hexsha
stringlengths
40
40
size
int64
5
1.04M
ext
stringclasses
6 values
lang
stringclasses
1 value
max_stars_repo_path
stringlengths
3
344
max_stars_repo_name
stringlengths
5
125
max_stars_repo_head_hexsha
stringlengths
40
78
max_stars_repo_licenses
sequencelengths
1
11
max_stars_count
int64
1
368k
max_stars_repo_stars_event_min_datetime
stringlengths
24
24
max_stars_repo_stars_event_max_datetime
stringlengths
24
24
max_issues_repo_path
stringlengths
3
344
max_issues_repo_name
stringlengths
5
125
max_issues_repo_head_hexsha
stringlengths
40
78
max_issues_repo_licenses
sequencelengths
1
11
max_issues_count
int64
1
116k
max_issues_repo_issues_event_min_datetime
stringlengths
24
24
max_issues_repo_issues_event_max_datetime
stringlengths
24
24
max_forks_repo_path
stringlengths
3
344
max_forks_repo_name
stringlengths
5
125
max_forks_repo_head_hexsha
stringlengths
40
78
max_forks_repo_licenses
sequencelengths
1
11
max_forks_count
int64
1
105k
max_forks_repo_forks_event_min_datetime
stringlengths
24
24
max_forks_repo_forks_event_max_datetime
stringlengths
24
24
content
stringlengths
5
1.04M
avg_line_length
float64
1.14
851k
max_line_length
int64
1
1.03M
alphanum_fraction
float64
0
1
lid
stringclasses
191 values
lid_prob
float64
0.01
1
d5c4c9a3342f6952211f2a8f5fd1a1cc6fb4c515
1,113
md
Markdown
README.md
TheVillageDev/mumbleSniff
145268ea75edb9c4c05af6ec6124259ecbcb1b8d
[ "BSD-2-Clause" ]
null
null
null
README.md
TheVillageDev/mumbleSniff
145268ea75edb9c4c05af6ec6124259ecbcb1b8d
[ "BSD-2-Clause" ]
1
2019-05-07T08:51:48.000Z
2020-10-28T19:13:37.000Z
README.md
TheVillageDev/mumbleSniff
145268ea75edb9c4c05af6ec6124259ecbcb1b8d
[ "BSD-2-Clause" ]
null
null
null
# How to get it working 1. Clone the repo and get into the folder. 2. Create a certificate for the mumble connection and save them to `key.pem` and `cert.pem`: openssl req -x509 -newkey rsa:2048 -nodes -keyout key.pem -out cert.pem 3. Edit the environment file: cp default.env .env vi .env 4. Add the Telegram Bot Token to the environment. Ask @BotFather for an API token and paste it after the __=__ char. 5. Change the Server-URL and the Mumble Username to whatever you desire. 6. Close the file. 7. Run `npm install` to recieve the required packages. # Start the script I ran best with loading `index.js` into an interactive shell: ```bash ~/mumbleSniff $ node > .load ./index.js ``` After that, you can import prior Telegram message ids with `fs.readFileSync("loggedInUsers.log", "utf-8").split("\n").forEach((i)=>{botUsers.push(i)});`. Then, check the botUsers array for new contents. (This is an [issue](https://github.com/jeyemwey/mumbleSniff/1), and _$soon_, the application should do this by itself.) # Contribute If you want to, you can surely contribute to this project. Just send a PR!
34.78125
322
0.733154
eng_Latn
0.978572
d5c51801d511f247ae82790dceda5244aa9f1960
3,680
md
Markdown
wdk-ddi-src/content/wdm/nf-wdm-excanceltimer.md
Cloud-Writer/windows-driver-docs-ddi
6ac33c6bc5649df3e1b468a977f97c688486caab
[ "CC-BY-4.0", "MIT" ]
null
null
null
wdk-ddi-src/content/wdm/nf-wdm-excanceltimer.md
Cloud-Writer/windows-driver-docs-ddi
6ac33c6bc5649df3e1b468a977f97c688486caab
[ "CC-BY-4.0", "MIT" ]
null
null
null
wdk-ddi-src/content/wdm/nf-wdm-excanceltimer.md
Cloud-Writer/windows-driver-docs-ddi
6ac33c6bc5649df3e1b468a977f97c688486caab
[ "CC-BY-4.0", "MIT" ]
null
null
null
--- UID: NF:wdm.ExCancelTimer title: ExCancelTimer function (wdm.h) description: The ExCancelTimer routine cancels a timer that was set by a previous call to the ExSetTimer routine. old-location: kernel\excanceltimer.htm tech.root: kernel ms.assetid: 5E52550D-0A81-4C72-9A82-7C13BC3EFE00 ms.date: 04/30/2018 ms.keywords: ExCancelTimer, ExCancelTimer routine [Kernel-Mode Driver Architecture], kernel.excanceltimer, wdm/ExCancelTimer ms.topic: function req.header: wdm.h req.include-header: Wdm.h, Ntddk.h, Ntifs.h req.target-type: Universal req.target-min-winverclnt: Available starting with Windows 8.1. req.target-min-winversvr: req.kmdf-ver: req.umdf-ver: req.ddi-compliance: req.unicode-ansi: req.idl: req.max-support: req.namespace: req.assembly: req.type-library: req.lib: Ntoskrnl.lib req.dll: req.irql: "<= DISPATCH_LEVEL" topic_type: - APIRef - kbSyntax api_type: - LibDef api_location: - ntoskrnl.lib - ntoskrnl.dll api_name: - ExCancelTimer product: - Windows targetos: Windows req.typenames: --- # ExCancelTimer function ## -description The <b>ExCancelTimer</b> routine cancels a timer that was set by a previous call to the <a href="https://msdn.microsoft.com/library/windows/hardware/dn265188">ExSetTimer</a> routine. ## -parameters ### -param Timer [in, out] A pointer to an <a href="https://docs.microsoft.com/windows-hardware/drivers/kernel/exxxxtimer-routines-and-ex-timer-objects">EX_TIMER</a> structure. This structure is a timer object that was previously allocated by the <a href="https://msdn.microsoft.com/library/windows/hardware/dn265179">ExAllocateTimer</a> routine. ### -param Parameters [in, optional] Drivers must set this parameter to <b>NULL</b>. ## -returns This routine returns <b>TRUE</b> if the timer was canceled. Otherwise, the routine returns <b>FALSE</b>. ## -remarks After your driver calls the <a href="https://msdn.microsoft.com/library/windows/hardware/dn265188">ExSetTimer</a> routine to set the timer, the timer might be canceled before it expires. The driver can call the <b>ExCancelTimer</b> routine to explicitly cancel a pending timer. Also, if the driver calls the <b>ExSetTimer</b> routine to set a new timer on a timer object before a previously set timer on this object expires, this <b>ExSetTimer</b> call implicitly cancels the previous timer and then starts the new timer. A return value of <b>TRUE</b> indicates that the timer was set when <b>ExCancelTimer</b> was called. In this case, the routine cancels the timer. A return value of <b>FALSE</b> indicates that the timer was not set, which might mean that the timer was never set, that the timer had already been canceled, or that the timer had already expired. When a timer expires, the operating system signals the timer object. As an option, a driver can supply an <a href="https://msdn.microsoft.com/library/windows/hardware/dn265190">ExTimerCallback</a> callback routine that is called when the timer expires. If the driver supplies this callback routine, this routine is guaranteed to be called if the timer object is signaled. If the timer is canceled before it expires, the timer object is not signaled and the callback routine is not called. For more information, see <a href="https://msdn.microsoft.com/library/windows/hardware/dn265198">ExXxxTimer Routines and EX_TIMER Objects</a>. ## -see-also <a href="https://docs.microsoft.com/windows-hardware/drivers/kernel/exxxxtimer-routines-and-ex-timer-objects">EX_TIMER</a> <a href="https://msdn.microsoft.com/library/windows/hardware/dn265179">ExAllocateTimer</a> <a href="https://msdn.microsoft.com/library/windows/hardware/dn265188">ExSetTimer</a>    
33.454545
521
0.767391
eng_Latn
0.899165
d5c57d7940de9c4601384f6b43312d27c4e63576
1,592
md
Markdown
docs/api/teamsfx-api.istatictab.md
zhenjiao-ms/TeamsFx
946cdd5d048f7493629f0ed185b1875df381c89a
[ "MIT" ]
127
2021-05-10T04:59:45.000Z
2022-03-19T00:25:23.000Z
docs/api/teamsfx-api.istatictab.md
zhenjiao-ms/TeamsFx
946cdd5d048f7493629f0ed185b1875df381c89a
[ "MIT" ]
740
2021-05-10T06:15:23.000Z
2022-03-31T07:45:14.000Z
docs/api/teamsfx-api.istatictab.md
zhenjiao-ms/TeamsFx
946cdd5d048f7493629f0ed185b1875df381c89a
[ "MIT" ]
73
2021-05-10T05:08:45.000Z
2022-03-29T12:08:43.000Z
<!-- Do not edit this file. It is automatically generated by API Documenter. --> [Home](./index.md) &gt; [@microsoft/teamsfx-api](./teamsfx-api.md) &gt; [IStaticTab](./teamsfx-api.istatictab.md) ## IStaticTab interface <b>Signature:</b> ```typescript export interface IStaticTab ``` ## Properties | Property | Type | Description | | --- | --- | --- | | [contentUrl?](./teamsfx-api.istatictab.contenturl.md) | string | <i>(Optional)</i> The url which points to the entity UI to be displayed in the Teams canvas. | | [context?](./teamsfx-api.istatictab.context.md) | ("personalTab" \| "channelTab")\[\] | <i>(Optional)</i> The set of contextItem scopes that a tab belong to | | [entityId](./teamsfx-api.istatictab.entityid.md) | string | A unique identifier for the entity which the tab displays. | | [name?](./teamsfx-api.istatictab.name.md) | string | <i>(Optional)</i> The display name of the tab. | | [objectId?](./teamsfx-api.istatictab.objectid.md) | string | <i>(Optional)</i> | | [scopes](./teamsfx-api.istatictab.scopes.md) | ("team" \| "personal")\[\] | Specifies whether the tab offers an experience in the context of a channel in a team, or an experience scoped to an individual user alone. These options are non-exclusive. Currently static tabs are only supported in the 'personal' scope. | | [searchUrl?](./teamsfx-api.istatictab.searchurl.md) | string | <i>(Optional)</i> The url to direct a user's search queries. | | [websiteUrl?](./teamsfx-api.istatictab.websiteurl.md) | string | <i>(Optional)</i> The url to point at if a user opts to view in a browser. |
61.230769
318
0.690955
eng_Latn
0.901644
d5c692809b42380886163ad0b2919d5bc2cdf3ab
941
md
Markdown
README.md
DeveloperShed/Empty-Project
10a8cea096abef4619abf0310fe1f16154e09988
[ "MIT" ]
null
null
null
README.md
DeveloperShed/Empty-Project
10a8cea096abef4619abf0310fe1f16154e09988
[ "MIT" ]
null
null
null
README.md
DeveloperShed/Empty-Project
10a8cea096abef4619abf0310fe1f16154e09988
[ "MIT" ]
null
null
null
# <<Project Name>> <<Project description>> * Source: [http://forums.devshed.com/path/to/thread](http://forums.devshed.com/path/to/thread) ## Features * List some features * List some more ## Browser support * Chrome *(latest)* * Edge *(latest)* * Firefox *(latest)* * Internet Explorer 8+ * Opera *(latest)* * Safari *(latest)* *Special comments about compatibility* ## Usage Nicely formatted usage instructions. ## Support Personal support requests should be made at the [Dev Shed Forums](http://forums.devshed.com). ## Contributing This code is made freely available. Anyone and everyone is welcome to [contribute](CONTRIBUTING.md). If you would like to get involved, please review the [guidelines](CONTRIBUTING.md): * [Bug reports](CONTRIBUTING.md#bugs) * [Feature requests](CONTRIBUTING.md#features) * [Pull requests](CONTRIBUTING.md#pull-requests) ## License The code is available under the [MIT license](LICENSE).
