARGET_CONTROL_DATA_ADDRESS=0.0.0.0:80 \ -e TARGET_CONTROL_CONTROL_ADDRESS=0.0.0.0:3000 \ -e TARGET_CONTROL_DESTINATION_ADDRESS=127.0.0.1:8080 \ -e TARGET_CONTROL_MAX_CONCURRENCY=2 \ -p 3000:3000 \ -p 80:80 \ public.ecr.aws/aws-elb/target-optimizer/target-control-agent:latest In this example, the agent running on the target instance will receive application traffic from the ALB on port 80 and proxy it to port 8080 of the loopback interface where the application is listening. It will receive management traffic from the ALB on port 3000. There are four other variables you can configure. We will look at them in a later section. Step 2: Create a new target group: 2.1 In the AWS Management Console, navigate to EC2 > Target groups. Figure 2: Creating a target group from the AWS Management Console 2.2 Provide a name and the protocol for the target group. For port, specify the port you provided for TARGET_CONTROL_DATA_ADDRESS in Step 1. Figure 3: Specifying the name, protocol, and port for a target group in the AWS Management Console 2.3 For target control port, specify the port you provided for TARGET_CONTROL_CONTROL_ADDRESS in Step 1. Figure 4: Enabling Target Optimizer on a target group by specifying a target control port 2.4 Register the instances on which the agent is running as targets in the target group. The port value should be the same as the port value in TARGET_CONTROL_DATA_ADDRESS that you provided in Step 1. Figure 5: Registering targets with the target group (Optional) Step 3: Verify your agent installation: This is a validation step for the ‘target-optimized’ target group that you’ve just created. We will verify that agents are properly set up and are proxying traffic correctly before we move production traffic to the target group. For this, we will run a default nginx server on targets in our target group. Next, we will create a test listener on the ALB that forwards traffic to the agent, which should proxy it to the Nginx server. Once we verify this setup, we will replace the Nginx container with the actual application. 3.1 On your target instances, install and run nginx on port 8080. From a shell, run: Install Nginx sudo yum install nginx -y Modify the default Nginx config to listen on 8080 sudo sed -i 's/listen\s*80;/listen 8080;/' /etc/nginx/nginx.conf Start nginx sudo systemctl start nginx Verify it’s listening on 8080 curl localhost:8080 3.2 Navigate to EC2 > Load balancers in the Management Console. Select your ALB. Note the ALB DNS name and click on Add listener. Figure 6: Adding a listener to an ALB from the AWS Management Console 3.2 Select a port (e.g. 81) for your test listener and the ‘target-optimized’ target group you created in Step 2. Figure 7: Configuring an ALB listener from the AWS Management Console 3.3 Verify that nginx is responding. From a shell on a client instance, run: curl http://<ALB DNS name>:81 It should return: HTTP/1.1 200 OK Welcome to nginx! 3.4 Now that you have verified that the agent is correctly proxying traffic to port 8080, stop the nginx server, run the actual application on port 8080 and continue with Step 4. You can also check the TargetControlActiveChannels metric in CloudWatch. When the metric value grows to become equal to the number of agents you deployed, it indicates that your agents are responding to the ALB. sudo systemctl stop nginx Step 4: Move traffic to your new ‘target optimized’ target group: 4.1 Navigate to EC2 > Load Balancers in the Management Console. Select your ALB and the listener to which you want to add the ‘target optimized’ target group. Under the Manage listener drop-down select Edit listener. Figure 8: Modifying an ALB listener from the AWS Management Console 4.2 Add the ‘target-optimized’ target group you created in Step 2 and give it a weight of 1. In our example, the existing target group also has a weight of 1; therefore 50% of traffic will shift to the new ‘target-optimized’ target group. Figure 9: Shifting traffic to a new target group by modifying an ALB listener rule ALB Agent variables In addition to the variables mentioned in Step 1, you can configure the following additional variables for the ALB agent: TARGET_CONTROL_TLS_CERT_PATH: The location of the TLS certificate that the agent provides to the ALB during TLS handshake. By default, the agent generates a self-signed certificate in-memory. TARGET_CONTROL_TLS_KEY_PATH: The location of the private key corresponding to the TLS certificate that the agent provides to the ALB during TLS handshake. By default, the agent generates a private key in-memory. TARGET_CONTROL_TLS_SECURITY_POLICY: The ELB security policy that you configure for your target group. The default is ELBSecurityPolicy-2016-08. TARGET_CONTROL_PROTOCOL_VERSION: The protocol through which the ALB communicates with the agent. The default is HTTP1. RUST_LOG: The log level of the agent process. The default is info. Metrics and troubleshooting You can troubleshoot using the following metrics in CloudWatch: TargetControlRequestCount: Number of requests forwarded by ALB to the agent. TargetControlRequestRejectCount: Number of requests rejected by ALB due to no targets being ready to receive requests. This metric shows an uptick when TargetControlWorkQueueLength is zero. TargetControlActiveChannelCount: Number of active control channels between the ALB and agents. Ideally, this should be equal to the number of agents. A lower number indicates that agents are not configured properly or are not available. TargetControlNewChannelCount: Number of new channels created between the ALB and agents. You will see an uptick in this metric when a new target is successfully added to the target group. TargetControlChannelErrorCount: Number of control channels between ALB and agents that failed to establish or experienced an unexpected error. A control channel error will result in that agent (and target) not receiving any application traffic. TargetControlWorkQueueLength: Number of signals received by the ALB from agents asking for requests. TargetControlProcessedBytes: Number of bytes processed by ALB for traffic going to target groups that enable target optimizer. Things to know New vs existing target groups: Target optimizer cannot be enabled on an existing target group. To use target optimizer, you must create a new target group. Supported target types: Targets of type ‘instance’ and ‘IP’ are supported with target optimizer. Targets of type ‘Lambda’ are not supported. Health checks: With Target Optimizer, we recommend you set the health-check port of your target group to be the same as the port in TARGET_CONTROL_DATA_ADDRESS. This way, the target will fail health checks if the agent is unhealthy. Attributes supported: For target optimizer, the load balancing algorithm type is ‘round robin’. AWS Load Balancer Controller: If you are using EKS, v2.16 of the AWS Load Balancer Controller has new annotations for Target Optimizer. ALB Agent: The agent uses insignificant resources that should not affect the target’s health or performance. Conclusion In this post, we introduced Target Optimizer for Application Load Balancer. We explained how it works and walked through an example of how to configure it. This feature allows you to factor in the capacity of your targets and helps you optimize the performance and efficiency of your application stack for workloads that require strict concurrency. Target Optimizer is available in all commercial AWS Regions, AWS GovCloud (US) Regions, and AWS China. Traffic to target groups that enable target optimizer is charged differently on the ALB. To learn more about the feature, please refer to the ALB user guide and pricing page . About the authors Ashish Kumar is a Senior Product Manager Tech at AWS, based out of the San Francisco Bay Area. He manages advanced cloud services in the virtual private cloud and application networking areas, such as AWS PrivateLink, VPC Lattice, and Elastic Load Balancing. Ashish has a bachelor’s from the Indian Institute of Technology Guwahati and an MBA and master’s in business analytics from the University of Notre Dame, USA. Jamie Wenzel Jamie is a Principal SA networking specialist in the EC2 Networking. Jamie is part of the application networking organization contributing to the design of application networking products and services. He is an avid public speaker at re:invent, re:inforce, lofts, summits and twitch. He has been with amazon for 6+ years and is passionate about helping people and organizations in their cloud journeys. Resources Networking Products Getting Started Amazon CloudFront Follow Twitter Facebook LinkedIn Twitch Email Updates Create an AWS account Learn What Is AWS? What Is Cloud Computing? What Is Agentic AI? Cloud Computing Concepts Hub AWS Cloud Security What's New Blogs Press Releases Resources Getting Started Training AWS Trust Center AWS Solutions Library Architecture Center Product and Technical FAQs Analyst Reports AWS Partners Developers Builder Center SDKs & Tools .NET on AWS Python on AWS Java on AWS PHP on AWS JavaScript on AWS Help Contact Us File a Support Ticket AWS re:Post Knowledge Center AWS Support Overview Get Expert Help AWS Accessibility Legal English Back to top Amazon is an Equal Opportunity Employer: Minority / Women / Disability / Veteran / Gender Identity / Sexual Orientation / Age. x facebook linkedin instagram twitch youtube podcasts <path d="M14.8571 13.1432V6.28606C14.6667 6.50035 14.4613 6.69678 14.2411 6.87535C12.6458 8.10154 11.378 9.10749 10.4375 9.89321C10.1339 10.1492 9.88691 10.3486 9.69643 10.4914C9.50595 10.6343 9.24851 10.7786 8. | 2026-01-13T09:30:39 |
https://www.thoughtworks.com/ | Thoughtworks: A leading technology consultancy | Thoughtworks Enable javascript in your browser for better experience. Need to know to enable it? Go here. Menu Close Worldwide | English Brazil Português Chile Español China Chinese Ecuador Español Germany Deutsch Spain Español Search Close Ask Tai Worldwide | English Brazil Português Chile Español China Chinese Ecuador Español Germany Deutsch Spain Español What we do Go to overview Solutions Customer Experience Product Innovation Data Modernization Scaling AI AI-first Software Engineering Transformation Enterprise Platform Modernization Digital Application Management and Operations Who we work with Go to overview Industries Automotive Public Sector Energy Media and Publishing Retail and E-commerce Financial Services and Insurance Not-for-profit Travel and Transport Healthcare and Life Sciences Utilities Manufacturing and Engineering Insights Go to overview Publications and Tools Technology Radar An opinionated guide to today's technology landscape Perspectives A no-nonsense publication for digital leaders Decoder The business execs' A-Z guide to technology Looking Glass Bringing the tech-led business changes into focus All Insights Articles In-depth insights to help your business grow Blogs Expert advice on design, engineering, AI and careers Books Explore our extensive library to keep learning Podcasts Conversations on the latest in business and tech Engineering Careers Go to overview Application Process What to expect as you interview with us Consultant Life Learn what life is like as a Thoughtworker Graduates and Career Changers Thoughtworks University: Preparing future leaders Search Jobs Find open positions in your region Stay Connected Sign up for our monthly newsletter Learning and Development Explore how we support career growth Benefits See how we take care of our people About Go to overview Contact Search Close Ask Tai Beyond the bottom line: Unlocking AI’s top-line growth Explore the report Thoughtworks awarded AWS Global Partner of the Year for data and analytics Learn more Design. Engineering. AI Delivering extraordinary impact by blending design, engineering and AI expertise What we do Thoughtworks is a visionary in 2025 Gartner® Magic Quadrant™ for custom software development services Learn more We've launched our alumni network Once a Thoughtworker, always a Thoughtworker Join Afterworks Previous Next Pause Play 5 1 2 3 4 We are a global technology consultancy that delivers extraordinary impact by blending design, engineering and AI expertise. Our commitment to design-led thinking, engineering excellence and innovation means we prioritize people, build teams with strong technical foundations and embed AI into every step of the process – not just as a tool, but as a mindset. It’s this approach that sets us apart, sparks bold ideas and empowers us to drive real, lasting innovation. We’re not preparing for the future – we’re defining it. How can we help you? Latest insights News and stories We've achieved the AWS Agentic AI Specialization to accelerate autonomous enterprise innovation Learn more Tool Assess your AI readiness Get started Blog Mainframe modernization: An illustrated guide Read now Publication Catch the latest Tech Radar Explore this edition Our clients count on us to handle what matters most Success stories Engineering effectiveness carsales: Driving excellence with operational transformation and AI-powered customer service Learn more Legacy modernization Docebo: Decommissioning legacy services to create a streamlined, scalable platform foundation Learn more AI and ML Bayer AG: Using AI to unleash the potential of preclinical data Learn more View more View less Powerful partnerships We take a customer-centric approach to everything we do, including our partnerships. Together we accelerate the scale, speed and outcomes we deliver for our clients. Find out more The GenAI guide to financial industry excellence 75% of GenAI pilots in banking never scale. Most financial institutions are experimenting with AI, but few are seeing measurable impact. The problem isn’t ambition. It’s architecture. Legacy systems, siloed data and fragmented governance keep AI stuck at the pilot stage, while locking up nearly 80% of IT budgets just to maintain the past. This guide shows how to change that. Read now AI insights to move your business forward Blog When chatbots mislead: Three traps and fixes for AI customer service Read this blog Podcast What does an AI strategy with humans at the center look like? Listen to the podcast Blog AI assistance is a misunderstood revolution in software engineering. Here’s why Read this blog View more View less Ready to take on a new role? Jobs in technology can be ordinary. Clock in, clock out — lather, rinse, repeat. Who wants that? Definitely not us and definitely not you. Thoughtworkers break the mold. Join our Great Place to Work-Certified™️ team. Together, let’s be extraordinary Explore careers with us Transform your digital journey Get in touch Company About us What we do Partnerships Who we work with News Diversity, Equity and Inclusion Careers Contact us Insights Preference center Articles Blogs Books Podcasts Site info Privacy policy Accessibility statement Modern slavery statement Code of conduct Integrity helpline Sustainable procurement policy Speak up policy Connect with us © 2026 Thoughtworks, Inc. × WeChat | 2026-01-13T09:30:39 |
https://www.frontendinterviewhandbook.com/ru/companies/salesforce-front-end-interview-questions | Salesforce Front End Interview Questions | The Official Front End Interview Handbook 2025 Перейти к основному содержимому We are now part of GreatFrontEnd , a front end interview preparation platform created by ex-Meta and Google Engineers. Get 20% off today ! Front End Interview Handbook Start reading Practice Coding Questions System Design Quiz Questions System design Blog Русский English 简体中文 Español 日本語 한국어 Polski Português Русский Tagalog বাংলা Поиск Introduction Coding interview JavaScript coding User interface coding Algorithms coding Quiz/trivia interview System design interview Overview User interface components Applications Behavorial interviews Resume preparation Interview questions 🔥 Amazon interview questions Google interview questions Microsoft interview questions Meta interview questions Airbnb interview questions ByteDance/TikTok interview questions Atlassian interview questions Uber interview questions Apple interview questions Canva interview questions Dropbox interview questions LinkedIn interview questions Lyft interview questions Twitter interview questions Shopify interview questions Pinterest interview questions Reddit interview questions Adobe interview questions Palantir interview questions Salesforce interview questions Oracle interview questions Interview questions 🔥 Salesforce interview questions Содержание этой страницы Salesforce Front End Interview Questions Latest version on GreatFrontEnd Find more company guides on GreatFrontEnd . Not much is known about Salesforce's front end interview process. Coding Flatten a nested array. Practice question (Free) Quiz questions What is the event loop? Read answer (Free) What is a closure? Read answer (Free) Positioning in CSS. Read answer (Free) Source: Glassdoor Salesforce UI Developer Interview Questions Insider tips from the GreatFrontEnd community These tips were shared by GreatFrontEnd users who have completed interviews with Salesforce. 25th Apr 2025 : They rescheduled my interview. Finally got the opportunity to talk to them yesterday. Was asked 2 easy LC( !! ) I was specifically asked if I would be comfortable coding in React, and after confirmation and 2 weeks of continuous React study, I was given 2 leetcode questions in the CoderPad 🤷🏼♀️ A version of the high five problem was asked and one was about calculating the distance a robot has moved. 18th Oct 2024 : Yes, I had a OA which had 2 medium/hard dynamic programming question 1 hour. It was pretty hard 🤕 Ah, I had some grouping of CPU tasks which was 2D dp. Currently I'm on the final round, so I assume this round would be either system design or a class design round. I'm not sure which one though For more insider tips, visit GreatFrontEnd ! Отредактировать эту страницу Последнее обновление 30 нояб. 2025 г. от Danielle Ford Предыдущая страница Palantir interview questions Следующая страница Oracle interview questions Table of Contents Coding Quiz questions Insider tips from the GreatFrontEnd community General Get started Trivia questions Company questions Blog Coding Algorithms JavaScript utility functions User interfaces System design System design overview User interface components Applications More GreatFrontEnd GitHub X Discord Contact us Tech Interview Handbook Copyright © 2025 Yangshun Tay and GreatFrontEnd | 2026-01-13T09:30:39 |
https://www.timeforkids.com/k1/sections/animals/ | TIME for Kids | Animals | Section | K-1 Skip to main content Search Articles by Grade level Grades K-1 Articles Grade 2 Articles Grades 3-4 Articles Grades 5-6 Articles Topics Animals Arts Ask Angela Books Business Careers Community Culture Debate Earth Science Education Election 2024 Engineering Environment Food and Nutrition Games Government History Holidays Inventions Movies and Television Music and Theater Nature News People Places Podcasts Science Service Stars Space Sports The Human Body The View Transportation Weather World Young Game Changers Your $ Financial Literacy Content Grade 4 Edition Grade 5-6 Edition For Grown-ups Resource Spotlight Also from TIME for Kids: Log In role: none user_age: none editions: The page you are about to enter is for grown-ups. Enter your birth date to continue. Month (MM) 01 02 03 04 05 06 07 08 09 10 11 12 Year (YYYY) 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949 1950 1951 1952 1953 1954 1955 1956 1957 1958 1959 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025 2026 Submit Animals Nature Time to Eat! December 22, 2025 Animals have favorite foods. Rabbits eat plants. They eat grass and leaves. Foxes eat other animals. Some animals eat all kinds of things. Different animals have different diets. Learn about some of them here. Meat Eaters Lions are carnivores.… Audio Spanish Nature Who Eats What? December 22, 2025 Some animals eat only meat. Others eat only plants. Some eat both. How can we tell who eats what? We can use this chart. It is called a Venn diagram. The animals on the left are carnivores. Those on the… Audio Nature Animals Talk Too December 22, 2025 How do you share your thoughts? You might use words. You might use your hands. Animals do not speak the way we do. But they have lots of ways to communicate. Sounding Off This monkey has a loud voice.… Audio Spanish Nature How Animals Vote December 22, 2025 People can vote. Did you know that groups of animals can vote too? They vote on where to look for food. Or they vote on where to live. Meerkats Meerkats (above) search for food. They can vote to search faster.… Audio Nature Animal Defenses December 19, 2025 Animals protect themselves against predators. Predators are other animals that want to eat them. How do they protect themselves? They use their defenses. Find out more. What’s That Smell? Skunks have a stinky secret. They spray a bad odor.… Audio Spanish Nature Clever Colors December 19, 2025 Often, an animal’s coloring helps it survive. Some colors say, “Don’t mess with me.” Others help animals trap food. Here are some examples. Take a look. Warning Sign This frog (above) is bright orange. Its color sends a warning… Audio Nature Living in the Wild December 12, 2025 Some animals live in green forests. Others live in deserts. These places are called habitats. A habitat has everything an animal needs. It has shelter. It has food. And it is the right temperature for its animals. Grassland Habitat Lions… Audio Spanish Environment A Rocky Habitat February 28, 2025 Habitats are the natural homes of plants and animals. A habitat has the resources that living things need to survive. One type is a mountain habitat. Read about what makes up a habitat. Climate Climate is the weather pattern… Audio Spanish Environment Explore Habitats February 28, 2025 Habitats can be hot or cold. They can be dry or wet. Each has its own living things. Read about four different habitats below. Arctic This is the coldest habitat (above). Much of the water is ice. Animals have… Audio Science Cave Living February 5, 2025 Caves are full of interesting animals. These animals fly, swim, and slither. Here are four cave creatures. Learn how they have adapted to their dark habitat. Bats Bats make a high-pitched sound. It bounces off cave walls. Bats use… Audio Spanish Posts pagination 1 2 3 4 5 6 Next Contact us Privacy policy California privacy Terms of Service Subscribe CLASSROOM INTERNATIONAL © 2026 TIME USA, LLC. All Rights Reserved. Powered by WordPress.com VIP | 2026-01-13T09:30:39 |
https://bsky.app/profile/charterworks.bsky.social | Bluesky JavaScript Required This is a heavily interactive web application, and JavaScript is required. Simple HTML interfaces are possible, but that is not what this is. Learn more about Bluesky at bsky.social and atproto.com . | 2026-01-13T09:30:39 |
http://tirkarthi.github.io/programming/2025/08/20/genai-healthy-skepticism.html | Generative AI and healthy skepticism xtreak blog whoami Comics Poems Generative AI and healthy skepticism Aug 20, 2025 Generative AI ecosystem is a constantly evolving technology with a heavy push across the society and especially in software engineering to adapt it and empower themselves with increased productivity. It’s a constant source of news with quotes and headlines from executives, engineers, vibe coding enthusiasts etc. about how people who don’t adapt it won’t survive the cycle. In this post it will be about taking a simple Migrating airflow.cfg from Airflow 2 to Airflow 3 I use Airflow at work and also a committer on the Apache Airflow team. Airflow 2 was released on 2020 and the major version Airflow 3 was released on April 2025. Given that Airflow is written in Python and the general experience towards Python 2 to 3 migration it was planned to make the migration as smooth as possible with a tool similar to 2to3. ruff has become a standard tool in the Python ecosystem and was enhanced to automate Airflow 2 to 3 changes to DAGs. One major aspect of the migration was towards cleanup of deprecated configurations from Airflow 2 that had to be removed/renamed in Airflow 3. This felt like a good use case for Generative AI since the Airflow configuration is an ini file where options were moved or deleted across sections. It’s a case of taking Airflow 2 cfg and translating it to Airflow 3 with objective rules for the transformation. I tried doing it with prompts and the experience is as below. I started with the initial prompt of “Please migrate airflow.cfg from Airflow 2 to Airflow 3”. The models suggested using “airflow config generate” and “airflow config export” to take a backup of the airflow config. On trying airflow config generate and airflow config export I was greeted with the message that these commands don’t even exist. I was under the impression that maybe these commands themselves were removed in Airflow 3. On a search of git history with git log -G'airflow config export' and git log -G'airflow config generate' I couldn’t find any mentions of these commands. airflow config generate Usage: airflow config [ -h ] COMMAND ... View configuration Positional Arguments: COMMAND get-value Print the value of the configuration lint lint options for the configuration changes while migrating from Airflow 2.x to Airflow 3.0 list List options for the configuration update update options for the configuration changes while migrating from Airflow 2.x to Airflow 3.0 Options: -h , --help show this help message and exit airflow config command error: argument COMMAND: invalid choice: 'generate' ( choose from 'get-value' , 'lint' , 'list' , 'update' ) , see help above. Then the models started writing an extensive 500 line script to parse the cfg file using configparser module and then to rename the options/sections. The script was wrapped with cli options using rich/click and other bells and whistles of customization though this was a one time task. There were close to 50 options that had to be updated but the script only had 5 keys. I tried to prompt it to add additional keys but it was still not complete. I was asked to check UPDATING.md in GitHub but the file never exists. $ find . -iname '*upgrade*md' $ find . -iname '*updat*md' What caught my eye was that the above output had airflow config update with a description to migrate the configuration from Airflow 2 to 3. I tried enriching the chat with giving it a hint over airflow config update which is a much more robust solution from Airflow community to make the changes that is also updated with Airflow 3.x versions in future. The changes to configuration in this case are deterministic and finite with clear source and target but the model started arguing over the fact such an option never exists in airflow config subcommand never exists in Airflow 3. It again started to market the script it wrote as the defacto migration tool and to create a new command airflow config update that acts as a bash wrapper to call this python script to update. It again started to respond with commands airflow config validate and airflow config diff that clearly don’t even exist. As much as it has been my experience towards a single task that doesn’t generalize it to all situations there have been many demonstrable positive improvements using AI. One of the use cases was about leveraging AI to provide translations for UI components in Apache Airflow project slated for Airflow 3.1 release that makes it more accessible to wider audiences. It has been a positive collaboration with people from different communities and languages in this effort. You can read more about it in the below link AI and Open Source: Expanding Apache Airflow’s Global Impact Through Collaboration Conflict of interest During the gold rush its a good time to be in the pick and shovel business - Mark Twain Advertisements these days are all over the web about how it’s a waste of time to learn programming or a beginner friendly programming language like Python. Some of these are quotes taken out of context from executives to grab headlines to grab clicks. Some even act as advertisements to courses to deter people from actually learning a language and to take their paid course in prompting with which you can start to earn in lakhs quickly. Just like when someone recommends a stock they have financial interest in these statements are often present to keep the technology buzz and hot since they have their personal interest in the company and technology. The interests don’t just end financially and also gives access to a lot of data. These days with a lot of the tools like MCP to be connected internal documents, source code, personal files etc. there is a treasure trove of data that people trust with the providers which earlier used to be very hard to obtain. There were a lot of recent posts about how companies have access to data in the name of Generative AI. These have also generated a lot of discussion about the widespread use of AI. Generative AI is a form of generative revenue for companies that sell it but are currently an expense/investment with returns left as an exercise to the reader. Copilot Broke Your Audit Log, but Microsoft Won’t Tell You - HN discussion Perplexity is using stealth, undeclared crawlers to evade website no-crawl directives - HN discussion How We Exploited CodeRabbit: From a Simple PR to RCE and Write Access on 1M Repositories - HN discussion News cycles and healthy skepticism As much as industry leaders and visionaries have lot of insights into the future with their experience, access to usage data etc. it’s a good practice to always step back and put up a hat of healthy skepticism to understand that there is also a conflict of interest in these statements both positive and negative. For the last few months there have been posts about how LLM and agents will replace software engineers but this week it has been all about the opposite. The narratives keep changing and suddenly anything with AI optimistic or pessimistic attracts clicks which leads to lot of polar opinions leaning towards extreme ends of the spectrum. As much as people want to hear something that substantiates their position it will be helpful to discern through the news and noise cycle so that people learn to accept the capabilities and disadvantages. To see where it fits and where it doesn’t to accept it instead of alienating the other camp that has a different voice will be healthy. The voices on both ends are constant throughout the tech cycles like Internet, mobile, big data, cloud computing, cryptocurrency and so on. How 95% of AI companies fail AWS CEO says using AI to replace junior staff is ‘Dumbest thing I’ve ever heard’ Some interesting reads LLM inevitabilism and HN discussion Writing Code Was Never The Bottleneck and HN discussion Pushes to git and rushes to order dinner Please enable JavaScript to view the comments powered by Disqus. xtreak blog xtreak blog tir.karthi@gmail.com tirkarthi tirkarthi A blog about programming, mistakes and eureka | 2026-01-13T09:30:39 |
https://www.php.net/x-myracloud-5958a2bbbed300a9b9ac631223924e0b/1768296252.696 | PHP update page now Downloads Documentation Get Involved Help Search docs Getting Started Introduction A simple tutorial Language Reference Basic syntax Types Variables Constants Expressions Operators Control Structures Functions Classes and Objects Namespaces Enumerations Errors Exceptions Fibers Generators Attributes References Explained Predefined Variables Predefined Exceptions Predefined Interfaces and Classes Predefined Attributes Context options and parameters Supported Protocols and Wrappers Security Introduction General considerations Installed as CGI binary Installed as an Apache module Session Security Filesystem Security Database Security Error Reporting User Submitted Data Hiding PHP Keeping Current Features HTTP authentication with PHP Cookies Sessions Handling file uploads Using remote files Connection handling Persistent Database Connections Command line usage Garbage Collection DTrace Dynamic Tracing Function Reference Affecting PHP's Behaviour Audio Formats Manipulation Authentication Services Command Line Specific Extensions Compression and Archive Extensions Cryptography Extensions Database Extensions Date and Time Related Extensions File System Related Extensions Human Language and Character Encoding Support Image Processing and Generation Mail Related Extensions Mathematical Extensions Non-Text MIME Output Process Control Extensions Other Basic Extensions Other Services Search Engine Extensions Server Specific Extensions Session Extensions Text Processing Variable and Type Related Extensions Web Services Windows Only Extensions XML Manipulation GUI Extensions Keyboard Shortcuts ? This help j Next menu item k Previous menu item g p Previous man page g n Next man page G Scroll to bottom g g Scroll to top g h Goto homepage g s Goto search (current page) / Focus search box A popular general-purpose scripting language that is especially suited to web development. Fast, flexible and pragmatic, PHP powers everything from your blog to the most popular websites in the world. What's new in 8.5 Download 8.5.1 · Changelog · Upgrading 8.4.16 · Changelog · Upgrading 8.3.29 · Changelog · Upgrading 8.2.30 · Changelog · Upgrading 18 Dec 2025 PHP 8.1.34 Released! The PHP development team announces the immediate availability of PHP 8.1.34. This is a security release. All PHP 8.1 users are encouraged to upgrade to this version. For source downloads of PHP 8.1.34 please visit our downloads page , Windows source and binaries can also be found there . The list of changes is recorded in the ChangeLog . 18 Dec 2025 PHP 8.4.16 Released! The PHP development team announces the immediate availability of PHP 8.4.16. This is a security release. All PHP 8.4 users are encouraged to upgrade to this version. For source downloads of PHP 8.4.16 please visit our downloads page , Windows source and binaries can also be found there . The list of changes is recorded in the ChangeLog . 18 Dec 2025 PHP 8.2.30 Released! The PHP development team announces the immediate availability of PHP 8.2.30. This is a security release. All PHP 8.2 users are encouraged to upgrade to this version. For source downloads of PHP 8.2.30 please visit our downloads page , Windows source and binaries can also be found there . The list of changes is recorded in the ChangeLog . 18 Dec 2025 PHP 8.3.29 Released! The PHP development team announces the immediate availability of PHP 8.3.29. This is a security release. All PHP 8.3 users are encouraged to upgrade to this version. For source downloads of PHP 8.3.29 please visit our downloads page , Windows source and binaries can also be found there . The list of changes is recorded in the ChangeLog . 18 Dec 2025 PHP 8.5.1 Released! The PHP development team announces the immediate availability of PHP 8.5.1. This is a security release. All PHP 8.5 users are encouraged to upgrade to this version. For source downloads of PHP 8.5.1 please visit our downloads page , Windows source and binaries can also be found there . The list of changes is recorded in the ChangeLog . 20 Nov 2025 PHP 8.5.0 Released! The PHP development team announces the immediate availability of PHP 8.5.0. This release marks the latest minor release of the PHP language. PHP 8.5 comes with numerous improvements and new features such as: New "URI" extension New pipe operator (|>) Clone With New #[\NoDiscard] attribute Support for closures, casts, and first class callables in constant expressions And much much more... For source downloads of PHP 8.5.0 please visit our downloads page , Windows source and binaries can also be found there . The list of changes is recorded in the ChangeLog . The migration guide is available in the PHP Manual. Please consult it for the detailed list of new features and backward incompatible changes. Kudos to all the contributors and supporters! 20 Nov 2025 PHP 8.4.15 Released! The PHP development team announces the immediate availability of PHP 8.4.15. This is a bug fix release. All PHP 8.4 users are encouraged to upgrade to this version. For source downloads of PHP 8.4.15 please visit our downloads page , Windows source and binaries can also be found there . The list of changes is recorded in the ChangeLog . 20 Nov 2025 PHP 8.3.28 Released! The PHP development team announces the immediate availability of PHP 8.3.28. This is a bug fix release. All PHP 8.3 users are encouraged to upgrade to this version. For source downloads of PHP 8.3.28 please visit our downloads page , Windows source and binaries can also be found there . The list of changes is recorded in the ChangeLog . 13 Nov 2025 PHP 8.5.0 RC 5 available for testing The PHP team is pleased to announce the fifth release candidate of PHP 8.5.0, RC 5. This continues the PHP 8.5 release cycle, the rough outline of which is specified in the PHP Wiki . For source downloads of PHP 8.5.0 RC5, please visit the download page . Please carefully test this version and report any issues found on GitHub . Please DO NOT use this version in production, it is a test version. For more information on the new features and other changes, you can read the NEWS file, or the UPGRADING file for a complete list of upgrading notes. These files can also be found in the release archive. The next release will be the GA release of PHP 8.5.0, planned for 20 Nov 2025. The signatures for the release can be found in the manifest or on the Release Candidates page . Thank you for helping us make PHP better. 06 Nov 2025 PHP 8.5.0 RC4 available for testing The PHP team is pleased to announce the final planned release candidate of PHP 8.5.0, RC 4. This continues the PHP 8.5 release cycle, the rough outline of which is specified in the PHP Wiki . For source downloads of PHP 8.5.0 RC4, please visit the download page . Please carefully test this version and report any issues found on GitHub . Please DO NOT use this version in production, it is a test version. For more information on the new features and other changes, you can read the NEWS file, or the UPGRADING file for a complete list of upgrading notes. These files can also be found in the release archive. The next release will be the GA release of PHP 8.5.0, planned for 20 Nov 2025. The signatures for the release can be found in the manifest or on the Release Candidates page . Thank you for helping us make PHP better. 23 Oct 2025 PHP 8.3.27 Released! The PHP development team announces the immediate availability of PHP 8.3.27. This is a bug fix release. All PHP 8.3 users are encouraged to upgrade to this version. For source downloads of PHP 8.3.27 please visit our downloads page , Windows source and binaries can be found on windows.php.net/download/ . The list of changes is recorded in the ChangeLog . 23 Oct 2025 PHP 8.4.14 Released! The PHP development team announces the immediate availability of PHP 8.4.14. This is a bug fix release. All PHP 8.4 users are encouraged to upgrade to this version. For source downloads of PHP 8.4.14 please visit our downloads page , Windows source and binaries can be found on windows.php.net/download/ . The list of changes is recorded in the ChangeLog . 23 Oct 2025 PHP 8.5.0 RC 3 available for testing The PHP team is pleased to announce the third release candidate of PHP 8.5.0, RC 3. This continues the PHP 8.5 release cycle, the rough outline of which is specified in the PHP Wiki . For source downloads of PHP 8.5.0 RC3, please visit the download page . Please carefully test this version and report any issues found on GitHub . Please DO NOT use this version in production, it is an early test version. For more information on the new features and other changes, you can read the NEWS file, or the UPGRADING file for a complete list of upgrading notes. These files can also be found in the release archive. The next release will be RC4, planned for 6 Nov 2025. The signatures for the release can be found in the manifest or on the Release Candidates page . Thank you for helping us make PHP better. 09 Oct 2025 PHP 8.5.0 RC 2 available for testing The PHP team is pleased to announce the second release candidate of PHP 8.5.0, RC 2. This continues the PHP 8.5 release cycle, the rough outline of which is specified in the PHP Wiki . For source downloads of PHP 8.5.0 RC2, please visit the download page . Please carefully test this version and report any issues found on GitHub . Please DO NOT use this version in production, it is an early test version. For more information on the new features and other changes, you can read the NEWS file, or the UPGRADING file for a complete list of upgrading notes. These files can also be found in the release archive. The next release will be RC3, planned for 23 Oct 2025. The signatures for the release can be found in the manifest or on the Release Candidates page . Thank you for helping us make PHP better. 25 Sep 2025 PHP 8.5.0 RC 1 available for testing The PHP team is pleased to announce the first release candidate of PHP 8.5.0, RC 1. This continues the PHP 8.5 release cycle, the rough outline of which is specified in the PHP Wiki . For source downloads of PHP 8.5.0 RC1, please visit the download page . Please carefully test this version and report any issues found on GitHub . Please DO NOT use this version in production, it is an early test version. For more information on the new features and other changes, you can read the NEWS file, or the UPGRADING file for a complete list of upgrading notes. These files can also be found in the release archive. The next release will be RC2, planned for 9 Oct 2025. The signatures for the release can be found in the manifest or on the Release Candidates page . Thank you for helping us make PHP better. 25 Sep 2025 PHP 8.3.26 Released! The PHP development team announces the immediate availability of PHP 8.3.26. This is a bug fix release. All PHP 8.3 users are encouraged to upgrade to this version. For source downloads of PHP 8.3.26 please visit our downloads page , Windows source and binaries can be found on windows.php.net/download/ . The list of changes is recorded in the ChangeLog . 25 Sep 2025 PHP 8.4.13 Released! The PHP development team announces the immediate availability of PHP 8.4.13. This is a bug fix release. All PHP 8.4 users are encouraged to upgrade to this version. For source downloads of PHP 8.4.13 please visit our downloads page , Windows source and binaries can be found on windows.php.net/download/ . The list of changes is recorded in the ChangeLog . 11 Sep 2025 PHP 8.5.0 Beta 3 available for testing The PHP team is pleased to announce the third beta release of PHP 8.5.0, Beta 3. This continues the PHP 8.5 release cycle, the rough outline of which is specified in the PHP Wiki . For source downloads of PHP 8.5.0 Beta 3, please visit the download page . Please carefully test this version and report any issues found on GitHub . Please DO NOT use this version in production, it is an early test version. For more information on the new features and other changes, you can read the NEWS file, or the UPGRADING file for a complete list of upgrading notes. These files can also be found in the release archive. The next release will be RC1, planned for 25 Sep 2025. The signatures for the release can be found in the manifest or on the Release Candidates page . Thank you for helping us make PHP better. 28 Aug 2025 PHP 8.5.0 Beta 2 available for testing The PHP team is pleased to announce the second beta release of PHP 8.5.0, Beta 2. This continues the PHP 8.5 release cycle, the rough outline of which is specified in the PHP Wiki . For source downloads of PHP 8.5.0 Beta 2 please visit the download page . Please carefully test this version and report any issues found on GitHub . Please DO NOT use this version in production, it is an early test version. For more information on the new features and other changes, you can read the NEWS file, or the UPGRADING file for a complete list of upgrading notes. These files can also be found in the release archive. The next release will be Beta 3, planned for 11 Sep 2025. The signatures for the release can be found in the manifest or on the Release Candidates page . Thank you for helping us make PHP better. 28 Aug 2025 PHP 8.3.25 Released! The PHP development team announces the immediate availability of PHP 8.3.25. This is a bug fix release. All PHP 8.3 users are encouraged to upgrade to this version. For source downloads of PHP 8.3.25 please visit our downloads page , Windows source and binaries can be found on windows.php.net/download/ . The list of changes is recorded in the ChangeLog . 28 Aug 2025 PHP 8.4.12 Released! The PHP development team announces the immediate availability of PHP 8.4.12. This is a bug fix release. All PHP 8.4 users are encouraged to upgrade to this version. For source downloads of PHP 8.4.12 please visit our downloads page , Windows source and binaries can be found on windows.php.net/download/ . The list of changes is recorded in the ChangeLog . 14 Aug 2025 PHP 8.5.0 Beta 1 available for testing The PHP team is pleased to announce the first beta release of PHP 8.5.0, Beta 1. This continues the PHP 8.5 release cycle, the rough outline of which is specified in the PHP Wiki . For source downloads of PHP 8.5.0 Beta 1 please visit the download page . Please carefully test this version and report any issues found on GitHub . Please DO NOT use this version in production, it is an early test version. For more information on the new features and other changes, you can read the NEWS file, or the UPGRADING file for a complete list of upgrading notes. These files can also be found in the release archive. The next release will be Beta 2, planned for 28 Aug 2025. The signatures for the release can be found in the manifest or on the Release Candidates page . Thank you for helping us make PHP better. 01 Aug 2025 PHP 8.5.0 Alpha 4 available for testing The PHP team is pleased to announce the third testing release of PHP 8.5.0, Alpha 4. This continues the PHP 8.5 release cycle, the rough outline of which is specified in the PHP Wiki . For source downloads of PHP 8.5.0 Alpha 4 please visit the download page . Please carefully test this version and report any issues found on GitHub . Please DO NOT use this version in production, it is an early test version. For more information on the new features and other changes, you can read the NEWS file, or the UPGRADING file for a complete list of upgrading notes. These files can also be found in the release archive. The next release will be Beta 1, planned for 14 Aug 2025. The signatures for the release can be found in the manifest or on the Release Candidates page . Thank you for helping us make PHP better. 31 Jul 2025 PHP 8.4.11 Released! The PHP development team announces the immediate availability of PHP 8.4.11. This is a bug fix release. All PHP 8.4 users are encouraged to upgrade to this version. For source downloads of PHP 8.4.11 please visit our downloads page , Windows source and binaries can be found on windows.php.net/download/ . The list of changes is recorded in the ChangeLog . 31 Jul 2025 PHP 8.3.24 Released! The PHP development team announces the immediate availability of PHP 8.3.24. This is a bug fix release. All PHP 8.3 users are encouraged to upgrade to this version. For source downloads of PHP 8.3.24 please visit our downloads page , Windows source and binaries can be found on windows.php.net/download/ . The list of changes is recorded in the ChangeLog . Older News Entries The PHP Foundation The PHP Foundation is a collective of people and organizations, united in the mission to ensure the long-term prosperity of the PHP language. Donate Upcoming conferences International PHP Conference Berlin 2026 Laravel Live Japan Conferences calling for papers Dutch PHP Conference 2026 User Group Events Special Thanks Social media @official_php @php@fosstodon.org @phpnet Copyright © 2001-2026 The PHP Group My PHP.net Contact Other PHP.net sites Privacy policy View Source ↑ and ↓ to navigate • Enter to select • Esc to close • / to open Press Enter without selection to search using Google | 2026-01-13T09:30:39 |
https://pubs.opengroup.org/onlinepubs/9799919799/utilities/contents.html | Shell & Utilities: Table of contents The Open Group Base Specifications Issue 8 IEEE Std 1003.1-2024 Copyright © 2001-2024 The IEEE and The Open Group Shell & Utilities: Table of Contents 1. Introduction 1.1 Relationship to Other Documents 1.1.1 System Interfaces 1.1.1.1 Process Attributes 1.1.1.2 Concurrent Execution of Processes 1.1.1.3 File Access Permissions 1.1.1.4 File Read, Write, and Creation 1.1.1.5 File Removal 1.1.1.6 File Time Values 1.1.1.7 File Contents 1.1.1.8 Pathname Resolution 1.1.1.9 Changing the Current Working Directory 1.1.1.10 Establish the Locale 1.1.1.11 Actions Equivalent to Functions 1.1.2 Concepts Derived from the ISO C Standard 1.1.2.1 Arithmetic Precision and Operations 1.1.2.2 Mathematical Functions 1.2 Utility Limits 1.3 Grammar Conventions 1.4 Utility Description Defaults 1.5 Considerations for Utilities in Support of Files of Arbitrary Size 1.6 Built-In Utilities 1.7 Intrinsic Utilities 2. Shell Command Language 2.1 Shell Introduction 2.2 Quoting 2.2.1 Escape Character (Backslash) 2.2.2 Single-Quotes 2.2.3 Double-Quotes 2.2.4 Dollar-Single-Quotes 2.3 Token Recognition 2.3.1 Alias Substitution 2.4 Reserved Words 2.5 Parameters and Variables 2.5.1 Positional Parameters 2.5.2 Special Parameters 2.5.3 Shell Variables 2.6 Word Expansions 2.6.1 Tilde Expansion 2.6.2 Parameter Expansion Examples 2.6.3 Command Substitution 2.6.4 Arithmetic Expansion Examples 2.6.5 Field Splitting 2.6.6 Pathname Expansion 2.6.7 Quote Removal 2.7 Redirection 2.7.1 Redirecting Input 2.7.2 Redirecting Output 2.7.3 Appending Redirected Output 2.7.4 Here-Document Examples 2.7.5 Duplicating an Input File Descriptor 2.7.6 Duplicating an Output File Descriptor 2.7.7 Open File Descriptors for Reading and Writing 2.8 Exit Status and Errors 2.8.1 Consequences of Shell Errors 2.8.2 Exit Status for Commands 2.9 Shell Commands 2.9.1 Simple Commands 2.9.1.1 Order of Processing 2.9.1.2 Variable Assignments 2.9.1.3 Commands with no Command Name 2.9.1.4 Command Search and Execution 2.9.1.5 Standard File Descriptors 2.9.1.6 Non-built-in Utility Execution 2.9.2 Pipelines Exit Status 2.9.3 Lists Examples 2.9.3.1 Asynchronous AND-OR Lists Exit Status 2.9.3.2 Sequential AND-OR Lists Exit Status 2.9.3.3 AND Lists Exit Status 2.9.3.4 OR Lists Exit Status 2.9.4 Compound Commands 2.9.4.1 Grouping Commands Exit Status 2.9.4.2 The for Loop Exit Status 2.9.4.3 Case Conditional Construct Exit Status 2.9.4.4 The if Conditional Construct Exit Status 2.9.4.5 The while Loop Exit Status 2.9.4.6 The until Loop Exit Status 2.9.5 Function Definition Command Exit Status 2.10 Shell Grammar 2.10.1 Shell Grammar Lexical Conventions 2.10.2 Shell Grammar Rules 2.11 Job Control 2.12 Signals and Error Handling 2.13 Shell Execution Environment 2.14 Pattern Matching Notation 2.14.1 Patterns Matching a Single Character 2.14.2 Patterns Matching Multiple Characters 2.14.3 Patterns Used for Filename Expansion 2.15 Special Built-In Utilities break NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 colon NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 continue NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 dot NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 eval NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 exec NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 exit NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 export NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 readonly NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 return NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 set NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 shift NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 times NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 trap NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 unset NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 3. Utilities admin NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 8 alias NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 ar NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 5 Issue 6 Issue 7 Issue 8 asa NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 at NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 awk NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION Overall Program Structure Expressions in awk Variables and Special Variables Regular Expressions Patterns Special Patterns Expression Patterns Pattern Ranges Actions Output Statements Functions Arithmetic Functions String Functions Input/Output and General Functions User-Defined Functions Grammar Lexical Conventions EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 5 Issue 6 Issue 7 Issue 8 basename NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 batch NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 bc NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION Grammar Lexical Conventions in bc Operations in bc EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 5 Issue 6 Issue 7 Issue 8 bg NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 c17 NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION Standard Libraries External Symbols Header Search Programming Environments EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY cal NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 cat NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 7 Issue 8 cd NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 cflow NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 chgrp NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 chmod NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION Grammar for chmod EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 chown NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 cksum NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 7 Issue 8 cmp NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 7 Issue 8 comm NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 command NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 7 Issue 8 compress NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 cp NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 crontab NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 csplit NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 5 Issue 6 Issue 7 Issue 8 ctags NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 5 Issue 6 Issue 7 Issue 8 cut NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 cxref NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 5 Issue 6 Issue 7 Issue 8 date NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 5 Issue 6 Issue 8 dd NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 5 Issue 6 Issue 7 Issue 8 delta NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION System Date and Time EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 5 Issue 6 Issue 7 Issue 8 df NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 diff NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT Diff Directory Comparison Format Diff Binary Output Format Diff Default Output Format Diff -e Output Format Diff -f Output Format Diff -c or -C Output Format Diff -u or -U Output Format STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 5 Issue 6 Issue 7 Issue 8 dirname NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 7 Issue 8 du NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 echo NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 5 Issue 6 Issue 7 Issue 8 ed NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION Regular Expressions in ed Addresses in ed Commands in ed Append Command Change Command Delete Command Edit Command Edit Without Checking Command Filename Command Global Command Interactive Global Command Help Command Help-Mode Command Insert Command Join Command Mark Command List Command Move Command Number Command Print Command Prompt Command Quit Command Quit Without Checking Command Read Command Substitute Command Copy Command Undo Command Global Non-Matched Command Interactive Global Not-Matched Command Write Command Line Number Command Shell Escape Command Null Command EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 5 Issue 6 Issue 7 Issue 8 env NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 7 Issue 8 ex NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION Initialization in ex and vi Addressing in ex Command Line Parsing in ex Input Editing in ex Scroll <newline> <backslash> <control>-V <control>-W Command Descriptions in ex Abbreviate Append Arguments Change Change Directory Copy Delete Edit File Global Insert Join List Map Mark Move Next Number Open Preserve Print Put Quit Read Recover Rewind Set Shell Source Substitute Suspend Tag Unabbreviate Undo Unmap Version Visual Write Write and Exit Yank Adjust Window Escape Shift Left Shift Right <control>-D Write Line Number Execute Regular Expressions in ex Replacement Strings in ex Edit Options in ex autoindent, ai autoprint, ap autowrite, aw beautify, bf directory, dir edcompatible, ed errorbells, eb exrc ignorecase, ic list magic mesg number, nu paragraphs, para prompt readonly redraw remap report scroll, scr sections shell, sh shiftwidth, sw showmatch, sm showmode slowopen tabstop, ts taglength, tl tags term terse warn window wrapmargin, wm wrapscan, ws writeany, wa EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE Options Standard Input Input Files Asynchronous Events Standard Error Initialization in ex and vi Addressing Command Line Parsing in ex Input Editing in ex eof Command Descriptions in ex Abbreviate Append Change Change Directory Copy Delete Edit File Global Insert Join List Map Mark Next Open Preserve Print Put Read Recover Rewind Substitute Set Tag Undo Version Write Adjust Window Escape Shift Left and Shift Right <control>-D Write Line Number Execute Regular Expressions in ex Edit Options in ex autoindent, ai autoprint, ap autowrite, aw ignorecase, ic paragraphs, para readonly report showmatch, sm showmode slowopen tags term terse window wrapmargin, wm FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 5 Issue 6 Issue 7 Issue 8 expand NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 expr NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION Matching Expression Identification as Integer or String EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 5 Issue 6 Issue 7 Issue 8 false NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 8 fc NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 5 Issue 6 Issue 7 Issue 8 fg NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 8 file NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 find NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 5 Issue 6 Issue 7 Issue 8 fold NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 fuser NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 7 Issue 8 gencat NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 get NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION System Date and Time Identification Keywords EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 5 Issue 6 Issue 7 Issue 8 getconf NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 5 Issue 6 Issue 7 Issue 8 getopts NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 gettext NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY grep NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 hash NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 7 Issue 8 head NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 iconv NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 id NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 7 Issue 8 ipcrm NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 7 Issue 8 ipcs NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 jobs NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 join NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 kill NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 lex NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION Definitions in lex Rules in lex User Subroutines in lex Regular Expressions in lex Actions in lex EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 link NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 8 ln NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 locale NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 5 Issue 6 Issue 7 Issue 8 localedef NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 logger NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 7 Issue 8 logname NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 8 lp NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 ls NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 5 Issue 6 Issue 7 Issue 8 m4 NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 5 Issue 6 Issue 7 Issue 8 mailx NAME SYNOPSIS Send Mode Receive Mode DESCRIPTION Send Mode Receive Mode OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION Start-Up in mailx Internal Variables in mailx Commands in mailx Declare Aliases Declare Alternatives Change Current Directory Copy Messages Delete Messages Discard Header Fields Delete Messages and Display Echo a String Edit Messages Exit Change Folder Display List of Folders Follow Up Specified Messages Display Header Summary for Specified Messages Display Header Summaries Help Hold Messages Execute Commands Conditionally List Available Commands Mail a Message Direct Messages to mbox Process Next Specified Message Pipe Message Display Message with Header Display Message Quit Reply to a Message or a Message List Retain Header Fields Save Messages Set Variables Invoke a Shell Display Message Size Read mailx Commands From a File Display Beginning of Messages Touch Messages Delete Aliases Undelete Messages Unset Variables Edit Message with Full-Screen Editor Write Messages to a File Scroll Header Display Invoke Shell Command Null Command Display Current Message Number Command Escapes in mailx EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 5 Issue 6 Issue 7 Issue 8 make NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION Makefile Syntax Include Lines Makefile Execution Target Rules Macros Inference Rules Libraries Internal Macros Default Rules EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 5 Issue 6 Issue 7 Issue 8 man NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 5 Issue 7 Issue 8 mesg NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 mkdir NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 5 Issue 7 Issue 8 mkfifo NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 8 more NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION Help Scroll Forward One Screenful Scroll Backward One Screenful Scroll Forward One Line Scroll Backward One Line Scroll Forward One Half Screenful Skip Forward One Line Scroll Backward One Half Screenful Go to Beginning of File Go to End-of-File Refresh the Screen Discard and Refresh Mark Position Return to Mark Return to Previous Position Search Forward for Pattern Search Backward for Pattern Repeat Search Repeat Search in Reverse Examine New File Examine Next File Examine Previous File Go to Tag Invoke Editor Display Position Quit EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 5 Issue 6 Issue 7 Issue 8 msgfmt NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY mv NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 newgrp NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 ngettext NAME SYNOPSIS DESCRIPTION nice NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 nl NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 5 Issue 6 Issue 7 Issue 8 nm NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 nohup NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 7 Issue 8 od NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 5 Issue 6 Issue 7 Issue 8 paste NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 patch NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION Patch File Format Filename Determination Patch Application EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 5 Issue 6 Issue 7 Issue 8 pathchk NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 7 Issue 8 pax NAME SYNOPSIS DESCRIPTION OPTIONS List Mode Format Specifications OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION pax Interchange Format pax Header Block pax Extended Header pax Extended Header Keyword Precedence pax Extended Header File Times ustar Interchange Format cpio Interchange Format cpio Header cpio Filename cpio File Data cpio Special Entries EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE pax Interchange Format pax Archive Character Set Encoding/Decoding ustar Interchange Format cpio Interchange Format cpio Header cpio Filename FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 5 Issue 6 Issue 7 Issue 8 pr NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 printf NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 7 Issue 8 prs NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT Data Keywords STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 5 Issue 6 Issue 7 Issue 8 ps NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 pwd NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 read NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 7 Issue 8 readlink NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY realpath NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY renice NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 5 Issue 6 Issue 7 Issue 8 rm NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 5 Issue 6 Issue 7 Issue 8 rmdel NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 8 rmdir NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 8 sact NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 8 sccs NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 sed NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION Addresses in sed Regular Expressions in sed Editing Commands in sed EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 5 Issue 6 Issue 7 Issue 8 sh NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION Command History List Command Line Editing Command Line Editing (vi-mode) vi Line Editing Insert Mode vi Line Editing Command Mode EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 5 Issue 6 Issue 7 Issue 8 sleep NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 8 sort NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 split NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 strings NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 strip NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 stty NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS Control Modes Input Modes Output Modes Local Modes Special Control Character Assignments Combination Modes Terminal Window Size Informational Queries STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 5 Issue 6 Issue 7 Issue 8 tabs NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 tail NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 talk NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 8 tee NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 test NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 5 Issue 6 Issue 7 Issue 8 time NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 timeout NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY touch NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 tput NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 tr NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE FUTURE DIRECTIONS SEE ALSO CHANGE HISTORY Issue 6 Issue 7 Issue 8 true NAME SYNOPSIS DESCRIPTION OPTIONS OPERANDS STDIN INPUT FILES ENVIRONMENT VARIABLES ASYNCHRONOUS EVENTS STDOUT STDERR OUTPUT FILES EXTENDED DESCRIPTION EXIT STATUS CONSEQUENCES OF ERRORS APPLICATION USAGE EXAMPLES RATIONALE F | 2026-01-13T09:30:39 |
http://tirkarthi.github.io/life/2018/12/28/git-log-2018.html | git log 2018 xtreak blog whoami Comics Poems git log 2018 Dec 28, 2018 I wrote a log last year and it felt good to write so here I am writing back about another year of good and bad stuff. I have divided the year into following subsections that can be skipped as necessary since this post got way more longer since it turned out to be one of my favourite years :) This might seem like a humble brag given the length but you know about my incessant overthinking and worried (polambal) nature ;) Open source promotions Read, write (and travel)? Friends forking on Health regressions Ad-libbing adulthood Open source promotions ( skippable ) tldr - I was interested in open source but it’s hard to work on open source unless you have a substantial project. I found CPython to be mine this year and made good contributions :) Oh boy, where do I begin! As I wrote code for food and fun I had a great year exploring various communities. My first minor but user facing contribution landed this year fixing an auto-completion bug for Leiningen for JDK 9 and above. Then I started doing a lot of Clojure that I wrote a post on fixing JDK 9 and Clojure 1.9 compatibilities. I also did a post on Rust about the top dependencies and got good feedback about it. So this completes the first half of 2018. For a long time I wanted to know how it feels like contributing to a big project and preferably a language implementation. Unlike most years I thought to actually give it a try :) Rust came to my mind given the community but I don’t know Rust good enough and felt more home on Python, language I know more and use at work. Since CPython also moved to GitHub the friction for contribution seemed very less. So I made my first PR which was just fixing several typos I found by running aspell across the docs. It felt good and the process was very good with GitHub reducing the barrier compared to mercurial though I use mercurial at work. I then moved on to easy issues and started subscribing to the tracker. For the first few months emails would flow and I had no sense over what I am reading. It all felt like alien language to move me. But I started picking up one bug at a time which is pure Python and then added test cases though I couldn’t fix them. In some cases while trying to write a test I was able to figure out what to do and started making a PR. So I started reading more and more issues. I added myself to interesting discussions to see how a feature is developed, the tradeoffs taken into consideration and so on. I started using search more and became more active in adding related issues and people to the issue. At one week I was skimming almost all the bugs in the last 5-10 years adding more context. So on September 24 I got an email which I thought was a mail to have me blocked given my activity and turned out to be a promotion mail giving me triager privileges with relevant endorsement. Thanks a lot for the trust upon me. This gave me more motivation to triage bugs that I read pretty much all issues today and contributed around 18 patches as of today with a major contribution to get correct class source code. I also reported my first security vulnerability in cookiejar which I am fixing now. I also triaged around 50+ issues this year. So I can’t ask for a better year :) Read, write and (travel)? I got a Kindle last year so this gave me easy access to books which also eases purchasing books that you will never read. I gifted a couple of books and find books to be good gifts and also easy to select ;) I also started writing more technical posts instead of the emotional rants in 2017 and wrote around 21k words very close to last year. The blog also got improved readership this year with traffic from organic search and posting it on social media handles that encourages me to write more next year with around 10 views per day. As a challenge I thought to attend conferences given my shy and introverted nature. I attended two Python conferences with one in Chennai and other in Hyderabad. For the first time I sort of planned on my own and went somewhere outside of the state to stay there for three days. I got to meet some new friends. I gave two talks on Python this year. So travel and conferences were welcome new additions this year. I am planning to attend more over next year too. Books I read this year : When Breath Becomes Air by Paul Kalanithi Night by Elie Wiesel The Pearl by John Steinbeck The Little Prince by Antoine de Saint-Exupéry Animal Farm by George Orwell Flowers For Algernon: by Daniel Keyes Man’s Search For Meaning by Viktor E Frankl (Reread) To Kill A Mockingbird by Harper Lee Of Mice and Men by John Steinbeck A Walk To Remember by Nicholas Sparks The Stranger by Albert Camus [The Subtle Art of Not Giving a F ck](https://en.wikipedia.org/wiki/The_Subtle_Art_of_Not_Giving_a_F ck) by Mark Manson Born a Crime by Trevor Noah Meditations by Marcus Aurelius Please don’t ask me about current reading list that triggers my tsundoku :( Friends forking on So I turned 25 this year completing almost quarter of a century and thus officially enjoying quarter life crisis. As life moves on with college and career you get different set of friends in each place. Rinse and repeat. This is also the time where people change careers seeking new stuff and get married. So some of my friends got married this year, some of them next year and some got engaged. Aaaaand this is the time you get the dreaded question “So, when are you getting married?”. You have a good job, decent savings as if you have filled all the parameters to a function completing the arity also considering partner to go through programming puns for a lifetime ;) It’s also the time not your family but friends start asking this (me too) that kind of makes you annoyed. You could also have friends who call after several years and you can pretty much guess they are getting married ;) So yeah there it is with people moving on with new family, job, country, etc. Time flies and it’s like I blinked and I am 25 . Fortunately, there are no regressions this year among people and I have less to rant about. I will continue with the answer of await marriage(timedelta(days=2*365)) and possibly get to this post once done to fix the TODO. Health regressions Nothing critical in short term but symptoms of long term issues Now we come to the darker aspects of the year. From time to time I get advice to sleep early and stretch out a little given the nature of my bob with no physical activity. Developers and pretty much many creative jobs have the kind of flow state where you are hooked and can go on for prolonged sessions fixing bugs. It’s cool when you get there but you also start developing some bad habits over the course. Like one example is that interesting bugs require me to sit for a long time that when you have the urge to piss you sort of defer to a point where you use some cause like going to a meeting or something to take a piss. Drinking water is another one where things are neglected over short term that look great and get back to you on the long term. I used to fantasise over long nights and sitting for a long time that seemed like I was too productive at night (in fact I am) but caused me inconsistent sleep cycles and hurts both eyes and back. This is not about staying up at night but about consistent and peaceful sleep cycles. There is also a nature of mine where I tend to treat my body as an artifact where it just works and it’s fine ignoring some symptoms that are minor but can end up in deep vicious habits that are hard to change over the course of time. I wrote about it last year. I have little improvement over this. I don’t have a clear plan over this or I am not going to a buy a shoe to go for a run tomorrow morning. Open source also takes a similar route that there is very thin line between motivation and obsession that can lead you to make unhealthy expectations about yourself though community knows it’s volunteered and time. I need to find some balance over stop answering emails at times to relax. This might sound crazy and yeah I can hear you saying if you gotta sleep then sleep, need to take a piss? then take a piss. But I think people who are over these habits know it’s kind of hard to give up and hope I get better (at least not worse) next year. Ad-libbing adulthood This kind of follows the same pattern as forking on section where you have responsibilities to take care of like learning to invest, plan your future that had been low priority factors when you started with a career. It’s not about churning away money but it’s a phase where it can happen. Next year my savings are going for home construction and I am back to ground zero of savings. In fact I have to also keep up with the lifestyle I am living (not a jones currently) to make sure I adapt with time and also not to worry too much about them in the due course of responsibility. It sort of felt adulthood would ensure automatic maturity over time but still I am not good at handling some scenarios and responsibilities. I will leave this here with thoughts from Calvin’s dad . Conclusion So there it is a great year with the traditional concerned thoughts around the end giving me points to improve. Thanks everyone who got until here. Writing could have been little long and unexpected positivity out of my blog. Do let mw know about the post. I also have disqus emojis enabled for the site. Wishing you a pretty rad year ahead. P.S. Don’t make off-by-one jokes about early new year wish please :) $ git merge 2018 $ git checkout -b 2019 Please enable JavaScript to view the comments powered by Disqus. xtreak blog xtreak blog tir.karthi@gmail.com tirkarthi tirkarthi A blog about programming, mistakes and eureka | 2026-01-13T09:30:39 |
https://opensource.com/resources/what-open-source | What is open source? | Opensource.com Skip to main content User account menu Log in RSS Main navigation Articles Resources What is open source? The open source way Projects and applications Organizations Open source alternatives Alternatives to Acrobat Alternatives to AutoCAD Alternatives to Dreamweaver Alternatives to Gmail Alternatives to MATLAB Alternatives to Minecraft Alternatives to Google Photos Alternatives to Photoshop Alternatives to Skype Alternatives to Slack Alternatives to Trello More... Linux Downloads Frequently Asked Questions Search What is open source? Image by: Opensource.com The term open source refers to something people can modify and share because its design is publicly accessible. The term originated in the context of software development to designate a specific approach to creating computer programs. Today, however, "open source" designates a broader set of values—what we call " the open source way ." Open source projects, products, or initiatives embrace and celebrate principles of open exchange, collaborative participation, rapid prototyping, transparency, meritocracy, and community-oriented development. What is open source software? Open source software is software with source code that anyone can inspect, modify, and enhance. "Source code" is the part of software that most computer users don't ever see; it's the code computer programmers can manipulate to change how a piece of software—a "program" or "application"—works. Programmers who have access to a computer program's source code can improve that program by adding features to it or fixing parts that don't always work correctly. What's the difference between open source software and other types of software? More Great Content Free online course: RHEL technical overview Learn Advanced Linux Commands Download Cheat Sheets Find an Open Source Alternative Read Top Linux Content Check out open source resources Some software has source code that only the person, team, or organization who created it—and maintains exclusive control over it—can modify. People call this kind of software "proprietary" or "closed source" software. Only the original authors of proprietary software can legally copy, inspect, and alter that software. And in order to use proprietary software, computer users must agree (usually by signing a license displayed the first time they run this software) that they will not do anything with the software that the software's authors have not expressly permitted. Microsoft Office and Adobe Photoshop are examples of proprietary software. Open source software is different. Its authors make its source code available to others who would like to view that code, copy it, learn from it, alter it, or share it. LibreOffice and the GNU Image Manipulation Program are examples of open source software. As they do with proprietary software, users must accept the terms of a license when they use open source software—but the legal terms of open source licenses differ dramatically from those of proprietary licenses. Open source licenses affect the way people can use, study, modify, and distribute software. In general, open source licenses grant computer users permission to use open source software for any purpose they wish . Some open source licenses—what some people call "copyleft" licenses—stipulate that anyone who releases a modified open source program must also release the source code for that program alongside it. Moreover, some open source licenses stipulate that anyone who alters and shares a program with others must also share that program's source code without charging a licensing fee for it. By design, open source software licenses promote collaboration and sharing because they permit other people to make modifications to source code and incorporate those changes into their own projects. They encourage computer programmers to access, view, and modify open source software whenever they like, as long as they let others do the same when they share their work. Is open source software only important to computer programmers? No. Open source technology and open source thinking both benefit programmers and non-programmers. Because early inventors built much of the Internet itself on open source technologies—like the Linux operating system and the Apache Web server application —anyone using the Internet today benefits from open source software. Every time computer users view web pages, check email, chat with friends, stream music online, or play multiplayer video games, their computers, mobile phones, or gaming consoles connect to a global network of computers using open source software to route and transmit their data to the "local" devices they have in front of them. The computers that do all this important work are typically located in faraway places that users don't actually see or can't physically access—which is why some people call these computers "remote computers." More and more, people rely on remote computers when performing tasks they might otherwise perform on their local devices. For example, they may use online word processing, email management, and image editing software that they don't install and run on their personal computers. Instead, they simply access these programs on remote computers by using a Web browser or mobile phone application. When they do this, they're engaged in "remote computing." Some people call remote computing "cloud computing," because it involves activities (like storing files, sharing photos, or watching videos) that incorporate not only local devices but also a global network of remote computers that form an "atmosphere" around them. Cloud computing is an increasingly important aspect of everyday life with Internet-connected devices. Some cloud computing applications, like Google Apps, are proprietary. Others, like ownCloud and Nextcloud , are open source. Cloud computing applications run "on top" of additional software that helps them operate smoothly and efficiently, so people will often say that software running "underneath" cloud computing applications acts as a " platform " for those applications. Cloud computing platforms can be open source or closed source. OpenStack is an example of an open source cloud computing platform. Why do people prefer using open source software? People prefer open source software to proprietary software for a number of reasons, including: Control. Many people prefer open source software because they have more control over that kind of software. They can examine the code to make sure it's not doing anything they don't want it to do, and they can change parts of it they don't like. Users who aren't programmers also benefit from open source software, because they can use this software for any purpose they wish—not merely the way someone else thinks they should. Training. Other people like open source software because it helps them become better programmers . Because open source code is publicly accessible, students can easily study it as they learn to make better software. Students can also share their work with others, inviting comment and critique, as they develop their skills. When people discover mistakes in programs' source code, they can share those mistakes with others to help them avoid making those same mistakes themselves. Security. Some people prefer open source software because they consider it more secure and stable than proprietary software. Because anyone can view and modify open source software, someone might spot and correct errors or omissions that a program's original authors might have missed. And because so many programmers can work on a piece of open source software without asking for permission from original authors, they can fix, update, and upgrade open source software more quickly than they can proprietary software. Stability. Many users prefer open source software to proprietary software for important, long-term projects. Because programmers publicly distribute the source code for open source software, users relying on that software for critical tasks can be sure their tools won't disappear or fall into disrepair if their original creators stop working on them. Additionally, open source software tends to both incorporate and operate according to open standards. Community. Open source software often inspires a community of users and developers to form around it. That's not unique to open source; many popular applications are the subject of meetups and user groups. But in the case of open source, the community isn't just a fanbase that buys in (emotionally or financially) to an elite user group; it's the people who produce, test, use, promote, and ultimately affect the software they love. Doesn't "open source" just mean something is free of charge? No. This is a common misconception about what "open source" implies, and the concept's implications are not only economic . Open source software programmers can charge money for the open source software they create or to which they contribute. But in some cases, because an open source license might require them to release their source code when they sell software to others, some programmers find that charging users money for software services and support (rather than for the software itself) is more lucrative. This way, their software remains free of charge, and they make money helping others install, use, and troubleshoot it. While some open source software may be free of charge, skill in programming and troubleshooting open source software can be quite valuable . Many employers specifically seek to hire programmers with experience working on open source software. What is open source "beyond software"? At Opensource.com, we like to say that we're interested in the ways open source values and principles apply to the world beyond software . We like to think of open source as not only a way to develop and license computer software, but also an attitude . Approaching all aspects of life " the open source way " means expressing a willingness to share, collaborating with others in ways that are transparent (so that others can watch and join too), embracing failure as a means of improving, and expecting—even encouraging—everyone else to do the same. It also means committing to playing an active role in improving the world, which is possible only when everyone has access to the way that world is designed. The world is full of "source code"— blueprints , recipes , rules —that guide and shape the way we think and act in it. We believe this underlying code (whatever its form) should be open, accessible, and shared—so many people can have a hand in altering it for the better. Here, we tell stories about the impact of open source values on all areas of life— science , education , government , manufacturing , health, law, and organizational dynamics . We're a community committed to telling others how the open source way is the best way, because a love of open source is just like anything else: it's better when it's shared. Where can I learn more about open source? We've compiled several resources designed to help you learn more about open source. We recommend you read our open source FAQs, how-to guides, and tutorials to get started. This work is licensed under a Creative Commons Attribution-Share Alike 4.0 International License. About This Site The opinions expressed on this website are those of each author, not of the author's employer or of Red Hat. Opensource.com aspires to publish all content under a Creative Commons license but may not be able to do so in all cases. You are responsible for ensuring that you have the necessary permission to reuse any work on this site. Red Hat and the Red Hat logo are trademarks of Red Hat, Inc., registered in the United States and other countries. A note on advertising: Opensource.com does not sell advertising on the site or in any of its newsletters. Copyright © 2021 Red Hat, Inc. Legal Privacy Policy Terms of use | 2026-01-13T09:30:39 |
https://docs.traefik.io/ | Traefik Proxy Documentation - Traefik Skip to content Initializing search Product Documentation Traefik Hub Kubernetes-Native API Management Traefik Enterprise The API Gateway Cloud Natives Trust Initializing search Traefik GitHub What is Traefik What is Traefik Table of contents Personas Core Concepts How to Use the Documentation Features Getting Started Getting Started Overview Configuration Introduction Quick Start Quick Start Kubernetes Docker Setup Setup Kubernetes Docker Swarm Expose Expose Overview Kubernetes Docker Swarm Secure Secure Secure Access with JWT Secure Access with OIDC Secure Access with a WAF Observe Observe Overview Logs & Access Logs Metrics Tracing Extend Govern Migrate Migrate Ingress NGINX to Traefik Traefik v3 minor migrations Traefik v2 to v3 Traefik v2 to v3 Migration guide Configuration changes for v3 Traefik v2 minor migrations Traefik v1 to v2 Reference Reference Install Configuration Install Configuration Boot Environment Configuration Discovery Configuration Discovery Overview Kubernetes Kubernetes Kubernetes Gateway API Kubernetes CRD Kubernetes Ingress Kubernetes Ingress NGINX Knative Docker Swarm Hashicorp Hashicorp Nomad Consul Consul Catalog KV Stores KV Stores Redis Consul etcd ZooKeeper Others Others File ECS HTTP EntryPoints API & Dashboard TLS TLS Certificate Resolvers Certificate Resolvers Overview ACME Tailscale SPIFFE OCSP Observability Observability Metrics Tracing Logs & AccessLogs Health Check (CLI & Ping) Options List Routing Configuration Routing Configuration Common Configuration Common Configuration Configuration Methods HTTP HTTP Routing Routing Router Rules & Priority Observability Multi-Layer Routing Load Balancing Load Balancing Service ServersTransport TLS TLS Overview TLS Certificates TLS Options Middlewares Middlewares Overview AddPrefix APIKey BasicAuth Buffering Chain Circuit Breaker Compress ContentType DigestAuth Distributed RateLimit Errors ForwardAuth GrpcWeb Headers HMAC IPAllowList InFlightReq JWT LDAP Token Introspection Client Credentials OIDC OPA PassTLSClientCert RateLimit RedirectRegex RedirectScheme ReplacePath ReplacePathRegex Retry StripPrefix StripPrefixRegex WAF TCP TCP Routing Routing Router Rules & Priority Service ServersTransport TLS Middlewares Middlewares Overview InFlightConn IPAllowList UDP UDP Routing Routing Router Rules & Priority Service Kubernetes Kubernetes Gateway API Kubernetes CRD Kubernetes CRD HTTP HTTP IngressRoute Service TraefikService ServersTransport Middleware TLSOption TLSStore TCP TCP IngressRouteTCP ServersTransportTCP MiddlewareTCP TLSOption TLSStore UDP UDP IngressRouteUDP Ingress Ingress NGINX Knative Label & Tag Providers Label & Tag Providers Docker Swarm Consul Catalog Nomad ECS KV File Security Security Request Path Content-Length Multi-Tenant Kubernetes Deprecation Notices Deprecation Notices Releases Features User Guides User Guides FastProxy Kubernetes and Let's Encrypt Kubernetes and cert-manager gRPC Examples WebSocket Examples Contributing Contributing Thank You! Submitting Issues Submitting PRs Security Building and Testing Documentation Data Collection Advocating Maintainers FAQ GitHub Table of contents Personas Core Concepts How to Use the Documentation What is Traefik? ¶ Traefik is an open-source Application Proxy and the core of the Traefik Hub Runtime Platform. If you start with Traefik for service discovery and routing, you can seamlessly add API management , API gateway , AI gateway , and API mocking capabilities as needed. For a detailed comparison of all Traefik products and their capabilities, see our Product Features Comparison . With 3.3 billion downloads and over 55k stars on GitHub, Traefik is used globally across hybrid cloud, multi-cloud, on prem, and bare metal environments running Kubernetes, Docker Swarm, AWS, the list goes on . Here’s how it works—Traefik receives requests on behalf of your system, identifies which components are responsible for handling them, and routes them securely. It automatically discovers the right configuration for your services by inspecting your infrastructure to identify relevant information and which service serves which request. Because everything happens automatically, in real time (no restarts, no connection interruptions), you can focus on developing and deploying new features to your system, instead of configuring and maintaining its working state. From the Traefik Maintainer Team When developing Traefik, our main goal is to make it easy to use, and we're sure you'll enjoy it. Personas ¶ Traefik supports different needs depending on your background. We keep three user personas in mind as we build and organize these docs: Beginners : You are new to Traefik or new to reverse proxies. You want simple, guided steps to set things up without diving too deep into advanced topics. DevOps Engineers : You manage infrastructure or clusters (Docker, Kubernetes, or other orchestrators). You integrate Traefik into your environment and value reliability, performance, and streamlined deployments. Developers : You create and deploy applications or APIs. You focus on how to expose your services through Traefik, apply routing rules, and integrate it with your development workflow. Core Concepts ¶ Traefik’s main concepts help you understand how requests flow to your services: Entrypoints are the network entry points into Traefik. They define the port that will receive the packets and whether to listen for TCP or UDP. Routers are in charge of connecting incoming requests to the services that can handle them. In the process, routers may use pieces of middleware to update the request or act before forwarding the request to the service. Services are responsible for configuring how to reach the actual services that will eventually handle the incoming requests. Providers are infrastructure components, whether orchestrators, container engines, cloud providers, or key-value stores. The idea is that Traefik queries the provider APIs in order to find relevant information about routing, and when Traefik detects a change, it dynamically updates the routes. These concepts work together to manage your traffic from the moment a request arrives until it reaches your application. How to Use the Documentation ¶ Navigation : Each main section focuses on a specific stage of working with Traefik - installing, exposing services, observing, extending & migrating. Use the sidebar to navigate to the section that is most appropriate for your needs. Practical Examples : You will see code snippets and configuration examples for different environments (YAML/TOML, Labels, & Tags). Reference : When you need to look up technical details, our reference section provides a deep dive into configuration options and key terms. Info Have a question? Join our Community Forum to discuss, learn, and connect with the Traefik community. Using Traefik OSS in production? Consider upgrading to our API gateway ( watch demo video ) for better security, control, and 24/7 support. Just need support? Explore our 24/7/365 support for Traefik OSS . Next Features Traefik Labs • Copyright © 2016-2026 Made with Material for MkDocs | 2026-01-13T09:30:39 |
https://www.charterworks.com/tag/ai/ | AI - Charter - Future of Work, AI, Management, Hybrid Try Charter Pro for $1 Latest Topics AI DEI Flexible Work Management Societal Issues Resources Briefing Work Tech Research Playbooks Case Studies Toolkits, Scripts, and other Resources Solutions Charter Pro Charter Forum Charter Pro for Teams Advisory + Strategic Services Events Upcoming and Past The AI Download Charter Cortados Leading With AI Masterclass Skills Accelerators Strategy Briefings Webinars Workplace Summit About Try Charter Pro for $1 Sign In AI Charter's latest research, reporting, and interviews on artificial intelligence (AI) and its applications and implications for work, management, jobs, leadership, and workplaces. Pro Briefing AI How AI will reshape workers’ identity and professional pride By Kevin J. Delaney Pro AI vibe coding The buzz about Claude Code, and what it means By Jacob Clemente Pro Insights Leadership ‘Do the hardest work first:’ Harvey’s Katie Burke on moving from CHRO to COO By Jena McGregor Pro Insights AI Six expert AI and work predictions for 2026 By Jacob Clemente Pro Insights AI What we know about AI now we didn’t a year ago By Jacob Clemente Pro Briefing 2025 Our most-read Charter Pro articles of 2025 By Kevin J. Delaney Pro Insights CHRO Five ways the chief people officer role evolved in 2025 By Jena McGregor Pro Briefing Events Our top takeaways from 2025 By Kevin J. Delaney Pro AI Jobs Charter Leadership Forum: What makes a good job in the age of AI By Charter Leadership Forum Pro Steal this idea Coaching Steal this idea: LinkedIn’s ‘coaching for all’ benefit By Jacob Clemente Pro Ideas uncertainty Three things leaders must do in 2026 to help manage uncertainty By Brian Elliott Pro Insights AI Why you should think alone before using AI By Jacob Clemente 1 of 28 → Insights Books Interviews Charter on TIME Research Connect Events Topics Artificial Intelligence Hybrid Work DEI Leadership Charter Pro Become a Member Support Sign In Search Contact Partnerships General Inquiries Company About Careers Press Newsletters Charter Briefing Charter Works Inc. © 2025 Privacy Terms of Service | 2026-01-13T09:30:39 |
