id int64 5 1.93M | title stringlengths 0 128 | description stringlengths 0 25.5k | collection_id int64 0 28.1k | published_timestamp timestamp[s] | canonical_url stringlengths 14 581 | tag_list stringlengths 0 120 | body_markdown stringlengths 0 716k | user_username stringlengths 2 30 |
|---|---|---|---|---|---|---|---|---|
1,875,785 | Data Field Encapsulation | Making data fields private protects data and makes the class easy to maintain. The data fields radius... | 0 | 2024-06-03T19:14:18 | https://dev.to/paulike/data-field-encapsulation-4i7b | java, programming, learning, beginners | Making data fields private protects data and makes the class easy to maintain. The data fields **radius** and **numberOfObjects** in the **CircleWithStaticMembers** class in **CircleWithStaticMembers.java** can be modified directly (e.g., **c1.radius = 5** or **CircleWithStaticMembers.numberOfObjects = 10**). This is not a good practice—for two reasons:
- First, data may be tampered with. For example, **numberOfObjects** is to count the number of objects created, but it may be mistakenly set to an arbitrary value (e.g., **CircleWithStaticMembers.numberOfObjects = 10**).
- Second, the class becomes difficult to maintain and vulnerable to bugs. Suppose you want to modify the **CircleWithStaticMembers** class to ensure that the radius is nonnegative after other programs have already used the class. You have to change not only the **CircleWithStaticMembers** class but also the programs that use it, because the clients may have modified the radius directly (e.g., **c1.radius = -5**).
To prevent direct modifications of data fields, you should declare the data fields private, using the **private** modifier. This is known as _data field encapsulation_.
A private data field cannot be accessed by an object from outside the class that defines the private field. However, a client often needs to retrieve and modify a data field. To make a private data field accessible, provide a _getter_ method to return its value. To enable a private data field to be updated, provide a _setter_ method to set a new value. A getter method is also referred to as an _accessor_ and a setter to a _mutator_.
A getter method has the following signature:
`public returnType getPropertyName()`
If the **returnType** is **boolean**, the getter method should be defined as follows by convention:
`public boolean isPropertyName()`
A setter method has the following signature:
`public void setPropertyName(dataType propertyValue)`
Let’s create a new circle class with a private data-field radius and its associated accessor and mutator methods. The class diagram is shown in Figure below.

The new circle class, named **CircleWithPrivateDataFields**, is defined in program below:
```
package demo;
public class CircleWithPrivateDataFields {
/** The radius of the circle */
private double radius = 1;
/** The number of objects created */
private static int numberOfObjects = 0;
/** Construct a circle with radius */
public CircleWithPrivateDataFields() {
numberOfObjects++;
}
/** Construct a circle with a specified radius */
public CircleWithPrivateDataFields(double newRadius) {
radius = newRadius;
numberOfObjects++;
}
/** return radius */
public double getRadius() {
return radius;
}
/** Set a new radius */
public void setRadius(double newRadius) {
radius = (newRadius >= 0) ? newRadius : 0;
}
/** return numberOfObjects */
public static int getNumberOfObjects() {
return numberOfObjects;
}
/** Return the area of this circle */
public double getArea() {
return radius * radius * Math.PI;
}
}
```
The **getRadius()** method (lines 22–24) returns the radius, and the **setRadius(newRadius)** method (line 27–29) sets a new radius for the object. If the new radius is negative, **0** is set as the radius for the object. Since these methods are the only ways to read and modify the radius, you have total control over how the **radius** property is accessed. If you have to change the implementation of these methods, you don’t need to change the client programs. This makes the class easy to maintain.
The program below gives a client program that uses the **Circle** class to create a **Circle** object and modifies the radius using the **setRadius** method.

The data field **radius** is declared private. Private data can be accessed only within their defining class, so you cannot use **myCircle.radius** in the client program. A compile error would occur if you attempted to access private data from a client.
Since **numberOfObjects** is private, it cannot be modified. This prevents tampering. For example, the user cannot set **numberOfObjects** to **100**. The only way to make it 100 is to create **100** objects of the **Circle** class. Suppose you combined **TestCircleWithPrivateDataFields** and **Circle** into one class by moving the **main** method in **TestCircleWithPrivateDataFields** into **Circle**. To prevent data from being tampered with and to make the class easy to maintain, declare data fields private. | paulike |
1,875,784 | I'am would like to start a startup | A post by Granger Aj | 0 | 2024-06-03T19:12:14 | https://dev.to/granger_aj_1109fd18d64004/iam-would-like-to-start-a-startup-2ca5 | granger_aj_1109fd18d64004 | ||
1,858,904 | 99okuk | 99ok cung cấp một loạt các trò chơi cá cược, bao gồm Tài Xỉu, Baccarat, Slot, và nhiều trò chơi khác.... | 0 | 2024-05-20T06:27:13 | https://dev.to/99okuk/99okuk-4dbm | 99ok cung cấp một loạt các trò chơi cá cược, bao gồm Tài Xỉu, Baccarat, Slot, và nhiều trò chơi khác. Với sự đa dạng này, người chơi có thể tận hưởng nhiều trải nghiệm giải trí khác nhau trên cùng một nền tảng....
Địa Chỉ: 83/2N ấp Xuân Thới Đông 3, Xuân Thới Đông, Hóc Môn, Thành phố Hồ Chí Minh, Việt Nam
Email: vasilioujaunita@gmail.com
Website: http://99ok.uk/
Điện Thoại: (+63) 962 502 4645
#99ok #99okuk
Social Links:
http://99ok.uk/
https://99ok.uk/lien-he-99ok-cham-soc-khach-hang-truc-tuyen/
https://99ok.uk/trach-nhiem-nguoi-choi/
https://99ok.uk/dieu-khoan-su-dung/
https://99ok.uk/chinh-sach-bao-mat/
https://99ok.uk/category/casino/
https://99ok.uk/category/the-thao/
https://99ok.uk/category/blog/
https://99ok.uk/tai-app/
https://99ok.uk/huong-dan-nap-tien/
https://99ok.uk/huong-dan-rut-tien/
https://99ok.uk/dang-ky/
https://99ok.uk/dang-nhap/
https://www.facebook.com/profile.php?id=61558760934320
https://www.youtube.com/channel/UCO-WqrS5a3PygP4K0C8byuw
https://www.pinterest.com/99okuk/
https://www.tumblr.com/99okuk
https://vimeo.com/99okuk
https://www.twitch.tv/99okuk/about
https://www.reddit.com/user/99okuk/
https://500px.com/p/99okuk?view=photos
https://gravatar.com/99okuk
https://www.blogger.com/profile/03511961100408723613
https://99okuk.blogspot.com/
https://99okuk.weebly.com/
https://draft.blogger.com/profile/03511961100408723613
https://twitter.com/99okuk
https://www.instapaper.com/p/14193429
https://hub.docker.com/u/99okuk
https://www.mixcloud.com/99okuk/
https://flipboard.com/@99okuk/99ok-casino-99ok-link-%C4%91%C4%83ng-k%C3%BD-t%E1%BA%A3i-app-nhanh-nh%E1%BA%A5t-ams7h9q8z?from=share&utm_source=flipboard&utm_medium=curator_share
https://issuu.com/99okuk
https://www.liveinternet.ru/users/casino99okuk/profile
https://beermapping.com/account/99okuk
https://qiita.com/99okuk
https://www.reverbnation.com/artist/99okuk
https://guides.co/g/99okuk/370555
https://os.mbed.com/users/99okuk/
https://myanimelist.net/profile/99okuk
https://www.metooo.io/u/99okuk
https://www.fitday.com/fitness/forums/members/99okuk.html
https://www.iniuria.us/forum/member.php?430598-99okuk
https://www.veoh.com/users/99okuk
https://gifyu.com/99okuk
https://www.dermandar.com/user/99okuk/
https://hypothes.is/users/99okuk
http://molbiol.ru/forums/index.php?showuser=1343248
https://leetcode.com/99okuk/
https://www.walkscore.com/people/269032376777/99okuk
http://www.fanart-central.net/user/99okuk/profile
https://www.chordie.com/forum/profile.php?id=1932701
http://hawkee.com/profile/6652611/
https://codepen.io/99okuk
https://jsfiddle.net/99okuk/pw16vk0h/1/
https://forum.acronis.com/user/634127
https://www.funddreamer.com/users/99okuk
https://www.renderosity.com/users/id:1483576
https://turkish.ava360.com/user/99okuk
https://www.storeboard.com/99okuk
https://doodleordie.com/profile/9okuk
https://mstdn.jp/@99okuk
https://community.windy.com/user/99okuk
https://connect.gt/user/99okuk
https://teletype.in/@99okuk
https://rentry.co/99okuk
https://talktoislam.com/user/99okuk
https://www.credly.com/users/99okuk/badges
https://www.roleplaygateway.com/member/99okuk/
https://masto.nu/@99okuk
https://www.ohay.tv/profile/99okuk
https://www.mapleprimes.com/users/99okuk
http://www.rohitab.com/discuss/user/2163918-99okuk/ | 99okuk | |
1,875,783 | Cloud SecOps: Enhancing Security and Operations in the Cloud | Introduction: The Evolution of Cloud Security and Operations In the age of digital transformation,... | 0 | 2024-06-03T19:12:05 | https://dev.to/unicloud/cloud-secops-enhancing-security-and-operations-in-the-cloud-4ol9 | **Introduction: The Evolution of Cloud Security and Operations**
In the age of digital transformation, cloud computing has become a cornerstone of modern IT infrastructure. However, with the increased reliance on cloud services comes the growing need for robust security measures. Cloud Security Operations, or Cloud SecOps, is a strategic approach that integrates security practices with cloud operations, ensuring that security is an inherent part of the cloud environment. This guide explores the significance of Cloud SecOps, its key components, and how it can enhance both security and operational efficiency in the cloud.
**1. Understanding Cloud SecOps**
[Cloud SecOps](https://unicloud.co/cloud-secops.html) is the convergence of security and operations within cloud environments. It focuses on embedding security practices directly into the operational processes of cloud management. This integration ensures that security is proactive and continuous, rather than reactive and isolated.
Key Objectives of Cloud SecOps:
**- Continuous Monitoring:** Constantly monitoring cloud environments to detect and respond to threats in real-time.
**- Automation:** Utilizing automation to enforce security policies and remediate issues without human intervention.
**- Compliance:** Ensuring that cloud operations adhere to regulatory standards and best practices.
**- Collaboration:** Fostering collaboration between security and operations teams to enhance overall cloud security posture.
**2. The Importance of Cloud SecOps**
As organizations increasingly move their workloads to the cloud, traditional security measures are often insufficient to address the unique challenges of cloud environments. Cloud SecOps offers several advantages that make it a critical component of modern cloud strategies.
**Key Benefits of Cloud SecOps:**
**- Enhanced Security:** By integrating security into every stage of cloud operations, Cloud SecOps provides comprehensive protection against threats.
**- Operational Efficiency:** Automation and continuous monitoring reduce the manual workload on IT teams, allowing them to focus on strategic initiatives.
**- Cost Savings:** Proactive security measures prevent costly breaches and downtime, leading to significant cost savings.
**- Agility:** Cloud SecOps enables organizations to quickly adapt to new threats and regulatory requirements, maintaining agility in their cloud operations.
**3. Core Components of Cloud SecOps**
Effective Cloud SecOps strategies encompass several key components that work together to ensure robust security and seamless operations.
**Key Components:**
**- Identity and Access Management (IAM):** Ensuring that only authorized users have access to cloud resources and that their activities are monitored.
**- Threat Detection and Response: **Implementing tools and processes to detect, investigate, and respond to security incidents in real-time.
**- Vulnerability Management:** Regularly scanning cloud environments for vulnerabilities and applying patches or mitigations as needed.
**- Compliance Management:** Ensuring that cloud operations comply with relevant regulations and industry standards.
**- Automation and Orchestration:** Utilizing automation tools to enforce security policies and streamline operational tasks.
**4. Implementing Cloud SecOps Best Practices**
Implementing [Cloud SecOps](https://unicloud.co/cloud-secops.html) requires a strategic approach that aligns with the organization’s goals and the specific characteristics of its cloud environment. Here are some best practices to consider:
**Best Practices:**
**- Develop a Cloud Security Policy:** Create a comprehensive policy that outlines security requirements and procedures for cloud operations.
**- Leverage Security Tools:** Use advanced security tools and platforms that provide visibility, threat detection, and automated response capabilities.
**- Regularly Assess Risks:** Conduct regular risk assessments to identify potential vulnerabilities and areas for improvement.
**- Train Your Team:** Ensure that both security and operations teams are trained in cloud security practices and understand the principles of Cloud SecOps.
**- Implement Continuous Monitoring:** Set up continuous monitoring to detect and respond to threats in real-time, minimizing the impact of security incidents.
**5. The Role of Automation in Cloud SecOps**
Automation plays a crucial role in the effectiveness of Cloud SecOps. By automating repetitive tasks and security enforcement, organizations can achieve a higher level of security and operational efficiency.
**Key Automation Strategies:**
**- Automated Compliance Checks:** Regularly check cloud configurations against compliance standards and automatically remediate any deviations.
**- Security Orchestration:** Automate the coordination of security responses across different tools and platforms to ensure a swift and effective reaction to incidents.
**- Continuous Integration and Continuous Deployment (CI/CD):** Integrate security checks into the CI/CD pipeline to ensure that security is considered at every stage of development and deployment.
**6. Challenges and Solutions in Cloud SecOps**
While Cloud SecOps offers numerous benefits, it also presents certain challenges that organizations must address to ensure its success.
**Common Challenges:**
**- Complexity:** Managing security across diverse and dynamic cloud environments can be complex.
**- Skill Gaps:** Finding and retaining skilled professionals who understand both security and cloud operations can be difficult.
**- Integration:** Integrating various security tools and platforms into a cohesive Cloud SecOps strategy can be challenging.
**Solutions:**
**- Adopt Unified Platforms:** Use unified security platforms that integrate multiple tools and provide a comprehensive view of the cloud environment.
**- Invest in Training:** Provide ongoing training and certification opportunities for your security and operations teams.
**- Engage Managed Services: **Consider engaging managed security service providers (MSSPs) to augment your in-house capabilities and ensure continuous protection.
**Conclusion: The Future of Cloud SecOps**
As cloud adoption continues to grow, the importance of integrating security and operations will only increase. Cloud SecOps represents a proactive and comprehensive approach to managing cloud security, ensuring that security is an integral part of cloud operations. By adopting Cloud SecOps strategies, organizations can enhance their security posture, improve operational efficiency, and stay ahead of evolving threats.
Investing in Cloud SecOps is not just about protecting your cloud environment—it's about enabling your organization to leverage the full potential of the cloud securely and efficiently. As you look to the future, prioritizing Cloud SecOps will be key to maintaining a robust and resilient cloud infrastructure.
| unicloud | |
1,875,782 | AWS Blog | Hi All, is there any way to publish Technical blog in AWS? | 0 | 2024-06-03T19:01:42 | https://dev.to/taha_yabali_4015ec5bff54/aws-blog-ijo | Hi All, is there any way to publish Technical blog in AWS? | taha_yabali_4015ec5bff54 | |
1,875,781 | Lifetime access for Limited Users! | Lifetime access for Limited Users! PortfolioBee Home Contact Login Sign up Cart 1 1 item Everything... | 0 | 2024-06-03T19:00:48 | https://dev.to/akashjas1996/lifetime-access-for-limited-users-2ikb | webdev, beginners, javascript, productivity |
Lifetime access for Limited Users!
PortfolioBee
Home
Contact
Login
Sign up
Cart
1
1 item
Everything at a Glance
In today’s competitive job market, standing out is crucial. PortfolioBee lets you present all your skills, achievements, and projects in one visually appealing space. Transform your journey and make a greater impact.
Unified Presentation of Skills
Easily showcase your technical, creative, and soft skills. PortfolioBee's user-friendly design helps you organize and highlight your strengths, making it easy for potential employers to recognize your depth of knowledge.
Detailed Project Showcases
Demonstrate your skills and results with PortfolioBee. Upload images, videos, and links to live projects or code repositories, providing a detailed story of your work. Help employers understand your skills and creativity better.
Subscribe to our emails
for tips to Showcase Your Skills and Land Your Dream Projects
Email
Email
Privacy Policy Refund Policy Shipping Policy Terms of Service Contact Information About us
Facebook
Instagram
Payment methods
© 2024, PortfolioBee
| akashjas1996 |
1,875,777 | PUT it at REST | Introduction Understanding REST and Its Rise to Prominence REST (Representational State... | 0 | 2024-06-03T18:57:15 | https://dev.to/jwtiller_c47bdfa134adf302/put-it-at-rest-395a | rest, grpc, signalr, dotnet | ## Introduction
Understanding REST and Its Rise to Prominence
REST (Representational State Transfer) has been the cornerstone of web API design for decades, renowned for its simplicity and effectiveness in integrating various systems over the internet. Initially conceptualized by Roy Fielding in his doctoral dissertation, REST leverages standard HTTP methods like GET, POST, PUT, and DELETE to perform operations. The widespread adoption of REST is largely due to its stateless nature and its ability to use standard web technologies and protocols, making it an accessible and reliable choice for developers.

## Exploring Alternatives: gRPC and SignalR
While REST remains popular, certain limitations have spurred the development and adoption of alternative technologies better suited for specific scenarios. Two notable alternatives are gRPC and SignalR, each with distinct advantages and potential drawbacks:
### gRPC
Developed by Google, gRPC is a high-performance, open-source framework that supports multiple languages. It uses HTTP/2 for transport, allowing for multiplexed streams over a single connection, which improves the efficiency of communications. gRPC is ideal for microservices and systems where internal communication is critical for performance due to its use of Protocol Buffers, a method of serializing structured data.
#### Pros
- Efficient binary serialization.
- Supports streaming data.
- Reduces latency and increases throughput.
- Contract-first approach, which ensures consistency and reliability in API development.
#### Cons
- Steeper learning curve compared to REST.
- Limited browser support due to reliance on HTTP/2.
- Different approach in authentication and authorization which may require additional customization.
### SignalR
A framework for ASP.NET developers that simplifies the process of adding real-time web functionality to applications. SignalR enables bi-directional communication between server and clients, which can be web, desktop, or mobile apps. It’s particularly well-suited for features like chat systems or real-time monitoring dashboards where immediate client updates are crucial.
#### Pros
- Real-time communication capabilities.
- Falls back to older technologies if WebSockets aren’t supported.
- Integrates seamlessly with existing ASP.NET ecosystems, like Blazor server-side applications.
#### Cons
- Adds more complexity due to persistent connecting known as “sticky session”
- More resource-intensive than REST for non-real-time solutions.
- Primarily focused on .NET applications.
- Authentication and authorization can be complex due to real-time nature of communications.
## Use Cases and Performance Insights
Each communication style shines in different scenarios:
- gRPC is highly efficient for microservices communication, where numerous, small, and frequent messages are exchanged.
- SignalR excels in scenarios requiring high-frequency updates from the server to the client, such as live content updates, collaborative applications, and real-time gaming.
For instance, in a search application, the initial connection establishment in SignalR might imply a slight delay compared to REST. However, once established, updates can be pushed from the server to the client instantly without needing to establish new connections, potentially speeding up real-time interactions significantly, useful for search features for instance.
## Personal Insight: My Experience with gRPC
When I first started working with gRPC back in 2018, it was available as a separate package. Over the years, however, it has become more deeply integrated into the .NET runtime, reflecting its growing importance and adoption within the developer community. This integration has made it even more straightforward to develop high-performance, scalable APIs using gRPC within the .NET ecosystem.
## Conclusion: Time to PUT REST at Rest?
As developers, we must continuously evolve and adapt to new technologies that can enhance and streamline our work. While the pun in our title may be playful, the message is serious: it’s time to consider expanding your toolbox beyond REST. By understanding and leveraging the strengths of gRPC and SignalR, you can significantly improve the performance and responsiveness of your applications. So, don’t just PUT it at REST; try putting it to the test with these capable alternatives in your next project! | jwtiller_c47bdfa134adf302 |
1,875,779 | Visibility Modifiers | Visibility modifiers can be used to specify the visibility of a class and its members. You can use... | 0 | 2024-06-03T18:56:32 | https://dev.to/paulike/visibility-modifiers-1jf4 | java, programming, learning, beginners | Visibility modifiers can be used to specify the visibility of a class and its members. You can use the **public** visibility modifier for classes, methods, and data fields to denote that they can be accessed from any other classes. If no visibility modifier is used, then by default the classes, methods, and data fields are accessible by any class in the same package. This is known as _package-private_ or _package-access_.
Packages can be used to organize classes. To do so, you need to add the following line as the first noncomment and nonblank statement in the program:
`package packageName;`
If a class is defined without the package statement, it is said to be placed in the _default package_. Java recommends that you place classes into packages rather than using a default package.
In addition to the **public** and default visibility modifiers, Java provides the **private** and **protected** modifiers for class members. This section introduces the **private** modifier.
The **private** modifier makes methods and data fields accessible only from within its own class. Figure below illustrates how a public, default, and private data field or method in class **C1** can be accessed from a class **C2** in the same package and from a class **C3** in a different package.

If a class is not defined as public, it can be accessed only within the same package. As shown below, **C1** can be accessed from **C2** but not from **C3**.

A visibility modifier specifies how data fields and methods in a class can be accessed from outside the class. There is no restriction on accessing data fields and methods from inside the class. As shown in Figure below (b), an object **c** of class **C** cannot access its private members, because **c** is in the **Test** class. As shown in Figure below (a), an object **c** of class **C** can access its private members, because **c** is defined inside its own class.

The **private** modifier applies only to the members of a class. The **public** modifier can apply to a class or members of a class. Using the modifiers **public** and **private** on local variables would cause a compile error.
In most cases, the constructor should be public. However, if you want to prohibit the user from creating an instance of a class, use a _private constructor_. For example, there is no reason to create an instance from the **Math** class, because all of its data fields and methods are static. To prevent the user from creating objects from the **Math** class, the constructor in **java.lang.Math** is defined as follows:
`private Math() {
}` | paulike |
1,875,538 | Declaring Variables in Golang | In Golang (Go) programming, variables are the fundamental building blocks for data storage and... | 0 | 2024-06-03T14:40:11 | https://dev.to/thelady_bella/declaring-variables-in-golang-3kj0 | go | In Golang (Go) programming, variables are the fundamental building blocks for data storage and manipulation. They are containers that hold the values that your code can access and modify, serving as the driving force of any program's functionality. Mastering variable declaration techniques is paramount for writing clean, maintainable, and efficient Go code.
This article provides a deep dive into declaring variables in Golang. It goes beyond a basic explanation and offers technical details for beginner Golang Developers who want to understand the in and out of variable declaration using the var and := keywords. It also covers zero values and best practices for choosing the right approach in different scenarios.
## The `var` Keyword:
Before any variable is declared in Golang, you have to get used to the var keyword. This keyword is the primary way to declare variables. It allows you to specify the name, data type, and optionally, an initial value for the variable. Here's a breakdown of its functionality
`var variableName type = value
e.g var name string = "Lady Bella"`
Let's breakdown this declaration:
`variableName`: This represents the chosen identifier for your variable within your code just as used in the example "name". When writing this, ensure to select a descriptive name that adheres to Golang's naming conventions (lowercase with underscores for separation).
`type`: This element dictates the data type the variable will encompass. Golang has a rich set of built-in data types such as `int` (integers), `string` (text), `bool` (booleans), `float64` (decimal numbers), and more.
`value`: This is used to assign an initial value during declaration. E.g "Bella". If this element is left vacant, Golang assigns the zero value specific to the data type (e.g., 0 for `int`, empty string for `string`).
Here's a practical example showcasing the declaration of multiple variables using var in Go:
`var name string = "Lady Bella"
var age int = 26
var isEnrolled bool = true`
Important things to note:
You can declare numerous variables of the same type on a single line, separated by commas.
If you can tell what kind of value a variable has from what you give it, you don't need to say the type. For example:
`var name = "Lady Bella" // type inferred as string
`
## The `:= `Shorthand:
Another way of declaring variables In Golang using shorthand. The `:=` (colon equals) is a shorthand notation for declaring and initialising variables in Go. It's a concise way to define a variable and assign a value to it at the same time.
It usually starts with a variable name `s` then the `:=`. When using the shorthand variable declaration, it means that there is no need to use the `var` keyword to declare a variable datatype. It means that the value of this operator should be assigned to the variable. Here's a breakdown of its key aspects:
`variableName := value
name := "Lady Bella"`
This approach proves particularly useful when the data type of the variable can be inferred from the assigned value.
Example:
`func greet(name string) {
message := "Welcome, " + name + "!"
fmt.Println(message)
}`
Things to consider:
The `:=` shorthand is restricted to function scopes; it cannot be used outside of functions.
It cannot be employed for redeclaration of existing variables within the same scope.
You should note that both `var` and `:=` have their designated use cases:
Use `var` when you need to declare the type or intend to assign a value later.
Use `:=` within functions for a concise declaration with type inference.
Always strive for readability and consistency in your codebase when making this decision.
## Incorrect Values:
The datatype of a variable is very important because it defines what values should be assigned to it. For example, a variable with a type of string cannot be assigned an Integer. If assigned, the compiler will throw an error.
Let's look at an example below:
`package main
``import "fmt"
`
`var s string`
`s = 123`
`func main() {`
`fmt.Println(s)`
`}`
Also, when you declare a variable with var but leave the initial value unassigned, Golang will automatically assign the zero value specific to its data type. Here are some common zero values:
`int`: 0
`float64`: 0.0
`string`: "" (empty string)
`bool`: false
Understanding zero values is crucial for initialising variables before their usage to prevent unexpected behavior.
When you learn how to declare variables in Go, you can make strong and flexible programs. Remember to choose the right way (`var` or `:=`) based on what you need and always keep your code clear and consistent.
That will be all for this article. So far, we have covered the two ways of declaring variables in Go, choosing the right approach based on your needs, and maintaining code readability.
PS: This is officially my first technical article, and I would love to hear your feedback. Did I cover this topic well? Is it easy enough for beginners to follow? Your honest feedback in the comments will help improve my future articles. | thelady_bella |
1,875,778 | Returning HTML With fetch() | You can use the hmpl-js package to load HTML from the server. It works on fetch, so it can help you... | 0 | 2024-06-03T18:55:36 | https://dev.to/antonmak1/returning-html-with-fetch-m1k | webdev, javascript, programming, tutorial | You can use the hmpl-js package to load HTML from the server. It works on `fetch`, so it can help you avoid writing a bunch of code:
```html
<div id="wrapper"></div>
<script src="https://unpkg.com/hmpl-js"></script>
<script>
const templateFn = hmpl.compile(
`<div>
<button class="getHTML">Get HTML!</button>
<request src="/api/test" after="click:.getHTML"></request>
</div>`
);
const wrapper = document.getElementById("wrapper");
const elementObj = templateFn({
credentials: "same-origin",
get: (prop, value) => {
if (prop === "response") {
if (value) {
wrapper.appendChild(value);
}
}
},
});
</script>
```
or
```javascript
import { compile } from "hmpl-js";
const templateFn = compile(
`<div>
<button class="getHTML">Get HTML!</button>
<request src="/api/test" after="click:.getHTML"></request>
</div>`
);
const wrapper = document.getElementById("wrapper");
const elementObj = templateFn({
credentials: "same-origin",
get: (prop, value) => {
if (prop === "response") {
if (value) {
wrapper.appendChild(value);
}
}
},
});
```
The function will fire dynamically, depending on the update of properties in the object. | antonmak1 |
1,875,775 | Insertion Sort Algorithm | Insertion Sort is a straightforward and efficient comparison-based sorting algorithm. The algorithm... | 27,581 | 2024-06-03T18:51:53 | https://blog.masum.dev/insertion-sort-algorithm | algorithms, computerscience, cpp, tutorial | Insertion Sort is a straightforward and efficient comparison-based sorting algorithm. The algorithm works similarly to how you might sort playing cards in your hands. It builds the sorted array one item at a time by taking each element from the unsorted portion and inserting it into its correct position in the sorted portion. This involves shifting elements in the sorted portion to the right to make space for the new element. The process starts with the second element and continues until all elements are sorted.
While Insertion Sort is not as efficient on large lists as more advanced algorithms like Quick Sort, Heap Sort or Merge Sort, it is more efficient in practice compared to other simple quadratic algorithms like [**Selection Sort**](https://blog.masum.dev/selection-sort-algorithm) or [**Bubble Sort**](https://blog.masum.dev/bubble-sort-algorithm), especially for small datasets or nearly sorted arrays.
### Implementation of Insertion Sort
```cpp
// Time Complexity: O(n*n) (where n = size of the array)
// for the worst and average cases &
// O(n) for the best case.
// Space Complexity: O(1)
void insertionSort(int arr[], int n)
{
for (int i = 1; i <= n - 1; i++)
{
int key = arr[i];
int j = i - 1;
while (arr[j] > key && j >= 0)
{
arr[j + 1] = arr[j];
j--;
}
arr[j + 1] = key;
}
}
```
**Logic**:
**1. Outer Loop**: Iterate from the second element to the last element of the array.
**2. Key Element**: Select the current element as the key element.
**3. Inner Loop**: Compare the key element with the elements in the sorted portion of the array (to its left) and shift the elements one position to the right until the correct position for the key element is found.
**4. Insertion**: Insert the key element in its correct position.
**Time Complexity**:
* **Worst and Average Cases**: O(n²)
* **Best Case**: O(n) when the array is already sorted
**Space Complexity**: O(1)
* **Explanation**: The algorithm sorts in place and uses a constant amount of extra space.
### Example
**Input**: `arr = [13, 46, 24, 50, 20, 9]`, `n = 6`
**Output**: `arr = [9, 13, 20, 24, 46, 50]`
**Explanation**: The algorithm iteratively takes an element from the unsorted portion and inserts it into the correct position in the sorted portion.
---
### Step-by-Step Explanation
Let's break down the steps for the example input `arr = [13, 46, 24, 50, 20, 9]` using Insertion Sort:
**1. Initial Array**: `[13, 46, 24, 50, 20, 9]`
**2. Pass 1**:
- **Array at the start of Pass 1**: `[13, 46, 24, 50, 20, 9]`
- `Key = 46`, Compare with `13`: No change
- **Array after pass 1**: `[13, 46, 24, 50, 20, 9]`
**3. Pass 2**:
- **Array at the start of Pass 2**: `[13, 46, 24, 50, 20, 9]`
- `Key = 24`, Compare with `46`: Shift `46`
- `Key = 24`, Compare with `13`: Insert `24` after `13`
- **Array after pass 2**: `[13, 24, 46, 50, 20, 9]`
**4. Pass 3**:
- **Array at the start of Pass 3**: `[13, 24, 46, 50, 20, 9]`
- `Key = 50`, Compare with `46`: No change
- **Array after pass 3**: `[13, 24, 46, 50, 20, 9]`
**5. Pass 4**:
- **Array at the start of Pass 4**: `[13, 24, 46, 50, 20, 9]`
- `Key = 20`, Compare with `50`: Shift `50`
- `Key = 20`, Compare with `46`: Shift `46`
- `Key = 20`, Compare with `24`: Shift `24`
- `Key = 20`, Compare with `13`: Insert `20` after `13`
- **Array after pass 4**: `[13, 20, 24, 46, 50, 9]`
**6. Pass 5**:
- **Array at the start of Pass 5**: `[13, 20, 24, 46, 50, 9]`
- `Key = 9`, Compare with `50`: Shift `50`
- `Key = 9`, Compare with `46`: Shift `46`
- `Key = 9`, Compare with `24`: Shift `24`
- `Key = 9`, Compare with `20`: Shift `20`
- `Key = 9`, Compare with `13`: Insert `9` at the start
- **Array after pass 5**: `[9, 13, 20, 24, 46, 50]`
**7. Final Sorted Array**: `[9, 13, 20, 24, 46, 50]`
### Visualization

---
### Edge Cases
* **Already Sorted Array**: The algorithm performs **O(n)** comparisons, making it efficient for nearly sorted inputs.
* **Array with Identical Elements**: Handles duplicates correctly without additional operations.
* **Single Element Array**: No changes needed, the array remains unchanged.
### Additional Notes
* **Efficiency**: More efficient than [**Bubble Sort**](https://blog.masum.dev/bubble-sort-algorithm) and [**Selection Sort**](https://blog.masum.dev/selection-sort-algorithm) for small datasets or nearly sorted arrays.
* **Stability**: Insertion Sort is stable, meaning it maintains the relative order of elements with equal keys.
* **Use Case**: Useful for small datasets, nearly sorted arrays or as a part of more complex algorithms like Tim Sort.
### Conclusion
Insertion Sort is a simple yet efficient sorting algorithm for small or nearly sorted datasets. It builds the sorted array one element at a time by shifting elements as necessary to make space for the new element. Despite its quadratic time complexity for larger arrays, its stability and efficiency for small datasets make it a valuable tool for specific use cases. Its in-place sorting capability and simplicity are its main advantages.
--- | masum-dev |
1,875,776 | Understanding the differences between JavaScript, Node.js, and Express.js | What is JavaScript? JavaScript is a popular programming language primarily used to make... | 0 | 2024-06-03T18:48:52 | https://dev.to/richardshaju/understanding-the-differences-between-javascript-nodejs-and-expressjs-5cb9 | javascript, node, express, web | ## What is JavaScript?
JavaScript is a popular programming language primarily used to make websites interactive. When you click a button and something happens on a webpage, it's likely thanks to JavaScript. It's like the magic behind the scenes that makes web pages dynamic and engaging.
- Where is it used? JavaScript runs in your web browser. It works with HTML and CSS to create and style web pages.
- What can it do? It can update content, control multimedia, animate images, and much more.
## What is Node.js?
Node.js is a powerful tool that lets JavaScript run outside of your web browser. Imagine you have a kitchen (your computer) where you can cook (run programs). Normally, you can only cook in the kitchen using a specific type of stove (the web browser). Node.js is like getting a new, versatile stove that allows you to cook anywhere in the kitchen (on your computer).
- Where is it used? Node.js is used on servers, which are like the kitchens that serve web content to users.
- What can it do? It can handle server-side tasks like reading files, connecting to databases, and managing multiple user requests at the same time.
## What is Express.js?
Express.js is a framework built on top of Node.js that helps developers build web applications easily. Think of it like a set of kitchen tools and recipes designed to make cooking specific dishes (web applications) faster and more efficient.
- Where is it used? Express.js is used in server-side development to build web applications and APIs (tools that let different software applications communicate with each other).
- What can it do? It simplifies the process of building web servers, managing routes (paths to different pages), and handling HTTP requests (the messages browsers send to servers).
Putting It All Together
**JavaScript:** The language used to make web pages interactive. It runs in the browser.
**Node.js:** A tool that allows JavaScript to run on servers, enabling it to handle backend tasks.
**Express.js:** A framework that sits on top of Node.js, making it easier to build web applications and APIs.
Example Scenario
Imagine you want to build a simple web application:
**Front End:** You use JavaScript to make your web pages interactive. Users can click buttons and see animations or updates without reloading the page.
**Back End:** You use Node.js to handle requests from the front end, interact with a database, and send back the needed information.
**Express.js:** You use Express.js to set up the server, define routes (like "/home" or "/profile"), and manage user requests efficiently.
By combining these tools, developers can create powerful, interactive web applications that are easy to maintain and scale.
I hope this article helps you❤️
Check out my other handles: richard.is-a.dev/about | richardshaju |
1,875,774 | Static Variables, Constants, and Methods | A static variable is shared by all objects of the class. A static method cannot access instance... | 0 | 2024-06-03T18:44:57 | https://dev.to/paulike/static-variables-constants-and-methods-mok | java, programming, learning, beginners | A static variable is shared by all objects of the class. A static method cannot access instance members of the class. The data field **radius** in the circle class is known as an _instance variable_. An instance variable is tied to a specific instance of the class; it is not shared among objects of the same class. For example, suppose that you create the following objects:
`Circle circle1 = new Circle();
Circle circle2 = new Circle(5);`
The **radius** in **circle1** is independent of the **radius** in **circle2** and is stored in a different memory location. Changes made to **circle1**’s **radius** do not affect **circle2**’s **radius**, and vice versa.
If you want all the instances of a class to share data, use _static variables_, also known as _class variables_. Static variables store values for the variables in a common memory location. Because of this common location, if one object changes the value of a static variable, all objects of the same class are affected. Java supports static methods as well as static variables. _Static methods_ can be called without creating an instance of the class.
Let’s modify the **Circle** class by adding a static variable **numberOfObjects** to count the number of circle objects created. When the first object of this class is created, **numberOfObjects** is **1**. When the second object is created, **numberOfObjects** becomes **2**. The UML of the new circle class is shown in Figure below.

The **Circle** class defines the instance variable **radius** and the static variable **numberOfObjects**, the instance methods **getRadius**, **setRadius**, and **getArea**, and the static method **getNumberOfObjects**. (Note that static variables and methods are underlined in the UML class diagram.)
To declare a static variable or define a **static** method, put the modifier static in the variable or method declaration. The static variable **numberOfObjects** and the static method **getNumberOfObjects()** can be declared as follows:
`static int numberOfObjects;
static int getNumberObjects() {
return numberOfObjects;
}`
Constants in a class are shared by all objects of the class. Thus, constants should be declared as **final static**. For example, the constant **PI** in the **Math** class is defined as:
`final static double PI = 3.14159265358979323846;`
The new circle class, named **CircleWithStaticMembers**, is defined below:

Method **getNumberOfObjects()** in **CircleWithStaticMembers** is a static method. All the methods in the **Math** class are static. The **main** method is static, too. Instance methods (e.g., **getArea()**) and instance data (e.g., **radius**) belong to instances and can be used only after the instances are created. They are accessed via a reference variable. Static methods (e.g., **getNumberOfObjects()**) and static data (e.g., **numberOfObjects**) can be accessed from a reference variable or from their class name.
The program below demonstrates how to use instance and static variables and methods and illustrates the effects of using them.

`Before creating objects
The number of Circle objects is 0
After creating c1
c1: radius (1.0) and number of Circle objects (1)
After creating c2 and modifying c1
c1: radius (9.0) and number of Circle objects (2)
c2: radius (5.0) and number of Circle objects (2)`
When you compile **TestCircleWithStaticMembers.java**, the Java compiler automatically compiles **CircleWithStaticMembers.java** if it has not been compiled since the last change.
Static variables and methods can be accessed without creating objects. Line 7 displays the number of objects, which is **0**, since no objects have been created.
The **main** method creates two circles, **c1** and **c2** (lines 10, 17). The instance variable **radius** in **c1** is modified to become **9** (line 20). This change does not affect the instance variable **radius** in **c2**, since these two instance variables are independent. The static variable **numberOfObjects** becomes **1** after **c1** is created (line 10), and it becomes **2** after **c2** is created (line 17).
Note that **PI** is a constant defined in **Math**, and **Math.PI** references the constant. **c1.numberOfObjects** (line 24) and **c2.numberOfObjects** (line 25) are better replaced by **CircleWithStaticMembers.numberOfObjects**. This improves readability, because other programmers can easily recognize the static variable. You can also replace **CircleWithStaticMembers.numberOfObjects** with **CircleWithStaticMembers.getNumberOfObjects()**.
Use **ClassName.methodName(arguments)** to invoke a static method and
**ClassName.staticVariable** to access a static variable. This improves readability, because this makes the static method and data easy to spot.
An instance method can invoke an instance or static method and access an instance or static data field. A static method can invoke a static method and access a static data field. However, a static method cannot invoke an instance method or access an instance data field, since static methods and static data fields don’t belong to a particular object. The relationship between static and instance members is summarized in the following diagram:

For example, the following code is wrong.
```
public class A {
int i = 5;
static int k = 2;
public static void main(String[] args) {
int j = i; // Wrong because i is an instance variable
m1(); // Wrong because m1() is an instance method
}
public void m1() {
// Correct since instance and static variables and methods
// can be used in an instance method
i = i + k + m2(i, k);
}
public static int m2(int i, int j) {
return (int)(Math.pow(i, j));
}
}
```
Note that if you replace the preceding code with the following new code, the program would be fine, because the instance data field **i** and method **m1** are now accessed from an object **a** (lines 7–8):
```
public class A {
int i = 5;
static int k = 2;
public static void main(String[] args) {
A a = new A();
int j = a.i; // OK, a.i accesses the object's instance variable
a.m1(); // OK. a.m1() invokes the object's instance method
}
public void m1() {
i = i + k + m2(i, k);
}
public static int m2(int i, int j) {
return (int)(Math.pow(i, j));
}
}
```
How do you decide whether a variable or a method should be an instance one or a static one? A variable or a method that is dependent on a specific instance of the class should be an instance variable or method. A variable or a method that is not dependent on a specific instance of the class should be a static variable or method. For example, every circle has its own radius, so the radius is dependent on a specific circle. Therefore, **radius** is an instance variable of the **Circle** class. Since the **getArea** method is dependent on a specific circle, it is an instance method. None of the methods in the **Math** class, such as **random**, **pow**, **sin**, and **cos**, is dependent on a specific instance. Therefore, these methods are static methods. The **main** method is static and can be invoked directly from a class.
It is a common design error to define an instance method that should have been defined as static. For example, the method **factorial(int n)** should be defined as static, as shown next, because it is independent of any specific instance.
 | paulike |
1,873,150 | Building in Public | Building in Public is rather quite self-explanatory: Building. In. Public, need I say more?... | 0 | 2024-06-03T17:52:51 | https://dev.to/aws-builders/building-in-public-4e91 | aws, buildinginpublic, cloud, webdev | **Building in Public** is rather quite self-explanatory:
Building. In. Public, need I say more?
Building in Public basically emphasizes and hopes to encourage you to develop the habit of documenting and sharing your journey, as it happens _in near real time_, which is why I have decided to document the development of my 'Pet Project' site using AWS services (mostly).
I say mostly, because I had intended to build a 100% AWS Cloud Native site, but I ended up registering my domain with a local provider which was four times cheaper than registering with Amazon Route53 (AWS's DNS Service), so technically, my future site has been optimized for cost already...
For more details, it is a _.co.za_ domain which is _ZAR 90_, which roughly equates to _USD 5_, and on Amazon Route53 it is _USD 13_, so hopefully, down the line, I hope Route53 becomes the cheaper option.
### What Are the Benefits of Building in Public?
There are numerous benefits of building in public but primarily:
**Feedback**: You get the opportunity to receive feedback in real time. This will help you make better choices instantaneously, especially if you haven’t realized that there’s a better alternative way to do something.
**Community**: You get the chance to engage with like-minded individuals who may be on the same journey. You also get to interact with people in more advanced positions. By learning from their mistakes, successes, and experiences, you gain valuable, actionable insights. These insights can help you progress faster by being part of something, rather than being a directionless, confused lone wolf.
**Enhanced Communication Skills**: Since building in public requires you to explain and document your steps, it encourages you to communicate more. As a result, you learn more as you transform your thoughts and actions into nuanced and structured words, either written or spoken, that others can effectively consume.
**Knowledge Acquisition and Retention**: There is a difference between active learning, which involves building and documenting, and passive learning, which involves reading and watching videos. By building in public, you engage in active learning, which enables you to retain the knowledge you acquire through the mistakes you make. Furthermore, by documenting your steps, you learn while teaching yourself and others. Thus, you are continuously and iteratively acquiring and retaining knowledge on another level.
**Accountability**: When you build in public, it means that you’re no longer the only one aware of your project. With others watching, you might feel more accountable and be more determined to see your project through. Accountability places responsibility on your shoulders. Therefore, you won’t quit as easily as you would when you lack accountability. The faster you fail, the faster you get up and try again.
### Conclusion
When you are building in public, you are not only building your project and your skills, but you are also building a real time feedback system, community, accountability, communication skills and enhanced knowledge acquisition.
You get the opportunity to learn, unlearn and relearn - live.
**Let's Build**... _In Public_.
| ntombizakhona |
1,875,773 | 🔥🔥🔥 NOTCOIN NEW LISTINGS🔥🔥🔥 | 🚀Notcoin is a rapidly emerging cryptocurrency that has gained significant traction in recent months,... | 0 | 2024-06-03T18:44:26 | https://dev.to/irmakork/notcoin-new-listings-46h4 |
🚀Notcoin is a rapidly emerging cryptocurrency that has gained significant traction in recent months, propelled by social media interest. Its price surged over 300% in the past week alone, reaching a new all-time high. With a growing user base of over 30 million on Telegram, Notcoin is poised to continue its upward trajectory in the crypto market.
The list of exchanges with NOT/USDT trading pair:
1️⃣ WhiteBIT
2️⃣ Huobi
3️⃣ OKX
4️⃣ Gate.io
5️⃣ KuCoin
6️⃣ Bitfinex
7️⃣ Binance
8️⃣ BitMart
9️⃣ Hotbit
🔟 CoinEx

| irmakork | |
1,873,950 | Pure SVG color change animation | A first SVG animation, using the animate tag to change between several different colors. 1.... | 0 | 2024-06-03T18:41:57 | https://dev.to/anonymouser/pure-svg-color-change-animation-25id | svg, animation, color, codepen | A first SVG animation, using the animate tag to change between several different colors.
## 1. Create the SVG shape.
This one is just a square `<rect>` 100 pixels long, with a color fill of blue `#0000ff` and a stroke color black `#000000`.
```<svg width="100" height="100" xmlns="http://www.w3.org/2000/svg">
<rect x="0" y="0" height="100" width="100" fill="#0000ff" stroke="#000000">
</rect>
</svg>```
## 2. Add the animate code
Add the `animate` tag inside the square's `<rect>`to flash between multiple colors using hex color codes held in `values` (#00ff00 green, #ff00ff purple, #ff0000 red) and the timings for each is held by `keyTimes`. The values in keyTimes must be between 0 and 1.
```<svg width="100" height="100" xmlns="http://www.w3.org/2000/svg">
<rect x="0" y="0" height="100" width="100" fill="#0000ff" stroke="#000000">
<animate
attributeName="fill"
attributeType="XML"
keyTimes="0; 0.5; 1"
begin="0s" dur="5s" values="#00ff00;#ff00ff;#ff0000"
calcMode="discrete"
repeatCount="indefinite"/>
</rect>
</svg>```
## 3. Run it
You can also embed it within a HTML document, eg in the `<body>` tag or a `<div>`.
{%codepen https://codepen.io/quiz-test/pen/bGyqJdo/ %} | anonymouser |
1,872,386 | The Future of Bug Logging and Internet Security | by Donnie Brown As we navigate through an increasingly digital world, the landscape of internet... | 0 | 2024-06-03T18:39:45 | https://dev.to/owasp/the-future-of-bug-logging-and-internet-security-2fp4 | security, ai | **by Donnie Brown**
As we navigate through an increasingly digital world, the landscape of internet security continues to evolve at a rapid pace. Emerging trends in bug logging and security highlight the critical need for robust, adaptive, and community-driven approaches to safeguard our digital environment. This post explores these trends, delves into the evolution of [OWASP Bug Logging Tool (BLT)](https://owasp.org/www-project-bug-logging-tool/), and predicts the future trajectory of internet security and bug reporting.
## Emerging Trends in Bug Logging and Security
The speed at which the internet evolves makes it a challenging task to secure every aspect of our online interactions. New vulnerabilities and threats surface daily, often driven by advancements in technology such as artificial intelligence (AI). As cybercriminals leverage AI to find and exploit security weaknesses more efficiently, the cybersecurity community must also harness AI to stay ahead.
Crowdsourcing bug reporting is becoming a pivotal strategy in this fight. By empowering individuals to report bugs for any company, regardless of whether they are part of a specific bug bounty program, we tap into the collective power of the global community. This democratized approach to bug logging can uncover vulnerabilities that might otherwise go unnoticed, contributing to a safer internet for everyone.
## The Evolution of OWASP BLT
OWASP BLT is at the forefront of these efforts, constantly evolving to meet new security challenges. This year, BLT is developing AI solutions as part of the Summer of Code initiative. With six students and four talented mentors, the project aims to make significant advancements over the summer.
Key developments include:
- **Private Information Monitoring**: Enhancing privacy by identifying and mitigating the exposure of sensitive information.
- **Trademark Search and Monitoring**: Protecting intellectual property by detecting unauthorized use of trademarks.
- **Educational Videos**: Providing valuable resources to educate the security community on best practices and emerging threats.
Additionally, BLT is expanding its capabilities to work with any project on GitHub, whether it has a domain name or not. This broadens the scope of projects that can benefit from BLT’s security insights, fostering a more secure development ecosystem.
One of the exciting new features is the deployment of the BLT Lettuce Bot, designed to greet users when they join the OWASP Slack. This bot is a testament to BLT’s commitment to creating an engaging and supportive community for security enthusiasts and professionals alike.
## Predictions for the Future of Internet Security and Bug Reporting
Looking ahead, the integration of AI and crowdsourcing will be crucial in shaping the future of internet security and bug reporting. Here are some key predictions:
- **Increased Automation**: AI will automate more aspects of bug detection and reporting, reducing the time and effort required to identify vulnerabilities.
- **Enhanced Collaboration**: Platforms that facilitate collaboration between security researchers, developers, and organizations will become more prevalent, fostering a collective defense against cyber threats.
- **Adaptive Security Measures**: Security solutions will become more adaptive, using AI to continuously learn from new threats and adjust defenses accordingly.
- **Broader Community Involvement**: More people, regardless of their technical background, will be encouraged to participate in bug reporting, harnessing the diverse perspectives and skills of a global community.
## Community Feedback and Future Features
As OWASP BLT continues to evolve, community feedback remains invaluable. We invite suggestions on features you would like to see implemented in BLT. Your input helps us prioritize developments that will have the most significant impact on internet security.
Current experimental features such as private information monitoring, trademark search and monitoring, and educational videos are just the beginning. We aim to make BLT a comprehensive tool that supports the security needs of any project, particularly those hosted on platforms like GitHub.
In conclusion, the future of bug logging and internet security lies in the synergy of human intelligence and AI. By leveraging the collective power of the global community and advanced technological solutions, we can create a safer digital environment for everyone. Together, with the help of tools like OWASP BLT, we can stay ahead of emerging threats and ensure the integrity of our online world.
--
[OWASP](https://owasp.org) is a non-profit foundation that envisions a world with no more insecure software. Our mission is to be the global open community that powers secure software through education, tools, and collaboration. We maintain hundreds of open source projects, run industry-leading educational and training conferences, and meet through over 250 chapters worldwide. | donnieblt |
1,875,770 | Buy verified cash app account | https://dmhelpshop.com/product/buy-verified-cash-app-account/ Buy verified cash app account Cash app... | 0 | 2024-06-03T18:30:40 | https://dev.to/aawqaa225/buy-verified-cash-app-account-516o | javascript, beginners, programming, tutorial | ERROR: type should be string, got "https://dmhelpshop.com/product/buy-verified-cash-app-account/\n\nBuy verified cash app account\nCash app has emerged as a dominant force in the realm of mobile banking within the USA, offering unparalleled convenience for digital money transfers, deposits, and trading. As the foremost provider of fully verified cash app accounts, we take pride in our ability to deliver accounts with substantial limits. Bitcoin enablement, and an unmatched level of security.\n\nOur commitment to facilitating seamless transactions and enabling digital currency trades has garnered significant acclaim, as evidenced by the overwhelming response from our satisfied clientele. Those seeking buy verified cash app account with 100% legitimate documentation and unrestricted access need look no further. Get in touch with us promptly to acquire your verified cash app account and take advantage of all the benefits it has to offer.\n\nWhy dmhelpshop is the best place to buy USA cash app accounts?\nIt’s crucial to stay informed about any updates to the platform you’re using. If an update has been released, it’s important to explore alternative options. Contact the platform’s support team to inquire about the status of the cash app service.\n\nClearly communicate your requirements and inquire whether they can meet your needs and provide the buy verified cash app account promptly. If they assure you that they can fulfill your requirements within the specified timeframe, proceed with the verification process using the required documents.\n\nOur account verification process includes the submission of the following documents: [List of specific documents required for verification].\n\nGenuine and activated email verified\nRegistered phone number (USA)\nSelfie verified\nSSN (social security number) verified\nDriving license\nBTC enable or not enable (BTC enable best)\n100% replacement guaranteed\n100% customer satisfaction\nWhen it comes to staying on top of the latest platform updates, it’s crucial to act fast and ensure you’re positioned in the best possible place. If you’re considering a switch, reaching out to the right contacts and inquiring about the status of the buy verified cash app account service update is essential.\n\nClearly communicate your requirements and gauge their commitment to fulfilling them promptly. Once you’ve confirmed their capability, proceed with the verification process using genuine and activated email verification, a registered USA phone number, selfie verification, social security number (SSN) verification, and a valid driving license.\n\nAdditionally, assessing whether BTC enablement is available is advisable, buy verified cash app account, with a preference for this feature. It’s important to note that a 100% replacement guarantee and ensuring 100% customer satisfaction are essential benchmarks in this process.\n\nHow to use the Cash Card to make purchases?\nTo activate your Cash Card, open the Cash App on your compatible device, locate the Cash Card icon at the bottom of the screen, and tap on it. Then select “Activate Cash Card” and proceed to scan the QR code on your card. Alternatively, you can manually enter the CVV and expiration date. How To Buy Verified Cash App Accounts.\n\nAfter submitting your information, including your registered number, expiration date, and CVV code, you can start making payments by conveniently tapping your card on a contactless-enabled payment terminal. Consider obtaining a buy verified Cash App account for seamless transactions, especially for business purposes. Buy verified cash app account.\n\nWhy we suggest to unchanged the Cash App account username?\nTo activate your Cash Card, open the Cash App on your compatible device, locate the Cash Card icon at the bottom of the screen, and tap on it. Then select “Activate Cash Card” and proceed to scan the QR code on your card.\n\nAlternatively, you can manually enter the CVV and expiration date. After submitting your information, including your registered number, expiration date, and CVV code, you can start making payments by conveniently tapping your card on a contactless-enabled payment terminal. Consider obtaining a verified Cash App account for seamless transactions, especially for business purposes. Buy verified cash app account. Purchase Verified Cash App Accounts.\n\nSelecting a username in an app usually comes with the understanding that it cannot be easily changed within the app’s settings or options. This deliberate control is in place to uphold consistency and minimize potential user confusion, especially for those who have added you as a contact using your username. In addition, purchasing a Cash App account with verified genuine documents already linked to the account ensures a reliable and secure transaction experience.\n\n \n\nBuy verified cash app accounts quickly and easily for all your financial needs.\nAs the user base of our platform continues to grow, the significance of verified accounts cannot be overstated for both businesses and individuals seeking to leverage its full range of features. How To Buy Verified Cash App Accounts.\n\nFor entrepreneurs, freelancers, and investors alike, a verified cash app account opens the door to sending, receiving, and withdrawing substantial amounts of money, offering unparalleled convenience and flexibility. Whether you’re conducting business or managing personal finances, the benefits of a verified account are clear, providing a secure and efficient means to transact and manage funds at scale.\n\nWhen it comes to the rising trend of purchasing buy verified cash app account, it’s crucial to tread carefully and opt for reputable providers to steer clear of potential scams and fraudulent activities. How To Buy Verified Cash App Accounts. With numerous providers offering this service at competitive prices, it is paramount to be diligent in selecting a trusted source.\n\nThis article serves as a comprehensive guide, equipping you with the essential knowledge to navigate the process of procuring buy verified cash app account, ensuring that you are well-informed before making any purchasing decisions. Understanding the fundamentals is key, and by following this guide, you’ll be empowered to make informed choices with confidence.\n\n \n\nIs it safe to buy Cash App Verified Accounts?\nCash App, being a prominent peer-to-peer mobile payment application, is widely utilized by numerous individuals for their transactions. However, concerns regarding its safety have arisen, particularly pertaining to the purchase of “verified” accounts through Cash App. This raises questions about the security of Cash App’s verification process.\n\nUnfortunately, the answer is negative, as buying such verified accounts entails risks and is deemed unsafe. Therefore, it is crucial for everyone to exercise caution and be aware of potential vulnerabilities when using Cash App. How To Buy Verified Cash App Accounts.\n\nCash App has emerged as a widely embraced platform for purchasing Instagram Followers using PayPal, catering to a diverse range of users. This convenient application permits individuals possessing a PayPal account to procure authenticated Instagram Followers.\n\nLeveraging the Cash App, users can either opt to procure followers for a predetermined quantity or exercise patience until their account accrues a substantial follower count, subsequently making a bulk purchase. Although the Cash App provides this service, it is crucial to discern between genuine and counterfeit items. If you find yourself in search of counterfeit products such as a Rolex, a Louis Vuitton item, or a Louis Vuitton bag, there are two viable approaches to consider.\n\n \n\nWhy you need to buy verified Cash App accounts personal or business?\nThe Cash App is a versatile digital wallet enabling seamless money transfers among its users. However, it presents a concern as it facilitates transfer to both verified and unverified individuals.\n\nTo address this, the Cash App offers the option to become a verified user, which unlocks a range of advantages. Verified users can enjoy perks such as express payment, immediate issue resolution, and a generous interest-free period of up to two weeks. With its user-friendly interface and enhanced capabilities, the Cash App caters to the needs of a wide audience, ensuring convenient and secure digital transactions for all.\n\nIf you’re a business person seeking additional funds to expand your business, we have a solution for you. Payroll management can often be a challenging task, regardless of whether you’re a small family-run business or a large corporation. How To Buy Verified Cash App Accounts.\n\nImproper payment practices can lead to potential issues with your employees, as they could report you to the government. However, worry not, as we offer a reliable and efficient way to ensure proper payroll management, avoiding any potential complications. Our services provide you with the funds you need without compromising your reputation or legal standing. With our assistance, you can focus on growing your business while maintaining a professional and compliant relationship with your employees. Purchase Verified Cash App Accounts.\n\nA Cash App has emerged as a leading peer-to-peer payment method, catering to a wide range of users. With its seamless functionality, individuals can effortlessly send and receive cash in a matter of seconds, bypassing the need for a traditional bank account or social security number. Buy verified cash app account.\n\nThis accessibility makes it particularly appealing to millennials, addressing a common challenge they face in accessing physical currency. As a result, ACash App has established itself as a preferred choice among diverse audiences, enabling swift and hassle-free transactions for everyone. Purchase Verified Cash App Accounts.\n\n \n\nHow to verify Cash App accounts\nTo ensure the verification of your Cash App account, it is essential to securely store all your required documents in your account. This process includes accurately supplying your date of birth and verifying the US or UK phone number linked to your Cash App account.\n\nAs part of the verification process, you will be asked to submit accurate personal details such as your date of birth, the last four digits of your SSN, and your email address. If additional information is requested by the Cash App community to validate your account, be prepared to provide it promptly. Upon successful verification, you will gain full access to managing your account balance, as well as sending and receiving funds seamlessly. Buy verified cash app account.\n\n \n\nHow cash used for international transaction?\nExperience the seamless convenience of this innovative platform that simplifies money transfers to the level of sending a text message. It effortlessly connects users within the familiar confines of their respective currency regions, primarily in the United States and the United Kingdom.\n\nNo matter if you’re a freelancer seeking to diversify your clientele or a small business eager to enhance market presence, this solution caters to your financial needs efficiently and securely. Embrace a world of unlimited possibilities while staying connected to your currency domain. Buy verified cash app account.\n\nUnderstanding the currency capabilities of your selected payment application is essential in today’s digital landscape, where versatile financial tools are increasingly sought after. In this era of rapid technological advancements, being well-informed about platforms such as Cash App is crucial.\n\nAs we progress into the digital age, the significance of keeping abreast of such services becomes more pronounced, emphasizing the necessity of staying updated with the evolving financial trends and options available. Buy verified cash app account.\n\nOffers and advantage to buy cash app accounts cheap?\nWith Cash App, the possibilities are endless, offering numerous advantages in online marketing, cryptocurrency trading, and mobile banking while ensuring high security. As a top creator of Cash App accounts, our team possesses unparalleled expertise in navigating the platform.\n\nWe deliver accounts with maximum security and unwavering loyalty at competitive prices unmatched by other agencies. Rest assured, you can trust our services without hesitation, as we prioritize your peace of mind and satisfaction above all else.\n\nEnhance your business operations effortlessly by utilizing the Cash App e-wallet for seamless payment processing, money transfers, and various other essential tasks. Amidst a myriad of transaction platforms in existence today, the Cash App e-wallet stands out as a premier choice, offering users a multitude of functions to streamline their financial activities effectively. Buy verified cash app account.\n\nTrustbizs.com stands by the Cash App’s superiority and recommends acquiring your Cash App accounts from this trusted source to optimize your business potential.\n\nHow Customizable are the Payment Options on Cash App for Businesses?\nDiscover the flexible payment options available to businesses on Cash App, enabling a range of customization features to streamline transactions. Business users have the ability to adjust transaction amounts, incorporate tipping options, and leverage robust reporting tools for enhanced financial management.\n\nExplore trustbizs.com to acquire verified Cash App accounts with LD backup at a competitive price, ensuring a secure and efficient payment solution for your business needs. Buy verified cash app account.\n\nDiscover Cash App, an innovative platform ideal for small business owners and entrepreneurs aiming to simplify their financial operations. With its intuitive interface, Cash App empowers businesses to seamlessly receive payments and effectively oversee their finances. Emphasizing customization, this app accommodates a variety of business requirements and preferences, making it a versatile tool for all.\n\nWhere To Buy Verified Cash App Accounts\nWhen considering purchasing a verified Cash App account, it is imperative to carefully scrutinize the seller’s pricing and payment methods. Look for pricing that aligns with the market value, ensuring transparency and legitimacy. Buy verified cash app account.\n\nEqually important is the need to opt for sellers who provide secure payment channels to safeguard your financial data. Trust your intuition; skepticism towards deals that appear overly advantageous or sellers who raise red flags is warranted. It is always wise to prioritize caution and explore alternative avenues if uncertainties arise.\n\nThe Importance Of Verified Cash App Accounts\nIn today’s digital age, the significance of verified Cash App accounts cannot be overstated, as they serve as a cornerstone for secure and trustworthy online transactions.\n\nBy acquiring verified Cash App accounts, users not only establish credibility but also instill the confidence required to participate in financial endeavors with peace of mind, thus solidifying its status as an indispensable asset for individuals navigating the digital marketplace.\n\nWhen considering purchasing a verified Cash App account, it is imperative to carefully scrutinize the seller’s pricing and payment methods. Look for pricing that aligns with the market value, ensuring transparency and legitimacy. Buy verified cash app account.\n\nEqually important is the need to opt for sellers who provide secure payment channels to safeguard your financial data. Trust your intuition; skepticism towards deals that appear overly advantageous or sellers who raise red flags is warranted. It is always wise to prioritize caution and explore alternative avenues if uncertainties arise.\n\nConclusion\nEnhance your online financial transactions with verified Cash App accounts, a secure and convenient option for all individuals. By purchasing these accounts, you can access exclusive features, benefit from higher transaction limits, and enjoy enhanced protection against fraudulent activities. Streamline your financial interactions and experience peace of mind knowing your transactions are secure and efficient with verified Cash App accounts.\n\nChoose a trusted provider when acquiring accounts to guarantee legitimacy and reliability. In an era where Cash App is increasingly favored for financial transactions, possessing a verified account offers users peace of mind and ease in managing their finances. Make informed decisions to safeguard your financial assets and streamline your personal transactions effectively.\n\nContact Us / 24 Hours Reply\nTelegram:dmhelpshop\nWhatsApp: +1 (980) 277-2786\nSkype:dmhelpshop\nEmail:dmhelpshop@gmail.com" | aawqaa225 |
1,875,768 | How to link your Blob file storage to Azure SQL database | Step 1: Login to Azure portal and search for storage accounts **First we need to create a... | 0 | 2024-06-03T18:27:23 | https://dev.to/busybrain/how-to-link-your-blob-file-storage-to-azure-sql-database-2d91 | **[Step 1: Login to Azure portal and search for storage accounts](url)**

## **First we need to create a Blob file storage before we link it to our SQL database.
Step 2 : Create a file storage **

**_Select your subscription
Create a resource group or add from an existing one you have created before.
Create a storage account name
Select a region and ensure performance is set at “Standard”
Select Redundancy to Geo-redundant storage then click “Create”_**

**_Leave other tabs as default, the main goal to create a file storage that can be sent to SQL database.
_**

**_Once you click on resources, the below page shows, click on containers to create a file storage._**

**Step 3: Create a container to store our files such as excel files, csv or other files that can be used to store data.
Select “container access level” and click create.**


**Step 4: click on the container and upload any csv file or any file used to create, store dataset from your computer, then click “upload”.**



**
## _Now we have BLOB storage container with a CSV file in it. Now let’s create an SQL database_
**
**Step 5 : Go to the Home page of the portal and search “SQL database” and click Create**


**_Select Subscription and resource group( if you have created one before) in this case you can select the same resource group used to create the BLOB storage for this SQL database to ensure you have all resources for the activity in the same resource group.
Create a Database name and select a server or create a server
Ensure the storage redundancy is “geo-redundant storage” similar to the BLOB storage, leave other tabs has default and click “create”_**




**_Once your SQL Database has been deployed, go to the resource page of the database. And click “Query editor.
Enter your login details you created while creating your SQL database._**


**_
## Now we are going to create table heads of CSV file in the blob storage into this tables folder in the database for us to link the dataset later.
_**



**
## _Now save the query as “dataset” and congratulations, you have create a SQL database_
**

**
## Congratulations you have successfully created A Blob storage and A SQL database.
**
**
## _Now lets link the storage file to the Database, _
**
**_Step 6: Go back home, and create “Data Factory” and create.
Select subscription, resource group such as the one for the data storage and SQL database._**


**Once you create and deploy, click on the resource for it and “launch studio”**

**This will open up a new-tab on your browser**



**_
## Now we need to provide a link service that will enable us link the Blob storage to our SQL database
_**

**_Under Data store tab, search for “Azure Blob Storage” _**


**_As usual, follow the details of subscriptions and under the storage account select the name of the blob storage file we created in azure earlier._**

**_once it is done, click “create”_**

## **_Now let’s repeat the process for SQL database,_**


**Select the required information has shown in the screenshot below, and click create.**

**_
## Now we have created the linking services for both the blob storage and Sql database, let’s go back to the pipeline2
_**




**_From the above select “Delimited text” which represents “CSV” file format stored in the blob storage in azure portal. _**


**_
select “dataset” and click ok _**

**_
## Let’s create same dataset for the SQL Table
_**





**_
## Now Go back to “pipeline2” and select “Move and transform”
_**

**_Move and drag “copy data to the open space next to it _**

**_Click on “Source” – Source is the source of the data which we want to connect the data from which is the “Blob storage”. _**

**_
## Now we click on “Sink”, sink is the sql table headers we created with the sql syntax called “orders”
_**

**_
## Now click on “Mapping” – to map both files together
_**


**_Confirm that dataset types from the source (Blob storage) is the same to destination (Sql database)
After that, confirm the tables “dataset and xsqltable1” are shown above then click “debug”._**


**_Once the “Debug is complete”, and its succeeded as shown above CONGRATULATIONS, YOU HAVE SUCCESSFULLY LINKED YOUR BLOB STORAGE TO YOUR SQL DATABASE._**
**_
##
Now go back to azure portal, check the SQL database query d.bo.dataset
_**



**_
##
Let’s compare the table previously
Before
_**

**_
## After
_**

**_
## CONGRATULATIONS, YOU HAVE SUCCESSFULLY LOADED YOUR BLOB CSV DATASET TO THE SQL DATABAS
_**
| busybrain | |
1,873,047 | 3 ways to deal with architecture responsibilities in your team | When discussing software architecture, I've explored three primary ways to allocate responsibility... | 0 | 2024-06-03T18:26:05 | https://dev.to/raphael-dumhart/3-ways-to-deal-with-architecture-responsibilities-in-your-team | architecture, learning | When discussing software architecture, I've explored three primary ways to allocate responsibility within a team.

The first method involves appointing a dedicated architect. This approach centralizes decision-making and ensures consistency in architectural standards. However, it can sometimes lead to a bottleneck, as all architectural decisions funnel through one person, which can slow down the process and reduce team autonomy.
The second method distributes architectural responsibilities among the development team. Here, certain team members are assigned architecture-related tasks based on their expertise. This can enhance collaboration and leverage diverse perspectives, leading to more innovative solutions. However, it may also cause inconsistencies if team members have differing views on architecture principles and standards. Coordination becomes crucial to maintain alignment and coherence in architectural decisions.