20.021277
184
0.729012
eng_Latn
0.888007
d5c7e55af001562bb5b64a3232f913813c1b7e53
51
md
Markdown
_includes/03-links.md
ailenelung/markdown-portfolio
2472e98e9dcb217cc3570fae39364a3c19417fe1
[ "MIT" ]
null
null
null
_includes/03-links.md
ailenelung/markdown-portfolio
2472e98e9dcb217cc3570fae39364a3c19417fe1
[ "MIT" ]
5
2020-07-04T04:09:23.000Z
2020-07-04T04:49:51.000Z
_includes/03-links.md
ailenelung/markdown-portfolio
2472e98e9dcb217cc3570fae39364a3c19417fe1
[ "MIT" ]
null
null
null
[Ailene's Old Lame Website](http://ailenelung.com)
25.5
50
0.745098
yue_Hant
0.386415
d5c889b543c02893342e374d841c77c92c5c6f31
4,262
md
Markdown
content/school/samenvattingen/Geschiedenis_amerika.md
maantjemol/quartz
f71cf37ed9ad6ad5439df76cfe2054505fc32d0c
[ "MIT" ]
null
null
null
content/school/samenvattingen/Geschiedenis_amerika.md
maantjemol/quartz
f71cf37ed9ad6ad5439df76cfe2054505fc32d0c
[ "MIT" ]
null
null
null
content/school/samenvattingen/Geschiedenis_amerika.md
maantjemol/quartz
f71cf37ed9ad6ad5439df76cfe2054505fc32d0c
[ "MIT" ]
null
null
null
--- title: "Geschiedenis_amerika" --- ** # De Amerikaanse revolutie: Houd eigenlijk in dat Amerikanen belasting betalen aan de Britten niet zo chill vinden, dus ze komen in opstand en worden onafhankelijk. # De revolutie: Hoewel Amerika geen contact had met europa volgde ze de discussies en verlichtingsideeën wel. De vrijheid sprak ze aan en ze begonnen zichzelf Amerikanen te noemen De staten bestuurde zichzelf vooral, maar ze waren ondergeschikt aan de Britse koning, die gouverneurs, ambtenaren en soldaten had. Radicale verlichte denkers zorgde voor wantrouwen onder de Amerikanen. Ze wouden hun shit liever zelf gaan regelen. De Amerikanen werden zich pijnlijk bewust van de Britse koning toen hij Belastingen wilde heffen. Deze had hij namelijk nodig om de Franse te verslaan en hij wou zijn rijke levenstijl niet opgeven. Het verzet in Amerika riep dat men maar moest gaan protesteren in de hoop dat daardoor de belastingen omlaag gingen. Dit alles ging mis toen Britse soldaten in Boston (1770) werden bekogelt met ijsballen en sneeuwballen door het verzet. Het één leidt tot het ander en de soldaten schieten meerdere mensen van het verzet neer. Dit wordt later bekend als Het bloedbad van Boston 2 jaar later (1772) vormde de verzetsleiders in Boston een verzet comité tegen het Britse bestuur. Ze hadden een paar belangrijke punten: Iedereen heeft recht op - Leven (behalve slaven) - Bezit (behalve slaven) - Vrijheid (behalve slaven) Dit soort verzets comités kwamen in alle 13 koloniën. De Britse koning was ondertussen echt wel toe aan geld, dus er kwamen in 1773 belastingen op thee. Hier waren de Amerikanen als oud britten echt niet blij mee. Er ontstond opnieuw een fel verzet in Boston. Opstandelingen verkleedde zich als slaven om vervolgens thee van Britse schepen af te gooien en het daarna te blamen op de slaven. Dit werd uiteindelijk de Boston tea party genoemd. De britse koning was inmiddels echt wel pissig. Hij besloot de ongehoorzame amerikanen te straffen: - De haven werd gesloten - Zelfbestuur werd afgeschaft - Beroepsmillitaire werden ingekwartiert Dit vonden de rebellen echt niet cool. Ze vormde in 1774 een parlement in Philadelphia met afgevaardigde van alle kolonienen. Zij besloten op 14 juli 1776 dat Amerika onafhankelijk was. Er werd ook een onafhankelijkheidsverklaring geschreven. Een jaar eerder (1775) was er een leger gevormd onder generaal George Washington. Hij was vooral goed in oorlogsstrategie. Hij gaf pamfletten en speeches aan zijn soldaten om ze moed in te spreken. Het pamflet Common Sense van Thomas Paine bracht de rebelse gedachten naar de rest van Amerika. Na veel oorlog met de Britten en nog meer hulp van de Fransen won Amerika in 1783 de revolutie en werden ze als onafhankelijk herkend. # Wat erna gebeurde: Er werd een grondwet geschreven in 1787 die nog steeds geldig en inmiddels best wel verouderd is. De macht werd verdeeld tussen - Het congres, bestaande uit afgevaardigde uit de staten - het Hooggerechtshof met meerdere opperrechters - De president, op dat moment George Washington omdat ie zo goed z’n best had gedaan in de oorlog Volgens de grondwet hadden alle burgers gelijke rechten. Burgers is in deze context witte mannen met een groot bezit. De indianen werden gevangen als slaven of vermoord. De noordelijke staten hadden de slavenhandel in 1787 afgeschaft, maar de zuidelijke staten waren er best wel afhankelijk van en wilden liever niet zelf  werken. De VS was namelijk toch weer vriendjes met de geworden om zo katoen te verkopen voor de industriële revolutie in Engeland. De overheid zorgde voor een verbod op import van slaven. Slavenhouders begonnen slavinnen veel kinderen te laten krijgen om zo hun slavenhandel te kunnen onderhouden. Dit zorgde ervoor dat de hoeveelheid slaven steeg van ½ miljoen in 1790 tot 4 miljoen in 1860. In 1860 werd Abraham Lincoln president van Amerika. Hier was het westen echt niet blij mee dus ze splitste zich af. Vijf jaar(1865) en 1 burgeroorlog later won het noorden en werd slavernij afgeschaft. ** [directory](moc/directory.md) [SamenvattingenIndex](school/SamenvattingenIndex.md)
43.938144
545
0.78672
nld_Latn
1.000005
d5c8dde03e59a3388d6ac963f860a55e777b0c74
79
md
Markdown
README.md
awkure/ogls
eabc1532e6922192fca718fc12f05f6950ba09cd
[ "MIT" ]
null
null
null
README.md
awkure/ogls
eabc1532e6922192fca718fc12f05f6950ba09cd
[ "MIT" ]
null
null
null
README.md
awkure/ogls
eabc1532e6922192fca718fc12f05f6950ba09cd
[ "MIT" ]
1
2018-03-01T07:11:48.000Z
2018-03-01T07:11:48.000Z
## OpenGL Showcase 0.0.1.1 nothing to see here ![demo](data/img/prev1.png)
13.166667
27
0.670886
eng_Latn
0.738097
d5cace2dfd9c68401ae37207bad965390ef98836
17,104
md
Markdown
mdop/mbam-v25/understanding-mbam-25-stand-alone-reports.md
MicrosoftDocs/mdop-docs-pr.ru-ru
568383949ef8ece1cef50567fcfac4bf4ee323c4
[ "CC-BY-4.0", "MIT" ]
1
2021-04-20T21:13:51.000Z
2021-04-20T21:13:51.000Z
mdop/mbam-v25/understanding-mbam-25-stand-alone-reports.md
MicrosoftDocs/mdop-docs-pr.ru-ru
568383949ef8ece1cef50567fcfac4bf4ee323c4
[ "CC-BY-4.0", "MIT" ]
2
2020-07-08T05:52:53.000Z
2020-07-08T15:40:31.000Z
mdop/mbam-v25/understanding-mbam-25-stand-alone-reports.md
MicrosoftDocs/mdop-docs-pr.ru-ru
568383949ef8ece1cef50567fcfac4bf4ee323c4
[ "CC-BY-4.0", "MIT" ]
1
2021-11-04T12:30:46.000Z
2021-11-04T12:30:46.000Z
--- title: Общие сведения об изолированных отчетах MBAM 2.5 description: Общие сведения об изолированных отчетах MBAM 2.5 author: dansimp ms.assetid: 78b5aaf4-8257-4722-8eb9-e0de48db6a11 ms.reviewer: '' manager: dansimp ms.author: dansimp ms.pagetype: mdop, security ms.mktglfcycl: manage ms.sitesec: library ms.prod: w10 ms.date: 06/16/2016 ms.openlocfilehash: 45e84c7c3b2bcb1602890c7c5a09592324da691e ms.sourcegitcommit: 354664bc527d93f80687cd2eba70d1eea024c7c3 ms.translationtype: MT ms.contentlocale: ru-RU ms.lasthandoff: 06/26/2020 ms.locfileid: "10812776" --- # Общие сведения об изолированных отчетах MBAM 2.5 В этой статье описаны отчеты, доступные при работе с администрированием и мониторингом Microsoft BitLocker (MBAM) в изолированной топологии. **Примечание.** Если вы используете MBAM с топологией интеграции Configuration Manager, вы создаете отчеты из Configuration Manager, а не из MBAM. Дополнительные сведения об этих отчетах можно найти [в разделе Просмотр отчетов MBAM 2,5 для топологии интеграции Configuration Manager](viewing-mbam-25-reports-for-the-configuration-manager-integration-topology.md) . ## Общие сведения об изолированных отчетах о топологии MBAM MBAM предоставляет три типа отчетов, которые можно использовать для отслеживания соответствия требованиям BitLocker для вашей организации. - [Отчет о соответствии требованиям предприятия](#bkmk-enterprisecompliance) - [Отчет о соответствии компьютера](#bkmk-compliance) - [Отчет об аудите восстановления](#bkmk-recovery) Чтобы получить доступ к отчетам MBAM при запуске MBAM в изолированной топологии, откройте веб-браузер и откройте веб-сайт администрирования и наблюдения. В левой строке меню выберите пункт **отчеты** . В верхней строке меню выберите отчет, который требуется создать. Дополнительные сведения о создании этих отчетов можно найти в разделе [Создание автономных отчетов MBAM 2,5](generating-mbam-25-stand-alone-reports.md). ### <a href="" id="bkmk-enterprisecompliance"></a>Отчет о соответствии требованиям предприятия Этот тип отчета используется для сбора сведений о соответствии общего соответствия требованиям BitLocker в вашей организации. С помощью фильтров можно сузить результаты поиска, чтобы узнать больше о состоянии соответствия требованиям и состоянии ошибки на компьютерах в Организации. **Общие сведения о корпоративном соответствии** <table> <colgroup> <col width="50%" /> <col width="50%" /> </colgroup> <thead> <tr class="header"> <th align="left">Имя столбца</th> <th align="left">Описание</th> </tr> </thead> <tbody> <tr class="odd"> <td align="left"><p>Управляемые компьютеры</p></td> <td align="left"><p>Количество компьютеров, которым MBAM управлять.</p></td> </tr> <tr class="even"> <td align="left"><p>% Соответствия требованиям</p></td> <td align="left"><p>Процент соответствия требованиям компьютеров в масштабах предприятия.</p></td> </tr> <tr class="odd"> <td align="left"><p>% Не соответствует требованиям</p></td> <td align="left"><p>Процент несоответствующих требованиям компьютеров в масштабах предприятия.</p></td> </tr> <tr class="even"> <td align="left"><p>% Исключении</p></td> <td align="left"><p>Процент компьютеров, исключаемых из требования шифрования BitLocker.