https://www.timeforkids.com/privacy-policy/#_Toc54003735 | TIME for Kids | Privacy Policy Skip to main content Get a Quote Subscribe Articles by Grade level Grades K-1 Articles Grade 2 Articles Grades 3-4 Articles Grades 5-6 Articles Topics Animals Arts Ask Angela Books Business Careers Community Culture Debate Earth Science Education Election 2024 Engineering Environment Food and Nutrition Games Government History Holidays Inventions Movies and Television Music and Theater Nature News People Places Podcasts Science Service Stars Space Sports The Human Body The View Transportation Weather World Young Game Changers Your $ Financial Literacy Content Grade 4 Edition Grade 5-6 Edition For Grown-ups Resource Spotlight Also from TIME for Kids: Log In role: none user_age: none editions: The page you are about to enter is for grown-ups. Enter your birth date to continue. Month (MM) 01 02 03 04 05 06 07 08 09 10 11 12 Year (YYYY) 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949 1950 1951 1952 1953 1954 1955 1956 1957 1958 1959 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025 2026 Submit SUBSCRIBE NOW AND SAVE TODAY! Privacy Policy This Privacy Policy was last updated on June 8, 2021. TABLE OF CONTENTS Note to Parents and Teachers about Our Data Collection from Kids The Information We Collect How We Use the Information We Collect Disclosure of Information. Third Party Websites Your California Privacy Rights: Notice to California Customers. Special Information for Nevada Residents. Your Opt-Out Choices Security of Personal Information. Retention of Personal Information. Changes to this Privacy Policy. How to Contact Us. Your privacy is important to us. This Privacy Policy describes how Time for Kids (“TFK,” “we,” or “our”) collects, uses, and discloses information when you interact with us, including via our website ( https://www.timeforkids.com/ ), mobile apps, email newsletters, online subscriptions, other product offerings, and any other services that display this Privacy Policy (collectively referred to as the “Services”). This Privacy Policy also applies to any offline data collection, such as the contact information you provide to create or update your print subscriptions. In this Policy, unless otherwise indicated, “personal information” means information that identifies, relates to, describes, is reasonably capable of being associated with, or could reasonably be linked, directly or indirectly, with a particular individual. Individuals from different countries or jurisdictions may have different rights with respect to their personal information. In particular, the European Union Privacy Policy applies to individuals in the European Union, United Kingdom, Switzerland, Norway, Lichtenstein, Iceland, Australia, and New Zealand in lieu of this Privacy Policy. We reserve the ability to limit our response to any request to exercise your rights based on the law that is applicable to you. Note to Parents and Teachers about Our Data Collection from Kids If you have questions about how TFK addresses the Children’s Online Privacy Protection Act (“COPPA”) (or US-state equivalents) or the Family Education Rights and Privacy Act (“FERPA”), please contact us using the contact information below. TFK is a teaching tool designed for teachers and their students, and parents and their children. TFK offers news and editorial content tailored to specific age ranges, companion materials such as quizzes and teaching aides, and the ability to take advantage of TFK’s partnerships with other companies that offer educational content for children. Parents and teachers create accounts with TFK to access these materials and may distribute them to students or children using the links that TFK provides and/or Google Classroom (teachers must have their own accounts with Google Classroom to take advantage of this integration). Parents and teachers can access their accounts here . We have taken steps numerous steps to minimize our data collection: TFK does not collect any information that personally identifies students or children, such as name. Nor are we capable of identifying students or children based on the information we do receive. Furthermore, the TFK website does not use third-party integrations, tracking technologies, or cookies that collect information to deliver personalized advertising. The TFK website uses Google Analytics to collect information about how users interact with the website. Having this information is important because it allows TFK to understand what works (or doesn’t) on the website. Google Analytics collects device identifiers, and if a child visits the TFK website on their own device or is given a device by a teacher or parent (for example, to read an article assigned by a teacher), Google Analytics will collect information about that device and how the user interacts with the website. The device identifiers Google Analytics collects do not personally identify children, and TFK does not use them as “persistent identifiers” capable of tracking a user across the internet. TFK makes its teaching aides and other resources available to parents and teachers as downloadable files or links to Google Forms. Teachers with Google Classroom accounts have the option to send a teaching aide to their Google Classroom account. In no event does TFK collect information about a student or child from these teaching aides, Google Forms, or the Google Classroom integration. Parents and teachers should consult Google’s privacy notices for more information about how Google may collect information from them. TFK may give parents and teachers the opportunity to use other companies’ services via links on the TFK website. While TFK offers links to those services, TFK does not collect any information from them about students or children. The Services do not display advertising or collect information to display targeted advertising on third-party websites or apps. The Information We Collect We collect the following types of personal information. Personal Identifiers : When you sign up for an account or make a purchase, we collect: Name, phone number, email address, contact address, and institutional affiliation (if you are a teacher). Credit card number (through a service provider). You have the option to store this information as part of your account. Commercial Information : When you engage in transactions with us, we create records of Services purchased and obtain payment information. Internet or Other Electronic Network Activity Information : We or external parties operating on our behalf collect information about the device you use to access our Services, such as your IP address, a device ID, and information about your web browser. Audio, electronic, visual, thermal, olfactory, or similar information : If you contact us via phone, we may record the call. We will notify you if a call is being recorded at the beginning of the call. Education information : We collect education information you voluntarily provide. Geolocation Data : We collect your IP address automatically when you use our Services, from which we or external parties operating on our behalf may be able to determine your general location. Information you give us about yourself or others : We collect information that you give us about yourself or others directly, including personal identifiers, such as name and other contact details; commercial information such as payment details and order history; and audio information if you contact us via telephone for customer service purposes. You give information to us directly when, for example, you register for the Services. You may give us personal information about other people, for example, when you fill out an order form and provide teacher names or sign up a friend for a gift subscription. Please ensure you have others’ permission to give us their personal information. The types of personal information that we may collect in this context include recipient’s name, address, e-mail address and telephone number. Please ensure that you notify the person whose information you are providing to us. Information we collect automatically : When you interact with our Services, we (and our partners who provide analytics services i.e, Google Analytics) automatically collect certain network or other activity information, including through the use of cookies, to provide you with the Services and to analyze your use of the Services. For example, we collect IP addresses and device identifiers, including general location data derived from your IP address, and information about the webpages you view and how you move through our Services, how you reached our Services, how you interact with our social media pages, and how you interact with our email communications. We use Google Analytics for these purposes. Google Analytics uses its own cookies. These cookies are only used to improve how our Services works. You can find out more information about Google Analytics cookies here . You can prevent the use of Google Analytics relating to your use of our Services by downloading and installing the browser plugin available here . TFK does not use third parties to collect information for advertising purposes. Please note that some of the information we request from you is required in order for you to use our Services. If you do not wish to provide such information to us, you are not obligated to, but as a result you may not be able to use the particular Service. However, some of the information we request from you is optional. This means that you can elect not to provide it to us and you will still be able to use the Service. If not all the information we request on a form is required, we may identify the required information to you such as by displaying an asterisk (*) next to the field where we request the required information. How We Use the Information We Collect We may use the information we collect for the following purposes: Provide the Services: Deliver the Services. Establish and administer your account, including conducting billing and invoicing, contacting you about the expiry of your subscription and sending you service messages about your subscription. For example, once you are subscribed, we may store your subscription information, including its start date, renewal date, pricing, publication, and any customer service contacts you may have with us. Authenticate access to your account. For example, you may provide us with a username and password to get access to your account. Perform maintenance and operations, including management of the network and devices supporting the Services and our systems. Provide technical support and assure quality of customer service interactions. Facilitate hardware and software upgrades for devices and systems. Enable your participation in surveys, sweepstakes, contests, and promotions. Communicate with You: Respond to your inquiries. Personalize communications. Send you service-related announcements, such as when we make changes to subscriber agreements, or to contact you about your account. Market our Services, such as by offering you products, programs or services that may be of interest to you, and keeping you informed of new happenings at TFK. Make Improvements to Our Products and Services: Identify and develop new products and services. Improve the design of our Services. Understand how our Services are used, including by creating measurement and analytics reports. Investigate Theft or Other Illegal Activities and Ensure a Secure Online Environment: Detect the unauthorized use or abuse of the Service. Protect you and other subscribers from fraudulent, abusive, unlawful use of, or subscription to, the Service. Protect our rights, our personnel, and our property. Comply with applicable law. We and our partners ( i.e., Google Analytics) use cookies, tags, pixels, web beacons, or other means of collecting information automatically from users for analytics purposes only. Disclosure of Information Publicly: If you choose to submit content (e.g., a “letter to the editor” or a comment or other submission on our social media pages), and you give us your consent, we may publish your name, screen name and the information you provided to us, which will be public. TFK’s website does not have community forums or other features that enabled user-generated submissions, and there are no means by which children can publicly post content. Affiliates: We may transfer information to our affiliates, including TIME USA, LLC for internal management and administrative purposes where necessary for the performance or conclusion of our contractual obligations to you or for your benefit. We may combine information from the Services together and with other information we obtain from our business records. Sale or Merger of Business : We may transfer to another entity or its affiliates or service providers some or all information about you in connection with, or during negotiations of, any merger, acquisition, sale of assets or any line of business, change in ownership control, or financing transaction. We cannot promise that an acquiring party or the merged entity will have the same privacy practices or treat your information the same as described in this Policy. Service Providers : We may disclose personal information to our service providers, which are companies that process information on our behalf, without your consent, to deliver the Service, and conduct business activities. We require our service providers to treat the information we disclose to them, or that they collect on our behalf, as confidential and to use the information only for the purposes for which they have been engaged. We engage with service providers to assist us with the following activities. Managing subscriptions, fulfilling orders, and delivering communications. Billing and payment processing, including billing and collection providers, such as payment processors and organizations that assist us in assessing your credit and payment status. Auditing and accounting. Professional consulting, such as law firms and firms that supply project-based resources and assistance. Analyzing web traffic. For more information, see our disclosure about our use of Google Analytics, above. We do not collect information from children for advertising purposes, and the device information we collect when a child uses our website does not personally identify the child. Securing our Services, such as entities that assist with security incident verification and response, service notifications, and fraud prevention. Managing information technology, such as entities that assist with website design, hosting, and maintenance, data and software storage, and network operation. There are limited circumstances in which the service provider collects data directly from you where its privacy policies may also apply. Authorities : We will disclose information we maintain when required to do so by law, for example, in response to a court order or a subpoena. We also may disclose such information in response to a law enforcement agency’s request. Third Party Websites Our Services provide links to third party websites or offerings where data privacy practices may be different to that of TFK. The inclusion of any link does not imply our endorsement of any other company, its websites, or its products and/or services. These linked websites or offerings have separate and independent privacy policies, which we recommend you read carefully. We have no control over such websites or offerings and therefore have no responsibility or liability for the manner in which the organizations that operate such linked websites or offerings may collect, use, disclose, or otherwise treat your personal information. Your California Privacy Rights: Notice to California Customers California Shine the Light : California’s “Shine the Light” law, Civil Code Section 1798.83, requires businesses that disclose personal information to third parties for those third parties’ direct marketing purposes to give California customers the ability to opt-out of such disclosure. TFK does not disclose the personal information it collects on the Services to third parties for their direct marketing purposes. California Consumer Privacy Act (“CCPA”): The California Consumer Privacy Act (“CCPA”) grants residents of California certain rights with respect to their personal information and requires us to provide such individuals with certain information, as described in this section. Your Rights : Transparency . At the time we collect personal information, you have the right to receive notice of the categories of personal information we collect, and the purposes for which those categories of personal information will be used. Access/Right to Know . You have the right to request access to personal information we collected about you and information regarding the source of that personal information, the purposes for which we collect it, and the third parties and service providers with whom we share it. You can make this access request by going to our California Access/Deletion Page . If you are a print subscriber, you can also access and update much of the personal information we have collected about you through your account page . Deletion . You have the right to request that we erase data we have collected from you. Please note that we may have a reason to deny your deletion request or delete data in a more limited way than you anticipated, e.g., because of a legal obligation to retain it or to provide a good or service that you request. You can make this deletion request by going to our California Access/Deletion Page . Opt-Out of Sale : You have the right to request that we stop “selling” your personal information as that that term is defined in the California Consumer Privacy Act. A “sale” of personal information is defined broadly: “selling, renting, releasing, disclosing, disseminating, making available, transferring, or otherwise communicating orally, in writing, or by electronic or other means, a consumer’s personal information by the business to another business or a third party for monetary or other valuable consideration.” TFK does not sell personal information it collects on the Services. Categories of personal information we collect . We collect the categories of information described above in the “ Information We Collect ” section for the purposes described in the “ How We Use Information ” section. Categories of personal information we disclose . We may disclose any of the categories of personal information listed above and use them for the above-listed purposes or for other business or operational purposes compatible with the context in which the personal information was collected. Our disclosures of personal information include disclosures to our “service providers,” which are companies that we engage for business purposes to conduct activities on our behalf. The categories of service providers with whom we share information and the services they provide are described above. Categories of personal information we “sell” . We do not sell personal information we collect on the Services. You can also make a CCPA access or deletion request by calling the following toll-free number: +1 (888) 914-9661 PIN 430210. Special Information for Nevada Residents Residents of the State of Nevada have the right to opt out of the sale of certain pieces of their information to other companies who will sell or license their information to others. We do not sell personal information we collect on the Services. If you are a Nevada resident and would like more information about our data sharing practices, please contact us using the information below. Your Opt-Out Choices Verification Procedures : We must verify your identity for everyone’s protection. To do so, we may require you to provide us with verification information prior to accessing any records containing personal information about you. We do this by: Asking you to provide personal identifiers we can match against information we may have collected from you previously and confirm your request using the email or telephone number stated in the request; or Having you submit your request through your account page (if you are a subscriber), which will automatically verify your identity and will result in faster processing of your request. If you are a California resident, you may authorize another individual or a business registered with the California Secretary of State, called an authorized agent, to make requests on your behalf. If we receive a request from an authorized agent, we require that the authorized agent verify its identity with us, that you verify your identity with us, and that you or the agent provide us with proof that you authorized the authorized agent in writing to make the request. We will use the information you provide for verification only for the purpose of verification. We may have a reason under the law why we do not have to respond to your request, or respond to it in a more limited way than you anticipated. If we do, we will explain that to you in our response. Your Account and Payment Information : If you are a print subscriber, please visit the Manage Account page to update your contact information and payment method. Marketing and Other Communications : If you wish to unsubscribe from receiving future email marketing from TFK, please use the unsubscribe link that appears at the bottom of our marketing emails. If you are a newsletter subscriber, you may unsubscribe using the unsubscribe options in the newsletter emails. If you prefer not to receive traditional mail or other offline promotions from TFK, please email us here . Please note that even if you opt out of receiving marketing communications from us, we may continue to send you transactional communications about your subscription or orders. Cookie Management and “Do Not Track” : You can control cookies using your web browser’s settings. If you delete your cookies or if you set your browser to decline cookies, some features of the Services may not be available, work, or work as designed. Google Analytics uses its own cookies. These cookies are only used to improve how our Services work. You can find out more information about Google Analytics cookies here . You can prevent the use of Google Analytics relating to your use of our Services by downloading and installing the browser plugin available here . If you delete your cookies, you may also delete your opt-out preferences. Your browser or device may include “Do Not Track” functionality. At this time, TFK does not respond to browser “Do Not Track” signals. Security of Personal Information We have put in place administrative, technical, and physical safeguards to help prevent unauthorized access, maintain data security and correctly use the information we collect. No system can be completely secure, however, and we do not guarantee that unauthorized disclosures and access will not happen. Retention of Personal Information We may retain information, including personal information we collect about you, for different periods of time consistent with the purposes of processing we describe in How We Use the Information We Collect and whether we are subject to a legal obligation to retain certain records. Changes to this Privacy Policy This Privacy Policy may be updated periodically to reflect changes to our information practices. The revised Privacy Policy will be posted on this website with the date of the last modification, and we will notify of the changes if required by the applicable law. We will treat your information in accordance with the privacy policy in place at the time of collection of such information, or as you otherwise indicate your preferences. We encourage you to check whenever you use our Services to see if the policy has been updated. How to Contact Us If you have any questions or concerns about this Privacy Policy, our data practices, or our compliance with applicable law please contact us by writing to us at privacy@time.com , or at: Time USA, LLC Attention: Privacy Officer 3 Bryant Park New York, NY 10036 Toll-free: 800-843-8463 If you are a print subscriber located in the U.S. and have questions about your subscription, please contact us by writing to us at tfkcustserv@cdsfulfillment.com or at: Time Customer Service Attention: Consumer Affairs 3000 University Center Drive Tampa, Florida 33612-6408 Toll-free: 1-877-604-8017 Grown-Ups Continue Navigate the news, together. Discover TIME for Kids for educators and families. Kids Explore Unlock a world of exciting stories. Start reading the news! News for You! Select your grade to begin reading. K-1 2 3-4 5-6 Contact us Privacy policy California privacy Terms of Service Subscribe CLASSROOM INTERNATIONAL © 2026 TIME USA, LLC. All Rights Reserved. Powered by WordPress.com VIP | 2026-01-13T09:30:39 |
https://llvm.org/doxygen/classObjCProtoName.html#afd3a08b8e7f067664ee9834f61ea8353 | LLVM: ObjCProtoName Class Reference LLVM  22.0.0git Public Member Functions | List of all members ObjCProtoName Class Reference #include " llvm/Demangle/ItaniumDemangle.h " Inheritance diagram for ObjCProtoName: This browser is not able to show SVG: try Firefox, Chrome, Safari, or Opera instead. [ legend ] Public Member Functions   ObjCProtoName ( const Node *Ty_, std::string_view Protocol_) template<typename Fn> void  match (Fn F ) const bool   isObjCObject () const std::string_view  getProtocol () const void  printLeft ( OutputBuffer &OB) const override Public Member Functions inherited from Node   Node ( Kind K_, Prec Precedence_= Prec::Primary , Cache RHSComponentCache_= Cache::No , Cache ArrayCache_= Cache::No , Cache FunctionCache_= Cache::No )   Node ( Kind K_, Cache RHSComponentCache_, Cache ArrayCache_= Cache::No , Cache FunctionCache_= Cache::No ) template<typename Fn> void  visit (Fn F ) const   Visit the most-derived object corresponding to this object. bool   hasRHSComponent ( OutputBuffer &OB) const bool   hasArray ( OutputBuffer &OB) const bool   hasFunction ( OutputBuffer &OB) const Kind   getKind () const Prec   getPrecedence () const Cache   getRHSComponentCache () const Cache   getArrayCache () const Cache   getFunctionCache () const virtual bool   hasRHSComponentSlow ( OutputBuffer &) const virtual bool   hasArraySlow ( OutputBuffer &) const virtual bool   hasFunctionSlow ( OutputBuffer &) const virtual const Node *  getSyntaxNode ( OutputBuffer &) const void  printAsOperand ( OutputBuffer &OB, Prec P = Prec::Default , bool StrictlyWorse=false) const void  print ( OutputBuffer &OB) const virtual bool   printInitListAsType ( OutputBuffer &, const NodeArray &) const virtual std::string_view  getBaseName () const virtual  ~Node ()=default DEMANGLE_DUMP_METHOD void  dump () const Additional Inherited Members Public Types inherited from Node enum   Kind : uint8_t enum class   Cache : uint8_t { Yes , No , Unknown }   Three-way bool to track a cached value. More... enum class   Prec : uint8_t {    Primary , Postfix , Unary , Cast ,    PtrMem , Multiplicative , Additive , Shift ,    Spaceship , Relational , Equality , And ,    Xor , Ior , AndIf , OrIf ,    Conditional , Assign , Comma , Default }   Operator precedence for expression nodes. More... Protected Attributes inherited from Node Cache   RHSComponentCache : 2   Tracks if this node has a component on its right side, in which case we need to call printRight. Cache   ArrayCache : 2   Track if this node is a (possibly qualified) array type. Cache   FunctionCache : 2   Track if this node is a (possibly qualified) function type. Detailed Description Definition at line 614 of file ItaniumDemangle.h . Constructor & Destructor Documentation ◆  ObjCProtoName() ObjCProtoName::ObjCProtoName ( const Node * Ty_ , std::string_view Protocol_  ) inline Definition at line 619 of file ItaniumDemangle.h . References Node::Node() . Member Function Documentation ◆  getProtocol() std::string_view ObjCProtoName::getProtocol ( ) const inline Definition at line 629 of file ItaniumDemangle.h . ◆  isObjCObject() bool ObjCProtoName::isObjCObject ( ) const inline Definition at line 624 of file ItaniumDemangle.h . References getName() . Referenced by PointerType::printLeft() , and PointerType::printRight() . ◆  match() template<typename Fn> void ObjCProtoName::match ( Fn F ) const inline Definition at line 622 of file ItaniumDemangle.h . References F . ◆  printLeft() void ObjCProtoName::printLeft ( OutputBuffer & OB ) const inline override virtual Implements Node . Definition at line 631 of file ItaniumDemangle.h . References Node::OutputBuffer . The documentation for this class was generated from the following file: include/llvm/Demangle/ ItaniumDemangle.h Generated on for LLVM by  1.14.0 | 2026-01-13T09:30:39 |
https://www.timeforkids.com/k1/topics/community/ | TIME for Kids | Community | Topic | K-1 Skip to main content Search Articles by Grade level Grades K-1 Articles Grade 2 Articles Grades 3-4 Articles Grades 5-6 Articles Topics Animals Arts Ask Angela Books Business Careers Community Culture Debate Earth Science Education Election 2024 Engineering Environment Food and Nutrition Games Government History Holidays Inventions Movies and Television Music and Theater Nature News People Places Podcasts Science Service Stars Space Sports The Human Body The View Transportation Weather World Young Game Changers Your $ Financial Literacy Content Grade 4 Edition Grade 5-6 Edition For Grown-ups Resource Spotlight Also from TIME for Kids: Log In role: none user_age: none editions: The page you are about to enter is for grown-ups. Enter your birth date to continue. Month (MM) 01 02 03 04 05 06 07 08 09 10 11 12 Year (YYYY) 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949 1950 1951 1952 1953 1954 1955 1956 1957 1958 1959 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025 2026 Submit Community TFK Press Club What's Your Tradition? January 5, 2023 Many people greet the new year with special traditions, from watching fireworks to eating 12 grapes for good luck. Another tradition is the First Day Hikes. They began near Boston, Massachusetts, in 1992, with 380 people. Now, thousands of people… Audio TFK Press Club Want to Write a Profile? December 15, 2022 A profile is a news article that focuses on a person. It can be about a celebrity, a politician, or even an individual in your community who’s doing something noteworthy. Typically, a profile includes information about the person’s career, interests,… Audio TFK Press Club What is Your Photo Story? December 9, 2022 Reporters use writing to tell readers the news. Photojournalists use photographs. Sometimes, the pictures they make appear alongside a news story. But sometimes, the photos take center stage. In a photo essay, a photojournalist can tell a powerful story with… Audio TFK Press Club Can You Go Global? December 1, 2022 This week’s issue of TIME for Kids features news stories about the planet’s population, an international conference, and the World Cup. Each of these stories is about an issue of interest to people worldwide—not just those who live in your… Audio TFK Press Club Where Have You Been? November 10, 2022 On November 2, the northern lights, also called the aurora borealis, were seen in Tromsø, Norway. The colorful display has dazzled people for as long there have been people to see it. For people who live in countries in the… Audio TFK Press Club What's Your Animal Story? November 3, 2022 Sir Väs, a deadly, seven-foot-long king cobra, escaped from its enclosure at the Skansen Aquarium, in Sweden, on October 22. A week later, after a desperate search, staff members were relieved to find that the snake had returned on its… Audio TFK Press Club What Matters to You? October 20, 2022 When getting ready to cast a ballot, voters consider the issues that matter most to them. Then they find out how the candidates feel about those issues. The issues can be local, such as how a community should manage its… Audio TFK Press Club Can You Set the Scene? October 13, 2022 Imagine you’re reading two articles about a Halloween parade. One includes only numerical information: the temperature outside, the number of people in attendance, a ranking of the costumes. The other includes facts, but it also describes the sights and sounds… Audio TFK Press Club Can You Hook Readers? October 6, 2022 Nothing draws a reader into a story like a great lede. A lede is an article’s first sentence or paragraph. It introduces a story, provides key information, and makes a reader want to know more. Sometimes, a lede contains an… Audio Community In the Community September 30, 2022 A community is a place where people live, work, and play. It has homes. It has businesses and schools. What do you have in your community? Stores There are places to shop in a community. Food is sold in… Audio Spanish Posts pagination 1 2 Next Contact us Privacy policy California privacy Terms of Service Subscribe CLASSROOM INTERNATIONAL © 2026 TIME USA, LLC. All Rights Reserved. Powered by WordPress.com VIP | 2026-01-13T09:30:39 |
https://www.docker.com/community/captains | Captains Program | Docker AI AI Docker for AI Simplifying Agent Development Docker Offload Break free of local constraints Docker MCP Catalog and Toolkit Connect and manage MCP tools Docker Model Runner Local-first LLM inference made easy More resources for developers Docker Brings Compose to the Agent Era: Building AI Agents is Now Easy Docker Accelerates Agent Development Read more Products Products Docker Hardened Images Ship with secure, enterprise-ready images Docker Desktop Containerize your applications Docker Hub Discover and share container images Docker Scout Simplify the software supply chain Docker Build Cloud Speed up your image builds Testcontainers Desktop Local testing with real dependencies Testcontainers Cloud Test without limits in the cloud Docker MCP Catalog and Toolkit Connect and manage MCP tools Docker Desktop v4.50 Find out what’s new to Docker Desktop in the latest release Read more Developers Developers Documentation Find guides for Docker products Getting Started Learn the Docker basics Resources Search a library of helpful materials Training Skill up your Docker knowledge Extensions SDK Create and share your own extensions Community Connect with other Docker developers Open Source Explore open source projects Preview Program Help shape the future of Docker Customer Stories Get inspired with customer stories More resources for developers Introducing Docker Model Runner A faster, simpler way to run and test AI models locally Read more Deliver Quickly. Build Securely. Stay Competitive. Meet growing demands for speed and security with integrated, efficient solutions Read more Get the latest Docker news Pricing Support Blog Company Company About Us Let us introduce ourselves What is a Container? Learn about containerization Why Docker Discover what makes us different Trust Find our customer trust resources Partners Become a Docker partner Customer Success Learn how you can succeed with Docker Events Attend live and virtual meet ups Docker Store Gear up with exclusive SWAG Careers Apply to join our team Contact Us We’d love to hear from you Docker Announces SOC 2 Type 2 Attestation & ISO 27001 Certification Learn what this means for Docker security and compliance Read more Search Sign In Get Started Toggle menu Docker Captains Program Help steer Docker into the future We’re on the lookout for passionate developers who love our community just as much as we do. Join the Docker Captains Program About the program Find your Captain About the program What it means to be a Docker Captain Docker Captains are technical experts and passionate community builders who drive Docker’s ecosystem forward. As active contributors and advocates, they share Docker knowledge and help shape Docker products. Program perks Benefits of being a Captain Becoming a Captain opens up opportunities for career growth, networking, and professional development. Our Captains have a direct line to Docker, get beta access to products, receive Docker swag, enjoy community support, and much more. Visibility and recognition Stand out as a Docker expert. Join exclusive events, access Docker customers, and seize networking and career opportunities. Beta access Get your hands on beta versions of Docker products and influence their development. Create unique content before anyone else. Connection with Docker staff Directly interact with Docker staff, ask questions, provide feedback, and gain insider insights. Docker swag and discounts Receive exclusive Docker swag, special access, and discounts on Docker Pro and partner products. Community support Join a private Slack channel to connect with other Docker Captains and staff, share ideas, and solve technical issues. Annual Captains offsites Be a part of annual events with Docker Captains and staff. Discuss Docker developments and collaborate on projects. Education budget Enhance your knowledge and expertise with Docker-related training or courses, covered by an education budget for Captains. Eligibility criteria How to become a Docker Captain Must be 18+ Show technical expertise in Docker and related technologies Demonstrate active community involvement and thought leadership Provide valuable feedback and ideas for Docker’s products and features Possess a strong online presence with a significant audience or following Have a history of significant contributions to the Docker community Abide by the Docker Community Code of Conduct Note: This program is open internationally. Application requirements What you need to apply In addition to the eligibility criteria, Captain applicants should fit into at least one of the following categories: Docker Advisor Be endorsed by a member from the Docker engineering or product team, highlighting your proficiency in Docker technologies. Criteria: A recommendation from a Docker team member. Docker Thought Leader Demonstrate your influence online, showcasing leadership in the Docker realm. Criteria: At least 5,000 monthly views across blogs, social media, or other online avenues. Docker Community Contributor Show significant contributions to the Docker community through content creation, event participation, or open-source engagements. Criteria: 5+ years of experience in community leadership or aiding individuals online. Special exceptions Sail the extra mile Even if you don’t meet all the criteria, you might still be called for an interview if: You fit multiple categories A Docker member or Captain vouches for you You are part of an underrepresented group You’re located in a geographical region of particular interest Your application is innovative, and you show genuine enthusiasm Renewal Process Looking to renew your Captain status? Docker Captains enjoy a term of one year. To qualify for renewal, Captains need to persistently meet their joining criteria and continuously contribute to the Docker community. Renewals are evaluated by Docker at the end of each term. More information Still have questions? Connect with our Developer Relations team in our Community Slack. Join our Docker Slack Community Search Expertise Select Agentic AI (1) Al/ML (70) CI/CD (167) Cloud Computing (1) Container security (1) DevOps (1) Developer productivity (163) Docker Extensions (1) Docker Hardened Images (1) Kubernetes (141) MCP (1) Microservices (1) Modern Application Development (146) Observability (103) Software Secure Supply Chain (72) Software Supply Chain Security (1) Tech trends (AI, Blockchain, Web3, etc) (18) WebAssembly (16) Location Select Argentina (1) Australia (5) Austria (1) Brasil (1) Brazil (17) Bulgaria (1) Canada (7) Colombia (3) Costa Rica (2) Cyprus (1) Denmark (2) Finland (1) France (5) Germany (17) Hungary (1) India (35) Ireland (1) Israel (1) Italy (4) Japan (3) Lithuania (1) Malaysia (3) Mexico (3) Nederland (1) Nepal (3) Netherlands (2) Norway (1) Perú (1) Poland (3) Portugal (1) Romania (1) Scotland (1) Singapore (1) South Africa (1) South Korea (3) Spain (5) Sweden (2) Switzerland (3) Taiwan (2) Turkey (4) UK (5) USA (41) United Arab Emirates (1) United Kingdom (5) Uruguay (1) Available for Select Blog posts (169) Conference Talks (1) Conferences (Booth demos) (48) Consulting (85) Meeting Clients (8) Meetup events (1) Meetups (168) Product briefings (121) Public speaking (173) Social media (45) Video Content (125) Workshops (1) Writing tutorials (153) Seoul, South Korea GeunCheol Yeom SRE Engineer Karrot More about GeunCheol Rome, Italy Andrea Gallegati DevSecOps Engineer and Educator IDS AirNav – an ENAV Group Company More about Andrea Sydney, Australia Geshan Manandhar Senior Software Engineer Simply Wall St. More about Geshan Chicago, IL, USA Advait Patel Senior Site Reliability Engineer Broadcom More about Advait Austin, TX, USA Balajee Asish Brahmandam Senior Engineering Manager Charles Schwab More about Balajee Cary, USA Neal Patel Senior Software Engineer Siimpl.io More about Neal Hyderabad, India Abhishek Veeramalla Principal Software Engineer Red Hat More about Abhishek Banglore, India Akanksha Buchke Senior Software Engineer Intuit More about Akanksha Tokyo, Japan Seito Horiguchi Web Engineer / Tech YouTuber Digital Garage Inc. / BugFix LLC More about Seito Fairfax, VA, USA Brandon Mitchell Open Source Developer Independent More about Brandon Antonis Kalipetis Antonis is a Senior Software Engineer at efood.gr — the leading online food delivery service in Greece. He is a Python lover and developer who helps teams embrace containers and improve their development workflow. He loves automating stuff and sharing knowledge around all things containers, DevOps and developer workflows. You can follow him on Twitter @akalipetis. Software Engineer Platform.sh More about Antonis New Delhi, India Saurav Jain Senior Developer Community Manager Apify More about Saurav Provo, UT, USA Rob Richardson Portfolio Architect The Church of Jesus Christ of Latter-day Saints More about Rob Banglore, India Sangam Biradar DevSecRel Specialist Independent More about Sangam Bucharest, Romania Flavius Dinu Developer Advocate Spacelift More about Flavius Glasgow, Scotland Alan Torrance Senior Director of Software Engineering J.P. Morgan Payments More about Alan Ankara, Turkey Baransel Saginda Senior Container Solutions Engineer SimR More about Baransel Westfield, NJ, USA Mike Toscano Manager, Software Engineering Paylocity More about Mike Jaipur, India Gaurav Sharma DevOps Engineer Onemind Services More about Gaurav Cheshire, UK Nigel Poulton Content creator nigelpoulton.com More about Nigel Chinsurah, India Rishi Mondal Site reliability engineer (SRE) CNCF Kubestellar More about Rishi Ayacucho, Perú Edith Erika Puclla Pareja Technology Evangelist Percona More about Edith Purcellville, USA Katoria Henry Senior Manager, Platform Engineering Comcast More about Katoria Amsterdam, Netherlands Albert Tanure Sr. Cloud Solutions Architect Microsoft More about Albert Freiburg, Germany Jonas Scherer Co-CEO and Data Scientist Hycean More about Jonas Vadodara, India Gauri Yadav Cloud Engineer Gavedu More about Gauri Chantilly, USA Swapnil Patil Senior Manager, Software Engineering Capital One More about Swapnil Seattle, WA, USA Vinicius Apolinario Principal Cloud Advocate Microsoft More about Vinicius Dubai, United Arab Emirates Sudhendu Pandey Sales Engineering Director kipi.ai More about Sudhendu Lisbon, Portugal Gustavo Adolfo Jr Valverde De Soto Senior DevOps Engineer Zcash Foundation More about Gustavo Ulm, Germany Tobias Fenster Managing Director at 4PS Germany, Chief Engineer Hilti More about Tobias Ahmedabad, India Mehul Patel Founder and Cloud Consultant Cloud Captain More about Mehul Kuala Lumpur, Malaysia Muhammad Suzarilshah bin Zakaria Network Support Engineer F5 More about Muhammad Helsinki, Finland Jami Kousa Senior Software Engineer Unity More about Jami Montreal, Canada David Cardozo Chief Analyst ML Scientist Updata More about David Melbourne, Australia Jorge Arteiro Senior Cloud Developer Advocate Microsoft More about Jorge Krakow, Poland Pawel Piwosz Cloud Solution Architect Tameshi More about Pawel Quebec, Canada Hamida Rebai Cloud Solution Architecte Revenu Quebec More about Hamida Toronto, Canada Vladimir Mikhalev DevOps Consultant / Team Lead Ataccama More about Vladimir Pune, India Rashi Chaubal Customer Success Engineer Infracloud Technologies More about Rashi Bengaluru, India Shubhendu Shubham Cloud Security SME Cognizant More about Shubhendu Rockwall, TX, USA Don Bauer DevOps Director S&P Global More about Don Bordeaux, France Kaan Yagci Software & Platform Engineer Makepad More about Kaan Tel Aviv, Israel Ben Greenberg Senior Developer Advocate Couchbase More about Ben Rio de Janeiro, Brazil Fabricio Veronez CTO DevOps Pro More about Fabricio Ankara, Turkey Çiğdem Kadakoğlu Senior Cloud&DevOps Engineer EPAM More about Çiğdem Indore, India Sarthak Shrivastava Full Stack Engineer Pfizer More about Sarthak Bogotá, Colombia Adriana Fernanda Moya Senior Cloud Engineer Globant More about Adriana Golden, CO, USA Will Crum Software Engineer SpectroCloud More about Will Berlin, Germany Sebastián Ramírez Senior Staff Software Engineer FastAPI More about Sebastián Burdur, Turkey Furkan Türkal Platform Engineer Trendyol More about Furkan Penang, Malaysia Sujay Pillai Cloud Advisory Manager Accenture More about Sujay Johannesburg, South Africa Nomthandazo T. Tshuma Senior Data Engineer Jutomate More about Nomthandazo Berlin, Germany Bodo Eichstädt Developer Advocate & Trainer bodo.io More about Bodo Santa Catarina, Brazil Cláudio Filipe Lima Rapôso Senior Software Architect CI&T More about Cláudio Banglore, India Rajani Ekunde DevOps Engineer GlobalLogic More about Rajani Sydney, Australia Hasnae Rehioui Staff Software Engineer SafetyCulture More about Hasnae Aparecida, Brazil Juliana Conde Alvarez Senior Software Engineer Analytics More about Juliana Bochum, Germany Camilla Hemmer Machine Learning Team Lead Scailex More about Camilla Limassol, Cyprus Suleiman Dibirov Senior Software Engineer TheSoul Publishing More about Suleiman Ciudad Real, Spain David Jiménez Villajos Backend Engineer Plexus Tech More about David Bobby Iliev Senior DevEx Engineer Materialize More about Bobby Oslo, Norway Rustam Mehmandarov Software Engineer SpareBank1 Utvikling More about Rustam Bruyères, France Yves Brissaud Senior Software Engineer Dagger More about Yves Trieste, Italy Marco Franzon Data Engineer eXact lab More about Marco Fenton, USA Shruthi Sreenivasa Murthy Assistant Director – Research Computing Saint Louis University More about Shruthi Freiburg im Breisgau, Germany Julian König Senior Developer j&s-soft GmbH More about Julian Pune, India Vishal Anarase Senior Software Engineer Civo More about Vishal Prakhar Srivastav Senior Software Engineer Google More about Prakhar Saloni Narang Co-Founder Kubesimplify More about Saloni Bucaramanga, Colombia Yhary Estefania Arias Trillo Machine Learning Engineer MindTech More about Yhary Pécs, Hungary Ákos Takács Infrastructure Engineer and containerization Specialist E-Group ICT Software More about Ákos Toronto, Canada Tatiana Mikhaleva Cloud Engineer DevOps.Pink More about Tatiana GLEIZE, France Rachid Zarouali Cloud Architect sevensphere More about Rachid New Delhi, India Shivay Lamba Developer Evangelist Couchbase More about Shivay Bengaluru, India Arpita Patel Technical Lead HCL Tech More about Arpita Indaiatuba, Brazil Gustavo Oliveira Do Nascimento Platform Engineer John Deere More about Gustavo Oliveira Patna, India Pradumna Saraf Open Source Developer Independent More about Pradumna Atlanta, USA Shawn Wildermuth Consultant and Instructor Wilder Minds LLC More about Shawn Seattle, WA, USA Akaash Vishal Hazarika Senior Member of Technical Staff Salesforce More about Akaash Madrid, Spain Ulises Gascon Architect One Beyond More about Ulises Betim, Brazil Luiz Carlos CTO/Software Engineer Full Cycle More about Luiz Kaunas, Lithuania Julius Lisauskas Senior DevOps Engineer Telesoftas, UAB More about Julius Rio de Janeiro, Brazil Camilla Martins Senior Site Reliability Engineer Storyblok More about Camilla Ahmedabad, India Shivlal Sharma Senior DevOps Engineer OpenXcell More about Shivlal New Delhi, India Utkarsh Chauhan Student University School Of Automation And Robotics More about Utkarsh London, UK Mama Samba Braima Nelson Djalo Founder Amigoscode More about Mama Mexico City, Mexico Ravi Kalia ML Engineer Genial Labs US LLC More about Ravi São Paulo, Brazil Sergio Lopes Principal Backend Engineer Banco Itaú Unibanco S.A More about Sergio Alex Iankoulski Alex Iankoulski is a Docker Captain and a full stack software / infrastructure architect / engineer who loves to use containers for everything he does. He focuses on enabling data scientists and machine learning experts fuel the artificial intelligence revolution. Currently Alex leads containerization efforts at Shell New Energies, helping reduce the global carbon footprint. Principal Solutions Architect, AI/ML Frameworks Amazon Web Services More about Alex Rome, Italy Francesco Ciulla Developer Advocate daily.dev More about Francesco Hyderabad, India Prasad Bhalerao Software Engineer One Convergence More about Prasad Indore, India Vinayak Singoriya DevOps Engineer Cognam Technologies Pvt. Ltd. More about Vinayak Kuala Lumpur, Malaysia Raeveen Pasupathy Platform Engineer ServiceRocket More about Raeveen Singapore, Singapore Nilesh Gule Enterprise Architect ad DBS Bank Ltd DBS Bank Ltd More about Nilesh Hyderabad, India Ajay Kumar Yegireddi Senior DevSecOps Engineer Practical-DevsecOps(Hsyn) More about Ajay Tokyo, Japan Atsushi Suzuki Software Engineer / DevOps / AI OPTEMO More about Atsushi Seoul, South Korea Juyoung Song Director of DAX, Research Fellow LG UPLUS More about Juyoung Richmond, USA Anil Kumar Moka Lead Software Engineer Capital one More about Anil Bengaluru, India Chandra Mohan Dhanasekaran Senior Cloud Architect Philips More about Chandra Kathmandu, Nepal Saroj Dahal CTO 28 Softwares More about Saroj São Paulo, Brazil Lucas de Faria Polaquini Staff Software Engineer Itau Unibanco More about Lucas Austin, TX, USA Joseph Velliah MTS 2, Information Security Engineer PayPal More about Joseph Londrina, Brazil Bruno Henrique de Brito Cloud Solution Architect avera More about Bruno São Paulo, Brazil Felipe Sarmento de Araujo Staff Software Engineer Itau Unibanco More about Felipe San Francisco, CA, USA Sumit Gupta Senior Analytics Engineer Notion More about Sumit Quebec, Canada Julien Maitrehenry Chief Architect Paren More about Julien London, UK Cristian Greco Senior Full-Stack Engineer Tesco More about Cristian Arun Gupta Vice President and General Manager, Open Ecosystem, Intel Intel More about Arun Virginia Beach, VA, USA Bret Fisher Docker Captain Independent DevOps course creator and trainer DevOps Dude More about Bret New Delhi, India Sarthak Varshney Associate Consultant Ezmata Technologies Pvt. Ltd More about Sarthak Rajesh Padmakumaran Vice President Genpact More about Rajesh Harsh Manvar Senior Software Engineer Man Co. More about Harsh Denver, CO, USA Jay Schmidt Support Engineer Oxide Computer More about Jay Belo Horizonte, Brazil Natália Granato Plataform Engineer Magalu Cloud More about Natália San Antonio, USA Gabel Wright Software Engineer JHUAPL More about Gabel James Spurin DevOps Consultant and Course/Content Creator DiveInto More about James Batumi, USA Igor Aleksandrov CTO, Software Engineer JetRockets More about Igor London, UK Ian Miell Partner Container Solutions More about Ian Hyderabad, India Avinash Reddy Thipparthi Sr. Specialist – Cloud and Infrastructure LTIMindtree More about Avinash Mahitha Adapa Principal Engineer More about Mahitha Freiburg im Breisgau, Germany Mohammad-Ali A’râbi Software Engineer Jodel More about Mohammad-Ali Jalandhar, India Karan Verma Computer Science Engineer Independent More about Karan São Paulo, Brazil Julio Arruda AI Impact Lead GFT Technologies More about Julio Nashik, India Nasiullha Chaudhari Senior DevOps Engineer CloudChamp More about Nasiullha Nottingham, United Kingdom Mike Smith Solutions Architect Freelance More about Mike Kitchener, Canada Rishab Kumar Staff Developer Evangelist Twilio More about Rishab Warsaw, Poland Łukasz Lach Senior Software Architect CD Projekt More about Łukasz Austin, TX, USA Michael Yuan Founder WasmEdge More about Michael Palo Alto, USA Raju Dandigam Engineering Leader Navan More about Raju Fremont, CA, USA Uttej Badwane Senior Security Engineer Carta, Inc. More about Uttej Winterthur, Switzerland Darragh Grealish CTO 56k.Cloud More about Darragh Nabiac, Australia Scott Coulton Chief Engineer Commonwealth Bank More about Scott Copenhagen, Denmark Lukasz Dynowski Independend Consultant SRP Consultancy More about Lukasz Osaka, Japan Masahito Zembutsu Technical Communicator / Engineer SAKURA internet, inc More about Masahito Lucerne, Switzerland Benito Martin Founder and ML Engineer Martin Data Solutions More about Benito Jaipur, India Naman Kaley Software Engineer Brudite Private Limited More about Naman Freiburg, Germany MohammadHasan Akbari Software Engineer Independent More about MohammadHasan Austin, TX, USA Sathiya Shunmugasundaram Staff Security Engineer, Platform Security Tesla More about Sathiya Sagar Utekar MTS3 Site Reliability Engineer VMware By Broadcom More about Sagar Santa Clara, CA, USA Rami Krispin Senior Manager Data Science and Engineering Apple More about Rami Daegu, South Korea Justin Yoo Principal Cloud Advocate Microsoft More about Justin Zaragoza, Spain Angel Borroy Developer Evangelist Hyland More about Angel Southampton, United Kingdom Steven Hartland VP of Engineering Rocket Science More about Steven Istanbul, Turkey Batuhan Apaydın Platform Engineer Trendyol More about Batuhan Banglore, India Alagu Prakalya P Machine Learning Engineer ASAPP More about Alagu Buenos Aires, Argentina Rossana Suarez Tech Lead DevOps naranjax More about Rossana Mexico City, Mexico Ricardo Alberto Perez Candelas Solutions Architect Grupo JAR More about Ricardo San Diego, CA, USA Prabesh Thapa Site Reliability Engineer Capsule More about Prabesh Campinas, Brazil Marcelo dos Santos Gonçalves Cloud Specialist SND More about Marcelo Amsterdam, Netherlands James van den Berg Senior IT Specialist ROC van Amsterdam More about James Ashburn, USA Anjan Kumar Reddy Ayyadapu Senior Architect Solution Leader Cloudera Inc More about Anjan Kathmandu, Nepal Kisan Tamang Cloud Solution Architect Amadablam Technology More about Kisan London, UK Madhu Kumar Director Fortune Technologies More about Madhu Austin, TX, USA Lee Calcote Founder Layer5 More about Lee Karan Singh MLOps Engineer Kubetools Technologies Inc More about Karan Rotterdam, Nederland Kasun Rajapakse Senior Consultant Avanade Nederland More about Kasun Orlando, FL, USA Wesley Willians Ramos da Silva CEO Full Cycle More about Wesley Burlington, VT, USA Julie Lerman Owner The Data Farm More about Julie Bengaluru, India Khushboo Verma Platform Engineer Appwrite More about Khushboo Nonnweiler, Germany Thorsten Hans Cloud-Native Consultant Thinktecture AG More about Thorsten Heredia, Costa Rica Gerardo López Falcón As a Principal Engineer, Gerardo leads the migration and innovation of projects to the cloud, leveraging Google Cloud Platform and AWS. Principal Engineer Veritas Automata More about Gerardo Salto, Brazil Renato Jose Groffe Solutions Architect Amil More about Renato Mielec, Poland Damian Naprawa Software Architect Capgemini More about Damian Sofia, Bulgaria Denislav Gavrilov Senior DevOps Engineer Luxoft More about Denislav Seattle, WA, USA Naga Santhosh Reddy Vootukuri Principal software engineering manager Microsoft More about Naga Millbrae, CA, USA Rajashree Mandaogane Senior Software Engineer Apple More about Rajashree Berlin, Germany Alex Pliutau Software Engineering Lead Solsten More about Alex Longmont, USA Brandon Hunt Staff Software Engineer NetDocuments More about Brandon São Paulo, Brasil Pedro Ignácio Rufo da Silva DevOps Engineer Itaú Unibanco More about Pedro Banglore, India Md Imran Engineering Manager Avesha More about Md Basel, Switzerland Lize Raes AI Transition Specialist Open Tide More about Lize Stockholm, Sweden Mohammed Aboullaite Senior Engineer Spotify More about Mohammed New York City, NY, USA Nick Janetakis Full stack developer / SRE More about Nick Seattle, WA, USA Aditya Gupta Software Engineer Amazon Web Services More about Aditya Durham, NC, USA Nirmal Mehta Principal Specialist Solutions Architect AWS More about Nirmal Toulouse, France Aurélie Vache DevRel OVHcloud More about Aurélie Davenport, USA Shelley Benhoff Co-Owner and Author HoffsTech, LLC More about Shelley Bonita, CA, USA Michele Leroux Bustamante President and Cloud / Security Architect Solliance Inc More about Michele Leicester, United Kingdom Rohit Ghumare Founder @ devrelasservice.com Taikun More about Rohit Timo Stark Principal Technical Product Manager NGINX NGINX More about Timo Uruguay, Uruguay Marcos Lilljedahl Senior Backend Engineer Dagger More about Marcos Esteban Maya Cadavid Founding Engineer FastAPI More about Esteban Mumbai, India Yadnesh Nikam Senior DevOps Consultant Holcim More about Yadnesh São Paulo, Brazil Rafael Pazini Senior Software Engineer Pluto TV More about Rafael Nicholas Dille Senior DevOps Engineer Haufe Group More about Nicholas Aurangbad, India Ashutosh S. Bhakare CEO Unnati Development and Training Centre Pvt Ltd More about Ashutosh Denis Cruz Rodrigues Staff Plus Engineer Itaú Unibanco S.A. More about Denis Rio de Janeiro, Brazil Luiz Carlos Faria Cloud Native Solution Architect gaGO.io More about Luiz Berlin, Germany Sergei Shitikov Lead Software Engineer Resido More about Sergei Taipei, Taiwan Ying Chu Ko 柯映竹 Software Dev Engineer Amazon Ring More about Ying Pokhara, Nepal Bishworaj Poudel Content Creator Technology Channel Private Limited More about Bishworaj Visakhapatnam, India Kunchala Vikram Senior Technical Specialist Sony More about Kunchala Nürnberg, Germany Josua Blejeru DevOps Engineer Airbus More about Josua Madrid, Spain Pablo Pérez-Aradros Senior SecDevOps Santander Bank More about Pablo Ellwangen, Germany Andre Hofmeister Software Architect ZEISS More about Andre Vancouver, Canada Max Proske Director, Software Development SIX12 Creative More about Max Minneapolis, MN, USA Steve Buchanan Cloud Native Enthusiast Buchatech More about Steve London, United Kingdom Ashraful Alam Lead Cloud Engineer Legal and General More about Ashraful Heredia, Costa Rica Gerardo Lopez Falcon Principal Engineer Veritas Automata More about Gerardo Hamburg, Germany Metin Yaylacioglu Platform Adoption Coach DB Systel More about Metin Belo Horizonte, Brazil Paloma Lataliza Cloud Engineer Claro More about Paloma Vienna, Austria Nana Janashia DevOps Consultant TechWorld with Nana More about Nana Castle Douglas, United Kingdom Oli Sturm Chief Evangelist DevExpress More about Oli Norrköping, Sweden Simon Aronsson Engineering Manager Canonical More about Simon Stezzano, Italy Ivan Pesenti Software Engineer CrowdStrike More about Ivan Paris, France Mazlum Tosun Head of Data and Cloud GroupBees More about Mazlum Kristiyan Velkov Front-end Advocate | Tech Lead | Speaker | Author Jakala More about Kristiyan Taipei, Taiwan Kai Kao Senior Consultant / Security Engineer HackerCat More about Kai Medellin, Colombia Maris Botero Data Scientist Engineer Mercado Libre More about Maris Indore, India Rashi Dashore Student Devi Ahilya University More about Rashi Dublin, Ireland Andrew Pruski Field Solutions Architect Pure Storage More about Andrew Melbourne, Australia Thiago Sinji Shimada Ramos Cloud Engineer DNX Solutions More about Thiago Aalborg, Denmark Martin Terp Senior Consultant Trifork.Security More about Martin Mexico City, Mexico Gloria Palma Gonzalez Senior Solution Architect Enchiladas DevOps More about Gloria Karlsruhe, Germany Jonas Scholz Jonas Scholz Sliplane More about Jonas Take your container security to the next level with Docker Find the right subscription for your unique security requirements. See pricing Have questions? Products Products Overview Docker Desktop Docker Hub Docker Scout Docker Build Cloud Testcontainers Desktop Testcontainers Cloud Docker MCP Catalog and Toolkit Docker Hardened Images Features Command Line Interface IDE Extensions Container Runtime Docker Extensions Trusted Open Source Content Secure Software Supply Chain Developers Documentation Getting Started Trainings Extensions SDK Community Open Source Preview Program Newsletter Pricing Personal Pro Team Business Premium Support and TAM Pricing FAQ Contact Sales Company About Us What is a Container Blog Why Docker Trust Customer Success Partners Events Docker System Status Newsroom Swag Store Brand Guidelines Trademark Guidelines Careers Contact Us Languages English 日本語 © 2026 Docker Inc. All rights reserved Terms of Service Privacy Legal Cookie Settings | 2026-01-13T09:30:39 |
https://llvm.org/doxygen/regcomp_8c.html#a0240ac851181b84ac374872dc5434ee4 | LLVM: lib/Support/regcomp.c File Reference LLVM  22.0.0git lib Support Classes | Macros | Functions | Variables regcomp.c File Reference #include " regex_impl.h " #include <ctype.h> #include <limits.h> #include <stdint.h> #include <stdio.h> #include <stdlib.h> #include < string.h > #include <sys/types.h> #include " regex2.h " #include " regutils.h " #include "llvm/Config/config.h" #include " llvm/Support/Compiler.h " Go to the source code of this file. Classes struct   cclass struct   cname struct   parse Macros #define  NPAREN    10 /* we need to remember () 1-9 for back refs */ #define  PEEK () #define  PEEK2 () #define  MORE () #define  MORE2 () #define  SEE (c) #define  SEETWO (a, b) #define  EAT (c) #define  EATTWO (a, b) #define  NEXT () #define  NEXT2 () #define  NEXTn (n) #define  GETNEXT () #define  SETERROR (e) #define  REQUIRE (co, e) #define  MUSTSEE (c, e) #define  MUSTEAT (c, e) #define  MUSTNOTSEE (c, e) #define  EMIT ( op , sopnd) #define  INSERT ( op , pos) #define  AHEAD (pos) #define  ASTERN ( sop , pos) #define  HERE () #define  THERE () #define  THERETHERE () #define  DROP (n) #define  DUPMAX    255 #define  REGINFINITY    ( DUPMAX + 1) #define  never    0 /* some <assert.h>s have bugs too */ #define  GOODFLAGS (f) #define  BACKSL    (1 << CHAR_BIT) #define  N    2 #define  INF    3 #define  REP (f, t) #define  MAP (n) Functions static void  p_ere (struct parse *, int) static void  p_ere_exp (struct parse *) static void  p_str (struct parse *) static void  p_bre (struct parse *, int, int) static int  p_simp_re (struct parse *, int) static int  p_count (struct parse *) static void  p_bracket (struct parse *) static void  p_b_term (struct parse *, cset *) static void  p_b_cclass (struct parse *, cset *) static void  p_b_eclass (struct parse *, cset *) static char   p_b_symbol (struct parse *) static char   p_b_coll_elem (struct parse *, int) static char   othercase (int) static void  bothcases (struct parse *, int) static void  ordinary (struct parse *, int) static void  nonnewline (struct parse *) static void  repeat (struct parse *, sopno , int, int) static int  seterr (struct parse *, int) static cset *  allocset (struct parse *) static void  freeset (struct parse *, cset *) static int  freezeset (struct parse *, cset *) static int  firstch (struct parse *, cset *) static int  nch (struct parse *, cset *) static void  mcadd (struct parse *, cset *, const char *) static void  mcinvert (struct parse *, cset *) static void  mccase (struct parse *, cset *) static int  isinsets (struct re_guts *, int) static int  samesets (struct re_guts *, int, int) static void  categorize (struct parse *, struct re_guts *) static sopno   dupl (struct parse *, sopno , sopno ) static void  doemit (struct parse *, sop , size_t) static void  doinsert (struct parse *, sop , size_t, sopno ) static void  dofwd (struct parse *, sopno , sop ) static void  enlarge (struct parse *, sopno ) static void  stripsnug (struct parse *, struct re_guts *) static void  findmust (struct parse *, struct re_guts *) static sopno   pluscount (struct parse *, struct re_guts *) int  llvm_regcomp ( llvm_regex_t *preg, const char *pattern, int cflags) Variables static struct cclass   cclasses [] static struct cname   cnames [] static char   nuls [10] Macro Definition Documentation ◆  AHEAD #define AHEAD ( pos ) Value: dofwd (p, pos, HERE () - (pos)) HERE #define HERE() Definition regcomp.c:265 dofwd static void dofwd(struct parse *, sopno, sop) Definition regcomp.c:1477 Definition at line 263 of file regcomp.c . Referenced by p_ere() , p_ere_exp() , and repeat() . ◆  ASTERN #define ASTERN ( sop , pos  ) Value: EMIT ( sop , HERE () - pos) EMIT #define EMIT(op, sopnd) Definition regcomp.c:261 sop unsigned long sop Definition regex2.h:68 Definition at line 264 of file regcomp.c . Referenced by p_ere() , p_ere_exp() , p_simp_re() , and repeat() . ◆  BACKSL #define BACKSL   (1 << CHAR_BIT) Referenced by p_simp_re() . ◆  DROP #define DROP ( n ) Value: (p->slen -= (n)) Definition at line 268 of file regcomp.c . Referenced by p_bre() , and repeat() . ◆  DUPMAX #define DUPMAX   255 Definition at line 273 of file regcomp.c . Referenced by p_count() . ◆  EAT #define EAT ( c ) Value: (( SEE (c)) ? ( NEXT (), 1) : 0) SEE #define SEE(c) Definition regcomp.c:248 NEXT #define NEXT() Definition regcomp.c:252 Definition at line 250 of file regcomp.c . Referenced by p_b_term() , p_bracket() , p_bre() , p_ere() , p_ere_exp() , and p_simp_re() . ◆  EATTWO #define EATTWO ( a , b  ) Value: (( SEETWO (a, b)) ? ( NEXT2 (), 1) : 0) NEXT2 #define NEXT2() Definition regcomp.c:253 SEETWO #define SEETWO(a, b) Definition regcomp.c:249 Definition at line 251 of file regcomp.c . Referenced by p_b_symbol() , p_b_term() , and p_simp_re() . ◆  EMIT #define EMIT ( op , sopnd  ) Value: doemit (p, ( sop )( op ), ( size_t )(sopnd)) op #define op(i) doemit static void doemit(struct parse *, sop, size_t) Definition regcomp.c:1424 Definition at line 261 of file regcomp.c . Referenced by doinsert() , llvm_regcomp() , ordinary() , p_bracket() , p_bre() , p_ere() , p_ere_exp() , p_simp_re() , and repeat() . ◆  GETNEXT #define GETNEXT ( ) Value: (*p->next++) Definition at line 255 of file regcomp.c . Referenced by p_b_symbol() , p_count() , p_ere_exp() , p_simp_re() , and p_str() . ◆  GOODFLAGS #define GOODFLAGS ( f ) Value: ((f) & ~REG_DUMP ) REG_DUMP #define REG_DUMP Definition regex_impl.h:63 Referenced by llvm_regcomp() . ◆  HERE #define HERE ( ) Value: (p->slen) Definition at line 265 of file regcomp.c . Referenced by doinsert() , dupl() , p_bre() , p_ere() , p_ere_exp() , p_simp_re() , and repeat() . ◆  INF #define INF   3 Referenced by repeat() . ◆  INSERT #define INSERT ( op , pos  ) Value: doinsert (p, ( sop )( op ), HERE () - (pos) + 1, pos) doinsert static void doinsert(struct parse *, sop, size_t, sopno) Definition regcomp.c:1444 Definition at line 262 of file regcomp.c . Referenced by p_ere() , p_ere_exp() , p_simp_re() , and repeat() . ◆  MAP #define MAP ( n ) Value: (((n) <= 1) ? (n) : ((n) == REGINFINITY ) ? INF : N ) N #define N INF #define INF REGINFINITY #define REGINFINITY Definition regcomp.c:275 Referenced by checkClobberSanity() , and repeat() . ◆  MORE #define MORE ( ) Value: (p->end - p->next > 0) Definition at line 246 of file regcomp.c . Referenced by llvm::Combiner::combineMachineInstrs() , INITIALIZE_PASS() , p_b_cclass() , p_b_coll_elem() , p_b_symbol() , p_b_term() , p_bracket() , p_bre() , p_count() , p_ere() , p_ere_exp() , p_simp_re() , p_str() , reportGISelDiagnostic() , llvm::reportGISelFailure() , llvm::reportGISelFailure() , llvm::reportGISelWarning() , llvm::Legalizer::runOnMachineFunction() , llvm::InstructionSelect::selectMachineFunction() , and llvm::MIRProfileLoader::setInitVals() . ◆  MORE2 #define MORE2 ( ) Value: (p->end - p->next > 1) Definition at line 247 of file regcomp.c . Referenced by p_b_term() , and p_ere_exp() . ◆  MUSTEAT #define MUSTEAT ( c , e  ) Value: ( REQUIRE ( MORE () && GETNEXT () == (c), e)) GETNEXT #define GETNEXT() Definition regcomp.c:255 MORE #define MORE() Definition regcomp.c:246 REQUIRE #define REQUIRE(co, e) Definition regcomp.c:257 Definition at line 259 of file regcomp.c . Referenced by p_bracket() , and p_ere_exp() . ◆  MUSTNOTSEE #define MUSTNOTSEE ( c , e  ) Value: ( REQUIRE (! MORE () || PEEK () != (c), e)) PEEK #define PEEK() Definition regcomp.c:244 Definition at line 260 of file regcomp.c . ◆  MUSTSEE #define MUSTSEE ( c , e  ) Value: ( REQUIRE ( MORE () && PEEK () == (c), e)) Definition at line 258 of file regcomp.c . ◆  N #define N   2 Examples /work/as-worker-4/publish-doxygen-docs/llvm-project/llvm/include/llvm/ADT/ilist_node.h , and /work/as-worker-4/publish-doxygen-docs/llvm-project/llvm/include/llvm/Transforms/Utils/Local.h . Referenced by llvm::AAMDNodes::AAMDNodes() , llvm::orc::ObjectLinkingLayer::add() , llvm::Registry< GCMetadataPrinter >::add_node() , llvm::X86Operand::addAbsMemOperands() , llvm::Instruction::addAnnotationMetadata() , llvm::Instruction::addAnnotationMetadata() , addArgumentAttrs() , llvm::X86Operand::addAVX512RCOperands() , addCalleeSavedRegs() , AddCombineBUILD_VECTORToVPADDL() , AddCombineToVPADD() , AddCombineVUZPToVPADDL() , llvm::X86Operand::addDstIdxOperands() , addEdge() , llvm::ItaniumManglingCanonicalizer::addEquivalence() , AddGlue() , llvm::X86Operand::addGR16orGR32orGR64Operands() , llvm::X86Operand::addGR32orGR64Operands() , llvm::X86Operand::addImmOperands() , XtensaOperand::addImmOperands() , llvm::LiveIntervals::addKillFlags() , llvm::GCOVBlock::addLine() , llvm::DwarfExpression::addMachineRegExpression() , llvm::X86Operand::addMaskPairOperands() , llvm::X86Operand::addMemOffsOperands() , llvm::X86Operand::addMemOperands() , llvm::DataDependenceGraph::addNode() , llvm::DirectedGraph< DDGNode, DDGEdge >::addNode() , AddNodeIDCustom() , AddNodeIDNode() , llvm::bfi_detail::IrreducibleGraph::addNodesInLoop() , llvm::ilist_callback_traits< MachineBasicBlock >::addNodeToList() , llvm::ilist_traits< MachineInstr >::addNodeToList() , llvm::SUnit::addPred() , llvm::rdf::DataFlowGraph::addr() , llvm::X86Operand::addRegOperands() , XtensaOperand::addRegOperands() , AddRequiredExtensionForVMULL() , addShuffleForVecExtend() , llvm::X86Operand::addSrcIdxOperands() , llvm::TargetLowering::DAGCombinerInfo::AddToWorklist() , adjustForFNeg() , adjustForLTGFR() , adjustForSubtraction() , llvm::IntervalMapImpl::NodeBase< std::pair< KeyT, KeyT >, ValT, LeafSize >::adjustFromLeftSib() , llvm::TypeBasedAAResult::aliasErrno() , llvm::AliasScopeNode::AliasScopeNode() , llvm::ThreadSafeAllocator< AllocatorType >::Allocate() , llvm::MemoryPhi::allocHungoffUses() , llvm::PHINode::allocHungoffUses() , llvm::SwitchInst::allocHungoffUses() , llvm::ISD::allOperandsUndef() , llvm::AMDGPUTargetLowering::allUsesHaveSourceMods() , allUsesTruncate() , llvm::AMDGPUDAGToDAGISel::AMDGPUDAGToDAGISel() , annotateFunctionWithHashMismatch() , llvm::DWARFTypePrinter< DieType >::appendConstVolatileQualifierAfter() , llvm::DWARFTypePrinter< DieType >::appendConstVolatileQualifierBefore() , appendNumber() , llvm::jitlink::systemz::applyFixup() , llvm::SDNode::areOnlyUsersOf() , llvm::DiagnosticInfoOptimizationBase::Argument::Argument() , llvm::DiagnosticInfoOptimizationBase::Argument::Argument() , llvm::DiagnosticInfoOptimizationBase::Argument::Argument() , llvm::DiagnosticInfoOptimizationBase::Argument::Argument() , llvm::DiagnosticInfoOptimizationBase::Argument::Argument() , llvm::DiagnosticInfoOptimizationBase::Argument::Argument() , llvm::DiagnosticInfoOptimizationBase::Argument::Argument() , llvm::msgpack::ArrayDocNode::ArrayDocNode() , llvm::ArrayRef() , llvm::ArrayRef< llvm::cfg::Update< MachineBasicBlock * > >::ArrayRef() , llvm::SmallVectorTemplateCommon< T, typename >::assertSafeToAdd() , llvm::SelectionDAG::AssignTopologicalOrder() , AVRDAGToDAGISel::select< AVRISD::CALL >() , AVRDAGToDAGISel::select< ISD::BRIND >() , AVRDAGToDAGISel::select< ISD::FrameIndex >() , AVRDAGToDAGISel::select< ISD::LOAD >() , AVRDAGToDAGISel::select< ISD::STORE >() , llvm::AVRTargetLowering::AVRTargetLowering() , llvm::SDNodeIterator::begin() , llvm::SUnitIterator::begin() , broadcastSrcOp() , buildCallOperands() , BuildExactSDIV() , BuildExactUDIV() , llvm::LazyCallGraph::buildRefSCCs() , llvm::TargetLowering::BuildSDIV() , llvm::PPCTargetLowering::BuildSDIVPow2() , llvm::TargetLowering::BuildSDIVPow2() , llvm::TargetLowering::buildSDIVPow2WithCMov() , llvm::TargetLowering::BuildSREMPow2() , llvm::buildTopDownFuncOrder() , llvm::TargetLowering::BuildUDIV() , llvm::APInt::byteSwap() , llvm::SelectionDAG::calculateDivergence() , llvm::MDNodeKeyImpl< GenericDINode >::calculateHash() , llvm::MDNodeKeyImpl< MDTuple >::calculateHash() , llvm::MDNodeOpsKey::calculateHash() , canChangeToInt() , canClobberPhysRegDefs() , CanCombineFCOPYSIGN_EXTEND_ROUND() , canConvertSETCCToXori() , llvm::TargetInstrInfo::canCopyGluedNodeDuringSchedule() , llvm::Thumb1InstrInfo::canCopyGluedNodeDuringSchedule() , canFoldInAddressingMode() , CanInvertMVEVCMP() , canLowerByDroppingElements() , canLowerToLDG() , slpvectorizer::BoUpSLP::canMapToVector() , canonicalizeBitSelect() , canonicalizeMetadataForValue() , canonicalizeShuffleWithOp() , canReduceVMulWidth() , llvm::CGDataPatchItem::CGDataPatchItem() , llvm::DominatorTreeBase< BlockT, false >::changeImmediateDominator() , CheckAndCreateOffsetAdd() , CheckAndImm() , CheckChild2CondCode() , CheckChildInteger() , CheckChildSame() , CheckChildType() , llvm::SelectionDAGISel::CheckComplexPattern() , llvm::AMDGPUPALMetadata::checkComputeRegisters() , llvm::AMDGPUPALMetadata::checkComputeRegisters() , CheckCondCode() , checkCVTFixedPointOperandWithFBits() , checkDot4MulSignedness() , llvm::checkForCycles() , checkForCyclesHelper() , checkIfSupported() , CheckInteger() , CheckOpcode() , checkOperandType() , CheckOrImm() , checkOverlappingElement() , checkResultType() , CheckSame() , CheckTyN() , CheckType() , CheckValueType() , GraphTraits< const CallsiteContextGraph< DerivedCCG, FuncTy, CallTy > * >::child_begin() , llvm::DomTreeGraphTraitsBase< Node, ChildIterator >::child_begin() , llvm::GraphTraits< AADepGraphNode * >::child_begin() , llvm::GraphTraits< ArgumentGraphNode * >::child_begin() , llvm::GraphTraits< BasicBlock * >::child_begin() , llvm::GraphTraits< BlockFrequencyInfo * >::child_begin() , llvm::GraphTraits< BoUpSLP * >::child_begin() , llvm::GraphTraits< CallGraphNode * >::child_begin() , llvm::GraphTraits< const BasicBlock * >::child_begin() , llvm::GraphTraits< const CallGraphNode * >::child_begin() , llvm::GraphTraits< const DDGNode * >::child_begin() , llvm::GraphTraits< const Loop * >::child_begin() , llvm::GraphTraits< const MachineBasicBlock * >::child_begin() , llvm::GraphTraits< const MachineLoop * >::child_begin() , llvm::GraphTraits< const VPBlockBase * >::child_begin() , llvm::GraphTraits< DDGNode * >::child_begin() , llvm::GraphTraits< DotCfgDiffDisplayGraph * >::child_begin() , llvm::GraphTraits< Inverse< BasicBlock * > >::child_begin() , llvm::GraphTraits< Inverse< const BasicBlock * > >::child_begin() , llvm::GraphTraits< Inverse< const MachineBasicBlock * > >::child_begin() , llvm::GraphTraits< Inverse< MachineBasicBlock * > >::child_begin() , llvm::GraphTraits< Inverse< MemoryAccess * > >::child_begin() , llvm::GraphTraits< Inverse< VPBlockBase * > >::child_begin() , llvm::GraphTraits< IrreducibleGraph >::child_begin() , llvm::GraphTraits< LazyCallGraph * >::child_begin() , llvm::GraphTraits< LazyCallGraph::Node * >::child_begin() , llvm::GraphTraits< Loop * >::child_begin() , llvm::GraphTraits< MachineBasicBlock * >::child_begin() , llvm::GraphTraits< MachineBlockFrequencyInfo * >::child_begin() , llvm::GraphTraits< MachineLoop * >::child_begin() , llvm::GraphTraits< MemoryAccess * >::child_begin() , llvm::GraphTraits< PGOUseFunc * >::child_begin() , llvm::GraphTraits< ProfiledCallGraphNode * >::child_begin() , llvm::GraphTraits< RematGraph * >::child_begin() , llvm::GraphTraits< SDNode * >::child_begin() , llvm::GraphTraits< SUnit * >::child_begin() , llvm::GraphTraits< ValueInfo >::child_begin() , llvm::GraphTraits< VPBlockBase * >::child_begin() , llvm::GraphTraits< VPBlockDeepTraversalWrapper< const VPBlockBase * > >::child_begin() , llvm::GraphTraits< VPBlockDeepTraversalWrapper< VPBlockBase * > >::child_begin() , llvm::GraphTraits< VPBlockShallowTraversalWrapper< const VPBlockBase * > >::child_begin() , llvm::GraphTraits< VPBlockShallowTraversalWrapper< VPBlockBase * > >::child_begin() , llvm::MachineDomTreeGraphTraitsBase< Node, ChildIterator >::child_begin() , llvm::GraphTraits< const CallGraphNode * >::child_edge_begin() , llvm::GraphTraits< const DDGNode * >::child_edge_begin() , llvm::GraphTraits< DDGNode * >::child_edge_begin() , llvm::GraphTraits< DotCfgDiffDisplayGraph * >::child_edge_begin() , llvm::GraphTraits< ValueInfo >::child_edge_begin() , llvm::GraphTraits< const CallGraphNode * >::child_edge_end() , llvm::GraphTraits< const DDGNode * >::child_edge_end() , llvm::GraphTraits< DDGNode * >::child_edge_end() , llvm::GraphTraits< DotCfgDiffDisplayGraph * >::child_edge_end() , llvm::GraphTraits< ValueInfo >::child_edge_end() , GraphTraits< const CallsiteContextGraph< DerivedCCG, FuncTy, CallTy > * >::child_end() , llvm::DomTreeGraphTraitsBase< Node, ChildIterator >::child_end() , llvm::GraphTraits< AADepGraphNode * >::child_end() , llvm::GraphTraits< ArgumentGraphNode * >::child_end() , llvm::GraphTraits< BasicBlock * >::child_end() , llvm::GraphTraits< BlockFrequencyInfo * >::child_end() , llvm::GraphTraits< BoUpSLP * >::child_end() , llvm::GraphTraits< CallGraphNode * >::child_end() , llvm::GraphTraits< const BasicBlock * >::child_end() , llvm::GraphTraits< const CallGraphNode * >::child_end() , llvm::GraphTraits< const DDGNode * >::child_end() , llvm::GraphTraits< const Loop * >::child_end() , llvm::GraphTraits< const MachineBasicBlock * >::child_end() , llvm::GraphTraits< const MachineLoop * >::child_end() , llvm::GraphTraits< const VPBlockBase * >::child_end() , llvm::GraphTraits< DDGNode * >::child_end() , llvm::GraphTraits< DotCfgDiffDisplayGraph * >::child_end() , llvm::GraphTraits< Inverse< BasicBlock * > >::child_end() , llvm::GraphTraits< Inverse< const BasicBlock * > >::child_end() , llvm::GraphTraits< Inverse< const MachineBasicBlock * > >::child_end() , llvm::GraphTraits< Inverse< MachineBasicBlock * > >::child_end() , llvm::GraphTraits< Inverse< MemoryAccess * > >::child_end() , llvm::GraphTraits< Inverse< VPBlockBase * > >::child_end() , llvm::GraphTraits< IrreducibleGraph >::child_end() , llvm::GraphTraits< LazyCallGraph * >::child_end() , llvm::GraphTraits< LazyCallGraph::Node * >::child_end() , llvm::GraphTraits< Loop * >::child_end() , llvm::GraphTraits< MachineBasicBlock * >::child_end() , llvm::GraphTraits< MachineBlockFrequencyInfo * >::child_end() , llvm::GraphTraits< MachineLoop * >::child_end() , llvm::GraphTraits< MemoryAccess * >::child_end() , llvm::GraphTraits< PGOUseFunc * >::child_end() , llvm::GraphTraits< ProfiledCallGraphNode * >::child_end() , llvm::GraphTraits< RematGraph * >::child_end() , llvm::GraphTraits< SDNode * >::child_end() , llvm::GraphTraits< SUnit * >::child_end() , llvm::GraphTraits< ValueInfo >::child_end() , llvm::GraphTraits< VPBlockBase * >::child_end() , llvm::GraphTraits< VPBlockDeepTraversalWrapper< const VPBlockBase * > >::child_end() , llvm::GraphTraits< VPBlockDeepTraversalWrapper< VPBlockBase * > >::child_end() , llvm::GraphTraits< VPBlockShallowTraversalWrapper< const VPBlockBase * > >::child_end() , llvm::GraphTraits< VPBlockShallowTraversalWrapper< VPBlockBase * > >::child_end() , llvm::MachineDomTreeGraphTraitsBase< Node, ChildIterator >::child_end() , llvm::AddrSpaceCastSDNode::classof() , llvm::AssertAlignSDNode::classof() , llvm::AtomicSDNode::classof() , llvm::BasicBlockSDNode::classof() , llvm::BlockAddressSDNode::classof() , llvm::BuildVectorSDNode::classof() , llvm::CondCodeSDNode::classof() , llvm::ConstantFPSDNode::classof() , llvm::ConstantPoolSDNode::classof() , llvm::ConstantSDNode::classof() , llvm::DbgEntity::classof() , llvm::DbgLabel::classof() , llvm::DbgVariable::classof() , llvm::DeactivationSymbolSDNode::classof() , llvm::ExternalSymbolSDNode::classof() , llvm::FPStateAccessSDNode::classof() , llvm::FrameIndexSDNode::classof() , llvm::GlobalAddressSDNode::classof() , llvm::JumpTableSDNode::classof() , llvm::LabelSDNode::classof() , llvm::LifetimeSDNode::classof() , llvm::LoadSDNode::classof() , llvm::LSBaseSDNode::classof() , llvm::MachineSDNode::classof() , llvm::MaskedGatherScatterSDNode::classof() , llvm::MaskedGatherSDNode::classof() , llvm::MaskedHistogramSDNode::classof() , llvm::MaskedLoadSDNode::classof() , llvm::MaskedLoadStoreSDNode::classof() , llvm::MaskedScatterSDNode::classof() , llvm::MaskedStoreSDNode::classof() , llvm::MCSymbolSDNode::classof() , llvm::MDNodeSDNode::classof() , llvm::MemIntrinsicSDNode::classof() , llvm::MemSDNode::classof() , llvm::ms_demangle::ArrayTypeNode::classof() , llvm::ms_demangle::ConversionOperatorIdentifierNode::classof() , llvm::ms_demangle::CustomTypeNode::classof() , llvm::ms_demangle::DynamicStructorIdentifierNode::classof() , llvm::ms_demangle::EncodedStringLiteralNode::classof() , llvm::ms_demangle::FunctionSignatureNode::classof() , llvm::ms_demangle::FunctionSymbolNode::classof() , llvm::ms_demangle::IdentifierNode::classof() , llvm::ms_demangle::IntegerLiteralNode::classof() , llvm::ms_demangle::IntrinsicFunctionIdentifierNode::classof() , llvm::ms_demangle::IntrinsicNode::classof() , llvm::ms_demangle::LiteralOperatorIdentifierNode::classof() , llvm::ms_demangle::LocalStaticGuardIdentifierNode::classof() , llvm::ms_demangle::LocalStaticGuardVariableNode::classof() , llvm::ms_demangle::NamedIdentifierNode::classof() , llvm::ms_demangle::NodeArrayNode::classof() , llvm::ms_demangle::PointerAuthQualifierNode::classof() , llvm::ms_demangle::PointerTypeNode::classof() , llvm::ms_demangle::PrimitiveTypeNode::classof() , llvm::ms_demangle::QualifiedNameNode::classof() , llvm::ms_demangle::RttiBaseClassDescriptorNode::classof() , llvm::ms_demangle::SpecialTableSymbolNode::classof() , llvm::ms_demangle::StructorIdentifierNode::classof() , llvm::ms_demangle::SymbolNode::classof() , llvm::ms_demangle::TagTypeNode::classof() , llvm::ms_demangle::TemplateParameterReferenceNode::classof() , llvm::ms_demangle::ThunkSignatureNode::classof() , llvm::ms_demangle::TypeNode::classof() , llvm::ms_demangle::VariableSymbolNode::classof() , llvm::ms_demangle::VcallThunkIdentifierNode::classof() , llvm::PiBlockDDGNode::classof() , llvm::PseudoProbeSDNode::classof() , llvm::RegisterMaskSDNode::classof() , llvm::RegisterSDNode::classof() , llvm::RootDDGNode::classof() , llvm::RootDDGNode::classof() , llvm::ShuffleVectorSDNode::classof() , llvm::SimpleDDGNode::classof() , llvm::SimpleDDGNode::classof() , llvm::SrcValueSDNode::classof() , llvm::StoreSDNode::classof() , llvm::SuffixTreeInternalNode::classof() , llvm::SuffixTreeLeafNode::classof() , llvm::TargetIndexSDNode::classof() , llvm::vfs::detail::InMemoryDirectory::classof() , llvm::vfs::detail::InMemoryFile::classof() , llvm::VPBaseLoadStoreSDNode::classof() , llvm::VPGatherScatterSDNode::classof() , llvm::VPGatherSDNode::classof() , llvm::VPLoadFFSDNode::classof() , llvm::VPLoadSDNode::classof() , llvm::VPScatterSDNode::classof() , llvm::VPStoreSDNode::classof() , llvm::VPStridedLoadSDNode::classof() , llvm::VPStridedStoreSDNode::classof() , llvm::VTSDNode::classof() , llvm::X86MaskedGatherScatterSDNode::classof() , llvm::X86MaskedGatherSDNode::classof() , llvm::X86MaskedScatterSDNode::classof() , llvm::yaml::AliasNode::classof() , llvm::yaml::BlockScalarNode::classof() , llvm::yaml::KeyValueNode::classof() , llvm::yaml::MappingNode::classof() , llvm::yaml::NullNode::classof() , llvm::yaml::ScalarNode::classof() , llvm::yaml::SequenceNode::classof() , cleanUpTempFilesImpl() , llvm::rdf::DataFlowGraph::DefStack::clear_block() , CloneLoopBlocks() , llvm::CloneModule() , CloneNodeWithValues() , llvm::sandboxir::SchedBundle::cluster() , llvm::rdf::DeadCodeElimination::collect() , llvm::collectChildrenInLoop() , collectConcatOps() , llvm::SDPatternMatch::ReassociatableOpc_match< PatternTs >::collectLeaves() , combineAcrossLanesIntrinsic() , combineADC() , combineAdd() , combineAddOfBooleanXor() , combineAddOrSubToADCOrSBB() , combineADDRSPACECAST() , combineADDToADDZE() , combineADDToMAT_PCREL_ADDR() , combineADDToSUB() , combineADDX() , combineAnd() , combineAndMaskToShift() , combineAndNotIntoANDNP() , combineAndNotIntoVANDN() , combineAndNotOrIntoAndNotAnd() , combineAndnp() , combineANDOfSETCCToCZERO() , combineAndOrForCcmpCtest() , CombineANDShift() , combineAndShuffleNot() , combineAVG() , combineAVX512SetCCToKMOV() , CombineBaseUpdate() , combineBEXTR() , combineBinOpOfExtractToReduceTree() , combineBinOpOfZExt() , combineBinOpToReduce() , combineBitcast() , combineBITREVERSE() , combineBMILogicOp() , combineBrCond() , combineBROADCAST_LOAD() , combineBT() , combineBVOfConsecutiveLoads() , combineBVOfVecSExt() , combineBVZEXTLOAD() , combineCarryDiamond() , combineCastedMaskArithmetic() , combineCMov() , combineCMP() , combineCommutableSHUFP() , combineCompareEqual() , combineCONCAT_VECTORS() , combineConcatVectorOfCasts() , combineConcatVectorOfConcatVectors() , combineConcatVectorOfExtracts() , combineConcatVectorOfScalars() , combineConcatVectorOfShuffleAndItsOperands() , combineConcatVectorOfSplats() , combineConstantPoolLoads() , combineCVTP2I_CVTTP2I() , combineCVTPH2PS() , combineDeMorganOfBoolean() , combineEXTEND_VECTOR_INREG() , combineEXTRACT_SUBVECTOR() , combineExtractFromVectorLoad() , combineExtractVectorElt() , combineExtractWithShuffle() , combineExtSetcc() , combineFaddCFmul() , combineFaddFsub() , combineFAnd() , combineFAndFNotToFAndn() , combineFAndn() , combineFMA() , combineFMADDSUB() , combineFMinFMax() , combineFMinNumFMaxNum() , combineFMulcFCMulc() , combineFneg() , combineFOr() , combineFP16_TO_FP() , combineFP_EXTEND() , combineFP_ROUND() , combineFP_TO_xINT_SAT() , combineFPToSInt() , combineFunnelShift() , combineGatherScatter() , combineHorizOpWithShuffle() , combinei64TruncSrlConstant() , combineINSERT_SUBVECTOR() , combineINTRINSIC_VOID() , combineINTRINSIC_W_CHAIN() , combineINTRINSIC_WO_CHAIN() , combineKSHIFT() , combineLOAD() , combineLoad() , combineLogicBlendIntoPBLENDV() , combineLRINT_LLRINT() , combineM68kBrCond() , combineM68kSetCC() , combineMaskedLoad() , combineMaskedStore() , combineMOVDQ2Q() , combineMOVMSK() , combineMul() , combineMulSpecial() , combineMulToPMADD52() , combineMulToPMADDWD() , combineMulToPMULDQ() , combineMulWide() , combineNarrowableShiftedLoad() , combineOp_VLToVWOp_VL() , combineOr() , combineOrAndToBitfieldInsert() , combineOrCmpEqZeroToCtlzSrl() , combineOrOfCZERO() , combineOrToBitfieldInsert() , combinePackingMovIntoStore() , combinePDEP() , combinePExtTruncate() , combinePMULDQ() , combinePRMT() , combineProxyReg() , combineRedundantDWordShuffle() , combineSBB() , combineSCALAR_TO_VECTOR() , combineScalarAndWithMaskSetcc() , combineSelect() , llvm::VETargetLowering::combineSelect() , combineSelectAndUse() , combineSelectAndUse() , combineSelectAndUse() , combineSelectAndUseCommutative() , combineSelectAndUseCommutative() , combineSelectAndUseCommutative() , llvm::VETargetLowering::combineSelectCC() , combineSelectOfTwoConstants() , combineSelectToBinOp() , combineSetCC() , combineSext() , combineSextInRegCmov() , combineShiftLeft() , combineShiftRightArithmetic() , combineShiftRightLogical() , combineShiftToMULH() , combineShiftToPMULH() , combineShlAddIAdd() , combineShlAddIAddImpl() , combineShuffle() , combineShuffleToAddSubOrFMAddSub() , combineShuffleToFMAddSub() , combineSignExtendInReg() , combineSIntToFP() , combineSTORE() , combineStore() , combineStoreToNewValue() , combineSub() , combineSubOfBoolean() , combineSubSetcc() , combineSubShiftToOrcB() , combineSUBX() , combineSVEBitSel() , combineSVEPrefetchVecBaseImmOff() , combineSVEReductionFP() , combineSVEReductionInt() , combineSVEReductionOrderedFP() , combineTargetShuffle() , combineTESTP() , llvm::TargetLowering::DAGCombinerInfo::CombineTo() , llvm::TargetLowering::DAGCombinerInfo::CombineTo() , llvm::TargetLowering::DAGCombinerInfo::CombineTo() , llvm::TargetLowering::TargetLoweringOpt::CombineTo() , combineToFPTruncExtElt() , combineToHorizontalAddSub() , combineToVCPOP() , combineToVWMACC() , llvm::VETargetLowering::combineTRUNCATE() , combineTruncate() , combineTruncatedArithmetic() , combineTruncOfSraSext() , combineTruncSelectToSMaxUSat() , combineTruncToVnclip() , combineUADDO_CARRYDiamond() , combineUIntToFP() , combineUnpackingMovIntoLoad() , combineVectorCompare() , combineVectorCompareAndMaskUnaryOp() , combineVectorHADDSUB() , combineVectorInsert() , combineVectorMulToSraBitcast() , combineVectorPack() , combineVectorShiftImm() , combineVectorShiftVar() , combineVectorSizedSetCCEquality() , combineVEXTRACT_STORE() , combineVFMADD_VLWithVFNEG_VL() , CombineVLDDUP() , combineVPMADD() , combineVPMADD52LH() , combineVqdotAccum() , combineVSelectToBLENDV() , combineVTRUNC() , combineVWADDSUBWSelect() , combineX86AddSub() , combineX86CloadCstore() , combineX86GatherScatter() , combineX86INT_TO_FP() , combineX86SetCC() , combineX86ShuffleChain() , combineX86ShufflesConstants() , combineX86SubCmpForFlags() , combineXor() , combineXorSubCTLZ() , combineXorToBitfieldInsert() , combineZext() , commuteSelect() , llvm::DomTreeNodeBase< BlockT >::compare() , llvm::sys::unicode::compareNode() , llvm::ScaledNumber< uint64_t >::compareTo() , llvm::ScaledNumber< uint64_t >::compareTo() , llvm::BTFTypeFuncProto::completeType() , llvm::WasmException::computeCallSiteTable() , llvm::ProfileSummaryBuilder::computeDetailedSummary() , computeDomSubtreeCost() , computeFlagsForAddressComputation() , llvm::ScheduleDAGSDNodes::computeLatency() , llvm::EHStreamer::computePadMap() , llvm::MachineBasicBlock::computeRegisterLiveness() , computeShapeInfoForInst() , llvm::object::computeSymbolSizes() , constantFold() , llvm::constructSeqOffsettoOrigRowMapping() , llvm::DwarfUnit::constructSubprogramArguments() , llvm::codeview::consume() , llvm::DIExpressionCursor::consume() , llvm::codeview::consume_numeric() , llvm::ImmutableGraph< NodeValueT, EdgeValueT >::NodeSet::contains() , llvm::ConvertCostTableLookup() , convertMergedOpToPredOp() , convertMLOADToLoadWithUsedBytesMask() , ConvertSelectToConcatVector() , ConvertSETCCToXori() , convertTwoLoadsAndCmpToVCMPEQUB() , llvm::IntervalMapImpl::NodeBase< std::pair< KeyT, KeyT >, ValT, LeafSize >::copy() , llvm::SelectionDAG::copyExtraInfo() , copyMetadataForAtomic() , llvm::copyMetadataForLoad() , llvm::copyNonnullMetadata() , llvm::copyRangeMetadata() , llvm::CostTableLookup() , llvm::StringRef::count() , llvm::ScaledNumberBase::countLeadingZeros32() , llvm::ScaledNumberBase::countLeadingZeros64() , countOperands() , llvm::InstrEmitter::CountResults() , llvm::Function::Create() , llvm::Function::Create() , llvm::PointerSumType< TagT, MemberTs... >::create() , llvm::IRBuilderBase::CreateAggregateRet() , llvm::DwarfUnit::createAndAddDIE() , llvm::AbstractDependenceGraphBuilder< GraphType >::createDefUseEdges() , llvm::AbstractDependenceGraphBuilder< DataDependenceGraph >::createDefUseEdges() , llvm::AbstractDependenceGraphBuilder< DataDependenceGraph >::createFineGrainedNodes() , llvm::DIBuilder::createGlobalVariableExpression() , llvm::createGraphFilename() , createIrreducibleLoop() , llvm::AbstractDependenceGraphBuilder< DataDependenceGraph >::createMemoryDependencyEdges() , llvm::SlotTracker::createMetadataSlot() , llvm::createPGONameMetadata() , llvm::sys::unicode::createRoot() , createThunkName() , customLegalizeToWOp() , customLegalizeToWOp() , customLegalizeToWOpWithSExt() , customLegalizeToWOpWithSExt() , CustomNonLegalBITCASTResults() , DAGCombineAddc() , llvm::SelectionDAG::DAGUpdateListener , llvm::DbgEntity::DbgEntity() , llvm::DDGEdge::DDGEdge() , llvm::DDGEdge::DDGEdge() , llvm::DDGNode::DDGNode() , llvm::DDGNode::DDGNode() , llvm::DebugLoc::DebugLoc() , DecodeDisp() , DecodeIITType() , llvm::AArch64_AM::decodeLogicalImmediate() , decodePCDBLOperand() , decodePunycode() , decodeRegisterClass() , decodeSImmOperandAndLslN() , llvm::DWARFTypePrinter< DieType >::decomposeConstVolatile() , llvm::SelectionDAG::DeleteNode() , llvm::IntrusiveBackList< Node >::deleteNode() , llvm::MDNode::deleteTemporary() , llvm::DomTreeBuilder::SemiNCAInfo< DomTreeT >::DeleteUnreachable() , llvm::SDValue::DenseMapInfo< SDValue > , llvm::DependenceGraphInfo< DDGNode >::DependenceGraphInfo() , llvm::OutlinedHashTree::depth() , llvm::AbstractDependenceGraphBuilder< GraphType >::destroyNode() , llvm::HexagonDAGToDAGISel::DetectUseSxtw() , determineVPlanVF() , llvm::DFCalculateWorkObject< BlockT >::DFCalculateWorkObject() , llvm::DGEdge< DDGNode, DDGEdge >::DGEdge() , llvm::DIArgListKeyInfo::DIArgListKeyInfo() , llvm::DictScope::DictScope() , llvm::DirectedGraph< DDGNode, DDGEdge >::DirectedGraph() , doNotCSE() , llvm::ArrayRef< llvm::cfg::Update< MachineBasicBlock * > >::drop_back() , llvm::BinaryStreamRefBase< RefType, StreamType >::drop_back() , llvm::MutableArrayRef< char >::drop_back() , llvm::StringRef::drop_back() , llvm::drop_begin() , llvm::drop_end() , llvm::ArrayRef< llvm::cfg::Update< MachineBasicBlock * > >::drop_front() , llvm::BinaryStreamRefBase< RefType, StreamType >::drop_front() , llvm::BinarySubstreamRef::drop_front() , llvm::MutableArrayRef< char >::drop_front() , llvm::StringRef::drop_front() , llvm::BinaryStreamRefBase< RefType, StreamType >::drop_symmetric() , llvm::LexicalScope::dump() , llvm::sandboxir::SchedBundle::dump() , llvm::SelectionDAG::dump() , llvm::ScheduleDAGSDNodes::dumpNode() , DumpNodes() , DumpNodesr() , earlyExpandDIVFIX() , llvm::LazyCallGraph::Edge::Edge() , llvm::LazyCallGraph::Edge::Edge() , llvm::SDPatternMatch::EffectiveOperands< ExcludeChain >::EffectiveOperands() , llvm::SDPatternMatch::EffectiveOperands< false >::EffectiveOperands() , eliminateFPCastPair() , llvm::OnDiskChainedHashTableGenerator< Info >::Emit() , emitErrorAndReplaceIntrinsicResults() , llvm::SystemZAsmPrinter::emitFunctionEntryLabel() , llvm::InstrProfRecordWriterTrait::EmitKey() , llvm::InstrProfRecordWriterTrait::EmitKeyDataLength() , llvm::memprof::CallStackWriterTrait::EmitKeyDataLength() , llvm::memprof::FrameWriterTrait::EmitKeyDataLength() , llvm::memprof::RecordWriterTrait::EmitKeyDataLength() , llvm::AsmPrinter::emitNops() , llvm::ScheduleDAGSDNodes::EmitSchedule() , llvm::MipsMCCodeEmitter::encodeInstruction() , llvm::SDNodeIterator::end() , llvm::SUnitIterator::end() , llvm::SelectionDAGISel::EnforceNodeIdInvariant() , llvm::EnumEntry< T >::EnumEntry() , llvm::EnumEntry< T >::EnumEntry() , llvm::const_iterator< MemoryLocation >::erase() , llvm::const_iterator< MemoryLocation >::erase() , llvm::ImmutableGraph< NodeValueT, EdgeValueT >::NodeSet::erase() , llvm::EscapeEnumerator::EscapeEnumerator() , llvm::HexagonEvaluator::evaluate() , Expand64BitShift() , llvm::TargetLowering::expandABD() , llvm::TargetLowering::expandABS() , llvm::TargetLowering::expandAVG() , llvm::TargetLowering::expandBITREVERSE() , llvm::TargetLowering::expandBSWAP() , llvm::TargetLowering::expandDIVREMByConstant() , llvm::TargetLowering::expandFMINIMUM_FMAXIMUM() , expandIntrinsicWChainHelper() , llvm::TargetLowering::expandMUL() , expandMul() , expandMulToAddOrSubOfShl() , expandMulToNAFSequence() , expandMulToShlAddShlAdd() , llvm::TargetLowering::expandPartialReduceMLA() , ExpandREAD_REGISTER() , llvm::TargetLowering::expandVectorFindLastActive() , llvm::TargetLowering::expandVPBITREVERSE() , llvm::TargetLowering::expandVPBSWAP() , llvm::TargetLowering::expandVPCTTZElements() , llvm::PPCTargetLowering::expandVSXLoadForLE() , llvm::PPCTargetLowering::expandVSXStoreForLE() , ExtendUsesToFormExtLoad() , llvm::SPIRV::extractFunctionTypeFromMetadata() , extractMDNode() , llvm::HexagonDAGToDAGISel::FastFDiv() , llvm::HexagonDAGToDAGISel::FDiv() , llvm::CallGraphUpdater::finalize() , llvm::DIBuilder::finalize() , llvm::GISelWorkList< 512 >::finalize() , llvm::StringRef::find() , llvm::LexicalScopes::findAbstractScope() , llvm::PMTopLevelManager::findAnalysisUsage() , FindBFIToCombineWith() , llvm::SwitchCG::SwitchLowering::findBitTestClusters() , FindCallSeqStart() , llvm::DGNode< DDGNode, DDGEdge >::findEdgesTo() , llvm::DGNode< DDGNode, DDGEdge >::findEdgeTo() , llvm::IntervalMapImpl::BranchNode< KeyT, ValT, Sizer::BranchSize, Traits >::findFrom() , llvm::IntervalMapImpl::LeafNode< KeyT, ValT, Sizer::LeafSize, Traits >::findFrom() , findGluedUser() , llvm::DirectedGraph< DDGNode, DDGEdge >::findIncomingEdgesToNode() , llvm::LexicalScopes::findInlinedScope() , llvm::SwitchCG::SwitchLowering::findJumpTables() , llvm::LexicalScopes::findLexicalScope() , findMemSDNode() , findMoreOptimalIndexType() , llvm::DirectedGraph< DDGNode, DDGEdge >::findNode() , llvm::DirectedGraph< DDGNode, DDGEdge >::findNode() , findNonImmUse() , findPartitions() , findPointerConstIncrement() , llvm::DomTreeBuilder::SemiNCAInfo< DomTreeT >::FindRoots() , findVSplat() , llvm::ItaniumPartialDemangler::finishDemangle() , FixupMMXIntrinsicTypes() , llvm::SelectionDAG::FlagInserter::FlagInserter() , fnegFoldsIntoOp() , foldADCToCINC() , foldADDIForFasterLocalAccesses() , foldAddSubBoolOfMaskedVal() , foldAddSubOfSignBit() , foldAndToUsubsat() , foldBitOrderCrossLogicOp() , foldBoolSelectToLogic() , foldCondBranchOnValueKnownInPredecessorImpl() , foldCSELofCTTZ() , foldExtendedSignBitTest() , foldExtendVectorInregToExtendOfSubvector() , foldFPToIntToFP() , llvm::AMDGPUTargetLowering::foldFreeOpFromSelect() , FoldIntToFPToInt() , foldLogicOfShifts() , foldLogicTreeOfShifts() , foldMaskAndShiftToExtract() , foldMaskAndShiftToScale() , foldMaskedShiftToBEXTR() , foldMaskedShiftToScaledMask() , foldMemChr() , foldRemainderIdiom() , foldSelectOfConstantsUsingSra() , foldSelectOfCTTZOrCTLZ() , foldSelectWithIdentityConstant() , foldSubCtlzNot() , foldToSaturated() , foldVectorXorShiftIntoCmp() , foldVectorXorShiftIntoCmp() , foldVGPRCopyIntoRegSequence() , foldVSelectToSignBitSplatMask() , foldXor1SetCC() , foldXorTruncShiftIntoCmp() , llvm::codeview::TypeCollection::ForEachRecord() , llvm::DISubprogram::forEachRetainedNode() , llvm::format_provider< T, std::enable_if_t< support::detail::use_string_formatter< T >::value > >::format() , llvm::format_decimal() , llvm::format_hex() , llvm::format_hex_no_prefix() , format_to_buffer() , llvm::IRSimilarity::IRSimilarityCandidate::fromCanonicalNum() , llvm::sys::unicode::Node::fullName() , llvm::gsym::FunctionInfo::FunctionInfo() , llvm::GCOVBlock::GCOVBlock() , llvm::GCRoot::GCRoot() , generateEquivalentSub() , llvm::LoongArchMatInt::generateInstSeq() , false::GepNode::GepNode() , llvm::ArrayRecycler< T, Align >::Capacity::get() , llvm::IDFCalculatorDetail::ChildrenGetterTy< NodeTy, IsPostDom >::get() , llvm::IDFCalculatorDetail::ChildrenGetterTy< BasicBlock, IsPostDom >::get() , llvm::LazyCallGraph::get() , llvm::ScaledNumber< uint64_t >::get() , llvm::PPC::get_VSPLTI_elt() , llvm::MipsTargetLowering::getAddrGlobal() , llvm::MipsTargetLowering::getAddrGlobalLargeGOT() , llvm::MipsTargetLowering::getAddrGPRel() , llvm::MipsTargetLowering::getAddrLocal() , llvm::MipsTargetLowering::getAddrNonPIC() , llvm::MipsTargetLowering::getAddrNonPICSym64() , llvm::NVPTXDAGToDAGISel::getAddrSpace() , llvm::SelectionDAG::getAddrSpaceCast() , llvm::rdf::Liveness::getAllReachingDefs() , llvm::offloading::amdgpu::getAMDGPUMetaDataFromImage() , getArray() , llvm::msgpack::Document::getArrayNode() , llvm::yaml::PolymorphicTraits< DocNode >::getAsMap() , getAsNonOpaqueConstant() , llvm::yaml::PolymorphicTraits< DocNode >::getAsScalar() , llvm::yaml::PolymorphicTraits< DocNode >::getAsSequence() , llvm::SelectionDAG::getAssertAlign() , llvm::json::Value::getAsUINT64() , llvm::SelectionDAG::getAtomic() , getBasePtrIndex() , llvm::SelectionDAG::getBasicBlock() , llvm::SelectionDAG::getBlockAddress() , llvm::MachineFunction::getBlockNumbered() , llvm::sandboxir::SchedBundle::getBot() , getBuildPairElt() , getBuildVectorizedValue() , llvm::EdgeBundles::getBundle() , llvm::IRSimilarity::IRSimilarityCandidate::getCanonicalNum() , llvm::X86TTIImpl::getCastInstrCost() , llvm::object::MachOObjectFile::getChainedFixupsSegments() , llvm::pdb::NativeEnumGlobals::getChildAtIndex() , llvm::pdb::NativeEnumInjectedSources::getChildAtIndex() , llvm::pdb::NativeEnumLineNumbers::getChildAtIndex() , llvm::pdb::NativeEnumModules::getChildAtIndex() , llvm::pdb::NativeEnumSymbols::getChildAtIndex() , llvm::pdb::NativeEnumTypes::getChildAtIndex() , llvm::DomTreeBuilder::SemiNCAInfo< DomTreeT >::getChildren() , llvm::DomTreeBuilder::SemiNCAInfo< DomTreeT >::getChildren() , llvm::GraphDiff< MachineBasicBlock *, false >::getChildren() , getCombineLoadStoreParts() , llvm::SelectionDAG::getCondCode() , llvm::SelectionDAG::getConstant() , llvm::SelectionDAG::getConstantFP() , llvm::SelectionDAG::getConstantPool() , llvm::SelectionDAG::getConstantPool() , llvm::getConstantValue() , llvm::legacy::FunctionPassManagerImpl::getContainedManager() , llvm::legacy::PassManagerImpl::getContainedManager() , llvm::FPPassManager::getContainedPass() , llvm::LPPassManager::getContainedPass() , llvm::RGPassManager::getContainedPass() , llvm::SelectionDAG::getCopyToReg() , llvm::SelectionDAG::getCopyToReg() , llvm::SelectionDAG::getCopyToReg() , llvm::ScheduleDAGSDNodes::getCustomGraphFeatures() , llvm::SelectionDAG::getDbgValue() , llvm::SelectionDAG::getDeactivationSymbol() , llvm::DominatorTreeBase< BlockT, false >::getDescendants() , llvm::cl::generic_parser_base::getDescription() , llvm::cl::parser< DataType >::getDescription() , llvm::NVPTXTargetLowering::getDivF32Level() , getDivRemArgList() , getDivRemLibcall() , llvm::MipsTargetLowering::getDllimportSymbol() , llvm::MipsTargetLowering::getDllimportVariable() , llvm::BFIDOTGraphTraitsBase< BlockFrequencyInfo, BranchProbabilityInfo >::getEdgeAttributes() , llvm::DOTGraphTraits< SplitGraph >::getEdgeAttributes() , llvm::StructType::getElementType() , llvm::msgpack::Document::getEmptyNode() , getEncodedIntegerLength() , llvm::AMDGPU::getEncodingFromOperandTable() , llvm::DomTreeGraphTraitsBase< Node, ChildIterator >::getEntryNode() , llvm::GraphTraits< const DDGNode * >::getEntryNode() , llvm::GraphTraits< const VPBlockBase * >::getEntryNode() , llvm::GraphTraits< DDGNode * >::getEntryNode() , llvm::GraphTraits< Inverse< MemoryAccess * > >::getEntryNode() , llvm::GraphTraits< LazyCallGraph * >::getEntryNode() , llvm::GraphTraits< LazyCallGraph::Node * >::getEntryNode() , llvm::GraphTraits< MemoryAccess * >::getEntryNode() , llvm::GraphTraits< SDNode * >::getEntryNode() , llvm::GraphTraits< SplitGraph >::getEntryNode() , llvm::GraphTraits< SUnit * >::getEntryNode() , llvm::GraphTraits< VPBlockBase * >::getEntryNode() , llvm::GraphTraits< VPBlockDeepTraversalWrapper< const VPBlockBase * > >::getEntryNode() , llvm::GraphTraits< VPBlockDeepTraversalWrapper< VPBlockBase * > >::getEntryNode() , llvm::GraphTraits< VPBlockShallowTraversalWrapper< const VPBlockBase * > >::getEntryNode() , llvm::GraphTraits< VPBlockShallowTraversalWrapper< VPBlockBase * > >::getEntryNode() , llvm::GraphTraits< VPlan * >::getEntryNode() , llvm::MachineDomTreeGraphTraitsBase< Node, ChildIterator >::getEntryNode() , llvm::BasicTTIImplBase< BasicTTIImpl >::getEstimatedNumberOfCaseClusters() , getExtendForIntVecReduction() , getExtendTypeForNode() , llvm::SelectionDAG::getExternalSymbol() , getExtractedDemandedElts() , getFauxShuffleMask() , getFieldRawString() , llvm::getFpImmVal() , llvm::ScaledNumber< uint64_t >::getFraction() , llvm::SelectionDAG::getFrameIndex() , llvm::ItaniumPartialDemangler::getFunctionBaseName() , llvm::IndexedInstrProfReader::getFunctionBitmap() , llvm::ItaniumPartialDemangler::getFunctionDeclContextName() , llvm::ItaniumPartialDemangler::getFunctionName() , llvm::ItaniumPartialDemangler::getFunctionParameters() , llvm::ItaniumPartialDemangler::getFunctionReturnType() , llvm::getGatherScatterIndex() , llvm::getGatherScatterScale() , llvm::SelectionDAG::getGatherVP() , llvm::StatepointOpers::getGCPointerMap() , llvm::SelectionDAG::getGetFPEnv() , llvm::SelectionDAG::getGlobalAddress() , getGlobalForName() , llvm::SelectionDAG::getGraphAttrs() , llvm::ScheduleDAGSDNodes::getGraphNodeLabel() , getHalf() , llvm::ScaledNumberBase::getHalf() , llvm::DIArgListInfo::getHashValue() , llvm::MDNodeInfo< NodeTy >::getHashValue() , getHexDigit() , llvm::getImmVal() , llvm::SelectionDAG::getIndexedStoreVP() , getInputChainForNode() , llvm::TargetInstrInfo::getInstrLatency() , getInstrProfSection() , llvm::IRBuilderBase::getIntN() , llvm::IRBuilderBase::getIntNTy() , getIntrinsicID() , llvm::ScaledNumber< uint64_t >::getInverse() , llvm::SelectionDAG::getJumpTable() , llvm::yaml::PolymorphicTraits< DocNode >::getKind() , llvm::SelectionDAG::getLabelNode() , getLargeExternalSymbol() , getLargeGlobalAddress() , llvm::SelectionDAG::getLifetimeNode() , llvm::SelectionDAG::getLoad() , llvm::SelectionDAG::getLoadFFVP() , llvm::SelectionDAG::getLoadVP() , llvm::SelectionDAG::getMachineNode() , llvm::msgpack::Document::getMapNode() , llvm::SelectionDAG::getMaskedGather() , llvm::SelectionDAG::getMaskedHistogram() , llvm::SelectionDAG::getMaskedLoad() , llvm::SelectionDAG::getMaskedScatter() , llvm::SelectionDAG::getMaskedStore() , llvm::AMDGPU::IsaInfo::getMaxWorkGroupsPerCU() , llvm::SelectionDAG::getMCSymbol() , llvm::SelectionDAG::getMDNode() , getMDNodeOperandImpl() , llvm::getMDOperandAsType() , llvm::SelectionDAG::getMemIntrinsicNode() , getMemOpKey() , llvm::MDNode::getMergedCalleeTypeMetadata() , llvm::SlotTracker::getMetadataSlot() , getMetadataTypeOrder() , getMetadataTypeOrder() , llvm::getN1Bits() , llvm::AliasScopeNode::getName() , llvm::AMDGPU::getNameFromOperandTable() , llvm::rdf::Liveness::getNearestAliasedRef() , llvm::TargetLowering::getNegatedExpression() , llvm::ilist_detail::NodeAccess::getNext() , llvm::ilist_detail::NodeAccess::getNext() , llvm::iplist_impl< IntrusiveListT, TraitsT >::getNextNode() , llvm::iplist_impl< IntrusiveListT, TraitsT >::getNextNode() , llvm::msgpack::Document::getNode() , llvm::msgpack::Document::getNode() , llvm::msgpack::Document::getNode() , llvm::msgpack::Document::getNode() , llvm::msgpack::Document::getNode() , llvm::msgpack::Document::getNode() , llvm::msgpack::Document::getNode() , llvm::msgpack::Document::getNode() , llvm::msgpack::Document::getNode() , llvm::SelectionDAG::getNode() , llvm::SelectionDAG::getNode() , llvm::SelectionDAG::getNode() , llvm::SelectionDAG::getNode() , llvm::SelectionDAG::getNode() , llvm::SelectionDAG::getNode() , llvm::VECustomDAG::getNode() , llvm::VECustomDAG::getNode() , llvm::VECustomDAG::getNode() , llvm::BFIDOTGraphTraitsBase< BlockFrequencyInfo, BranchProbabilityInfo >::getNodeAttributes() , llvm::DOTGraphTraits< ScheduleDAG * >::getNodeAttributes() , llvm::DOTGraphTraits< ScheduleDAGMI * >::getNodeAttributes() , llvm::DOTGraphTraits< SelectionDAG * >::getNodeAttributes() , llvm::DOTGraphTraits< SplitGraph >::getNodeAttributes() , llvm::DOTGraphTraits< SplitGraph >::getNodeDescription() , llvm::ImmutableGraph< MachineInstr *, int >::getNodeIndex() , llvm::DOTGraphTraits< SplitGraph >::getNodeLabel() , llvm::getNodePassthru() , llvm::ilist_detail::NodeAccess::getNodePtr() , llvm::ilist_detail::NodeAccess::getNodePtr() , llvm::ilist_detail::SpecificNodeAccess< OptionsT >::getNodePtr() , llvm::ilist_detail::SpecificNodeAccess< OptionsT >::getNodePtr() , getNodeRegMask() , llvm::AbstractDependenceGraphBuilder< GraphType >::getNodesInPiBlock() , llvm::DDGBuilder::getNodesInPiBlock() , getNonCompileUnitScope() , llvm::SelectionDAGBuilder::getNonRegisterValue() , llvm::EmptyMatchContext::getNumOperands() , llvm::SDPatternMatch::BasicMatchContext::getNumOperands() , llvm::VPMatchContext::getNumOperands() , getNumOperandsNoGlue() , llvm::InstrProfRecord::getNumValueData() , llvm::AArch64CC::getNZCVToSatisfyCondCode() , llvm::GVNExpression::BasicExpression::getOperand() , llvm::NamedMDNode::getOperand() , llvm::VPUser::getOperand() , llvm::BitCodeAbbrev::getOperandInfo() , llvm::cl::generic_parser_base::getOption() , llvm::cl::parser< DataType >::getOption() , llvm::cl::generic_parser_base::getOptionValue() , llvm::cl::parser< DataType >::getOptionValue() , llvm::MachineFunction: | 2026-01-13T09:30:39 |