The third approach treats architecture as a collective skill that every team member should possess. This method encourages a culture where everyone is involved in architectural discussions and decisions. It promotes a sense of ownership and shared responsibility, which can be motivating and empowering for the team. The challenge with this approach lies in ensuring that all team members have the necessary skills and understanding of architectural principles. It requires ongoing training and a strong commitment to knowledge sharing within the team.
Each approach has its pros and cons, and the best choice depends on the specific context of the organization and the nature of the projects being undertaken. A dedicated architect can provide clear guidance and maintain consistency, but may slow down decision-making. Distributing responsibilities can harness diverse ideas but requires strong coordination. Treating architecture as a shared skill fosters collaboration and ownership but demands continuous learning and alignment.
In my experience, finding the right balance is key. Often, a hybrid approach that combines elements of all three methods can be the most effective. This way, we can leverage the strengths of each approach while mitigating their weaknesses. Ultimately, the goal is to create a robust and flexible architecture that supports the organization's objectives and adapts to changing needs.
For more detailed insights, you can read the [full post in German] (https://www.raphaeldumhart.at/blog/3-arten-der-architektur-zustaendigkeit/).
Disclaimer: This post was partly created with AI for summary and translation. | raphael-dumhart |
1,875,735 | Bubble Sort Algorithm | Bubble Sort is a simple comparison-based sorting algorithm. It repeatedly steps through the list,... | 27,581 | 2024-06-03T18:20:59 | https://blog.masum.dev/bubble-sort-algorithm | algorithms, computerscience, cpp, tutorial | Bubble Sort is a simple comparison-based sorting algorithm. It repeatedly steps through the list, **compares adjacent** elements and **swaps** them if they are in the wrong order. The process is repeated until the list is sorted. This algorithm gets its name because larger elements "bubble" to the top (end) of the list.
### Implementation of Bubble Sort
#### **Standard Bubble Sort**
```cpp
// Time Complexity: O(n*n) (where n = size of the array)
// for the worst, average and best cases.
// Space Complexity: O(1)
void bubbleSort(int arr[], int n)
{
for (int i = 0; i < n - 1; i++)
{
for (int j = 0; j < n - 1 - i; j++)
{
if (arr[j] > arr[j + 1])
{
swap(arr[j], arr[j + 1]);
}
}
}
}
```
**Logic**:
**1. Outer Loop**: Iterate from the **start** of the array to the **second last** element.
**2. Inner Loop**: For each pass, compare adjacent elements.
- If the current element is greater (or smaller, depending on sorting order) than the next element, swap them.
**3. Progressive Shortening**: With each pass, the largest (or smallest, depending on sorting order) unsorted element is bubbled to its correct position, so the range of the inner loop is reduced.
**Time Complexity**: O(n²)
* **Explanation**: Two nested loops each iterating up to `n` times result in O(n²) time complexity for **all (best, worst and average)** cases.
**Space Complexity**: O(1)
* **Explanation**: The algorithm sorts in place and uses a constant amount of extra space.
---
#### **Optimized Bubble Sort**
```cpp
// Time Complexity: O(n*n) (where n = size of the array)
// for the worst and average cases &
// O(n) for the best case.
// Space Complexity: O(1)
void bubbleSortOptimized(int arr[], int n)
{
for (int i = 0; i < n - 1; i++)
{
bool didSwap = false;
for (int j = 0; j < n - 1 - i; j++)
{
if (arr[j] > arr[j + 1])
{
swap(arr[j], arr[j + 1]);
didSwap = true;
}
}
if (!didSwap)
{
break;
}
}
}
```
**Logic:**
**1. Outer Loop**: Iterate from the **start** of the array to the **second last** element.
**2. Inner Loop**: For each pass, compare adjacent elements.
- If the current element is greater (or smaller, depending on sorting order) than the next element, swap them and set `didSwap` to `true`.
**3. Early Termination**: If no elements were swapped in the inner loop, the array is already sorted and the algorithm can terminate early.
**Time Complexity**:
* **Worst and Average Cases**: O(n²)
* **Best Case**: O(n) when the **array is already sorted.**
**Space Complexity**: O(1)
* **Explanation**: The algorithm sorts in place and uses a constant amount of extra space.
### Example
**Input**: `arr = [13, 46, 24, 50, 20, 9]`, `n = 6`
**Output**: `arr = [9, 13, 20, 24, 46, 50]`
**Explanation**: The algorithm repeatedly compares and swaps adjacent elements if they are in the wrong order. This process continues until the array is sorted.
---
### Step-by-Step Explanation
Let's break down the steps for the example input `arr = [13, 46, 24, 50, 20, 9]` using the standard Bubble Sort:
**1. Initial Array**: `[13, 46, 24, 50, 20, 9]`
**2. Pass 1**:
- **Array at the start of Pass 1**: `[13, 46, 24, 50, 20, 9]`
- Compare `13` and `46`: No swap `[13, 46, 24, 50, 20, 9]`
- Compare `46` and `24`: Swap `[13, 24, 46, 50, 20, 9]`
- Compare `46` and `50`: No swap `[13, 24, 46, 50, 20, 9]`
- Compare `50` and `20`: Swap `[13, 24, 46, 20, 50, 9]`
- Compare `50` and `9`: Swap `[13, 24, 46, 20, 9, 50]`
- **Array after pass 1**: `[13, 24, 46, 20, 9, 50]`
**3. Pass 2**:
- **Array at the start of Pass 2**: `[13, 24, 46, 20, 9, 50]`
- Compare `13` and `24`: No swap `[13, 24, 46, 20, 9, 50]`
- Compare `24` and `46`: No swap `[13, 24, 46, 20, 9, 50]`
- Compare `46` and `20`: Swap `[13, 24, 20, 46, 9, 50]`
- Compare `46` and `9`: Swap `[13, 24, 20, 9, 46, 50]`
- **Array after pass 2**: `[13, 24, 20, 9, 46, 50]`
**4. Pass 3**:
- **Array at the start of Pass 3**: `[13, 24, 20, 9, 46, 50]`
- Compare `13` and `24`: No swap `[13, 24, 20, 9, 46, 50]`
- Compare `24` and `20`: Swap `[13, 20, 24, 9, 46, 50]`
- Compare `24` and `9`: Swap `[13, 20, 9, 24, 46, 50]`
- **Array after pass 3**: `[13, 20, 9, 24, 46, 50]`
**5. Pass 4**:
- **Array at the start of Pass 4**: `[13, 20, 9, 24, 46, 50]`
- Compare `13` and `20`: No swap `[13, 20, 9, 24, 46, 50]`
- Compare `20` and `9`: Swap `[13, 9, 20, 24, 46, 50]`
- **Array after pass 4**: `[13, 9, 20, 24, 46, 50]`
**6. Pass 5**:
- **Array at the start of Pass 5**: `[13, 9, 20, 24, 46, 50]`
- Compare `13` and `9`: Swap `[9, 13, 20, 24, 46, 50]`
- **Array after pass 5**: `[9, 13, 20, 24, 46, 50]`
**7. Final Sorted Array**: `[9, 13, 20, 24, 46, 50]`
### Visualization

---
### Edge Cases
* **Already Sorted Array**: The optimized version will terminate early, resulting in O(n) time complexity.
* **Array with Identical Elements**: The algorithm will handle duplicates correctly.
* **Single Element Array**: No swaps needed, the array remains unchanged.
### Additional Notes
* **Inefficiency**: Due to its O(n²) time complexity, Bubble Sort is inefficient for large datasets compared to more advanced algorithms like Quick Sort or Merge Sort.
* **Stability**: Bubble Sort is stable, meaning it maintains the relative order of elements with equal keys.
* **Use Case**: Useful for small datasets or when the simplicity of implementation is more important than performance.
### Conclusion
Bubble Sort is a fundamental sorting algorithm that provides a clear introduction to the concept of sorting. Although not suitable for large datasets due to its quadratic time complexity, it is easy to understand and implement. The optimized version improves efficiency by terminating early if the array is already sorted. Its simplicity and in-place sorting capability are its main advantages.
--- | masum-dev |
1,875,742 | Output Laravel SQL Query log | You’ve likely encountered many query issues while developing software with Laravel. You might be... | 0 | 2024-06-03T18:19:33 | https://dev.to/bri4n0/output-laravel-sql-query-log-285b | You’ve likely encountered many query issues while developing software with Laravel. You might be wondering why your features are slow or how many queries your function is making to the database. You may not know if you’re experiencing N+1 problems or how to optimize your queries. This package is here to support you with those challenges.
**Install**
To install via Composer, run:
```
composer require bri4n0/sql-query-log
```
For version <= 11: Add to section providers of config/app.php:
```
// config/app.php
'providers' => [
...
Bri4n0\SqlQueryLog\DataBaseQueryServiceProvider::class,
];
```
For version >= 11: Add to section providers of bootstrap/providers.php:
```
// bootstrap/providers.php
return [
...
Bri4n0\SqlQueryLog\DataBaseQueryServiceProvider::class,
];
```
Set enable SQL query log, Add to .env:
```
ENABLE_SQL_LOG=true
```
**Others**
Custom logging channel:
open file config/logging.php add channel to section channels:
```
'channels' => [
...,
'sql-query-log' => [
'driver' => 'daily',
'path' => storage_path('logs/queries.log'),
'days' => env('LOG_DAILY_DAYS', 14),
'replace_placeholders' => true,
],
]
```
enable using sql query log channel:
```
SQL_LOG_CHANNEL=sql-query-log
```
Custom logging channel level:
```
SQL_LOG_LEVEL=debug
```
show more: https://github.com/bri4n0/sql-query-log | bri4n0 | |
1,875,741 | Key Factors to Consider for Effective Database Design (Constraints, Indexes) | Constraints: Using constraints in database design is essential to enforce data integrity,... | 0 | 2024-06-03T18:17:59 | https://dev.to/_akajuthi_/key-factors-to-consider-for-effective-database-design-constraints-30he | database, sql | ## Constraints:
Using constraints in database design is essential to enforce data integrity, ensure data consistency, and prevent invalid data entry. Here’s when and how to use various constraints effectively:
**1. PRIMARY KEY Constraint**
- **Purpose:** Uniquely identifies each record in a table.
- **When to Use:** Every table should have a primary key. Use it for columns or a combination of columns that uniquely identify a row.
```
CREATE TABLE employees (
employee_id INT PRIMARY KEY,
first_name VARCHAR(50),
last_name VARCHAR(50)
);
```
**2. FOREIGN KEY Constraint**
**Purpose:** Ensures referential integrity by linking columns in one table to the primary key or a unique key in another table.
**When to Use:** Use it to define relationships between tables (one-to-one, one-to-many, many-to-many).
```
CREATE TABLE departments (
department_id INT PRIMARY KEY,
department_name VARCHAR(50)
);
CREATE TABLE employees (
employee_id INT PRIMARY KEY,
first_name VARCHAR(50),
last_name VARCHAR(50),
department_id INT,
FOREIGN KEY (department_id) REFERENCES departments(department_id)
);
```
**3. NOT NULL Constraint**
**Purpose:** Ensures that a column cannot have NULL values.
**When to Use:** Use it for columns that must always have a value, such as primary key columns and essential attributes.
```
CREATE TABLE employees (
employee_id INT PRIMARY KEY,
first_name VARCHAR(50) NOT NULL,
last_name VARCHAR(50) NOT NULL
);
```
**4. CHECK Constraint**
**Purpose:** Ensures that all values in a column satisfy a specific condition.
**When to Use:** Use it to enforce domain integrity by restricting the values that can be inserted into a column.
```
CREATE TABLE employees (
employee_id INT PRIMARY KEY,
first_name VARCHAR(50) NOT NULL,
last_name VARCHAR(50) NOT NULL,
age INT CHECK (age >= 18 AND age <= 65)
);
```
**5. DEFAULT Constraint**
**Purpose:** Provides a default value for a column when no value is specified.
**When to Use:** Use it to ensure a column has a default value if none is provided upon insertion.
```
CREATE TABLE employees (
employee_id INT PRIMARY KEY,
first_name VARCHAR(50) NOT NULL,
last_name VARCHAR(50) NOT NULL,
hire_date DATE DEFAULT CURRENT_DATE
);
```
**6. Unique Constraint**
**Purpose:** Ensures the uniqueness of values in one or more columns. (Unique indexes may allow NULL values, but they enforce uniqueness for non-NULL values only.)
**When to Use:** Use it to enforce uniqueness in columns that are not primary keys.
```
CREATE TABLE employees (
employee_id INT PRIMARY KEY,
email VARCHAR(100) UNIQUE,
...
);
```
## Indexes:
Indexes are data structures in a database that improve the speed of data retrieval operations on database tables. They work by providing a quick lookup mechanism for accessing data based on the values stored in specific columns or combinations of columns. Here's a comprehensive overview of indexes in databases:
1. **Purpose of Indexes**
- Indexes speed up data retrieval operations, such as SELECT, JOIN, WHERE, and ORDER BY clauses.
- They provide a quick way to locate rows in a table without having to scan the entire table.
2. **Types of Indexes**
In SQL databases, indexes are used to speed up the retrieval of data from tables. Different types of indexes serve different purposes and are optimized for various query patterns. Here are the main types of indexes you can use:
**Clustered Index**
- **Description:** The data rows are stored in the order of the clustered index key. Each table can have only one clustered index because the data rows themselves can only be sorted in one order.
- **Use Case:** Primary keys are typically implemented as clustered indexes by default.
- **Example:**
```sql
CREATE TABLE employees (
employee_id INT PRIMARY KEY,
first_name VARCHAR(50),
last_name VARCHAR(50)
);
```
- **Effect:** The `PRIMARY KEY` constraint creates a clustered index on `employee_id`.
**Non-Clustered Index**
- **Description:** Contains a copy of part of the data from the table in the index structure and a pointer to the actual data row. Multiple non-clustered indexes can exist on a table.
- **Use Case:** Optimizing search queries on non-key columns.
- **Example:**
```sql
CREATE INDEX idx_last_name ON employees(last_name);
```
**Unique Index**
- **Description:** Ensures that all values in the indexed column or columns are unique.
- **Use Case:** Enforcing uniqueness on columns other than the primary key.
- **Example:**
```sql
CREATE UNIQUE INDEX idx_email_unique ON employees(email);
```
**Full-Text Index**
- **Description:** Used for full-text searches on large text-based columns. It enables efficient searching of words and phrases within text columns.
- **Use Case:** Implementing full-text search capabilities.
- **Example:**
```sql
CREATE FULLTEXT INDEX idx_fulltext_description ON products(description);
```
**Composite Index**
- **Description:** An index on multiple columns. Useful for queries that filter based on multiple columns.
- **Use Case:** Optimizing multi-column searches.
- **Example:**
```sql
CREATE INDEX idx_first_last_name ON employees(first_name, last_name);
```
**Bitmap Index**
- **Description:** Uses bitmaps and is efficient for columns with a low cardinality (few unique values).
- **Use Case:** Data warehousing scenarios where queries involve columns with low cardinality.
- **Example:** (Syntax may vary depending on the DBMS, e.g., Oracle supports bitmap indexes)
```sql
CREATE BITMAP INDEX idx_gender ON employees(gender);
```
**Function-Based Index**
- **Description:** Indexes the result of a function or expression applied to a column.
- **Use Case:** Optimizing queries involving functions or expressions.
- **Example:**
```sql
CREATE INDEX idx_upper_last_name ON employees(UPPER(last_name));
```
**Filtered/Partial Index**
- **Description:** An index that includes only a subset of the rows in the table, defined by a filter condition.
- **Use Case:** Optimizing queries that frequently filter on a specific condition.
- **Example:** (Available in SQL Server and PostgreSQL)
```sql
CREATE INDEX idx_active_employees ON employees(status)
WHERE status = 'active';
```
**Spatial Index**
- **Description:** Optimized for spatial data types, such as geometry and geography.
- **Use Case:** Geospatial queries, e.g., finding points within a certain radius.
- **Example:** (Syntax varies by DBMS, example in MySQL)
```sql
CREATE SPATIAL INDEX idx_location ON locations(geo);
```
**XML Index**
- **Description:** Specifically for indexing XML data types.
- **Use Case:** Optimizing queries on XML columns.
- **Example:** (SQL Server example)
```sql
CREATE PRIMARY XML INDEX idx_xml_data ON documents(xml_column);
```
3. **Creating and Managing Indexes**
- Indexes can be created using SQL statements, typically with the `CREATE INDEX` command.
- Indexes should be carefully chosen based on the types of queries executed against the table and the data distribution.
- Indexes require storage space and impact data modification operations (such as INSERT, UPDATE, DELETE), as the index structures must be maintained alongside the data.
- Regular maintenance, such as index rebuilds and defragmentation, may be necessary to ensure optimal performance.
4. **Choosing Indexes**
- Consider creating indexes on columns frequently used in WHERE, JOIN, and ORDER BY clauses.
- Balance the benefits of indexing with the overhead of index maintenance and storage requirements.
- Monitor query performance and adjust indexes as needed based on query execution plans and performance metrics.
Indexes play a crucial role in database performance optimization, but their design and usage should be carefully planned to achieve the desired performance improvements while minimizing overhead and ensuring data consistency.
**Reference for index:**
[https://vertabelo.com/blog/database-index-types/] | _akajuthi_ |
1,875,740 | New Moon This Week! Astrologer Reveals Who Jupiter is Protecting and Who Will Have the Most Luck in Love | Detailed Astrological Forecast for the Week of June 3 to June 9, 2024 The new moon this week marks... | 0 | 2024-06-03T18:16:38 | https://dev.to/press_horoscope/new-moon-this-week-astrologer-reveals-who-jupiter-is-protecting-and-who-will-have-the-most-luck-in-love-1p8b | horoscope, astrology, astro, zodiac | Detailed [Astrological Forecast](https://presshoroskop.com/new-moon-this-week-astrologer-reveals-who-jupiter-is-protecting-and-who-will-have-the-most-luck-in-love/) for the Week of June 3 to June 9, 2024
The new moon this week marks the beginning of a new cycle, a time to plant seeds for our goals and desires. Astrologers predict that this phase is excellent for initiating new projects and embracing fresh starts. As we navigate the influence of the new moon from June 3 to June 9, let’s explore how each zodiac sign will be affected.
Aries
Aries individuals should pay attention to their digestive health this week. Single Aries may attract attention through work, although the person they are interested in might not notice them. Those in relationships might consider marriage or strengthening their bond and could also be thinking about starting a family. A vacation might be on the horizon. The new moon brings favorable conditions for professional growth.
Taurus
Taurus should be mindful of skin issues, allergies, and immune system health. Singles are ready to make a significant decision regarding a romantic interest. The beginning of the week may bring workplace stress, but relief is expected from Thursday onward.
Gemini
Gemini enjoys Jupiter’s protection for the next 12 months. In matters of the heart, significant encounters are likely mid-week. Couples may be planning for marriage, cohabitation, or family expansion. Professionally, new projects or promotions could be on the horizon.
Cancer
Cancer natives may face chronic health issues. Single Cancers might reconnect with someone from their past. For those in relationships, old fears may resurface. This week is excellent for making significant professional strides.
Leo
Leos might struggle with mental stress and anxiety. Singles could see an old flame reappearing, and by the end of the week, a new romantic interest might emerge. Those in relationships may experience minor conflicts due to a lack of time spent together. This week is particularly beneficial for Leos working in governmental or large organizational settings.
Virgo
Virgos could face back problems. Single Virgos might be drawn to challenging romantic interests. While this week may not be ideal for starting a new relationship, flirting is on the cards. For couples, relationship dynamics improve. The new moon from Wednesday brings positive changes in the workplace, including potential additional income despite demanding bosses, with support from colleagues.
Libra
Libras might experience a drop in immunity this week. Singles may seek out complicated romantic situations that stimulate them. For those in relationships, communication with partners improves. Financially, unexpected income might come their way, and there is a strong desire for a job change.
Scorpio
Scorpios should watch for neck and spine issues. Single Scorpios are in for passionate moments, while those in relationships can enjoy relaxation with their partners amidst busy schedules. Important business deals and international contacts are highlighted.
Sagittarius
Single Sagittarians should avoid returning to former partners, although flirting opportunities abound. Those in relationships may be more focused on elderly family members than their partners. This week brings rapid and efficient progress in work, along with significant business partnerships.
Capricorn
Capricorns should take care of chronic health conditions. Single Capricorns might meet someone interesting through work. Those in relationships are busy but will find relaxation around the weekend. Prioritizing tasks is essential for them this week.
Aquarius
Single Aquarians might hear from an ex. Those in relationships are planning trips and find it hard to stay in one place. Financially, they may feel uncertain, and the stars advise against making investments just yet.
Pisces
Pisces are dealing with chronic health issues. Single Pisces may meet someone through work or online. Those in relationships look forward to travel or new challenges. Financial worries might cause some anxiety, and relying on someone for support is recommended.
Conclusion
The new moon this week offers a unique opportunity for all zodiac signs to start anew, set fresh intentions, and work towards their goals. Whether it’s health, love, or career, each sign has specific influences and advice to follow. | press_horoscope |
1,875,739 | How to Install MongoDB with OpenSSL 3 Support on Fedora 39 | If you're still having troubles running MongoDB + OpenSSL3 on Fedora, learn how to install it... | 0 | 2024-06-03T18:14:52 | https://dev.to/matheus4lves/how-to-install-mongodb-with-openssl-3-support-on-fedora-39-4nii | mongodb, fedora, linux | If you're still having troubles running MongoDB + OpenSSL3 on Fedora, learn how to install it properly by checking my first article as a freeCodeCamp Publication Contributor: [How to Install MongoDB with OpenSSL 3 Support on Fedora 39](https://www.freecodecamp.org/news/how-to-install-mongodb-with-openssl-3-support-on-fedora-39/) | matheus4lves |
1,875,738 | Using Classes from the Java Library | The Java API contains a rich set of classes for developing Java programs. This section gives some... | 0 | 2024-06-03T18:14:05 | https://dev.to/paulike/using-classes-from-the-java-library-2jna | java, programming, learning, beginners | The Java API contains a rich set of classes for developing Java programs. This section gives some examples of the classes in the Java library.
## The Date Class
Java provides a system-independent encapsulation of date and time in the **java.util.Date** class, as shown in Figure below.

You can use the no-arg constructor in the **Date** class to create an instance for the current date and time, the **getTime()** method to return the elapsed time since January 1, 1970, GMT, and the **toString()** method to return the date and time as a string. For example, the following code
`java.util.Date date = new java.util.Date();
System.out.println("The elapsed time since Jan 1, 1970 is " +
date.getTime() + " milliseconds");
System.out.println(date.toString());`
displays the output like this:
`The elapsed time since Jan 1, 1970 is 1324903419651 milliseconds
Mon Dec 26 07:43:39 EST 2011`
The **Date** class has another constructor, **Date(long elapseTime)**, which can be used to construct a **Date** object for a given time in milliseconds elapsed since January 1, 1970, GMT.
## The Random Class
Another way to generate random numbers is to use the **java.util.Random**
class, as shown in Figure below, which can generate a random **int**, **long**, **double**, **float**, and **boolean** value.

When you create a **Random** object, you have to specify a seed or use the default seed. A seed is a number used to initialize a random number generator. The no-arg constructor creates a **Random** object using the current elapsed time as its seed. If two **Random** objects have the same seed, they will generate identical sequences of numbers. For example, the following code creates two **Random** objects with the same seed, **3**.
`Random random1 = new Random(3);
System.out.print("From random1: ");
for (int i = 0; i < 10; i++)
System.out.print(random1.nextInt(1000) + " ");`
`Random random2 = new Random(3);
System.out.print("\nFrom random2: ");
for (int i = 0; i < 10; i++)
System.out.print(random2.nextInt(1000) + " ");`
The code generates the same sequence of random **int** values:
`From random1: 734 660 210 581 128 202 549 564 459 961
From random2: 734 660 210 581 128 202 549 564 459 961`
The ability to generate the same sequence of random values is useful in software testing and many other applications. In software testing, often you need to reproduce the test cases from a fixed sequence of random numbers.
## The Point2D Class
Java API has a conveninent **Point2D** class in the **javafx.geometry** package for representing a point in a two-dimensional plane. The UML diagram for the class is shown in Figure below.

You can create a **Point2D** object for a point with the specified _x_- and _y_-coordinates, use the **distance** method to compute the distance from this point to another point, and use the **toString()** method to return a string representation of the point. Below program gives an example of using this class.
```
package demo;
import java.util.Scanner;
import javafx.geometry.Point2D;
public class TestPoint2D {
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
System.out.print("Enter point1's x-, y-coordinates: ");
double x1 = input.nextDouble();
double y1 = input.nextDouble();
System.out.print("Enter point2's x-, y-coordinates: ");
double x2 = input.nextDouble();
double y2 = input.nextDouble();
Point2D p1 = new Point2D(x1, y1);
Point2D p2 = new Point2D(x2, y2);
System.out.println("p1 is " + p1.toString());
System.out.println("p2 is " + p2.toString());
System.out.println("The distance between p1 and p2 is " + p1.distance(p2));
}
}
```
`Enter point1's x-, y-coordinates: 1.5 5.5
Enter point2's x-, y-coordinates: -5.3 -4.4
p1 is Point2D [x = 1.5, y = 5.5]
p2 is Point2D [x = -5.3, y = -4.4]
The distance between p1 and p2 is 12.010412149464313`
This program creates two objects of the **Point2D** class (lines 17–18). The **toString()** method returns a string that describes the object (lines 19–20). Invoking **p1.distance(p2)** returns the distance between the two points (line 21). | paulike |
1,875,736 | Keyed Services in .net 8 | In complex applications, it's common to have multiple implementations of the same interface. However,... | 27,293 | 2024-06-03T18:11:28 | https://dev.to/moh_moh701/using-keyed-services-in-aspnet-core-8-3pbb | dotnetcore, aspdotnet, api |
In complex applications, it's common to have multiple implementations of the same interface. However, this can lead to ambiguity and bugs when resolving these dependencies using the built-in dependency injection (DI) container in ASP.NET Core. ASP.NET Core 8 introduces the concept of keyed services to solve this problem, allowing you to register services with a unique key. This article will explain how to use this new feature effectively.
### The Problem with Multiple Implementations
When you have multiple implementations of the same interface and register them without any distinguishing mechanism, the DI container will resolve the last registered service by default. This can cause unexpected behavior.
#### Example:
```csharp
builder.Services.AddSingleton<INotificationService, MailNotificationService>();
builder.Services.AddSingleton<INotificationService, PhoneNotificationService>();
builder.Services.AddSingleton<INotificationService, PushNotificationService>();
```
In the example above, when `INotificationService` is resolved, it will always return the `PushNotificationService` because it was the last one registered.
### Introducing Keyed Services
ASP.NET Core 8 introduces keyed services, allowing you to register services with a key. This key is typically a string but can be any type. This feature lets you specify which implementation to use when resolving the dependency.
#### Registering Keyed Services:
To register services with a key, use the `AddKeyedSingleton` method (or `AddKeyedScoped` / `AddKeyedTransient` based on the desired lifetime).
```csharp
builder.Services.AddKeyedSingleton<INotificationService, MailNotificationService>("mail");
builder.Services.AddKeyedSingleton<INotificationService, PhoneNotificationService>("phone");
builder.Services.AddKeyedSingleton<INotificationService, PushNotificationService>("push");
```
### Resolving Keyed Services
To resolve a keyed service, you use the `IKeyedServiceProvider` interface. This interface provides methods to get the service instance based on the key.
#### Example:
```csharp
public class ShoppingCartService : IShoppingCartService
{
private readonly IKeyedServiceProvider _serviceProvider;
public ShoppingCartService(IKeyedServiceProvider serviceProvider)
{
_serviceProvider = serviceProvider;
}
public void ClearCart(string notificationType)
{
var notificationService = _serviceProvider.GetRequiredKeyedService<INotificationService>(notificationType);
notificationService.SendNotification("Cart cleared");
}
}
```
In this example, the `ShoppingCartService` class can use different notification services based on the provided key (`"mail"`, `"phone"`, or `"push"`). This is a powerful way to handle multiple implementations and provides flexibility in selecting the appropriate service at runtime.
### Benefits of Keyed Services
- **Clarity and Control**: By explicitly specifying which implementation to use, you avoid ambiguity and make the code more understandable.
- **Flexibility**: Keyed services allow you to switch between different implementations based on context or configuration easily.
- **Maintainability**: Adding or removing implementations becomes simpler and less risky, as it does not affect other parts of the application.
### Full Example
Below is a full example demonstrating the registration and resolution of keyed services in ASP.NET Core 8:
#### Program.cs:
```csharp
var builder = WebApplication.CreateBuilder(args);
// Registering keyed services
builder.Services.AddKeyedSingleton<INotificationService, MailNotificationService>("mail");
builder.Services.AddKeyedSingleton<INotificationService, PhoneNotificationService>("phone");
builder.Services.AddKeyedSingleton<INotificationService, PushNotificationService>("push");
var app = builder.Build();
app.Run();
```
#### Notification Services:
```csharp
public interface INotificationService
{
void SendNotification(string message);
}
public class MailNotificationService : INotificationService
{
public void SendNotification(string message)
{
// Logic for sending mail notification
}
}
public class PhoneNotificationService : INotificationService
{
public void SendNotification(string message)
{
// Logic for sending phone notification
}
}
public class PushNotificationService : INotificationService
{
public void SendNotification(string message)
{
// Logic for sending push notification
}
}
```
#### ShoppingCartService:
```csharp
public interface IShoppingCartService
{
void ClearCart(string notificationType);
}
public class ShoppingCartService : IShoppingCartService
{
private readonly INotificationService _notificationService;
public ShoppingCartService([FromKeyedServices("mail")] INotificationService notificationService)
{
_notificationService = notificationService;
}
public void ClearCart()
{
_notificationService.SendNotification("Cart cleared");
}
}
```
### Conclusion
Keyed services in ASP.NET Core 8 provide a robust way to manage multiple implementations of the same interface, offering clarity, control, and flexibility. By using this feature, you can avoid the common pitfalls of dependency resolution in complex applications and ensure your services are resolved accurately and efficiently.
### Source
For more detailed information and to stay updated with the latest features in .NET 8, you can refer to the What's New in .NET 8 course on Pluralsight.
https://app.pluralsight.com/library/courses/dot-net-8-whats-new/table-of-contents | moh_moh701 |
1,875,733 | testing python code | def test_user_names(first, last): """" a function that prompts for user names """ full_name =... | 0 | 2024-06-03T18:09:24 | https://dev.to/mw_nz_3025915caf4a61ed7/testing-python-code-40ib | programming, beginners, python, learning | def test_user_names(first, last):
"""" a function that prompts for user names """
full_name = first + " " + last
return full_name.title()
guys above is my basic python code which is supposed to prompt for user input, first and last names.
note*.. i have written my file name containing the function above with a test_names.py, i have also done the same for the code below
below is the (unittest) code i am using to test if my code behaves correctly.
""" a class to test my test_names.py code"""
import unittest
from test_file_names import user_names
class test_nomencreture(unittest.TestCase):
def test_namesakes(self):
adder = user_names('john','pedro')
self.assertEquals(adder, 'john pedro')
unittest.main()
....but for some reason am getting an error ,the test is failing ,the test is not running ,
----------------------------------------------------------------------
Ran 0 tests in 0.000s
NO TESTS RAN
Process finished with exit code 5
Empty suite
(i am a beginner forgive me if the error is too basic . i do not know what the empty suite means,your help will be much appreciated
| mw_nz_3025915caf4a61ed7 |
1,875,731 | Buy Verified Paxful Account | https://dmhelpshop.com/product/buy-verified-paxful-account/ Buy Verified Paxful Account There are... | 0 | 2024-06-03T18:05:23 | https://dev.to/yyrwasti22/buy-verified-paxful-account-4bdf | react, python, ai, devops | ERROR: type should be string, got "https://dmhelpshop.com/product/buy-verified-paxful-account/\n\n\n\n\nBuy Verified Paxful Account\nThere are several compelling reasons to consider purchasing a verified Paxful account. Firstly, a verified account offers enhanced security, providing peace of mind to all users. Additionally, it opens up a wider range of trading opportunities, allowing individuals to partake in various transactions, ultimately expanding their financial horizons.\n\nMoreover, Buy verified Paxful account ensures faster and more streamlined transactions, minimizing any potential delays or inconveniences. Furthermore, by opting for a verified account, users gain access to a trusted and reputable platform, fostering a sense of reliability and confidence.\n\nLastly, Paxful’s verification process is thorough and meticulous, ensuring that only genuine individuals are granted verified status, thereby creating a safer trading environment for all users. Overall, the decision to Buy Verified Paxful account can greatly enhance one’s overall trading experience, offering increased security, access to more opportunities, and a reliable platform to engage with. Buy Verified Paxful Account.\n\nBuy US verified paxful account from the best place dmhelpshop\nWhy we declared this website as the best place to buy US verified paxful account? Because, our company is established for providing the all account services in the USA (our main target) and even in the whole world. With this in mind we create paxful account and customize our accounts as professional with the real documents. Buy Verified Paxful Account.\n\nIf you want to buy US verified paxful account you should have to contact fast with us. Because our accounts are-\n\nEmail verified\nPhone number verified\nSelfie and KYC verified\nSSN (social security no.) verified\nTax ID and passport verified\nSometimes driving license verified\nMasterCard attached and verified\nUsed only genuine and real documents\n100% access of the account\nAll documents provided for customer security\nWhat is Verified Paxful Account?\nIn today’s expanding landscape of online transactions, ensuring security and reliability has become paramount. Given this context, Paxful has quickly risen as a prominent peer-to-peer Bitcoin marketplace, catering to individuals and businesses seeking trusted platforms for cryptocurrency trading.\n\nIn light of the prevalent digital scams and frauds, it is only natural for people to exercise caution when partaking in online transactions. As a result, the concept of a verified account has gained immense significance, serving as a critical feature for numerous online platforms. Paxful recognizes this need and provides a safe haven for users, streamlining their cryptocurrency buying and selling experience.\n\nFor individuals and businesses alike, Buy verified Paxful account emerges as an appealing choice, offering a secure and reliable environment in the ever-expanding world of digital transactions. Buy Verified Paxful Account.\n\nVerified Paxful Accounts are essential for establishing credibility and trust among users who want to transact securely on the platform. They serve as evidence that a user is a reliable seller or buyer, verifying their legitimacy.\n\nBut what constitutes a verified account, and how can one obtain this status on Paxful? In this exploration of verified Paxful accounts, we will unravel the significance they hold, why they are crucial, and shed light on the process behind their activation, providing a comprehensive understanding of how they function. Buy verified Paxful account.\n\n \n\nWhy should to Buy Verified Paxful Account?\nThere are several compelling reasons to consider purchasing a verified Paxful account. Firstly, a verified account offers enhanced security, providing peace of mind to all users. Additionally, it opens up a wider range of trading opportunities, allowing individuals to partake in various transactions, ultimately expanding their financial horizons.\n\nMoreover, a verified Paxful account ensures faster and more streamlined transactions, minimizing any potential delays or inconveniences. Furthermore, by opting for a verified account, users gain access to a trusted and reputable platform, fostering a sense of reliability and confidence. Buy Verified Paxful Account.\n\nLastly, Paxful’s verification process is thorough and meticulous, ensuring that only genuine individuals are granted verified status, thereby creating a safer trading environment for all users. Overall, the decision to buy a verified Paxful account can greatly enhance one’s overall trading experience, offering increased security, access to more opportunities, and a reliable platform to engage with.\n\n \n\nWhat is a Paxful Account\nPaxful and various other platforms consistently release updates that not only address security vulnerabilities but also enhance usability by introducing new features. Buy Verified Paxful Account.\n\nIn line with this, our old accounts have recently undergone upgrades, ensuring that if you purchase an old buy Verified Paxful account from dmhelpshop.com, you will gain access to an account with an impressive history and advanced features. This ensures a seamless and enhanced experience for all users, making it a worthwhile option for everyone.\n\n \n\nIs it safe to buy Paxful Verified Accounts?\nBuying on Paxful is a secure choice for everyone. However, the level of trust amplifies when purchasing from Paxful verified accounts. These accounts belong to sellers who have undergone rigorous scrutiny by Paxful. Buy verified Paxful account, you are automatically designated as a verified account. Hence, purchasing from a Paxful verified account ensures a high level of credibility and utmost reliability. Buy Verified Paxful Account.\n\nPAXFUL, a widely known peer-to-peer cryptocurrency trading platform, has gained significant popularity as a go-to website for purchasing Bitcoin and other cryptocurrencies. It is important to note, however, that while Paxful may not be the most secure option available, its reputation is considerably less problematic compared to many other marketplaces. Buy Verified Paxful Account.\n\nThis brings us to the question: is it safe to purchase Paxful Verified Accounts? Top Paxful reviews offer mixed opinions, suggesting that caution should be exercised. Therefore, users are advised to conduct thorough research and consider all aspects before proceeding with any transactions on Paxful.\n\n \n\nHow Do I Get 100% Real Verified Paxful Accoun?\nPaxful, a renowned peer-to-peer cryptocurrency marketplace, offers users the opportunity to conveniently buy and sell a wide range of cryptocurrencies. Given its growing popularity, both individuals and businesses are seeking to establish verified accounts on this platform.\n\nHowever, the process of creating a verified Paxful account can be intimidating, particularly considering the escalating prevalence of online scams and fraudulent practices. This verification procedure necessitates users to furnish personal information and vital documents, posing potential risks if not conducted meticulously.\n\nIn this comprehensive guide, we will delve into the necessary steps to create a legitimate and verified Paxful account. Our discussion will revolve around the verification process and provide valuable tips to safely navigate through it.\n\nMoreover, we will emphasize the utmost importance of maintaining the security of personal information when creating a verified account. Furthermore, we will shed light on common pitfalls to steer clear of, such as using counterfeit documents or attempting to bypass the verification process.\n\nWhether you are new to Paxful or an experienced user, this engaging paragraph aims to equip everyone with the knowledge they need to establish a secure and authentic presence on the platform.\n\nBenefits Of Verified Paxful Accounts\nVerified Paxful accounts offer numerous advantages compared to regular Paxful accounts. One notable advantage is that verified accounts contribute to building trust within the community.\n\nVerification, although a rigorous process, is essential for peer-to-peer transactions. This is why all Paxful accounts undergo verification after registration. When customers within the community possess confidence and trust, they can conveniently and securely exchange cash for Bitcoin or Ethereum instantly. Buy Verified Paxful Account.\n\nPaxful accounts, trusted and verified by sellers globally, serve as a testament to their unwavering commitment towards their business or passion, ensuring exceptional customer service at all times. Headquartered in Africa, Paxful holds the distinction of being the world’s pioneering peer-to-peer bitcoin marketplace. Spearheaded by its founder, Ray Youssef, Paxful continues to lead the way in revolutionizing the digital exchange landscape.\n\nPaxful has emerged as a favored platform for digital currency trading, catering to a diverse audience. One of Paxful’s key features is its direct peer-to-peer trading system, eliminating the need for intermediaries or cryptocurrency exchanges. By leveraging Paxful’s escrow system, users can trade securely and confidently.\n\nWhat sets Paxful apart is its commitment to identity verification, ensuring a trustworthy environment for buyers and sellers alike. With these user-centric qualities, Paxful has successfully established itself as a leading platform for hassle-free digital currency transactions, appealing to a wide range of individuals seeking a reliable and convenient trading experience. Buy Verified Paxful Account.\n\n \n\nHow paxful ensure risk-free transaction and trading?\nEngage in safe online financial activities by prioritizing verified accounts to reduce the risk of fraud. Platforms like Paxfu implement stringent identity and address verification measures to protect users from scammers and ensure credibility.\n\nWith verified accounts, users can trade with confidence, knowing they are interacting with legitimate individuals or entities. By fostering trust through verified accounts, Paxful strengthens the integrity of its ecosystem, making it a secure space for financial transactions for all users. Buy Verified Paxful Account.\n\nExperience seamless transactions by obtaining a verified Paxful account. Verification signals a user’s dedication to the platform’s guidelines, leading to the prestigious badge of trust. This trust not only expedites trades but also reduces transaction scrutiny. Additionally, verified users unlock exclusive features enhancing efficiency on Paxful. Elevate your trading experience with Verified Paxful Accounts today.\n\nIn the ever-changing realm of online trading and transactions, selecting a platform with minimal fees is paramount for optimizing returns. This choice not only enhances your financial capabilities but also facilitates more frequent trading while safeguarding gains. Buy Verified Paxful Account.\n\nExamining the details of fee configurations reveals Paxful as a frontrunner in cost-effectiveness. Acquire a verified level-3 USA Paxful account from usasmmonline.com for a secure transaction experience. Invest in verified Paxful accounts to take advantage of a leading platform in the online trading landscape.\n\n \n\nHow Old Paxful ensures a lot of Advantages?\n\nExplore the boundless opportunities that Verified Paxful accounts present for businesses looking to venture into the digital currency realm, as companies globally witness heightened profits and expansion. These success stories underline the myriad advantages of Paxful’s user-friendly interface, minimal fees, and robust trading tools, demonstrating its relevance across various sectors.\n\nBusinesses benefit from efficient transaction processing and cost-effective solutions, making Paxful a significant player in facilitating financial operations. Acquire a USA Paxful account effortlessly at a competitive rate from usasmmonline.com and unlock access to a world of possibilities. Buy Verified Paxful Account.\n\nExperience elevated convenience and accessibility through Paxful, where stories of transformation abound. Whether you are an individual seeking seamless transactions or a business eager to tap into a global market, buying old Paxful accounts unveils opportunities for growth.\n\nPaxful’s verified accounts not only offer reliability within the trading community but also serve as a testament to the platform’s ability to empower economic activities worldwide. Join the journey towards expansive possibilities and enhanced financial empowerment with Paxful today. Buy Verified Paxful Account.\n\n \n\nWhy paxful keep the security measures at the top priority?\nIn today’s digital landscape, security stands as a paramount concern for all individuals engaging in online activities, particularly within marketplaces such as Paxful. It is essential for account holders to remain informed about the comprehensive security protocols that are in place to safeguard their information.\n\nSafeguarding your Paxful account is imperative to guaranteeing the safety and security of your transactions. Two essential security components, Two-Factor Authentication and Routine Security Audits, serve as the pillars fortifying this shield of protection, ensuring a secure and trustworthy user experience for all. Buy Verified Paxful Account.\n\nConclusion\nInvesting in Bitcoin offers various avenues, and among those, utilizing a Paxful account has emerged as a favored option. Paxful, an esteemed online marketplace, enables users to engage in buying and selling Bitcoin. Buy Verified Paxful Account.\n\nThe initial step involves creating an account on Paxful and completing the verification process to ensure identity authentication. Subsequently, users gain access to a diverse range of offers from fellow users on the platform. Once a suitable proposal captures your interest, you can proceed to initiate a trade with the respective user, opening the doors to a seamless Bitcoin investing experience.\n\nIn conclusion, when considering the option of purchasing verified Paxful accounts, exercising caution and conducting thorough due diligence is of utmost importance. It is highly recommended to seek reputable sources and diligently research the seller’s history and reviews before making any transactions.\n\nMoreover, it is crucial to familiarize oneself with the terms and conditions outlined by Paxful regarding account verification, bearing in mind the potential consequences of violating those terms. By adhering to these guidelines, individuals can ensure a secure and reliable experience when engaging in such transactions. Buy Verified Paxful Account.\n\n \n\nContact Us / 24 Hours Reply\nTelegram:dmhelpshop\nWhatsApp: +1 (980) 277-2786\nSkype:dmhelpshop\nEmail:dmhelpshop@gmail.com" | yyrwasti22 |
1,875,676 | Combining Inheritance and Polymorphism in Real-World Applications | Introduction Welcome to the final part of our series, "Mastering OOP Concepts: Inheritance... | 27,582 | 2024-06-03T18:02:11 | https://dev.to/techtobe101/combining-inheritance-and-polymorphism-in-real-world-applications-384 | oop, programming, techtobe101, beginners | ### Introduction
Welcome to the final part of our series, "Mastering OOP Concepts: Inheritance and Polymorphism." Today, we’ll look at how inheritance and polymorphism work together in real-world applications.
### Combining Inheritance and Polymorphism
In complex systems, inheritance and polymorphism are often used together to create scalable and maintainable code.
### Case Study: Enhanced Zoo Management System
Let’s extend our Zoo Management System to manage various activities like feeding, sleeping, and making sounds for different animals.
#### Step-by-Step Implementation
1 . **Base Class and Derived Classes**:
- As previously defined, with the addition of an activity method.
```python
class Animal:
def __init__(self, name, age):
# Initialize the common properties
self.name = name
self.age = age
def eat(self):
# Common eat method
print(f"{self.name} is eating.")
def sleep(self):
# Common sleep method
print(f"{self.name} is sleeping.")
def make_sound(self):
# Placeholder method to be overridden
pass
def perform_activity(self):
# Method to perform all common activities
self.eat()
self.sleep()
self.make_sound()
```
2 . **Using the Combined Approach**:
- Manage activities for different animals using polymorphism.
```python
class Lion(Animal):
def make_sound(self):
# Specific sound for Lion
print(f"{self.name} roars.")
class Elephant(Animal):
def make_sound(self):
# Specific sound for Elephant
print(f"{self.name} trumpets.")
```
3 . **Using the Combined Approach**:
- Manage activities for different animals using polymorphism.
```python
animals = [Lion("Simba", 5), Elephant("Dumbo", 10)]
for animal in animals:
animal.perform_activity() # Each animal performs its unique activities
```
### Insights and Practical Application
Combining inheritance and polymorphism allows you to create a well-structured and efficient system. It ensures that common functionality is reused while allowing specific behaviors to be defined as needed.
#### Tips for Implementation
- **Plan Your Class Hierarchy:** Design a clear hierarchy where inheritance makes sense, ensuring subclasses extend and specialize rather than replicate.
- **Test Extensively:** Verify that polymorphic behavior functions correctly across different objects and scenarios in your application.
### Takeaways
- **Efficiency**: Reduces code duplication and promotes reuse.
- **Clarity**: Enhances code clarity by separating common and specific functionalities.
- **Extensibility**: Makes the system easier to extend with new features or classes.
### Goal
By the end of this series, you should be able to combine inheritance and polymorphism to build efficient and maintainable applications.
---
I hope this was a worthwhile read for you! If you have any questions, feel free to ask in the comments below. Super cool that I get to be a part of your journey, come one, let's grow together!
If you want to see more content like this, I invite you to follow. I post content like this every week to help you along on your coding journey.
> TechTobe101 -I'm with you 🤝
| techtobe101 |
1,875,675 | Diving Deeper into Polymorphism | Introduction Welcome to the second part of our series, "Mastering OOP Concepts:... | 27,582 | 2024-06-03T18:01:53 | https://dev.to/techtobe101/diving-deeper-into-polymorphism-3i0i | oop, programming, techtobe101, beginners | ### Introduction
Welcome to the second part of our series, "Mastering OOP Concepts: Inheritance and Polymorphism." Today, we’ll explore polymorphism, which allows methods to do different things based on the object they are called on.
### What is Polymorphism?
Polymorphism means "many forms." In OOP, it allows you to use a single interface to interact with different types of objects. The term "many forms" captures the essence that different objects can respond to the same message or method call in different ways, depending on their specific implementation. It promotes code reusability, enhances flexibility, and improves maintainability by reducing the need for conditional statements.
### Case Study: Zoo Management System (Continued)
Continuing from our previous article, let’s enhance our Zoo Management System to include polymorphism. Our goal is to create a method `make_sound()` that behaves differently for each animal.
#### Step-by-Step Implementation
1. **Extend the Base Class (`Animal`)**:
- Define a method `make_sound()` to be overridden by derived classes.
```python
class Animal:
def __init__(self, name, age):
# Initialize the common properties
self.name = name
self.age = age
def eat(self):
# Common eat method
print(f"{self.name} is eating.")
def sleep(self):
# Common sleep method
print(f"{self.name} is sleeping.")
def make_sound(self):
# Placeholder method to be overridden
pass
```
2 . **Override in Derived Classes (`Lion` and `Elephant`)**:
- Provide specific implementations of `make_sound()`.
```python
class Lion(Animal):
def make_sound(self):
# Specific sound for Lion
print(f"{self.name} roars.")
class Elephant(Animal):
def make_sound(self):
# Specific sound for Elephant
print(f"{self.name} trumpets.")
```
3 . **Using Polymorphism**:
- Create a list of `Animal` objects and call `make_sound()` on each.
```python
animals = [Lion("Simba", 5), Elephant("Dumbo", 10)]
for animal in animals:
animal.make_sound() # Each animal makes its unique sound
```
### Insights and Practical Application
Polymorphism allows us to write more generic and flexible code. It’s particularly useful when dealing with collections of objects that share a common interface but exhibit different behaviors.
#### Tips for Implementation
- **Interface Design:** Define clear method names and signatures that encourage polymorphic behavior.
- **Override with Care:** Ensure overridden methods respect the intended behavior of the superclass while adding specific functionality.
- **Dynamic Execution:** Leverage polymorphism to handle diverse object types in a unified manner, improving code extensibility and adaptability.
### Takeaways
- **Flexibility**: Polymorphism enables flexible and extensible code.
- **Simplicity**: It simplifies code by using a single interface for multiple implementations.
- **Maintainability**: Code is easier to maintain and extend.
### Goal
By the end of this article, you should understand how to implement polymorphism to make your code more flexible and maintainable.
---
Thanks for joining us today.
Join us, tomorrow, in the next and final article where we discuss how to implement inheritance and polymorphism into your projects. Hope to see you there! | techtobe101 |
1,875,674 | Introduction to Inheritance in Object-Oriented Programming | Introduction Welcome to the first part of our series, "Mastering OOP Concepts: Inheritance... | 27,582 | 2024-06-03T18:00:04 | https://dev.to/techtobe101/introduction-to-inheritance-in-object-oriented-programming-1cg2 | oop, programming, techtobe101, beginners | ### Introduction
Welcome to the first part of our series, "Mastering OOP Concepts: Inheritance and Polymorphism." Today, we’re focusing on inheritance, a key concept in object-oriented programming (OOP) that allows for code reusability and logical organization of classes.
### What is Inheritance?
Inheritance allows one class to inherit the properties and methods of another class. This helps in creating a hierarchy and promotes code reuse. Essentially, this means the child/derived class can reuse the code of the parent/base class, making development faster and more organized.
### Case Study: Zoo Management System
Let’s consider a Zoo Management System where we have different types of animals. Our goal is to create a base class `Animal` and derive specific animal classes from it, such as `Lion` and `Elephant`.
#### Step-by-Step Implementation
1 . **Define the Base Class (`Animal`)**:
- Include common properties like `name` and `age`.
- Define common methods like `eat()` and `sleep()`.
```python
class Animal:
def __init__(self, name, age):
# Initialize the common properties
self.name = name
self.age = age
def eat(self):
# Common eat method
print(f"{self.name} is eating.")
def sleep(self):
# Common sleep method
print(f"{self.name} is sleeping.")
```
2 . **Create Derived Classes (`Lion` and `Elephant`)**:
- Inherit from the `Animal` class.
- Add specific methods for each animal.
```python
class Lion(Animal):
def roar(self):
# Specific method for Lion
print(f"{self.name} roars.")
class Elephant(Animal):
def trumpet(self):
# Specific method for Elephant
print(f"{self.name} trumpets.")
```
3 . **Using the Classes**:
- Create instances of `Lion` and `Elephant`.
- Demonstrate inherited and specific methods.
```python
simba = Lion("Simba", 5)
simba.eat() # Inherited from Animal class
simba.roar() # Specific to Lion class
dumbo = Elephant("Dumbo", 10)
dumbo.sleep() # Inherited from Animal class
dumbo.trumpet() # Specific to Elephant class
```
### Insights and Practical Application
By using inheritance, we avoid redundant code and make our system scalable. For instance, if we introduce a new animal, we only need to define what's unique about it without rewriting common functionalities.
#### Tips for Implementation
- **Identify Commonality before you code:** Start by identifying common behaviors or attributes that can be grouped into a superclass.
- **Plan Hierarchies:** Design class hierarchies that reflect real-world relationships or logical groupings. You might have a base class Account, with subclasses like CheckingAccount and SavingsAccount that inherit from it. This reflects the real-world relationship where both checking and savings accounts share common behaviors and attributes defined in the Account class.
- **Identifying Commonalities after you've coded:** Look for similarities among your classes/functions. Implement these common features in a superclass to avoid repeating code.
- **Extend and Customize:** Use inheritance to extend functionality where needed. Customize subclasses for specific behaviors or attributes unique to them.
### Takeaways
- **Reusability**: Inheritance allows for reusing existing code.
- **Organization**: It helps in logically organizing code into hierarchies.
- **Scalability**: Adding new features or classes becomes easier.
### Goal
By the end of this article, you have the necessary tools and knowledge to understand how to implement inheritance in your projects to create scalable and maintainable code structures.
---
Join us in the next article where we dive deeper into polymorphism. Hope to see you there!
#TechTobe101 | techtobe101 |
1,875,727 | Accessing Objects via Reference Variables | An object’s data and methods can be accessed through the dot (.) operator via the object’s reference... | 0 | 2024-06-03T17:57:30 | https://dev.to/paulike/accessing-objects-via-reference-variables-44p7 | java, programming, learning, beginners | An object’s data and methods can be accessed through the dot (**.**) operator via the object’s reference variable. Newly created objects are allocated in the memory. They can be accessed via reference variables.
## Reference Variables and Reference Types
Objects are accessed via the object’s _reference variables_, which contain references to the objects. Such variables are declared using the following syntax:
`ClassName objectRefVar;`
A class is essentially a programmer-defined type. A class is a _reference type_, which means that a variable of the class type can reference an instance of the class. The following statement declares the variable **myCircle** to be of the **Circle** type:
`Circle myCircle;`
The variable **myCircle** can reference a **Circle** object. The next statement creates an object and assigns its reference to **myCircle**:
`myCircle = new Circle();`
You can write a single statement that combines the declaration of an object reference variable, the creation of an object, and the assigning of an object reference to the variable with the following syntax:
`ClassName objectRefVar = new ClassName();`
Here is an example:
`Circle myCircle = new Circle();`
The variable **myCircle** holds a reference to a **Circle** object.
An object reference variable that appears to hold an object actually contains a reference to that object. Strictly speaking, an object reference variable and an object are different, but most of the time the distinction can be ignored. Therefore, it is fine, for simplicity, to
say that **myCircle** is a **Circle** object rather than use the longer-winded description that **myCircle** is a variable that contains a reference to a **Circle** object.
Arrays are treated as objects in Java. Arrays are created using the **new** operator. An array variable is actually a variable that contains a reference to an array.
## Accessing an Object’s Data and Methods
In OOP terminology, an object’s member refers to its data fields and methods. After an object is created, its data can be accessed and its methods can be invoked using the _dot operator_ (**.**), also known as the _object member access operator_:
- **objectRefVar.dataField** references a data field in the object.
- **objectRefVar.method(arguments)** invokes a method on the object.
For example, **myCircle.radius** references the radius in **myCircle**, and **myCircle.getArea()** invokes the **getArea** method on **myCircle**. Methods are invoked as operations on objects.
The data field **radius** is referred to as an _instance variable_, because it is dependent on a specific instance. For the same reason, the method **getArea** is referred to as an _instance method_, because you can invoke it only on a specific instance. The object on which an instance method is invoked is called a _calling object_.
Recall that you use **Math.methodName(arguments)** (e.g., **Math.pow(3, 2.5)**) to invoke a method in the **Math** class. Can you invoke **getArea()** using **Circle.getArea()**? The answer is no. All the methods in the **Math** class are static methods, which are defined using the **static** keyword. However, **getArea()** is an instance method, and thus nonstatic. It must be invoked from an object using **objectRefVar.methodName(arguments)** (e.g., **myCircle.getArea()**).
Usually you create an object and assign it to a variable, and then later you can use the variable to reference the object. Occasionally an object does not need to be referenced later. In this case, you can create an object without explicitly assigning it to a variable using the syntax:
`new Circle();`
or
`System.out.println("Area is " + new Circle(5).getArea());`
The former statement creates a **Circle** object. The latter creates a **Circle** object and invokes its **getArea** method to return its area. An object created in this way is known as an _anonymous object_.
## Reference Data Fields and the null Value
The data fields can be of reference types. For example, the following **Student** class contains a data field **name** of the **String** type. **String** is a predefined Java class.
`class Student {
String name; // name has the default value null
int age; // age has the default value 0
boolean isScienceMajor; // isScienceMajor has default value false
char gender; // gender has default value '\u0000'
}`
If a data field of a reference type does not reference any object, the data field holds a special Java value, **null**. **null** is a literal just like **true** and **false**. While **true** and **false** are Boolean literals, **null** is a literal for a reference type.
The default value of a data field is **null** for a reference type, **0** for a numeric type, **false** for a **boolean** type, and **\u0000** for a **char** type. However, Java assigns no default value to a local variable inside a method. The following code displays the default values of the data fields **name**, **age**, **isScienceMajor**, and **gender** for a **Student** object:
`class Test {
public static void main(String[] args) {
Student student = new Student();
System.out.println("name? " + student.name);
System.out.println("age? " + student.age);
System.out.println("isScienceMajor? " + student.isScienceMajor);
System.out.println("gender? " + student.gender);
}
}`
The following code has a compile error, because the local variables **x** and **y** are not initialized:
`class Test {
public static void main(String[] args) {
int x; // x has no default value
String y; // y has no default value
System.out.println("x is " + x);
System.out.println("y is " + y);
}
}`
**NullPointerException** is a common runtime error. It occurs when you invoke a method on a reference variable with a **null** value.
## Differences between Variables of Primitive Types and Reference Types
Every variable represents a memory location that holds a value. When you declare a variable, you are telling the compiler what type of value the variable can hold. For a variable of a primitive type, the value is of the primitive type. For a variable of a reference type, the value is a
reference to where an object is located. For example, as shown in Figure below, the value of **int** variable **i** is **int** value **1**, and the value of **Circle** object **c** holds a reference to where the contents of the **Circle** object are stored in memory.

When you assign one variable to another, the other variable is set to the same value. For a variable of a primitive type, the real value of one variable is assigned to the other variable. For a variable of a reference type, the reference of one variable is assigned to the other variable.

As shown in Figure above, the assignment statement **i = j** copies the contents of **j** into **i** for primitive variables. As shown in Figure below, the assignment statement **c1 = c2** copies the reference of **c2** into **c1** for reference variables. After the assignment, variables **c1** and **c2** refer to the same object.

After the assignment statement **c1 = c2**, **c1** points to the same object referenced by **c2**. The object previously referenced by **c1** is no longer useful and therefore is now known as _garbage_. Garbage occupies memory space, so the Java runtime system detects garbage and automatically reclaims the space it occupies. This process is called _garbage collection_.
If you know that an object is no longer needed, you can explicitly assign **null** to a reference variable for the object. The JVM will automatically collect the space if the object is not referenced by any reference variable. | paulike |
1,875,725 | Controlled & Uncontrolled Component | Uncontrolled 🔽 In the example, each accordion has its own state(isOpen). By default, it is... | 26,254 | 2024-06-03T17:55:59 | https://dev.to/jorjishasan/controlled-uncontrolled-component-3h3h | webdev, javascript, react, discuss | ## Uncontrolled 🔽
In the example, each accordion has its own state(`isOpen`). By default, it is set to `false`. On click, it flips the value of the state variable(`isOpen`) to `true or false`. Based on the `isOpen` value, it expands and collapses.
Since it controls its own state and doesn't rely on its parents, the children are **uncontrolled components**.
{% details 👉🏽 App.js %}
```jsx
const AccordionSection = ({ title, children }) => {
const [isOpen, setIsOpen] = useState(false);
return (
<div>
<button onClick={() => setIsOpen(!isOpen)}>{title}</button>
<span>{isOpen && children}</span>
</div>
);
};
const UncontrolledAccordion = () => {
return (
<div>
<AccordionSection title="Button 1">Content 1</AccordionSection>
<AccordionSection title="Button 2">Content 2</AccordionSection>
<AccordionSection title="Button 3">Content 3</AccordionSection>
</div>
);
};
export default UncontrolledAccordion;
```
{% enddetails %}

---
## Controlled ⬇️
Unlike an uncontrolled component, if the parent controls the child's state heavily or the child relies on his parent, that child is a Controlled component.
In the example below, we removed the accordion's ability to control itself and gave that power to the parent. Let's inspect the code.
- Render the accordions without functionality.
- Create state variable `activeIndex` with value `null`
- Whenever any accordion gets clicked, the `onClick` function is invoked, and `activeIndex` is set to the current `index`.
- By then, re-render happens. And this props `isActive={activeIndex === index}` validate and send `True` in props.
- The accordion that gets clicked will get a `True` boolean value and will be expanded.
Even in the preview of our code, we can see that the parent's state changes every time a child clicks. The parent is controlling the child via props.
{% details 👉🏽 App.js %}
```js
const AccordionSection = ({ title, children, isActive, onClick }) => {
return (
<div>
<button onClick={onClick}>{title}</button>
{isActive && <span>{children}</span>}
</div>
);
};
const ControlledAccordion = () => {
const [activeIndex, setActiveIndex] = useState(null);
return (
<>
{["Content 1", "Content 2", "Content 3"].map((content, index) => (
<AccordionSection
key={index}
title={`Button ${index + 1}`}
isActive={activeIndex === index}
onClick={() => setActiveIndex(activeIndex === index ? null : index)}
>
{content}
</AccordionSection>
))}
</>
);
};
export default ControlledAccordion;
```
{% enddetails %}

---
NB: In case anyone is wondering how I got this developer view, it's actually a Chrome extension called [React Developer Tools](https://chromewebstore.google.com/detail/react-developer-tools/fmkadmapgofadopljbjfkapdkoienihi?hl=en), available in the extension store.
| jorjishasan |
1,875,722 | A Guide to Successful Infotainment System Testing | Mastering infotainment testing becomes pivotal in automotive embedded systems’ intricate and highly... | 0 | 2024-06-03T17:50:14 | https://nyweekly.com/tech/a-guide-to-successful-infotainment-system-testing/ | testing, webdev, mobile, automotives | Mastering infotainment testing becomes pivotal in automotive embedded systems’ intricate and highly technical world. With the advent and progression of intelligent vehicle technology, a seamless user experience has traversed beyond being merely desirable, etching itself as an absolute necessity. Focusing on automotive infotainment and IVI testing, let’s unfold the crucial mantras that can lead your development team to unprecedented success.
Firstly, understanding the multifaceted aspects of [automotive infotainment testing](https://www.headspin.io/white-papers/automated-testing-of-infotainment-systems) is crucial. Infotainment testing, particularly within the automotive sector, encompasses various evaluative procedures designed to validate, verify, and ensure the optimal performance of In-Vehicle Infotainment (IVI) systems. Infotainment systems blend entertainment and information delivery features, providing drivers and passengers with interactive and multimedia functionalities, such as navigation, music streaming, internet connectivity, and voice assistant features, while navigating the vehicle’s complex environment.
The notion of infotainment testing, therefore, hinges on a multifaceted approach that scrutinizes various aspects, including:
- **Functionality Verification**: Ensuring all features, from audio playback to GPS navigation, function as intended without glitches.
- **User Interface and Experience (UI/UX) Testing**: Confirming the system provides an intuitive, responsive, and user-friendly interface and experience.
- **Compatibility Testing**: Ensuring the infotainment system harmoniously interacts with various devices and platforms, such as smartphones, ensuring consistent performance.
- **Performance Testing**: Validating the system’s reliability, speed, and overall efficiency under varied conditions and loads.
- **Security Testing**: Identifying and mitigating vulnerabilities to protect user data and ensure system integrity.
- **Compliance Testing**: Confirming that the system adheres to regulatory norms and industry standards, safeguarding users, and ensuring quality and reliability.
## Infotainment Testing Benefits
The manifold benefits emerging from infotainment testing are substantial, spanning facets of user satisfaction, safety, and commercial success. Here’s an exploration of the pivotal benefits:
**Enhanced User Satisfaction**
Diligent infotainment testing ensures a glitch-free, smooth, and engaging user experience, directly correlating with heightened user satisfaction and brand loyalty.
**Safety Assurance**
By thoroughly testing IVI systems, potential malfunctions that could distract the driver and compromise safety are minimized, ensuring the system contributes positively to the vehicle’s overall security.
**Market Competitiveness**
A rigorously tested and top-performing infotainment system can be a significant market differentiator, enhancing a vehicle’s appeal and competitive edge.
**Reduced Post-Deployment Costs**
Efficient testing can identify and rectify issues early, mitigating the need for costly fixes post-deployment and reducing the likelihood of recall scenarios.
**Compliance and Standard Adherence**
Ensuring the infotainment system aligns with legal and industry standards protects the manufacturer from potential legal consequences and fortifies brand reputation.
**Security and Data Protection**
In an era where data breaches are becoming increasingly prevalent, ensuring a secure infotainment system protects users’ data and reinforces trust in the brand.
**Enhanced Reliability**
The system’s reliability is fortified through meticulous testing, ensuring consistent performance and decreasing the risk of system failures that could disillusion users.
**Future-Proofing**
Infotainment testing can also assess the system’s capacity to be updated or upgraded, ensuring its longevity and adaptability to emerging technologies and user expectations.
**Optimized Performance**
Testing ensures that the system works and performs optimally, ensuring swift responsiveness, accurate functionality, and overall streamlined performance.
Manufacturers safeguard users and ensure a stellar user experience through infotainment testing, fortifying their market position and mitigating future risks. Consequently, it is pivotal in developing and deploying automotive infotainment systems.
## Infotainment Testing Success Mantras
Embarking upon the journey of infotainment testing, meticulous IVI testing becomes paramount. In-vehicle infotainment (IVI) systems present a unique blend of functionalities and services, traversing through navigation, entertainment, and internet functionality. Ensuring their flawless operation, compatibility, and reliability is indispensable for user satisfaction and safety, making it vital for your team to strategize and implement comprehensive testing protocols.
Hence, let’s delve into the essential mantras for infotainment testing success:
**User-Centric Approach**
Concentrating on methods to [test user experience](https://www.headspin.io/blog/user-experience-testing-a-complete-guide) effectively ensures that the infotainment systems are functional but also user-friendly and intuitive. It demands a holistic understanding of user needs, preferences, and behaviors, aligning the system’s functionality and interface with anticipated user interactions.
**Embracing Automation**
The automation of testing processes provides a scaffold of efficiency and consistency. By automating repetitive yet necessary tests, teams can ensure the robustness of the infotainment system across various scenarios while optimizing resource utilization and time management.
**Cross-Platform Compatibility**
Ensuring that the infotainment systems perform seamlessly across various platforms and devices is crucial. Employ a rigorous cross-platform testing strategy to validate system performance, ensuring consistent functionality and user experience across all intended devices.
**Real-World Testing**
Incorporate real-world testing scenarios to validate the infotainment system’s reliability and performance under various real-life conditions. This includes considering various user journeys, environmental factors, and possible disruptions, ensuring practical usage robustness.
**Rigorous Security Testing**
Given the interconnectivity of IVI systems, security testing is imperative to shield them against potential threats and vulnerabilities. A robust security testing protocol should be established to safeguard system integrity and protect user data.
**Continual Performance Monitoring**
Employing tools and platforms to monitor the performance of infotainment systems post-deployment constantly is pivotal. This ensures that issues are identified and rectified promptly, continually safeguarding user experience and system reliability.
**Compliance and Standardization**
Ensure that all testing and development processes adhere to industry standards and regulations. This involves validating system compliance with automotive industry standards and regulatory norms, ensuring safety, reliability, and quality.
**Collaborative Testing Ecosystem**
Establishing a collaborative ecosystem where developers, testers, and stakeholders synchronously work enables swift identification and resolution of issues, fostering a streamlined development and testing process.
**Leveraging Expertise**
Utilizing platforms and tools, like those provided by HeadSpin, that offer a cohesive environment for testing and monitoring the user experience can significantly enhance testing efficiency and accuracy.
**Feedback and Optimization**
Implementing a mechanism to gather and analyze user feedback post-deployment ensures continual improvement. This feedback loop enables teams to identify areas of improvement and implement necessary optimizations, thereby enhancing the system perpetually.
## Summary
Nurturing a framework where these mantras are embedded within the operational ethos of your automotive embedded systems development team can pave the way toward infotainment testing excellence. It’s pivotal to recognize that infotainment systems, particularly within the automotive domain, are no longer ancillary but integral components that significantly influence user satisfaction and safety.
By amalgamating a meticulous testing approach, embracing automation, ensuring cross-platform compatibility, and maintaining a relentless focus on user experience, development teams can not only assure the reliability and efficacy of infotainment systems but also fortify their position in a competitive market that ceaselessly seeks innovation, quality, and user-centricity.
_Article resource: This post was originally published on https://nyweekly.com/tech/a-guide-to-successful-infotainment-system-testing/_ | abhayit2000 |
1,875,721 | Buy verified cash app account | https://dmhelpshop.com/product/buy-verified-cash-app-account/ Buy verified cash app account Cash... | 0 | 2024-06-03T17:48:04 | https://dev.to/yyrwasti22/buy-verified-cash-app-account-k9i | webdev, javascript, beginners, programming | ERROR: type should be string, got "https://dmhelpshop.com/product/buy-verified-cash-app-account/\n\n\n\nBuy verified cash app account\nCash app has emerged as a dominant force in the realm of mobile banking within the USA, offering unparalleled convenience for digital money transfers, deposits, and trading. As the foremost provider of fully verified cash app accounts, we take pride in our ability to deliver accounts with substantial limits. Bitcoin enablement, and an unmatched level of security.\n\nOur commitment to facilitating seamless transactions and enabling digital currency trades has garnered significant acclaim, as evidenced by the overwhelming response from our satisfied clientele. Those seeking buy verified cash app account with 100% legitimate documentation and unrestricted access need look no further. Get in touch with us promptly to acquire your verified cash app account and take advantage of all the benefits it has to offer.\n\nWhy dmhelpshop is the best place to buy USA cash app accounts?\nIt’s crucial to stay informed about any updates to the platform you’re using. If an update has been released, it’s important to explore alternative options. Contact the platform’s support team to inquire about the status of the cash app service.\n\nClearly communicate your requirements and inquire whether they can meet your needs and provide the buy verified cash app account promptly. If they assure you that they can fulfill your requirements within the specified timeframe, proceed with the verification process using the required documents.\n\nOur account verification process includes the submission of the following documents: [List of specific documents required for verification].\n\nGenuine and activated email verified\nRegistered phone number (USA)\nSelfie verified\nSSN (social security number) verified\nDriving license\nBTC enable or not enable (BTC enable best)\n100% replacement guaranteed\n100% customer satisfaction\nWhen it comes to staying on top of the latest platform updates, it’s crucial to act fast and ensure you’re positioned in the best possible place. If you’re considering a switch, reaching out to the right contacts and inquiring about the status of the buy verified cash app account service update is essential.\n\nClearly communicate your requirements and gauge their commitment to fulfilling them promptly. Once you’ve confirmed their capability, proceed with the verification process using genuine and activated email verification, a registered USA phone number, selfie verification, social security number (SSN) verification, and a valid driving license.\n\nAdditionally, assessing whether BTC enablement is available is advisable, buy verified cash app account, with a preference for this feature. It’s important to note that a 100% replacement guarantee and ensuring 100% customer satisfaction are essential benchmarks in this process.\n\nHow to use the Cash Card to make purchases?\nTo activate your Cash Card, open the Cash App on your compatible device, locate the Cash Card icon at the bottom of the screen, and tap on it. Then select “Activate Cash Card” and proceed to scan the QR code on your card. Alternatively, you can manually enter the CVV and expiration date. How To Buy Verified Cash App Accounts.\n\nAfter submitting your information, including your registered number, expiration date, and CVV code, you can start making payments by conveniently tapping your card on a contactless-enabled payment terminal. Consider obtaining a buy verified Cash App account for seamless transactions, especially for business purposes. Buy verified cash app account.\n\nWhy we suggest to unchanged the Cash App account username?\nTo activate your Cash Card, open the Cash App on your compatible device, locate the Cash Card icon at the bottom of the screen, and tap on it. Then select “Activate Cash Card” and proceed to scan the QR code on your card.\n\nAlternatively, you can manually enter the CVV and expiration date. After submitting your information, including your registered number, expiration date, and CVV code, you can start making payments by conveniently tapping your card on a contactless-enabled payment terminal. Consider obtaining a verified Cash App account for seamless transactions, especially for business purposes. Buy verified cash app account. Purchase Verified Cash App Accounts.\n\nSelecting a username in an app usually comes with the understanding that it cannot be easily changed within the app’s settings or options. This deliberate control is in place to uphold consistency and minimize potential user confusion, especially for those who have added you as a contact using your username. In addition, purchasing a Cash App account with verified genuine documents already linked to the account ensures a reliable and secure transaction experience.\n\n \n\nBuy verified cash app accounts quickly and easily for all your financial needs.\nAs the user base of our platform continues to grow, the significance of verified accounts cannot be overstated for both businesses and individuals seeking to leverage its full range of features. How To Buy Verified Cash App Accounts.\n\nFor entrepreneurs, freelancers, and investors alike, a verified cash app account opens the door to sending, receiving, and withdrawing substantial amounts of money, offering unparalleled convenience and flexibility. Whether you’re conducting business or managing personal finances, the benefits of a verified account are clear, providing a secure and efficient means to transact and manage funds at scale.\n\nWhen it comes to the rising trend of purchasing buy verified cash app account, it’s crucial to tread carefully and opt for reputable providers to steer clear of potential scams and fraudulent activities. How To Buy Verified Cash App Accounts. With numerous providers offering this service at competitive prices, it is paramount to be diligent in selecting a trusted source.\n\nThis article serves as a comprehensive guide, equipping you with the essential knowledge to navigate the process of procuring buy verified cash app account, ensuring that you are well-informed before making any purchasing decisions. Understanding the fundamentals is key, and by following this guide, you’ll be empowered to make informed choices with confidence.\n\n \n\nIs it safe to buy Cash App Verified Accounts?\nCash App, being a prominent peer-to-peer mobile payment application, is widely utilized by numerous individuals for their transactions. However, concerns regarding its safety have arisen, particularly pertaining to the purchase of “verified” accounts through Cash App. This raises questions about the security of Cash App’s verification process.\n\nUnfortunately, the answer is negative, as buying such verified accounts entails risks and is deemed unsafe. Therefore, it is crucial for everyone to exercise caution and be aware of potential vulnerabilities when using Cash App. How To Buy Verified Cash App Accounts.\n\nCash App has emerged as a widely embraced platform for purchasing Instagram Followers using PayPal, catering to a diverse range of users. This convenient application permits individuals possessing a PayPal account to procure authenticated Instagram Followers.\n\nLeveraging the Cash App, users can either opt to procure followers for a predetermined quantity or exercise patience until their account accrues a substantial follower count, subsequently making a bulk purchase. Although the Cash App provides this service, it is crucial to discern between genuine and counterfeit items. If you find yourself in search of counterfeit products such as a Rolex, a Louis Vuitton item, or a Louis Vuitton bag, there are two viable approaches to consider.\n\n \n\nWhy you need to buy verified Cash App accounts personal or business?\nThe Cash App is a versatile digital wallet enabling seamless money transfers among its users. However, it presents a concern as it facilitates transfer to both verified and unverified individuals.\n\nTo address this, the Cash App offers the option to become a verified user, which unlocks a range of advantages. Verified users can enjoy perks such as express payment, immediate issue resolution, and a generous interest-free period of up to two weeks. With its user-friendly interface and enhanced capabilities, the Cash App caters to the needs of a wide audience, ensuring convenient and secure digital transactions for all.\n\nIf you’re a business person seeking additional funds to expand your business, we have a solution for you. Payroll management can often be a challenging task, regardless of whether you’re a small family-run business or a large corporation. How To Buy Verified Cash App Accounts.\n\nImproper payment practices can lead to potential issues with your employees, as they could report you to the government. However, worry not, as we offer a reliable and efficient way to ensure proper payroll management, avoiding any potential complications. Our services provide you with the funds you need without compromising your reputation or legal standing. With our assistance, you can focus on growing your business while maintaining a professional and compliant relationship with your employees. Purchase Verified Cash App Accounts.\n\nA Cash App has emerged as a leading peer-to-peer payment method, catering to a wide range of users. With its seamless functionality, individuals can effortlessly send and receive cash in a matter of seconds, bypassing the need for a traditional bank account or social security number. Buy verified cash app account.\n\nThis accessibility makes it particularly appealing to millennials, addressing a common challenge they face in accessing physical currency. As a result, ACash App has established itself as a preferred choice among diverse audiences, enabling swift and hassle-free transactions for everyone. Purchase Verified Cash App Accounts.\n\n \n\nHow to verify Cash App accounts\nTo ensure the verification of your Cash App account, it is essential to securely store all your required documents in your account. This process includes accurately supplying your date of birth and verifying the US or UK phone number linked to your Cash App account.\n\nAs part of the verification process, you will be asked to submit accurate personal details such as your date of birth, the last four digits of your SSN, and your email address. If additional information is requested by the Cash App community to validate your account, be prepared to provide it promptly. Upon successful verification, you will gain full access to managing your account balance, as well as sending and receiving funds seamlessly. Buy verified cash app account.\n\n \n\nHow cash used for international transaction?\nExperience the seamless convenience of this innovative platform that simplifies money transfers to the level of sending a text message. It effortlessly connects users within the familiar confines of their respective currency regions, primarily in the United States and the United Kingdom.\n\nNo matter if you’re a freelancer seeking to diversify your clientele or a small business eager to enhance market presence, this solution caters to your financial needs efficiently and securely. Embrace a world of unlimited possibilities while staying connected to your currency domain. Buy verified cash app account.\n\nUnderstanding the currency capabilities of your selected payment application is essential in today’s digital landscape, where versatile financial tools are increasingly sought after. In this era of rapid technological advancements, being well-informed about platforms such as Cash App is crucial.\n\nAs we progress into the digital age, the significance of keeping abreast of such services becomes more pronounced, emphasizing the necessity of staying updated with the evolving financial trends and options available. Buy verified cash app account.\n\nOffers and advantage to buy cash app accounts cheap?\nWith Cash App, the possibilities are endless, offering numerous advantages in online marketing, cryptocurrency trading, and mobile banking while ensuring high security. As a top creator of Cash App accounts, our team possesses unparalleled expertise in navigating the platform.\n\nWe deliver accounts with maximum security and unwavering loyalty at competitive prices unmatched by other agencies. Rest assured, you can trust our services without hesitation, as we prioritize your peace of mind and satisfaction above all else.\n\nEnhance your business operations effortlessly by utilizing the Cash App e-wallet for seamless payment processing, money transfers, and various other essential tasks. Amidst a myriad of transaction platforms in existence today, the Cash App e-wallet stands out as a premier choice, offering users a multitude of functions to streamline their financial activities effectively. Buy verified cash app account.\n\nTrustbizs.com stands by the Cash App’s superiority and recommends acquiring your Cash App accounts from this trusted source to optimize your business potential.\n\nHow Customizable are the Payment Options on Cash App for Businesses?\nDiscover the flexible payment options available to businesses on Cash App, enabling a range of customization features to streamline transactions. Business users have the ability to adjust transaction amounts, incorporate tipping options, and leverage robust reporting tools for enhanced financial management.\n\nExplore trustbizs.com to acquire verified Cash App accounts with LD backup at a competitive price, ensuring a secure and efficient payment solution for your business needs. Buy verified cash app account.\n\nDiscover Cash App, an innovative platform ideal for small business owners and entrepreneurs aiming to simplify their financial operations. With its intuitive interface, Cash App empowers businesses to seamlessly receive payments and effectively oversee their finances. Emphasizing customization, this app accommodates a variety of business requirements and preferences, making it a versatile tool for all.\n\nWhere To Buy Verified Cash App Accounts\nWhen considering purchasing a verified Cash App account, it is imperative to carefully scrutinize the seller’s pricing and payment methods. Look for pricing that aligns with the market value, ensuring transparency and legitimacy. Buy verified cash app account.\n\nEqually important is the need to opt for sellers who provide secure payment channels to safeguard your financial data. Trust your intuition; skepticism towards deals that appear overly advantageous or sellers who raise red flags is warranted. It is always wise to prioritize caution and explore alternative avenues if uncertainties arise.\n\nThe Importance Of Verified Cash App Accounts\nIn today’s digital age, the significance of verified Cash App accounts cannot be overstated, as they serve as a cornerstone for secure and trustworthy online transactions.\n\nBy acquiring verified Cash App accounts, users not only establish credibility but also instill the confidence required to participate in financial endeavors with peace of mind, thus solidifying its status as an indispensable asset for individuals navigating the digital marketplace.\n\nWhen considering purchasing a verified Cash App account, it is imperative to carefully scrutinize the seller’s pricing and payment methods. Look for pricing that aligns with the market value, ensuring transparency and legitimacy. Buy verified cash app account.\n\nEqually important is the need to opt for sellers who provide secure payment channels to safeguard your financial data. Trust your intuition; skepticism towards deals that appear overly advantageous or sellers who raise red flags is warranted. It is always wise to prioritize caution and explore alternative avenues if uncertainties arise.\n\nConclusion\nEnhance your online financial transactions with verified Cash App accounts, a secure and convenient option for all individuals. By purchasing these accounts, you can access exclusive features, benefit from higher transaction limits, and enjoy enhanced protection against fraudulent activities. Streamline your financial interactions and experience peace of mind knowing your transactions are secure and efficient with verified Cash App accounts.\n\nChoose a trusted provider when acquiring accounts to guarantee legitimacy and reliability. In an era where Cash App is increasingly favored for financial transactions, possessing a verified account offers users peace of mind and ease in managing their finances. Make informed decisions to safeguard your financial assets and streamline your personal transactions effectively.\n\nContact Us / 24 Hours Reply\nTelegram:dmhelpshop\nWhatsApp: +1 (980) 277-2786\nSkype:dmhelpshop\nEmail:dmhelpshop@gmail.com" | yyrwasti22 |
1,875,720 | The Best Habit Tracking Apps on iPhone | In the pursuit of personal growth, forming good habits is indisputably beneficial. For those seeking... | 0 | 2024-06-03T17:47:39 | https://blog.productivity.directory/the-best-habit-tracking-apps-on-iphone-397414e89a57 | habittrackerapps, productivity, habittracking, iphoneapps | In the pursuit of personal growth, forming good habits is indisputably beneficial. For those seeking a little digital assistance in tracking their daily routines and goals, iPhone apps have become invaluable tools. These applications not only help in building and maintaining good habits but also offer insights into one's behavior and progress. Below, we explore some of the best habit tracking apps available on iPhone, perfect for anyone looking to boost their productivity and well-being.
Habitica
--------