</p></td> </tr> <tr class="odd"> <td align="left"><p>% Без исключения</p></td> <td align="left"><p>Процент компьютеров без исключения из требования шифрования BitLocker.</p></td> </tr> <tr class="even"> <td align="left"><p>SDMI</p></td> <td align="left"><p>Процент соответствия требованиям компьютеров в масштабах предприятия.</p></td> </tr> <tr class="odd"> <td align="left"><p>Не соответствует требованиям</p></td> <td align="left"><p>Процент несоответствующих требованиям компьютеров в масштабах предприятия.</p></td> </tr> <tr class="even"> <td align="left"><p>Облагаемый</p></td> <td align="left"><p>Общее количество компьютеров, исключаемых из требования шифрования BitLocker.</p></td> </tr> <tr class="odd"> <td align="left"><p>Без исключения</p></td> <td align="left"><p>Общее количество компьютеров без исключения из требований шифрования BitLocker.</p></td> </tr> </tbody> </table> **Сведения о компьютере в соответствии с требованиями предприятия** <table> <colgroup> <col width="50%" /> <col width="50%" /> </colgroup> <thead> <tr class="header"> <th align="left">Имя столбца</th> <th align="left">Описание</th> </tr> </thead> <tbody> <tr class="odd"> <td align="left"><p>Имя компьютера</p></td> <td align="left"><p>Указанное пользователем DNS-имя, управляемое MBAM.</p></td> </tr> <tr class="even"> <td align="left"><p>Доменное имя</p></td> <td align="left"><p>Полное доменное имя, в котором находится клиентский компьютер и управляется MBAM.</p></td> </tr> <tr class="odd"> <td align="left"><p>Состояние соответствия требованиям</p></td> <td align="left"><p>Состояние соответствия для компьютера согласно политике, указанной для компьютера. Состояния не соответствуют требованиям и не соответствуют требованиям. Дополнительные сведения о том, как интерпретировать состояние соответствия требованиям, можно найти в следующей таблице "требования соответствия требованиям предприятия".</p></td> </tr> <tr class="even"> <td align="left"><p>Исключение</p></td> <td align="left"><p>Состояние, указывающее на то, исключен ли этот компьютер из политики BitLocker.</p></td> </tr> <tr class="odd"> <td align="left"><p>Сведения о статусе соответствия требованиям</p></td> <td align="left"><p>Сообщения об ошибках и состоянии, связанные с состоянием соответствия компьютера согласно указанной политике.</p></td> </tr> <tr class="even"> <td align="left"><p>Последний контакт</p></td> <td align="left"><p>Дата и время последнего обращения компьютера к серверу для отправки отчета о состоянии соответствия требованиям. Частота контактов настраивается. Дополнительные сведения можно найти в разделе Параметры групповой политики MBAM.</p></td> </tr> </tbody> </table> ### <a href="" id="bkmk-compliance"></a>Отчет о соответствии компьютера Этот тип отчета используется для сбора сведений, относящихся к компьютеру или пользователю. Чтобы просмотреть этот отчет, щелкните имя компьютера в отчете соответствие требованиям предприятия или введите имя компьютера в отчете соответствие требованиям к компьютеру. Этот отчет содержит подробные сведения о шифровании каждого диска (операционной системы и несъемных дисков с данными) на компьютере. Кроме того, она указывает политику, которая применяется к каждому типу дисков на компьютере. Чтобы просмотреть сведения о каждом диске, разверните элемент имя компьютера. **Примечание.** Состояние шифрования тома съемных данных не отображается в этом отчете. **Поля отчета о соответствии компьютера** <table> <colgroup> <col width="50%" /> <col width="50%" /> </colgroup> <thead> <tr class="header"> <th align="left">Имя столбца</th> <th align="left">Описание</th> </tr> </thead> <tbody> <tr class="odd"> <td align="left"><p>Имя компьютера</p></td> <td align="left"><p>Указанное пользователем DNS-имя компьютера, управляемое с помощью MBAM.</p></td> </tr> <tr class="even"> <td align="left"><p>Доменное имя</p></td> <td align="left"><p>Полное доменное имя, в котором находится клиентский компьютер и управляется MBAM.</p></td> </tr> <tr class="odd"> <td align="left"><p>Тип компьютера</p></td> <td align="left"><p>Тип компьютера. Допустимые типы не являются переносимыми и переносимыми.</p></td> </tr> <tr class="even"> <td align="left"><p>Операционная система</p></td> <td align="left"><p>Тип операционной системы находится на клиентском компьютере, управляемом MBAM.</p></td> </tr> <tr class="odd"> <td align="left"><p>Состояние соответствия требованиям</p></td> <td align="left"><p>Общее состояние соответствия требованиям для компьютера, управляемого с помощью MBAM. Допустимые состояния соответствуют требованиям и не соответствуют требованиям.</p> <p>Обратите внимание, что состояние соответствия для каждого устройства (в приведенной ниже таблице) может указывать на разные состояния соответствия требованиям. Однако это поле представляет это состояние соответствия согласно указанной политике.</p></td> </tr> <tr class="even"> <td align="left"><p>Стойкость шифра политики</p></td> <td align="left"><p>Стойкость шифра, выбранная администратором во время MBAM политики (например, 128-bit с диффузором).</p></td> </tr> <tr class="odd"> <td align="left"><p>Диск с операционной системой политики</p></td> <td align="left"><p>Указывает, требуется ли шифрование для операционной системы, и отображается соответствующий тип предохранителя.</p></td> </tr> <tr class="even"> <td align="left"><p>Политика — фиксированный диск с данными</p></td> <td align="left"><p>Указывает, требуется ли шифрование для фиксированного диска с данными.</p></td> </tr> <tr class="odd"> <td align="left"><p>Съемный диск с данными политики</p></td> <td align="left"><p>Указывает, требуется ли шифрование для съемного диска.</p></td> </tr> <tr class="even"> <td align="left"><p>Пользователи устройств</p></td> <td align="left"><p>Известные пользователи на компьютере, управляемом с помощью MBAM.</p></td> </tr> <tr class="odd"> <td align="left"><p>Исключение</p></td> <td align="left"><p>Состояние, указывающее на то, исключен ли этот компьютер из политики BitLocker.</p></td> </tr> <tr class="even"> <td align="left"><p>Изготовитель</p></td> <td align="left"><p>Название изготовителя компьютера, которое отображается в BIOS компьютера.</p></td> </tr> <tr class="odd"> <td align="left"><p>Модель</p></td> <td align="left"><p>Название модели изготовителя компьютера, как оно отображается в BIOS компьютера.</p></td> </tr> <tr class="even"> <td align="left"><p>Сведения о статусе соответствия требованиям</p></td> <td align="left"><p>Сообщения об ошибках и состоянии, связанные с состоянием соответствия компьютера согласно указанной политике.</p></td> </tr> <tr class="odd"> <td align="left"><p>Последний контакт</p></td> <td align="left"><p>Дата и время последнего обращения компьютера к серверу для отправки отчета о состоянии соответствия требованиям. Частота контактов настраивается. Дополнительные сведения можно найти в разделе Параметры групповой политики MBAM.</p></td> </tr> </tbody> </table> **Поля "диск" для отчета о соответствии компьютера** <table> <colgroup> <col width="50%" /> <col width="50%" /> </colgroup> <thead> <tr class="header"> <th align="left">Имя столбца</th> <th align="left">Описание</th> </tr> </thead> <tbody> <tr class="odd"> <td align="left"><p>Буква диска</p></td> <td align="left"><p>Буква диска компьютера, назначенная пользователем на определенный диск.</p></td> </tr> <tr class="even"> <td align="left"><p>Тип диска</p></td> <td align="left"><p>Тип диска. Допустимые значения: диск операционной системы и фиксированный диск с данными. Это физические диски, а не логические тома.</p></td> </tr> <tr class="odd"> <td align="left"><p>Стойкость шифра</p></td> <td align="left"><p>Стойкость шифра, выбранная администратором в течение MBAM политики.</p></td> </tr> <tr class="even"> <td align="left"><p>Тип предохранителя</p></td> <td align="left"><p>Тип предохранителя, выбранный с помощью параметра групповой политики, используемого для шифрования операционной системы или фиксированного объема данных.</p></td> </tr> <tr class="odd"> <td align="left"><p>Состояние предохранителя</p></td> <td align="left"><p>Указывает на то, что компьютер, управляемый MBAM, включил Тип предохранителя, указанный в политике. Допустимые состояния: ON и OFF.</p></td> </tr> <tr class="even"> <td align="left"><p>Состояние шифрования</p></td> <td align="left"><p>Состояние шифрования диска. Допустимые состояния шифруются, а не шифруются и шифруются.</p></td> </tr> <tr class="odd"> <td align="left"><p>Состояние соответствия требованиям</p></td> <td align="left"><p>Состояние, указывающее, соответствует ли диск требованиям политики. Состояния не соответствуют требованиям и не соответствуют требованиям.</p></td> </tr> <tr class="even"> <td align="left"><p>Сведения о статусе соответствия требованиям</p></td> <td align="left"><p>Сообщения об ошибках и состоянии соответствия требованиям компьютера согласно указанной политике.</p></td> </tr> </tbody> </table> ### <a href="" id="bkmk-recovery"></a>Отчет об аудите восстановления Этот тип отчета используется для аудита пользователей, которые запросили доступ к ключам восстановления BitLocker. В отчете есть несколько фильтров, основанных на нужных критериях фильтрации. Вы можете отфильтровать по определенному типу пользователя (в службе поддержки пользователей или для конечного пользователя), о том, что запрос завершился сбоем или был успешно, определен требуемый тип ключа и диапазон дат, в течение которого произошло извлечение. **Поля отчета аудита восстановления** <table> <colgroup> <col width="50%" /> <col width="50%" /> </colgroup> <thead> <tr class="header"> <th align="left">Имя столбца</th> <th align="left">Описание</th> </tr> </thead> <tbody> <tr class="odd"> <td align="left"><p>Дата и время запроса</p></td> <td align="left"><p>Дата и время, когда запрос на получение ключа был выполнен конечным пользователем или пользователем службы поддержки.