https://www.charterworks.com/privacy-policy/#your-choices | Privacy Policy Try Charter Pro for $1 Latest Topics AI DEI Flexible Work Management Societal Issues Resources Briefing Work Tech Research Playbooks Case Studies Toolkits, Scripts, and other Resources Solutions Charter Pro Charter Forum Charter Pro for Teams Advisory + Strategic Services Events Upcoming and Past The AI Download Charter Cortados Leading With AI Masterclass Skills Accelerators Strategy Briefings Webinars Workplace Summit About Try Charter Pro for $1 Sign In Privacy Policy Last Updated: December 14, 2021 1. WHAT CHARTER COLLECTS 1 2. HOW CHARTER USES YOUR INFORMATION 3 3. HOW CHARTER SHARES INFORMATION 5 4. THIRD PARTY COOKIES AND TRACKING TECHNOLOGIES 7 5. YOUR CHOICES 8 6. FOR READERS OUTSIDE THE US 9 7. OTHER INFORMATION 9 Charter Works, Inc. and its affiliates (“Charter Works,” “Charter,” “we,” “us,” or “our”) operate CharterWorks.com, deliver newsletters, host live events, and deliver other products and services (“Services”). This Privacy Policy describes the kinds of information Charter may gather when you use the Services, how Charter uses that information, when Charter might disclose that information, and how you can manage it. By using the Services, you are accepting the practices described in our Privacy Policy, including our use of cookies and similar online tools. If you do not agree to the terms of this Privacy Policy, please do not use the Services. We reserve the right to modify or amend the terms of our privacy policy from time to time without notice. Your continued use of our Services following the posting of changes to these terms will mean you accept those changes. Please note: our Services are under constant development. This Privacy Policy may therefore be modified and updated on an ongoing basis. Please check back to this page regularly. Our Privacy Policy does not govern or apply to information collected or used by Charter Works through other means or to websites maintained by other companies or organizations to which we may link or who may link to us. Please send any questions about privacy issues to privacy@charterworks.com. WHAT CHARTER COLLECTS The information we collect and the purposes for which we use it will depend on how you interact with Charter Works and the Services. Information You Provide to Us When you use the Services, you may provide us the following: Registration, Subscription or Contact Information such as e-mail address, name, phone number, shipping address, and billing information Demographic and interest information such as your age, date of birth, gender, interests, lifestyle information, and hobbies Financial and transactional information such as credit or debit card number, verification number, and expiration date, to process payments and information about your transactions and purchases with us. Please note: payment information goes to our payment processors and is not collected, processed, or stored by Charter Works. Customer service information such as questions and other messages you address to us directly through online forms, by email, over the phone, or by post, and summaries or voice recordings of your interactions with customer care Employment or Education Information such as education history, employment experience, business contact information User-generated content such as comments on articles, photos, videos, audio, any information you submit in public forums or message boards, reviews and feedback or testimonials you provide about our Services Marketing information such as information related to your preferences for receiving communications, subscribing to our publications, newsletters, and other content Survey, market research or sweepstakes information such as information gathered when you complete a survey, participate in market research, or enter a contest, sweepstakes, or game relating to the Services. Social media information if you link your account or access the Services through a third-party connection or log-in, we may have access to any information you provide to that social network depending on your privacy settings Other information any other information you choose to directly provide to us in connection with your use of the Services Information We Automatically Collect We may collect information about your use of the Services, including: Device information and identifiers : such as computer or mobile device model, IP address, other unique device identifiers, operating system version, browser type, language, and settings Usage information : such as information about the Services you use, the time, date, and duration of your use of the Services, newsletter open-rate, referral information, your interaction with content offered through the Services, search terms used, referring website, and software crash reports. We also collect information stored using cookies, mobile ad identifiers, and similar technologies set on your device. Our servers may automatically keep an activity log of your use of the Services. We may collect such usage information at the individual or aggregate level. Please see Section Four of this Privacy Policy (THIRD PARTY COOKIES AND TRACKING TECHNOLOGIES ) for more information about how we collect and use this information. Location information : such as city, state and ZIP code associated with your IP address and precise geolocation information from your devices, with your permission in accordance with your mobile device settings. Information We Receive from Third Parties We may receive information about you from third parties and combine it with information we receive from or about you, including: Information from social media networks When you interact with Charter Works a social media service or log in using social media credentials, depending on your social media settings, we may have access to your information from that social network such as your social media account ID and/or user name associated with that social media service, your profile picture, email address, friends list or information about the people and groups you are connected to and how you interact with them, and any information you have made public in connection with that social media service, Information from third party email and subscription providers and/or processors When you purchase one of our subscription products on a third-party services or stores subscription (including the Apple Store), we receive personal information from the third parties that help us process emails and subscriptions. Please note: Charter Works does not receive (or collect, process, or store) any payment card industry (“PCI”) data. Information from publicly or commercially available sources We may collect information from third parties such as consumer data resellers that make available information, collected both online and offline, such as demographic information, additional contact information, group affiliations, occupational information, and educational background, which we may combine with other information we receive from or about you. Other Information We Collect Charter also may collect other information about you, your device, or your use of the Services in ways that we describe to you at the point of collection, or otherwise, with your consent. You may choose not to provide us with certain types of information but doing so may affect your experience in using the Services. HOW CHARTER USES YOUR INFORMATION Charter uses your information to personalize and improve your experience using the Services in the ways described below, or in other ways at your direction or with your consent. To Provide the Services For example, to: Process and fulfill your transactions , including subscriptions or memberships, and enable you to login to the Services, Contact you and send you communications about the Services (including communications you request like newsletters) and share invitations to events or offers about Charter products or our third-party partners’ products Respond to you and your comments, inquiries, or requests; and transmit legal notices, policy updates, and other important information about the Services, Provide features of the Services (such as social sharing and comments) and to post content you submit, Provide customer support , administer loyalty programs, contests, promotions, or surveys, or Identify and repair errors that impair the function of the Services and to detect security incidents Protect the rights of Charter and others, detect, investigate, and prevent activities that may violate our policies or may be fraudulent, illegal; to protect, enforce, or defend the legal rights, privacy, safety, or property of Charter Works, its employees, agents, or users; or as required by law. Please note: all editorial and commercial email messages include instructions for unsubscribing from such future communications. To Deliver Personalized Content and Recommendations For example, to: Customize features of the Services, Deliver relevant content and to provide you with an enhanced experience based on your activities and interests Send you personalized newsletters , surveys, and information about products, services and promotions offered by us, our partners, and other organizations with which we work Facilitate the delivery of targeted advertising (including interest-based advertising), promotions, and offers, on behalf of ourselves and our third-party advertisers, both on our websites and elsewhere Customize content that our third-party partners deliver on the Services (e.g., personalized third-party advertising) based on your activity on the Services Create and update inferences and profiles about you that can be used for advertising and marketing on the Services, third party services and platforms, and mobile apps, or for analytics, Measure and report on the delivery of advertisements Please note: all editorial and commercial email messages include instructions for unsubscribing from such future communications. To enable us to provide these Services, we may use the information we collect to identify you across sessions, browsers, and/or devices. Please see Section Four of this Privacy Policy (THIRD PARTY COOKIES AND TRACKING TECHNOLOGIES ) for further information about our and third parties’ use of cookies and other tracking technologies and your choices related to targeted advertising. To Learn About Our Users and Improve Services We conduct analysis and research on our users’ demographics, interests, and behavior and perform statistical analysis of our users, their use of the Services, and their purchasing patterns. We do this to optimize and improve the Services, our products, and our operations. To Combine Information for All the Purposes Described Above We may use the information gathered from one aspect of the Services to enhance other aspects of Services and we may combine information gathered from multiple aspects of the Services into a single user record. We also may use or combine information that we collect offline or that we collect or receive from third-party sources for many reasons, including to enhance, expand, and check the accuracy of our records. Data collected from a particular computer, browser or device may be used with another computer, browser or device that is linked to the computer, browser, or device on which such data was collected. HOW CHARTER SHARES INFORMATION Charter’s information-sharing practices vary based on the type of information and the type of recipient. Aggregate Or De-Identified Information We may use and share deidentified information with third parties in any manner for any purposes. Subscription Providers If your subscription is provided in whole or in part by your employer or other third party, we may share with them information about your access and use of your subscription. If you have a subscription associated with a professor or school, we may notify your professor or school to confirm your subscription, access, or use. When providing information to a subscription provider, we may reveal limited amounts of your personal information such as your name or email address. Service Providers and Professional Advisors We share information with third party agents and vendors who perform functions on our behalf, including, but not limited to, web hosting, content syndication, content management, social media integration, marketing, analytics, product development, email or text message transmission, billing or payment processing, order fulfillment, auditing, and customer service. We also may disclose your personal information to professional advisors, such as lawyers, bankers, auditors, and insurers, where necessary in the course of the professional services that they render to us. Service providers and professional advisors with whom we share information will be obligated to maintain the confidentiality (as appropriate for the services) and security of personal information Charter transmits to them. Third Party Content and/or Advertising Partners Third parties that provide content, advertising, or functionality to the Services may collect or receive information about you and/or your use of the Services, using cookies, beacons, and similar technologies. Third party content and/or advertising partners may use such information to provide you with advertising that is based on your interests and to measure and analyze ad performance on our Services or other websites or platforms, and combine it with information collected across different websites, online services, and other devices. Please note: third parties’ use of your information will be based on their own privacy policies. Social Media Platforms and Services If you log in with or connect a social media service account to a Charter Works Service, certain information may be available to the social media platform, in which case the social media platform’s use of the shared information will be governed by the social media platform’s privacy policy and your privacy settings for that platform. If you do not want your personal information shared as described, please do not connect your social media platform account with your Charter Works account, and do not participate in social sharing on the Services. Providers of Co-Branded Services Charter may offer co-branded services or features, such as conferences, events, contests, sweepstakes, or other promotions together with a third party (“Co-Branded Services”). Co-Branded Services may be hosted by Charter Works or through the third party’s services. Charter may share the information you submit in connection with the Co-Branded Service with the applicable third party or the third party may receive certain information from you at the same time Charter does. Please note: a third party’s use of your information will be governed by the third party’s privacy policy. Other Users of The Services Any information (including your name, location, email address, profile information, and comments) you choose to submit through the use certain features of the Services that provide an opportunity to interact with Charter and other Charter users (e.g., community forums, Slack groups) may be publicly available. Charter is not responsible for any information you choose to submit and make public through these channels of communication. Business Transferees In the event of a corporate change in control (for instance, a sale or merger) or due diligence in contemplation thereof, Charter Works may transfer your personal information to the new party in control or the party acquiring assets. With Your Consent at Your Direction We may also share your information with your consent. The Services may link to third-party websites and services that are outside our control. We are not responsible for the security or privacy of any information collected by these third parties, which operate pursuant to their respective privacy policies. THIRD PARTY COOKIES AND TRACKING TECHNOLOGIES Cookies are small text files that are stored in your device’s browser when you visit a website that enable the business that places the cookie business to recognize a user across one or more browsing sessions, and across one or more websites. When you use the Services, we and our third-party partners use cookies, pixel tags, device IDs and other similar technologies (collectively, “Cookies”) to collect information from your browser or device for the purposes of information storage and access; personalization of the Services; measurement of and analytics regarding the use of the Services; content selection, delivery, and reporting; and advertising selection, targeting, delivery, and reporting. By using the Services, you consent to our use of cookies and similar technologies. The following types of Cookies are used in the Services: Essential Cookies Essential Cookies enable you to browse our Services and use certain features. Disabling Essential Cookies may prevent you from using certain parts of the Services. These cookies also help keep our Services safe and secure. Preference Cookies Preference Cookies store information such as your login data, if applicable, and website preferences. Disabling Preference Cookies may hinder our ability to remember certain choices you’ve previously made or personalize your browsing experience by providing you with relevant information. Preference cookies can also be used to recognize your device so that you do not have to provide the same information more than once. Performance Cookies Performance Cookies collect information about how you use the Services such as which pages you visit regularly. Performance cookies are used to provide you with a high-quality experience by doing things such as tracking page load, site response times, and error messages. Content and Advertising Cookies Content and Advertising Cookies gather information about your use of our services so we provide you with more relevant content and advertising on the Services and elsewhere online and across your devices. Content and Advertising Cookies are also used to gather feedback on customer satisfaction through surveys. They remember that you’ve visited the Services and help Chart understand usage of the Services. Some Content and Advertising cookies are from third parties that collect information about your use of our Services to provide advertising (on our Services and elsewhere, across your different devices) based on your online activities (so-called “interest-based advertising”). Charter may not have access to these cookies, although we may use statistical information arising from the cookies provided by these third parties to customize content and for the other purposes described above. Please note: Charter does not control the privacy practices of these third parties, and their practices are not covered by this Privacy Policy. YOUR CHOICES There are several ways to minimize tracking of your online activity by third parties, some of which we have summarized below. We hope you find this information to be a helpful reference. Please note: using these tools to opt out of tracking and targeting does not mean that you will not receive advertising while using our Services or on other websites. Controls for Cookies and Online Tracking Choices Since many of these opt-out tools are specific to a device or browser, you will need to opt out on every browser and device that you use. Blocking Cookies in Your Browser . Most browsers let you remove or reject cookies, including cookies used for interest-based advertising. To do this, follow the instructions in your browser settings. Many browsers accept cookies by default until you change your settings. If you wish to opt-out of Google Analytics’ tracking, use this browser add-on provided by Google . Blocking advertising ID use in your mobile settings. Your mobile device settings may provide functionality to limit use of the advertising ID associated with your mobile device for interest-based advertising purposes. For more information about how to change these settings for Apple, Android or Windows devices, see: Apple: http://support.apple.com/kb/HT4228 Android: http://www.google.com/policies/technologies/ads/ Windows: http://choice.microsoft.com/en-US/opt-out Using privacy plug-ins or browsers . You also may use a browser with privacy features, like Brave, or install browser plugins like Privacy Badger , Ghostery or uBlock Origin . These may offer tools to block or limit third-party cookies/trackers. Platform opt-outs. The following advertising platforms offer opt-out features that let you opt-out of certain uses of your information for interest-based advertising: Google and Facebook Advertising industry opt-out tools. You can use these opt-out options to limit use of your interest-based advertising by participating companies: Digital Advertising Alliance and Network Advertising Initiative . Please note: opting-out of advertising networks’ tracking and targeting does not mean that you will not receive advertising while using our Services or on other websites, nor will it prevent the receipt of interest-based advertising from third parties that do not participate in these programs. It will exclude you, however, from interest-based advertising conducted through participating networks, as provided by their policies and choice mechanisms. Accessing Your Information You can request to access, review, correct, update, delete or modify your registration or subscription profile information (if Charter maintains such information) and modify your marketing preferences (where applicable) by contacting privacy@charterworks.com. Please note: if you have subscribed or registered for multiple of our Services or subscriptions, you may need to update your information for each account separately. Emails, Newsletters, and Text Messages You may always opt-out of receiving future e-mail marketing messages and newsletters from Charter Works by following the instructions contained within the emails and newsletters, or by e-mailing us at privacy@charterworks.com. You may opt out of receiving promotions or advertising via Text Message at any time, by replying “STOP” to one of our Text Messages. Responding To Requests For your protection, we may only implement requests with respect to the personal information associated with the email address that you use to send us your request and/or on the basis of other information we use to verify you before implementing your request. Please note: we may need to retain certain information for record-keeping purposes and/or to complete any transactions you began prior to requesting such change or deletion (e.g., when you make a purchase or enter a promotion, you may not be able to change or delete the personal information provided until after the completion or cancelation of such purchase or promotion). FOR READERS OUTSIDE THE US Charter Works is a US-based news organization, so we apply US law to our privacy practices. This means that wherever you are in the world, this Privacy Policy will apply to the information you provide to Charter or we collect when you use the Services. OTHER INFORMATION Security We take reasonable security measures to protect your information, including the use of physical, technical, and administrative controls. Please understand, however, that while we try our best to safeguard your personal information once we receive it, no transmission of data over the Internet or any other public network can be guaranteed to be 100% secure. You need to help protect the privacy of your own information. You must take precautions to protect the security of any personal information that you may transmit over any home networks, wireless routers, wireless (WiFi) networks or similar devices by using encryption and other techniques to prevent unauthorized persons from intercepting or receiving any of your personal information. You are responsible for the security of your information when using unencrypted, open access, or otherwise unsecured networks. Storage The period for which we keep information varies according to the purpose for which it is used. In some cases, there are legal requirements to keep data for a minimum period. We will retain your Personal Data for the period necessary to fulfill the purposes outlined in this Privacy Policy unless a longer retention period is required or allowed by law. Children’s Information The Services are not intended for children under 13 years of age. Charter Works does not knowingly collect personal information from children under 13 years of age. If Charter Works discovers that a child under the age of 13 has provided Charter Works with personal information and we do not have parental consent, Charter Works will delete that child’s information. If you believe that company has been provided with the personal information of a child under the age of 13 without parental consent, please notify us immediately at privacy@charterworks.com Questions If you have questions about our Privacy Policy, please contact us at privacy@charterworks.com Insights Books Interviews Charter on TIME Research Connect Events Topics Artificial Intelligence Hybrid Work DEI Leadership Charter Pro Become a Member Support Sign In Search Contact Partnerships General Inquiries Company About Careers Press Newsletters Charter Briefing Charter Works Inc. © 2025 Privacy Terms of Service | 2026-01-13T09:30:39 |
http://tirkarthi.github.io/programming/2022/02/26/sqlite-json-improvements.html | JSON improvements in SQLite 3.38.0 xtreak blog whoami Comics Poems JSON improvements in SQLite 3.38.0 Feb 26, 2022 SQLite 3.38.0 introduced improvements to JSON query syntax using -> and ->> operators that are similar to PostgreSQL JSON functions . In this post we will look into how this simplifies the query syntax. Installation The JSON functions are now built-ins. It is no longer necessary to use the -DSQLITE_ENABLE_JSON1 compile-time option to enable JSON support. JSON is on by default. Disable the JSON interface using the new -DSQLITE_OMIT_JSON compile-time option. With the release of 3.38.0 JSON support is on by default. SQLite also provides pre-built binaries for Linux, Windows and Mac. For Linux you can get started with below. For other platforms please visit downloads page. wget https://www.sqlite.org/2022/sqlite-tools-linux-x86-3380000.zip unzip sqlite-tools-linux-x86-3380000.zip cd sqlite-tools-linux-x86-3380000 rlwrap ./sqlite3 I found that support for readline is missing in the prebuilt binaries. If readline and other build utilities are installed in your machine you can download and compile SQLite binary. wget https://www.sqlite.org/2022/sqlite-autoconf-3380000.tar.gz tar -xvf sqlite-autoconf-3380000.tar.gz cd sqlite-autoconf-3380000 ./configure make ./sqlite3 JSON enhancements proposal thread in SQLite forum Sample data In this post we will be using a sample data that stores the interests of a user as a JSON and see how the new operators provide support in querying. The table has an auto incrementing id as primary key with name as text and a JSON storing interests of the user. Let’s also assume the array of likes are stored in the order of preferences such that for John he likes skating the most and swimming as the last. . / sqlite3 SQLite version 3 . 38 . 0 2022 - 02 - 22 18 : 58 : 40 Enter ".help" for usage hints . Connected to a transient in - memory database . Use ".open FILENAME" to reopen on a persistent database . sqlite > create table user ( id integer primary key , name text , interests json ); sqlite > insert into user values ( null , "John" , '{"likes": ["skating", "reading", "swimming"], "dislikes": ["cooking"]}' ); sqlite > insert into user values ( null , "Kate" , '{"likes": ["reading", "swimming"], "dislikes": ["skating"]}' ); sqlite > insert into user values ( null , "Jim" , '{"likes": ["reading", "swimming"], "dislikes": ["cooking"]}' ); sqlite > . mode column sqlite > select * from user ; id name interests -- ---- ------------------------------------------------------------ 1 John { "likes" : [ "skating" , "reading" , "swimming" ], "dislikes" : [ "cooking" ]} 2 Kate { "likes" : [ "reading" , "swimming" ], "dislikes" : [ "skating" ]} 3 Jim { "likes" : [ "reading" , "swimming" ], "dislikes" : [ "cooking" ]} Operator semantics SQLite docs With the above schema in place we can now use the JSON operators to query. With -> we can have the left part as a JSON component and the right part as a path expression. -> also provides a JSON representation in return so it can be chained in nested lookups. In the below example we look for users who have reading as their first preference. Since the interests column is of JSON type we can use -> operator along with $.likes which is a path expression to get the likes attribute. Then we can pass it to ->> which also takes a path expression to its right but returns value as SQLite datatype like text, integer etc. instead of JSON. Here $[0] is used to access the first element of the array. As per docs path also supports negative indexing where $[#-1] can be used to access last element of the array. select id , name , interests from user where interests -> '$.likes' ->> '$[0]' = 'reading' ; id name interests -- ---- ----------------------------------------------------------- 2 Kate { "likes" : [ "reading" , "swimming" ], "dislikes" : [ "cooking" ]} 3 Jim { "likes" : [ "reading" , "swimming" ], "dislikes" : [ "cooking" ]} select id , name , interests from user where interests -> '$.likes' ->> '$[0]' = 'skating' ; id name interests -- ---- ------------------------------------------------------------ 1 John { "likes" : [ "skating" , "reading" , "swimming" ], "dislikes" : [ "cooking" ]} The above query can be further simplified removing $ and for integers even removing quotes. select id , name , interests from user where interests -> 'likes' ->> '[0]' = 'skating' ; id name interests -- ---- ------------------------------------------------------------ 1 John { "likes" : [ "skating" , "reading" , "swimming" ], "dislikes" : [ "cooking" ]} -- As per reddit comment in r/sql for integers even [] is optional -- Rules https://github.com/sqlite/sqlite/blob/a0318fd7b4fbedbce74f133fb0f84ff4a19ea075/src/json.c#L1554 select id , name , interests from user where interests -> 'likes' ->> 0 = 'skating' ; id name interests -- ---- ------------------------------------------------------------ 1 John { "likes" : [ "skating" , "reading" , "swimming" ], "dislikes" : [ "cooking" ]} The catch with -> and ->> is that -> returns a JSON representation and it also expects the right side to be a JSON. This might lead to some confusion like below example where using ->[0] doesn’t return any value since we are comparing JSON representation with text value of “skating” -- Returns no value select id , name , interests from user where interests -> 'likes' -> '[0]' = 'skating' ; -- Returns value select id , name , interests from user where interests -> 'likes' -> '[0]' = '"skating"' ; id name interests -- ---- ------------------------------------------------------------ 1 John { "likes" : [ "skating" , "reading" , "swimming" ], "dislikes" : [ "cooking" ]} -- Returns value too with the string represented as JSON select id , name , interests from user where interests -> 'likes' -> '[0]' = json_quote ( 'skating' ); id name interests -- ---- ------------------------------------------------------------ 1 John { "likes" : [ "skating" , "reading" , "swimming" ], "dislikes" : [ "cooking" ]} We can also the operators to get specific fields like queries. -- List of first and last preference of users with skating as their first preference select id , name , interests -> 'likes' ->> '[0]' as first_preference , interests -> 'likes' ->> '$[#-1]' as last_preference from user where interests -> 'likes' ->> '[0]' = 'skating' ; id name first_preference last_preference -- ---- ---------------- --------------- 1 John skating swimming We can also use the operators in sorting and grouping -- List of users sorted by their first preference select id , name , interests -> 'likes' ->> '[0]' as first_preference interests -> 'likes' ->> '$[#-1]' as last_preference from user order by interests -> 'likes' ->> '[0]' ; id name first_preference last_preference -- ---- ---------------- --------------- 2 Kate reading swimming 3 Jim reading swimming 1 John skating swimming -- List of users grouped by their first preference select id , name , interests -> 'likes' ->> '[0]' as first_preference , interests -> 'likes' ->> '$[#-1]' as last_preference from user group by interests -> 'likes' ->> '[0]' ; id name first_preference last_preference -- ---- ---------------- --------------- 2 Kate reading swimming 1 John skating swimming Indexing Index can also be created for a given expression thus making the query efficient. Once we create an index for querying by first preference the index is used for -- Query plan without index explain query plan select id , name , interests from user where interests -> 'likes' ->> '[0]' = 'skating' ; QUERY PLAN --SCAN user -- Create index on first preference of a user create index idx_first_preference on user ( interests -> 'likes' ->> '[0]' ); explain query plan select id , name , interests from user where interests -> 'likes' ->> '[0]' = 'skating' ; QUERY PLAN --SEARCH user USING INDEX idx_first_preference (<expr>=?) explain query plan select id , name , interests from user where interests -> 'likes' ->> '[1]' = 'skating' ; QUERY PLAN --SCAN user Conclusion Enabling JSON by default and the new operators in 3.38.0 improve adoption and ergonomics of using JSON in SQLite. PostgreSQL has more rich query support which will be hopefully added in future releases. Please enable JavaScript to view the comments powered by Disqus. xtreak blog xtreak blog tir.karthi@gmail.com tirkarthi tirkarthi A blog about programming, mistakes and eureka | 2026-01-13T09:30:39 |
https://www.frontendinterviewhandbook.com/ja-JP/companies/apple-front-end-interview-questions | Apple Front End Interview Questions | The Official Front End Interview Handbook 2025 メインコンテンツまでスキップ We are now part of GreatFrontEnd , a front end interview preparation platform created by ex-Meta and Google Engineers. Get 20% off today ! Front End Interview Handbook Start reading Practice Coding Questions System Design Quiz Questions System design Blog 日本語 English 简体中文 Español 日本語 한국어 Polski Português Русский Tagalog বাংলা 検索 Introduction Coding interview JavaScript coding User interface coding Algorithms coding Quiz/trivia interview System design interview Overview User interface components Applications Behavorial interviews Resume preparation Interview questions 🔥 Amazon interview questions Google interview questions Microsoft interview questions Meta interview questions Airbnb interview questions ByteDance/TikTok interview questions Atlassian interview questions Uber interview questions Apple interview questions Canva interview questions Dropbox interview questions LinkedIn interview questions Lyft interview questions Twitter interview questions Shopify interview questions Pinterest interview questions Reddit interview questions Adobe interview questions Palantir interview questions Salesforce interview questions Oracle interview questions Interview questions 🔥 Apple interview questions このページの見出し Apple Front End Interview Questions Latest version on GreatFrontEnd Find the latest version of this page on GreatFrontEnd's Apple Front End Interview Guide . Not much is known about Apple's front end interview process. JavaScript coding questions Implement Array.prototype methods ( flat , map , reduce , concat ) by yourself using JavaScript. Practice questions How can you execute an array of promise in sequence? User interface coding questions Implement a simple photo ordering tool with vanilla JS and no libraries. Quiz questions How do you build an npm package? What is a compositing layer in CSS? Algorithm Given an array, return an array where the each value is the product of the next two items: E.g. [3, 4, 5] -> [20, 15, 12] Source: Glassdoor Apple Front End Developer Interview Questions Insider tips from the GreatFrontEnd community These tips were shared by GreatFrontEnd users who have completed interviews with Apple. 21st May 2025 : in final rounds with apple, this is what recruiter explained There will be 4 x 45 min interviews conducted virtually so can be on 1 day or split over 2. See below for focus areas. JavaScript: Coding (similar to tech screen) Bug Hunt: Coding (working on existing code base) Web Performance (Domain knowledge questions focused on Web Performance) Product Thinking (Behavioral round focused on collaboration, balancing technical VS business needs and understanding user impact) if anyone has tips for how to practice / prepare for "bug hunt" and "product thinking" feel free to comment. i believe "web performance" will be deep JS trivia likely covering a range of concepts that are usually surfaced in FE system design interviews 2nd Dec 2024 : they have a big question bank, usually team by team case yes they ask sys design, its a faang company so the bar is really high also one of the lowest paying of the faangs lol 14th Apr 2024 : Think it was 6 total rounds All fundamentals Vanilla js 5 yoe (In response to what do you think helped you prep for: big tech, specifically apple is asking a lot of vanilla js questions, dom related questions?) GreatFrontEnd UI questions all with vanilla js implementation 3rd Apr 2024 : I finished up my Apple Phone Screen. They don’t like to ask LC questions but rather asked my background and experience with 10 mins left for a super easy js question. I guess the process really depends on the team you are about to interview for. They care more about if you are a good fit for the position rather than if you are someone who can ace a LC question. Hope I can make it to the onsite. 12th Mar 2024 : I haven’t interviewed but I applied and was preparing for it a while back. Similar to other companies Apple has started prioritising system design apart from the leetcode. For leetcoding they ask trees and sorting based questions. It depends a lot on team and level of position too. For more insider tips, visit GreatFrontEnd ! このページを編集 2025年11月30日 に Danielle Ford が 最終更新 前へ Uber interview questions 次へ Canva interview questions Table of Contents JavaScript coding questions User interface coding questions Quiz questions Algorithm Insider tips from the GreatFrontEnd community General Get started Trivia questions Company questions Blog Coding Algorithms JavaScript utility functions User interfaces System design System design overview User interface components Applications More GreatFrontEnd GitHub X Discord Contact us Tech Interview Handbook Copyright © 2025 Yangshun Tay and GreatFrontEnd | 2026-01-13T09:30:39 |
https://www.charterworks.com/1for30days/ | Upgrade to Charter Pro Try Charter Pro for $1 Latest Topics AI DEI Flexible Work Management Societal Issues Resources Briefing Work Tech Research Playbooks Case Studies Toolkits, Scripts, and other Resources Solutions Charter Pro Charter Forum Charter Pro for Teams Advisory + Strategic Services Events Upcoming and Past The AI Download Charter Cortados Leading With AI Masterclass Skills Accelerators Strategy Briefings Webinars Workplace Summit About Try Charter Pro for $1 Sign In Upgrade to Charter Pro Just $1 for the first 30 days Sharpen your expertise with Charter Pro’s original journalism, research, and expert analysis focused on the future of work, including AI, flexible work, diversity and wellness. Join Charter Pro today We use Stripe for secure and encrypted payments. With Charter Pro, get unlimited access to: In-depth reporting, exclusive analysis, and essential research to stay ahead on critical workplace issues and navigate the future of work Three premium, expert-led newsletters per week for quick decision-making insights Templates, toolkits and benchmarks to effectively lead and implement key initiatives Exclusive live events and on-demand workshops for unique networking and upskilling opportunities Trusted by change-ready leaders from innovative companies like: Preview it Research briefings tk tk tk tk Deep dives tk tk tk tk Agendas tk tk tk tk Playbooks tk tk tk tk Tools tk tk tk tk What members are saying about Charter Pro: For the past three years, Charter has been an instrumental partner in guiding me and my teams as we've navigated the ever-evolving future of work. Now with Charter Pro, I have all of their rigorous reporting at my fingertips to strengthen my executive business cases and drive quicker adoption of my recommendations.” Alex Buder Shapiro Chief People Officer, Jasper AI Charter’s “superpower is in creating a sense of connection with data, narrative, and an inspirational vision.” Keegan Evans Executive Coach Benefit from access to the Charter Pro staff and community: FAQs Why should I upgrade to Charter Pro? Become a member to get unlimited access to our news and insights, and: Learn from experts in AI, flexible work, and equity Quickly and confidently implement our customizable tools, templates, and benchmarks Connect with leaders at our live events and virtual workshops Drive business impact with essential analysis Stay ahead on critical workplace issues Can I expense a Charter Pro membership at work? Yes. Charter Pro is indispensable for your job, and expensable to your company. Many of our members use their company’s professional development budget to expense their membership. If you’d like to request that your employer sponsor your membership, here’s a template you can use. Do you have team memberships? Yes. We recognize that change is a collective rather than an individual endeavor. If you’d like to talk about getting group access to Charter Pro, email pro@charterworks.com . Why did you create Charter Pro? Charter Pro is designed to equip you with everything you need to transform 2024’s challenges into your strategic advantages. We’ve spent the past year interviewing leaders about what they need most to adapt and succeed in their role. What they told us: they urgently need research, tools, and advice for navigating the converging workplace transformations driven by AI, inclusion, and flexible work they need to be able to accessibly and continuously upskill their teams to adapt to changing economic, cultural, and technological contexts so they too can help drive change they’re hungry for a community of peers they can share and learn from What other memberships does Charter offer? We work with executives, CHROs and their leadership teams from future-forward organizations through Charter Pro CxO , a membership for owners of the talent agenda. In addition to unlimited content and event access, this membership includes unlimited advisory services, which means that we connect CxO members to work experts studying, reporting and researching all the latest developments on how work is changing and helping leaders benefit from them to drive business results. If you’re interested in learning more about Charter Pro CxO , email us at pro@charterworks.com . How do I contact Charter about memberships? You can email us at pro@charterworks.com , and someone from our team will get back to you within 48 business hours. Insights Books Interviews Charter on TIME Research Connect Events Topics Artificial Intelligence Hybrid Work DEI Leadership Charter Pro Become a Member Support Sign In Search Contact Partnerships General Inquiries Company About Careers Press Newsletters Charter Briefing Charter Works Inc. © 2025 Privacy Terms of Service | 2026-01-13T09:30:39 |
https://llvm.org/doxygen/classBitIntType.html#pub-methods | LLVM: BitIntType Class Reference LLVM  22.0.0git Public Member Functions | List of all members BitIntType Class Reference final #include " llvm/Demangle/ItaniumDemangle.h " Inheritance diagram for BitIntType: This browser is not able to show SVG: try Firefox, Chrome, Safari, or Opera instead. [ legend ] Public Member Functions   BitIntType ( const Node *Size_, bool Signed_) template<typename Fn> void  match (Fn F ) const void  printLeft ( OutputBuffer &OB) const override Public Member Functions inherited from Node   Node ( Kind K_, Prec Precedence_= Prec::Primary , Cache RHSComponentCache_= Cache::No , Cache ArrayCache_= Cache::No , Cache FunctionCache_= Cache::No )   Node ( Kind K_, Cache RHSComponentCache_, Cache ArrayCache_= Cache::No , Cache FunctionCache_= Cache::No ) template<typename Fn> void  visit (Fn F ) const   Visit the most-derived object corresponding to this object. bool   hasRHSComponent ( OutputBuffer &OB) const bool   hasArray ( OutputBuffer &OB) const bool   hasFunction ( OutputBuffer &OB) const Kind   getKind () const Prec   getPrecedence () const Cache   getRHSComponentCache () const Cache   getArrayCache () const Cache   getFunctionCache () const virtual bool   hasRHSComponentSlow ( OutputBuffer &) const virtual bool   hasArraySlow ( OutputBuffer &) const virtual bool   hasFunctionSlow ( OutputBuffer &) const virtual const Node *  getSyntaxNode ( OutputBuffer &) const void  printAsOperand ( OutputBuffer &OB, Prec P = Prec::Default , bool StrictlyWorse=false) const void  print ( OutputBuffer &OB) const virtual bool   printInitListAsType ( OutputBuffer &, const NodeArray &) const virtual std::string_view  getBaseName () const virtual  ~Node ()=default DEMANGLE_DUMP_METHOD void  dump () const Additional Inherited Members Public Types inherited from Node enum   Kind : uint8_t enum class   Cache : uint8_t { Yes , No , Unknown }   Three-way bool to track a cached value. More... enum class   Prec : uint8_t {    Primary , Postfix , Unary , Cast ,    PtrMem , Multiplicative , Additive , Shift ,    Spaceship , Relational , Equality , And ,    Xor , Ior , AndIf , OrIf ,    Conditional , Assign , Comma , Default }   Operator precedence for expression nodes. More... Protected Attributes inherited from Node Cache   RHSComponentCache : 2   Tracks if this node has a component on its right side, in which case we need to call printRight. Cache   ArrayCache : 2   Track if this node is a (possibly qualified) array type. Cache   FunctionCache : 2   Track if this node is a (possibly qualified) function type. Detailed Description Definition at line 525 of file ItaniumDemangle.h . Constructor & Destructor Documentation ◆  BitIntType() BitIntType::BitIntType ( const Node * Size_ , bool Signed_  ) inline Definition at line 530 of file ItaniumDemangle.h . References Node::Node() . Member Function Documentation ◆  match() template<typename Fn> void BitIntType::match ( Fn F ) const inline Definition at line 533 of file ItaniumDemangle.h . References F . ◆  printLeft() void BitIntType::printLeft ( OutputBuffer & OB ) const inline override virtual Implements Node . Definition at line 535 of file ItaniumDemangle.h . References Node::OutputBuffer . The documentation for this class was generated from the following file: include/llvm/Demangle/ ItaniumDemangle.h Generated on for LLVM by  1.14.0 | 2026-01-13T09:30:39 |
https://kno.wled.ge/features/effects/ | Effects - WLED Project Skip to content Join us on Discord for support and updates! WLED Project Effects Initializing search WLED Welcome Basics Features Interfaces Advanced About WLED Project WLED Welcome Basics Basics Getting Started Getting Started Quick Start Wiring Guides Top 5 mistakes Compatibility Compatibility LED strips Controllers Other Hardware Software Installation Installation Install WLED Binary Install using ESP GUI Compiling WLED Tutorials FAQ Features Features Effects Effects Table of contents Effect Overlay Retired Effects Palettes Macros Presets Segments Settings Multi-strip Support Relay Control Web GUI Sitemap White handling Pixel Art Converter Ethernet (LAN) compatibility Interfaces Interfaces Blynk DMX Output DMX Input E1.31 (DMX) / Art-Net HTTP Request API Remote Control JSON API MQTT Philips Hue Serial WLED UDP Sync UDP Realtime / tpm2.net Websocket DDP Realtime Advanced Advanced Audio Reactive WLED Home Automation Remote Access / IFTTT Security Wiring Protips Long Data Lines Compiling WLED Custom Features ESP32 Recovery Mapping Mixed 2D and 1D Bus Virtual LEDs Custom Access Point Configuration Using PIR Sensors About About Contributors & Credits Privacy Policy Upcoming Features Table of contents Effect Overlay Retired Effects Effects Version Info Effects above 117 are only available 0.14+ or Sound Reactive forks. Retired Effects - Can't find an old favorite? Look here. Effect Overlay Some effects can be overlaid on the background of another effect. To use overlay, set up segments with overlapping pixels. The overlay effect must be playing on the segment with the higher id. If the Overlay option is checked, the background will not be painted and the effect from the lower segment will be displayed. To aid in showing where colors vs palettes are used, all effects are rendered with the Party palette and the colors: Primary ( Fx ) (or black) Secondary ( Bg ) Tertiary ( Cs ). For 2D effects the background (secondary) color is set to black. ID Effect Description Flags Colors Parms 186 Akemi The WLED mascot rocking to your tunes. ▦ ♫ Head palette, Arms & Legs, Eyes & Mouth Color speed, Dance 27 Android Section of varying length running ⋮ 🎨 Fx, Bg Speed, Width 38 Aurora Simulation of the Aurora Borealis ⋮ 🎨 1, 2, 3 Speed, Intensity 183 Black Hole Colorful dots orbiting a white black hole. ▦ 🎨 Fx Fade rate, Outer Y freq., Outer X freq., Inner X freq., Inner Y freq., Solid 115 Blends Blends random colors across palette ⋮ 🎨 Shift speed, Blend speed 1 Blink Blinks between primary and secondary color ⋮ 🎨 Fx, Bg Speed, Duty cycle 26 Blink Rainbow Same as blink, cycles through the rainbow ⋮ 🎨 Fx, Bg Frequency, Blink duration 121 Blobs No really, they are blobs. ▦ 🎨 Fx Speed, # blobs, Blur 163 Blurz Flash an fftResult bin per frame and then blur/fade. ⋮ ♫ 🎨 Fx, Color mix Fade rate, Blur 91 Bouncing Balls Bouncing ball effect ⋮ 🎨 Fx, Bg, Cs Gravity, # of balls, Overlay 68 Bpm Pulses moving back and forth on palette ⋮ 🎨 Fx Speed 2 Breathe Fades between primary and secondary color ⋮ 🎨 Fx, Bg Speed 88 Candle Flicker resembling a candle flame ⋮ 🎨 Fx, Bg Speed, Intensity 102 Candle Multi Like candle effect, but each LED has it's own flicker pattern ⋮ 🎨 Fx, Bg Speed, Intensity 28 Chase 2 LEDs in primary color running on secondary ⋮ 🎨 Fx, Bg, Cs Speed, Width 37 Chase 2 Pattern of n LEDs primary and n LEDs secondary moves along the strip ⋮ 🎨 Fx, Bg Speed, Width 54 Chase 3 Like Chase, but with 3 colors ⋮ 🎨 1, 2, 3 Speed, Size 31 Chase Flash 2 LEDs flash in secondary color while the rest is lit in primary. The flashing LEDs wander from start to end ⋮ 🎨 Bg, Fx Speed 32 Chase Flash Rnd Like Chase Flash, but the 2 LEDs flash in random colors and leaves a random color behind ⋮ 🎨 Fx, Bg Speed 30 Chase Rainbow Like 28 but leaves trail of rainbow ⋮ 🎨 Fx, Bg Speed, Width 29 Chase Random Like Chase but leaves trail of random color ⋮ 🎨 Fx, Cs Speed, Width 111 Chunchun Birds flying in a circle formation ⋮ 🎨 Fx, Bg Speed, Gap size 167 Colored Bursts Rotating rays of color. ▦ 🎨 Speed, # of lines, Blur, Gradient, Dots 34 Colorful Shifting Red-Amber-Green-Blue pattern ⋮ 🎨 1, 2, 3 Speed, Saturation 8 Colorloop Cycle all LEDs through the rainbow colors ⋮ 🎨 Speed, Saturation 74 Colortwinkles LEDs light up randomly in random colors and fade off again ⋮ 🎨 Fade speed, Spawn speed 67 Colorwaves Like Pride 2015, but uses palettes ⋮ 🎨 Fx Speed, Hue 119 Crazy Bees Bees darting from flower to flower. ▦ Speed, Blur 159 DJ Light An effect emanating from the center to the edges. ⋮ ♫ Speed 152 DNA A very cool DNA like pattern. ▦ 🎨 Scroll speed, Blur 182 DNA Spiral Spiraling DNA pattern ▦ 🎨 Scroll speed, Y frequency 112 Dancing Shadows Moving spotlights ⋮ 🎨 Fx Speed, # of shadows 18 Dissolve Fills LEDs with primary in random order, then off again ⋮ 🎨 Fx, Bg Repeat speed, Dissolve speed, Random 19 Dissolve Rnd Fills LEDs with random colors in random order, then off again ⋮ 🎨 Bg Repeat speed, Dissolve speed 124 Distortion Waves Distorted sine waves with a psychedelic flair. ▦ Speed, Scale 164 Drift A rotating kaleidoscope. ▦ 🎨 Rotation speed, Blur amount 123 Drift Rose Spinning arms that adds and removes nodes as it winds and unwinds. ▦ Fade, Blur 96 Drip Water dripping effect ⋮ 🎨 Fx, Bg Gravity, # of drips, Overlay 7 Dynamic Sets each LED to a random color ⋮ 🎨 Speed, Intensity, Smooth 117 Dynamic Smooth Like Dynamic, but with smooth palette blends ⋮ 🎨 Speed, Intensity 12 Fade Fades smoothly between primary and secondary color ⋮ 🎨 Fx, Bg Speed 49 Fairy Inspired by twinkle style Christmas lights. ⋮ 🎨 Fx, Bg Speed, # of flashers 51 Fairytwinkle Like Colortwinkle, but starting from all lit ⋮ 🎨 Fx, Bg Speed, Intensity 69 Fill Noise Noise pattern ⋮ 🎨 Fx Speed 66 Fire 2012 Simulates flickering fire in red and yellow ⋮ 🎨 Cooling, Spark rate, Boost 45 Fire Flicker LEDs randomly flickering ⋮ 🎨 Fx Speed, Intensity 149 Firenoise Using Perlin Noise for fire. ▦ 🎨 X scale, Y scale 42 Fireworks Random color blobs light up, then fade again ⋮ ▦ 🎨 Fx, Bg Frequency 90 Fireworks 1D one dimension fireworks with flare ⋮ ▦ 🎨 Fx, Bg Gravity, Firing side 89 Fireworks Starburst Exploding multicolor fireworks ⋮ 🎨 Bg Chance, Fragments, Overlay 110 Flow Blend of palette and spot effects ⋮ 🎨 Speed, Zones 179 Flow Stripe Strip with rotating colours. ⋮ Hue speed, Effect speed 155 Freqmap Map the loudest frequency throughout the length of the LED's. ⋮ ♫ 🎨 Fx, Bg Fade rate, Starting color 138 Freqmatrix The temporal tail for this animation starts at the beginning of the Segment rather than in the center of the segment. ⋮ ♫ Speed, Sound effect, Low bin, High bin, Sensivity 141 Freqpixels Random pixels coloured by frequency. ⋮ ♫ Fade rate, Starting color and # of pixels 137 Freqwave Maps the major frequencies from the incoming signal to colors in the HSV color space. ⋮ ♫ Speed, Sound effect, Low bin, High bin, Pre-amp 177 Frizzles Moving patterns. ▦ 🎨 X frequency, Y frequency, Blur 160 Funky Plank A 2D wall of reactivity running from bottom to top ▦ ♫ Scroll speed, # of bands 139 GEQ A 16x16 graphic equalizer. ▦ ♫ 🎨 Fx, Peaks Fade speed, Ripple decay, # of bands, Color bars 172 Game Of Life Scrolling game of life. ▦ 🎨 Fx, Bg Speed 120 Ghost Rider Color changing ghost riding a kite... in a tornado. ▦ 🎨 Fade rate, Blur 87 Glitter Rainbow with white sparkles ⋮ 🎨 1, 2, Glitter color Speed, Intensity, Overlay 46 Gradient Moves a saturation gradient of the primary color along the strip ⋮ 🎨 Fx, Bg Speed, Spread 156 Gravcenter Volume reactive vu-meter from center with gravity and perlin noise. ⋮ ♪ 🎨 Fx, Bg Rate of fall, Sensitivity 157 Gravcentric Volume reactive vu-meter from center with gravity. Volume provides index to (time rotating) palette colour. ⋮ ♪ 🎨 Fx, Bg Rate of fall, Sensitivity 158 Gravfreq VU Meter from center. Log of frequency is index to center colour. ⋮ ♫ 🎨 Fx, Bg Rate of fall, Sensivity 132 Gravimeter Volume reactive vu-meter with gravity and perlin noise. ⋮ ♪ 🎨 Fx, Bg Rate of fall, Sensitivity 82 Halloween Eyes One Pair of blinking eyes at random intervals along strip ⋮ ▦ 🎨 Fx, Bg Duration, Eye fade time, Overlay 100 Heartbeat led strip pulsing rhythm similar to a heart beat ⋮ 🎨 Fx, Bg Speed, Intensity 180 Hiphotic A moving plasma. ▦ 🎨 Fx X scale, Y scale, Speed 58 ICU Two "eyes" running on opposite sides of the strip ⋮ 🎨 Fx, Bg Speed, Intensity, Overlay 64 Juggle Eight colored dots running, leaving trails ⋮ 🎨 Speed, Trail 130 Juggles Juggling balls. ⋮ ♪ 🎨 Fx, Bg Speed, # of balls 168 Julia Animated Julia set fractal named after mathematician Gaston Julia. ▦ 🎨 Fx Max iterations per pixel, X center, Y center, Area size 75 Lake Calm palette waving ⋮ 🎨 Fx Speed 41 Lighthouse Dot moves from start to end, leaving behind a fading trail ⋮ 🎨 Fx, Bg Speed, Fade rate 57 Lightning Short random white strobe similar to a lightning bolt ⋮ 🎨 Fx, Bg Speed, Intensity, Overlay 176 Lissajous A frequency based Lissajous pattern. ▦ 🎨 Fx X frequency, Fade rate, Speed 47 Loading Moves a sawtooth pattern along the strip ⋮ 🎨 Fx, Bg Speed, Fade 131 Matripix Similar to Matrix. ⋮ ♪ 🎨 Fx, Bg Speed, Brightness 153 Matrix The Matrix, on a 2D matrix. ▦ Spawn, Trail Speed, Spawning rate, Trail, Custom color 154 Metaballs A cool plasma type effect. ▦ 🎨 Speed 76 Meteor The primary color creates a trail of randomly decaying color ⋮ 🎨 Fx Speed, Trail length 77 Meteor Smooth Smoothly animated meteor ⋮ 🎨 Fx Speed, Trail length 135 Midnoise Perlin noise emanating from center. ⋮ ♪ 🎨 Fx, Bg Fade rate, Max. length 59 Multi Comet Like Scanner, but creates multiple trails ⋮ 70 Noise 1 Fast Noise shift pattern ⋮ 🎨 Fx Speed 71 Noise 2 Fast Noise shift pattern ⋮ 🎨 Fx Speed 72 Noise 3 Noise shift pattern ⋮ 🎨 Fx Speed 73 Noise 4 Noise sparkle pattern ⋮ 🎨 Fx Speed 107 Noise Pal Peaceful noise that's slow and with gradually changing palettes ⋮ 🎨 Speed, Scale 146 Noise2D ▦ 🎨 Speed, Scale 143 Noisefire A perlin noise based volume reactive fire routine. ⋮ ♪ Speed, Intensity 136 Noisemeter Volume reactive vu-meter. ⋮ ♪ 🎨 Fx, Bg Fade rate, Width 145 Noisemove Using perlin noise as movement for different frequency bins. ⋮ ♫ 🎨 Fx, Bg Speed of perlin movement, Fade rate 126 Octopus A cephalopod stuck in a whirlpool. ▦ 🎨 Speed, Offset X, Offset Y, Legs 62 Oscillate Areas of primary and secondary colors move between opposite ends, combining colors where they touch ⋮ 101 Pacifica Gentle ocean waves ⋮ 🎨 Speed, Angle 65 Palette Running color palette ⋮ 🎨 Cycle speed 98 Percent Lights up a percentage of segment ⋮ 🎨 Fx, Bg % of fill, One color 147 Perlin Move Using Perlin Noise for movement. ⋮ 🎨 Fx, Bg Speed, # of pixels, Fade rate 105 Phased Sine waves (in sourcecode) ⋮ 🎨 Fx, Bg Speed, Intensity 109 Phased Noise Noisy sine waves ⋮ 🎨 Fx, Bg Speed, Intensity 128 Pixels Random pixels ⋮ ♪ 🎨 Fx, Bg Fade rate, # of pixels 129 Pixelwave Pixels emanating from center ⋮ ♪ 🎨 Fx, Bg Speed, Sensitivity 97 Plasma Plasma lamp ⋮ 🎨 Fx Phase, Intensity 178 Plasma Ball A ball of plasma. ▦ 🎨 Speed, Fade, Blur 133 Plasmoid Sine wave based plasma. ⋮ ♪ 🎨 Fx, Bg Phase, # of pixels 174 Polar Lights The northern lights. ▦ Speed, Scale 95 Popcorn popping kernels ⋮ 🎨 Fx, Bg, Cs Speed, Intensity, Overlay 63 Pride 2015 Rainbow cycling with brightness variation ⋮ Speed 144 Puddlepeak Blast coloured puddles randomly up and down the strand with the 'beat'. ⋮ ♪ 🎨 Fx, Bg Fade rate, Puddle size, Select bin, Volume (min) 134 Puddles Blast coloured puddles based on volume. ⋮ ♪ 🎨 Fx, Bg Fade rate, Puddle size 162 Pulser Travelling waves. ▦ 🎨 Speed, Blur 78 Railway Shows primary and secondary color on alternating LEDs. All LEDs fade to their opposite color and back again ⋮ 🎨 1, 2 Speed, Smoothness 43 Rain Like Fireworks, but the blobs move ⋮ ▦ 🎨 Fx, Bg Speed, Spawning rate 9 Rainbow Displays rainbow colors along the whole strip ⋮ 🎨 Speed, Size 33 Rainbow Runner Like Chase, but the 2 LEDs light up in rainbow colors and leave a primary color trail ⋮ 🎨 Bg Speed, Size 5 Random Colors Applies a new random color to all LEDs ⋮ 🎨 Speed, Fade time 79 Ripple Effect resembling random water ripples ⋮ ▦ 🎨 Bg Speed, Wave #, Overlay 148 Ripple Peak Peak detection triggers ripples. ⋮ ♪ 🎨 Fx, Bg Fade rate, Max # of ripples, Select bin, Volume (min) 99 Ripple Rainbow Like ripple, but with a dimly lit changing background ⋮ ▦ 🎨 Speed, Wave # 185 Rocktaves Colours the same for each note between octaves, with sine wave going back and forth. ⋮ ♫ 🎨 Fx, Bg 15 Running Sine Waves scrolling ⋮ 🎨 Fx, Bg Speed, Wave width 52 Running Dual Sine waves in both directions ⋮ 🎨 L, Bg, R Speed, Wave width 16 Saw Sawtooth Waves scrolling ⋮ 🎨 Fx, Bg Speed, Width 10 Scan A single primary colored light wanders between start and end ⋮ 🎨 Fx, Bg, Cs Speed, # of dots, Overlay 11 Scan Dual Same as Scan but uses two lights starting at both ends ⋮ 🎨 Fx, Bg, Cs Speed, # of dots, Overlay 40 Scanner Dot moves between ends, leaving behind a fading trail ⋮ 🎨 Fx, Bg Speed, Fade rate 60 Scanner Dual Like Scanner, but with two dots running on opposite sides ⋮ 🎨 Fx, Bg, Cs Speed, Fade rate 122 Scrolling Text Edit segment name to set text (variables #DATE, #TIME, #DDMM, #MMDD, #HHMM, #HH, #MM; suffix with 0 to have leading 0s, i.e. #DATE0). Use segment grouping to increase text size on a large matrix. ▦ 🎨 Fx, Bg, Gradient Speed, Y Offset, Trail, Font size, Gradient, Overlay, 0 181 Sindots Dots revolving in a circle while the 'camera' ▦ 🎨 Speed, Dot distance, Fade rate, Blur 108 Sine Controllable sine waves ⋮ 92 Sinelon Fastled sinusoidal moving eye ⋮ 🎨 Fx, Bg, Cs Speed, Trail 93 Sinelon Dual Sinelon from both directions ⋮ 🎨 Fx, Bg, Cs Speed, Trail 94 Sinelon Rainbow Sinelon in rainbow colours ⋮ 🎨 Cs Speed, Trail 125 Soap Like soap bubbles, but lasts longer. ▦ 🎨 Speed, Smoothness 0 Solid Solid primary color on all LEDs ⋮ 103 Solid Glitter Like Glitter, but with solid color background ⋮ Bg, Glitter color Intensity 83 Solid Pattern Speed sets number of LEDs on, intensity sets off ⋮ 🎨 Fg, Bg Fg size, Bg size 84 Solid Pattern Tri Solid Pattern with three colors ⋮ 1, 2, 3 Size 118 Spaceships Circling ships with fading trails. Homage to 80s spaceship shooter games. ▦ 🎨 Speed, Blur 20 Sparkle Single random LEDs light up in the primary color for a short time, secondary is background ⋮ 🎨 Fx, Bg Speed, Overlay 21 Sparkle Dark All LEDs are lit in the primary color, single random LEDs turn off for a short time ⋮ 🎨 Bg, Fx Speed, Intensity, Overlay 22 Sparkle+ All LEDs are lit in the primary color, multiple random LEDs turn off for a short time ⋮ 🎨 Bg, Fx Speed, Intensity, Overlay 85 Spots Solid lights with even distance ⋮ 🎨 Fx, Bg Spread, Width, Overlay 86 Spots Fade Spots, getting bigger and smaller ⋮ 🎨 Fx, Bg Spread, Width, Overlay 150 Squared Swirl Boxes moving around ▦ 🎨 Blur 39 Stream Flush bands random hues along the string ⋮ 🎨 Speed, Zone size 61 Stream 2 Flush random hues along the string ⋮ Speed 23 Strobe All LEDs are lit in the secondary color, all LEDs flash in a single short burst in primary color ⋮ 🎨 Fx, Bg Speed 25 Strobe Mega All LEDs are lit in the secondary color, all LEDs flash in several short bursts in primary color ⋮ 🎨 Fx, Bg Speed, Intensity 24 Strobe Rainbow Same as strobe, cycles through the rainbow ⋮ 🎨 Bg Speed 166 Sun Radiation The sun! Doesn't support segments. ▦ Variance, Brightness 104 Sunrise Simulates a gradual sunrise or sunset. Speed sets: 0 - static sun, 1 - 60: sunrise time in minutes,60 - 120: sunset time in minutes - 60, above: "breathing" rise and set ⋮ 🎨 Time [min], Width 6 Sweep Switches between primary and secondary, switching LEDs one by one, start to end to start ⋮ 🎨 Fx, Bg Speed, Intensity 36 Sweep Random Like Sweep, but uses random colors ⋮ 🎨 Speed 175 Swirl Several blurred circles. Looks good with pink plasma palette. Supports AGC. ▦ ♪ 🎨 Bg Swirl Speed, Sensitivity, Blur 116 TV Simulator TV light spill simulation ⋮ Speed, Intensity 173 Tartan Plaid pattern of horizontal and vertical bands. Makes a great kilt. ▦ 🎨 X scale, Y scale, Sharpness 44 Tetrix Falling blocks stack ⋮ 🎨 Fx, Bg Speed, Width, One color 13 Theater Pattern of one lit and two unlit LEDs running ⋮ 🎨 Fx, Bg Speed, Gap size 14 Theater Rainbow Same as Theater but uses colors of the rainbow ⋮ 🎨 Bg Speed, Gap size 35 Traffic Light Emulates a traffic light ⋮ 🎨 Bg Speed, US style 56 Tri Fade Fades the whole strip from primary color to secondary color to off ⋮ 🎨 1, 2, 3 Speed 55 Tri Wipe Like Wipe but turns LEDs off as "third color" ⋮ 🎨 1, 2, 3 Speed 17 Twinkle Random LEDs light up in the primary color with secondary as background ⋮ 🎨 Fx, Bg Speed, Intensity 81 Twinklecat Twinkling with fast in / slow out ⋮ 🎨 Speed, Twinkle rate 80 Twinklefox FastLED gentle twinkling with slow fade in/out ⋮ 🎨 Speed, Twinkle rate 106 Twinkleup Twinkle effect with fade-in ⋮ 🎨 Fx, Bg Speed, Intensity 50 Two Dots Two areas sweeping ⋮ 🎨 1, 2, Bg Speed, Dot size, Overlay 113 Washing Machine Spins, slows, reverses directions ⋮ 🎨 Speed, Intensity 140 Waterfall A volume AND FFT version of a Waterfall that has 'beat' support. ⋮ ♫ 🎨 Fx, Bg Speed, Adjust color, Select bin, Volume (min) 165 Waverly Noise waves with some sound. ▦ ♪ 🎨 Amplification, Sensitivity 184 Wavesins Beat waves and phase shifting. Looks OK in 2D'ish as well. ⋮ 🎨 Fx Speed, Brightness variation, Starting color, Range of colors, Color variation 127 Waving Cell If a bunch of eucaryotes went to a sports stadium and did the wave, it would look exactly like this. ▦ 🎨 Speed, Amplitude 1, Amplitude 2, Amplitude 3 3 Wipe Switches between primary and secondary, switching LEDs one by one, start to end ⋮ 🎨 Fx, Bg Speed, Intensity 4 Wipe Random Same as Wipe, but uses random colors ⋮ 🎨 Speed Retired Effects Some effects get retired when they can be recreated with newer, more general effects. Removed Effect Replacement Retired After Candy Cane Chase 2 - red/white 0.14.0 Dissolve Rnd Dissolve 0.14.0 Dynamic Smooth Dynamic 0.14.0 Halloween Chase 2 0.14.0 Merry Christmas Chase 2 - red/green 0.12.0 Police Two Dot 0.14.0 Police All Two Dots - red/blue w/ full intensity 0.13.0 Two Areas Two Dots - full intensity 0.13.0 Back to top Made with Material for MkDocs | 2026-01-13T09:30:39 |
https://www.charterworks.com/tag/work-tech/ | Work Tech - Charter - Future of Work, AI, Management, Hybrid Try Charter Pro for $1 Latest Topics AI DEI Flexible Work Management Societal Issues Resources Briefing Work Tech Research Playbooks Case Studies Toolkits, Scripts, and other Resources Solutions Charter Pro Charter Forum Charter Pro for Teams Advisory + Strategic Services Events Upcoming and Past The AI Download Charter Cortados Leading With AI Masterclass Skills Accelerators Strategy Briefings Webinars Workplace Summit About Try Charter Pro for $1 Sign In Work Tech Pro Insights AI What testing shows about OpenAI’s deep research agent By Jacob Clemente Pro Work Tech Meetings The best AI note-taking tools for meetings By Michelle Peng Pro Work Tech AI Charter Work Tech: The best AI-powered search engines By Jacob Clemente Pro Work Tech Caregiving AI tools to support working parents and other caregivers By Michelle Peng Pro Work Tech AI Charter Work Tech: The best AI-powered email tools By Jacob Clemente Pro Work Tech Technology Charter Work Tech: 9 tools for better asynchronous communication By Cari Romm Nazeer Pro Work Tech Financial wellness Financial wellness tools to ease workers' money anxiety By Michelle Peng 1 of 4 → Insights Books Interviews Charter on TIME Research Connect Events Topics Artificial Intelligence Hybrid Work DEI Leadership Charter Pro Become a Member Support Sign In Search Contact Partnerships General Inquiries Company About Careers Press Newsletters Charter Briefing Charter Works Inc. © 2025 Privacy Terms of Service | 2026-01-13T09:30:39 |
http://tirkarthi.github.io/programming/2018/11/30/it-is-not-click-of-a-merge-button.html | It is not a simple click of the merge button xtreak blog whoami Comics Poems It is not a simple click of the merge button Nov 30, 2018 Note: This is just something that I wanted to write for a long time and thought to write it out given the recent posts about JavaScript and Clojure. This is just common problems and sometimes I even committed some of the mistakes mentioned here. I may have some instances of my own mistakes as an example to drive the fact but it’s never a personal attack on anybody. So take this is a piece of opinion with salt like other posts. My first experience with open source was in the form an Android app, Wordzilla that I open sourced back in 2014. It was cool to see people using it and some people asked me about license for using the database. I had no clue and said please do whatever you want. I tried contributing to some tools I use and fixing up some personal itches and grew up from there. I am not a very big contributor but kind of worked in my own pace since I feel working on open source for long continuous periods is hard unless you do it full-time or involved with a large project. I am grateful for the work of others and felt good in my code helping others. But I also got to know more about why it’s more than code in maintaining large software projects and this is mostly a post on some of the mistakes I did and things common in open source. Time and interest variables A large part of open source projects start as a personal itch like you want to solve a problem for which you don’t find a library and you end up writing one. X language has a library but you use Y and you port the library. You tend to open source the project in hope that it might help someone else. Some projects pick up steam and grow a community and other might just end up as your own little experiments. Either way you put in time and effort. Like all the other things in life you move on to some other languages/domain writing more code or you don’t even write code anymore. Someday one user might have their own personal itch and want to add a feature to the project. They will raise a PR and even a simple one but you don’t want to maintain it anymore due lack of interest. The most common answer with open source is to ask the user to fork it. A lot of languages support using libraries directly from git but they might still want it upstream so that they can install it with the package manager or as a sense of satisfaction seeing their own code being part of a project. So there is conflict of interest with the user urging the maintainer to merge the code. They might be busy with their other projects or activities given their limited time and priority which the user might have no clue about. Sometimes someone makes a nice feature request and the maintainer adds some polishing comments but the user just disappears with the PR languishing. It happens in all the projects small and large and with small projects being dependency of a larger one. Time and interest are highly relative enough that what might seem more important to me might not be of any interest to the maintainer anymore and vice versa. It’s common human nature to put more emphasis on what we need to accomplish and it takes a little more time to understand the variadic nature of time and interest on both sides. Well on the user side you might say well if you don’t maintain it why not transfer the ownership to someone else. Trust is crucial but not measurable Large parts of the open source communities are built upon trust since a lot of work just happens across the internet. I might start contributing something and with trust grows over time based not only on contributions but how I communicate with others, respond for feedback/criticism, prioritize and so on. Pretty much like a relationship several factors contribute towards trust and maintainers act upon the trust gained upon the interactions since you never get to know a person more than that or see them in real life day to day like a coworker. But they all can be manipulated and also change over a period of time. The nature of the contributor after a lot of years might be different than the day you gave access to their project. Also trust is not really measurable in quantitative terms except that you can act only with the best of interest and benefit of doubt. Even with face to face meetings it’s kind of hard to measure trust and they might seem like a good chap in some aspect but a complete jerk to someone/something else that you might never know and even only get to know over the course of time that may or may not affect the project. With people from different countries, race, gender and conditions of life that you get to deal with on the internet it becomes even harder to quantify trust. Maybe it’s something that the communities need to deal with benefit and might need to enforce trust and better behavior like CoC but we are humans. So when you transfer the maintership you are also entitled to vet someone you never met based only on the interactions with them. When they end up doing something nefarious then you are again entitled to act upon their actions. So there is another layer added where you are entitled not only for your behavior but also for someone else. So that brings me to the next topic of entitlement. Entitlement and cost When people release some project that ends up large then they are also entitled to maintain it or transfer maintenance or be clear about the deprecation once you don’t maintain it anymore. In large projects you are entitled for the most part in any one of the category. For the first option it might be powering large parts of revenue for a company though you work in another company and you have very limited time to juggle between a day job, family, friends and your own interests out of code. In case of maintenance transfer you are also entitled to vet people based on trust before you transfer them. With the third case you might not have interest even given the money due to other projects and you need to deprecate it but you are entitled to maintain it just for the sake that it’s part of large infrastructure like a social service. These things all come at a cost of time that cannot be obtained back. There is also economics factor of life that you have to earn to pay your bills and at some point you thrive for better financial stability that might conflict with your involvement with the open source project. There is a general expectation among the users of open source to make sure you spend more time on the project as if you have to do it at the cost of your own labour being underfunded or working on something that is clearly not a priority despite money. There are funding platforms and many other platforms that are great but it never has to come at the cost and expectation that the developer has to do underfunded labour just in the name of working on open source as if doing greater good to mankind. They are not sustainable in the long term and the satisfaction of seeing your code rake billions of dollars is great but then again the satisfaction doesn’t pay daily bills and you might even want to lead a better financial life deriving more value out of your skills. So people working on their own time in open source projects shouldn’t be treated as non-profit workers because they have the benefit of developing open source and at that point it’s just underfunded labour deceived as open source to derive more labour. A lot of experiences like this might even cause frustration and burn out driving away people along with developing fear over the course of time where people don’t want to open source their code anymore over maintaining it or the community altering with interest of the original developer. I don’t really know any solution to solve this and of course more money to open source projects thus developer has more share of their bread with the project but is not really a solution all the time. I can go on about conflicts of interests over the design, other bike shedding, health and personal problems of the maintainer reducing involvement and so on but I will stop here. So next time you make a (simple) feature request or bug fix that languishes for a long time it is not a simple click of the merge button! Makes a PR and merges to master Please enable JavaScript to view the comments powered by Disqus. xtreak blog xtreak blog tir.karthi@gmail.com tirkarthi tirkarthi A blog about programming, mistakes and eureka | 2026-01-13T09:30:39 |
https://www.charterworks.com/tag/societal-issues/ | Societal issues - Charter - Future of Work, AI, Management, Hybrid Try Charter Pro for $1 Latest Topics AI DEI Flexible Work Management Societal Issues Resources Briefing Work Tech Research Playbooks Case Studies Toolkits, Scripts, and other Resources Solutions Charter Pro Charter Forum Charter Pro for Teams Advisory + Strategic Services Events Upcoming and Past The AI Download Charter Cortados Leading With AI Masterclass Skills Accelerators Strategy Briefings Webinars Workplace Summit About Try Charter Pro for $1 Sign In Societal issues Read Charter's latest insights and interviews on navigating societal issues in the workplace. Pro Leadership Societal issues Steal this idea: Move the conversation to in-person By Kevin J. Delaney Pro Charter Workplace Summit Events Charter Workplace Summit 2024: Unlocking constructive communications in an anxious, polarized work climate By Cari Romm Nazeer Pro Charter Workplace Summit Events Charter Workplace Summit 2024: How to navigate politics and societal issues in the workplace in an election year By Cari Romm Nazeer Pro Cortado Events Charter Cortado: The 2024 election and the workplace By Michelle Peng Pro Case study Politics What people need for productive political conversations at work By Michelle Peng Pro Case study Elections How to approach societal issues—a Microsoft case study By Michelle Peng Pro Insights Elections Election stress and civic empowerment By Michelle Peng Pro Insights Employee Activism What to do when protests come to your workplace By Michelle Peng Pro Agenda Layoffs Boosting post-layoff morale, on-site child-care programs close, a framework for public statements on societal issues By Jacob Clemente, Michelle Peng, and Cari Romm Nazeer Pro Resources Guide Download - HR is the new PR By Michelle Peng Pro Resources Societal issues Worksheet: Connecting first principles to societal issues By Michelle Peng 1 of 3 → Insights Books Interviews Charter on TIME Research Connect Events Topics Artificial Intelligence Hybrid Work DEI Leadership Charter Pro Become a Member Support Sign In Search Contact Partnerships General Inquiries Company About Careers Press Newsletters Charter Briefing Charter Works Inc. © 2025 Privacy Terms of Service | 2026-01-13T09:30:39 |
https://www.timeforkids.com/k1/topics/earth-science/ | TIME for Kids | Earth Science | Topic | K-1 Skip to main content Search Articles by Grade level Grades K-1 Articles Grade 2 Articles Grades 3-4 Articles Grades 5-6 Articles Topics Animals Arts Ask Angela Books Business Careers Community Culture Debate Earth Science Education Election 2024 Engineering Environment Food and Nutrition Games Government History Holidays Inventions Movies and Television Music and Theater Nature News People Places Podcasts Science Service Stars Space Sports The Human Body The View Transportation Weather World Young Game Changers Your $ Financial Literacy Content Grade 4 Edition Grade 5-6 Edition For Grown-ups Resource Spotlight Also from TIME for Kids: Log In role: none user_age: none editions: The page you are about to enter is for grown-ups. Enter your birth date to continue. Month (MM) 01 02 03 04 05 06 07 08 09 10 11 12 Year (YYYY) 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949 1950 1951 1952 1953 1954 1955 1956 1957 1958 1959 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025 2026 Submit Earth Science Science Feels like Summer October 10, 2024 Summer can be very hot. There is lots of sun. It is a good time to swim and have fun outside. What do you do in the summer? Days are longer. The sun stays up later in the summer.… Audio Spanish Science Stay Safe in Summer October 10, 2024 Summer is fun. But too much heat or sun is unhealthy. Here are some tips for staying safe. Apply sunscreen. The sun’s rays are strong. They can burn your skin. Sunscreen (above) can block those rays. Drink water. … Audio Science Sensing Spring October 4, 2024 When winter ends, spring begins. The weather gets warmer. Plants and animals return. Your senses can help you experience spring. Here’s how. See. Take a look. You can see lots of animals in the spring. Birds return when weather warms.… Audio Spanish Science Watch it Grow October 4, 2024 A plant grows in stages. Follow the arrows to learn about a lemon tree’s life cycle. 1. A seed is planted. Its shell is hard. A seed needs soil to grow in. It needs water and sunlight, too. 2. The… Audio Science An Icy Season September 27, 2024 Winter is the coldest season. Some places prepare for icy weather. Here are four things you might see in winter. Snow Water freezes in the clouds. It turns into ice crystals. They fall to the ground as snowflakes. Sleet If… Audio Spanish Science Time for Change September 20, 2024 Fall is the season between summer and winter. Weather goes from hot to cool. Animals get ready for this change. Plants change too. Leaves change color. Look at these trees. Some leaves are yellow. Some are red and orange.… Audio Spanish Science Ripe for Picking September 20, 2024 Each season has its fruits and vegetables. Here are four items that are picked in the fall. Apples Fall is apple season. You can pick your own at an orchard (above). Sweet Potatoes Sweet potatoes grow in the ground. They… Audio Science Fossil Finds March 29, 2024 Fossils are the remains of plants or animals from long ago. They can be bones or teeth. Or they can be impressions in rock. Rock Stars People who study fossils are paleontologists. They dig for fossils. These scientists have… Audio Spanish Environment Protecting Coral Reefs April 20, 2023 Pollution and a warming planet are destroying coral reefs. Here is what you can do to help. Reduce, reuse, recycle. (Above) Plastic and other trash are harming the ocean. Use less plastic. Recycle what you can. Hands off! Coral… Audio Science Hungry Plants April 14, 2023 Did you know that some plants are carnivorous? That means they eat meat. They eat insects and small animals. Here are four carnivorous plants. Cobra Lily This plant looks like a snake. Insects try to eat its nectar. They get… Audio Spanish Posts pagination 1 2 3 4 5 6 Next Contact us Privacy policy California privacy Terms of Service Subscribe CLASSROOM INTERNATIONAL © 2026 TIME USA, LLC. All Rights Reserved. Powered by WordPress.com VIP | 2026-01-13T09:30:39 |
https://www.ovhcloud.com/nl/professional-services/ | Professional Services | OVHcloud Nederland Menu openen Webmail Notifications Terug naar menu No pending order No pending ticket Mijn klantaccount Terug naar menu Mijn klantaccount Mijn facturen Mijn producten en diensten Mijn betaalmethodes Mijn bestellingen Mijn contacten Mijn support-verzoeken Sales contact Support Terug naar menu Hulpcentrum Supportniveaus Professional Services Community‘s Terug naar menu OVHcloud Community OVHcloud Blog Evenementen Learn Terug naar menu Documentatie Tutorials Use cases Compliance Case Studies Videos Stories Training Nederland [€] Terug naar menu Europe Deutschland [€] España [€] France [€] Ireland [€] Italia [€] Nederland [€] Polska [PLN] Portugal [€] United Kingdom [£] America Canada (en) [$] Canada (fr) [$] United States [$] América Latina [$] Afrika Maroc [Dhs] Sénégal [FCFA] Tunisie [DT] Oceanië Australia [A$] Azië Singapore [S$] Asia [US$] India [₹] World World [$] World [€] Login menu openen Welkom bij OVHcloud. Log in om te bestellen, uw producten en diensten te beheren, en uw bestellingen te volgen. Mijn klantaccount Webmail Bare Metal & VPS Terug naar menu Bare Metal & VPS Dedicated servers Terug naar menu Dedicated servers Producten Ontdek onze Dedicated Servers Rise Servers Nieuw De betaalbaarste Bare-Metal servers van OVHcloud Advance Servers Nieuw Veelzijdige servers voor kleine en middelgrote bedrijven. Game Servers Nieuw Voor games en streamingplatforms Storage Servers Servers voor archivering, back-up of gedistribueerde opslag. Scale Servers Nieuw Specifiek ontworpen voor complexe infrastructuren met hoge resilience. High Grade Servers De krachtigste servers, geoptimaliseerd voor kritieke workloads. Besturingssystemen en applicaties Besturingssystemen en applicaties die geschikt zijn voor al uw toepassingen Beschikbaarheid van onze dedicated servers per regio De beschikbaarheid van onze servers in onze verschillende regio's over de hele wereld Bare Metal Wholesale Profiteer van een reeks Advance-, Scale- of High Grade-servers voor een volledig rack. Use case Resilience en AZ Grid computing SAP HANA Containerisatie/virtualisatie Website business application Hyper-Converged Infrastructure Software Defined Storage Big data en Web Analytics Storage en backup AI, Machine Learning, Deep learning Confidential Computing Database Gaming High Performance Computing Eco dedicated servers Terug naar menu Eco dedicated servers Eco dedicated servers Ontdek onze Eco Dedicated Servers Kimsufi servers Voordelige servers om uw bedrijf op te starten So You Start servers Een reeks dedicated servers, ideaal voor startups en TPE's Rise Servers Nieuw Beproefde Intel- en AMD-platforms die een uitstekende prijs-prestatieverhouding bieden Distributies en besturingssystemen Hier vindt u de versies die compatibel zijn met uw Eco server Use case Website en zakelijke applicatie E-mailserver Nieuw Data storage Nieuw VPS - Virtual private servers Terug naar menu VPS - Virtual private servers VPS - Virtual private servers Onze VPS'en Nieuw Onze nieuwe VPS met maximale resources voor een competitieve prijs, onmiddellijke schaalbaarheid, verbeterde beveiliging en beschikbaarheid in al onze regio's. Distributies en licenties Bekijk al onze distributies en licenties die op VPS beschikbaar zijn Opties Pas uw VPS aan met onze geavanceerde opties Hulp Use case Geautomatiseerde workflows met n8n Nieuw WordPress-multisiteplatform Videogameserver Testserver met VPS Hosting van tradingapplicaties op een Forex VPS Managed Bare Metal Terug naar menu Managed Bare Metal Managed Bare Metal Managed Bare Metal Essentials powered by VMware® Uw virtual infrastructuur beheerd door OVHcloud Opslag en back-up Terug naar menu Opslag en back-up Opslag en back-up Bekijk al onze oplossingen Enterprise File Storage Volledig beheerde, op NetApp ONTAP Select-gebaseerde bestandsopslag NAS-HA Centrale opslag- of back-upruimte voor bestandsgegevens Cloud Disk Array Uitbreidbare oplossing voor Block Storage op basis van CEPH-technologie Veeam Enterprise Plus Oplossing waarmee u uw gegevens kunt beschermen zoals het u schikt HYCU for OVHcloud Vereenvoudig het maken van back-ups en het migreren van uw Nutanix-workloads Use cases Gegevensopslag voor uw Linux-servers Gegevensopslag voor uw virtual machines Netwerk Terug naar menu Netwerk Netwerk Additional IP Wijs dynamische IP-adressen toe en zet ze over tussen services OVHcloud Load Balancer Verdeel de workload van uw applicatie over meerdere backend-servers Privénetwerk (vRack) Verbind al uw OVHcloud-services met een afgeschermd privénetwerk OVHcloud Link Aggregation Krijg een redundant privénetwerk met hoge bandbreedte OVHcloud Connect Verbind uw datacenter met OVHcloud Publieke Bandbreedte Verhoog uw standaard gegarandeerde bandbreedte CDN-infrastructuur Een dedicated CDN ter aanvulling van uw OVHcloud-producten Bring Your Own IP (BYOIP) Importeer uw IP-adressen en maak uw migratie naar OVHcloud gemakkelijk Netwerkbeveiliging Terug naar menu Netwerkbeveiliging Netwerkbeveiliging Anti-DDoS-infrastructuur Bescherm uw infrastructuren tegen DDoS-aanvallen Game DDoS Protection Bescherm uw gaming- en e-sports-business met een geavanceerde beveiligingsoplossing DNSSEC Bescherm uw gegevens tegen DNS-cache poisoning SSL Gateway De eenvoudigste manier om de beveiliging van uw webpagina in te schakelen. Zonder moeite! Identiteit, beveiliging en exploitatie Terug naar menu Identiteit, beveiliging en exploitatie Identiteit, beveiliging en exploitatie Identity and Access Management (IAM) Beveilig uw toegangsbeheer en verhoog uw productiviteit Logs Data Platform Uitgebreid platform voor het verzamelen, opslaan en bekijken van uw logs Key Management Service (KMS) Beveilig uw gegevens op al uw OVHcloud-services vanaf één centrale plek Secret Manager Professioneel beheer van al uw secrets op één plek Service Logs Monitor de prestaties en beveiliging van uw cloudomgeving Bare Metal Pod Terug naar menu Bare Metal Pod Bare Metal Pod SecNumCloud-gekwalificeerde Bare Metal Pod De prestaties van Bare Metal in een soevereine omgeving die voldoet aan de criteria van het SecNumCloud-label Domeinnaam Hosting E-mail Terug naar menu Domeinnaam Hosting E-mail Domeinnaam Terug naar menu Domeinnaam Domeinnaam Zoek uw domeinnaam Verhuis uw domeinnaam naar OVHcloud Verleng uw domeinnaam Zoeken op de secundaire markt (aftermarket) Snelle toegang Tarieven van domeinnamen Whois: zoeken naar domeingegevens DNS-server Speciale aanbiedingen Nieuw Webhosting Terug naar menu Webhosting Webhosting Alle webpakketten Extra databases SSL-optie CDN-optie Snelle toegang Hoe creëer ik een website? Host uw WordPress-site Creëer uw website in 1 klik Creëer uw webshop E-mail en teamwerkoplossingen Terug naar menu E-mail en teamwerkoplossingen E-mail en teamwerkoplossingen Alle e-mailoplossingen Alle Exchange-producten Office 365-licenties Public Cloud Terug naar menu Public Cloud Public Cloud Terug naar menu Public Cloud Public Cloud Meer informatie over Public Cloud Service-ecosysteem Geef uw bedrijf een boost, automatiseer uw structuur Prijzen Bekijk onze eenvoudige, redelijke tarieven Public Cloud gratis uitproberen Test zonder kosten onze oplossingen Savings Plans Nieuw Profiteer van lagere prijzen door een looptijd van 1 tot 36 maanden aan te gaan voor uw Public Cloud-resources. Voordelen van Public Cloud Ontdek cloudcomputing-oplossingen die alles bieden wat u nodig heeft Cloud computing Lees meer over deze steeds populairdere werkwijze Compliance & certificering Ontdek hoe OVHcloud vertrouwde oplossingen bouwt Vertrouwde zones Gebruik uw kritieke gegevens in buitengewoon veilige zones Beschikbaarheid per regio Bekijk onze catalogus per locatie Local Zones Nieuw Implementeer cloudservices dichter bij uw gebruikers Onze documentatie Raadpleeg onze handleidingen & tutorials Compute Terug naar menu Compute Compute Ontdek al onze Compute-producten Virtual Machine Instances Profiteer van polyvalente instances die geschikt zijn voor al uw toepassingen Cloud GPU Versnel uw workloads met high-performance GPU instances. Metal Instances Combineer de kracht van Bare Metal met de automatisering van de cloud Onze documentatie Raadpleeg onze documentatie voor de reeks Compute Local Zone Nieuw Implementeer cloudservices dichter bij uw gebruikers Storage Terug naar menu Storage Storage Bekijk al onze producten voor Storage Block Storage Maak opslagvolumes aan die als extra disks bruikbaar zijn Object Storage Profiteer van onbeperkte opslagruimte on-demand, compatibel met S3 Cold Archive Uiterst betaalbare archivering voor gegevens die zeer zelden worden geraadpleegd Local Zone Nieuw Implementeer cloudservices dichter bij uw gebruikers Onze documentatie Raadpleeg onze documentatie over de reeks Storage Netwerk Terug naar menu Netwerk Netwerk Ontdek al onze Network-producten Private Network Implementeer privénetwerken gebaseerd op OVHcloud-vRack Load Balancer Manage variabel dataverkeer door het over meerdere resources te verdelen Floating IP Gemakkelijk uw publieke IP-adres aan een servive toewijzen of overzetten Gateway Manage een enkel verbindingspunt tussen uw privénetwerk & internet Onze documentatie Raadpleeg onze documentatie over de reeks Network Containers & Orkestratie Terug naar menu Containers & Orkestratie Containers & Orkestratie Ontdek al onze Containers & Orchestration-producten Managed Kubernetes Service Orkestreer uw applicaties in containers met een Kubernetes-cluster dat CNCF gecertificeerd is. Load Balancer for Managed Kubernetes Service Manage variabele activiteit door het dataverkeer evenwichtig over uw verschillende resources te verdelen Managed Rancher Service Nieuw Centraal en eenvoudig beheer van uw Kubernetes-clusters Managed Private Registry Beheer uw container- en helmchart-images in een beveiligd privé-register Onze documentatie Raadpleeg onze documentatie over de reeks Containers & Orchestration Databases Terug naar menu Databases Databases Ontdek al onze producten voor Databases MongoDB Document-oriented NoSQL engine. Probeer het gratis met Free Tier MySQL Een populaire relationele database die zich aanpast aan uw gebruik PostgreSQL De vooraanstaande opensource relationele database-engine Valkey Intelligente in-memory storage Onze documentatie Raadpleeg onze documentatie over de reeks Databases Analytics Terug naar menu Analytics Analytics Ontdek al onze producten voor Analytics Kafka Queueing-oplossing om uw event-driven architecturen te implementeren Kafka Connect Uitbreiding om de inname van uw bronnen naar Apache Kafka te vereenvoudigen Kafka MirrorMaker Replicatie garandeert een hoge beschikbaarheid van uw Kafka-clusters Logs Data Platform Uitgebreid platform voor het verzamelen, opslaan en bekijken van uw logs OpenSearch Engine voor het indexeren, zoeken en analyseren van gegevens ClickHouse Nieuw Ultrasnelle analyse van uw gegevens binnen handbereik Managed Dashboards Grafana-platform voor dashboards Onze documentatie Raadpleeg onze documentatie over de reeks Analytics Data Platform Nieuw Terug naar menu Data Platform Data Platform Ontdek al onze producten voor Data Platform Ontdek OVHcloud Data Platform Nieuw Voer uw Data & Analytics-projecten eenvoudig en in een recordtijd uit Data Catalog Nieuw Meer dan 50 connectors voor al uw gegevensbronnen Lakehouse Manager Nieuw Geïntegreerde Data Warehouse- en Data Lake-opslag, op basis van Apache IJsberg Data Processing Engine Nieuw Automatiseer de uitvoering en orkestratie van uw ETL/ELT workloads Analytics Manager Nieuw Maak uw dashboards aan en voer uw query’s uit met de Trino-engine Application Services Nieuw SDK en serverservices om uw Data API's en applicaties te implementeren Control Center Nieuw Monitor de metrics, beheer de logs en de waarschuwingen van uw omgevingen AI & Machine Learning Terug naar menu AI & Machine Learning AI & Machine Learning Ontdek al onze producten voor AI & Machine Learning AI & Quantum Notebooks Start uw Jupyter- of VS Code-notebooks in de cloud en kies uit onze native AI- of quantumframeworks AI Training Train uw modellen voor artificiële intelligentie AI Deploy Implementeer modellen voor machine learning & genereer voorspellingen AI Endpoints Nieuw Breid uw applicaties uit met generatieve AI-modellen dankzij eenvoudige en veilige standaard API's Onze documentatie Raadpleeg onze documentatie over de reeks AI & Machine Learning Quantum Computing Terug naar menu Quantum Computing Quantum Computing Ontdek al onze producten voor Quantum Computing Quantum Emulators Nieuw Simuleer uw quantumalgoritmen op kant-en-klare notebooks Quantum Processing Units (QPU) Nieuw Gebruik echte quantumcomputers via ons Quantum Platform Wat is quantumcomputing? Ontdek de nieuwe revolutie van de aankomende rekenversnelling en hoe u vandaag nog kunt groeien op de kwantumcomputers van morgen Identiteit, Beveiliging & Operaties Terug naar menu Identiteit, Beveiliging & Operaties Identiteit, Beveiliging & Operaties Ontdek al onze producten Identiteit, Beveiliging & Operaties Identity and Access Management (IAM) Beveilig uw toegangsbeheer en verhoog uw productiviteit Logs Data Platform Uitgebreid platform voor het verzamelen, opslaan en bekijken van uw logs Key Management Service (KMS) Beveilig uw gegevens op al uw OVHcloud-services vanaf één plek Secret Manager Professioneel beheer van al uw secrets op één plek Services Logs Monitor de prestaties en de beveiliging van uw cloud-omgeving Hosted Private Cloud Terug naar menu Hosted Private Cloud VMware Terug naar menu VMware VMware on OVHcloud Ontdek VMware on OVHcloud Public VCF as a Service Nieuw Gedeelde en beheerde VMware-oplossing, mogelijk gemaakt door VMware Cloud Foundation Managed VMware vSphere Beheerde VMware-oplossing voor alle bedrijven Managed VMware vSphere met de SecNumCloud-kwalificatie VMware-oplossing in een door de ANSSI (Frans Agentschap voor Cyberveiligheid) gecertificeerde vertrouwde zone Solutions De VMware-producten vergelijken SAP on OVHcloud Datacenteruitbreiding en -migratie Hybride en Multicloud-oplossing Disaster recovery oplossingen Oplossingen voor Europese Vertrouwde Zones Bekijk alle oplossingen Nutanix Terug naar menu Nutanix Hosted Private Cloud NC2 on OVHcloud Nieuw Nutanix Cloud Clusters (NC2) on OVHcloud Nutanix on OVHcloud Our scalable, ready-to-use Nutanix hyperconverged platform (HCI) SecNumCloud-gekwalificeerde Bare Metal Pod Nieuw Nutanix-gekwalificeerde servers beschikbaar in SecNumCloud-gekwalificeerde Bare Metal Pods HYCU for OVHcloud Vereenvoudig het maken van back-ups en het migreren van uw Nutanix-workloads Veeam Enterprise voor al uw back-ups Een eigen Veeam Backup & Replication-oplossing voor al uw back-ups Praktijkgevallen Migratie en beheer van uw gegevens Disaster Recovery Plan (DRP) Hyperconvergentie, besparingen en het milieu Disaster Recovery (DRaaS) SAP HANA Terug naar menu SAP HANA SAP HANA SAP HANA on Private Cloud De oplossing voor moeiteloze SAP-implementaties in een soevereine cloud Solutions SAP on OVHcloud Opslag & Back-Up Terug naar menu Opslag & Back-Up Storage en backup Ontdek alle opslagoplossingen Veeam-optie voor VMware back-up Veeam Managed Backup-oplossing voor het back-uppen van uw virtual machines Zerto-optie voor uw VMware Disaster Recovery Plan Disaster Recovery Plan (DRP)-oplossing voor uw VMware-clusters op meerdere locaties Veeam-optie voor Public VCF as-a-Service Een eigen Veeam Backup & Replication-oplossing voor al uw back-ups Veeam Enterprise - Licenties Een eigen Veeam Backup & Replication-oplossing voor al uw back-ups HYCU for OVHcloud Vereenvoudig het maken van back-ups en het migreren van uw Nutanix-workloads Object Storage Profiteer van onbeperkte opslagruimte on-demand, compatibel met S3 Cold Archive Archiveer uw gegevens op de lange termijn tegen de beste prijs NetApp - Enterprise File Storage Volledig gemanagede opslag van bestanden op basis van NetApp ONTAP Select Use case Back-up en noodherstel Bedrijfscontinuïteit Noodherstel voor Managed VMware vSphere Noodherstel voor Nutanix on OVHcloud Netwerk Terug naar menu Netwerk Netwerk Additional IP Wijs dynamische IP-adressen toe en zet ze over tussen services OVHcloud Load Balancer Verdeel de workload van uw applicatie over meerdere backend-servers Privénetwerk (vRack) Verbind al uw OVHcloud-services met een afgeschermd privénetwerk OVHcloud Connect Verbind uw datacenter met OVHcloud CDN-infrastructuur Een dedicated CDN ter aanvulling van uw OVHcloud-producten Bring Your Own IP (BYOIP) Importeer uw IP-adressen en maak uw migratie naar OVHcloud gemakkelijk Netwerkbeveiliging Terug naar menu Netwerkbeveiliging Netwerkbeveiliging Anti-DDoS-infrastructuur Bescherm uw infrastructuren tegen DDoS-aanvallen DNSSEC Bescherm uw gegevens tegen DNS-cache poisoning SSL Gateway De eenvoudigste manier om de beveiliging van uw webpagina in te schakelen. Zonder moeite! Identiteit, beveiliging en exploitatie Terug naar menu Identiteit, beveiliging en exploitatie Identiteit, beveiliging en exploitatie Identity and Access Management (IAM) Beveilig uw toegangsbeheer en verhoog uw productiviteit Logs Data Platform Uitgebreid platform voor het verzamelen, opslaan en bekijken van uw logs Key Management Service (KMS) Beveilig uw gegevens op al uw OVHcloud-services vanaf één centrale plek Secret Manager Professioneel beheer van al uw secrets op één plek Service Logs Monitor de prestaties en beveiliging van uw cloudomgeving Compliance en certificeringen Terug naar menu Compliance en certificeringen Compliance en certificeringen Volledige lijst met standaarden en regelgevingen AVG (GDPR) Naleving van Verordening (EU) 2016/679 inzake gegevensbescherming SecNumCloud ANSSI Security Visa (Beveiligingsvisum) HDS en hosting van medische gegevens Hosting van medische gegevens in Frankrijk en in meerdere landen HIPAA en HITECH Hosting van medische gegevens in de Verenigde Staten PCI DSS Hosting van bankgegevens ISO/IEC 27001, 27017 en 27018 Beheer van informatiebeveiliging ISO/IEC 27701 Beheer van de veiligheid van de verwerking van persoonsgegevens ISO 50001 Energie-efficiency managen SOC 1, 2 en 3 AICPA SSAE 16/ISAE 3402 type II-verklaring en -rapportage EBA en ACPR Conformiteit voor financiële dienstverleners in Europa G-Cloud Het leveren van clouddiensten voor de publieke sector in het Verenigd Koninkrijk Oplossingen Terug naar menu Oplossingen Use cases Terug naar menu Use cases Use cases Verhuis naar de cloud Kies voor een migratie naar de cloud met OVHcloud Hybride cloud & Multi-cloud Big data-analytics High-performance workloads Opslag van grote datasets Gridcomputing Back-up en noodherstel Vertrouwde Zone SecNumCloud-omgeving Netwerkbeveiliging Cloud Security Datacenteruitbreiding en -migratie Datacentertransformatie Sector Terug naar menu Sector Sector Publieke sector Een vertrouwde oplossing voor landelijke en lokale overheden Gezondheidszorg De vertrouwde oplossing voor de gezondheidszorg Financiële dienstverlening Onze oplossingen voor financiële dienstverleners Fabricage en productie De vertrouwde cloud-oplossing voor Europese ondernemingen Software/Informatietechnologie SaaS- en PaaS-oplossingen van softwarepartners van OVHcloud Organisatietype Terug naar menu Organisatietype Organisatietype Enterprise Oplossingen voor de digitale transformatie van bedrijven Softwareproducenten (SaaS/PaaS) SaaS- en PaaS-oplossingen van softwarepartners van OVHcloud Systeemintegrator Oplossingen voor integrators, IT-outsourcing en consultancybedrijven Bestuur / overheid Vertrouwde oplossingen voor landelijke en lokale overheden Start-up Ondersteunende oplossingen voor Start-ups Scale-up Ondersteunende oplossingen voor Scale-ups Technologie Terug naar menu Technologie Technologie Veeam Bescherm uw gegevens met de Veeam-oplossingen van OVHcloud HYCU De back-upoplossing die geliefd is bij Nutanix-gebruikers SAP Onze SAP on OVHcloud-oplossingen voor SAP-omgevingen die in een soevereine cloud gehost worden NetApp NetApp-opslagoplossingen met overzichtelijke kosten en hoge prestaties Nvidia Nvidia GPU-oplossingen versnellen uw innovatie- en AI-projecten MongoDB MongoDB-oplossingen die gegevensbeheer vereenvoudigen OpenStack OpenStack-oplossingen die OVHcloud inzet voor cloud-infrastructuren Intel Oplossingen voor kenners die snel werken met Intel® Xeon® in de cloud AMD High-end cloud-oplossingen met AMD-processors Hadoop Cloudera Uw 100% gemanagede Cloudera-oplossing met Claranet Ecosystem Terug naar menu Ecosystem Ecosystem Ontdek het OVHcloud Partner-ecosysteem Partner Program Een speciaal initiatief voor onze partners: resellers, integrators, IT-outsourcers en adviseurs Open Trusted Cloud Een ecosysteem van gewaarmerkte SaaS- en PaaS-oplossingen, gehost in onze open, reversibele en betrouwbare cloud Startup Program Een programma om start-ups en scale-ups te begeleiden en zo hun groei te versnellen OVHcloud Labs De innovatiezone om onze technologieën te testen voordat ze officieel op de markt worden gebracht Onze Ecosystem evenementen Vind alle evenementen in verband met ons partnerecosysteem: webinars, conferenties, enz. OVHcloud Ecosystem Awards Ontdek onze OVHcloud Ecosystem awards, die de leiders van het ecosysteem per categorie belonen Training & Certificering Breid uw expertise uit met trainingen certificeringen die beschikbaar zijn voor de leden van het programma Snelle toegang Vind een OVH Partner Schrijf u in voor het Partner Program Schrijf u in voor het Startup Program Prijsvergelijking Partner Portal FAQ Partner Program Over Terug naar menu Over Over Wie we zijn Nieuws Wereldwijde infrastructuur Onze datacenters Onze Local Zones Backbonenetwerk Doe mee met het avontuur Patent Pledge Juridische informatie AVG/GDPR - Bescherming van gegevens Gegevenssoevereiniteit Onze doelstellingen Innovatie Duurzame cloud Vertrouwde cloud Impact Tracker Milieu Summit Open search bar Close search bar Geen resultaat Producten Oplossingen Partners Documentatie Articles Zie alle resultaten Professional Services Professional Services Professional Services van OVHcloud De Professional Services van OVHcloud bieden technisch advies en best practices voor al uw cloudtransformatieprojecten Neem contact met ons op Overzicht Overzicht Use cases Use cases Technologie Technologie Klantervaringen Klantervaringen Partners Partners Neem contact met ons op Alle expertise van OVHcloud ten dienste van uw transformatie Professional Services bestaat uit 3 hoofdlijnen van services met toegevoegde waarde: technisch advies Professional Services van OVHcloud bieden technisch advies en best practices voor al uw cloudtransformatieprojecten. Diensten Professional Services van OVHcloud vereenvoudigen uw cloudmigratie- en moderniseringsprojecten, waardoor ze een grote toegevoegde waarde voor uw bedrijf opleveren. We kunnen ook betrouwbare partners aanbevelen voor optimale resultaten in cloud- en on-premises-omgevingen. Training Professional Services van OVHcloud bieden trainingssessies op maat, evenals een reeks cursussen die beschikbaar zijn in onze online catalogus. Ga naar de trainingscatalogus YouTube stelt het afspelen van zijn video's afhankelijk van het plaatsen van tracers, om u gerichte reclame te kunnen aanbieden op basis van uw surfgedrag. Om de video te kunnen bekijken, moet u de privacycategorie Cookies delen op platforms van derden in ons Privacycentrum accepteren. U hebt de mogelijkheid om uw toestemming op elk moment in te trekken. Raadpleeg voor meer informatie het cookiebeleid van YouTube en het cookiebeleid van OVHcloud. Show Privacy Center OVHcloud Professional Services: vereenvoudig uw migratie en optimaliseer uw activiteiten! Cloud-producten Migratie naar de Cloud Profiteer van gepersonaliseerd advies over de planning en implementatie van een migratie, waarbij rekening wordt gehouden met al uw behoeften op het gebied van beveiliging, resilience en herstel na een calamiteit. Hybrid Cloud & Multi-Cloud Ontwerp en bouw uw hybride en multi-cloudoplossingen met hulp van onze cloudoplossingsarchitecten. POC-advies. Moderne Cloud-infrastructuren Ontdek de best practices voor het beheren, optimaliseren en beveiligen van uw cloud-infrastructuur. Modernisering en ontwikkeling van applicaties Optimaliseer de levenscyclus van uw ontwikkelingen met de best practices van DevOps, zodat applicaties sneller gemoderniseerd kunnen worden, continue integratie en effectieve levering in de cloud mogelijk zijn. Data & AI Gebruik informatie op basis van data en AI om uw bedrijf sneller te laten groeien, de besluitvorming te verbeteren en innovatie te stimuleren. Belangrijkste expertisetechnologieën met Professional Services Wiremind raadt Professional Services van OVHcloud aan Professional Services heeft Wiremind geholpen de kennis op te doen die nodig is om de beste opslagprestaties van onze dedicated servers te verkrijgen. Cédric De St. Martin, Operations VP/SRE bij Wiremind Neem contact met ons op voor professionele expertise Vraag onze experts om een persoonlijke analyse van uw project Neem contact met ons op Succes boeken met de deskundige partners van OVHcloud Gespecialiseerde experts voor alle behoeften OVHcloud is een leverancier van cloud-resources en ontwikkelt een partnernetwerk om u te ondersteunen bij al uw bedrijfsprojecten. Uitgebreide ervaring Onze partners zijn getraind om u optimaal te ondersteunen. Daardoor weet u zeker dat u over het beste van OVHcloud beschikt. Aanvullende vaardigheden We beschikken over kennis en expertise op het gebied van technologie en processen om de servicecatalogus van al onze partners verder aan te vullen. Ga naar de partnerlijst van OVHcloud Antwoord op uw vragen: Wat zijn Professional Services precies? Professional Services is een team met deskundigen en trainers voor klanten en partners. Het is een competentiecentrum dat advies geeft over cloud-omgevingen. Het maakt gebruik van een breed scala aan oplossingen, technologieën en services. Professional Services biedt bedrijven op maat gemaakte services voor alle transformatieprojecten. Het implementeert strategieën die de groei en het concurrentievermogen van klanten en partners stimuleren. Biedt Professional Services ondersteuning voor alle producten? Ja, Professional Services werkt met alle producten van OVHcloud, zowel in de private als in de public cloud. Onze experts zijn ook bekwaam in diverse technologieën op het gebied van IT en cloud computing. Zo kunnen ze u zowel bij legacy- als bij cloud-native-omgevingen met een passende, moderne methodologie ondersteunen. Werkt u ook met de omgevingen zelf? We treden op als technisch expert. Wij begeleiden u in alle fasen en geven u het beste advies om uw project tot een succes te maken. Afhankelijk van uw project kunnen we u ook partnerservicebedrijven aanraden die taken als geavanceerde ondersteuning en/of geoutsourcet infrastructuurmanagement kunnen uitvoeren. In welke talen kan ik worden begeleid of opgeleid? De experts bij Professional Services kunnen u begeleiden en opleiden in het Frans en het Engels. Ook hier maken we gebruik van ons partnernetwerk om u in andere talen en met andere specialiteiten te begeleiden. Back to top Tools Mijn klantaccount Webmail API Procedure Mailinglijsten Status Whois Contactpersoon domein Meld misbruik (abuse@ovh.net) Verzoek om openbaarmaking van Whois-informatie Intellectuele eigendom Merken Support Hulpcentrum Handleidingen Kenniscentrum Woordenlijst Community Supportniveaus Neem svp contact met ons op Uw OVHcloud Customer Service Maandag t/m vrijdag: 09.00 - 18.00 Technische support: +31 78 808 0120 kosten normaal tarief. Commerciele vragen: +31 78 808 0120 De klantenservice zal in uitsluitend het Engels worden aangeboden. Nieuws Pers Blog Social media Houd contact met ons © Copyright 1999-2026 OVH SAS. Algemene voorwaarden Contracten Gegevensbescherming Mijn cookies beheren Rechten en plichten van domeinnaamhouders ICANN achtergrondinformatie voor domeinnaamhouders Betalingen Sitemap Over OVHcloud Werken bij OVHcloud In overeenstemming met de 2006/112/EG-richtlijnen, gewijzigd op 1 januari 2015, kunnen prijzen incl. btw variëren, afhankelijk van het land waar de klant verblijft (de weergegeven prijzen zijn standaard inclusief btw). | 2026-01-13T09:30:39 |