[Habitica](https://productivity.directory/habitica) turns the mundane task of habit tracking into a fun, game-like experience. Users can create characters, earn rewards, and level up as they succeed in their real-life goals. This RPG-style app is especially appealing to those who thrive on visual and interactive motivation. The community aspect of Habitica also allows you to engage with friends or other users, making the journey towards your goals a shared and supportive experience.
Streaks
-------

As the name suggests, [Streaks](https://productivity.directory/streaks) focuses on maintaining continuous progress in up to 12 habits. The app is highly intuitive, offering a simple interface where you can tap to mark a habit as complete. Streaks work with Apple Health to automatically track certain activities like walking or meditation, providing a seamless integration with your health data. For those who appreciate minimalistic design and straightforward functionality, Streaks is a top choice.
Done
----

[Done](https://productivity.directory/done) allows users to set and track goals on a daily, weekly, and monthly basis. Its strength lies in its flexibility and ease of use, allowing for multiple habit tracking without overwhelming the user. You can customize the app with various colors and create bar graphs to visually analyze your progress over time. For those who want a simple yet comprehensive overview of their habits, Done offers just that.
Forest
------

[Forest](https://productivity.directory/forest) offers a unique approach to habit tracking by encouraging you to focus on tasks while growing virtual trees. The more time you spend away from your phone and focused on your task, the more your forest flourishes. It's particularly useful for those aiming to decrease screen time and increase productivity. The environmental twist? Forest partners with real-tree planting organizations, turning your virtual achievements into actual tree plantings.
Tody
----

For those looking to improve their domestic habits, [Tody](https://productivity.directory/tody) offers a practical solution. Unlike standard cleaning apps, Tody uses an "optimization algorithm" to suggest cleaning tasks based on need rather than arbitrary dates. This means it adapts to your personal cleaning pace and encourages you to clean more efficiently. Its user-friendly interface and practical approach make it an excellent choice for managing household tasks.
Conclusion
==========
Whether you're looking to build new habits, maintain streaks, or find creative motivation, there's a habit tracking app on the iPhone that can cater to your needs. Each app offers unique features that can help transform your daily routines into meaningful accomplishments. By choosing the right app, you can enhance your productivity, improve your well-being, and embark on a journey of personal development. Choose wisely, and let your smartphone be your guide on the path to a better you.
Ready to take your workflows to the next level? Explore a vast array of [Productivity tools](https://productivity.directory/), along with their alternatives, at [Productivity Directory](https://productivity.directory/) and Read more about them on [The Productivity Blog](https://blog.productivity.directory/) and Find Weekly [Productivity tools](https://productivity.directory/) on [The Productivity Newsletter](https://newsletter.productivity.directory/). Find the perfect fit for your workflow needs today! | stan8086 |
1,875,719 | How to Read A Barcode in C# | How to Read Barcodes in C Download Barcode Reader for C# Project Create a Visual Studio... | 0 | 2024-06-03T17:46:19 | https://dev.to/mhamzap10/how-to-read-a-barcode-in-c-21hk | barcode, csharp, dotnet, aspdotnet | ##How to Read Barcodes in C#
1. Download [Barcode Reader](https://ironsoftware.com/csharp/barcode/tutorials/csharp-barcode-image-generator/) for C# Project
2. Create a Visual Studio Project:
3. Install Barcode Library
4. Write a Code to Read a Barcode
5. Write Code to read multiple barcode images
This tutorial provides a straightforward approach to read barcodes using C# within the .NET Framework. It equips developers with essential skills to efficiently extract [barcode](https://en.wikipedia.org/wiki/Barcode) information for various applications.
##C# Barcode Reader Library:
[IronBarcode](https://ironsoftware.com/csharp/barcode/) is a powerful and easy-to-use library for barcode [generation](https://ironsoftware.com/csharp/barcode/blog/using-ironbarcode/barcode-generator-net/) and [reading](https://ironsoftware.com/csharp/barcode/tutorials/reading-barcodes/) in .NET applications. Developed by IronSoftware, it allows developers to integrate barcode functionalities into their C# and VB.NET projects with minimal effort. The library supports a wide range of barcode types and formats, making it a versatile tool for various barcode-related tasks in software development.
###Key Features of IronBarcode
**<u>Barcode Reading:</u>**
1. The library can read and decode barcodes from images, PDFs, and even directly from web URLs.
2. It supports reading multiple barcodes from a single image.
3. Advanced reading options allow for fine-tuning, such as specifying barcode types, adjusting image contrast, and selecting specific regions of an image to scan.
**<u>Barcode Generation:</u>**
1. IronBarcode can generate a variety of barcodes. Supported barcode formats are QR codes, Code 128, Code 39, UPC, EAN, and more.
2. It supports customization of barcode appearance, such as colors, and sizes, and adding logos or images within QR codes. It provides methods to style barcodes.
3. Barcodes can be saved in various formats like PNG, JPEG, GIF, BMP, and more.
**<u>Supported Formats:</u>**
IronBarcode supports a wide range of barcode formats including linear (1D) barcodes and matrix (2D) barcodes.
**<u>Ease of Use:</u>**
1. The API is designed to be intuitive and straightforward, making it accessible even to developers with limited experience in barcode technologies.
2. Comprehensive documentation and examples
##Step-By-Step Tutorial:
Let's begin the step-by-step tutorial to generate barcodes.
###Step # 1: Create a Visual Studio Project:
Here are the steps to create a Visual Studio Console application in .NET 8:
1. Open Visual Studio.
2. Click on "Create a new project."
3. Select "Console App" and click "Next."
4. Name your project and select the location, then click "Next."
5. Choose ".NET 8" as the framework and click "Create."
6. Wait for the project to be set up and initialized.

###Step # 2: Install Barcode Library:
Before getting started, you need to install the Barcode Library in your project. You have three options for this, and you can choose any one that suits you best.
####Package Manager Console:
1. Go to "Tools" > "NuGet Package Manager" > "Package Manager Console."
2. In the console, type:
`Install-Package Barcode`
3. Press Enter and wait for the installation to complete.

####Nuget Package Manager Solution:
1. Right-click on your solution in the Solution Explorer.
2. Select "Manage NuGet Packages for Solution."
3. In the "Browse" tab, search for "IronBarcode."

4. Select "IronBarcode" from the list and click "Install."
5. Choose the projects within the solution where you want to install the package and click "OK."
##Download From the Link:
If you like doing things manually, just download the [IronBarCode.Dll](https://www.nuget.org/packages/BarCode) from the link provided and then add it to your project as a reference.
Once IronBarcode is installed, include the following namespace in your C# class:
```
using Ironbarcode;
```
###Step # 3: Write Code to Read Barcode Image:
The following code snippet demonstrates how to read a barcode from an image file and output its text content using IronBarcode in C#.
```
static void Main(string[] args)
{
var resultFromFile = BarcodeReader.Read(@"barcode.png");
foreach (var item in resultFromFile)
{
Console.WriteLine(item.Text);
}
}
```
The above code utilizes IronBarcode to extract data from a barcode image file ("barcode.png"). It iterates through the obtained results and prints out the textual content of each identified barcode to the console.

###Read From Multiple Barcodes:
Efficiently scanning multiple barcodes within a document is made possible by the IronBarcode library in C#. This code showcases how to utilize the library's capabilities, such as concurrent processing and advanced barcode recognition options. By fine-tuning parameters like multithreading and expected barcode types, developers can optimize the scanning process for swift and accurate extraction of multiple barcode values from a single document. The following barcode images will be used as input.

Check out the code below to see how IronBarcode simplifies and improves barcode reading in C#.
```
var myOptionsExample = new BarcodeReaderOptions
{
// Choose a speed from: Faster, Balanced, Detailed, ExtremeDetail
// There is a tradeoff in performance as more Detail is set
Speed = ReadingSpeed.Balanced,
// Reader will stop scanning once a barcode is found, unless set to true
ExpectMultipleBarcodes = true,
// By default, all barcode formats are scanned for.
// Specifying one or more, performance will increase.
ExpectBarcodeTypes = BarcodeEncoding.AllOneDimensional,
// Utilizes multiple threads to reads barcodes from multiple images in parallel.
Multithreaded = true,
// Maximum threads for parallel. Default is 4
MaxParallelThreads = 2,
};
var resultFromPdf = BarcodeReader.Read("barcode.pdf", myOptionsExample);
for (int i = 0; i < resultFromPdf.Count; i++)
{
// Print Barcode Data
Console.WriteLine($"Value from Barcode # {i} : {resultFromPdf[i]}");
}
```
The provided code snippet demonstrates how to utilize the IronBarcode library in C# for efficient and flexible barcode reading. By configuring options such as reading speed, expected barcode types, and multithreading, developers can optimize the scanning process to extract multiple barcode values from a PDF document. The code initializes a set of options defining the reading parameters, including the desired reading speed, the expectation of multiple barcodes, and the utilization of multithreading for parallel processing. Subsequently, it reads barcodes from the specified PDF file using the defined options and prints out the extracted barcode values along with their corresponding indices. This implementation showcases how IronBarcode simplifies barcode reading tasks while providing customization options for enhanced performance and versatility.
Utilizing IronBarcode in C# facilitates faster barcode scanning by efficiently processing binary data through the integration of a barcode scanner. This enables seamless extraction of barcode information from various file formats across different operating systems, enhancing overall efficiency in barcode recognition tasks. By harnessing the library's capabilities, developers can streamline their applications' barcode reading functionality, achieving swift and accurate results across diverse environments.
##Conclusion:
In conclusion, IronBarcode stands as a robust solution for barcode reading in C#, offering developers a straightforward and efficient way to integrate barcode functionality into their applications. Its extensive feature set, including advanced reading options, barcode generation, and support for multiple barcode formats, streamlines the development process. With [a free trial](https://ironsoftware.com/csharp/barcode/#trial-license) available, developers can explore IronBarcode's capabilities risk-free, and upon satisfaction, seamlessly transition to [purchase](https://ironsoftware.com/csharp/barcode/licensing/) for continued access to its full functionality and support. IronBarcode empowers developers to enhance their applications with accurate and fast barcode scanning capabilities, making it a valuable asset in the toolkit of any C# developer.
Following the conclusion, it's worth highlighting [IronQR](https://ironsoftware.com/csharp/qr/), a specialized library dedicated to QR code [generation](https://ironsoftware.com/csharp/qr/examples/generate-qr-code/) and [recognition](https://ironsoftware.com/csharp/qr/blog/using-ironqr/csharp-qr-code-reader-developer-tutorial/). IronQR employs advanced machine-learning techniques to enhance accuracy and speed, making it a valuable addition to any developer's toolkit. When combined with IronBarcode, these two libraries offer a comprehensive solution for incorporating both barcode and QR code functionalities seamlessly into .NET applications. | mhamzap10 |
1,875,716 | My First Post!!! | I am a CS Graduate Student at Illinois Tech. As I didn't land any internships for the summer, I have... | 0 | 2024-06-03T17:43:26 | https://dev.to/gopi_ravady_64fee83fc400d/my-first-post-324e | mongodb, flutter, dart, socketio | I am a CS Graduate Student at Illinois Tech. As I didn't land any internships for the summer, I have developed a hobby project.
I have developed a user-friendly chat application using my primary mobile applications development framework: Flutter. I have also utilized socket.io for bidirectional communication from my Flutter application to the MongoDB server for my backend.
My first post is to ask suggestions from fellow developers for suggestions on how to improve the efficiency of bidirectional communication and integrate rasa (chatbot) into my application.
Thank you for taking the time to read this post! | gopi_ravady_64fee83fc400d |
1,875,715 | From Solopreneur to Scalable Success: Building a Sustainable SaaS Business Model | The tech world is full of solopreneurs – tech-savvy individuals who run their own businesses. This... | 0 | 2024-06-03T17:43:21 | https://dev.to/marufhossain/from-solopreneur-to-scalable-success-building-a-sustainable-saas-business-model-4i64 | The tech world is full of solopreneurs – tech-savvy individuals who run their own businesses. This approach is especially attractive for building a [SaaS application](https://www.clickittech.com/saas/saas-application/?utm_source=backlinks&utm_medium=referral
) (software delivered online with a subscription fee). SaaS businesses offer solopreneurs a unique advantage: scalability. Unlike traditional businesses, a SaaS application can serve a large number of customers without needing a massive team. This article will explore how solopreneurs can transform their ideas into thriving, sustainable SaaS businesses.
There are many reasons why solopreneurs excel in the SaaS space. First, they can make decisions quickly and adapt to changing needs. Since they don't have a big team to manage, solopreneurs can keep overhead costs low. Perhaps the biggest advantage is their deep understanding of the target market – if the solopreneur's expertise aligns with the problem their SaaS application solves. Of course, being a solopreneur also has challenges. Limited resources and potential skill gaps can slow down development. The key is to leverage your strengths and find ways to overcome these hurdles.
Building a strong foundation is crucial for any SaaS business model. The first step is defining your value proposition – what problem does your SaaS application solve, and how does it benefit customers? Who is your ideal customer? Understanding your target market allows you to tailor your product to their specific needs. Finally, you need a pricing strategy. Will you offer a subscription with different tiers? A freemium model with a free basic version and paid upgrades? The best pricing strategy depends on your value proposition and target market. Remember, it's also important to develop strategies to attract new customers and keep existing ones happy – that's how you achieve sustainable growth.
Taking your SaaS idea from concept to launch requires specific steps. First, develop a Minimum Viable Product (MVP). This is a basic version of your application with core functionalities. The MVP helps you validate market demand and see if there's real interest in your product. Get feedback from potential customers through interviews, surveys, and beta testing. Use this feedback to improve your MVP before the official launch. You'll also need to secure the resources you need to develop and launch your SaaS application. This could involve software, tools, and potentially hiring freelancers for specific tasks. Don't forget to establish a strong brand identity and online presence to attract potential customers.
So, you've launched your SaaS application – now how do you scale it as a solopreneur? Leverage automation tools! These can handle repetitive tasks like marketing and customer support, freeing up your time to focus on more strategic areas. Strategic partnerships and outsourcing can also be helpful. Partner with other businesses that complement your product, or outsource specific tasks to qualified professionals. Building a strong customer community is another great way to scale. Loyal customers are more likely to stick around and refer your SaaS application to others. Always keep an eye on key metrics – user growth, churn rate (how many customers leave), and customer lifetime value (how much revenue a customer generates). These metrics tell you how well your business is doing and where you can improve.
Building a sustainable SaaS business requires a long-term vision. Develop a roadmap for ongoing product development. What new features will you add? How will you keep your SaaS application relevant and valuable to customers? Consider exploring additional revenue streams beyond core subscriptions. Could you offer premium features or add-ons? As your business grows, you might even consider seeking funding from venture capitalists or angel investors.
There are many inspiring examples of solopreneurs who have built successful SaaS businesses. Basecamp, a project management tool, and Mint.com, a personal finance app, are just a few. These solopreneurs focused on delivering a strong value proposition, built a solid foundation, and embraced strategic growth to achieve long-term success.
The journey from solopreneur to SaaS leader is an exciting one. By focusing on value proposition, building a strong foundation, and embracing strategic growth, you can turn your innovative idea into a thriving, sustainable SaaS business. Remember, the tech world rewards those who can adapt and solve problems. So, put your skills to work, embrace the challenges, and watch your SaaS application soar! | marufhossain | |
1,875,714 | Mastering the GMAT: The Power of Expert GMAT Coaching | Introduction: Are you looking for Expert GMAT Coaching? Preparing for the Graduate Management... | 0 | 2024-06-03T17:42:38 | https://dev.to/alijutt_seo_a59e5d5e3087f/mastering-the-gmat-the-power-of-expert-gmat-coaching-435j | Introduction:
Are you looking for Expert GMAT Coaching? Preparing for the Graduate Management Admission Test (GMAT) is a crucial step for many individuals aspiring to pursue graduate business education. However, navigating the complexities of the GMAT exam can be daunting without proper guidance and support. This is where expert GMAT coaching comes into play. In this comprehensive guide, we'll explore the benefits of expert GMAT coaching, how it can help you ace the GMAT exam, and what to look for in a reputable coaching service.
Understanding the GMAT:
Overview of the GMAT exam, its sections, and its importance in business school admissions.
Discussion on the skills and knowledge tested in each section of the GMAT.
What is Expert GMAT Coaching?
Defining expert GMAT coaching and its role in assisting students with GMAT preparation.
Explaining how expert GMAT coaches provide personalized guidance and support to help students achieve their target scores.
Benefits of Expert GMAT Coaching:
Highlighting the advantages of enrolling in expert GMAT coaching, such as tailored study plans and access to experienced instructors.
Discussing how expert GMAT coaching can increase confidence and improve test-taking strategies.
Personalized Study Plans:
Importance of personalized study plans tailored to individual students' strengths and weaknesses.
How expert GMAT coaches assess students' skills and create customized study schedules to optimize their preparation.
Access to Experienced Instructors:
Value of accessing experienced GMAT instructors who can provide expert guidance and support.
Discussion on how expert GMAT coaches leverage their knowledge and expertise to help students succeed.
Comprehensive Study Materials:
Importance of having access to comprehensive study materials, including textbooks, practice tests, and online resources.
How expert GMAT coaching programs offer curated study materials designed to cover all aspects of the GMAT exam.
Practice Tests and Simulations:
Role of practice tests and simulations in simulating real GMAT exam conditions and building test-taking skills.
Availability of practice tests and simulations through expert GMAT coaching programs to help students assess their progress and identify areas for improvement.
Time Management Strategies:
Strategies for managing time effectively during the GMAT exam, including pacing techniques and prioritization strategies.
Guidance on time management provided by expert GMAT coaches to help students maximize their performance on test day.
Verbal and Quantitative Reasoning Strategies:
Strategies for approaching verbal and quantitative reasoning questions on the GMAT.
How expert GMAT coaches offer targeted instruction to help students strengthen their reasoning skills.
Analytical Writing Support:
Tips and techniques for improving analytical writing skills and crafting compelling essays for the GMAT.
Support and feedback offered by expert GMAT coaches to help students excel in the analytical writing section of the exam.
Flexibility and Convenience:
Flexibility and convenience offered by expert GMAT coaching programs, allowing students to access resources and support from anywhere, at any time.
Availability of online platforms and flexible scheduling options through expert GMAT coaching programs to accommodate students' busy schedules.
Progress Tracking:
Methods for tracking progress and assessing readiness for the GMAT exam, including diagnostic tests and progress assessments.
Tools and resources provided by expert GMAT coaches to help students monitor their progress and adjust their study plans accordingly.
Overcoming Test Anxiety:
Techniques for managing test anxiety and staying calm and focused during the GMAT exam.
Strategies and support offered by expert GMAT coaches to help students overcome test anxiety and perform their best on test day.
Cost-Effectiveness:
Consideration of the cost-effectiveness of expert GMAT coaching compared to self-study or other preparation methods.
Value-added services and resources offered at competitive prices by expert GMAT coaching programs to help students maximize their investment in GMAT preparation.
Test-Day Support:
Importance of having support on test day, including tips for navigating test center logistics and managing test-day stress.
Guidance and support provided by expert GMAT coaches to help students feel confident and prepared on test day.
Test Retake Strategies:
Strategies for students considering retaking the GMAT exam to improve their scores.
Tailored support and resources offered by expert GMAT coaches to help students develop effective retake strategies and achieve their target scores.
Making an Informed Decision:
Key considerations for students weighing the option of enrolling in expert GMAT coaching.
Encouragement for students to research and compare different expert GMAT coaching programs to find the best fit for their needs and goals.
Conclusion: Excel on the GMAT with Expert GMAT Coaching
Consider the invaluable support and guidance that expert GMAT coaching can provide. From personalized study plans and access to experienced instructors to comprehensive study materials and test-day support, expert GMAT coaching programs offer everything you need to succeed on the exam. By enrolling in expert GMAT coaching, you can optimize your preparation efforts, boost your confidence, and maximize your chances of achieving your target GMAT score. So, take advantage of expert GMAT coaching and pave the way for your future success in business school and beyond.
| alijutt_seo_a59e5d5e3087f | |
1,873,752 | I built an open-source multi-platforms Note-taking app using Reactjs and Tauri | Hi everyone, It's Hudy again. Almost a month ago, I shared my open-source project manager with you... | 0 | 2024-06-03T17:40:55 | https://dev.to/hudy9x/i-built-a-note-taking-app-for-2-years-ago-and-released-it-open-source-2m0j | react, tauri | Hi everyone, It's Hudy again.
Almost a month ago, I shared [my open-source project manager](https://dev.to/hudy9x/i-built-a-free-open-source-project-manager-that-helps-teams-keep-costs-under-15month-3pmk) with you guys. And it got a lot of attention from community. Besides, I received valuable comments from you all which helped me improve the app significantly.
So, today I'd love to share another open-source project with you: my Note-taking app that I built 2 years ago.
It's a simple note-taking app designed for personal use. You can find it's features here [kompad.vercel.app](https://kompad.vercel.app/). And here's the Github [repository](https://github.com/hudy9x/kompad)
> Note: This app is open-source and free to use. However, it hasn't received updates in the past few months.
[](https://kompad.vercel.app/)
## What frameworks did i use
Reactjs was still my favorite frontend framework that time. Additionally I discovered Tauri - an app construction toolkit that lets you build software for all major desktop operating system. This combination was fantastic for building multi-platform applications using Web technologies.
- [Tauri](https://tauri.app/v1/guides/getting-started/setup/)
- Reactjs
- [Tiptap](https://tiptap.dev/docs/editor/installation) - a toolkit for building rich text WYSIWYG editors
- Firebase (Authentication + Firestore + Storage)
- [Algolia](https://www.algolia.com/) - Full text search
## Why Tauri, but Electronjs ?
Before I discovered Tauri, I tried Electron.js, which was incredibly easy to use and develop with. However, the resulting app file size was massive, exceeding 500mb. This significant size prompted me to explore alternatives, ultimately leading me to Tauri.
Tauri not only produces significantly smaller applications files compared to Electron.js (which relies on Node.js)but, it also leverages Rust for it's core functionality. After testing out, I was convinced it was the perfect choice for building this app.
## What features did it have
I initially thought I only needed a few basic features, but that turned out I was wrong. As development progressed, I kept coming up with new features I wanted to add. Let's take a look at what I ended up building.
### Markdown support and Search
As a developer, markdown was a must-have feature for the app. Next is the search function. Since Firestore doesn't support full-text search, I utilized Algolia for this functionality.

### Code highlight
The second must-have feature was code highlighting. Because I take a lot of notes on code snippets, tutorials, and tech articles.

### Shortcuts
Being a Neovim user, I dislike using the mouse while writing or coding. Therefore, shortcuts were the third essential feature.

### Folder, Tags and Favorites
This feature allows users to create folders, tags, and add notes to favorites for easy organization by category.

### Word counting
Sometimes I want to know how many words I've written and how long it would take to read the note.

### Theme collection
A beautiful app motivates me to write. So, dark/light mode wasn't enough. It needed the ability to create and customize new themes.

### Synced to Other devices
Of course, it also syncs updates to other devices. Updating a note on the Windows app will immediately sync it to the Web app, thanks to Firebase Firestore.
If it didn't sync, that would be a bug, not a feature! LOL
### Support Windows, Linux, Macos, Web, PWA
I use Windows and macOS at the office and Linux at home. So, the app had to be multi-platform. It might sound strange, but in the office, I use macOS for coding and Windows for a local server. Sometimes I use it for coding, sometimes not.
### Auto updates
Whenever the app has new updates, a small circle icon appears on the bottom left sidebar. You can then choose to update or not.

### Basic Content Encryption
This feature encrypts your notes before saving them to the database. This makes your content difficult to read without your decryption code.

## How to install
To run the app on your specific operating system, you'll need to install Tauri and build the app yourself. My friend has written a detailed installation guide [here](https://github.com/hudy9x/kompad/tree/main/docs). Please let me know if you encounter any issues with the guide or if it seems outdated.
> Important Note: Configuring authentication and rules for Firebase requires some prior experience with the platform.
## Conclusion
Building open-source projects hones my coding and writing. I'm excited to share this app! Feedback on the app or installation guide is highly appreciated. Stay tuned for more projects coming soon!
| hudy9x |
1,875,626 | Manual de uso Immigrant - Jira | Visão geral O Immigrant - Jira é uma abordagem baseada em ontologia que auxilia na... | 0 | 2024-06-03T17:40:28 | https://dev.to/dadecoelho/manual-de-uso-immigrant-jira-4m86 | ledscommunity | ## Visão geral
O Immigrant - Jira é uma abordagem baseada em ontologia que auxilia na identificação das necessidades de informação da organização, recuperando dados do Jira e fornecendo dados integrados que atendam às necessidades de informação.
### Pré-requisitos
1- Python
2- Docker
3- Java 17
## Infraestrutura
Fornece a infraestrutura base necessária para rodar o projeto.
### Passo a Passo
1- **Clone o repositório:**
```bash
git clone https://gitlab.com/immigrant-data-driven-development/infrastructure/base-infrastructure.git
cd base-infrastructure
```
2- **Crie um arquivo `.env` com o seguinte conteúdo:**
```env
DEBEZIUM_VERSION=2.0
COMPOSE_PROJECT_NAME=immigrant-cdc-infrastructure
```
3- **Inicialize o Docker:**
```bash
docker-compose up
```
4- **Verifique a aplicação na URL:** [http://localhost:19000](http://localhost:19000)
---
## Jira Extractor
O Jira Extractor é uma ferramenta para extrair dados do Jira. Ele utiliza a biblioteca jiraX para a extração e Apache Kafka para colocar os dados em uma fila.
### Passo a Passo
1- **Clone o repositório:**
```bash
git clone https://gitlab.com/immigrant-data-driven-development/etl/extract/jira-extract.git
cd jira-extract
```
2- **Crie um arquivo `.env` com o seguinte conteúdo:**
```env
TOPIC=application.jira.extract
SERVERS=kafka:29092
GROUP_ID=extract_jira_group
URL={url do projeto}
USERNAME={seu email}
SECRET={api token}
```
3- **Inicialize o Docker:**
```bash
docker-compose up
```
4- **Testando com o `producer.py`:**
- **Crie e ative um ambiente virtual Python:**
```bash
python -m venv env
source env/bin/activate
```
- **Instale as dependências:**
```
pip install -r src/requirements.txt
```
- **Rode o producer:**
```bash
python src/producer.py
```
Exemplo dos dados enviados pelo producer:
```python
data = {
"url":config('URL'),
"username": config('USERNAME'),
"secret": config('SECRET'),
}
```
5- **Verifique os tópicos gerados na URL:** [http://localhost:19000](http://localhost:19000)

---
## SRO - Transform and Load
É o componente responsável por mapear o modelo do Jira para o banco de dados SRO.
### Passo a Passo
1- **Execute o serviço do Transform and Load:**
- **Clone o repositório:**
```bash
git clone https://gitlab.com/immigrant-data-driven-development/services/domain/sro.git
cd sro/webservice
```
- **Execute o serviço:**
```bash
docker-compose up
```
ou
```bash
mvn clean install
mvn spring-boot:run
```
2- **Execute o Transform and Load:**
- **Clone o repositório:**
```bash
git clone https://gitlab.com/immigrant-data-driven-development/etl/transform-and-load/sro.git
cd sro
```
- **Crie um arquivo `.env` com o seguinte conteúdo:**
```env
KAFKA_SERVER=kafka
KAFKA_PORT=29092
DB_URL=db-pg
DB_PORT=5432
DB_NAME=sro
DB_USERNAME=postgres
DB_PASSWORD=postgres
SERVER_ETL_PORT=8091
MONGO_HOST=mongo
MONGO_DB=sro
MONGO_PORT=27017
```
- **Execute o Transform and Load:**
```bash
docker-compose up
```
ou
```bash
mvn clean install
mvn spring-boot:run
```
3- **Verifique se os dados esperados estão no banco postgres gerado.**
Exemplo de projeto convertido para o banco de dados SRO

[Link do repositório do Immigrant](https://gitlab.com/immigrant-data-driven-development)
Neste repositório temos o Immigrant de forma completa. | dadecoelho |
1,872,956 | Deletes and MVCC in YugabyteDB | An application pattern that could cause issues with Multi-Version Concurrent Control (MVCC) databases... | 27,563 | 2024-06-03T17:40:27 | https://dev.to/yugabyte/deletes-and-mvcc-in-yugabytedb-12ip | yugabytedb, distributed, sql, postgres | An application pattern that could cause issues with Multi-Version Concurrent Control (MVCC) databases is a queuing table with frequent insertions and deletions. Since all reads are based on a consistent snapshot, rows are not physically deleted, allowing the system to retrieve the state at any point since the start of the longest transaction. By default, YugabyteDB retains these intermediate versions for 15 minutes. A delete is simply a new version with a deletion marker, often called a tombstone.
In some MVCC implementations, the dequeue job may need to scan previously deleted rows before finding one that is visible to the current read time. This can increase processing times.
In YugabyteDB, all versions of a key are stored together, with the Hybrid Logical Clock timestamp appended to the key when stored in the LSM Tree. The order of the key determines whether you start scanning from the oldest (First-In-First-Out), which may include deleted rows, or from the newest (Last-In-First-Out), which may include newly inserted rows.
Here is a simple demonstration of the two cases. I use an identifier generated from a sequence to obtain an approximate ordering, but you can also use a timestamp.
## Example
```sh
git clone git@github.com:FranckPachot/yb-metrics-lab.git
cd yb-metrics-lab
docker compose run --rm -it pgbench bash
```
I have a simple table that queues payloads for an account:
```sql
yugabyte=# \d job_queue
Table "public.job_queue"
Column | Type | Collation | Nullable | Default
------------+---------+-----------+----------+------------------------------
id | bigint | | not null | generated always as identity
account_id | integer | | not null |
payload | text | | |
```
I'll use the following scripts to enqueue (insert) and dequeue (select for update skip locked and delete) from this table:
```sql
cat > enqueue.sql <<'SQL'
insert into job_queue(account_id) values(0);
SQL
cat > dequeue.sql <<'SQL'
begin transaction;
select account_id, id, payload, 1 as found from job_queue
where account_id=0
for update skip locked limit 1
\gset
delete from job_queue
where account_id=:account_id and id=:id;
commit;
SQL
```
## First-In-First-Out (FIFO)
I created my table with the primary key in the same ascending order as the sequence-generated ID:
```sql
drop table if exists job_queue;
create table job_queue (
primary key (account_id, id asc)
, id bigint generated always as identity
, account_id int
, payload text
);
```
I run the enqueue from one session and, starting one minute later, the dequeue from ten sessions:
```sh
# enqueue job
pgbench --rate=100 -nf enqueue.sql -T 3600 & sleep 60
# dequeue job
pgbench --client=10 -nf dequeue.sql -T 3600 -P 60
```
Here is the PgBench progression for dequeue, slowing down because of increasing latency:
```sh
pgbench (16.3 (Debian 16.3-1.pgdg120+1), server 11.2-YB-2.21.0.1-b0)
pgbench (16.3 (Debian 16.3-1.pgdg120+1), server 11.2-YB-2.21.0.1-b0)
progress: 60.0 s, 146.7 tps, lat 67.712 ms stddev 72.708, 0 failed
progress: 120.0 s, 77.5 tps, lat 129.086 ms stddev 133.242, 0 failed
progress: 180.0 s, 60.6 tps, lat 164.808 ms stddev 161.830, 0 failed
progress: 240.0 s, 51.4 tps, lat 194.510 ms stddev 181.549, 0 failed
progress: 300.0 s, 45.5 tps, lat 219.726 ms stddev 196.644, 0 failed
progress: 360.0 s, 41.4 tps, lat 241.760 ms stddev 206.806, 0 failed
progress: 420.0 s, 37.9 tps, lat 263.482 ms stddev 214.651, 0 failed
progress: 480.0 s, 35.3 tps, lat 283.004 ms stddev 219.732, 0 failed
progress: 540.0 s, 33.8 tps, lat 295.915 ms stddev 225.483, 0 failed
progress: 600.0 s, 31.9 tps, lat 313.742 ms stddev 225.922, 0 failed
progress: 660.0 s, 30.7 tps, lat 325.523 ms stddev 231.293, 0 failed
progress: 720.0 s, 29.4 tps, lat 340.384 ms stddev 234.496, 0 failed
progress: 780.0 s, 28.5 tps, lat 351.654 ms stddev 235.606, 0 failed
progress: 840.0 s, 27.3 tps, lat 366.428 ms stddev 235.558, 0 failed
progress: 900.0 s, 26.7 tps, lat 374.767 ms stddev 235.163, 0 failed
progress: 960.0 s, 25.6 tps, lat 389.821 ms stddev 238.707, 0 failed
progress: 1020.0 s, 25.4 tps, lat 394.482 ms stddev 238.515, 0 failed
progress: 1080.0 s, 24.5 tps, lat 408.922 ms stddev 239.427, 0 failed
progress: 1140.0 s, 23.9 tps, lat 418.647 ms stddev 236.840, 0 failed
progress: 1200.0 s, 23.6 tps, lat 422.421 ms stddev 237.729, 0 failed
progress: 1260.0 s, 23.1 tps, lat 433.824 ms stddev 238.868, 0 failed
progress: 1320.0 s, 22.7 tps, lat 441.515 ms stddev 238.022, 0 failed
progress: 1380.0 s, 22.0 tps, lat 454.995 ms stddev 236.985, 0 failed
progress: 1440.0 s, 19.5 tps, lat 514.327 ms stddev 229.819, 0 failed
progress: 1500.0 s, 19.2 tps, lat 519.461 ms stddev 234.298, 0 failed
progress: 1560.0 s, 19.0 tps, lat 528.162 ms stddev 229.675, 0 failed
progress: 1620.0 s, 18.7 tps, lat 534.814 ms stddev 230.564, 0 failed
progress: 1680.0 s, 18.2 tps, lat 548.424 ms stddev 227.151, 0 failed
progress: 1740.0 s, 18.1 tps, lat 553.188 ms stddev 228.198, 0 failed
progress: 1800.0 s, 17.7 tps, lat 565.126 ms stddev 229.877, 0 failed
progress: 1860.0 s, 17.5 tps, lat 569.887 ms stddev 229.138, 0 failed
progress: 1920.0 s, 17.6 tps, lat 569.976 ms stddev 232.376, 0 failed
progress: 1980.0 s, 17.2 tps, lat 580.405 ms stddev 232.279, 0 failed
progress: 2040.0 s, 17.4 tps, lat 575.567 ms stddev 229.492, 0 failed
progress: 2100.0 s, 17.1 tps, lat 585.600 ms stddev 227.470, 0 failed
progress: 2160.0 s, 17.0 tps, lat 588.600 ms stddev 226.274, 0 failed
progress: 2220.0 s, 16.8 tps, lat 597.306 ms stddev 230.114, 0 failed
progress: 2280.0 s, 16.7 tps, lat 599.443 ms stddev 224.922, 0 failed
progress: 2340.0 s, 16.4 tps, lat 612.358 ms stddev 221.710, 0 failed
progress: 2400.0 s, 16.5 tps, lat 607.770 ms stddev 222.975, 0 failed
progress: 2460.0 s, 16.3 tps, lat 613.478 ms stddev 223.859, 0 failed
progress: 2520.0 s, 16.2 tps, lat 619.936 ms stddev 227.354, 0 failed
progress: 2580.0 s, 16.2 tps, lat 615.391 ms stddev 221.524, 0 failed
progress: 2640.0 s, 15.9 tps, lat 628.707 ms stddev 215.744, 0 failed
progress: 2700.0 s, 15.8 tps, lat 633.731 ms stddev 209.020, 0 failed
progress: 2760.0 s, 15.4 tps, lat 646.383 ms stddev 209.972, 0 failed
progress: 2820.0 s, 15.5 tps, lat 645.852 ms stddev 211.241, 0 failed
progress: 2880.0 s, 15.3 tps, lat 655.629 ms stddev 205.603, 0 failed
progress: 2940.0 s, 15.0 tps, lat 665.360 ms stddev 207.632, 0 failed
progress: 3000.0 s, 15.3 tps, lat 655.442 ms stddev 204.249, 0 failed
progress: 3060.0 s, 14.8 tps, lat 672.804 ms stddev 202.524, 0 failed
progress: 3120.0 s, 14.6 tps, lat 683.751 ms stddev 190.039, 0 failed
progress: 3180.0 s, 14.7 tps, lat 681.479 ms stddev 198.928, 0 failed
progress: 3240.0 s, 14.4 tps, lat 696.753 ms stddev 199.672, 0 failed
progress: 3300.0 s, 14.0 tps, lat 708.999 ms stddev 195.875, 0 failed
progress: 3360.0 s, 14.0 tps, lat 717.781 ms stddev 198.667, 0 failed
progress: 3420.0 s, 13.9 tps, lat 719.463 ms stddev 201.397, 0 failed
progress: 3480.0 s, 13.5 tps, lat 736.315 ms stddev 199.684, 0 failed
```
The total statistics for enqueue:
```
transaction type: enqueue.sql
scaling factor: 1
progress: 3540.0 s, 13.7 tps, lat 728.964 ms stddev 208.056, 0 failed
query mode: simple
number of clients: 1
number of threads: 1
maximum number of tries: 1
duration: 3600 s
number of transactions actually processed: 360418
number of failed transactions: 0 (0.000%)
latency average = 9.583 ms
latency stddev = 18.288 ms
rate limit schedule lag: avg 4.668 (max 475.122) ms
initial connection time = 24.256 ms
tps = 100.116656 (without initial connection time)
progress: 3600.0 s, 14.1 tps, lat 707.956 ms stddev 195.490, 0 failed
```
and the total for dequeue:
```
transaction type: dequeue.sql
scaling factor: 1
query mode: simple
number of clients: 10
number of threads: 1
maximum number of tries: 1
duration: 3600 s
number of transactions actually processed: 89663
number of failed transactions: 0 (0.000%)
latency average = 401.490 ms
latency stddev = 290.233 ms
initial connection time = 235.231 ms
tps = 24.905485 (without initial connection time)
```
I gathered a few statistics from my Grafana dashboard (IntentsDB is in Red-Yellow, RegularDB in Blue-Purple):


## Last-In-First-Out (LIFO)
I re-created my table with the primary key in descending order, which is the opposite of how it is generated by the sequence:
```sql
drop table if exists job_queue;
create table job_queue (
primary key (account_id, id desc)
, id bigint generated always as identity
, account_id int
, payload text
);
```
I run the same as before except that I also rate-limit the dequeue because I expect it to be faster and want to avoid pgbench failing with `expected one row, got 0`:
```sh
# enqueue job
pgbench --rate=100 -nf enqueue.sql -T 3600 & sleep 60
# dequeue job
pgbench --rate=100 --client=10 -nf dequeue.sql -T 3600 -P 60
```
Here is the PgBench progression for dequeue, which always keep-up with the enqueue rate and with acceptable latency:
```sh
pgbench --rate=100 --client=10 -nf dequeue.sql -T 3600 -P 60
pgbench (16.3 (Debian 16.3-1.pgdg120+1), server 11.2-YB-2.21.0.1-b0)
pgbench (16.3 (Debian 16.3-1.pgdg120+1), server 11.2-YB-2.21.0.1-b0)
progress: 60.0 s, 98.7 tps, lat 8.064 ms stddev 9.179, 0 failed, lag 0.127 ms
progress: 120.0 s, 95.9 tps, lat 9.373 ms stddev 8.582, 0 failed, lag 0.100 ms
progress: 180.0 s, 99.5 tps, lat 11.545 ms stddev 12.404, 0 failed, lag 0.099 ms
progress: 240.0 s, 100.5 tps, lat 13.966 ms stddev 17.003, 0 failed, lag 0.100 ms
progress: 300.0 s, 99.0 tps, lat 16.370 ms stddev 23.553, 0 failed, lag 0.115 ms
progress: 360.0 s, 98.6 tps, lat 20.362 ms stddev 34.356, 0 failed, lag 0.833 ms
progress: 420.0 s, 101.7 tps, lat 28.105 ms stddev 57.121, 0 failed, lag 1.556 ms
progress: 480.0 s, 101.0 tps, lat 27.464 ms stddev 48.073, 0 failed, lag 0.258 ms
progress: 540.0 s, 98.9 tps, lat 25.940 ms stddev 42.101, 0 failed, lag 0.141 ms
progress: 600.0 s, 102.1 tps, lat 63.286 ms stddev 125.027, 0 failed, lag 14.132 ms
progress: 660.0 s, 100.7 tps, lat 37.192 ms stddev 72.409, 0 failed, lag 1.475 ms
progress: 720.0 s, 99.1 tps, lat 39.608 ms stddev 77.520, 0 failed, lag 0.488 ms
progress: 780.0 s, 99.9 tps, lat 44.945 ms stddev 86.302, 0 failed, lag 1.237 ms
progress: 840.0 s, 98.5 tps, lat 43.786 ms stddev 79.889, 0 failed, lag 0.386 ms
progress: 900.0 s, 100.6 tps, lat 62.501 ms stddev 126.731, 0 failed, lag 1.846 ms
progress: 960.0 s, 101.6 tps, lat 72.515 ms stddev 151.758, 0 failed, lag 6.916 ms
progress: 1020.0 s, 98.7 tps, lat 66.117 ms stddev 130.873, 0 failed, lag 2.217 ms
progress: 1080.0 s, 99.6 tps, lat 70.434 ms stddev 143.450, 0 failed, lag 1.957 ms
progress: 1140.0 s, 99.7 tps, lat 82.825 ms stddev 176.040, 0 failed, lag 9.100 ms
progress: 1200.0 s, 100.5 tps, lat 76.087 ms stddev 162.944, 0 failed, lag 4.043 ms
progress: 1260.0 s, 100.7 tps, lat 94.963 ms stddev 204.738, 0 failed, lag 15.627 ms
progress: 1320.0 s, 99.9 tps, lat 82.451 ms stddev 170.476, 0 failed, lag 4.002 ms
progress: 1380.0 s, 99.1 tps, lat 79.145 ms stddev 170.828, 0 failed, lag 2.622 ms
progress: 1440.0 s, 99.8 tps, lat 84.359 ms stddev 180.998, 0 failed, lag 3.621 ms
progress: 1500.0 s, 99.8 tps, lat 84.317 ms stddev 183.958, 0 failed, lag 4.569 ms
progress: 1560.0 s, 101.2 tps, lat 82.745 ms stddev 183.122, 0 failed, lag 3.603 ms
progress: 1620.0 s, 98.4 tps, lat 82.990 ms stddev 181.972, 0 failed, lag 3.662 ms
progress: 1680.0 s, 99.8 tps, lat 86.107 ms stddev 192.065, 0 failed, lag 4.773 ms
progress: 1740.0 s, 99.9 tps, lat 88.515 ms stddev 198.305, 0 failed, lag 5.556 ms
progress: 1800.0 s, 100.9 tps, lat 96.506 ms stddev 231.509, 0 failed, lag 8.763 ms
progress: 1860.0 s, 100.6 tps, lat 100.779 ms stddev 222.100, 0 failed, lag 14.758 ms
progress: 1920.0 s, 99.0 tps, lat 95.487 ms stddev 233.232, 0 failed, lag 7.288 ms
progress: 1980.0 s, 102.2 tps, lat 113.076 ms stddev 266.697, 0 failed, lag 25.122 ms
progress: 2040.0 s, 99.9 tps, lat 93.044 ms stddev 225.485, 0 failed, lag 6.309 ms
progress: 2100.0 s, 99.2 tps, lat 93.029 ms stddev 220.702, 0 failed, lag 5.438 ms
progress: 2160.0 s, 99.0 tps, lat 97.459 ms stddev 234.508, 0 failed, lag 8.769 ms
progress: 2220.0 s, 99.6 tps, lat 96.281 ms stddev 227.267, 0 failed, lag 8.618 ms
progress: 2280.0 s, 99.9 tps, lat 92.199 ms stddev 222.713, 0 failed, lag 5.039 ms
progress: 2340.0 s, 101.5 tps, lat 102.342 ms stddev 260.968, 0 failed, lag 12.282 ms
progress: 2400.0 s, 102.8 tps, lat 101.874 ms stddev 279.425, 0 failed, lag 12.277 ms
progress: 2460.0 s, 100.0 tps, lat 101.566 ms stddev 261.376, 0 failed, lag 12.693 ms
progress: 2520.0 s, 101.0 tps, lat 146.805 ms stddev 329.037, 0 failed, lag 54.946 ms
progress: 2580.0 s, 98.5 tps, lat 186.116 ms stddev 369.730, 0 failed, lag 98.700 ms
progress: 2640.0 s, 100.2 tps, lat 62.095 ms stddev 119.576, 0 failed, lag 2.023 ms
progress: 2700.0 s, 99.5 tps, lat 71.383 ms stddev 143.084, 0 failed, lag 4.054 ms
progress: 2760.0 s, 100.0 tps, lat 73.186 ms stddev 148.095, 0 failed, lag 1.882 ms
progress: 2820.0 s, 100.3 tps, lat 80.258 ms stddev 169.544, 0 failed, lag 5.936 ms
progress: 2880.0 s, 98.6 tps, lat 75.789 ms stddev 161.448, 0 failed, lag 2.136 ms
progress: 2940.0 s, 103.7 tps, lat 203.515 ms stddev 293.579, 0 failed, lag 118.073 ms
progress: 3000.0 s, 101.9 tps, lat 149.085 ms stddev 263.196, 0 failed, lag 66.254 ms
progress: 3060.0 s, 99.3 tps, lat 78.714 ms stddev 165.887, 0 failed, lag 3.332 ms
progress: 3120.0 s, 100.6 tps, lat 83.259 ms stddev 182.955, 0 failed, lag 4.556 ms
progress: 3180.0 s, 98.1 tps, lat 82.884 ms stddev 181.662, 0 failed, lag 3.129 ms
progress: 3240.0 s, 99.9 tps, lat 83.095 ms stddev 183.558, 0 failed, lag 2.576 ms
progress: 3300.0 s, 100.0 tps, lat 85.494 ms stddev 194.323, 0 failed, lag 4.479 ms
progress: 3360.0 s, 98.2 tps, lat 84.920 ms stddev 193.003, 0 failed, lag 2.676 ms
progress: 3420.0 s, 101.4 tps, lat 86.418 ms stddev 204.487, 0 failed, lag 3.915 ms
progress: 3480.0 s, 98.9 tps, lat 91.951 ms stddev 213.238, 0 failed, lag 5.161 ms
```
The total statistics for the enqueue job:
```
transaction type: enqueue.sql
scaling factor: 1
query mode: simple
number of clients: 1
number of threads: 1
maximum number of tries: 1
duration: 3600 s
number of transactions actually processed: 359955
number of failed transactions: 0 (0.000%)
latency average = 6.192 ms
latency stddev = 4.475 ms
rate limit schedule lag: avg 2.012 (max 73.152) ms
initial connection time = 21.283 ms
tps = 99.988027 (without initial connection time)
progress: 3540.0 s, 101.9 tps, lat 98.697 ms stddev 234.471, 0 failed, lag 12.376 ms
progress: 3600.0 s, 13.6 tps, lat 19861.627 ms stddev 15905.049, 0 failed, lag 19125.271 ms
```
and for the dequeue job:
```
transaction type: dequeue.sql
scaling factor: 1
query mode: simple
number of clients: 10
number of threads: 1
maximum number of tries: 1
duration: 3600 s
number of transactions actually processed: 354818
number of failed transactions: 0 (0.000%)
latency average = 124.958 ms
latency stddev = 1261.227 ms
rate limit schedule lag: avg 55.943 (max 51818.490) ms
initial connection time = 207.699 ms
tps = 98.550957 (without initial connection time)
```
My Grafana dashboard shows that this higher throughput and lower latency didn't use more resources in terms of terms of LSM Tree seek/next or memory:

It experienced fewer read restarts:

It's not easy to recommend a one-size-fits-all design for queuing tables in SQL databases because it depends on how the application performs the queuing and dequeuing. The goal of this post was to demonstrate some patterns and show how to test them. One specificity of MVCC databases is that they must keep the deleted rows for a while, and you should avoid scanning through an increasing number of them.
| franckpachot |
1,857,858 | CDI scope | Java'da CDI (Contexts and Dependency Injection) scope, bir bean'in yaşam süresini ve hangi durumlarda... | 0 | 2024-05-18T20:15:45 | https://dev.to/mustafacam/cdi-scope-3m2d | Java'da CDI (Contexts and Dependency Injection) scope, bir bean'in yaşam süresini ve hangi durumlarda yeni bir instance'ın oluşturulacağını belirleyen bir mekanizmadır. CDI scope'lar, bean'lerin uygulama içindeki farklı kullanım senaryolarına göre nasıl yönetileceğini tanımlar¹.
CDI'de kullanılan bazı yaygın scope'lar şunlardır:
- **@RequestScoped**: Bean, bir HTTP isteği boyunca yaşar ve her yeni istek için yeni bir instance oluşturulur².
- **@SessionScoped**: Bean, bir kullanıcının HTTP oturumu boyunca yaşar ve oturum sona erene kadar aynı instance kullanılır².
- **@ApplicationScoped**: Bean, tüm uygulama boyunca yaşar ve tüm kullanıcılar arasında paylaşılır. Uygulama çalıştığı sürece tek bir instance oluşturulur ve bu instance tüm kullanıcılar tarafından kullanılır².
- **@Dependent**: Varsayılan scope'dur. Bean, bir başka bean'e bağımlı olarak yaşar ve onun yaşam döngüsüne bağlıdır. Yani, bağımlı bean ne zaman yaratılırsa ya da yok edilirse, dependent scope'daki bean de o zaman yaratılır veya yok edilir².
- **@ConversationScoped**: Bean, bir kullanıcının birden fazla istek boyunca yürüttüğü bir "konuşma" süresince yaşar. Konuşma kapsamı, geliştirici tarafından kontrol edilen sınırlar içinde birden fazla istek boyunca uzatılabilir².
Bu scope'lar, bean'lerin oluşturulması, kullanılması ve yok edilmesi süreçlerini yönetir ve uygulamanın performansını ve bellek kullanımını optimize etmeye yardımcı olur. Ayrıca, uygulamanın farklı bölümlerindeki bean'lerin birbiriyle nasıl etkileşime gireceğini de belirler¹².
Kaynak: Bing ile konuşma, 18.05.2024
(1) An Introduction to CDI in Java | Baeldung. https://www.baeldung.com/java-ee-cdi.
(2) 23.8 Using Scopes - Java Platform, Enterprise Edition: The Java EE .... https://docs.oracle.com/javaee/7/tutorial/cdi-basic008.htm.
(3) Java EE CDI bean scopes - Java Code Geeks. https://www.javacodegeeks.com/2013/04/java-ee-cdi-bean-scopes.html.
(4) Using Scopes - The Java EE 6 Tutorial - Oracle. https://docs.oracle.com/javaee/6/tutorial/doc/gjbbk.html.
(5) undefined. http://java.sun.com/xml/ns/javaee.
(6) undefined. http://www.w3.org/2001/XMLSchema-instance.
(7) undefined. http://java.sun.com/xml/ns/javaee/beans_1_0.xsd. | mustafacam | |
1,875,713 | Understanding Web Hosting: A Comprehensive Guide | Web hosting is a fundamental component of the internet, serving as the backbone for websites and... | 0 | 2024-06-03T17:40:13 | https://dev.to/harry_jack_5bec57012370cf/understanding-web-hosting-a-comprehensive-guide-obo | webhosting, webhostingservices | Web hosting is a fundamental component of the internet, serving as the backbone for websites and online applications. For anyone looking to establish an online presence, understanding web hosting is crucial. This guide will delve into what web hosting is, the types of web hosting available, and how to choose the right web hosting service for your needs.
What is Web Hosting?
**[Web hosting](https://riteanswers.com/domain-and-hosting)** refers to the service that allows individuals and organizations to make their websites accessible via the World Wide Web. Web hosting providers supply the technologies and services needed for a website or webpage to be viewed on the internet. Websites are hosted, or stored, on special computers called servers. When internet users want to view your website, all they need to do is type your website address or domain into their browser. Their computer will then connect to your server and your web pages will be delivered to them through the browser.
Types of Web Hosting
Shared Hosting: This is the most common and affordable type of web hosting. In shared hosting, multiple websites share a single server's resources, including bandwidth, storage, and processing power. It's ideal for small websites and blogs with low to moderate traffic.
VPS Hosting: Virtual Private Server (VPS) hosting provides a middle ground between shared hosting and dedicated hosting. A VPS hosting environment mimics a dedicated server within a shared hosting environment. It is suitable for websites that have grown beyond the limitations of shared hosting.
Dedicated Hosting: With dedicated hosting, you get an entire server to yourself. This type of hosting is best for websites with high traffic volumes or those requiring substantial resources. It offers the highest level of performance, security, and control.
Cloud Hosting: Cloud hosting uses a network of servers to ensure maximum uptime and scalability. This type of hosting is perfect for websites that experience fluctuating traffic levels, as it allows for resources to be allocated dynamically based on demand.
Managed Hosting: In managed hosting, the hosting provider takes care of all server-related issues, including maintenance, security, and updates. This option is excellent for those who do not have the technical expertise to manage a server or who prefer to focus on their core business activities.
Choosing the Right Web Hosting Service
When selecting a **[web hosting service](https://riteanswers.com/domain-and-hosting)**, consider the following factors:
Performance: Look for hosting services that guarantee high uptime and fast load times.
Security: Ensure that the hosting provider offers robust security measures, including SSL certificates and regular backups.
Support: Opt for providers that offer 24/7 customer support to help resolve any issues promptly.
Scalability: Choose a hosting service that can grow with your website, offering options to upgrade resources as needed.
Cost: Compare the pricing plans of different providers to find one that offers good value for your specific requirements.
Understanding the various aspects of web hosting will enable you to make an informed decision that best suits your website's needs. Whether you're starting a personal blog or running a large e-commerce site, the right web hosting service is critical to your online success.
| harry_jack_5bec57012370cf |
1,872,201 | Routing in Umbraco Part 2: Content Finders | The previous article in this series demoed how to adjust segments for your Umbraco nodes using an... | 27,570 | 2024-06-03T17:39:42 | https://dev.to/hartviglarsen/routing-in-umbraco-part-2-content-finders-4j0i | umbraco, dotnet, routing, cms | The [previous article](https://dev.to/hartviglarsen/routing-in-umbraco-part-1-url-segments-4lmj) in this series demoed how to adjust segments for your Umbraco nodes using an `IUrlSegmentProvider`. When an altered segment is returned in an `IUrlSegmentProvider` it becomes a _native_ segment that Umbraco can handle out of the box and no further URL manipulation/rewrite is required.
But.. what if you wanted to change the path? Say, for example, you have a blog and you want to automatically have the year of the blog post's creation inserted in the URL, such as `/blog/hello-world` should become `/blog/2024/hello-world`. This is where an `IContentFinder` comes in.
When you alter part of a node's _path_ and not simply the _segment_, Umbraco will need some help mapping the [inbound request](https://docs.umbraco.com/umbraco-cms/reference/routing/request-pipeline) to the node, as the new path assigned to the node is not natively known by Umbraco.
This article will show how to provide a new path for a node and how to return that node for the inbound request.
## Changing the path
Much like an `IUrlSegmentProvider` Umbraco has an `IUrlProvider` that can be implemented for change the URL for your nodes.
The interface has two methods: `GetUrl()` and `GetOtherUrls()`. The latter will let your return other URLs to display in the Backoffice on the node's _Info_ Content App.
Below is an example for `GetUrl()`.
```c#
public class BlogPostUrlProvider : IUrlProvider
{
public UrlInfo? GetUrl(IPublishedContent content, UrlMode mode, string? culture, Uri current)
{
}
public IEnumerable<UrlInfo> GetOtherUrls(int id, Uri current)
{
}
}
```
However, instead of implementing `IUrlProvider`, Umbraco ships with a `DefaultUrlProvider` with a _virtual_ method for both `GetOtherUrls()` and `GetUrl()` that can be overwritten.
```c#
public class BlogPostUrlProvider : DefaultUrlProvider
{
public BlogPostUrlProvider(IOptionsMonitor<RequestHandlerSettings> requestSettings,
ILogger<DefaultUrlProvider> logger,
ISiteDomainMapper siteDomainMapper,
IUmbracoContextAccessor umbracoContextAccessor,
UriUtility uriUtility,
ILocalizationService localizationService) : base(requestSettings, logger, siteDomainMapper, umbracoContextAccessor, uriUtility, localizationService)
{ }
}
```
> Note that `ILocalizationService` is removed in V15. Unfortunately DefaultUrlProvider does not yet have a constructor that accepts ILanguageService. If you want to skip changing the injected interface as part of a V15 upgrade, consider doing a full `IUrlProvider` implementation. Inspiration can be found on [Github](https://github.com/umbraco/Umbraco-CMS/blob/contrib/src/Umbraco.Core/Routing/DefaultUrlProvider.cs).
Change the blog post's `UrlInfo` in `GetUrl()` like so:
```c#
public override UrlInfo? GetUrl(IPublishedContent content, UrlMode mode, string? culture, Uri current)
{
if (content.ContentType.Alias != "blogPost") return null;
var segment = content.UrlSegment;
if (segment is null) return null;
var currentUrlInfo = base.GetUrl(content, mode, culture, current);
if (currentUrlInfo is null) return null;
// To add the post's created year one could
// simply replace the post's segment in the
// URL with year/segment.
var currentUrl = currentUrlInfo.Text;
var customUrl = currentUrl.Replace(segment,
$"{content.CreateDate.Year}/{segment}");
return new UrlInfo(customUrl, true, culture);
}
```
Register the `BlogPostUrlProvider`. `Insert<T>()` accepts an `int index`. When no index is provided it defaults to 0.
```c#
public class BlogPostComposer : IComposer
{
public void Compose(IUmbracoBuilder builder)
{
builder.UrlProviders().Insert<BlogPostUrlProvider>();
}
}
```
Alternatively, if your solution has multiple providers, the provider could be inserted before a specific provider:
```c#
builder.UrlProviders().InsertBefore<DefaultUrlProvider, BlogPostUrlProvider>();
```
The following methods are available for registering your provider. The same goes for `ContentFinders()`:
```c#
builder.UrlProviders().Append<T>();
builder.UrlProviders().Insert<T>(int index = 0);
builder.UrlProviders().Remove<T>();
builder.UrlProviders().InsertAfter<TAfter,T>();
builder.UrlProviders().InsertBefore<TBefore, T>();
```
If you attempt to view the URL in the Backoffice you will notice that it is not working. This is because we have yet to change the inbound request.