</p></td> </tr> <tr class="even"> <td align="left"><p>Источник запросов аудита</p></td> <td align="left"><p>Сайт, с которого был инициирован запрос. У этого элемента может быть одно из двух значений: <strong> портал самообслуживания </strong> или служба <strong> поддержки </strong> .</p></td> </tr> <tr class="odd"> <td align="left"><p>Состояние запроса</p></td> <td align="left"><p>Состояние запроса. Допустимые состояния успешно установлены (ключ был получен) или завершился сбоем (ключ не был получен).</p></td> </tr> <tr class="even"> <td align="left"><p>Пользователь службы поддержки</p></td> <td align="left"><p>Пользователь службы поддержки, который инициировал запрос на получение ключа.</p> <div class="alert"> <strong>Примечание.</strong><br/><p>Если пользователь расширенной справочной службы возводит ключ, не указывая конечного пользователя, <strong> поле конечного пользователя </strong> будет пустым. Пользователь службы поддержки должен указать конечного пользователя, и этот пользователь будет отображаться в этом поле.</p> <p>При восстановлении с помощью портала самообслуживания будет указан конечный пользователь в этом поле и в <strong> поле конечных пользователей </strong> .</p> </div> <div> </div></td> </tr> <tr class="odd"> <td align="left"><p>Конечный пользователь</p></td> <td align="left"><p>Конечный пользователь, который инициировал запрос на получение ключа.</p></td> </tr> <tr class="even"> <td align="left"><p>Компьютер</p></td> <td align="left"><p>Имя компьютера, на котором был восстановлен компьютер.</p></td> </tr> <tr class="odd"> <td align="left"><p>Тип ключа</p></td> <td align="left"><p>Тип ключа, запрошенный пользователем службы технической поддержки или конечным пользователем. Ниже перечислены три типа ключей, которые MBAM собирает.</p> <ul> <li><p>Пароль ключа восстановления (используется для восстановления компьютера в режиме восстановления)</p></li> <li><p>ИД ключа восстановления (используется для восстановления компьютера в режиме восстановления от имени другого пользователя)</p></li> <li><p>Хеш пароля TPM (используется для восстановления компьютера с заблокированным доверенным платформенным модулем)</p></li> </ul></td> </tr> <tr class="even"> <td align="left"><p>Описание причины</p></td> <td align="left"><p>Причина, по которой указанный тип ключа запрашивался пользователем службы поддержки или конечным пользователем. Причины указаны в разделе Восстановление диска и управление функциями доверенного платформенного модуля на веб-сайте администрирования и мониторинга. Допустимые значения — это введенный пользователем текст или один из указанных ниже кодов причин.</p> <ul> <li><p>Порядок загрузки операционной системы изменился</p></li> <li><p>BIOS изменилась</p></li> <li><p>Изменены файлы операционной системы</p></li> <li><p>Потерянный ключ запуска</p></li> <li><p>Потерянный ПИН-код</p></li> <li><p>Сброс доверенного платформенного модуля</p></li> <li><p>Утеряна парольная фраза</p></li> <li><p>Потерялась смарт-карта</p></li> <li><p>Сброс блокировки ПИН-кода</p></li> <li><p>Включить доверенный платформенный модуль</p></li> <li><p>Отключение доверенного платформенного модуля</p></li> <li><p>Изменение пароля доверенного платформенного модуля</p></li> <li><p>Очистить доверенный платформенный модуль</p></li> </ul></td> </tr> </tbody> </table> **Примечание.** Результаты отчета можно сохранить в файл, нажав кнопку " **Экспорт** " в строке меню " **отчеты** ". ## Статьи по теме [Мониторинг и создание отчетов по соответствию BitLocker с помощью MBAM 2.5](monitoring-and-reporting-bitlocker-compliance-with-mbam-25.md) [Создание изолированных отчетов MBAM 2.5](generating-mbam-25-stand-alone-reports.md) ## У вас есть предложение MBAM? - Здесь вы можете добавить предложения и проголосовать [здесь](http://mbam.uservoice.com/forums/268571-microsoft-bitlocker-administration-and-monitoring). - Для MBAM проблемы используйте [MBAM Форум TechNet](https://social.technet.microsoft.com/Forums/home?forum=mdopmbam).
43.521628
478
0.746024
rus_Cyrl
0.881839
d5cb5d81b73b466e19b80694a7d358dd2e124fe7
278
md
Markdown
add/metadata/System.Web.UI.WebControls/GridViewPageEventArgs.meta.md
loreley-larisa/dotnet-api-docs
d42d6e7178e293d24939d4a3bd5b2f43973c82ba
[ "CC-BY-4.0", "MIT" ]
null
null
null
add/metadata/System.Web.UI.WebControls/GridViewPageEventArgs.meta.md
loreley-larisa/dotnet-api-docs
d42d6e7178e293d24939d4a3bd5b2f43973c82ba
[ "CC-BY-4.0", "MIT" ]
null
null
null
add/metadata/System.Web.UI.WebControls/GridViewPageEventArgs.meta.md
loreley-larisa/dotnet-api-docs
d42d6e7178e293d24939d4a3bd5b2f43973c82ba
[ "CC-BY-4.0", "MIT" ]
1
2019-03-27T19:35:47.000Z
2019-03-27T19:35:47.000Z
--- uid: System.Web.UI.WebControls.GridViewPageEventArgs ms.author: "riande" --- --- uid: System.Web.UI.WebControls.GridViewPageEventArgs.#ctor(System.Int32) ms.author: "riande" --- --- uid: System.Web.UI.WebControls.GridViewPageEventArgs.NewPageIndex ms.author: "riande" ---
18.533333
72
0.744604
yue_Hant
0.606706
d5cbcbcd9b6118a51eca1231857fb1bd874f8ebb
651
md
Markdown
docs/api/nn/conv.md
marcelroed/equinox
3804a8d60217bde685bee0a893a7bd55b1e63c26
[ "Apache-2.0" ]
null
null
null
docs/api/nn/conv.md
marcelroed/equinox
3804a8d60217bde685bee0a893a7bd55b1e63c26
[ "Apache-2.0" ]
null
null
null
docs/api/nn/conv.md
marcelroed/equinox
3804a8d60217bde685bee0a893a7bd55b1e63c26
[ "Apache-2.0" ]
null
null
null
# Convolutional ::: equinox.nn.Conv selection: members: - __init__ - __call__ --- ::: equinox.nn.ConvTranspose selection: members: - __init__ - __call__ --- ::: equinox.nn.Conv1d selection: members: false --- ::: equinox.nn.Conv2d selection: members: false --- ::: equinox.nn.Conv3d selection: members: false --- ::: equinox.nn.ConvTranspose1d selection: members: false --- ::: equinox.nn.ConvTranspose2d selection: members: false --- ::: equinox.nn.ConvTranspose3d selection: members: false
12.519231
30
0.545315
eng_Latn
0.43974
d5cbcffb5d4dcfcb2224e17f20969f3dbe880da3
2,809
md
Markdown
_posts/2020-06-26-leetcode-interview-0201.md
codeFarmer1118/qilixiang.github.io
c94d7becfc1590049a9919547c74029f16e45eed
[ "Apache-2.0" ]
7
2017-09-24T11:53:14.000Z
2017-12-25T10:09:07.000Z
_posts/2020-06-26-leetcode-interview-0201.md
whvixd/qilixiang.github.io
ee4d26f94ab08850b92188d605aec2e01246e2d2
[ "Apache-2.0" ]
null
null
null
_posts/2020-06-26-leetcode-interview-0201.md
whvixd/qilixiang.github.io
ee4d26f94ab08850b92188d605aec2e01246e2d2
[ "Apache-2.0" ]
null
null
null
--- layout: post title: leetcode interview 0201 subtitle: 移除重复节点 date: 2020-06-26 author: Static header-img: catalog: true tags: - leetcode之每日一题 --- > 题目链接:[https://leetcode-cn.com/problems/remove-duplicate-node-lcci/](https://leetcode-cn.com/problems/remove-duplicate-node-lcci/) ## 题目描述 <html> <img src="/img/leetcode/leetcode-interview-0201.png" width="700" height="700" /> </html> --- ## 分析 #### 1. 双重循环 --- ## 代码实现 ```java public enum QInterview0201 { instance; public ListNode removeDuplicateNodes(ListNode head) { ListNode p=head; while (p!=null){ ListNode r=p; while (r.next!=null){ if(p.val==r.next.val){ // 删除重复节点 r.next=r.next.next; continue; } r=r.next; } p=p.next; } return head; } public static void main(String[] args) { ListNode node1 = ListNode.createByArray(new int[]{1, 2, 3, 3, 2, 1}); QInterview0201.instance.removeDuplicateNodes(node1); // assert [1, 2, 3] ListNode.print(node1); ListNode node2 = ListNode.createByArray(new int[]{1, 1, 1, 1, 2}); QInterview0201.instance.removeDuplicateNodes(node2); // assert [1, 2] ListNode.print(node2); } } ``` > **ListNode.java** ```java public class ListNode { public int val; public ListNode next; public ListNode(){} public ListNode(int x) { val = x; } public static void print(ListNode l, String preMessage, String postMessage) { preMessage=preMessage==null?"":preMessage; postMessage=postMessage==null?"":postMessage; ListNode head = l; StringBuilder sb = new StringBuilder(); sb.append(preMessage); while (head != null) { sb.append(head.val); head = head.next; if (head != null) { sb.append("->"); } } sb.append(postMessage); System.out.println(sb); } public static void print(ListNode l) { print(l, null, null); } public static void print(String preMessage, ListNode l) { print(l, preMessage, null); } public static void print(ListNode l, String postMessage) { print(l, null, postMessage); } public static ListNode createByArray(int[] array){ if(array.length==0) return null; ListNode head =new ListNode(0); ListNode point=head; for(int e:array){ point=point.next=new ListNode(e); } return head.next; } } ``` **If you want to live in happiness,you should love your life. (Britain)Johnson** > 要想生活快乐,就必须热爱生活。-- \[英] 约翰逊
22.837398
131
0.555714
kor_Hang
0.200635
d5cbd6d9c9c1e1657c7da744665b6e07b7f1195b
16,119
md
Markdown
Agile_process.md
kbase/project_guides
2973668ebf5278f7b78f0811e45d0721d5dcaf25
[ "MIT" ]
8
2015-04-15T22:07:14.000Z
2020-11-03T15:43:02.000Z
Agile_process.md
kbase/project_guides
2973668ebf5278f7b78f0811e45d0721d5dcaf25
[ "MIT" ]
69
2015-04-02T01:30:06.000Z
2020-05-11T20:15:59.000Z
Agile_process.md
kbase/project_guides
2973668ebf5278f7b78f0811e45d0721d5dcaf25
[ "MIT" ]
41
2015-04-02T00:40:14.000Z
2020-11-01T01:45:04.000Z