https://events.docker.com/penang/ | Events | Docker AI AI Docker for AI Simplifying Agent Development Docker Offload Break free of local constraints Docker MCP Catalog and Toolkit Connect and manage MCP tools Docker Model Runner Local-first LLM inference made easy More resources for developers Docker Brings Compose to the Agent Era: Building AI Agents is Now Easy Docker Accelerates Agent Development Read more Products Products Docker Hardened Images Ship with secure, enterprise-ready images Docker Desktop Containerize your applications Docker Hub Discover and share container images Docker Scout Simplify the software supply chain Docker Build Cloud Speed up your image builds Testcontainers Desktop Local testing with real dependencies Testcontainers Cloud Test without limits in the cloud Docker MCP Catalog and Toolkit Connect and manage MCP tools Docker Desktop v4.50 Find out what’s new to Docker Desktop in the latest release Read more Developers Developers Documentation Find guides for Docker products Getting Started Learn the Docker basics Resources Search a library of helpful materials Training Skill up your Docker knowledge Extensions SDK Create and share your own extensions Community Connect with other Docker developers Open Source Explore open source projects Preview Program Help shape the future of Docker Customer Stories Get inspired with customer stories More resources for developers Introducing Docker Model Runner A faster, simpler way to run and test AI models locally Read more Deliver Quickly. Build Securely. Stay Competitive. Meet growing demands for speed and security with integrated, efficient solutions Read more Get the latest Docker news Pricing Support Blog Company Company About Us Let us introduce ourselves What is a Container? Learn about containerization Why Docker Discover what makes us different Trust Find our customer trust resources Partners Become a Docker partner Customer Success Learn how you can succeed with Docker Events Attend live and virtual meet ups Docker Store Gear up with exclusive SWAG Careers Apply to join our team Contact Us We’d love to hear from you Docker Announces SOC 2 Type 2 Attestation & ISO 27001 Certification Learn what this means for Docker security and compliance Read more Search Sign In Get Started Toggle menu Events Learn from experts and get to know Docker. Upcoming Events Webinar Jan 13, 2026 DHI ELS Launch Docker Hardened Images are now freely available, raising the security baseline across the software supply chain. Michael Donovan and Christian Dupuis Register now #SLMs #testcontainers Manu is speaking at Container Days London Don’t miss his talk: “Choosing the Smallest LLM That Won’t Completely Fail You” Feb 11 – 12 Register now Toledo, Spain Manuel de la Peña Manuel de la Peña is an open source software engineer at Docker, specializing in developer tooling and maintaining Testcontainers for Go. Staff Software Engineer Docker More about Manuel Find a Local Meetup Attend one of the 200+ Docker Meetups around the globe. Attend a meetup Products Products Overview Docker Desktop Docker Hub Docker Scout Docker Build Cloud Testcontainers Desktop Testcontainers Cloud Docker MCP Catalog and Toolkit Docker Hardened Images Features Command Line Interface IDE Extensions Container Runtime Docker Extensions Trusted Open Source Content Secure Software Supply Chain Developers Documentation Getting Started Trainings Extensions SDK Community Open Source Preview Program Newsletter Pricing Personal Pro Team Business Premium Support and TAM Pricing FAQ Contact Sales Company About Us What is a Container Blog Why Docker Trust Customer Success Partners Events Docker System Status Newsroom Swag Store Brand Guidelines Trademark Guidelines Careers Contact Us Languages English 日本語 © 2026 Docker Inc. All rights reserved Terms of Service Privacy Legal Cookie Settings | 2026-01-13T09:30:39 |
https://www.charterworks.com/events/ | Events Try Charter Pro for $1 Latest Topics AI DEI Flexible Work Management Societal Issues Resources Briefing Work Tech Research Playbooks Case Studies Toolkits, Scripts, and other Resources Solutions Charter Pro Charter Forum Charter Pro for Teams Advisory + Strategic Services Events Upcoming and Past The AI Download Charter Cortados Leading With AI Masterclass Skills Accelerators Strategy Briefings Webinars Workplace Summit About Try Charter Pro for $1 Sign In Events Charter’s events bring together top executives, researchers, and thought leaders to explore—in-person and virtually—the new playbook for leadership and the future of work Get in touch Sponsor an event Upcoming events Leading with AI NYC - Feb. 10, 2026 / SF - Feb. 24, 2026 For many organizations, the messy middle looks like greater adoption, experimentation, worker training, and more use cases, with little to show for it at the organization level. This year's Leading with AI Summit focuses on how to break out of the messy middle and pull ahead. Learn more → What people are saying about our events: Charter has become a center of gravity for the most influential and compassionate leaders, innovators, and luminaries in our field. And, their magnetic pull was on full display at this year’s Charter Workplace Summit.” David Landman HR executive and advisor This instant connection is what Charter does best - creating spaces where future-focused leaders can truly connect.” Stephanie LeBlanc-Godfrey Founder, Mother AI · Global head of inclusion for women of color, Google On-demand sessions and past events Stream videos and read takeaways from our briefings, workshops, and discussions of the most-pressing leadership and talent-related issues. Featured The New Employer Brand Summit: The New Talent Playbook Watch: Charter Cortado from Davos 2025 Charter Workplace Summit 2024: The view from the boardroom See recent The AI Download The AI Download: How we use AI The AI Download: Tools to supercharge your work The AI Download: How AI will transform different professions See all Executive Strategy Briefings Charter Pro Strategy Briefing: Q1 2025 Charter Pro Strategy Briefing: Q4 2024 Charter Executive Strategy Briefing: Q2 2024 See all New Employer Brand Summit View The New Employer Brand Summit event details The New Employer Brand Summit: The ROI of Employer Branding The New Employer Brand Summit: Employer Brand and Business Outcomes See all Charter Workplace Summit View Charter Workplace Summit '25 event details Smart by design: Building Tuffy's brain Introducing human-positive AI to superpower your workforce See all Leading With AI View Leading with AI event details Leading with AI: How to close the gen(der)AI gap Leading with AI: How ServiceNow uses genAI See all Skills Accelerators Charter Skills Accelerator: Superlearning Charter Skills Accelerator: Learning culture Charter Skills Accelerator: Collaboration lab See all Cortados Watch: Charter Cortado from Davos 2025 Charter Cortado: The 2024 election and the workplace Charter Cortado: The Future-Proof Career with Isabel Berwick See all Masterclass The Executive Blueprint for Talent Density in 2025 Hybrid Readiness: Next level collaboration for distributed teams Leading Change in the Age of AI: Brain-Friendly Change Management Strategies See all Webinars Webinar: Leading Learning in the Al Era The Continuous-Learning Imperative: Futureproofing Your Organization’s Talent Strategy The Executive Blueprint for Talent Density in 2025 See all Sponsor an event Contact us to learn more about sponsorship opportunities and join the organizations we’ve partnered with on events. Get in touch Insights Books Interviews Charter on TIME Research Connect Events Topics Artificial Intelligence Hybrid Work DEI Leadership Charter Pro Become a Member Support Sign In Search Contact Partnerships General Inquiries Company About Careers Press Newsletters Charter Briefing Charter Works Inc. © 2025 Privacy Terms of Service | 2026-01-13T09:30:40 |
https://fr-fr.facebook.com/reg/?entry_point=login&next=https%3A%2F%2Fl.facebook.com%2Fl.php%3Fu%3Dhttps%253A%252F%252Fwww.instagram.com%252F%26amp%253Bh%3DAT0TfXpKf-syTcRfZolaYSaZxd_c23OvPxsy26GA871uv_piXdJIM2RfwgXPq7rGSj6VCJKPY9O1rAwDRUtyOkqa-ut1fiYPLYbXwO7EHolry1leWvNJK9F2PIqHcOo1x-XIlrCvBoDLSsj_ | Facebook Facebook Adresse e-mail ou téléphone Mot de passe Informations de compte oubliées ? Créer un compte Cette fonction est temporairement bloquée Cette fonction est temporairement bloquée Il semble que vous ayez abusé de cette fonctionnalité en l’utilisant trop vite. Vous n’êtes plus autorisé à l’utiliser. Back Français (France) 한국어 English (US) Tiếng Việt Bahasa Indonesia ภาษาไทย Español 中文(简体) 日本語 Português (Brasil) Deutsch S’inscrire Se connecter Messenger Facebook Lite Vidéo Meta Pay Boutique Meta Meta Quest Ray-Ban Meta Meta AI Plus de contenu Meta AI Instagram Threads Centre d’information sur les élections Politique de confidentialité Centre de confidentialité À propos Créer une publicité Créer une Page Développeurs Emplois Cookies Choisir sa publicité Conditions générales Aide Importation des contacts et non-utilisateurs Paramètres Historique d’activité Meta © 2026 | 2026-01-13T09:30:40 |
https://www.timeforkids.com/g56/topics/science/ | TIME for Kids | Science | Topic | G5-6 Skip to main content Search Articles by Grade level Grades K-1 Articles Grade 2 Articles Grades 3-4 Articles Grades 5-6 Articles Topics Animals Arts Ask Angela Books Business Careers Community Culture Debate Earth Science Education Election 2024 Engineering Environment Food and Nutrition Games Government History Holidays Inventions Movies and Television Music and Theater Nature News People Places Podcasts Science Service Stars Space Sports The Human Body The View Transportation Weather World Young Game Changers Your $ Financial Literacy Content Grade 4 Edition Grade 5-6 Edition For Grown-ups Resource Spotlight Also from TIME for Kids: Log In role: none user_age: none editions: The page you are about to enter is for grown-ups. Enter your birth date to continue. Month (MM) 01 02 03 04 05 06 07 08 09 10 11 12 Year (YYYY) 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949 1950 1951 1952 1953 1954 1955 1956 1957 1958 1959 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025 2026 Submit Science World Stomping Grounds January 23, 2025 Paleontologists have discovered nearly 200 dinosaur tracks forming what experts are calling a “dinosaur highway.” The tracks are located in Oxfordshire, England, and date back 166 million years. Worker Gary Johnson found the tracks while digging up clay in a… Audio Business Fossil for Sale July 11, 2022 A dinosaur skeleton is going up for sale. Sotheby’s, the New York City auction house, made the announcement last week. The fossil will be part of a natural-history auction on July 28. The skeleton belonged to a Gorgosaurus, a cousin… Audio World Moonglow May 18, 2022 A total lunar eclipse occurred on May 16. A lunar eclipse happens when the moon passes into Earth’s shadow. It takes on a red and orange glow. Here, the eclipse… Audio United States Standing Proud March 9, 2022 Life-size, 3D-printed statues honoring women in STEM appear in Washington, D.C., on March 4. They’re on display at Smithsonian gardens and museums, through Marc… Audio Environment From Ranch to Lab January 7, 2022 Brown cows roam the meadows of a farm in the Netherlands. They are Limousins, a breed known for the quality of its meat. Every few months, a veterinarian makes a tiny cut in a cow’s flank, removes a sample of… Audio Spanish Health TFK Explains: COVID-19 Vaccine for Kids October 29, 2021 On November 2, the United States Centers for Disease Control and Prevention (CDC) recommended the Pfizer-BioNTech vaccine for children ages 5 to 11. This vaccine helps protect against COVID-19. Here’s what you need to know. How does the vaccine… Audio Environment Repairing the Planet October 22, 2021 On October 17, the winners of the first annual Earthshot Prize were announced in London, England. Prince William, Duke of Cambridge, is a founder of the award. His aim is to inspire new ideas and technologies for helping the environment… Audio The Kid Report: Testing the Water September 22, 2021 The story “Testing the Water”—about how scientists are testing wastewater for the coronavirus—appears in this week’s issue of TIME for Kids. Allie Amison took part in a wastewater testing program at her school, and writes about it below. The University… Audio Testing the Water September 22, 2021 If it’s flushed down the toilet, Rob Knight wants to know about it. He’s a researcher at the University of California San Diego. He specializes in microbes, the tiny organisms that live in your gut. Knight is testing the university’s… Audio Contact us Privacy policy California privacy Terms of Service Subscribe CLASSROOM INTERNATIONAL © 2026 TIME USA, LLC. All Rights Reserved. Powered by WordPress.com VIP | 2026-01-13T09:30:40 |
http://tirkarthi.github.io/life/2021/12/30/git-rev-parse-2021.html | git rev-parse 2021 xtreak blog whoami Comics Poems git rev-parse 2021 Dec 30, 2021 2021 was a swing year with pandemic turning more deadly than ever at start and is still turning out to be a mystery with Omicron variant hitting new peaks as I write this post. Finance 2021 was a good year in terms of Finance. My current value in stocks and mutual funds by end of the year doubled compared to the start aided by the bull run and good savings rate due to work from home throughout the year. I paid off the money I technically owed during marriage and took up a new one which we will get to in a minute. Given the pain of a bear market in first half of 2020 and optimism of markets in the second half of 2020 I just maxed out my mutual fund and stocks. In case of stocks it’s mostly buying and holding large cap with around 10% as fun money to buy small/mid-cap. The absolute profit stands at 20% and 35% for stocks and mutual fund portfolio since I kept averaging with little in cash as post-tax returns on FD and debt instruments are low enough to just hold in savings account for better liquidity. I also switched to arbitrage funds from debt since I feel they are good to park for short term providing 4-5% and also treated as STCG of 15% compared to 30% in debt funds when retrieved within 3 years. There was a little 10% dip around November but it’s about discipline and sticking with the plan as most of the money in the market is something I hopefully don’t need in 5-10 years. I will also have my ELSS schemes completing 3 years and I am looking to consolidate them as lockin expires. My tax saver FD will also be over. It’s the first investment I did after a job change in 2016 for the tax year. I find this to be a poor one with 30% tax on the interest that I could have just bought ELSS that would have better returns from equity even without the 2020 bull run with LTCG at 10% post 1 lakh limit per year. So I am just looking forward to consolidating that too in my portfolio. Given that the investments were 3-5 years it also makes me realize time flies fast! Amount invested = 1,00,000 Maturity = 1,39,000 30% tax on interest = -11,700 Post tax maturity = 1,27,300 (27% total return after 5 years) I also took my first loan. It seems that taking a loan is a ritual to reach the adult phase that somehow it creeps in though I deliberately avoided it for years. I took a car loan and finally bought a new Swift VXI automatic. Yeah, you might say taking a loan to buy a deprecating asset but second hand automatic was little hard to find during a pandemic. Talking about buying at peak, a new version was released with better engine and features after a month though current one is good too averaging around 18kmpl for petrol and a full tank can give 500-550kms ride. I had the money for a full payment but the pre-approved loan with 7.7% seemed good enough. I just wanted to let the money compound for another 5 years and not disturb it since it had some good gains in second half of 2021 where I mostly started really investing in my life with investment as goal with most of the money going to my house construction. I also started a SIP of the EMI amount for 5 years in an equity fund that on the same date of EMI deduction. I just want to do a little experiment on if this decision to take a loan made sense. By 2.5 years I would have paid half the loan and rest of the half saved in equity fund that I can sell and pay off the loan. I can just run it for 5 years and see how much I could have just made if I paid the amount in full without a loan and did 2x on the SIP route putting in EMI amount too to see if it made sense. Either way I will write about it in sometime once I reach the midway mark in 2023 to see if the loan was beneficial. Health and pandemic 2021 had Delta variant in the first half causing a lot of damage and was way worse with Oxygen and hospitalization issues. There was another wave by March-June in India with lockdown and vaccination efforts just starting out. I myself got first dose of Covaxin by May end. The Delta wave coupled with my own medical issues towards Mid June unrelated to the pandemic led me to take a few months to recover back to normal. It also made me reach out to my emergency fund for the first time as backup though insurance covered almost all of it. Something I never anticipated to do but also made me realize the value of emergency fund that I started building around 2020 only. My family was very much supportive throughout the period including recovery and post hospitalization checkups. The issue was a recurrence of the past and something I hopefully won’t get in future. This also made me realize how unprepared I am in terms of responsibilities in case it turned out to be terminal though luckily it was not. It’s a gut check around how little there is left between today and tomorrow. So there is a dilemma around where if you come across such a situation where there is little time left would you look back and think about all the things you wanted to do and never did for better support of family or would you just go on enjoying life at present now with little less care about family thant the first. It also taught me about striking the balance though imperfect around both enjoying present and making efforts for a better tomorrow too. The whole episode just reminds me of the below passage as I re-read the book during recovery. The tricky part of illness is that, as you go through it, your values are constantly changing. You try to figure out what matters to you, and then you keep figuring it out. It felt like someone had taken away my credit card and I was having to learn how to budget. You may decide you want to spend your time working as a neurosurgeon, but two months later, you may feel differently. Two months after that, you may want to learn to play the saxophone or devote yourself to the church. Death may be a one-time event, but living with terminal illness is a process. - When breath becomes air, Paul Kalanithi Less code and some upgrades My code contributions were also less. I was using $5 digital ocean server and ssh-ing into it from my 7 year old 2GB RAM laptop. Post the medical event I finally took the plunge and bought a new HP laptop at 55k. The machine with latest AMD 5000 series processor, 8GB RAM and most importantly an SSD gave me more time to develop locally with better battery backup. I also upgraded my phone to Samsung Galaxy A52 from my 4 year old Moto G5 Plus with no security updates for past 2 years. The phone became slow to use with normal applications demanding more RAM and space. I published an open source Android application. An app to display the meanings as notification when you select a word from any other app. I finally got some long missing thrill around developing and publishing something. The app received 500+ downloads and I also received it in F-Droid. There are 5-10 daily users and it’s something I can be proud of for the year. It also gave me a sense of modern application development where I learned more about Kotlin. I also gave Flutter a try making mock designs of UI of popular apps like WhataApp and Zerodha. Flutter also inspired me to try out Jetpack Compose which I very much love given the XML driven nature of UI development in Android. I tried a rewrite of the application in Jetpack Compose. So a lot of fun during my medical recovery as something it is I can focus on and learn along. I also spent the last couple of months fixing Python 3.11 compatibility issues like unittest deprecations that were removed. Notification Dictionary https://github.com/tirkarthi/NotificationDictionary/ https://play.google.com/store/apps/details?id=com.xtreak.notificationdictionary The car was also a notable life upgrade though from a cost perspective it’s a deprecation and a second-hand automatic is hard to find as I mentioned earlier. It was very much helpful during medical issues. It’s also easier to drive as I was not well used to manual gear/clutch coordination and fear of turning the car off despite going to a driving class. It’s a reliable one though not shiny and for an entry level hatchback I guess it’s a good choice. There are aspects like maintenance, mileage that I will learn more about as I drive more but I am somehow an amateur drive after all these years of excuses. As they said the usage goes up once a car comes as I never really thought driving 4000kms in a year though I only take it once a week and never drove anywhere post 50kms at a stretch. Maybe it’s an indication of the fuel prices that crossed a century and the rising inflation along with me being not used to driving much I wrote almost nothing in the blog this year. I hope to write more tech, life and finance in 2022. So it was a year of less code but with some good upgrades that finally made me to spend something on myself after the health phase as I have been postponing these in the name of frugality. Conclusion This wraps up the year for me. It’s a strange year with a lot of sound experience on all parts of life. The pandemic is still on so I am not sure if I will write a similar sentence next year in terms of what it can bring :) Happy holidays! Stay safe! Pushes to git and feeds the demanding cat Please enable JavaScript to view the comments powered by Disqus. xtreak blog xtreak blog tir.karthi@gmail.com tirkarthi tirkarthi A blog about programming, mistakes and eureka | 2026-01-13T09:30:40 |
https://www.charterworks.com/tag/cortado/ | Cortado - Charter - Future of Work, AI, Management, Hybrid Try Charter Pro for $1 Latest Topics AI DEI Flexible Work Management Societal Issues Resources Briefing Work Tech Research Playbooks Case Studies Toolkits, Scripts, and other Resources Solutions Charter Pro Charter Forum Charter Pro for Teams Advisory + Strategic Services Events Upcoming and Past The AI Download Charter Cortados Leading With AI Masterclass Skills Accelerators Strategy Briefings Webinars Workplace Summit About Try Charter Pro for $1 Sign In Cortado Charter's coffee-sized masterclasses with leading voices on the future of work. Pro Davos Insights Watch: Charter Cortado from Davos 2025 By Michelle Peng Pro Cortado Events Charter Cortado: The 2024 election and the workplace By Michelle Peng Pro Cortado Careers Charter Cortado: The Future-Proof Career with Isabel Berwick By Kevin J. Delaney Pro Cortado AI Charter Pro x Artificiality Workshop: Making decisions with generative AI By Cari Romm Nazeer Pro Cortado Webinar Charter Cortado: Unlearning common workplace behaviors to lead with more awareness and agility By Emily Goligoski Pro Cortado Webinar Charter Pro Strategy Briefing: Q1 2024 By Kevin J. Delaney Pro Cortado Culture Charter Cortado: Building a culture of growth By Kevin J. Delaney Pro Cortado Webinar Charter Cortado: Intro to breathwork with WellSet By Emily Goligoski Pro Cortado Webinar Charter Cortado: Combating the threats of AI By Massella Dukuly Pro Cortado Webinar Charter Cortado: Live from Davos 2024 By Kevin J. Delaney Pro Cortado DEI Charter Cortado: AI and inclusion with Dr. Stephanie Creary By Emily Goligoski Pro Cortado AI Charter Cortado: AI innovation, employee adoption, and how your organization can lead By Emily Goligoski and Jacob Clemente 1 of 3 → Insights Books Interviews Charter on TIME Research Connect Events Topics Artificial Intelligence Hybrid Work DEI Leadership Charter Pro Become a Member Support Sign In Search Contact Partnerships General Inquiries Company About Careers Press Newsletters Charter Briefing Charter Works Inc. © 2025 Privacy Terms of Service | 2026-01-13T09:30:40 |
https://aws.amazon.com/blogs/networking-and-content-delivery/introducing-quic-protocol-support-for-network-load-balancer-accelerating-mobile-first-applications/ | Introducing QUIC Protocol Support for Network Load Balancer: Accelerating Mobile-First Applications | Networking & Content Delivery Skip to Main Content Filter: All English Contact us AWS Marketplace Support My account Search Filter: All Sign in to console Create account AWS Blogs Home Blogs Editions Networking & Content Delivery Introducing QUIC Protocol Support for Network Load Balancer: Accelerating Mobile-First Applications by Andrew Gray and Milind Kulkarni on 13 NOV 2025 in Elastic Load Balancing , Networking & Content Delivery Permalink Share Today, AWS announces the launch of QUIC protocol support for Network Load Balancer (NLB) . This capability enables customers to forward QUIC traffic to their targets with ultra-low latency while maintaining session stickiness using QUIC Connection IDs. In this blog we will provide an overview of QUIC, demonstrate how to enable it using the AWS Console and CLI, and provide additional considerations. What is QUIC and Why Does It Matter? QUIC ( RFC 9000 ) represents a fundamental shift in how we approach network communication in our mobile-first world. QUIC is a transport protocol that runs over UDP and provides built-in encryption, congestion control, and multiplexing capabilities. QUIC is the transport protocol for HTTP/3, enabling applications to use HTTP/3 for their workloads to achieve better latency, connection resilience, and reduced head-of-line blocking. Unlike traditional networking protocols designed for static nodes, QUIC is built from the ground up for mobile devices and applications that demand: Ultra-low latency through minimized handshakes and reduced packet round trips Built-in security with TLS 1.3 encryption Connection resilience that maintains sessions even when client IP addresses or port numbers change The Mobile Revolution Demands Better Performance The explosive growth of smartphone applications has created new performance expectations. Companies providing mobile gaming, ride-sharing applications and other latency-sensitive industries have already implemented QUIC in their applications to deliver superior user experiences. On the client side, major browsers including Safari, Chrome, Edge, and Firefox support QUIC by default. QUIC can reduce end-to-end application latency by 25-30%, transforming user experiences from sluggish 500ms response times to snappy 350ms interactions. This improvement is particularly important in regions with limited cellular bandwidth and lower network quality. NLB QUIC: Passthrough Mode for Maximum Performance Network Load Balancer’s QUIC protocol passthrough complements Amazon CloudFront ’s existing QUIC termination capabilities, giving customers flexibility to optimize performance at both the edge and core of their infrastructure. The Network Load Balancer implementation focuses on QUIC passthrough mode, which means the NLB forwards QUIC traffic directly to targets without terminating the client sessions. This approach delivers several key advantages: Minimal latency overhead – No additional processing delays High performance – Packet-level forwarding for maximum throughput Customer control – Customers maintain full control over TLS certificates and client-server interactions through end-to-end TLS of the payload. Flexibility – Customers can continue optimizing their applications without load balancer constraints Session Stickiness – Maintains connection continuity using QUIC Connection IDs, even when UDP 5-tuples change during sessions. Health Check Compatibility – Works with existing TCP health checks, simplifying migration from current architectures. Kubernetes Integration – Kubernetes does not natively support provisioning QUIC-enabled NLBs. QUIC support is added through the AWS ControllerLoad Balancer . This guide will walk you through the setup steps. Existing Metrics – Leverages current UDP metrics with additional QUIC-specific insights for connection tracking and routing decisions. See the monitoring section later on for details and recommendations. This functionality leverages the QUIC load balancer specification from the Internet Engineering Task Force (IETF ). The key concept is the QUIC Connection ID (a standard part of QUIC that server software generates for clients) has a Server ID encoded within it. NLB requires an 8-byte Server ID, which customers configure per instance, as discussed below. Early adopters are already seeing substantial benefits. One customer expects to save a full network round trip in their latency-sensitive search service, directly improving their mobile user interface responsiveness. With usage projections of 145 TB/day and peak connection rates of 200,000 connections per second, the performance gains translate to measurable business value. Getting Started QUIC support is available for new and existing Network Load Balancers. You can enable QUIC protocol support through the AWS Management Console , CLI , APIs , or AWS Load Balancer Controller. For customers currently using workarounds or considering alternatives, NLB QUIC support provides a native AWS solution that eliminates the complexity and additional costs of custom implementations. To get started with the console: Go to EC2 then Load Balancers Click Create Load Balancer Click Create under Network Load Balancer. On the next screen, you will see the new QUIC related options available when no security groups are defined, as shown in Figure 1. Figure 1: New QUIC and TCP_QUIC protocol options in Load Balancer configuration You can select QUIC as a protocol type, which supports standard QUIC over UDP. TCP_QUIC is a better choice for using QUIC to support an HTTP/3 application because it allows you to configure both QUIC on UDP 443 and the fallback standard HTTPS server on TCP 443 with one listener. When configuring the target group, you have two corresponding options: QUIC and TCP_QUIC. Ensure your target group and listener match. Figure 2: NLB Target Group configuration with new QUIC and TCP_QUIC protocol options highlighted After clicking through the target group creation, you will reach a Register targets screen that looks somewhat different than other modes (Figure 3). First, you must use Instance ID as your target type. Second, a new parameter for QUIC is the Server ID: Figure 3: Target group target registration screen with new Server ID field highlighted. This is where you configure which server ID corresponds to which instance. This mechanism (referred to as plaintext CID) allows NLB to route traffic without requiring your decryption keys, avoiding security risks. NLB uses the Server ID (part of the Connection ID) to steer traffic accordingly. If you are using QUIC mode, your final listener configuration should look like this (Figure 4): Figure 4: Completed listener configuration, with QUIC protocol and target group highlighted. Follow best practice and configure health checks for your targets , as you would with any other NLB usage. Performing these same steps in the AWS CLI or AWS SDK s works as expected: Create the target group, again using QUIC or TCP_QUIC as the protocol: % aws elbv2 create-target-group --name API-QUIC --protocol QUIC --port 443 --vpc-id vpc-1234567890abcdef0 { "TargetGroups": [ { "TargetGroupArn": "arn:aws:elasticloadbalancing:ap-southeast-4:111122223333:targetgroup/API-QUIC/1234567890abcdef0", "TargetGroupName": "API-QUIC", "Protocol": "QUIC", "Port": 443, "VpcId": "vpc-1234567890abcdef0", "HealthCheckProtocol": "TCP", "HealthCheckPort": "traffic-port", "HealthCheckEnabled": true, "HealthCheckIntervalSeconds": 30, "HealthCheckTimeoutSeconds": 10, "HealthyThresholdCount": 5, "UnhealthyThresholdCount": 2, "TargetType": "instance", "IpAddressType": "ipv4" } ] } Construct the listener to connect the NLB to the target group: % aws elbv2 create-load-balancer --name API-QUIC-LB --subnets subnet-1234567890abcdef0 subnet-1234567890abcdef1 subnet-1234567890abcdef2 --type network --scheme internet-facing { "LoadBalancers": [ { "LoadBalancerArn": "arn:aws:elasticloadbalancing:ap-southeast-4:111122223333:loadbalancer/net/API-QUIC-LB/021345abcdef67890", "DNSName": "API-QUIC-LB-021345abcdef67890.elb.ap-southeast-4.amazonaws.com", "CanonicalHostedZoneId": "Z12345678ABCDEFGHIJK", "CreatedTime": "2025-10-31T02:24:43.514000+00:00", "LoadBalancerName": "API-QUIC-LB", "Scheme": "internet-facing", "VpcId": "vpc-1234567890abcdef0", "State": { "Code": "provisioning" }, "Type": "network", "AvailabilityZones": [ { "ZoneName": "ap-southeast-4a", "SubnetId": "subnet-1234567890abcdef0", "LoadBalancerAddresses": [] }, { "ZoneName": "ap-southeast-4b", "SubnetId": "subnet-1234567890abcdef1", "LoadBalancerAddresses": [] }, { "ZoneName": "ap-southeast-4c", "SubnetId": "subnet-1234567890abcdef2", "LoadBalancerAddresses": [] } ], "IpAddressType": "ipv4", "EnablePrefixForIpv6SourceNat": "off" } ] } Construct the listener to connect the NLB to the target group: % aws elbv2 create-listener --load-balancer-arn arn:aws:elasticloadbalancing:ap-southeast-4:111122223333:loadbalancer/net/API-QUIC-LB/1234567890abcdef0 --protocol QUIC --port 443 --default-actions Type=forward,TargetGroupArn=arn:aws:elasticloadbalancing:ap-southeast-4:111122223333:targetgroup/API-QUIC/1234567890abcdef0 { "Listeners": [ { "ListenerArn": "arn:aws:elasticloadbalancing:ap-southeast-4:111122223333:listener/net/API-QUIC-LB/1234567890abcdef0/abcdef01234567890", "LoadBalancerArn": "arn:aws:elasticloadbalancing:ap-southeast-4:111122223333:loadbalancer/net/API-QUIC-LB/1234567890abcdef0", "Port": 443, "Protocol": "QUIC", "DefaultActions": [ { "Type": "forward", "TargetGroupArn": "arn:aws:elasticloadbalancing:ap-southeast-4:111122223333:targetgroup/API-QUIC/1234567890abcdef0", "ForwardConfig": { "TargetGroups": [ { "TargetGroupArn": "arn:aws:elasticloadbalancing:ap-southeast-4:111122223333:targetgroup/API-QUIC/1234567890abcdef0" } ], "TargetGroupStickinessConfig": { "Enabled": false } } } ] } ] } Finally, register your instances with the target group, using the new QuicServerId field in addition to the usual entries: % aws elbv2 register-targets --target-group-arn arn:aws:elasticloadbalancing:ap-southeast-4:111122223333:targetgroup/API-QUIC/1234567890abcdef0 --targets Id=i-1234567890abcdef0,Port=443,QuicServerId=0x1122334455667788 You can register the same instance with multiple target groups, using the same QuicServerId for all of them. Different instances must use different QuicServerIds. Monitoring QUIC Network Load Balancers provide new Amazon CloudWatch metrics that customers should add to their monitoring and alerting systems: NewFlowCount_QUIC – This metric provides the number of newly initiated QUIC flows seen through the load balancer. Customers should monitor this metric for changes that deviate from their workload patterns. ProcessedBytes_QUIC – This metric shows the total number of bytes processed by QUIC listeners. Customers should monitor this metric for changes that deviate from their baseline workload patterns. QUIC_Unknown_Server_ID_Packet_Drop_Count – This metric increments when the load balancer receives a Server ID that is not registered with NLB. Customers should set alarms for increases in this count, as this indicates invalid server IDs are being generated. Increments can occur when servers are deregistered and removed before clients have finished their sessions. Considerations The QUIC load balancer specification from IETF (QUIC-LB) is currently in draft state. AWS offers support based on the current draft, which has remained stable for several months. Details may change between now and when QUIC-LB becomes an RFC. Monitor the specification for changes you will need to implement. QUIC is used for internet-facing traffic with a single port, so the option to add additional security groups in front of NLB is not available. To handle restrictions, implement them in your server software. QUIC-LB is a new technology, and server software platforms have not yet implemented it in their main codebases. To test this functionality, we built a server in Rust using AWS’s s2n-quic library and its support for custom Connection ID generators. The s2n-quic library provides a good starting point if your use case requires that level of customization. Fast-moving software branches are also available for evaluation, or you can ask your software vendor when they will add support for QUIC-LB. For networking professionals, note that the QUIC RFC states in section 14 that UDP packets must not be fragments, which reduces implementation complexity. Your server software encodes specific server IDs in the connection ID and NLB uses that encoding instead of sticky sessions or other techniques to keep sessions tied to one target. Consider how your application will handle failover. Amazon’s CTO, Werner Vogels , says that ‘Everything Fails All the Time’. Plan how your software will handle cases when your server fails or needs to be replaced. This feature is supported in all AWS Commercial and GovCloud (US) Regions. This is no additional charge for using this feature beyond standard NLB charges Conclusion This launch demonstrates AWS’s commitment to supporting mobile and web applications. NLB’s QUIC protocol passthrough complements existing Amazon CloudFront QUIC termination capabilities, giving you flexibility to optimize performance at both the edge and core of your infrastructure. AWS provides the tools and services you need to deliver high-quality user experiences. QUIC support on Network Load Balancer advances this capability. Enable QUIC support on your Network Load Balancer today to improve your mobile application performance. For detailed technical specifications and implementation guidance, visit the AWS documentation . About the authors Andrew Gray Andrew Gray is a Principal Solutions Architect at AWS, specializing in networking architecture and engineering. With experience as a lead networking engineer in telecommunications and higher education, Andrew enjoys applying his technical expertise to develop innovative cloud solutions. He is passionate about solving complex challenges at the intersection of networking, infrastructure, and code. Milind Kulkarni Milind is a Principal Product Manager at Amazon Web Services (AWS). He has over 20 years of experience in networking, data center architectures, SDN/NFV, and cloud computing. He is a co-inventor of nine US Patents and has co-authored three IETF Standards. Resources Networking Products Getting Started Amazon CloudFront Follow Twitter Facebook LinkedIn Twitch Email Updates Create an AWS account Learn What Is AWS? What Is Cloud Computing? What Is Agentic AI? Cloud Computing Concepts Hub AWS Cloud Security What's New Blogs Press Releases Resources Getting Started Training AWS Trust Center AWS Solutions Library Architecture Center Product and Technical FAQs Analyst Reports AWS Partners Developers Builder Center SDKs & Tools .NET on AWS Python on AWS Java on AWS PHP on AWS JavaScript on AWS Help Contact Us File a Support Ticket AWS re:Post Knowledge Center AWS Support Overview Get Expert Help AWS Accessibility Legal English Back to top Amazon is an Equal Opportunity Employer: Minority / Women / Disability / Veteran / Gender Identity / Sexual Orientation / Age. x facebook linkedin instagram twitch youtube podcasts email Privacy Site terms Cookie Preferences © 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved. | 2026-01-13T09:30:40 |
https://github.com/yangshun/front-end-interview-handbook/edit/main/contents/companies/shopify-front-end-interview-questions.md | Sign in to GitHub · GitHub Skip to content You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert Sign in to GitHub {{ message }} --> Username or email address Password Forgot password? Uh oh! There was an error while loading. Please reload this page . New to GitHub? Create an account Sign in with a passkey Terms Privacy Docs Contact GitHub Support Manage cookies Do not share my personal information You can’t perform that action at this time. | 2026-01-13T09:30:40 |
https://llvm.org/doxygen/ItaniumDemangle_8h.html | LLVM: include/llvm/Demangle/ItaniumDemangle.h File Reference LLVM  22.0.0git include llvm Demangle Classes | Namespaces | Macros | Typedefs | Enumerations | Functions | Variables ItaniumDemangle.h File Reference #include " DemangleConfig.h " #include " StringViewExtras.h " #include " Utility.h " #include <algorithm> #include <cctype> #include <cstdint> #include <cstdio> #include <cstdlib> #include <cstring> #include <limits> #include <new> #include <string_view> #include <type_traits> #include <utility> #include "ItaniumNodes.def" Go to the source code of this file. Classes class   PODSmallVector< T, N > class   Node class   NodeArray struct   NodeArrayNode class   DotSuffix class   VendorExtQualType class   QualType class   ConversionOperatorType class   PostfixQualifiedType class   NameType class   BitIntType class   ElaboratedTypeSpefType class   TransformedType struct   AbiTagAttr class   EnableIfAttr class   ObjCProtoName class   PointerType class   ReferenceType class   PointerToMemberType class   ArrayType class   FunctionType class   NoexceptSpec class   DynamicExceptionSpec class   ExplicitObjectParameter   Represents the explicitly named object parameter. More... class   FunctionEncoding class   LiteralOperator class   SpecialName class   CtorVtableSpecialName struct   NestedName struct   MemberLikeFriendName struct   ModuleName struct   ModuleEntity struct   LocalName class   QualifiedName class   VectorType class   PixelVectorType class   BinaryFPType class   SyntheticTemplateParamName   An invented name for a template parameter for which we don't have a corresponding template argument. More... class   TemplateParamQualifiedArg class   TypeTemplateParamDecl   A template type parameter declaration, 'typename T'. More... class   ConstrainedTypeTemplateParamDecl   A constrained template type parameter declaration, 'C T'. More... class   NonTypeTemplateParamDecl   A non-type template parameter declaration, 'int N'. More... class   TemplateTemplateParamDecl   A template template parameter declaration, 'template<typename T> typename N'. More... class   TemplateParamPackDecl   A template parameter pack declaration, 'typename ...T'. More... class   ParameterPack   An unexpanded parameter pack (either in the expression or type context). More... class   TemplateArgumentPack   A variadic template argument. More... class   ParameterPackExpansion   A pack expansion. More... class   TemplateArgs struct   ForwardTemplateReference   A forward-reference to a template argument that was not known at the point where the template parameter name was parsed in a mangling. More... struct   NameWithTemplateArgs class   GlobalQualifiedName class   ExpandedSpecialSubstitution class   SpecialSubstitution class   CtorDtorName class   DtorName class   UnnamedTypeName class   ClosureTypeName class   StructuredBindingName class   BinaryExpr class   ArraySubscriptExpr class   PostfixExpr class   ConditionalExpr class   MemberExpr class   SubobjectExpr class   EnclosingExpr class   CastExpr class   SizeofParamPackExpr class   CallExpr class   NewExpr class   DeleteExpr class   PrefixExpr class   FunctionParam class   ConversionExpr class   PointerToMemberConversionExpr class   InitListExpr class   BracedExpr class   BracedRangeExpr class   FoldExpr class   ThrowExpr class   BoolExpr class   StringLiteral class   LambdaExpr class   EnumLiteral class   IntegerLiteral class   RequiresExpr class   ExprRequirement class   TypeRequirement class   NestedRequirement class   FloatLiteralImpl< Float > struct   AbstractManglingParser< Derived, Alloc > class   AbstractManglingParser< Derived, Alloc >::ScopedTemplateParamList class   AbstractManglingParser< Derived, Alloc >::SaveTemplateParams struct   AbstractManglingParser< Derived, Alloc >::NameState   Holds some extra information about a <name> that is being parsed. More... struct   AbstractManglingParser< Derived, Alloc >::OperatorInfo struct   FloatData< float > struct   FloatData< double > struct   FloatData< long double > struct   ManglingParser< Alloc > Namespaces namespace   float_literal_impl Macros #define  NODE ( NodeKind ) #define  NODE ( X ) #define  NODE ( X ) Typedefs using  FloatLiteral = FloatLiteralImpl <float> using  DoubleLiteral = FloatLiteralImpl <double> using  LongDoubleLiteral = FloatLiteralImpl <long double> Enumerations enum   FunctionRefQual : unsigned char { FrefQualNone , FrefQualLValue , FrefQualRValue } enum   Qualifiers { QualNone = 0 , QualConst = 0x1 , QualVolatile = 0x2 , QualRestrict = 0x4 } enum class   ReferenceKind { LValue , RValue } enum class   TemplateParamKind { Type , NonType , Template } enum class   SpecialSubKind {    allocator , basic_string , string , istream ,    ostream , iostream } Functions Qualifiers   operator|= ( Qualifiers &Q1, Qualifiers Q2) constexpr Node::Kind   float_literal_impl::getFloatLiteralKind (float *) constexpr Node::Kind   float_literal_impl::getFloatLiteralKind (double *) constexpr Node::Kind   float_literal_impl::getFloatLiteralKind (long double *) DEMANGLE_ABI const char *  parse_discriminator ( const char *first, const char *last) Variables template<typename Derived, typename Alloc > const AbstractManglingParser < Derived, Alloc >::OperatorInfo  AbstractManglingParser< Derived, Alloc >::Ops [] template<typename Derived, typename Alloc > const size_t  AbstractManglingParser< Derived, Alloc >::NumOps Macro Definition Documentation ◆  NODE [1/3] #define NODE ( NodeKind ) Value: K## NodeKind , NodeKind Determine the kind of a node from its type. Definition ItaniumDemangle.h:2650 Definition at line 169 of file ItaniumDemangle.h . Referenced by GetCodeName() . ◆  NODE [2/3] #define NODE ( X ) Value: case K## X : \ return F ( static_cast< const X * > ( this )); F #define F(x, y, z) Definition MD5.cpp:54 X static TableGen::Emitter::OptClass< SkeletonEmitter > X("gen-skeleton-class", "Generate example skeleton class") Definition at line 169 of file ItaniumDemangle.h . ◆  NODE [3/3] #define NODE ( X ) Value: template <> struct NodeKind < X > { \ static constexpr Node::Kind Kind = Node::K## X ; \ static constexpr const char * name () { return # X ; } \ }; name static const char * name Definition SMEABIPass.cpp:52 Node::Kind Kind Definition ItaniumDemangle.h:168 Definition at line 169 of file ItaniumDemangle.h . Typedef Documentation ◆  DoubleLiteral using DoubleLiteral = FloatLiteralImpl <double> Definition at line 2633 of file ItaniumDemangle.h . ◆  FloatLiteral using FloatLiteral = FloatLiteralImpl <float> Definition at line 2632 of file ItaniumDemangle.h . ◆  LongDoubleLiteral using LongDoubleLiteral = FloatLiteralImpl <long double> Definition at line 2634 of file ItaniumDemangle.h . Enumeration Type Documentation ◆  FunctionRefQual enum FunctionRefQual : unsigned char Enumerator FrefQualNone  FrefQualLValue  FrefQualRValue  Definition at line 420 of file ItaniumDemangle.h . ◆  Qualifiers enum Qualifiers Enumerator QualNone  QualConst  QualVolatile  QualRestrict  Definition at line 426 of file ItaniumDemangle.h . ◆  ReferenceKind enum class ReferenceKind strong Enumerator LValue  RValue  Definition at line 683 of file ItaniumDemangle.h . ◆  SpecialSubKind enum class SpecialSubKind strong Enumerator allocator  basic_string  string  istream  ostream  iostream  Definition at line 1673 of file ItaniumDemangle.h . ◆  TemplateParamKind enum class TemplateParamKind strong Enumerator Type  NonType  Template  Definition at line 1243 of file ItaniumDemangle.h . Function Documentation ◆  operator|=() Qualifiers operator|= ( Qualifiers & Q1 , Qualifiers Q2  ) inline Definition at line 433 of file ItaniumDemangle.h . ◆  parse_discriminator() DEMANGLE_ABI const char * parse_discriminator ( const char * first , const char * last  ) References DEMANGLE_ABI . Referenced by AbstractManglingParser< Derived, Alloc >::parseLocalName() . Variable Documentation ◆  AbstractManglingParser< Derived, Alloc >::NumOps template<typename Derived, typename Alloc > const size_t AbstractManglingParser < Derived, Alloc >::NumOps Initial value: = sizeof ( Ops ) / sizeof ( Ops [0]) Ops const AbstractManglingParser< Derived, Alloc >::OperatorInfo AbstractManglingParser< Derived, Alloc >::Ops[] Definition ItaniumDemangle.h:3370 Definition at line 3452 of file ItaniumDemangle.h . Referenced by llvm::AMDGPURegisterBankInfo::addMappingFromTable() , allOpsDefaultValue() , llvm::CCState::AnalyzeCallOperands() , llvm::CCState::AnalyzeCallOperands() , llvm::AMDGPURegisterBankInfo::applyMappingImage() , llvm::SIInstrInfo::areLoadsFromSameBasePtr() , canConvertToFMA() , canonicalizePHIOperands() , llvm::GlobalObject::clearMetadata() , CollectOpsToWiden() , combineConcatVectorOps() , combineX86ShufflesConstants() , llvm::X86TargetLowering::computeKnownBitsForTargetNode() , llvm::GISelValueTracking::computeKnownBitsImpl() , llvm::X86TargetLowering::ComputeNumSignBitsForTargetNode() , llvm::RISCVInstrInfo::convertToThreeAddress() , llvm::SystemZInstrInfo::convertToThreeAddress() , createMMXBuildVector() , llvm::MDNode::DIAssignID , llvm::SIRegisterInfo::eliminateFrameIndex() , llvm::emitAMDGPUPrintfCall() , emitIntrinsicWithCC() , emitIntrinsicWithCCAndChain() , emitTypedInstrOperands() , llvm::GlobalObject::eraseMetadataIf() , llvm::GIMatchTableExecutor::executeMatchTable() , llvm::MachineInstr::findInlineAsmFlagIdx() , llvm::MachineInstr::findTiedOperandIdx() , llvm::InlineAsm::Flag::Flag() , FoldBUILD_VECTOR() , llvm::SelectionDAG::FoldConstantArithmetic() , llvm::ARMBaseInstrInfo::foldImmediate() , llvm::SystemZInstrInfo::foldMemoryOperandImpl() , llvm::X86InstrInfo::foldMemoryOperandImpl() , llvm::X86InstrInfo::foldMemoryOperandImpl() , fuseTwoAddrInst() , generateNewInstTree() , llvm::X86::getFirstAddrOperandIdx() , GetFunctionFromMDNode() , llvm::AMDGPURegisterBankInfo::getImageMapping() , getInputChainForNode() , llvm::GCNTTIImpl::getIntrinsicInstrCost() , llvm::ARMTTIImpl::getMemcpyCost() , llvm::SystemZTTIImpl::getMemoryOpCost() , llvm::SelectionDAG::getNode() , llvm::X86II::getOperandBias() , getOperands() , llvm::BuildVectorSDNode::getRepeatedSequence() , llvm::getSPIRVStringOperand() , getSplatableConstant() , llvm::BuildVectorSDNode::getSplatValue() , insertSEH() , insertTrivialPHIs() , llvm::isConstantOrConstantVector() , llvm::BuildVectorSDNode::isConstantSequence() , llvm::BuildVectorSDNode::isConstantSplat() , llvm::SIInstrInfo::isLegalGFX12PlusPackedMathFP32Operand() , IsSafeAndProfitableToMove() , isTwoAddrUse() , lowerBUILD_VECTORAsBroadCastLoad() , llvm::HexagonTargetLowering::LowerINLINEASM() , llvm::LegalizerHelper::lowerMergeValues() , lowerRISCVVMachineInstrToMCInst() , lowerVectorIntrinsicScalars() , llvm::MachineRegisterInfo::moveOperands() , moveOperands() , llvm::SIInstrInfo::mutateAndCleanupImplicit() , llvm::GlobalVariable::operator=() , llvm::HexagonInstrInfo::PredicateInstruction() , llvm::SPIRVInstPrinter::printInst() , llvm::SPIRVInstPrinter::printOpExtInst() , llvm::SPIRVInstPrinter::printRemainingVariableOps() , llvm::SPIRVInstPrinter::printStringImm() , llvm::SPIRVInstPrinter::printUnknownType() , llvm::MDTuple::push_back() , llvm::SwitchInst::removeCase() , llvm::IndirectBrInst::removeDestination() , llvm::PHINode::removeIncomingValueIf() , slpvectorizer::BoUpSLP::reorderBottomToTop() , llvm::PHINode::replaceIncomingBlockWith() , llvm::sandboxir::PHINode::replaceIncomingBlockWith() , llvm::MDNode::resize() , llvm::DAGTypeLegalizer::run() , llvm::SelectionDAGISel::SelectCodeCommon() , llvm::PHINode::setIncomingValueForBlock() , llvm::User::setNumHungOffUseOperands() , llvm::X86TargetLowering::SimplifyMultipleUseDemandedBitsForTargetNode() , splitEdge() , splitVectorOp() , llvm::X86InstrInfo::unfoldMemoryOperand() , updateLiveVariables() , llvm::SelectionDAG::UpdateNodeOperands() , llvm::MachineRegisterInfo::verifyUseList() , and llvm::MDNode::~MDNode() . ◆  AbstractManglingParser< Derived, Alloc >::Ops template<typename Derived, typename Alloc > const AbstractManglingParser <Derived, Alloc >::OperatorInfo AbstractManglingParser < Derived, Alloc >::Ops[] Examples /work/as-worker-4/publish-doxygen-docs/llvm-project/llvm/include/llvm/Transforms/Utils/Local.h . Definition at line 3370 of file ItaniumDemangle.h . Referenced by AddCombineBUILD_VECTORToVPADDL() , AddCombineTo64bitMLAL() , AddCombineTo64bitUMAAL() , AddCombineToVPADD() , AddCombineVUZPToVPADDL() , llvm::RegsForValue::AddInlineAsmOperands() , llvm::DwarfCompileUnit::addMemoryLocation() , AddNodeIDOperands() , AddNodeIDOperands() , addRegsToSet() , addStackMapLiveVars() , allOpsDefaultValue() , llvm::AnalyzeVirtRegInBundle() , llvm::PatternMatch::AnyOps_match< Opcode, OperandTypes >::AnyOps_match() , llvm::DIExpression::append() , llvm::DIExpression::appendOffset() , llvm::DIExpression::appendOpsToArg() , llvm::DIExpression::appendToStack() , llvm::CombinerHelper::applyCombineConcatVectors() , llvm::CombinerHelper::applyCombineShuffleConcat() , llvm::CombinerHelper::applyCombineShuffleVector() , applyDivisibilityOnMinMaxExpr() , AVRDAGToDAGISel::select< AVRISD::CALL >() , AVRDAGToDAGISel::select< ISD::STORE >() , broadcastSrcOp() , llvm::MachineIRBuilder::buildBuildVector() , llvm::MachineIRBuilder::buildBuildVectorConstant() , llvm::MachineIRBuilder::buildBuildVectorTrunc() , buildCallOperands() , llvm::MachineIRBuilder::buildConcatVectors() , llvm::VPlanSlp::buildGraph() , llvm::MachineIRBuilder::buildMergeLikeInstr() , llvm::MachineIRBuilder::buildMergeLikeInstr() , llvm::MachineIRBuilder::buildMergeValues() , buildMultiplyTree() , llvm::DICompositeType::buildODRType() , buildRegSequence32() , llvm::SITargetLowering::buildRSRC() , buildScalarToVector() , buildTreeReduction() , BuildVSLDOI() , llvm::DIExpression::canonicalizeExpressionOps() , canonicalizeShuffleMaskWithHorizOp() , canonicalizeShuffleWithOp() , canReplaceGEPIdxWithZero() , canSinkInstructions() , llvm::AArch64TargetLowering::changeStreamingMode() , CloneNodeWithValues() , CollectAddOperandsWithScales() , collectConcatOps() , collectInlineAsmInstrOperands() , collectMultiplyFactors() , CollectSubexprs() , llvm::PPCTargetLowering::CollectTargetIntrinsicOperands() , llvm::SITargetLowering::CollectTargetIntrinsicOperands() , llvm::TargetLowering::CollectTargetIntrinsicOperands() , combineADDToSUB() , combineArithReduction() , combineBinOpToReduce() , combineBitcast() , combineBVOfConsecutiveLoads() , combineCMov() , combineCONCAT_VECTORS() , combineConcatVectorOfScalars() , combineConcatVectorOps() , combineExtractWithShuffle() , combineFP_EXTEND() , combineHorizOpWithShuffle() , combineMaskedStore() , combineMulToPMADDWD() , combineMulToPMULDQ() , combineOrAndToBitfieldInsert() , combineOrToBitfieldInsert() , combineScalarAndWithMaskSetcc() , llvm::VETargetLowering::combineSelect() , llvm::VETargetLowering::combineSelectCC() , combineSetCCMOVMSK() , combineShuffleOfScalars() , combineStore() , combineSVEPrefetchVecBaseImmOff() , combineTargetShuffle() , combineToHorizontalAddSub() , combineToVWMACC() , CombineVLDDUP() , combineVqdotAccum() , combineX86AddSub() , combineX86CloadCstore() , combineX86ShuffleChain() , combineX86ShufflesConstants() , combineX86ShufflesRecursively() , combineX86SubCmpForFlags() , combineXorToBitfieldInsert() , computeExprForSpill() , llvm::X86TargetLowering::computeKnownBitsForTargetNode() , llvm::computeMinimumValueSizes() , llvm::X86TargetLowering::ComputeNumSignBitsForTargetNode() , llvm::DIExpression::constantFold() , constantFoldAndGroupOps() , llvm::ConstantFoldExtractElementInstruction() , llvm::ConstantFoldInstOperands() , llvm::ConstantFoldInstruction() , llvm::M68kTargetLowering::create() , createAccessTag() , llvm::IRBuilderBase::CreateAnd() , llvm::IRBuilderBase::CreateAssumption() , llvm::MDBuilder::createCallbackEncoding() , llvm::MDBuilder::createCallees() , llvm::MatrixBuilder::CreateColumnMajorLoad() , llvm::MatrixBuilder::CreateColumnMajorStore() , llvm::IRBuilderBase::CreateElementUnorderedAtomicMemCpy() , llvm::IRBuilderBase::CreateElementUnorderedAtomicMemMove() , llvm::IRBuilderBase::CreateElementUnorderedAtomicMemSet() , llvm::IRBuilderBase::CreateFAddReduce() , createFFSIntrinsic() , llvm::IRBuilderBase::CreateFMulReduce() , llvm::DIExpression::createFragmentExpression() , llvm::MDBuilder::createFunctionEntryCount() , createGPRPairNode() , createGPRPairNode2xi32() , llvm::IRBuilderBase::CreateInvariantStart() , llvm::MDBuilder::createLLVMStats() , createLoadLR() , llvm::IRBuilderBase::CreateLogicalOr() , llvm::IRBuilderBase::CreateMaskedCompressStore() , llvm::IRBuilderBase::CreateMaskedExpandLoad() , llvm::IRBuilderBase::CreateMaskedGather() , llvm::IRBuilderBase::CreateMaskedLoad() , llvm::IRBuilderBase::CreateMaskedScatter() , llvm::IRBuilderBase::CreateMaskedStore() , llvm::MatrixBuilder::CreateMatrixMultiply() , llvm::MatrixBuilder::CreateMatrixTranspose() , createMemMemNode() , llvm::IRBuilderBase::CreateMemSet() , llvm::IRBuilderBase::CreateMemSetInline() , llvm::IRBuilderBase::CreateMemTransferInst() , createMMXBuildVector() , llvm::IRBuilderBase::CreateNAryOp() , llvm::OpenMPIRBuilder::createOffloadEntriesAndInfoMetadata() , llvm::IRBuilderBase::CreateOr() , llvm::createOrderedReduction() , createOrReplaceFragment() , llvm::MDBuilder::createPCSections() , createPopcntIntrinsic() , createPSADBW() , llvm::MDBuilder::createPseudoProbeDesc() , llvm::MDBuilder::createRTTIPointerPrologue() , llvm::createSimpleReduction() , createStoreLR() , llvm::MDBuilder::createTBAAStructTypeNode() , llvm::MDBuilder::createTBAATypeNode() , createVariablePermute() , llvm::IRBuilderBase::CreateVectorInterleave() , llvm::IRBuilderBase::CreateVectorSplice() , createVPDPBUSD() , cvtVOP3DstOpSelOnly() , llvm::describeFuzzerAggregateOps() , llvm::describeFuzzerControlFlowOps() , llvm::describeFuzzerFloatOps() , llvm::describeFuzzerIntOps() , llvm::describeFuzzerOtherOps() , llvm::describeFuzzerPointerOps() , llvm::describeFuzzerUnaryOperations() , llvm::describeFuzzerVectorOps() , llvm::TargetInstrInfo::describeLoadedValue() , llvm::X86InstrInfo::describeLoadedValue() , detectPMADDUBSW() , llvm::HexagonDAGToDAGISel::DetectUseSxtw() , llvm::DIBasicType::DIBasicType() , llvm::DIBasicType::DIBasicType() , llvm::DILexicalBlockBase::DILexicalBlockBase() , llvm::DILocalScope::DILocalScope() , llvm::DIScope::DIScope() , llvm::DITemplateParameter::DITemplateParameter() , llvm::DIType::DIType() , llvm::DIVariable::DIVariable() , llvm::SelectionDAG::doesNodeExist() , DoInitialMatch() , llvm::SystemZRegisterInfo::eliminateFrameIndex() , EltsFromConsecutiveLoads() , EmitAddTreeOfValues() , emitIntrinsicWithCC() , emitIntrinsicWithCCAndChain() , emitLockedStackOp() , EmitMaskedTruncSStore() , llvm::AArch64SelectionDAGInfo::EmitMOPS() , emitRepmovs() , emitRepstos() , emitSETCC() , llvm::SystemZSelectionDAGInfo::EmitTargetCodeForMemchr() , llvm::RISCVSelectionDAGInfo::EmitTargetCodeForMemset() , llvm::AArch64SelectionDAGInfo::EmitTargetCodeForSetTag() , EmitTest() , EmitTruncSStore() , llvm::InstCombinerImpl::eraseInstFromFunction() , llvm::VPInterleaveEVLRecipe::execute() , llvm::VPInterleaveRecipe::execute() , llvm::VPWidenGEPRecipe::execute() , llvm::VPWidenRecipe::execute() , expandIntrinsicWChainHelper() , llvm::TargetLowering::expandMULO() , llvm::TargetLowering::expandVecReduce() , llvm::TargetLowering::expandVecReduceSeq() , ExtendToType() , llvm::HexagonDAGToDAGISel::FastFDiv() , llvm::HexagonDAGToDAGISel::FDiv() , llvm::LegalizerHelper::fewerElementsVectorShuffle() , fillSubVectorFromBuildVector() , fillVector() , findInnerReductionPhi() , FindInOperandList() , findZeroVectorIdx() , FoldBUILD_VECTOR() , foldCONCAT_VECTORS() , llvm::SelectionDAG::FoldConstantArithmetic() , llvm::SelectionDAG::FoldConstantBuildVector() , llvm::SelectionDAG::foldConstantFPMath() , llvm::DIExpression::foldConstantMath() , llvm::InstCombinerImpl::foldICmpWithConstant() , foldInlineAsmMemOperand() , llvm::TargetInstrInfo::foldMemoryOperand() , llvm::TargetInstrInfo::foldMemoryOperand() , llvm::AArch64InstrInfo::foldMemoryOperandImpl() , llvm::RISCVInstrInfo::foldMemoryOperandImpl() , llvm::RISCVInstrInfo::foldMemoryOperandImpl() , llvm::SIInstrInfo::foldMemoryOperandImpl() , llvm::SystemZInstrInfo::foldMemoryOperandImpl() , llvm::SystemZInstrInfo::foldMemoryOperandImpl() , llvm::TargetInstrInfo::foldMemoryOperandImpl() , llvm::TargetInstrInfo::foldMemoryOperandImpl() , llvm::X86InstrInfo::foldMemoryOperandImpl() , llvm::X86InstrInfo::foldMemoryOperandImpl() , foldPatchpoint() , llvm::InstCombinerImpl::freelyInvertAllUsersOf() , generateNewInstTree() , generateReproducer() , llvm::ScalarEvolution::getAddExpr() , llvm::ScalarEvolution::getAddExpr() , llvm::ScalarEvolution::getAddExpr() , llvm::SITargetLowering::getAddrModeArguments() , llvm::SelectionDAG::getAddrSpaceCast() , llvm::ScalarEvolution::getAnyExtendExpr() , llvm::ConstantExpr::getAsInstruction() , llvm::SelectionDAG::getAtomic() , llvm::SelectionDAG::getAtomic() , llvm::SelectionDAG::getAtomicCmpSwap() , llvm::SelectionDAG::getAtomicLoad() , getAVX2GatherNode() , getAVX512Node() , getBROADCAST_LOAD() , llvm::SelectionDAG::getBuildVector() , llvm::SelectionDAG::getBuildVector() , getBuildVectorSplat() , llvm::SelectionDAG::getCALLSEQ_END() , llvm::SelectionDAG::getCALLSEQ_START() , llvm::SelectionDAG::getConstant() , getConstVector() , getConstVector() , getCopyFromPartsVector() , llvm::SelectionDAG::getCopyFromReg() , llvm::SelectionDAG::getCopyFromReg() , getCopyToPartsVector() , llvm::SelectionDAG::getCopyToReg() , llvm::SelectionDAG::getCopyToReg() , llvm::InjectorIRStrategy::getDefaultOps() , llvm::HexagonTargetLowering::GetDynamicTLSAddr() , getExactSDiv() , llvm::DIExpression::getExtOps() , getFauxShuffleMask() , getFoldedOpcode() , llvm::TargetInstrInfo::getFrameIndexOperands() , llvm::X86InstrInfo::getFrameIndexOperands() , getGatherNode() , llvm::SelectionDAG::getGatherVP() , getGeneralPermuteNode() , llvm::SelectionDAG::getGetFPEnv() , llvm::DIBasicType::getImpl() , llvm::SelectionDAG::getIndexedStoreVP() , getInstReadLaneMask() , getIntOperandFromRegisterString() , getIntOperandsFromRegisterString() , llvm::RISCVTTIImpl::getIntrinsicInstrCost() , getInvertedVectorForFMA() , getKeyFPValMD() , getKeyValMD() , getKeyValMD() , llvm::SelectionDAG::getLabelNode() , llvm::SelectionDAG::getLifetimeNode() , llvm::SelectionDAG::getLoad() , llvm::SelectionDAG::getLoadFFVP() , llvm::SelectionDAG::getLoadVP() , llvm::SelectionDAG::getMachineNode() , llvm::SelectionDAG::getMachineNode() , llvm::SelectionDAG::getMachineNode() , llvm::SelectionDAG::getMachineNode() , llvm::SelectionDAG::getMachineNode() , llvm::SelectionDAG::getMachineNode() , llvm::SelectionDAG::getMachineNode() , llvm::SelectionDAG::getMachineNode() , llvm::SelectionDAG::getMachineNode() , llvm::SelectionDAG::getMachineNode() , llvm::SelectionDAG::getMachineNode() , llvm::SelectionDAG::getMachineNode() , llvm::SelectionDAG::getMaskedGather() , llvm::SelectionDAG::getMaskedHistogram() , llvm::SelectionDAG::getMaskedLoad() , llvm::SelectionDAG::getMaskedScatter() , llvm::SelectionDAG::getMaskedStore() , llvm::SelectionDAG::getMemIntrinsicNode() , llvm::SelectionDAG::getMemIntrinsicNode() , llvm::SelectionDAG::getMemIntrinsicNode() , llvm::SelectionDAG::getMergeValues() , llvm::ScalarEvolution::getMinMaxExpr() , llvm::ScalarEvolution::getMulExpr() , llvm::ScalarEvolution::getMulExpr() , llvm::ScalarEvolution::getMulExpr() , llvm::TargetLowering::getNegatedExpression() , llvm::SelectionDAG::getNode() , llvm::SelectionDAG::getNode() , llvm::SelectionDAG::getNode() , llvm::SelectionDAG::getNode() , llvm::SelectionDAG::getNode() , llvm::SelectionDAG::getNode() , llvm::SelectionDAG::getNode() , llvm::SelectionDAG::getNode() , llvm::SelectionDAG::getNode() , llvm::SelectionDAG::getNode() , llvm::SelectionDAG::getNode() , llvm::SelectionDAG::getNode() , llvm::SelectionDAG::getNode() , llvm::SelectionDAG::getNode() , llvm::SelectionDAG::getNode() , llvm::SelectionDAG::getNode() , llvm::SelectionDAG::getNode() , llvm::SelectionDAG::getNodeIfExists() , llvm::SelectionDAG::getNodeIfExists() , llvm::AArch64RegisterInfo::getOffsetOpcodes() , llvm::RISCVRegisterInfo::getOffsetOpcodes() , llvm::TargetRegisterInfo::getOffsetOpcodes() , llvm::MipsTargetLowering::getOpndList() , getOrSelfReference() , getPopFromX87Reg() , llvm::SCEVAddRecExpr::getPostIncExpr() , getPrefetchNode() , llvm::SelectionDAG::getPseudoProbeNode() , getPSHUFShuffleMask() , getRegFromMIA() , getRelevantOperands() , getSalvageOpsForTrunc() , getScatterNode() , llvm::SelectionDAG::getScatterVP() , llvm::vputils::getSCEVExprForVPValue() , llvm::ScalarEvolution::getSequentialMinMaxExpr() , llvm::SelectionDAG::getSetFPEnv() , slpvectorizer::BoUpSLP::LookAheadHeuristics::getShallowScore() , getShapedOperandsForInst() , llvm::ScalarEvolution::getSignExtendExprImpl() , llvm::ScalarEvolution::getSMaxExpr() , llvm::ScalarEvolution::getSMaxExpr() , llvm::ScalarEvolution::getSMinExpr() , llvm::ScalarEvolution::getSMinExpr() , llvm::SelectionDAG::getSplatBuildVector() , llvm::SelectionDAG::getStore() , llvm::SelectionDAG::getStoreVP() , llvm::SelectionDAG::getStridedLoadVP() , llvm::SelectionDAG::getStridedStoreVP() , getTargetShuffleAndZeroables() , getTargetShuffleMask() , getTargetShuffleMask() , llvm::SelectionDAG::getTruncStoreVP() , llvm::SelectionDAG::getTruncStridedStoreVP() , llvm::ScalarEvolution::getUMaxExpr() , llvm::ScalarEvolution::getUMaxExpr() , llvm::ScalarEvolution::getUMinExpr() , llvm::ScalarEvolution::getUMinExpr() , llvm::ScalarEvolution::getUMinFromMismatchedTypes() , llvm::ScalarEvolution::getUMinFromMismatchedTypes() , llvm::SelectionDAG::getVAArg() , llvm::SelectionDAGBuilder::getValueImpl() , getVectorShuffle() , llvm::SelectionDAG::getVectorShuffle() , getVSlidedown() , getVSlideup() , llvm::ConstantExpr::getWithOperands() , llvm::ConstantExpr::getWithOperands() , llvm::ScalarEvolution::getZeroExtendExprImpl() , GroupByComplexity() , hasHugeExpression() , llvm::rdf::DataFlowGraph::hasUntrackedRef() , llvm::GCNTTIImpl::hoistLaneIntrinsicThroughOperand() , llvm::MachineInstr::insert() , instCombineSVEPTest() , llvm::ConstantRange::intrinsic() , llvm::TargetTransformInfoImplCRTPBase< T >::isExpensiveToSpeculativelyExecute() , isFreeToSplitVector() , llvm::X86TargetLowering::isGuaranteedNotToBeUndefOrPoisonForTargetNode() , llvm::AArch64TTIImpl::isProfitableToSinkOperands() , llvm::ARMTTIImpl::isProfitableToSinkOperands() , llvm::GCNTTIImpl::isProfitableToSinkOperands() , llvm::RISCVTTIImpl::isProfitableToSinkOperands() , llvm::TargetTransformInfoImplBase::isProfitableToSinkOperands() , llvm::WebAssemblyTTIImpl::isProfitableToSinkOperands() , llvm::X86TTIImpl::isProfitableToSinkOperands() , llvm::SelectionDAG::isUndef() , llvm::AMDGPULegalizerInfo::legalizeBVHIntersectRayIntrinsic() , legalizeSVEGatherPrefetchOffsVec() , llvm::SITargetLowering::legalizeTargetIndependentNode() , LinearizeExprTree() , LowerABS() , llvm::ARMTargetLowering::LowerAsmOperandForConstraint() , llvm::AVRTargetLowering::LowerAsmOperandForConstraint() , llvm::LanaiTargetLowering::LowerAsmOperandForConstraint() , llvm::M68kTargetLowering::LowerAsmOperandForConstraint() , llvm::NVPTXTargetLowering::LowerAsmOperandForConstraint() , llvm::PPCTargetLowering::LowerAsmOperandForConstraint() , llvm::RISCVTargetLowering::LowerAsmOperandForConstraint() , llvm::SITargetLowering::LowerAsmOperandForConstraint() , llvm::SparcTargetLowering::LowerAsmOperandForConstraint() , llvm::SystemZTargetLowering::LowerAsmOperandForConstraint() , llvm::TargetLowering::LowerAsmOperandForConstraint() , llvm::X86TargetLowering::LowerAsmOperandForConstraint() , llvm::XtensaTargetLowering::LowerAsmOperandForConstraint() , llvm::InlineAsmLowering::lowerAsmOperandForConstraint() , llvm::SPIRVInlineAsmLowering::lowerAsmOperandForConstraint() , llvm::SelectionDAGBuilder::LowerAsSTATEPOINT() , LowerATOMIC_STORE() , LowerAVXCONCAT_VECTORS() , llvm::HexagonTargetLowering::LowerBUILD_VECTOR() , lowerBUILD_VECTOR() , lowerBUILD_VECTORAsBroadCastLoad() , lowerBuildVectorAsBroadcast() , LowerBuildVectorv4x32() , lowerBuildVectorViaDominantValues() , llvm::HexagonTargetLowering::LowerCall() , llvm::LoongArchTargetLowering::LowerCall() , llvm::RISCVTargetLowering::LowerCall() , llvm::SITargetLowering::LowerCall() , llvm::SystemZTargetLowering::LowerCall() , llvm::VETargetLowering::LowerCall() , llvm::XtensaTargetLowering::LowerCall() , llvm::SparcTargetLowering::LowerCall_32() , llvm::SparcTargetLowering::LowerCall_64() , LowerCallResult() , LowerCMP_SWAP() , LowerCONCAT_VECTORSvXi1() , LowerCTLZ() , LowerCTPOP() , LowerCTTZ() , lowerCvtRSIntrinsics() , llvm::FastISel::lowerDbgDeclare() , llvm::FastISel::lowerDbgValue() , lowerDSPIntr() , llvm::AMDGPUTargetLowering::LowerDYNAMIC_STACKALLOC() , llvm::LanaiTargetLowering::LowerDYNAMIC_STACKALLOC() , llvm::NVPTXTargetLowering::LowerDYNAMIC_STACKALLOC() , LowerDYNAMIC_STACKALLOC() , llvm::VETargetLowering::lowerDYNAMIC_STACKALLOC() , LowerF128Load() , lowerFixedVectorSegLoadIntrinsics() , lowerFixedVectorSegStoreIntrinsics() , llvm::SparcTargetLowering::LowerGlobalTLSAddress() , lowerIncomingStatepointValue() , llvm::InlineAsmLowering::lowerInlineAsm() , llvm::ARMTargetLowering::lowerInterleavedLoad() , llvm::AArch64TargetLowering::lowerInterleavedStore() , llvm::ARMTargetLowering::lowerInterleavedStore() , llvm::RISCVTargetLowering::lowerInterleavedStore() , llvm::RISCVTargetLowering::lowerInterleaveIntrinsicToStore() , LowerINTRINSIC_W_CHAIN() , llvm::IntrinsicLowering::LowerIntrinsicCall() , llvm::MipsTargetLowering::lowerLOAD() , lowerLoadF128() , lowerLoadI1() , LowerMGATHER() , lowerMSASplatZExt() , LowerMSCATTER() , lowerMSTORE() , llvm::SelectionDAGBuilder::lowerNoFPClassToAssertNoFPClass() , llvm::SystemZTargetLowering::LowerOperationWrapper() , LowerPredicateStore() , llvm::SelectionDAGBuilder::lowerRangeToAssertZExt() , lowerReductionSeq() , llvm::MSP430TargetLowering::LowerSELECT_CC() , llvm::MSP430TargetLowering::LowerSETCC() , llvm::LanaiTargetLowering::LowerSHL_PARTS() , lowerShuffleAsBroadcast() , lowerShuffleAsUNPCKAndPermute() , llvm::LanaiTargetLowering::LowerSRL_PARTS() , llvm::NVPTXTargetLowering::LowerSTACKSAVE() , lowerStatepointMetaArgs() , LowerStore() , lowerSTOREVector() , lowerTcgen05Ld() , LowerTcgen05MMADisableOutputLane() , lowerTcgen05St() , lowerUINT_TO_FP_vXi32() , lowerV4X128Shuffle() , LowerVECTOR_SHUFFLE() , lowerVECTOR_SHUFFLE() , lowerVECTOR_SHUFFLE() , lowerVECTOR_SHUFFLE_VSHF() , lowerVECTOR_SHUFFLE_VSHUF() , LowerWRITE_REGISTER() , llvm::PatternMatch::m_GEP() , llvm::VPlanPatternMatch::m_VPInstruction() , llvm::SystemZTargetLowering::makeExternalCall() , llvm::TargetLowering::makeLibCall() , llvm::TargetLowering::makeLibCall() , llvm::CombinerHelper::matchCombineConcatVectors() , llvm::CombinerHelper::matchCombineShuffleConcat() , llvm::CombinerHelper::matchCombineShuffleVector() , llvm::AMDGPUDAGToDAGISel::matchLoadD16FromBuildVector() , matchPMADDWD() , matchPMADDWD_2() , llvm::CombinerHelper::matchUnmergeValuesAnyExtBuildVector() , llvm::DICommonBlock::MDNode , llvm::DICompositeType::MDNode , llvm::DIDerivedType::MDNode , llvm::DIEnumerator::MDNode , llvm::DIFixedPointType::MDNode , llvm::DIGenericSubrange::MDNode , llvm::DIGlobalVariable::MDNode , llvm::DIGlobalVariableExpression::MDNode , llvm::DIImportedEntity::MDNode , llvm::DILabel::MDNode , llvm::DILexicalBlock::MDNode , llvm::DILexicalBlockFile::MDNode , llvm::DILocalVariable::MDNode , llvm::DIMacro::MDNode , llvm::DIMacroFile::MDNode , llvm::DIModule::MDNode , llvm::DINamespace::MDNode , llvm::DIObjCProperty::MDNode , llvm::DIStringType::MDNode , llvm::DISubrange::MDNode , llvm::DISubrangeType::MDNode , llvm::DISubroutineType::MDNode , llvm::DITemplateTypeParameter::MDNode , llvm::DITemplateValueParameter::MDNode , llvm::MDBuilder::mergeCallbackEncodings() , llvm::SelectionDAG::MorphNodeTo() , moveBelowOrigChain() , llvm::SelectionDAG::mutateStrictFPToFP() , narrowLoadToVZLoad() , narrowVectorSelect() , NormalizeBuildVector() , OptimizeAndOrXor() , llvm::AArch64SysReg::parseGenericRegister() , partitionShuffleOfConcats() , PerformADDVecReduce() , performANDCombine() , PerformBUILD_VECTORCombine() , performConcatVectorsCombine() , performCONDCombine() , llvm::PPCTargetLowering::PerformDAGCombine() , llvm::R600TargetLowering::PerformDAGCombine() , llvm::RISCVTargetLowering::PerformDAGCombine() , performDUPCombine() , performExtBinopLoadFold() , llvm::AMDGPUTargetLowering::performFNegCombine() , performGatherLoadCombine() , PerformHWLoopCombine() , llvm::ARMTargetLowering::PerformIntrinsicCombine() , performLD1Combine() , performLD1ReplicateCombine() , performLDNT1Combine() , llvm::AMDGPUTargetLowering::performLoadCombine() , performMaskedGatherScatterCombine() , PerformMVEVLDCombine() , performNEONPostLDSTCombine() , performPostLD1Combine() , PerformReduceShuffleCombine() , performScatterStoreCombine() , performSignExtendInRegCombine() , performSRACombine() , performST1Combine() , performSubsToAndsCombine() , PerformVDUPCombine() , PerformVECREDUCE_ADDCombine() , PerformVMOVhrCombine() , performVSelectCombine() , PerformXORCombine() , llvm::SITargetLowering::PostISelFolding() , llvm::DIExpression::prepend() , llvm::DIExpression::prependOpcodes() , llvm::RISCVDAGToDAGISel::PreprocessISelDAG() , PrintOps() , processSDiv() , processSRem() , pushStackMapConstant() , llvm::MachineInstr::readsWritesVirtualRegister() , rebuildGatherScatter() , llvm::ScalarEvolution::registerUser() , llvm::ScalarEvolution::removePointerBase() , slpvectorizer::BoUpSLP::reorderBottomToTop() , ReplaceATOMIC_LOAD_128Results() , replaceAtomicSwap128() , ReplaceCMP_SWAP_128Results() , ReplaceCMP_SWAP_64Results() , replaceCMP_XCHG_128Results() , replaceInChain() , ReplaceINTRINSIC_W_CHAIN() , llvm::SITargetLowering::ReplaceNodeResults() , llvm::SparcTargetLowering::ReplaceNodeResults() , llvm::X86TargetLowering::ReplaceNodeResults() , ReplaceREADCYCLECOUNTER() , rewriteCall() , rewriteSelectInstMemOps() , runImpl() , salvageDbgAssignAddress() , llvm::salvageDebugInfoForDbgValue() , llvm::salvageDebugInfoForDbgValues() , llvm::salvageDebugInfoImpl() , salvageDebugInfoImpl() , salvageDebugInfoImpl() , llvm::SelectionDAGBuilder::salvageUnresolvedDbgValue() , llvm::AMDGPUDAGToDAGISel::Select() , llvm::RISCVDAGToDAGISel::Select() , llvm::SelectionDAGISel::SelectCodeCommon() , llvm::HexagonDAGToDAGISel::SelectFrameIndex() , llvm::HexagonDAGToDAGISel::SelectHVXDualOutput() , selectI64Imm() , selectI64ImmDirect() , selectI64ImmDirectPrefix() , llvm::HexagonDAGToDAGISel::SelectIndexedStore() , llvm::SelectionDAGISel::SelectInlineAsmMemoryOperands() , llvm::HexagonDAGToDAGISel::SelectNewCircIntrinsic() , llvm::SelectionDAG::SelectNodeTo() , llvm::SelectionDAG::SelectNodeTo() , llvm::SelectionDAG::SelectNodeTo() , llvm::SelectionDAG::SelectNodeTo() , llvm::SelectionDAG::SelectNodeTo() , llvm::SelectionDAG::SelectNodeTo() , llvm::SelectionDAG::SelectNodeTo() , llvm::SelectionDAG::SelectNodeTo() , llvm::FastISel::selectPatchpoint() , llvm::FastISel::selectStackmap() , llvm::HexagonDAGToDAGISel::SelectV65Gather() , llvm::HexagonDAGToDAGISel::SelectV65GatherPred() , llvm::HexagonDAGToDAGISel::SelectVAlign() , llvm::AMDGPUDAGToDAGISel::SelectVectorShuffle() , llvm::FastISel::selectXRayCustomEvent() , llvm::FastISel::selectXRayTypedEvent() , llvm::FunctionLoweringInfo::set() , llvm::MCInst::setOperands() , llvm::TargetLoweringBase::setOperationAction() , llvm::TargetLoweringBase::setOperationAction() , llvm::TargetLoweringBase::setOperationPromotedToType() , shouldSinkVectorOfPtrs() , shouldSinkVScale() , llvm::TargetLowering::SimplifyDemandedVectorElts() , llvm::X86TargetLowering::SimplifyDemandedVectorEltsForTargetNode() , simplifyFPOp() , llvm::simplifyInstruction() , simplifyInstructionWithPHI() , simplifyOperationIntoSelectOperand() , simplifyWithOpsReplaced() , sinkCommonCodeFromPredecessors() , sinkProxyReg() , SkipExtensionForVMULL() , llvm::TargetLowering::softenSetCCOperands() , SplitOpsAndApply() , llvm::AMDGPUTargetLowering::SplitVectorLoad() , StrengthenNoWrapFlags() , llvm::stripNonLineTableDebugInfo() , tryBitfieldInsertOpFromOr() , tryBitfieldInsertOpFromOrAndImm() , TryCombineBaseUpdate() , llvm::CombinerHelper::tryCombineShuffleVector() , tryFoldCommutativeMath() , tryFoldCommutativeMathWithArgInBetween() , tryFoldConstants() , tryFoldNoOpMath() , llvm::RISCVDAGToDAGISel::tryIndexedLoad() , tryInterleave() , tryOrrWithShift() , llvm::VPRecipeBuilder::tryToCreatePartialReduction() , tryToFoldLiveIns() , tryToReplaceALMWithWideALM() , TryToShrinkGlobalToBoolean() , updateDVIWithLocation() , updateDVIWithLocations() , llvm::SelectionDAG::UpdateNodeOperands() , llvm::SelectionDAG::UpdateNodeOperands() , llvm::SelectionDAG::UpdateNodeOperands() , llvm::SelectionDAG::UpdateNodeOperands() , upgradeARMIntrinsicCall() , llvm::upgradeInstructionLoopAttachment() , upgradeLoopArgument() , llvm::UpgradeModuleFlags() , upgradeX86IntrinsicCall() , llvm::X86TargetLowering::visitMaskedLoad() , llvm::X86TargetLowering::visitMaskedStore() , walkToAllocaAndPrependOffsetDeref() , widenVec() , widenVectorToPartType() , and willShiftRightEliminate() . Generated on for LLVM by  1.14.0 | 2026-01-13T09:30:40 |
https://www.charterworks.com/tag/playbook/ | Playbook - Charter - Future of Work, AI, Management, Hybrid Try Charter Pro for $1 Latest Topics AI DEI Flexible Work Management Societal Issues Resources Briefing Work Tech Research Playbooks Case Studies Toolkits, Scripts, and other Resources Solutions Charter Pro Charter Forum Charter Pro for Teams Advisory + Strategic Services Events Upcoming and Past The AI Download Charter Cortados Leading With AI Masterclass Skills Accelerators Strategy Briefings Webinars Workplace Summit About Try Charter Pro for $1 Sign In Playbook Charter's in-depth, downloadable guides to key issues in the future of work, combining original research with extensive interviews for the full view. Pro Playbook AI Download - Leading Learning in the AI Era By Jacob Clemente, Kevin Delaney, and Michelle Peng Pro Playbook Charter Workplace Summit Download - Charter Workplace Summit 2025: The playbook for winning at business, people, and AI By Jacob Clemente, Kevin Delaney, and Michelle Peng Pro Playbook AI Download - Leading in the age of AI: Practices for the new era By Jacob Clemente and Kevin J. Delaney Pro Playbook employer brand Download - The new employer brand as a key to business performance By Kevin J. Delaney Pro Leading with AI Events Download - Charter Leading with AI 2025 By Jacob Clemente and Kevin J. Delaney Pro Playbook Leadership Download - Culture in a Time of Change By Charter Staff Pro Charter Workplace Summit Events Download - Charter Workplace Summit 2024: The New Leadership Playbook By Jacob Clemente, Michelle Peng, and Cari Romm Nazeer Pro Playbook AI Download - The AI Educator: Using artificial intelligence to transform manager development By Michelle Peng Pro Resources Research Download - AI in the workplace: How companies and workers are getting it right By Emily Goligoski and Jacob Clemente Pro Playbook Resources Download - The Shared Power Advantage: How to build a thriving company where workers have a seat at the table By Michelle Peng Pro Resources Playbook Download - Charter Workplace Summit Playbook: The New People-First Paradigm By Cari Romm Nazeer 1 of 2 → Insights Books Interviews Charter on TIME Research Connect Events Topics Artificial Intelligence Hybrid Work DEI Leadership Charter Pro Become a Member Support Sign In Search Contact Partnerships General Inquiries Company About Careers Press Newsletters Charter Briefing Charter Works Inc. © 2025 Privacy Terms of Service | 2026-01-13T09:30:40 |
http://tirkarthi.github.io/life/2017/12/23/2017-shortlog.html | git log --since=360.days xtreak blog whoami Comics Poems git log --since=360.days Dec 23, 2017 I have been thinking about writing a year end review and here it goes. It’s just a log of the mistakes I have made and the decisions that I took based on them and you can have your own opinions I was at home for the 2017 new year and though the weather in Chennai stabilized it was still comfortable being home for the new year. I had the usual flurry of messages and my hands full of grit about the things to achieve for the year. My friend came to drop me at my pick up point and we thought to take a selfie and I told him of the plans for the year. But I finally gave in saying if life was little less shitty compared to the previous year it’s progress. So I took a snap and posted it with the caption ‘Let shit go’ and there goes 2017. Commute I changed jobs last year and it introduced me to a new schedule of things a commute of 2-3 hours everyday. The primary reason being the fact that I got used to the comfort and generally aversive (lazy to be honest) towards moving to different places and getting used to the shops and food around there. So I made to promise to get to office early and then leave early in order to avoid the traffic. I used to take a 570 AC for commute and since my new office had 7 hour workday I left the office by 4.30-5 and then reach home by around 6.30 after dinner. Though this gave me the habit of leaving work at correct times it got me to a new frustration of commute. I still remember the day when I started from my office in the evening and my friend boarded train from Salem to reach Tirupur by the time I got home. You read it right and taking into account 2-3 hours of commute I was spending around 60 full hours in bus for a month. I resorted to books, music and even programming. But commute itself became a hell hole of it’s own leaving me fatigued in the evenings and the need to sleep early so that I can wake up early leaving almost nothing to do. Luckily one of my friends came in for an internship and I thought to move on thankfully given my lazy track record in finding a hostel nearby. The commute time reduced to 15-20 minutes and that itself was a great turnaround that I can still wake up late and then reach home by 6. Since I slept very late in the night it gave me 6 hours to do whatever I wanted to do and the frequency of the bus was also high. He finally finished his internship and I moved to a separate house. Almost all the time I had one my friends as a company and hence living alone is itself was a unique experience over the years and then I moved on to the next set of cooking madness. Cooking Me : Here is a photo of the Maggi I cooked Mom : Well, why does it look like Upma ? Well that summarises my cooking skills :) To be frank I never tried it since I always ate outside and had good access to food but it was always a time constraint one depending upon the shop timing and availability. So after a lot of insistence from my parents I finally plunged into cook something on my own. The difficult thing about cooking is mostly in moving out the utensils in case you are moving out to a different house. Sounds silly but I feel that way. I bought some utensils and then started out with some really simple dishes like Maggi, Upma and dosa. This year also had Milo back in production and the whole set give me some freedom to cook whenever I want. This also lead to eating very late night and then skipping breakfast on most days with milk. My mom was more than excited and had long calls over doing an Upma. My friend also moved in and a pretty great cook. I am learning it and it’s gives some more responsibility over survival on my own and I hope to improve being a stupid AI in cooking :) Code This year has been a pretty wild ride given the amount of fat finger incidents and things broken in general to learn from. This year was extremely good compared to my previous year that I finally completed some side projects I had started ;) I did some interesting prototypes with other languages and frameworks giving me good amount of paradigm shifts. I am confident the next year will be even more exciting with a lot of interesting experiments. Blog The blog was a great experiment and I am happy that I revived it and writing gives me more pleasure these days given that I wrote close to 23k words this year alone. Trying not to be a smug it also allows me to write something that I can go back and read to myself. I also experimented with poems and comics. Blog also provides me a medium to interact with the community and to contribute something back with tutorials and musing on the things I have been playing with. I have also increased the amount of blogs that I read this year with people sharing a lot about technical and non-technical parts. I hope to write/rant more for the next year. Kindle I started reading books during my commute but I was tired and couldn’t get hold of it. Later this year I bought a set of books to study but carrying them around and accessibility when I felt to give a read was limited. So I bought a Kindle during September on an impulsive note to be fair since I didn’t have a concrete reading habit established to utilize it well. I was advised by my friends to start from a genre to read what you love and then to move on to other genre of books once the habit is set. The trick worked fairly well and I started with Sidney Sheldon. I love it but it introduces another impulse of having a large set of books stocked in the Kindle only to not start them at all like the movies I have in my hard disk. The following are the books I have read for the year in no particular order : Windmill of the Gods by Sidney Sheldon If Tomorrow Comes by Sidney Sheldon Meditations by Marcus Aurelius The Enchiridion by Epictetus Nylon kayiru by Sujatha The Subtle Art of Not Giving a F*ck by Mark Manson Shoe Dog by Phil Knight Maybe So it was a less shitty year in general compared to 2016 and there is a lot of scope for improvement and bugs/regressions to fix for the next year :) So hoping less stupidity and maybe a little more organized life next year. Speaking of organizing myself I just forgot the warm Milo I left on the mug for an hour. BRB. Closes emacs with face-palm P.S. : Thanks to everyone who had been a part of the year. Merry Christmas and wishing you a pretty rad 2018 :) Please enable JavaScript to view the comments powered by Disqus. xtreak blog xtreak blog tir.karthi@gmail.com tirkarthi tirkarthi A blog about programming, mistakes and eureka | 2026-01-13T09:30:40 |
https://www.charterworks.com/tag/the-ai-download/ | The AI Download - Charter - Future of Work, AI, Management, Hybrid Try Charter Pro for $1 Latest Topics AI DEI Flexible Work Management Societal Issues Resources Briefing Work Tech Research Playbooks Case Studies Toolkits, Scripts, and other Resources Solutions Charter Pro Charter Forum Charter Pro for Teams Advisory + Strategic Services Events Upcoming and Past The AI Download Charter Cortados Leading With AI Masterclass Skills Accelerators Strategy Briefings Webinars Workplace Summit About Try Charter Pro for $1 Sign In The AI Download Pro The AI Download AI use cases The AI Download: How we use AI By Jacob Clemente Pro The AI Download AI The AI Download: Qualtrics CEO Zig Serafin on how AI is changing his company By Massella Dukuly and Jacob Clemente Pro The AI Download AI The AI Download: Tools to supercharge your work By Massella Dukuly and Jacob Clemente Pro The AI Download AI The AI Download: How AI will transform different professions By Jacob Clemente Pro The AI Download AI The AI Download: An interview with Blitzy co-founders Brian Elliot and Siddhant Pardeshi By Jacob Clemente Pro The AI Download AI The AI Download: 2024 in Review By Jacob Clemente Pro The AI Download AI The AI Download: How AI startups use genAI By Jacob Clemente Pro The AI Download AI The AI Download: What AI agents mean for your business By Jacob Clemente 1 of 1 Insights Books Interviews Charter on TIME Research Connect Events Topics Artificial Intelligence Hybrid Work DEI Leadership Charter Pro Become a Member Support Sign In Search Contact Partnerships General Inquiries Company About Careers Press Newsletters Charter Briefing Charter Works Inc. © 2025 Privacy Terms of Service | 2026-01-13T09:30:40 |