## Handling the inbound request
Umbraco will go through all registered `IContentFinder`s until one of them returns true, after which no further `IContentFinder`s are executed.
The goal of an `IContentFinder` is therefore to set an `IPublishedContent` for the request and return `true`, so Umbraco can load the node and stop executing the rest of the `IContentFinder`s.
Create a `BlogPostContentFinder` that implements `IContentFinder` and inject `IUmbracoContextAccessor`.
```c#
public class BlogPostContentFinder : IContentFinder
{
private readonly IUmbracoContextAccessor _contextAccessor;
public BlogPostContentFinder(IUmbracoContextAccessor contextAccessor)
{
_contextAccessor = contextAccessor;
}
public Task<bool> TryFindContent(IPublishedRequestBuilder request)
{
}
}
```
In `TryFindContent()` attempt to find a content node by (in this case) the _route_. Provided there is a match, set it as the published content and return `true`.
```c#
public Task<bool> TryFindContent(IPublishedRequestBuilder request)
{
// Get the path for the current request
var path = request.Uri.GetAbsolutePathDecoded();
// In this example site there will not be other URLs using four digits
// between two slashes, so they can easily be removed safely like so.
// E.g. /blog/2024/hello-world -> /blog/hello-world
var url = Regex.Replace(path, "/[0-9]+/", "/");
if (!_contextAccessor.TryGetUmbracoContext(out var context)) return Task.FromResult(false);
// Attempt to find the content
var content = context.Content?.GetByRoute(url);
if (content is null) return Task.FromResult(false);
// Set it as the published content for the request
request.SetPublishedContent(content);
// Return true to let Umbraco know a match was found
return Task.FromResult(true);
}
```
Register the `BlogPostContentFinder`:
```c#
public class BlogPostComposer : IComposer
{
public void Compose(IUmbracoBuilder builder)
{
builder.UrlProviders().Insert<BlogPostUrlProvider>();
builder.ContentFinders().Append<BlogPostContentFinder>();
}
}
```
Build your solution and publish a blog post and everything should work:


| hartviglarsen |
1,875,712 | What sets this gaming platform apart from other free online Android games that require no download? | This gaming platform have revolutionized the world of free online Android games by offering a unique... | 0 | 2024-06-03T17:36:38 | https://dev.to/claywinston/what-sets-this-gaming-platform-apart-from-other-free-online-android-games-that-require-no-download-l16 | game, mobilegame, androidgames, gamedev | This [**gaming platform**](https://medium.com/@adreeshelk/how-to-play-hundreds-of-games-on-your-lock-screen-without-downloading-anything-4f03e0173441?utm_source=referral&utm_medium=Medium&utm_campaign=Nostra) have revolutionized the world of free online Android games by offering a unique and unparalleled gaming experience that requires no download. Unlike many other platforms that require users to go through the hassle of downloading and installing games, Games are instantly accessible, allowing players to dive into the action with just a simple swipe on their lock screen.
One of the key features that sets this [**gaming platform** ](https://nostra.gg/articles/evolution-of-mobile-games.html?utm_source=referral&utm_medium=article&utm_campaign=Nostra)apart is their seamless integration with Android devices. By leveraging the lock screen functionality, This gaming platform provide a convenient and immersive gaming experience that fits perfectly into users' daily routines. Whether waiting in line, commuting, or taking a short break, players can easily access their favorite this gaming platform without the need for time-consuming downloads or installations.
Moreover, This gaming platform boast an extensive library of high-quality titles across various genres, catering to the diverse interests of Android users. From classic games like sudoku and chess to action-packed adventures like Wothan the Barbarian and Fruit Katana, This gaming platform offer a wide range of [free online Android games](https://medium.com/@adreeshelk/publishing-on-a-robust-gaming-platform-key-considerations-for-developers-1c8888f80d91?utm_source=referral&utm_medium=Medium&utm_campaign=Nostra) that cater to both casual and hardcore gamers.
Another aspect that distinguishes this gaming platform from other free online Android games is their commitment to delivering top-notch graphics, engaging gameplay, and immersive narratives. This gaming platform collaborates with talented game developers to create visually stunning and captivating games that rival the quality of traditional downloaded titles. By leveraging advanced technology and optimization techniques, Nostra ensures that players enjoy smooth, lag-free gaming experiences without compromising on visual fidelity or performance.
Furthermore, This gaming platform foster a vibrant gaming community where players can connect, compete, and interact with one another. Through leaderboards, challenges, and social features, This gaming platform encourage players to engage with the platform, share their achievements, and discover new titles based on their preferences and gaming history.
In a world where instant gratification and convenience reign supreme, This gaming platform have set a new standard for free online Android games. By eliminating the need for downloads and offering a diverse selection of high-quality titles, This gaming platform has created a gaming ecosystem that is accessible, engaging, and truly revolutionary." | claywinston |
1,875,711 | packagemain.tech - Newsletter about Backend, Cloud, DevOps, APIs... | The Backend is the backbone of any modern application. It handles data storage, user interactions,... | 0 | 2024-06-03T17:31:19 | https://dev.to/plutov/packagemaintech-newsletter-about-backend-cloud-devops-apis-3bh9 | backend, cloud, devops, api | ---
title: packagemain.tech - Newsletter about Backend, Cloud, DevOps, APIs...
published: true
description:
tags: backend, cloud, devops, api
cover_image: https://dev-to-uploads.s3.amazonaws.com/uploads/articles/mkf7uembk3lz1p1pugpc.png
# Use a ratio of 100:42 for best results.
# published_at: 2024-06-03 17:30 +0000
---
The Backend is the backbone of any modern application. It handles data storage, user interactions, complex calculations, and much more.
Mastering this side of development opens doors to exciting opportunities, but it can be hard.
The [packagemain.tech](https://packagemain.tech) newsletter is here to help! | plutov |
1,869,509 | Manual de Uso R2D2 | Este manual descreve o uso da extensão de Visual Studio Code geradora de código e documentação R2D2.... | 0 | 2024-06-03T16:44:23 | https://dev.to/joaomrpimentel/manual-de-uso-r2d2-3aog | ledscommunity, langium, codegenerator, csharp | Este manual descreve o uso da extensão de Visual Studio Code geradora de código e documentação R2D2.
### Instalação:
1- Abra o Visual Studio Code
2- Clique em extensões
3- Pesquise R2D2
4- Clique para instalar a extensão R2D2 do LEDS IFES

### Como usar:
#### Criando o arquivo para geração:
1- Crie um arquivo de nome qualquer com a extensão .r2d2.
2- Após criar o arquivo, abra-o.
3- Aqui iniciaremos a programação da geração de código. Primeiro, definimos a configuração do projeto a ser gerado. Para fins de exemplo, vamos seguir o modelo de exemplo do Slave-One (Outro projeto do Leds). Assim, definimos as configurações do projeto:
```
Configuration {
software_name: "Slave-One" // O nome do projeto
about: "Slave-one project example" // Uma descrição do projeto
language: csharp-minimal-api // Escolha a linguagem em que o código será gerado
}
```
Para a linguagem, temos três opções por enquanto: python, java e csharp-minimal-api.
4- Depois, definimos módulos. Assim, definimos um módulo:
```
module Main {
// Aqui ficam os componentes dos módulos
}
```
5- Dentro de módulos, definimos entidades e enums:
```
entity Projeto {
nome: string
data_inicio: date
data_fim: date
orcamento: decimal
cliente: string
patrocinador: string
objetivo: string
Projeto OneToMany Projeto
Projeto OneToMany Time
Projeto uses ProjetoStatus
}
enum ProjetoStatus {
Ativo
Cancelado
Entregue
}
```
Dentro da declaração de entidade, temos os seus atributos, como `nome: string`, as relações entre as classes, como `Projeto OneToMany Projeto`, e o `Projeto uses ProjetoStatus`, que indica o uso de um enum. Na declaração do Enum, apenas colocamos quais os valores do enum. E assim continuamos a declarações com quantos módulos, entidades e enums forem necessários.
#### Rodando R2D2 para gerar o código:
Após criar, estruturar e salvar o arquivo .r2d2, clique com o botão direito em qualquer lugar dentro do arquivo e escolha o que você deseja gerar **(Na versão atual, o r2d2 gera apenas a API)**, como na imagem abaixo:

Após isso, as pastas e o conteúdo serão gerados na mesma pasta em que o arquivo .r2d2 se encontra.

#### Como utilizar o código gerado em C# no Visual Studio:
1- Abra o arquivo da solução gerada no Visual Studio: Com o Visual Studio já instalado, apenas abra a pasta do backend e abra o arquivo com o nome do seu projeto `.sln`.
2- (Não ocorre em todos os casos) Correção da auto relação na entidade, caso tenha alguma auto relação, entre no arquivo .cs da entidade e faça a troca do nome da entidade para o nome desejado (um nome diferente do da própria entidade para evitar conflitos no C#)

Depois disso, troque o nome da entidade também na relação dentro do `ContextDb.cs`:

Assim a auto relação funcionará corretamente.
3- Apenas clique para rodar o container docker e código.

Após isso é só esperar tudo compilar, que ele abrirá uma página no seu navegador com o link da API, caso apareça uma página com Hello World tudo está funcionando.
#### Abrindo o Swagger:
1- Já na página da API no navegador(Hello World), basta adicionar `/swagger` ao final do link que entraremos na tela do swagger.

#### Exemplo:
[Link do repositório com o exemplo do Slave-One](https://gitlab.com/joaomarcosrpimentel/exemplo-r2d2-slave-one)
Neste repositório temos tudo o que foi gerado seguindo este manual.
| joaomrpimentel |
1,875,709 | What are your goals for week 23 of 2024! Mid year edition. | It's week 23 of 2024. It's June at Virtual Coffee we are doing mid year check ins. Are you on track... | 19,128 | 2024-06-03T17:30:18 | https://dev.to/jarvisscript/what-are-your-goals-for-week-23-of-2024-mid-year-edition-3647 | discuss, motivation | It's week 23 of 2024. It's June at Virtual Coffee we are doing mid year check ins. Are you on track to meet your goals for the year?
## What are your goals for the week?
- What are you building?
- What will be a good result by week's end?
- What events are happening this week?
* any suggestions for in person or virtual events?
- Any special goals for the quarter?
{% embed https://dev.to/virtualcoffee/monthly-challenge-mid-year-check-in-recharge-and-refocus-for-an-amazing-second-half-2k4c %}
### Last Week's Goals
- [:white_check_mark:] Continue Job Search. Applied and hoping to hear back.
- [:white_check_mark:] Project work.
- [:x:] Blog.
- Events.
* [:white_check_mark:] Thursday online job Fair.
- [:white_check_mark:] Run a goal setting thread on Virtual Coffee Slack.
- [:white_check_mark:] Clean up from Renaissance Faire * 90% done, stuff is clean but needs to be stored.
- [:white_check_mark:] Yard Work
### This Week's Goals
- Continue Job Search.
- Project work.
- Blog.
- Work on DEV Frontend Challenge
- Events.
* I am Not a Robot with @Nickyt And Gant.
* Thursday Virtual Coffee.
- Run a goal setting thread on Virtual Coffee Slack.
- Assess my mid year progress.
- Yard Work
### Your Goals for the week
Your turn what do you plan to do this week?
- What are you building?
- What will be a good result by week's end?
- What events are happening any week?
* in person or virtual?
- Got any Summer Plans?
```html
-$JarvisScript git commit -m "Mid year already!"
``` | jarvisscript |
1,875,708 | JavaScript Class Constructors | In JavaScript, a class constructor is a special method in a class that is called when an object is... | 0 | 2024-06-03T17:28:57 | https://dev.to/yomtech/javascript-class-constructors-ice | webdev, javascript, beginners, programming | In JavaScript, a class constructor is a special method in a class that is called when an object is created from the class. It is used to initialize the object's properties and set the initial state of the object.
Here is an example of a simple class constructor in JavaScript:
```
class Person {
constructor(name, age) {
this.name = name;
this.age = age;
}
}
```
In this example, the `Person` class has a constructor that takes two arguments, `name` and `age`. When a new `Person` object is created, the constructor is called, and the `name` and `age` properties are set.
For examples:
```
let person = new Person('John', 30);
console.log(person.name); // Output: John
console.log(person.age); // Output: 30
```
Here are some key points about class constructors in JavaScript:
- The constructor is called when an object is created from the class using the `new` keyword.
- The constructor is responsible for initializing the object's properties.
- The constructor can take arguments, which are passed when the object is created.
- If no constructor is defined, a default constructor is created automatically.
Here are some more examples of class constructors in JavaScript:
```
class Car {
constructor(make, model, year) {
this.make = make;
this.model = model;
this.year = year;
}
}
let car = new Car('Toyota', 'Corolla', 2020);
class Point {
constructor(x, y) {
this.x = x;
this.y = y;
}
}
let point = new Point(10, 20);
```
| yomtech |
1,875,707 | Constructing Objects Using Constructors | A constructor is invoked to create an object using the new operator. Constructors are a special kind... | 0 | 2024-06-03T17:28:02 | https://dev.to/paulike/constructing-objects-using-constructors-ng1 | java, programming, learning, beginners | A constructor is invoked to create an object using the **new** operator. Constructors are a special kind of method. They have three peculiarities:
- A constructor must have the same name as the class itself.
- Constructors do not have a return type—not even **void**.
- Constructors are invoked using the **new** operator when an object is created. Constructors play the role of initializing objects.
The constructor has exactly the same name as its defining class. Like regular methods, constructors can be overloaded (i.e., multiple constructors can have the same name but different signatures), making it easy to construct objects with different initial data values.
It is a common mistake to put the **void** keyword in front of a constructor. For example,
`public void Circle() {
}`
In this case, **Circle()** is a method, not a constructor.
Constructors are used to construct objects. To construct an object from a class, invoke a constructor of the class using the **new** operator, as follows:
`new ClassName(arguments);`
For example, **new Circle()** creates an object of the **Circle** class using the first constructor defined in the **Circle** class, and **new Circle(25)** creates an object using the second constructor defined in the **Circle** class.
A class normally provides a constructor without arguments (e.g., **Circle()**). Such a constructor is referred to as a _no-arg_ or _no-argument constructor_.
A class may be defined without constructors. In this case, a public no-arg constructor with an empty body is implicitly defined in the class. This constructor, called a _default constructor_, is provided automatically _only if no constructors are explicitly defined in the class_. | paulike |
1,875,706 | Installing with PNPM is 56% faster than NPM | I'm surprised I don't see recommendations to use PNPM over NPM more often. Over the past couple of... | 0 | 2024-06-03T17:23:13 | https://dev.to/dcs_ink/installing-with-pnpm-is-56-faster-than-npm-1phc | I'm surprised I don't see recommendations to use PNPM over NPM more often. Over the past couple of months, I've been reading guides and tutorials daily, and I've only seen it recommended in one project, [homepage](https://github.com/gethomepage/homepage#:~:text=Then%20install%20dependencies%20and%20build%20the%20production%20bundle%20(I%27m%20using%20pnpm%20here%2C%20you%20can%20use%20npm%20or%20yarn%20if%20you%20like)%3A).
Since I started using PNPM while learning React, I've noticed a significant speed increase. PNPM conducts a daily benchmark comparing its performance to NPM. You can check it out here: [PNPM Benchmarks](https://pnpm.io/benchmarks).
Have a great day! | dcs_ink | |
1,875,697 | How to generate graph in Pdf | *How to Generate graph in wkhtmltopdf * | 0 | 2024-06-03T17:17:56 | https://dev.to/nguemoue/how-to-generate-graph-in-pdf-59jb | programming, laravel, wkhtnktopdf | **How to Generate graph in wkhtmltopdf **
| nguemoue |
1,875,696 | **¡Invasión de Redes! Una Guía de Protocolos Network con Halo**🤖 | ¡Hola Chiquis!👋🏻 ¿Preparados para una aventura? En el mundo de hoy, estar conectados es tan... | 0 | 2024-06-03T17:13:23 | https://dev.to/orlidev/invasion-de-redes-una-guia-de-protocolos-network-con-halo-1khb | webdev, networking, programming, tutorial | ¡Hola Chiquis!👋🏻 ¿Preparados para una aventura? En el mundo de hoy, estar conectados es tan importante como respirar. Pero, ¿alguna vez te has preguntado cómo funciona la magia detrás de esas videollamadas, las descargas ultrarrápidas de tus series favoritas o las partidas en línea?
Pues prepárense, porque hoy nos embarcaremos en un viaje intergaláctico para desentrañar los misterios de los protocolos de red, esos héroes anónimos que hacen posible la comunicación digital.

Imaginen un universo como el de Halo, lleno de naves espaciales, planetas alienígenas y batallas. Pero en lugar de blasters y espadas de energía, nuestras armas serán conceptos como TCP/IP, DNS y DHCP. 🕹️Acompáñenme en este post y descubran cómo estos protocolos trabajan juntos para crear una red intergaláctica robusta, eficiente y segura, tan asombrosa como la tecnología Covenant.
En el universo de Halo, la guerra entre el UNSC y el Covenant no se libra solo en el campo de batalla, sino también en las redes informáticas. Para que las naves espaciales se comuniquen, las bases intercambien datos y los Spartans 🎮 coordinen sus ataques, se necesitan protocolos de red robustos y eficientes.
Acompáñame en este viaje a través de los intrincados sistemas de red de Halo, donde descifraremos conceptos complejos con ejemplos originales inspirados en este legendario videojuego.
En el universo de Halo, 🤖 la comunicación y la estrategia son clave para la supervivencia. En el mundo de las redes, los protocolos son igual de cruciales, asegurando que cada bit de información juegue su parte en la gran batalla de la transferencia de datos.
La Red de Internet: Una Batalla en el Universo de Halo 🦾
Imagina que el universo de Internet es como el universo de Halo. En este universo, los protocolos de red son como los personajes de Halo, cada uno con un papel específico y crucial.
1. TCP/IP: La columna vertebral de la comunicación intergaláctica 🎮
Imagina que eres un Spartan, a punto de infiltrarse en una base Covenant. Necesitas enviar información crítica a tu equipo en tiempo real. Ahí es donde entra en juego el Protocolo de Control de Transmisión/Protocolo de Internet (TCP/IP), el dúo dinámico que garantiza la entrega confiable de datos.
TCP actúa como un sargento experimentado, organizando los paquetes de información en un orden específico y numerándolos para que no se pierdan en el camino. IP, por otro lado, funciona como un explorador espacial, identificando la ruta más eficiente para que los datos lleguen a su destino.

El Protocolo de Internet (IP) es como el Jefe Maestro. Al igual que el Jefe Maestro, que es crucial para la supervivencia de la humanidad, IP es fundamental para el funcionamiento de Internet. IP se encarga de enrutar y direccionar paquetes de datos para que puedan viajar a través de las redes y llegar al destino correcto.
- El Despertar del Jefe Maestro (TCP/IP) 💪🏻 En el vasto universo de Internet, el Jefe Maestro es como el TCP/IP, el protocolo que asegura que cada paquete de datos llegue a su destino final. Imagina que cada misión del Jefe Maestro es una sesión de datos que debe ser entregada sin errores, completando cada nivel (paquete de datos) con precisión antes de pasar al siguiente.
2. DNS: La guía galáctica para encontrar información 🕹️
En el universo de Halo, al igual que en el nuestro, encontrar información puede ser un desafío. Es ahí donde entra en juego el Sistema de Nombres de Dominio (DNS), el equivalente galáctico a una guía telefónica interplanetaria.
Cuando un Spartan necesita acceder a una base de datos específica, el DNS actúa como un operador de centralita, traduciendo el nombre de la base de datos (como "[se quitó una URL no válida]") en su dirección IP (como "192.168.1.100"). Sin DNS, navegar por la red sería tan caótico como atravesar un campo de asteroides sin un mapa estelar.
- DNS: El Inquisidor 👾 El Sistema de Nombres de Dominio (DNS) es como El Inquisidor. Al igual que el Inquisidor, que desempeña un papel crucial en la trama de Halo, DNS es esencial para la navegación en Internet. DNS traduce los nombres de dominio legibles por humanos en direcciones IP.
- La Danza de los Elites (DNS) 👨🏻🚀 Los Elites, conocidos por su agilidad, son como el DNS. Así como ellos se mueven rápidamente en el campo de batalla, DNS traduce nombres de dominio (como www.halowaypoint.com) en direcciones IP, permitiendo a los usuarios navegar por la web con facilidad.
3. DHCP: La asignación automática de recursos en el campo de batalla 💾
Imagina un pelotón de Spartans preparándose para una misión. Cada uno necesita un arma y un traje espacial, pero no hay tiempo para asignarlos manualmente. Ahí es donde entra en juego el Protocolo de Configuración de Host Dinámico (DHCP), el equivalente galáctico a un oficial de suministros intergaláctico eficiente.
DHCP funciona como un dispensador automático de recursos, asignando direcciones IP y configuraciones de red a los dispositivos que se conectan a la red. Esto garantiza que cada Spartan tenga los recursos que necesita para completar su misión sin perder tiempo en trámites burocráticos.

4. Protocolos de capa de transporte: La logística de la guerra espacial 📼
En el fragor de la batalla, la comunicación confiable y eficiente es crucial. Los protocolos de capa de transporte, como UDP y TCP, son los encargados de garantizar que los datos lleguen a su destino de forma rápida y segura.
UDP actúa como un mensajero veloz, entregando paquetes de datos de manera rápida pero sin garantía de entrega. Es ideal para transmitir información que no es crítica, como transmisiones de voz o video en tiempo real. TCP, por otro lado, es un mensajero meticuloso que se asegura de que cada paquete llegue a su destino, incluso si tiene que reenviarlo varias veces. Es perfecto para transmitir información crucial, como órdenes de batalla o actualizaciones de inteligencia.
- TCP y UDP: Avery Johnson 🌌 Los protocolos de transporte más comunes son TCP y UDP. Podemos pensar en ellos como Avery Johnson. Al igual que Johnson, que ayudan al Jefe Maestro en su misión, TCP y UDP trabajan con IP para garantizar que los datos lleguen correctamente a su destino.
5. Seguridad de red: Protegiendo la información en territorio hostil 💽
En el universo de Halo, la información confidencial es un arma poderosa. Protegerla de las garras del Covenant es esencial para la supervivencia del UNSC. Los protocolos de seguridad de red, como HTTPS y VPN, son los guardianes digitales que mantienen la información segura.
HTTPS funciona como un escudo impenetrable, cifrando los datos que se transmiten entre un dispositivo y un servidor web. Esto evita que el Covenant intercepte y lea información confidencial. Las VPN, por otro lado, crean un túnel seguro a través de una red pública, como Internet, permitiendo que los Spartans se comuniquen de forma segura entre sí, incluso si se encuentran en diferentes planetas.
- Los Hunters y la Seguridad de la Red (HTTPS) 🔫 Los Hunters son fuertes y casi impenetrables, simbolizando el HTTPS. Así como los Hunters protegen a los Covenant, HTTPS cifra los datos para proteger la información que viaja entre el navegador y el servidor, manteniendo a salvo las comunicaciones de los ataques enemigos.
- HTTP, FTP, SMTP: Los Aliados 👩🏼🚀 Los protocolos de la capa de aplicación como HTTP, FTP y SMTP son como los aliados en el universo de Halo. Al igual que los aliados, que proporcionan apoyo en la batalla, estos protocolos permiten la interacción con las aplicaciones web, la transferencia de archivos y el envío de correos electrónicos.
- SSH: Noble Six 💥 SSH (Secure Shell) podría ser Noble Six. Al igual que Noble Six, que es conocido por su habilidad para realizar misiones de infiltración, SSH proporciona un canal seguro para la comunicación en una red no segura.
- SSL/TLS: Cortana 💫 SSL/TLS (Secure Sockets Layer/Transport Layer Security) podría ser Cortana. Al igual que Cortana, que protege al Jefe Maestro, SSL/TLS protege los datos transmitidos a través de la red asegurando que sean privados y no puedan ser interceptados.
Cortana y la Resolución de Direcciones (ARP) 🛰️ Cortana, la inteligente IA, utiliza el ARP para identificar la ubicación exacta de los dispositivos en la red. Al igual que Cortana descifra los códigos Forerunner, ARP traduce direcciones IP en direcciones MAC, asegurando que los mensajes lleguen al aliado correcto.

- ARP: Guilty Spark 🛸 ARP (Address Resolution Protocol) podría ser Guilty Spark. Al igual que Guilty Spark, que tiene la capacidad de interactuar con la tecnología Forerunner, ARP tiene la capacidad de resolver direcciones IP en direcciones MAC.
- La Flota Covenant y el Intercambio de Archivos (FTP) ⚡ La flota Covenant transporta tropas y recursos a través del espacio, similar al FTP, que transfiere archivos de un sistema a otro. Ya sea desplegando Phantoms o enviando documentos, ambos son esenciales para mantener las operaciones en marcha.
- Los Flood y el Control de Congestión (ICMP) 🌀 Los Flood son una amenaza que se propaga rápidamente, similar a la congestión de la red. El ICMP actúa como un sistema de alerta temprana, enviando mensajes de error cuando hay demasiados Flood (datos) intentando pasar por un camino (enlace de red).
- Los Grunts y la Transferencia de Datos (UDP) ✨ Los Grunts, aunque no son muy fiables, son rápidos y numerosos. Representan el UDP, un protocolo que envía datos rápidamente pero sin garantizar su llegada. Es perfecto para misiones donde la velocidad es más crítica que la precisión.
Protocolos podrían representar a los aliados de Halo 🚀
- DHCP: Soldados ODST 🌠 El Protocolo de Configuración Dinámica de Host (DHCP) podría ser los Soldados de Choque de Descenso Orbital (ODST). Al igual que los ODST, que son desplegados rápidamente para proporcionar refuerzos y apoyo, DHCP asigna rápidamente direcciones IP a los dispositivos en una red.
- IMAP y POP3: Noble Team 🪐 Los protocolos de correo electrónico IMAP y POP3 podrían ser el Noble Team. Al igual que el Noble Team, que trabaja en conjunto para completar misiones, IMAP y POP3 trabajan juntos para permitir a los usuarios recibir y leer correos electrónicos.
- STP: Los Spartans 🤖 El Protocolo Spanning Tree (STP) podría ser Los Spartans. Al igual que Los Spartans, que son la última línea de defensa, STP previene los bucles de red, protegiendo la red de la congestión y el mal rendimiento.
Protocolos que podrían representar a los enemigos de Halo 👽
- BGP (Border Gateway Protocol): Los Flood 👽 El BGP (Border Gateway Protocol) podría ser Los Flood. Al igual que Los Flood, que son una amenaza constante y pueden infectar y controlar a otras especies, el BGP puede ser peligroso si se utiliza incorrectamente. Un ejemplo de esto es el BGP hijacking, donde los atacantes pueden redirigir el tráfico de la red a su antojo.
- Protocolos sin cifrado: Los Covenant 👾 Los protocolos sin cifrado, como HTTP, podrían ser Los Covenant. Al igual que Los Covenant, que son una amenaza constante para la humanidad, los protocolos sin cifrado pueden ser peligrosos ya que permiten que cualquiera que escuche el tráfico de la red lea datos potencialmente confidenciales.
- Bucles de red: Los Prometeos 🌌 Los bucles de red podrían ser Los Prometeos. Al igual que Los Prometeos, que pueden reaparecer una y otra vez, los bucles de red pueden provocar una propagación sin fin de paquetes de datos, llevando a una congestión y degradación del rendimiento general de la red.

Conclusión: Dominando las redes para conquistar el universo 👨🏻💻
Al comprender los protocolos de red y cómo funcionan, podemos aprovecharlos para crear redes más eficientes, seguras y confiables. En el universo de Halo, esto significa la diferencia entre la victoria y la derrota.
Así que ya lo sabes, la próxima vez que te enfrentes a un desafío de red, recuerda los principios básicos de TCP/IP, DNS, DHCP, los protocolos de capa de transporte y la seguridad de red. Con estos conocimientos en tu arsenal, estarás preparado para conquistar cualquier red, ya sea en el campo de batalla o en la comodidad de tu hogar.
Así que la próxima vez que estés navegando por Internet, imagina que estás en una misión con el Jefe Maestro y sus aliados, luchando contra los desafíos de la red. ¡Espero que esta analogía te ayude a entender mejor los protocolos de red de Internet! 🎮🌐
🚀 ¿Te ha gustado? Comparte tu opinión.
Artículo completo, visita: https://lnkd.in/ewtCN2Mn
https://lnkd.in/eAjM_Smy 👩💻 https://lnkd.in/eKvu-BHe
https://dev.to/orlidev ¡No te lo pierdas!
Referencias:
Imágenes creadas con: Copilot (microsoft.com)
##PorUnMillonDeAmigos #LinkedIn #Hiring #DesarrolloDeSoftware #Programacion #Networking #Tecnologia #Empleo #NetworkProtocols

 | orlidev |
1,875,695 | Free Notion Style Avatar Generator | I built a free tool this weekend for Notion lovers(Notion Avatar). Notion style Avatar generator,... | 0 | 2024-06-03T17:13:14 | https://dev.to/mddanishyusuf/free-notion-style-avatar-generator-2a4l | notion, avatar | I built a free tool this weekend for Notion lovers[(Notion Avatar)](https://iconbuddy.com/notion-style-avatar-generator).
[](https://iconbuddy.com/notion-style-avatar-generator)
Notion style Avatar generator, A online Notion style avatar free generator tool to make profile with head, eyes, nose, eyes, glasses, hair, & head parts, also easily customize background color.
Checkout here → [https://iconbuddy.com/notion-style-avatar-generator](https://iconbuddy.com/notion-style-avatar-generator)
Let me know your feedback on this. Thanks | mddanishyusuf |
1,875,560 | Selection Sort Algorithm | Selection Sort is a simple and intuitive sorting algorithm. It divides the input list into two parts:... | 27,581 | 2024-06-03T17:10:09 | https://blog.masum.dev/selection-sort-algorithm | algorithms, computerscience, cpp, tutorial | Selection Sort is a simple and intuitive sorting algorithm. It divides the input list into two parts: a sorted sublist of items which is built up from left to right at the front (left) of the list and a sublist of the remaining unsorted items. The algorithm proceeds by **finding the smallest** (or largest, depending on sorting order) element in the unsorted sublist, **swapping** it with the **leftmost unsorted element** (putting it in sorted order) and moving the sublist boundaries one element to the right.
### Implementation of Selection Sort
```cpp
// Time Complexity: O(n*n) (where n = size of the array)
// for the best, worst and average cases.
// Space Complexity: O(1)
void selectionSort(int arr[], int n)
{
for (int i = 0; i <= n - 2; i++)
{
int min = i;
for (int j = i; j <= n - 1; j++)
{
if (arr[j] < arr[min])
{
min = j;
}
}
swap(arr[min], arr[i]);
}
}
```
**Logic**:
**1. Outer Loop**: Iterate from the **start** of the array to the **second last** element.
**2. Initialize Minimum**: Assume the current element is the smallest (`min = i`).
**3. Inner Loop**: Find the smallest element in the unsorted portion of the array.
- Iterate through the remaining elements (`j = i` to `n - 1`).
- If a smaller element is found (`arr[j] < arr[min]`), update the index of the smallest element (`min = j`).
**4. Swap**: Swap the found minimum element with the first unsorted element.
**Time Complexity**: O(n²)
* **Explanation**: The outer loop runs `n - 2` i.e. `n - 1` times and the inner loop runs up to `n - 1` times, resulting in O(n²) for **all (best, worst and average)** cases.
**Space Complexity**: O(1)
* **Explanation**: The algorithm sorts in place and uses a constant amount of extra space.
### Example
**Input**: `arr = [7, 5, 9, 2, 8]`, `n = 5`
**Output**: `arr = [2, 5, 7, 8, 9]`
**Explanation**: In each iteration, the smallest element from the unsorted portion of the array is selected and swapped with the first element of the unsorted portion. This process continues, reducing the unsorted portion of the array by one element each time, until the entire array is sorted.
---
### Step-by-Step Explanation
Let's break down the steps for the example input `arr = [7, 5, 9, 2, 8]`:
**1. Initial Array**: `[7, 5, 9, 2, 8]`
**2. Pass 1**:
- **Array at the start of Pass 1:**`[7, 5, 9, 2, 8]`
- Find the minimum from index 0 to 4: `2`
- Swap `2` with the first element `7`
- **Array after pass 1:**`[2, 5, 9, 7, 8]`
**3. Pass 2**:
- **Array at the start of Pass 2:**`[2, 5, 9, 7, 8]`
- Find the minimum from index 1 to 4: `5`
- Swap `5` with itself (no change).
- **Array after pass 2:**`[2, 5, 9, 7, 8]`
**4. Pass 3**:
- **Array at the start of Pass 3:**`[2, 5, 9, 7, 8]`
- Find the minimum from index 2 to 4: `7`
- Swap `7` with `9`
- **Array after pass 3:**`[2, 5, 7, 9, 8]`
**5. Pass 4**:
- **Array at the start of Pass 4:**`[2, 5, 7, 9, 8]`
- Find the minimum from index 3 to 4: `8`
- Swap `8` with `9`
- **Array after pass 4:**`[2, 5, 7, 8, 9]`
**6. Final Sorted Array:**`[2, 5, 7, 8, 9]`
### Visualization

---
### Edge Cases
* **Already Sorted Array**: The algorithm still performs O(n²) comparisons, making it inefficient for sorted inputs.
* **Array with Identical Elements**: Handles duplicates correctly but doesn't provide any advantage over its time complexity.
* **Single Element Array**: No swaps needed, the array remains unchanged.
### Additional Notes
* **Inefficiency**: Due to its O(n²) time complexity, Selection Sort is inefficient for large datasets compared to more advanced algorithms like Quick Sort or Merge Sort.
* **Stability**: Selection Sort is not stable, meaning it may change the relative order of elements with equal keys.
* **Use Case**: Useful for small datasets or when memory space is limited since it sorts in place with O(1) additional space.
### Conclusion
Selection Sort is a fundamental sorting algorithm that provides a clear introduction to the concept of sorting. Although not suitable for large datasets due to its quadratic time complexity, it is easy to understand and implement, making it an excellent teaching tool for learning about algorithmic concepts. Its simplicity and in-place sorting capability are its main advantages.
--- | masum-dev |
1,875,694 | 5 Reasons Why Every Business Needs Professional Commercial Cleaning Services | As a business owner, maintaining a clean and well-organized workspace should be a top priority. A... | 0 | 2024-06-03T17:09:49 | https://dev.to/sparklymaids/5-reasons-why-every-business-needs-professional-commercial-cleaning-services-21pk | cleaningservices | As a business owner, maintaining a clean and well-organized workspace should be a top priority. A tidy environment not only creates a positive first impression for customers and clients but also contributes to employee productivity and overall profitability.
However, keeping a commercial space spotless can take time and effort, especially with the demands of daily operations. This is where professional commercial cleaning services come into play, offering a comprehensive solution to all your cleaning needs.
The Importance of a Clean Work Environment
A clean and well-maintained workspace is essential for various reasons. First and foremost, it enhances the overall aesthetic appeal of your business premises, leaving a lasting impression on visitors and potential customers. A cluttered or dirty environment can be off-putting and may even discourage people from doing business with you.
Moreover, a clean workplace promotes a healthier and safer environment for your employees. Dust, dirt, and other allergens can accumulate in poorly maintained spaces, leading to respiratory issues and other health concerns. By hiring professional commercial cleaning services, you can ensure that your workspace is free from harmful contaminants, reducing the risk of illness and absenteeism among your staff.
The Benefits of Professional Commercial Cleaning Services
While it may be tempting to assign cleaning tasks to your employees or attempt to handle them yourself, investing in professional commercial cleaning services offers numerous advantages that can benefit your business in the long run.
Expertise and Experience - Professional cleaning companies employ trained and experienced staff who are well-versed in the latest cleaning techniques and equipment. They have the knowledge and skills to tackle even the toughest cleaning challenges, ensuring that every nook and cranny of your commercial space is pristine.
Consistent Quality - Maintaining a consistent level of cleanliness can be challenging when relying on in-house staff or personal efforts. Professional cleaning services, on the other hand, follow strict protocols and quality control measures to ensure that their work meets the highest standards every time.
Cost-Effective - While hiring a professional cleaning service may seem like an added expense, it can actually save you money in the long run. By delegating cleaning tasks to experts, you free up your employees to focus on their core responsibilities, improving productivity and reducing the need for costly replacements or repairs due to neglected maintenance.
Specialized Services - Commercial cleaning services offer a wide range of specialized services tailored to meet the unique needs of different businesses. From deep cleaning and floor care to window washing and pressure washing, these professionals have the tools and expertise to handle any cleaning task efficiently and effectively.
Customized Solutions - Professional cleaning companies understand that every business has its own set of requirements and preferences. They work closely with clients to develop customized cleaning plans that address specific needs, ensuring that each area of your commercial space receives the attention it deserves.
5 Reasons Why Your Business Needs Professional Commercial Cleaning Services
Create a Welcoming and Positive First Impression
First impressions are crucial in any business setting. When clients, customers, or potential partners visit your premises, the cleanliness and appearance of your space can shape their perception of your brand and professionalism. A well-maintained and spotless environment conveys attention to detail, pride in your work, and a commitment to quality.
Professional commercial cleaning services ensure that every nook and cranny of your office, retail space, or facility is meticulously cleaned and presentable. From sparkling floors, streak-free windows, dust-free surfaces, and immaculate restrooms, a professional cleaning team leaves no stone unturned. This level of cleanliness creates a welcoming atmosphere and demonstrates your dedication to providing a top-notch experience for your clients and visitors.
Improve Employee Productivity and Well-being
A clean and healthy work environment is essential for employee productivity and well-being. Cluttered, dusty, or unsanitary conditions can contribute to workplace distractions, reduced focus, and even health issues like allergies or respiratory problems.
By partnering with professional commercial cleaning services, you can ensure your workspace is consistently free from dirt, dust, and allergens. Clean air quality and a well-organized environment help employees stay focused, motivated, and energized throughout the workday. Additionally, regular deep cleaning and sanitization can help prevent the spread of illnesses, reduce absenteeism, and maintain a healthy workforce.
When employees feel valued and work in a clean, comfortable environment, their job satisfaction and well-being improve. This positive impact on employee morale can increase productivity, improve retention rates, and create a stronger company culture.
Maintain Compliance with Health and Safety Regulations
Depending on your industry, your business may be subject to specific health and safety regulations related to cleanliness and hygiene. Failure to comply with these regulations can result in costly fines, legal issues, or temporary closure.
Professional commercial cleaning services are well-versed in the latest industry standards and regulations. They employ trained professionals who understand the proper cleaning techniques, products, and protocols required to maintain a safe and compliant environment. By outsourcing your cleaning needs to experts, you can rest assured that your facility meets or exceeds the necessary health and safety standards, minimizing the risk of violations or penalties.
Extend the Lifespan of Your Facilities and Equipment
Regular, thorough cleaning enhances the appearance of your workspace and contributes to the longevity of your facilities and equipment. Dirt, grime, and neglect can accelerate wear and tear, leading to costly repairs or replacements.
Professional commercial cleaning services utilize specialized equipment and techniques to effectively deep clean surfaces, floors, and equipment. This level of cleaning helps preserve the condition of your assets, preventing premature deterioration and minimizing the need for frequent repairs or replacements. Investing in professional cleaning protects your financial investment in your business's physical infrastructure.
Focus on Your Core Business Operations
As a business owner or manager, your time and resources are better spent on core operations, strategic planning, and business growth. Attempting to handle cleaning tasks in-house can significantly drain your team's productivity and efficiency.
By outsourcing your cleaning needs to professional commercial cleaning services, you can free up valuable time and resources that would otherwise be dedicated to cleaning duties. Your employees can concentrate on their primary roles and responsibilities, while the cleaning professionals handle the tasks they are trained and equipped to perform efficiently.
Furthermore, professional cleaning companies have access to specialized equipment, products, and training that may not be feasible or cost-effective for your business to acquire independently. By leveraging their expertise, you can ensure a high level of cleaning quality without diverting resources away from your core operations.
Summing Up
Investing in professional commercial cleaning services is a strategic decision that offers numerous benefits for businesses of all sizes and industries. The advantages of outsourcing your cleaning needs are clear, from creating a positive first impression and promoting employee well-being to maintaining compliance and protecting your assets.
By partnering with a reputable and experienced commercial cleaning company, you can ensure a consistently clean, safe, and inviting environment for your clients, employees, and visitors. Furthermore, you can focus your energy and resources on what truly matters – growing and succeeding in your core business operations.
Don't underestimate the power of a clean and well-maintained workspace. By prioritizing professional cleaning services, you're not only enhancing your physical surroundings but also investing in the long-term success and reputation of your business.
https://sparklymaids.com/services/commercial-cleaning/ | sparklymaids |
1,875,688 | Making a Totally Free Uptime Monitor using a Worker Runtime and OpenTelemetry | Table of Contents What is an Uptime Monitor and When to Use One? Traditional... | 0 | 2024-06-03T17:09:33 | https://dev.to/grunet/making-a-totally-free-uptime-monitor-using-a-worker-runtime-and-opentelemetry-1bha | devops, monitoring | ## Table of Contents
- [What is an Uptime Monitor and When to Use One?](#what-is-an-uptime-monitor-and-when-to-use-one)
- [Traditional Options](#traditional-options)
- [Using a Worker Runtime and OpenTelemetry](#using-a-worker-runtime-and-opentelemetry)
* [The High-Level Solution](#the-highlevel-solution)
* [The High-Level Setup Steps](#the-highlevel-setup-steps)
* [Comparison to the Other Options](#comparison-to-the-other-options)
- [Takeaway](#takeaway)
## What is an Uptime Monitor and When to Use One?
An uptime monitor is a tool that periodically (e.g. every minute) checks your application or API to gauge if it’s up and healthy.
If you have true observability and are using SLOs effectively you probably don’t need to use one. But if you’re not at that level yet, an uptime monitor can be a valuable information source regarding the reliability of your application or API.
## Traditional Options
There are a number of ways to run an uptime monitor. For example,
- Running a cron job on a server/VM and using bash, curl, and webhooks
- Setting up an Eventbridge cron with Container/Lambda targets and webhooks
- Paying for a 3rd party service (e.g. Pingdom)
Each of them comes with their own downsides though
- Maintenance (e.g. security patching, keeping away from end-of-life states)
- Complexity (e.g. setting up IaC, CI/CD)
- Cost
Is there an option that avoids these downsides?
## Using a Worker Runtime and OpenTelemetry
I contend there is using a [worker runtime](https://workers.js.org/) and [OpenTelemetry](https://opentelemetry.io/).
### The High-Level Solution
The solution maps out at a high-level as follows
1. Use a cron from a worker runtime
2. Have the worker hit the application or API endpoint
3. Gather instrumentation about the network call with OpenTelemetry
4. Send that OpenTelemetry instrumentation to an observability backend
5. Use the observability backend to alert on unhealthy traffic
### The High-Level Setup Steps
These steps will use Cloudflare Workers for the worker runtime, but something similar can be done with Deno Deploy as well.
1. [Create a free Cloudflare account](https://dash.cloudflare.com/sign-up/workers-and-pages)
2. [Create a worker](https://developers.cloudflare.com/workers/get-started/guide/) with the following code and the [Node.js compatibility flag](https://developers.cloudflare.com/workers/runtime-apis/nodejs/#enable-nodejs-from-the-cloudflare-dashboard)
```js
import { instrument } from '@microlabs/otel-cf-workers'
const handler = {
async scheduled(event, env, ctx) {
await fetch(env.ENDPOINT_TO_MONITOR)
}
}
const config = (env, _trigger) => {
return {
exporter: {
url: 'https://api.honeycomb.io/v1/traces',
headers: { 'x-honeycomb-team': env.HONEYCOMB_API_KEY },
},
service: { name: env.ENDPOINT_NAME },
}
}
export default instrument(handler, config)
```
3. [Add an environment variable](https://developers.cloudflare.com/workers/configuration/environment-variables/#add-environment-variables-via-the-dashboard) named “ENDPOINT_TO_MONITOR” with the endpoint to check and add another environment variable named “ENDPOINT_NAME” with a friendly name for the endpoint
4. [Create a free Honeycomb account](https://www.notion.so/Making-a-Totally-Free-Uptime-Monitor-using-a-Worker-Runtime-and-OpenTelemetry-0a4636936b3c40f38dd8c4a474145aec?pvs=21)
5. Create an environment named “Uptime Monitors” and [create an ingest key](https://docs.honeycomb.io/get-started/configure/environments/manage-api-keys/)
6. Back in Cloudflare, take that ingest key and copy-paste it into a [Cloudflare Workers secret](https://developers.cloudflare.com/workers/configuration/secrets/#via-the-dashboard) named “HONEYCOMB_API_KEY”
7. [Add a cron](https://developers.cloudflare.com/workers/configuration/cron-triggers/#via-the-dashboard) of “* * * * *” to the worker
8. (Confirm that traces are appearing every minute in Honeycomb)
9. In Honeycomb, [create a trigger](https://docs.honeycomb.io/notify/alert/triggers/create/) (alert) based on the query
```jsx
COUNT > 0 where http.response.status_code >= 400
```
10. Route the trigger’s notifications as needed (e.g. to Slack)
You should now have a functioning uptime monitor for your endpoint.
### Comparison to the Other Options
Compared to the other options outlined before, this solution has
- Minimal maintenance (just a single npm package and its dependencies to monitor for security vulnerabilities)
- Minimal complexity (just the steps outlined above)
- Totally free (the usage is very much within the [Cloudflare Workers free tier](https://developers.cloudflare.com/workers/platform/pricing/#workers) and [Honeycomb free tier](https://www.honeycomb.io/pricing))
## Takeaway
Paying for an uptime monitor service is probably preferable to this (if you’re able to).
The real takeaway is that there is this newer form of compute (worker runtimes) with a cost model that can be taken advantage of for situations similar to this. | grunet |
1,875,692 | Example: Defining Classes and Creating Objects | Classes are definitions for objects and objects are created from classes. This section gives two... | 0 | 2024-06-03T17:09:32 | https://dev.to/paulike/example-defining-classes-and-creating-objects-2nni | java, programming, learning, beginners | Classes are definitions for objects and objects are created from classes. This section gives two examples of defining classes and uses the classes to create objects. Below is a program that defines the **Circle** class and uses it to create objects. The program constructs three circle objects with radius **1**, **25**, and **125** and displays the radius and area of each of the three circles. It then changes the radius of the second object to **100** and displays its new radius and area.
```
package demo;
public class TestSimpleCircle {
public static void main(String[] args) {
// Create a circle with radius 1
SimpleCircle circle1 = new SimpleCircle();
System.out.println("The area of the circle of radius " + circle1.radius + " is " + circle1.getArea());
// Create a circle with radius 25
SimpleCircle circle2 = new SimpleCircle(25);
System.out.println("The area of the circle of radius " + circle2.radius + " is " + circle2.getArea());
// Create a circle with radius 125
SimpleCircle circle3 = new SimpleCircle(125);
System.out.println("The area of the circle of radius " + circle3.radius + " is " + circle3.getArea());
// Modify circle radius
circle2.radius = 100; // or circle2.setRadius(100)
System.out.println("The area of the circle of radius " + circle2.radius + " is " + circle2.getArea());
}
}
// Define the circle class with two constructors
class SimpleCircle {
double radius;
/** Construct a circle with radius 1 */
SimpleCircle(){
radius = 1;
}
/** Construct a circle with a specified radius */
SimpleCircle(double newRadius){
radius = newRadius;
}
/** Return the area of this circle */
double getArea() {
return radius * radius * Math.PI;
}
/** Return the perimeter of this circle */
double getPerimeter() {
return 2 * radius * Math.PI;
}
/** Set a new radius for this circle */
void setRadius(double newRadius) {
radius = newRadius;
}
}
```
`The area of the circle of radius 1.0 is 3.141592653589793
The area of the circle of radius 25.0 is 1963.4954084936207
The area of the circle of radius 125.0 is 49087.385212340516
The area of the circle of radius 100.0 is 31415.926535897932`
The program contains two classes. The first of these, **TestSimpleCircle**, is the main class. Its sole purpose is to test the second class, **SimpleCircle**. Such a program that uses the class is often referred to as a _client_ of the class. When you run the program, the Java runtime system invokes the **main** method in the main class.
You can put the two classes into one file, but only one class in the file can be a _public class_. Furthermore, the public class must have the same name as the file name. Therefore, the file name is **TestSimpleCircle.java**, since **TestSimpleCircle** is public. Each class in the source code is compiled into a **.class** file. When you compile **TestSimpleCircle.java**, two class files **TestSimpleCircle.class** and **SimpleCircle.class** are generated, as shown below.

The main class contains the **main** method (line 5) that creates three objects. As in creating an array, the **new** operator is used to create an object from the constructor: **new SimpleCircle()** creates an object with radius **1** (line 7), **new SimpleCircle(25)** creates an object with radius **25** (line 11), and **new SimpleCircle(125)** creates an object with radius **125** (line 15).
These three objects (referenced by **circle1**, **circle2**, and **circle3**) have different data but the same methods. Therefore, you can compute their respective areas by using the **getArea()** method. The data fields can be accessed via the reference of the object using **circle1.radius**, **circle2.radius**, and **circle3.radius**, respectively. The object can invoke its method via the reference of the object using **circle1.getArea()**, **circle2.getArea()**, and **circle3.getArea()**, respectively.
These three objects are independent. The radius of **circle2** is changed to **100** in line 19. The object’s new radius and area are displayed in lines 20.
As another example, consider television sets. Each TV is an object with states (current channel, current volume level, power on or off) and behaviors (change channels, adjust volume, turn on/off). You can use a class to model TV sets. The UML diagram for the class is
shown below.

```
package demo;
public class TV {
int channel = 1; // Default channel is 1
int volumeLevel = 1; // Default volume level is 1
boolean on = false; // TV is off
public TV() {
}
public void turnOn() {
on = true;
}
public void turnOff() {
on = false;
}
public void setChannel(int newChannel) {
if(on && newChannel >= 1 && newChannel <= 120)
channel = newChannel;
}
public void setVolume(int newVolumeLevel) {
if(on && newVolumeLevel >= 1 && newVolumeLevel <= 7)
volumeLevel = newVolumeLevel;
}
public void channelUp() {
if(on && channel < 120)
channel++;
}
public void channelDown() {
if(on && channel > 1)
channel--;
}
public void volumeUp() {
if(on && volumeLevel < 7)
volumeLevel++;
}
public void volumeDown() {
if(on && volumeLevel > 1)
volumeLevel--;
}
}
```
The constructor and methods in the **TV** class are defined public so they can be accessed from other classes. Note that the channel and volume level are not changed if the TV is not on. Before either of these is changed, its current value is checked to ensure that it is within the correct range. Below gives a program that uses the **TV** class to create two objects.

The program creates two objects in lines 6 and 11 and invokes the methods on the objects to perform actions for setting channels and volume levels and for increasing channels and volumes. The program displays the state of the objects in lines 17–18. The methods are invoked using syntax such as **tv1.turnOn()** (line 7). The data fields are accessed using syntax such as **tv1.channel** (line 17).
These examples have given you a glimpse of classes and objects. You may have many questions regarding constructors, objects, reference variables, accessing data fields, and invoking object’s methods. The sections that follow discuss these issues in detail. | paulike |
1,875,691 | Senior Growth is Brutal | Hello everyone, better that I get this out in the open, being a senior dev still involves a hell of a... | 0 | 2024-06-03T17:02:55 | https://dev.to/adam_cyclones/senior-growth-is-brutal-nnk | watercooler | Hello everyone, better that I get this out in the open, being a senior dev still involves a hell of a lot of personal growth, contrary to my initial belief that the great seniors I see are PERFECT, they probably (and i say that with a heavy question mark) go through the same journey of learning, and apparently I am doing many many things, even knowing some of these things are not great behaviours, but doing it anyway, I won't lie, I'm not going to frame it that I am not messing up, but the failing, is being caught if only by me, I am trying not to do it again because you know why it's bad.
It's a painful process, I've never felt so much imposters syndrome in my entire career and I am grateful and hopeful that my colleagues are patient, I certainly am going through a phase of the junior senior, and I hope it stops soon... Even being a bad developer at time to time, taking shortcuts... Because GSD!
I want to be positive but I just need a win soon to validate my lizard brain 🧠
Rant over, you don't have to understand it I just needed to vent | adam_cyclones |
1,875,690 | How to Use CompanionLink to Manage Contacts, Calendars, and Tasks? | Ever feel overwhelmed by the chaos of managing contacts, calendars, and tasks? CompanionLink might be... | 0 | 2024-06-03T17:02:14 | https://dev.to/companionlink-1/how-to-use-companionlink-to-manage-contacts-calendars-and-tasks-4mm9 | companionlink | Ever feel overwhelmed by the chaos of managing contacts, calendars, and tasks? CompanionLink might be the solution you need. This powerful tool streamlines your data management and helps you stay organized and efficient.

[CompanionLink](https://www.companionlink.com/) is software that synchronizes your contacts, calendars, and tasks across multiple platforms and devices. Whether you use Outlook, Google, or an array of other services, CompanionLink ensures your information is consistently updated and accessible. You can eliminate the headaches of manually entering data in multiple places.
In today's fast-paced world, efficient data management is not merely a luxury but a necessity. It means that you meet your goals and priorities on time.
Not managing these elements effectively can result in costly mistakes, missed opportunities, and added stress. CompanionLink provides a unified solution to keep all these aspects in check.
## Preparing to use CompanionLink
Before you dive into CompanionLink, please make sure your system meets the requirements so you avoid any installation hiccups.
To use CompanionLink seamlessly, could you confirm that your device and operating system are compatible? CompanionLink supports various devices, including Windows PCs, Macs, iPhones, Android phones, and more.
You may need specific software installed depending on what you want to sync with CompanionLink. For instance, if you want to synchronize your Outlook contacts and calendar, you should already have Microsoft Outlook installed. If you wish to use Google synchronization, please set up a Google account. Staying ahead of these prerequisites can save you time and frustration during installation.
## Installation and setup
Start your CompanionLink journey by visiting their official website. Navigate to the download section. CompanionLink has different versions tailored to various needs, so select the one that suits your requirements.
Please be sure to look for a version compatible with your device. Whether you use Windows, macOS, or mobile platforms like Android and iOS, CompanionLink offers the right fit. Being selective ensures you harness the full potential of the software.
Once you have downloaded the appropriate version, locate the installation file in your downloads folder and double-click it. Follow the on-screen prompts, agree to the terms and conditions and select the desired installation path. After a few clicks, CompanionLink will be installed on your device.
After installing, you will need to configure the initial settings. Launch the software, and it will prompt you to enter your email and preferred synchronization method. Tailoring these initial preferences can significantly streamline your future syncing processes.
## Synchronization options
Opt for wireless sync if you like the idea of your data updating automatically without connecting any cables. This method uses your Wi-Fi or mobile data to sync your contacts, calendars, and tasks across your devices seamlessly.
If internet privacy and security matter to you, choose USB sync. This method allows you to sync data by directly connecting your mobile device to your computer via a USB cable, ensuring a secure transfer of information.
Cloud sync is your best bet for those who prefer access to their data from any location. Use services like Google Drive, OneDrive, or Dropbox to keep your information accessible and synchronized effortlessly.
## Configuring sync settings
. It supports various sources, including Outlook, Google, and more, allowing you to.
Options range from real-time updates to periodic syncing every few hours. When setting this frequency, please look at how up-to-date your information needs to be.
You can customize your sync options to cater specifically to your needs. Set filters for contacts, apply categories and tags for events and define task priorities. Tailoring these options can make your daily management tasks significantly more efficient.
## Contact management
Please import your contacts from various sources to consolidate your information in one place. Whether you are pulling contacts from your email client or another device, CompanionLink simplifies the import process, saving you time and effort. Manually add new contacts to ensure all essential details are noticed. Edit existing contacts effortlessly, updating information to keep your contact list current and relevant. Stay organized and improve your efficiency by maintaining accurate contact details.
Could you create and manage groups to categorize your contacts effectively? Whether you are grouping by family, friends, or colleagues, keeping similar contacts together helps you find information quickly. Assign tags and categories to each contact, making search and retrieval more intuitive. An organized contact list can significantly enhance your network and communication ability. Think about how much time you could save if every contact were easy to locate.
Synchronize your contacts across all your devices to maintain consistency and access information wherever you go. CompanionLink ensures all your devices have the most up-to-date contact information. Handle duplicate contacts seamlessly, merging or deleting duplicates to keep your contact list clean and organized. Have you ever experienced the frustration of having outdated or duplicate contacts? Regular synchronization can eliminate these headaches, ensuring you always have the correct information at your fingertips.
## Calendar management
Create new events quickly on your calendar, ensuring you attend all necessary appointments and meetings. Edit existing events to accommodate changes, keeping your schedule flexible and up-to-date. Delete outdated or canceled events to keep your calendar clutter-free. A well-maintained calendar can be a powerful tool. Imagine how productive you could be with an accurate and organized calendar.
Set up recurring events to manage regular appointments or meetings effortlessly. Use categories and tags to classify events, making it easier to find specific appointments. Color code events for a visual representation of your schedule, helping you quickly identify different types of commitments. An organized calendar can significantly reduce the stress of managing your time. How would it feel to have a clear view of your day's agenda with just a glance?
## Tasks management
You can start by adding new tasks, which is straightforward with CompanionLink. Enter the task details, and it will appear in your task list. Make these tasks more effective by setting due dates and priorities. Prioritize your tasks based on urgency and importance, which helps you manage your time better. Editing and updating existing tasks is also easy, allowing you to adjust as your priorities shift.
Categorize your tasks to keep them organized. Use categories to separate different functions, such as work-related or personal tasks. This method adds clarity and helps you focus better. Take advantage of tags for even better management; tags allow for more specific grouping and easier retrieval of tasks. Set reminders and notifications so you never miss a deadline. Being organized contributes significantly to productivity.
CompanionLink excels in keeping your tasks synchronized across multiple devices. You can adjust the sync settings to fit your needs, whether you prefer real-time updates or periodic syncing. Ensuring task consistency across devices enables you to access your updated task list from anywhere at any time. This feature is a game-changer for people constantly on the go. Imagine the relief of having your task list perfectly updated on your phone, tablet, and computer.
## Advanced features
Data backup and restoration are essential for peace of mind. Set up automatic backups to ensure that your data is safe. If you lose any information, restoring backup data is quick and straightforward. You can explore advanced synchronization options to tailor CompanionLink to suit your needs. Customizing sync rules lets you decide how data syncs between devices, while one-way or two-way sync offers flexibility.
CompanionLink prioritizes the security of your data. Protect your information with passwords, making unauthorized access difficult. Data encryption adds an extra layer of protection, ensuring that even if data is intercepted, it will be unreadable. In a world where data breaches are common, securing your task management data should not be an afterthought.
## Troubleshooting and support
Sync errors can derail your productivity. If you experience sync failures, you should check your network connectivity. A stable internet connection is crucial for smooth synchronization, especially when using cloud sync options.
Next, ensure that the correct sync settings are configured. Double-check if your CompanionLink is set to sync with the proper accounts and platforms. Sometimes, outdated software versions cause issues. Lastly, reopening the application or rebooting your device often resolves minor glitches.
### Handling Duplicate Entries Effectively
Nothing is more frustrating than dealing with duplicate contacts or calendar entries. Duplicates typically occur when syncing data across multiple platforms that need to be perfectly aligned. To resolve this, you can use CompanionLink's built-in deduplication tools.
First, please review your sync settings to ensure you are syncing in one direction only or correctly configuring two-way sync. This avoids the creation of duplicate entries. You can also manually review your contacts and calendar entries to identify and delete duplicates.
### Preventing and Recovering Missing Data
Missing data can cause panic, but there are steps to mitigate this issue. First, could you check if the missing data is hidden because of filter settings? If filters are not the issue, it is time to revisit your sync settings. Could you make sure that the data from all your preferred sources is selected for synchronization?
Another solution is to search through your backups. CompanionLink regularly backs up your data, and restoring from a recent backup can recover missing information. Regularly backing up your data is a proactive measure to prevent future data loss.
### Accessing the Online Help Center
. It offers a comprehensive FAQ section, detailed guides, and step-by-step tutorials. These resources explain troubleshooting steps for common problems and advanced features. Utilizing these materials can save time and provide immediate answers.
### Engaging with User Forums
User forums are another excellent support avenue. These forums are filled with experienced users who share their insights and solutions. Engaging in forums helps you find answers to unique problems and gain tips to enhance your CompanionLink experience. It fosters a sense of community where users help each other navigate challenges.
| companionlink-1 |
1,875,686 | Partitions, Merge Append, Pagination, and Limit pushdown in YugabyteDB | When using Top-N queries for pagination, you usually include an ORDER BY clause and a LIMIT or FETCH... | 0 | 2024-06-03T17:00:54 | https://dev.to/yugabyte/partitions-merge-append-pagination-and-limit-pushdown-in-yugabytedb-49ml | yugabytedb, postgres, distributed, sql | When using Top-N queries for pagination, you usually include an ORDER BY clause and a LIMIT or FETCH FIRST ROWS clause. The goal is to avoid scanning a large number of rows, sorting them, and then returning only the first few. It's crucial to have an index that returns the rows in the desired order. In PostgreSQL declarative partitioning, the indexes are local, but the order is maintained using a "Merge Append" and then the LIMIT is optimized.
Here is an example:
```sql
create table demo ( id bigint, x int, y float ) partition by range(id);
create table demo0 partition of demo for values from (00) to (10);
create table demo1 partition of demo for values from (10) to (20);
create table demo2 partition of demo for values from (20) to (30);
create table demo3 partition of demo for values from (30) to (40);
insert into demo select generate_series(0,39),100*random(),random();
\watch c=1000 i=0.01
```
I'll run the following query:
```sql
select * from demo where x=1
order by x,y desc limit 10
;
```
If I create an index only for the WHERE clause
```sql
yugabyte=# create index demo_bad on demo(x);
CREATE INDEX
```
My query reads a hundred rows from each partition and has to sort them to get the Top-10 (`Sort Method: top-N heapsort`).
```sql
yugabyte=# explain (analyze, dist)
select * from demo where x=1
order by x,y desc limit 10
;
QUERY PLAN
-----------------------------------------------------------------------------------------------------------------------------------------
Limit (cost=21.96..21.99 rows=10 width=20) (actual time=9.165..9.171 rows=10 loops=1)
-> Sort (cost=21.96..22.06 rows=40 width=20) (actual time=9.163..9.164 rows=10 loops=1)
Sort Key: demo0.y DESC
Sort Method: top-N heapsort Memory: 26kB
-> Append (cost=0.00..21.10 rows=40 width=20) (actual time=2.748..9.032 rows=393 loops=1)
-> Index Scan using demo0_x_idx on demo0 (cost=0.00..5.22 rows=10 width=20) (actual time=2.745..2.779 rows=101 loops=1)
Index Cond: (x = 1)
Storage Table Read Requests: 1
Storage Table Read Execution Time: 1.458 ms
Storage Table Rows Scanned: 101
Storage Index Read Requests: 1
Storage Index Read Execution Time: 1.072 ms
Storage Index Rows Scanned: 101
-> Index Scan using demo1_x_idx on demo1 (cost=0.00..5.22 rows=10 width=20) (actual time=2.236..2.266 rows=94 loops=1)
Index Cond: (x = 1)
Storage Table Read Requests: 1
Storage Table Read Execution Time: 1.224 ms
Storage Table Rows Scanned: 94
Storage Index Read Requests: 1
Storage Index Read Execution Time: 0.820 ms
Storage Index Rows Scanned: 94
-> Index Scan using demo2_x_idx on demo2 (cost=0.00..5.22 rows=10 width=20) (actual time=1.806..1.835 rows=93 loops=1)
Index Cond: (x = 1)
Storage Table Read Requests: 1
Storage Table Read Execution Time: 1.118 ms
Storage Table Rows Scanned: 93
Storage Index Read Requests: 1
Storage Index Read Execution Time: 0.528 ms
Storage Index Rows Scanned: 93
-> Index Scan using demo3_x_idx on demo3 (cost=0.00..5.22 rows=10 width=20) (actual time=1.997..2.033 rows=105 loops=1)
Index Cond: (x = 1)
Storage Table Read Requests: 1
Storage Table Read Execution Time: 1.168 ms
Storage Table Rows Scanned: 105
Storage Index Read Requests: 1
Storage Index Read Execution Time: 0.665 ms
Storage Index Rows Scanned: 105
Planning Time: 0.175 ms
Execution Time: 9.251 ms
```
This is fast in my case, but not scalable.
What I want is that the limit is pushed down, reading at maximum ten rows from each partition.
Let's create an index that returns the rows in the right order:
```sql
yugabyte=# drop index demo_bad;
DROP INDEX
yugabyte=# create index demo_good on demo(x,y desc);
CREATE INDEX
```
Let's run the query again:
```sql
yugabyte=# explain (analyze, dist)
select * from demo where x=1
order by x,y desc limit 10
;
QUERY PLAN
-------------------------------------------------------------------------------------------------------------------------------------
Limit (cost=0.04..1.81 rows=10 width=20) (actual time=7.901..7.919 rows=10 loops=1)
-> Merge Append (cost=0.04..71.04 rows=400 width=20) (actual time=7.899..7.912 rows=10 loops=1)
Sort Key: demo0.y DESC
-> Index Scan using demo0_x_y_idx on demo0 (cost=0.00..16.25 rows=100 width=20) (actual time=2.823..2.826 rows=3 loops=1)
Index Cond: (x = 1)
Storage Table Read Requests: 1
Storage Table Read Execution Time: 1.122 ms
Storage Table Rows Scanned: 10
Storage Index Read Requests: 1
Storage Index Read Execution Time: 1.154 ms
Storage Index Rows Scanned: 10
-> Index Scan using demo1_x_y_idx on demo1 (cost=0.00..16.25 rows=100 width=20) (actual time=1.741..1.744 rows=3 loops=1)
Index Cond: (x = 1)
Storage Table Read Requests: 1
Storage Table Read Execution Time: 0.880 ms
Storage Table Rows Scanned: 10
Storage Index Read Requests: 1
Storage Index Read Execution Time: 0.701 ms
Storage Index Rows Scanned: 10
-> Index Scan using demo2_x_y_idx on demo2 (cost=0.00..16.25 rows=100 width=20) (actual time=1.818..1.819 rows=2 loops=1)
Index Cond: (x = 1)
Storage Table Read Requests: 1
Storage Table Read Execution Time: 1.087 ms
Storage Table Rows Scanned: 10
Storage Index Read Requests: 1
Storage Index Read Execution Time: 0.593 ms
Storage Index Rows Scanned: 10
-> Index Scan using demo3_x_y_idx on demo3 (cost=0.00..16.25 rows=100 width=20) (actual time=1.507..1.509 rows=5 loops=1)
Index Cond: (x = 1)
Storage Table Read Requests: 1
Storage Table Read Execution Time: 0.957 ms
Storage Table Rows Scanned: 10
Storage Index Read Requests: 1
Storage Index Read Execution Time: 0.387 ms
Storage Index Rows Scanned: 10
Planning Time: 1.350 ms
Execution Time: 8.000 ms
Storage Read Requests: 8
Storage Read Execution Time: 6.882 ms
Storage Rows Scanned: 80
```
There's no `Sort` operation but a `Merge Append` that reads from each partition branch and preserves the order. This allows YugabyteDB to push down the LIMIT and read ten rows from each branch.
This reads 40 rows in total, 10 rows from 4 partitions (you see 80 because there are 40 index entries and 40 table rows) because we don't know in advance where the Top-10 will come from and it is better to read them by batch.
To understand better I can set the fetch size to its minimum:
```sql
yugabyte=# set yb_fetch_row_limit to 1;
SET
yugabyte=# explain (analyze, dist)
select * from demo where x=1
order by x,y desc limit 10
;
QUERY PLAN
---------------------------------------------------------------------------------------------------------------------------------------
Limit (cost=0.04..1.81 rows=10 width=20) (actual time=14.748..20.888 rows=10 loops=1)
-> Merge Append (cost=0.04..71.04 rows=400 width=20) (actual time=14.746..20.877 rows=10 loops=1)
Sort Key: demo0.y DESC
-> Index Scan using demo0_x_y_idx on demo0 (cost=0.00..16.25 rows=100 width=20) (actual time=10.187..11.525 rows=3 loops=1)
Index Cond: (x = 1)
Storage Table Read Requests: 3
Storage Table Read Execution Time: 2.282 ms
Storage Table Rows Scanned: 3
Storage Index Read Requests: 3
Storage Index Read Execution Time: 3.930 ms
Storage Index Rows Scanned: 3
-> Index Scan using demo1_x_y_idx on demo1 (cost=0.00..16.25 rows=100 width=20) (actual time=1.674..2.752 rows=3 loops=1)
Index Cond: (x = 1)
Storage Table Read Requests: 3
Storage Table Read Execution Time: 1.697 ms
Storage Table Rows Scanned: 3
Storage Index Read Requests: 3
Storage Index Read Execution Time: 0.731 ms
Storage Index Rows Scanned: 3
-> Index Scan using demo2_x_y_idx on demo2 (cost=0.00..16.25 rows=100 width=20) (actual time=1.580..2.352 rows=2 loops=1)
Index Cond: (x = 1)
Storage Table Read Requests: 2
Storage Table Read Execution Time: 1.434 ms
Storage Table Rows Scanned: 2
Storage Index Read Requests: 2
Storage Index Read Execution Time: 0.687 ms
Storage Index Rows Scanned: 2
-> Index Scan using demo3_x_y_idx on demo3 (cost=0.00..16.25 rows=100 width=20) (actual time=1.294..4.218 rows=5 loops=1)
Index Cond: (x = 1)
Storage Table Read Requests: 5
Storage Table Read Execution Time: 3.344 ms
Storage Table Rows Scanned: 5
Storage Index Read Requests: 5
Storage Index Read Execution Time: 0.375 ms
Storage Index Rows Scanned: 5
Planning Time: 6.991 ms
Execution Time: 22.635 ms
Storage Read Requests: 26
Storage Read Execution Time: 14.479 ms
Storage Rows Scanned: 26
```
In my example, I retrieved between 2 and 5 rows from each partition to get a total of 10 rows. Although I read fewer rows, this resulted in more read requests, making the process less efficient. It's better to keep the default fetch size, which will be automatically adjusted to the LIMIT value. | franckpachot |
1,875,689 | 2486. Append Characters to String to Make Subsequence | 2486. Append Characters to String to Make Subsequence Medium You are given two strings s and t... | 27,523 | 2024-06-03T16:57:45 | https://dev.to/mdarifulhaque/2486-append-characters-to-string-to-make-subsequence-5633 | php, leetcode, algorithms, programming | 2486\. Append Characters to String to Make Subsequence
Medium
You are given two strings `s` and `t` consisting of only lowercase English letters.
Return _the minimum number of characters that need to be appended to the end of `s` so that `t` becomes a **subsequence** of `s`._
A **subsequence** is a string that can be derived from another string by deleting some or no characters without changing the order of the remaining characters.
**Example 1:**
- **Input:** s = "coaching", t = "coding"
- **Output:** 4
- **Explanation:** Append the characters "ding" to the end of s so that s = "coachingding".\
Now, t is a subsequence of s ("**co**aching**ding**").\
It can be shown that appending any 3 characters to the end of s will never make t a subsequence.
**Example 2:**
- **Input:** s = "abcde", t = "a"
- **Output:** 0
- **Explanation:** t is already a subsequence of s ("**a**bcde").
**Example 3:**
- **Input:** s = "z", t = "abcde"
- **Output:** 5
- **Explanation:** Append the characters "abcde" to the end of s so that s = "zabcde".\
Now, t is a subsequence of s ("z**abcde**").\
It can be shown that appending any 4 characters to the end of s will never make t a subsequence.
**Constraints:**
- <code>1 <= s.length, t.length <= 10<sup>5</sup></code>
- `s` and `t` consist only of lowercase English letters.
**Solution:**
```
class Solution {
/**
* @param String $s
* @param String $t
* @return Integer
*/
function appendCharacters($s, $t) {
$i = 0;
foreach(str_split($s) as $c) {
if ($c == $t[$i]) {
if (++$i == strlen($t)) {
return 0;
}
}
}
return strlen($t) - $i;
}
}
```
**Contact Links**
- **[LinkedIn](https://www.linkedin.com/in/arifulhaque/)**
- **[GitHub](https://github.com/mah-shamim)**
| mdarifulhaque |
1,875,687 | Learn As You Code: HTML and CSS! - Series Introduction | This is the first post in a series that will challenge YOU to learn two foundational web development... | 27,613 | 2024-06-03T16:55:53 | https://dev.to/nmiller15/learn-while-you-code-html-and-css-part-1-3064 | html, css, beginners, webdev | This is the first post in a series that will challenge YOU to learn two foundational web development languages. And the best way to learn to code, is to code! So, code as you learn, and learn as you code! Each of these posts will include a brief lesson and a challenge. Make sure to actually complete the challenge and by the end of this series you’ll be able to create your own websites locally on your own computer!
### What is HTML?
HTML is the the foundational language for the internet. What you’re looking at right now, this website, is the result of your web browser reading and interpreting HTML.
HTML stands for Hypertext Markup Language and it’s been the language of the internet since practically the beginning. In fact, the creator of the world wide web, Tim Berners-Lee, developed this language! That’s cool, but what is HTML, what does it do? Well, we can break down the term. Hypertext is a fancy word for text that connects text to other text and markup is a word for the preparation of text for presentation. So, all together, HTML is a language that prepares text for presentation on the internet and connects some of that text to other documents on the internet! Simply, HTML provides the structure for the content of a web page.
### What is CSS?
HTML creates the structure and defines the content for a web page, but, if we don’t tell the web browser anything else, it’s not going to look very appealing. So, we have to add another document that will tell your browser how to display all of the different page elements, fun things like: what font to use, how big the text should be, what kind of background color you want, and where on the page it should be!
CSS is the language that solves this problem. CSS stands for Cascading Style Sheets. It is a collection of rules that tell the browser how to display different types of HTML elements. What’s crazy to me, is that HTML web pages were around for about four years before CSS was implemented. The language was first proposed in 1994 by a man named HÃ¥kon Wium Lie (if you know how to pronounce that, you deserve a medal). So for four years, websites were just white background with black text, left-aligned… very very bland. That was before the internet that we think of today. Then, the internet was just for researchers and raw sharing of information. But, now we use the internet for all sorts of things.
Using HTML and CSS together, you can create any design that you want to. Together these two languages are powerful design tools if you learn how to wield them.
### The Challenge
Even though this is just an introductory lesson, there is still a challenge! You don’t even need to leave this page to do this! On a desktop computer, right-click this paragraph! Click on “Inspect Element” and notice the window that pops up.
Do you see it? Great! Challenge complete! This is the Developer Tools for the website that you’re looking at. And inside you can see the HTML and CSS that your browser is reading! Take some time to look at the language! Click on some different elements to see what's inside, and see if you can locate the styling pane in your browser's DevTools.
If this looks overwhelming, that’s okay! Most websites are very complex and have been built over many years by many people. If you follow along with this series, you'll get step by step instructions on how to create your own web-pages!
See you next time, and don’t forget to Learn as You Code!
| nmiller15 |
1,875,685 | WezTerm: an actually good config key binding recipe | While WezTerm is a great terminal with sane defaults, it doesn't provide the default key binding to... | 0 | 2024-06-03T16:54:01 | https://dev.to/eugenebabichenko/wezterm-an-actually-good-config-key-binding-recipe-3lp5 | terminal, wezterm |
While [WezTerm][wez] is a great terminal with sane defaults, it doesn't provide
the default key binding to open the configuration file and edit it. That is
understandable, everyone may have their own preference for that. Here we will
figure out the recipe that would work everywhere and abide by modern standards.
_The original article was posted at my homepage: https://eugene-babichenko.github.io/blog/2024/06/03/wezterm-open-config/_
In my opinion, the proper way to go is to open the configuration file with the
editor specified in the `EDITOR` environment variable. I am also using macOS
most of the time, so the most natural key binding to configure something is
`Cmd+,`. In many applications this key binding is universal for all operating
systems.
It is easy to find out where the WezTerm configuration file is located: there is
always the `WEZTERM_CONFIG_FILE` variable. Also there is always the
`WEZTERM_CONFIG_DIR` variable that should allow us to specify the working
directory for our editor.
The problem with the `EDITOR` variable is that it may not be immediately
accessible to WezTerm config via `os.getenv("EDITOR")` if it was specified in
your shell configuration (e.g. `.bashrc`) and not it some other magical place.
To solve this we will obviously need to load our editor inside the shell, which
is conveniently accessible via the `SHELL` variable.
Considering all of the above, we end up with the code like this:
```lua
local wezterm = require("wezterm")
local config = wezterm.config_builder()
config.keys = {
{
key = ",",
mods = "SUPER",
action = act.SpawnCommandInNewWindow({
cwd = os.getenv("WEZTERM_CONFIG_DIR"),
args = { os.getenv("SHELL"), "-c", "$EDITOR $WEZTERM_CONFIG_FILE" },
}),
},
}
```
This greatness of this specific recipe is that it will work regardless of your
preferred shell end editor as long as the `EDITOR` variable is set. The `-c`
flag is accepted by all major \*nix shells. Also, regardless of the fact your
editor is running with an shell, the window will close immediately after you
close the editor. And of course, you can swap `SpawnCommandInNewWindow` with
`SpawnCommandInNewTab` or any custom `SpawnCommand` call.
[wez]: https://wezfurlong.org/wezterm/
| eugenebabichenko |
1,875,684 | Step by Step Troubleshooting WAFv2 - With Pictures | You suspect that the Web Application Firewall (WAF) may be obstructing the functionality of your... | 0 | 2024-06-03T16:53:58 | https://dev.to/aws-builders/step-by-step-troubleshooting-wafv2-with-pictures-4hnp | aws, cloud, waf, security |

You suspect that the Web Application Firewall (WAF) may be obstructing the functionality of your application. This article provides guidance on diagnosing the issue and adjusting/removing WAF rules as necessary.