## Overview In an Agile development process requirements and solutions evolve through collaboration between cross-functional teams. It promotes adaptive planning, evolutionary development, early delivery, continuous improvement, and encourages rapid and flexible response to change. In addition, it promotes ownership, accountability and transparency by requiring all members to contribute and visibly communicating the current priorities and progress on active priorities. The KBase Executive Committee will prioritize Campaigns (one to two month long development efforts for 3-5 people) that can be completed in one or more Sprints (two weeks of effort for 3-5 people). KBase will run 2-week Sprint sessions with four teams. Each team would have 3-5 members. A Sprint team would have a product owner (the person responsible for ensuring the product is done right as a whole); the product owner could change from Sprint to Sprint based on what is being targeted. The Sprint Teams may also change composition, but we would try to avoid too much change since building up a strong functional team is an important component of Agile. A key principle of Agile is iterative improvement. This applies to the process, as well as development. Consequently, the process should evolve based on experience and feedback. The proposal below should be thought of as a starting point that will be improved through an explicit Retrospective process that improves after every 2 week Sprint cycle. ## Team Configurations Fundamentally, co-localization supports high bandwidth discussion and communication. However, because of the distributed nature of the KBase project, we will have some teams with members that are from multiple sites. We will aim for a balance. The team compositions can and will change, but we will aim for continuity as much as possible since this helps build familiarity and camaraderie. The LRM (Fernando Perez) and Production Lead (Shane Canon) will be responsible for balancing team composition before each Sprint. Members of a Sprint should be working on the Sprint tasks for at least 60% time during the Sprint window (i.e. 6/10 days) and available for discussion throughout. Staff that are at fractional effort or have a small amount of effort allocated to “Sprint-able” Teams should consolidate time and communicate when they will be available. Product Owners may be chosen from outside the Production boxes, for example, when a person has a firm understanding of what needs to be delivered for a specific item. As described below, each sprint will start with a team meeting to decide on scoping, roles and task breakdown. Each sprint team will have a designated representative that attends a Sprint Oversight meeting. These will occur one to two times a week and are meant to identify any conflicts between Sprint teams. However, it is likely that the Production Lead and LRM will attempt to select Sprints such that the tasks are non-overlapping/interacting. Depending on the sprint goals, we will experiment with having members of the UE documentation team be part of the sprint teams to help create documentation and tutorials. ### Non-Sprint Personnel Some team members posses critical science knowledge. These members may be assigned to specific teams or designated as product owners when a deliverable aligns with their expertise. For KBase developers who are very low percent effort, or are otherwise unable to join a Sprint, they will coordinate with their box lead to identify tasks. ## Sprint Cycle We will use a two week Sprint Cycle. At first we will include a one week period between each Sprint or every two Sprints to capture cleanup items, maintenance, and other tasks that don’t neatly fit into a Sprint model. Over time we will try to reduce these. - Each Sprint will start with a two hour planning meeting with the Product Owner and Team members (described below). - Each Sprint Team should have a short (15 minutes) daily meeting to cover what was done the previous day, what is on deck for that day, and any critical blockers. - The Sprints will end with a Retrospective. This will be used to assess how much of the Campaign the Sprint accomplished, remaining or incomplete items will return to the Campaigns backlog. New items that come up during the Sprint will also be added to the backlog. The Retrospective will also be used to discuss any lessons learned during the Sprint and suggest changes. <table> <tbody> <tr class="odd"> <td align="left"></td> <td align="left">Monday</td> <td align="left">Tuesday</td> <td align="left">Wednesday</td> <td align="left">Thursday</td> <td align="left">Friday</td> </tr> <tr class="even"> <td align="left">Week 1</td> <td align="left">Planning Meeting</td> <td align="left">Daily</td> <td align="left">Daily</td> <td align="left">Daily</td> <td align="left">Daily</td> </tr> <tr class="odd"> <td align="left">Week 2</td> <td align="left">Daily</td> <td align="left">Daily</td> <td align="left">Daily</td> <td align="left">Daily</td> <td align="left"><p>Sprint</p> <p>Retrospective</p></td> </tr> <tr class="even"> <td align="left"><p>Week 3</p> <p>[maintenance &amp; steady state activities]</p></td> <td align="left">Report out to all@kbase</td> <td align="left">E.C. evaluation</td> <td align="left">E.C. reprioritization</td> <td align="left">Team and Product Owner assignments</td> <td align="left"></td> </tr> </tbody> </table> ## Deliverables: Sprints and Campaigns Deliverables will be split into Sprints and Campaigns. A deliverable (Sprint or Campaign) should result in a complete “product” that, usually, results in a user visible item (i.e. a new feature or component). However, some items may be more internal (i.e. architecture changes, refactoring). For deliverables that are too big for a Sprint, they will be organized in Campaigns which can include multiple Sprints. However, Campaigns shouldn’t exceed four Sprints. This is to avoid having deliverables that take too long to provide a finished product which delays feedback. Problems that require long-term thinking and effort, such as the repayment of technical debt, architectural evolution or the replacement of a major component, should still be able to break down the long-term problem into campaigns and then further into sprints. This encourages a focus of these efforts into cycles where concrete feedback and outcomes can be attained. ## Priority List (Product Backlog) The project will maintain a global publicly visible priority list of deliverables. This list will be maintained by the EC with input from the Production Leads, Science Engagement, and User Engagement. This list is a living document that will be updated periodically both to reflect completed work but also changing priorities. Prior to each Sprint, the Production Leads and LRM will determine which major Sprints or Campaigns will be tackled during the next Sprint cycle. This selection will be shared with the entire project. In general, the highest priorities will be selected, but conflicts, resource balancing or critical maintenance items may influence the selection. Deferring an item shouldn’t be problematic since the item will likely get prioritized in subsequent sprints. ## Coordination with Science Engagement The Science Engagement team will also participate in the Sprint process. After some initial prototyping is done with the selected collaborators, the collaboration lead will write a campaign doc and submit it to the E.C. for scheduling/prioritization. These campaigns can be for hardening the prototype services, data models and visualizations and pushing the functionality out to the live site. There may also be some situations where SE will need sprints to create the initial prototypes. ## Coordination with User Engagement User Engagement will also be able to create Sprints and Campaigns. There will be situations where UE, based on feedback from users or upcoming outreach events, will initiate campaigns around tutorials or user requested functionality. For example, based on user feedback, UE may determine that by adding a new narrative tree algorithm we could capture a significant number of new users. They would write up a Campaign and submit it to the EC. In another case, UE may determine that they need new material for an upcoming workshop, and this would be a Sprint requiring effort from developers and scientists working with the UE. ## Coordination with Release Engineering We expect that most Sprints will create deployable functionality that will be immediately deployed on CI and next.kbase.us and will eventually move to production in a rapid time-frame (weeks). Some Campaigns may have more disruptive changes (e.g., format changes) that require more significant deployment; those migration and deployment activities should be integrated into the Campaign and include Sprints to address those changes. ## Pre-Sprint Planning After a campaign is selected, the product owner will meet with the sprint team to plan the sprint. During this process, the sprint team and product owner will generate user stories, discuss what the deliverables of each user story entails and select a set of stories to complete during the sprint. At this point, each user story will be broken down into tasks. The user stories can then be shared with the project and individual tasks can be added to JIRA for tracking. The sprint-planning team will be responsible for evaluating each task in the context of KBase wide integration to prevent redundancy, silos and inconsistencies. ## Coordination between Sprint Teams and Box Leads For Sprints that directly impact areas controlled by a box lead, we expect that the