https://unicef.github.io//publicgoods-accelerator-guide/design-structure-support/technical-assistance | How do I design and deliver technical assistance to DPGs? | Digital Public Goods Accelerator Guide Skip to main content Digital Public Goods Accelerator Guide GitHub Introduction About Digital Public Goods (DPGs) Sustainability of Open Source Business Models (OSBM) Designing structure and content to support Digital Public Goods (DPGs) How do I design and deliver technical assistance to DPGs? Open Source Mentorship Structure for Your Accelerator Mentorship & Resources for Startups Open-Source Governance Choosing an Open-Source License Project Management & Documentation Milestones & Challenges Business Mentorship Case Studies Nominating a DPG Appendix 🏠 Designing structure and content to support Digital Public Goods (DPGs) How do I design and deliver technical assistance to DPGs? On this page How do I design and deliver technical assistance to DPGs? Whether the startup is new to open source or already creates open source products, it is important to understand if the startup has fully considered what it means to adopt open source and what technical support the startup needs. This section will cover: Should the startup adopt open source? and Conduct a Needs Assessment on Startup Support Should the startup adopt open source? A startup will need to consider how they license and share their work. There are three main things that are important to know about -- licensing, repositories, and community building. More details will be covered further in the guide. 1. Open Source Licensing In order for a product to be considered open source, the product must be publicly released under an Open Source License . An Open Source license communicates to others that the software, hardware, or content is open source and can be freely used, modified, and shared. The license text must be included as a new file in the root directory of your public repository. Often a license is also posted in a prominent place on the website for a particular product or in the download of a software package or hardware design package. Licensing may seem like a technical detail and it is easy to overlook, but the type of license you choose can have wide-reaching and lasting effects on your company, so you must choose wisely. It is also important to decide at this stage whether you would like your license to be copyleft , which ensures that downstream derivatives stay open source; or permissive, which allows downstream derivatives to be redistributed as closed source. The guide will talk about the options for different licenses to explore: software, hardware and content. 2. Repositories Do they have an existing repository for collaboration? Open source projects often rely on many different people to contribute to the project. This collaboration can take many different forms, but often, an open source project will have a public repository, which is a directory or storage space where projects live that anyone can access, which is sometimes shortened to “repo.” Common platforms for software collaboration are GitHub, GitLab, Gogs, Gitea, Bitbucket, Sourceforge, OpenForge in India, CSDN in China, and iHub in Kenya. Resource: Interested in trying out open source for yourself? You can try making your own GitHub repository or a GitLab project . Does the repository have public documentation? In order for others to participate, a project needs thoughtful documentation in public view. Depending on the size of a project, this could mean one or many of the following things: README file placed near the license text file Dedicated documentation website (e.g. docs.example.org ) Public Q&A site Effective technical documentation enables others to become contributors. This lets others follow in your footsteps and move more quickly to meaningful contribution, instead of figuring out how to set up a project in your configuration. The technical documentation is instructional and should outline what a path to a successful contribution is. Additionally, when the documentation is published in public repositories, documentation becomes a more open project task for outside contribution and discussion. Q: How do you make sure that contributions are relevant, helpful, and in working order? A: There is usually an approvals process where a collaborator can submit a contribution and other project leaders can decide which contributions are added to the final product. Learn more about governance models in the next section of the guide. 3. Community building It is a good idea for a startup to spend time interacting with an existing open source community. This builds a stronger understanding of experiences in collaborative open source projects. Ideally, the startup should select an open source product, component, or tool already used by the startup. When selecting a project, also look for good documentation and guidance for newcomers. More established open source projects also have public fora for others to raise feedback and discuss the project. These can look like web forums, discussion mailing lists, IRC or Matrix chat rooms, recurring team video meetings, Slack or Mattermost servers, and more. Here are some examples of open source forums: Fedora Linux Discussion : a certified DPG OpenStreetMap forum Drupal forum Mozilla forum React forum Discourse forum phpBB forum D3.js forum Resource: See this CHAOSS metric on Chat Platform Inclusivity . Conduct a needs assessment on startup support Before designing or supporting the startup's open source journey and becoming a DPG, you will need to conduct a needs assessment on what support they will need. This needs assessment includes, but is not limited to: Company's Problem Statement Company's Solution Statement Piloting plan/experiment summary Piloting challenges Business Model/Scalability after pilot Product and User Development – what needs to be changed/fixed for the product to qualify as beta DPG? Company performance to date Team skills/expertise - what other areas of expertise are missing on the team and why are they crucial for the pilot? Business Strategy (business model, user/customer acquisition, potential CO scale/LTA, Potential for public funds, potential for private funds) Technical Support Plan Summary Resource: The detailed needs assessment template can be found here . Edit this page Previous Successfully Scaled DPGs Next Open Source Mentorship Structure for Your Accelerator Should the startup adopt open source? 1. Open Source Licensing 2. Repositories 3. Community building Conduct a needs assessment on startup support Docs Guide Community Twitter More GitHub Copyright © 2022 UNICEF. Built with Docusaurus. | 2026-01-13T09:30:40 |
https://www.ovhcloud.com/fr-ca/professional-services/ | Professional Services | OVHcloud Canada Ouvrir le menu Messagerie web Notifications Retourner au menu No pending order No pending ticket Mon compte client Retourner au menu Mon compte client Mes factures Mes produits et services Mes moyens de paiement Mes commandes Mes contacts Mes demandes d'assistance Contact commercial Soutien Retourner au menu Centre d'aide Niveaux de support Professional Services Communautés Retourner au menu OVHcloud Communauté OVHcloud Blog Events Learn Retourner au menu Documentation Tutoriels Use cases Centre pour développeurs Compliance Case Studies Vidéos Stories Training Canada (fr) [$] Retourner au menu Europe Deutschland [€] España [€] France [€] Ireland [€] Italia [€] Nederland [€] Polska [PLN] Portugal [€] United Kingdom [£] Amérique Canada (en) [$] Canada (fr) [$] United States [$] América Latina [$] Afrique Maroc [Dhs] Sénégal [FCFA] Tunisie [DT] Océanie Australia [A$] Asie Singapore [S$] Asia [US$] India [₹] World World [$] World [€] Ouvrir le menu de connexion Bienvenue chez OVHcloud. Connectez-vous pour commander, gérer vos produits et solutions et suivre vos commandes. Mon compte client Messagerie web Bare Metal & VPS Retourner au menu Bare Metal & VPS Serveurs Dédiés Retourner au menu Serveurs Dédiés Produits Découvrir nos Serveurs Dédiés Serveurs Rise Nouveau Les plus abordables des serveurs Bare Metal d'OVHcloud Serveurs Advance Nouveau Des serveurs polyvalents pour les petites et moyennes entreprises. Serveurs Game Nouveau Pour les jeux vidéo et les plateformes de streaming. Serveurs Storage et sauvegarde Des serveurs pour l’archivage, la sauvegarde, ou le stockage distribué. Serveurs Scale Nouveau Spécifiquement conçus pour des infrastructures complexes à haute résilience. Serveurs High Grade Les serveurs les plus puissants, optimisés pour les charges critiques. Systèmes d'exploitation et applications Les systèmes d'exploitation et applications adaptés à tous vos usages Disponibilité de nos serveurs dédiés par région Les disponibilités de nos serveurs dans nos différentes régions à travers le monde Bare Metal Wholesale Bénéficiez d'une offre de serveurs Advance, Scale ou High Grade au rack complet. Cas d'usage Résilience et AZ Grid computing SAP HANA Virtualisation et conteneurisation Site web et application métier Infrastructure hyper-convergée Software Defined Storage Big data et Analytics Archivage et sauvegarde AI, Machine Learning et Deep learning Confidential Computing Base de données Gaming High Performance Computing Serveurs Dédiés Eco Retourner au menu Serveurs Dédiés Eco Serveurs Dédiés Eco Découvrir nos Serveurs Dédiés Eco Serveurs Kimsufi Des serveurs à petits prix pour démarrer votre activité Serveurs So You Start Une gamme de serveurs dédiés idéale pour les startups et les TPE Serveurs Rise Nouveau Des plateformes Intel et AMD éprouvées, qui allient performances et prix compétitifs Distributions et systèmes d'exploitation Retrouvez les versions compatibles avec votre serveur Eco Cas d'usage Plateforme d'hébergement de jeux Site web et application métier Serveur email Nouveau Data stockage Nouveau VPS - Serveurs Privés Virtuels Retourner au menu VPS - Serveurs Privés Virtuels VPS – Serveurs Privés Virtuels Nos VPS Nouveau Notre nouveau VPS avec des ressources maximales à prix compétitifs, une évolutivité instantanée, une sécurité renforcée et disponible dans toutes nos régions. Distributions et licences Consulter l'ensemble de nos distributions et licences disponibles sur VPS Options Personnalisez votre VPS avec nos options avancées Aide Cas d'usage Workflows automatisés avec n8n Nouveau Plateforme multisite WordPress Serveur de jeux vidéo Serveur de Tests avec VPS Hébergement d'applications de trading sur un VPS Forex Managed Bare Metal Retourner au menu Managed Bare Metal Managed Bare Metal Managed Bare Metal Essentials powered by VMware® Votre infrastructure virtuelle managée par OVHcloud Stockage et sauvegarde Retourner au menu Stockage et sauvegarde Stockage et sauvegarde Découvrir toutes nos solutions Enterprise File Storage Stockage de fichiers entièrement managé et basé sur NetApp ONTAP Select NAS-HA Espace centralisé de stockage ou de sauvegarde pour vos données fichiers Cloud Disk Array Solution de stockage bloc évolutif basée sur la technologie CEPH Veeam Enterprise Plus Solution vous permettant de protéger vos données de la manière qui vous convient HYCU for OVHcloud Simplifiez la sauvegarde et la migration de vos charges de travail Nutanix Cas d'usage Stockage de données pour vos serveurs Linux Stockage de données pour vos machines virtuelles Réseau Retourner au menu Réseau Réseau Additional IP Attribuer et déplacer des adresses IP dynamiques d’un service à un autre OVHcloud Load Balancer Répartissez la charge de vos applications sur plusieurs serveurs secondaires Réseau privé (vRack) Reliez tous vos services OVHcloud à un réseau privé isolé OVHcloud Link Aggregation Bénéficiez d'un réseau privé redondé à haut débit OVHcloud Connect Le chemin le plus court entre votre datacenter et OVHcloud Bande passante publique Augmentez votre bande passante garantie par défaut Bring Your Own IP (BYOIP) Importez vos propres adresses IP et facilitez votre migration chez OVHcloud Sécurité réseau Retourner au menu Sécurité réseau Sécurité réseau Infrastructure Anti-DDoS Protégez vos infrastructures contre les attaques par déni de service distribuées Game DDoS Protection Protect your gaming and e-sport business with best-in-class security solution DNSSEC Protégez vos données contre le cache poisoning SSL Gateway Le moyen le plus simple d'assurer la sécurité de votre page web Sans effort ! Identité, sécurité et opérations Retourner au menu Identité, sécurité et opérations Identité, sécurité et opérations Identity and Access Management (IAM) Sécurisez votre gestion des accès et améliorez votre productivité Logs Data Platform Plateforme complète pour collecter, stocker et visualiser vos logs Key Management Service (KMS) Sécurisez vos données sur tous vos services OVHcloud à partir d'un endroit unique Secret Manager Gestion professionnelle de tous vos secrets en un seul endroit Service Logs Monitorez les performances et la sécurité de votre environnement cloud Domaine Hébergement Email Retourner au menu Domaine Hébergement Email Nom de Domaine Retourner au menu Nom de Domaine Nom de Domaine Recherchez votre nom de domaine Transférez votre nom de domaine chez OVHcloud Renouvelez votre nom de domaine Recherchez sur le marché secondaire (aftermarket) Accès rapide Tarifs des noms de domaines Whois : recherchez les informations d'un domaine Serveur DNS Offres spéciales Nouveau Hébergement web Retourner au menu Hébergement web Hébergement web Tous les packs Web Bases de données additionnelles Option SSL Option CDN Accès rapide Comment créer un site web ? Hébergez votre site WordPress Créez votre site en 1 clic Créez votre boutique en ligne E-mail Retourner au menu E-mail E-mail Toutes les offres Exchange Cloud Public Retourner au menu Cloud Public Cloud Public Retourner au menu Cloud Public Cloud Public Découvrir Public Cloud Ecosystème de services Accélérez votre activité, automatisez votre structure Tarification Consultez notre tarification simple & accessible Essai gratuit de Public Cloud Testez nos solutions sans engager de frais Savings Plans Nouveau Bénéficiez de prix réduits en vous engageant sur une période de 1 à 36 mois sur vos ressources Public Cloud. Avantages de l'offre Public Cloud Découvrez des solutions infonuagique pour répondre à vos besoins Cloud Computing Apprenez-en plus sur cette pratique de plus en plus répandue Conformité & certifications Explorez comment OVHcloud construit des solutions de confiance Disponibilités par régions Découvrez la couverture de notre catalogue selon la localisation Local Zones Nouveau Déployez des services cloud au plus près de vos utilisateurs Notre documentation Consultez nos guides & tutoriels Calcul Retourner au menu Calcul Calcul Découvrir tous nos produits Compute Virtual Machine Instances Profitez d’instances polyvalentes et adaptées à tous vos usages Cloud GPU Accélérez vos charges de travail avec des instances GPU haute performance. Metal Instances Combinez la puissance du Bare Metal avec l’automatisation du cloud Notre documentation Consultez notre documentation pour la gamme Compute En route vers le PaaS Concentrez-vous sur vos applications & gagnez en compétitivité Local Zone Nouveau Déployez des services cloud au plus près de vos utilisateurs Stockage Retourner au menu Stockage Stockage Découvrir tous nos produits Storage Block Storage Créez vos volumes de stockage, utilisables comme des disques supplémentaires Object Storage Profitez du stockage illimité à la demande, compatible S3 Cold Archive Archivage ultra-économique pour les données très rarement consultées Local Zone Nouveau Déployez des services cloud au plus près de vos utilisateurs Notre documentation Consultez notre documentation pour la gamme Storage Réseau Retourner au menu Réseau Réseau Découvrir tous nos produits Network Private Network Déployez des réseaux privés portés par le vRack d'OVHcloud Répartiteur de charge Gérez le trafic variable en le répartissant sur plusieurs ressources Floating IP Attribuez & déplacez votre IP publique d’un service à l’autre Gateway Gérez un point de connexion unique entre votre reseau privé & internet Notre documentation Consultez notre documentation pour la gamme Network Conteneurs et orchestration Retourner au menu Conteneurs et orchestration Conteneurs et orchestration Découvrir tous nos produits Containers & Orchestration Managed Kubernetes Service Orchestrez vos applications conteneurisées avec un cluster Kubernetes certifié CNCF Répartiteur de charge for Managed Kubernetes Service Gérez les variations d'activité, en équilibrant le trafic sur vos différentes ressources Managed Rancher Service Nouveau Une gestion centralisée et simplifiée de vos clusters Kubernetes Managed Private Registry Gérez vos images de conteneurs et helmchart sur un registre privé sécurisé Notre documentation Consultez notre documentation pour la gamme Containers & Orchestration En route vers le PaaS Concentrez-vous sur vos applications & gagnez en compétitivité Databases Retourner au menu Databases Databases Découvrir tous nos produits Databases MongoDB Moteur NoSQL orienté documents. Essayer gratuitement MySQL Base de données relationnelle populaire qui s’adapte à vos usages PostgreSQL Le moteur de bases de données relationnelles open-source de référence Valkey Le stockage in-memory intelligent Notre documentation Consultez notre documentation pour la gamme Databases En route vers le PaaS Concentrez-vous sur vos applications & gagnez en compétitivité Analytics Retourner au menu Analytics Analytics Découvrir tous nos produits Analytics Kafka Solution de queueing pour déployer vos architectures event-driven Kafka Connect Extension simplifiant l’ingestion de vos sources vers Apache Kafka Kafka MirrorMaker Réplication assurant une haute disponibilité de vos clusters Kafka Logs Data Platform Plateforme complète pour collecter, stocker et visualiser vos logs OpenSearch Moteur dédié à l’indexation, la recherche et l’analyse de données ClickHouse Nouveau L'analyse ultra-rapide de vos données à portée de main Managed Dashboards Plateforme Grafana permettant de réaliser des tableaux de bord Notre documentation Consultez notre documentation pour la gamme Analytics En route vers le PaaS Concentrez-vous sur vos applications & gagnez en compétitivité Data Platform Nouveau Retourner au menu Data Platform Data Platform Découvrir tous nos produits Data Plaform Découvrir OVHcloud Data Platform Nouveau Réalisez vos projets Data & Analytics simplement et en un temps record Data Catalog Nouveau Plus de 50 connecteurs pour toutes vos sources de données Lakehouse Manager Nouveau Stockage Data Warehouse et Data Lake unifié, basé sur Apache Iceberg Data Processing Engine Nouveau Automatisez l’exécution et l’orchestration de vos workloads ETL/ELT Analytics Manager Nouveau Créez vos tableaux de bord et lancez vos requêtes grâce au moteur Trino Application Services Nouveau SDK et services serverless pour déployer vos API et applications Data Control Center Nouveau Monitorez les métrics, gérez les logs et les alertes de vos environnements IA & Apprentissage Automatique Retourner au menu IA & Apprentissage Automatique IA & Apprentissage Automatique Découvrir tous nos produits AI & Machine learning AI & Quantum Notebooks Démarrer vos notebooks Jupyter ou VS Code dans le cloud, et choisissez parmi nos frameworks AI ou quantiques natifs AI Training Entraînez vos modèles d'intelligence artificielle AI Deploy Déployez des modèles de machine learning & obtenez vos prédictions AI Endpoints Nouveau Enrichissez vos applications avec des modèles d'IA Générative grâce à des API standards simples et sécurisées Notre documentation Consultez notre documentation pour la gamme AI & Machine learning En route vers le PaaS Concentrez-vous sur vos applications & gagnez en compétitivité Quantum Computing Retourner au menu Quantum Computing Quantum Computing Découvrir tous nos produits Quantum Computing Quantum Emulators Nouveau Simulez vos algorithmes quantiques sur des notebooks prêts à l'emploi Quantum Processing Units (QPU) Nouveau Accédez à de vrais ordinateurs quantiques via notre Quantum Platform Qu’est-ce que le Quantum computing ? Découvrez la nouvelle révolution de l’accélération de calculs à venir et comment développer dès aujourd’hui sur les ordinateurs quantiques de demain Identité, sécurité et opérations Retourner au menu Identité, sécurité et opérations Identité, sécurité et opérations Découvrir tous nos produits Identité, Securité & Opérations Identity and Access Management (IAM) Sécurisez votre gestion des accès et améliorez votre productivité Logs Data Platform Plateforme complète pour collecter, stocker et visualiser vos logs Key Management Service (KMS) Sécurisez vos données sur tous vos services OVHcloud à partir d'un endroit unique Secret Manager Gestion professionnelle de tous vos secrets en un seul endroit Services Logs Monitorez les performances et la sécurité de votre environnement cloud Hosted Private Cloud Retourner au menu Hosted Private Cloud VMware Retourner au menu VMware VMware on OVHcloud Découvrir VMware on OVHcloud Public VCF as a Service Nouveau Solution VMware partagée et gérée, optimisée par VMware Cloud Foundation Managed VMware vSphere Solution VMware managée pour toutes les entreprises Managed VMware vSphere qualifié SecNumCloud Solution VMware en zone de confiance qualifiée par l'ANSSI Solutions Comparer les offres VMware SAP on OVHcloud Extension et migration de centres de données Solution hybride et multicloud Solutions de reprise d’activité Voir toutes les solutions Nutanix Retourner au menu Nutanix Hosted Private Cloud NC2 on OVHcloud Nouveau Nutanix Cloud Clusters (NC2) on OVHcloud Nutanix on OVHcloud Notre plateforme hyperconvergée (HCI) Nutanix évolutive et prête à l'emploi Bare Metal Pod qualifié SecNumCloud Nouveau Serveurs qualifiés Nutanix disponibles dans Bare Metal Pod qualifié SecNumCloud HYCU for OVHcloud Simplifiez la sauvegarde et la migration de vos charges de travail Nutanix Veeam Enterprise pour toutes vos sauvergardes Solution dédiée Veeam Backup & Replication pour toutes vos sauvegardes Cas d’usage Migration et gestion de vos données Plan de Reprise d'Activité (PRA) Hyperconvergence, économies et écologie Disaster Recovery (DRaaS) SAP HANA Retourner au menu SAP HANA SAP HANA SAP HANA on Private Cloud La solution qui facilite vos déploiements SAP dans un cloud souverain Solutions SAP on OVHcloud On-Prem Cloud Platform Retourner au menu On-Prem Cloud Platform On-Prem Cloud Platform On-Prem Cloud Platform (OPCP) Avec OPCP, déployez vos services sur site ou en edge, en toute autonomie et sécurité. Air-gapped by design. Infra as a Service Infrastructure de base pour construire et exploiter votre cloud sur site Platform as a Service Environnements cloud natifs et services prêts à l’emploi Cloud ready Portail unique pour déployer et gérer facilement les charges de travail Stockage & Sauvegarde Retourner au menu Stockage & Sauvegarde Stockage et Sauvegarde Option Veeam pour sauvegarde VMware Solution Veeam Backup Managed pour la sauvegarde de vos machines virtuelles Option Zerto pour votre plan de reprise d'activité VMware Solution de plan de reprise d'activité (PRA) multisite pour vos clusters VMware Option Veeam pour Public VCF as-a-Service Solution dédiée Veeam Backup & Replication pour toutes vos sauvegardes Veeam Enterprise - Licences Solution dédiée Veeam Backup & Replication pour toutes vos sauvegardes HYCU for OVHcloud Simplifiez la sauvegarde et la migration de vos charges de travail Nutanix Object Storage Profitez du stockage illimité à la demande, compatible S3 Cold Archive Archivez vos données sur le long terme au meilleur prix NetApp - Enterprise File Storage Stockage de fichiers entièrement managé et basé sur NetApp ONTAP Select Cas d'usage Sauvegarde et reprise après sinistre Continuité d’activité Reprise après sinistre pour Managed VMware vSphere Reprise après sinistre pour Nutanix on OVHcloud Réseau Retourner au menu Réseau Réseau Additional IP Attribuer et déplacer des adresses IP dynamiques d’un service à un autre OVHcloud Load Balancer Répartissez la charge de vos applications sur plusieurs serveurs secondaires Réseau privé (vRack) Reliez tous vos services OVHcloud à un réseau privé isolé OVHcloud Connect Le chemin le plus court entre votre datacenter et OVHcloud Bring Your Own IP (BYOIP) Importez vos propres adresses IP et facilitez votre migration chez OVHcloud Sécurité réseau Retourner au menu Sécurité réseau Sécurité réseau Infrastructure Anti-DDoS Protégez vos infrastructures contre les attaques par déni de service distribuées DNSSEC Protégez vos données contre le cache poisoning SSL Gateway Le moyen le plus simple d'assurer la sécurité de votre page web Sans effort ! Identité, sécurité et opérations Retourner au menu Identité, sécurité et opérations Identité, sécurité et opérations Identity and Access Management (IAM) Sécurisez votre gestion des accès et améliorez votre productivité Logs Data Platform Plateforme complète pour collecter, stocker et visualiser vos logs Key Management Service (KMS) Sécurisez vos données sur tous vos services OVHcloud à partir d'un endroit unique Secret Manager Gestion professionnelle de tous vos secrets en un seul endroit Service Logs Monitorez les performances et la sécurité de votre environnement cloud Conformité et certifications Retourner au menu Conformité et certifications Conformité et certifications Liste complète des normes et réglementations SecNumCloud Qualification Visa de sécurité de l'ANSSI HDS et hébergement de données de santé Hébergement de données de santé en France et dans plusieurs pays HIPAA et HITECH Hébergement de données de santé aux États-Unis PCI DSS Hébergement de données bancaires ISO/IEC 27001, 27017 et 27018 Gestion de la sécurité de l'information ISO/IEC 27701 Gestion de la sécurité du traitement des données personnelles ISO 50001 Maîtriser la performance énergétique SOC 1, 2 et 3 Attestation et rapports AICPA SSAE 16/ISAE 3402 type II EBA et ACPR Conformité pour les opérateurs de services financiers en Europe G-Cloud Fourniture de services cloud pour le secteur public au Royaume-Uni Solutions Retourner au menu Solutions Cas d’usage Retourner au menu Cas d’usage Cas d’usage Migrer vers le cloud Cloud hybride et multi-cloud Modernisation des applications Application cloud native Intelligence artificielle Analyse de données/Big Data Gestion des données Charges de travail haute performance Stockage de données volumineuses Grid Computing Sauvegarde et reprise après sinistre Continuité d’activité Environnement SecNumCloud Protection réseau Sécurité du cloud Extension et migration du centre de données Transformation du centre de données Solutions on-premises Industrie Retourner au menu Industrie Industrie Secteur public Une solution de confiance pour les gouvernements et les administrations Soins de santé La solution de confiance pour le secteur de la santé Finance Nos solutions pour les opérateurs de services financiers Production industrielle La solution cloud de confiance des industriels européens E-commerce L'hébergement Web pour les e-commerçants Logiciels/technologies de l'information Les solutions SaaS et PaaS des Editeurs de logiciels partenaires d'OVHcloud Gaming Les solutions cloud pour les sociétés et les acteurs du secteur du Gaming Blockchain Les solutions OVHcloud pour libérer vos projets blockchain Type d'organisation Retourner au menu Type d'organisation Type d'organisation Entreprise Des solutions pour la transformation numérique des entreprises Éditeurs de logiciels (SaaS/PaaS) Les solutions SaaS et PaaS des Editeurs de logiciels partenaires d'OVHcloud Intégrateur système Les solutions pour les intégrateurs, infogérants et les sociétés de conseils Gouvernement/Administrations Les solutions de confiance pour les gouvernements et les administrations Startup Les solutions d'accompagnement pour les Startups Scale-up Les solutions d'accompagnement pour les ScaleUps Technologie Retourner au menu Technologie Technologie Veeam Protégez vos données avec les solutions Veeam proposées par OVHcloud VMware by Broadcom Les solutions VMware by Broadcom et OVHcloud pour tous vos projets Nutanix Accélérez et simplifiez votre parcours multicloud hybride avec la solution Nutanix on OVHcloud HYCU La solution de sauvegarde plébiscitée par les utilisateurs Nutanix SAP Nos solutions SAP on OVHcloud pour l’hébergement d’environnements SAP dans un cloud souverain NetApp Les solutions de stockage NetApp avec la maîtrise des coûts et des performances élevées Nvidia Les solutions GPU d'Nvidia accèlèrent vos projets d'innovation et d'AI MongoDB Des solutions MongoDB pour simplifier la gestion de vos données OpenStack Les solutions OpenStack intégrées à OVHcloud pour des infrastructures cloud Intel Les solutions des connaisseurs qui accélèrent avec Intel® Xeon® dans le cloud AMD Les solutions cloud haut de gamme avec les processeurs AMD Hadoop Cloudera Votre solution Cloudera 100 % managé avec Claranet Ecosystem Retourner au menu Ecosystem Ecosystem Découvrez l'écosystème partenaire OVHcloud Partner Program Une initiative dédiée à nos partenaires revendeurs, intégrateurs, infogéreurs et prescripteurs Open Trusted Cloud Un écosystème de solutions SaaS et PaaS labellisées, hébergées dans notre cloud ouvert, réversible et fiable Startup Program Un programme d'accompagnement des startups et scaleups pour accélérer leur croissance OVHcloud Labs La zone d'innovation permettant de tester nos technologies avant-gardistes avant qu'elles soient officiellement lancées sur le marché Nos évènements Écosystème Retrouvez tous les rendez-vous dédiés à notre écosystème partenaire : webinars, conférences, ... Formation & Certification Développez votre expertise grâce aux formations et aux certifications mises à la disposition des membres du programme Accès rapide Trouver un partenaire S'inscrire au Partner Program S'inscrire au Startup Program Comparateur de prix Portail Partenaires FAQ Partner Program À propos Retourner au menu À propos À propos Qui sommes-nous Actualités Infrastructure mondiale Nos centres de données Nos Local Zones Réseau backbone Rejoignez l'aventure Patent Pledge Légal Nos engagements Innovation Cloud durable Cloud de confiance Relations investisseurs Impact Tracker Environnemental Summit Open search bar Close search bar Aucun résultat Produits Solutions Partenaires Documentation Articles Voir tous les résultats Professional Services Professional Services Les Professional Services d’OVHcloud Les Professional Services d'OVHcloud vous apportent des conseils techniques et les bonnes pratiques pour tous vos projets de transformation vers le Cloud Contactez-nous Vue d'ensemble Vue d'ensemble Cas d'usage Cas d'usage Technologies Technologies Témoignages Témoignages Partenaires Partenaires Contactez-nous L’expertise d’OVHcloud au service de votre transformation Les Professional Services interviennent autour de 3 axes principaux de services à valeur ajoutée : Conseil technique Les Professional Services d'OVHcloud vous apportent des conseils techniques et les bonnes pratiques pour tous vos projets de transformation vers le Cloud. Prestation Les Professional Services d’OVHcloud simplifient vos projets de migration vers le cloud et de modernisation, apportant ainsi une grande valeur ajoutée à votre entreprise. Nous pouvons également recommander des partenaires de confiance pour des résultats optimaux dans les environnements cloud et on-premises. Formation Les Professional Services d’OVHcloud proposent des sessions de formation sur mesure, ainsi qu'une gamme de cours disponibles dans notre catalogue en ligne. Accéder au catalogue de formation YouTube conditionne la lecture de ses vidéos au dépôt de traceurs afin de vous proposer des publicités ciblées en fonction de votre navigation. Pour pouvoir regarder la vidéo, vous devez accepter la catégorie de confidentialité Partage de cookies sur des plateformes tierces dans notre Centre de confidentialité. Vous avez la possibilité de retirer votre consentement à tout moment. Pour plus d'informations, consultez la politique de cookies de YouTube et la politique de cookies d'OVHcloud . Show Privacy Center OVHcloud Professional Services : simplifiez votre migration, amplifiez votre activité ! Offres Cloud Migration vers le Cloud Bénéficiez de conseils personnalisés sur la planification et la mise en œuvre d'une migration, en tenant compte de tous vos besoins en matière de sécurité, de résilience et de rétablissement après sinistre. Cloud Hybride & Multi-Cloud Concevez et construisez vos solutions hybrides et multi-cloud avec l'aide de nos architectes de solutions cloud. POC de conseil. Infrastructures Cloud modernes Découvrez les bonnes pratiques de gestion, d'optimisation et de sécurisation de votre infrastructure cloud. Modernisation et développement d'applications Optimisez le cycle de vie de vos développements grâce aux meilleures pratiques DevOps, pour permettre une modernisation plus rapide des applications, une intégration continue et une livraison efficace dans le cloud. Données & IA Exploitez les informations axées sur les données et les technologies d'IA pour accélérer la croissance de votre entreprise, améliorer la prise de décision et stimuler l'innovation. Technologies d'expertise clés avec Professional Services Wiremind recommande les Professional Services d'OVHcloud Les Professional Services ont aidé Wiremind à acquérir les connaissances nécessaires pour obtenir les meilleures performances de stockage de nos serveurs dédiés. Cédric De St Martin, Operations VP / SRE de Wiremind Contactez nous pour obtenir des expertises professionnelles Demander une analyse personnalisée de votre projet à nos experts Nous contacter Réussir avec les partenaires experts d'OVHcloud Des experts spécialisés pour couvrir tous les besoins Fournisseur de ressources cloud, OVHcloud développe un réseau de partenaires pour vous accompagner dans tous les projets de votre entreprise. Une expérience enrichie Nos partenaires sont formés pour vous apporter la meilleure expérience, ce qui vous garantit de bénéficier du meilleur d’OVHcloud. Des compétences complémentaires Nous disposons de connaissances et d’expertises sur les technologies et les processus pour compléter le catalogue de services de tous nos partenaires. Accéder à l'annuaire des partenaires OVHcloud Les questions que vous vous posez : Que sont les Professional Services ? Professional Services est une équipe d’experts et de formateurs au service des clients et des partenaires. Il s’agit d’un centre de compétences délivrant des conseils sur les environnements cloud qui s’appuie sur une grande variété de solutions, de technologies et de services. Les Professional Services (services professionnels) proposent des services sur mesure aux entreprises pour tous les projets de transformation et mettent en œuvre des stratégies au service de la croissance et de la compétitivité des clients et des partenaires. Est-ce que les Professional Services interviennent sur tous les produits ? Oui, les Professional Services travaillent sur tous les produits disponibles chez OVHcloud, en cloud privé et public. Nos experts maîtrisent également de nombreuses technologies du marché de l’informatique et du cloud. Ainsi, il est possible de vous accompagner sur des environnements legacy ou des environnements cloud-native avec une méthodologie adaptée et moderne. Intervenez-vous sur les environnements ? Nous intervenons en tant qu’expert technique. Nous vous guidons dans toutes les étapes et vous apportons les meilleurs conseils pour que votre projet soit un succès. Selon votre projet, nous pourrons également vous conseiller des entreprises de services partenaires pouvant effectuer des missions d’accompagnement avancé et/ou d’infogérance de vos infrastructures. Dans quelles langues puis-je être accompagné ou formé ? Les experts des Professional Services peuvent vous accompagner ou vous former en français et en anglais. Nous nous appuyons également sur notre réseau de partenaires pour vous accompagner dans d’autres langues et d’autres expertises. Back to top Outils Mon compte client Webmail API Travaux Contact domaine Signaler un abus (abuse@ovh.net) Propriété Intellectuelle Marques Support Centre d'aide Guides Centre d'apprentissage Glossaire Communauté OVHcloud Niveaux de support Contactez nous Nouvelle commande, conseils techniques, incidents Votre Service Client OVHcloud 1-855-684-5463 Sans frais News Espace presse Blog Réseaux sociaux Restons connectés © Copyright 1999-2026 OVH SAS. Mentions légales Contrats Protection des renseignements personnels Gérer mes cookies Droits et obligations des titulaires de noms de domaines Documentation ICANN à l'usage des titulaires des noms de domaine Paiements Plan de site A propos d'OVHcloud OVHcloud recrute | 2026-01-13T09:30:40 |
https://www.timeforkids.com/k1/?age=child | TIME for Kids | Articles | K-1 Skip to main content Search Articles by Grade level Grades K-1 Articles Grade 2 Articles Grades 3-4 Articles Grades 5-6 Articles Topics Animals Arts Ask Angela Books Business Careers Community Culture Debate Earth Science Education Election 2024 Engineering Environment Food and Nutrition Games Government History Holidays Inventions Movies and Television Music and Theater Nature News People Places Podcasts Science Service Stars Space Sports The Human Body The View Transportation Weather World Young Game Changers Your $ Financial Literacy Content Grade 4 Edition Grade 5-6 Edition For Grown-ups Resource Spotlight Also from TIME for Kids: Log In role: none user_age: none editions: The page you are about to enter is for grown-ups. Enter your birth date to continue. Month (MM) 01 02 03 04 05 06 07 08 09 10 11 12 Year (YYYY) 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949 1950 1951 1952 1953 1954 1955 1956 1957 1958 1959 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025 2026 Submit Articles K-1 2 3-4 5-6 Animals Time to Eat! December 22, 2025 Animals have favorite foods. Rabbits eat plants. They eat grass and leaves. Foxes eat other animals. Some animals eat all kinds of things. Different animals have different diets. Learn about some of them here. Meat Eaters Lions are carnivores.… Audio Spanish Animals Who Eats What? December 22, 2025 Some animals eat only meat. Others eat only plants. Some eat both. How can we tell who eats what? We can use this chart. It is called a Venn diagram. The animals on the left are carnivores. Those on the… Audio Animals Animals Talk Too December 22, 2025 How do you share your thoughts? You might use words. You might use your hands. Animals do not speak the way we do. But they have lots of ways to communicate. Sounding Off This monkey has a loud voice.… Audio Spanish Animals How Animals Vote December 22, 2025 People can vote. Did you know that groups of animals can vote too? They vote on where to look for food. Or they vote on where to live. Meerkats Meerkats (above) search for food. They can vote to search faster.… Audio Animals Animal Defenses December 19, 2025 Animals protect themselves against predators. Predators are other animals that want to eat them. How do they protect themselves? They use their defenses. Find out more. What’s That Smell? Skunks have a stinky secret. They spray a bad odor.… Audio Spanish Animals Clever Colors December 19, 2025 Often, an animal’s coloring helps it survive. Some colors say, “Don’t mess with me.” Others help animals trap food. Here are some examples. Take a look. Warning Sign This frog (above) is bright orange. Its color sends a warning… Audio Animals Living in the Wild December 12, 2025 Some animals live in green forests. Others live in deserts. These places are called habitats. A habitat has everything an animal needs. It has shelter. It has food. And it is the right temperature for its animals. Grassland Habitat Lions… Audio Spanish Community Community Care November 5, 2025 It is important to stay clean. It keeps your body healthy. Personal care items help. Toilet paper is a personal care item. So are soap and toothpaste. Audrey Brown is 13. She helps people get these items. Collecting Things … Audio Spanish Community Take Care November 5, 2025 We all have health issues sometimes. Someone might get the flu. Someone might skin their knee. You can show that you care. A small act can make a big difference. It can cheer someone up when they feel down. It… Audio Community Protect the Planet October 31, 2025 Start a compost bin. Pick up litter. These are ways to help the environment. Everyone has a part to play. Every action matters. How will you keep the Earth clean and beautiful? Read a few ideas below. What others can… Audio Community Pals with Paws October 24, 2025 Hayden Roland is 12. He loves animals. He has six pets. But he takes care of many more. Hayden started a group called Wagging Tails. The group is almost two years old. It helps animals without homes. Animal Care Some… Audio Spanish Community Help Animals October 24, 2025 Animals are all around us. They need our care and attention. Some people volunteer at animal shelters. Others work to protect wildlife habitats. How can you help the creatures around you? Read some ideas below. Then imagine a few of… Audio Community Play Your Part October 17, 2025 You are part of many communities. Your neighborhood is one. Sports teams and clubs are communities too. How can you make your communities better? There are lots of ways. Read about a few. Keep places clean. Do you see… Audio Spanish Posts pagination 1 2 3 4 5 … 40 Next Contact us Privacy policy California privacy Terms of Service Subscribe CLASSROOM INTERNATIONAL © 2026 TIME USA, LLC. All Rights Reserved. Powered by WordPress.com VIP | 2026-01-13T09:30:40 |
https://integrity.github.io/ | Integrity | Continuous Integration server Integrity Continuous Integration server As soon as you push your commits, Integrity builds your code, run your tests and makes sure everything works fine. It then reports the build status using various notifiers back to you and your team so everyone is on the same page and problems can be fixed right away. Check out Integrity watching itself: Read more about about Continuous Integration on Martin Fowler’s website and Wikipedia . Installation Make sure your system meet these prerequisites: Ruby >= 1.8.7 (1.8.7, 1.9.2, 1.9.3 and 2.0.0 should work) RubyGems >= 1.3.5 git >= 1.6 Then grab Integrity via git, install its dependencies and create the database: $ gem install bundler $ git clone git : //github . com/integrity/integrity $ cd integrity $ git checkout -b deploy v26 $ bundle install $ bundle exec rake db To give it a quick try before going any further, run bundle exec rackup and navigate to http://0.0.0.0:9292 . Upgrade: $ git fetch origin $ git merge v26 Configuration Integrity is configured via the init.rb file using Ruby. Integrity . configure do | c | c . database = "sqlite3:integrity.db" c . directory = "builds" c . base_url = "http://ci.example.org" c . log = "integrity.log" c . builder = : threaded , 5 c . build_all = true c . project_default_build_count = 10 end Basic settings database Any valid database URI supported by DataMapper . sqlite3:integrity.db mysql://user:password@localhost/integrity postgres://user:password@localhost/integrity Important You need to install the appropriate data_objects adapter as well. The SQLite3 adapter ( do_sqlite3 ) is installed by default. directory This is where your projects' code will be checked out. Make sure it is writable by the user who runs Integrity. base_url Absolute URL to your Integrity instance, without a trailing slash. This setting is optional but is required to have proper links in notifications. log Path to the Integrity log file; mostly useful for troubleshooting build_all! Tells Integrity to build every single commit it is notified about. Only builds the newest otherwise. auto_branch! Say the project Integrity is tracking the master branch, and I push my build-duration topic branch to GitHub, Integrity will create and build a new project named Integrity (build-duration) using the same build command and notifiers. trim_branches When Integrity is set to auto branch, it is possible for a large number of stale branches to stick around which no longer exist. Turning this on will automatically detect when a branch is deleted via the GitHub post-receive hook and delete the build history for the branch. project_default_build_count How many builds to initially show on project pages. nil, which is the default, means show all builds. HTTP authentication If both username and password settings are set then only the logged-in users can administer the projects and see the private ones. c . username = "admin" c . password = "password" To protect the whole Integrity instance, set ADMIN_USERNAME and ADMIN_PASSWORD environment variables before starting Integrity: export ADMIN_USERNAME = admin ADMIN_PASSWORD = secret On Heroku: heroku config : add ADMIN_USERNAME = admin ADMIN_PASSWORD = secret checkout_proc Set to a Proc instance to override default checkout mechanism. For example, to use git-cachecow to cache repositories locally: c . checkout_proc = Proc . new do | runner , repo_uri , branch , sha1 , target_directory | runner . run! "git scclone #{repo_uri} #{target_directory} #{sha1}" end Building private repositories Integrity will use keys configured in its environment for repository access. The easiest option is to switch to the Unix user that Integrity runs under and create an SSH key for this user: ssh-keygen Save the key to the default location. Add the public key to the list of allowed keys in the repository you wish to build. Clone the repository manually to check that it works and trust the server’s host key if necessary. An alternative is to configure GIT_SSH environment variable. Integrity ships with a sample git_ssh file in doc directory. Path to this file should be placed in the GIT_SSH environment variable. You can do this on Heroku by editing init.rb to include the following: ENV [ 'GIT_SSH' ] = File . join ( File . dirname ( __FILE__ ), 'doc/git_ssh' ) Then, specify a private key that is allowed by repository: heroku config : add GIT_PRIVATE_KEY = "----contents of private key second line of private key make sure to use double quotes to allow multi-line config var value end of private key-----------" Warning Storing secret data such as private keys in environment is inherently insecure. If you do this, restrict access to your Integrity installation to trusted users only. Automating the builds Integrity provides two HTTP endpoints to trigger new builds: POST /:project/builds Causes Integrity to fetch the HEAD of the remote repository and build it. Note that HTTP authentication applies to it if set. This endpoint can’t be disabled. POST /github/:token Supports GitHub’s Post-Receive Hook . Enable it: c . github_token = "TOKEN" Choosing a builder Integrity ships with three ways of building your codes in the background. Threaded The threaded builder pushes the build job to an in-memory queue and processes them as soon as possible. It relies on Ruby’s thread so it doesn’t have any dependency nor requires to run other processes. c . builder = : threaded , 5 The second argument is the size of the thread pool. Note The threaded builder cannot be used with Passenger . Delayed::Job The dj builder queues up the builds into an SQL database using Delayed::Job . To use it, install its dependencies by uncommenting the relevant lines in the Gemfile and run bundle lock && bundle install . c . builder = : dj , { : adapter => "sqlite3" , : database => "dj.db" } The second argument must be a valid ActiveRecord connection hash . Run a worker with rake jobs:work . See Delayed::Job’s documentation for more details. Resque The resque builder, as the name implies, uses resque to store jobs. c . builder = : resque Notification After a build status is available, you want to know it immediately . Integrity supports a number of notification mechanisms: AMQP Campfire Flowdock Co-op Email HTTP Amazon SES Shell TCP To enable and use a notifier with your projects: Open the Gemfile , uncomment the relevant lines and run bundle lock && bundle install to install the notifier’s dependencies. Edit the init.rb file to require it. Example: require "integrity" # You need to add this line: require "integrity/notifier/email" Restart Integrity and go to a project settings screen where you can enable and configure the notifier. HTTP Notifier This notifier sends an HTTP POST request to the specified URL. The payload is sent as HTML form fields, with application/x-www-form-urlencoded content type. The fields are as follows: name : project name status : build status string (success/failed) url : url to build page in Integrity repo : URI specified for repository in project configuration branch : branch specified in project configuration commit : SHA1 of the commit that was built author : Commit’s author name (without email address) message : Commit message, prefixed with branch name Example request body: name=My+Test+Project&status=success&url=http%3A%2F%2Fwww.example.com%2Fmy-test-project%2Fbuilds%2F1&repo=%2Ftmp%2Fi%2Ftmp%2Fmy_test_project&branch=master&commit=d669c99c26419806c80326e1b09eda378e65491d&author=John+Doe&message=master%3A+This+commit+will+work Deployment Phusion Passenger Please see Passenger’s documentation for Apache and Nginx . Note Currently ThreadedBuilder does not work with Passenger (issue #156 ). Please use DelayedBuilder or ResqueBuilder. Thin Uncomment the thin line in the Gemfile Run bundle install to install Thin $ $EDITOR doc/thin . yml $ thin -C doc/thin . yml start Unicorn Uncomment the unicorn line in the Gemfile Run bundle install to install Unicorn $ $EDITOR doc/unicorn . rb $ unicorn -c doc/unicorn . rb -D Reverse Proxy You will want to run a reverse proxy such as Nginx or Apache in front of Thin or Unicorn servers. Nginx Nginx can be configured as follows: http { upstream builder-integrityapp-com { # thin or unicorn - first instance server 127.0.0.1:8910; # thin only - specify all remaining instances server 127.0.0.1:8911; } server { server_name builder.integrityapp.com; location / { proxy_pass http://builder-integrityapp-com; } } Apache Apache can be configured as follows: <VirtualHost *:80> ServerName ci.example.org ServerAlias ci ProxyRequests Off ProxyPreserveHost On <Proxy *> Order allow,deny Allow from all </Proxy> ProxyPass / http://127.0.0.1:8910/ ProxyPassReverse / http://127.0.0.1:8910/ ProxyPassReverse / http://127.0.0.1:8911/ </VirtualHost> If you wish Apache to serve static files: <VirtualHost *:80> ServerName ci.example.org ServerAlias ci ProxyRequests Off ProxyPreserveHost On <Proxy *> Order allow,deny Allow from all </Proxy> DocumentRoot /path/to/integrity/lib/app/public RewriteEngine On RewriteCond %{DOCUMENT_ROOT}%{REQUEST_URI} !-f RewriteRule ^/(.*)$ http://localhost:8910/$1 [P] </VirtualHost> <Directory /path/to/integrity/lib/app/public> Order allow,deny Allow from all Options None AllowOverride None # Apache 2.4+ AuthType None Require all granted </Directory> FAQ Does it support Subversion or any other SCM? Integrity only works with git . However, git can mirror other SCMs, for example Subversion via git-svn, and Integrity will work with such mirrored repositories. It is up to you to keep the mirrored repositories up to date with your primary repositories. But does it work with <insert tech here>? Absolutely! As long as your build process can be run from an UNIX-y environment and that it returns a zero status code for success and non-zero for failure, then Integrity works for you. Support / Contributing You can get in touch via IRC at #integrity on freenode . If no one happens to be around, you can ask our mailing list at integrity@librelist.com . ( Archives ) If you find a bug, or want to give us a feature request, log it into our bug tracker . To start hacking, grab the code from our git repository at git://github.com/integrity/integrity.git and setup the dependencies with bundle install && bundle lock . Finally, hack and bundle exec rake as usual ;-) Once you’re done, make sure your changes are rebased on on top of the master branch and open a new ticket in our bug tracker to let us know where we can pull from. Documentation To build HTML documentation, run rake html . This is what goes on the Integrity website ( http://integrity.github.com ). Dependencies for HTML documentation generation: asciidoc source-highlight Integrity is © 2008, 2009, 2010 Nicolás Sanguinetti and Simon Rozet , © 2012, 2013 Oleg Pudeyev Bugs / Support | Source Code | 2026-01-13T09:30:40 |
https://logtide.dev/docs/migration#ai:lucide:zap | Migration Guides | LogTide Docs Docs GitHub Login Get Started Menu Documentation Documentation Getting Started Quick Start Installation No-SDK Setup API Reference Overview Authentication Log Ingestion Log Query Alerts SDKs Overview Node.js Python Go PHP Kotlin C# / .NET Integrations Syslog OpenTelemetry Authentication Overview OpenID Connect LDAP Initial Admin Setup Auth-Free Mode Admin Settings User Management Troubleshooting Dev Testing Migration Overview From Datadog From Splunk From ELK Stack From SigNoz From Grafana Loki Guides Architecture Log Retention Deployment Contributing View on GitHub Documentation Getting Started Quick Start Installation No-SDK Setup API Reference Overview Authentication Log Ingestion Log Query Alerts SDKs Overview Node.js Python Go PHP Kotlin C# / .NET Integrations Syslog OpenTelemetry Authentication Overview OpenID Connect LDAP Initial Admin Setup Auth-Free Mode Admin Settings User Management Troubleshooting Dev Testing Migration Overview From Datadog From Splunk From ELK Stack From SigNoz From Grafana Loki Guides Architecture Log Retention Deployment Contributing View on GitHub Docs Migration Migration Guides Step-by-step guides to migrate from your current log management platform to LogTide. Each guide includes feature comparisons, SDK migration examples, and alert conversion strategies. Why Migrate to LogTide? Zero Per-GB Costs Self-hosted means unlimited logs without metered pricing. Only pay for infrastructure. Full Data Ownership Your logs never leave your infrastructure. GDPR compliant by design with EU data sovereignty. Built-in SIEM Sigma rules, threat detection, and incident management included - no extra costs or add-ons. Unlimited Users No per-seat licensing. Add your entire team without worrying about costs. Choose Your Migration Path Datadog Medium 4-8 hours Migrate from Datadog's proprietary platform to LogTide and save up to 90% on log costs. No per-GB pricing Self-hosted Full SIEM included Splunk Medium 6-12 hours Replace Splunk Universal Forwarder with LogTide's lightweight SDK and native Sigma rules. SPL to LogTide query mapping Sigma rules support No license fees ELK Stack Easy 3-6 hours Simplify your ELK (Elasticsearch, Logstash, Kibana) stack with LogTide's all-in-one solution. No cluster management Built-in SIEM Similar query syntax SigNoz Easy 2-4 hours Seamless migration from SigNoz with native OpenTelemetry support and enhanced security features. OpenTelemetry native Sigma detection MITRE ATT&CK mapping Grafana Loki Easy 4-6 hours Move from Loki to LogTide for built-in alerting, SIEM capabilities, and richer querying. Built-in alerting No Prometheus dependency Full-text search General Migration Process While each platform has unique considerations, all migrations follow a similar process: 1 Preparation & Assessment Document your current setup: log sources, volume, alerts, dashboards, and integrations. Export configurations where possible. 2 Deploy LogTide Set up LogTide using Docker Compose. Create your organization, project, and generate an API key. See the Deployment Guide for details. 3 Parallel Ingestion Configure your application to send logs to both platforms simultaneously. Run in parallel for 24-48 hours to validate data consistency. 4 Migrate Alerts & Dashboards Convert your alert rules to LogTide's format. Recreate critical dashboards. Test notifications (email, Slack, webhooks). 5 Cutover & Cleanup Once validated, update production configs to use LogTide exclusively. Decommission the old platform and remove unused agents. Need Help? If you encounter issues during migration or have questions about specific use cases: Open a GitHub issue for bugs or feature requests Join GitHub Discussions for questions and community support Check the documentation for detailed API and SDK references Edit this page on GitHub ON THIS PAGE Why Migrate to LogTide? Choose Your Migration Path General Migration Process Need Help? Privacy-first log management. Open source, GDPR compliant, built in Europe. Product Documentation Getting Started SDKs Open Source GitHub AGPLv3 License Report Issue © 2026 LogTide. Built with care in Europe. All systems operational | 2026-01-13T09:30:40 |
https://www.timeforkids.com/ | TIME for Kids Skip to main content Get a Quote Subscribe Articles by Grade level Grades K-1 Articles Grade 2 Articles Grades 3-4 Articles Grades 5-6 Articles Topics Animals Arts Ask Angela Books Business Careers Community Culture Debate Earth Science Education Election 2024 Engineering Environment Food and Nutrition Games Government History Holidays Inventions Movies and Television Music and Theater Nature News People Places Podcasts Science Service Stars Space Sports The Human Body The View Transportation Weather World Young Game Changers Your $ Financial Literacy Content Grade 4 Edition Grade 5-6 Edition For Grown-ups Resource Spotlight Also from TIME for Kids: Log In role: none user_age: none editions: The page you are about to enter is for grown-ups. Enter your birth date to continue. Month (MM) 01 02 03 04 05 06 07 08 09 10 11 12 Year (YYYY) 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949 1950 1951 1952 1953 1954 1955 1956 1957 1958 1959 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025 2026 Submit SUBSCRIBE NOW AND SAVE TODAY! Subscribe Today TIME for Kids was named a Common Sense Selection for Learning by Common Sense Education because of our best-in-class media resources for students and educators. Subscribe Now Get A Quote Empowering Futures This FREE platform is designed to help students explore careers and includes teaching resources. Free Sign-Up Service Stars Help kids make a positive impact in their community with our themed missions! Free Resources Arrows Current events for kids. TIME for Kids nurtures today’s learners and tomorrow’s leaders with authentic news and the critical-thinking skills that shape active global citizens. Subscribe Log In For Educators Build lesson plans around current events. Build literacy skills. View pricing For Families Discover top stories. Discuss world issues as a family at home. Discover Now Read our latest articles and stories Now students can follow the latest news. All tailored to their reading level. To explore the kids' website, select a grade and discover new stories each week. View articles by grade level K-1 2 3-4 5-6 Easy to Engage. Easy to Access. Easy to Use. Subscribe Now Get A Quote Grown-Ups Continue Navigate the news, together. Discover TIME for Kids for educators and families. Kids Explore Unlock a world of exciting stories. Start reading the news! News for You! Select your grade to begin reading. K-1 2 3-4 5-6 Contact us Privacy policy California privacy Terms of Service Subscribe CLASSROOM INTERNATIONAL © 2026 TIME USA, LLC. All Rights Reserved. Powered by WordPress.com VIP | 2026-01-13T09:30:40 |
https://www.timeforkids.com/service-stars | Service Stars Get Started Be Inspired Submit Stories Find Resources Meet Service Stars Submit Stories Find Resources Make the World a Brighter Place All kids can make a positive impact on their communities, and small actions can lead to big change. How will you make a difference, in your own way? Let the themed missions on this page inspire you. Kindness Mission: Spread Kindness Kindness counts, big time! Many kids care about spreading kindness at home, at school, and in their community. Are you one of them? Here’s how to do it: First, think of a plan to make the world a bit kinder, whether you’re organizing a big event or simply telling a friend that you care. Then put your plan into action. Watch for results. Was your kindness plan a success? Get the details More Missions Kindness Mission: Kindness Bingo Make the world a brighter place! TIME for Kids Service Stars encourages kids to spread kindness and make a positive impact on their communities. Animal Welfare Mission: Protect Animals How do you help animals? Some people volunteer at shelters. Others raise money for wildlife. Literacy Mission: Boost Literacy From organizing book drives to participating in tutoring groups, kids can aid literacy efforts in their community. Environment Mission: Protect the Planet You don’t need to be a superhero or a famous climate activist to help protect the environment. Everyone can play a part. Civic Engagement Mission: Speak Out By learning about an issue, raising awareness, and trying to get that problem solved, you’re doing your part to make things better. Health Mission: Promote Wellness When a person is feeling unwell, physically or mentally, even a small gesture of care can mean the world. Fundraising Mission: Raise Money It's fun to find creative ways to raise money for a good cause. You don't have to gather a huge sum to make a huge impact. Food Insecurity Mission: Fight Hunger Many millions of people in the United States live in food-insecure households. How can you help? Made Possible By The Allstate Foundation empowers youth to serve their communities and create positive change. Contact Us Privacy Policy California Privacy Powered by © 2026 TIME USA, LLC. All Rights Reserved. Powered by WordPress.com VIP | 2026-01-13T09:30:40 |
https://www.charterworks.com/privacy-policy/#for-readers-outside-the-us | Privacy Policy Try Charter Pro for $1 Latest Topics AI DEI Flexible Work Management Societal Issues Resources Briefing Work Tech Research Playbooks Case Studies Toolkits, Scripts, and other Resources Solutions Charter Pro Charter Forum Charter Pro for Teams Advisory + Strategic Services Events Upcoming and Past The AI Download Charter Cortados Leading With AI Masterclass Skills Accelerators Strategy Briefings Webinars Workplace Summit About Try Charter Pro for $1 Sign In Privacy Policy Last Updated: December 14, 2021 1. WHAT CHARTER COLLECTS 1 2. HOW CHARTER USES YOUR INFORMATION 3 3. HOW CHARTER SHARES INFORMATION 5 4. THIRD PARTY COOKIES AND TRACKING TECHNOLOGIES 7 5. YOUR CHOICES 8 6. FOR READERS OUTSIDE THE US 9 7. OTHER INFORMATION 9 Charter Works, Inc. and its affiliates (“Charter Works,” “Charter,” “we,” “us,” or “our”) operate CharterWorks.com, deliver newsletters, host live events, and deliver other products and services (“Services”). This Privacy Policy describes the kinds of information Charter may gather when you use the Services, how Charter uses that information, when Charter might disclose that information, and how you can manage it. By using the Services, you are accepting the practices described in our Privacy Policy, including our use of cookies and similar online tools. If you do not agree to the terms of this Privacy Policy, please do not use the Services. We reserve the right to modify or amend the terms of our privacy policy from time to time without notice. Your continued use of our Services following the posting of changes to these terms will mean you accept those changes. Please note: our Services are under constant development. This Privacy Policy may therefore be modified and updated on an ongoing basis. Please check back to this page regularly. Our Privacy Policy does not govern or apply to information collected or used by Charter Works through other means or to websites maintained by other companies or organizations to which we may link or who may link to us. Please send any questions about privacy issues to privacy@charterworks.com. WHAT CHARTER COLLECTS The information we collect and the purposes for which we use it will depend on how you interact with Charter Works and the Services. Information You Provide to Us When you use the Services, you may provide us the following: Registration, Subscription or Contact Information such as e-mail address, name, phone number, shipping address, and billing information Demographic and interest information such as your age, date of birth, gender, interests, lifestyle information, and hobbies Financial and transactional information such as credit or debit card number, verification number, and expiration date, to process payments and information about your transactions and purchases with us. Please note: payment information goes to our payment processors and is not collected, processed, or stored by Charter Works. Customer service information such as questions and other messages you address to us directly through online forms, by email, over the phone, or by post, and summaries or voice recordings of your interactions with customer care Employment or Education Information such as education history, employment experience, business contact information User-generated content such as comments on articles, photos, videos, audio, any information you submit in public forums or message boards, reviews and feedback or testimonials you provide about our Services Marketing information such as information related to your preferences for receiving communications, subscribing to our publications, newsletters, and other content Survey, market research or sweepstakes information such as information gathered when you complete a survey, participate in market research, or enter a contest, sweepstakes, or game relating to the Services. Social media information if you link your account or access the Services through a third-party connection or log-in, we may have access to any information you provide to that social network depending on your privacy settings Other information any other information you choose to directly provide to us in connection with your use of the Services Information We Automatically Collect We may collect information about your use of the Services, including: Device information and identifiers : such as computer or mobile device model, IP address, other unique device identifiers, operating system version, browser type, language, and settings Usage information : such as information about the Services you use, the time, date, and duration of your use of the Services, newsletter open-rate, referral information, your interaction with content offered through the Services, search terms used, referring website, and software crash reports. We also collect information stored using cookies, mobile ad identifiers, and similar technologies set on your device. Our servers may automatically keep an activity log of your use of the Services. We may collect such usage information at the individual or aggregate level. Please see Section Four of this Privacy Policy (THIRD PARTY COOKIES AND TRACKING TECHNOLOGIES ) for more information about how we collect and use this information. Location information : such as city, state and ZIP code associated with your IP address and precise geolocation information from your devices, with your permission in accordance with your mobile device settings. Information We Receive from Third Parties We may receive information about you from third parties and combine it with information we receive from or about you, including: Information from social media networks When you interact with Charter Works a social media service or log in using social media credentials, depending on your social media settings, we may have access to your information from that social network such as your social media account ID and/or user name associated with that social media service, your profile picture, email address, friends list or information about the people and groups you are connected to and how you interact with them, and any information you have made public in connection with that social media service, Information from third party email and subscription providers and/or processors When you purchase one of our subscription products on a third-party services or stores subscription (including the Apple Store), we receive personal information from the third parties that help us process emails and subscriptions. Please note: Charter Works does not receive (or collect, process, or store) any payment card industry (“PCI”) data. Information from publicly or commercially available sources We may collect information from third parties such as consumer data resellers that make available information, collected both online and offline, such as demographic information, additional contact information, group affiliations, occupational information, and educational background, which we may combine with other information we receive from or about you. Other Information We Collect Charter also may collect other information about you, your device, or your use of the Services in ways that we describe to you at the point of collection, or otherwise, with your consent. You may choose not to provide us with certain types of information but doing so may affect your experience in using the Services. HOW CHARTER USES YOUR INFORMATION Charter uses your information to personalize and improve your experience using the Services in the ways described below, or in other ways at your direction or with your consent. To Provide the Services For example, to: Process and fulfill your transactions , including subscriptions or memberships, and enable you to login to the Services, Contact you and send you communications about the Services (including communications you request like newsletters) and share invitations to events or offers about Charter products or our third-party partners’ products Respond to you and your comments, inquiries, or requests; and transmit legal notices, policy updates, and other important information about the Services, Provide features of the Services (such as social sharing and comments) and to post content you submit, Provide customer support , administer loyalty programs, contests, promotions, or surveys, or Identify and repair errors that impair the function of the Services and to detect security incidents Protect the rights of Charter and others, detect, investigate, and prevent activities that may violate our policies or may be fraudulent, illegal; to protect, enforce, or defend the legal rights, privacy, safety, or property of Charter Works, its employees, agents, or users; or as required by law. Please note: all editorial and commercial email messages include instructions for unsubscribing from such future communications. To Deliver Personalized Content and Recommendations For example, to: Customize features of the Services, Deliver relevant content and to provide you with an enhanced experience based on your activities and interests Send you personalized newsletters , surveys, and information about products, services and promotions offered by us, our partners, and other organizations with which we work Facilitate the delivery of targeted advertising (including interest-based advertising), promotions, and offers, on behalf of ourselves and our third-party advertisers, both on our websites and elsewhere Customize content that our third-party partners deliver on the Services (e.g., personalized third-party advertising) based on your activity on the Services Create and update inferences and profiles about you that can be used for advertising and marketing on the Services, third party services and platforms, and mobile apps, or for analytics, Measure and report on the delivery of advertisements Please note: all editorial and commercial email messages include instructions for unsubscribing from such future communications. To enable us to provide these Services, we may use the information we collect to identify you across sessions, browsers, and/or devices. Please see Section Four of this Privacy Policy (THIRD PARTY COOKIES AND TRACKING TECHNOLOGIES ) for further information about our and third parties’ use of cookies and other tracking technologies and your choices related to targeted advertising. To Learn About Our Users and Improve Services We conduct analysis and research on our users’ demographics, interests, and behavior and perform statistical analysis of our users, their use of the Services, and their purchasing patterns. We do this to optimize and improve the Services, our products, and our operations. To Combine Information for All the Purposes Described Above We may use the information gathered from one aspect of the Services to enhance other aspects of Services and we may combine information gathered from multiple aspects of the Services into a single user record. We also may use or combine information that we collect offline or that we collect or receive from third-party sources for many reasons, including to enhance, expand, and check the accuracy of our records. Data collected from a particular computer, browser or device may be used with another computer, browser or device that is linked to the computer, browser, or device on which such data was collected. HOW CHARTER SHARES INFORMATION Charter’s information-sharing practices vary based on the type of information and the type of recipient. Aggregate Or De-Identified Information We may use and share deidentified information with third parties in any manner for any purposes. Subscription Providers If your subscription is provided in whole or in part by your employer or other third party, we may share with them information about your access and use of your subscription. If you have a subscription associated with a professor or school, we may notify your professor or school to confirm your subscription, access, or use. When providing information to a subscription provider, we may reveal limited amounts of your personal information such as your name or email address. Service Providers and Professional Advisors We share information with third party agents and vendors who perform functions on our behalf, including, but not limited to, web hosting, content syndication, content management, social media integration, marketing, analytics, product development, email or text message transmission, billing or payment processing, order fulfillment, auditing, and customer service. We also may disclose your personal information to professional advisors, such as lawyers, bankers, auditors, and insurers, where necessary in the course of the professional services that they render to us. Service providers and professional advisors with whom we share information will be obligated to maintain the confidentiality (as appropriate for the services) and security of personal information Charter transmits to them. Third Party Content and/or Advertising Partners Third parties that provide content, advertising, or functionality to the Services may collect or receive information about you and/or your use of the Services, using cookies, beacons, and similar technologies. Third party content and/or advertising partners may use such information to provide you with advertising that is based on your interests and to measure and analyze ad performance on our Services or other websites or platforms, and combine it with information collected across different websites, online services, and other devices. Please note: third parties’ use of your information will be based on their own privacy policies. Social Media Platforms and Services If you log in with or connect a social media service account to a Charter Works Service, certain information may be available to the social media platform, in which case the social media platform’s use of the shared information will be governed by the social media platform’s privacy policy and your privacy settings for that platform. If you do not want your personal information shared as described, please do not connect your social media platform account with your Charter Works account, and do not participate in social sharing on the Services. Providers of Co-Branded Services Charter may offer co-branded services or features, such as conferences, events, contests, sweepstakes, or other promotions together with a third party (“Co-Branded Services”). Co-Branded Services may be hosted by Charter Works or through the third party’s services. Charter may share the information you submit in connection with the Co-Branded Service with the applicable third party or the third party may receive certain information from you at the same time Charter does. Please note: a third party’s use of your information will be governed by the third party’s privacy policy. Other Users of The Services Any information (including your name, location, email address, profile information, and comments) you choose to submit through the use certain features of the Services that provide an opportunity to interact with Charter and other Charter users (e.g., community forums, Slack groups) may be publicly available. Charter is not responsible for any information you choose to submit and make public through these channels of communication. Business Transferees In the event of a corporate change in control (for instance, a sale or merger) or due diligence in contemplation thereof, Charter Works may transfer your personal information to the new party in control or the party acquiring assets. With Your Consent at Your Direction We may also share your information with your consent. The Services may link to third-party websites and services that are outside our control. We are not responsible for the security or privacy of any information collected by these third parties, which operate pursuant to their respective privacy policies. THIRD PARTY COOKIES AND TRACKING TECHNOLOGIES Cookies are small text files that are stored in your device’s browser when you visit a website that enable the business that places the cookie business to recognize a user across one or more browsing sessions, and across one or more websites. When you use the Services, we and our third-party partners use cookies, pixel tags, device IDs and other similar technologies (collectively, “Cookies”) to collect information from your browser or device for the purposes of information storage and access; personalization of the Services; measurement of and analytics regarding the use of the Services; content selection, delivery, and reporting; and advertising selection, targeting, delivery, and reporting. By using the Services, you consent to our use of cookies and similar technologies. The following types of Cookies are used in the Services: Essential Cookies Essential Cookies enable you to browse our Services and use certain features. Disabling Essential Cookies may prevent you from using certain parts of the Services. These cookies also help keep our Services safe and secure. Preference Cookies Preference Cookies store information such as your login data, if applicable, and website preferences. Disabling Preference Cookies may hinder our ability to remember certain choices you’ve previously made or personalize your browsing experience by providing you with relevant information. Preference cookies can also be used to recognize your device so that you do not have to provide the same information more than once. Performance Cookies Performance Cookies collect information about how you use the Services such as which pages you visit regularly. Performance cookies are used to provide you with a high-quality experience by doing things such as tracking page load, site response times, and error messages. Content and Advertising Cookies Content and Advertising Cookies gather information about your use of our services so we provide you with more relevant content and advertising on the Services and elsewhere online and across your devices. Content and Advertising Cookies are also used to gather feedback on customer satisfaction through surveys. They remember that you’ve visited the Services and help Chart understand usage of the Services. Some Content and Advertising cookies are from third parties that collect information about your use of our Services to provide advertising (on our Services and elsewhere, across your different devices) based on your online activities (so-called “interest-based advertising”). Charter may not have access to these cookies, although we may use statistical information arising from the cookies provided by these third parties to customize content and for the other purposes described above. Please note: Charter does not control the privacy practices of these third parties, and their practices are not covered by this Privacy Policy. YOUR CHOICES There are several ways to minimize tracking of your online activity by third parties, some of which we have summarized below. We hope you find this information to be a helpful reference. Please note: using these tools to opt out of tracking and targeting does not mean that you will not receive advertising while using our Services or on other websites. Controls for Cookies and Online Tracking Choices Since many of these opt-out tools are specific to a device or browser, you will need to opt out on every browser and device that you use. Blocking Cookies in Your Browser . Most browsers let you remove or reject cookies, including cookies used for interest-based advertising. To do this, follow the instructions in your browser settings. Many browsers accept cookies by default until you change your settings. If you wish to opt-out of Google Analytics’ tracking, use this browser add-on provided by Google . Blocking advertising ID use in your mobile settings. Your mobile device settings may provide functionality to limit use of the advertising ID associated with your mobile device for interest-based advertising purposes. For more information about how to change these settings for Apple, Android or Windows devices, see: Apple: http://support.apple.com/kb/HT4228 Android: http://www.google.com/policies/technologies/ads/ Windows: http://choice.microsoft.com/en-US/opt-out Using privacy plug-ins or browsers . You also may use a browser with privacy features, like Brave, or install browser plugins like Privacy Badger , Ghostery or uBlock Origin . These may offer tools to block or limit third-party cookies/trackers. Platform opt-outs. The following advertising platforms offer opt-out features that let you opt-out of certain uses of your information for interest-based advertising: Google and Facebook Advertising industry opt-out tools. You can use these opt-out options to limit use of your interest-based advertising by participating companies: Digital Advertising Alliance and Network Advertising Initiative . Please note: opting-out of advertising networks’ tracking and targeting does not mean that you will not receive advertising while using our Services or on other websites, nor will it prevent the receipt of interest-based advertising from third parties that do not participate in these programs. It will exclude you, however, from interest-based advertising conducted through participating networks, as provided by their policies and choice mechanisms. Accessing Your Information You can request to access, review, correct, update, delete or modify your registration or subscription profile information (if Charter maintains such information) and modify your marketing preferences (where applicable) by contacting privacy@charterworks.com. Please note: if you have subscribed or registered for multiple of our Services or subscriptions, you may need to update your information for each account separately. Emails, Newsletters, and Text Messages You may always opt-out of receiving future e-mail marketing messages and newsletters from Charter Works by following the instructions contained within the emails and newsletters, or by e-mailing us at privacy@charterworks.com. You may opt out of receiving promotions or advertising via Text Message at any time, by replying “STOP” to one of our Text Messages. Responding To Requests For your protection, we may only implement requests with respect to the personal information associated with the email address that you use to send us your request and/or on the basis of other information we use to verify you before implementing your request. Please note: we may need to retain certain information for record-keeping purposes and/or to complete any transactions you began prior to requesting such change or deletion (e.g., when you make a purchase or enter a promotion, you may not be able to change or delete the personal information provided until after the completion or cancelation of such purchase or promotion). FOR READERS OUTSIDE THE US Charter Works is a US-based news organization, so we apply US law to our privacy practices. This means that wherever you are in the world, this Privacy Policy will apply to the information you provide to Charter or we collect when you use the Services. OTHER INFORMATION Security We take reasonable security measures to protect your information, including the use of physical, technical, and administrative controls. Please understand, however, that while we try our best to safeguard your personal information once we receive it, no transmission of data over the Internet or any other public network can be guaranteed to be 100% secure. You need to help protect the privacy of your own information. You must take precautions to protect the security of any personal information that you may transmit over any home networks, wireless routers, wireless (WiFi) networks or similar devices by using encryption and other techniques to prevent unauthorized persons from intercepting or receiving any of your personal information. You are responsible for the security of your information when using unencrypted, open access, or otherwise unsecured networks. Storage The period for which we keep information varies according to the purpose for which it is used. In some cases, there are legal requirements to keep data for a minimum period. We will retain your Personal Data for the period necessary to fulfill the purposes outlined in this Privacy Policy unless a longer retention period is required or allowed by law. Children’s Information The Services are not intended for children under 13 years of age. Charter Works does not knowingly collect personal information from children under 13 years of age. If Charter Works discovers that a child under the age of 13 has provided Charter Works with personal information and we do not have parental consent, Charter Works will delete that child’s information. If you believe that company has been provided with the personal information of a child under the age of 13 without parental consent, please notify us immediately at privacy@charterworks.com Questions If you have questions about our Privacy Policy, please contact us at privacy@charterworks.com Insights Books Interviews Charter on TIME Research Connect Events Topics Artificial Intelligence Hybrid Work DEI Leadership Charter Pro Become a Member Support Sign In Search Contact Partnerships General Inquiries Company About Careers Press Newsletters Charter Briefing Charter Works Inc. © 2025 Privacy Terms of Service | 2026-01-13T09:30:40 |
https://www.charterworks.com/pro/pricing/ | Charter - Future of Work, AI, Management, Hybrid Try Charter Pro for $1 Latest Topics AI DEI Flexible Work Management Societal Issues Resources Briefing Work Tech Research Playbooks Case Studies Toolkits, Scripts, and other Resources Solutions Charter Pro Charter Forum Charter Pro for Teams Advisory + Strategic Services Events Upcoming and Past The AI Download Charter Cortados Leading With AI Masterclass Skills Accelerators Strategy Briefings Webinars Workplace Summit About Try Charter Pro for $1 Sign In Upgrade to Charter Pro Sharpen your expertise with Charter Pro’s original journalism, research, and expert analysis focused on the future of work, including AI, flexible work, diversity and wellness. Monthly $29 /mo Select Monthly Plan Yearly (15% off) $348 $299 /yr Select Yearly Plan We use Stripe for secure and encrypted payments. With Charter Pro, get unlimited access to: In-depth reporting, exclusive analysis, and essential research to stay ahead on critical workplace issues and navigate the future of work Three premium, expert-led newsletters per week for quick decision-making insights Templates, toolkits and benchmarks to effectively lead and implement key initiatives Exclusive live events and on-demand workshops for unique networking and upskilling opportunities Trusted by change-ready leaders from innovative companies like: Preview it Research briefings tk tk tk tk Deep dives tk tk tk tk Agendas tk tk tk tk Playbooks tk tk tk tk Tools tk tk tk tk What members are saying about Charter Pro: For the past three years, Charter has been an instrumental partner in guiding me and my teams as we've navigated the ever-evolving future of work. Now with Charter Pro, I have all of their rigorous reporting at my fingertips to strengthen my executive business cases and drive quicker adoption of my recommendations.” Alex Buder Shapiro Chief People Officer, Jasper AI Charter’s “superpower is in creating a sense of connection with data, narrative, and an inspirational vision.” Keegan Evans Executive Coach Benefit from access to the Charter Pro staff and community: FAQs Why should I upgrade to Charter Pro? Become a member to get unlimited access to our news and insights, and: Learn from experts in AI, flexible work, and equity Quickly and confidently implement our customizable tools, templates, and benchmarks Connect with leaders at our live events and virtual workshops Drive business impact with essential analysis Stay ahead on critical workplace issues Can I expense a Charter Pro membership at work? Yes. Charter Pro is indispensable for your job, and expensable to your company. Many of our members use their company’s professional development budget to expense their membership. If you’d like to request that your employer sponsor your membership, here’s a template you can use. Do you have team memberships? Yes. We recognize that change is a collective rather than an individual endeavor. If you’d like to talk about getting group access to Charter Pro, email pro@charterworks.com . Why did you create Charter Pro? Charter Pro is designed to equip you with everything you need to transform 2024’s challenges into your strategic advantages. We’ve spent the past year interviewing leaders about what they need most to adapt and succeed in their role. What they told us: they urgently need research, tools, and advice for navigating the converging workplace transformations driven by AI, inclusion, and flexible work they need to be able to accessibly and continuously upskill their teams to adapt to changing economic, cultural, and technological contexts so they too can help drive change they’re hungry for a community of peers they can share and learn from What other memberships does Charter offer? We work with executives, CHROs and their leadership teams from future-forward organizations through Charter Pro CxO , a membership for owners of the talent agenda. In addition to unlimited content and event access, this membership includes unlimited advisory services, which means that we connect CxO members to work experts studying, reporting and researching all the latest developments on how work is changing and helping leaders benefit from them to drive business results. If you’re interested in learning more about Charter Pro CxO , email us at pro@charterworks.com . How do I contact Charter about memberships? You can email us at pro@charterworks.com , and someone from our team will get back to you within 48 business hours. Insights Books Interviews Charter on TIME Research Connect Events Topics Artificial Intelligence Hybrid Work DEI Leadership Charter Pro Become a Member Support Sign In Search Contact Partnerships General Inquiries Company About Careers Press Newsletters Charter Briefing Charter Works Inc. © 2025 Privacy Terms of Service | 2026-01-13T09:30:40 |
https://www.charterworks.com/tag/flexible-work/ | Flexible work - Charter - Future of Work, AI, Management, Hybrid Try Charter Pro for $1 Latest Topics AI DEI Flexible Work Management Societal Issues Resources Briefing Work Tech Research Playbooks Case Studies Toolkits, Scripts, and other Resources Solutions Charter Pro Charter Forum Charter Pro for Teams Advisory + Strategic Services Events Upcoming and Past The AI Download Charter Cortados Leading With AI Masterclass Skills Accelerators Strategy Briefings Webinars Workplace Summit About Try Charter Pro for $1 Sign In Flexible work Read Charter's latest insights and interviews on best practices for flexible work. Pro Research Flexible work The hidden talent tax of policy changes By Brian Elliott Pro Steal this idea Working parents Steal this idea: How Liberty Mutual gives working parents the gift of time By Michelle Peng Pro Ideas Flexible work Why we can’t stop talking about remote work nearly six years later By Brian Elliott Pro Ideas Flexible work How mastering hybrid is an AI advantage By Brian Elliott Pro Briefing Flexible work How to approach the “agree-to-disagree equilibrium” of flexible work By Kevin J. Delaney Pro Steal this idea Offices How to build worker feedback into your approach to office design By Michelle Peng Pro Insights Flexible work New data on office mandates and what works By Brian Elliott Pro Insights Working parents The support parents need during back-to-school season By Michelle Peng Pro Briefing summer How work is different this summer By Kevin J. Delaney Pro Insights Flexible work The return-to-office reality gap By Brian Elliott Pro Insights Flexibility Four takeaways from Running Remote By Erin Grau Pro Briefing Flexible work How AI is unlocking remote work for blue-collar workers By Kevin J. Delaney 1 of 9 → Insights Books Interviews Charter on TIME Research Connect Events Topics Artificial Intelligence Hybrid Work DEI Leadership Charter Pro Become a Member Support Sign In Search Contact Partnerships General Inquiries Company About Careers Press Newsletters Charter Briefing Charter Works Inc. © 2025 Privacy Terms of Service | 2026-01-13T09:30:40 |
https://unicef.github.io//publicgoods-accelerator-guide/design-structure-support/technical-assistance | How do I design and deliver technical assistance to DPGs? | Digital Public Goods Accelerator Guide Skip to main content Digital Public Goods Accelerator Guide GitHub Introduction About Digital Public Goods (DPGs) Sustainability of Open Source Business Models (OSBM) Designing structure and content to support Digital Public Goods (DPGs) How do I design and deliver technical assistance to DPGs? Open Source Mentorship Structure for Your Accelerator Mentorship & Resources for Startups Open-Source Governance Choosing an Open-Source License Project Management & Documentation Milestones & Challenges Business Mentorship Case Studies Nominating a DPG Appendix 🏠 Designing structure and content to support Digital Public Goods (DPGs) How do I design and deliver technical assistance to DPGs? On this page How do I design and deliver technical assistance to DPGs? Whether the startup is new to open source or already creates open source products, it is important to understand if the startup has fully considered what it means to adopt open source and what technical support the startup needs. This section will cover: Should the startup adopt open source? and Conduct a Needs Assessment on Startup Support Should the startup adopt open source? A startup will need to consider how they license and share their work. There are three main things that are important to know about -- licensing, repositories, and community building. More details will be covered further in the guide. 1. Open Source Licensing In order for a product to be considered open source, the product must be publicly released under an Open Source License . An Open Source license communicates to others that the software, hardware, or content is open source and can be freely used, modified, and shared. The license text must be included as a new file in the root directory of your public repository. Often a license is also posted in a prominent place on the website for a particular product or in the download of a software package or hardware design package. Licensing may seem like a technical detail and it is easy to overlook, but the type of license you choose can have wide-reaching and lasting effects on your company, so you must choose wisely. It is also important to decide at this stage whether you would like your license to be copyleft , which ensures that downstream derivatives stay open source; or permissive, which allows downstream derivatives to be redistributed as closed source. The guide will talk about the options for different licenses to explore: software, hardware and content. 2. Repositories Do they have an existing repository for collaboration? Open source projects often rely on many different people to contribute to the project. This collaboration can take many different forms, but often, an open source project will have a public repository, which is a directory or storage space where projects live that anyone can access, which is sometimes shortened to “repo.” Common platforms for software collaboration are GitHub, GitLab, Gogs, Gitea, Bitbucket, Sourceforge, OpenForge in India, CSDN in China, and iHub in Kenya. Resource: Interested in trying out open source for yourself? You can try making your own GitHub repository or a GitLab project . Does the repository have public documentation? In order for others to participate, a project needs thoughtful documentation in public view. Depending on the size of a project, this could mean one or many of the following things: README file placed near the license text file Dedicated documentation website (e.g. docs.example.org ) Public Q&A site Effective technical documentation enables others to become contributors. This lets others follow in your footsteps and move more quickly to meaningful contribution, instead of figuring out how to set up a project in your configuration. The technical documentation is instructional and should outline what a path to a successful contribution is. Additionally, when the documentation is published in public repositories, documentation becomes a more open project task for outside contribution and discussion. Q: How do you make sure that contributions are relevant, helpful, and in working order? A: There is usually an approvals process where a collaborator can submit a contribution and other project leaders can decide which contributions are added to the final product. Learn more about governance models in the next section of the guide. 3. Community building It is a good idea for a startup to spend time interacting with an existing open source community. This builds a stronger understanding of experiences in collaborative open source projects. Ideally, the startup should select an open source product, component, or tool already used by the startup. When selecting a project, also look for good documentation and guidance for newcomers. More established open source projects also have public fora for others to raise feedback and discuss the project. These can look like web forums, discussion mailing lists, IRC or Matrix chat rooms, recurring team video meetings, Slack or Mattermost servers, and more. Here are some examples of open source forums: Fedora Linux Discussion : a certified DPG OpenStreetMap forum Drupal forum Mozilla forum React forum Discourse forum phpBB forum D3.js forum Resource: See this CHAOSS metric on Chat Platform Inclusivity . Conduct a needs assessment on startup support Before designing or supporting the startup's open source journey and becoming a DPG, you will need to conduct a needs assessment on what support they will need. This needs assessment includes, but is not limited to: Company's Problem Statement Company's Solution Statement Piloting plan/experiment summary Piloting challenges Business Model/Scalability after pilot Product and User Development – what needs to be changed/fixed for the product to qualify as beta DPG? Company performance to date Team skills/expertise - what other areas of expertise are missing on the team and why are they crucial for the pilot? Business Strategy (business model, user/customer acquisition, potential CO scale/LTA, Potential for public funds, potential for private funds) Technical Support Plan Summary Resource: The detailed needs assessment template can be found here . Edit this page Previous Successfully Scaled DPGs Next Open Source Mentorship Structure for Your Accelerator Should the startup adopt open source? 1. Open Source Licensing 2. Repositories 3. Community building Conduct a needs assessment on startup support Docs Guide Community Twitter More GitHub Copyright © 2022 UNICEF. Built with Docusaurus. | 2026-01-13T09:30:40 |