1. Open `WEB ACLs` tab under the WAF dashboard as shown in figure.

2. Make sure you choose the correct region. In this example my WAF is deployed in Ohio(us-east-2). And then click your WAF rule, here in this example the name is managed_rules.

3. In this dashboard, you can access comprehensive metrics related to your WAF. Take a moment to review the graphics and metrics to become acquainted with them. Make sure that Blocked button is selected only. However, the information we require is located at the bottom of the page, so please scroll down accordingly.

4.At the bottom, we can see at the Attack Types graph that our WAF detected 3 different attack types as SQL Injection, NoUserAgent and BadBots. We see those 3 because previously I tried to do an SQL injection to my application and also I made HTTPS requests without proper headers. In Requests terminated by managed rule groups you can see which rule groups are blocking your requests. In my case they are AWSManagedRulesSQLiRuleSet (for SQL injection) and AWSManagedRulesCommonRuleSet (for missing and bad agent header). Now that we have gathered some information, our focus needs to shift to the individual rules rather than the rule groups. Let's direct our attention to the graphic located at the bottom left Top 10 managed rule labels.

5. If we take a closer look at this graph, we can see exactly when each rule kicks in and stops your access. Just match up the times when you tried to access with the points on the graph. The pink line on the graph shows which rule is stopping you. Below the graph, you'll see a list of rules that were triggered, each with its own color. In my case, it looks like the rule that's causing the trouble is aws:core-rule-set:NoUserAgent_Header. So what does it mean?

6. The rule label is aws:core-rule-set:NoUserAgent_Header. After the last column, we see the name of the rule we want to exclude, which is NoUserAgent_Header. I actually sent a request with an empty user agent header, triggering this rule. Now, let's proceed and see how to exclude the rule programmatically.

7. The rule NoUserAgent_Header belongs to the core-rule-set, and we need to refer to the corresponding AWS documentation to verify the actual name of NoUserAgent_Header because it is case-sensitive. As shown in the image below, we find the corresponding LABEL and Role Name. So in our case, the rule name I need to use in the exclude list is NoUserAgent_HEADER, not NoUserAgent_Header, because it is case-sensitive. Please take a look at the table below to find corresponding AWS page for your label name that you see in CloudWatch.

| Label from CloudWatch | Corresponding AWS Page |
|-----------------------------|------------------------------------------------|
| core-rule-set | AWSManagedRulesCommonRuleSet |
| sql-database | AWSManagedRulesSQLiRuleSet |
| windows-os | AWSManagedRulesWindowsRuleSet |
| known-bad-inputs | AWSManagedRulesKnownBadInputsRuleSet |
| amazon-ip-list | AWSManagedRulesAmazonIpReputationList |
8. Now we can go to our root module and define our variables as shown below. We wanted to exclude NoUserAgent_HEADER and I place it under the rules_to_exclude_common list because this rule is part of the AWSManagedRulesCommonRuleSet. As you can see I also exclude as I wish other rules. Here I also excluded SQLi_QUERYARGUMENTS which is a rule blocks SQL injections and also I excluded UserAgent_BadBots_HEADER which inspects for common User-Agent header values that indicate that the request is a bad bot. You can see the code snippet at the bottom of the page.

But why did we place NoUserAgent_HEADER under the rules_to_exclude_commonblock? In the table below, you can identify the corresponding Terraform variable to utilize in your code by comparing it with the Label from the CloudWatch column.
| Label from CloudWatch | Corresponding TF Variable |
|-----------------------|--------------------------------|
| core-rule-set | rules_to_exclude_common |
| sql-database | rules_to_exclude_sql |
| windows-os | rules_to_exclude_windows |
| known-bad-inputs | rules_to_exclude_bad |
| amazon-ip-list | rules_to_exclude_reputation |
Now we can provision our infrastructure with that code (or whichever IaC Tool you use):
```bash
$ terraform apply
```
10. Now we can check whether our changes have been applied with going back to the dashboard from STEP 3. In that screen you need to click to Rules.

11. Here I will click common. Because I wanted to exclude NoUserAgent_HEADER , and I know that I declared it in exclusion list under the rules_to_exclude_common block and this rule is part of AWSManagedRulesCommonRuleSet.

12. Below, you can observe that NoUserAgent_HEADER is explicitly allowed now. Additionally, UserAgent_BadBots_HEADER is allowed, as both have been excluded. Remember that SQLi_QUERYARGUMENTS rule has also been excluded, which you can confirm under the sql section rather than common.

13. So finally, you can see that again I send a request with an empty user agent header, but this time I receive successful response rather than `403 Forbidden`.