Sprint team will include the box lead and/or members of that box. Once or twice a week, there will be a Sprint Oversight meeting. During this meeting the selected representative from each Sprint will meet with the Production Lead, LRM and Box Leads. At this meeting both direct and indirect impacts on Box Areas will be discussed and activity from the Sprints can be reviewed to ensure that design and implementation choices align with the broader project principles and goals. ## Reporting and Tracking The priority list is [maintained and publicly visible here](https://docs.google.com/spreadsheets/d/1RYqniwN816QkaJqRJgsHXqkuIkFZ3S90dVD0RjR4jxk/edit?usp=sharing). As Campaigns are selected for a Sprint Cycle and the planning is completed, the team will create and assign JIRA tickets to track tasks, and below we describe the process for proposing new sprints and campaigns. At the end of each Sprint, the teams will create a formal summary and present the results of their Retrospective on the Monday Report Out Meeting (this summary should be linked into the original Sprint issue that was created when the Sprint was approved). These results may also include lessons learned for improving future Sprints. Each Sprint team will have a half an hour for presentation and discussion. All KBase personnel are invited to attend. These reports can then be used for creating progress reports to DOE. ## Management The primary role of the EC and PIs will be to maintain the prioritization list and provide feedback to the Production Lead and LRM. The Production Lead and LRM are responsible for sequencing Sprints and managing the Sprint Teams. The EC and PI will have opportunities to adjust the priorities during the Sprint-Free week and quarterly Project Planning Meetings. We can also allocate fixed number of sprints per cycle for specific areas. For instance, management may determine that there should always be a UI campaign. ## Process for proposing new sprints or campaigns To propose a new sprint, the process to follow is: 1. Open a new issue on JIRA, and assign to it the issue type "Proposed Sprint" (we don't have a separate type for sprints and campaigns): ![Proposed sprint screenshot](images/jira-proposed-sprint.png) 2. Provide in the *Summary* field a one sentece description of the sprint. 2. Fill out the *Description* field with a body of text according to the template in the section immediately below. It should be relatively concise, but try to answer each of these questions clearly, so that the group leads and KBase executive committee can use this information to decide whether to accept your proposal and put it into the sprint pipeline. 2. Assign it to Shane Canon, the production lead. 2. List any components you may think it impacts, if you know in advance. 2. At this time, don't bother adding Epic/Theme or Sprint labels yet, as those will be added if the sprint is actually accepted for execution later on. ### Template **Why it’s important:** Explain why KBase should do this.  How will it help make KBase unique, bring in users, improve the system, etc.  Why is it more important for KBase to do this compared to other priorities. **What needs to be done?** Provide a brief paragraph describing what has to be done including new data types, new UI pieces, example, etc.  Be complete but avoid going into implementation details.  This is more about understanding the scope of the activity versus exactly how it will be done. **Estimated Number of Sprints:** X sprints **Key Staff:** List important staff needed for the Sprint and what specific skills and knowledge they provide. **Dependencies:**  List any other campaigns, sprints, or activities that impact your proposed sprint or campaign. ### Evaluation of sprint proposals Once a sprint/campaign proposal is submitted, there may be discussion and questions about it directly on the JIRA ticket. The members of the KBase Executive Committee, who ultimately will make the decisions on which sprints to put into the implementation pipeline, will be added as watchers to the ticket so they have a chance to comment. Then, during the next maintenance week, the EC will include in its evaluation and re-prioritization decisions (that normally consider the outcome of the just-finished sprint cycle) any new proposals that have arrived. This will allow the EC to weigh these proposals in the context of the outcomes and feedback of the recently concluded sprint cycle. The EC can decide to assign the proposals either to immediate execution in the next cycle, to be put in the queue for a later cycle, or it can decline the proposal. If a proposal is accepted, it will be given a sprint label and an epic/theme in JIRA so it can be sorted accordingly, and it will be re-assigned to its ultimate product owner. If a proposal is rejected, the rejection type will be one of: * *Reject*: As written, this proposal is not going to happen, and the reasons why will be communicated. * *Reconsider*: We foresee doing this, but it needs to wait for N sprint cycles to be re-evaluated. The resolution should specify what is blocking and how many cycles to wait before resubmission (point at which, there may be new information to consider). * *Not discussed*: We didn't get around to talking about it; we will get to it next time. This is not ideal, but realistically it will happen sometimes. This information will be recorded in the proposal ticket, so the submitter will have a record of the decision. # Remaining questions These are a few questions that arose in the previous PR regarding how the Agile development process and decisions are made. We should at least clarify some of them: * A request for more transparency from EC on decision process: agenda and outcomes, as they pertain to the development process, should be shared with the team. * How is work outside of the sprint cycles reported, managed, or decided on? * Does the Executive committee review work that is not part of the sprint cycles? * How do the working teams get a finer-granularity and updated description of priorities and project vision? This seems critically necessary to have clear objectives and goals that to plan against. Basically, a dynamic, living version of the project high-level roadmap that is updated periodically by the EC.
45.792614
144
0.791426
eng_Latn
0.999662
d5cbea5817950cfc3a294023af21e2add1855fb4
1,974
md
Markdown
docs/extend/reference/client/context.md
geverghe/vsts-docs
e5047a149ea3e93e52ab49c7e6d653b418e817a5
[ "CC-BY-4.0", "MIT" ]
1
2020-03-03T18:57:40.000Z
2020-03-03T18:57:40.000Z
docs/extend/reference/client/context.md
geverghe/vsts-docs
e5047a149ea3e93e52ab49c7e6d653b418e817a5
[ "CC-BY-4.0", "MIT" ]
null
null
null
docs/extend/reference/client/context.md
geverghe/vsts-docs
e5047a149ea3e93e52ab49c7e6d653b418e817a5
[ "CC-BY-4.0", "MIT" ]
2
2020-02-06T06:41:54.000Z
2021-07-14T10:42:31.000Z
--- ms.prod: devops ms.technology: devops-ecosystem title: Web Context | Extensions for Azure DevOps Services description: Context data available in your web extensions ms.assetid: b926a050-1e70-4907-8963-e4f2ee9939e5 ms.manager: mijacobs ms.author: chcomley author: chcomley ms.topic: article monikerRange: '>= tfs-2017' ms.date: 08/04/2016 --- # Web context The `core SDK` provides an API for getting context information, for example the current project's ID (if your extension is operating at a project or team level). ### Usage #### Example ```json { "id": "my-extension", ... "baseUri": "https://{{account.name}}.myservice.com/my-extension/{{project.id}}" } ``` ### Full JSON example ```json { "user": { "id": "d6245f20-2af8-44f4-9451-8107cb2767db", "name": "Norman Paulk", "email": "[email protected]", "uniqueName": "[email protected]" }, "team": { "id": "a63ff425-76b0-4dac-9b81-b265fb361da4", "name": "Quality assurance", "userIsMember": true, "userIsAdmin": true }, "project": { "id": "c501f0f0-9dca-40a3-ac5a-4d2d9a4a1825", "name": "Fabrikam-Fiber-Git" }, "collection": { "id": "7696cd7b-25fd-4378-b5f2-7c97228ee542", "name": "DefaultCollection", "uri": "https://dev.azure.com/fabrikam/DefaultCollection/", "relativeUri": "/DefaultCollection/" }, "account": { "id": "dab4b99d-4317-4b8a-98b8-f02ecaceb5b4", "name": "fabrikam", "uri": "https://dev.azure.com/fabrikam/", "relativeUri": "/" }, "host": { "id": "7696cd7b-25fd-4378-b5f2-7c97228ee542", "name": "DefaultCollection", "uri": "https://dev.azure.com/fabrikam/DefaultCollection/", "relativeUri": "/DefaultCollection/", "hostType": "projectCollection", "scheme": "https", "authority": "dev.azure.com/fabrikam" } } ```
25.307692
161
0.609422
yue_Hant
0.151483
d5cc3b4685295664577e4e46b6af9e04e5689e5c
500
md
Markdown
errors/no-color.md
zicht/zss
97d0d7f57fad7c5d59c294d644d0e57767d26dac
[ "MIT" ]
18
2017-09-12T11:55:24.000Z
2022-03-08T10:20:38.000Z
errors/no-color.md
zicht/zss
97d0d7f57fad7c5d59c294d644d0e57767d26dac
[ "MIT" ]
28
2017-09-14T09:18:25.000Z
2021-09-10T12:20:47.000Z
errors/no-color.md
zicht/zss
97d0d7f57fad7c5d59c294d644d0e57767d26dac
[ "MIT" ]
4
2017-12-12T13:14:36.000Z
2021-07-26T17:23:34.000Z
# No color #### Why this error occurred The mixin `get-color` is called with a color name that is not defined in `$zss--colors`. #### Possible ways to fix it The error message contains the name of the invalid color. Check the definition of `$zss--colors` and either: - find the invalid call in your Sass source code and change the parameter of `get-color` to a value that _is_ defined in `$zss--colors`. - add the missing name as a key/value pair to the `$zss--colors` map, e.g. `orange: #f90`.