http://tirkarthi.github.io/clojure/2017/10/09/graphql-tutorial.html | A GraphQL tutorial xtreak blog whoami Comics Poems A GraphQL tutorial Oct 9, 2017 Thanks to Walmart Labs for their Lacinia library and the helpful members at the Slack channel Early days of REST Most of us use REST everyday for building our web applications and I think it’s a great step forward from the early days of writing HTML where every endpoint was pretty tightly coupled to the resource you are trying to access like get-books , update-book , delete-book , etc. Apart from the naming every project used to follow different conventions which was a hurdle as we move from one project to another and REST fixed a lot of the problems. But we hit some limitations of REST in our daily programming as the teams were split into backend and frontend. Limitations of REST Frontend needs keys that are different from what the backend supplies to them. Most of the time backend team serializes the record using the database column names for the objects. But the frontend team needs the value with different key and hence it leads to back and forth updates to the backend code and docs. Eg. Frontend might require the column last_updated_at as last_modified_at . Frontend team was consuming data they don’t need at all for some of the pages thus increasing the bandwidth for those pages. Eg. A summary list with name and subject through GET request was returning a lot of data they don’t need and REST doesn’t provide good ways to get only the required keys. Backend needs to maintain separate endpoints for different resources and hence when the frontend team needs to present as a cohesive page with data from different identities then they need to make varying amount of REST calls to get the data and then manipulate the data in the browser forming a cohesive state. Eg. A page with information about the book and the author along with all the other books written by the author would perform a GET request for the book information and an another one for the author followed by another for the list of books by the author with each call having the same problem returning a lot of unused data. Evaluating GraphQL So I was evaluating the usage of GraphQL to solve some of the problems and to identify the ecosystem around GraphQL to see if we can utilise the current tooling to solve our use case. The following is a sample application that I have implemented using Lacinia, an open source GraphQL implementation for Clojure for Walmart Labs explaining my experience with it and the limitations. Common myths surrounding GraphQL GraphQL and security : Since GraphQL involves querying from the browser it often scares people around performing queries over database from the browser which could lead to data breach and so forth. We will get to know that it’s much more sandboxed in the amount of access we give to our users along with some of the limitations surrounding permissions. GraphQL and RDBMS : It’s a common misconception due to the name that GraphQL requires some sort of graph database or NoSQL database. But GraphQL is only a spec and the implementation of the spec doesn’t really limit it to graph database. GraphQL can be used with RDBMS, NoSQL and even in-memory stores. This tutorial will use SQLite. GraphQL and writes : Another misconception surrounding the usage of GraphQL is that very less people show cool demos with the read aspects of the database making it feel like writes are very hard in GraphQL. But writes use the same underlying concept as reads do. But it’s often recommended to be more specific about writes unlike REST where we can update almost all the fields using the same endpoint. A music collection app The tutorial will involve building a simple music collection app with two tables. The artist table contains id and name of the artist. The track table contains the track ID, name along with a foreign key reference to the artist ID for each track. GraphQL schema GraphQL wants us to define a schema file that essentially allows us to define the fields enabled for access along with other meta data and how we will be retrieving the given data. Thus we can define here to make sure only specified fields are exposed. The schema file we will be using uses EDN but you can use JSON or any other format necessary. The schema file for the project will be as below : { :objects { :track { :fields { :trackid { :type Int } :trackname { :type String } :trackartist { :type ( list :artist ) :resolve :get-artist }}} :artist { :fields { :artistid { :type Int } :artistname { :type String } :tracks { :type ( list :track ) :resolve :get-tracks }}}} :mutations { :createArtist { :resolve :create-artist :type ( list :artist ) :args { :artistname { :type String }}}} :queries { :artist { :resolve :get-artist :type ( list :artist ) :args { :id { :type Int } :name { :type String }}} :track { :resolve :get-tracks :type ( list :track ) :args { :trackid { :type Int } :first { :type Int } :trackname { :type String }}}}} Objects : An object is an entity containing the given fields. Here track object has the fields trackid, trackname and trackartist with types. We could see that trackartist is by itself an object unlike the other fields of primitive types. We also specify that it can be resolved using get-artist function. Similarly we define the fields for an artist and it also contains tracks object which is a list of tracks and it’s resolved by get-tracks function. We will be writing the resolvers soon thus confirming the fact that graph databases are not necessary for using GraphQL. Only the specified fields will be accessible from the client thus we don’t need to worry about data breach unless we specify secret fields here. Queries : Queries determine the queries we will be performing using GraphQL. They don’t need to have the same name as the objects. We specify that the query can be resolved using get-artist function and it returns a list of artists. We can also specify the fields through args that we will be accepting from the client for querying. So there are a set of fixed queries and thus we will not be exposing all the tables to the client. Mutations : Mutations are GraphQL’s way of specifying the writes and as mentioned above it’s recommended to use specific mutations unlike REST where we have single endpoint for multiple updates. I have createArtist mutation that enables me to accept an artist name to create a record. It also specifies that I will be returning a list of artist and the write logic is handled in create-artist function. GraphQL resolvers GraphQL resolvers are a way to return the appropriate results for the queries along with handling our writes too. Thus a simple resolver to for an artist can be return as below : ( defn get-artist [ context arguments value ] ( let [{ :keys [ id name ]} arguments { id :trackartist, :or { id id }} value ] ' ({ :artistid 1 :artistname "Kiara" })) The get-artist takes three parameters context, argument and value. Context will be nil here for the most part. arguments contains the arguments passed as part of query and value is something we will get to soon. Since we specified in the schema file that id, limit and name are the fields through which we can filter our records we use them. GraphQL queries query { artist(id: 1) { artistname } } In GraphQL there is a single endpoint where we post the query and get the result instead of using a separate endpoints for each resource. We can post the query as payload and get the results. In our case all the queries are via in query params to localhost:8888 to return the result using a rich IDE. This is not our production use case where sending data through query params will result in data breaches. The query attribute defines that this will be a read-query and we are querying for an artist with ID as 1 and we need the artistname. Since we didn’t specify artistid which is also a part of the object it’s not returned. Thus the above query will return the below result : { "data": { "artist": [ { "artistname": "Kiara" } ] } } Let us go deeper Since we have the artistid and artistname returned directly as part of the result from the table how do we retrieve the related tracks for the artist which is also a part of the object. We can see from the schema file we have attached the function get-tracks with it. Hence to retrieve the tracks information for the given artist GraphQL passes each artist entry from the returned list to the get track function as the value argument. Imagine the get-tracks function as below : ( defn get-tracks [ context arguments value ] ( let [{ :keys [ artistid trackname trackid ]} value { :keys [ trackname trackid first ] , :or { trackname trackname trackid trackid }} arguments ] ' ({ :trackid 1 :trackname "Heavy" }))) This gets the artistid in the value map and thus we can return all the tracks for the artist given the artistid. We simply return a fixed set of results but we can use the information to query from the database or in-memory store and return the results. Thus the query to get an artist information along with all the tracknames by the artist will be as below : Query : query { artist(id: 1) { artistname tracks { trackname } } } Result : { "data": { "artist": [ { "artistname": "Kiara", "tracks": [ { "trackname": "Heavy" } ] } ] } } And the magic part is that we can one more level deeper to get the artistname for the track again since we have declared an artist field for the track. Thus the track row with track ID, name and artist ID will be passed to the get-artist function again. Since we have the artist ID we can get the artistname again one level deeper. We can keep doing this but we have to remember the fact that it this callback is done for each row. So if an artist has 10 tracks and we do the same thing it will result in 10 function calls to get the result. Hence as we go deeper and deeper the amount of calls increase a lot. Instead of returning fixed set of results we can use our data retrieval logics there. The below function is the actual get-artist function as part of the repo that uses HoneySQL to construct the query and returns the results. ( defn get-artist [ context arguments value ] ( let [{ :keys [ id name ]} arguments { id :trackartist, :or { id id }} value query ( -> ( select :* ) ( merge-where ( if ( some? id ) [ := :artistid id ])) ( merge-where ( if ( some? name ) [ := :artistname name ])) ( from :artist ) sql/format ) result ( jdbc/query db query )] result )) GraphQL mutations So we are done with the read part but what about the write part which is a significant other half in the application. GraphQL uses the concept of mutations to handle writes. The mutations part is similar to query except that we make insert instead of using select queries. The below function is the create-artist resolver that gets the artist’s name and creates an artist entry in the table. Here we get the artist name and insert it into the table. The last inserted row is returned. Since we have specified the return type to return artist object we can filter the output fields as in the queries. The following mutation creates an artist named Amy and returns the ID and name. ( defn create-artist [ context arguments value ] ( let [{ :keys [ artistname ]} arguments insert-stmt ( -> ( insert-into :artist ) ( columns :artistname ) ( values [[ artistname ]]) ( sql/format )) result ( jdbc/execute! db insert-stmt ) res-query ( -> ( select :* ) ( from :artist ) ( order-by [ :artistid :desc ]) ( limit 1 ) sql/format ) artist ( jdbc/query db res-query )] artist )) Mutation : mutation { createArtist(artistname: "Amy") { artistname artistid } } Result : { "data": { "createArtist": [ { "artistname": "Amy", "artistid": 17 } ] } } Renaming keys In addition to the query part GraphQL allows the frontend team to rename the keys in the result as they need. This is done by specifying the key name before the field name. The below query returns the result with artistname key as simply name query { artist(id: 1) { name: artistname } } { "data": { "artist": [ { "name": "Kiara" } ] } } Declarative queries Since the queries are declarative in nature we can easily maintain them and also change them over time. Since it’s far easy to resolve the relations we can also write less and to fill a lot of use cases. In a music app when the user loves a song the artist and genre details can be retrieved easily. Similarly we can list all the other songs by the artist to the user thus building cohesive profiles using data from lot of endpoints in REST will be a single query in GraphQL. IGraphQL IGraphQL is sort of an IDE that makes the development a lot more interactive. It also generates docs from the schema file thus we can make explore on the fields with more ease and interactivity compared to something like a Swagger setup. Sample use cases In case of source code we can get the commits and get the author details along with other repositories by the other using the same language as the source code. In case of a shopping cart app we can display an item and retrieve all the other different items to show to the user with retrieving only the necessary fields. In case of comparing two items we can let the user determine the fields over which they need to compare and get only the relevant fields for the resource saving a lot of bandwidth in mobile apps. It enables developers to build more out of the platform instead of using GraphQL than glueing up REST calls. Testing Testing of queries is lot more easier with executing the query and then comparing the result. This makes writing more extensive tests to suit the complexity in highly related queries and also ensures that if we upgrade from one schema to another the test suite is more robust indicating the breakage involved. Disadvantages GraphQL is just a spec and hence a lot of custom code is required for supporting pagination, rate-limiting, permissions, etc. depending upon the language. Some frameworks like Django have Django REST Framework type of tooling built around it with Graphene reducing a lot of work but with respect to Clojure we need to write some more code for better control trade-off. Though the learning curve is pretty easy there is a paradigm shift involved in writing GraphQL queries after dealing with REST endpoints for a lot of years. Licensing is another major issue surrounding GraphQL though it was relicensed . The code for the post is available at GitHub . Kindly add in if I am wrong on any of the above or missed out anything in the post. Please enable JavaScript to view the comments powered by Disqus. xtreak blog xtreak blog tir.karthi@gmail.com tirkarthi tirkarthi A blog about programming, mistakes and eureka | 2026-01-13T09:30:40 |
https://www.charterworks.com/tag/skills-accelerator/ | Skills accelerator - Charter - Future of Work, AI, Management, Hybrid Try Charter Pro for $1 Latest Topics AI DEI Flexible Work Management Societal Issues Resources Briefing Work Tech Research Playbooks Case Studies Toolkits, Scripts, and other Resources Solutions Charter Pro Charter Forum Charter Pro for Teams Advisory + Strategic Services Events Upcoming and Past The AI Download Charter Cortados Leading With AI Masterclass Skills Accelerators Strategy Briefings Webinars Workplace Summit About Try Charter Pro for $1 Sign In Skills accelerator Pro Skills accelerator Learning Charter Skills Accelerator: Superlearning By Charter Staff Pro Skills accelerator Skills Charter Skills Accelerator: Learning culture By Charter Staff Pro Skills accelerator Skills Charter Skills Accelerator: Collaboration lab By Charter Staff Pro Skills accelerator Skills Charter Skills Accelerator: Hybrid readiness By Charter Staff Pro Skills accelerator Skills Charter Skills Accelerator: Rapid trust skills By Charter Staff Pro Skills accelerator Skills Charter Skills Accelerator: Strategic thinking By Charter Staff Pro Skills accelerator Skills Charter Skills Accelerator: Influence lab By Charter Staff Pro Skills accelerator Skills Charter Skills Accelerator: Internal comms for the TikTok generation By Charter Staff Pro Skills accelerator Skills Charter Skills Accelerator: Productivity lab By Charter Staff Pro Skills accelerator Skills Charter Skills Accelerator: Feedback culture By Charter Staff Pro Skills accelerator Skills Charter Skills Accelerator: Manager accelerator By Charter Staff Pro Skills accelerator Skills Charter Skills Accelerator: Inclusive leadership By Charter Staff 1 of 2 → Insights Books Interviews Charter on TIME Research Connect Events Topics Artificial Intelligence Hybrid Work DEI Leadership Charter Pro Become a Member Support Sign In Search Contact Partnerships General Inquiries Company About Careers Press Newsletters Charter Briefing Charter Works Inc. © 2025 Privacy Terms of Service | 2026-01-13T09:30:40 |
https://echorand.me/posts/linux-system-mining/ | Linux System Mining with Python Exploring Software About Posts Talks Writings and Trainings Categories Subscribe (RSS) Linux System Mining with Python January 22, 2018 In this article, we will explore the Python programming language as a tool to retrieve various information about a system running Linux. Let's get started. Which Python? When I refer to Python, I am referring to CPython 2 (2.7 to be exact). I will mention it explicitly when the same code won't work with CPython 3 (3.3) and provide the alternative code, explaining the differences. Just to make sure that you have CPython installed, type python or python3 from the terminal and you should see the Python prompt displayed in your terminal. Note Please note that all the programs have their first line as #!/usr/bin/env python meaning that, we want the Python interpreter to execute these scripts. Hence, if you make your script executable using chmod +x your-script.py , you can execute it using ./your-script.py (which is what you will see in this article). Exploring the platform module The platform module in the standard library has a number of functions which allow us to retrieve various system information. Let us start the Python interpreter and explore some of them, starting with the platform.uname() function: >>> import platform >>> platform.uname() ('Linux', 'fedora.echorand', '3.7.4-204.fc18.x86_64', '#1 SMP Wed Jan 23 16:44:29 UTC 2013', 'x86_64') If you are aware of the uname command on Linux, you will recognize that this function is an interface of sorts to this command. On Python 2, it returns a tuple consisting of the system type (or Kernel type), hostname, version, release, machine hardware and processor information. You can access individual attributes using indices, like so: >>> platform.uname()[0] 'Linux' On Python 3, the function returns a named tuple: >>> platform.uname() uname_result(system='Linux', node='fedora.echorand', release='3.7.4-204.fc18.x86_64', version='#1 SMP Wed Jan 23 16:44:29 UTC 2013', machine='x86_64', processor='x86_64') Since the returned result is a named tuple, this makes it easy to refer to individual attributes by name rather than having to remember the indices, like so: >>> platform.uname().system 'Linux' The platform module also has direct interfaces to some of the above attributes, like so: >>> platform.system() 'Linux' >>> platform.release() '3.7.4-204.fc18.x86_64' The linux_distribution() function returns details about the Linux distribution you are on. For example, on a Fedora 18 system, this command returns the following information: >>> platform.linux_distribution() ('Fedora', '18', 'Spherical Cow') The result is returned as a tuple consisting of the distribution name, version and the code name. The distributions supported by your particular Python version can be obtained by printing the value of the _supported_dists attribute: >>> platform._supported_dists ('SuSE', 'debian', 'fedora', 'redhat', 'centos', 'mandrake', 'mandriva', 'rocks', 'slackware', 'yellowdog', 'gentoo', 'UnitedLinux', 'turbolinux') If your Linux distribution is not one of these (or a derivative of one of these), then you will likely not see any useful information from the above function call. The final function from the platform module, we will look at is the architecture() function. When you call the function without any arguments, this function returns a tuple consisting of the bit architecture and the executable format of the Python executable, like so: >>> platform.architecture() ('64bit', 'ELF') On a 32-bit Linux system, you would see: >>> platform.architecture() ('32bit', 'ELF') You will get similar results if you specify any other executable on the system, like so: >>> platform.architecture(executable='/usr/bin/ls') ('64bit', 'ELF') You are encouraged to explore other functions of the platform module which among others, allow you to find the current Python version you are running. If you are keen to know how this module retrieves this information, the Lib/platform.py file in the Python source directory is where you should look into. The os and sys modules are also of interest to retrieve certain system attributes such as the native byteorder. Next, we move beyond the Python standard library modules to explore some generic approaches to access the information on a Linux system made available via the proc and sysfs file systems. It is to be noted that the information made available via these filesystems will vary between various hardware architectures and hence you should keep that in mind while reading this article and also writing scripts which attempt to retrieve information from these files. CPU Information The file /proc/cpuinfo contains information about the processing units on your system. For example, here is a Python version of what the Linux command cat /proc/cpuinfo would do: #! /usr/bin/env python """ print out the /proc/cpuinfo file """ from __future__ import print_function with open('/proc/cpuinfo') as f: for line in f: print(line.rstrip('\n')) When you execute this program either using Python 2 or Python 3, you should see all the contents of /proc/cpuinfo dumped on your screen (In the above program, the rstrip() method removes the trailing newline character from the end of each line). The next code listing uses the startswith() string method to display the models of your processing units: #! /usr/bin/env python """ Print the model of your processing units """ from __future__ import print_function with open('/proc/cpuinfo') as f: for line in f: # Ignore the blank line separating the information between # details about two processing units if line.strip(): if line.rstrip('\n').startswith('model name'): model_name = line.rstrip('\n').split(':')[1] print(model_name) When you run this program, you should see the model names of each of your processing units. For example, here is what I see on my computer: Intel(R) Core(TM) i7-3520M CPU @ 2.90GHz Intel(R) Core(TM) i7-3520M CPU @ 2.90GHz Intel(R) Core(TM) i7-3520M CPU @ 2.90GHz Intel(R) Core(TM) i7-3520M CPU @ 2.90GHz We have so far seen a couple of ways to find the architecture of the computer system we are on. To be technically correct, both those approaches actually report the architecture of the kernel your system is running. So, if your computer is actually a 64-bit computer, but is running a 32-bit kernel, then the above methods will report it as having a 32-bit architecture. To find the true architecture of the computer you can look for the lm flag in the list of flags in /proc/cpuinfo . The lm flag stands for long mode and is only present on computers with a 64-bit architecture. The next program shows how you can do this: #! /usr/bin/env python """ Find the real bit architecture """ from __future__ import print_function with open('/proc/cpuinfo') as f: for line in f: # Ignore the blank line separating the information between # details about two processing units if line.strip(): if line.rstrip('\n').startswith('flags') \ or line.rstrip('\n').startswith('Features'): if 'lm' in line.rstrip('\n').split(): print('64-bit') else: print('32-bit') As we have seen so far, it is possible to read the /proc/cpuinfo and use simple text processing techniques to read the data we are looking for. To make it friendlier for other programs to use this data, it is perhaps a better idea to make the contents of /proc/cpuinfo available as a standard data structure, such as a dictionary. The idea is simple: if you see the contents of this file, you will find that for each processing unit, there are a number of key, value pairs (in an earlier example, we printed the model name of the processor, here model name was a key). The information about different processing units are separated from each other by a blank line. It is simple to build a dictionary structure which has each of the processing unit's data as keys. For each of the these keys, the value is all the information about the corresponding processing unit present in the file /proc/cpuinfo . The next listing shows how you can do so. #!/usr/bin/env/ python """ /proc/cpuinfo as a Python dict """ from __future__ import print_function from collections import OrderedDict import pprint def cpuinfo(): ''' Return the information in /proc/cpuinfo as a dictionary in the following format: cpu_info['proc0']={...} cpu_info['proc1']={...} ''' cpuinfo=OrderedDict() procinfo=OrderedDict() nprocs = 0 with open('/proc/cpuinfo') as f: for line in f: if not line.strip(): # end of one processor cpuinfo['proc%s' % nprocs] = procinfo nprocs=nprocs+1 # Reset procinfo=OrderedDict() else: if len(line.split(':')) == 2: procinfo[line.split(':')[0].strip()] = line.split(':')[1].strip() else: procinfo[line.split(':')[0].strip()] = '' return cpuinfo if __name__=='__main__': cpuinfo = cpuinfo() for processor in cpuinfo.keys(): print(cpuinfo[processor]['model name']) This code uses an OrderedDict (Ordered dictionary) instead of a usual dictionary so that the key and values are stored in the order which they are found in the file. Hence, the data for the first processing unit is followed by the data about the second processing unit and so on. If you call this function, it returns you a dictionary. The keys of dictionary are each processing unit with. You can then use to sieve for the information you are looking for (as demonstrated in the if __name__=='__main__' block). The above program when run will once again print the model name of each processing unit (as indicated by the statement print(cpuinfo[processor]['model name']) : Intel(R) Core(TM) i7-3520M CPU @ 2.90GHz Intel(R) Core(TM) i7-3520M CPU @ 2.90GHz Intel(R) Core(TM) i7-3520M CPU @ 2.90GHz Intel(R) Core(TM) i7-3520M CPU @ 2.90GHz Memory Information Similar to /proc/cpuinfo , the file /proc/meminfo contains information about the main memory on your computer. The next program creates a dictionary from the contents of this file and dumps it. #!/usr/bin/env python from __future__ import print_function from collections import OrderedDict def meminfo(): ''' Return the information in /proc/meminfo as a dictionary ''' meminfo=OrderedDict() with open('/proc/meminfo') as f: for line in f: meminfo[line.split(':')[0]] = line.split(':')[1].strip() return meminfo if __name__=='__main__': #print(meminfo()) meminfo = meminfo() print('Total memory: {0}'.format(meminfo['MemTotal'])) print('Free memory: {0}'.format(meminfo['MemFree'])) As earlier, you could also access any specific information you are looking for by using that as a key (shown in the if __name__==__main__ block). When you execute the program, you should see an output similar to the following: Total memory: 7897012 kB Free memory: 249508 kB Network Statistics Next, we explore the network devices on our computer system. We will retrieve the network interfaces on the system and the data bytes sent and recieved by them since your system reboot. The /proc/net/dev file makes this information available. If you examine the contents of this file, you will notice that the first two lines contain header information - i.e. the first column of this file is the network interface name, the second and the third columns display information about the received and the transmitted bytes (such as total bytes sent, number of packets, errors, etc.). Our interest here is to extract the total data sent and recieved by the different network devices. The next listing shows how we can extract this information from /proc/net/dev : #!/usr/bin/env python from __future__ import print_function from collections import namedtuple def netdevs(): ''' RX and TX bytes for each of the network devices ''' with open('/proc/net/dev') as f: net_dump = f.readlines() device_data={} data = namedtuple('data',['rx','tx']) for line in net_dump[2:]: line = line.split(':') if line[0].strip() != 'lo': device_data[line[0].strip()] = data(float(line[1].split()[0])/(1024.0*1024.0), float(line[1].split()[8])/(1024.0*1024.0)) return device_data if __name__=='__main__': netdevs = netdevs() for dev in netdevs.keys(): print('{0}: {1} MiB {2} MiB'.format(dev, netdevs[dev].rx, netdevs[dev].tx)) When you run the above program, the output should display your network devices along with the total recieved and transmitted data in MiB since your last reboot as shown below: em1: 0.0 MiB 0.0 MiB wlan0: 2651.40951061 MiB 183.173976898 MiB You could probably couple this with a persistent data storage mechanism to write your own data usage monitoring program. Processes The /proc directory also contains a directory each for all the running processes. The directory names are the same as the process IDs for these processes. Hence, if you scan /proc for all directories which have digits as their names, you will have a list of process IDs of all the currently running processes. The function process_list() in the next listing returns a list with process IDs of all the currently running processes. The length of this list will hence be the total number of processes running on the system as you will see when you execute the above program. #!/usr/bin/env python """ List of all process IDs currently active """ from __future__ import print_function import os def process_list(): pids = [] for subdir in os.listdir('/proc'): if subdir.isdigit(): pids.append(subdir) return pids if __name__=='__main__': pids = process_list() print('Total number of running processes:: {0}'.format(len(pids))) The above program when executed will show an output similar to: Total number of running processes:: 229 Each of the process directories contain number of other files and directories which contain various information about the invoking command of the process, the shared libraries its using, and others. #!/usr/bin/env python """ Python interface to the /proc file system. Although this can be used as a replacement for cat /proc/... on the command line, its really aimed to be an interface to /proc for other Python programs. As long as the object you are looking for exists in /proc and is readable (you have permission and if you are reading a file, its contents are alphanumeric, this program will find it). If its a directory, it will return a list of all the files in that directory (and its sub-dirs) which you can then read using the same function. Example usage: Read /proc/cpuinfo: $ ./readproc.py proc.cpuinfo Read /proc/meminfo: $ ./readproc.py proc.meminfo Read /proc/cmdline: $ ./readproc.py proc.cmdline Read /proc/1/cmdline: $ ./readproc.py proc.1.cmdline Read /proc/net/dev: $ ./readproc.py proc.net.dev Comments/Suggestions: Amit Saha <@echorand> <http://echorand.me> """ from __future__ import print_function import os import sys import re def toitem(path): """ Convert /foo/bar to foo.bar """ path = path.lstrip('/').replace('/','.') return path def todir(item): """ Convert foo.bar to /foo/bar""" # TODO: breaks if there is a directory whose name is foo.bar (for # eg. conf.d/), but we don't have to worry as long as we are using # this for reading /proc return '/' + item.replace('.','/') def readproc(item): """ Resolves proc.foo.bar items to /proc/foo/bar and returns the appropriate data. 1. If its a file, simply return the lines in this file as a list 2. If its a directory, return the files in this directory in the proc.foo.bar style as a list, so that this function can then be called to retrieve the contents """ item = todir(item) if not os.path.exists(item): return 'Non-existent object' if os.path.isfile(item): # its a little tricky here. We don't want to read huge binary # files and return the contents. We will probably not need it # in the usual case. # utilities like 'file' on Linux and the Python interface to # libmagic are useless when it comes to files in /proc for # detecting the mime type, since the these are not on-disk # files. # Searching, i find this solution which seems to be a # reasonable assumption. If we find a '\0' in the first 1024 # bytes of a file, we declare it as binary and return an empty string # however, some of the files in /proc which contain text may # also contain the null byte as a constituent character. # Hence, I use a RE expression that matches against any # combination of alphanumeric characters # If any of these conditions suffice, we read the file's contents pattern = re.compile('\w*') try: with open(item) as f: chunk = f.read(1024) if '\0' not in chunk or pattern.match(chunk) is not None: f.seek(0) data = f.readlines() return data else: return '{0} is binary'.format(item) except IOError: return 'Error reading object' if os.path.isdir(item): data = [] for dir_path, dir_name, files in os.walk(item): for file in files: data.append(toitem(os.path.join(dir_path, file))) return data if __name__=='__main__': if len(sys.argv)>1: data = readproc(sys.argv[1]) else: data = readproc('proc') if type(data) == list: for line in data: print(line) else: print(data) Block devices The next program lists all the block devices by reading from the sysfs virtual file system. The block devices on your system can be found in the /sys/block directory. Thus, you may have directories such as /sys/block/sda, /sys/block/sdb and so on. To find all such devices, we perform a scan of the /sys/block directory using a simple regular expression to express the block devices we are interested in finding. #!/usr/bin/env python """ Read block device data from sysfs """ from __future__ import print_function import glob import re import os # Add any other device pattern to read from dev_pattern = ['sd.*','mmcblk*'] def size(device): nr_sectors = open(device+'/size').read().rstrip('\n') sect_size = open(device+'/queue/hw_sector_size').read().rstrip('\n') # The sect_size is in bytes, so we convert it to GiB and then send it back return (float(nr_sectors)*float(sect_size))/(1024.0*1024.0*1024.0) def detect_devs(): for device in glob.glob('/sys/block/*'): for pattern in dev_pattern: if re.compile(pattern).match(os.path.basename(device)): print('Device:: {0}, Size:: {1} GiB'.format(device, size(device))) if __name__=='__main__': detect_devs() If you run this program, you will see output similar to as follows: Device:: /sys/block/sda, Size:: 465.761741638 GiB Device:: /sys/block/mmcblk0, Size:: 3.70703125 GiB When I run the program, I had a SD memory card plugged in as well and hence you can see that the program detects it. You can extend this program to recognize other block devices (such as virtual hard disks) as well. Building command line utilities One ubiquitious part of all Linux command line utilities is that they allow the user to specify command line arguments to customise the default behavior of the program. The argparse module allows your program to have an interface similar to built-in Linux utilities. The next listing shows a program which retrieves all the users on your system and prints their login shells (using the pwd standard library module): #!/usr/bin/env python """ Print all the users and their login shells """ from __future__ import print_function import pwd # Get the users from /etc/passwd def getusers(): users = pwd.getpwall() for user in users: print('{0}:{1}'.format(user.pw_name, user.pw_shell)) if __name__=='__main__': getusers() When run the program above, it will print all the users on your system and their login shells. Now, let us say that you want the program user to be able to choose whether he or she wants to see the system users (like daemon , apache ). We will see a first use of the argparse module to implement this feature in by extending the previous listing as follows. #!/usr/bin/env python """ Utility to play around with users and passwords on a Linux system """ from __future__ import print_function import pwd import argparse import os def read_login_defs(): uid_min = None uid_max = None if os.path.exists('/etc/login.defs'): with open('/etc/login.defs') as f: login_data = f.readlines() for line in login_data: if line.startswith('UID_MIN'): uid_min = int(line.split()[1].strip()) if line.startswith('UID_MAX'): uid_max = int(line.split()[1].strip()) return uid_min, uid_max # Get the users from /etc/passwd def getusers(no_system=False): uid_min, uid_max = read_login_defs() if uid_min is None: uid_min = 1000 if uid_max is None: uid_max = 60000 users = pwd.getpwall() for user in users: if no_system: if user.pw_uid >= uid_min and user.pw_uid <= uid_max: print('{0}:{1}'.format(user.pw_name, user.pw_shell)) else: print('{0}:{1}'.format(user.pw_name, user.pw_shell)) if __name__=='__main__': parser = argparse.ArgumentParser(description='User/Password Utility') parser.add_argument('--no-system', action='store_true',dest='no_system', default = False, help='Specify to omit system users') args = parser.parse_args() getusers(args.no_system) On executing the above program with the --help option, you will see a nice help message with the available options (and what they do): $ ./getusers.py --help usage: getusers.py [-h] [--no-system] User/Password Utility optional arguments: -h, --help show this help message and exit --no-system Specify to omit system users An example invocation of the above program is as follows: $ ./getusers.py --no-system gene:/bin/bash When you pass an invalid parameter, the program complains: $ ./getusers.py --param usage: getusers.py [-h] [--no-system] getusers.py: error: unrecognized arguments: --param Let us try to understand in brief how we used argparse in the above program. The statement: parser = argparse.ArgumentParser(description='User/Password Utility') creates a new ArgumentParser object with an optional description of what this program does. Then, we add the arguments that we want the program to recognize using the add_argument() method in the next statement: parser.add_argument('--no-system', action='store_true', dest='no_system', default = False, help='Specify to omit system users') . The first argument to this method is the name of the option that the program user will supply as an argument while invoking the program, the next parameter action=store_true indicates that this is a boolean option. That is, its presence or absence affects the program behavior in some way. The dest parameter specifies the variable in which the value that the value of this option will be available to the program. If this option is not supplied by the user, the default value is False which is indicated by the parameter default = False and the last parameter is the help message that the program displays about this option. Finally, the arguments are parsed using the parse_args() method: args = parser.parse_args() . Once the parsing is done, the values of the options supplied by the user can be retrieved using the syntax args.option_dest , where option_dest is the dest variable that you specified while setting up the arguments. This statement: getusers(args.no_system) calls the getusers() function with the option value for no_system supplied by the user. The next program shows how you can specify options which allow the user to specify non-boolean preferences to your program. This program is a rewrite of Listing 6, with the additional option to specify the network device you may be interested in. #!/usr/bin/env python from __future__ import print_function from collections import namedtuple import argparse def netdevs(iface=None): ''' RX and TX bytes for each of the network devices ''' with open('/proc/net/dev') as f: net_dump = f.readlines() device_data={} data = namedtuple('data',['rx','tx']) for line in net_dump[2:]: line = line.split(':') if not iface: if line[0].strip() != 'lo': device_data[line[0].strip()] = data(float(line[1].split()[0])/(1024.0*1024.0), float(line[1].split()[8])/(1024.0*1024.0)) else: if line[0].strip() == iface: device_data[line[0].strip()] = data(float(line[1].split()[0])/(1024.0*1024.0), float(line[1].split()[8])/(1024.0*1024.0)) return device_data if __name__=='__main__': parser = argparse.ArgumentParser(description='Network Interface Usage Monitor') parser.add_argument('-i','--interface', dest='iface', help='Network interface') args = parser.parse_args() netdevs = netdevs(iface = args.iface) for dev in netdevs.keys(): print('{0}: {1} MiB {2} MiB'.format(dev, netdevs[dev].rx, netdevs[dev].tx)) When you execute the program without any arguments, it behaves exactly as the earlier version. However, you can also specify the network device you may be interested in. For example: $ ./net_devs_2.py em1: 0.0 MiB 0.0 MiB wlan0: 146.099492073 MiB 12.9737148285 MiB virbr1: 0.0 MiB 0.0 MiB virbr1-nic: 0.0 MiB 0.0 MiB $ ./net_devs_2.py --help usage: net_devs_2.py [-h] [-i IFACE] Network Interface Usage Monitor optional arguments: -h, --help show this help message and exit -i IFACE, --interface IFACE Network interface $ ./net_devs_2.py -i wlan0 wlan0: 146.100307465 MiB 12.9777050018 MiB System-wide availability of your scripts With the help of this article, you may have been able to write one or more useful scripts for yourself which you want to use everyday like any other Linux command. The easiest way to do is make this script executable and setup a BASH alias to this script. You could also remove the .py extension and place this file in a standard location such as /usr/local/sbin . Other useful standard library modules Besides the standard library modules we have already looked at in this article so far, there are number of other standard modules which may be useful: subprocess, ConfigParser, readline and curses. What next? At this stage, depending on your own experience with Python and exploring Linux internals, you may follow one of the following paths. If you have been writing a lot of shell scripts/command pipelines to explore various Linux internals, take a look at Python. If you wanted a easier way to write your own utility scripts for performing various tasks, take a look at Python. Lastly, if you have been using Python for programming of other kinds on Linux, have fun using Python for exploring Linux internals. Resources Python resources Lists Tuples Namedtuples OrderedDict split() strip() rstrip() and other string methods Reading and writing files os module platform module pwd module spwd module grp module subprocess module ConfigParser module readline module System Information Long Mode /proc file system sysfs Post managed in a git repo | Last Commit on this post | Edit post Blog managed via Hugo and using a modified version of the Etch theme. | 2026-01-13T09:30:40 |
http://tirkarthi.github.io/life/2019/03/29/on-death-of-a-puppy.html | On death of a puppy xtreak blog whoami Comics Poems On death of a puppy Mar 29, 2019 I moved to Chennai around 5 years back for work and luckily (unfortunate for him?) got one of my college roommates to stay with me. The street had a dog that would occasionally get food from one of the houses. After a few weeks it gave birth to a puppy. The puppy was cute, white and had a noticeable black mark around it’s left eye making it more pretty. People along the streets would watch it in wonder as it strolls around and pat it sometimes. They would also feed it with a crumple of snacks they buy along to their room. One day the puppy somehow managed to reach the service roads along the corridor of the main road and it seemed a car or truck rammed on it in the morning. The puppy was small and just had it skin teared out with intestines laying upon on the road. Someone seemed to have moved it to the farther end. Nobody cared and they just made sure their vehicle just didn’t touch it and moved along in sideways. To add more to that in the evening someone again seemed to have rammed on it again and the body was now totally fleshless with only a fur of skin flat and filled with dust. All the love and joy that little puppy shared around just evaporated in a moment and all that is now left is a disgruntled memory about it’s body. There could have been places the puppy could have went and people it shared moments with but in a flash it’s no more. To be little more honest the same chances of it occurring to me or the other person I see across the street are more or less the same. Though humans have better access to medical facilities and so on theoretically the chances of death are almost the same. The other thing about death is that it has a rippling effect on others lives too. As much as the joy brought in creation of life to others it leaves upon the same (or more amount) of sadness when death ensues. It increases even more when someone dies young since it makes their loved ones think about all the things that they could have done. Sometimes it even takes a lot of years before someone gets to accept the fact of death to move on. It’s one of the reasons where things like war, epidemic diseases, etc. leave a long term dent in a lot of lives indirectly collectively adding up the impact of death of a single person. Just like the puppy that could have had a life, all the things that I delay now for the future that lies in uncertainty is also reduces the probability of actually getting to that point. It just doesn’t stop with me I have to also watch my parents age. Small scars or injuries that used to cure quickly in the past now take up time as a fact of ageing. Just as they have to be more careful they watch me age as well on trying to cope up with these things. Sadly, this is not one of the facts that were taught about and something a person has to cope up with on their own personal terms. The thing that made me write about this is that I saw another couple of puppies yesterday that were playing along. They were at a hospital that opened up near my house. The security guard bought them a couple of biscuits and they snuggled around his legs with a tiny scream. As much death takes it all away it doesn’t really stop us from making moments that we know will just be memories someday. Maybe that’s a great quality of love and kindness that I need to value more and more along with also knowing the fact I am treading down the path filled with uncertainty. It’s not the first time I am writing about death and for some reason I tend to get to it once a year . Reopens when breath becomes air by Paul Kalanithi Please enable JavaScript to view the comments powered by Disqus. xtreak blog xtreak blog tir.karthi@gmail.com tirkarthi tirkarthi A blog about programming, mistakes and eureka | 2026-01-13T09:30:40 |
https://aws.amazon.com/blogs/networking-and-content-delivery/network-load-balancers-now-support-weighted-target-groups/ | Network Load Balancers now support Weighted Target Groups | Networking & Content Delivery Skip to Main Content Filter: All English Contact us AWS Marketplace Support My account Search Filter: All Sign in to console Create account AWS Blogs Home Blogs Editions Networking & Content Delivery Network Load Balancers now support Weighted Target Groups by Tyler Applebaum and Milind Kulkarni on 19 NOV 2025 in Elastic Load Balancing , Networking & Content Delivery Permalink Share Today Amazon Web Services (AWS) is launching weighted target groups for Network Load Balancers (NLB) . This feature allows users to configure static weights among multiple NLB target groups. Weighted target groups enable you to easily perform blue/green or canary deployment strategies with zero downtime and without the need of multiple load balancers. This feature is available now on new and existing NLBs in all commercial Regions, including GovCloud Regions. Prior to the introduction of this feature, users needed to configure multiple NLBs with separate target groups and manage weights in Route 53. Weighted target groups allow you to reduce infrastructure costs and operational overhead. Users can assign numeric weights between 0 and 999 to each NLB target group. Traffic will continue to be distributed across all configured Availability Zones but can now be influenced by a weight metric. Figure 1: NLB with equal-weight target groups In the example shown in Figure 1, Target Groups A and B are set to receive an equal share of traffic by configuring an equal weight of 25 on each target group. Target group weights are configurable as integers, with valid values from 0 – 999. If each target group contains three Amazon EC2 instances, then each instance will handle approximately 16.66% of the total load (50% / 3 instances). Prerequisites This post assumes you are familiar with NLBs and the component target groups and listeners . Use Cases 1) Blue/Green Deployment If you maintain multiple versions of your application in a blue/green deployment, you can now use NLB weighted target groups to steer traffic between them. Figure 2: Target group weight detail To modify the weight of each target group, use the AWS Management Console , NLB ModifyListener API, or the AWS Command Line Interface (AWS CLI) . aws elbv2 modify-listener \ --listener-arn <Listener ARN> \ --protocol TCP \ --port 443 \ --default-actions '[{ "Type": "forward", "ForwardConfig": { "TargetGroups": [{ "TargetGroupArn": "<Target Group Blue ARN>", "Weight": 0 }, { "TargetGroupArn": "<Target Group Green ARN>", "Weight": 100 }] } }]' The result will shift new traffic from the Blue target group to the Green target group after a short period of up to 3 minutes. 2) Performing Target Group Maintenance If your application is split into multiple target groups, you can adjust the weights of your target groups to perform maintenance on a portion of your compute instances. In this example, traffic is distributed across three target groups with an equal weight. Figure 3: Equal-weighted target groups To perform maintenance on the instances in the NLB-WTG-1-IPv6 target group, adjust the weight of that group to zero so that it will not receive new traffic. After the weight adjustment: Figure 4: Traffic shifted from three target groups to two While the integers of 33 remain the same, the overall total of 66 is now only split between the two groups, resulting in a 50% distribution of traffic. You can verify the traffic flow by inspecting the NewFlowCount Amazon CloudWatch metric with the TargetGroup dimension selected. Figure 5: The CloudWatch NewFlowCount metric displaying data using the TargetGroup dimension Figure 5 depicts three target groups with equal weights. Over time, the request distribution becomes more evenly balanced across all three target groups. Figure 6: Two target groups share an equal load after removing one target group from service Figure 6 depicts the result of setting one of the to a zero weight. The requests continue to be balanced between the two remaining active target groups. Considerations Listener Types Each listener that contains weighted target groups must contain target groups that consist of just one protocol. A single listener cannot contain TCP and TLS weighted target groups together. For example, a blue/green deployment with a TLS listener must contain all TLS or all TCP target groups. A “blue” TCP target group cannot be weighted with a “green” TLS target group. Stickiness Weighted target groups support stickiness for TCP, UDP and TCP_UDP listeners. The stickiness setting is configured at the listener level under Load Balancer details and applies to all target groups associated with the listener. if a target group weight changes, or a target group is added or removed. By default, stickiness is not enabled. Mixed IP Address Types As of the writing of this blog post, an NLB listener must contain weighted target groups with the same internet protocol version, either all IPv4, or all IPv6. Monitoring The launch of weighted target groups for these existing NLB CloudWatch metrics: NewFlowCount, NewFlowCount_TCP, NewFlowCount_TLS, NewFlowCount_UDP, ActiveFlowCount, ActiveFlowCount_TCP, ActiveFlowCount_TLS, and ActiveFlowCount_UDP. These existing metrics can now be viewed on a per-target group basis to compare flow counts between target groups. Compare the new and active flow counts of different target groups to determine the effective traffic weights among the target groups. Weighted Routing Evaluation Use the weighted routing evaluation feature located in the listener details console page to evaluate target distribution and detailed cross-zone settings. This feature can help identify inconsistencies like unequal numbers of targets in each load balancer zone, which would impact the configured target group weights if cross-zone load balancing is disabled. Figure 7: The weighted routing evaluation feature in the NLB console In Figure 8, below, I have three target groups with one target in each Availability Zone. Cross-zone load balancing is enabled, so this is still a valid configuration. Figure 8: Weighted routing evaluation results Conclusion Use weighted target groups to improve flexibility in traffic steering to your NLB target groups. Whether you’re supporting a blue/green deployment, a canary deployment, or distributing traffic in a custom way, create a weighted target group today and try your use case. To get started with weighted target groups, visit the target groups section on the console or check out the weighted target group documentation . About the authors Tyler Applebaum Tyler is a Sr. Solutions Architect in the Charlotte, NC area helping customers migrate to AWS and modernize their applications. He has previous experience as a network engineer working in healthcare and finance. Milind Kulkarni Milind is a Principal Product Manager at Amazon Web Services (AWS). He has over 20 years of experience in networking, data center architectures, SDN/NFV, and cloud computing. He is a co-inventor of nine US Patents and has co-authored three IETF Standards. TAGS: Elastic Load Balancing , Network Load Balancer , Networking , Networking & Content Delivery Resources Networking Products Getting Started Amazon CloudFront Follow Twitter Facebook LinkedIn Twitch Email Updates Create an AWS account Learn What Is AWS? What Is Cloud Computing? What Is Agentic AI? Cloud Computing Concepts Hub AWS Cloud Security What's New Blogs Press Releases Resources Getting Started Training AWS Trust Center AWS Solutions Library Architecture Center Product and Technical FAQs Analyst Reports AWS Partners Developers Builder Center SDKs & Tools .NET on AWS Python on AWS Java on AWS PHP on AWS JavaScript on AWS Help Contact Us File a Support Ticket AWS re:Post Knowledge Center AWS Support Overview Get Expert Help AWS Accessibility Legal English Back to top Amazon is an Equal Opportunity Employer: Minority / Women / Disability / Veteran / Gender Identity / Sexual Orientation / Age. x facebook linkedin instagram twitch youtube podcasts email Privacy Site terms Cookie Preferences © 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved. | 2026-01-13T09:30:40 |
https://aws.amazon.com/blogs/networking-and-content-delivery/drive-application-performance-with-application-load-balancer-target-optimizer/ | Drive application performance with Application Load Balancer Target Optimizer | Networking & Content Delivery Skip to Main Content Filter: All English Contact us AWS Marketplace Support My account Search Filter: All Sign in to console Create account AWS Blogs Home Blogs Editions Networking & Content Delivery Drive application performance with Application Load Balancer Target Optimizer by James Wenzel and Ashish Kumar on 20 NOV 2025 in Announcements , Elastic Load Balancing , Launch , Networking & Content Delivery , News Permalink Share AWS Application Load Balancer is an HTTP request load balancer designed to provide scalability through load distribution and high availability through target health detection and unhealthy target isolation. Today, we are excited to introduce ALB Target Optimizer, a powerful new feature through which ALB delivers optimal concurrency to each target. In this post, we will dive deep into how Target Optimizer works, discuss its benefits and walk through an example of how you can set it up. ALB distributes incoming requests among targets based on the configured load balancing algorithm, round robin by default. The number of concurrent requests delivered to each target can vary a lot based on the incoming client load, the amount of time it takes the backend application to process the request, the number of targets, and the load balancing algorithm. Many applications have difficulty processing too many concurrent requests. Some specialized applications, such as Large Language Models, often can only process 1 or 2 concurrent requests at a time. Traditional load balancing algorithms like round robin cannot ensure exactly 1 or 2 concurrent requests, affecting application performance for such specialized applications. Target Optimizer allows you to accurately control how many concurrent requests an application instance receives, enabling high-efficiency load balanced applications while still maintaining low latency and high availability. In the next section, we will look at the key benefits it provides. Key benefits Target Optimizer provides the following benefits: Limit concurrent requests: Target Optimizer lets you enforce a given maximum on the number of concurrent requests on a target. You can use this capability to fine-tune your application stack so that targets receive only the number of requests they can process. Optimize load balancing for low concurrency: You can use Target Optimizer for large applications and models that run at very low concurrency, where each application instance can only process a small number (e.g. 1-5) of requests at a time. With Target Optimizer, you can enforce as low as one concurrent request per target. This is perfect for applications that need strict control over concurrent requests. Reduce error-rate and latency: Without Target Optimizer, some targets could get excessive requests creating hot spots, while others could be underutilized. Hot-spotted targets get more requests than they have the capacity to process, causing clients to see errors and retry requests which adds latency. With Target Optimizer, ALB uniformly distributes the load. This eliminates errors caused by hot spots, therefore eliminating the need for client retries. Drive target utilization: With Target Optimizer, a target that completes a request immediately sends a signal indicating its readiness to ALB for the next request. This allows the targets to stay busy without becoming overloaded. Use heterogeneous targets: With Target Optimizer, you can register targets of different capacities with a target group. You can configure each target to receive requests proportional to its capacity. Prerequisites In this post, we assume that readers are familiar with the fundamentals of ALB, such as creating an ALB, creating listeners, adding rules and associating target groups. This is necessary to understand what Target Optimizer is and how it generally works. We also assume readers are familiar with running containers. This will be useful to understand the example we walk through. Introducing Target Optimizer Target optimizer augments ALB capabilities by addressing challenges that emerge with large applications or models that are compute-intensive and where an application instance can process only few requests concurrently. Inference workloads such as image generation models, large language models, etc. may run on expensive GPU hardware that can be easily impacted by small inefficiencies in load distribution. Let’s look at how ALB works and how these inefficiencies may emerge with commonplace load balancing algorithms like round robin, weighed round robin, and least outstanding requests (LoR). High-availability and redundancy are built into ALB by design. Under the hood, ALB consists of multiple independent nodes spread across multiple different AZs. Any node can answer an incoming request. Each ALB node makes independent routing decisions based on the load balancing algorithm chosen when the ALB was configured, and without regard to the target’s current capacity. This can lead to the below non-ideal situations for low concurrency workloads: A target can end up receiving more requests than it has capacity to process. This can lead to an increase in 5XX errors, in latency, and a negative impact on the target’s health if appropriate error handling is missing. Targets can become unevenly utilized when request processing times vary. For example, requests that need image generation may take longer to complete than requests that need a plain-text response. Under normal circumstances, there can be inconsistent performance which can lead to under-utilization on some targets and increased errors on others. Each ALB node is independent and has its own view of the load on a target. Since more than one node may be interacting with a single target, an ALB node is unaware of the total load on each target. This can lead to increased errors, especially when each target has capacity to process only a small number of requests at a time. Target Optimizer addresses these challenges by involving targets in load distribution. Rather than a ‘push’ model where the ALB forwards requests to targets based solely on the output of an algorithm, Target Optimizer enables a ‘pull’ model where targets ask the ALB to forward requests to them. You configure the maximum number of concurrent requests that a target can receive from the ALB. If a target has fewer requests than your configured maximum number, it lets the ALB know, and the ALB makes it eligible for processing another incoming request. The ALB forwards a request only when asked by a target. Since the target receives a request only when it can process it, the request has a much lower chance of being rejected or having to be retried by the client and a higher chance of being fulfilled. Also, since a target immediately asks the ALB for another request when one completes, Target Optimizer ensures utilization of the target fleet is high. In the next section, we will see how Target Optimizer works. Target Optimizer ALB agent Target Optimizer works with the help of an agent, provided by AWS, that runs on the target. You deploy the agent to run on the host of the application target, which then acts as a gatekeeper to your application. Using the agent, you can specify the maximum number of concurrent requests that you want the ALB to send to that application instance. The agent serves as a proxy between the ALB and the application. It establishes long-lived communication channels with the ALB nodes on which it sends metrics and other control data. The agent tracks the number of requests the target is processing. When the number of requests falls below the configured maximum number, the agent sends a signal to one of the ALB nodes asking for another request. Now that we understand how Target Optimizer works, we will give a high-level overview of how to set it up, followed by walking through a step-by-step example. Figure 1: The Target Optimizer agent is an inline proxy between the ALB and target application Setting up Target Optimizer Target Optimizer can be set up easily using three steps outlined below. We’ll cover the steps in more detail in an example later. For more information, refer to the ALB User Guide . Step 1: Install and configure the ALB agent on your targets: In this first step, you install the agent on the targets where your application resides. Since the agent serves as a proxy, you configure it by providing the port on which it will receive traffic from the ALB and the port which it will proxy traffic to. You also configure the maximum concurrent requests that you want the ALB to send to that application instance. If your application is running on Amazon Elastic Container Service and Amazon Elastic Kubernetes Service, you run the agent as a sidecar with your application container. Step 2: Create a target group with Target Optimizer enabled: You create a new target group and specify a ‘target control port’ for it. This is the port on which the agent exchanges control data with the ALB. You then register the targets created in Step 1 with this target group. Once registered, the ALB establishes control channels with the agents running on the targets. Step 3: Shift traffic to the new target group: Once your new ‘target-optimized’ target group is ready; you then modify the listener rules on your ALB to shift a portion of traffic to it. Now let’s demonstrate these steps in the section below. Setup Example These steps are for Linux-based machine. Step 1: Install and configure the Target Optimizer agent on your targets In this step, we will launch and configure EC2 instances that we will later add to our ‘target-optimized’ target group. 1.1 Create a new EC2 instance and install Docker on it: sudo yum install docker sudo service docker start 1.2 Pull the latest agent container: docker pull public.ecr.aws/aws-elb/target-optimizer/target-control-agent:latest 1.3 Run the agent container with the following variables: TARGET_CONTROL_DATA_ADDRESS: The agent will receive application traffic from the ALB on this socket (IP:port). The port in this socket is what you will configure for your target group. TARGET_CONTROL_CONTROL_ADDRESS: The ALB establishes control channels with agents on this socket for management traffic. The port in the socket is what you configure as the target control port for the target group in Step 2. TARGET_CONTROL_DESTINATION_ADDRESS: The agent will proxy traffic to this socket. Your target application should listen on this socket. TARGET_CONTROL_MAX_CONCURRENCY: The maximum number of concurrent requests that the target will receive from the ALB. It can be between 0-1000. The default is 1. docker run -d \ --name target-optimizer-agent \ --restart unless-stopped \ --network host \ -e TARGET_CONTROL_DATA_ADDRESS=0.0.0.0:80 \ -e TARGET_CONTROL_CONTROL_ADDRESS=0.0.0.0:3000 \ -e TARGET_CONTROL_DESTINATION_ADDRESS=127.0.0.1:8080 \ -e TARGET_CONTROL_MAX_CONCURRENCY=2 \ -p 3000:3000 \ -p 80:80 \ public.ecr.aws/aws-elb/target-optimizer/target-control-agent:latest In this example, the agent running on the target instance will receive application traffic from the ALB on port 80 and proxy it to port 8080 of the loopback interface where the application is listening. It will receive management traffic from the ALB on port 3000. There are four other variables you can configure. We will look at them in a later section. Step 2: Create a new target group: 2.1 In the AWS Management Console, navigate to EC2 > Target groups. Figure 2: Creating a target group from the AWS Management Console 2.2 Provide a name and the protocol for the target group. For port, specify the port you provided for TARGET_CONTROL_DATA_ADDRESS in Step 1. Figure 3: Specifying the name, protocol, and port for a target group in the AWS Management Console 2.3 For target control port, specify the port you provided for TARGET_CONTROL_CONTROL_ADDRESS in Step 1. Figure 4: Enabling Target Optimizer on a target group by specifying a target control port 2.4 Register the instances on which the agent is running as targets in the target group. The port value should be the same as the port value in TARGET_CONTROL_DATA_ADDRESS that you provided in Step 1. Figure 5: Registering targets with the target group (Optional) Step 3: Verify your agent installation: This is a validation step for the ‘target-optimized’ target group that you’ve just created. We will verify that agents are properly set up and are proxying traffic correctly before we move production traffic to the target group. For this, we will run a default nginx server on targets in our target group. Next, we will create a test listener on the ALB that forwards traffic to the agent, which should proxy it to the Nginx server. Once we verify this setup, we will replace the Nginx container with the actual application. 3.1 On your target instances, install and run nginx on port 8080. From a shell, run: Install Nginx sudo yum install nginx -y Modify the default Nginx config to listen on 8080 sudo sed -i 's/listen\s*80;/listen 8080;/' /etc/nginx/nginx.conf Start nginx sudo systemctl start nginx Verify it’s listening on 8080 curl localhost:8080 3.2 Navigate to EC2 > Load balancers in the Management Console. Select your ALB. Note the ALB DNS name and click on Add listener. Figure 6: Adding a listener to an ALB from the AWS Management Console 3.2 Select a port (e.g. 81) for your test listener and the ‘target-optimized’ target group you created in Step 2. Figure 7: Configuring an ALB listener from the AWS Management Console 3.3 Verify that nginx is responding. From a shell on a client instance, run: curl http://<ALB DNS name>:81 It should return: HTTP/1.1 200 OK Welcome to nginx! 3.4 Now that you have verified that the agent is correctly proxying traffic to port 8080, stop the nginx server, run the actual application on port 8080 and continue with Step 4. You can also check the TargetControlActiveChannels metric in CloudWatch. When the metric value grows to become equal to the number of agents you deployed, it indicates that your agents are responding to the ALB. sudo systemctl stop nginx Step 4: Move traffic to your new ‘target optimized’ target group: 4.1 Navigate to EC2 > Load Balancers in the Management Console. Select your ALB and the listener to which you want to add the ‘target optimized’ target group. Under the Manage listener drop-down select Edit listener. Figure 8: Modifying an ALB listener from the AWS Management Console 4.2 Add the ‘target-optimized’ target group you created in Step 2 and give it a weight of 1. In our example, the existing target group also has a weight of 1; therefore 50% of traffic will shift to the new ‘target-optimized’ target group. Figure 9: Shifting traffic to a new target group by modifying an ALB listener rule ALB Agent variables In addition to the variables mentioned in Step 1, you can configure the following additional variables for the ALB agent: TARGET_CONTROL_TLS_CERT_PATH: The location of the TLS certificate that the agent provides to the ALB during TLS handshake. By default, the agent generates a self-signed certificate in-memory. TARGET_CONTROL_TLS_KEY_PATH: The location of the private key corresponding to the TLS certificate that the agent provides to the ALB during TLS handshake. By default, the agent generates a private key in-memory. TARGET_CONTROL_TLS_SECURITY_POLICY: The ELB security policy that you configure for your target group. The default is ELBSecurityPolicy-2016-08. TARGET_CONTROL_PROTOCOL_VERSION: The protocol through which the ALB communicates with the agent. The default is HTTP1. RUST_LOG: The log level of the agent process. The default is info. Metrics and troubleshooting You can troubleshoot using the following metrics in CloudWatch: TargetControlRequestCount: Number of requests forwarded by ALB to the agent. TargetControlRequestRejectCount: Number of requests rejected by ALB due to no targets being ready to receive requests. This metric shows an uptick when TargetControlWorkQueueLength is zero. TargetControlActiveChannelCount: Number of active control channels between the ALB and agents. Ideally, this should be equal to the number of agents. A lower number indicates that agents are not configured properly or are not available. TargetControlNewChannelCount: Number of new channels created between the ALB and agents. You will see an uptick in this metric when a new target is successfully added to the target group. TargetControlChannelErrorCount: Number of control channels between ALB and agents that failed to establish or experienced an unexpected error. A control channel error will result in that agent (and target) not receiving any application traffic. TargetControlWorkQueueLength: Number of signals received by the ALB from agents asking for requests. TargetControlProcessedBytes: Number of bytes processed by ALB for traffic going to target groups that enable target optimizer. Things to know New vs existing target groups: Target optimizer cannot be enabled on an existing target group. To use target optimizer, you must create a new target group. Supported target types: Targets of type ‘instance’ and ‘IP’ are supported with target optimizer. Targets of type ‘Lambda’ are not supported. Health checks: With Target Optimizer, we recommend you set the health-check port of your target group to be the same as the port in TARGET_CONTROL_DATA_ADDRESS. This way, the target will fail health checks if the agent is unhealthy. Attributes supported: For target optimizer, the load balancing algorithm type is ‘round robin’. AWS Load Balancer Controller: If you are using EKS, v2.16 of the AWS Load Balancer Controller has new annotations for Target Optimizer. ALB Agent: The agent uses insignificant resources that should not affect the target’s health or performance. Conclusion In this post, we introduced Target Optimizer for Application Load Balancer. We explained how it works and walked through an example of how to configure it. This feature allows you to factor in the capacity of your targets and helps you optimize the performance and efficiency of your application stack for workloads that require strict concurrency. Target Optimizer is available in all commercial AWS Regions, AWS GovCloud (US) Regions, and AWS China. Traffic to target groups that enable target optimizer is charged differently on the ALB. To learn more about the feature, please refer to the ALB user guide and pricing page . About the authors Ashish Kumar is a Senior Product Manager Tech at AWS, based out of the San Francisco Bay Area. He manages advanced cloud services in the virtual private cloud and application networking areas, such as AWS PrivateLink, VPC Lattice, and Elastic Load Balancing. Ashish has a bachelor’s from the Indian Institute of Technology Guwahati and an MBA and master’s in business analytics from the University of Notre Dame, USA. Jamie Wenzel Jamie is a Principal SA networking specialist in the EC2 Networking. Jamie is part of the application networking organization contributing to the design of application networking products and services. He is an avid public speaker at re:invent, re:inforce, lofts, summits and twitch. He has been with amazon for 6+ years and is passionate about helping people and organizations in their cloud journeys. Resources Networking Products Getting Started Amazon CloudFront Follow Twitter Facebook LinkedIn Twitch Email Updates Create an AWS account Learn What Is AWS? What Is Cloud Computing? What Is Agentic AI? Cloud Computing Concepts Hub AWS Cloud Security What's New Blogs Press Releases Resources Getting Started Training AWS Trust Center AWS Solutions Library Architecture Center Product and Technical FAQs Analyst Reports AWS Partners Developers Builder Center SDKs & Tools .NET on AWS Python on AWS Java on AWS PHP on AWS JavaScript on AWS Help Contact Us File a Support Ticket AWS re:Post Knowledge Center AWS Support Overview Get Expert Help AWS Accessibility Legal English Back to top Amazon is an Equal Opportunity Employer: Minority / Women / Disability / Veteran / Gender Identity / Sexual Orientation / Age. x facebook linkedin instagram twitch youtube podcasts <path d="M14.8571 13.1432V6.28606C14.6667 6.50035 14.4613 6.69678 14.2411 6.87535C12.6458 8.10154 11.378 9.10749 10.4375 9.89321C10.1339 10.1492 9.88691 10.3486 9.69643 10.4914C9.50595 10.6343 9.24851 10.7786 8. | 2026-01-13T09:30:40 |
https://llvm.org/doxygen/classPostfixQualifiedType.html#ac7d251dd7e33171ba26e128450ba97f9 | LLVM: PostfixQualifiedType Class Reference LLVM  22.0.0git Public Member Functions | List of all members PostfixQualifiedType Class Reference final #include " llvm/Demangle/ItaniumDemangle.h " Inheritance diagram for PostfixQualifiedType: This browser is not able to show SVG: try Firefox, Chrome, Safari, or Opera instead. [ legend ] Public Member Functions   PostfixQualifiedType ( const Node *Ty_, std::string_view Postfix_) template<typename Fn> void  match (Fn F ) const void  printLeft ( OutputBuffer &OB) const override Public Member Functions inherited from Node   Node ( Kind K_, Prec Precedence_= Prec::Primary , Cache RHSComponentCache_= Cache::No , Cache ArrayCache_= Cache::No , Cache FunctionCache_= Cache::No )   Node ( Kind K_, Cache RHSComponentCache_, Cache ArrayCache_= Cache::No , Cache FunctionCache_= Cache::No ) template<typename Fn> void  visit (Fn F ) const   Visit the most-derived object corresponding to this object. bool   hasRHSComponent ( OutputBuffer &OB) const bool   hasArray ( OutputBuffer &OB) const bool   hasFunction ( OutputBuffer &OB) const Kind   getKind () const Prec   getPrecedence () const Cache   getRHSComponentCache () const Cache   getArrayCache () const Cache   getFunctionCache () const virtual bool   hasRHSComponentSlow ( OutputBuffer &) const virtual bool   hasArraySlow ( OutputBuffer &) const virtual bool   hasFunctionSlow ( OutputBuffer &) const virtual const Node *  getSyntaxNode ( OutputBuffer &) const void  printAsOperand ( OutputBuffer &OB, Prec P = Prec::Default , bool StrictlyWorse=false) const void  print ( OutputBuffer &OB) const virtual bool   printInitListAsType ( OutputBuffer &, const NodeArray &) const virtual std::string_view  getBaseName () const virtual  ~Node ()=default DEMANGLE_DUMP_METHOD void  dump () const Additional Inherited Members Public Types inherited from Node enum   Kind : uint8_t enum class   Cache : uint8_t { Yes , No , Unknown }   Three-way bool to track a cached value. More... enum class   Prec : uint8_t {    Primary , Postfix , Unary , Cast ,    PtrMem , Multiplicative , Additive , Shift ,    Spaceship , Relational , Equality , And ,    Xor , Ior , AndIf , OrIf ,    Conditional , Assign , Comma , Default }   Operator precedence for expression nodes. More... Protected Attributes inherited from Node Cache   RHSComponentCache : 2   Tracks if this node has a component on its right side, in which case we need to call printRight. Cache   ArrayCache : 2   Track if this node is a (possibly qualified) array type. Cache   FunctionCache : 2   Track if this node is a (possibly qualified) function type. Detailed Description Definition at line 495 of file ItaniumDemangle.h . Constructor & Destructor Documentation ◆  PostfixQualifiedType() PostfixQualifiedType::PostfixQualifiedType ( const Node * Ty_ , std::string_view Postfix_  ) inline Definition at line 500 of file ItaniumDemangle.h . References Node::Node() . Member Function Documentation ◆  match() template<typename Fn> void PostfixQualifiedType::match ( Fn F ) const inline Definition at line 503 of file ItaniumDemangle.h . References F . ◆  printLeft() void PostfixQualifiedType::printLeft ( OutputBuffer & OB ) const inline override virtual Implements Node . Definition at line 505 of file ItaniumDemangle.h . References Node::OutputBuffer . The documentation for this class was generated from the following file: include/llvm/Demangle/ ItaniumDemangle.h Generated on for LLVM by  1.14.0 | 2026-01-13T09:30:40 |
https://www.timeforkids.com/k1/topics/arts/ | TIME for Kids | Arts | Topic | K-1 Skip to main content Search Articles by Grade level Grades K-1 Articles Grade 2 Articles Grades 3-4 Articles Grades 5-6 Articles Topics Animals Arts Ask Angela Books Business Careers Community Culture Debate Earth Science Education Election 2024 Engineering Environment Food and Nutrition Games Government History Holidays Inventions Movies and Television Music and Theater Nature News People Places Podcasts Science Service Stars Space Sports The Human Body The View Transportation Weather World Young Game Changers Your $ Financial Literacy Content Grade 4 Edition Grade 5-6 Edition For Grown-ups Resource Spotlight Also from TIME for Kids: Log In role: none user_age: none editions: The page you are about to enter is for grown-ups. Enter your birth date to continue. Month (MM) 01 02 03 04 05 06 07 08 09 10 11 12 Year (YYYY) 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949 1950 1951 1952 1953 1954 1955 1956 1957 1958 1959 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025 2026 Submit Arts Arts My Cool Job March 3, 2023 Meet Cheresse Thornhill-Goldson. She is a sneaker designer. She has designed shoes for athletes and other people. She also mentors students. They follow in her footsteps. Learn more about her career. Starting Out Thornhill-Goldson started drawing sneakers in fifth grade.… Audio Spanish History Cave Art February 21, 2020 Some caves are full of art. Thousands of years ago, humans drew on their walls. Cave art can teach us something about people who lived long ago. Take a look. Magura Cave, Bulgaria These paintings show scenes of hunting, dancing,… Audio World A World of Music September 18, 2018 People all over the world make music. Here are instruments from different continents. Which instrument is your favorite? This is a guiro. It comes from South America. The instrument is made from a hollow gourd. It has ridges. A player… Audio Spanish Contact us Privacy policy California privacy Terms of Service Subscribe CLASSROOM INTERNATIONAL © 2026 TIME USA, LLC. All Rights Reserved. Powered by WordPress.com VIP | 2026-01-13T09:30:40 |
https://opensource.com/resources/organizations | Open source organizations | Opensource.com Skip to main content User account menu Log in RSS Main navigation Articles Resources What is open source? The open source way Projects and applications Organizations Open source alternatives Alternatives to Acrobat Alternatives to AutoCAD Alternatives to Dreamweaver Alternatives to Gmail Alternatives to MATLAB Alternatives to Minecraft Alternatives to Google Photos Alternatives to Photoshop Alternatives to Skype Alternatives to Slack Alternatives to Trello More... Linux Downloads Frequently Asked Questions Search Open source organizations Image by: Opensource.com There are quite a number of not-for-profit and charitable organizations supporting the open source software movement. These are some we think you should know about. Apache Software Foundation The  Apache Software Foundation  provides organizational, legal, and financial support for a broad range of open source software projects. The foundation provides an established framework for intellectual property and financial contributions that simultaneously limits contributors' potential legal exposure. Cloud Native Computing Foundation The  Cloud Native Computing Foundation 's (CNCF) mission is to promote adoption of distributed computing and "cloud-native" systems, which it defines as being container packaged, dynamically managed, and microservices oriented. A project of the Linux Foundation, CNCF hosts the Kubernetes cloud orchestration system and other cloud-native open source projects. Digital Freedom Foundation Digital Freedom Foundation  sponsors annual events to promote free software, hardware, and content. Its events are Software Freedom Day, Document Freedom Day, Hardware Freedom Day, and Education Freedom Day. The Document Foundation The  Document Foundation  is the home of the LibreOffice free and open source office suite. It is an independent, self-governing, meritocratic entity, created by former leaders of the OpenOffice.org Community, in the form of a charitable foundation under German law (gemeinnützige rechtsfähige Stiftung des bürgerlichen Rechts). Drupal Association The  Drupal Association  fosters and supports the Drupal content management software project. It helps the Drupal community with funding, infrastructure, education, promotion, distribution, and online collaboration. Eclipse Foundation The Eclipse Foundation provides our global community of developers and member organizations with a business-friendly environment for open source software collaboration and innovation. The Foundation is home to the Eclipse IDE, Jakarta EE, and open source projects, including runtimes, tools, specifications, and frameworks for cloud and edge applications, IoT, AI, automotive, and more. Free Software Foundation The  Free Software Foundation 's (FSF) mission is to defend computer users' freedom and rights. It promotes the "development and use of free (as in freedom) software and documentation" and campaigns against digital rights management, software patents, and other threats to computer user freedom. Free Software Foundation Europe The  Free Software Foundation Europe 's (FSFE) is a sister organization to the FSF. Its goal is to help people understand how Free Software contributes to freedom, transparency, and self-determination. It fosters Free Software adoption, encouraging people to use and develop Free Software, and providing resources to enable everyone to further promote Free Software in Europe. GNOME Foundation The  GNOME Foundation  is a nonprofit organization that supports the GNOME project and its contributors. The foundation provides resources and infrastructure, steers releases, determines what software is part of the project, and acts as the project's public face and voice. KDE e.V. KDE eingetragener Verein  (German for "registered association") is a nonprofit organization that represents the open source KDE Project in legal and financial matters. It holds the KDE trademark and other property for the KDE community, as well as organizing events and generating sponsorships to support KDE development. Linux Foundation Founded in 2000, the  Linux Foundation  sponsors the work of Linux creator Linus Torvalds and is supported by leading technology companies and developers around the world. The Linux Foundation is the nonprofit consortium dedicated to fostering the growth of Linux. Linux Professional Institute Founded in 1999,  Linux Professional Institute  (LPI) is a Canadian nonprofit organization that advocates for and assists in the professional use of Linux, open source, and free software. Its purpose is to "enable economic and creative opportunities for everybody by making open source knowledge and skills certification universally accessible." Mozilla Foundation The  Mozilla Foundation  is dedicated to the idea that the internet must always remain an open and accessible global public resource for everyone. Operating as a social enterprise, the foundation is the sole shareholder in the Mozilla Corporation, which makes the Firefox browser software and other open source tools. NetBSD NetBSD is a free and highly portable Unix-like open source operating system. It's available for a wide range of platforms, from large-scale servers and powerful desktop systems to handheld and embedded devices, making it ideal for rescuing old "end of life" hardware. OASIS Open OASIS Open is where individuals, organizations, and governments come together to solve some of the world’s biggest technical challenges through the development of open code and open standards. Open Bioinformatics Foundation The  Open Bioinformatics Foundation  advocates for open source software within the biological research community. Among its activities, it supports conferences, runs hackathons, and participates in the Google Summer of Code. Open Education Consortium The  Open Education Consortium  is a worldwide community of hundreds of universities and associated organizations that advocates for the free and open digital publication of high quality university‐level educational materials to improve educational access and effectiveness. Open Source Automation Development Lab The  Open Source Automation Development Lab  (OSADL) is a Germany-based worldwide organization that supports open source software in the machine, machine tool, and automation industries. OSADL coordinates the development and financing of open source industrial projects on behalf of its member organizations. Open Source Geospatial Foundation The  Open Source Geospatial Foundation  (OSGeo) supports collaborative development of open source geospatial software. Major GIS-related software projects are involved in the organization; furthermore it provides financial, organizational, and legal support to the open source GIS community. Open Source For America Open Source for America  (OSFA) seeks to educate decision makers in the U.S. federal government about the benefits of free and open source software. OSFA encourages government use of open source software and serve as a voice for the open source community to the federal government. Open Source Matters Open Source Matters  (OSM) is a nonprofit organization, incorporated in the United States, created to serve the financial and legal interests of the  Joomla  project. OSM engages in regular self-assessment to ensure it is accountable to Joomla and acting in Joomla's interest. Open Source Initiative The  Open Source Initiative  (OSI) is a nonprofit corporation formed to advocate for the benefits of open source and build bridges across the open source community. It maintains the Open Source Definition and approves OCD-conformant licenses. OpenStack Foundation The  OpenStack Foundation  promotes the global development, distribution, and adoption of the OpenStack cloud operating system. As the global independent home for OpenStack, the foundation serves more than 60,000 individual members from over 180 countries around the world. Oregon State University (OSU) Open Source Lab The Oregon State University  Open Source Lab  is the home of growing, high-impact open source communities. It hosts more than 160 open source projects, including those of open source leaders including the Apache Software Foundation, the Linux Foundation, and the Drupal content management system.  Software Freedom Conservancy The  Software Freedom Conservancy  is a nonprofit organization that promotes, improves, develops, and defends free, libre, and open source software (FLOSS) projects. By providing infrastructure and non-development support services, the organization enables FLOSS developers to focus on their projects. Software Freedom Law Center The  Software Freedom Law Center  provides free legal services to free and open source projects, including licensing, copyrights, patents, trademarks, and nonprofit governance, as well as education, consulting, and training. Software in the Public Interest Software in the Public Interest  (SPI) is a nonprofit organization that handles non-technical administrative tasks for select open source projects so their developers can focus on developing and distributing open hardware and software. This work is licensed under a Creative Commons Attribution-Share Alike 4.0 International License. About This Site The opinions expressed on this website are those of each author, not of the author's employer or of Red Hat. Opensource.com aspires to publish all content under a Creative Commons license but may not be able to do so in all cases. You are responsible for ensuring that you have the necessary permission to reuse any work on this site. Red Hat and the Red Hat logo are trademarks of Red Hat, Inc., registered in the United States and other countries. A note on advertising: Opensource.com does not sell advertising on the site or in any of its newsletters. Copyright © 2021 Red Hat, Inc. Legal Privacy Policy Terms of use | 2026-01-13T09:30:40 |
https://unicef.github.io//publicgoods-accelerator-guide/design-structure-support/technical-assistance | How do I design and deliver technical assistance to DPGs? | Digital Public Goods Accelerator Guide Skip to main content Digital Public Goods Accelerator Guide GitHub Introduction About Digital Public Goods (DPGs) Sustainability of Open Source Business Models (OSBM) Designing structure and content to support Digital Public Goods (DPGs) How do I design and deliver technical assistance to DPGs? Open Source Mentorship Structure for Your Accelerator Mentorship & Resources for Startups Open-Source Governance Choosing an Open-Source License Project Management & Documentation Milestones & Challenges Business Mentorship Case Studies Nominating a DPG Appendix 🏠 Designing structure and content to support Digital Public Goods (DPGs) How do I design and deliver technical assistance to DPGs? On this page How do I design and deliver technical assistance to DPGs? Whether the startup is new to open source or already creates open source products, it is important to understand if the startup has fully considered what it means to adopt open source and what technical support the startup needs. This section will cover: Should the startup adopt open source? and Conduct a Needs Assessment on Startup Support Should the startup adopt open source? A startup will need to consider how they license and share their work. There are three main things that are important to know about -- licensing, repositories, and community building. More details will be covered further in the guide. 1. Open Source Licensing In order for a product to be considered open source, the product must be publicly released under an Open Source License . An Open Source license communicates to others that the software, hardware, or content is open source and can be freely used, modified, and shared. The license text must be included as a new file in the root directory of your public repository. Often a license is also posted in a prominent place on the website for a particular product or in the download of a software package or hardware design package. Licensing may seem like a technical detail and it is easy to overlook, but the type of license you choose can have wide-reaching and lasting effects on your company, so you must choose wisely. It is also important to decide at this stage whether you would like your license to be copyleft , which ensures that downstream derivatives stay open source; or permissive, which allows downstream derivatives to be redistributed as closed source. The guide will talk about the options for different licenses to explore: software, hardware and content. 2. Repositories Do they have an existing repository for collaboration? Open source projects often rely on many different people to contribute to the project. This collaboration can take many different forms, but often, an open source project will have a public repository, which is a directory or storage space where projects live that anyone can access, which is sometimes shortened to “repo.” Common platforms for software collaboration are GitHub, GitLab, Gogs, Gitea, Bitbucket, Sourceforge, OpenForge in India, CSDN in China, and iHub in Kenya. Resource: Interested in trying out open source for yourself? You can try making your own GitHub repository or a GitLab project . Does the repository have public documentation? In order for others to participate, a project needs thoughtful documentation in public view. Depending on the size of a project, this could mean one or many of the following things: README file placed near the license text file Dedicated documentation website (e.g. docs.example.org ) Public Q&A site Effective technical documentation enables others to become contributors. This lets others follow in your footsteps and move more quickly to meaningful contribution, instead of figuring out how to set up a project in your configuration. The technical documentation is instructional and should outline what a path to a successful contribution is. Additionally, when the documentation is published in public repositories, documentation becomes a more open project task for outside contribution and discussion. Q: How do you make sure that contributions are relevant, helpful, and in working order? A: There is usually an approvals process where a collaborator can submit a contribution and other project leaders can decide which contributions are added to the final product. Learn more about governance models in the next section of the guide. 3. Community building It is a good idea for a startup to spend time interacting with an existing open source community. This builds a stronger understanding of experiences in collaborative open source projects. Ideally, the startup should select an open source product, component, or tool already used by the startup. When selecting a project, also look for good documentation and guidance for newcomers. More established open source projects also have public fora for others to raise feedback and discuss the project. These can look like web forums, discussion mailing lists, IRC or Matrix chat rooms, recurring team video meetings, Slack or Mattermost servers, and more. Here are some examples of open source forums: Fedora Linux Discussion : a certified DPG OpenStreetMap forum Drupal forum Mozilla forum React forum Discourse forum phpBB forum D3.js forum Resource: See this CHAOSS metric on Chat Platform Inclusivity . Conduct a needs assessment on startup support Before designing or supporting the startup's open source journey and becoming a DPG, you will need to conduct a needs assessment on what support they will need. This needs assessment includes, but is not limited to: Company's Problem Statement Company's Solution Statement Piloting plan/experiment summary Piloting challenges Business Model/Scalability after pilot Product and User Development – what needs to be changed/fixed for the product to qualify as beta DPG? Company performance to date Team skills/expertise - what other areas of expertise are missing on the team and why are they crucial for the pilot? Business Strategy (business model, user/customer acquisition, potential CO scale/LTA, Potential for public funds, potential for private funds) Technical Support Plan Summary Resource: The detailed needs assessment template can be found here . Edit this page Previous Successfully Scaled DPGs Next Open Source Mentorship Structure for Your Accelerator Should the startup adopt open source? 1. Open Source Licensing 2. Repositories 3. Community building Conduct a needs assessment on startup support Docs Guide Community Twitter More GitHub Copyright © 2022 UNICEF. Built with Docusaurus. | 2026-01-13T09:30:40 |
https://www.linkedin.com/shareArticle?mini=true&title=Network%20Load%20Balancers%20now%20support%20Weighted%20Target%20Groups&source=Amazon%20Web%20Services&url=https://aws.amazon.com/blogs/networking-and-content-delivery/network-load-balancers-now-support-weighted-target-groups/ | LinkedIn Login, Sign in | LinkedIn Sign in Sign in with Apple Sign in with a passkey By clicking Continue, you agree to LinkedIn’s User Agreement , Privacy Policy , and Cookie Policy . or Email or phone Password Show Forgot password? Keep me logged in Sign in We’ve emailed a one-time link to your primary email address Click on the link to sign in instantly to your LinkedIn account. If you don’t see the email in your inbox, check your spam folder. Resend email Back New to LinkedIn? Join now Agree & Join LinkedIn By clicking Continue, you agree to LinkedIn’s User Agreement , Privacy Policy , and Cookie Policy . LinkedIn © 2026 User Agreement Privacy Policy Community Guidelines Cookie Policy Copyright Policy Send Feedback Language العربية (Arabic) বাংলা (Bangla) Čeština (Czech) Dansk (Danish) Deutsch (German) Ελληνικά (Greek) English (English) Español (Spanish) فارسی (Persian) Suomi (Finnish) Français (French) हिंदी (Hindi) Magyar (Hungarian) Bahasa Indonesia (Indonesian) Italiano (Italian) עברית (Hebrew) 日本語 (Japanese) 한국어 (Korean) मराठी (Marathi) Bahasa Malaysia (Malay) Nederlands (Dutch) Norsk (Norwegian) ਪੰਜਾਬੀ (Punjabi) Polski (Polish) Português (Portuguese) Română (Romanian) Русский (Russian) Svenska (Swedish) తెలుగు (Telugu) ภาษาไทย (Thai) Tagalog (Tagalog) Türkçe (Turkish) Українська (Ukrainian) Tiếng Việt (Vietnamese) 简体中文 (Chinese (Simplified)) 正體中文 (Chinese (Traditional)) | 2026-01-13T09:30:40 |