| ayogun |
1,875,683 | Start and Stop Timer | const App = () => { const [count, setCount] = React.useState(0); const [isCount0,... | 0 | 2024-06-03T16:53:57 | https://dev.to/alamfatima1999/start-and-stop-timer-5487 | ```JS
const App = () => {
const [count, setCount] = React.useState(0);
const [isCount0, setIsCount0] =
React.useState(true);
const [id, setId] =
React.useState(true);
React.useEffect(() => {
console.log("Inside useEffect");
// setIsCount0(false);
setCount(0);
const newId = setInterval(() => setCount((prev) => prev + 1), 1000);
setId(newId);
console.log("id = ",id)
}, [isCount0]);
const clearTimer = () => {
// console.log("cleartime", id);
clearInterval(id);
setCount(0);
}
const startTimer = () => {
if(count!=0)
{
console.log("start timer");
clearInterval(id);
}
setIsCount0((prev) => !prev);
}
return(
<div>
<h3>Count : {count}</h3>
<button onClick = {clearTimer}>Stop timer</button>
<button onClick = {startTimer}>Start timer</button>
</div>
);
};
ReactDOM.render(<App />, document.getElementById("root"));
```
| alamfatima1999 | |
1,875,682 | 🧠 Part 1 - Memory Management in JavaScript: 10+ Data Structures & Garbage Collection Techniques | JS Deep Dive | Memory management is a fundamental aspect of programming that varies significantly between... | 0 | 2024-06-03T16:53:48 | https://dev.to/nikhilgupta946/part-1-memory-management-in-javascript-10-data-structures-garbage-collection-techniques-js-deep-dive-4c5b | javascript, programming, webdev, react | - Memory management is a fundamental aspect of programming that varies significantly between languages.
- Low-level languages like C require manual memory management through functions like malloc() and free(), whereas high-level languages like JavaScript automate this process through garbage collection.
> This article delves into the intricacies of memory management in JavaScript, exploring its lifecycle, allocation strategies, and the role of garbage collection. 🌟
## Understanding the Memory Lifecycle 🧠
Every programming journey begins with understanding the memory lifecycle. Whether you're coding in C or JavaScript, the process is remarkably consistent:
- Allocate: Request the memory you need.
- Use: Utilize the allocated memory (read/write).
- Release: Free the memory once it's no longer required.
While the first and third steps are explicit in low-level languages, JavaScript handles the first and last steps implicitly, thanks to its automatic memory management features. 🛠️
## Allocation in JavaScript 🖥️
JavaScript elegantly manages memory allocation to simplify development. When you declare values, it automatically allocates memory:
```
const n = 123; // Allocates memory for a number
const s = "azerty"; // Allocates memory for a string
const o = {
a: 1,
b: null,
}; // Allocates memory for an object and its contents
const a = [1, null, "abra"]; // Allocates memory for an array and its elements
function f(a) {
return a + 2; // Allocates a function
}
document.getElementById('myButton').addEventListener('click', () => {
document.body.style.backgroundColor = 'blue';
}, false);
```
## Releasing Unneeded Memory 🗑️
Releasing memory when it's no longer needed is crucial. High-level languages like JavaScript employ garbage collection (GC) to automate this process. GC monitors memory allocation and decides when memory can be safely reclaimed. However, due to the complexity of determining exactly when memory is no longer needed, GC implementations approximate this process. 🕵️♀️
## Garbage Collection Explained 🧹
Garbage collection is a sophisticated technique used to manage memory. It works by identifying objects that are no longer accessible (i.e., not referenced by any live variables) and deallocating their memory.
> Two primary GC algorithms used are reference counting and mark-and-sweep.
### Reference Counting 📈
Reference counting tracks the number of references to an object. If an object's reference count drops to zero, it's considered safe to deallocate its memory. However, this method struggles with circular references, leading to memory leaks.
```
let primary = {
key1: {
key1_nested_key1: 2,
},
};
// 2 objects are created. One is referenced by the other as one of its properties.
// The other is referenced by being assigned to the 'primary' variable.
// None can be garbage-collected.
let secondary = primary;
// The 'secondary' variable is the second thing that has a reference to the object.
primary = 1;
// Now, the object that was originally in 'primary' has a unique reference
// embodied by the 'secondary' variable.
let tertiary = secondary.key1;
// Reference to the 'key1' property of the object.
// This object now has 2 references: one as a property,
// the other as the 'tertiary' variable.
secondary = "Nikhil";
// The object that was originally in 'primary' has now zero
// references to it. It can be garbage-collected.
// However, its 'key1' property is still referenced by
// the 'tertiary' variable, so it cannot be freed.
tertiary = null;
// The 'key1' property of the object originally in primary
// has zero references to it. It can be garbage collected.
```
### Mark-and-Sweep 🪲
Mark-and-sweep is a more advanced Garbage Collection strategy. It starts from a set of root objects (e.g., global variables) and marks all objects reachable from these roots.
Afterwards, it sweeps away all unmarked objects, deallocating their memory.
> This method efficiently handles circular references, making it the preferred choice for modern JavaScript engines. 🚀
## Configuring Engine's Memory Model 🛠️
- JavaScript engines allow developers to configure memory settings, such as increasing the maximum heap size or exposing the garbage collector for debugging purposes.
- For instance, Node.js offers flags to adjust memory limits and enable garbage collector inspection:
```
node - max-old-space-size=4096 myScript.js
node - expose-gc - inspect myScript.js
```
## Advanced-Data Structures for Memory Management 🧩
- JavaScript introduces data structures like WeakMap and WeakSet, designed to aid in memory management by allowing objects to be garbage collected even if they're referenced within these structures.
- These structures hold weak references, meaning they don't prevent the garbage collector from collecting the referenced objects.
### WeakMap and WeakSet 🌐
- WeakMap and WeakSet both allow you to associate objects with other objects or track unique values without preventing those objects from being garbage collected.
- This feature is particularly useful for caching systems or tracking dependencies without holding onto unnecessary memory.
```
const weakMap = new WeakMap();
const key1 = {};
weakMap.set(key1, { key1 });
// Now `key1` cannot be garbage collected,
// because the value holds a reference to the key1,
// and the value is strongly held in the map!
```
### WeakRef and FinalizationRegistry 🔄
- WeakRef and FinalizationRegistry offer deeper insights into the garbage collection process.
- WeakRef allows you to hold a weak reference to an object, enabling it to be garbage collected while still accessing its value.
- FinalizationRegistry lets you register callbacks to run when an object is about to be garbage collected, facilitating cleanup operations.
```
const cache = new Map();
const registry = new FinalizationRegistry((value) => {
cache.delete(value);
});
function cached(fetcher) {
return async (key) => {
let value = cache.get(key);
if (value !== undefined) {
return value.deref();
}
value = await fetcher(key);
cache.set(key, new WeakRef(value));
registry.register(value, key);
return value;
};
}
const getImage = cached(async (url) => fetch(url).then(res => res.blob()));
``` | nikhilgupta946 |
1,875,680 | A course on Automating boring staff | I was navigating the confines of Udemy when I came across a Python course that powerfully caught my... | 0 | 2024-06-03T16:53:08 | https://dev.to/maxwellnewage/a-course-on-automating-boring-staff-26g7 | python, programming, beginners | I was navigating the confines of Udemy when I came across a Python course that powerfully caught my curiosity: [Automate the Boring Stuff with Python Programming](https://www.udemy.com/course/automate/). It lasts about nine and a half hours, it's somewhat old, but it captivated me from the first minute.

Above, you can see my certificate, freshly minted and ready to show off on my LinkedIn profile. Many people with too much free time might object with something like, "but the course lasts less than 40 hours, it must be very bad or incomplete." To these types of individuals, I would say that a course is not worth more or less based on the amount of time it takes.
Sometimes there are 4-hour courses that explain everything in a concise and specific manner, and then there are those famous 60-hour courses where 10 are theory and 50 are excruciating practice. Halfway through the course, you realize that you're repeating most of the concepts. It's like those cartridges with 999 games, where 800 were the same but changed Mario's outfit color (yes, I also went through that golden era).
The course is basically a video and practice translation of the book of the same name. Although it is several years old (it uses a version of Python from 2015), it remains a gem to admire and is also great for taking the first steps in Python.
## The content
It should be noted that the entire course is in English, but even if you don't have a strong command of the language, you can understand everything that is happening because Al Sweigart (the course creator) constantly executes commands in the console, demonstrating their results.
As for the course content itself, we have different sections covering all the fundamentals of Python:
- Control structures
- Conditional structures
- Functions
- Loops
- Lists and Dictionaries
- String Handling
- File Handling
- Debugging (it hurts a bit because he does it with the Python Shell)
After explaining the basics, the fun begins: Automation.
- Web Scraping
- Reading and writing Excel, Word, and PDF files
- Sending and reading emails
- Automating GUI
It is worth noting that at the end of the GUI chapter, he shows a script that plays a sushi preparation video game by itself.
## Conclusions
The main reason I recommend a course that is already several years old is because of its quality. Al Sweigart explains with love and dedication in every line of code he writes. It is designed for people who want to get into development, but it can surprise even experienced individuals. I got it for free during some sort of sale, if you know about it, don't hesitate to mention it in the comments! | maxwellnewage |
1,875,679 | Unlocking the ABCs of SEO: Elevating Visibility(Part-1) | Content Quality: At the core of every successful digital marketing strategy is content that... | 0 | 2024-06-03T16:52:34 | https://dev.to/urmila_1b8eb242ff335f2045/unlocking-the-abcs-of-seo-elevating-visibilitypart-1-4ifa |
2. Content Quality:
At the core of every successful [digital marketing ](https://contentcrusaders.in/)strategy is content that catches attention and builds up genuine connections. Quality content is not just facts and figures; it is storytelling—something that pulsates with life and speaks directly to the hearts of your audience, touching their dreams and concerns. Be it a story that touches the heartstrings, an informative video, or a relevant social media post, all of these pieces of content must seem like a discussion with the person to build that trust, sewing long-term relations with your audience. After all, these little personal touches touch souls and make brands stand out in the digital world. It is the human touch that makes all the difference in the digital world. Exceptional content, therefore, resounds with its audience, elicits sharing, and instills a lasting connection with the brand—what is required for traffic generation, lead generation, and nurturing of customer loyalty in today's competitive online world.
3. Meta Tags:
Meta tags are an integral component in on-page SEO, giving the search engines useful information on a webpage. Composed of meta titles and descriptions, these tags are summaries in a nutshell that affect click-through rates and search engine rankings. Well-crafted meta tags include the following: they contain important keywords, explain what is on the page, and attract users to click through to the website. They are important in forming a first impression of a webpage in search results and thus are instrumental to attracting organic traffic. Effective meta tags lead to improved visibility, user engagement, and finally, the success of [digital marketing](https://contentcrusaders.in/) efforts.
4. URL Structure:
The structure of a URL is one of the main elements in the optimization of a website; it influences user experience and search visibility. A well-structured URL provides clear navigation and communicates the hierarchy of content on a website. It should be concise, descriptive, and include relevant keywords, aiding both users and search engines in understanding the topic on the webpage. Proper formatting increases readability and makes sharing easier, hence increasing click-through rates on search results. Logically organizing the structure of URLs and embedding targeted keywords can help businesses improve the ranking of their websites in search engines and thus increase organic traffic—thereby raising the experience users have on the website.
5. Header Tags:
Header tags are normally very useful structuring elements of a website and organizing the content. They help search engines understand the hierarchy and context of the content on a web page and, at the same time, improve readability for users. Usually, the H1 tag is the major heading on the web page, indicating to the search engines and users the major topic of the text. The other tags of the header, like H2, H3, etc., create the sections of content in a logical structure assisting its comprehension. Through the strategic use of header tags to help outline the content and include targeted keywords, businesses can easily optimize web pages for better [search engine rankings](https://contentcrusaders.in/) and user engagement
6. Image Optimization:
Image optimization is of utmost importance to achieve high website performance and user experience. Well-optimized images will make web pages load fast and easily accessible. Moreover, this will also improve SEO ranking. Compressions in the file size of images without losing their quality can reduce website load time and bandwidth consumption. Alt text and descriptive filenames give search engines contextual meaning of the image, increasing the chances of the image appearing in image search results. As a result, optimized images are also important for a visually pleasing and satisfying website, leading to higher user satisfaction and retention rates. With special emphasis on image optimization, the website will deliver an accessible, fast, and very appealing visual experience on all devices.
7. Internal Linking:
Internal linking, in its essence, is a very robust SEO strategy that links one page of a website to another within the same domain. It helps users navigate a website more efficiently, and, secondly, spreads link equity across the whole website to help increase overall authority and search engine rankings. Companies can guide visitors through a strategically built internal link in content, which will surely lead them to related or relevant pages, increasing the desire to explore and engage with the website.Secondly, internal linking helps to create a hierarchical structure that enables search engines to understand the relative importance of the different pages and their context, enhancing the exposure and accessibility of the website on [search engines](https://contentcrusaders.in/).
8. Mobile-friendliness :
is among the most important factors that influence both user experience and search engine rankings. As 90% of all internet traffic today originates from mobile devices, one must take heed and have websites tweaked for the small screens of mobiles. Responsive design is one aspect of the website that adjusts the layout of a website, along with the content, to fit different screens; hence, it is convenient to browse and read. Besides satisfying the interest of mobile users, such mobile-friendly websites also enjoy preferential treatment from search engines, especially Google, that rank mobile-friendly websites higher in search results. That will, in turn, help increase user engagement, decrease bounce rates, and provide a better competitive advantage in today's world dominated by mobile devices.
9. [Page Speed](https://contentcrusaders.in/):
Page speed is among the most important elements in user experience and for search engines to rank a site. It is usually the measure of the time it takes for a webpage to load its content and the elements of that page. The faster it is to load, the more pleased the users are, the lower the bounce rates, and the higher the number of conversions. The search engines, like Google, normally rank sites with fast loading times, as they are friendlier and more useful to users. Some page speed optimization techniques include image optimization, leverage browser caching, and minimizing unnecessary code. With page speed optimization at the forefront, it will ensure a smooth and efficient browsing experience that will change users into highly engaged customers, hence bringing better visibility to search engines.
10. User Experience:
This encompasses all the features a user finds and experiences while interacting with websites, applications, or products and enhances their satisfaction with usability. It comprehends the behaviors, needs, and preferences of users to make things intuitive and accessible. UX design makes friendly interactions that touch users, thus increasing satisfaction and loyalty. The ideal UX journey will include website navigation, content layout, page speed & responsiveness on all devices. if done correctly, businesses benefit from more than just better customer retention with UX design: they build up conversion rates & brand loyalty. Moreover, good user experiences raise websites in the search engines, such as Google, favor those websites that are of value & are User-centric. investment in UX is a must in the modern competitive world of technology if one is to forge ahead & build on long-term success.
| urmila_1b8eb242ff335f2045 | |
1,875,678 | Mastering React Component Lifecycle: The Foundation for React Concepts | React, with its component-based architecture and declarative syntax, has become a staple in modern... | 0 | 2024-06-03T16:52:06 | https://dev.to/harshitt1617/mastering-react-component-lifecycle-the-foundation-for-react-concepts-b9a | react, javascript, webdev, reactnative | React, with its component-based architecture and declarative syntax, has become a staple in modern web development. However, to truly harness the power of React, understanding its lifecycle methods is essential. These methods form the foundation for advanced concepts like re-rendering, caching, and performance optimisation. In this blog, we'll take a comprehensive look at React's lifecycle methods, diving deep into each phase and providing practical examples along the way.
Intro to React and its Component Lifecycle
React's lifecycle can be divided into three main phases: Mounting, Updating, and Unmounting. Each phase has specific methods that allow developers to hook into the component's lifecycle and execute code at precise moments. Let's explore these phases and methods in detail.
1. Mounting Phase
The Mounting phase occurs when a component is first created and inserted into the DOM. Here are the key methods in this phase:
1.1 constructor(props)
The constructor method is where you initialize state and bind event handlers. It's called before the component is mounted.
for example :-

class MyComponent extends React.Component {
constructor(props) {
super(props);
this.state = { count: 0 };
this.handleClick = this.handleClick.bind(this);
}
handleClick() {
this.setState({ count: this.state.count + 1 });
}
render() {
return (
<div>
<p>Count: {this.state.count}</p>
<button onClick={this.handleClick}>Increment</button>
</div>
);
}
}
1.2 static getDerivedStateFromProps(props, state)
The getDerivedStateFromProps method is called before rendering the component, both during the initial mount and subsequent updates. It should return an object to update the state, or null to update nothing.

class MyComponent extends React.Component {
static getDerivedStateFromProps(nextProps, prevState) {
if (nextProps.someValue !== prevState.someValue) {
return { someValue: nextProps.someValue };
}
return null;
}
}
1.3 render()
The render method is required and returns the JSX that makes up the component's UI.

render() {
return (
<div>
<p>Count: {this.state.count}</p>
<button onClick={this.handleClick}>Increment</button>
</div>
);
}
1.4 componentDidMount()
The componentDidMount method is invoked immediately after a component is mounted. It's a good place to fetch data from an API or set up subscriptions.

componentDidMount() {
fetch('https://api.example.com/data')
.then(response => response.json())
.then(data => this.setState({ data }));
}
2. Updating Phase
The Updating phase occurs when a component's state or props change. Here are the key methods in this phase:
2.1 static getDerivedStateFromProps(props, state)
The getDerivedStateFromProps method is called again in this phase, allowing the component to update its state in response to prop changes.
2.2 shouldComponentUpdate(nextProps, nextState)
The shouldComponentUpdate method determines whether the component should update. By default, it returns true. Returning false can prevent unnecessary updates, improving performance.

shouldComponentUpdate(nextProps, nextState) {
return nextState.count !== this.state.count;
}
2.3 render()
The render method is called again to re-render the component with the new state or props.
2.4 getSnapshotBeforeUpdate(prevProps, prevState)
The getSnapshotBeforeUpdate method is called just before the changes from the virtual DOM are applied to the DOM. It captures some information (e.g., scroll position) from the DOM before it is potentially changed.

getSnapshotBeforeUpdate(prevProps, prevState) {
if (prevState.list.length < this.state.list.length) {
const list = document.querySelector('ul');
return list.scrollHeight - list.scrollTop;
}
return null;
}
2.5 componentDidUpdate(prevProps, prevState, snapshot)
The componentDidUpdate method is called after the updates are applied to the DOM. It's a good place to perform network requests or DOM manipulations that depend on the component being updated.

componentDidUpdate(prevProps, prevState, snapshot) {
if (snapshot !== null) {
const list = document.querySelector('ul');
list.scrollTop = list.scrollHeight - snapshot;
}
}
3. Unmounting Phase
The Unmounting phase occurs when a component is removed from the DOM. Here's the key method in this phase:
3.1 componentWillUnmount()
The componentWillUnmount method is called just before a component is unmounted. It's used to clean up resources like event listeners or timers to prevent memory leaks.

componentWillUnmount() {
// Clean up resources here
}
Error Handling Phase
React also provides methods for error handling during rendering and lifecycle methods:
4.1 static getDerivedStateFromError(error)
The getDerivedStateFromError method is called when a descendant component throws an error. It allows the component to update its state to render an error message.

static getDerivedStateFromError(error) {
return { hasError: true };
}
4.2 componentDidCatch(error, info)
The componentDidCatch method is called after a component catches an error in its descendants. It's used for logging errors or displaying a fallback UI.

componentDidCatch(error, info) {
logErrorToService(error, info);
}
Deprecated Methods
Some methods were used in older versions of React but have been deprecated. These include:
UNSAFE_componentWillMount()
UNSAFE_componentWillReceiveProps(nextProps)
UNSAFE_componentWillUpdate(nextProps, nextState)
These methods are no longer recommended and should be avoided in new code.
Conclusion: Why Mastering Lifecycle Methods Matters
Understanding React's component lifecycle methods is crucial for efficient and robust application development. These methods give you control over component behaviour, optimise rendering performance, manage resources effectively, and handle errors gracefully.
By mastering these basics, you pave the way for advanced React concepts like re-rendering, caching, and performance optimisation. So dive deep into React's lifecycle methods, experiment with them, and elevate your React development skills to the next level! | harshitt1617 |
1,875,677 | Support My YouTube Channel - devDive with Dipak! | Hey Dev Community! 👋 I hope you're all doing well and enjoying your coding journey. As some of you... | 0 | 2024-06-03T16:51:40 | https://dev.to/dipakahirav/support-my-youtube-channel-devdive-with-dipak-1pb7 | coding, javascript, webdev, learning | Hey Dev Community! 👋
I hope you're all doing well and enjoying your coding journey. As some of you might know, I've recently started a YouTube channel called **devDive with Dipak** where I share my knowledge and passion for full-stack development, coding problem-solving, and much more!
🔗 **[Check out my YouTube channel here!](https://www.youtube.com/@DevDivewithDipak)** 🔗
I'm reaching out to my amazing 9000+ followers here on Dev.to to kindly ask for your support. If you enjoy my content, please consider subscribing to my channel and hitting the like button on my videos. Your support means the world to me and will help me continue creating valuable content for the community.
Here's a quick list of what you can expect on my channel:
- **Full-Stack Development Tutorials**
- **Coding Problem Solving Sessions**
- **Practical Examples and Hands-On Projects**
- **Daily Short Videos with Programming Quotes and Tips**
Your subscription and likes not only boost my motivation but also help the channel grow and reach more people who might benefit from the content. So, if you find my posts here helpful, you'll definitely love the videos I share on YouTube.
Thank you for your continued support and for being such an awesome community!
Happy coding! 🚀
Best regards,
**Dipak Ahirav**
| dipakahirav |
1,875,672 | Website Design: A Powerful Tool for Lead Generation and Startups | In today's digital age, having a well-designed website is not just a luxury but a necessity for... | 0 | 2024-06-03T16:47:56 | https://dev.to/mdarafath/website-design-a-powerful-tool-for-lead-generation-and-startups-2pg1 | In today's digital age, having a well-designed website is not just a luxury but a necessity for businesses aiming to thrive and grow. For startups, especially, a compelling online presence can make the difference between success and obscurity.
The Role of Website Design in Lead Generation
Website design plays a pivotal role in lead generation. An effectively designed website serves as a business's digital storefront, attracting potential customers and encouraging them to engage with the company's products or services.
Here’s how:
First impressions matter. A website is often the first point of contact between a business and its potential customers. A visually appealing, user-friendly design can capture visitors' attention and keep them on the site longer. This increased engagement can translate into higher conversion rates, as visitors are more likely to explore the site further and take action.
Navigation and Usability: A well-structured website with intuitive navigation makes it easy for visitors to find the information they need. This reduces bounce rates and increases the likelihood of converting visitors into leads. Clear calls-to-action (CTAs) strategically placed throughout the site guide users towards desired actions, such as signing up for newsletters, requesting quotes, or making purchases.
SEO Optimization: An effective website design incorporates search engine optimisation (SEO) principles to ensure that the site ranks well on search engines like Google. High visibility on search engines increases organic traffic, bringing more potential leads to the site. Keywords, such as "[website design Brunei](https://tekydoct.com/our-services/website-design/
)," when used appropriately, can help attract local clients looking for web design services.
Mobile Responsiveness: With an increasing number of users accessing websites via mobile devices, having a mobile-responsive design is crucial. A responsive website adjusts seamlessly to different screen sizes, providing an optimal viewing experience on all devices. This not only improves the user experience but also boosts search engine rankings, further enhancing lead-generation efforts.
Benefits for Startups
For startups, a well-designed website offers numerous advantages:
Credibility and Trust: A professionally designed website lends credibility to a startup, making it appear more trustworthy and reliable. This is essential in building consumer confidence, especially for new businesses that need to establish their reputation.
Cost-Effective Marketing: Compared to traditional marketing methods, digital marketing through a website is more cost-effective. A website can serve as a central hub for all marketing efforts, integrating with social media, email campaigns, and other online advertising strategies to reach a wider audience at a lower cost.
Market Reach: A website allows startups to reach a global audience. Unlike physical storefronts, a website is accessible 24/7, breaking geographical barriers and enabling startups to tap into markets beyond their local area.
Data Collection and Analysis: Websites provide valuable insights into user behaviour through analytics tools. Startups can gather data on visitor demographics, interests, and behaviour patterns. This information is crucial for refining marketing strategies, improving products or services, and making informed business decisions.
Scalability: A website can grow with the business. Startups can start with a basic site and gradually expand its features and functionalities as the business evolves. This scalability ensures that the website continues to meet the business's needs without requiring a complete overhaul.
Why Choose Tekydoct Sdn Bhd?
At [Tekydoct Sdn. Bhd](https://tekydoct.com/)., we understand the unique challenges that startups face. Our team of skilled designers and developers is committed to creating websites that not only look great but also drive results. We take a personalised approach, working closely with our clients to understand their specific needs and goals. Our expertise in website design in Brunei ensures that your site is optimised for both local and global audiences, maximising your reach and impact.
Conclusion
A well-designed website is a powerful tool for lead generation and a vital asset for startups. It enhances credibility, expands market reach, and provides valuable data for business growth. At Tekydoct Sdn. Bhd., we are dedicated to helping businesses succeed with exceptional website designs that fulfil client requirements and exceed expectations. Let us help you create a website that not only stands out but also drives your business forward.
| mdarafath | |
1,875,671 | Blockchain Beyond Bitcoin: Innovative Uses in Various Industries | Supply Chain Management: Blockchain enhances transparency and traceability, allowing real-time... | 0 | 2024-06-03T16:39:48 | https://dev.to/bingecoder89/blockchain-beyond-bitcoin-innovative-uses-in-various-industries-5boo | webdev, javascript, devops, ai | - **Supply Chain Management**: Blockchain enhances transparency and traceability, allowing real-time tracking of goods from origin to consumer, reducing fraud and errors.
- **Healthcare**: Securing patient data on a blockchain ensures privacy and data integrity, while also enabling efficient sharing of medical records among authorized providers.
- **Voting Systems**: Blockchain-based voting systems offer tamper-proof and transparent election processes, increasing trust in democratic institutions and reducing election fraud.
- **Real Estate**: Smart contracts on the blockchain simplify property transactions, reduce paperwork, and eliminate the need for intermediaries, making the process faster and more secure.
- **Financial Services**: Beyond cryptocurrencies, blockchain facilitates faster and cheaper cross-border payments, improves fraud detection, and streamlines regulatory compliance.
- **Intellectual Property**: Creators can use blockchain to register and manage copyrights, patents, and trademarks, ensuring proof of ownership and protecting against unauthorized use.
- **Energy Sector**: Blockchain supports peer-to-peer energy trading, allowing individuals to buy and sell renewable energy directly, promoting decentralized energy markets.
- **Food Safety**: By tracking the journey of food products from farm to table, blockchain helps in quickly identifying contamination sources, ensuring faster recalls and better food safety.
- **Education**: Blockchain can securely store academic credentials and certificates, making it easier to verify qualifications and reducing credential fraud.
- **Humanitarian Aid**: Ensuring transparency and accountability in the distribution of aid, blockchain helps in tracking the flow of funds and resources, ensuring they reach the intended recipients efficiently. | bingecoder89 |
1,875,669 | Top 10 SaaS Applications To Help Businesses Grow | In today's competitive business world, staying ahead of the curve requires using the right tools.... | 0 | 2024-06-03T16:35:21 | https://dev.to/marufhossain/top-10-saas-applications-to-help-businesses-grow-259k | In today's competitive business world, staying ahead of the curve requires using the right tools. Enter SaaS (Software as a Service) applications – game-changers that deliver software on demand over the internet. No expensive installations, no complex maintenance – just powerful features accessible from any device. But with a vast array of options, choosing the right SaaS applications can be overwhelming. Let's explore some of the top contenders that can propel your business to new heights!
**Customer Relationship Management (CRM) – Your Secret Weapon for Customer Love**
Imagine knowing every detail about your customers, from their preferences to purchase history. That's the magic of CRM! Tools like Salesforce and HubSpot CRM centralize customer data, streamline lead management, and help you track deals in real-time. This translates to closing more deals, boosting customer retention, and building stronger relationships – all vital ingredients for business growth.
**Project Management – Teamwork Makes the Dream Work**
Ever felt like projects are spinning out of control? Project management applications like Asana and Trello come to the rescue. These tools help you assign tasks, track progress, and collaborate seamlessly with your team. Imagine deadlines met effortlessly, clear communication, and a team firing on all cylinders – that's the power of effective project management!
**Marketing Made Easy – Reaching the Right Audience at the Right Time**
The key to business growth? Reaching the right audience with the right message. Marketing SaaS applications like Mailchimp and Hootsuite make this a breeze. With email marketing automation, you can send personalized campaigns that resonate with your customers. Social media management tools help you schedule posts, engage with followers, and build brand awareness across various platforms. The result? A wider audience, more leads, and a thriving online presence.
**Beyond the Basics – Power Up Your Business**
The SaaS landscape offers a treasure trove of solutions beyond the core categories. Accounting applications like QuickBooks simplify financial management, while Content Management Systems (CMS) like WordPress empower you to create and manage a stunning website. Communication and collaboration tools like Slack and Microsoft Teams keep your team connected and productive. Don't forget about Analytics & Business Intelligence tools like Google Analytics, which provide valuable insights into customer behavior and help you make data-driven decisions.
**Choosing the Perfect Fit – The Journey Begins**
The right SaaS applications can be the growth engine your business needs. But remember, there's no one-size-fits-all solution. Research available options, consider factors like pricing plans, security features, and integration capabilities with your existing tools. The key is to find applications that align with your specific needs and goals. With the right tools in your arsenal, you're well on your way to achieving sustainable business growth!
**Bonus Tip: The [SaaS application development](https://www.clickittech.com/saas-application-development/?utm_source=backlinks&utm_medium=referral) world is constantly evolving, so stay updated on the latest trends and explore new tools as your business needs change.**
| marufhossain | |
1,875,667 | Buy Verified Paxful Account | https://dmhelpshop.com/product/buy-verified-paxful-account/ Buy Verified Paxful Account There are... | 0 | 2024-06-03T16:33:55 | https://dev.to/uiueqay3/buy-verified-paxful-account-2g6d | python, ai, devops, productivity | ERROR: type should be string, got "https://dmhelpshop.com/product/buy-verified-paxful-account/\n\n\n\n\nBuy Verified Paxful Account\nThere are several compelling reasons to consider purchasing a verified Paxful account. Firstly, a verified account offers enhanced security, providing peace of mind to all users. Additionally, it opens up a wider range of trading opportunities, allowing individuals to partake in various transactions, ultimately expanding their financial horizons.\n\nMoreover, Buy verified Paxful account ensures faster and more streamlined transactions, minimizing any potential delays or inconveniences. Furthermore, by opting for a verified account, users gain access to a trusted and reputable platform, fostering a sense of reliability and confidence.\n\nLastly, Paxful’s verification process is thorough and meticulous, ensuring that only genuine individuals are granted verified status, thereby creating a safer trading environment for all users. Overall, the decision to Buy Verified Paxful account can greatly enhance one’s overall trading experience, offering increased security, access to more opportunities, and a reliable platform to engage with. Buy Verified Paxful Account.\n\nBuy US verified paxful account from the best place dmhelpshop\nWhy we declared this website as the best place to buy US verified paxful account? Because, our company is established for providing the all account services in the USA (our main target) and even in the whole world. With this in mind we create paxful account and customize our accounts as professional with the real documents. Buy Verified Paxful Account.\n\nIf you want to buy US verified paxful account you should have to contact fast with us. Because our accounts are-\n\nEmail verified\nPhone number verified\nSelfie and KYC verified\nSSN (social security no.) verified\nTax ID and passport verified\nSometimes driving license verified\nMasterCard attached and verified\nUsed only genuine and real documents\n100% access of the account\nAll documents provided for customer security\nWhat is Verified Paxful Account?\nIn today’s expanding landscape of online transactions, ensuring security and reliability has become paramount. Given this context, Paxful has quickly risen as a prominent peer-to-peer Bitcoin marketplace, catering to individuals and businesses seeking trusted platforms for cryptocurrency trading.\n\nIn light of the prevalent digital scams and frauds, it is only natural for people to exercise caution when partaking in online transactions. As a result, the concept of a verified account has gained immense significance, serving as a critical feature for numerous online platforms. Paxful recognizes this need and provides a safe haven for users, streamlining their cryptocurrency buying and selling experience.\n\nFor individuals and businesses alike, Buy verified Paxful account emerges as an appealing choice, offering a secure and reliable environment in the ever-expanding world of digital transactions. Buy Verified Paxful Account.\n\nVerified Paxful Accounts are essential for establishing credibility and trust among users who want to transact securely on the platform. They serve as evidence that a user is a reliable seller or buyer, verifying their legitimacy.\n\nBut what constitutes a verified account, and how can one obtain this status on Paxful? In this exploration of verified Paxful accounts, we will unravel the significance they hold, why they are crucial, and shed light on the process behind their activation, providing a comprehensive understanding of how they function. Buy verified Paxful account.\n\n \n\nWhy should to Buy Verified Paxful Account?\nThere are several compelling reasons to consider purchasing a verified Paxful account. Firstly, a verified account offers enhanced security, providing peace of mind to all users. Additionally, it opens up a wider range of trading opportunities, allowing individuals to partake in various transactions, ultimately expanding their financial horizons.\n\nMoreover, a verified Paxful account ensures faster and more streamlined transactions, minimizing any potential delays or inconveniences. Furthermore, by opting for a verified account, users gain access to a trusted and reputable platform, fostering a sense of reliability and confidence. Buy Verified Paxful Account.\n\nLastly, Paxful’s verification process is thorough and meticulous, ensuring that only genuine individuals are granted verified status, thereby creating a safer trading environment for all users. Overall, the decision to buy a verified Paxful account can greatly enhance one’s overall trading experience, offering increased security, access to more opportunities, and a reliable platform to engage with.\n\n \n\nWhat is a Paxful Account\nPaxful and various other platforms consistently release updates that not only address security vulnerabilities but also enhance usability by introducing new features. Buy Verified Paxful Account.\n\nIn line with this, our old accounts have recently undergone upgrades, ensuring that if you purchase an old buy Verified Paxful account from dmhelpshop.com, you will gain access to an account with an impressive history and advanced features. This ensures a seamless and enhanced experience for all users, making it a worthwhile option for everyone.\n\n \n\nIs it safe to buy Paxful Verified Accounts?\nBuying on Paxful is a secure choice for everyone. However, the level of trust amplifies when purchasing from Paxful verified accounts. These accounts belong to sellers who have undergone rigorous scrutiny by Paxful. Buy verified Paxful account, you are automatically designated as a verified account. Hence, purchasing from a Paxful verified account ensures a high level of credibility and utmost reliability. Buy Verified Paxful Account.\n\nPAXFUL, a widely known peer-to-peer cryptocurrency trading platform, has gained significant popularity as a go-to website for purchasing Bitcoin and other cryptocurrencies. It is important to note, however, that while Paxful may not be the most secure option available, its reputation is considerably less problematic compared to many other marketplaces. Buy Verified Paxful Account.\n\nThis brings us to the question: is it safe to purchase Paxful Verified Accounts? Top Paxful reviews offer mixed opinions, suggesting that caution should be exercised. Therefore, users are advised to conduct thorough research and consider all aspects before proceeding with any transactions on Paxful.\n\n \n\nHow Do I Get 100% Real Verified Paxful Accoun?\nPaxful, a renowned peer-to-peer cryptocurrency marketplace, offers users the opportunity to conveniently buy and sell a wide range of cryptocurrencies. Given its growing popularity, both individuals and businesses are seeking to establish verified accounts on this platform.\n\nHowever, the process of creating a verified Paxful account can be intimidating, particularly considering the escalating prevalence of online scams and fraudulent practices. This verification procedure necessitates users to furnish personal information and vital documents, posing potential risks if not conducted meticulously.\n\nIn this comprehensive guide, we will delve into the necessary steps to create a legitimate and verified Paxful account. Our discussion will revolve around the verification process and provide valuable tips to safely navigate through it.\n\nMoreover, we will emphasize the utmost importance of maintaining the security of personal information when creating a verified account. Furthermore, we will shed light on common pitfalls to steer clear of, such as using counterfeit documents or attempting to bypass the verification process.\n\nWhether you are new to Paxful or an experienced user, this engaging paragraph aims to equip everyone with the knowledge they need to establish a secure and authentic presence on the platform.\n\nBenefits Of Verified Paxful Accounts\nVerified Paxful accounts offer numerous advantages compared to regular Paxful accounts. One notable advantage is that verified accounts contribute to building trust within the community.\n\nVerification, although a rigorous process, is essential for peer-to-peer transactions. This is why all Paxful accounts undergo verification after registration. When customers within the community possess confidence and trust, they can conveniently and securely exchange cash for Bitcoin or Ethereum instantly. Buy Verified Paxful Account.\n\nPaxful accounts, trusted and verified by sellers globally, serve as a testament to their unwavering commitment towards their business or passion, ensuring exceptional customer service at all times. Headquartered in Africa, Paxful holds the distinction of being the world’s pioneering peer-to-peer bitcoin marketplace. Spearheaded by its founder, Ray Youssef, Paxful continues to lead the way in revolutionizing the digital exchange landscape.\n\nPaxful has emerged as a favored platform for digital currency trading, catering to a diverse audience. One of Paxful’s key features is its direct peer-to-peer trading system, eliminating the need for intermediaries or cryptocurrency exchanges. By leveraging Paxful’s escrow system, users can trade securely and confidently.\n\nWhat sets Paxful apart is its commitment to identity verification, ensuring a trustworthy environment for buyers and sellers alike. With these user-centric qualities, Paxful has successfully established itself as a leading platform for hassle-free digital currency transactions, appealing to a wide range of individuals seeking a reliable and convenient trading experience. Buy Verified Paxful Account.\n\n \n\nHow paxful ensure risk-free transaction and trading?\nEngage in safe online financial activities by prioritizing verified accounts to reduce the risk of fraud. Platforms like Paxfu implement stringent identity and address verification measures to protect users from scammers and ensure credibility.\n\nWith verified accounts, users can trade with confidence, knowing they are interacting with legitimate individuals or entities. By fostering trust through verified accounts, Paxful strengthens the integrity of its ecosystem, making it a secure space for financial transactions for all users. Buy Verified Paxful Account.\n\nExperience seamless transactions by obtaining a verified Paxful account. Verification signals a user’s dedication to the platform’s guidelines, leading to the prestigious badge of trust. This trust not only expedites trades but also reduces transaction scrutiny. Additionally, verified users unlock exclusive features enhancing efficiency on Paxful. Elevate your trading experience with Verified Paxful Accounts today.\n\nIn the ever-changing realm of online trading and transactions, selecting a platform with minimal fees is paramount for optimizing returns. This choice not only enhances your financial capabilities but also facilitates more frequent trading while safeguarding gains. Buy Verified Paxful Account.\n\nExamining the details of fee configurations reveals Paxful as a frontrunner in cost-effectiveness. Acquire a verified level-3 USA Paxful account from usasmmonline.com for a secure transaction experience. Invest in verified Paxful accounts to take advantage of a leading platform in the online trading landscape.\n\n \n\nHow Old Paxful ensures a lot of Advantages?\n\nExplore the boundless opportunities that Verified Paxful accounts present for businesses looking to venture into the digital currency realm, as companies globally witness heightened profits and expansion. These success stories underline the myriad advantages of Paxful’s user-friendly interface, minimal fees, and robust trading tools, demonstrating its relevance across various sectors.\n\nBusinesses benefit from efficient transaction processing and cost-effective solutions, making Paxful a significant player in facilitating financial operations. Acquire a USA Paxful account effortlessly at a competitive rate from usasmmonline.com and unlock access to a world of possibilities. Buy Verified Paxful Account.\n\nExperience elevated convenience and accessibility through Paxful, where stories of transformation abound. Whether you are an individual seeking seamless transactions or a business eager to tap into a global market, buying old Paxful accounts unveils opportunities for growth.\n\nPaxful’s verified accounts not only offer reliability within the trading community but also serve as a testament to the platform’s ability to empower economic activities worldwide. Join the journey towards expansive possibilities and enhanced financial empowerment with Paxful today. Buy Verified Paxful Account.\n\n \n\nWhy paxful keep the security measures at the top priority?\nIn today’s digital landscape, security stands as a paramount concern for all individuals engaging in online activities, particularly within marketplaces such as Paxful. It is essential for account holders to remain informed about the comprehensive security protocols that are in place to safeguard their information.\n\nSafeguarding your Paxful account is imperative to guaranteeing the safety and security of your transactions. Two essential security components, Two-Factor Authentication and Routine Security Audits, serve as the pillars fortifying this shield of protection, ensuring a secure and trustworthy user experience for all. Buy Verified Paxful Account.\n\nConclusion\nInvesting in Bitcoin offers various avenues, and among those, utilizing a Paxful account has emerged as a favored option. Paxful, an esteemed online marketplace, enables users to engage in buying and selling Bitcoin. Buy Verified Paxful Account.\n\nThe initial step involves creating an account on Paxful and completing the verification process to ensure identity authentication. Subsequently, users gain access to a diverse range of offers from fellow users on the platform. Once a suitable proposal captures your interest, you can proceed to initiate a trade with the respective user, opening the doors to a seamless Bitcoin investing experience.\n\nIn conclusion, when considering the option of purchasing verified Paxful accounts, exercising caution and conducting thorough due diligence is of utmost importance. It is highly recommended to seek reputable sources and diligently research the seller’s history and reviews before making any transactions.\n\nMoreover, it is crucial to familiarize oneself with the terms and conditions outlined by Paxful regarding account verification, bearing in mind the potential consequences of violating those terms. By adhering to these guidelines, individuals can ensure a secure and reliable experience when engaging in such transactions. Buy Verified Paxful Account.\n\n \n\nContact Us / 24 Hours Reply\nTelegram:dmhelpshop\nWhatsApp: +1 (980) 277-2786\nSkype:dmhelpshop\nEmail:dmhelpshop@gmail.com" | uiueqay3 |
1,875,666 | Implementing API Rate Limiting with a Token Bucket 🪣 | In this article, We will try to explore Token Bucket algorithm and its implementation in NodeJS for... | 0 | 2024-06-03T16:30:00 | https://keploy.io/blog/community/create-api-rate-limiting-with-token-bucket | webdev, programming, news, api |

In this article, We will try to explore Token Bucket algorithm and its implementation in NodeJS for API Rate Limiting in very simple terms.
**What is Token Bucket ?**
Token Bucket is an algorithm which is used to limit our resources or server usage. It is an algorithm in which we have some finite amount of tokens on our server and whenever a request is made, a token is used for that request full fulfillment. When there are requests more than the number of tokens, then the server denies or awaits all the requests until the tokens are refilled.
The tokens can be refilled in various ways. Two of them are as follows :
whenever a request is fulfilled, the token used by the user is returned back to the server.
refilling the tokens after a specific interval of time.
https://keploy.io/wp/wp-content/uploads/2024/05/fdecfaa9-210f-407a-a35c-63de7fa7.webp
Implementation of Token Bucket
1. Setup a new npm project and set the "type":"module".
```
npm init -y
```
https://keploy.io/wp/wp-content/uploads/2024/05/dd6aec84-6a75-4ac8-a434-6bd92b96.webp
2.Install express.
```
npm i express
```
3.Create a new file, name it anything, let's say "index.js". Write a basic express server code in it.
```
import express from 'express';
const app = express();
app.get('/',(req,res) => {
res.send('Hello There !!');
})
const PORT = process.env.PORT || 8000;
app.listen(PORT,() => {
console.log(`Server is running on PORT : ${PORT}`);
})
```
Now we'll be rate limiting the request to '/'. We'll be programming a middleware to achieve this.
4.Create a new file for the middleware, let's say, "rateLimiter.js" and write the syntax of the middleware function and export it.
```
export const rateLimiter = (req,res,next) => {
}
const tokens = ["AAAA","AAAA","AAAA","AAAA","AAAA"];
var time = new Date().getTime();
export const rateLimiter = (req,res,next) => {
}
```
In this code, tokens is the array of the tokens which the user can use to make a request to the server. time is a variable in which we store the current time in milliseconds.
```
const tokens = ["AAAA","AAAA","AAAA","AAAA","AAAA"];
var time = new Date().getTime();
export const rateLimiter = (req,res,next) => {
if(tokens.length){
tokens.pop();
next();
}
else{
res.send(`Service not available due to excess requests !! , ${new Date().getTime()-time}`);
}
}
```
We have added simple if else condition in this, if any request comes and if the tokens array has a token, then a token will pop out and the request will be allowed, else the request will be denied.
After the tokens array becomes empty, we need to refill it.
```
const tokens = ["AAAA","AAAA","AAAA","AAAA","AAAA"];
var time = new Date().getTime();
export const rateLimiter = (req,res,next) => {
if(tokens.length){
tokens.pop();
next();
}
else{
if(new Date().getTime()-time >= 20000){
const len = tokens.length;
for(let i=0;i<5-len;i++){
tokens.push("AAAA");
}
time = new Date().getTime();
rateLimiter(res,res,next);
}
else{
res.send(`Service not available due to excess requests !! , ${new Date().getTime()-time}`);
}
}
}
```
In this code, we changed a little bit of else condition. We are calculating the time difference with "new Date().getTime()-time". If this difference exceeds 20000 milliseconds i.e. 20 sec, the tokens array will be refilled to 5 tokens.
But this code has a problem. In this code, whenever the server is started, the time variable gets initialized. Suppose after 20 seconds the first request is made. Then, by this code we will be able to make 10 requests in a span of 20 seconds because after 20 seconds when all the 5 tokens are used, the if condition of the outer else condition will run and it will refill the array with 5 more tokens immediately. But by our code, we only want 5 requests per 20 seconds.
With a smaller change in the present code, we can achieve the desired result.
```
const tokens = ["AAAA","AAAA","AAAA","AAAA","AAAA"];
var time = new Date().getTime();
export const rateLimiter = (req,res,next) => {
if(tokens.length && new Date().getTime()-time < 20000){
tokens.pop();
next();
}
else{
if(new Date().getTime()-time >= 20000){
const len = tokens.length;
for(let i=0;i<5-len;i++){
tokens.push("AAAA");
}
time = new Date().getTime();
rateLimiter(res,res,next);
}
else{
res.send(`Service not available due to excess requests !! , ${new Date().getTime()-time}`);
}
}
}
```
We changed the outer if condition. The conditions are like firstly the server should be having a token and the time should be less than 20 sec, if the time difference is exceeding 20 seconds, the array will be refilled if there are less than 5 tokens in it.
Now add the middleware to the route.
```
import express from 'express';
import { rateLimiter } from './rateLimiter.js';
const app = express();
app.get('/', rateLimiter, (req,res) => {
res.send('Hello There !!');
})
const PORT = process.env.PORT || 8000;
app.listen(PORT,() => {
console.log(`Server is running on PORT : ${PORT}`);
})
Congratulations ! You have successfully added Rate Limitation to your api
The final code looks like this.
//"index.js"
import express from 'express';
import { rateLimiter } from './middleware/rateLimiter.js';
const app = express();
app.get('/', rateLimiter, (req,res) => {
res.send("Hello There !!");
})
const PORT = process.env.PORT || 8000;
app.listen(PORT,() => {
console.log(`Server is running on PORT : ${PORT}`);
})
// "rateLimiter.js"
const tokens = ["AAAA","AAAA","AAAA","AAAA","AAAA"];
var time = new Date().getTime();
export const rateLimiter = (req,res,next) => {
if(tokens.length && new Date().getTime()-time < 20000){
tokens.pop();
next();
}
else{
if(new Date().getTime()-time >= 20000){
const len = tokens.length;
for(let i=0;i<5-len;i++){
tokens.push("AAAA");
}
time = new Date().getTime();
rateLimiter(res,res,next);
}
else{
res.send(`Service not available due to excess requests !! , ${new Date().getTime()-time}`);
}
}
}
```
**Conclusion**
Now, I think we have understood how Token Bucket is implemented and will be able to customize the number of requests and tokens in it. If you have any queries, write in the comments and I will try to help you out.
**FAQs:**
**What is the Token Bucket algorithm?**
The Token Bucket algorithm is used for rate limiting to control the consumption of resources or server usage. It involves maintaining a bucket of tokens, where each token represents permission to perform a specific action or request.
**How does the Token Bucket algorithm work?**
Requests consume tokens from the bucket. When the bucket is empty, further requests are either denied or queued until tokens are refilled. Tokens can be refilled at a fixed rate or based on certain conditions.
**What is the purpose of API rate limiting?**
Rate limiting helps prevent abuse or overload of APIs by restricting the number of requests a client can make within a specified timeframe. It ensures fair usage of resources and protects the server from being overwhelmed. | keploy |
1,875,665 | System Design Resources that are Not ByteByteGo | System design is a core engineering skill and everyone on your team should have some degree of... | 0 | 2024-06-03T16:29:47 | https://dev.to/vladi-stevanovic/system-design-resources-that-are-not-bytebytego-1h2j | systemdesign, softwaredevelopment, architecture, productivity | System design is a core engineering skill and everyone on your team should have [some degree of understanding of their system’s architecture](https://www.multiplayer.app/blog/why-everyone-in-your-team-should-understand-the-system-architecture-even-a-little/).
In addition to that, with the rise in the adoption of AI coding assistants, mastering this skill will safeguard your professional career ensuring that you remain relevant and productive in an evolving technological landscape.
Traditionally, junior developers have been taught to focus primarily on learning coding skills and mastering the fundamentals of their chosen technologies. However, AI assistants, like GitHub Copilot, are significantly accelerating coding tasks—55% of users report coding faster. This acceleration frees up time for developers to delve deeper into system intricacies, thereby gaining expertise in the environments they create and adopting a more holistic approach to software system development.
Inbal Shani, former CPO at GitHub, [emphasized this shift in mindset](https://youtu.be/f10s3rxKaJw?si=ZeXagayKdPyXsGwk&t=508):
> *Developers need to form a different thinking […] more systems, more architecture. You need to start figuring out how to use the AI tools to help you be successful. It's no longer just the actual code writing, it's really evolving your thinking to see the big picture, the connected experience, and the connected systems.*
>
This mindset, once primarily associated with senior software engineers, is now becoming essential for all developers. The gap between senior and junior developers is narrowing, especially as 92% of developers are already leveraging AI tools.
👉 The time to start learning system design is now. 👈
### Problems with the Current System Design Discourse
Unfortunately, the discourse around system design often centers on “[how to ace a system design interview](https://medium.com/javarevisited/top-10-system-design-interview-books-in-2024-3e69e182e092)”. While it's true that system design is a critical skill for many organizations, particularly given the prevalence of distributed systems, this focus on interview preparation neglects the importance of applying these skills in day-to-day, real-world scenarios.
This hyper-focus on technical interviews is akin to the institution of standardized testing—it has its uses but is inherently limited. It fails to provide a complete picture of the real-world challenges and the creative, adaptive thinking required to effectively apply system design knowledge and skills in practical contexts.
Furthermore, the industry is currently [experiencing a shift in the role and significance of Software Architect](https://www.multiplayer.app/blog/the-rise-of-modern-software-architects/)s. We're recognizing that system and software design are not confined to specific roles; every engineer should possess some level of proficiency in these areas. Having system design experience and considering architectural requirements during coding makes you a better engineer and leads to superior products.
However, many engineers and organizations have yet to embrace this trend, maintaining a strict differentiation between engineers and various types of Software Architects.
Lastly, the most significant issue: system design is often misconceived as merely diagramming, producing specific documents, or adhering to codified frameworks. In reality, system design is an ongoing **process** that outlines the high-level conceptual structure of a complex system (the system architecture) and defines its major components and interactions. While it **can** result in outputs such as system diagrams, Architectural Design Records, or the use of specific tools and frameworks, it encompasses how a team builds software and not just the tools that they use to help throughout the process.
## Resources you usually see
When researching system design, the internet often surfaces two primary resources:
- The [ByteByteGo Newsletter](https://blog.bytebytego.com/)
- [Corporate Engineering Blogs](https://bytesizeddesign.substack.com/p/the-byte-sized-design-list-of-system)
I want to emphasize that **both are extremely helpful** and I highly recommend them. In fact, we are subcribers to - and avid fans of - the ByteByteGo Newsletter and its authors [Alex Xu](https://x.com/alexxubyte) and [Sahn Lam](https://x.com/sahnlam). Conveying complex concepts in a fun and visual way is an art and reading their newsletter is always a pleasure.
Likewise, it’s fascinating to learn how companies like Netflix, Google, Stripe, or Spotify design their systems and discover the clever solutions they’ve implemented. However, chances are you’re not working on a system as mammoth as theirs and their approaches are often tailored to these specific use cases.
Indeed, there is **no single right way** to architect a system. The design depends on your business requirements, development stage, and the trade-offs you’re willing to make.
## Underestimated System Design Newsletters
In addition to ByteByteGo and various corporate blogs, I highly recommend checking these resources. They are not mentioned nearly as often, but they can teach you a lot about system design:
<aside>
📌 NB. These are just general categories that helped **me** categorize them, so there is some overlap.
</aside>
**Fundamentals of System Design**
- “[System Design Codex](https://newsletter.systemdesigncodex.com/)” by [Saurabh Dashora](https://x.com/ProgressiveCod2)
- “[Distributed Systems Architecture](https://www.multiplayer.app/distributed-systems-architecture/)” by [Thomas Johnson](https://x.com/tomjohnson3)
- “[Architecture Notes](https://architecturenotes.co/)” by [Mahdi Yusuf](https://x.com/myusuf3)
- “[Software Design: Tidy First?](https://tidyfirst.substack.com/)” by [Kent Beck](https://x.com/KentBeck)
- "[Level Up Coding](https://blog.levelupcoding.com/)” by [Nikki Siapno](https://www.linkedin.com/in/nikkisiapno/)
- “[AlgoMaster](https://newsletter.ashishps.com/)” by [Ashish Pratap Singh](https://www.linkedin.com/in/ashishps1/)
- “[System Design Classroom](https://systemdesignclassroom.substack.com/)” by [Raul Junco](https://www.linkedin.com/in/raul-junco/)
- “[Dev Details](https://blog.devdetails.com/)” by [Mike Thornton](https://www.linkedin.com/in/devdetails/)
- “[Tech World With Milan](https://newsletter.techworld-with-milan.com/)” by [Milan Milanović](https://x.com/milan_milanovic)
**Big Tech System Design Examples & Recaps**
- “[System Design Newsletter](https://newsletter.systemdesign.one/)” by [Neo Kim](https://x.com/systemdesign42)
- “[Byte-Sized Design](https://bytesizeddesign.substack.com/)”
- “[Quastor](https://blog.quastor.org/)” by [Arpan G.](https://www.linkedin.com/in/arpan-g-1445571b3/)
**Broader Scope Interesting Newsletters**
- “[.NET & Software Architecture](https://www.milanjovanovic.tech/blog)” by [Milan Jovanović](https://x.com/mjovanovictech)
- “[Curious Engineer](https://vivekbansal.substack.com/)” by [Vivek Bansal](https://x.com/vivekbansal1011)
- “[Technically](https://read.technically.dev/)” by [Justin Gage](https://x.com/readtechnically)
- “[Data Gibberish](https://open.substack.com/pub/datagibberish)” by [Yordan Ivanov](https://www.linkedin.com/in/ivanovyordan/)
- “[EcZachly Data Engineering](https://blog.dataengineer.io/)” by [Zach Wilson](https://www.linkedin.com/in/eczachly/)
## System Design Books
System design books are also great starting points for deepening your understanding of architectural principles and best practices. Here are some of the most popular ones:
- [Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems](https://www.amazon.com/Designing-Data-Intensive-Applications-Reliable-Maintainable/dp/1449373321) by Martin Kleppmann
- [Fundamentals of Software Architecture: An Engineering Approach](https://www.amazon.com/Fundamentals-Software-Architecture-Comprehensive-Characteristics/dp/1492043451) by Mark Richards and Neal Ford
- [Tidy First?: A Personal Exercise in Empirical Software Design](https://www.amazon.com/Tidy-First-Personal-Exercise-Empirical/dp/1098151240) by Kent Beck
- [The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win](https://www.amazon.com/Phoenix-Project-DevOps-Helping-Business/dp/1942788290) by Gene Kim, Kevin Behr, and George Spafford and its sequel “[The Unicorn Project](https://www.amazon.com/Unicorn-Project-Developers-Disruption-Thriving/dp/1942788762/ref=pd_bxgy_d_sccl_1/141-6395562-5865409?pd_rd_w=1pL1n&content-id=amzn1.sym.c51e3ad7-b551-4b1a-b43c-3cf69addb649&pf_rd_p=c51e3ad7-b551-4b1a-b43c-3cf69addb649&pf_rd_r=X0VAY77QQKFHGVZ7X0P1&pd_rd_wg=HJbqR&pd_rd_r=3be08e4b-e077-48df-a5b2-d6bc4097ef4c&pd_rd_i=1942788762&psc=1)”
- [Building Microservices: Designing Fine-Grained Systems](https://www.amazon.com/Building-Microservices-Designing-Fine-Grained-Systems/dp/1491950358) by Sam Newman
- [The Art of Scalability: Scalable Web Architecture, Processes, and Organizations for the Modern Enterprise](https://www.amazon.com/Art-Scalability-Architecture-Organizations-Enterprise/dp/0134032802) by Martin L. Abbott and Michael T. Fisher
- [Clean Architecture: A Craftsman's Guide to Software Structure and Design](https://www.amazon.com/Clean-Architecture-Craftsmans-Software-Structure/dp/0134494164) by Robert C. Martin
- [Designing Distributed Systems](https://www.amazon.com/Designing-Distributed-Systems-Brendan-Burns/dp/1491983647) by Brendan Burns
## Helpful GitHub Repos
I also recommend these GitHub repositories for practical examples, tools, and resources to enhance your system design skills and knowledge.
- [The System Design Primer](https://github.com/donnemartin/system-design-primer) by [Dan Golant](https://github.com/dgolant)
- [System Design](https://github.com/karanpratapsingh/system-design) by [Karan Pratap Singh](https://github.com/karanpratapsingh)
- [Professional Programming](https://github.com/charlax/professional-programming) by [Charles-Axel Dein](https://github.com/charlax)
---
I hope you found this helpful and I look forward to more recommendations in the comments! 💜 | vladi-stevanovic |
1,857,678 | cdi ==> bean | @data @AllArgsConstructor @NoArgsConstructor @builder //cdi ==> bean @Named(value =... | 0 | 2024-05-18T14:56:01 | https://dev.to/mustafacam/cdi-bean-30p9 | @Data
@AllArgsConstructor
@NoArgsConstructor
@Builder
//cdi ==> bean
@Named(value = "namedtuto")
@ApplicationScoped
public class _01_Named {
private Long namedId;
private String namedData="Merhabalar Named Cdi Bean";
}
Bu Java kodu, **CDI (Contexts and Dependency Injection)** ve **Lombok** kütüphanesini kullanarak bir **bean** tanımlıyor. Açıklamalarıyla birlikte her bir parçanın ne işe yaradığını inceleyelim:
- `@Data`: Lombok kütüphanesinden bir annotation'dır ve sınıf için getter, setter, `toString`, `equals` ve `hashCode` metodlarını otomatik olarak oluşturur¹⁵.
- `@AllArgsConstructor`: Yine Lombok'tan bir annotation olup, sınıfın tüm alanları için parametre alan bir constructor oluşturur¹.
- `@NoArgsConstructor`: Sınıf için parametresiz bir constructor oluşturur. Bu, özellikle JPA gibi bazı Java EE teknolojileri tarafından gereklidir¹.
- `@Builder`: Lombok ile, nesneleri adım adım oluşturmak için kullanılan builder pattern'ini kolayca uygulamak için kullanılır⁶.
CDI ile ilgili annotation'lar:
- `@Named(value = "namedtuto")`: CDI'da, bean'in isimlendirilmesini sağlar ve bu isimle bean'e erişilebilir hale gelir[^10^].
- `@ApplicationScoped`: Bean'in uygulama kapsamında olduğunu belirtir, yani uygulama çalıştığı sürece tek bir instance'ı olur ve tüm uygulama boyunca paylaşılır¹⁸.
Bu kod parçası, `namedId` ve `namedData` adında iki özel alana sahip `_01_Named` isimli bir sınıf tanımlar. `namedData` alanı "Merhabalar Named Cdi Bean" string'i ile başlatılmıştır. Bu sınıf, CDI tarafından yönetilen bir bean olarak işlev görür ve Lombok sayesinde ekstra boilerplate kod yazmaya gerek kalmadan çeşitli yardımcı metodlara otomatik olarak sahip olur. Bu bean, `namedtuto` ismiyle uygulama genelinde erişilebilir ve uygulama kapsamında yaşar, yani uygulama çalıştığı sürece aynı instance'ı kullanılır. Bu yapı, özellikle web uygulamalarında ve enterprise Java uygulamalarında sıkça kullanılır.
Kaynak: Bing ile konuşma, 18.05.2024
(1) @Data - Project Lombok. https://projectlombok.org/features/Data.
(2) @NoArgsConstructor, @RequiredArgsConstructor, @AllArgsConstructor. https://projectlombok.org/features/constructor.
(3) Using Lombok's @Builder Annotation | Baeldung. https://www.baeldung.com/lombok-builder.
(4) java - What is javax.inject.Named annotation supposed to be used for .... https://stackoverflow.com/questions/5415261/what-is-javax-inject-named-annotation-supposed-to-be-used-for.
(5) java - What is the difference between @ApplicationScoped and @Singleton .... https://stackoverflow.com/questions/4555844/what-is-the-difference-between-applicationscoped-and-singleton-scopes-in-cdi.
(6) Why to use @AllArgsConstructor and @NoArgsConstructor together over an .... https://stackoverflow.com/questions/68314072/why-to-use-allargsconstructor-and-noargsconstructor-together-over-an-entity.
(7) What is the @NoArgsConstructor annotation in Lombok? - Educative. https://www.educative.io/answers/what-is-the-noargsconstructor-annotation-in-lombok.
(8) @AllArgsConstructor vs @NoArgsConstructor vs @RequiredArgsConstructor .... https://dailycodework.com/lombok-annotations-explained/.
(9) Annotation Type NoArgsConstructor - Project Lombok. https://projectlombok.org/api/lombok/NoArgsConstructor.
(10) @Builder - Project Lombok. https://projectlombok.org/features/Builder.
(11) @builder annotation in spring boot | Code Ease. https://www.codeease.net/programming/java/builder-annotation-in-spring-boot.
(12) Lombok @Builder with Examples- HowToDoInJava. https://howtodoinjava.com/lombok/lombok-builder-annotation/.
(13) An Introduction to CDI in Java | Baeldung. https://www.baeldung.com/java-ee-cdi.
(14) Java CDI Dependency Injection Example | Burak Aktas. http://buraktas.com/java-cdi-dependency-injection-example/.
(15) Creating Named beans with annotations (JSF 2.0) - IBM. https://www.ibm.com/docs/SSRTLW_9.6.0/com.ibm.etools.jsf.doc/topics/tcrt_facesNamed_bean_annot.html.
(16) Giving Beans EL Names - The Java EE 6 Tutorial - Oracle. https://docs.oracle.com/javaee/6/tutorial/doc/gjbak.html.
(17) @Data Lombok Annotation Example - Java Guides. https://www.javaguides.net/2019/03/project-lombok-data-annotation-example.html.
(18) Using Data annotation on Java DTO class - Stack Overflow. https://stackoverflow.com/questions/51820133/using-data-annotation-on-java-dto-class.
(19) ApplicationScoped (Java(TM) EE 7 Specification APIs) - Oracle. https://docs.oracle.com/javaee/7/api/javax/enterprise/context/ApplicationScoped.html.
(20) ApplicationScope (Spring Framework 6.1.6 API). https://docs.spring.io/spring-framework/docs/current/javadoc-api/org/springframework/web/context/annotation/ApplicationScope.html.
(21) ApplicationScope (Spring Framework API) - Javadoc - Pleiades. https://spring.pleiades.io/spring-framework/docs/current/javadoc-api/org/springframework/web/context/annotation/ApplicationScope.html.
(22) ApplicationScoped (Java EE 6 ) - Oracle. https://docs.oracle.com/javaee/6/api/javax/faces/bean/ApplicationScoped.html.
(23) Difference Between Lombok @AllArgsConstructor ... - Baeldung. https://www.baeldung.com/java-lombok-constructor-annotations-comparison.
(24) What is the @AllArgsConstructor annotation in Lombok? - Educative. https://www.educative.io/answers/what-is-the-allargsconstructor-annotation-in-lombok.
(25) java 8 - @AllArgsConstructor and Constructor Injection with Spring: is .... https://stackoverflow.com/questions/62631503/allargsconstructor-and-constructor-injection-with-spring-is-private-final-need.
(26) undefined. https://mvnrepository.com/artifact/org.projectlombok/lombok.
(27) undefined. https://projectlombok.org/download.
(28) undefined. http://download.oracle.com/javaee/6/api/javax/inject/Named.html.
(29) undefined. https://dzone.com/articles/java-ee6-cdi-named-components.
(30) undefined. http://java.sun.com/xml/ns/javaee.
(31) undefined. http://www.w3.org/2001/XMLSchema-instance.
(32) undefined. http://java.sun.com/xml/ns/javaee/beans_1_0.xsd. | mustafacam | |
1,875,664 | Hands-on Basic Linux Commands: #Day3 of 90DaysofDevOps | Task: What is the Linux command to: 1. To view what's written in a file. Viewing the Contents of a... | 0 | 2024-06-03T16:29:07 | https://dev.to/oncloud7/hands-on-basic-linux-commands-day3-of-90daysofdevops-49ma | devops, linux, awschallenge, 90daysofdevops | **Task: What is the Linux command to:**
**1. To view what's written in a file.**
Viewing the Contents of a File: You can use the cat command to see what's written in a file. For example:


**2. To change the access permissions of files.**
To modify the access permissions of files, you can use the chmod command. For instance:


1. chmod +rwx filename to add permissions
2. chmod -rwx directoryname to remove permissions.
3. chmod +x filename to allow executable permissions.
4. chmod -wx filename to take out write and executable permissions.

**There are three options for permission groups available to you in Linux.**
**owners:** these permissions will only apply to owners and will not affect other groups.
**groups:** you can assign a group of users specific permissions, which will only impact users within the group.
**users:** these permissions will apply to all users, and as a result, they present the greatest security risk and should be assigned with caution.
**There are three kinds of file permissions in Linux:**
**Read (r):** Allows a user or group to view a file.
**Write (w):** Permits the user to write or modify a file or directory.
**Execute (x):** A user or group with execute permissions can execute a file or view a directory.
**3. To check which commands you have run till now.**


**4. To remove a directory/ Folder.**


**5. To create a fruits.txt file and to view the content.**


**6. Add content in devops.txt (One in each line) - Apple, Mango, Banana, Cherry, Kiwi, Orange, Guava.**


**7. Show only the top three fruits from the file.**


**8. Show only the bottom three fruits from the file.**


**9. To create another file Colors.txt and to view the content.**


**10. Add content in Colors.txt (One in each line) - Red, Pink, White, Black, Blue, Orange, Purple, Grey.**


**11. To find the difference between fruits.txt and Colors.txt files.**

 | oncloud7 |
1,875,663 | Buy verified cash app account | https://dmhelpshop.com/product/buy-verified-cash-app-account/ Buy verified cash app account Cash... | 0 | 2024-06-03T16:22:29 | https://dev.to/uiueqay3/buy-verified-cash-app-account-2fk | webdev, javascript, beginners, programming | ERROR: type should be string, got "https://dmhelpshop.com/product/buy-verified-cash-app-account/\n\n\n\n\nBuy verified cash app account\nCash app has emerged as a dominant force in the realm of mobile banking within the USA, offering unparalleled convenience for digital money transfers, deposits, and trading. As the foremost provider of fully verified cash app accounts, we take pride in our ability to deliver accounts with substantial limits. Bitcoin enablement, and an unmatched level of security.\n\nOur commitment to facilitating seamless transactions and enabling digital currency trades has garnered significant acclaim, as evidenced by the overwhelming response from our satisfied clientele. Those seeking buy verified cash app account with 100% legitimate documentation and unrestricted access need look no further. Get in touch with us promptly to acquire your verified cash app account and take advantage of all the benefits it has to offer.\n\nWhy dmhelpshop is the best place to buy USA cash app accounts?\nIt’s crucial to stay informed about any updates to the platform you’re using. If an update has been released, it’s important to explore alternative options. Contact the platform’s support team to inquire about the status of the cash app service.\n\nClearly communicate your requirements and inquire whether they can meet your needs and provide the buy verified cash app account promptly. If they assure you that they can fulfill your requirements within the specified timeframe, proceed with the verification process using the required documents.\n\nOur account verification process includes the submission of the following documents: [List of specific documents required for verification].\n\nGenuine and activated email verified\nRegistered phone number (USA)\nSelfie verified\nSSN (social security number) verified\nDriving license\nBTC enable or not enable (BTC enable best)\n100% replacement guaranteed\n100% customer satisfaction\nWhen it comes to staying on top of the latest platform updates, it’s crucial to act fast and ensure you’re positioned in the best possible place. If you’re considering a switch, reaching out to the right contacts and inquiring about the status of the buy verified cash app account service update is essential.\n\nClearly communicate your requirements and gauge their commitment to fulfilling them promptly. Once you’ve confirmed their capability, proceed with the verification process using genuine and activated email verification, a registered USA phone number, selfie verification, social security number (SSN) verification, and a valid driving license.\n\nAdditionally, assessing whether BTC enablement is available is advisable, buy verified cash app account, with a preference for this feature. It’s important to note that a 100% replacement guarantee and ensuring 100% customer satisfaction are essential benchmarks in this process.\n\nHow to use the Cash Card to make purchases?\nTo activate your Cash Card, open the Cash App on your compatible device, locate the Cash Card icon at the bottom of the screen, and tap on it. Then select “Activate Cash Card” and proceed to scan the QR code on your card. Alternatively, you can manually enter the CVV and expiration date. How To Buy Verified Cash App Accounts.\n\nAfter submitting your information, including your registered number, expiration date, and CVV code, you can start making payments by conveniently tapping your card on a contactless-enabled payment terminal. Consider obtaining a buy verified Cash App account for seamless transactions, especially for business purposes. Buy verified cash app account.\n\nWhy we suggest to unchanged the Cash App account username?\nTo activate your Cash Card, open the Cash App on your compatible device, locate the Cash Card icon at the bottom of the screen, and tap on it. Then select “Activate Cash Card” and proceed to scan the QR code on your card.\n\nAlternatively, you can manually enter the CVV and expiration date. After submitting your information, including your registered number, expiration date, and CVV code, you can start making payments by conveniently tapping your card on a contactless-enabled payment terminal. Consider obtaining a verified Cash App account for seamless transactions, especially for business purposes. Buy verified cash app account. Purchase Verified Cash App Accounts.\n\nSelecting a username in an app usually comes with the understanding that it cannot be easily changed within the app’s settings or options. This deliberate control is in place to uphold consistency and minimize potential user confusion, especially for those who have added you as a contact using your username. In addition, purchasing a Cash App account with verified genuine documents already linked to the account ensures a reliable and secure transaction experience.\n\n \n\nBuy verified cash app accounts quickly and easily for all your financial needs.\nAs the user base of our platform continues to grow, the significance of verified accounts cannot be overstated for both businesses and individuals seeking to leverage its full range of features. How To Buy Verified Cash App Accounts.\n\nFor entrepreneurs, freelancers, and investors alike, a verified cash app account opens the door to sending, receiving, and withdrawing substantial amounts of money, offering unparalleled convenience and flexibility. Whether you’re conducting business or managing personal finances, the benefits of a verified account are clear, providing a secure and efficient means to transact and manage funds at scale.\n\nWhen it comes to the rising trend of purchasing buy verified cash app account, it’s crucial to tread carefully and opt for reputable providers to steer clear of potential scams and fraudulent activities. How To Buy Verified Cash App Accounts. With numerous providers offering this service at competitive prices, it is paramount to be diligent in selecting a trusted source.\n\nThis article serves as a comprehensive guide, equipping you with the essential knowledge to navigate the process of procuring buy verified cash app account, ensuring that you are well-informed before making any purchasing decisions. Understanding the fundamentals is key, and by following this guide, you’ll be empowered to make informed choices with confidence.\n\n \n\nIs it safe to buy Cash App Verified Accounts?\nCash App, being a prominent peer-to-peer mobile payment application, is widely utilized by numerous individuals for their transactions. However, concerns regarding its safety have arisen, particularly pertaining to the purchase of “verified” accounts through Cash App. This raises questions about the security of Cash App’s verification process.\n\nUnfortunately, the answer is negative, as buying such verified accounts entails risks and is deemed unsafe. Therefore, it is crucial for everyone to exercise caution and be aware of potential vulnerabilities when using Cash App. How To Buy Verified Cash App Accounts.\n\nCash App has emerged as a widely embraced platform for purchasing Instagram Followers using PayPal, catering to a diverse range of users. This convenient application permits individuals possessing a PayPal account to procure authenticated Instagram Followers.\n\nLeveraging the Cash App, users can either opt to procure followers for a predetermined quantity or exercise patience until their account accrues a substantial follower count, subsequently making a bulk purchase. Although the Cash App provides this service, it is crucial to discern between genuine and counterfeit items. If you find yourself in search of counterfeit products such as a Rolex, a Louis Vuitton item, or a Louis Vuitton bag, there are two viable approaches to consider.\n\n \n\nWhy you need to buy verified Cash App accounts personal or business?\nThe Cash App is a versatile digital wallet enabling seamless money transfers among its users. However, it presents a concern as it facilitates transfer to both verified and unverified individuals.\n\nTo address this, the Cash App offers the option to become a verified user, which unlocks a range of advantages. Verified users can enjoy perks such as express payment, immediate issue resolution, and a generous interest-free period of up to two weeks. With its user-friendly interface and enhanced capabilities, the Cash App caters to the needs of a wide audience, ensuring convenient and secure digital transactions for all.\n\nIf you’re a business person seeking additional funds to expand your business, we have a solution for you. Payroll management can often be a challenging task, regardless of whether you’re a small family-run business or a large corporation. How To Buy Verified Cash App Accounts.\n\nImproper payment practices can lead to potential issues with your employees, as they could report you to the government. However, worry not, as we offer a reliable and efficient way to ensure proper payroll management, avoiding any potential complications. Our services provide you with the funds you need without compromising your reputation or legal standing. With our assistance, you can focus on growing your business while maintaining a professional and compliant relationship with your employees. Purchase Verified Cash App Accounts.\n\nA Cash App has emerged as a leading peer-to-peer payment method, catering to a wide range of users. With its seamless functionality, individuals can effortlessly send and receive cash in a matter of seconds, bypassing the need for a traditional bank account or social security number. Buy verified cash app account.\n\nThis accessibility makes it particularly appealing to millennials, addressing a common challenge they face in accessing physical currency. As a result, ACash App has established itself as a preferred choice among diverse audiences, enabling swift and hassle-free transactions for everyone. Purchase Verified Cash App Accounts.\n\n \n\nHow to verify Cash App accounts\nTo ensure the verification of your Cash App account, it is essential to securely store all your required documents in your account. This process includes accurately supplying your date of birth and verifying the US or UK phone number linked to your Cash App account.\n\nAs part of the verification process, you will be asked to submit accurate personal details such as your date of birth, the last four digits of your SSN, and your email address. If additional information is requested by the Cash App community to validate your account, be prepared to provide it promptly. Upon successful verification, you will gain full access to managing your account balance, as well as sending and receiving funds seamlessly. Buy verified cash app account.\n\n \n\nHow cash used for international transaction?\nExperience the seamless convenience of this innovative platform that simplifies money transfers to the level of sending a text message. It effortlessly connects users within the familiar confines of their respective currency regions, primarily in the United States and the United Kingdom.\n\nNo matter if you’re a freelancer seeking to diversify your clientele or a small business eager to enhance market presence, this solution caters to your financial needs efficiently and securely. Embrace a world of unlimited possibilities while staying connected to your currency domain. Buy verified cash app account.\n\nUnderstanding the currency capabilities of your selected payment application is essential in today’s digital landscape, where versatile financial tools are increasingly sought after. In this era of rapid technological advancements, being well-informed about platforms such as Cash App is crucial.\n\nAs we progress into the digital age, the significance of keeping abreast of such services becomes more pronounced, emphasizing the necessity of staying updated with the evolving financial trends and options available. Buy verified cash app account.\n\nOffers and advantage to buy cash app accounts cheap?\nWith Cash App, the possibilities are endless, offering numerous advantages in online marketing, cryptocurrency trading, and mobile banking while ensuring high security. As a top creator of Cash App accounts, our team possesses unparalleled expertise in navigating the platform.\n\nWe deliver accounts with maximum security and unwavering loyalty at competitive prices unmatched by other agencies. Rest assured, you can trust our services without hesitation, as we prioritize your peace of mind and satisfaction above all else.\n\nEnhance your business operations effortlessly by utilizing the Cash App e-wallet for seamless payment processing, money transfers, and various other essential tasks. Amidst a myriad of transaction platforms in existence today, the Cash App e-wallet stands out as a premier choice, offering users a multitude of functions to streamline their financial activities effectively. Buy verified cash app account.\n\nTrustbizs.com stands by the Cash App’s superiority and recommends acquiring your Cash App accounts from this trusted source to optimize your business potential.\n\nHow Customizable are the Payment Options on Cash App for Businesses?\nDiscover the flexible payment options available to businesses on Cash App, enabling a range of customization features to streamline transactions. Business users have the ability to adjust transaction amounts, incorporate tipping options, and leverage robust reporting tools for enhanced financial management.\n\nExplore trustbizs.com to acquire verified Cash App accounts with LD backup at a competitive price, ensuring a secure and efficient payment solution for your business needs. Buy verified cash app account.\n\nDiscover Cash App, an innovative platform ideal for small business owners and entrepreneurs aiming to simplify their financial operations. With its intuitive interface, Cash App empowers businesses to seamlessly receive payments and effectively oversee their finances. Emphasizing customization, this app accommodates a variety of business requirements and preferences, making it a versatile tool for all.\n\nWhere To Buy Verified Cash App Accounts\nWhen considering purchasing a verified Cash App account, it is imperative to carefully scrutinize the seller’s pricing and payment methods. Look for pricing that aligns with the market value, ensuring transparency and legitimacy. Buy verified cash app account.\n\nEqually important is the need to opt for sellers who provide secure payment channels to safeguard your financial data. Trust your intuition; skepticism towards deals that appear overly advantageous or sellers who raise red flags is warranted. It is always wise to prioritize caution and explore alternative avenues if uncertainties arise.\n\nThe Importance Of Verified Cash App Accounts\nIn today’s digital age, the significance of verified Cash App accounts cannot be overstated, as they serve as a cornerstone for secure and trustworthy online transactions.\n\nBy acquiring verified Cash App accounts, users not only establish credibility but also instill the confidence required to participate in financial endeavors with peace of mind, thus solidifying its status as an indispensable asset for individuals navigating the digital marketplace.\n\nWhen considering purchasing a verified Cash App account, it is imperative to carefully scrutinize the seller’s pricing and payment methods. Look for pricing that aligns with the market value, ensuring transparency and legitimacy. Buy verified cash app account.\n\nEqually important is the need to opt for sellers who provide secure payment channels to safeguard your financial data. Trust your intuition; skepticism towards deals that appear overly advantageous or sellers who raise red flags is warranted. It is always wise to prioritize caution and explore alternative avenues if uncertainties arise.\n\nConclusion\nEnhance your online financial transactions with verified Cash App accounts, a secure and convenient option for all individuals. By purchasing these accounts, you can access exclusive features, benefit from higher transaction limits, and enjoy enhanced protection against fraudulent activities. Streamline your financial interactions and experience peace of mind knowing your transactions are secure and efficient with verified Cash App accounts.\n\nChoose a trusted provider when acquiring accounts to guarantee legitimacy and reliability. In an era where Cash App is increasingly favored for financial transactions, possessing a verified account offers users peace of mind and ease in managing their finances. Make informed decisions to safeguard your financial assets and streamline your personal transactions effectively.\n\nContact Us / 24 Hours Reply\nTelegram:dmhelpshop\nWhatsApp: +1 (980) 277-2786\nSkype:dmhelpshop\nEmail:dmhelpshop@gmail.com\n\n" | uiueqay3 |
1,875,662 | How can I modify the logo and footnote from a WP theme | I created a website and built it from a theme that comes with logo and footnote design. I want to... | 0 | 2024-06-03T16:21:57 | https://dev.to/bitiqa/how-can-i-modify-the-logo-and-footnote-from-a-wp-theme-32eb | I created a website and built it from a theme that comes with logo and footnote design. I want to change the logo to my own logo and the structure of the footnote section, and tried to do this by going to the Widgets section (under Appearance) but I don't seem to be able to do this. Any suggestions on how I can do this pls? | bitiqa | |
1,875,661 | Why Use Time Tracking Software? | Introduction: Maintaining team productivity and meeting project deadlines can be a... | 0 | 2024-06-03T16:21:48 | https://dev.to/goseoservices/why-use-time-tracking-software-550a | productivity, monitoring | ## Introduction:
Maintaining team productivity and meeting project deadlines can be a never-ending race against the clock in today's fast-paced business environment. It makes sense that managers would want a magic solution to make time management easier—juggling tasks, allocating resources, and monitoring employee hours.
Enter time tracking software, a powerful tool that can revolutionize your business. But why exactly should you consider using time-tracking software? Let's examine the many advantages it provides.
## Unveiling the Power of Time Tracking Software
While traditional methods like timesheets and manual tracking can work, they often need to catch up in a modern work environment. Time tracking software offers a comprehensive and user-friendly solution, providing a multitude of advantages over manual methods:
-
**Increased Productivity:** Picture a system that automatically keeps track of the amount of time spent on assignments and projects. Employees and supervisors can save a great deal of time by not having to enter timesheets when using time tracking software manually. This frees teams to concentrate on meaningful work rather than wasting time on tedious administrative duties.
-
**Improved Project Management:** Precise time monitoring information offers vital perspectives on project schedules and resource distribution. It is possible to pinpoint places where projects must catch up or resources could be improved. Doing so lets you make well-informed judgments and modify project plans as necessary to ensure timely completion and avoid expensive delays.
-
**Boosted Productivity:** Knowing their tracked time can motivate employees to stay focused and minimize distractions. Time-tracking software also helps identify time-consuming tasks and potential bottlenecks in workflows. This allows you to optimize processes and empower employees to work smarter, not harder.
-
**Transparency and Accountability:** A transparent time-tracking system fosters a culture of accountability within your team. Employees can see how their time contributes to the overall project goals, and managers gain a clear picture of individual workloads. This transparency builds trust and promotes a collaborative work environment.
-
**Data-Driven Decision Making:** Time tracking software provides a wealth of valuable data at your fingertips. You can analyze trends, identify areas for improvement, and gain insights into team performance. This data can be used to make informed decisions about staffing, resource allocation, and future project planning. Move from gut feelings to data-driven strategies for a more successful business.
Time-tracking software is not about micromanaging employees. It's about empowering them with the tools to be more productive and providing managers with valuable data to make strategic decisions.
## The Capabilities of Time Tracking Software
Time tracking software goes far beyond simply recording employee hours. Modern solutions offer a range of features designed to streamline workflows and enhance team collaboration:
-
**Project Management Integration:** Integrate your time tracking software with existing project management tools. This allows for seamless data transfer and provides a holistic view of project progress, resource allocation, and deadlines.
-
**Detailed Reporting and Analytics:** Generate comprehensive reports that provide insights into team productivity, individual performance, and project timelines. Identify trends, analyze billable hours, and gain valuable data for future project planning.
-
**Flexible Tracking Methods:** Many software options offer diverse tracking methods for different work styles and tasks. This could include timers for specific tasks, manual entry for non-billable activities, or automatic time capture for particular applications.
-
**Mobile Apps for On-the-Go Tracking:** Empower your team to track time from anywhere with mobile apps. This is particularly beneficial for remote workers or those with flexible schedules.
-
**Automated Payroll Calculations:** Integrate your time-tracking software with payroll systems to streamline payroll processing and ensure accurate employee paychecks. This saves valuable time and eliminates manual data entry errors.
These features, combined with core time-tracking functionalities, make time-tracking software a powerful tool for any business looking to optimize its operations and improve overall team performance.
## Choosing the Right Time Tracking Software
With many time-tracking software options, selecting the right solution for your unique needs is crucial. Here are some essential things to think about:
-
**Team Size and Needs:** Consider the size of your team and their specific work styles. Some software options better suit larger teams with complex project structures. In contrast, others might cater to smaller, more agile teams.
-
**Features and Functionality: ** Evaluate the features offered by different software solutions and identify functionalities that best align with your business goals. Do you prioritize project management integration, detailed reporting, or mobile access?
-
**Budget:** Time-tracking software solutions come in a variety of pricing structures. Consider your budget constraints and choose a solution that offers the functionalities you need at a reasonable price point.
-
**Ease of Use:** An intuitive and user-friendly interface ensures your team readily adopts the new software. Avoid overly complex interfaces that lead to frustration and resistance.
-
**Security and Data Privacy:** Ensure the software provider prioritizes data security and adheres to relevant data privacy regulations. Employee data should be protected, and the software should be transparent about how data is collected and used.
Remember, the ideal time tracking software should feel manageable. It should integrate seamlessly into your existing workflows and empower your team to work more efficiently.
## Your Ally in the Battle Against the Clock
While numerous time tracking software solutions exist, [Time Champ](https://timechamp.io) stands out. We offer a robust and user-friendly platform to empower teams to work smarter, not stiffer. Here's what sets Time Champ apart from Employee Monitoring Software:
-
**Focus on Transparency:** Time Champ promotes a culture of trust and ownership by encouraging employees to self-report their time spent on tasks. This approach fosters accountability and yields more accurate data than intrusive monitoring practices.
-
**Project Management Integration:** Seamlessly integrate Time Champ with your existing project management tools. This lets you view project progress, resource allocation, and time spent on tasks within a single platform, providing a holistic view of project efficiency.
-
**Actionable Insights and Analytics:** Gain valuable insights into team productivity and identify potential bottlenecks without micromanagement. Generate reports that analyze project timelines, workload distribution, and billable hours. Use this data to make data-driven decisions and optimize future projects.
-
**Flexibility and Customization:** Time Champ caters to diverse work styles and project needs. Offer employees the flexibility to choose their preferred tracking methods (timers, manual entry) and customize reports to focus on specific metrics.
-
**Focus on Employee Experience:** Time Champ prioritizes a user-friendly experience for managers and employees. The intuitive interface is easy to learn and navigate, minimizing disruption to existing workflows.
## Conclusion:
Ultimately, Time Champ enables in-person and remote teams to be responsible and productive without sacrificing privacy. It's a valuable tool for optimizing processes, increasing productivity, and helping a successful organization make data-driven decisions.
Ready to unlock the full potential of your team with time-tracking software? Explore what Time Tracking software offers and how it can help your business conquer the time monster! | goseoservices |
1,875,660 | Building great things | Ah, the journey of building a software house - an adventure that many developers face at the end of... | 0 | 2024-06-03T16:20:23 | https://dev.to/damnpedrini/building-great-things-41hi | buildinpublic, webdev, beginners, ai | Ah, the journey of building a software house - an adventure that many developers face at the end of college. It's like stepping into a parallel universe, where we can not only do what we love, but also breathe life into ideas that we believe will make a difference, all with a beautiful aesthetic, of course.
But like in any great saga, there were some setbacks. My beloved Macbook Pro decided to overheat. Apparently, the thermal paste wasn't applied ideally, and in the heat of the Brazilian summer, the GPU suffered a thermal collapse. Thank you, Apple, for reminding me that even the most elegant gadgets have their moments of fragility.
So there I was, in the following three months, relying exclusively on my main work computer at @dialog.ci (Thank you very much for that), where I was introduced to the wonderful world of Linux Mint. Ah, what a beauty of a distribution for beginners! I fell in love with the simplicity and control it offered. And now, I'm immersed in Debian, feeling like a true master of the code arts.
During this period of technological misfortune, I managed to save up and buy a new M2 Air. I shared the idea of the software house with a designer friend, and he bought into it. Thus was born @sakuracodeprojects, our company with such a beautiful aesthetic that it makes pixels cry with emotion.
In the last six months, while we were planning the launch of Sakura, I also delved into a personal project for my college graduation: a vegan food app powered by artificial intelligence (yeah, another one of those AI things, following in the footsteps of Stanford students, you know how it is). I presented the project to my college advisor, who loved the idea and, to my surprise, enrolled me in an international scientific research forum. Finally, I'll have the chance to present my work to the public.
Furthermore, I started studying Ruby on Rails and quite enjoyed it. It's amazing how this language can simplify web development.
Now, with Sakura Code Projects taking off and my AI project gaining international recognition, I'm determined to focus only on what truly excites me in my personal projects. In the coming months, I'll only work on projects that engage me body and soul.
And it seems luck is on my side, as two new developers have joined the Sakura team. They are campus students who found us. I confess I thought it would be harder to put together a team, but things just fell into place, and I'm incredibly happy with the result.
Here, I conclude the end of a cycle where I learned about constancy, consistency, values, and purpose, not only in my projects, but also in how I balance them with my personal life, making everything one. I maintain a healthy routine of exercise and surfing on the beautiful beaches of the Brazilian coast, as I believe that for great performance, it's necessary to focus not only on intellectual development but also on physical.
I believe I've used my time meaningfully, pursuing goals worth the effort, alongside people who value relationships. | damnpedrini |
1,875,658 | Defining Classes for Objects | Object-oriented programming enables you to develop large-scale software and GUIs effectively. A class... | 0 | 2024-06-03T16:20:05 | https://dev.to/paulike/defining-classes-for-objects-15o5 | java, programming, learning, beginners | Object-oriented programming enables you to develop large-scale software and GUIs effectively. A class defines the properties and behaviors for objects. Object-oriented programming (OOP) involves programming using objects. An _object_ represents an entity in the real world that can be distinctly identified. For example, a student, a desk, a circle, a button, and even a loan can all be viewed as objects. An object has a unique identity, state, and behavior.
- The _state_ of an object (also known as its _properties_ or _attributes_) is represented by _data fields_ with their current values. A circle object, for example, has a data field **radius**, which is the property that characterizes a circle. A rectangle object has the data fields **width** and **height**, which are the properties that characterize a rectangle.
- The _behavior_ of an object (also known as its _actions_) is defined by methods. To invoke a method on an object is to ask the object to perform an action. For example, you may define methods named **getArea()** and **getPerimeter()** for circle objects. A circle object may invoke **getArea()** to return its area and **getPerimeter()** to return its perimeter. You may also define the **setRadius(radius)** method. A circle object can invoke this method to change its radius.
Objects of the same type are defined using a common class. A _class_ is a template, blueprint, or _contract_ that defines what an object’s data fields and methods will be. An object is an instance of a class. You can create many instances of a class. Creating an instance is referred to as _instantiation_. The terms _object_ and _instance_ are often interchangeable. The relationship between classes and objects is analogous to that between an apple-pie recipe and apple pies: You can make as many apple pies as you want from a single recipe. Figure below (a) shows a class named **Circle** and its three objects.

A Java class uses variables to define data fields and methods to define actions. Additionally, a class provides methods of a special type, known as _constructors_, which are invoked to create a new object. A constructor can perform any action, but constructors are designed to perform initializing actions, such as initializing the data fields of objects. Figure below (b) shows an example of defining the class for circle objects.

The **Circle** class is different from all of the other classes you have seen thus far. It does not have a **main** method and therefore cannot be run; it is merely a definition for circle objects. The class that contains the **main** method will be referred to in this book, for convenience, as the _main class_.
The illustration of class templates and objects in Figure above (a) can be standardized using _Unified Modeling Language (UML)_ notation. This notation, as shown in Figure below, is called a _UML class diagram_, or simply a _class diagram_.

In the class diagram, the data field is denoted as
`dataFieldName: dataFieldType`
The constructor is denoted as
`ClassName(parameterName: parameterType)`
The method is denoted as
`methodName(parameterName: parameterType): returnType` | paulike |
1,875,657 | easiest way to get ahead in tech quick. | Go Here Free tool to optimize yourself for the current landscape of jobs. Resume optimized for... | 0 | 2024-06-03T16:18:53 | https://dev.to/alexdonn/easiest-way-to-get-ahead-in-tech-quick-59ch | workplace, productivity, career | [Go Here
](https://sourceco.io/success)
Free tool to optimize yourself for the current landscape of jobs. Resume optimized for current ai resume filtering.
Free tools to make yourself standout amongst everyone else. To get picked for the top jobs, be at the top, look like #1.
| alexdonn |
1,875,655 | What is GitOps? | What is GitOps? GitOps is a set of practices that centers around using Git as a single... | 0 | 2024-06-03T16:15:14 | https://dev.to/oussamalakhdar/what-is-gitops-5al2 | devops, gitops, git, cloud | ## What is GitOps?
GitOps is a set of practices that centers around using Git as a single source of truth for declarative infrastructure and applications. It emphasizes using Git pull requests as the primary way to manage infrastructure and application configurations. This methodology is closely associated with `Kubernetes` but can be applied to various types of infrastructure and application automation.
### **Core Components of GitOps:**
- **Version Control:** All declarative configuration files that describe infrastructure and applications are stored in a Git repository. This enables version control, full audit trails, and configuration as code.
- **Automated Deployment:** Continuous integration and deployment (CI/CD) tools automatically apply changes when the configuration in the Git repository changes. This automated process ensures that the production environment reflects the state described by the repository.
- **Merge Requests for Change Management:** Changes to infrastructure or applications are made through changes to code in Git repositories. Merge requests for these changes serve as the primary mechanism for peer review, logging, and tracking of all changes.
- **Continuous Monitoring:** With GitOps, it's essential to have a monitoring system in place that can detect and alert on discrepancies between the declared state stored in Git and the actual state of the environment. This allows for quick detection and correction of configuration drift or unauthorized changes.
- **Reconciliation and Convergence:** The system continuously observes the current state of the infrastructure and automatically takes action to reconcile the actual state with the desired state described in the Git repository. This ensures consistency and reliability in the deployment environments.
### **Benefits and Advantages of Adopting GitOps:**
- **Version Control and History:** Everything is stored in a Git repository, including infrastructure-as-code and configurations. This means changes are version-controlled, providing a complete history of who changed what and when, which is essential for audit trails and rollback capabilities.
- **Improved Productivity and Speed:** GitOps automates the deployment process, reducing the manual steps required to deploy and manage applications. This results in faster development cycles and quicker deployments, allowing teams to push updates and features more frequently.
- **Stronger Security Posture:** Using Git repositories as the source of truth adds an additional layer of security. Access to change infrastructure or software can be controlled through Git’s robust access control mechanisms. Moreover, the use of pull requests and code reviews before merging promotes better security practices.
- **Better Reliability:** GitOps provides a reliable process for application deployment by ensuring that the deployment environment always matches the state described in the Git repository. If a deployment does not meet the expected state, it can be automatically rolled back to the last known good state, minimizing downtime and service disruptions.
- **Disaster Recovery:** Since the entire system (infrastructure and applications) is codified and versioned in Git, it's easier to restore the system in the event of a disaster. You can redeploy the last known good configuration to any environment, which can significantly reduce recovery times.
- **Improved Collaboration:** GitOps facilitates better collaboration among team members by using Merge/Pull Requests as a mechanism for reviewing and approving changes. This collaboration is bolstered by the use of standard Git features like branches and tags to manage releases.
### Popular GitOps tools that are widely used in the industry to implement GitOps practices:
1. **ArgoCD** - A declarative, Git-driven continuous delivery tool for Kubernetes.
2. **Flux** - Another tool that automatically ensures that the state of a Kubernetes cluster matches the config in git. It also monitors all configured repositories and automatically updates the state.
3. **Jenkins X** - Extends Jenkins to provide continuous integration and continuous delivery in Kubernetes using GitOps principles.
4. **Terraform** - Although primarily an infrastructure-as-code tool, Terraform can be integrated into GitOps workflows to manage cloud and on-premises resources.
##Conclusion:
GitOps uses the power of Git to streamline and secure infrastructure and application management. By integrating Git as the central mechanism for all changes, GitOps improves automation, enhances security, and ensures consistent deployments. This approach boosts team efficiency and reliability, making it a valuable practice for modern DevOps environments aiming to optimize their workflows and embrace continuous improvement. | oussamalakhdar |
1,875,654 | Authenticate to multiple git based source accounts in single system | Generate SSH keys using the below two commands in gitbash terminal. ssh-keygen -t ed25519 -C... | 0 | 2024-06-03T16:11:52 | https://dev.to/mohan023/authenticate-to-multiple-git-based-source-accounts-in-single-system-4imb | 1. Generate SSH keys using the below two commands in gitbash terminal.
`ssh-keygen -t ed25519 -C "abc@gmail.com" -f ~/.ssh/P`
`ssh-keygen -t ed25519 -C "xyz@c.com" -f ~/.ssh/C`
2. Add public keys to respective accounts
3. Configure multiple host in **config** file under ~/.ssh directory

| mohan023 | |
1,875,648 | Should you consider switching from brand-name to generics? | Choosing generic medicines can save you money while ensuring you receive safe and effective... | 0 | 2024-06-03T15:57:48 | https://dev.to/letozac17/should-you-consider-switching-from-brand-name-to-generics-3gh1 | onlinepharmacyusa, buygenericdrugsonline, dirxonlinepharmacy | Choosing generic medicines can save you money while ensuring you receive safe and effective treatment. Generic drugs are identical to brand-name drugs in dosage, safety, and strength, meeting the same rigorous FDA standards. They are often much cheaper because they don't carry the high development costs of brand-name drugs. At DiRx, we help you find affordable generic options, ensuring you get the best value for your healthcare needs.
#OnlinepharmacyUSA#Buygenericdrugsonline#FDAapprovedgenerics#Affordableprescriptiondrugs#Costsavingsonmedication#Genericvsbrandnamedrugs#DiRxonlinepharmacy#Cheapmedicines#onlineGenericdrugbenefits#Safegenericmedications
[](https://shorturl.at/weL7r)
| letozac17 |
1,875,651 | Expert-Level Tutorials on Stable Diffusion & SDXL & Generative AI: Master Advanced Techs — 75 Tutorials | Expert-Level Tutorials on Stable Diffusion & SDXL: Master Advanced Techniques and... | 0 | 2024-06-03T16:10:24 | https://dev.to/furkangozukara/expert-level-tutorials-on-stable-diffusion-sdxl-generative-ai-master-advanced-techs-75-tutorials-4f0l | beginners, tutorial, python, ai | <h1 style="margin-left:0px;"><strong>Expert-Level Tutorials on Stable Diffusion & SDXL: Master Advanced Techniques and Strategies</strong></h1>
<p style="margin-left:0px;">Greetings everyone. I am <strong>Dr. Furkan Gözükara</strong>. I am an Assistant Professor in Software Engineering department of a private university (have PhD in Computer Engineering).</p>
<p style="margin-left:0px;">My LinkedIn : <a target="_blank" href="https://www.linkedin.com/in/furkangozukara"><strong><u>https://www.linkedin.com/in/furkangozukara</u></strong></a></p>
<p style="margin-left:0px;">My Twitter : <a target="_blank" href="https://twitter.com/GozukaraFurkan"><strong><u>https://twitter.com/GozukaraFurkan</u></strong></a></p>
<p style="margin-left:0px;">My Linktr : <a target="_blank" href="https://linktr.ee/FurkanGozukara"><strong><u>https://linktr.ee/FurkanGozukara</u></strong></a></p>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/1*X_Xx-ly7c0Hppw9N5FuXSQ.png 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/1*X_Xx-ly7c0Hppw9N5FuXSQ.png 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/1*X_Xx-ly7c0Hppw9N5FuXSQ.png 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/1*X_Xx-ly7c0Hppw9N5FuXSQ.png 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/1*X_Xx-ly7c0Hppw9N5FuXSQ.png 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/1*X_Xx-ly7c0Hppw9N5FuXSQ.png 1100w, https://miro.medium.com/v2/resize:fit:1400/format:webp/1*X_Xx-ly7c0Hppw9N5FuXSQ.png 1400w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 700px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/1*X_Xx-ly7c0Hppw9N5FuXSQ.png 640w, https://miro.medium.com/v2/resize:fit:720/1*X_Xx-ly7c0Hppw9N5FuXSQ.png 720w, https://miro.medium.com/v2/resize:fit:750/1*X_Xx-ly7c0Hppw9N5FuXSQ.png 750w, https://miro.medium.com/v2/resize:fit:786/1*X_Xx-ly7c0Hppw9N5FuXSQ.png 786w, https://miro.medium.com/v2/resize:fit:828/1*X_Xx-ly7c0Hppw9N5FuXSQ.png 828w, https://miro.medium.com/v2/resize:fit:1100/1*X_Xx-ly7c0Hppw9N5FuXSQ.png 1100w, https://miro.medium.com/v2/resize:fit:1400/1*X_Xx-ly7c0Hppw9N5FuXSQ.png 1400w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 700px"><img class="image_resized" style="height:auto;width:680px;" src="https://miro.medium.com/v2/resize:fit:1313/1*X_Xx-ly7c0Hppw9N5FuXSQ.png" alt="" width="700" height="394">
</picture>
</p>
<p style="margin-left:0px;"><strong>Our channel address (35,000+ subscribers) if you like to subscribe ⤵️</strong></p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://www.youtube.com/@SECourses"><strong><u>https://www.youtube.com/@SECourses</u></strong></a></h3>
<p style="margin-left:0px;"><strong>Our discord (7,300+ members) to get more help ⤵️</strong></p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://discord.com/servers/software-engineering-courses-secourses-772774097734074388"><strong><u>https://discord.com/servers/software-engineering-courses-secourses-772774097734074388</u></strong></a></h3>
<p style="margin-left:0px;"><strong>Our 1,800+ Stars GitHub Stable Diffusion and other tutorials repo ⤵️</strong></p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://github.com/FurkanGozukara/Stable-Diffusion"><strong><u>https://github.com/FurkanGozukara/Stable-Diffusion</u></strong></a></h3>
<p style="margin-left:0px;">I am keeping this list up-to-date. I got upcoming new awesome video ideas. Trying to find time to do that.</p>
<p style="margin-left:0px;"><strong>I am open to any criticism you have. I am constantly trying to improve the quality of my tutorial guide videos. Please leave comments with both your suggestions and what you would like to see in future videos.</strong></p>
<p style="margin-left:0px;"><strong>All videos have manually fixed subtitles and properly prepared video chapters. You can watch with these perfect subtitles or look for the chapters you are interested in.</strong></p>
<p style="margin-left:0px;">Since my profession is teaching, I usually do not skip any of the important parts. Therefore, you may find my videos a little bit longer.</p>
<p style="margin-left:0px;">Playlist link on YouTube: <a target="_blank" href="https://www.youtube.com/watch?v=mnCY8uM7E50&list=PL_pbwdIyffsmclLl0O144nQRnezKlNdx3"><strong><u>Stable Diffusion Tutorials, Automatic1111 Web UI & Google Colab Guides, DreamBooth, Textual Inversion / Embedding, LoRA, AI Upscaling, Video to Anime</u></strong></a></p>
<h3 style="margin-left:0px;"><strong>Tutorial Videos</strong></h1>
<p style="margin-left:0px;">1.) Automatic1111 Web UI — PC — Free</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/B5U7LJOvH6g"><strong><u>How To Install Python, Setup Virtual Environment VENV, Set Default Python System Path & Install Git</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*Y1SAJl6r-dEq-6F9 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*Y1SAJl6r-dEq-6F9 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*Y1SAJl6r-dEq-6F9 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*Y1SAJl6r-dEq-6F9 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*Y1SAJl6r-dEq-6F9 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*Y1SAJl6r-dEq-6F9 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*Y1SAJl6r-dEq-6F9 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*Y1SAJl6r-dEq-6F9 640w, https://miro.medium.com/v2/resize:fit:720/0*Y1SAJl6r-dEq-6F9 720w, https://miro.medium.com/v2/resize:fit:750/0*Y1SAJl6r-dEq-6F9 750w, https://miro.medium.com/v2/resize:fit:786/0*Y1SAJl6r-dEq-6F9 786w, https://miro.medium.com/v2/resize:fit:828/0*Y1SAJl6r-dEq-6F9 828w, https://miro.medium.com/v2/resize:fit:1100/0*Y1SAJl6r-dEq-6F9 1100w, https://miro.medium.com/v2/resize:fit:960/0*Y1SAJl6r-dEq-6F9 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*Y1SAJl6r-dEq-6F9" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">2.) Automatic1111 Web UI — PC — Free</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://www.youtube.com/watch?v=AZg6vzWHOTA"><strong><u>Easiest Way to Install & Run Stable Diffusion Web UI on PC by Using Open Source Automatic Installer</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*ZfeLxWpkPqblhA20.png 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*ZfeLxWpkPqblhA20.png 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*ZfeLxWpkPqblhA20.png 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*ZfeLxWpkPqblhA20.png 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*ZfeLxWpkPqblhA20.png 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*ZfeLxWpkPqblhA20.png 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*ZfeLxWpkPqblhA20.png 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*ZfeLxWpkPqblhA20.png 640w, https://miro.medium.com/v2/resize:fit:720/0*ZfeLxWpkPqblhA20.png 720w, https://miro.medium.com/v2/resize:fit:750/0*ZfeLxWpkPqblhA20.png 750w, https://miro.medium.com/v2/resize:fit:786/0*ZfeLxWpkPqblhA20.png 786w, https://miro.medium.com/v2/resize:fit:828/0*ZfeLxWpkPqblhA20.png 828w, https://miro.medium.com/v2/resize:fit:1100/0*ZfeLxWpkPqblhA20.png 1100w, https://miro.medium.com/v2/resize:fit:960/0*ZfeLxWpkPqblhA20.png 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*ZfeLxWpkPqblhA20.png" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">3.) Automatic1111 Web UI — PC — Free</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://www.youtube.com/watch?v=aAyvsX-EpG4"><strong><u>How to use Stable Diffusion V2.1 and Different Models in the Web UI — SD 1.5 vs 2.1 vs Anything V3</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*cr16SwqioT1QoxBK.png 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*cr16SwqioT1QoxBK.png 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*cr16SwqioT1QoxBK.png 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*cr16SwqioT1QoxBK.png 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*cr16SwqioT1QoxBK.png 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*cr16SwqioT1QoxBK.png 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*cr16SwqioT1QoxBK.png 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*cr16SwqioT1QoxBK.png 640w, https://miro.medium.com/v2/resize:fit:720/0*cr16SwqioT1QoxBK.png 720w, https://miro.medium.com/v2/resize:fit:750/0*cr16SwqioT1QoxBK.png 750w, https://miro.medium.com/v2/resize:fit:786/0*cr16SwqioT1QoxBK.png 786w, https://miro.medium.com/v2/resize:fit:828/0*cr16SwqioT1QoxBK.png 828w, https://miro.medium.com/v2/resize:fit:1100/0*cr16SwqioT1QoxBK.png 1100w, https://miro.medium.com/v2/resize:fit:960/0*cr16SwqioT1QoxBK.png 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*cr16SwqioT1QoxBK.png" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">4.) Automatic1111 Web UI — PC — Free</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://www.youtube.com/watch?v=Bdl-jWR3Ukc"><strong><u>Zero To Hero Stable Diffusion DreamBooth Tutorial By Using Automatic1111 Web UI — Ultra Detailed</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*hrc_gsu7NIIfMZCl.png 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*hrc_gsu7NIIfMZCl.png 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*hrc_gsu7NIIfMZCl.png 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*hrc_gsu7NIIfMZCl.png 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*hrc_gsu7NIIfMZCl.png 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*hrc_gsu7NIIfMZCl.png 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*hrc_gsu7NIIfMZCl.png 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*hrc_gsu7NIIfMZCl.png 640w, https://miro.medium.com/v2/resize:fit:720/0*hrc_gsu7NIIfMZCl.png 720w, https://miro.medium.com/v2/resize:fit:750/0*hrc_gsu7NIIfMZCl.png 750w, https://miro.medium.com/v2/resize:fit:786/0*hrc_gsu7NIIfMZCl.png 786w, https://miro.medium.com/v2/resize:fit:828/0*hrc_gsu7NIIfMZCl.png 828w, https://miro.medium.com/v2/resize:fit:1100/0*hrc_gsu7NIIfMZCl.png 1100w, https://miro.medium.com/v2/resize:fit:960/0*hrc_gsu7NIIfMZCl.png 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*hrc_gsu7NIIfMZCl.png" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">5.) Automatic1111 Web UI — PC — Free</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://www.youtube.com/watch?v=KwxNcGhHuLY"><strong><u>DreamBooth Got Buffed — 22 January Update — Much Better Success Train Stable Diffusion Models Web UI</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*sWXlhX1-WvAmcJmC.png 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*sWXlhX1-WvAmcJmC.png 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*sWXlhX1-WvAmcJmC.png 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*sWXlhX1-WvAmcJmC.png 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*sWXlhX1-WvAmcJmC.png 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*sWXlhX1-WvAmcJmC.png 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*sWXlhX1-WvAmcJmC.png 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*sWXlhX1-WvAmcJmC.png 640w, https://miro.medium.com/v2/resize:fit:720/0*sWXlhX1-WvAmcJmC.png 720w, https://miro.medium.com/v2/resize:fit:750/0*sWXlhX1-WvAmcJmC.png 750w, https://miro.medium.com/v2/resize:fit:786/0*sWXlhX1-WvAmcJmC.png 786w, https://miro.medium.com/v2/resize:fit:828/0*sWXlhX1-WvAmcJmC.png 828w, https://miro.medium.com/v2/resize:fit:1100/0*sWXlhX1-WvAmcJmC.png 1100w, https://miro.medium.com/v2/resize:fit:960/0*sWXlhX1-WvAmcJmC.png 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*sWXlhX1-WvAmcJmC.png" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">6.) Automatic1111 Web UI — PC — Free</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://www.youtube.com/watch?v=s25hcW4zq4M"><strong><u>How to Inject Your Trained Subject e.g. Your Face Into Any Custom Stable Diffusion Model By Web UI</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*vk2sBi_nHHR73l2B.png 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*vk2sBi_nHHR73l2B.png 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*vk2sBi_nHHR73l2B.png 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*vk2sBi_nHHR73l2B.png 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*vk2sBi_nHHR73l2B.png 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*vk2sBi_nHHR73l2B.png 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*vk2sBi_nHHR73l2B.png 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*vk2sBi_nHHR73l2B.png 640w, https://miro.medium.com/v2/resize:fit:720/0*vk2sBi_nHHR73l2B.png 720w, https://miro.medium.com/v2/resize:fit:750/0*vk2sBi_nHHR73l2B.png 750w, https://miro.medium.com/v2/resize:fit:786/0*vk2sBi_nHHR73l2B.png 786w, https://miro.medium.com/v2/resize:fit:828/0*vk2sBi_nHHR73l2B.png 828w, https://miro.medium.com/v2/resize:fit:1100/0*vk2sBi_nHHR73l2B.png 1100w, https://miro.medium.com/v2/resize:fit:960/0*vk2sBi_nHHR73l2B.png 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*vk2sBi_nHHR73l2B.png" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">7.) Automatic1111 Web UI — PC — Free</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://www.youtube.com/watch?v=mfaqqL5yOO4"><strong><u>How To Do Stable Diffusion LORA Training By Using Web UI On Different Models — Tested SD 1.5, SD 2.1</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*de5cD6Dto-1jc0Mk.png 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*de5cD6Dto-1jc0Mk.png 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*de5cD6Dto-1jc0Mk.png 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*de5cD6Dto-1jc0Mk.png 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*de5cD6Dto-1jc0Mk.png 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*de5cD6Dto-1jc0Mk.png 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*de5cD6Dto-1jc0Mk.png 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*de5cD6Dto-1jc0Mk.png 640w, https://miro.medium.com/v2/resize:fit:720/0*de5cD6Dto-1jc0Mk.png 720w, https://miro.medium.com/v2/resize:fit:750/0*de5cD6Dto-1jc0Mk.png 750w, https://miro.medium.com/v2/resize:fit:786/0*de5cD6Dto-1jc0Mk.png 786w, https://miro.medium.com/v2/resize:fit:828/0*de5cD6Dto-1jc0Mk.png 828w, https://miro.medium.com/v2/resize:fit:1100/0*de5cD6Dto-1jc0Mk.png 1100w, https://miro.medium.com/v2/resize:fit:960/0*de5cD6Dto-1jc0Mk.png 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*de5cD6Dto-1jc0Mk.png" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">8.) Automatic1111 Web UI — PC — Free</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://www.youtube.com/watch?v=O01BrQwOd-Q"><strong><u>8 GB LoRA Training — Fix CUDA & xformers For DreamBooth and Textual Inversion in Automatic1111 SD UI</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*f9fU1q6MjGDmoBhw.png 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*f9fU1q6MjGDmoBhw.png 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*f9fU1q6MjGDmoBhw.png 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*f9fU1q6MjGDmoBhw.png 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*f9fU1q6MjGDmoBhw.png 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*f9fU1q6MjGDmoBhw.png 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*f9fU1q6MjGDmoBhw.png 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*f9fU1q6MjGDmoBhw.png 640w, https://miro.medium.com/v2/resize:fit:720/0*f9fU1q6MjGDmoBhw.png 720w, https://miro.medium.com/v2/resize:fit:750/0*f9fU1q6MjGDmoBhw.png 750w, https://miro.medium.com/v2/resize:fit:786/0*f9fU1q6MjGDmoBhw.png 786w, https://miro.medium.com/v2/resize:fit:828/0*f9fU1q6MjGDmoBhw.png 828w, https://miro.medium.com/v2/resize:fit:1100/0*f9fU1q6MjGDmoBhw.png 1100w, https://miro.medium.com/v2/resize:fit:960/0*f9fU1q6MjGDmoBhw.png 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*f9fU1q6MjGDmoBhw.png" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">9.) Automatic1111 Web UI — PC — Free</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://www.youtube.com/watch?v=dNOpWt-epdQ"><strong><u>How To Do Stable Diffusion Textual Inversion (TI) / Text Embeddings By Automatic1111 Web UI Tutorial</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*E_SZJJBVqOyFZHjb.png 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*E_SZJJBVqOyFZHjb.png 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*E_SZJJBVqOyFZHjb.png 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*E_SZJJBVqOyFZHjb.png 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*E_SZJJBVqOyFZHjb.png 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*E_SZJJBVqOyFZHjb.png 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*E_SZJJBVqOyFZHjb.png 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*E_SZJJBVqOyFZHjb.png 640w, https://miro.medium.com/v2/resize:fit:720/0*E_SZJJBVqOyFZHjb.png 720w, https://miro.medium.com/v2/resize:fit:750/0*E_SZJJBVqOyFZHjb.png 750w, https://miro.medium.com/v2/resize:fit:786/0*E_SZJJBVqOyFZHjb.png 786w, https://miro.medium.com/v2/resize:fit:828/0*E_SZJJBVqOyFZHjb.png 828w, https://miro.medium.com/v2/resize:fit:1100/0*E_SZJJBVqOyFZHjb.png 1100w, https://miro.medium.com/v2/resize:fit:960/0*E_SZJJBVqOyFZHjb.png 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*E_SZJJBVqOyFZHjb.png" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">10.) Automatic1111 Web UI — PC — Free</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://www.youtube.com/watch?v=TBq1bhY8BOc"><strong><u>How To Generate Stunning Epic Text By Stable Diffusion AI — No Photoshop — For Free — Depth-To-Image</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*sIcFwKIX5Pq3VSIJ.png 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*sIcFwKIX5Pq3VSIJ.png 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*sIcFwKIX5Pq3VSIJ.png 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*sIcFwKIX5Pq3VSIJ.png 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*sIcFwKIX5Pq3VSIJ.png 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*sIcFwKIX5Pq3VSIJ.png 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*sIcFwKIX5Pq3VSIJ.png 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*sIcFwKIX5Pq3VSIJ.png 640w, https://miro.medium.com/v2/resize:fit:720/0*sIcFwKIX5Pq3VSIJ.png 720w, https://miro.medium.com/v2/resize:fit:750/0*sIcFwKIX5Pq3VSIJ.png 750w, https://miro.medium.com/v2/resize:fit:786/0*sIcFwKIX5Pq3VSIJ.png 786w, https://miro.medium.com/v2/resize:fit:828/0*sIcFwKIX5Pq3VSIJ.png 828w, https://miro.medium.com/v2/resize:fit:1100/0*sIcFwKIX5Pq3VSIJ.png 1100w, https://miro.medium.com/v2/resize:fit:960/0*sIcFwKIX5Pq3VSIJ.png 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*sIcFwKIX5Pq3VSIJ.png" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">11.) Python Code — Hugging Face Diffusers Script — PC — Free</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://www.youtube.com/watch?v=-6CA18MS0pY"><strong><u>How to Run and Convert Stable Diffusion Diffusers (.bin Weights) & Dreambooth Models to CKPT File</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*MVnQheTGhCPHXpQj.png 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*MVnQheTGhCPHXpQj.png 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*MVnQheTGhCPHXpQj.png 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*MVnQheTGhCPHXpQj.png 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*MVnQheTGhCPHXpQj.png 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*MVnQheTGhCPHXpQj.png 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*MVnQheTGhCPHXpQj.png 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*MVnQheTGhCPHXpQj.png 640w, https://miro.medium.com/v2/resize:fit:720/0*MVnQheTGhCPHXpQj.png 720w, https://miro.medium.com/v2/resize:fit:750/0*MVnQheTGhCPHXpQj.png 750w, https://miro.medium.com/v2/resize:fit:786/0*MVnQheTGhCPHXpQj.png 786w, https://miro.medium.com/v2/resize:fit:828/0*MVnQheTGhCPHXpQj.png 828w, https://miro.medium.com/v2/resize:fit:1100/0*MVnQheTGhCPHXpQj.png 1100w, https://miro.medium.com/v2/resize:fit:960/0*MVnQheTGhCPHXpQj.png 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*MVnQheTGhCPHXpQj.png" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">12.) NMKD Stable Diffusion GUI — Open Source — PC — Free</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://www.youtube.com/watch?v=EPRa8EZl9Os"><strong><u>Forget Photoshop — How To Transform Images With Text Prompts using InstructPix2Pix Model in NMKD GUI</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*wIzvasqIJLi4deTI.png 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*wIzvasqIJLi4deTI.png 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*wIzvasqIJLi4deTI.png 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*wIzvasqIJLi4deTI.png 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*wIzvasqIJLi4deTI.png 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*wIzvasqIJLi4deTI.png 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*wIzvasqIJLi4deTI.png 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*wIzvasqIJLi4deTI.png 640w, https://miro.medium.com/v2/resize:fit:720/0*wIzvasqIJLi4deTI.png 720w, https://miro.medium.com/v2/resize:fit:750/0*wIzvasqIJLi4deTI.png 750w, https://miro.medium.com/v2/resize:fit:786/0*wIzvasqIJLi4deTI.png 786w, https://miro.medium.com/v2/resize:fit:828/0*wIzvasqIJLi4deTI.png 828w, https://miro.medium.com/v2/resize:fit:1100/0*wIzvasqIJLi4deTI.png 1100w, https://miro.medium.com/v2/resize:fit:960/0*wIzvasqIJLi4deTI.png 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*wIzvasqIJLi4deTI.png" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">13.) Google Colab Free — Cloud — No PC Is Required</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://www.youtube.com/watch?v=mnCY8uM7E50"><strong><u>Transform Your Selfie into a Stunning AI Avatar with Stable Diffusion — Better than Lensa for Free</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*gT8INnY0avCDSiqU.png 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*gT8INnY0avCDSiqU.png 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*gT8INnY0avCDSiqU.png 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*gT8INnY0avCDSiqU.png 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*gT8INnY0avCDSiqU.png 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*gT8INnY0avCDSiqU.png 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*gT8INnY0avCDSiqU.png 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*gT8INnY0avCDSiqU.png 640w, https://miro.medium.com/v2/resize:fit:720/0*gT8INnY0avCDSiqU.png 720w, https://miro.medium.com/v2/resize:fit:750/0*gT8INnY0avCDSiqU.png 750w, https://miro.medium.com/v2/resize:fit:786/0*gT8INnY0avCDSiqU.png 786w, https://miro.medium.com/v2/resize:fit:828/0*gT8INnY0avCDSiqU.png 828w, https://miro.medium.com/v2/resize:fit:1100/0*gT8INnY0avCDSiqU.png 1100w, https://miro.medium.com/v2/resize:fit:960/0*gT8INnY0avCDSiqU.png 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*gT8INnY0avCDSiqU.png" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">14.) Google Colab Free — Cloud — No PC Is Required</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://www.youtube.com/watch?v=kIyqAdd_i10"><strong><u>Stable Diffusion Google Colab, Continue, Directory, Transfer, Clone, Custom Models, CKPT SafeTensors</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*4qiBmI7RxkipX0L2.png 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*4qiBmI7RxkipX0L2.png 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*4qiBmI7RxkipX0L2.png 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*4qiBmI7RxkipX0L2.png 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*4qiBmI7RxkipX0L2.png 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*4qiBmI7RxkipX0L2.png 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*4qiBmI7RxkipX0L2.png 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*4qiBmI7RxkipX0L2.png 640w, https://miro.medium.com/v2/resize:fit:720/0*4qiBmI7RxkipX0L2.png 720w, https://miro.medium.com/v2/resize:fit:750/0*4qiBmI7RxkipX0L2.png 750w, https://miro.medium.com/v2/resize:fit:786/0*4qiBmI7RxkipX0L2.png 786w, https://miro.medium.com/v2/resize:fit:828/0*4qiBmI7RxkipX0L2.png 828w, https://miro.medium.com/v2/resize:fit:1100/0*4qiBmI7RxkipX0L2.png 1100w, https://miro.medium.com/v2/resize:fit:960/0*4qiBmI7RxkipX0L2.png 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*4qiBmI7RxkipX0L2.png" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">15.) Automatic1111 Web UI — PC — Free</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://www.youtube.com/watch?v=XiKyEKJrTLQ"><strong><u>Become A Stable Diffusion Prompt Master By Using DAAM — Attention Heatmap For Each Used Token — Word</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*x-Bd26QaJiO7F_4X.png 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*x-Bd26QaJiO7F_4X.png 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*x-Bd26QaJiO7F_4X.png 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*x-Bd26QaJiO7F_4X.png 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*x-Bd26QaJiO7F_4X.png 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*x-Bd26QaJiO7F_4X.png 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*x-Bd26QaJiO7F_4X.png 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*x-Bd26QaJiO7F_4X.png 640w, https://miro.medium.com/v2/resize:fit:720/0*x-Bd26QaJiO7F_4X.png 720w, https://miro.medium.com/v2/resize:fit:750/0*x-Bd26QaJiO7F_4X.png 750w, https://miro.medium.com/v2/resize:fit:786/0*x-Bd26QaJiO7F_4X.png 786w, https://miro.medium.com/v2/resize:fit:828/0*x-Bd26QaJiO7F_4X.png 828w, https://miro.medium.com/v2/resize:fit:1100/0*x-Bd26QaJiO7F_4X.png 1100w, https://miro.medium.com/v2/resize:fit:960/0*x-Bd26QaJiO7F_4X.png 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*x-Bd26QaJiO7F_4X.png" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">16.) Python Script — Gradio Based — ControlNet — PC — Free</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://www.youtube.com/watch?v=YJebdQ30UZQ"><strong><u>Transform Your Sketches into Masterpieces with Stable Diffusion ControlNet AI — How To Use Tutorial</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*ermUCewhrXSmJcRf.png 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*ermUCewhrXSmJcRf.png 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*ermUCewhrXSmJcRf.png 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*ermUCewhrXSmJcRf.png 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*ermUCewhrXSmJcRf.png 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*ermUCewhrXSmJcRf.png 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*ermUCewhrXSmJcRf.png 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*ermUCewhrXSmJcRf.png 640w, https://miro.medium.com/v2/resize:fit:720/0*ermUCewhrXSmJcRf.png 720w, https://miro.medium.com/v2/resize:fit:750/0*ermUCewhrXSmJcRf.png 750w, https://miro.medium.com/v2/resize:fit:786/0*ermUCewhrXSmJcRf.png 786w, https://miro.medium.com/v2/resize:fit:828/0*ermUCewhrXSmJcRf.png 828w, https://miro.medium.com/v2/resize:fit:1100/0*ermUCewhrXSmJcRf.png 1100w, https://miro.medium.com/v2/resize:fit:960/0*ermUCewhrXSmJcRf.png 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*ermUCewhrXSmJcRf.png" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">17.) Automatic1111 Web UI — PC — Free</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://www.youtube.com/watch?v=vhqqmkTBMlU"><strong><u>Sketches into Epic Art with 1 Click: A Guide to Stable Diffusion ControlNet in Automatic1111 Web UI</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*98SPTesYq368JPl0.png 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*98SPTesYq368JPl0.png 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*98SPTesYq368JPl0.png 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*98SPTesYq368JPl0.png 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*98SPTesYq368JPl0.png 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*98SPTesYq368JPl0.png 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*98SPTesYq368JPl0.png 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*98SPTesYq368JPl0.png 640w, https://miro.medium.com/v2/resize:fit:720/0*98SPTesYq368JPl0.png 720w, https://miro.medium.com/v2/resize:fit:750/0*98SPTesYq368JPl0.png 750w, https://miro.medium.com/v2/resize:fit:786/0*98SPTesYq368JPl0.png 786w, https://miro.medium.com/v2/resize:fit:828/0*98SPTesYq368JPl0.png 828w, https://miro.medium.com/v2/resize:fit:1100/0*98SPTesYq368JPl0.png 1100w, https://miro.medium.com/v2/resize:fit:960/0*98SPTesYq368JPl0.png 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*98SPTesYq368JPl0.png" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">18.) RunPod — Automatic1111 Web UI — Cloud — Paid — No PC Is Required</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://www.youtube.com/watch?v=QN1vdGhjcRc"><strong><u>Ultimate RunPod Tutorial For Stable Diffusion — Automatic1111 — Data Transfers, Extensions, CivitAI</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*txW_4fd12JJXWRVo 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*txW_4fd12JJXWRVo 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*txW_4fd12JJXWRVo 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*txW_4fd12JJXWRVo 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*txW_4fd12JJXWRVo 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*txW_4fd12JJXWRVo 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*txW_4fd12JJXWRVo 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*txW_4fd12JJXWRVo 640w, https://miro.medium.com/v2/resize:fit:720/0*txW_4fd12JJXWRVo 720w, https://miro.medium.com/v2/resize:fit:750/0*txW_4fd12JJXWRVo 750w, https://miro.medium.com/v2/resize:fit:786/0*txW_4fd12JJXWRVo 786w, https://miro.medium.com/v2/resize:fit:828/0*txW_4fd12JJXWRVo 828w, https://miro.medium.com/v2/resize:fit:1100/0*txW_4fd12JJXWRVo 1100w, https://miro.medium.com/v2/resize:fit:960/0*txW_4fd12JJXWRVo 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*txW_4fd12JJXWRVo" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">19.) RunPod — Automatic1111 Web UI — Cloud — Paid — No PC Is Required</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/c_S2kFAefTQ"><strong><u>How To Install DreamBooth & Automatic1111 On RunPod & Latest Libraries — 2x Speed Up — cudDNN — CUDA</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*V4Bp_XkqPV5EUBDq 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*V4Bp_XkqPV5EUBDq 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*V4Bp_XkqPV5EUBDq 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*V4Bp_XkqPV5EUBDq 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*V4Bp_XkqPV5EUBDq 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*V4Bp_XkqPV5EUBDq 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*V4Bp_XkqPV5EUBDq 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*V4Bp_XkqPV5EUBDq 640w, https://miro.medium.com/v2/resize:fit:720/0*V4Bp_XkqPV5EUBDq 720w, https://miro.medium.com/v2/resize:fit:750/0*V4Bp_XkqPV5EUBDq 750w, https://miro.medium.com/v2/resize:fit:786/0*V4Bp_XkqPV5EUBDq 786w, https://miro.medium.com/v2/resize:fit:828/0*V4Bp_XkqPV5EUBDq 828w, https://miro.medium.com/v2/resize:fit:1100/0*V4Bp_XkqPV5EUBDq 1100w, https://miro.medium.com/v2/resize:fit:960/0*V4Bp_XkqPV5EUBDq 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*V4Bp_XkqPV5EUBDq" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">20.) Automatic1111 Web UI — PC — Free</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/iFRdrRyAQdQ"><strong><u>Fantastic New ControlNet OpenPose Editor Extension & Image Mixing — Stable Diffusion Web UI Tutorial</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*h8gJm-tw3IpRwGDI.png 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*h8gJm-tw3IpRwGDI.png 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*h8gJm-tw3IpRwGDI.png 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*h8gJm-tw3IpRwGDI.png 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*h8gJm-tw3IpRwGDI.png 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*h8gJm-tw3IpRwGDI.png 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*h8gJm-tw3IpRwGDI.png 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*h8gJm-tw3IpRwGDI.png 640w, https://miro.medium.com/v2/resize:fit:720/0*h8gJm-tw3IpRwGDI.png 720w, https://miro.medium.com/v2/resize:fit:750/0*h8gJm-tw3IpRwGDI.png 750w, https://miro.medium.com/v2/resize:fit:786/0*h8gJm-tw3IpRwGDI.png 786w, https://miro.medium.com/v2/resize:fit:828/0*h8gJm-tw3IpRwGDI.png 828w, https://miro.medium.com/v2/resize:fit:1100/0*h8gJm-tw3IpRwGDI.png 1100w, https://miro.medium.com/v2/resize:fit:960/0*h8gJm-tw3IpRwGDI.png 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*h8gJm-tw3IpRwGDI.png" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">21.) Automatic1111 Web UI — PC — Free</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/Tb4IYIYm4os"><strong><u>Automatic1111 Stable Diffusion DreamBooth Guide: Optimal Classification Images Count Comparison Test</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*w3paKXFaH7ThYCo_.png 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*w3paKXFaH7ThYCo_.png 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*w3paKXFaH7ThYCo_.png 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*w3paKXFaH7ThYCo_.png 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*w3paKXFaH7ThYCo_.png 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*w3paKXFaH7ThYCo_.png 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*w3paKXFaH7ThYCo_.png 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*w3paKXFaH7ThYCo_.png 640w, https://miro.medium.com/v2/resize:fit:720/0*w3paKXFaH7ThYCo_.png 720w, https://miro.medium.com/v2/resize:fit:750/0*w3paKXFaH7ThYCo_.png 750w, https://miro.medium.com/v2/resize:fit:786/0*w3paKXFaH7ThYCo_.png 786w, https://miro.medium.com/v2/resize:fit:828/0*w3paKXFaH7ThYCo_.png 828w, https://miro.medium.com/v2/resize:fit:1100/0*w3paKXFaH7ThYCo_.png 1100w, https://miro.medium.com/v2/resize:fit:960/0*w3paKXFaH7ThYCo_.png 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*w3paKXFaH7ThYCo_.png" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">22.) Automatic1111 Web UI — PC — Free</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/sRdtVanSRl4"><strong><u>Epic Web UI DreamBooth Update — New Best Settings — 10 Stable Diffusion Training Compared on RunPods</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*tvkfgfIpbnO_YAoo.png 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*tvkfgfIpbnO_YAoo.png 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*tvkfgfIpbnO_YAoo.png 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*tvkfgfIpbnO_YAoo.png 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*tvkfgfIpbnO_YAoo.png 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*tvkfgfIpbnO_YAoo.png 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*tvkfgfIpbnO_YAoo.png 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*tvkfgfIpbnO_YAoo.png 640w, https://miro.medium.com/v2/resize:fit:720/0*tvkfgfIpbnO_YAoo.png 720w, https://miro.medium.com/v2/resize:fit:750/0*tvkfgfIpbnO_YAoo.png 750w, https://miro.medium.com/v2/resize:fit:786/0*tvkfgfIpbnO_YAoo.png 786w, https://miro.medium.com/v2/resize:fit:828/0*tvkfgfIpbnO_YAoo.png 828w, https://miro.medium.com/v2/resize:fit:1100/0*tvkfgfIpbnO_YAoo.png 1100w, https://miro.medium.com/v2/resize:fit:960/0*tvkfgfIpbnO_YAoo.png 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*tvkfgfIpbnO_YAoo.png" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">23.) Automatic1111 Web UI — PC — Free</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/tXaQAkOgezQ"><strong><u>New Style Transfer Extension, ControlNet of Automatic1111 Stable Diffusion T2I-Adapter Color Control</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*6FyRWw_e_Q0pakZy.png 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*6FyRWw_e_Q0pakZy.png 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*6FyRWw_e_Q0pakZy.png 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*6FyRWw_e_Q0pakZy.png 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*6FyRWw_e_Q0pakZy.png 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*6FyRWw_e_Q0pakZy.png 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*6FyRWw_e_Q0pakZy.png 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*6FyRWw_e_Q0pakZy.png 640w, https://miro.medium.com/v2/resize:fit:720/0*6FyRWw_e_Q0pakZy.png 720w, https://miro.medium.com/v2/resize:fit:750/0*6FyRWw_e_Q0pakZy.png 750w, https://miro.medium.com/v2/resize:fit:786/0*6FyRWw_e_Q0pakZy.png 786w, https://miro.medium.com/v2/resize:fit:828/0*6FyRWw_e_Q0pakZy.png 828w, https://miro.medium.com/v2/resize:fit:1100/0*6FyRWw_e_Q0pakZy.png 1100w, https://miro.medium.com/v2/resize:fit:960/0*6FyRWw_e_Q0pakZy.png 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*6FyRWw_e_Q0pakZy.png" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">24.) Automatic1111 Web UI — PC — Free</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/C_mJI4U23nQ"><strong><u>Generate Text Arts & Fantastic Logos By Using ControlNet Stable Diffusion Web UI For Free Tutorial</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*cEC93Y5C1bRlQZNx.png 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*cEC93Y5C1bRlQZNx.png 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*cEC93Y5C1bRlQZNx.png 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*cEC93Y5C1bRlQZNx.png 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*cEC93Y5C1bRlQZNx.png 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*cEC93Y5C1bRlQZNx.png 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*cEC93Y5C1bRlQZNx.png 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*cEC93Y5C1bRlQZNx.png 640w, https://miro.medium.com/v2/resize:fit:720/0*cEC93Y5C1bRlQZNx.png 720w, https://miro.medium.com/v2/resize:fit:750/0*cEC93Y5C1bRlQZNx.png 750w, https://miro.medium.com/v2/resize:fit:786/0*cEC93Y5C1bRlQZNx.png 786w, https://miro.medium.com/v2/resize:fit:828/0*cEC93Y5C1bRlQZNx.png 828w, https://miro.medium.com/v2/resize:fit:1100/0*cEC93Y5C1bRlQZNx.png 1100w, https://miro.medium.com/v2/resize:fit:960/0*cEC93Y5C1bRlQZNx.png 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*cEC93Y5C1bRlQZNx.png" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">25.) Automatic1111 Web UI — PC — Free</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/pom3nQejaTs"><strong><u>How To Install New DREAMBOOTH & Torch 2 On Automatic1111 Web UI PC For Epic Performance Gains Guide</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*_qSRL0TmztrIVnj7.png 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*_qSRL0TmztrIVnj7.png 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*_qSRL0TmztrIVnj7.png 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*_qSRL0TmztrIVnj7.png 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*_qSRL0TmztrIVnj7.png 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*_qSRL0TmztrIVnj7.png 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*_qSRL0TmztrIVnj7.png 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*_qSRL0TmztrIVnj7.png 640w, https://miro.medium.com/v2/resize:fit:720/0*_qSRL0TmztrIVnj7.png 720w, https://miro.medium.com/v2/resize:fit:750/0*_qSRL0TmztrIVnj7.png 750w, https://miro.medium.com/v2/resize:fit:786/0*_qSRL0TmztrIVnj7.png 786w, https://miro.medium.com/v2/resize:fit:828/0*_qSRL0TmztrIVnj7.png 828w, https://miro.medium.com/v2/resize:fit:1100/0*_qSRL0TmztrIVnj7.png 1100w, https://miro.medium.com/v2/resize:fit:960/0*_qSRL0TmztrIVnj7.png 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*_qSRL0TmztrIVnj7.png" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">26.) Automatic1111 Web UI — PC — Free</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/m-UVVY_syP0"><strong><u>Training Midjourney Level Style And Yourself Into The SD 1.5 Model via DreamBooth Stable Diffusion</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*wdqjKHTDZswnU4Ee.png 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*wdqjKHTDZswnU4Ee.png 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*wdqjKHTDZswnU4Ee.png 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*wdqjKHTDZswnU4Ee.png 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*wdqjKHTDZswnU4Ee.png 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*wdqjKHTDZswnU4Ee.png 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*wdqjKHTDZswnU4Ee.png 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*wdqjKHTDZswnU4Ee.png 640w, https://miro.medium.com/v2/resize:fit:720/0*wdqjKHTDZswnU4Ee.png 720w, https://miro.medium.com/v2/resize:fit:750/0*wdqjKHTDZswnU4Ee.png 750w, https://miro.medium.com/v2/resize:fit:786/0*wdqjKHTDZswnU4Ee.png 786w, https://miro.medium.com/v2/resize:fit:828/0*wdqjKHTDZswnU4Ee.png 828w, https://miro.medium.com/v2/resize:fit:1100/0*wdqjKHTDZswnU4Ee.png 1100w, https://miro.medium.com/v2/resize:fit:960/0*wdqjKHTDZswnU4Ee.png 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*wdqjKHTDZswnU4Ee.png" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">27.) Automatic1111 Web UI — PC — Free</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/kmT-z2lqEPQ"><strong><u>Video To Anime — Generate An EPIC Animation From Your Phone Recording By Using Stable Diffusion AI</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*wPlxcWNkYomz6u8W.png 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*wPlxcWNkYomz6u8W.png 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*wPlxcWNkYomz6u8W.png 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*wPlxcWNkYomz6u8W.png 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*wPlxcWNkYomz6u8W.png 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*wPlxcWNkYomz6u8W.png 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*wPlxcWNkYomz6u8W.png 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*wPlxcWNkYomz6u8W.png 640w, https://miro.medium.com/v2/resize:fit:720/0*wPlxcWNkYomz6u8W.png 720w, https://miro.medium.com/v2/resize:fit:750/0*wPlxcWNkYomz6u8W.png 750w, https://miro.medium.com/v2/resize:fit:786/0*wPlxcWNkYomz6u8W.png 786w, https://miro.medium.com/v2/resize:fit:828/0*wPlxcWNkYomz6u8W.png 828w, https://miro.medium.com/v2/resize:fit:1100/0*wPlxcWNkYomz6u8W.png 1100w, https://miro.medium.com/v2/resize:fit:960/0*wPlxcWNkYomz6u8W.png 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*wPlxcWNkYomz6u8W.png" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">28.) Python Script — Jupyter Based — PC — Free</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/dYt9xJ7dnpU"><strong><u>Midjourney Level NEW Open Source Kandinsky 2.1 Beats Stable Diffusion — Installation And Usage Guide</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*m6-nqrgz43slXs1J.png 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*m6-nqrgz43slXs1J.png 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*m6-nqrgz43slXs1J.png 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*m6-nqrgz43slXs1J.png 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*m6-nqrgz43slXs1J.png 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*m6-nqrgz43slXs1J.png 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*m6-nqrgz43slXs1J.png 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*m6-nqrgz43slXs1J.png 640w, https://miro.medium.com/v2/resize:fit:720/0*m6-nqrgz43slXs1J.png 720w, https://miro.medium.com/v2/resize:fit:750/0*m6-nqrgz43slXs1J.png 750w, https://miro.medium.com/v2/resize:fit:786/0*m6-nqrgz43slXs1J.png 786w, https://miro.medium.com/v2/resize:fit:828/0*m6-nqrgz43slXs1J.png 828w, https://miro.medium.com/v2/resize:fit:1100/0*m6-nqrgz43slXs1J.png 1100w, https://miro.medium.com/v2/resize:fit:960/0*m6-nqrgz43slXs1J.png 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*m6-nqrgz43slXs1J.png" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">29.) Automatic1111 Web UI — PC — Free</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/lgP1LNnaUaQ"><strong><u>RTX 3090 vs RTX 3060 Ultimate Showdown for Stable Diffusion, ML, AI & Video Rendering Performance</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*vRH-B9MYpA8Yb05Y.png 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*vRH-B9MYpA8Yb05Y.png 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*vRH-B9MYpA8Yb05Y.png 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*vRH-B9MYpA8Yb05Y.png 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*vRH-B9MYpA8Yb05Y.png 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*vRH-B9MYpA8Yb05Y.png 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*vRH-B9MYpA8Yb05Y.png 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*vRH-B9MYpA8Yb05Y.png 640w, https://miro.medium.com/v2/resize:fit:720/0*vRH-B9MYpA8Yb05Y.png 720w, https://miro.medium.com/v2/resize:fit:750/0*vRH-B9MYpA8Yb05Y.png 750w, https://miro.medium.com/v2/resize:fit:786/0*vRH-B9MYpA8Yb05Y.png 786w, https://miro.medium.com/v2/resize:fit:828/0*vRH-B9MYpA8Yb05Y.png 828w, https://miro.medium.com/v2/resize:fit:1100/0*vRH-B9MYpA8Yb05Y.png 1100w, https://miro.medium.com/v2/resize:fit:960/0*vRH-B9MYpA8Yb05Y.png 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*vRH-B9MYpA8Yb05Y.png" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">30.) Kohya Web UI — Automatic1111 Web UI — PC — Free</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/TpuDOsuKIBo"><strong><u>Generate Studio Quality Realistic Photos By Kohya LoRA Stable Diffusion Training — Full Tutorial</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*CVe2w3D31kA5FL5L 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*CVe2w3D31kA5FL5L 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*CVe2w3D31kA5FL5L 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*CVe2w3D31kA5FL5L 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*CVe2w3D31kA5FL5L 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*CVe2w3D31kA5FL5L 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*CVe2w3D31kA5FL5L 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*CVe2w3D31kA5FL5L 640w, https://miro.medium.com/v2/resize:fit:720/0*CVe2w3D31kA5FL5L 720w, https://miro.medium.com/v2/resize:fit:750/0*CVe2w3D31kA5FL5L 750w, https://miro.medium.com/v2/resize:fit:786/0*CVe2w3D31kA5FL5L 786w, https://miro.medium.com/v2/resize:fit:828/0*CVe2w3D31kA5FL5L 828w, https://miro.medium.com/v2/resize:fit:1100/0*CVe2w3D31kA5FL5L 1100w, https://miro.medium.com/v2/resize:fit:960/0*CVe2w3D31kA5FL5L 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*CVe2w3D31kA5FL5L" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">31.) Kaggle NoteBook (Cloud) — Free</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/R2fEocf-MU8"><strong><u>DeepFloyd IF By Stability AI — Is It Stable Diffusion XL or Version 3? We Review and Show How To Use</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*32C1Y9apjFoQBag0 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*32C1Y9apjFoQBag0 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*32C1Y9apjFoQBag0 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*32C1Y9apjFoQBag0 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*32C1Y9apjFoQBag0 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*32C1Y9apjFoQBag0 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*32C1Y9apjFoQBag0 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*32C1Y9apjFoQBag0 640w, https://miro.medium.com/v2/resize:fit:720/0*32C1Y9apjFoQBag0 720w, https://miro.medium.com/v2/resize:fit:750/0*32C1Y9apjFoQBag0 750w, https://miro.medium.com/v2/resize:fit:786/0*32C1Y9apjFoQBag0 786w, https://miro.medium.com/v2/resize:fit:828/0*32C1Y9apjFoQBag0 828w, https://miro.medium.com/v2/resize:fit:1100/0*32C1Y9apjFoQBag0 1100w, https://miro.medium.com/v2/resize:fit:960/0*32C1Y9apjFoQBag0 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*32C1Y9apjFoQBag0" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">32.) Python Script — Automatic1111 Web UI — PC — Free</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/343I11mhnXs"><strong><u>How To Find Best Stable Diffusion Generated Images By Using DeepFace AI — DreamBooth / LoRA Training</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*ZhiXbx550Rp5JQwT.png 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*ZhiXbx550Rp5JQwT.png 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*ZhiXbx550Rp5JQwT.png 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*ZhiXbx550Rp5JQwT.png 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*ZhiXbx550Rp5JQwT.png 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*ZhiXbx550Rp5JQwT.png 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*ZhiXbx550Rp5JQwT.png 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*ZhiXbx550Rp5JQwT.png 640w, https://miro.medium.com/v2/resize:fit:720/0*ZhiXbx550Rp5JQwT.png 720w, https://miro.medium.com/v2/resize:fit:750/0*ZhiXbx550Rp5JQwT.png 750w, https://miro.medium.com/v2/resize:fit:786/0*ZhiXbx550Rp5JQwT.png 786w, https://miro.medium.com/v2/resize:fit:828/0*ZhiXbx550Rp5JQwT.png 828w, https://miro.medium.com/v2/resize:fit:1100/0*ZhiXbx550Rp5JQwT.png 1100w, https://miro.medium.com/v2/resize:fit:960/0*ZhiXbx550Rp5JQwT.png 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*ZhiXbx550Rp5JQwT.png" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">33.) PC — Google Colab (Cloud) — Free</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/OI1LEN-SgLM"><strong><u>Mind-Blowing Deepfake Tutorial: Turn Anyone into Your Favorite Movie Star! PC & Google Colab — roop</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*KJFIjmHTK9EtcAb3 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*KJFIjmHTK9EtcAb3 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*KJFIjmHTK9EtcAb3 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*KJFIjmHTK9EtcAb3 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*KJFIjmHTK9EtcAb3 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*KJFIjmHTK9EtcAb3 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*KJFIjmHTK9EtcAb3 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*KJFIjmHTK9EtcAb3 640w, https://miro.medium.com/v2/resize:fit:720/0*KJFIjmHTK9EtcAb3 720w, https://miro.medium.com/v2/resize:fit:750/0*KJFIjmHTK9EtcAb3 750w, https://miro.medium.com/v2/resize:fit:786/0*KJFIjmHTK9EtcAb3 786w, https://miro.medium.com/v2/resize:fit:828/0*KJFIjmHTK9EtcAb3 828w, https://miro.medium.com/v2/resize:fit:1100/0*KJFIjmHTK9EtcAb3 1100w, https://miro.medium.com/v2/resize:fit:960/0*KJFIjmHTK9EtcAb3 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*KJFIjmHTK9EtcAb3" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">34.) Automatic1111 Web UI — PC — Free</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/ot5GkaxHPzk"><strong><u>Stable Diffusion Now Has The Photoshop Generative Fill Feature With ControlNet Extension — Tutorial</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*cf1p_YS1t2TE5ib8 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*cf1p_YS1t2TE5ib8 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*cf1p_YS1t2TE5ib8 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*cf1p_YS1t2TE5ib8 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*cf1p_YS1t2TE5ib8 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*cf1p_YS1t2TE5ib8 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*cf1p_YS1t2TE5ib8 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*cf1p_YS1t2TE5ib8 640w, https://miro.medium.com/v2/resize:fit:720/0*cf1p_YS1t2TE5ib8 720w, https://miro.medium.com/v2/resize:fit:750/0*cf1p_YS1t2TE5ib8 750w, https://miro.medium.com/v2/resize:fit:786/0*cf1p_YS1t2TE5ib8 786w, https://miro.medium.com/v2/resize:fit:828/0*cf1p_YS1t2TE5ib8 828w, https://miro.medium.com/v2/resize:fit:1100/0*cf1p_YS1t2TE5ib8 1100w, https://miro.medium.com/v2/resize:fit:960/0*cf1p_YS1t2TE5ib8 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*cf1p_YS1t2TE5ib8" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">35.) Automatic1111 Web UI — PC — Free</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/QTYX0tgA5ho"><strong><u>Human Cropping Script & 4K+ Resolution Class / Reg Images For Stable Diffusion DreamBooth / LoRA</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*k5P8tVhNwQiU7nsU 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*k5P8tVhNwQiU7nsU 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*k5P8tVhNwQiU7nsU 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*k5P8tVhNwQiU7nsU 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*k5P8tVhNwQiU7nsU 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*k5P8tVhNwQiU7nsU 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*k5P8tVhNwQiU7nsU 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*k5P8tVhNwQiU7nsU 640w, https://miro.medium.com/v2/resize:fit:720/0*k5P8tVhNwQiU7nsU 720w, https://miro.medium.com/v2/resize:fit:750/0*k5P8tVhNwQiU7nsU 750w, https://miro.medium.com/v2/resize:fit:786/0*k5P8tVhNwQiU7nsU 786w, https://miro.medium.com/v2/resize:fit:828/0*k5P8tVhNwQiU7nsU 828w, https://miro.medium.com/v2/resize:fit:1100/0*k5P8tVhNwQiU7nsU 1100w, https://miro.medium.com/v2/resize:fit:960/0*k5P8tVhNwQiU7nsU 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*k5P8tVhNwQiU7nsU" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">36.) Automatic1111 Web UI — PC — Free</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/olX1mySE8HA"><strong><u>Stable Diffusion 2 NEW Image Post Processing Scripts And Best Class / Regularization Images Datasets</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*TfPAtBVVTjZREtMK 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*TfPAtBVVTjZREtMK 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*TfPAtBVVTjZREtMK 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*TfPAtBVVTjZREtMK 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*TfPAtBVVTjZREtMK 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*TfPAtBVVTjZREtMK 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*TfPAtBVVTjZREtMK 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*TfPAtBVVTjZREtMK 640w, https://miro.medium.com/v2/resize:fit:720/0*TfPAtBVVTjZREtMK 720w, https://miro.medium.com/v2/resize:fit:750/0*TfPAtBVVTjZREtMK 750w, https://miro.medium.com/v2/resize:fit:786/0*TfPAtBVVTjZREtMK 786w, https://miro.medium.com/v2/resize:fit:828/0*TfPAtBVVTjZREtMK 828w, https://miro.medium.com/v2/resize:fit:1100/0*TfPAtBVVTjZREtMK 1100w, https://miro.medium.com/v2/resize:fit:960/0*TfPAtBVVTjZREtMK 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*TfPAtBVVTjZREtMK" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">37.) Automatic1111 Web UI — PC — Free</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/jD1ZSd9aFHg"><strong><u>How To Use Roop DeepFake On RunPod Step By Step Tutorial With Custom Made Auto Installer Script</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*5NwG81zU83spKGiT 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*5NwG81zU83spKGiT 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*5NwG81zU83spKGiT 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*5NwG81zU83spKGiT 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*5NwG81zU83spKGiT 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*5NwG81zU83spKGiT 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*5NwG81zU83spKGiT 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*5NwG81zU83spKGiT 640w, https://miro.medium.com/v2/resize:fit:720/0*5NwG81zU83spKGiT 720w, https://miro.medium.com/v2/resize:fit:750/0*5NwG81zU83spKGiT 750w, https://miro.medium.com/v2/resize:fit:786/0*5NwG81zU83spKGiT 786w, https://miro.medium.com/v2/resize:fit:828/0*5NwG81zU83spKGiT 828w, https://miro.medium.com/v2/resize:fit:1100/0*5NwG81zU83spKGiT 1100w, https://miro.medium.com/v2/resize:fit:960/0*5NwG81zU83spKGiT 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*5NwG81zU83spKGiT" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">38.) RunPod — Automatic1111 Web UI — Cloud — Paid — No PC Is Required</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/c_S2kFAefTQ"><strong><u>How To Install DreamBooth & Automatic1111 On RunPod & Latest Libraries — 2x Speed Up — cudDNN — CUDA</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*tofAIsOgmmoq0kt7 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*tofAIsOgmmoq0kt7 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*tofAIsOgmmoq0kt7 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*tofAIsOgmmoq0kt7 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*tofAIsOgmmoq0kt7 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*tofAIsOgmmoq0kt7 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*tofAIsOgmmoq0kt7 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*tofAIsOgmmoq0kt7 640w, https://miro.medium.com/v2/resize:fit:720/0*tofAIsOgmmoq0kt7 720w, https://miro.medium.com/v2/resize:fit:750/0*tofAIsOgmmoq0kt7 750w, https://miro.medium.com/v2/resize:fit:786/0*tofAIsOgmmoq0kt7 786w, https://miro.medium.com/v2/resize:fit:828/0*tofAIsOgmmoq0kt7 828w, https://miro.medium.com/v2/resize:fit:1100/0*tofAIsOgmmoq0kt7 1100w, https://miro.medium.com/v2/resize:fit:960/0*tofAIsOgmmoq0kt7 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*tofAIsOgmmoq0kt7" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">39.) Automatic1111 Web UI — PC — Free + RunPod (Cloud)</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/3E5fhFQUVLo"><strong><u>Zero to Hero ControlNet Tutorial: Stable Diffusion Web UI Extension | Complete Feature Guide</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*x7s_wwCiKyf6CfbC 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*x7s_wwCiKyf6CfbC 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*x7s_wwCiKyf6CfbC 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*x7s_wwCiKyf6CfbC 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*x7s_wwCiKyf6CfbC 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*x7s_wwCiKyf6CfbC 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*x7s_wwCiKyf6CfbC 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*x7s_wwCiKyf6CfbC 640w, https://miro.medium.com/v2/resize:fit:720/0*x7s_wwCiKyf6CfbC 720w, https://miro.medium.com/v2/resize:fit:750/0*x7s_wwCiKyf6CfbC 750w, https://miro.medium.com/v2/resize:fit:786/0*x7s_wwCiKyf6CfbC 786w, https://miro.medium.com/v2/resize:fit:828/0*x7s_wwCiKyf6CfbC 828w, https://miro.medium.com/v2/resize:fit:1100/0*x7s_wwCiKyf6CfbC 1100w, https://miro.medium.com/v2/resize:fit:960/0*x7s_wwCiKyf6CfbC 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*x7s_wwCiKyf6CfbC" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">40.) Automatic1111 Web UI — PC — Free + RunPod (Cloud)</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/g0wXIcRhkJk"><strong><u>The END of Photography — Use AI to Make Your Own Studio Photos, FREE Via DreamBooth Training</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*UNeJxfgI22acQUHJ 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*UNeJxfgI22acQUHJ 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*UNeJxfgI22acQUHJ 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*UNeJxfgI22acQUHJ 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*UNeJxfgI22acQUHJ 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*UNeJxfgI22acQUHJ 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*UNeJxfgI22acQUHJ 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*UNeJxfgI22acQUHJ 640w, https://miro.medium.com/v2/resize:fit:720/0*UNeJxfgI22acQUHJ 720w, https://miro.medium.com/v2/resize:fit:750/0*UNeJxfgI22acQUHJ 750w, https://miro.medium.com/v2/resize:fit:786/0*UNeJxfgI22acQUHJ 786w, https://miro.medium.com/v2/resize:fit:828/0*UNeJxfgI22acQUHJ 828w, https://miro.medium.com/v2/resize:fit:1100/0*UNeJxfgI22acQUHJ 1100w, https://miro.medium.com/v2/resize:fit:960/0*UNeJxfgI22acQUHJ 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*UNeJxfgI22acQUHJ" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">41.) Google Colab — Gradio — Free — Cloud</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/s2MQqmv6yAg"><strong><u>How To Use Stable Diffusion XL (SDXL 0.9) On Google Colab For Free</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*RcDlb-m77mkhmCB- 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*RcDlb-m77mkhmCB- 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*RcDlb-m77mkhmCB- 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*RcDlb-m77mkhmCB- 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*RcDlb-m77mkhmCB- 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*RcDlb-m77mkhmCB- 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*RcDlb-m77mkhmCB- 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*RcDlb-m77mkhmCB- 640w, https://miro.medium.com/v2/resize:fit:720/0*RcDlb-m77mkhmCB- 720w, https://miro.medium.com/v2/resize:fit:750/0*RcDlb-m77mkhmCB- 750w, https://miro.medium.com/v2/resize:fit:786/0*RcDlb-m77mkhmCB- 786w, https://miro.medium.com/v2/resize:fit:828/0*RcDlb-m77mkhmCB- 828w, https://miro.medium.com/v2/resize:fit:1100/0*RcDlb-m77mkhmCB- 1100w, https://miro.medium.com/v2/resize:fit:960/0*RcDlb-m77mkhmCB- 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*RcDlb-m77mkhmCB-" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">42.) Local — PC — Free — Gradio</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/__7VNmnn5iU"><strong><u>Stable Diffusion XL (SDXL) Locally On Your PC — 8GB VRAM — Easy Tutorial With Automatic Installer</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*vJttYOCrS1qVK82w 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*vJttYOCrS1qVK82w 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*vJttYOCrS1qVK82w 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*vJttYOCrS1qVK82w 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*vJttYOCrS1qVK82w 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*vJttYOCrS1qVK82w 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*vJttYOCrS1qVK82w 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*vJttYOCrS1qVK82w 640w, https://miro.medium.com/v2/resize:fit:720/0*vJttYOCrS1qVK82w 720w, https://miro.medium.com/v2/resize:fit:750/0*vJttYOCrS1qVK82w 750w, https://miro.medium.com/v2/resize:fit:786/0*vJttYOCrS1qVK82w 786w, https://miro.medium.com/v2/resize:fit:828/0*vJttYOCrS1qVK82w 828w, https://miro.medium.com/v2/resize:fit:1100/0*vJttYOCrS1qVK82w 1100w, https://miro.medium.com/v2/resize:fit:960/0*vJttYOCrS1qVK82w 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*vJttYOCrS1qVK82w" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">43.) Cloud — RunPod</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/gTdPRm-R-14"><strong><u>How To Use SDXL On RunPod Tutorial. Auto Installer & Refiner & Amazing Native Diffusers Based Gradio</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*8C556on8U8rKsbgm 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*8C556on8U8rKsbgm 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*8C556on8U8rKsbgm 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*8C556on8U8rKsbgm 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*8C556on8U8rKsbgm 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*8C556on8U8rKsbgm 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*8C556on8U8rKsbgm 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*8C556on8U8rKsbgm 640w, https://miro.medium.com/v2/resize:fit:720/0*8C556on8U8rKsbgm 720w, https://miro.medium.com/v2/resize:fit:750/0*8C556on8U8rKsbgm 750w, https://miro.medium.com/v2/resize:fit:786/0*8C556on8U8rKsbgm 786w, https://miro.medium.com/v2/resize:fit:828/0*8C556on8U8rKsbgm 828w, https://miro.medium.com/v2/resize:fit:1100/0*8C556on8U8rKsbgm 1100w, https://miro.medium.com/v2/resize:fit:960/0*8C556on8U8rKsbgm 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*8C556on8U8rKsbgm" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">44.) Local — PC — Free — Google Colab (Cloud) — RunPod (Cloud) — Custom Web UI</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/FnMHbhvWUhE"><strong><u>ComfyUI Master Tutorial — Stable Diffusion XL (SDXL) — Install On PC, Google Colab (Free) & RunPod</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*ncF5u5c7cAWbd02L 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*ncF5u5c7cAWbd02L 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*ncF5u5c7cAWbd02L 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*ncF5u5c7cAWbd02L 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*ncF5u5c7cAWbd02L 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*ncF5u5c7cAWbd02L 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*ncF5u5c7cAWbd02L 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*ncF5u5c7cAWbd02L 640w, https://miro.medium.com/v2/resize:fit:720/0*ncF5u5c7cAWbd02L 720w, https://miro.medium.com/v2/resize:fit:750/0*ncF5u5c7cAWbd02L 750w, https://miro.medium.com/v2/resize:fit:786/0*ncF5u5c7cAWbd02L 786w, https://miro.medium.com/v2/resize:fit:828/0*ncF5u5c7cAWbd02L 828w, https://miro.medium.com/v2/resize:fit:1100/0*ncF5u5c7cAWbd02L 1100w, https://miro.medium.com/v2/resize:fit:960/0*ncF5u5c7cAWbd02L 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*ncF5u5c7cAWbd02L" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">45.) Local — PC — Free — RunPod (Cloud)</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/AY6DMBCIZ3A"><strong><u>First Ever SDXL Training With Kohya LoRA — Stable Diffusion XL Training Will Replace Older Models</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*PsGyydxVLgyjc-Hb 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*PsGyydxVLgyjc-Hb 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*PsGyydxVLgyjc-Hb 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*PsGyydxVLgyjc-Hb 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*PsGyydxVLgyjc-Hb 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*PsGyydxVLgyjc-Hb 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*PsGyydxVLgyjc-Hb 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*PsGyydxVLgyjc-Hb 640w, https://miro.medium.com/v2/resize:fit:720/0*PsGyydxVLgyjc-Hb 720w, https://miro.medium.com/v2/resize:fit:750/0*PsGyydxVLgyjc-Hb 750w, https://miro.medium.com/v2/resize:fit:786/0*PsGyydxVLgyjc-Hb 786w, https://miro.medium.com/v2/resize:fit:828/0*PsGyydxVLgyjc-Hb 828w, https://miro.medium.com/v2/resize:fit:1100/0*PsGyydxVLgyjc-Hb 1100w, https://miro.medium.com/v2/resize:fit:960/0*PsGyydxVLgyjc-Hb 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*PsGyydxVLgyjc-Hb" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">46.) Local — PC — Free</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/eY_v5IR4dUQ"><strong><u>How To Use SDXL in Automatic1111 Web UI — SD Web UI vs ComfyUI — Easy Local Install Tutorial / Guide</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*l-0mEnPDG79GL0Sy 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*l-0mEnPDG79GL0Sy 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*l-0mEnPDG79GL0Sy 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*l-0mEnPDG79GL0Sy 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*l-0mEnPDG79GL0Sy 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*l-0mEnPDG79GL0Sy 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*l-0mEnPDG79GL0Sy 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*l-0mEnPDG79GL0Sy 640w, https://miro.medium.com/v2/resize:fit:720/0*l-0mEnPDG79GL0Sy 720w, https://miro.medium.com/v2/resize:fit:750/0*l-0mEnPDG79GL0Sy 750w, https://miro.medium.com/v2/resize:fit:786/0*l-0mEnPDG79GL0Sy 786w, https://miro.medium.com/v2/resize:fit:828/0*l-0mEnPDG79GL0Sy 828w, https://miro.medium.com/v2/resize:fit:1100/0*l-0mEnPDG79GL0Sy 1100w, https://miro.medium.com/v2/resize:fit:960/0*l-0mEnPDG79GL0Sy 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*l-0mEnPDG79GL0Sy" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">47.) Cloud — RunPod — Paid</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/mDW4zqh8R40"><strong><u>How to use Stable Diffusion X-Large (SDXL) with Automatic1111 Web UI on RunPod — Easy Tutorial</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*NMJj6_NIcdDVU8xB 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*NMJj6_NIcdDVU8xB 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*NMJj6_NIcdDVU8xB 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*NMJj6_NIcdDVU8xB 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*NMJj6_NIcdDVU8xB 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*NMJj6_NIcdDVU8xB 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*NMJj6_NIcdDVU8xB 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*NMJj6_NIcdDVU8xB 640w, https://miro.medium.com/v2/resize:fit:720/0*NMJj6_NIcdDVU8xB 720w, https://miro.medium.com/v2/resize:fit:750/0*NMJj6_NIcdDVU8xB 750w, https://miro.medium.com/v2/resize:fit:786/0*NMJj6_NIcdDVU8xB 786w, https://miro.medium.com/v2/resize:fit:828/0*NMJj6_NIcdDVU8xB 828w, https://miro.medium.com/v2/resize:fit:1100/0*NMJj6_NIcdDVU8xB 1100w, https://miro.medium.com/v2/resize:fit:960/0*NMJj6_NIcdDVU8xB 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*NMJj6_NIcdDVU8xB" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">48.) Local — PC — Free</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/sBFGitIvD2A"><strong><u>Become A Master Of SDXL Training With Kohya SS LoRAs — Combine Power Of Automatic1111 & SDXL LoRAs</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*S9s7H2zNBinA80yl 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*S9s7H2zNBinA80yl 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*S9s7H2zNBinA80yl 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*S9s7H2zNBinA80yl 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*S9s7H2zNBinA80yl 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*S9s7H2zNBinA80yl 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*S9s7H2zNBinA80yl 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*S9s7H2zNBinA80yl 640w, https://miro.medium.com/v2/resize:fit:720/0*S9s7H2zNBinA80yl 720w, https://miro.medium.com/v2/resize:fit:750/0*S9s7H2zNBinA80yl 750w, https://miro.medium.com/v2/resize:fit:786/0*S9s7H2zNBinA80yl 786w, https://miro.medium.com/v2/resize:fit:828/0*S9s7H2zNBinA80yl 828w, https://miro.medium.com/v2/resize:fit:1100/0*S9s7H2zNBinA80yl 1100w, https://miro.medium.com/v2/resize:fit:960/0*S9s7H2zNBinA80yl 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*S9s7H2zNBinA80yl" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">49.) Cloud — RunPod — Paid</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/-xEwaQ54DI4"><strong><u>How To Do SDXL LoRA Training On RunPod With Kohya SS GUI Trainer & Use LoRAs With Automatic1111 UI</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*o_utl75aUxCF8it_ 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*o_utl75aUxCF8it_ 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*o_utl75aUxCF8it_ 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*o_utl75aUxCF8it_ 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*o_utl75aUxCF8it_ 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*o_utl75aUxCF8it_ 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*o_utl75aUxCF8it_ 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*o_utl75aUxCF8it_ 640w, https://miro.medium.com/v2/resize:fit:720/0*o_utl75aUxCF8it_ 720w, https://miro.medium.com/v2/resize:fit:750/0*o_utl75aUxCF8it_ 750w, https://miro.medium.com/v2/resize:fit:786/0*o_utl75aUxCF8it_ 786w, https://miro.medium.com/v2/resize:fit:828/0*o_utl75aUxCF8it_ 828w, https://miro.medium.com/v2/resize:fit:1100/0*o_utl75aUxCF8it_ 1100w, https://miro.medium.com/v2/resize:fit:960/0*o_utl75aUxCF8it_ 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*o_utl75aUxCF8it_" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">50.) Cloud — Kaggle — Free</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/JF2P7BIUpIU"><strong><u>How to Do SDXL Training For FREE with Kohya LoRA — Kaggle — NO GPU Required — Pwns Google Colab</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*Hn07s8FHB4sdZ76Q 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*Hn07s8FHB4sdZ76Q 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*Hn07s8FHB4sdZ76Q 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*Hn07s8FHB4sdZ76Q 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*Hn07s8FHB4sdZ76Q 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*Hn07s8FHB4sdZ76Q 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*Hn07s8FHB4sdZ76Q 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*Hn07s8FHB4sdZ76Q 640w, https://miro.medium.com/v2/resize:fit:720/0*Hn07s8FHB4sdZ76Q 720w, https://miro.medium.com/v2/resize:fit:750/0*Hn07s8FHB4sdZ76Q 750w, https://miro.medium.com/v2/resize:fit:786/0*Hn07s8FHB4sdZ76Q 786w, https://miro.medium.com/v2/resize:fit:828/0*Hn07s8FHB4sdZ76Q 828w, https://miro.medium.com/v2/resize:fit:1100/0*Hn07s8FHB4sdZ76Q 1100w, https://miro.medium.com/v2/resize:fit:960/0*Hn07s8FHB4sdZ76Q 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*Hn07s8FHB4sdZ76Q" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">51.) Cloud — Kaggle — Free</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/dpM02YMj8FY"><strong><u>How Use Stable Diffusion, SDXL, ControlNet, LoRAs For FREE Without A GPU On Kaggle Like Google Colab</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*BohFBU9krrPJ_SxL 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*BohFBU9krrPJ_SxL 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*BohFBU9krrPJ_SxL 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*BohFBU9krrPJ_SxL 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*BohFBU9krrPJ_SxL 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*BohFBU9krrPJ_SxL 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*BohFBU9krrPJ_SxL 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*BohFBU9krrPJ_SxL 640w, https://miro.medium.com/v2/resize:fit:720/0*BohFBU9krrPJ_SxL 720w, https://miro.medium.com/v2/resize:fit:750/0*BohFBU9krrPJ_SxL 750w, https://miro.medium.com/v2/resize:fit:786/0*BohFBU9krrPJ_SxL 786w, https://miro.medium.com/v2/resize:fit:828/0*BohFBU9krrPJ_SxL 828w, https://miro.medium.com/v2/resize:fit:1100/0*BohFBU9krrPJ_SxL 1100w, https://miro.medium.com/v2/resize:fit:960/0*BohFBU9krrPJ_SxL 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*BohFBU9krrPJ_SxL" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">52.) Windows — Free</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/a8oeCFyM5gA"><strong><u>Turn Videos Into Animation With Just 1 Click — ReRender A Video Tutorial — Installer For Windows</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*SajTzbaMIpC9QvT7 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*SajTzbaMIpC9QvT7 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*SajTzbaMIpC9QvT7 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*SajTzbaMIpC9QvT7 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*SajTzbaMIpC9QvT7 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*SajTzbaMIpC9QvT7 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*SajTzbaMIpC9QvT7 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*SajTzbaMIpC9QvT7 640w, https://miro.medium.com/v2/resize:fit:720/0*SajTzbaMIpC9QvT7 720w, https://miro.medium.com/v2/resize:fit:750/0*SajTzbaMIpC9QvT7 750w, https://miro.medium.com/v2/resize:fit:786/0*SajTzbaMIpC9QvT7 786w, https://miro.medium.com/v2/resize:fit:828/0*SajTzbaMIpC9QvT7 828w, https://miro.medium.com/v2/resize:fit:1100/0*SajTzbaMIpC9QvT7 1100w, https://miro.medium.com/v2/resize:fit:960/0*SajTzbaMIpC9QvT7 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*SajTzbaMIpC9QvT7" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">53.) RunPod — Cloud — Paid</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/cVf9Qf_pKks"><strong><u>Turn Videos Into Animation / 3D Just 1 Click — ReRender A Video Tutorial — Installer For RunPod</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*3nJEtW0V6kPNpRoL 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*3nJEtW0V6kPNpRoL 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*3nJEtW0V6kPNpRoL 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*3nJEtW0V6kPNpRoL 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*3nJEtW0V6kPNpRoL 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*3nJEtW0V6kPNpRoL 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*3nJEtW0V6kPNpRoL 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*3nJEtW0V6kPNpRoL 640w, https://miro.medium.com/v2/resize:fit:720/0*3nJEtW0V6kPNpRoL 720w, https://miro.medium.com/v2/resize:fit:750/0*3nJEtW0V6kPNpRoL 750w, https://miro.medium.com/v2/resize:fit:786/0*3nJEtW0V6kPNpRoL 786w, https://miro.medium.com/v2/resize:fit:828/0*3nJEtW0V6kPNpRoL 828w, https://miro.medium.com/v2/resize:fit:1100/0*3nJEtW0V6kPNpRoL 1100w, https://miro.medium.com/v2/resize:fit:960/0*3nJEtW0V6kPNpRoL 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*3nJEtW0V6kPNpRoL" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">54.) Local — PC — Free</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/kvxX6NrPtEk"><strong><u>Double Your Stable Diffusion Inference Speed with RTX Acceleration TensorRT: A Comprehensive Guide</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*j3yPFd3d6JkHXAS9 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*j3yPFd3d6JkHXAS9 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*j3yPFd3d6JkHXAS9 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*j3yPFd3d6JkHXAS9 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*j3yPFd3d6JkHXAS9 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*j3yPFd3d6JkHXAS9 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*j3yPFd3d6JkHXAS9 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*j3yPFd3d6JkHXAS9 640w, https://miro.medium.com/v2/resize:fit:720/0*j3yPFd3d6JkHXAS9 720w, https://miro.medium.com/v2/resize:fit:750/0*j3yPFd3d6JkHXAS9 750w, https://miro.medium.com/v2/resize:fit:786/0*j3yPFd3d6JkHXAS9 786w, https://miro.medium.com/v2/resize:fit:828/0*j3yPFd3d6JkHXAS9 828w, https://miro.medium.com/v2/resize:fit:1100/0*j3yPFd3d6JkHXAS9 1100w, https://miro.medium.com/v2/resize:fit:960/0*j3yPFd3d6JkHXAS9 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*j3yPFd3d6JkHXAS9" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">55.) RunPod — Cloud — Paid</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/eKnMVXVjVoU"><strong><u>How to Install & Run TensorRT on RunPod, Unix, Linux for 2x Faster Stable Diffusion Inference Speed</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*zoDvBAOdVCPSIX-q 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*zoDvBAOdVCPSIX-q 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*zoDvBAOdVCPSIX-q 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*zoDvBAOdVCPSIX-q 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*zoDvBAOdVCPSIX-q 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*zoDvBAOdVCPSIX-q 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*zoDvBAOdVCPSIX-q 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*zoDvBAOdVCPSIX-q 640w, https://miro.medium.com/v2/resize:fit:720/0*zoDvBAOdVCPSIX-q 720w, https://miro.medium.com/v2/resize:fit:750/0*zoDvBAOdVCPSIX-q 750w, https://miro.medium.com/v2/resize:fit:786/0*zoDvBAOdVCPSIX-q 786w, https://miro.medium.com/v2/resize:fit:828/0*zoDvBAOdVCPSIX-q 828w, https://miro.medium.com/v2/resize:fit:1100/0*zoDvBAOdVCPSIX-q 1100w, https://miro.medium.com/v2/resize:fit:960/0*zoDvBAOdVCPSIX-q 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*zoDvBAOdVCPSIX-q" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">56.) Local — PC — Free</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/Fbuyu35TkE4"><strong><u>SOTA Image PreProcessing Scripts For Stable Diffusion Training — Auto Subject Crop & Face Focus</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*iEDTFvVQqSZ8Ajyb 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*iEDTFvVQqSZ8Ajyb 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*iEDTFvVQqSZ8Ajyb 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*iEDTFvVQqSZ8Ajyb 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*iEDTFvVQqSZ8Ajyb 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*iEDTFvVQqSZ8Ajyb 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*iEDTFvVQqSZ8Ajyb 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*iEDTFvVQqSZ8Ajyb 640w, https://miro.medium.com/v2/resize:fit:720/0*iEDTFvVQqSZ8Ajyb 720w, https://miro.medium.com/v2/resize:fit:750/0*iEDTFvVQqSZ8Ajyb 750w, https://miro.medium.com/v2/resize:fit:786/0*iEDTFvVQqSZ8Ajyb 786w, https://miro.medium.com/v2/resize:fit:828/0*iEDTFvVQqSZ8Ajyb 828w, https://miro.medium.com/v2/resize:fit:1100/0*iEDTFvVQqSZ8Ajyb 1100w, https://miro.medium.com/v2/resize:fit:960/0*iEDTFvVQqSZ8Ajyb 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*iEDTFvVQqSZ8Ajyb" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">57.) Local — PC — Free</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/jHTkVm2mcfs"><strong><u>Fooocus Stable Diffusion Web UI — Use SDXL Like You Are Using Midjourney — Easy To Use High Quality</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*eikK5lGqgkLifHlA 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*eikK5lGqgkLifHlA 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*eikK5lGqgkLifHlA 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*eikK5lGqgkLifHlA 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*eikK5lGqgkLifHlA 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*eikK5lGqgkLifHlA 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*eikK5lGqgkLifHlA 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*eikK5lGqgkLifHlA 640w, https://miro.medium.com/v2/resize:fit:720/0*eikK5lGqgkLifHlA 720w, https://miro.medium.com/v2/resize:fit:750/0*eikK5lGqgkLifHlA 750w, https://miro.medium.com/v2/resize:fit:786/0*eikK5lGqgkLifHlA 786w, https://miro.medium.com/v2/resize:fit:828/0*eikK5lGqgkLifHlA 828w, https://miro.medium.com/v2/resize:fit:1100/0*eikK5lGqgkLifHlA 1100w, https://miro.medium.com/v2/resize:fit:960/0*eikK5lGqgkLifHlA 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*eikK5lGqgkLifHlA" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">58.) Cloud — Kaggle (Cloud) — Free</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/16-b1AjvyBE"><strong><u>How To Do Stable Diffusion XL (SDXL) DreamBooth Training For Free — Utilizing Kaggle — Easy Tutorial</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*NSAw42FhgNiQv_tF 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*NSAw42FhgNiQv_tF 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*NSAw42FhgNiQv_tF 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*NSAw42FhgNiQv_tF 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*NSAw42FhgNiQv_tF 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*NSAw42FhgNiQv_tF 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*NSAw42FhgNiQv_tF 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*NSAw42FhgNiQv_tF 640w, https://miro.medium.com/v2/resize:fit:720/0*NSAw42FhgNiQv_tF 720w, https://miro.medium.com/v2/resize:fit:750/0*NSAw42FhgNiQv_tF 750w, https://miro.medium.com/v2/resize:fit:786/0*NSAw42FhgNiQv_tF 786w, https://miro.medium.com/v2/resize:fit:828/0*NSAw42FhgNiQv_tF 828w, https://miro.medium.com/v2/resize:fit:1100/0*NSAw42FhgNiQv_tF 1100w, https://miro.medium.com/v2/resize:fit:960/0*NSAw42FhgNiQv_tF 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*NSAw42FhgNiQv_tF" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">59.) Free — Local — RunPod (Cloud)</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/ZiUXf_idIR4"><strong><u>PIXART-α : First Open Source Rival to Midjourney — Better Than Stable Diffusion SDXL — Full Tutorial</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*YhnoYAmxJk3LV6_m 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*YhnoYAmxJk3LV6_m 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*YhnoYAmxJk3LV6_m 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*YhnoYAmxJk3LV6_m 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*YhnoYAmxJk3LV6_m 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*YhnoYAmxJk3LV6_m 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*YhnoYAmxJk3LV6_m 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*YhnoYAmxJk3LV6_m 640w, https://miro.medium.com/v2/resize:fit:720/0*YhnoYAmxJk3LV6_m 720w, https://miro.medium.com/v2/resize:fit:750/0*YhnoYAmxJk3LV6_m 750w, https://miro.medium.com/v2/resize:fit:786/0*YhnoYAmxJk3LV6_m 786w, https://miro.medium.com/v2/resize:fit:828/0*YhnoYAmxJk3LV6_m 828w, https://miro.medium.com/v2/resize:fit:1100/0*YhnoYAmxJk3LV6_m 1100w, https://miro.medium.com/v2/resize:fit:960/0*YhnoYAmxJk3LV6_m 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*YhnoYAmxJk3LV6_m" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">60.) Free — Local — PC</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/-NjNy7afOQ0"><strong><u>Essential AI Tools and Libraries: A Guide to Python, Git, C++ Compile Tools, FFmpeg, CUDA, PyTorch</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*kfaa3CLV2eGgS0-E 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*kfaa3CLV2eGgS0-E 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*kfaa3CLV2eGgS0-E 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*kfaa3CLV2eGgS0-E 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*kfaa3CLV2eGgS0-E 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*kfaa3CLV2eGgS0-E 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*kfaa3CLV2eGgS0-E 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*kfaa3CLV2eGgS0-E 640w, https://miro.medium.com/v2/resize:fit:720/0*kfaa3CLV2eGgS0-E 720w, https://miro.medium.com/v2/resize:fit:750/0*kfaa3CLV2eGgS0-E 750w, https://miro.medium.com/v2/resize:fit:786/0*kfaa3CLV2eGgS0-E 786w, https://miro.medium.com/v2/resize:fit:828/0*kfaa3CLV2eGgS0-E 828w, https://miro.medium.com/v2/resize:fit:1100/0*kfaa3CLV2eGgS0-E 1100w, https://miro.medium.com/v2/resize:fit:960/0*kfaa3CLV2eGgS0-E 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*kfaa3CLV2eGgS0-E" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">61.) Free — Local — PC & RunPod (Cloud)</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/HeXknItbMM8"><strong><u>MagicAnimate: Temporally Consistent Human Image Animation using Diffusion Model — Full Tutorial</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*7MA3BnLjA2zYJuZt 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*7MA3BnLjA2zYJuZt 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*7MA3BnLjA2zYJuZt 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*7MA3BnLjA2zYJuZt 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*7MA3BnLjA2zYJuZt 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*7MA3BnLjA2zYJuZt 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*7MA3BnLjA2zYJuZt 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*7MA3BnLjA2zYJuZt 640w, https://miro.medium.com/v2/resize:fit:720/0*7MA3BnLjA2zYJuZt 720w, https://miro.medium.com/v2/resize:fit:750/0*7MA3BnLjA2zYJuZt 750w, https://miro.medium.com/v2/resize:fit:786/0*7MA3BnLjA2zYJuZt 786w, https://miro.medium.com/v2/resize:fit:828/0*7MA3BnLjA2zYJuZt 828w, https://miro.medium.com/v2/resize:fit:1100/0*7MA3BnLjA2zYJuZt 1100w, https://miro.medium.com/v2/resize:fit:960/0*7MA3BnLjA2zYJuZt 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*7MA3BnLjA2zYJuZt" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">62.) Free — Local — PC — RunPod (Cloud) — Kaggle (Cloud)</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/rjXsJ24kQQg"><strong><u>Instantly Transfer Face By Using IP-Adapter-FaceID: Full Tutorial & GUI For Windows, RunPod & Kaggle</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*w_5ayEfUPIuZm6GF 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*w_5ayEfUPIuZm6GF 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*w_5ayEfUPIuZm6GF 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*w_5ayEfUPIuZm6GF 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*w_5ayEfUPIuZm6GF 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*w_5ayEfUPIuZm6GF 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*w_5ayEfUPIuZm6GF 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*w_5ayEfUPIuZm6GF 640w, https://miro.medium.com/v2/resize:fit:720/0*w_5ayEfUPIuZm6GF 720w, https://miro.medium.com/v2/resize:fit:750/0*w_5ayEfUPIuZm6GF 750w, https://miro.medium.com/v2/resize:fit:786/0*w_5ayEfUPIuZm6GF 786w, https://miro.medium.com/v2/resize:fit:828/0*w_5ayEfUPIuZm6GF 828w, https://miro.medium.com/v2/resize:fit:1100/0*w_5ayEfUPIuZm6GF 1100w, https://miro.medium.com/v2/resize:fit:960/0*w_5ayEfUPIuZm6GF 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*w_5ayEfUPIuZm6GF" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">63.) Free — Local — PC — RunPod (Cloud) — Kaggle (Cloud)</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/G-oZn4H-aHQ"><strong><u>Detailed Comparison of 160+ Best Stable Diffusion 1.5 Custom Models & 1 Click Script to Download All</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*L9EmsRVumz-6xAYZ 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*L9EmsRVumz-6xAYZ 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*L9EmsRVumz-6xAYZ 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*L9EmsRVumz-6xAYZ 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*L9EmsRVumz-6xAYZ 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*L9EmsRVumz-6xAYZ 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*L9EmsRVumz-6xAYZ 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*L9EmsRVumz-6xAYZ 640w, https://miro.medium.com/v2/resize:fit:720/0*L9EmsRVumz-6xAYZ 720w, https://miro.medium.com/v2/resize:fit:750/0*L9EmsRVumz-6xAYZ 750w, https://miro.medium.com/v2/resize:fit:786/0*L9EmsRVumz-6xAYZ 786w, https://miro.medium.com/v2/resize:fit:828/0*L9EmsRVumz-6xAYZ 828w, https://miro.medium.com/v2/resize:fit:1100/0*L9EmsRVumz-6xAYZ 1100w, https://miro.medium.com/v2/resize:fit:960/0*L9EmsRVumz-6xAYZ 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*L9EmsRVumz-6xAYZ" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">64.) Free — Local — PC — RunPod (Cloud)</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/PqREA6-bC3w"><strong><u>SUPIR: New SOTA Open Source Image Upscaler & Enhancer Model Better Than Magnific & Topaz AI Tutorial</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*CdG6XwMHHlYnuPN- 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*CdG6XwMHHlYnuPN- 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*CdG6XwMHHlYnuPN- 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*CdG6XwMHHlYnuPN- 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*CdG6XwMHHlYnuPN- 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*CdG6XwMHHlYnuPN- 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*CdG6XwMHHlYnuPN- 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*CdG6XwMHHlYnuPN- 640w, https://miro.medium.com/v2/resize:fit:720/0*CdG6XwMHHlYnuPN- 720w, https://miro.medium.com/v2/resize:fit:750/0*CdG6XwMHHlYnuPN- 750w, https://miro.medium.com/v2/resize:fit:786/0*CdG6XwMHHlYnuPN- 786w, https://miro.medium.com/v2/resize:fit:828/0*CdG6XwMHHlYnuPN- 828w, https://miro.medium.com/v2/resize:fit:1100/0*CdG6XwMHHlYnuPN- 1100w, https://miro.medium.com/v2/resize:fit:960/0*CdG6XwMHHlYnuPN- 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*CdG6XwMHHlYnuPN-" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">65.) Free — Local — PC — Massed Compute (Cloud)</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/0t5l6CP9eBg"><strong><u>Full Stable Diffusion SD & XL Fine Tuning Tutorial With OneTrainer On Windows & Cloud — Zero To Hero</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*uUtMIXsMZgjZ0Sdi 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*uUtMIXsMZgjZ0Sdi 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*uUtMIXsMZgjZ0Sdi 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*uUtMIXsMZgjZ0Sdi 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*uUtMIXsMZgjZ0Sdi 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*uUtMIXsMZgjZ0Sdi 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*uUtMIXsMZgjZ0Sdi 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*uUtMIXsMZgjZ0Sdi 640w, https://miro.medium.com/v2/resize:fit:720/0*uUtMIXsMZgjZ0Sdi 720w, https://miro.medium.com/v2/resize:fit:750/0*uUtMIXsMZgjZ0Sdi 750w, https://miro.medium.com/v2/resize:fit:786/0*uUtMIXsMZgjZ0Sdi 786w, https://miro.medium.com/v2/resize:fit:828/0*uUtMIXsMZgjZ0Sdi 828w, https://miro.medium.com/v2/resize:fit:1100/0*uUtMIXsMZgjZ0Sdi 1100w, https://miro.medium.com/v2/resize:fit:960/0*uUtMIXsMZgjZ0Sdi 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*uUtMIXsMZgjZ0Sdi" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">66.) Free — Local — PC — Cloud — Extension</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/lMQ7DIPmrfI"><strong><u>Improve Stable Diffusion Prompt Following & Image Quality Significantly With Incantations Extension</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*LSG18TB58_Me9n-K 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*LSG18TB58_Me9n-K 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*LSG18TB58_Me9n-K 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*LSG18TB58_Me9n-K 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*LSG18TB58_Me9n-K 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*LSG18TB58_Me9n-K 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*LSG18TB58_Me9n-K 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*LSG18TB58_Me9n-K 640w, https://miro.medium.com/v2/resize:fit:720/0*LSG18TB58_Me9n-K 720w, https://miro.medium.com/v2/resize:fit:750/0*LSG18TB58_Me9n-K 750w, https://miro.medium.com/v2/resize:fit:786/0*LSG18TB58_Me9n-K 786w, https://miro.medium.com/v2/resize:fit:828/0*LSG18TB58_Me9n-K 828w, https://miro.medium.com/v2/resize:fit:1100/0*LSG18TB58_Me9n-K 1100w, https://miro.medium.com/v2/resize:fit:960/0*LSG18TB58_Me9n-K 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*LSG18TB58_Me9n-K" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">67.) Free — Local — PC</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/OYxVEvDf284"><strong><u>Complete Guide to SUPIR Enhancing and Upscaling Images Like in Sci-Fi Movies on Your PC</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*b2ILs3KTkWwRzJHp 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*b2ILs3KTkWwRzJHp 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*b2ILs3KTkWwRzJHp 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*b2ILs3KTkWwRzJHp 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*b2ILs3KTkWwRzJHp 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*b2ILs3KTkWwRzJHp 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*b2ILs3KTkWwRzJHp 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*b2ILs3KTkWwRzJHp 640w, https://miro.medium.com/v2/resize:fit:720/0*b2ILs3KTkWwRzJHp 720w, https://miro.medium.com/v2/resize:fit:750/0*b2ILs3KTkWwRzJHp 750w, https://miro.medium.com/v2/resize:fit:786/0*b2ILs3KTkWwRzJHp 786w, https://miro.medium.com/v2/resize:fit:828/0*b2ILs3KTkWwRzJHp 828w, https://miro.medium.com/v2/resize:fit:1100/0*b2ILs3KTkWwRzJHp 1100w, https://miro.medium.com/v2/resize:fit:960/0*b2ILs3KTkWwRzJHp 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*b2ILs3KTkWwRzJHp" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">68.) Free — Local — PC</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/m4pcIeAVQD0"><strong><u>IDM-VTON: The Most Amazing Virtual Clothing Try On Application — Open Source — 1 Click Install & Use</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*Q5Oq8Xv4vxsuiPZo 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*Q5Oq8Xv4vxsuiPZo 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*Q5Oq8Xv4vxsuiPZo 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*Q5Oq8Xv4vxsuiPZo 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*Q5Oq8Xv4vxsuiPZo 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*Q5Oq8Xv4vxsuiPZo 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*Q5Oq8Xv4vxsuiPZo 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*Q5Oq8Xv4vxsuiPZo 640w, https://miro.medium.com/v2/resize:fit:720/0*Q5Oq8Xv4vxsuiPZo 720w, https://miro.medium.com/v2/resize:fit:750/0*Q5Oq8Xv4vxsuiPZo 750w, https://miro.medium.com/v2/resize:fit:786/0*Q5Oq8Xv4vxsuiPZo 786w, https://miro.medium.com/v2/resize:fit:828/0*Q5Oq8Xv4vxsuiPZo 828w, https://miro.medium.com/v2/resize:fit:1100/0*Q5Oq8Xv4vxsuiPZo 1100w, https://miro.medium.com/v2/resize:fit:960/0*Q5Oq8Xv4vxsuiPZo 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*Q5Oq8Xv4vxsuiPZo" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">69.) Free & Paid — Cloud — RunPod — Massed Compute — Kaggle</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/LeHfgq_lAXU"><strong><u>IDM-VTON: The Most Amazing Virtual Clothing Try On Application — RunPod — Massed Compute — Kaggle</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*JVYDbJBkDW0oExUY 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*JVYDbJBkDW0oExUY 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*JVYDbJBkDW0oExUY 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*JVYDbJBkDW0oExUY 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*JVYDbJBkDW0oExUY 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*JVYDbJBkDW0oExUY 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*JVYDbJBkDW0oExUY 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*JVYDbJBkDW0oExUY 640w, https://miro.medium.com/v2/resize:fit:720/0*JVYDbJBkDW0oExUY 720w, https://miro.medium.com/v2/resize:fit:750/0*JVYDbJBkDW0oExUY 750w, https://miro.medium.com/v2/resize:fit:786/0*JVYDbJBkDW0oExUY 786w, https://miro.medium.com/v2/resize:fit:828/0*JVYDbJBkDW0oExUY 828w, https://miro.medium.com/v2/resize:fit:1100/0*JVYDbJBkDW0oExUY 1100w, https://miro.medium.com/v2/resize:fit:960/0*JVYDbJBkDW0oExUY 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*JVYDbJBkDW0oExUY" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">70.) Free — Local — PC</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/q0cYhalUUsc"><strong><u>Stable Cascade Full Tutorial for Windows — Predecessor of SD3–1-Click Install Amazing Gradio APP</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*OSdFWTD8x8j44U80 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*OSdFWTD8x8j44U80 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*OSdFWTD8x8j44U80 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*OSdFWTD8x8j44U80 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*OSdFWTD8x8j44U80 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*OSdFWTD8x8j44U80 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*OSdFWTD8x8j44U80 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*OSdFWTD8x8j44U80 640w, https://miro.medium.com/v2/resize:fit:720/0*OSdFWTD8x8j44U80 720w, https://miro.medium.com/v2/resize:fit:750/0*OSdFWTD8x8j44U80 750w, https://miro.medium.com/v2/resize:fit:786/0*OSdFWTD8x8j44U80 786w, https://miro.medium.com/v2/resize:fit:828/0*OSdFWTD8x8j44U80 828w, https://miro.medium.com/v2/resize:fit:1100/0*OSdFWTD8x8j44U80 1100w, https://miro.medium.com/v2/resize:fit:960/0*OSdFWTD8x8j44U80 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*OSdFWTD8x8j44U80" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">71.) Free & Paid — Cloud — RunPod — Massed Compute — Kaggle</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/PKDeMdEObNo"><strong><u>Stable Cascade Full Tutorial for Cloud — Predecessor of SD3 — Massed Compute, RunPod & Kaggle</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*CH3jwKfaL7DLthbp 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*CH3jwKfaL7DLthbp 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*CH3jwKfaL7DLthbp 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*CH3jwKfaL7DLthbp 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*CH3jwKfaL7DLthbp 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*CH3jwKfaL7DLthbp 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*CH3jwKfaL7DLthbp 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*CH3jwKfaL7DLthbp 640w, https://miro.medium.com/v2/resize:fit:720/0*CH3jwKfaL7DLthbp 720w, https://miro.medium.com/v2/resize:fit:750/0*CH3jwKfaL7DLthbp 750w, https://miro.medium.com/v2/resize:fit:786/0*CH3jwKfaL7DLthbp 786w, https://miro.medium.com/v2/resize:fit:828/0*CH3jwKfaL7DLthbp 828w, https://miro.medium.com/v2/resize:fit:1100/0*CH3jwKfaL7DLthbp 1100w, https://miro.medium.com/v2/resize:fit:960/0*CH3jwKfaL7DLthbp 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*CH3jwKfaL7DLthbp" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">72.) Free All Platforms</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/X5WVZ0NMaTg"><strong><u>How to Download (wget) Models from CivitAI & Hugging Face (HF) & upload into HF including privates</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*eT5xjwn8VX7UNdSx 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*eT5xjwn8VX7UNdSx 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*eT5xjwn8VX7UNdSx 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*eT5xjwn8VX7UNdSx 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*eT5xjwn8VX7UNdSx 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*eT5xjwn8VX7UNdSx 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*eT5xjwn8VX7UNdSx 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*eT5xjwn8VX7UNdSx 640w, https://miro.medium.com/v2/resize:fit:720/0*eT5xjwn8VX7UNdSx 720w, https://miro.medium.com/v2/resize:fit:750/0*eT5xjwn8VX7UNdSx 750w, https://miro.medium.com/v2/resize:fit:786/0*eT5xjwn8VX7UNdSx 786w, https://miro.medium.com/v2/resize:fit:828/0*eT5xjwn8VX7UNdSx 828w, https://miro.medium.com/v2/resize:fit:1100/0*eT5xjwn8VX7UNdSx 1100w, https://miro.medium.com/v2/resize:fit:960/0*eT5xjwn8VX7UNdSx 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*eT5xjwn8VX7UNdSx" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">72.) Free All Platforms</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/X5WVZ0NMaTg"><strong><u>How to Download (wget) Models from CivitAI & Hugging Face (HF) & upload into HF including privates</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*fg59JPcowqDT9jDm 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*fg59JPcowqDT9jDm 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*fg59JPcowqDT9jDm 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*fg59JPcowqDT9jDm 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*fg59JPcowqDT9jDm 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*fg59JPcowqDT9jDm 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*fg59JPcowqDT9jDm 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*fg59JPcowqDT9jDm 640w, https://miro.medium.com/v2/resize:fit:720/0*fg59JPcowqDT9jDm 720w, https://miro.medium.com/v2/resize:fit:750/0*fg59JPcowqDT9jDm 750w, https://miro.medium.com/v2/resize:fit:786/0*fg59JPcowqDT9jDm 786w, https://miro.medium.com/v2/resize:fit:828/0*fg59JPcowqDT9jDm 828w, https://miro.medium.com/v2/resize:fit:1100/0*fg59JPcowqDT9jDm 1100w, https://miro.medium.com/v2/resize:fit:960/0*fg59JPcowqDT9jDm 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*fg59JPcowqDT9jDm" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">73.) Free All Platforms</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/TNR2HZRw74E"><strong><u>Testing Stable Diffusion Inference Performance with Latest NVIDIA Driver including TensorRT ONNX</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*H5vd6vyu_d7tAXF7 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*H5vd6vyu_d7tAXF7 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*H5vd6vyu_d7tAXF7 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*H5vd6vyu_d7tAXF7 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*H5vd6vyu_d7tAXF7 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*H5vd6vyu_d7tAXF7 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*H5vd6vyu_d7tAXF7 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*H5vd6vyu_d7tAXF7 640w, https://miro.medium.com/v2/resize:fit:720/0*H5vd6vyu_d7tAXF7 720w, https://miro.medium.com/v2/resize:fit:750/0*H5vd6vyu_d7tAXF7 750w, https://miro.medium.com/v2/resize:fit:786/0*H5vd6vyu_d7tAXF7 786w, https://miro.medium.com/v2/resize:fit:828/0*H5vd6vyu_d7tAXF7 828w, https://miro.medium.com/v2/resize:fit:1100/0*H5vd6vyu_d7tAXF7 1100w, https://miro.medium.com/v2/resize:fit:960/0*H5vd6vyu_d7tAXF7 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*H5vd6vyu_d7tAXF7" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">74.) Free — Local — PC</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/RdWKOUlenaY"><strong><u>Mind-Blowing Deepfake Tutorial: Turn Anyone into Your Fav Movie Star! Better than Roop & Face Fusion</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*KvUsKthIIKzZp5ml 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*KvUsKthIIKzZp5ml 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*KvUsKthIIKzZp5ml 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*KvUsKthIIKzZp5ml 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*KvUsKthIIKzZp5ml 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*KvUsKthIIKzZp5ml 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*KvUsKthIIKzZp5ml 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*KvUsKthIIKzZp5ml 640w, https://miro.medium.com/v2/resize:fit:720/0*KvUsKthIIKzZp5ml 720w, https://miro.medium.com/v2/resize:fit:750/0*KvUsKthIIKzZp5ml 750w, https://miro.medium.com/v2/resize:fit:786/0*KvUsKthIIKzZp5ml 786w, https://miro.medium.com/v2/resize:fit:828/0*KvUsKthIIKzZp5ml 828w, https://miro.medium.com/v2/resize:fit:1100/0*KvUsKthIIKzZp5ml 1100w, https://miro.medium.com/v2/resize:fit:960/0*KvUsKthIIKzZp5ml 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*KvUsKthIIKzZp5ml" alt="" width="480" height="270">
</picture>
</p>
<p style="margin-left:0px;">75.) Massed Compute (Cloud)</p>
<h3 style="margin-left:0px;"><a target="_blank" href="https://youtu.be/HLWLSszHwEc"><strong><u>Best Deepfake Open Source App ROPE — So Easy To Use Full HD Feceswap DeepFace, No GPU Required Cloud</u></strong></a></h3>
<p style="margin-left:auto;">
<picture>
<source srcset="https://miro.medium.com/v2/resize:fit:640/format:webp/0*YdeQZzAKSiYTa3jE 640w, https://miro.medium.com/v2/resize:fit:720/format:webp/0*YdeQZzAKSiYTa3jE 720w, https://miro.medium.com/v2/resize:fit:750/format:webp/0*YdeQZzAKSiYTa3jE 750w, https://miro.medium.com/v2/resize:fit:786/format:webp/0*YdeQZzAKSiYTa3jE 786w, https://miro.medium.com/v2/resize:fit:828/format:webp/0*YdeQZzAKSiYTa3jE 828w, https://miro.medium.com/v2/resize:fit:1100/format:webp/0*YdeQZzAKSiYTa3jE 1100w, https://miro.medium.com/v2/resize:fit:960/format:webp/0*YdeQZzAKSiYTa3jE 960w" type="image/webp" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px">
<source srcset="https://miro.medium.com/v2/resize:fit:640/0*YdeQZzAKSiYTa3jE 640w, https://miro.medium.com/v2/resize:fit:720/0*YdeQZzAKSiYTa3jE 720w, https://miro.medium.com/v2/resize:fit:750/0*YdeQZzAKSiYTa3jE 750w, https://miro.medium.com/v2/resize:fit:786/0*YdeQZzAKSiYTa3jE 786w, https://miro.medium.com/v2/resize:fit:828/0*YdeQZzAKSiYTa3jE 828w, https://miro.medium.com/v2/resize:fit:1100/0*YdeQZzAKSiYTa3jE 1100w, https://miro.medium.com/v2/resize:fit:960/0*YdeQZzAKSiYTa3jE 960w" sizes="(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 480px"><img class="image_resized" style="height:auto;width:480px;" src="https://miro.medium.com/v2/resize:fit:900/0*YdeQZzAKSiYTa3jE" alt="" width="480" height="270">
</picture>
</p> | furkangozukara |
1,875,650 | When You Feel Like You Don’t Know Anything | Hello, everyone! This is my first blog post here, and I'd like to start off on a more philosophical... | 0 | 2024-06-03T16:09:01 | https://dev.to/miguelx/when-you-feel-like-you-dont-know-anything-10p9 | Hello, everyone! This is my first blog post here, and I'd like to start off on a more philosophical note.
First of all, I have a confession to make: I don't consider myself good at programming. What I'm going to say next might confuse you, though. I've been programming since the age of 13, and I hold a degree in computer science. In my free time, I like solving competitive programming problems and occasionally building personal projects. Oh, and I almost left out the most important part: I've also worked for two big tech companies over the past three years.
Well then, why do I think I'm inferior? Look, it's very simple. Even though I've listed a lot of things, I've never been truly good at any of them, and there's evidence that supports this, be it my average performance in programming contests or the struggles I've had at university and at my job. Anyway, I don't want to stay mediocre forever, which is why I decided to embark on a learning quest, and to make the whole process more interesting, I'll document my progress in this blog.
## What to focus on?
Over the years, I realized that programming is a much bigger field than one might think in the beginning. See, it's not just about writing code. For one thing, you have to be good at spotting patterns and logical thinking to come up with optimal solutions; for another, you should have a solid understanding of at least one programming language and its framework. There're also other less obvious factors, like the ability to write a clean code.
Of course, all of it comes with practice. But what exactly should you practice to improve each skill? How'd you get better at logical thinking, for example? And is it really necessary to learn algorithms and data structures, aka do LeetCode, if you're already employed? Well, I've been swimming in a sea of these questions for a while now, but I believe I've found some answers. However, first we should ask ourselves the most important question of all: why do programming anyway?
## Is it worth it?
Let's face it. I'm pretty sure that around 20 years ago no one would have even considered a programming career for life. It was just too new, too vague, and to the majority of people, programming felt more like magic. However, with the advent of new technology, it became clear that working for a big tech company could be the most lucrative career of all! The best thing is you didn't have to live a hermit lifestyle in order to succeed: work schedules became flexible, managers more lenient, and the whole process became more relaxed compared to the tech jobs in the 20th century.
Unfortunately, all good things come to an end, and the programming industry boom is no exception. It's no secret that big tech companies have been laying off their staff for nearly two years at this point. Nowadays, people are getting more and more uncertain about whether they should even get a CS degree or opt for something completely different. Things got even hazier with all these breaking AI news, appearing almost every week in our feeds. What if big tech companies started creating separate repositories for AI-based developers only? Why would we need any programmers then?
Let's slow down a bit. Personally, I don't think that AI will start writing code from A to Z in the foreseeable future, simply because there'd be one huge piece missing: human interaction. You see, working on a large project in a big tech company isn't even so much about your hard skills as it is about your ability to collaborate with others and translate the requirements sent to you by your supervisor into those that will meet the needs of the end user. In order to do that, you often have to communicate with half a dozen people before you actually ship the new feature. But are we sure AI can communicate just as well with one another? And even if they could, would we, the end users, be satisfied with their work?
The point is, I'm pretty certain that the programming industry isn't going to just disappear in the near future. The massive layoffs will eventually come to a halt, since the world doesn't stay in place, and there's new technology coming out every month or so. Remember the time when smartphones came around in 2007? Just think about how many new jobs it brought, and I'm pretty sure another similar revolution is not too far off.
So, even if you're just a student who's learning how to code, I believe that the effort you're putting in is not in vain. If you're the kind of person who'd spend their free time exploring new programming languages, participating in contests, and trying to get hands-on experience by working on bigger projects, then it's clear that you're truly passionate about what you do. In this case, a programmer's career is right up your alley.
## Stay put…
All right then, say you've been working for a big company for several years and gained lots of hands-on experience. You've gotten several promotions and you're basically basking in the sun at this point, but suddenly… the company goes out of business, you get laid off. And just like that, you're back to square one. You find your outdated resume and begin practicing long-forgotten LeetCode problems, cursing the whole interviewing system.
You see what I'm getting at? You can be a top developer on your team, completely fluent in the ecosystem of your company and knowing every nook and cranny of the project you've been working on for so long, but to the outside world, you're no different. Once you quit your company, you basically have to start all over again: writing a CV, sending countless applications, interview prepping, and finally immersing yourself in the company's infrastructure and your new project. No wonder not too many people are willing to change their jobs very often.
And it's okay! I mean, it's all right to work for the same company for years if you feel like it. I've had several supervisors who've been working with their teams for over 10 years, and they loved their jobs. Besides, even if you do decide to change your team, the process of rotation is much easier within the same company. For me, it involved no LeetCode questions, for example, and I mostly talked about my past experience.
## …or move on?
Still, I just can't bear the idea of working in the same place forever. Perhaps one of the biggest push factors for me is that I want to move to another country, and my only viable option is to find a job abroad. Besides, I've always been a keen learner and strived to improve lots of skills, English being one of them. Apparently, settling down simply isn't my way, and I'll continue learning and improving outside my working hours.
For now, I'd like you to join me on my riveting programming journey. With time, I'll address all the questions I posed at the beginning of this article and show you what the actual process of learning feels like to someone who's been programming since childhood.
| miguelx | |
1,875,757 | Create a Tarot View App with the Gemini API in just 15 minutes?. | Discover "What applications can you make with GeminiAPI?" while engaging with Gemini, a comprehensive... | 0 | 2024-06-06T09:28:54 | https://bunhere.medium.com/6ac685e39cab | tarot, nextjs, buildwithai, geminiapi | ---
title: Create a Tarot View App with the Gemini API in just 15 minutes?.
published: true
date: 2024-06-03 16:05:21 UTC
tags: tarot,nextjs,buildwithai,geminiapi
canonical_url: https://bunhere.medium.com/6ac685e39cab
---
Discover "What applications can you make with GeminiAPI?" while engaging with Gemini, a comprehensive language model for Google AI. Here is a demonstration of how to build a Tarot reading app with the help of the Gemini API, including how to send a request through a prompt and get the results.

> _Author:_ [_bunhere.com_](https://bunhere.com)
> I am always looking for feedback on my writing, so please let me know what you think._ ❤️_ | bunhere |
1,875,649 | Day 9 of my progress as a vue dev | About today Today was a little more progressive than yesterday and it made me realize how much... | 0 | 2024-06-03T16:03:40 | https://dev.to/zain725342/day-9-of-my-progress-as-a-vue-dev-3oco | webdev, vue, typescript, tailwindcss | **About today**
Today was a little more progressive than yesterday and it made me realize how much crippling being addicted to something is even if it is something as simple as a web series. To us it's just couple of hours of entertainment but really it's just overloading your mind with something poisonous which is taking place of something important that could have been there. I did work on my job project as well as the DSA visualizer but not as efficiently as I wanted to.
I did started to work on the tree structure and I believe I will be find a good solution on how to visualize it.
**What's next?**
My current aim is to get disciplined and start giving more hours to my projects and work and learning new stuff while resisting the urge to relax or to be entertained every 20 minutes. I believe if I get that right I will eventually get better at polishing my other skills.
**Improvements required**
Most improvement is I need right now is with my self control to not just let me self go and resist myself from overdoing things for a long amount of time, no matter what it is. Trust me it's still about progressing as a developer.
Wish me luck! | zain725342 |
1,875,646 | Introducing "Speed" | Recently, I decided to get back to OCaml, a very powerful functional language that has also received... | 27,578 | 2024-06-03T15:58:05 | https://dev.to/stroiman/introducing-speed-2ofk | ocaml, tdd, testing | Recently, I decided to get back to OCaml, a very powerful functional language that has also received some great additions since the last version I used.
My approach to development is almost always to practice TDD; not so much because of the testing part; but because this sets up a fast feedback loop, allowing me to work effectively with code. I looked into the choices of available test tools; and I wasn't really happy with any of them. They all seem to have a strong emphasis on the "test" part of it; rather the efficiency gained from a fast feedback loop.
So I decided to write my own, and I am now ready to present it to the world: [Speed](https://github.com/stroiman/opam-speed).
This is still very early acces, and things can change; but I invite everyone interested in TDD and OCaml to check it out.
## The name
I has been looking a bit into another test library, Alcotest, and for some weird reason, I made an association to amphetamine; mostly known for its illegal recreational use; but also used as a drug for the treatment for ADHD. A nickname for amphetamine is _speed_.
Because the process of test-driven development makes me a more efficient programmer, I found the name to be fitting.
## Features
Current features of speed include:
- Structured test suites with nested contexts
- Friendly DSL for building tests decoupled from the internal data structure
- Support for custom setup (though I am searching for a prettier syntax in the DSL)
- Metadata in a child context can be used in setup in a parent context.
- Support for synchronous tests and asynchronous tests using [[Lwt]]
- Technically; they are currently two separate suites; but the execution of both is transparent.
- Assertions library with potential for nice output
- Composable assertions (e.g. `Ok 42 |> should @@ be_ok >=> equal_int 42`)
- A few PPX rewriters to help with some trivial code
- Test focus (the ability to only run a subset of the tests when working on a new feature)
The following features are planned, but not implemented:
- Customisation of test output (ability to plug in your own reporting module)
- Teardown/cleanup hooks
- Ability to fail on the presence of focused tests (important for CI servers)
- Better messages for assertions, particularly when assertions are composed into larger assertions.
- Multicore support
- Mixing Lwt/Async/Sync code in the same suite.
This is generally developed in parallel with a pet project; and features are added to Speed as I need them. E.g. you can expect to see teardown support added once I start making integration tests of message publishing.
## How It Looks
There are two different DSLs, one based on lists, and one based on effect handlers.
## List Based DSL
This constructs the tests using lists of objects.
```OCaml
open Speed.Dsl
let suite = parse [
context "Feature" [
test "Some behaviour" (fun _ -> (* ...*) ());
test "Something else" (fun _ -> ());
context "Child context" [
test "More stuff" (fun _ -> ())
]
]
]
```
This has some very powerful properties. As your tests are lists, you can use `List` functions to generate tests e.g. from data.
```OCaml
context "Email validation" @
["jd@example.com", true;
"jd@example", false;
"@example.com", false]
|> List.map ~f(fun (email, expected) ->
test (Format.sprintf "Email %s is valid: %b" email expected) (fun ->
expect (Email.is_valid email) @@ equal_bool expected
)
)
```
By treating test as data, you have all the power of the data manipulation functions available in OCaml. This also allows you to compose larger test suites from smaller components. E.g. do if you have multiple things that should share the same behaviour, that specification could be reused between the suites.
## Effect Based DSL
There is an alternate DSL based OCaml 5 effect handlers. Effect handlers are still treated as experimental in OCaml, so this should probably be avoided ... unless there is a significant benefit. That benefit is _readability_.
Although the list based approach is powerful in when creating test suites; it isn't always easy to read. I've experimented a lot with setting up `ocamlformat`, but I never quite liked the output. Each individual test never really stand out, partly because `ocamlformat` remove blanks lines.
When using the effect handler DSL, tests are expressed as function calls. This allows for a syntax more like that of similar tools in other languages, e.g. RSpec from Ruby (which is a direct inspiration for the metadata feature), and tools like Mocha, Jasmine, and Jest in JavaScript.
But more importantly, `ocamlformat` can be configured to preserve a blank line between tests, providing much better visual separation in the test code.
```OCaml
open Speed.Dsl.Effect.Simple
let suite = root_context "Some feature" (fun _ ->
describe "in some context" (fun _ ->
test "Behaviour 1" (fun _ ->
()
);
test "Behaviour 2" (fun _ ->
()
);
);
describe "In another context" (fun _ ->
test "Behavior 3" (fun _ -> ());
);
)
```
## Assertions
The library contains a module for writing assertions. Eventually; I will probably extract that to it's own library, as I believe that the test runner and verification are two different problems; the only relation between the two is that failed verifications must in some way be communicated back to the test runner.
But right now, for the purpose of faster development, they are placed in the same library.
### Expectations
An "expectation" is right now simple function that _can verify a value_. An expectation that can verify an int value equals 42 can be created like this:
```OCaml
let expectation = equal_int 42
```
Two functions `expect` and `should` can verify the actual value matches an expectation, the only difference between them is the order in which they receive the arguments:
```OCaml
expect "foo" (equal_string "foo");
"foo" |> should (equal_string "foo");
(* or *)
expect "foo" @@ equal_string "foo";
"foo" |> should @@ equal_string "foo";
```
In both cases, an optional `~name` can be added, that will be written to the output:
```OCaml
expect ~name:"HTTP Status" status @@ equal_int 200;
status |> should ~name:"HTTP Status" @@ equal_int 200;
```
![[Pasted image 20240517150848.png]]
A successful expectation can return a new value, allowing you to compose matchers. E.g. the `be_ok` that verifies that an `('a,'b) result` has the value `Ok x`, will pass the actual `x` along. Expectations can be composed using the fish operator (`>=>`).
```OCaml
let be_ok_equal_42 = be_ok >=> equal_int 42 in
Ok 42 |> should be_ok_equal_42; (* Success *)
Ok 43 |> should be_ok_equal_42; (* Error *)
Error () |> should be_ok_equal_42; (* Error *)
```
### Writing custom expectations
The expectation is _currently_ just a function that takes the actual value as input and returns a `result`.
```OCaml
(* note, this type is actually not defined in code, this is the type inferred from expect/should *)
type expectation = 'a -> ( 'b, [> `AssertionErrorWithFormat of Format.formatter -> unit ]) result
```
The `Error` value carries a polymorphic variant. The special `AssertionErrorWithFormat` carries a function that can write a nice error message, in the previous example, the "expected"/"actual" messages originates from the assertion error (as well as the output colouring). The `should` / `expect` functions are responsible for adding the "Assertion error" along with the name if specified; and test runner / reporter will make this integrate in the test output where appropriate.
But as these are polymorphic variants; you can really return any polymorphic variant value you like; but they will not be formatted nicely with the current reporter if you don't use `AssertionErrorWithFormat`.
NOTE: I expect to change the type of an expectation in order support better error messages when composing expectations. But I will write that in a new module; keeping the existing module unchanged for a reasonable amount of time; as to not break existing code.
### Record matcher ppx_deriver
My philosophy is that a test should only contain details related to the behaviour the test describes. When verifying a record type, you should just verify the properties relevant to the behaviour described by the test.
There is a ppx deriver that can help with this just that. When with `ppx_import`, you can generate matcher functions for record types with optional parameters for each field.
Let's say you have this in your production code:
```OCaml
(* /lib/user.ml *)
type user = {
first_name: string;
last_name: string;
email: string
}
```
You could easily have different tests for verifying different parts of a `user`.
```OCaml
(* /test/user_test.ml *)
open Speed.Dsl.Effect.Simple
[%import: Account.user] [@@deriving matcher]
root_context "user" (fun _ ->
test "Has right email" (fun _ ->
create_user ()
|> should @@ match_user ~email:equal_string "jd@example.com"
);
test "Has right name" (fun _ ->
create_user ()
|> should @@ match_user ~first_name:equal_string "John" ~last_name:equal_string "Doe"
)
)
```
NOTE: In the dune file, you need to use `staged_pps` instead of `pps` for the `ppx_import`/`speed.ppx_matcher` combination to work.
## General setup and shared data
In a child group, you can attach a _setup_ function. The return value of that function will be made available to the tests inside that scope. Metadata is specified using the extensible variant, `Speed.metadata`.
### Fixtures
The fixture allows you to add value that will be made available to the test in the scope. Nested scopes also have acces to this, and can create a new value (of a different type)
```OCaml
open Speed.Dsl.Effect
s.fixture ~setup:(fun x -> 42) "Value is an int"
(fun s ->
s.test "Test 42" (fun x -> x.subject |> should @@ equal_int 42);
s.fixture ~setup:(fun x -> Int.to_string x.subject) "Value is a string"
(fun s ->
s.test "Test '42'" (fun x -> x.subject |> should @@ equal_string "42")
)
)
```
NOTE: The previous examples used the `Speed.Dsl.Effect.Simple` which does not need the `s` value in the nested test builder functions. But that version is incapable of carrying type information from the setup to the tests. So when fixtures are needed, a slightly more verbose syntax is required.
### Metadata
The setup can receive metadata specified on the test, allowing you to have common setup code; while each test specifies the specific scenario. Without any helpers, reading the metadata requires a bit of cumbersome pattern matching.
```OCaml
(* Define metadata by extending the metadata type *)
type Speed.Domain.metadata += Username of string
(* The setup function receives a record `{ metadata: Domain.metadata list; ... }` *)
fixture ~setup:(fun x ->
(* To get the metadata, we have to search the list for the precense of a UserName
constructor. As it's not guaranteed that one exist, the result is a
`string option` rather than a `string` *)
let username =
x.metadata
|> List.find_map function | UserName x -> Some x | None -> None in
...
)
```
To simplify this task, Speed contains a ppx rewriter that can generate that code for you:
```OCaml
fixture ~setup:(fun x ->
let username = x.metadata |> [%m Username] in
...
);
(* Or the simpler version that performs get_metadata behind the scenes *)
fixture ~setup:(fun x ->
let username = x |> [%mx Username] in (* [%mx looks up x.metadata field itself ] *)
...
)
```
Like before, the returned value is here `string option`, but you can supply a default value to get a `string`:
```OCaml
fixture ~setup:(fun x ->
let username = x.metadata |> [%m Username "missing"] in
(* username inferred to be: string *)
...
);
fixture ~setup:(fun x ->
let username = x |> [%mx Username "missing"] in
...
)
```
To use that, add the `speed.ppx_metadata` to your `dune` file
```dune
(test
(preprocess (pps speed.ppx_metadata ...))
```
### A larger example
This example shows the type of scenario that these features were intended to support. An application, using the Dream HTTP framework handles the route `POST /registration`. In this test, the application logic has been replaced with a test double that accepts one hardcoded email address, and reports another as a duplicate.
So the general setup creates the request and the nested contexts define the different request bodies for the two cases handled by the mocked domain logic; AND two cases that should be handled by the HTTP layer's request validation. In each group, there are separate specification for the generated body, as well as the response status.
NOTE: At the time of writing this, `Lwt` promises are not handled in setup code, which results in the subject being a `response promise` instead of a `response`; thus the liberal use infix operators. This should be handled by Speed, eliminating the excessive use of custom operators
```OCaml
type Speed.Domain.metadata += Body of string;;
root_context "POST /registration" (fun s ->
s.setup
(fun x ->
let body = x |> [%mx Body ""] in
Dream.request ~method_:`POST ~target:"/registration"
~headers:["content-type", "application/x-www-form-urlencoded"]
body
|> handle_request
)
(fun s ->
s.context ~metadata:[Body "email=john.doe%40example.com"] "Email is valid" (fun s ->
s.test "Should generate a status 200" (fun { subject; _ } ->
let+ status = subject >|= Dream.status >|= Dream.status_to_int in
status |> should @@ equal_int 200
);
s.test "Should return a 'please check your email' reply" (fun { subject; _ } ->
let+ body = subject >>= Dream.body in
body |> should @@ contain "Please check your email"
)
);
s.context ~metadata:[Body "email=jane.doe%40example.com"] "Email is a duplicate"
(fun s ->
s.test "Should generate a status 200" (fun { subject; _ } ->
let+ status = subject >|= Dream.status >|= Dream.status_to_int in
status |> should @@ equal_int 200
);
s.test "Should return a 'please check your email' reply" (fun { subject; _ } ->
let+ body = subject >>= Dream.body in
body |> should @@ contain "duplicate"
)
);
s.context ~metadata:[Body "email=invalid"] "Email is not a valid email" (fun s ->
(* ... *)
);
s.context ~metadata:[Body "bad_name=jd%40example.com"] "Body does not contain an email" (fun s ->
(* ... *)
)
)
)
```
This doesn't read as well as I would like, and at the time of reading this; I am contemplating which language features can be used to make this read better; or if I possibly need another ppx rewriter.
An alternate syntax is using the `with_metadata` function, but ocamlformat _may_ still squash it all into one line.
```ocaml
with_metadata [Body "bad_name=jd%40example.com"] s.context "Body does not contain an email" (fun s ->
(* ... *)
)
```
## Can I use this now?
Yes you can! (with OCaml 5)
At the time of writing this, the best option is to get the sources and build directly.
```sh
> git clone https://github.com/stroiman/opam-speed.git
> cd speed
> opam install . --deps-only
> make install
```
It is published to the official opam repository, but release of new packages involve a manual approval flow; which takes time; which again makes me not create releases frequently.
I don't commit non-working changes to master (but I am human, not an LLM, so I might make mistakes)
Remember, this will pin the package to the local path, so be sure to `opam unpin speed` if you later want to use the distributed package instead.
Be aware that this is still a very early, and may not follow standard OCaml practices, e.g. interfaces are not defined for the modules, thus not hiding the parts intended for internal use. Documentation in code is virtually non-existing, only real documentation is through README files, and that is not guaranteed to be up-to-date.
The best documentation is really to read the test code ;)
Internal structures may change, but I do intend to keep the essential modules stable, That means that the different DSLs, the test root test runner, and the assertions module. Whenever possible, breaking changes will be developed in a new module, in order to not break existing usages.
E.g. when the fixture feature was added, the effect handler based DSL needed a significant rewrite, but also a breaking change as the original version was incapable of carrying the type information from the fixture to child suites and tests. This was originally called `Effect_dsl_2`, letting all the old code still work without modifications. I have since renamed the modules, but both modules still exist; as the original is a bit less verbose.
## Can I help?
If you find this valuable, and have ideas how to improve this, please reach out :)
Also, I am not the most experienced OCaml programmer. Am I missing some idiomatic OCaml patterns? or are there bad OCaml practices | stroiman |
1,874,948 | Understanding Closures in JavaScript | Table of Contents What's a closure Why are they needed Encapsulation & State... | 0 | 2024-06-03T15:55:58 | https://dev.to/dev_diaries_by_varun/closures-in-javascript-what-they-are-and-why-they-matter-o6 | webdev, javascript, programming, beginners | ## Table of Contents
[What's a closure](#chapter-1)
[Why are they needed](#chapter-2)
[Encapsulation & State Management](#chapter-3)
[Higher Order Functions](#chapter-4)
[Function Currying & Composition](#chapter-5)
[How Javascript libraries leverage closures](#chapter-6)
---
In the vast world of JavaScript, closures stand out as one of the most powerful and intriguing concepts. Whether you're a seasoned developer or just starting your coding journey, understanding closures is essential for mastering JavaScript.
In this blog post, we'll demystify closures, exploring their fundamental principles, practical applications, and why they are indispensable in modern JavaScript development.
By the end, you'll have a clear understanding of how closures work and how to leverage them to enhance your coding skills.
---
## What's a closure ? <a name="chapter-1"></a>
A closure is a fundamental concept in JavaScript (and many other programming languages) that allows a function to retain access to its lexical scope, even after the function that created the scope has finished executing.
To be honest, the definition does not give an idea about the power of closures🙈.
So what if a function can retain its lexical scope ? What's the big deal ?
Believe Me ❤️ , closures are an infinity stone in the gauntlet of functional programming 🔮
---
## Why are they needed ? <a name="chapter-2"></a>
In modern day code development, Functional Programming is highly leveraged because it has certain advantages over OOPS in certain areas.
With this change in approach, we still needed to support basic features of OOPS & clean coding.
Functional Programming has it's unique ways of implementing these features
1. Modular & Reusable Code.
2. Encapsulation & State Management.
This is exactly where closure is needed.
**💡Functional Programming is easier to understand with examples. So i'll provide lots of them.**
{% collapsible What is functional programming? %}
- For simplicity, let's say functional programming is all about thinking in terms of functions & smartly leveraging them in our code.
- Functions are treated as first class citizens. They can be declared as a variable, can be passed as arguments, can be returned from another function & much more.
{% endcollapsible %}
---
## Encapsulation & State Management <a name="chapter-3"></a>
Functional Programming has no concept of access specifiers - `public, private & protected.`
So how do we achieve encapsulation?
`Closure` is one of the ways you can achieve encapsulation.
**Use-case**
- We have a variable count & we want to allow limited operations on it - `increment, decrement, reset & get.`
- We want to prevent count from external access i.e. keep it private.
First let's see OOPS way of achieving encapsulation.
### Encapsulation using OOPS
```javascript
class Count {
private _count = 0;
function increment(){
this._count++;
}
function decrement(){
this._count--;
}
function reset(){
this._count = 0;
}
function getCount(){
return this._count;
}
}
const count = new Count();
```
### Encapsulation using Functional Programming
```javascript
function count() {
let count = 0;
return {
increment: function(){
count++;
},
decrement: function(){
count--;
},
reset: function(){
count = 0;
},
getCount: function(){
return count;
}
};
};
const fpCount = count();
```
Now does this statement ring a bell ??? Let's see...
`Closure allows a function to retain access to its lexical scope, even after the function that created the scope has finished executing`.
When we called `count()` it executed & returned us methods to play around with count variable.
But even after its execution, all handler methods remember value of count because they have access to their lexical environment.
Also using `closures` the handler functions manage the state of count variable.
This way we've achieved encapsulation & state management of count variable 😉🎉
---
## Higher Order Functions <a name="chapter-4"></a>
> A higher-order function is a function that either Takes one or more functions as arguments or Returns a function as its result.
The purpose of Higher Order Functions is to make the code modular & reusable.
Use-case
- We want to loop over an array
```javascript
// Classical way to loop over an array
const numbers = [1,2,3,4,5,6];
for(let i = 0; i < numbers.length; i++){
console.log('number ', numbers[i], ' is at index ', i);
}
// Same using functional programming
function printElementAndIndex(element, index) {
console.log('number ', element, ' is at index ', index);
}
// For any beginners reading this,
// forEach is a higher order function provided by javascript
numbers.forEach(printElementAndIndex);
```
You see `printElementAndIndex` was called for every element in numbers array.
It remembered the values of element & index passed to it at that iteration.
- Attaching event handler
```javascript
// Assuming we're attaching a click listener
// on button with id 'my-button'
const button = document.getElementById('#my-button');
const handleButtonClick = (event) => {
// handle click event here
}
// 'addEventListener' is the higher order function here
// because it accepts function as an argument
button.addEventListener('click',handleButtonClick);
```
`addEventListener` finishes its execution the moment UI is rendered.
`handleButtonClick` is a callback which executes later but it still gets access to `Event` object because of closure.
---
## Function Currying & Composition <a name="chapter-5"></a>
> Function Currying is a technique using which a function with multiple arguments is transformed into a series of functions each taking one argument.
> Function Composition is a technique using which we can combine two or more functions to create custom functions.
These techniques also help us write `Modular & Reusable code` by leveraging `Pure Functions` which is one of the fundamental advantages of using Functional Programming.
{% collapsible What are Pure Functions? %}
Functions which return consistent output provided it receives consistent input. They cause no side-effects, do not modify any external state & make code more predictable.
{% endcollapsible %}
**Use-case**
- Let's say we have to write a function which calculates bill.
The conditions are,
1. We give 10% discount if amount is greater than 1000.
2. We levy 7% service charge on total amount.
This is how we could've written it without functional programming.
```javascript
function calculateBill(amount) {
let totalAmount = amount;
if(totalAmount > 1000){
totalAmount = totalAmount - ( totalAmount * 10 / 10 );
}
return totalAmount + ( totalAmount * 7 / 100 );
}
```
Although this is a working function, it has some pitfalls.
1. Values of service charge & discount are hardcoded. In future if we have multiple discount offers depending on amount it's hard to adapt. Either too many if & else blocks or code duplication if separate function for each condition is created.
2. It's not a pure function.
Now let's write the same using `Currying` & `Composition`.
```javascript
// Function Currying
// Notice how we split into two funtions
// Each handles one argument & makes function modular & reusable
function calculateDiscount(discountPercentage, eligibleAmount){
return function(amount){
if(amount > eligibleAmount) {
return amount - ( amount * discountPercentage / 100 );
}
return amount;
}
}
function addServiceCharge(taxPercentage){
return function(amount){
return amount + ( amount * taxPercentage / 100 );
}
}
// Later on if we change discount & tax percentages,
// we can quickly adapt.
// Notice that these are pure functions.
const discountByTen = calculateDiscount(10, 1000);
const levyServiceChargeOf7 = addServiceCharge(7);
// Function Composition
// Notice how we combined existing functions to create new function
const composeBillCalculator = (levyServiceCharge, applyDiscount)
=> amount => levyServiceCharge(applyDiscount(amount));
// Currently we have,
// 1] 10% discount
// 2] 7% service charge
const calculateBill =
composeBillCalculator(levyServiceChargeOf7, discountByTen);
export { calculateBill };
```
---
## How Javascript libraries leverage closures <a name="chapter-6"></a>
### React
[React](https://react.dev/), a popular frontend javascript library leverages closures to manage state of the component.
Also it has a concept of [Hooks](https://react.dev/reference/react/hooks) which entirely based on closures.
```javascript
import React, { useState, useEffect } from 'react';
function Timer() {
// useState leverages closure internally.
// setSeconds is a setter to update state.
// seconds acts like a getter.
const [seconds, setSeconds] = useState(0);
useEffect(() => {
const interval = setInterval(() => {
setSeconds(prevSeconds => prevSeconds + 1);
}, 1000);
return () => clearInterval(interval); // Cleanup
}, []); // Empty dependency array to run once
return <div>{seconds} seconds have passed.</div>;
}
```
### Nodejs
[Nodejs](https://nodejs.org/en), a popular backend javascript runtime, leverages closures when managing asynchronous execution via callbacks.
**Use-case**
- File read operation
```javascript
const fs = require('fs');
function readFile(filePath) {
fs.readFile(filePath, 'utf8', (err, data) => {
if (err) {
console.error('Error reading file:', err);
return;
}
console.log('File contents:', data);
});
}
readFile('example.txt');
```
The `callback` function inside `fs.readFile` forms a closure that retains access to `filePath` and any other outer variables.
This closure ensures the callback can use these variables even after the asynchronous file read operation completes.
[ExpressJs](https://expressjs.com/) is a popular framework for Nodejs.
It has a concept called [middlewares](https://expressjs.com/en/guide/using-middleware.html) which uses closures.
---
I hope you understood how cool the closures are 😍
Do let me know in comments if you know any other usage of closures.
Go ahead leverage them in your code with confidence 😊
Additionally, closures are a popular topic in technical interviews. With the knowledge and examples provided here, you should be well-equipped to explain and demonstrate closures with confidence during your next interview.
Thank you for reading, and happy coding!
| dev_diaries_by_varun |
1,875,647 | http://wpu.me | The website http://wpu.me appears to be related to WordPress tutorials and tips. It is designed to... | 0 | 2024-06-03T15:54:34 | https://dev.to/bebopalulasheismybaby/httpwpume-2fnc | The website [http://wpu.me](http://wpu.me) appears to be related to WordPress tutorials and tips. It is designed to assist users with basic WordPress requests, offering tutorials, tips, and tricks to enhance their WordPress skills. | bebopalulasheismybaby | |
1,875,656 | Une autre manière de faire fonctionner OpenStack au-dessus de Kubernetes avec Atmosphere … | Plusieurs projets de déploiement d’OpenStack qui reposent sur un cluster Kubernetes existent à... | 0 | 2024-06-03T16:18:41 | https://deep75.medium.com/une-autre-mani%C3%A8re-de-faire-fonctionner-openstack-au-dessus-de-kubernetes-avec-atmosphere-9ac8c46b4232 | kubernetes, openstack, docker, phoenixnap | ---
title: Une autre manière de faire fonctionner OpenStack au-dessus de Kubernetes avec Atmosphere …
published: true
date: 2024-06-03 15:53:30 UTC
tags: kubernetes,openstack,docker,phoenixnap
canonical_url: https://deep75.medium.com/une-autre-mani%C3%A8re-de-faire-fonctionner-openstack-au-dessus-de-kubernetes-avec-atmosphere-9ac8c46b4232
---

Plusieurs projets de déploiement d’OpenStack qui reposent sur un cluster Kubernetes existent à commencer par OpenStack Helm :
- [Openstack-helm](https://wiki.openstack.org/wiki/Openstack-helm)
- [GitHub - openstack/openstack-helm: Helm charts for deploying OpenStack on Kubernetes. Mirror of code maintained at opendev.org.](https://github.com/openstack/openstack-helm)
> Mais c’est aussi le cas du projet open source Atmosphere du fournisseur Cloud Vexxhost qui fournit un large éventail de fonctionnalités d’infrastructure, notamment des machines virtuelles, Kubernetes, du bare metal, du stockage en bloc et en objet, des équilibreurs de charge en tant que service, et plus encore …
[Atmosphere deployment tool | VEXXHOST](https://vexxhost.com/platform/)
Atmosphere fait tourner OpenStack au-dessus de Kubernetes. Cette configuration permet des déploiements, des mises à niveau et des contrôles de santé simples et facile.
[VEXXHOST Launches Atmosphere, a New Open Source, OpenStack Deployment Tool](https://vexxhost.com/company/newsroom/vexxhost-launches-atmosphere-a-new-open-source-openstack-deployment-tool/)
{% youtube wHrTGBdqmmI %}
[GitHub - vexxhost/atmosphere: Simple & easy private cloud platform featuring VMs, Kubernetes & bare-metal](https://github.com/vexxhost/atmosphere)
Je vais simplement suivre le modus operandi proposé par Vexxhost pour un serveur Bare Metal :

- [Quick Start - Atmosphere 1.10.4.post231.dev0+f2e3b279 documentation](https://vexxhost.github.io/atmosphere/quick-start.html)
- [OpenStack sur LXD avec Juju et k3sup dans phoenixNAP …](https://deep75.medium.com/openstack-sur-lxd-avec-juju-et-k3sup-dans-phoenixnap-e5867a487497)
- [“OpenStack on LXD” et “k0s” dans un serveur Bare Metal ARM 64 Bits d’AWS …](https://dev.to/deep75/openstack-on-lxd-et-k0s-dans-un-serveur-bare-metal-arm-64-bits-d-aws-5hce)
- [Créer simplement un cluster k8s dans PhoenixNAP avec Rancher en quelques clics ...](https://dev.to/deep75/creer-simplement-un-cluster-k8s-dans-phoenixnap-avec-rancher-en-quelques-clics--3d6i)
Pour cela je pars d’un serveur dans PhoenixNAP sous Ubuntu 22.04 LTS :



Mise à jour de ce dernier et installation des paquets nécessaires au lancement du déploiement d’Atmosphere :
```bash
ubuntu@atmosphere:~$ sudo apt-get update && sudo apt-get install git python3-pip -y && sudo pip install poetry
ubuntu@atmosphere:~$ git clone https://github.com/vexxhost/atmosphere.git
Cloning into 'atmosphere'...
remote: Enumerating objects: 25111, done.
remote: Counting objects: 100% (825/825), done.
remote: Compressing objects: 100% (398/398), done.
remote: Total 25111 (delta 377), reused 704 (delta 306), pack-reused 24286
Receiving objects: 100% (25111/25111), 10.78 MiB | 50.17 MiB/s, done.
Resolving deltas: 100% (14299/14299), done.
ubuntu@atmosphere:~$ cd atmosphere/
ubuntu@atmosphere:~/atmosphere$ ls
CHANGELOG.md Jenkinsfile build doc galaxy.yml hack meta playbooks pyproject.toml test-requirements.txt tox.ini
Dockerfile README.md charts flake.lock go.mod images mkdocs.yml plugins release-please-config.json tests zuul.d
Earthfile atmosphere cmd flake.nix go.sum internal molecule poetry.lock roles tools
ubuntu@atmosphere:~/atmosphere$ sudo poetry install --with dev
Creating virtualenv atmosphere-NEvTTHEY-py3.10 in /root/.cache/pypoetry/virtualenvs
Installing dependencies from lock file
Package operations: 89 installs, 0 updates, 0 removals
- Installing attrs (23.2.0)
- Installing pycparser (2.22)
- Installing rpds-py (0.18.0)
- Installing cffi (1.16.0)
- Installing markupsafe (2.1.5)
- Installing mdurl (0.1.2)
- Installing referencing (0.35.0)
- Installing cryptography (42.0.5)
- Installing jinja2 (3.1.3)
- Installing jsonschema-specifications (2023.12.1)
- Installing markdown-it-py (3.0.0)
- Installing packaging (24.0)
- Installing pbr (6.0.0)
- Installing pygments (2.17.2)
- Installing pyyaml (6.0.1)
- Installing resolvelib (1.0.1)
- Installing wrapt (1.16.0)
- Installing ansible-core (2.16.6)
- Installing bracex (2.4)
- Installing certifi (2024.2.2)
- Installing charset-normalizer (3.3.2)
- Installing click (8.1.7)
- Installing debtcollector (3.0.0)
- Installing idna (3.7)
- Installing iso8601 (2.1.0)
- Installing jsonschema (4.21.1)
- Installing netaddr (0.8.0)
- Installing netifaces (0.11.0)
- Installing oslo-i18n (6.3.0)
- Installing pyparsing (3.1.2)
- Installing rich (13.7.1)
- Installing subprocess-tee (0.4.1)
- Installing tzdata (2024.1)
- Installing urllib3 (2.2.1)
- Installing ansible-compat (4.1.11)
- Installing click-help-colors (0.9.4)
- Installing decorator (5.1.1)
- Installing distro (1.9.0)
- Installing enrich (1.2.7)
- Installing exceptiongroup (1.2.1)
- Installing iniconfig (2.0.0)
- Installing jsonpointer (2.4)
- Installing mccabe (0.7.0)
- Installing msgpack (1.0.8)
- Installing os-service-types (1.7.0)
- Installing oslo-utils (7.1.0)
- Installing pluggy (1.5.0)
- Installing pycodestyle (2.9.1)
- Installing pyflakes (2.5.0)
- Installing requests (2.31.0)
- Installing rfc3986 (2.0.0)
- Installing six (1.16.0)
- Installing stevedore (5.2.0)
- Installing tomli (2.0.1)
- Installing typing-extensions (4.11.0)
- Installing wcmatch (8.5.1)
- Installing appdirs (1.4.4)
- Installing coverage (7.5.0)
- Installing docker (7.0.0)
- Installing dogpile-cache (1.3.2)
- Installing execnet (2.1.1)
- Installing flake8 (5.0.4)
- Installing isort (5.13.2)
- Installing jmespath (1.0.1)
- Installing jsonpatch (1.33)
- Installing keystoneauth1 (5.6.0)
- Installing molecule (6.0.3)
- Installing munch (4.0.0)
- Installing oslo-config (9.4.0)
- Installing oslo-context (5.5.0)
- Installing oslo-serialization (5.4.0)
- Installing py (1.11.0)
- Installing pyinotify (0.9.6)
- Installing pytest (7.4.4)
- Installing python-dateutil (2.9.0.post0)
- Installing regex (2024.4.28)
- Installing requestsexceptions (1.4.0)
- Installing selinux (0.3.0)
- Installing docker-image-py (0.1.12)
- Installing flake8-isort (4.2.0)
- Installing molecule-plugins (23.5.3)
- Installing openstacksdk (0.62.0)
- Installing oslo-log (5.5.1)
- Installing pytest-cov (3.0.0)
- Installing pytest-forked (1.6.0)
- Installing pytest-mock (3.14.0)
- Installing pytest-xdist (3.6.1)
- Installing rjsonnet (0.5.4)
- Installing ruyaml (0.91.0)
Installing the current project: atmosphere (1.10.4.post186.dev0+779cb921)
```
Très rapidement, je lance le déploiement qui prend un peu moins d’une heure ici :
```bash
ubuntu@atmosphere:~/atmosphere$ sudo poetry run molecule converge -s aio
INFO aio scenario test matrix: dependency, create, prepare, converge
INFO Performing prerun with role_name_check=0...
INFO Running aio > dependency
WARNING Skipping, missing the requirements file.
WARNING Skipping, missing the requirements file.
INFO Running aio > create
PLAY [Wait for user to read warning] *******************************************
TASK [Gathering Facts] *********************************************************
Monday 03 June 2024 12:02:39 +0000 (0:00:00.020) 0:00:00.020 ***********
ok: [localhost]
.
.
.
.
.
PLAY [Configure networking] ****************************************************
TASK [Gathering Facts] *********************************************************
Monday 03 June 2024 12:49:26 +0000 (0:00:00.418) 0:45:34.621 ***********
ok: [instance]
TASK [Add IP address to "br-ex"] ***********************************************
Monday 03 June 2024 12:49:28 +0000 (0:00:02.159) 0:45:36.781 ***********
ok: [instance]
TASK [Set "br-ex" interface to "up"] *******************************************
Monday 03 June 2024 12:49:28 +0000 (0:00:00.153) 0:45:36.934 ***********
ok: [instance]
PLAY RECAP *********************************************************************
instance : ok=669 changed=267 unreachable=0 failed=0 skipped=246 rescued=0 ignored=1
Monday 03 June 2024 12:49:28 +0000 (0:00:00.304) 0:45:37.239 ***********
===============================================================================
vexxhost.atmosphere.percona_xtradb_cluster : Apply Percona XtraDB cluster - 203.51s
vexxhost.atmosphere.cinder : Deploy Helm chart ------------------------ 157.84s
vexxhost.atmosphere.keycloak : Deploy Helm chart ---------------------- 156.65s
vexxhost.atmosphere.heat : Deploy Helm chart -------------------------- 120.67s
vexxhost.atmosphere.manila : Deploy Helm chart ------------------------ 104.84s
vexxhost.atmosphere.nova : Deploy Helm chart -------------------------- 100.67s
vexxhost.ceph.osd : Install OSDs --------------------------------------- 89.67s
vexxhost.atmosphere.glance : Deploy Helm chart ------------------------- 88.95s
vexxhost.atmosphere.magnum : Deploy Helm chart ------------------------- 88.06s
vexxhost.atmosphere.octavia : Deploy Helm chart ------------------------ 83.51s
vexxhost.atmosphere.keystone : Deploy Helm chart ----------------------- 80.67s
vexxhost.atmosphere.neutron : Deploy Helm chart ------------------------ 74.13s
vexxhost.atmosphere.barbican : Deploy Helm chart ----------------------- 67.48s
vexxhost.ceph.mon : Run Bootstrap coomand ------------------------------ 62.21s
vexxhost.atmosphere.placement : Deploy Helm chart ---------------------- 58.82s
vexxhost.kubernetes.cluster_api : Set node selector for Cluster API components -- 57.15s
vexxhost.atmosphere.glance_image : Download image ---------------------- 53.93s
vexxhost.atmosphere.glance_image : Check if image exists --------------- 50.38s
vexxhost.atmosphere.neutron : Create networks -------------------------- 36.62s
vexxhost.atmosphere.rabbitmq : Deploy cluster -------------------------- 35.65s
```
Le cluster est déployé et je peux vérifier les accès disponibles localement sur ce serveur physique :
```bash
root@instance:~# apt install python3-openstackclient -y
root@instance:~# source openrc
root@instance:~# openstack endpoint list
+----------------------------------+-----------+--------------+-----------------+---------+-----------+------------------------------------------------------------------------------+
| ID | Region | Service Name | Service Type | Enabled | Interface | URL |
+----------------------------------+-----------+--------------+-----------------+---------+-----------+------------------------------------------------------------------------------+
| 0584539654844f7f956088e43836ed4c | RegionOne | swift | object-store | True | public | https://object-store.131-153-200-197.nip.io/swift/v1/%(tenant_id)s |
| 069df7eb37584d91a22a95e7d36493d3 | RegionOne | manila | share | True | internal | http://manila-api.openstack.svc.cluster.local:8786/v1 |
| 08b5e9b96ddf4ce79f270f582dc6bf7b | RegionOne | manilav2 | sharev2 | True | public | https://share.131-153-200-197.nip.io/v2 |
| 0b95720b8c0e4de692acf18b769ce8be | RegionOne | heat-cfn | cloudformation | True | admin | http://heat-cfn.openstack.svc.cluster.local:8000/v1 |
| 120958efeb924a0a98bf03ce807c0ace | RegionOne | cinderv3 | volumev3 | True | internal | http://cinder-api.openstack.svc.cluster.local:8776/v3/%(tenant_id)s |
| 1427e413681e4518ac03d768bb44cb60 | RegionOne | placement | placement | True | admin | http://placement-api.openstack.svc.cluster.local:8778/ |
| 1611e222d7b8447596aa44c0965aec1a | RegionOne | cinderv3 | volumev3 | True | public | https://volume.131-153-200-197.nip.io/v3/%(tenant_id)s |
| 19047158ec1446b5b746682bc8d9dd93 | RegionOne | heat-cfn | cloudformation | True | internal | http://heat-cfn.openstack.svc.cluster.local:8000/v1 |
| 1e04bacc8aae44b3818de40e386cf68e | RegionOne | barbican | key-manager | True | admin | http://barbican-api.openstack.svc.cluster.local:9311/ |
| 27d7b0d81a104b54a3dcb8632297707f | RegionOne | keystone | identity | True | admin | http://keystone-api.openstack.svc.cluster.local:5000/ |
| 2c4218a3da784f98890bcb6ac6cb20ae | RegionOne | heat | orchestration | True | admin | http://heat-api.openstack.svc.cluster.local:8004/v1/%(project_id)s |
| 2f19518bd66c421eb6a5e25f7c93c96e | RegionOne | manila | share | True | public | http://manila.openstack.svc.cluster.local/v1 |
| 3578d37453854cfbafdc18f2be4f0a62 | RegionOne | glance | image | True | public | https://image.131-153-200-197.nip.io/ |
| 3a2e106afdbf43689676c85718319f88 | RegionOne | glance | image | True | admin | http://glance-api.openstack.svc.cluster.local:9292/ |
| 3e3240df5df847bc84c204e0b18783f1 | RegionOne | glance | image | True | internal | http://glance-api.openstack.svc.cluster.local:9292/ |
| 3f51c888203c433ea31d2ca67cf3e359 | RegionOne | manilav2 | sharev2 | True | admin | http://manila-api.openstack.svc.cluster.local:8786/v2 |
| 44f08551b541410d8bb28b3a148dca0f | RegionOne | heat | orchestration | True | internal | http://heat-api.openstack.svc.cluster.local:8004/v1/%(project_id)s |
| 6501cca34cd5401d8561522f062ec126 | RegionOne | magnum | container-infra | True | internal | http://magnum-api.openstack.svc.cluster.local:9511/v1 |
| 65c4f687017d4ff4b774a61cd670de52 | RegionOne | barbican | key-manager | True | public | https://key-manager.131-153-200-197.nip.io/ |
| 695342e32bf84ae48cc0c873227ce1ce | RegionOne | heat | orchestration | True | public | https://orchestration.131-153-200-197.nip.io/v1/%(project_id)s |
| 71af00dd937e49c28827dadbe6d55bbe | RegionOne | swift | object-store | True | internal | http://rook-ceph-rgw-ceph.openstack.svc.cluster.local/swift/v1/%(tenant_id)s |
| 7ada3efd05b64af1ae726d495fe61a6e | RegionOne | cinderv3 | volumev3 | True | admin | http://cinder-api.openstack.svc.cluster.local:8776/v3/%(tenant_id)s |
| 87e74af69cbb4577b4dd29d106aed5fa | RegionOne | magnum | container-infra | True | public | https://container-infra.131-153-200-197.nip.io/v1 |
| 8dae31f3eed946eea30025e56fbfd83a | RegionOne | nova | compute | True | admin | http://nova-api.openstack.svc.cluster.local:8774/v2.1 |
| 8e562226dccc4df0af3c8cdfdec95084 | RegionOne | barbican | key-manager | True | internal | http://barbican-api.openstack.svc.cluster.local:9311/ |
| 8f629f7e748d4c3087bf17aaa0ce2e47 | RegionOne | manila | share | True | admin | http://manila-api.openstack.svc.cluster.local:8786/v1 |
| 91149164a0584145b6344ae1d525457b | RegionOne | keystone | identity | True | public | https://identity.131-153-200-197.nip.io/ |
| a936e3ca42a54b6e97672f20e17c095b | RegionOne | neutron | network | True | admin | http://neutron-server.openstack.svc.cluster.local:9696/ |
| b987ba9af66c4a14ba42d1fd8c1b2285 | RegionOne | placement | placement | True | public | https://placement.131-153-200-197.nip.io/ |
| b9e2e43e90d649d5b6089c7474ba30cd | RegionOne | octavia | load-balancer | True | internal | http://octavia-api.openstack.svc.cluster.local:9876/ |
| bf2839c099f946e39d21a0b6bcad0b87 | RegionOne | neutron | network | True | public | https://network.131-153-200-197.nip.io/ |
| bf959da766554e91972fe1da9cff6d8e | RegionOne | heat-cfn | cloudformation | True | public | https://cloudformation.131-153-200-197.nip.io/v1 |
| d027a62b34ca4eaabc508c04ad8f94e7 | RegionOne | magnum | container-infra | True | admin | http://magnum-api.openstack.svc.cluster.local:9511/v1 |
| d3e857109be14bfabf82e962068b54af | RegionOne | nova | compute | True | public | https://compute.131-153-200-197.nip.io/v2.1 |
| d6985c01aca54ec49e0ec1c728fc271b | RegionOne | nova | compute | True | internal | http://nova-api.openstack.svc.cluster.local:8774/v2.1 |
| d74feae56d034bd7ad421e4588f0731e | RegionOne | octavia | load-balancer | True | admin | http://octavia-api.openstack.svc.cluster.local:9876/ |
| e7bcb22c547e41489cc7d5732bca4a84 | RegionOne | manilav2 | sharev2 | True | internal | http://manila-api.openstack.svc.cluster.local:8786/v2 |
| f005b62e7769497eb54b0c0a3fa3c587 | RegionOne | octavia | load-balancer | True | public | https://load-balancer.131-153-200-197.nip.io/ |
| f40bb006a4984428b581042a78539ef8 | RegionOne | neutron | network | True | internal | http://neutron-server.openstack.svc.cluster.local:9696/ |
| f4d8af60368645c7a5f1d9605afb5494 | RegionOne | placement | placement | True | internal | http://placement-api.openstack.svc.cluster.local:8778/ |
| f5aa8f8ba519480199f224800480e8cb | RegionOne | keystone | identity | True | internal | http://keystone-api.openstack.svc.cluster.local:5000/ |
+----------------------------------+-----------+--------------+-----------------+---------+-----------+------------------------------------------------------------------------------+
```
Ainsi que des accès via l’Ingress Controller du cluster Kubernetes sous-jacent :
```bash
root@instance:~# kubectl cluster-info
Kubernetes control plane is running at https://10.96.240.10:6443
CoreDNS is running at https://10.96.240.10:6443/api/v1/namespaces/kube-system/services/kube-dns:dns/proxy
To further debug and diagnose cluster problems, use 'kubectl cluster-info dump'.
root@instance:~# kubectl get nodes -o wide
NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME
instance Ready control-plane 60m v1.28.4 131.153.200.197 <none> Ubuntu 22.04.4 LTS 5.15.0-105-generic containerd://1.7.9
root@instance:~# kubectl get ing -A
NAMESPACE NAME CLASS HOSTS ADDRESS PORTS AGE
auth-system keycloak atmosphere keycloak.131-153-200-197.nip.io 10.98.36.135 80, 443 54m
monitoring kube-prometheus-stack-alertmanager atmosphere alertmanager.131-153-200-197.nip.io 10.98.36.135 80, 443 53m
monitoring kube-prometheus-stack-grafana atmosphere grafana.131-153-200-197.nip.io 10.98.36.135 80, 443 53m
monitoring kube-prometheus-stack-prometheus atmosphere prometheus.131-153-200-197.nip.io 10.98.36.135 80, 443 53m
openstack cloudformation atmosphere cloudformation.131-153-200-197.nip.io 10.98.36.135 80, 443 33m
openstack compute atmosphere compute.131-153-200-197.nip.io 10.98.36.135 80, 443 38m
openstack compute-novnc-proxy atmosphere vnc.131-153-200-197.nip.io 10.98.36.135 80, 443 38m
openstack container-infra atmosphere container-infra.131-153-200-197.nip.io 10.98.36.135 80, 443 27m
openstack container-infra-registry atmosphere container-infra-registry.131-153-200-197.nip.io 10.98.36.135 80, 443 27m
openstack dashboard atmosphere dashboard.131-153-200-197.nip.io 10.98.36.135 80, 443 23m
openstack identity atmosphere identity.131-153-200-197.nip.io 10.98.36.135 80, 443 51m
openstack image atmosphere image.131-153-200-197.nip.io 10.98.36.135 80, 443 46m
openstack key-manager atmosphere key-manager.131-153-200-197.nip.io 10.98.36.135 80, 443 49m
openstack load-balancer atmosphere load-balancer.131-153-200-197.nip.io 10.98.36.135 80, 443 30m
openstack network atmosphere network.131-153-200-197.nip.io 10.98.36.135 80, 443 36m
openstack orchestration atmosphere orchestration.131-153-200-197.nip.io 10.98.36.135 80, 443 33m
openstack placement atmosphere placement.131-153-200-197.nip.io 10.98.36.135 80, 443 41m
openstack rook-ceph-cluster atmosphere object-store.131-153-200-197.nip.io 10.98.36.135 80, 443 48m
openstack sharev2 atmosphere share.131-153-200-197.nip.io 10.98.36.135 80, 443 23m
openstack volumev3 atmosphere volume.131-153-200-197.nip.io 10.98.36.135 80, 443 42m
```
Le domaine WildCard utilisé ici me donne accès au Dashboard Horizon pour plus de simplicité :



Je charge une image locale d’Ubuntu 24.04 LTS dans le cluster :
```bash
root@instance:~# cat openrc
# Ansible managed: Do NOT edit this file manually!
export OS_IDENTITY_API_VERSION=3
export OS_AUTH_URL="https://identity.131-153-200-197.nip.io/v3"
export OS_AUTH_TYPE=password
export OS_REGION_NAME="RegionOne"
export OS_USER_DOMAIN_NAME=Default
export OS_USERNAME="admin-RegionOne"
export OS_PASSWORD="lzi232PTaHpzoC2HjwSLKepZELQd6ENJ"
export OS_PROJECT_DOMAIN_NAME=Default
export OS_PROJECT_NAME=admin
export OS_CACERT=/usr/local/share/ca-certificates/atmosphere.crt
root@instance:~# wget -c https://cloud-images.ubuntu.com/noble/current/noble-server-cloudimg-amd64.img
Saving to: ‘noble-server-cloudimg-amd64.img’
noble-server-cloudimg-amd64.img 100%[=====================================================================================================>] 454.00M 17.9MB/s in 30s
2024-06-03 13:22:40 (15.3 MB/s) - ‘noble-server-cloudimg-amd64.img’ saved [476053504/476053504]
root@instance:~# openstack image create --public --container-format bare --disk-format qcow2 --file ~/noble-server-cloudimg-amd64.img ubuntu-24.04
+------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------+
| Field | Value |
+------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------+
| container_format | bare |
| created_at | 2024-06-03T13:23:12Z |
| disk_format | qcow2 |
| file | /v2/images/81d8eafa-4054-455c-9640-4e83c0566d21/file |
| id | 81d8eafa-4054-455c-9640-4e83c0566d21 |
| min_disk | 0 |
| min_ram | 0 |
| name | ubuntu-24.04 |
| owner | 43321f42e8434f8aa53531bd104e2809 |
| properties | locations='[]', os_hidden='False', owner_specified.openstack.md5='', owner_specified.openstack.object='images/ubuntu-24.04', owner_specified.openstack.sha256='' |
| protected | False |
| schema | /v2/schemas/image |
| status | queued |
| tags | |
| updated_at | 2024-06-03T13:23:12Z |
| visibility | public |
+------------------+------------------------------------------------------------------------------------------------------------------------------------------------------------------+
root@instance:~# openstack image list
+--------------------------------------+---------------------------+--------+
| ID | Name | Status |
+--------------------------------------+---------------------------+--------+
| 04e2f39a-e4ff-426b-aeee-b82acd3bf611 | amphora-x64-haproxy | active |
| 49a3b09d-c191-4c36-8541-31efaffb404d | cirros | active |
| b7e75cdb-37b0-4f2a-badf-cfdee7bca83d | manila-service-image | active |
| 3c5df46c-7015-411c-8009-afa6695672a6 | ubuntu-2204-kube-v1.27.8s | active |
| 81d8eafa-4054-455c-9640-4e83c0566d21 | ubuntu-24.04 | active |
+--------------------------------------+---------------------------+--------+
```

Configuration d’une topologie réseau pour un rapide test :

Avec l’image chargée dans Glance, lancement de trois petites instances Ubuntu 24.04 LTS …