https://www.ovhcloud.com/it/professional-services/ | Professional Services | OVHcloud Italia Apri menu Webmail Notifications Torna al menu No pending order No pending ticket Il tuo account cliente Torna al menu Il tuo account cliente Le mie fatture I miei prodotti e servizi I miei metodi di pagamento I miei ordini I miei contatti Le mie richieste di assistenza Contatto commerciale Supporto Torna al menu Centro assistenza Livelli di supporto Professional Services Community Torna al menu OVHcloud Community OVHcloud Blog Eventi Risorse online Torna al menu Documentazione Tutorial Casi d’uso Conformità Case Study Videos Storie Formazione Italia [€] Torna al menu Europa Deutschland [€] España [€] France [€] Ireland [€] Italia [€] Nederland [€] Polska [PLN] Portugal [€] United Kingdom [£] America Canada (en) [$] Canada (fr) [$] United States [$] América Latina [$] Africa Maroc [Dhs] Sénégal [FCFA] Tunisie [DT] Oceania Australia [A$] Asia Singapore [S$] Asia [US$] India [₹] World World [$] World [€] Apri menu login Benvenuto in OVHcloud. Effettua il login per ordinare e gestire i tuoi prodotti e servizi e monitorare gli ordini. Il tuo account cliente Webmail Bare Metal e VPS Torna al menu Bare Metal e VPS Server Dedicati Torna al menu Server Dedicati Prodotti I nostri server dedicati Server Rise Novità I server Bare Metal più convenienti di OVHcloud Server Advance Novità Server polivalenti per piccole e medie imprese. Server Game Novità Per videogiochi e piattaforme di streaming Server Storage Server per archiviazione, backup e storage distribuito Server Scale Novità Progettati per infrastrutture complesse ad alta resilienza. Server High Grade I server più potenti, ottimizzati per carichi di lavoro critici Sistemi operativi e applicazioni Sistemi operativi e applicazioni ottimizzati per qualsiasi tipo di utilizzo. Disponibilità dei nostri server dedicati per Region Disponibilità dei server nelle nostre diverse Region nel mondo Bare Metal Wholesale Usufruisci di un'offerta di server Advance, Scale o High Grade in un rack completo. Casi d’uso Resilienza e AZ Grid computing SAP HANA Virtualizzazione e container Website Business Application Infrastruttura iperconvergente Software Defined Storage Big Data e Analytics Storage e backup AI, Machine Learning e Deep learning Confidential Computing Database Gaming High Performance Computing Server dedicati Eco Torna al menu Server dedicati Eco Server dedicati Eco Scopri i nostri server dedicati Eco Server Kimsufi Server a prezzi contenuti per avviare la tua attività Server So you Start Una gamma di server dedicati perfetta per startup e piccole imprese Server Rise Novità Piattaforme Intel e AMD collaudate, che combinano performance e prezzi competitivi Distribuzioni e sistemi operativi Tutte le versioni compatibili con i server Eco Casi d’uso Piattaforma di hosting di gioco Sito web e applicazioni aziendali Server email Novità Data storage Novità VPS – Server Privati Virtuali Torna al menu VPS – Server Privati Virtuali VPS – Server Privati Virtuali I nostri VPS Novità Il nostro nuovo VPS con risorse elevate a prezzi competitivi, scalabilità istantanea, sicurezza rafforzata e disponibile in tutte le nostre Region. Distribuzioni e licenze Tutte le nostre distribuzioni e licenze disponibili sui VPS Opzioni Personalizza il tuo VPS con le nostre opzioni avanzate Aiuto Casi d’uso Flussi di lavoro automatizzati con n8n Novità Piattaforma multisito WordPress Server di videogiochi Server di test con VPS Hosting di applicazioni di trading su VPS Forex Managed Bare Metal Torna al menu Managed Bare Metal Managed Bare Metal Managed Bare Metal Essentials powered by VMware® La tua infrastruttura virtuale gestita da OVHcloud Storage e backup Torna al menu Storage e backup Storage e backup Scopri tutte le nostre soluzioni Enterprise File Storage File storage totalmente gestito e basato su NetApp ONTAP Select NAS-HA Spazio centralizzato di storage e backup per i dati Cloud Disk Array Soluzione di storage a blocchi scalabile basata sulla tecnologia CEPH Veeam Enterprise Plus Soluzione che permette di proteggere i dati nel modo migliore HYCU for OVHcloud Backup e migrazione semplificati dei carichi di lavoro Nutanix Casi d'uso Storage di dati per server Linux Storage di dati per macchine virtuali Rete Torna al menu Rete Rete Additional IP Assegnare e trasferire indirizzi IP dinamici da un servizio a un altro Load Balancer OVHcloud Ripartire il carico delle applicazioni su più server di backend Rete privata (vRack) Connettere tutti i servizi OVHcloud con una rete privata isolata OVHcloud Link Aggregation Rete privata ridondante con un’elevata capacità di banda passante OVHcloud Connect Il percorso più breve tra il proprio datacenter e OVHcloud Banda passante pubblica Aumentare la banda passante garantita di default CDN Infrastructure Una CDN dedicata per completare i servizi OVHcloud Bring Your Own IP (BYOIP) Importare gli indirizzi IP e facilitare la migrazione in OVHcloud Sicurezza di rete Torna al menu Sicurezza di rete Sicurezza di rete Infrastruttura anti-DDoS Per usufruire di infrastrutture protette in modo efficace dagli attacchi DDoS. Game DDoS Protection Proteggere i servizi di gaming ed e-sport con una soluzione anti-DDoS specifica DNSSEC Proteggere i dati dal Cache Poisoning SSL Gateway Il modo più semplice di garantire la sicurezza delle pagine Web, senza difficoltà. Identità, sicurezza e operazioni Torna al menu Identità, sicurezza e operazioni Identità, sicurezza e operazioni Identity and Access Management (IAM) Proteggere la gestione degli accessi e aumentare la produttività Logs Data Platform Piattaforma completa per raccogliere, salvare e visualizzare i log Key Management Service (KMS) Proteggi i dati su tutti i servizi OVHcloud da un punto centralizzato Secret Manager Gestione professionale di tutti i segreti in un unico posto Service Logs Monitora le prestazioni e la sicurezza del tuo ambiente cloud Bare Metal Pod Torna al menu Bare Metal Pod Bare Metal Pod Bare Metal Pod certificato SecNumCloud Le prestazioni del Bare Metal in un ambiente sovrano che risponde ai criteri del marchio SecNumCloud Dominio Hosting Email Torna al menu Dominio Hosting Email Dominio Web Torna al menu Dominio Web Dominio Web Cerca il tuo dominio Trasferisci il tuo dominio in OVHcloud Rinnova il tuo dominio Cerca nel mercato secondario (aftermarket) Accesso rapido Tariffe dei domini Whois: cerca le informazioni di un dominio Server DNS Offerte speciali Novità Hosting web Torna al menu Hosting web Hosting web Tutti i pack Web Database aggiuntivi Opzione SSL Opzione CDN Accesso rapido Come creare un sito Web? Ospita il tuo sito WordPress Crea il tuo sito in 1 click Crea il tuo negozio online Email e soluzioni collaborative Torna al menu Email e soluzioni collaborative Email e soluzioni collaborative Tutte le soluzioni email Tutte le soluzioni Exchange Licenze Office 365 SMS Torna al menu SMS SMS Invia SMS Pro Public Cloud Torna al menu Public Cloud Public Cloud Torna al menu Public Cloud Public Cloud Scopri il Public Cloud Ecosistema di servizi Accelera la tua attività e automatizza l’infrastruttura. Tariffe Consulta la nostra tariffazione semplice e accessibile. Prova gratuita Public Cloud Testa le nostre soluzioni senza spese. Savings Plan Novità Approfitta di prezzi ridotti impegnandoti per un periodo da 1 a 36 mesi per le tue risorse Public Cloud. Vantaggi della soluzione Public Cloud Scopri soluzioni di cloud computing adatte a tutte le tue esigenze. Cloud computing Conosci di più su questa tecnologia sempre più diffusa. Conformità e certificazione Scopri come OVHcloud costruisce soluzioni di fiducia. Trusted Zone Esegui il deploy di dati strategici in zone protette. Disponibilità per Region Scopri la copertura del nostro catalogo in base alla localizzazione. Local Zone Novità Esegui i servizi cloud più vicino ai tuoi utenti Documentazione Consulta le nostre guide e tutorial. Compute Torna al menu Compute Compute Scopri tutte le nostre soluzioni Compute Virtual Machine Instances Approfitta di istanze polivalenti e adatte a qualsiasi tipo di utilizzo. Cloud GPU Accelera i carichi di lavoro con istanze GPU ad alte prestazioni. Metal Instances Combina tutta la potenza del Bare Metal con l'automazione del Cloud. Documentazione Consulta la nostra documentazione della gamma Compute. Verso il PaaS Concentrati sulle applicazioni e aumenta la tua competitività. Local Zone Novità Esegui i servizi cloud più vicino ai tuoi utenti Storage Torna al menu Storage Storage Scopri tutte le nostre soluzioni Storage Block Storage Crea volumi di storage e utilizzali come dischi aggiuntivi. Object Storage Approfitta dello storage illimitato on demand, compatibile con S3 Cold Archive Archiviazione ultraeconomica per dati consultati molto raramente Local Zone Novità Esegui i servizi cloud più vicino ai tuoi utenti Documentazione Consulta la nostra documentazione della gamma Storage. Network Torna al menu Network Network Scopri tutte le nostre soluzioni Network Private Network Crea reti private basate sulla vRack di OVHcloud. Load Balancer Gestisci il traffico variabile distribuendolo su più risorse. Floating IP Assegna e trasferisci un IP pubblico da un servizio all'altro. Gateway Gestisci un punto di connessione unico tra una rete privata e Internet. Documentazione Consulta la nostra documentazione della gamma Network. Containers & Orchestration Torna al menu Containers & Orchestration Containers & Orchestration Scopri tutte le nostre soluzioni Containers & Orchestration Managed Kubernetes Orchestra le tue applicazioni per container con un cluster Kubernetes certificato CNCF. Load Balancer for Managed Kubernetes Service Gestisci le variazioni di traffico distribuendo in modo equilibrato il carico sulle diverse risorse. Managed Rancher Service Novità Gestione centralizzata e semplificata dei cluster Kubernetes. Managed Private Registry Gestisci le immagini di container e chart helm su un registro privato sicuro. Documentazione Consulta la nostra documentazione della gamma Containers & Orchestration. Verso il PaaS Concentrati sulle applicazioni e aumenta la tua competitività. Databases Torna al menu Databases Databases Scopri tutte le nostre soluzioni Databases MongoDB Motore NoSQL orientato ai documenti. Prova gratis con Free Tier MySQL Database relazionale popolare adatto ai diversi utilizzi. PostgreSQL Motore di database relazionali open source di riferimento. Valkey Lo storage in-memory intelligente Documentazione Consulta la nostra documentazione della gamma Databases. Verso il PaaS Concentrati sulle applicazioni e aumenta la tua competitività. Analytics Torna al menu Analytics Analytics Scopri tutte le nostre soluzioni Analytics Kafka Soluzioni di queuing per eseguire architetture event-driven. Kafka Connect Estensione che semplifica l'ingestione di dati dalle sorgenti verso Apache Kafka. Kafka MirrorMaker Replica che assicura l'alta disponibilità dei cluster Kafka. Logs Data Platform Piattaforma completa per raccogliere, salvare e visualizzare i log. OpenSearch Motore dedicato all’indicizzazione, ricerca e analisi dei dati. ClickHouse Novità Analisi ultra-rapida dei dati a portata di mano Managed Dashboards Piattaforma Grafana che permette di realizzare dashboard. Documentazione Consulta la nostra documentazione della gamma Analytics. Verso il PaaS Concentrati sulle applicazioni e aumenta la tua competitività. Data Platform Novità Torna al menu Data Platform Data Platform Scopri tutte le nostre soluzioni Data Plaform Scopri Data Platform di OVHcloud Novità Realizza progetti Data & Analytics in modo semplice e in tempi record. Data Catalog Novità Più di 50 connettori per tutte le sorgenti di dati. Lakehouse Manager Novità Storage Data Warehouse e Data Lake unificato, basato su Apache Iceberg. Data Processing Engine Novità Automatizza l'esecuzione e l'orchestrazione dei workload ETL/ELT. Analytics Manager Novità Crea dashboard e effettua le tue query con il motore Trino. Application Services Novità SDK e servizi serverless per implementare API e applicazioni Data. Control Center Novità Monitora le metriche, gestisci i log e gli alert dei tuoi ambienti. AI & Machine Learning Torna al menu AI & Machine Learning AI & Machine Learning Scopri tutte le nostre soluzioni AI & Machine Learning AI & Quantum Notebooks Avviare notebook Jupyter o VS Code nel Cloud e scegliere tra i nostri framework AI o quantici nativi AI Training Istruisci i tuoi modelli di Intelligenza Artificiale. AI Deploy Esegui modelli di Machine Learning e realizza previsioni efficaci. AI Endpoints Novità Arricchisci le tue applicazioni con modelli di IA generativa grazie ad API standard semplici e sicure. Documentazione Consulta la nostra documentazione della gamma AI & Machine Learning. Verso il PaaS Concentrati sulle applicazioni e aumenta la tua competitività. Quantum computing Torna al menu Quantum computing Quantum computing Scopri tutte le nostre soluzioni Quantum Computing Quantum Emulators Novità Simula i tuoi algoritmi quantici su notebook pronti all'uso Quantum Processing Units (QPU) Novità Accedi a veri computer quantistici tramite la nostra Quantum Platform Cos'è il Quantum computing? Scopri la nuova rivoluzione dell’accelerazione di calcolo e come svilupparla sin da subito sui computer quantistici futuri Identity, Security & Operations Torna al menu Identity, Security & Operations Identity, Security & Operations Scopri tutte le nostre soluzioni Identity, Security & Operations Identity and Access Management (IAM) Proteggi la gestione degli accessi e migliora la tua produttività. Logs Data Platform Piattaforma completa per raccogliere, salvare e visualizzare i log Key Management Service (KMS) Proteggi i dati su tutti i servizi OVHcloud da un'unica posizione. Secret Manager Gestione professionale di tutti i segreti in un unico posto Services Logs Monitora le prestazioni e la sicurezza del tuo ambiente cloud Hosted Private Cloud Torna al menu Hosted Private Cloud VMware Torna al menu VMware VMware on OVHcloud Scopri VMware on OVHcloud Public VCF as a Service Novità Soluzione VMware condivisa e gestita, ottimizzata da VMware Cloud Foundation Managed VMware vSphere Soluzione VMware gestita per tutte le aziende Managed VMware vSphere certificato SecNumCloud Soluzione VMware in una Trusted Zone certificata dall'ANSSI Soluzioni Soluzioni VMware a confronto SAP on OVHcloud Estensione e migrazione dei datacenter Soluzioni hybrid Cloud e multicloud Soluzioni di Disaster Recovery Soluzioni Trusted Zone europee Visualizzare le nostre soluzioni Nutanix Torna al menu Nutanix Hosted Private Cloud NC2 on OVHcloud Novità Nutanix Cloud Clusters (NC2) on OVHcloud Nutanix on OVHcloud La nostra piattaforma iperconvergente (HCI) Nutanix scalabile e pronta all'uso Bare Metal Pod certificato SecNumCloud Novità Server certificati Nutanix disponibili in Bare Metal Pod certificato SecNumCloud HYCU for OVHcloud Backup e migrazione semplificati dei carichi di lavoro Nutanix Veeam Enterprise per tutti i backup Soluzione dedicata Veeam Backup & Replication per tutti i backup Casi d’uso Migrazione e gestione dei dati Disaster Recovery Plan (DRP) Iperconvergenza, risparmio ed ecologia Disaster Recovery (DRaaS) SAP HANA Torna al menu SAP HANA SAP HANA SAP HANA on Private Cloud La soluzione che facilita i deploy SAP in un Cloud sovrano Soluzioni SAP on OVHcloud Storage e backup Torna al menu Storage e backup Storage e backup Scopri tutte le soluzioni di storage Opzione Veeam per il backup VMware Soluzione Veeam Backup Managed per il backup delle macchine virtuali Opzione Zerto per il Disaster Recovery Plan VMware Soluzione di Disaster Recovery Plan (DRP) multisito per i cluster VMware Opzione Veeam per Public VCF as-a-Service Soluzione dedicata Veeam Backup & Replication per tutti i backup Veeam Enterprise - Licenze Soluzione dedicata Veeam Backup & Replication per tutti i backup HYCU for OVHcloud Backup e migrazione semplificati dei carichi di lavoro Nutanix Object Storage Approfitta di storage illimitato on demand, compatibile con S3* Cold Archive Archivia i tuoi dati a lungo termine al miglior prezzo. NetApp - Enterprise File Storage Storage di file totalmente gestito e basato su NetApp ONTAP Select Casi d’uso Backup e ripristino dopo un incidente Continuità operativa Disaster Recovery per Managed VMware vSphere Disaster Recovery per Nutanix on OVHcloud Rete Torna al menu Rete Rete Additional IP Assegnare e trasferire indirizzi IP dinamici da un servizio a un altro Load Balancer OVHcloud Ripartire il carico delle applicazioni su più server di backend Rete privata (vRack) Connettere tutti i servizi OVHcloud a una rete privata isolata OVHcloud Connect Il percorso più breve tra il proprio datacenter e OVHcloud CDN Infrastructure Una CDN dedicata per completare i servizi OVHcloud Bring Your Own IP (BYOIP) Importare gli indirizzi IP e facilitare la migrazione in OVHcloud Sicurezza di rete Torna al menu Sicurezza di rete Sicurezza di rete Infrastruttura anti-DDoS Per usufruire di infrastrutture protette in modo efficace dagli attacchi DDoS. DNSSEC Proteggere i dati dal Cache Poisoning SSL Gateway Il modo più semplice di garantire la sicurezza delle pagine Web, senza difficoltà. Identità, sicurezza e operazioni Torna al menu Identità, sicurezza e operazioni Identità, sicurezza e operazioni Identity and Access Management (IAM) Proteggere la gestione degli accessi e aumentare la produttività Logs Data Platform Piattaforma completa per raccogliere, salvare e visualizzare i log Key Management Service (KMS) Proteggi i dati su tutti i servizi OVHcloud da un punto centralizzato Secret Manager Gestione professionale di tutti i segreti in un unico posto Service Logs Monitora le prestazioni e la sicurezza del tuo ambiente cloud Conformità e certificazioni Torna al menu Conformità e certificazioni Conformità e certificazioni Elenco completo delle norme e dei regolamenti GDPR Conformità al regolamento (UE) 2016/679 sulla protezione dei dati SecNumCloud Qualificazione ANSSI Security Visa HDS e hosting di dati sanitari Hosting di dati sanitari in Europa HIPAA e HITECH Hosting di dati sanitari negli Stati Uniti PCI DSS Hosting di dati bancari ISO/IEC 27001, 27017 e 27018 Gestione della sicurezza delle informazioni ISO/IEC 27701 Gestione della sicurezza del trattamento dei dati personali ISO 14001 Tenere sotto controllo l'impatto ambientale. ISO 50001 Controllare le prestazioni energetiche SOC 1, 2 e SOC 3 Certificazione e report AICPA SSAE 16/ISAE 3402 tipo II EBA e ACPR Conformità per gli operatori di servizi finanziari in Europa G-Cloud Servizi Cloud per il settore pubblico nel Regno Unito Soluzioni Torna al menu Soluzioni Casi d’uso Torna al menu Casi d’uso Casi d’uso Migrazione al Cloud Cloud ibrido e multicloud Modernizzazione delle applicazioni Applicazioni Cloud native Intelligenza Artificiale Analisi dei Big Data Gestione dei dati Carichi di lavoro ad alte prestazioni Storage di grandi dataset Grid Computing Migrazione a PaaS Backup e disaster recovery Trusted Zone Ambiente SecNumCloud Protezione di rete Sicurezza del Cloud Estensione e migrazione dei datacenter Trasformazione dei datacenter Aumenta la tua brand reputation Metti al primo posto la stabilità finanziaria Proteggi la tua attività dai cyberattacchi Industria Torna al menu Industria Industria Settore pubblico Soluzione di fiducia per i governi e le amministrazioni Sanità Soluzione di fiducia per il settore sanitario Servizi finanziari Soluzioni per gli operatori di servizi finanziari Industria manifatturiera Soluzione Cloud di fiducia per l'industria europea E-commerce Hosting Web per gli e-commerce Software/Tecnologia dell'informazione Soluzioni SaaS e PaaS dei software provider partner di OVHcloud Tipo di organizzazione Torna al menu Tipo di organizzazione Tipo di organizzazione Azienda Soluzioni per la trasformazione digitale delle aziende Software house (SaaS/PaaS) Soluzioni SaaS e PaaS dei software provider partner di OVHcloud System Integrator Soluzioni per integratori, amministratori e società di consulenza Governo/Amministrazioni Soluzioni di fiducia per i governi e le amministrazioni Startup Soluzioni di accompagnamento per le startup Scaleup Soluzioni di accompagnamento per scaleup Tecnologia Torna al menu Tecnologia Tecnologia Veeam Proteggi i tuoi dati con le soluzioni Veeam offerte da OVHcloud VMware by Broadcom Soluzioni VMware by Broadcom e OVHcloud per tutti i tuoi progetti HYCU Soluzione di backup apprezzata dagli utenti Nutanix SAP Le nostre soluzioni SAP on OVHcloud per ambienti SAP ospitati in un cloud sovrano. NetApp Soluzioni di storage NetApp con controllo di costi e prestazioni elevate Nvidia Soluzioni GPU di Nvidia per accelerare i tuoi progetti di innovazione e IA MongoDB Soluzioni MongoDB che semplificano la gestione dei dati OpenStack Soluzioni OpenStack integrate in OVHcloud per infrastrutture Cloud Intel Soluzioni degli esperti per accelerare con Intel® Xeon® nel Cloud AMD Soluzioni Cloud di alta gamma con processori AMD Hadoop Cloudera Soluzione Cloudera 100% gestita con Claranet Ecosistema Torna al menu Ecosistema Ecosistema Scopri l’ecosistema di partner di OVHcloud Partner Program Un'iniziativa dedicata ai nostri partner rivenditori, System Integrator, provider di servizi gestiti e consulenti. Open Trusted Cloud Un intero ecosistema di soluzioni SaaS e PaaS certificate, ospitate nel nostro Cloud aperto, reversibile e affidabile. Startup Program Un programma di accompagnamento per startup e scaleup che le aiuta ad accelerare la crescita OVHcloud Labs Lo spazio di innovazione in cui di testare le nostre tecnologie all’avanguardia prima del lancio ufficiale sul mercato. Eventi dell’ecosistema Per consultare tutti gli appuntamenti dedicati al nostro ecosistema partner: Webinar, conferenze... OVHcloud Ecosystem Awards Scopri gli OVHcloud Ecosystem Award, che premiano i leader dell'anno dell'ecosistema per categoria. Formazione e certificazione Numerose sessioni di formazione e certificazioni sono a disposizione dei membri del programma per aiutarli a sviluppare capacità e competenze. Accesso rapido Trova un partner Aderire all’OVHcloud Partner Program Aderire allo Startup Program Comparatore di prezzi Portale Partner FAQ Partner Program Tutto su OVHcloud Torna al menu Tutto su OVHcloud Tutto su OVHcloud Chi siamo Novità Infrastruttura globale I nostri datacenter Le nostre Local Zone Rete backbone Unisciti all’avventura Patent Pledge Informazioni legali Protezione dei dati - GDPR Sovranità dei dati Il nostro impegno Innovazione Cloud sostenibile Cloud di fiducia Impact Tracker Ambientale Summit Open search bar Close search bar Nessun risultato Prodotti Soluzioni Partner Guide Articles Visualizza tutti i risultati Professional Services Professional Services Professional Services di OVHcloud I Professional Services di OVHcloud forniscono consigli tecnici e best practice per tutti i tuoi progetti di trasformazione verso il cloud. Contattaci Panoramica Panoramica Casi d’uso Casi d’uso Tecnologie Tecnologie Testimonianze Testimonianze Partner Partner Contattaci L’esperienza di OVHcloud al servizio della tua trasformazione I Professional Services lavorano su tre ambiti principali di servizi a valore aggiunto: Consulenza tecnica Forniscono consigli tecnici e best practice per tutti i tuoi progetti di trasformazione verso il cloud. Prestazione Semplificano i tuoi progetti di migrazione al cloud e modernizzazione, apportando un grande valore aggiunto alla tua azienda. Possono anche raccomandare partner di fiducia per risultati ottimali in ambienti cloud e on-premise. Formazione Offrono sessioni di formazione su misura e un’ampia varietà di corsi disponibili nel nostro catalogo online. Accedi al catalogo di formazione La riproduzione di video su Youtube prevede strumenti di tracciamento per offrirti pubblicità personalizzate basate sulla tua navigazione. Per guardare il video, devi accettare la politica sulla privacy relativa ai cookies di condivisione su piattaforme terze del nostro Privacy Center. Puoi disattivare questa opzione in qualsiasi momento. Per maggiori informazioni, consulta la politica sui cookies di Vimeo e la politica sui cookies di OVHcloud. Show Privacy Center Professional Services di OVHcloud: semplifica la tua migrazione, amplifica la tua attività! Soluzioni cloud Migrazione al cloud Usufruisci di consigli personalizzati sulla pianificazione e la realizzazione della migrazione, considerando tutte le esigenze in materia di sicurezza, resilienza e disaster recovery. Cloud ibrido e multicloud Progetta e costruisci soluzioni ibride e multicloud con l'aiuto dei nostri Cloud Solution Architect. POC di consulenza. Infrastrutture cloud moderne Scopri le best practice per la gestione, ottimizzazione e sicurezza della tua infrastruttura cloud. Modernizzazione e sviluppo di applicazioni Ottimizza il ciclo di vita dei tuoi sviluppi grazie alle best practice DevOps, per consentire una modernizzazione più rapida delle applicazioni, un'integrazione continua e una distribuzione efficace nel cloud. Dati e IA Utilizza le informazioni basate sui dati e le tecnologie di IA per accelerare la crescita aziendale, migliorare il processo decisionale e stimolare l'innovazione. Tecnologie chiave con Professional Services Wiremind consiglia i Professional Services di OVHcloud I Professional Services hanno aiutato Wiremind ad acquisire le conoscenze necessarie per ottenere le migliori prestazioni di storage dai nostri server dedicati. Cédric De St Martin, Operations VP/SRE di Wiremind Contattaci per ottenere consigli da professionisti Rivolgiti ai nostri esperti per un’analisi personalizzata del tuo progetto. Contattaci Raggiungere gli obiettivi con i partner esperti di OVHcloud Esperti specializzati per ogni esigenza OVHcloud è un provider di risorse cloud con una solida rete di partner per accompagnare tutti i progetti della tua azienda. Esperienza arricchita I nostri partner sono formati per offrire la migliore esperienza possibile e permetterti così di ottenere il massimo dalle soluzioni di OVHcloud. Competenze complementari Le nostre conoscenze e competenze sulle tecnologie e i processi ci permettono di completare il catalogo di servizi di tutti i nostri partner. Accedi all'elenco dei partner OVHcloud Le risposte alle tue domande Cosa sono i Professional Services? I Professional Services sono un team di esperti e formatori al servizio di clienti e partner. Si tratta di un centro di competenze che fornisce consulenza sugli ambienti cloud e si basa su un’ampia gamma di soluzioni, tecnologie e servizi. I Professional Services (servizi professionali) offrono servizi su misura alle aziende per tutti i progetti di trasformazione e attuano strategie per supportare la crescita e la competitività di clienti e partner. I Professional Services sono disponibili per tutte le soluzioni OVHcloud? Sì, i Professional Services lavorano con tutti i servizi disponibili in OVHcloud, sia nel cloud privato che pubblico. I nostri esperti dispongono anche di conoscenze avanzate su numerose tecnologie del mercato IT e cloud e sono quindi in grado di fornire supporto per ambienti legacy o cloud-native con metodologie adeguate e moderne. OVHcloud interviene sugli ambienti? Interveniamo come esperti tecnici, guidando gli utenti in tutte le fasi del progetto e offriamo i migliori consigli per il suo successo. A seconda delle necessità possiamo anche consigliare aziende partner che possono fornire supporto avanzato o gestire le infrastrutture. In quali lingue sono disponibili supporto e formazione? Gli esperti dei Professional Services offrono supporto e formazione in lingua francese e inglese. Ci affidiamo inoltre alla nostra rete di partner per consulenze in altre lingue e aree di competenza. Back to top Strumenti Il tuo account cliente Webmail API Procedura Mailing list OVHcloud Status Whois Contatto dominio Segnala un abuso (abuse@ovh.net) Richiesta di divulgazione di informazioni Whois Proprietà Intellettuale Marchi Supporto Centro assistenza Guide Centro di apprendimento Glossario Community Livelli di supporto Supporto OVH Lun-Ven: 08:00-18:00 +39 02 5560 0423 Costo secondo l'operatore News Press room Blog Social network Restiamo in contatto © Copyright 1999-2026 OVH SAS. Informazioni legali Contratti Protezione dei dati Gestire i cookie Diritti e responsabilità dei titolari di domini Documentazione ICANN per i titolari dei domini Pagamenti Mappa del sito Chi siamo Lavora con noi Conformemente alla Direttiva 2006/112/CE e successive modifiche, a partire dal 01/01/2015 i prezzi IVA inclusa possono variare in base al Paese di residenza del cliente (i prezzi IVA inclusa pubblicati includono di default l'aliquota IVA attualmente in vigore in Italia). | 2026-01-13T09:30:40 |
https://www.charterworks.com/tag/case-study/ | Case study - Charter - Future of Work, AI, Management, Hybrid Try Charter Pro for $1 Latest Topics AI DEI Flexible Work Management Societal Issues Resources Briefing Work Tech Research Playbooks Case Studies Toolkits, Scripts, and other Resources Solutions Charter Pro Charter Forum Charter Pro for Teams Advisory + Strategic Services Events Upcoming and Past The AI Download Charter Cortados Leading With AI Masterclass Skills Accelerators Strategy Briefings Webinars Workplace Summit About Try Charter Pro for $1 Sign In Case study Pro Insights Caregiving A case study on helping ‘the sandwich generation’ with elder care By Michelle Peng Pro Case study AI Case Study: ServiceNow leaders catalyze the reimagining of roles By Jacob Clemente Pro Insights Wellbeing How Microsoft challenges its workers to build healthier habits By Michelle Peng Pro Insights AI Zapier’s counterintuitive move to boost pay before seeing AI improvements By Brian Elliott Pro Case study Performance Why Foursquare shifted from individual to team-level performance evaluations By Michelle Peng Pro Insights AI A case study in using genAI to unlock growth By Jacob Clemente Pro Case study Distributed teams How Atlassian used culture to navigate distributed work By Cari Romm Nazeer Pro Case study codetermination Lessons from one employer’s experiment with employee board representation — A Honeycomb case study By Michelle Peng Pro Case study Employee Stock Ownership Programs What a new push for employee stock ownership can do for companies and workers — A Verizon case study By Michelle Peng Pro Case study Politics What people need for productive political conversations at work By Michelle Peng 1 of 2 → Insights Books Interviews Charter on TIME Research Connect Events Topics Artificial Intelligence Hybrid Work DEI Leadership Charter Pro Become a Member Support Sign In Search Contact Partnerships General Inquiries Company About Careers Press Newsletters Charter Briefing Charter Works Inc. © 2025 Privacy Terms of Service | 2026-01-13T09:30:40 |
https://unicef.github.io//publicgoods-accelerator-guide/bizmodels-dpgs/biz-models | Understanding Open Source Business and Financial Models | Digital Public Goods Accelerator Guide Skip to main content Digital Public Goods Accelerator Guide GitHub Introduction About Digital Public Goods (DPGs) Sustainability of Open Source Business Models (OSBM) Understanding Open Source Business and Financial Models Open Source Benefits & Challenges Privately Funded Open Source Business Models Successfully Scaled DPGs Designing structure and content to support Digital Public Goods (DPGs) Case Studies Nominating a DPG Appendix 🏠 Sustainability of Open Source Business Models (OSBM) Understanding Open Source Business and Financial Models On this page Understanding Open Source Business and Financial Models Before considering if it is a DPG, we have to understand, what is considered open source? DPGs must use an open source license, therefore the startup or a part of the business model must be open source. We will go in depth about the technicalities of open source in this guide. On a high level, here’s what you need to know. Open source is a way to license software, hardware, and content so that they can be be continuously improved, modified and redistributed by any purpose commercially. Some companies see open source as an adoption mechanism through building a community which leads to free organic marketing. Resource: Open Source 101, why is it important? Resource: FREE Online Agora Open Source Business Model Course - Free online course to take a deep dive into opensource models and understanding the ecosystem further. Open source is also… Method Movement Culture To develop and distribute software and a set of best practices to make software and build teams that make software Movement based on ideals and philosophy beyond only code Collection of people, values, and ideas that take the form of software projects and communities What are the challenges that startups typically face? Cost: Many startups struggle to develop sustainable cost structures. Market competitiveness now requires significant investment in R&D, testing, and product development, which includes surveying, research, coding and more, all of which many companies have minimal budgets for. Funding: Many startups struggle to develop sustainable cost structures. Market competitiveness now requires significant investment in R&D, testing, and product development, which includes surveying, research, coding and more, all of which many companies have minimal budgets for. Copyright: It is becoming increasingly difficult to protect IP, so businesses that create and capture them entirely from a proprietary product are being threatened by competition. Diversity: More companies are discovering the importance of having diverse teams, which can add a rich range of perspectives that can widen a company's reach and enrich successful product development. As such, companies with very homogenous teams are falling behind. What are some myths and misconceptions that exist surrounding open source? Myth #1: I've heard that it's impossible to make money in open source because anyone can just take your code and market it themselves Myth #2: I've heard that open source software is susceptible to feeling disjointed because there so many people with different coding style working on the project. Myth #3: I've encountered so many OS repositories that don't seem to be actively maintained. Is it true that the majority of open source projects are abandoned? Fact: Despite the fact that your code or hardware design is freely available, there are a number of businesses that are profitable, have received investment, and have been acquired and gone public with open source solutions. Fact: It's true that disjointed software can happen, and that it can set a project back or even run it into the ground. However, following coding best practices and ensuring extensive documentation surrounding project and coding guidelines and protocols can, along with good project communication and a common, well-articulated vision, help to ensure that the software remains a unified project. Fact: Approximately 98% are only modified in the year after they are created and are never touched again. However, this may be tempered by the fact that about 1/2 of the active projects have only one contributor and close to 90% have 5 or fewer. This indicates many projects are non-professional in nature. How do you continue to make OS projects sustainable: Make sure developers use the product, so they have stake in making it better Have a clearly defined vision that everyone can agree on Get enough people onto the project such that no one developer is overwhelmed with feature requests or bugs, but not too many people such that it is hard to juggle the contributors and stick to a singular vision. Edit this page Previous What are the Steps to Support and Accelerate DPGs? Next Open Source Benefits & Challenges Before considering if it is a DPG, we have to understand, what is considered open source? Open source is also… What are the challenges that startups typically face? What are some myths and misconceptions that exist surrounding open source? Docs Guide Community Twitter More GitHub Copyright © 2022 UNICEF. Built with Docusaurus. | 2026-01-13T09:30:40 |
https://time.com/wellness-mags/ | TIME for Health TIME logo Subscribe Subscribe Close Subscribe Sections Home U.S. Politics World Health Business Tech Entertainment Ideas Science History Newsfeed Sports Magazine TIME 2030 Video TIME100 Talks The TIME Vault TIME for Health TIME for Kids TIME Edge Red Border: Branded Content by TIME Join Us Newsletters Subscribe Give a Gift Shop the TIME Store Customer Care US & Canada Global Help Center Reach Out Careers Press Room Contact the Editors Reprints and Permissions More Privacy Policy Your Privacy Rights Terms of Use Site Map Connect with Us TIME logo Home U.S. Politics World Health Business Tech Entertainment Ideas Science History Newsfeed Sports Magazine The TIME Vault TIME For Kids TIME Edge Masthead Newsletters Subscribe Give a Gift Shop the TIME Store Careers Press Room Contact the Editors U.S. Customer Service E.U. Customer Service Asia Customer Service Reprints and Permissions Site Map © 2025 TIME USA, LLC. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Service , Privacy Policy ( Your Privacy Rights ) and Do Not Sell or Share My Personal Information . TIME may receive compensation for some links to products and services on this website. Offers may be subject to change without notice. | 2026-01-13T09:30:40 |
https://aws.amazon.com/blogs/networking-and-content-delivery/category/networking-content-delivery/elastic-load-balancing/#aws-page-content-main | Elastic Load Balancing | Networking & Content Delivery Skip to Main Content Filter: All English Contact us AWS Marketplace Support My account Search Filter: All Sign in to console Create account AWS Blogs Home Blogs Editions Networking & Content Delivery Category: Elastic Load Balancing re:Invent 2025: Your ultimate AWS Networking guide to this year’s must-attend cloud event by Anusha Jampala on 25 NOV 2025 in Amazon CloudFront , Amazon VPC , Amazon VPC Lattice , AWS Cloud WAN , Elastic Load Balancing , Networking & Content Delivery Permalink Share Before you head into the Thanksgiving holiday, take a moment to read through this guide and start planning your AWS Networking re:Invent journey! From December 1st to December 5th, Las Vegas, Nevada will transform into the ultimate destination for cloud innovation, making it the perfect time to look ahead to the one of the most […] Drive application performance with Application Load Balancer Target Optimizer by James Wenzel and Ashish Kumar on 20 NOV 2025 in Announcements , Elastic Load Balancing , Launch , Networking & Content Delivery , News Permalink Share AWS Application Load Balancer is an HTTP request load balancer designed to provide scalability through load distribution and high availability through target health detection and unhealthy target isolation. Today, we are excited to introduce ALB Target Optimizer, a powerful new feature through which ALB delivers optimal concurrency to each target. In this post, we will […] Network Load Balancers now support Weighted Target Groups by Tyler Applebaum and Milind Kulkarni on 19 NOV 2025 in Elastic Load Balancing , Networking & Content Delivery Permalink Share Today Amazon Web Services (AWS) is launching weighted target groups for Network Load Balancers (NLB). This feature allows users to configure static weights among multiple NLB target groups. Weighted target groups enable you to easily perform blue/green or canary deployment strategies with zero downtime and without the need of multiple load balancers. This feature is […] Introducing QUIC Protocol Support for Network Load Balancer: Accelerating Mobile-First Applications by Andrew Gray and Milind Kulkarni on 13 NOV 2025 in Elastic Load Balancing , Networking & Content Delivery Permalink Share Today, AWS announces the launch of QUIC protocol support for Network Load Balancer (NLB). This capability enables customers to forward QUIC traffic to their targets with ultra-low latency while maintaining session stickiness using QUIC Connection IDs. In this blog we will provide an overview of QUIC, demonstrate how to enable it using the AWS Console […] Introducing cross-account support for Amazon CloudFront Virtual Private Cloud (VPC) origins by Salman Ahmed , Ankush Goyal , and Kunj Thacker on 06 NOV 2025 in Amazon CloudFront , Amazon EC2 , Amazon VPC , Announcements , Elastic Load Balancing , Networking & Content Delivery Permalink Share In November 2024, Amazon CloudFront introduced CloudFront Virtual Private Cloud (VPC) origins, a security feature that allowed customers to deliver content from applications hosted in private subnets. In addition, we are now introducing cross-account support for Amazon CloudFront VPC origins, enabling network traffic flow between Amazon CloudFront and Application Load Balancers (ALBs), Network Load Balancers […] Introducing URL and host header rewrite with AWS Application Load Balancers by Mohamad Naji and Mahmoud Elhusseiny on 15 OCT 2025 in Amazon VPC , Announcements , Elastic Load Balancing , Networking & Content Delivery Permalink Share Today we’re announcing the general availability of rewriting URLs and host headers natively on Amazon Web Services (AWS) Application Load Balancers (ALB). You can use this new feature to implement regex matches based on request parameters and rewrite both host headers and URLs before routing to your targets. Operating at Layer 7 (application layer) of […] Building Resilient Multi-cluster Applications with Amazon EKS, Part 1: Implementing Cross-cluster Load Balancing with NLB by Krishna Sarabu , Anuj Butail , and Pushkar Patil on 22 SEP 2025 in Amazon Elastic Kubernetes Service , Compute , Elastic Load Balancing , Networking & Content Delivery Permalink Share This three-part series explores design patterns and strategies to enhance application resiliency through multi-cluster deployment on Amazon Elastic Kubernetes Service (EKS). In this first part, we address a common challenge when using a Network Load Balancer (NLB) in multi-cluster environments. Organizations increasingly rely on Kubernetes—whether through Amazon Elastic Kubernetes Service (EKS) or self-managed clusters on […] Design and build IPv6 internet inspection architectures on AWS by Nikhil Bhagat and Alexandra Huides on 03 JUN 2025 in Customer Solutions , Gateway Load Balancer , Networking & Content Delivery , Technical How-to Permalink Share As organizations increasingly adopt IPv6 to address public IPv4 exhaustion, private IPv4 scarcity—especially in large-scale networks—and the need to support IPv6-only clients, securing both IPv4 and IPv6 traffic becomes critical. We can apply consistent traffic inspection for inbound and outbound flows in Amazon Virtual Private Clouds (Amazon VPCs) to maintain security. In this post, we […] Simplify ALB’s public IP address assignment with VPC IPAM by Ankit Chadha and Pushkar Patil on 18 APR 2025 in Amazon VPC , Elastic Load Balancing , Networking & Content Delivery Permalink Share Application Load Balancer (ALB) operates at layer-7 of the OSI model and allows you to load balance HTTP and HTTPS requests to its backend targets. In March 2025, we launched ALB and Amazon VPC IP Address Manager (IPAM) integration that allows you to use predictable IP address blocks for your internet-facing ALBs. This feature helps […] Exploring Data Transfer Costs for AWS Network Load Balancers by Lucas Rolim and Luis Felipe Silveira da Silva on 08 APR 2025 in Amazon EC2 , Elastic Load Balancing , Gateway Load Balancer Permalink Share In this post, we explore how Amazon Elastic Compute Cloud (Amazon EC2) data transfer costs apply to the communication between Network Load Balancer (NLB), clients, and targets in multiple scenarios, to help you optimize data transfer costs on Amazon Web Services (AWS). For Classic and Application load balancers, visit our post, Exploring Data Transfer Costs […] ← Older posts Create an AWS account Learn What Is AWS? What Is Cloud Computing? What Is Agentic AI? Cloud Computing Concepts Hub AWS Cloud Security What's New Blogs Press Releases Resources Getting Started Training AWS Trust Center AWS Solutions Library Architecture Center Product and Technical FAQs Analyst Reports AWS Partners Developers <a data-rg-n="Link" href="/developer/?nc1=f_dr" data-rigel-analytics="{"name":"Link","properties":{"size":1}}" class="rgft_8711ccd9 rgft_98b54368 rgft_13008707 | 2026-01-13T09:30:40 |
https://vega.github.io/vega-lite/examples/#bar-charts | Example Gallery | Vega-Lite Vega-Lite Vega Altair Vega-Lite API Examples Tutorials Documentation Usage Ecosystem GitHub Try Online Example Gallery This page shows example specifications for different types of graphics. To see example code for embedding visualizations in a webpage, please read the embed documentation . Single-View Plots Bar Charts Histograms, Density Plots, and Dot Plots Scatter & Strip Plots Line Charts Area Charts & Streamgraphs Table-based Plots Circular Plots Advanced Calculations Composite Marks Error Bars & Error Bands Box Plots Layered Plots Labeling & Annotation Other Layered Plots Multi-View Displays Faceting (Trellis Plot / Small Multiples) Repeat & Concatenation Maps (Geographic Displays) Interactive Interactive Charts Interactive Multi-View Displays Community Examples Single-View Plots Bar Charts Simple Bar Chart Responsive Bar Chart Aggregate Bar Chart Aggregate Bar Chart (Sorted) Grouped Bar Chart Grouped Bar Chart (Multiple Measure with Repeat) Stacked Bar Chart Stacked Bar Chart with Rounded Corners Horizontal Stacked Bar Chart Normalized (Percentage) Stacked Bar Chart Normalized (Percentage) Stacked Bar Chart With Labels Gantt Chart (Ranged Bar Marks) A Bar Chart Encoding Color Names in the Data Layered Bar Chart Diverging Stacked Bar Chart (Population Pyramid) Diverging Stacked Bar Chart (with Neutral Parts) Bar Chart with Labels Bar Chart with Label Overlays Bar Chart showing Initials of Month Names Bar Chart with bars center-aligned with time unit ticks Bar Chart with Negative Values and a Zero-Baseline Horizontal Bar Chart with Negative Values and Labels Bar Chart with a Spacing-Saving Y-Axis Heat Lane Chart Histograms, Density Plots, and Dot Plots Histogram Histogram (from Binned Data) Log-scaled Histogram Non-linear Histogram Relative Frequency Histogram Density Plot Stacked Density Estimates 2D Histogram Scatterplot 2D Histogram Heatmap Cumulative Frequency Distribution Layered Histogram and Cumulative Histogram Wilkinson Dot Plot Isotype Dot Plot Isotype Dot Plot with Emoji Relative Bar Chart (Calculate Percentage of Total) Scatter & Strip Plots Scatterplot 1D Strip Plot Strip Plot Colored Scatterplot 2D Histogram Scatterplot Bubble Plot Scatterplot with Null Values in Grey Scatterplot with Filled Circles Bubble Plot (Gapminder) Bubble Plot (Natural Disasters) Scatter Plot with Text Marks Image-based Scatter Plot Strip plot with custom axis tick labels Dot Plot with Jittering Line Charts Line Chart Line Chart with Point Markers Line Chart with Stroked Point Markers Multi Series Line Chart Multi Series Line Chart with Repeat Operator Multi Series Line Chart with Halo Stroke Slope Graph Step Chart Line Chart with Monotone Interpolation Line Chart with Conditional Axis Properties Connected Scatterplot (Lines with Custom Paths) Bump Chart Line Chart with Varying Size (using the trail mark) A comet chart showing changes between between two states Line Chart with Markers and Invalid Values Carbon Dioxide in the Atmosphere Line Charts Showing Ranks Over Time Drawing Sine and Cosine Curves with the Sequence Generator Line chart with varying stroke dash Line chart with a dashed part Area Charts & Streamgraphs Area Chart Area Chart with Gradient Area Chart with Overlaying Lines and Point Markers Stacked Area Chart Normalized Stacked Area Chart Streamgraph Horizon Graph Table-based Plots Table Heatmap Annual Weather Heatmap 2D Histogram Heatmap Table Bubble Plot (Github Punch Card) Heatmap with Labels Lasagna Plot (Dense Time-Series Heatmap) Mosaic Chart with Labels Wind Vector Map Circular Plots Pie Chart Pie Chart with percentage_tooltip Donut Chart Pie Chart with Labels Radial Plot Pyramid Pie Chart Advanced Calculations Relative Bar Chart (Calculate Percentage of Total) Calculate Difference from Average Calculate Difference from Annual Average Calculate Residuals Line Charts Showing Ranks Over Time Waterfall Chart of Monthly Profit and Loss Filtering Top-K Items Top-K Plot with “Others” Using the lookup transform to combine data Cumulative Frequency Distribution Layered Histogram and Cumulative Histogram Parallel Coordinate Plot Bar Chart Showing Argmax Value Layering Averages over Raw Values Layering Rolling Averages over Raw Values Line Chart to Show Benchmarking Results Quantile-Quantile Plot (QQ Plot) Linear Regression Loess Regression Using window transform to impute missing values by averaging the previous and next values. Ternary chart Composite Marks Error Bars & Error Bands Error Bars Showing Confidence Interval Error Bars Showing Standard Deviation Line Chart with Confidence Interval Band Scatterplot with Mean and Standard Deviation Overlay Box Plots Box Plot with Min/Max Whiskers Tukey Box Plot (1.5 IQR) Box Plot with Pre-Calculated Summaries Layered Plots Labeling & Annotation Simple Bar Chart with Labels Simple Bar Chart with Labels and Emojis Layering text over heatmap Carbon Dioxide in the Atmosphere Bar Chart Highlighting Values beyond a Threshold Mean overlay over precipitation chart Histogram with a Global Mean Overlay Line Chart with Highlighted Rectangles Layering Averages over Raw Values Layering Rolling Averages over Raw Values Distributions and Medians of Likert Scale Ratings Comparative Likert Scale Ratings Other Layered Plots Candlestick Chart Ranged Dot Plot Bullet Chart Layered Plot with Dual-Axis Horizon Graph Weekly Weather Plot Wheat and Wages Example Multi-View Displays Faceting (Trellis Plot / Small Multiples) Trellis Bar Chart Trellis Stacked Bar Chart Trellis Scatter Plot (wrapped) Trellis Histograms Trellis Scatter Plot Showing Anscombe’s Quartet Becker’s Barley Trellis Plot Trellis Area Trellis Area Plot Showing Annual Temperatures in Seattle Faceted Density Plot Compact Trellis Grid of Bar Charts Repeat & Concatenation Repeat and Layer to Show Different Movie Measures Vertical Concatenation Horizontally Repeated Charts Interactive Scatterplot Matrix Marginal Histograms Discretizing scales Nested View Concatenation Aligned with Axis minExtent Population Pyramid Maps (Geographic Displays) Choropleth of Unemployment Rate per County One Dot per Zipcode in the U.S. One Dot per Airport in the U.S. Overlayed on Geoshape Rules (line segments) Connecting SEA to every Airport Reachable via Direct Flights Three Choropleths Representing Disjoint Data from the Same Table U.S. State Capitals Overlayed on a Map of U.S. Line between Airports in the U.S. Income in the U.S. by State, Faceted over Income Brackets London Tube Lines Projection explorer Earthquakes Example Faceted County-Level Species Habitat Maps Interactive Interactive Charts Bar Chart with Highlighting on Hover and Selection on Click Histogram with Full-Height Hover Targets for Tooltip Interactive Legend Scatterplot with External Links and Tooltips Rectangular Brush Area Chart with Rectangular Brush Paintbrush Highlight Scatterplot Pan & Zoom Query Widgets Interactive Average Multi Series Line Chart with an Interactive Line Highlight Multi Series Line Chart with an Interactive Point Highlight Multi Series Line Chart with Labels Multi Series Line Chart with Tooltip via Pivot Multi Series Line Chart with Tooltip Isotype Grid Brushing Scatter Plot to show data on a table Selectable Heatmap Bar Chart with a Minimap Interactive Index Chart Focus + Context - Smooth Histogram Zooming Dynamic Color Legend Search Input Change zorder on hover Interactive Multi-View Displays Overview and Detail Crossfilter (Filter) Crossfilter (Highlight) Interactive Scatterplot Matrix Interactive Dashboard with Cross Highlight Seattle Weather Exploration Connections among Major U.S. Airports. An interactive scatter plot of global health statistics by country and year. Community Examples Here we list great examples of Vega-Lite visualizations that were created by the community. Please help us expand this gallery by forking our example block and sending us a pull request with your example added to this list. Many visualizations in the book Making Data Visual by Danyel Fisher and Miriah Meyer are made with Vega-Lite Grouped Bar Chart by @churtado Bar Chart with Negative Values by @digi0ps Multi Line Highlight by @amitkaps Slope graph by @g3o2 Scatter Nearest Rule by @amitkaps Scatter Brush Rule by @amitkaps Unit Chart Rectangular by @amitkaps Unit Chart Stacked by @amitkaps Unit Chart Small Multiple by @amitkaps Dot-dash plot by @g3o2 Cumulative Wikipedia Donations by @domoritz CO2 Concentration in the Atmosphere by @domoritz Horizontal Stacked Bar Chart with Labels by @pratapvardhan Interactive stacked time-series by @jakevdp Bicycle Count Time-series with Dynamic Scale by @jakevdp Vega-Lite downloads by @domoritz Waterfall Chart by @italo-batista Bar, Small Multiple, Heatmap, Gantt Charts: Exploring NYC Event Permits by @hydrosquall Image Pixel Render by @amitkaps Top-K Plot with Others by @manzt Trafford Data Lab’s Vega-Lite graphics companion by @trafforddatalab International Flight Map by @alhenry BBC Visual and Data Journalism cookbook port to Vega-Lite by @aezarebski Car Registrations in Portugal - 3 plots with cross-filtering by @jlborges An interactive Rank-Plot by @jlborges An interactive Dashboard by @jlborges Dashboard for the Effects of Labor Market Subsidies in Austria by @schmoigl Size of People around the World by @schmoigl Diverging Dot Plot by @shadfrigui Edit this page and submit a pull request! | 2026-01-13T09:30:40 |
https://llvm.org/doxygen/regcomp_8c.html#a0240ac851181b84ac374872dc5434ee4 | LLVM: lib/Support/regcomp.c File Reference LLVM  22.0.0git lib Support Classes | Macros | Functions | Variables regcomp.c File Reference #include " regex_impl.h " #include <ctype.h> #include <limits.h> #include <stdint.h> #include <stdio.h> #include <stdlib.h> #include < string.h > #include <sys/types.h> #include " regex2.h " #include " regutils.h " #include "llvm/Config/config.h" #include " llvm/Support/Compiler.h " Go to the source code of this file. Classes struct   cclass struct   cname struct   parse Macros #define  NPAREN    10 /* we need to remember () 1-9 for back refs */ #define  PEEK () #define  PEEK2 () #define  MORE () #define  MORE2 () #define  SEE (c) #define  SEETWO (a, b) #define  EAT (c) #define  EATTWO (a, b) #define  NEXT () #define  NEXT2 () #define  NEXTn (n) #define  GETNEXT () #define  SETERROR (e) #define  REQUIRE (co, e) #define  MUSTSEE (c, e) #define  MUSTEAT (c, e) #define  MUSTNOTSEE (c, e) #define  EMIT ( op , sopnd) #define  INSERT ( op , pos) #define  AHEAD (pos) #define  ASTERN ( sop , pos) #define  HERE () #define  THERE () #define  THERETHERE () #define  DROP (n) #define  DUPMAX    255 #define  REGINFINITY    ( DUPMAX + 1) #define  never    0 /* some <assert.h>s have bugs too */ #define  GOODFLAGS (f) #define  BACKSL    (1 << CHAR_BIT) #define  N    2 #define  INF    3 #define  REP (f, t) #define  MAP (n) Functions static void  p_ere (struct parse *, int) static void  p_ere_exp (struct parse *) static void  p_str (struct parse *) static void  p_bre (struct parse *, int, int) static int  p_simp_re (struct parse *, int) static int  p_count (struct parse *) static void  p_bracket (struct parse *) static void  p_b_term (struct parse *, cset *) static void  p_b_cclass (struct parse *, cset *) static void  p_b_eclass (struct parse *, cset *) static char   p_b_symbol (struct parse *) static char   p_b_coll_elem (struct parse *, int) static char   othercase (int) static void  bothcases (struct parse *, int) static void  ordinary (struct parse *, int) static void  nonnewline (struct parse *) static void  repeat (struct parse *, sopno , int, int) static int  seterr (struct parse *, int) static cset *  allocset (struct parse *) static void  freeset (struct parse *, cset *) static int  freezeset (struct parse *, cset *) static int  firstch (struct parse *, cset *) static int  nch (struct parse *, cset *) static void  mcadd (struct parse *, cset *, const char *) static void  mcinvert (struct parse *, cset *) static void  mccase (struct parse *, cset *) static int  isinsets (struct re_guts *, int) static int  samesets (struct re_guts *, int, int) static void  categorize (struct parse *, struct re_guts *) static sopno   dupl (struct parse *, sopno , sopno ) static void  doemit (struct parse *, sop , size_t) static void  doinsert (struct parse *, sop , size_t, sopno ) static void  dofwd (struct parse *, sopno , sop ) static void  enlarge (struct parse *, sopno ) static void  stripsnug (struct parse *, struct re_guts *) static void  findmust (struct parse *, struct re_guts *) static sopno   pluscount (struct parse *, struct re_guts *) int  llvm_regcomp ( llvm_regex_t *preg, const char *pattern, int cflags) Variables static struct cclass   cclasses [] static struct cname   cnames [] static char   nuls [10] Macro Definition Documentation ◆  AHEAD #define AHEAD ( pos ) Value: dofwd (p, pos, HERE () - (pos)) HERE #define HERE() Definition regcomp.c:265 dofwd static void dofwd(struct parse *, sopno, sop) Definition regcomp.c:1477 Definition at line 263 of file regcomp.c . Referenced by p_ere() , p_ere_exp() , and repeat() . ◆  ASTERN #define ASTERN ( sop , pos  ) Value: EMIT ( sop , HERE () - pos) EMIT #define EMIT(op, sopnd) Definition regcomp.c:261 sop unsigned long sop Definition regex2.h:68 Definition at line 264 of file regcomp.c . Referenced by p_ere() , p_ere_exp() , p_simp_re() , and repeat() . ◆  BACKSL #define BACKSL   (1 << CHAR_BIT) Referenced by p_simp_re() . ◆  DROP #define DROP ( n ) Value: (p->slen -= (n)) Definition at line 268 of file regcomp.c . Referenced by p_bre() , and repeat() . ◆  DUPMAX #define DUPMAX   255 Definition at line 273 of file regcomp.c . Referenced by p_count() . ◆  EAT #define EAT ( c ) Value: (( SEE (c)) ? ( NEXT (), 1) : 0) SEE #define SEE(c) Definition regcomp.c:248 NEXT #define NEXT() Definition regcomp.c:252 Definition at line 250 of file regcomp.c . Referenced by p_b_term() , p_bracket() , p_bre() , p_ere() , p_ere_exp() , and p_simp_re() . ◆  EATTWO #define EATTWO ( a , b  ) Value: (( SEETWO (a, b)) ? ( NEXT2 (), 1) : 0) NEXT2 #define NEXT2() Definition regcomp.c:253 SEETWO #define SEETWO(a, b) Definition regcomp.c:249 Definition at line 251 of file regcomp.c . Referenced by p_b_symbol() , p_b_term() , and p_simp_re() . ◆  EMIT #define EMIT ( op , sopnd  ) Value: doemit (p, ( sop )( op ), ( size_t )(sopnd)) op #define op(i) doemit static void doemit(struct parse *, sop, size_t) Definition regcomp.c:1424 Definition at line 261 of file regcomp.c . Referenced by doinsert() , llvm_regcomp() , ordinary() , p_bracket() , p_bre() , p_ere() , p_ere_exp() , p_simp_re() , and repeat() . ◆  GETNEXT #define GETNEXT ( ) Value: (*p->next++) Definition at line 255 of file regcomp.c . Referenced by p_b_symbol() , p_count() , p_ere_exp() , p_simp_re() , and p_str() . ◆  GOODFLAGS #define GOODFLAGS ( f ) Value: ((f) & ~REG_DUMP ) REG_DUMP #define REG_DUMP Definition regex_impl.h:63 Referenced by llvm_regcomp() . ◆  HERE #define HERE ( ) Value: (p->slen) Definition at line 265 of file regcomp.c . Referenced by doinsert() , dupl() , p_bre() , p_ere() , p_ere_exp() , p_simp_re() , and repeat() . ◆  INF #define INF   3 Referenced by repeat() . ◆  INSERT #define INSERT ( op , pos  ) Value: doinsert (p, ( sop )( op ), HERE () - (pos) + 1, pos) doinsert static void doinsert(struct parse *, sop, size_t, sopno) Definition regcomp.c:1444 Definition at line 262 of file regcomp.c . Referenced by p_ere() , p_ere_exp() , p_simp_re() , and repeat() . ◆  MAP #define MAP ( n ) Value: (((n) <= 1) ? (n) : ((n) == REGINFINITY ) ? INF : N ) N #define N INF #define INF REGINFINITY #define REGINFINITY Definition regcomp.c:275 Referenced by checkClobberSanity() , and repeat() . ◆  MORE #define MORE ( ) Value: (p->end - p->next > 0) Definition at line 246 of file regcomp.c . Referenced by llvm::Combiner::combineMachineInstrs() , INITIALIZE_PASS() , p_b_cclass() , p_b_coll_elem() , p_b_symbol() , p_b_term() , p_bracket() , p_bre() , p_count() , p_ere() , p_ere_exp() , p_simp_re() , p_str() , reportGISelDiagnostic() , llvm::reportGISelFailure() , llvm::reportGISelFailure() , llvm::reportGISelWarning() , llvm::Legalizer::runOnMachineFunction() , llvm::InstructionSelect::selectMachineFunction() , and llvm::MIRProfileLoader::setInitVals() . ◆  MORE2 #define MORE2 ( ) Value: (p->end - p->next > 1) Definition at line 247 of file regcomp.c . Referenced by p_b_term() , and p_ere_exp() . ◆  MUSTEAT #define MUSTEAT ( c , e  ) Value: ( REQUIRE ( MORE () && GETNEXT () == (c), e)) GETNEXT #define GETNEXT() Definition regcomp.c:255 MORE #define MORE() Definition regcomp.c:246 REQUIRE #define REQUIRE(co, e) Definition regcomp.c:257 Definition at line 259 of file regcomp.c . Referenced by p_bracket() , and p_ere_exp() . ◆  MUSTNOTSEE #define MUSTNOTSEE ( c , e  ) Value: ( REQUIRE (! MORE () || PEEK () != (c), e)) PEEK #define PEEK() Definition regcomp.c:244 Definition at line 260 of file regcomp.c . ◆  MUSTSEE #define MUSTSEE ( c , e  ) Value: ( REQUIRE ( MORE () && PEEK () == (c), e)) Definition at line 258 of file regcomp.c . ◆  N #define N   2 Examples /work/as-worker-4/publish-doxygen-docs/llvm-project/llvm/include/llvm/ADT/ilist_node.h , and /work/as-worker-4/publish-doxygen-docs/llvm-project/llvm/include/llvm/Transforms/Utils/Local.h . Referenced by llvm::AAMDNodes::AAMDNodes() , llvm::orc::ObjectLinkingLayer::add() , llvm::Registry< GCMetadataPrinter >::add_node() , llvm::X86Operand::addAbsMemOperands() , llvm::Instruction::addAnnotationMetadata() , llvm::Instruction::addAnnotationMetadata() , addArgumentAttrs() , llvm::X86Operand::addAVX512RCOperands() , addCalleeSavedRegs() , AddCombineBUILD_VECTORToVPADDL() , AddCombineToVPADD() , AddCombineVUZPToVPADDL() , llvm::X86Operand::addDstIdxOperands() , addEdge() , llvm::ItaniumManglingCanonicalizer::addEquivalence() , AddGlue() , llvm::X86Operand::addGR16orGR32orGR64Operands() , llvm::X86Operand::addGR32orGR64Operands() , llvm::X86Operand::addImmOperands() , XtensaOperand::addImmOperands() , llvm::LiveIntervals::addKillFlags() , llvm::GCOVBlock::addLine() , llvm::DwarfExpression::addMachineRegExpression() , llvm::X86Operand::addMaskPairOperands() , llvm::X86Operand::addMemOffsOperands() , llvm::X86Operand::addMemOperands() , llvm::DataDependenceGraph::addNode() , llvm::DirectedGraph< DDGNode, DDGEdge >::addNode() , AddNodeIDCustom() , AddNodeIDNode() , llvm::bfi_detail::IrreducibleGraph::addNodesInLoop() , llvm::ilist_callback_traits< MachineBasicBlock >::addNodeToList() , llvm::ilist_traits< MachineInstr >::addNodeToList() , llvm::SUnit::addPred() , llvm::rdf::DataFlowGraph::addr() , llvm::X86Operand::addRegOperands() , XtensaOperand::addRegOperands() , AddRequiredExtensionForVMULL() , addShuffleForVecExtend() , llvm::X86Operand::addSrcIdxOperands() , llvm::TargetLowering::DAGCombinerInfo::AddToWorklist() , adjustForFNeg() , adjustForLTGFR() , adjustForSubtraction() , llvm::IntervalMapImpl::NodeBase< std::pair< KeyT, KeyT >, ValT, LeafSize >::adjustFromLeftSib() , llvm::TypeBasedAAResult::aliasErrno() , llvm::AliasScopeNode::AliasScopeNode() , llvm::ThreadSafeAllocator< AllocatorType >::Allocate() , llvm::MemoryPhi::allocHungoffUses() , llvm::PHINode::allocHungoffUses() , llvm::SwitchInst::allocHungoffUses() , llvm::ISD::allOperandsUndef() , llvm::AMDGPUTargetLowering::allUsesHaveSourceMods() , allUsesTruncate() , llvm::AMDGPUDAGToDAGISel::AMDGPUDAGToDAGISel() , annotateFunctionWithHashMismatch() , llvm::DWARFTypePrinter< DieType >::appendConstVolatileQualifierAfter() , llvm::DWARFTypePrinter< DieType >::appendConstVolatileQualifierBefore() , appendNumber() , llvm::jitlink::systemz::applyFixup() , llvm::SDNode::areOnlyUsersOf() , llvm::DiagnosticInfoOptimizationBase::Argument::Argument() , llvm::DiagnosticInfoOptimizationBase::Argument::Argument() , llvm::DiagnosticInfoOptimizationBase::Argument::Argument() , llvm::DiagnosticInfoOptimizationBase::Argument::Argument() , llvm::DiagnosticInfoOptimizationBase::Argument::Argument() , llvm::DiagnosticInfoOptimizationBase::Argument::Argument() , llvm::DiagnosticInfoOptimizationBase::Argument::Argument() , llvm::msgpack::ArrayDocNode::ArrayDocNode() , llvm::ArrayRef() , llvm::ArrayRef< llvm::cfg::Update< MachineBasicBlock * > >::ArrayRef() , llvm::SmallVectorTemplateCommon< T, typename >::assertSafeToAdd() , llvm::SelectionDAG::AssignTopologicalOrder() , AVRDAGToDAGISel::select< AVRISD::CALL >() , AVRDAGToDAGISel::select< ISD::BRIND >() , AVRDAGToDAGISel::select< ISD::FrameIndex >() , AVRDAGToDAGISel::select< ISD::LOAD >() , AVRDAGToDAGISel::select< ISD::STORE >() , llvm::AVRTargetLowering::AVRTargetLowering() , llvm::SDNodeIterator::begin() , llvm::SUnitIterator::begin() , broadcastSrcOp() , buildCallOperands() , BuildExactSDIV() , BuildExactUDIV() , llvm::LazyCallGraph::buildRefSCCs() , llvm::TargetLowering::BuildSDIV() , llvm::PPCTargetLowering::BuildSDIVPow2() , llvm::TargetLowering::BuildSDIVPow2() , llvm::TargetLowering::buildSDIVPow2WithCMov() , llvm::TargetLowering::BuildSREMPow2() , llvm::buildTopDownFuncOrder() , llvm::TargetLowering::BuildUDIV() , llvm::APInt::byteSwap() , llvm::SelectionDAG::calculateDivergence() , llvm::MDNodeKeyImpl< GenericDINode >::calculateHash() , llvm::MDNodeKeyImpl< MDTuple >::calculateHash() , llvm::MDNodeOpsKey::calculateHash() , canChangeToInt() , canClobberPhysRegDefs() , CanCombineFCOPYSIGN_EXTEND_ROUND() , canConvertSETCCToXori() , llvm::TargetInstrInfo::canCopyGluedNodeDuringSchedule() , llvm::Thumb1InstrInfo::canCopyGluedNodeDuringSchedule() , canFoldInAddressingMode() , CanInvertMVEVCMP() , canLowerByDroppingElements() , canLowerToLDG() , slpvectorizer::BoUpSLP::canMapToVector() , canonicalizeBitSelect() , canonicalizeMetadataForValue() , canonicalizeShuffleWithOp() , canReduceVMulWidth() , llvm::CGDataPatchItem::CGDataPatchItem() , llvm::DominatorTreeBase< BlockT, false >::changeImmediateDominator() , CheckAndCreateOffsetAdd() , CheckAndImm() , CheckChild2CondCode() , CheckChildInteger() , CheckChildSame() , CheckChildType() , llvm::SelectionDAGISel::CheckComplexPattern() , llvm::AMDGPUPALMetadata::checkComputeRegisters() , llvm::AMDGPUPALMetadata::checkComputeRegisters() , CheckCondCode() , checkCVTFixedPointOperandWithFBits() , checkDot4MulSignedness() , llvm::checkForCycles() , checkForCyclesHelper() , checkIfSupported() , CheckInteger() , CheckOpcode() , checkOperandType() , CheckOrImm() , checkOverlappingElement() , checkResultType() , CheckSame() , CheckTyN() , CheckType() , CheckValueType() , GraphTraits< const CallsiteContextGraph< DerivedCCG, FuncTy, CallTy > * >::child_begin() , llvm::DomTreeGraphTraitsBase< Node, ChildIterator >::child_begin() , llvm::GraphTraits< AADepGraphNode * >::child_begin() , llvm::GraphTraits< ArgumentGraphNode * >::child_begin() , llvm::GraphTraits< BasicBlock * >::child_begin() , llvm::GraphTraits< BlockFrequencyInfo * >::child_begin() , llvm::GraphTraits< BoUpSLP * >::child_begin() , llvm::GraphTraits< CallGraphNode * >::child_begin() , llvm::GraphTraits< const BasicBlock * >::child_begin() , llvm::GraphTraits< const CallGraphNode * >::child_begin() , llvm::GraphTraits< const DDGNode * >::child_begin() , llvm::GraphTraits< const Loop * >::child_begin() , llvm::GraphTraits< const MachineBasicBlock * >::child_begin() , llvm::GraphTraits< const MachineLoop * >::child_begin() , llvm::GraphTraits< const VPBlockBase * >::child_begin() , llvm::GraphTraits< DDGNode * >::child_begin() , llvm::GraphTraits< DotCfgDiffDisplayGraph * >::child_begin() , llvm::GraphTraits< Inverse< BasicBlock * > >::child_begin() , llvm::GraphTraits< Inverse< const BasicBlock * > >::child_begin() , llvm::GraphTraits< Inverse< const MachineBasicBlock * > >::child_begin() , llvm::GraphTraits< Inverse< MachineBasicBlock * > >::child_begin() , llvm::GraphTraits< Inverse< MemoryAccess * > >::child_begin() , llvm::GraphTraits< Inverse< VPBlockBase * > >::child_begin() , llvm::GraphTraits< IrreducibleGraph >::child_begin() , llvm::GraphTraits< LazyCallGraph * >::child_begin() , llvm::GraphTraits< LazyCallGraph::Node * >::child_begin() , llvm::GraphTraits< Loop * >::child_begin() , llvm::GraphTraits< MachineBasicBlock * >::child_begin() , llvm::GraphTraits< MachineBlockFrequencyInfo * >::child_begin() , llvm::GraphTraits< MachineLoop * >::child_begin() , llvm::GraphTraits< MemoryAccess * >::child_begin() , llvm::GraphTraits< PGOUseFunc * >::child_begin() , llvm::GraphTraits< ProfiledCallGraphNode * >::child_begin() , llvm::GraphTraits< RematGraph * >::child_begin() , llvm::GraphTraits< SDNode * >::child_begin() , llvm::GraphTraits< SUnit * >::child_begin() , llvm::GraphTraits< ValueInfo >::child_begin() , llvm::GraphTraits< VPBlockBase * >::child_begin() , llvm::GraphTraits< VPBlockDeepTraversalWrapper< const VPBlockBase * > >::child_begin() , llvm::GraphTraits< VPBlockDeepTraversalWrapper< VPBlockBase * > >::child_begin() , llvm::GraphTraits< VPBlockShallowTraversalWrapper< const VPBlockBase * > >::child_begin() , llvm::GraphTraits< VPBlockShallowTraversalWrapper< VPBlockBase * > >::child_begin() , llvm::MachineDomTreeGraphTraitsBase< Node, ChildIterator >::child_begin() , llvm::GraphTraits< const CallGraphNode * >::child_edge_begin() , llvm::GraphTraits< const DDGNode * >::child_edge_begin() , llvm::GraphTraits< DDGNode * >::child_edge_begin() , llvm::GraphTraits< DotCfgDiffDisplayGraph * >::child_edge_begin() , llvm::GraphTraits< ValueInfo >::child_edge_begin() , llvm::GraphTraits< const CallGraphNode * >::child_edge_end() , llvm::GraphTraits< const DDGNode * >::child_edge_end() , llvm::GraphTraits< DDGNode * >::child_edge_end() , llvm::GraphTraits< DotCfgDiffDisplayGraph * >::child_edge_end() , llvm::GraphTraits< ValueInfo >::child_edge_end() , GraphTraits< const CallsiteContextGraph< DerivedCCG, FuncTy, CallTy > * >::child_end() , llvm::DomTreeGraphTraitsBase< Node, ChildIterator >::child_end() , llvm::GraphTraits< AADepGraphNode * >::child_end() , llvm::GraphTraits< ArgumentGraphNode * >::child_end() , llvm::GraphTraits< BasicBlock * >::child_end() , llvm::GraphTraits< BlockFrequencyInfo * >::child_end() , llvm::GraphTraits< BoUpSLP * >::child_end() , llvm::GraphTraits< CallGraphNode * >::child_end() , llvm::GraphTraits< const BasicBlock * >::child_end() , llvm::GraphTraits< const CallGraphNode * >::child_end() , llvm::GraphTraits< const DDGNode * >::child_end() , llvm::GraphTraits< const Loop * >::child_end() , llvm::GraphTraits< const MachineBasicBlock * >::child_end() , llvm::GraphTraits< const MachineLoop * >::child_end() , llvm::GraphTraits< const VPBlockBase * >::child_end() , llvm::GraphTraits< DDGNode * >::child_end() , llvm::GraphTraits< DotCfgDiffDisplayGraph * >::child_end() , llvm::GraphTraits< Inverse< BasicBlock * > >::child_end() , llvm::GraphTraits< Inverse< const BasicBlock * > >::child_end() , llvm::GraphTraits< Inverse< const MachineBasicBlock * > >::child_end() , llvm::GraphTraits< Inverse< MachineBasicBlock * > >::child_end() , llvm::GraphTraits< Inverse< MemoryAccess * > >::child_end() , llvm::GraphTraits< Inverse< VPBlockBase * > >::child_end() , llvm::GraphTraits< IrreducibleGraph >::child_end() , llvm::GraphTraits< LazyCallGraph * >::child_end() , llvm::GraphTraits< LazyCallGraph::Node * >::child_end() , llvm::GraphTraits< Loop * >::child_end() , llvm::GraphTraits< MachineBasicBlock * >::child_end() , llvm::GraphTraits< MachineBlockFrequencyInfo * >::child_end() , llvm::GraphTraits< MachineLoop * >::child_end() , llvm::GraphTraits< MemoryAccess * >::child_end() , llvm::GraphTraits< PGOUseFunc * >::child_end() , llvm::GraphTraits< ProfiledCallGraphNode * >::child_end() , llvm::GraphTraits< RematGraph * >::child_end() , llvm::GraphTraits< SDNode * >::child_end() , llvm::GraphTraits< SUnit * >::child_end() , llvm::GraphTraits< ValueInfo >::child_end() , llvm::GraphTraits< VPBlockBase * >::child_end() , llvm::GraphTraits< VPBlockDeepTraversalWrapper< const VPBlockBase * > >::child_end() , llvm::GraphTraits< VPBlockDeepTraversalWrapper< VPBlockBase * > >::child_end() , llvm::GraphTraits< VPBlockShallowTraversalWrapper< const VPBlockBase * > >::child_end() , llvm::GraphTraits< VPBlockShallowTraversalWrapper< VPBlockBase * > >::child_end() , llvm::MachineDomTreeGraphTraitsBase< Node, ChildIterator >::child_end() , llvm::AddrSpaceCastSDNode::classof() , llvm::AssertAlignSDNode::classof() , llvm::AtomicSDNode::classof() , llvm::BasicBlockSDNode::classof() , llvm::BlockAddressSDNode::classof() , llvm::BuildVectorSDNode::classof() , llvm::CondCodeSDNode::classof() , llvm::ConstantFPSDNode::classof() , llvm::ConstantPoolSDNode::classof() , llvm::ConstantSDNode::classof() , llvm::DbgEntity::classof() , llvm::DbgLabel::classof() , llvm::DbgVariable::classof() , llvm::DeactivationSymbolSDNode::classof() , llvm::ExternalSymbolSDNode::classof() , llvm::FPStateAccessSDNode::classof() , llvm::FrameIndexSDNode::classof() , llvm::GlobalAddressSDNode::classof() , llvm::JumpTableSDNode::classof() , llvm::LabelSDNode::classof() , llvm::LifetimeSDNode::classof() , llvm::LoadSDNode::classof() , llvm::LSBaseSDNode::classof() , llvm::MachineSDNode::classof() , llvm::MaskedGatherScatterSDNode::classof() , llvm::MaskedGatherSDNode::classof() , llvm::MaskedHistogramSDNode::classof() , llvm::MaskedLoadSDNode::classof() , llvm::MaskedLoadStoreSDNode::classof() , llvm::MaskedScatterSDNode::classof() , llvm::MaskedStoreSDNode::classof() , llvm::MCSymbolSDNode::classof() , llvm::MDNodeSDNode::classof() , llvm::MemIntrinsicSDNode::classof() , llvm::MemSDNode::classof() , llvm::ms_demangle::ArrayTypeNode::classof() , llvm::ms_demangle::ConversionOperatorIdentifierNode::classof() , llvm::ms_demangle::CustomTypeNode::classof() , llvm::ms_demangle::DynamicStructorIdentifierNode::classof() , llvm::ms_demangle::EncodedStringLiteralNode::classof() , llvm::ms_demangle::FunctionSignatureNode::classof() , llvm::ms_demangle::FunctionSymbolNode::classof() , llvm::ms_demangle::IdentifierNode::classof() , llvm::ms_demangle::IntegerLiteralNode::classof() , llvm::ms_demangle::IntrinsicFunctionIdentifierNode::classof() , llvm::ms_demangle::IntrinsicNode::classof() , llvm::ms_demangle::LiteralOperatorIdentifierNode::classof() , llvm::ms_demangle::LocalStaticGuardIdentifierNode::classof() , llvm::ms_demangle::LocalStaticGuardVariableNode::classof() , llvm::ms_demangle::NamedIdentifierNode::classof() , llvm::ms_demangle::NodeArrayNode::classof() , llvm::ms_demangle::PointerAuthQualifierNode::classof() , llvm::ms_demangle::PointerTypeNode::classof() , llvm::ms_demangle::PrimitiveTypeNode::classof() , llvm::ms_demangle::QualifiedNameNode::classof() , llvm::ms_demangle::RttiBaseClassDescriptorNode::classof() , llvm::ms_demangle::SpecialTableSymbolNode::classof() , llvm::ms_demangle::StructorIdentifierNode::classof() , llvm::ms_demangle::SymbolNode::classof() , llvm::ms_demangle::TagTypeNode::classof() , llvm::ms_demangle::TemplateParameterReferenceNode::classof() , llvm::ms_demangle::ThunkSignatureNode::classof() , llvm::ms_demangle::TypeNode::classof() , llvm::ms_demangle::VariableSymbolNode::classof() , llvm::ms_demangle::VcallThunkIdentifierNode::classof() , llvm::PiBlockDDGNode::classof() , llvm::PseudoProbeSDNode::classof() , llvm::RegisterMaskSDNode::classof() , llvm::RegisterSDNode::classof() , llvm::RootDDGNode::classof() , llvm::RootDDGNode::classof() , llvm::ShuffleVectorSDNode::classof() , llvm::SimpleDDGNode::classof() , llvm::SimpleDDGNode::classof() , llvm::SrcValueSDNode::classof() , llvm::StoreSDNode::classof() , llvm::SuffixTreeInternalNode::classof() , llvm::SuffixTreeLeafNode::classof() , llvm::TargetIndexSDNode::classof() , llvm::vfs::detail::InMemoryDirectory::classof() , llvm::vfs::detail::InMemoryFile::classof() , llvm::VPBaseLoadStoreSDNode::classof() , llvm::VPGatherScatterSDNode::classof() , llvm::VPGatherSDNode::classof() , llvm::VPLoadFFSDNode::classof() , llvm::VPLoadSDNode::classof() , llvm::VPScatterSDNode::classof() , llvm::VPStoreSDNode::classof() , llvm::VPStridedLoadSDNode::classof() , llvm::VPStridedStoreSDNode::classof() , llvm::VTSDNode::classof() , llvm::X86MaskedGatherScatterSDNode::classof() , llvm::X86MaskedGatherSDNode::classof() , llvm::X86MaskedScatterSDNode::classof() , llvm::yaml::AliasNode::classof() , llvm::yaml::BlockScalarNode::classof() , llvm::yaml::KeyValueNode::classof() , llvm::yaml::MappingNode::classof() , llvm::yaml::NullNode::classof() , llvm::yaml::ScalarNode::classof() , llvm::yaml::SequenceNode::classof() , cleanUpTempFilesImpl() , llvm::rdf::DataFlowGraph::DefStack::clear_block() , CloneLoopBlocks() , llvm::CloneModule() , CloneNodeWithValues() , llvm::sandboxir::SchedBundle::cluster() , llvm::rdf::DeadCodeElimination::collect() , llvm::collectChildrenInLoop() , collectConcatOps() , llvm::SDPatternMatch::ReassociatableOpc_match< PatternTs >::collectLeaves() , combineAcrossLanesIntrinsic() , combineADC() , combineAdd() , combineAddOfBooleanXor() , combineAddOrSubToADCOrSBB() , combineADDRSPACECAST() , combineADDToADDZE() , combineADDToMAT_PCREL_ADDR() , combineADDToSUB() , combineADDX() , combineAnd() , combineAndMaskToShift() , combineAndNotIntoANDNP() , combineAndNotIntoVANDN() , combineAndNotOrIntoAndNotAnd() , combineAndnp() , combineANDOfSETCCToCZERO() , combineAndOrForCcmpCtest() , CombineANDShift() , combineAndShuffleNot() , combineAVG() , combineAVX512SetCCToKMOV() , CombineBaseUpdate() , combineBEXTR() , combineBinOpOfExtractToReduceTree() , combineBinOpOfZExt() , combineBinOpToReduce() , combineBitcast() , combineBITREVERSE() , combineBMILogicOp() , combineBrCond() , combineBROADCAST_LOAD() , combineBT() , combineBVOfConsecutiveLoads() , combineBVOfVecSExt() , combineBVZEXTLOAD() , combineCarryDiamond() , combineCastedMaskArithmetic() , combineCMov() , combineCMP() , combineCommutableSHUFP() , combineCompareEqual() , combineCONCAT_VECTORS() , combineConcatVectorOfCasts() , combineConcatVectorOfConcatVectors() , combineConcatVectorOfExtracts() , combineConcatVectorOfScalars() , combineConcatVectorOfShuffleAndItsOperands() , combineConcatVectorOfSplats() , combineConstantPoolLoads() , combineCVTP2I_CVTTP2I() , combineCVTPH2PS() , combineDeMorganOfBoolean() , combineEXTEND_VECTOR_INREG() , combineEXTRACT_SUBVECTOR() , combineExtractFromVectorLoad() , combineExtractVectorElt() , combineExtractWithShuffle() , combineExtSetcc() , combineFaddCFmul() , combineFaddFsub() , combineFAnd() , combineFAndFNotToFAndn() , combineFAndn() , combineFMA() , combineFMADDSUB() , combineFMinFMax() , combineFMinNumFMaxNum() , combineFMulcFCMulc() , combineFneg() , combineFOr() , combineFP16_TO_FP() , combineFP_EXTEND() , combineFP_ROUND() , combineFP_TO_xINT_SAT() , combineFPToSInt() , combineFunnelShift() , combineGatherScatter() , combineHorizOpWithShuffle() , combinei64TruncSrlConstant() , combineINSERT_SUBVECTOR() , combineINTRINSIC_VOID() , combineINTRINSIC_W_CHAIN() , combineINTRINSIC_WO_CHAIN() , combineKSHIFT() , combineLOAD() , combineLoad() , combineLogicBlendIntoPBLENDV() , combineLRINT_LLRINT() , combineM68kBrCond() , combineM68kSetCC() , combineMaskedLoad() , combineMaskedStore() , combineMOVDQ2Q() , combineMOVMSK() , combineMul() , combineMulSpecial() , combineMulToPMADD52() , combineMulToPMADDWD() , combineMulToPMULDQ() , combineMulWide() , combineNarrowableShiftedLoad() , combineOp_VLToVWOp_VL() , combineOr() , combineOrAndToBitfieldInsert() , combineOrCmpEqZeroToCtlzSrl() , combineOrOfCZERO() , combineOrToBitfieldInsert() , combinePackingMovIntoStore() , combinePDEP() , combinePExtTruncate() , combinePMULDQ() , combinePRMT() , combineProxyReg() , combineRedundantDWordShuffle() , combineSBB() , combineSCALAR_TO_VECTOR() , combineScalarAndWithMaskSetcc() , combineSelect() , llvm::VETargetLowering::combineSelect() , combineSelectAndUse() , combineSelectAndUse() , combineSelectAndUse() , combineSelectAndUseCommutative() , combineSelectAndUseCommutative() , combineSelectAndUseCommutative() , llvm::VETargetLowering::combineSelectCC() , combineSelectOfTwoConstants() , combineSelectToBinOp() , combineSetCC() , combineSext() , combineSextInRegCmov() , combineShiftLeft() , combineShiftRightArithmetic() , combineShiftRightLogical() , combineShiftToMULH() , combineShiftToPMULH() , combineShlAddIAdd() , combineShlAddIAddImpl() , combineShuffle() , combineShuffleToAddSubOrFMAddSub() , combineShuffleToFMAddSub() , combineSignExtendInReg() , combineSIntToFP() , combineSTORE() , combineStore() , combineStoreToNewValue() , combineSub() , combineSubOfBoolean() , combineSubSetcc() , combineSubShiftToOrcB() , combineSUBX() , combineSVEBitSel() , combineSVEPrefetchVecBaseImmOff() , combineSVEReductionFP() , combineSVEReductionInt() , combineSVEReductionOrderedFP() , combineTargetShuffle() , combineTESTP() , llvm::TargetLowering::DAGCombinerInfo::CombineTo() , llvm::TargetLowering::DAGCombinerInfo::CombineTo() , llvm::TargetLowering::DAGCombinerInfo::CombineTo() , llvm::TargetLowering::TargetLoweringOpt::CombineTo() , combineToFPTruncExtElt() , combineToHorizontalAddSub() , combineToVCPOP() , combineToVWMACC() , llvm::VETargetLowering::combineTRUNCATE() , combineTruncate() , combineTruncatedArithmetic() , combineTruncOfSraSext() , combineTruncSelectToSMaxUSat() , combineTruncToVnclip() , combineUADDO_CARRYDiamond() , combineUIntToFP() , combineUnpackingMovIntoLoad() , combineVectorCompare() , combineVectorCompareAndMaskUnaryOp() , combineVectorHADDSUB() , combineVectorInsert() , combineVectorMulToSraBitcast() , combineVectorPack() , combineVectorShiftImm() , combineVectorShiftVar() , combineVectorSizedSetCCEquality() , combineVEXTRACT_STORE() , combineVFMADD_VLWithVFNEG_VL() , CombineVLDDUP() , combineVPMADD() , combineVPMADD52LH() , combineVqdotAccum() , combineVSelectToBLENDV() , combineVTRUNC() , combineVWADDSUBWSelect() , combineX86AddSub() , combineX86CloadCstore() , combineX86GatherScatter() , combineX86INT_TO_FP() , combineX86SetCC() , combineX86ShuffleChain() , combineX86ShufflesConstants() , combineX86SubCmpForFlags() , combineXor() , combineXorSubCTLZ() , combineXorToBitfieldInsert() , combineZext() , commuteSelect() , llvm::DomTreeNodeBase< BlockT >::compare() , llvm::sys::unicode::compareNode() , llvm::ScaledNumber< uint64_t >::compareTo() , llvm::ScaledNumber< uint64_t >::compareTo() , llvm::BTFTypeFuncProto::completeType() , llvm::WasmException::computeCallSiteTable() , llvm::ProfileSummaryBuilder::computeDetailedSummary() , computeDomSubtreeCost() , computeFlagsForAddressComputation() , llvm::ScheduleDAGSDNodes::computeLatency() , llvm::EHStreamer::computePadMap() , llvm::MachineBasicBlock::computeRegisterLiveness() , computeShapeInfoForInst() , llvm::object::computeSymbolSizes() , constantFold() , llvm::constructSeqOffsettoOrigRowMapping() , llvm::DwarfUnit::constructSubprogramArguments() , llvm::codeview::consume() , llvm::DIExpressionCursor::consume() , llvm::codeview::consume_numeric() , llvm::ImmutableGraph< NodeValueT, EdgeValueT >::NodeSet::contains() , llvm::ConvertCostTableLookup() , convertMergedOpToPredOp() , convertMLOADToLoadWithUsedBytesMask() , ConvertSelectToConcatVector() , ConvertSETCCToXori() , convertTwoLoadsAndCmpToVCMPEQUB() , llvm::IntervalMapImpl::NodeBase< std::pair< KeyT, KeyT >, ValT, LeafSize >::copy() , llvm::SelectionDAG::copyExtraInfo() , copyMetadataForAtomic() , llvm::copyMetadataForLoad() , llvm::copyNonnullMetadata() , llvm::copyRangeMetadata() , llvm::CostTableLookup() , llvm::StringRef::count() , llvm::ScaledNumberBase::countLeadingZeros32() , llvm::ScaledNumberBase::countLeadingZeros64() , countOperands() , llvm::InstrEmitter::CountResults() , llvm::Function::Create() , llvm::Function::Create() , llvm::PointerSumType< TagT, MemberTs... >::create() , llvm::IRBuilderBase::CreateAggregateRet() , llvm::DwarfUnit::createAndAddDIE() , llvm::AbstractDependenceGraphBuilder< GraphType >::createDefUseEdges() , llvm::AbstractDependenceGraphBuilder< DataDependenceGraph >::createDefUseEdges() , llvm::AbstractDependenceGraphBuilder< DataDependenceGraph >::createFineGrainedNodes() , llvm::DIBuilder::createGlobalVariableExpression() , llvm::createGraphFilename() , createIrreducibleLoop() , llvm::AbstractDependenceGraphBuilder< DataDependenceGraph >::createMemoryDependencyEdges() , llvm::SlotTracker::createMetadataSlot() , llvm::createPGONameMetadata() , llvm::sys::unicode::createRoot() , createThunkName() , customLegalizeToWOp() , customLegalizeToWOp() , customLegalizeToWOpWithSExt() , customLegalizeToWOpWithSExt() , CustomNonLegalBITCASTResults() , DAGCombineAddc() , llvm::SelectionDAG::DAGUpdateListener , llvm::DbgEntity::DbgEntity() , llvm::DDGEdge::DDGEdge() , llvm::DDGEdge::DDGEdge() , llvm::DDGNode::DDGNode() , llvm::DDGNode::DDGNode() , llvm::DebugLoc::DebugLoc() , DecodeDisp() , DecodeIITType() , llvm::AArch64_AM::decodeLogicalImmediate() , decodePCDBLOperand() , decodePunycode() , decodeRegisterClass() , decodeSImmOperandAndLslN() , llvm::DWARFTypePrinter< DieType >::decomposeConstVolatile() , llvm::SelectionDAG::DeleteNode() , llvm::IntrusiveBackList< Node >::deleteNode() , llvm::MDNode::deleteTemporary() , llvm::DomTreeBuilder::SemiNCAInfo< DomTreeT >::DeleteUnreachable() , llvm::SDValue::DenseMapInfo< SDValue > , llvm::DependenceGraphInfo< DDGNode >::DependenceGraphInfo() , llvm::OutlinedHashTree::depth() , llvm::AbstractDependenceGraphBuilder< GraphType >::destroyNode() , llvm::HexagonDAGToDAGISel::DetectUseSxtw() , determineVPlanVF() , llvm::DFCalculateWorkObject< BlockT >::DFCalculateWorkObject() , llvm::DGEdge< DDGNode, DDGEdge >::DGEdge() , llvm::DIArgListKeyInfo::DIArgListKeyInfo() , llvm::DictScope::DictScope() , llvm::DirectedGraph< DDGNode, DDGEdge >::DirectedGraph() , doNotCSE() , llvm::ArrayRef< llvm::cfg::Update< MachineBasicBlock * > >::drop_back() , llvm::BinaryStreamRefBase< RefType, StreamType >::drop_back() , llvm::MutableArrayRef< char >::drop_back() , llvm::StringRef::drop_back() , llvm::drop_begin() , llvm::drop_end() , llvm::ArrayRef< llvm::cfg::Update< MachineBasicBlock * > >::drop_front() , llvm::BinaryStreamRefBase< RefType, StreamType >::drop_front() , llvm::BinarySubstreamRef::drop_front() , llvm::MutableArrayRef< char >::drop_front() , llvm::StringRef::drop_front() , llvm::BinaryStreamRefBase< RefType, StreamType >::drop_symmetric() , llvm::LexicalScope::dump() , llvm::sandboxir::SchedBundle::dump() , llvm::SelectionDAG::dump() , llvm::ScheduleDAGSDNodes::dumpNode() , DumpNodes() , DumpNodesr() , earlyExpandDIVFIX() , llvm::LazyCallGraph::Edge::Edge() , llvm::LazyCallGraph::Edge::Edge() , llvm::SDPatternMatch::EffectiveOperands< ExcludeChain >::EffectiveOperands() , llvm::SDPatternMatch::EffectiveOperands< false >::EffectiveOperands() , eliminateFPCastPair() , llvm::OnDiskChainedHashTableGenerator< Info >::Emit() , emitErrorAndReplaceIntrinsicResults() , llvm::SystemZAsmPrinter::emitFunctionEntryLabel() , llvm::InstrProfRecordWriterTrait::EmitKey() , llvm::InstrProfRecordWriterTrait::EmitKeyDataLength() , llvm::memprof::CallStackWriterTrait::EmitKeyDataLength() , llvm::memprof::FrameWriterTrait::EmitKeyDataLength() , llvm::memprof::RecordWriterTrait::EmitKeyDataLength() , llvm::AsmPrinter::emitNops() , llvm::ScheduleDAGSDNodes::EmitSchedule() , llvm::MipsMCCodeEmitter::encodeInstruction() , llvm::SDNodeIterator::end() , llvm::SUnitIterator::end() , llvm::SelectionDAGISel::EnforceNodeIdInvariant() , llvm::EnumEntry< T >::EnumEntry() , llvm::EnumEntry< T >::EnumEntry() , llvm::const_iterator< MemoryLocation >::erase() , llvm::const_iterator< MemoryLocation >::erase() , llvm::ImmutableGraph< NodeValueT, EdgeValueT >::NodeSet::erase() , llvm::EscapeEnumerator::EscapeEnumerator() , llvm::HexagonEvaluator::evaluate() , Expand64BitShift() , llvm::TargetLowering::expandABD() , llvm::TargetLowering::expandABS() , llvm::TargetLowering::expandAVG() , llvm::TargetLowering::expandBITREVERSE() , llvm::TargetLowering::expandBSWAP() , llvm::TargetLowering::expandDIVREMByConstant() , llvm::TargetLowering::expandFMINIMUM_FMAXIMUM() , expandIntrinsicWChainHelper() , llvm::TargetLowering::expandMUL() , expandMul() , expandMulToAddOrSubOfShl() , expandMulToNAFSequence() , expandMulToShlAddShlAdd() , llvm::TargetLowering::expandPartialReduceMLA() , ExpandREAD_REGISTER() , llvm::TargetLowering::expandVectorFindLastActive() , llvm::TargetLowering::expandVPBITREVERSE() , llvm::TargetLowering::expandVPBSWAP() , llvm::TargetLowering::expandVPCTTZElements() , llvm::PPCTargetLowering::expandVSXLoadForLE() , llvm::PPCTargetLowering::expandVSXStoreForLE() , ExtendUsesToFormExtLoad() , llvm::SPIRV::extractFunctionTypeFromMetadata() , extractMDNode() , llvm::HexagonDAGToDAGISel::FastFDiv() , llvm::HexagonDAGToDAGISel::FDiv() , llvm::CallGraphUpdater::finalize() , llvm::DIBuilder::finalize() , llvm::GISelWorkList< 512 >::finalize() , llvm::StringRef::find() , llvm::LexicalScopes::findAbstractScope() , llvm::PMTopLevelManager::findAnalysisUsage() , FindBFIToCombineWith() , llvm::SwitchCG::SwitchLowering::findBitTestClusters() , FindCallSeqStart() , llvm::DGNode< DDGNode, DDGEdge >::findEdgesTo() , llvm::DGNode< DDGNode, DDGEdge >::findEdgeTo() , llvm::IntervalMapImpl::BranchNode< KeyT, ValT, Sizer::BranchSize, Traits >::findFrom() , llvm::IntervalMapImpl::LeafNode< KeyT, ValT, Sizer::LeafSize, Traits >::findFrom() , findGluedUser() , llvm::DirectedGraph< DDGNode, DDGEdge >::findIncomingEdgesToNode() , llvm::LexicalScopes::findInlinedScope() , llvm::SwitchCG::SwitchLowering::findJumpTables() , llvm::LexicalScopes::findLexicalScope() , findMemSDNode() , findMoreOptimalIndexType() , llvm::DirectedGraph< DDGNode, DDGEdge >::findNode() , llvm::DirectedGraph< DDGNode, DDGEdge >::findNode() , findNonImmUse() , findPartitions() , findPointerConstIncrement() , llvm::DomTreeBuilder::SemiNCAInfo< DomTreeT >::FindRoots() , findVSplat() , llvm::ItaniumPartialDemangler::finishDemangle() , FixupMMXIntrinsicTypes() , llvm::SelectionDAG::FlagInserter::FlagInserter() , fnegFoldsIntoOp() , foldADCToCINC() , foldADDIForFasterLocalAccesses() , foldAddSubBoolOfMaskedVal() , foldAddSubOfSignBit() , foldAndToUsubsat() , foldBitOrderCrossLogicOp() , foldBoolSelectToLogic() , foldCondBranchOnValueKnownInPredecessorImpl() , foldCSELofCTTZ() , foldExtendedSignBitTest() , foldExtendVectorInregToExtendOfSubvector() , foldFPToIntToFP() , llvm::AMDGPUTargetLowering::foldFreeOpFromSelect() , FoldIntToFPToInt() , foldLogicOfShifts() , foldLogicTreeOfShifts() , foldMaskAndShiftToExtract() , foldMaskAndShiftToScale() , foldMaskedShiftToBEXTR() , foldMaskedShiftToScaledMask() , foldMemChr() , foldRemainderIdiom() , foldSelectOfConstantsUsingSra() , foldSelectOfCTTZOrCTLZ() , foldSelectWithIdentityConstant() , foldSubCtlzNot() , foldToSaturated() , foldVectorXorShiftIntoCmp() , foldVectorXorShiftIntoCmp() , foldVGPRCopyIntoRegSequence() , foldVSelectToSignBitSplatMask() , foldXor1SetCC() , foldXorTruncShiftIntoCmp() , llvm::codeview::TypeCollection::ForEachRecord() , llvm::DISubprogram::forEachRetainedNode() , llvm::format_provider< T, std::enable_if_t< support::detail::use_string_formatter< T >::value > >::format() , llvm::format_decimal() , llvm::format_hex() , llvm::format_hex_no_prefix() , format_to_buffer() , llvm::IRSimilarity::IRSimilarityCandidate::fromCanonicalNum() , llvm::sys::unicode::Node::fullName() , llvm::gsym::FunctionInfo::FunctionInfo() , llvm::GCOVBlock::GCOVBlock() , llvm::GCRoot::GCRoot() , generateEquivalentSub() , llvm::LoongArchMatInt::generateInstSeq() , false::GepNode::GepNode() , llvm::ArrayRecycler< T, Align >::Capacity::get() , llvm::IDFCalculatorDetail::ChildrenGetterTy< NodeTy, IsPostDom >::get() , llvm::IDFCalculatorDetail::ChildrenGetterTy< BasicBlock, IsPostDom >::get() , llvm::LazyCallGraph::get() , llvm::ScaledNumber< uint64_t >::get() , llvm::PPC::get_VSPLTI_elt() , llvm::MipsTargetLowering::getAddrGlobal() , llvm::MipsTargetLowering::getAddrGlobalLargeGOT() , llvm::MipsTargetLowering::getAddrGPRel() , llvm::MipsTargetLowering::getAddrLocal() , llvm::MipsTargetLowering::getAddrNonPIC() , llvm::MipsTargetLowering::getAddrNonPICSym64() , llvm::NVPTXDAGToDAGISel::getAddrSpace() , llvm::SelectionDAG::getAddrSpaceCast() , llvm::rdf::Liveness::getAllReachingDefs() , llvm::offloading::amdgpu::getAMDGPUMetaDataFromImage() , getArray() , llvm::msgpack::Document::getArrayNode() , llvm::yaml::PolymorphicTraits< DocNode >::getAsMap() , getAsNonOpaqueConstant() , llvm::yaml::PolymorphicTraits< DocNode >::getAsScalar() , llvm::yaml::PolymorphicTraits< DocNode >::getAsSequence() , llvm::SelectionDAG::getAssertAlign() , llvm::json::Value::getAsUINT64() , llvm::SelectionDAG::getAtomic() , getBasePtrIndex() , llvm::SelectionDAG::getBasicBlock() , llvm::SelectionDAG::getBlockAddress() , llvm::MachineFunction::getBlockNumbered() , llvm::sandboxir::SchedBundle::getBot() , getBuildPairElt() , getBuildVectorizedValue() , llvm::EdgeBundles::getBundle() , llvm::IRSimilarity::IRSimilarityCandidate::getCanonicalNum() , llvm::X86TTIImpl::getCastInstrCost() , llvm::object::MachOObjectFile::getChainedFixupsSegments() , llvm::pdb::NativeEnumGlobals::getChildAtIndex() , llvm::pdb::NativeEnumInjectedSources::getChildAtIndex() , llvm::pdb::NativeEnumLineNumbers::getChildAtIndex() , llvm::pdb::NativeEnumModules::getChildAtIndex() , llvm::pdb::NativeEnumSymbols::getChildAtIndex() , llvm::pdb::NativeEnumTypes::getChildAtIndex() , llvm::DomTreeBuilder::SemiNCAInfo< DomTreeT >::getChildren() , llvm::DomTreeBuilder::SemiNCAInfo< DomTreeT >::getChildren() , llvm::GraphDiff< MachineBasicBlock *, false >::getChildren() , getCombineLoadStoreParts() , llvm::SelectionDAG::getCondCode() , llvm::SelectionDAG::getConstant() , llvm::SelectionDAG::getConstantFP() , llvm::SelectionDAG::getConstantPool() , llvm::SelectionDAG::getConstantPool() , llvm::getConstantValue() , llvm::legacy::FunctionPassManagerImpl::getContainedManager() , llvm::legacy::PassManagerImpl::getContainedManager() , llvm::FPPassManager::getContainedPass() , llvm::LPPassManager::getContainedPass() , llvm::RGPassManager::getContainedPass() , llvm::SelectionDAG::getCopyToReg() , llvm::SelectionDAG::getCopyToReg() , llvm::SelectionDAG::getCopyToReg() , llvm::ScheduleDAGSDNodes::getCustomGraphFeatures() , llvm::SelectionDAG::getDbgValue() , llvm::SelectionDAG::getDeactivationSymbol() , llvm::DominatorTreeBase< BlockT, false >::getDescendants() , llvm::cl::generic_parser_base::getDescription() , llvm::cl::parser< DataType >::getDescription() , llvm::NVPTXTargetLowering::getDivF32Level() , getDivRemArgList() , getDivRemLibcall() , llvm::MipsTargetLowering::getDllimportSymbol() , llvm::MipsTargetLowering::getDllimportVariable() , llvm::BFIDOTGraphTraitsBase< BlockFrequencyInfo, BranchProbabilityInfo >::getEdgeAttributes() , llvm::DOTGraphTraits< SplitGraph >::getEdgeAttributes() , llvm::StructType::getElementType() , llvm::msgpack::Document::getEmptyNode() , getEncodedIntegerLength() , llvm::AMDGPU::getEncodingFromOperandTable() , llvm::DomTreeGraphTraitsBase< Node, ChildIterator >::getEntryNode() , llvm::GraphTraits< const DDGNode * >::getEntryNode() , llvm::GraphTraits< const VPBlockBase * >::getEntryNode() , llvm::GraphTraits< DDGNode * >::getEntryNode() , llvm::GraphTraits< Inverse< MemoryAccess * > >::getEntryNode() , llvm::GraphTraits< LazyCallGraph * >::getEntryNode() , llvm::GraphTraits< LazyCallGraph::Node * >::getEntryNode() , llvm::GraphTraits< MemoryAccess * >::getEntryNode() , llvm::GraphTraits< SDNode * >::getEntryNode() , llvm::GraphTraits< SplitGraph >::getEntryNode() , llvm::GraphTraits< SUnit * >::getEntryNode() , llvm::GraphTraits< VPBlockBase * >::getEntryNode() , llvm::GraphTraits< VPBlockDeepTraversalWrapper< const VPBlockBase * > >::getEntryNode() , llvm::GraphTraits< VPBlockDeepTraversalWrapper< VPBlockBase * > >::getEntryNode() , llvm::GraphTraits< VPBlockShallowTraversalWrapper< const VPBlockBase * > >::getEntryNode() , llvm::GraphTraits< VPBlockShallowTraversalWrapper< VPBlockBase * > >::getEntryNode() , llvm::GraphTraits< VPlan * >::getEntryNode() , llvm::MachineDomTreeGraphTraitsBase< Node, ChildIterator >::getEntryNode() , llvm::BasicTTIImplBase< BasicTTIImpl >::getEstimatedNumberOfCaseClusters() , getExtendForIntVecReduction() , getExtendTypeForNode() , llvm::SelectionDAG::getExternalSymbol() , getExtractedDemandedElts() , getFauxShuffleMask() , getFieldRawString() , llvm::getFpImmVal() , llvm::ScaledNumber< uint64_t >::getFraction() , llvm::SelectionDAG::getFrameIndex() , llvm::ItaniumPartialDemangler::getFunctionBaseName() , llvm::IndexedInstrProfReader::getFunctionBitmap() , llvm::ItaniumPartialDemangler::getFunctionDeclContextName() , llvm::ItaniumPartialDemangler::getFunctionName() , llvm::ItaniumPartialDemangler::getFunctionParameters() , llvm::ItaniumPartialDemangler::getFunctionReturnType() , llvm::getGatherScatterIndex() , llvm::getGatherScatterScale() , llvm::SelectionDAG::getGatherVP() , llvm::StatepointOpers::getGCPointerMap() , llvm::SelectionDAG::getGetFPEnv() , llvm::SelectionDAG::getGlobalAddress() , getGlobalForName() , llvm::SelectionDAG::getGraphAttrs() , llvm::ScheduleDAGSDNodes::getGraphNodeLabel() , getHalf() , llvm::ScaledNumberBase::getHalf() , llvm::DIArgListInfo::getHashValue() , llvm::MDNodeInfo< NodeTy >::getHashValue() , getHexDigit() , llvm::getImmVal() , llvm::SelectionDAG::getIndexedStoreVP() , getInputChainForNode() , llvm::TargetInstrInfo::getInstrLatency() , getInstrProfSection() , llvm::IRBuilderBase::getIntN() , llvm::IRBuilderBase::getIntNTy() , getIntrinsicID() , llvm::ScaledNumber< uint64_t >::getInverse() , llvm::SelectionDAG::getJumpTable() , llvm::yaml::PolymorphicTraits< DocNode >::getKind() , llvm::SelectionDAG::getLabelNode() , getLargeExternalSymbol() , getLargeGlobalAddress() , llvm::SelectionDAG::getLifetimeNode() , llvm::SelectionDAG::getLoad() , llvm::SelectionDAG::getLoadFFVP() , llvm::SelectionDAG::getLoadVP() , llvm::SelectionDAG::getMachineNode() , llvm::msgpack::Document::getMapNode() , llvm::SelectionDAG::getMaskedGather() , llvm::SelectionDAG::getMaskedHistogram() , llvm::SelectionDAG::getMaskedLoad() , llvm::SelectionDAG::getMaskedScatter() , llvm::SelectionDAG::getMaskedStore() , llvm::AMDGPU::IsaInfo::getMaxWorkGroupsPerCU() , llvm::SelectionDAG::getMCSymbol() , llvm::SelectionDAG::getMDNode() , getMDNodeOperandImpl() , llvm::getMDOperandAsType() , llvm::SelectionDAG::getMemIntrinsicNode() , getMemOpKey() , llvm::MDNode::getMergedCalleeTypeMetadata() , llvm::SlotTracker::getMetadataSlot() , getMetadataTypeOrder() , getMetadataTypeOrder() , llvm::getN1Bits() , llvm::AliasScopeNode::getName() , llvm::AMDGPU::getNameFromOperandTable() , llvm::rdf::Liveness::getNearestAliasedRef() , llvm::TargetLowering::getNegatedExpression() , llvm::ilist_detail::NodeAccess::getNext() , llvm::ilist_detail::NodeAccess::getNext() , llvm::iplist_impl< IntrusiveListT, TraitsT >::getNextNode() , llvm::iplist_impl< IntrusiveListT, TraitsT >::getNextNode() , llvm::msgpack::Document::getNode() , llvm::msgpack::Document::getNode() , llvm::msgpack::Document::getNode() , llvm::msgpack::Document::getNode() , llvm::msgpack::Document::getNode() , llvm::msgpack::Document::getNode() , llvm::msgpack::Document::getNode() , llvm::msgpack::Document::getNode() , llvm::msgpack::Document::getNode() , llvm::SelectionDAG::getNode() , llvm::SelectionDAG::getNode() , llvm::SelectionDAG::getNode() , llvm::SelectionDAG::getNode() , llvm::SelectionDAG::getNode() , llvm::SelectionDAG::getNode() , llvm::VECustomDAG::getNode() , llvm::VECustomDAG::getNode() , llvm::VECustomDAG::getNode() , llvm::BFIDOTGraphTraitsBase< BlockFrequencyInfo, BranchProbabilityInfo >::getNodeAttributes() , llvm::DOTGraphTraits< ScheduleDAG * >::getNodeAttributes() , llvm::DOTGraphTraits< ScheduleDAGMI * >::getNodeAttributes() , llvm::DOTGraphTraits< SelectionDAG * >::getNodeAttributes() , llvm::DOTGraphTraits< SplitGraph >::getNodeAttributes() , llvm::DOTGraphTraits< SplitGraph >::getNodeDescription() , llvm::ImmutableGraph< MachineInstr *, int >::getNodeIndex() , llvm::DOTGraphTraits< SplitGraph >::getNodeLabel() , llvm::getNodePassthru() , llvm::ilist_detail::NodeAccess::getNodePtr() , llvm::ilist_detail::NodeAccess::getNodePtr() , llvm::ilist_detail::SpecificNodeAccess< OptionsT >::getNodePtr() , llvm::ilist_detail::SpecificNodeAccess< OptionsT >::getNodePtr() , getNodeRegMask() , llvm::AbstractDependenceGraphBuilder< GraphType >::getNodesInPiBlock() , llvm::DDGBuilder::getNodesInPiBlock() , getNonCompileUnitScope() , llvm::SelectionDAGBuilder::getNonRegisterValue() , llvm::EmptyMatchContext::getNumOperands() , llvm::SDPatternMatch::BasicMatchContext::getNumOperands() , llvm::VPMatchContext::getNumOperands() , getNumOperandsNoGlue() , llvm::InstrProfRecord::getNumValueData() , llvm::AArch64CC::getNZCVToSatisfyCondCode() , llvm::GVNExpression::BasicExpression::getOperand() , llvm::NamedMDNode::getOperand() , llvm::VPUser::getOperand() , llvm::BitCodeAbbrev::getOperandInfo() , llvm::cl::generic_parser_base::getOption() , llvm::cl::parser< DataType >::getOption() , llvm::cl::generic_parser_base::getOptionValue() , llvm::cl::parser< DataType >::getOptionValue() , llvm::MachineFunction: | 2026-01-13T09:30:40 |
https://opensource.com/resources/projects-and-applications | Projects and Applications | Opensource.com Skip to main content User account menu Log in RSS Main navigation Articles Resources What is open source? The open source way Projects and applications Organizations Open source alternatives Alternatives to Acrobat Alternatives to AutoCAD Alternatives to Dreamweaver Alternatives to Gmail Alternatives to MATLAB Alternatives to Minecraft Alternatives to Google Photos Alternatives to Photoshop Alternatives to Skype Alternatives to Slack Alternatives to Trello More... Linux Downloads Frequently Asked Questions Search Projects and Applications Image by: Opensource.com Top 5 open source project management tools Top 3 open source business intelligence and reporting tools Top 5 open source alternatives to Trello Top 5 open source alternatives to Gmail Top 4 open source command-line email clients Top 7 open source tools and free resources for writing Top 10 open source alternatives to Minecraft Top 4 open source tools for diagramming in Fedora Top 3 open source tools for creating presentations Top 3 open source content management systems Top 4 open source ERP systems Top 4 open source LDAP implementations Top 3 open source alternatives to Google Analytics Top 5 open source customer relationship management tools Top 3 open source scanning utilities Top 4 open source text editors Top 8 open source data visualization tools Top 5 open source tools for taming text This work is licensed under a Creative Commons Attribution-Share Alike 4.0 International License. Are you new to open source? Browse our collection of resources. Start now About This Site The opinions expressed on this website are those of each author, not of the author's employer or of Red Hat. Opensource.com aspires to publish all content under a Creative Commons license but may not be able to do so in all cases. You are responsible for ensuring that you have the necessary permission to reuse any work on this site. Red Hat and the Red Hat logo are trademarks of Red Hat, Inc., registered in the United States and other countries. A note on advertising: Opensource.com does not sell advertising on the site or in any of its newsletters. Copyright © 2021 Red Hat, Inc. Legal Privacy Policy Terms of use | 2026-01-13T09:30:40 |
https://aws.amazon.com/blogs/networking-and-content-delivery/category/post-types/announcements/ | Announcements | Networking & Content Delivery Skip to Main Content Filter: All English Contact us AWS Marketplace Support My account Search Filter: All Sign in to console Create account AWS Blogs Home Blogs Editions Networking & Content Delivery Category: Announcements AWS and Google Cloud collaborate to simplify multicloud networking by Robert Kennedy and Rob Enns (Guest) on 08 DEC 2025 in Announcements , Networking & Content Delivery Permalink Share As organizations increasingly adopt multicloud architectures, the need for interoperability between cloud service providers has never been greater. Historically, however, connecting these environments has been a challenge, forcing customers to take a complex “do-it-yourself” approach to managing global multi-layered networks at scale. To address these challenges and advance a more open cloud environment, Amazon Web […] Securing Egress Architectures with Network Firewall Proxy by Tom Adamski and Akshay Choudhry on 25 NOV 2025 in Announcements , AWS Network Firewall , Networking & Content Delivery , Security, Identity, & Compliance Permalink Share Note: Dec 4, 2025 – expanded with additional section on application networking integrations. Customers who control access out of their AWS environments using self-managed proxies often find it challenging to deploy, scale, and patch their EC2 or container-based proxy fleets. With the recent launch of AWS Network Firewall proxy preview, AWS is taking over the […] Introducing Flexible Cost Allocation for AWS Transit Gateway by Thaddeus Worsnop and Alin Scurtu on 21 NOV 2025 in Announcements , AWS Transit Gateway , Networking & Content Delivery , Technical How-to Permalink Share Today AWS announced Flexible Cost Allocation (FCA) for AWS Transit Gateway, a capability that gives you granular control over how Transit Gateway data processing costs are allocated across AWS accounts, including member accounts within AWS Organizations. With FCA, you configure metering policies for your Transit Gateway that allows you the flexibility to allocate charges to […] AWS Site-to-Site VPN and eero make remote connectivity for distributed sites simpler by Pablo Sánchez Carmona and Tim Dormer on 21 NOV 2025 in Announcements , AWS Site-to-Site VPN , Networking & Content Delivery Permalink Share Amazon Web Services (AWS) is working with eero to make it simpler and more convenient for organizations to establish secure connectivity between their remote sites and AWS in just a few clicks. The integration of AWS Site-to-Site VPN with eero’s devices enables organizations to scale site connectivity across many locations faster and more efficient, without requiring […] Drive application performance with Application Load Balancer Target Optimizer by James Wenzel and Ashish Kumar on 20 NOV 2025 in Announcements , Elastic Load Balancing , Launch , Networking & Content Delivery , News Permalink Share AWS Application Load Balancer is an HTTP request load balancer designed to provide scalability through load distribution and high availability through target health detection and unhealthy target isolation. Today, we are excited to introduce ALB Target Optimizer, a powerful new feature through which ALB delivers optimal concurrency to each target. In this post, we will […] Introducing flat-rate pricing plans with no overages by Cristian Graziano on 18 NOV 2025 in Amazon CloudFront , Amazon CloudWatch , Amazon Route 53 , Amazon Simple Storage Service (S3) , Announcements , AWS WAF , Networking & Content Delivery Permalink Share Today, Amazon Web Services (AWS) is launching flat-rate pricing plans with no overages for website delivery and security. The pricing plans, available with Amazon CloudFront, combine global content delivery (CDN) with multiple AWS services and features into a monthly price with no overage charges, regardless of whether your website or application goes viral or faces […] Introducing AWS Site-to-Site VPN 5 Gbps Tunnels to support high throughput workloads by Vinod Kataria and Nishant Kumar on 12 NOV 2025 in *Post Types , Announcements , AWS Site-to-Site VPN , AWS VPN , Networking & Content Delivery Permalink Share AWS Site-to-Site VPN now supports VPN connections with up to 5 Gbps bandwidth per tunnel, a 4x improvement from existing limit of 1.25 Gbps. This increased bandwidth benefits customers who require high-capacity connections for bandwidth-intensive hybrid applications, big data migrations, and disaster recovery architectures. AWS Site-to-Site VPN is a fully managed service that allows you […] Custom domain names for VPC Lattice resources by Natti Swaminathan and Ashish Kumar on 07 NOV 2025 in Amazon VPC Lattice , Announcements , Networking & Content Delivery Permalink Share Amazon VPC Lattice is a fully managed application networking service that lets you connect, secure, and monitor communication between your services and resources within and across VPCs and accounts. Today, we announce custom domain names for Lattice resources. In this post, we will examine this feature in detail. Resource owners can now specify an Fully […] Introducing cross-account support for Amazon CloudFront Virtual Private Cloud (VPC) origins by Salman Ahmed , Ankush Goyal , and Kunj Thacker on 06 NOV 2025 in Amazon CloudFront , Amazon EC2 , Amazon VPC , Announcements , Elastic Load Balancing , Networking & Content Delivery Permalink Share In November 2024, Amazon CloudFront introduced CloudFront Virtual Private Cloud (VPC) origins, a security feature that allowed customers to deliver content from applications hosted in private subnets. In addition, we are now introducing cross-account support for Amazon CloudFront VPC origins, enabling network traffic flow between Amazon CloudFront and Application Load Balancers (ALBs), Network Load Balancers […] Introducing URL and host header rewrite with AWS Application Load Balancers by Mohamad Naji and Mahmoud Elhusseiny on 15 OCT 2025 in Amazon VPC , Announcements , Elastic Load Balancing , Networking & Content Delivery Permalink Share Today we’re announcing the general availability of rewriting URLs and host headers natively on Amazon Web Services (AWS) Application Load Balancers (ALB). You can use this new feature to implement regex matches based on request parameters and rewrite both host headers and URLs before routing to your targets. Operating at Layer 7 (application layer) of […] ← Older posts Create an AWS account Learn What Is AWS? What Is Cloud Computing? What Is Agentic AI? Cloud Computing Concepts Hub AWS Cloud Security What's New Blogs Press Releases Resources Getting Started Training AWS Trust Center AWS Solutions Library Architecture Center Product and Technical FAQs Analyst Reports AWS Partners Developers Builder Center <a data-rg-n="Link" href="/developer/tools/?nc1=f_dr" data-rigel- | 2026-01-13T09:30:40 |
https://wiki.php.net/todo/php55?do=login | PHP: Log In Login Register You are here: start › todo › php55 todo:php55 Login You are currently not logged in! Enter your authentication credentials below to log in. You need to have cookies enabled to log in. Log In Username Password Remember me Log In You don't have an account yet? Just get one: Register Forgotten your password? Get a new one: Set new password todo/php55.txt · Last modified: 2025/04/03 13:08 by 127.0.0.1 Page Tools Show page Old revisions Backlinks Back to top Copyright © 2001-2026 The PHP Group Other PHP.net sites Privacy policy | 2026-01-13T09:30:40 |
https://llvm.org/doxygen/classOutputBuffer.html#ae4bdd75f0df36a0f0343aad6ddffdff1 | LLVM: OutputBuffer Class Reference LLVM  22.0.0git Public Member Functions | Public Attributes | List of all members OutputBuffer Class Reference #include " llvm/Demangle/Utility.h " Public Member Functions   OutputBuffer ( char *StartBuf, size_t Size )   OutputBuffer ( char *StartBuf, size_t *SizePtr)   OutputBuffer ()=default   OutputBuffer ( const OutputBuffer &)=delete OutputBuffer &  operator= ( const OutputBuffer &)=delete virtual  ~OutputBuffer ()=default   operator std::string_view () const virtual void  printLeft ( const Node & N )   Called by the demangler when printing the demangle tree. virtual void  printRight ( const Node & N ) virtual void  notifyInsertion (size_t, size_t)   Called when we write to this object anywhere other than the end. virtual void  notifyDeletion (size_t, size_t)   Called when we make the CurrentPosition of this object smaller. bool   isInParensInTemplateArgs () const   Returns true if we're currently between a '(' and ')' when printing template args. bool   isInsideTemplateArgs () const   Returns true if we're printing template args. void  printOpen ( char Open='(') void  printClose ( char Close=')') OutputBuffer &  operator+= (std::string_view R) OutputBuffer &  operator+= ( char C ) OutputBuffer &  prepend (std::string_view R) OutputBuffer &  operator<< (std::string_view R) OutputBuffer &  operator<< ( char C ) OutputBuffer &  operator<< (long long N ) OutputBuffer &  operator<< ( unsigned long long N ) OutputBuffer &  operator<< (long N ) OutputBuffer &  operator<< ( unsigned long N ) OutputBuffer &  operator<< (int N ) OutputBuffer &  operator<< ( unsigned int N ) void  insert (size_t Pos, const char *S, size_t N ) size_t  getCurrentPosition () const void  setCurrentPosition (size_t NewPos) char   back () const bool   empty () const char *  getBuffer () char *  getBufferEnd () size_t  getBufferCapacity () const Public Attributes unsigned   CurrentPackIndex = std::numeric_limits< unsigned >::max()   If a ParameterPackExpansion (or similar type) is encountered, the offset into the pack that we're currently printing. unsigned   CurrentPackMax = std::numeric_limits< unsigned >::max() struct {      unsigned     ParenDepth = 0    The depth of '(' and ')' inside the currently printed template arguments. More...     bool     InsideTemplate = false    True if we're currently printing a template argument. More... }  TemplateTracker Detailed Description Definition at line 34 of file Utility.h . Constructor & Destructor Documentation ◆  OutputBuffer() [1/4] OutputBuffer::OutputBuffer ( char * StartBuf , size_t Size  ) inline Definition at line 75 of file Utility.h . References Size . Referenced by operator+=() , operator+=() , operator<<() , operator<<() , operator<<() , operator<<() , operator<<() , operator<<() , operator<<() , operator<<() , operator=() , OutputBuffer() , OutputBuffer() , and prepend() . ◆  OutputBuffer() [2/4] OutputBuffer::OutputBuffer ( char * StartBuf , size_t * SizePtr  ) inline Definition at line 77 of file Utility.h . References OutputBuffer() . ◆  OutputBuffer() [3/4] OutputBuffer::OutputBuffer ( ) default ◆  OutputBuffer() [4/4] OutputBuffer::OutputBuffer ( const OutputBuffer & ) delete References OutputBuffer() . ◆  ~OutputBuffer() virtual OutputBuffer::~OutputBuffer ( ) virtual default Member Function Documentation ◆  back() char OutputBuffer::back ( ) const inline Definition at line 213 of file Utility.h . References DEMANGLE_ASSERT . ◆  empty() bool OutputBuffer::empty ( ) const inline Definition at line 218 of file Utility.h . ◆  getBuffer() char * OutputBuffer::getBuffer ( ) inline Definition at line 220 of file Utility.h . Referenced by llvm::dlangDemangle() , removeNullBytes() , and llvm::ThinLTOCodeGenerator::writeGeneratedObject() . ◆  getBufferCapacity() size_t OutputBuffer::getBufferCapacity ( ) const inline Definition at line 222 of file Utility.h . ◆  getBufferEnd() char * OutputBuffer::getBufferEnd ( ) inline Definition at line 221 of file Utility.h . ◆  getCurrentPosition() size_t OutputBuffer::getCurrentPosition ( ) const inline Definition at line 207 of file Utility.h . Referenced by decodePunycode() , llvm::dlangDemangle() , and removeNullBytes() . ◆  insert() void OutputBuffer::insert ( size_t Pos , const char * S , size_t N  ) inline Definition at line 194 of file Utility.h . References DEMANGLE_ASSERT , N , and notifyInsertion() . Referenced by decodePunycode() . ◆  isInParensInTemplateArgs() bool OutputBuffer::isInParensInTemplateArgs ( ) const inline Returns true if we're currently between a '(' and ')' when printing template args. Definition at line 118 of file Utility.h . References TemplateTracker . ◆  isInsideTemplateArgs() bool OutputBuffer::isInsideTemplateArgs ( ) const inline Returns true if we're printing template args. Definition at line 123 of file Utility.h . References TemplateTracker . Referenced by printClose() , and printOpen() . ◆  notifyDeletion() virtual void OutputBuffer::notifyDeletion ( size_t , size_t  ) inline virtual Called when we make the CurrentPosition of this object smaller. Definition at line 100 of file Utility.h . Referenced by setCurrentPosition() . ◆  notifyInsertion() virtual void OutputBuffer::notifyInsertion ( size_t , size_t  ) inline virtual Called when we write to this object anywhere other than the end. Definition at line 97 of file Utility.h . Referenced by insert() , and prepend() . ◆  operator std::string_view() OutputBuffer::operator std::string_view ( ) const inline Definition at line 86 of file Utility.h . ◆  operator+=() [1/2] OutputBuffer & OutputBuffer::operator+= ( char C ) inline Definition at line 145 of file Utility.h . References C() , and OutputBuffer() . ◆  operator+=() [2/2] OutputBuffer & OutputBuffer::operator+= ( std::string_view R ) inline Definition at line 136 of file Utility.h . References OutputBuffer() , and Size . ◆  operator<<() [1/8] OutputBuffer & OutputBuffer::operator<< ( char C ) inline Definition at line 168 of file Utility.h . References C() , and OutputBuffer() . ◆  operator<<() [2/8] OutputBuffer & OutputBuffer::operator<< ( int N ) inline Definition at line 186 of file Utility.h . References N , and OutputBuffer() . ◆  operator<<() [3/8] OutputBuffer & OutputBuffer::operator<< ( long long N ) inline Definition at line 170 of file Utility.h . References N , and OutputBuffer() . ◆  operator<<() [4/8] OutputBuffer & OutputBuffer::operator<< ( long N ) inline Definition at line 178 of file Utility.h . References N , and OutputBuffer() . ◆  operator<<() [5/8] OutputBuffer & OutputBuffer::operator<< ( std::string_view R ) inline Definition at line 166 of file Utility.h . References OutputBuffer() . ◆  operator<<() [6/8] OutputBuffer & OutputBuffer::operator<< ( unsigned int N ) inline Definition at line 190 of file Utility.h . References N , and OutputBuffer() . ◆  operator<<() [7/8] OutputBuffer & OutputBuffer::operator<< ( unsigned long long N ) inline Definition at line 174 of file Utility.h . References N , and OutputBuffer() . ◆  operator<<() [8/8] OutputBuffer & OutputBuffer::operator<< ( unsigned long N ) inline Definition at line 182 of file Utility.h . References N , and OutputBuffer() . ◆  operator=() OutputBuffer & OutputBuffer::operator= ( const OutputBuffer & ) delete References OutputBuffer() . ◆  prepend() OutputBuffer & OutputBuffer::prepend ( std::string_view R ) inline Definition at line 151 of file Utility.h . References notifyInsertion() , OutputBuffer() , and Size . ◆  printClose() void OutputBuffer::printClose ( char Close = ')' ) inline Definition at line 130 of file Utility.h . References isInsideTemplateArgs() , and TemplateTracker . ◆  printLeft() void OutputBuffer::printLeft ( const Node & N ) inline virtual Called by the demangler when printing the demangle tree. By default calls into Node::print {Left|Right} but can be overriden by clients to track additional state when printing the demangled name. Definition at line 6202 of file ItaniumDemangle.h . References N . ◆  printOpen() void OutputBuffer::printOpen ( char Open = '(' ) inline Definition at line 125 of file Utility.h . References isInsideTemplateArgs() , and TemplateTracker . ◆  printRight() void OutputBuffer::printRight ( const Node & N ) inline virtual Definition at line 6204 of file ItaniumDemangle.h . References N . ◆  setCurrentPosition() void OutputBuffer::setCurrentPosition ( size_t NewPos ) inline Definition at line 208 of file Utility.h . References notifyDeletion() . Referenced by llvm::dlangDemangle() , and removeNullBytes() . Member Data Documentation ◆  CurrentPackIndex unsigned OutputBuffer::CurrentPackIndex = std::numeric_limits< unsigned >::max() If a ParameterPackExpansion (or similar type) is encountered, the offset into the pack that we're currently printing. Definition at line 104 of file Utility.h . ◆  CurrentPackMax unsigned OutputBuffer::CurrentPackMax = std::numeric_limits< unsigned >::max() Definition at line 105 of file Utility.h . ◆  InsideTemplate bool OutputBuffer::InsideTemplate = false True if we're currently printing a template argument. Definition at line 113 of file Utility.h . ◆  ParenDepth unsigned OutputBuffer::ParenDepth = 0 The depth of '(' and ')' inside the currently printed template arguments. Definition at line 110 of file Utility.h . ◆  [struct] struct { ... } OutputBuffer::TemplateTracker Referenced by isInParensInTemplateArgs() , isInsideTemplateArgs() , printClose() , and printOpen() . The documentation for this class was generated from the following files: include/llvm/Demangle/ Utility.h include/llvm/Demangle/ ItaniumDemangle.h Generated on for LLVM by  1.14.0 | 2026-01-13T09:30:40 |
https://www.linkedin.com/shareArticle?url=https%3a%2f%2fsujaypillai.dev%2f2020%2f08%2f2020-08-17-setting-up-blog-on-aws-using-traefik-docker%2f&title=Running%20Hugo%20in%20Docker%20%2b%20Traefik | LinkedIn Login, Sign in | LinkedIn Sign in Sign in with Apple Sign in with a passkey By clicking Continue, you agree to LinkedIn’s User Agreement , Privacy Policy , and Cookie Policy . or Email or phone Password Show Forgot password? Keep me logged in Sign in We’ve emailed a one-time link to your primary email address Click on the link to sign in instantly to your LinkedIn account. If you don’t see the email in your inbox, check your spam folder. Resend email Back New to LinkedIn? Join now Agree & Join LinkedIn By clicking Continue, you agree to LinkedIn’s User Agreement , Privacy Policy , and Cookie Policy . LinkedIn © 2026 User Agreement Privacy Policy Community Guidelines Cookie Policy Copyright Policy Send Feedback Language العربية (Arabic) বাংলা (Bangla) Čeština (Czech) Dansk (Danish) Deutsch (German) Ελληνικά (Greek) English (English) Español (Spanish) فارسی (Persian) Suomi (Finnish) Français (French) हिंदी (Hindi) Magyar (Hungarian) Bahasa Indonesia (Indonesian) Italiano (Italian) עברית (Hebrew) 日本語 (Japanese) 한국어 (Korean) मराठी (Marathi) Bahasa Malaysia (Malay) Nederlands (Dutch) Norsk (Norwegian) ਪੰਜਾਬੀ (Punjabi) Polski (Polish) Português (Portuguese) Română (Romanian) Русский (Russian) Svenska (Swedish) తెలుగు (Telugu) ภาษาไทย (Thai) Tagalog (Tagalog) Türkçe (Turkish) Українська (Ukrainian) Tiếng Việt (Vietnamese) 简体中文 (Chinese (Simplified)) 正體中文 (Chinese (Traditional)) | 2026-01-13T09:30:40 |
https://www.php.net/manual/ja/refs.basic.other.php | PHP: その他の基本モジュール - Manual update page now Downloads Documentation Get Involved Help Search docs Getting Started Introduction A simple tutorial Language Reference Basic syntax Types Variables Constants Expressions Operators Control Structures Functions Classes and Objects Namespaces Enumerations Errors Exceptions Fibers Generators Attributes References Explained Predefined Variables Predefined Exceptions Predefined Interfaces and Classes Predefined Attributes Context options and parameters Supported Protocols and Wrappers Security Introduction General considerations Installed as CGI binary Installed as an Apache module Session Security Filesystem Security Database Security Error Reporting User Submitted Data Hiding PHP Keeping Current Features HTTP authentication with PHP Cookies Sessions Handling file uploads Using remote files Connection handling Persistent Database Connections Command line usage Garbage Collection DTrace Dynamic Tracing Function Reference Affecting PHP's Behaviour Audio Formats Manipulation Authentication Services Command Line Specific Extensions Compression and Archive Extensions Cryptography Extensions Database Extensions Date and Time Related Extensions File System Related Extensions Human Language and Character Encoding Support Image Processing and Generation Mail Related Extensions Mathematical Extensions Non-Text MIME Output Process Control Extensions Other Basic Extensions Other Services Search Engine Extensions Server Specific Extensions Session Extensions Text Processing Variable and Type Related Extensions Web Services Windows Only Extensions XML Manipulation GUI Extensions Keyboard Shortcuts ? This help j Next menu item k Previous menu item g p Previous man page g n Next man page G Scroll to bottom g g Scroll to top g h Goto homepage g s Goto search (current page) / Focus search box GeoIP » « SyncSharedMemory::write PHP マニュアル 関数リファレンス Change language: English German Spanish French Italian Japanese Brazilian Portuguese Russian Turkish Ukrainian Chinese (Simplified) Other その他の基本モジュール GeoIP — Geo IP ロケーション はじめに インストール/設定 定義済み定数 GeoIP 関数 FANN — FANN (Fast Artificial Neural Network) はじめに インストール/設定 定義済み定数 例 Fann 関数 FANNConnection — The FANNConnection class Igbinary はじめに インストール/設定 Igbinary 関数 JSON — JavaScript Object Notation はじめに インストール/設定 定義済み定数 JsonException — JsonException クラス JsonSerializable — JsonSerializable インターフェイス JSON 関数 Simdjson はじめに インストール/設定 定義済み定数 Simdjson 関数 SimdJsonException — The SimdJsonException class SimdJsonValueError — The SimdJsonValueError class Lua はじめに インストール/設定 Lua — Lua クラス LuaClosure — LuaClosure クラス LuaSandbox はじめに インストール/設定 Differences from Standard Lua 例 LuaSandbox — The LuaSandbox class LuaSandboxFunction — The LuaSandboxFunction class LuaSandboxError — The LuaSandboxError class LuaSandboxErrorError — The LuaSandboxErrorError class LuaSandboxFatalError — The LuaSandboxFatalError class LuaSandboxMemoryError — The LuaSandboxMemoryError class LuaSandboxRuntimeError — The LuaSandboxRuntimeError class LuaSandboxSyntaxError — The LuaSandboxSyntaxError class LuaSandboxTimeoutError — The LuaSandboxTimeoutError class その他 — その他の関数 はじめに インストール/設定 定義済み定数 その他の関数 変更履歴 Random — 乱数生成器および、乱数関連の関数 はじめに 定義済み定数 例 Random 関数 Random\Randomizer — Random\Randomizer クラス Random\IntervalBoundary — Random\IntervalBoundary Enum Random\Engine — Random\Engine インターフェイス Random\CryptoSafeEngine — Random\CryptoSafeEngine インターフェイス Random\Engine\Secure — Random\Engine\Secure クラス Random\Engine\Mt19937 — Random\Engine\Mt19937 クラス Random\Engine\PcgOneseq128XslRr64 — Random\Engine\PcgOneseq128XslRr64 クラス Random\Engine\Xoshiro256StarStar — Random\Engine\Xoshiro256StarStar クラス Random\RandomError — Random\RandomError クラス Random\BrokenRandomEngineError — Random\BrokenRandomEngineError クラス Random\RandomException — Random\RandomException クラス Seaslog はじめに インストール/設定 定義済み定数 例 Seaslog 関数 SeasLog — The SeasLog class SPL — Standard PHP Library (SPL) インターフェイス データ構造 例外 イテレータ ファイル操作 SPL 関数 ストリーム はじめに インストール/設定 定義済み定数 ストリームフィルタ ストリームコンテキスト ストリームのエラー 例 php_user_filter — php_user_filter クラス streamWrapper — streamWrapper クラス ストリーム 関数 Swoole はじめに インストール/設定 定義済み定数 Swoole 関数 Swoole\Async — The Swoole\Async class Swoole\Atomic — The Swoole\Atomic class Swoole\Buffer — The Swoole\Buffer class Swoole\Channel — The Swoole\Channel class Swoole\Client — The Swoole\Client class Swoole\Connection\Iterator — The Swoole\Connection\Iterator class Swoole\Coroutine — The Swoole\Coroutine class Swoole\Coroutine\Lock — The Swoole\Coroutine\Lock class Swoole\Event — The Swoole\Event class Swoole\Exception — The Swoole\Exception class Swoole\Http\Client — The Swoole\Http\Client class Swoole\Http\Request — The Swoole\Http\Request class Swoole\Http\Response — The Swoole\Http\Response class Swoole\Http\Server — The Swoole\Http\Server class Swoole\Lock — The Swoole\Lock class Swoole\Mmap — The Swoole\Mmap class Swoole\MySQL — The Swoole\MySQL class Swoole\MySQL\Exception — The Swoole\MySQL\Exception class Swoole\Process — The Swoole\Process class Swoole\Redis\Server — The Swoole\Redis\Server class Swoole\Runtime — The Swoole\Runtime class Swoole\Serialize — The Swoole\Serialize class Swoole\Server — The Swoole\Server class Swoole\Table — The Swoole\Table class Swoole\Timer — The Swoole\Timer class Swoole\WebSocket\Frame — The Swoole\WebSocket\Frame class Swoole\WebSocket\Server — The Swoole\WebSocket\Server class Tidy はじめに インストール/設定 定義済み定数 例 tidy — tidy クラス tidyNode — tidyNode クラス Tidy 関数 Tokenizer はじめに インストール/設定 定義済み定数 例 PhpToken — PhpToken クラス Tokenizer 関数 URLs はじめに 定義済み定数 URL 関数 V8js — V8 JavaScript Engine 統合 はじめに インストール/設定 例 V8Js — V8Js クラス V8JsException — V8JsException クラス Yaml — YAML によるデータのシリアライズ はじめに インストール/設定 定義済み定数 例 コールバック Yaml 関数 Yaf — Yet Another Framework (Yaf) はじめに インストール/設定 定義済み定数 例 アプリケーションの設定 Yaf_Application — Yaf_Application クラス Yaf_Bootstrap_Abstract — Yaf_Bootstrap_Abstract クラス Yaf_Dispatcher — Yaf_Dispatcher クラス Yaf_Config_Abstract — Yaf_Config_Abstract クラス Yaf_Config_Ini — Yaf_Config_Ini クラス Yaf_Config_Simple — Yaf_Config_Simple クラス Yaf_Controller_Abstract — Yaf_Controller_Abstract クラス Yaf_Action_Abstract — Yaf_Action_Abstract クラス Yaf_View_Interface — Yaf_View_Interface クラス Yaf_View_Simple — Yaf_View_Simple クラス Yaf_Loader — Yaf_Loader クラス Yaf_Plugin_Abstract — Yaf_Plugin_Abstract クラス Yaf_Registry — Yaf_Registry クラス Yaf_Request_Abstract — Yaf_Request_Abstract クラス Yaf_Request_Http — Yaf_Request_Http クラス Yaf_Request_Simple — Yaf_Request_Simple クラス Yaf_Response_Abstract — Yaf_Response_Abstract クラス Yaf_Route_Interface — Yaf_Route_Interface クラス Yaf_Route_Map — Yaf_Route_Map クラス Yaf_Route_Regex — Yaf_Route_Regex クラス Yaf_Route_Rewrite — Yaf_Route_Rewrite クラス Yaf_Router — Yaf_Router クラス Yaf_Route_Simple — Yaf_Route_Simple クラス Yaf_Route_Static — Yaf_Route_Static クラス Yaf_Route_Supervar — Yaf_Route_Supervar クラス Yaf_Session — Yaf_Session クラス Yaf_Exception — Yaf_Exception クラス Yaf_Exception_TypeError — Yaf_Exception_TypeError クラス Yaf_Exception_StartupError — Yaf_Exception_StartupError クラス Yaf_Exception_DispatchFailed — Yaf_Exception_DispatchFailed クラス Yaf_Exception_RouterFailed — Yaf_Exception_RouterFailed クラス Yaf_Exception_LoadFailed — Yaf_Exception_LoadFailed クラス Yaf_Exception_LoadFailed_Module — Yaf_Exception_LoadFailed_Module クラス Yaf_Exception_LoadFailed_Controller — Yaf_Exception_LoadFailed_Controller クラス Yaf_Exception_LoadFailed_Action — Yaf_Exception_LoadFailed_Action クラス Yaf_Exception_LoadFailed_View — Yaf_Exception_LoadFailed_View クラス Yaconf はじめに インストール/設定 Yaconf — The Yaconf class Taint はじめに インストール/設定 詳細 Taint 関数 Data Structures はじめに インストール/設定 例 Ds\Collection — The Collection interface Ds\Hashable — The Hashable interface Ds\Sequence — The Sequence interface Ds\Vector — The Vector class Ds\Deque — The Deque class Ds\Map — The Map class Ds\Pair — The Pair class Ds\Set — The Set class Ds\Stack — The Stack class Ds\Queue — The Queue class Ds\PriorityQueue — The PriorityQueue class var_representation はじめに インストール/設定 定義済み定数 var_representation 関数 Found A Problem? Learn How To Improve This Page • Submit a Pull Request • Report a Bug + add a note User Contributed Notes There are no user contributed notes for this page. 関数リファレンス PHP の振る舞いの変更 音声フォーマットの操作 認証サービス コマンドライン関連 圧縮およびアーカイブ 暗号 データベース関連 日付および時刻関連 ファイルシステム 自然言語および文字エンコーディング 画像処理および作成 メール関連 数学 テキスト以外の MIME 型 プロセス制御 その他の基本モジュール その他のサービス 検索エンジン用の拡張モジュール サーバー固有のモジュール セッション関連 テキスト処理 変数・データ型関連 ウェブサービス Windows 用のモジュール XML 操作 GUI用の拡張モジュール Copyright © 2001-2026 The PHP Documentation Group My PHP.net Contact Other PHP.net sites Privacy policy ↑ and ↓ to navigate • Enter to select • Esc to close • / to open Press Enter without selection to search using Google | 2026-01-13T09:30:40 |
https://www.charterworks.com/tag/executive-strategy-briefing/ | Executive Strategy Briefing - Charter - Future of Work, AI, Management, Hybrid Try Charter Pro for $1 Latest Topics AI DEI Flexible Work Management Societal Issues Resources Briefing Work Tech Research Playbooks Case Studies Toolkits, Scripts, and other Resources Solutions Charter Pro Charter Forum Charter Pro for Teams Advisory + Strategic Services Events Upcoming and Past The AI Download Charter Cortados Leading With AI Masterclass Skills Accelerators Strategy Briefings Webinars Workplace Summit About Try Charter Pro for $1 Sign In Executive Strategy Briefing Pro Executive Strategy Briefing Events Charter Pro Strategy Briefing: Q1 2025 By Kevin J. Delaney Pro Events Executive Strategy Briefing Register - Charter Pro Strategy Briefing: Q1 2025 By Charter Staff Pro Executive Strategy Briefing Charter Pro Charter Pro Strategy Briefing: Q4 2024 By Kevin J. Delaney Pro Executive Strategy Briefing Leadership Charter Executive Strategy Briefing: Q2 2024 By Kevin J. Delaney Pro Cortado Webinar Charter Pro Strategy Briefing: Q1 2024 By Kevin J. Delaney 1 of 1 Insights Books Interviews Charter on TIME Research Connect Events Topics Artificial Intelligence Hybrid Work DEI Leadership Charter Pro Become a Member Support Sign In Search Contact Partnerships General Inquiries Company About Careers Press Newsletters Charter Briefing Charter Works Inc. © 2025 Privacy Terms of Service | 2026-01-13T09:30:40 |
http://mailman.videolan.org/pipermail/libdvbpsi-devel/ | The libdvbpsi-devel Archives The libdvbpsi-devel Archives You can get more information about this list . Archive View by: Downloadable version November 2024: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Text 16 KB ] January 2022: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 2 KB ] August 2021: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 2 KB ] March 2021: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 1 KB ] January 2021: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 845 bytes ] March 2020: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 1 KB ] October 2019: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 4 KB ] August 2019: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 3 KB ] December 2018: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 1 KB ] August 2018: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 1 KB ] May 2018: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 2 KB ] February 2018: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 5 KB ] December 2017: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 7 KB ] October 2017: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 1 KB ] July 2017: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 5 KB ] February 2017: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 3 KB ] January 2016: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 21 KB ] September 2015: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 2 KB ] August 2015: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 10 KB ] June 2015: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 13 KB ] May 2015: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 11 KB ] April 2015: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 2 KB ] March 2015: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 35 KB ] February 2015: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 3 KB ] January 2015: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 2 KB ] December 2014: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 9 KB ] October 2014: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 489 bytes ] September 2014: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 7 KB ] August 2014: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 5 KB ] June 2014: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 4 KB ] May 2014: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 1 KB ] April 2014: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 23 KB ] March 2014: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 1 KB ] February 2014: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 16 KB ] January 2014: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 1 KB ] December 2013: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 1 KB ] November 2013: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 1 KB ] October 2013: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 4 KB ] September 2013: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 642 bytes ] August 2013: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 5 KB ] July 2013: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 1 KB ] May 2013: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 4 KB ] April 2013: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 1 KB ] February 2013: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 638 bytes ] January 2013: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 10 KB ] December 2012: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 3 KB ] November 2012: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 1 KB ] October 2012: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 8 KB ] September 2012: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 3 KB ] August 2012: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 11 KB ] July 2012: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 4 KB ] June 2012: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 18 KB ] May 2012: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 24 KB ] March 2012: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 1 KB ] February 2012: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 3 KB ] December 2011: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 4 KB ] November 2011: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 4 KB ] October 2011: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 1 KB ] August 2011: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 731 bytes ] July 2011: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 2 KB ] May 2011: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 4 KB ] April 2011: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 875 bytes ] January 2011: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 548 bytes ] November 2010: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 1 KB ] May 2010: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 1 KB ] April 2010: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 1 KB ] March 2010: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 416 bytes ] February 2010: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 780 bytes ] January 2010: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 2 KB ] December 2009: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 5 KB ] November 2009: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 3 KB ] October 2009: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 1 KB ] September 2009: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 983 bytes ] August 2009: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 957 bytes ] November 2008: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 1 KB ] September 2008: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 613 bytes ] July 2008: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 1 KB ] May 2008: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 1 KB ] April 2008: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 2 KB ] March 2008: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 3 KB ] February 2008: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 4 KB ] January 2008: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 2 KB ] December 2007: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 767 bytes ] October 2007: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 5 KB ] August 2007: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 3 KB ] July 2007: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 974 bytes ] June 2007: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 442 bytes ] May 2007: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 994 bytes ] April 2007: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 4 KB ] March 2007: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 629 bytes ] February 2007: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 2 KB ] January 2007: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 673 bytes ] September 2006: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 1 KB ] July 2006: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 647 bytes ] May 2006: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 1 KB ] March 2006: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 480 bytes ] February 2006: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 944 bytes ] December 2005: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 1 KB ] November 2005: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 809 bytes ] October 2005: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 403 bytes ] September 2005: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 873 bytes ] August 2005: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 520 bytes ] July 2005: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 1 KB ] June 2005: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 430 bytes ] May 2005: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 916 bytes ] April 2005: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 839 bytes ] March 2005: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 4 KB ] January 2005: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 446 bytes ] December 2004: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 777 bytes ] November 2004: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 570 bytes ] October 2004: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 1 KB ] August 2004: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 1 KB ] July 2004: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 475 bytes ] June 2004: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 467 bytes ] February 2004: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 2 KB ] January 2004: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 1 KB ] December 2003: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 636 bytes ] November 2003: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 1 KB ] October 2003: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 508 bytes ] September 2003: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 3 KB ] July 2003: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 1 KB ] February 2003: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 1 KB ] January 2003: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 447 bytes ] December 2002: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 4 KB ] October 2002: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 3 KB ] September 2002: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 1 KB ] June 2002: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 632 bytes ] May 2002: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 3 KB ] April 2002: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 4 KB ] March 2002: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 2 KB ] January 2002: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 1 KB ] December 2001: [ Thread ] [ Subject ] [ Author ] [ Date ] [ Gzip'd Text 470 bytes ] | 2026-01-13T09:30:40 |
https://www.frontendinterviewhandbook.com/pl/companies/pinterest-front-end-interview-questions | Pinterest Front End Interview Questions | The Official Front End Interview Handbook 2025 Przejdź do głównej zawartości We are now part of GreatFrontEnd , a front end interview preparation platform created by ex-Meta and Google Engineers. Get 20% off today ! Front End Interview Handbook Start reading Practice Coding Questions System Design Quiz Questions System design Blog Polski English 简体中文 Español 日本語 한국어 Polski Português Русский Tagalog বাংলা Szukaj Introduction Coding interview JavaScript coding User interface coding Algorithms coding Quiz/trivia interview System design interview Overview User interface components Applications Behavorial interviews Resume preparation Interview questions 🔥 Amazon interview questions Google interview questions Microsoft interview questions Meta interview questions Airbnb interview questions ByteDance/TikTok interview questions Atlassian interview questions Uber interview questions Apple interview questions Canva interview questions Dropbox interview questions LinkedIn interview questions Lyft interview questions Twitter interview questions Shopify interview questions Pinterest interview questions Reddit interview questions Adobe interview questions Palantir interview questions Salesforce interview questions Oracle interview questions Interview questions 🔥 Pinterest interview questions Na tej stronie Pinterest Front End Interview Questions Latest version on GreatFrontEnd Find more company guides on GreatFrontEnd . Insider tips from the GreatFrontEnd community These tips were shared by GreatFrontEnd users who have completed interviews with Pinterest. 3rd Apr 2024 : I tríed few months ago. I did the first round only for a release engineer position. The problem is called Can you win. And it is similar to that in Leetcode jump and jump II. They are medium level problems. At least you can solve 2 in 20-30 mins. They recommend that. 4th Feb 2024 : Last time I interviewed for a FE engineer role at Pinterest in 2019, it was 3 LC rounds. one required a trie data structure to solve a string DSA. "Given a stream of comments, detect inappropriate language". I would be interested to know if they do have a true FE track. Just re-read this question. I thought you were asking about onsite. The question I got for phone screen was: Given an array of integers like [1,2,0,4,3] and a starting index, return true if you are able to get to a "0" value. Return false if you can't. Each value in the array is how many steps to the left or right you can move. You have to take that many steps exactly. If you are at the start or end of the array and you have movements left, you can wrap around to the opposite side. ex: same array, but startingIdx = 3. It returns true because you can go 1 step to the right, then 3 steps to the right starting at 0. So this is backtracking plus keeping track of which indexes you've finished evaluating. I've never seen this on LC. I think I spent 15 mins trying to voice out the solution. 15 minutes coding. Finished. 15 minutes of talking back and forth about Pinterest. Ended the interview 15 minutes early. hilariously, i got the same question on the onsite and then there was a follow up question to this which was: you've used recursion to solve htis, but can you solve this without it? So instead of a (call) stack of nodes to process, use a queue, Pinterest was the worst interview experience I've gone through for frontend. Position asked for React experience, didn't write a single line of JavaScript. Only Python for DSA. So it would be a breath of fresh air if they did create an FE track since 2019 Yup, passed the phone screen, went to onsite. Didn't get offer because I wasn't very good with string DSA at the time 4th Feb 2024 : yes, afaik they have a FE track and a full stack track for interviews. thats what the recruiter alluded to because im teetering between FE and full stack and she mentioned that the interview might be different if i wanted to focus on full stack 12th Sep 2023 : So, the recruiter just explained to me, that there will be 1 Algos, 1 Frontend Coding with React, 1 Frontend System Design and 1 Behavioral for Pinterest's onsite For more insider tips, visit GreatFrontEnd ! Edytuj tę stronę Ostatnia aktualizacja dnia 30 lis 2025 przez Danielle Ford Poprzednia strona Shopify interview questions Następna strona Reddit interview questions Table of Contents Insider tips from the GreatFrontEnd community General Get started Trivia questions Company questions Blog Coding Algorithms JavaScript utility functions User interfaces System design System design overview User interface components Applications More GreatFrontEnd GitHub X Discord Contact us Tech Interview Handbook Copyright © 2025 Yangshun Tay and GreatFrontEnd | 2026-01-13T09:30:40 |
http://www.linkedin.com/shareArticle?mini=true&url=&title=&summary=&source= | LinkedIn Login, Sign in | LinkedIn Sign in Sign in with Apple Sign in with a passkey By clicking Continue, you agree to LinkedIn’s User Agreement , Privacy Policy , and Cookie Policy . or Email or phone Password Show Forgot password? Keep me logged in Sign in We’ve emailed a one-time link to your primary email address Click on the link to sign in instantly to your LinkedIn account. If you don’t see the email in your inbox, check your spam folder. Resend email Back New to LinkedIn? Join now Agree & Join LinkedIn By clicking Continue, you agree to LinkedIn’s User Agreement , Privacy Policy , and Cookie Policy . LinkedIn © 2026 User Agreement Privacy Policy Community Guidelines Cookie Policy Copyright Policy Send Feedback Language العربية (Arabic) বাংলা (Bangla) Čeština (Czech) Dansk (Danish) Deutsch (German) Ελληνικά (Greek) English (English) Español (Spanish) فارسی (Persian) Suomi (Finnish) Français (French) हिंदी (Hindi) Magyar (Hungarian) Bahasa Indonesia (Indonesian) Italiano (Italian) עברית (Hebrew) 日本語 (Japanese) 한국어 (Korean) मराठी (Marathi) Bahasa Malaysia (Malay) Nederlands (Dutch) Norsk (Norwegian) ਪੰਜਾਬੀ (Punjabi) Polski (Polish) Português (Portuguese) Română (Romanian) Русский (Russian) Svenska (Swedish) తెలుగు (Telugu) ภาษาไทย (Thai) Tagalog (Tagalog) Türkçe (Turkish) Українська (Ukrainian) Tiếng Việt (Vietnamese) 简体中文 (Chinese (Simplified)) 正體中文 (Chinese (Traditional)) | 2026-01-13T09:30:40 |
https://vi-vn.facebook.com/login/?next=https%3A%2F%2Fl.facebook.com%2Fl.php%3Fu%3Dhttps%253A%252F%252Fwww.instagram.com%252F%26amp%253Bh%3DAT1bONjc9mR_ysldfAUtcw_cQngO0HrqFY--hGxloUDMWcxGhNxUuBC_BaZnB6mDSKlGN7V05DxfkOCGmR96jlXsqii1T-n_fTcVDVT3MfNNucxA4SXArcLYtel72l-S-zivnidKYY3WHKsP | Facebook Facebook Email hoặc điện thoại Mật khẩu Bạn quên tài khoản ư? Tạo tài khoản mới Bạn tạm thời bị chặn Bạn tạm thời bị chặn Có vẻ như bạn đang dùng nhầm tính năng này do sử dụng quá nhanh. Bạn tạm thời đã bị chặn sử dụng nó. Back Tiếng Việt 한국어 English (US) Bahasa Indonesia ภาษาไทย Español 中文(简体) 日本語 Português (Brasil) Français (France) Deutsch Đăng ký Đăng nhập Messenger Facebook Lite Video Meta Pay Cửa hàng trên Meta Meta Quest Ray-Ban Meta Meta AI Nội dung khác do Meta AI tạo Instagram Threads Trung tâm thông tin bỏ phiếu Chính sách quyền riêng tư Trung tâm quyền riêng tư Giới thiệu Tạo quảng cáo Tạo Trang Nhà phát triển Tuyển dụng Cookie Lựa chọn quảng cáo Điều khoản Trợ giúp Tải thông tin liên hệ lên & đối tượng không phải người dùng Cài đặt Nhật ký hoạt động Meta © 2026 | 2026-01-13T09:30:40 |
https://reviews.llvm.org/D126309#3588191 | ⚙ D126309 [docs][OpaquePtr] Add detail to motivations behind opaque pointers Page Menu Home Phabricator This is an archive of the discontinued LLVM Phabricator instance. Paths Table of Contents t - llvm/docs/ - docs/ 2 OpaquePointers.rst Hide Panel f Keyboard Reference ? Differential D126309 [docs][OpaquePtr] Add detail to motivations behind opaque pointers Closed Public Authored by aeubanks on May 24 2022, 10:58 AM. Download Raw Diff Details Reviewers rnk nikic Group Reviewers Restricted Project Commits rG47bfc365fc84: [docs][OpaquePtr] Add detail to motivations behind opaque pointers Diff Detail Repository rG LLVM Github Monorepo Event Timeline aeubanks created this revision. May 24 2022, 10:58 AM Herald added a project: Restricted Project . · View Herald Transcript May 24 2022, 10:58 AM aeubanks requested review of this revision. May 24 2022, 10:58 AM Herald added a project: Restricted Project . · View Herald Transcript May 24 2022, 10:58 AM Herald added a subscriber: llvm-commits . · View Herald Transcript aeubanks added reviewers: Restricted Project , rnk . May 24 2022, 10:58 AM Harbormaster completed remote builds in B166089: Diff 431727 . May 24 2022, 11:59 AM dblaikie added a subscriber: dblaikie . May 24 2022, 3:31 PM Comment Actions If you want to add any of the history, looks like this is my first email proposing the direction: https://lists.llvm.org/pipermail/llvm-dev/2015-February/081822.html aeubanks updated this revision to Diff 432024 . May 25 2022, 9:25 AM Comment Actions reference post from 2015 Harbormaster completed remote builds in B166292: Diff 432024 . May 25 2022, 9:59 AM rnk added inline comments. May 25 2022, 11:59 AM llvm/docs/OpaquePointers.rst 51–101 I believe I provided this wording suggestion, but I think it needs work. I did a bit of digging, and if you go back to the original 2003 publication , it was explicit that the types were included with the intention that they would support optimization: "The architecture that we propose is based on a new language-independent low-level code representation that preserves important type information from the source code. ... However, the linktime optimizer can only perform meaningful optimizations on the program if it has enough high-level information about the program to prove that aggressive optimizations are safe. Because of this, the lowlevel code representation is typed (using a languageindependent constructive type system) and directly exposes information about structure and array accesses to the optimizer. ...." Originally, LLVM was a research project with a goal of enabling fancy optimizations (see the DSA paper ). As LLVM evolved into a production compiler, the community started to realize that the LLVM struct type system, or at least the way llvm-gcc used it, couldn't really be used as a sound basis for alias analysis. The DSA alias analysis was removed from LLVM in 2006. So with that in mind, here's a wording suggestion: LLVM's type system was originally designed to support high-level optimization. However, years of LLVM implementation experience have demonstrated that the current pointee type system design does not effectively support optimization. Memory optimization algorithms, such as SROA, GVN, and AA, generally need to look through LLVM's struct types and reason about the underlying memory offsets. The community realized that pointee types are hindering LLVM development, rather than helping it. Pointee types provide some value to frontends because the IR verifier uses types to detect straightforward type confusion bugs. However, frontends also have to deal with the complexity of inserting bitcasts everywhere that they might be required. The current community consensus is that the costs of pointee types outweight the benefits, and that they should be removed. aeubanks updated this revision to Diff 437388 . Jun 15 2022, 4:04 PM Comment Actions update rnk accepted this revision. Jun 15 2022, 4:21 PM rnk added a subscriber: nikic . Comment Actions + @nikic This revision is now accepted and ready to land. Jun 15 2022, 4:21 PM Harbormaster completed remote builds in B170146: Diff 437388 . Jun 15 2022, 5:40 PM nikic accepted this revision. Jun 16 2022, 12:41 AM Comment Actions Not familiar with the historical context, but looks fine to me :) This revision was landed with ongoing or failed builds. Jun 16 2022, 10:17 AM Closed by commit rG47bfc365fc84: [docs][OpaquePtr] Add detail to motivations behind opaque pointers (authored by aeubanks ). · Explain Why This revision was automatically updated to reflect the committed changes. aeubanks added a commit: rG47bfc365fc84: [docs][OpaquePtr] Add detail to motivations behind opaque pointers . foad added a subscriber: foad . Jun 17 2022, 2:40 AM foad added inline comments. llvm/docs/OpaquePointers.rst 55 "hindrance" Revision Contents Files History Commits Path Size llvm/ docs/ OpaquePointers.rst 100 lines Diff ID Base Description Created Lint Unit Base Base Diff 1 431727 96bbe1b May 24 2022, 10:58 AM ★ ★ Diff 2 432024 96bbe1b reference post from 2015 May 25 2022, 9:25 AM ★ ★ Diff 3 437388 bab0910 update Jun 15 2022, 4:04 PM ★ ★ Diff 4 437592 b67984d rG47bfc365fc84128a7d060ad386fabbde5dc90921 Jun 16 2022, 10:17 AM ★ ★ Diff 437592 llvm/docs/OpaquePointers.rst =============== =============== Opaque Pointers Opaque Pointers =============== =============== The Opaque Pointer Type The Opaque Pointer Type ======================= ======================= Traditionally, LLVM IR pointer types have contained a pointee type. For example, Traditionally, LLVM IR pointer types have contained a pointee type. For example, ``i32*`` is a pointer that points to an ``i32`` somewhere in memory. However, ``i32*`` is a pointer that points to an ``i32`` somewhere in memory. However, due to a lack of pointee type semantics and various issues with having pointee due to a lack of pointee type semantics and various issues with having pointee types, there is a desire to remove pointee types from pointers. types, there is a desire to remove pointee types from pointers. The opaque pointer type project aims to replace all pointer types containing The opaque pointer type project aims to replace all pointer types containing pointee types in LLVM with an opaque pointer type. The new pointer type is pointee types in LLVM with an opaque pointer type. The new pointer type is tentatively represented textually as ``ptr`` . represented textually as ``ptr`` . Some instructions still need to know what type to treat the memory pointed to by the pointer as. For example, a load needs to know how many bytes to load from memory and what type to treat the resulting value as. In these cases, instructions themselves contain a type argument. For example the load instruction from older versions of LLVM .. code-block :: llvm load i64 * %p becomes .. code-block :: llvm load i64 , ptr %p Address spaces are still used to distinguish between different kinds of pointers Address spaces are still used to distinguish between different kinds of pointers where the distinction is relevant for lowering (e.g. data vs function pointers where the distinction is relevant for lowering (e.g. data vs function pointers have different sizes on some architectures). Opaque pointers are not changing have different sizes on some architectures). Opaque pointers are not changing anything related to address spaces and lowering. For more information, see anything related to address spaces and lowering. For more information, see `DataLayout <LangRef.html#langref-datalayout> `_ . Opaque pointers in non-default `DataLayout <LangRef.html#langref-datalayout> `_ . Opaque pointers in non-default address space are spelled ``ptr addrspace(N)`` . address space are spelled ``ptr addrspace(N)`` . This was proposed all the way back in `2015 <https://lists.llvm.org/pipermail/llvm-dev/2015-February/081822.html> `_ . Issues with explicit pointee types Issues with explicit pointee types ================================== ================================== LLVM IR pointers can be cast back and forth between pointers with different LLVM IR pointers can be cast back and forth between pointers with different pointee types. The pointee type does not necessarily represent the actual pointee types. The pointee type does not necessarily represent the actual underlying type in memory. In other words, the pointee type carries no real underlying type in memory. In other words, the pointee type carries no real semantics. semantics. Lots of operations do not actu ally care about the underly ing type . These Historic ally LLVM was some sort of type-safe subset of C. Hav ing pointee type s operations, typically intrinsics, usually end up taking an ``i8*`` . This causes provided an extra layer of checks to make sure that the Clang frontend matched lots of redundant no-op bitcasts in the IR to and from a pointer with a its frontend values/operations with the corresponding LLVM IR. However, as other different pointee type. The extra bitcasts take up space and require extra work languages like C++ adopted LLVM, the community realized that pointee types were to look through in optimizations. And more bitcasts increase th e ch ances of more of a hinderance for LLVM development and that the extra typ e ch ecking with foad Unsubmitted Not Done Reply Inline Actions "hindrance" foad: "hindrance" incorrect bitcasts, especially in regards to address spaces . some frontends wasn't worth it . Some instructions still need to know what type to treat the memory pointed to by LLVM's type system was `originally designed the pointer as. For example, a load needs to know how many bytes to load from <https://llvm.org/pubs/2003-05-01-GCCSummit2003.html> ` to support high-level memory. In these cases, instruc tion s themselves contain a type argument. For optimization. However, years of LLVM implementa tion experience have demonstrated example the load instruction from older versions of LLVM that the pointee type system design does not effectively support optimization. Memory optimization algorithms, such as SROA, GVN, and AA, .. code-block :: llvm generally need to look through LLVM's struct types and reason about the underlying memory offsets. The community realized that pointee types hinder LLVM load i64 * %p development, rather than helping it. Some of the initially proposed high-level optimizations have evolved into `TBAA becomes <https://llvm.org/docs/LangRef.html#tbaa-metadata> ` due to limitations with representing higher-level language information directly via SSA values. .. code-block :: llvm Pointee types provide some value to frontends because the IR verifier uses types load i64 , ptr %p to detect straightforward type confusion bugs. However, frontends also have to deal with the complexity of inserting bitcasts everywhere that they might be A nice analogous transition that happened earlier in LLVM is inte ger signedness. required. The community consensus is that the costs of po inte e types There is no distinction between signed and unsigned integer types, rather the outweight the benefits, and that they should be removed. integer operations themselves contain what to treat the integer as. Initially, LLVM IR distinguished between unsigned and signed integer type s . The transition Many operations do not actually care about the underlying type. The se from manifesting signedness in typ es to instructions happened early on in LLVM's operations, typ ically intrinsics, usually end up taking an arbitrary pointer life to the betterment of LLVM IR. type ``i8*`` and sometimes a size. This causes lots of redundant no-op bitcasts in the IR to and from a pointer with a different pointee type. No-op bitcasts take up memory/disk space and also take up compile time to look through. However, perhaps the biggest issue is the code complexity required to deal with bitcasts. When looking up through def-use chains for pointers it's easy to forget to call `Value::stripPointerCasts()` to find the true underlying pointer obfuscated by bitcasts. And when looking down through def-use chains passes need to iterate through bitcasts to handle uses. Removing no-op pointer bitcasts prevents a category of missed optimizations and makes writing LLVM passes a little bit easier. Fewer no-op pointer bitcasts also reduces the chances of incorrect bitcasts in regards to address spaces. People maintaining backends that care a lot about address spaces have complained that frontends like Clang often incorrectly bitcast pointers, losing address space information. An analogous transition that happened earlier in LLVM is integer signedness. Currently there is no distinction between signed and unsigned integer types, but rather each integer operation (e.g. add) contains flags to signal how to treat the integer. Previously LLVM IR distinguished between unsigned and signed integer types and ran into similar issues of no-op casts. The transition from manifesting signedness in types to instructions happened early on in LLVM's timeline to make LLVM easier to work with. rnk Unsubmitted Not Done Reply Inline Actions I believe I provided this wording suggestion, but I think it needs work. I did a bit of digging, and if you go back to the original 2003 publication , it was explicit that the types were included with the intention that they would support optimization: "The architecture that we propose is based on a new language-independent low-level code representation that preserves important type information from the source code. ... However, the linktime optimizer can only perform meaningful optimizations on the program if it has enough high-level information about the program to prove that aggressive optimizations are safe. Because of this, the lowlevel code representation is typed (using a languageindependent constructive type system) and directly exposes information about structure and array accesses to the optimizer. ...." Originally, LLVM was a research project with a goal of enabling fancy optimizations (see the DSA paper ). As LLVM evolved into a production compiler, the community started to realize that the LLVM struct type system, or at least the way llvm-gcc used it, couldn't really be used as a sound basis for alias analysis. The DSA alias analysis was removed from LLVM in 2006. So with that in mind, here's a wording suggestion: LLVM's type system was originally designed to support high-level optimization. However, years of LLVM implementation experience have demonstrated that the current pointee type system design does not effectively support optimization. Memory optimization algorithms, such as SROA, GVN, and AA, generally need to look through LLVM's struct types and reason about the underlying memory offsets. The community realized that pointee types are hindering LLVM development, rather than helping it. Pointee types provide some value to frontends because the IR verifier uses types to detect straightforward type confusion bugs. However, frontends also have to deal with the complexity of inserting bitcasts everywhere that they might be required. The current community consensus is that the costs of pointee types outweight the benefits, and that they should be removed. rnk: I believe I provided this wording suggestion, but I think it needs work. I did a bit of… Opaque Pointers Mode Opaque Pointers Mode ==================== ==================== During the transition phase, LLVM can be used in two modes: In typed pointer During the transition phase, LLVM can be used in two modes: In typed pointer mode all pointer types have a pointee type and opaque pointers cannot be used. mode all pointer types have a pointee type and opaque pointers cannot be used. In opaque pointers mode (the default), all pointers are opaque. The opaque In opaque pointers mode (the default), all pointers are opaque. The opaque pointer mode can be disabled using ``-opaque-pointers=0`` in pointer mode can be disabled using ``-opaque-pointers=0`` in ▲ Show 20 Lines • Show All 166 Lines • Show Last 20 Lines | 2026-01-13T09:30:40 |
http://tirkarthi.github.io/life/2018/10/16/second-rank-is-good-too.html | Second rank is good too xtreak blog whoami Comics Poems Second rank is good too Oct 16, 2018 Last month was a pretty exciting month where I got promoted as a CPython core triager . I am happy to be a part of the core team and it also encourages me to work more on CPython. One strange thought experiment came out of this when one of my friends said, “Well, now that you are on the second rank as a triager you are one step away from reaching the first rank of being a core developer”. I shrugged off given my limited skills and unlimited imposter syndrome that I will certainly never become one and more than that as a weird creature I like triaging responsibilities more. I thought about this for sometime like when you are aiming to reach the top and you have reached a point where you are happy in the journey is it ok to settle down? The below is a brain dump of this Growth addiction There is always a push for growth pretty much across life. They usually come in quotes like “Life is growth. If you don’t grow you die.”. Growth itself comes with different meanings in different phases like when I started as a baby it was to grow up as a educated and healthy lad. Then you have education paved more as a means to better job in your adolescent life. Then once you have finished formal education you need to get a job for growth and to sustain. Your career opens up different opportunities and you move on to higher roles. But every once in a while you wish to stop in terms of pursuing higher and have more time doing what you love to do though it means growth to you on personal terms there is a looming cloud of slackness and stagnation. An example is when I started my career as a trainee it was to get promoted as an engineer and then you get to senior engineer. Then you have to take into consideration about the next branch you wish to cling on to like you want to go to the tech side where you want to lead architecture or you want to go to people management and so on. I was little cautious since each route might lead me higher but keeps me away from what I enjoy the most at that time which is to be more involved with development. There is a strange stigma that if someone stays as a senior engineer then they have stopped growing. Sure you can pick up languages and know nitty gritty details but you haven’t moved up in the ladder and therein lies a problem with treating growth as a ladder. Sometimes it feels like you treat yourself as a multinational company where you have to grow on role or raise (I can hear you on petrol prices) on an annual basis and if you stay there without any losses and sustain you are known to have ceased growing or become complacent with the scenarios. But essentially you are growing on your means maybe at a slower rate and maybe you don’t need to grow further at all for some period of time. Like business there is human tendency that if you don’t push yourself further you have stopped growing. Different meanings of growth So growth itself has different meanings and as you start your journey towards the first rank you might get to the second rank and you might be more comfortable and relaxed in the second rank that you see for yourself as a good fit once you reach there. Your perception of success changes over a period of time and sometimes success is making sure you know where to stop which doesn’t necessarily mean failure but it’s just that your priorities have shifted and perspectives have changed. The things you aimed as best will never be a good fit once you get nearby. Similar case with being a triager in one aspect makes me feel that I have much more impact on bisecting down the bug, adding context and notifying appropriate people about the issue and so on. In a way this also gives me more time to interact with people. You can do this as a core developer too but your responsibilities sort of shift towards other things that you may not necessarily like. Similar stuff with being a senior engineer vs someone who leads the design. Sometimes I don’t feel like I have the skill or design is something I don’t particularly enjoy even though at one point it seemed to be the next logical step in my career. Maybe not **right now ** This is also a case where you just need more time to think about things and maybe you can’t do it right now . There is nothing that stops you from proceeding further once your priorities shift again and I am not developing some strict recipe here as it depends on individual. I might develop different skills and my perspective might change in the future but it’s not necessary to always move on to the next thing. The whole point is that it’s as important stopping for a moment to see if it’s ok to stay where you are as much as you think about the next step to proceed further :) Thinks about his annual appraisal meeting P.S. To the reader, this post is not necessarily an answer to the questions you might have asked me it’s just your questions blended with the post as good examples :) Please enable JavaScript to view the comments powered by Disqus. xtreak blog xtreak blog tir.karthi@gmail.com tirkarthi tirkarthi A blog about programming, mistakes and eureka | 2026-01-13T09:30:40 |
https://llvm.org/doxygen/classObjCProtoName.html#a70a1b5f096c404c6c7d994a12d8f9de6 | LLVM: ObjCProtoName Class Reference LLVM  22.0.0git Public Member Functions | List of all members ObjCProtoName Class Reference #include " llvm/Demangle/ItaniumDemangle.h " Inheritance diagram for ObjCProtoName: This browser is not able to show SVG: try Firefox, Chrome, Safari, or Opera instead. [ legend ] Public Member Functions   ObjCProtoName ( const Node *Ty_, std::string_view Protocol_) template<typename Fn> void  match (Fn F ) const bool   isObjCObject () const std::string_view  getProtocol () const void  printLeft ( OutputBuffer &OB) const override Public Member Functions inherited from Node   Node ( Kind K_, Prec Precedence_= Prec::Primary , Cache RHSComponentCache_= Cache::No , Cache ArrayCache_= Cache::No , Cache FunctionCache_= Cache::No )   Node ( Kind K_, Cache RHSComponentCache_, Cache ArrayCache_= Cache::No , Cache FunctionCache_= Cache::No ) template<typename Fn> void  visit (Fn F ) const   Visit the most-derived object corresponding to this object. bool   hasRHSComponent ( OutputBuffer &OB) const bool   hasArray ( OutputBuffer &OB) const bool   hasFunction ( OutputBuffer &OB) const Kind   getKind () const Prec   getPrecedence () const Cache   getRHSComponentCache () const Cache   getArrayCache () const Cache   getFunctionCache () const virtual bool   hasRHSComponentSlow ( OutputBuffer &) const virtual bool   hasArraySlow ( OutputBuffer &) const virtual bool   hasFunctionSlow ( OutputBuffer &) const virtual const Node *  getSyntaxNode ( OutputBuffer &) const void  printAsOperand ( OutputBuffer &OB, Prec P = Prec::Default , bool StrictlyWorse=false) const void  print ( OutputBuffer &OB) const virtual bool   printInitListAsType ( OutputBuffer &, const NodeArray &) const virtual std::string_view  getBaseName () const virtual  ~Node ()=default DEMANGLE_DUMP_METHOD void  dump () const Additional Inherited Members Public Types inherited from Node enum   Kind : uint8_t enum class   Cache : uint8_t { Yes , No , Unknown }   Three-way bool to track a cached value. More... enum class   Prec : uint8_t {    Primary , Postfix , Unary , Cast ,    PtrMem , Multiplicative , Additive , Shift ,    Spaceship , Relational , Equality , And ,    Xor , Ior , AndIf , OrIf ,    Conditional , Assign , Comma , Default }   Operator precedence for expression nodes. More... Protected Attributes inherited from Node Cache   RHSComponentCache : 2   Tracks if this node has a component on its right side, in which case we need to call printRight. Cache   ArrayCache : 2   Track if this node is a (possibly qualified) array type. Cache   FunctionCache : 2   Track if this node is a (possibly qualified) function type. Detailed Description Definition at line 614 of file ItaniumDemangle.h . Constructor & Destructor Documentation ◆  ObjCProtoName() ObjCProtoName::ObjCProtoName ( const Node * Ty_ , std::string_view Protocol_  ) inline Definition at line 619 of file ItaniumDemangle.h . References Node::Node() . Member Function Documentation ◆  getProtocol() std::string_view ObjCProtoName::getProtocol ( ) const inline Definition at line 629 of file ItaniumDemangle.h . ◆  isObjCObject() bool ObjCProtoName::isObjCObject ( ) const inline Definition at line 624 of file ItaniumDemangle.h . References getName() . Referenced by PointerType::printLeft() , and PointerType::printRight() . ◆  match() template<typename Fn> void ObjCProtoName::match ( Fn F ) const inline Definition at line 622 of file ItaniumDemangle.h . References F . ◆  printLeft() void ObjCProtoName::printLeft ( OutputBuffer & OB ) const inline override virtual Implements Node . Definition at line 631 of file ItaniumDemangle.h . References Node::OutputBuffer . The documentation for this class was generated from the following file: include/llvm/Demangle/ ItaniumDemangle.h Generated on for LLVM by  1.14.0 | 2026-01-13T09:30:40 |
https://sujaypillai.dev/tags/dockertip/ | dockertip | Tag | Sujay Pillai Sujay Pillai Posts Tags Categories About Sujay Pillai Posts Tags Categories About dockertip 2019 Connect to Docker daemon over ssh using docker-compose 01-22 2018 Switch between Linux and Windows Container on D4W 05-06 Switch ORCHESTRATOR on D4W 04-13 Powered by Hugo | Theme - LoveIt 2018 - 2021 Sujay Pillai | CC BY-NC 4.0 | 2026-01-13T09:30:40 |
https://ublock.org/ | uBlock: A no-nonsense ad blocker. Help A no-nonsense ad blocker Your web experience has never been this fast and efficient. no ads no sneaky tracking no overhead fast memory efficient lightweight Add uBlock to your browser Google Chrome Microsoft Edge Set and forget. Add uBlock to your browser to automatically block ads, pop ups, and trackers. Browse faster. Privacy Policy License (GPLv3) Releases Help | 2026-01-13T09:30:40 |
https://www.ovhcloud.com/es/professional-services/ | Professional Services | OVHcloud Global Abrir menú Webmail Notifications Volver al menú No pending order No pending ticket Área de cliente Volver al menú Área de cliente Mis facturas Mis productos y servicios Mis formas de pago Mis pedidos Mis contactos Mis solicitudes de asistencia Contactar con el equipo comercial Soporte Volver al menú Centro de ayuda Niveles de soporte Comunidades Volver al menú OVHcloud Community OVHcloud Blog Eventos Learn Volver al menú Documentación Tutoriales Casos de uso Cumplimiento Casos de éxito Vídeos Stories Training Volver al menú Europe Deutschland [€] España [€] France [€] Ireland [€] Italia [€] Nederland [€] Polska [PLN] Portugal [€] United Kingdom [£] America Canada (en) [$] Canada (fr) [$] United States [$] América Latina [$] África Maroc [Dhs] Sénégal [FCFA] Tunisie [DT] Oceanía Australia [A$] Asia Singapore [S$] Asia [US$] India [₹] World World [$] World [€] Abrir el menú de inicio ¡Bienvenido/a a OVHcloud! Identifíquese para poder contratar soluciones, gestionar sus productos y servicios, y realizar el seguimiento de sus pedidos. Área de cliente Webmail Bare Metal y VPS Volver al menú Bare Metal y VPS Servidores dedicados Volver al menú Servidores dedicados Productos Descubrir nuestros servidores dedicados Servidores Rise Nuevo Los servidores bare metal más asequibles de OVHcloud Servidores Advance Nuevo Servidores polivalentes para pequeñas y medianas empresas (pymes). Servidores Game Nuevo Para videojuegos y plataformas de streaming Servidores Storage Servidores para archivado, backup o almacenamiento distribuido Servidores Scale Nuevo Específicamente diseñados para infraestructuras complejas de alta resiliencia Servidores High Grade Nuestros servidores más potentes, optimizados para cargas críticas Sistemas operativos y aplicaciones Sistemas operativos y aplicaciones adaptados a todos los usos Disponibilidad de nuestros servidores dedicados por región Disponibilidad de nuestros servidores en nuestras diferentes regiones de todo el mundo Bare Metal Wholesale Disfrute de servidores Advance, Scale o High Grade en un rack completo. Casos de uso Resiliencia y AZ SAP HANA Virtualización y contenerización Website Business Application Infraestructura hiperconvergente Software Defined Storage Big data y analítica Archivado y backup IA, machine learning y deep learning Confidential Computing Bases de datos Gaming High Performance Computing Servidores dedicados Eco Volver al menú Servidores dedicados Eco Servidores dedicados Eco Descubrir los servidores dedicados Eco Servidores Kimsufi Servidores a buen precio para lanzar su proyecto Servidores So you Start La gama de servidores dedicados perfecta para startups y pymes Servidores Rise Nuevo Reconocidas plataformas Intel y AMD, y alto rendimiento a precios competitivos Distribuciones y sistemas operativos Consulte las versiones compatibles con su servidor Eco Casos de uso Sitio web y aplicación empresarial Servidor de correo Nuevo Data storage Nuevo VPS - Servidores Privados Virtuales Volver al menú VPS - Servidores Privados Virtuales VPS - Servidor privado virtual Nuestros VPS Nuevo Nuestro nuevo VPS con altas prestaciones a precios competitivos, escalabilidad instantánea, seguridad reforzada y disponible en todas nuestras regiones. Distribuciones y licencias Conozca todas nuestras distribuciones y licencias Opciones Personalice su VPS con nuestras opciones avanzadas Ayuda Casos de uso Flujos de trabajo automatizados con n8n Nuevo Plataforma multisitio WordPress Servidor de videojuegos Servidor de pruebas con VPS Hosting de aplicaciones de trading en un VPS Forex Managed Bare Metal Volver al menú Managed Bare Metal Managed Bare Metal Managed Bare Metal Essentials powered by VMware® Su infraestructura virtual gestionada por OVHcloud Almacenamiento y backup Volver al menú Almacenamiento y backup Almacenamiento y backup Descubrir todas nuestras soluciones Enterprise File Storage Almacenamiento de archivos totalmente administrado y basado en NetApp ONTAP Select NAS-HA Espacio centralizado de almacenamiento o backup para sus datos Cloud Disk Array Solución de almacenamiento en bloque escalable basada en tecnología CEPH Veeam Enterprise Plus La solución que le permite proteger sus datos de la manera que mejor se adapta a sus necesidades HYCU for OVHcloud Simplifique el backup y la migración de sus cargas de trabajo Nutanix Casos de uso Almacenamiento de datos para sus servidores Linux Almacenamiento de datos para sus máquinas virtuales Network Volver al menú Network Network Additional IP Asigne y migre direcciones IP dinámicas de un servicio a otro Load Balancer de OVHcloud Reparta la carga de sus aplicaciones en múltiples servidores backend Red privada (vRack) Conecte todos sus servicios de OVHcloud en una red privada aislada OVHcloud Link Aggregation Red privada redundante con gran capacidad de ancho de banda OVHcloud Connect Conecte su datacenter con OVHcloud Ancho de banda público Aumente el ancho de banda garantizado por defecto Bring Your Own IP (BYOIP) Importe sus direcciones IP y facilite su migración a OVHcloud Seguridad de red Volver al menú Seguridad de red Seguridad de red Infraestructura anti-DDoS Proteja su infraestructura frente a ataques DDoS Game DDoS Protection Proteja sus servicios de gaming y e-sport con una solución anti-DDoS específica DNSSEC Proteja sus datos frente al «cache poisoning» SSL Gateway La forma más sencilla de garantizar la seguridad en su sitio web, ¡sin esfuerzo! Identidad, seguridad y operaciones Volver al menú Identidad, seguridad y operaciones Identidad, seguridad y operaciones Identity and Access Management (IAM) Proteja la gestión de accesos y mejore su productividad Logs Data Platform Plataforma completa para recopilar, almacenar y visualizar sus logs Secret Manager Gestión profesional de todos tus secretos en una mismo servicio Service Logs Monitorice el rendimiento y la seguridad de su entorno cloud Bare Metal Pod Volver al menú Bare Metal Pod Bare Metal Pod Bare Metal Pod con certificación SecNumCloud El rendimiento del Bare Metal en un entorno soberano y apto para la certificación SecNumCloud Dominio Hosting Email Volver al menú Dominio Hosting Email Dominio web Volver al menú Dominio web Dominio web Busque su dominio Renueve su dominio Consulte el mercado secundario (aftermarket) Acceso rápido Precios de los dominios Whois: buscar información de un dominio Servidor DNS Hosting Volver al menú Hosting Hosting Todos los packs Web Bases de datos adicionales Opción SSL Opción CDN Acceso rápido ¿Cómo crear un sitio web? Aloje su sitio web WordPress Cree su sitio web en un clic E-mail Volver al menú E-mail E-mail Todos los productos Exchange Public Cloud Volver al menú Public Cloud Public Cloud Volver al menú Public Cloud Public Cloud Descubrir Public Cloud Ecosistema de servicios Acelere su actividad y automatice su infraestructura Tarificación Descubra nuestros precios transparentes y asequibles Prueba gratuita de Public Cloud Pruebe nuestras soluciones sin incurrir en gastos Savings Plans Nuevo Disfrute de precios reducidos al contratar sus recursos Public Cloud con un compromiso de entre 1 y 36 meses Ventajas de la solución Public Cloud Conozca las soluciones de cloud computing adaptadas a sus necesidades Cloud Computing Aprenda más sobre esta tecnología cada vez más extendida Conformidad y certificaciones Descubra cómo OVHcloud construye soluciones de confianza Zonas de confianza Despliegue sus datos estratégicos en zonas con protección especial Disponibilidad por regiones Descubra la cobertura de nuestro catálogo por región Local Zones Nuevo Despliega servicios cloud más cerca de tus usuarios Documentación Consulte nuestras guías y tutoriales Compute Volver al menú Compute Compute Descubrir todas nuestras soluciones Compute Virtual Machine Instances Disfrute de instancias polivalentes y adaptadas a todos sus usos Cloud GPU Acelere sus cargas de trabajo con instancias GPU de alto rendimiento Metal Instances Combine la potencia del bare metal con la automatización del cloud Documentación Consulte la documentación de nuestra gama Compute Hacia el PaaS Concéntrese en sus aplicaciones y mejore su competitividad Local Zone Nuevo Despliega servicios cloud más cerca de tus usuarios Storage Volver al menú Storage Storage Descubrir todas nuestras soluciones Storage Block Storage Cree volúmenes de almacenamiento y utilícelos como discos adicionales Object Storage Disfrute del almacenamiento ilimitado bajo demanda, compatible con S3 Cold Archive Archivado muy económico para datos de acceso muy poco frecuentes. Local Zone Nuevo Despliega servicios cloud más cerca de tus usuarios Documentación Consulte la documentación de la gama Storage Network Volver al menú Network Network Descubrir todas nuestras soluciones Network Private Network Despliegue redes privadas en el vRack de OVHcloud Load Balancer Gestione el tráfico variable distribuyéndolo entre varios recursos Floating IP Asigne y transfiera su IP pública de un servicio a otro Gateway Gestione un punto de conexión único entre su red privada e internet Documentación Consulte la documentación de la gama Network Containers & Orchestration Volver al menú Containers & Orchestration Containers & Orchestration Descubrir todas nuestras soluciones Containers & Orchestration Managed Kubernetes Service Orqueste sus aplicaciones de contenedores con un cluster Kubernetes certificado por la CNCF Load Balancer for Managed Kubernetes Service Gestione las fluctuaciones de su actividad equilibrando el tráfico en los diferentes recursos Managed Rancher Service Nuevo Una gestión centralizada y simplificada de sus clústeres Kubernetes Managed Private Registry Gestione sus imágenes de contenedores y charts Helm en un registro privado seguro Documentación Consulte la documentación de la gama Containers & Orchestration Hacia el PaaS Concéntrese en sus aplicaciones y mejore su competitividad Databases Volver al menú Databases Databases Descubrir todas nuestras soluciones Databases MongoDB Motor NoSQL orientado a documentos. Probar la versión gratuita MySQL La popular base de datos relacional adaptada a sus necesidades PostgreSQL El motor de bases de datos relacionales open source de referencia Valkey El almacenamiento en memoria inteligente Nuestra documentación Consulte la documentación de la gama Databases Hacia el PaaS Concéntrese en sus aplicaciones y mejore su competitividad Analytics Volver al menú Analytics Analytics Descubrir todas nuestras soluciones Analytics Kafka Solución de «queuing» para implementar arquitecturas «event-driven» Kafka Connect Extensión para simplificar la ingestión de sus fuentes hacia Apache Kafka Kafka MirrorMaker Replicación para garantizar la alta disponibilidad de sus clústeres Kafka Logs Data Platform Plataforma completa para recopilar, almacenar y visualizar sus logs OpenSearch Motor dedicado para indexación, búsqueda y análisis de datos ClickHouse Nuevo El análisis ultra-rápido de tus datos al alcance de la mano Managed Dashboards Plataforma Grafana para crear dashboards Documentación Consulte la documentación de la gama Analytics Hacia el PaaS Concéntrese en sus aplicaciones y mejore su competitividad Data Platform Nuevo Volver al menú Data Platform Data Platform Descubrir todas nuestras soluciones Data Platform Descubrir Data Platform de OVHcloud Nuevo Ponga en marcha sus proyectos Data & Analytics fácilmente y en tiempo récord Data Catalog Nuevo Más de 50 conectores para todas sus fuentes de datos Lakehouse Manager Nuevo Almacenamiento «data warehouse» y «data lake» unificado basado en Apache Iceberg Data Processing Engine Nuevo Automatice la ejecución y la orquestación de sus workloads ETL/ELT Analytics Manager Nuevo Cree sus dashboards y realice sus consultas con el motor Trino Application Services Nuevo SDK y servicios «serverless» para desplegar sus API y aplicaciones de datos Control Center Nuevo Monitorice las métricas, gestione los logs y las alertas de sus entornos AI & Machine Learning Volver al menú AI & Machine Learning AI & Machine Learning Descubrir todas nuestras soluciones AI & Machine Learning AI & Quantum Notebooks Inicie sus notebooks Jupyter o VS Code en el cloud y elija entre nuestros frameworks AI o cuánticos nativos AI Training Entrene sus modelos de inteligencia artificial AI Deploy Despliegue modelos de machine learning y obtenga predicciones AI Endpoints Nuevo Potencia tus aplicaciones con modelos de IA generativa gracias a las API estándar y seguras. Documentación Consulte la documentación de la gama AI & Machine Learning Hacia el PaaS Concéntrese en sus aplicaciones y mejore su competitividad Quantum Computing Volver al menú Quantum Computing Quantum Computing Descubrir todos nuestros productos Quantum Computing Quantum Emulators Nuevo Simula tus algoritmos cuánticos en notebooks listos para usar Quantum Processing Units (QPU) Nuevo Accede a ordenadores cuánticos a través de nuestra plataforma Quantum ¿Qué es la computación cuántica? Descubra la nueva revolución en aceleración de la computación y cómo empezar a desarrollar hoy en los ordenadores cuánticos del mañana Identity, Security & Operations Volver al menú Identity, Security & Operations Identity, Security & Operations Descubrir todas nuestras soluciones Identity, Security & Operations Identity and Access Management (IAM) Proteja la gestión de accesos y mejore su productividad Logs Data Platform Plataforma completa para recopilar, almacenar y visualizar sus logs Key Management Service (KMS) Proteja los datos en todos sus servicios de OVHcloud desde un único lugar Secret Manager Gestión profesional de todos tus secretos en una mismo servicio Services Logs Monitorice el rendimiento y la seguridad en su entorno cloud Hosted Private Cloud Volver al menú Hosted Private Cloud VMware Volver al menú VMware VMware on OVHcloud Descubrir VMware on OVHcloud Public VCF as a Service Nuevo Solución VMware compartida y administrada, optimizada con tecnología de VMware Cloud Foundation Managed VMware vSphere Solución VMware administrada para todas las empresas Managed VMware vSphere con certificación SecNumCloud Solución VMware en una zona de confianza (Trusted Zone) acreditada por la ANSSI Soluciones Comparar las soluciones VMware SAP on OVHcloud Extensión y migración de datacenter Soluciones de cloud híbrido y multicloud Soluciones de recuperación ante desastres Ver todas las soluciones Nutanix Volver al menú Nutanix Hosted Private Cloud NC2 on OVHcloud Nuevo Nutanix Cloud Clusters (NC2) on OVHcloud Nutanix on OVHcloud Nuestra plataforma hiperconvergente (HCI) Nutanix escalable y lista para usar Bare Metal Pod con certificación SecNumCloud Nuevo Servidores certificados por Nutanix disponibles en Bare Metal Pod, con certificación SecNumCloud HYCU for OVHcloud Simplifique el backup y la migración de sus cargas de trabajo Nutanix Veeam Enterprise para todos sus backups Solución dedicada Veeam Backup & Replication para todos sus backups Casos de uso Migración y gestión de sus datos Plan de recuperación ante desastres (DRP) Hiperconvergencia, ahorro y ecología SAP HANA Volver al menú SAP HANA SAP HANA SAP HANA on Private Cloud La solución que facilita sus despliegues SAP en un cloud soberano Soluciones SAP on OVHcloud Almacenamiento y backup Volver al menú Almacenamiento y backup Almacenamiento y backup Descubra todas las soluciones de almacenamiento Nuestro servicio Veeam para backup de VMware Solución Veeam Backup Managed para el backup de sus máquinas virtuales Opción Zerto para planes de recuperación ante desastres de VMware Solución de plan de recuperación ante desastres (DRP) multisitio para sus clústeres VMware Solución Veeam para Public VCF as a Service Solución dedicada Veeam Backup & Replication para todos sus backups Veeam Enterprise - Licencias Solución dedicada Veeam Backup & Replication para todos sus backups HYCU for OVHcloud Simplifique el backup y la migración de sus cargas de trabajo Nutanix Object Storage Disfrute del almacenamiento ilimitado bajo demanda, compatible con S3 Cold Archive Archive sus datos a largo plazo al mejor precio NetApp - Enterprise File Storage Almacenamiento de archivos totalmente administrado con tecnología NetApp ONTAP Select Casos de uso Backup y recuperación ante desastres Continuidad del negocio Recuperación ante desastres para Managed VMware vSphere Recuperación ante desastres para Nutanix on OVHcloud Red Volver al menú Red Red Additional IP Asigne y migre direcciones IP dinámicas de un servicio a otro Load Balancer de OVHcloud Reparta la carga de sus aplicaciones en múltiples servidores backend Red privada (vRack) Conecte todos sus servicios de OVHcloud en una red privada aislada OVHcloud Connect Conecte su datacenter con OVHcloud Bring Your Own IP (BYOIP) Importe sus direcciones IP y facilite su migración a OVHcloud Seguridad de red Volver al menú Seguridad de red Seguridad de red Infraestructura anti-DDoS Proteja su infraestructura frente a ataques DDoS DNSSEC Proteja sus datos frente al «cache poisoning» SSL Gateway La forma más sencilla de garantizar la seguridad en su sitio web, ¡sin esfuerzo! Identidad, seguridad y operaciones Volver al menú Identidad, seguridad y operaciones Identidad, seguridad y operaciones Identity and Access Management (IAM) Proteja la gestión de accesos y mejore su productividad Logs Data Platform Plataforma completa para recopilar, almacenar y visualizar sus logs Secret Manager Gestión profesional de todos tus secretos en una mismo servicio Service Logs Monitorice el rendimiento y la seguridad de su entorno cloud Conformidad y certificaciones Volver al menú Conformidad y certificaciones Conformidad y certificaciones Lista completa de normas y reglamentaciones SecNumCloud Calificación del visado de seguridad de la ANSSI HDS y alojamiento de datos de salud Alojamiento de datos de salud en Europa HIPAA e HITECH Alojamiento de datos de salud en Estados Unidos PCI DSS Alojamiento de datos bancarios ISO/IEC 27001, 27017 y 27018 Gestión de la seguridad de la información ISO/IEC 27701 Gestión de la seguridad del tratamiento de datos personales ISO 50001 Controlar el desempeño energético SOC 1, 2 y 3 Certificación e informes AICPA SSAE 16/ISAE 3402 de tipo II EBA y ACPR Conformidad para los operadores de servicios financieros en Europa G-Cloud Prestación de servicios cloud para el sector público en Reino Unido Soluciones Volver al menú Soluciones Casos de uso Volver al menú Casos de uso Casos de uso Migración al cloud Cloud híbrido y multicloud Modernización de aplicaciones Aplicaciones nativas de cloud Inteligencia artificial Analítica de big data Gestión de datos Cargas de trabajo de alto rendimiento Almacenamiento de grandes conjuntos de datos Grid Computing Migración a PaaS Backup y recuperación ante desastres Continuidad del negocio Entorno SecNumCloud Protección de red Seguridad cloud Extensión y migración de datacenter Transformación de datacenter Industria Volver al menú Industria Industria Sector público Solución de confianza para las instituciones y las administraciones públicas Salud Solución de confianza para el sector de la salud Servicios financieros Soluciones para los operadores de servicios financieros Sector industrial Solución cloud de confianza para la industria europea E-commerce Alojamiento web para el comercio electrónico Software y tecnologías de la información Soluciones SaaS y PaaS de proveedores de software partners de OVHcloud Gaming Soluciones cloud para empresas y actores del sector del videojuego Blockchain Soluciones de OVHcloud para impulsar sus proyectos de blockchain Tipo de negocio Volver al menú Tipo de negocio Tipo de negocio Empresas Soluciones para impulsar la transformación digital de las empresas Editores de software (SaaS/PaaS) Soluciones SaaS y PaaS de proveedores de software partners de OVHcloud Integradores de sistemas Soluciones para integradores, administradores de TI y empresas de consultoría Instituciones y administraciones públicas Soluciones de confianza para las instituciones y las administraciones públicas Startups Soluciones de apoyo para startups Scaleups Soluciones de apoyo para scaleups Tecnología Volver al menú Tecnología Tecnología Veeam Proteja sus datos con las soluciones Veeam de OVHcloud VMware by Broadcom Soluciones VMware by Broadcom y OVHcloud para todos sus proyectos Nutanix Acelere y simplifique su viaje hacia un multicloud híbrido con la solución Nutanix on OVHcloud HYCU La solución de backup elegida por los usuarios Nutanix SAP Soluciones SAP on OVHcloud para el alojamiento de entornos SAP en un cloud soberano NetApp Soluciones de almacenamiento NetApp con control de costes y alto rendimiento Nvidia Soluciones GPU de Nvidia para acelerar sus proyectos de innovación e IA MongoDB Soluciones MongoDB para simplificar la gestión de datos OpenStack Soluciones OpenStack integradas en OVHcloud para sus infraestructuras cloud Intel Soluciones de expertos para acelerar con Intel® Xeon® en la nube AMD Soluciones cloud de alta gama con procesadores AMD Hadoop Cloudera Solución Cloudera 100 % administrada con Claranet Ecosistema Volver al menú Ecosistema Ecosistema Descubra el ecosistema de partners de OVHcloud Partner Program Una iniciativa especialmente creada para nuestros partners revendedores, integradores, proveedores de servicios administrados y asesoramiento Open Trusted Cloud Un ecosistema de soluciones SaaS y PaaS acreditadas y alojadas en nuestro cloud abierto, reversible y fiable Startup Program Un programa de apoyo a startups y scaleups para acelerar su crecimiento OVHcloud Labs El espacio de innovación en el que podrá probar nuestra tecnología de vanguardia antes de su lanzamiento oficial al mercado. Eventos del ecosistema Conozca todos los eventos de nuestro ecosistema de partners: webinars, conferencias, etc. OVHcloud Ecosystem Awards Descubra cómo nuestros OVHcloud Ecosystem Awards premian cada año a los líderes de nuestro ecosistema por categoría Formación y certificación Desarrolle sus conocimientos con las diferentes formaciones y certificaciones disponibles para miembros del OVHcloud Partner Program. Acceso rápido Encontrar un partner Participar en el OVHcloud Partner Program Participar en el OVHcloud Startup Program Comparador de precios Portal de partners FAQ Partner Program ¿Quiénes somos? Volver al menú ¿Quiénes somos? ¿Quiénes somos? Quiénes somos Actualidad Infraestructura mundial Nuestros servidores Nuestras Local Zones Backbone: Únete a la aventura Patent Pledge Legal Nuestros compromisos Innovación Cloud sostenible Cloud de confianza Impact Tracker Medioambiental Summit Open search bar Close search bar No hay resultados. Productos Soluciones Partners Documentación Artículos Ver todos los resultados Professional Services Professional Services Professional Services de OVHcloud Los Professional Services de OVHcloud le ofrecen consejos técnicos y buenas prácticas para todos sus proyectos de transformación al cloud Contacte con nosotros Vista general Vista general Casos de uso Casos de uso Tecnologías Tecnologías Testimonios Testimonios Colaboradores Colaboradores Contacte con nosotros Toda la experiencia de OVHcloud al servicio de su transformación Nuestros Professional Services se vertebran en tres ejes principales de servicios con valor añadido Soporte técnico Los Professional Services de OVHcloud le ofrecen consejos técnicos y buenas prácticas para todos sus proyectos de transformación al cloud. Prestaciones Los Professional Services de OVHcloud simplifican sus proyectos de modernización y migración al cloud, aportando así un gran valor añadido a su empresa. También podemos recomendar partners de confianza para obtener resultados óptimos en entornos cloud y on-premises. Formación Los Professional Services de OVHcloud ofrecen sesiones de formación personalizada, así como una gama de cursos disponibles en nuestro catálogo en línea. Acceder al catálogo de formación La reproducción de vídeos en YouTube está sujeta a la aceptación de las herramientas de rastreo que la plataforma utiliza para ofrecerle publicidad personalizada basada en su navegación. Para poder ver el vídeo, deberá aceptar las cookies de uso compartido en plataformas de terceros en la configuración de cookies de OVHcloud. Puede retirar su consentimiento en cualquier momento. Para más información, consulte las políticas de cookies de YouTube y de OVHcloud . Show Privacy Center OVHcloud Professional Services: ¡simplifique su migración y amplíe su actividad! Offres Cloud Migración al cloud Obtenga asesoramiento personalizado sobre la planificación y la implementación de una migración, teniendo en cuenta todas sus necesidades en materia de seguridad, resiliencia y recuperación ante desastres. Cloud híbrido y multicloud Diseñe y construya sus soluciones híbridas y multicloud con la ayuda de nuestros arquitectos de soluciones cloud, a través de un POC de consultoría. Infraestructuras cloud modernas Descubra las buenas prácticas de gestión, optimización y protección de su infraestructura cloud. Modernización y desarrollo de aplicaciones Optimice el ciclo de vida de sus desarrollos gracias a las mejores prácticas de DevOps para permitir una modernización más rápida de las aplicaciones, una integración continua y un servicio eficaz en el cloud. Datos e IA Aproveche la información basada en datos y tecnologías de IA para acelerar el crecimiento de su empresa, mejorar la toma de decisiones y estimular la innovación. Tecnologías de experiencia clave con Professional Services Wiremind recomienda los Professional Services de OVHcloud Los Professional Services ayudaron a Wiremind a adquirir los conocimientos necesarios para obtener el mejor rendimiento de almacenamiento de nuestros servidores dedicados. Cédric De St Martin, Operaciones VP/SRE de Wiremind Póngase en contacto con nosotros para obtener asesoramiento profesional Solicite un análisis personalizado de su proyecto a nuestros expertos Contactar con OVHcloud Alcanzar el éxito con los partners expertos de OVHcloud Expertos especializados para cubrir todas sus necesidades OVHcloud es un proveedor de recursos cloud con una sólida red de partners para ayudarle en todos los proyectos de su empresa. Una experiencia optimizada Nuestros partners le ofrecerán una experiencia óptima para que pueda sacar el máximo partido a todas sus soluciones de OVHcloud. Competencias complementarias En OVHcloud aportamos todo nuestro conocimiento y experiencia sobre las tecnologías y los procesos empresariales para completar el catálogo de servicios de nuestros partners. Acceder al directorio de partners de OVHcloud FAQ ¿En qué consisten los Professional Services? Los Professional Services están compuestos por equipos de expertos y formadores de OVHcloud al servicio de nuestros clientes y partners. Se trata de un completo centro de competencias que ofrece asesoramiento sobre entornos cloud y que se basa en una gran variedad de soluciones, tecnologías y servicios. Estos Professional Services proporcionan a las empresas servicios a medida para todos sus proyectos de transformación y ponen en marcha diferentes estrategias al servicio del crecimiento y la competitividad de nuestros clientes y partners. ¿Los Professional Services están disponibles en todas las soluciones de OVHcloud? Sí, los Professional Services trabajan con todas las soluciones disponibles en OVHcloud, tanto en cloud privado como público. Nuestros expertos también dominan las diferentes tecnologías disponibles en el mercado de la informática y del cloud. Por lo tanto, podrán asesorarle sobre entornos legacy o nativos cloud utilizando una moderna metodología adaptada a su caso particular. ¿Intervienen estos servicios en los entornos? Los equipos de Professional Services intervienen como expertos técnicos. Así pues, le guiarán a través de todas las etapas y le proporcionarán asesoramiento adaptado para garantizar el éxito de su proyecto. En función de sus características, también podrán recomendarle empresas colaboradoras (partners) que puedan ofrecerle un soporte avanzado o servicios de administración de sus infraestructuras. ¿En qué idiomas está disponible este servicio? Los expertos de nuestros Professional Services podrán prestarle asesoramiento y formación tanto en inglés como en francés. No obstante, si necesita ayuda en otros idiomas, puede recurrir a nuestra red de partners. Back to top Herramientas Mi cuenta de cliente Webmail API Status OVHcloud Contacto de dominio Informar de una infracción (abuse@ovh.net) Solicitud de divulgación de datos Whois Propiedad intelectual Marcas Soporte Centro de ayuda Guías Centro de aprendizaje Glosario Community Niveles de soporte Contáctenos Nuevo pedido, asesoramiento técnico, incidencias Atención al cliente OVH 1-855-684-5463 Sin costo Noticias Espacio de prensa Blog Redes sociales Sigamos en contacto © Copyright 1999-2026 OVH SAS. Aviso legal Contratos Gestionar las cookies Derechos y obligaciones de los titulares de dominios Información de la ICANN para los titulares de los dominios Pagos Mapa del sitio Acerca de OVHcloud Empleo OVHcloud | 2026-01-13T09:30:40 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.