```bash
root@instance:~# openstack server list
+--------------------------------------+-------+--------+--------------------------------------+--------------+----------+
| ID | Name | Status | Networks | Image | Flavor |
+--------------------------------------+-------+--------+--------------------------------------+--------------+----------+
| 07d6bf6e-edff-4729-9133-31849ea6fe87 | k0s-3 | ACTIVE | network1=10.96.250.216, 11.12.13.185 | ubuntu-24.04 | m1.small |
| afd10cda-f99c-4877-9948-a7f25b5e756a | k0s-1 | ACTIVE | network1=10.96.250.211, 11.12.13.99 | ubuntu-24.04 | m1.small |
| d70230a1-9fdf-40d9-959d-c9960479b4a5 | k0s-2 | ACTIVE | network1=10.96.250.208, 11.12.13.80 | ubuntu-24.04 | m1.small |
+--------------------------------------+-------+--------+--------------------------------------+--------------+----------+
```
Un cluster kubernetes simple sur la base de ces trois instances est alors possible avec k0sctl.
[GitHub - k0sproject/k0sctl: A bootstrapping and management tool for k0s clusters.](https://github.com/k0sproject/k0sctl)
```
root@instance:~# wget -c https://github.com/k0sproject/k0sctl/releases/download/v0.17.8/k0sctl-linux-x64
root@instance:~# mv k0sctl-linux-x64 /usr/local/bin/k0sctl && chmod +x /usr/local/bin/k0sctl
root@instance:~# k0sctl
NAME:
k0sctl - k0s cluster management tool
USAGE:
k0sctl [global options] command [command options]
COMMANDS:
version Output k0sctl version
apply Apply a k0sctl configuration
kubeconfig Output the admin kubeconfig of the cluster
init Create a configuration template
reset Remove traces of k0s from all of the hosts
backup Take backup of existing clusters state
config Configuration related sub-commands
completion
help, h Shows a list of commands or help for one command
GLOBAL OPTIONS:
--debug, -d Enable debug logging (default: false) [$DEBUG]
--trace Enable trace logging (default: false) [$TRACE]
--no-redact Do not hide sensitive information in the output (default: false)
--help, -h show help
root@instance:~# k0sctl init --k0s > k0sctl.yaml
root@instance:~# cat k0sctl.yaml
apiVersion: k0sctl.k0sproject.io/v1beta1
kind: Cluster
metadata:
name: k0s-cluster
spec:
hosts:
- ssh:
address: 10.96.250.211
user: ubuntu
port: 22
keyPath: /root/.ssh/id_rsa
role: controller
- ssh:
address: 10.96.250.208
user: ubuntu
port: 22
keyPath: /root/.ssh/id_rsa
role: worker
- ssh:
address: 10.96.250.216
user: ubuntu
port: 22
keyPath: /root/.ssh/id_rsa
role: worker
k0s:
config:
apiVersion: k0s.k0sproject.io/v1beta1
kind: Cluster
metadata:
name: k0s
spec:
api:
k0sApiPort: 9443
port: 6443
installConfig:
users:
etcdUser: etcd
kineUser: kube-apiserver
konnectivityUser: konnectivity-server
kubeAPIserverUser: kube-apiserver
kubeSchedulerUser: kube-scheduler
konnectivity:
adminPort: 8133
agentPort: 8132
network:
kubeProxy:
disabled: false
mode: iptables
kuberouter:
autoMTU: true
mtu: 0
peerRouterASNs: ""
peerRouterIPs: ""
podCIDR: 10.244.0.0/16
provider: kuberouter
serviceCIDR: 10.96.0.0/12
podSecurityPolicy:
defaultPolicy: 00-k0s-privileged
storage:
type: etcd
telemetry:
enabled: true
root@instance:~# k0sctl apply --config k0sctl.yaml
⠀⣿⣿⡇⠀⠀⢀⣴⣾⣿⠟⠁⢸⣿⣿⣿⣿⣿⣿⣿⡿⠛⠁⠀⢸⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠀█████████ █████████ ███
⠀⣿⣿⡇⣠⣶⣿⡿⠋⠀⠀⠀⢸⣿⡇⠀⠀⠀⣠⠀⠀⢀⣠⡆⢸⣿⣿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀███ ███ ███
⠀⣿⣿⣿⣿⣟⠋⠀⠀⠀⠀⠀⢸⣿⡇⠀⢰⣾⣿⠀⠀⣿⣿⡇⢸⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠀███ ███ ███
⠀⣿⣿⡏⠻⣿⣷⣤⡀⠀⠀⠀⠸⠛⠁⠀⠸⠋⠁⠀⠀⣿⣿⡇⠈⠉⠉⠉⠉⠉⠉⠉⠉⢹⣿⣿⠀███ ███ ███
⠀⣿⣿⡇⠀⠀⠙⢿⣿⣦⣀⠀⠀⠀⣠⣶⣶⣶⣶⣶⣶⣿⣿⡇⢰⣶⣶⣶⣶⣶⣶⣶⣶⣾⣿⣿⠀█████████ ███ ██████████
k0sctl v0.17.8 Copyright 2023, k0sctl authors.
Anonymized telemetry of usage will be sent to the authors.
By continuing to use k0sctl you agree to these terms:
https://k0sproject.io/licenses/eula
INFO ==> Running phase: Set k0s version
INFO Looking up latest stable k0s version
INFO Using k0s version v1.30.1+k0s.0
INFO ==> Running phase: Connect to hosts
INFO [ssh] 10.96.250.216:22: connected
INFO [ssh] 10.96.250.208:22: connected
INFO [ssh] 10.96.250.211:22: connected
INFO ==> Running phase: Detect host operating systems
INFO [ssh] 10.96.250.216:22: is running Ubuntu 24.04 LTS
INFO [ssh] 10.96.250.208:22: is running Ubuntu 24.04 LTS
INFO [ssh] 10.96.250.211:22: is running Ubuntu 24.04 LTS
INFO ==> Running phase: Acquire exclusive host lock
INFO ==> Running phase: Prepare hosts
INFO ==> Running phase: Gather host facts
INFO [ssh] 10.96.250.216:22: using k0s-3 as hostname
INFO [ssh] 10.96.250.211:22: using k0s-1 as hostname
INFO [ssh] 10.96.250.208:22: using k0s-2 as hostname
INFO [ssh] 10.96.250.211:22: discovered ens3 as private interface
INFO [ssh] 10.96.250.208:22: discovered ens3 as private interface
INFO [ssh] 10.96.250.216:22: discovered ens3 as private interface
INFO [ssh] 10.96.250.211:22: discovered 11.12.13.99 as private address
INFO [ssh] 10.96.250.208:22: discovered 11.12.13.80 as private address
INFO [ssh] 10.96.250.216:22: discovered 11.12.13.185 as private address
INFO ==> Running phase: Validate hosts
INFO ==> Running phase: Validate facts
INFO ==> Running phase: Download k0s on hosts
INFO [ssh] 10.96.250.216:22: downloading k0s v1.30.1+k0s.0
INFO [ssh] 10.96.250.211:22: downloading k0s v1.30.1+k0s.0
INFO [ssh] 10.96.250.208:22: downloading k0s v1.30.1+k0s.0
INFO ==> Running phase: Install k0s binaries on hosts
INFO [ssh] 10.96.250.211:22: validating configuration
INFO ==> Running phase: Configure k0s
INFO [ssh] 10.96.250.211:22: installing new configuration
INFO ==> Running phase: Initialize the k0s cluster
INFO [ssh] 10.96.250.211:22: installing k0s controller
INFO [ssh] 10.96.250.211:22: waiting for the k0s service to start
INFO [ssh] 10.96.250.211:22: waiting for kubernetes api to respond
INFO ==> Running phase: Install workers
INFO [ssh] 10.96.250.216:22: validating api connection to https://11.12.13.99:6443
INFO [ssh] 10.96.250.208:22: validating api connection to https://11.12.13.99:6443
INFO [ssh] 10.96.250.211:22: generating a join token for worker 1
INFO [ssh] 10.96.250.211:22: generating a join token for worker 2
INFO [ssh] 10.96.250.216:22: writing join token
INFO [ssh] 10.96.250.208:22: writing join token
INFO [ssh] 10.96.250.216:22: installing k0s worker
INFO [ssh] 10.96.250.208:22: installing k0s worker
INFO [ssh] 10.96.250.216:22: starting service
INFO [ssh] 10.96.250.216:22: waiting for node to become ready
INFO [ssh] 10.96.250.208:22: starting service
INFO [ssh] 10.96.250.208:22: waiting for node to become ready
INFO ==> Running phase: Release exclusive host lock
INFO ==> Running phase: Disconnect from hosts
INFO ==> Finished in 42s
INFO k0s cluster version v1.30.1+k0s.0 is now installed
INFO Tip: To access the cluster you can now fetch the admin kubeconfig using:
INFO k0sctl kubeconfig
```
Kubernetes via k0s est actif et accessible via son fichier kubeconfigspécifique :
```bash
root@instance:~# k0sctl kubeconfig > kubeconfig
root@instance:~# kubectl --kubeconfig=kubeconfig cluster-info
Kubernetes control plane is running at https://10.96.250.211:6443
CoreDNS is running at https://10.96.250.211:6443/api/v1/namespaces/kube-system/services/kube-dns:dns/proxy
To further debug and diagnose cluster problems, use 'kubectl cluster-info dump'.
root@instance:~# kubectl --kubeconfig=kubeconfig get nodes -o wide
NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME
k0s-2 Ready <none> 2m41s v1.30.1+k0s 11.12.13.80 <none> Ubuntu 24.04 LTS 6.8.0-31-generic containerd://1.7.17
k0s-3 Ready <none> 2m41s v1.30.1+k0s 11.12.13.185 <none> Ubuntu 24.04 LTS 6.8.0-31-generic containerd://1.7.17
root@instance:~# kubectl --kubeconfig=kubeconfig get po,svc -A
NAMESPACE NAME READY STATUS RESTARTS AGE
kube-system pod/coredns-6997b8f8bd-957bd 1/1 Running 0 2m41s
kube-system pod/coredns-6997b8f8bd-ddr5t 1/1 Running 0 2m41s
kube-system pod/konnectivity-agent-2bxgl 1/1 Running 0 2m51s
kube-system pod/konnectivity-agent-4gfsw 1/1 Running 0 2m51s
kube-system pod/kube-proxy-2cq5w 1/1 Running 0 2m51s
kube-system pod/kube-proxy-m6rnv 1/1 Running 0 2m51s
kube-system pod/kube-router-p9s4t 1/1 Running 0 2m51s
kube-system pod/kube-router-qhcp4 1/1 Running 0 2m51s
kube-system pod/metrics-server-5cd4986bbc-rf4wc 1/1 Running 0 2m57s
NAMESPACE NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
default service/kubernetes ClusterIP 10.96.0.1 <none> 443/TCP 3m15s
kube-system service/kube-dns ClusterIP 10.96.0.10 <none> 53/UDP,53/TCP,9153/TCP 3m5s
kube-system service/metrics-server ClusterIP 10.97.91.41 <none> 443/TCP 3m1s
```
Le démonstrateur FC en une commande (habituelle maintenant) :
```yaml
root@instance:~# cat test.yaml
---
apiVersion: apps/v1
kind: Deployment
metadata:
name: fcdemo3
labels:
app: fcdemo3
spec:
replicas: 4
selector:
matchLabels:
app: fcdemo3
template:
metadata:
labels:
app: fcdemo3
spec:
containers:
- name: fcdemo3
image: mcas/franceconnect-demo2:latest
ports:
- containerPort: 3000
---
apiVersion: v1
kind: Service
metadata:
name: fcdemo-service
spec:
type: ClusterIP
selector:
app: fcdemo3
ports:
- protocol: TCP
port: 80
targetPort: 3000
root@instance:~# kubectl --kubeconfig=kubeconfig apply -f test.yaml
deployment.apps/fcdemo3 created
service/fcdemo-service created
root@instance:~# kubectl --kubeconfig=kubeconfig get po,svc
NAME READY STATUS RESTARTS AGE
pod/fcdemo3-85f6bd87c-7jvpk 1/1 Running 0 13s
pod/fcdemo3-85f6bd87c-btv9m 1/1 Running 0 13s
pod/fcdemo3-85f6bd87c-nlw9x 1/1 Running 0 13s
pod/fcdemo3-85f6bd87c-v66bs 1/1 Running 0 13s
NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
service/fcdemo-service ClusterIP 10.98.123.24 <none> 80/TCP 13s
service/kubernetes ClusterIP 10.96.0.1 <none> 443/TCP 8m19s
```
Redirection de port ici pour accès local à ce dernier …
```bash
root@instance:~# kubectl --kubeconfig=kubeconfig port-forward service/fcdemo-service 12222:80 --address='0.0.0.0'
Forwarding from 0.0.0.0:12222 -> 3000
```




Sachant qu’Atmosphere disposait de Magnum pour déployer un cluster Kubernetes intrinsèque …

Pour conclure, Atmosphere est un projet pour un déploiement simplifié d’un cluster Openstack conteneurisé dans un cluster Kubernetes de base (en reprenant OpenStack Helm) et que l’on retrouve également dans la nouvelle mouture de Canonical MicroStack par exemple …
[OpenStack for the edge, micro clouds and developers](https://microstack.run/)

À suivre ! | deep75 |
1,875,643 | Ai Will Live and Die By Trust it | AI will live and die by trust. The potential of AI is unmatched, but we have to be able to trust... | 0 | 2024-06-03T15:48:25 | https://dev.to/stealc/ai-will-live-and-die-by-trust-it-2l63 | ai, news, machinelearning, webdev | >_AI will live and die by trust._

The potential of AI is unmatched, but we have to be able to trust it. Once we trust it, we can address various use cases, ideally one at a time, to avoid confusion or overwhelm IT teams with too much too fast.
## Answering the Key Questions Around AI Adoption
Navigating trust in AI involves addressing hesitations and slowdowns in its implementation, outlines the five fundamental questions that everyone has around AI, including:
- Concerns about data privacy
- Security compliance
- Scalability management
- Cost considerations
- Reliability and accuracy
the primary importance of AI fulfilling its intended purpose, highlighting the necessity of trust along the AI journey. Establishing trust involves recognizing AI's usefulness within specific scenarios, thus driving its adoption and integration.
##Is My Data Going to be Private?

- Given AI's dependence on data, ensuring the privacy of this data is crucial. As AI solutions continuously gather and analyze data, concerns arise regarding its confidentiality and protection from unauthorized access or misuse.
- Efforts to protect his data may include encryption protocols, stringent access controls, data anonymization techniques, and adherence to strict privacy regulations. Organizations and AI developers must take proactive steps to prioritize data privacy, thereby fostering trust among users and stakeholders in AI systems.
##Am I Going to be Secure and Compliant?

- The next question concerns security and compliance: "Am I going to be secure and compliant?" As compliance becomes an escalating concern for CIOs and organizations or Companies, ensuring AI solutions adhere to regulatory frameworks will be key.
- This entails implementing stringent security measures throughout the AI solution's lifecycle, encompassing data encryption, access controls, and secure authentication protocols.
- By prioritizing security and compliance measures, organizations can instill confidence in the integrity and reliability of their AI systems, fostering trust among stakeholders and users alike.
## Will the Information be Accurate?

- Ensuring the accuracy of AI-generated information is a big part of its effectiveness and trustworthiness. That said, as Kassner highlights, if **AI fails to fulfill its primary purpose,concerns about accuracy become irrelevant**.
- **Human oversight will remain crucial in verifying the accuracy of AI outputs**, especially in critical decision-making contexts. Striking a balance between leveraging AI to enhance productivity and ensuring accuracy requires continuous refinement and adaptation. At the end of the day, as long as AI can save you time, it doesn’t have to be perfect. It just has to get you there.
## How Do I Scale My AI Deployment?

Addressing the question of scaling AI deployment and usage requires a strategic approach to accommodate evolving demands and workloads. As AI implementations and usage expand, organizations must devise scalable strategies to meet growing requirements effectively. This entails evaluating infrastructure capabilities, leveraging cloud-based solutions for scalability, and adopting future-proof network infrastructures that facilitate seamless expansion.
## How Do I Manage Cost?
- Navigating the costs associated with AI deployments is a critical consideration for organizations seeking to maximize the value of their investments.
- As AI implementation progresses, managing costs becomes increasingly crucial. Organizations must adopt a strategic approach to cost management to address this question, leveraging techniques such as resource optimization, budget allocation, and cost-benefit analysis.

---
> **_"If you get into a truck and try to turn it on and it doesn't even start, do you care if it doesn't have a seatbelt? No, so my point is simple. AI dies on being useful in doing the purpose that you wanted it to do first, then it will fail on everything else"_**
---

@article by Chinnanj | stealc |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.