35.714286
108
0.718
eng_Latn
0.998504
d5ccf2e9271624258fdd3fba96d56671fd4a0a63
31,655
md
Markdown
articles/virtual-machines/workloads/sap/sap-high-availability-installation-wsfc-shared-disk.md
fuatrihtim/azure-docs.tr-tr
6569c5eb54bdab7488b44498dc4dad397d32f1be
[ "CC-BY-4.0", "MIT" ]
null
null
null
articles/virtual-machines/workloads/sap/sap-high-availability-installation-wsfc-shared-disk.md
fuatrihtim/azure-docs.tr-tr
6569c5eb54bdab7488b44498dc4dad397d32f1be
[ "CC-BY-4.0", "MIT" ]
null
null
null
articles/virtual-machines/workloads/sap/sap-high-availability-installation-wsfc-shared-disk.md
fuatrihtim/azure-docs.tr-tr
6569c5eb54bdab7488b44498dc4dad397d32f1be
[ "CC-BY-4.0", "MIT" ]
null
null
null
--- title: Azure 'da SAP ASCS/SCS örneği için Windows Yük devretme kümesine ve paylaşılan diske SAP NetWeaver HA 'yi yüklemeyin | Microsoft Docs description: SAP NetWeaver HA 'yi bir Windows Yük devretme kümesine ve paylaşılan diske bir SAP ASCS/SCS örneği için nasıl yükleyeceğinizi öğrenin. services: virtual-machines-windows,virtual-network,storage documentationcenter: saponazure author: rdeltcheva manager: juergent editor: '' tags: azure-resource-manager keywords: '' ms.assetid: 6209bcb3-5b20-4845-aa10-1475c576659f ms.service: virtual-machines-sap ms.topic: article ms.tgt_pltfrm: vm-windows ms.workload: infrastructure-services ms.date: 08/12/2020 ms.author: radeltch ms.custom: H1Hack27Feb2017 ms.openlocfilehash: 12cfd39cf1358dcef79c3843627f0b45dc688c9e ms.sourcegitcommit: 910a1a38711966cb171050db245fc3b22abc8c5f ms.translationtype: MT ms.contentlocale: tr-TR ms.lasthandoff: 03/20/2021 ms.locfileid: "101667943" --- # <a name="install-sap-netweaver-ha-on-a-windows-failover-cluster-and-shared-disk-for-an-sap-ascsscs-instance-in-azure"></a>Azure 'da SAP ASCS/SCS örneği için Windows Yük devretme kümesine ve paylaşılan diske SAP NetWeaver HA 'yi yüklemeyin [1928533]:https://launchpad.support.sap.com/#/notes/1928533 [1999351]:https://launchpad.support.sap.com/#/notes/1999351 [2015553]:https://launchpad.support.sap.com/#/notes/2015553 [2178632]:https://launchpad.support.sap.com/#/notes/2178632 [2243692]:https://launchpad.support.sap.com/#/notes/2243692 [sap-installation-guides]:http://service.sap.com/instguides [azure-resource-manager/management/azure-subscription-service-limits]:../../../azure-resource-manager/management/azure-subscription-service-limits.md [azure-resource-manager/management/azure-subscription-service-limits-subscription]:../../../azure-resource-manager/management/azure-subscription-service-limits.md [dbms-guide]:../../virtual-machines-windows-sap-dbms-guide.md [deployment-guide]:deployment-guide.md [dr-guide-classic]:https://go.microsoft.com/fwlink/?LinkID=521971 [getting-started]:get-started.md [ha-guide]:sap-high-availability-guide.md [sap-high-availability-architecture-scenarios]:sap-high-availability-architecture-scenarios.md [sap-high-availability-guide-wsfc-shared-disk]:sap-high-availability-guide-wsfc-shared-disk.md [sap-high-availability-guide-wsfc-file-share]:sap-high-availability-guide-wsfc-file-share.md [sap-ascs-high-availability-multi-sid-wsfc]:sap-ascs-high-availability-multi-sid-wsfc.md [sap-high-availability-infrastructure-wsfc-shared-disk]:sap-high-availability-infrastructure-wsfc-shared-disk.md [sap-high-availability-installation-wsfc-shared-disk]:sap-high-availability-installation-wsfc-shared-disk.md [sap-ha-guide-8.9]:high-availability-guide.md#fe0bd8b5-2b43-45e3-8295-80bee5415716 [sap-ha-guide-8.11]:high-availability-guide.md#661035b2-4d0f-4d31-86f8-dc0a50d78158 [sap-hana-ha]:sap-hana-high-availability.md [sap-suse-ascs-ha]:high-availability-guide-suse.md [planning-guide]:planning-guide.md [planning-guide-11]:planning-guide.md [planning-guide-2.1]:planning-guide.md#1625df66-4cc6-4d60-9202-de8a0b77f803 [planning-guide-2.2]:planning-guide.md#f5b3b18c-302c-4bd8-9ab2-c388f1ab3d10 [planning-guide-microsoft-azure-networking]:planning-guide.md#61678387-8868-435d-9f8c-450b2424f5bd [planning-guide-storage-microsoft-azure-storage-and-data-disks]:planning-guide.md#a72afa26-4bf4-4a25-8cf7-855d6032157f [sap-high-availability-infrastructure-wsfc-shared-disk]:sap-high-availability-infrastructure-wsfc-shared-disk.md [sap-ha-guide-figure-1000]:./media/virtual-machines-shared-sap-high-availability-guide/1000-wsfc-for-sap-ascs-on-azure.png [sap-ha-guide-figure-1001]:./media/virtual-machines-shared-sap-high-availability-guide/1001-wsfc-on-azure-ilb.png [sap-ha-guide-figure-1002]:./media/virtual-machines-shared-sap-high-availability-guide/1002-wsfc-sios-on-azure-ilb.png [sap-ha-guide-figure-2000]:./media/virtual-machines-shared-sap-high-availability-guide/2000-wsfc-sap-as-ha-on-azure.png [sap-ha-guide-figure-2001]:./media/virtual-machines-shared-sap-high-availability-guide/2001-wsfc-sap-ascs-ha-on-azure.png [sap-ha-guide-figure-2003]:./media/virtual-machines-shared-sap-high-availability-guide/2003-wsfc-sap-dbms-ha-on-azure.png [sap-ha-guide-figure-2004]:./media/virtual-machines-shared-sap-high-availability-guide/2004-wsfc-sap-ha-e2e-archit-template1-on-azure.png [sap-ha-guide-figure-2005]:./media/virtual-machines-shared-sap-high-availability-guide/2005-wsfc-sap-ha-e2e-arch-template2-on-azure.png [sap-ha-guide-figure-3000]:./media/virtual-machines-shared-sap-high-availability-guide/3000-template-parameters-sap-ha-arm-on-azure.png [sap-ha-guide-figure-3001]:./media/virtual-machines-shared-sap-high-availability-guide/3001-configuring-dns-servers-for-Azure-vnet.png [sap-ha-guide-figure-3002]:./media/virtual-machines-shared-sap-high-availability-guide/3002-configuring-static-IP-address-for-network-card-of-each-vm.png [sap-ha-guide-figure-3003]:./media/virtual-machines-shared-sap-high-availability-guide/3003-setup-static-ip-address-ilb-for-ascs-instance.png [sap-ha-guide-figure-3004]:./media/virtual-machines-shared-sap-high-availability-guide/3004-default-ascs-scs-ilb-balancing-rules-for-azure-ilb.png [sap-ha-guide-figure-3005]:./media/virtual-machines-shared-sap-high-availability-guide/3005-changing-ascs-scs-default-ilb-rules-for-azure-ilb.png [sap-ha-guide-figure-3006]:./media/virtual-machines-shared-sap-high-availability-guide/3006-adding-vm-to-domain.png [sap-ha-guide-figure-3007]:./media/virtual-machines-shared-sap-high-availability-guide/3007-config-wsfc-1.png [sap-ha-guide-figure-3008]:./media/virtual-machines-shared-sap-high-availability-guide/3008-config-wsfc-2.png [sap-ha-guide-figure-3009]:./media/virtual-machines-shared-sap-high-availability-guide/3009-config-wsfc-3.png [sap-ha-guide-figure-3010]:./media/virtual-machines-shared-sap-high-availability-guide/3010-config-wsfc-4.png [sap-ha-guide-figure-3011]:./media/virtual-machines-shared-sap-high-availability-guide/3011-config-wsfc-5.png [sap-ha-guide-figure-3012]:./media/virtual-machines-shared-sap-high-availability-guide/3012-config-wsfc-6.png [sap-ha-guide-figure-3013]:./media/virtual-machines-shared-sap-high-availability-guide/3013-config-wsfc-7.png [sap-ha-guide-figure-3014]:./media/virtual-machines-shared-sap-high-availability-guide/3014-config-wsfc-8.png [sap-ha-guide-figure-3015]:./media/virtual-machines-shared-sap-high-availability-guide/3015-config-wsfc-9.png [sap-ha-guide-figure-3016]:./media/virtual-machines-shared-sap-high-availability-guide/3016-config-wsfc-10.png [sap-ha-guide-figure-3017]:./media/virtual-machines-shared-sap-high-availability-guide/3017-config-wsfc-11.png [sap-ha-guide-figure-3018]:./media/virtual-machines-shared-sap-high-availability-guide/3018-config-wsfc-12.png [sap-ha-guide-figure-3019]:./media/virtual-machines-shared-sap-high-availability-guide/3019-assign-permissions-on-share-for-cluster-name-object.png [sap-ha-guide-figure-3020]:./media/virtual-machines-shared-sap-high-availability-guide/3020-change-object-type-include-computer-objects.png [sap-ha-guide-figure-3021]:./media/virtual-machines-shared-sap-high-availability-guide/3021-check-box-for-computer-objects.png [sap-ha-guide-figure-3022]:./media/virtual-machines-shared-sap-high-availability-guide/3022-set-security-attributes-for-cluster-name-object-on-file-share-quorum.png [sap-ha-guide-figure-3023]:./media/virtual-machines-shared-sap-high-availability-guide/3023-call-configure-cluster-quorum-setting-wizard.png [sap-ha-guide-figure-3024]:./media/virtual-machines-shared-sap-high-availability-guide/3024-selection-screen-different-quorum-configurations.png [sap-ha-guide-figure-3025]:./media/virtual-machines-shared-sap-high-availability-guide/3025-selection-screen-file-share-witness.png [sap-ha-guide-figure-3026]:./media/virtual-machines-shared-sap-high-availability-guide/3026-define-file-share-location-for-witness-share.png [sap-ha-guide-figure-3027]:./media/virtual-machines-shared-sap-high-availability-guide/3027-successful-reconfiguration-cluster-file-share-witness.png [sap-ha-guide-figure-3028]:./media/virtual-machines-shared-sap-high-availability-guide/3028-install-dot-net-framework-35.png [sap-ha-guide-figure-3029]:./media/virtual-machines-shared-sap-high-availability-guide/3029-install-dot-net-framework-35-progress.png [sap-ha-guide-figure-3030]:./media/virtual-machines-shared-sap-high-availability-guide/3030-sios-installer.png [sap-ha-guide-figure-3031]:./media/virtual-machines-shared-sap-high-availability-guide/3031-first-screen-sios-data-keeper-installation.png [sap-ha-guide-figure-3032]:./media/virtual-machines-shared-sap-high-availability-guide/3032-data-keeper-informs-service-be-disabled.png [sap-ha-guide-figure-3033]:./media/virtual-machines-shared-sap-high-availability-guide/3033-user-selection-sios-data-keeper.png [sap-ha-guide-figure-3034]:./media/virtual-machines-shared-sap-high-availability-guide/3034-domain-user-sios-data-keeper.png [sap-ha-guide-figure-3035]:./media/virtual-machines-shared-sap-high-availability-guide/3035-provide-sios-data-keeper-license.png [sap-ha-guide-figure-3036]:./media/virtual-machines-shared-sap-high-availability-guide/3036-data-keeper-management-config-tool.png [sap-ha-guide-figure-3037]:./media/virtual-machines-shared-sap-high-availability-guide/3037-tcp-ip-address-first-node-data-keeper.png [sap-ha-guide-figure-3038]:./media/virtual-machines-shared-sap-high-availability-guide/3038-create-replication-sios-job.png [sap-ha-guide-figure-3039]:./media/virtual-machines-shared-sap-high-availability-guide/3039-define-sios-replication-job-name.png [sap-ha-guide-figure-3040]:./media/virtual-machines-shared-sap-high-availability-guide/3040-define-sios-source-node.png [sap-ha-guide-figure-3041]:./media/virtual-machines-shared-sap-high-availability-guide/3041-define-sios-target-node.png [sap-ha-guide-figure-3042]:./media/virtual-machines-shared-sap-high-availability-guide/3042-define-sios-synchronous-replication.png [sap-ha-guide-figure-3043]:./media/virtual-machines-shared-sap-high-availability-guide/3043-enable-sios-replicated-volume-as-cluster-volume.png [sap-ha-guide-figure-3044]:./media/virtual-machines-shared-sap-high-availability-guide/3044-data-keeper-synchronous-mirroring-for-SAP-gui.png [sap-ha-guide-figure-3045]:./media/virtual-machines-shared-sap-high-availability-guide/3045-replicated-disk-by-data-keeper-in-wsfc.png [sap-ha-guide-figure-3046]:./media/virtual-machines-shared-sap-high-availability-guide/3046-dns-entry-sap-ascs-virtual-name-ip.png [sap-ha-guide-figure-3046-ers2]:./media/virtual-machines-shared-sap-high-availability-guide/3046-dns-entry-sap-ers2-virtual-name-ip.png [sap-ha-guide-figure-3047]:./media/virtual-machines-shared-sap-high-availability-guide/3047-dns-manager.png [sap-ha-guide-figure-3048]:./media/virtual-machines-shared-sap-high-availability-guide/3048-default-cluster-probe-port.png [sap-ha-guide-figure-3049]:./media/virtual-machines-shared-sap-high-availability-guide/3049-cluster-probe-port-after.png [sap-ha-guide-figure-3050]:./media/virtual-machines-shared-sap-high-availability-guide/3050-service-type-ers-delayed-automatic.png [sap-ha-guide-figure-5000]:./media/virtual-machines-shared-sap-high-availability-guide/5000-wsfc-sap-sid-node-a.png [sap-ha-guide-figure-5001]:./media/virtual-machines-shared-sap-high-availability-guide/5001-sios-replicating-local-volume.png [sap-ha-guide-figure-5002]:./media/virtual-machines-shared-sap-high-availability-guide/5002-wsfc-sap-sid-node-b.png [sap-ha-guide-figure-5003]:./media/virtual-machines-shared-sap-high-availability-guide/5003-sios-replicating-local-volume-b-to-a.png [sap-ha-guide-figure-6003]:./media/virtual-machines-shared-sap-high-availability-guide/6003-sap-multi-sid-full-landscape.png [sap-templates-3-tier-multisid-xscs-marketplace-image]:https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2Fazure-quickstart-templates%2Fmaster%2Fsap-3-tier-marketplace-image-multi-sid-xscs%2Fazuredeploy.json [sap-templates-3-tier-multisid-xscs-marketplace-image-md]:https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2Fazure-quickstart-templates%2Fmaster%2Fsap-3-tier-marketplace-image-multi-sid-xscs-md%2Fazuredeploy.json [sap-templates-3-tier-multisid-db-marketplace-image]:https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2Fazure-quickstart-templates%2Fmaster%2Fsap-3-tier-marketplace-image-multi-sid-db%2Fazuredeploy.json [sap-templates-3-tier-multisid-db-marketplace-image-md]:https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2Fazure-quickstart-templates%2Fmaster%2Fsap-3-tier-marketplace-image-multi-sid-db-md%2Fazuredeploy.json [sap-templates-3-tier-multisid-apps-marketplace-image]:https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2Fazure-quickstart-templates%2Fmaster%2Fsap-3-tier-marketplace-image-multi-sid-apps%2Fazuredeploy.json [sap-templates-3-tier-multisid-apps-marketplace-image-md]:https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2Fazure-quickstart-templates%2Fmaster%2Fsap-3-tier-marketplace-image-multi-sid-apps-md%2Fazuredeploy.json [virtual-machines-azure-resource-manager-architecture-benefits-arm]:../../../azure-resource-manager/management/overview.md#the-benefits-of-using-resource-manager [virtual-machines-manage-availability]:../../virtual-machines-windows-manage-availability.md Bu makalede, bir SAP ASCS/SCS örneğini Kümelendirmek için bir Windows Server yük devretme kümesi ve Küme Paylaşılan diski kullanılarak Azure 'da yüksek kullanılabilirliğe sahip bir SAP sisteminin nasıl yükleneceği ve yapılandırılacağı açıklanmaktadır. [Mimari kılavuzunda açıklandığı gibi: Küme Paylaşılan diski kullanarak bir Windows Yük devretme KÜMESINDE SAP ASCS/SCS örneği kümeleme][sap-high-availability-guide-wsfc-shared-disk]küme paylaşılan *diski* için iki alternatif vardır: - [Azure paylaşılan diskleri](../../disks-shared.md) - Kümelenmiş paylaşılan diskin benzetimini yapan yansıtılmış depolama alanı oluşturmak için [SIOS Dataman küme sürümünü](https://us.sios.com/products/datakeeper-cluster/) kullanma ## <a name="prerequisites"></a>Önkoşullar Yüklemeye başlamadan önce şu belgeleri gözden geçirin: * [Mimari Kılavuzu: Küme Paylaşılan diski kullanarak bir Windows Yük devretme kümesinde SAP yoks/SCS örneği oluşturma][sap-high-availability-guide-wsfc-shared-disk] * [SAP Ass/SCS örneği için Windows Yük devretme kümesi ve paylaşılan disk kullanarak SAP HA için Azure altyapısını hazırlama][sap-high-availability-infrastructure-wsfc-shared-disk] Bu makaledeki DBMS kurulumunu açıklamamız, çünkü ayarlar kullandığınız DBMS sistemine bağlı olarak değişir. DBMS ile ilgili yüksek kullanılabilirliğe sahip olan sorunların, Azure için farklı DBMS satıcılarının desteklediği işlevlere değinilmesi gerektiğini varsaydık. Oracle veritabanları için SQL Server ve Oracle Data Guard için AlwaysOn veya veritabanı yansıtma örnekleri verilmiştir. DBMS için yüksek kullanılabilirlik senaryoları Bu makalede ele alınmıyor. Farklı DBMS Hizmetleri, Azure 'daki kümelenmiş SAP Ass veya SCS yapılandırmasıyla etkileşen özel önemli noktalar yoktur. > [!NOTE] > SAP NetWeaver ABAP Systems, Java sistemleri ve ABAP + Java sistemlerinin yükleme yordamları neredeyse aynıdır. En önemli fark, SAP ABAP sisteminin bir ASCS örneğine sahip olması gerektiğidir. SAP Java sisteminde bir SCS örneği vardır. SAP ABAP + Java sisteminde bir ASCS örneği ve aynı Microsoft yük devretme kümesi grubunda çalışan bir SCS örneği vardır. Her SAP NetWeaver yükleme yığını için herhangi bir yükleme farkı açıkça bahsedilir. Adımların geri kalanının aynı olduğunu varsayabilirsiniz. ## <a name="install-sap-with-a-high-availability-ascsscs-instance"></a><a name="31c6bd4f-51df-4057-9fdf-3fcbc619c170"></a>Yüksek kullanılabilirliğe sahip bir ASCS/SCS örneğiyle SAP 'yi yükler > [!IMPORTANT] > Paylaşılan disk sunmak için SIOS kullanırsanız, sayfa dosyanızı SIOS veri kullanımı yansıtılmış birimlerine yerleştirmeyin. Sayfa dosyanızı, varsayılan olan bir Azure sanal makinesinin geçici sürücüsünde bırakabilirsiniz. Henüz orada yoksa, Windows sayfa dosyasını Azure sanal makinenizin D sürücüsüne taşıyın. SAP 'yi yüksek kullanılabilirliğe sahip bir ASCS/SCS örneğiyle yüklemek şu görevleri içerir: * Kümelenmiş SAP ASCS/SCS örneği için bir sanal ana bilgisayar adı oluşturun. * İlk küme düğümüne SAP 'yi yükler. * ASCS/SCS örneğinin SAP profilini değiştirin. * Araştırma bağlantı noktası ekleyin. * Windows Güvenlik Duvarı araştırma bağlantı noktasını açın. ### <a name="create-a-virtual-host-name-for-the-clustered-sap-ascsscs-instance"></a><a name="a97ad604-9094-44fe-a364-f89cb39bf097"></a>Kümelenmiş SAP Ass/SCS örneği için sanal ana bilgisayar adı oluşturma 1. Windows DNS Yöneticisi 'nde, yoks/SCS örneğinin sanal ana bilgisayar adı için bir DNS girişi oluşturun. > [!IMPORTANT] > ASCS/SCS örneğinin sanal ana bilgisayar adına atadığınız IP adresi, Azure Load Balancer atadığınız IP adresiyle aynı olmalıdır. ![Şekil 1: SAP ASCS/SCS kümesi sanal adı ve TCP/IP adresi için DNS girişi tanımlama][sap-ha-guide-figure-3046] _SAP ASCS/SCS kümesi sanal adı ve TCP/IP adresi için DNS girişi tanımlayın_ 2. Ayrıca kümelenmiş örnek olan yeni SAP sıraya alma çoğaltma sunucusu 2 ' yi kullanıyorsa, DNS 'de ERS2 için bir sanal ana bilgisayar adı da ayırmanız gerekir. > [!IMPORTANT] > ERS2 örneğinin sanal ana bilgisayar adına atadığınız IP adresi, Azure Load Balancer atadığınız ikinci IP adresi olmalıdır. ![Şekil 1A: SAP ASCS/SCS kümesi sanal adı ve TCP/IP adresi için DNS girişi tanımlama][sap-ha-guide-figure-3046-ers2] _SAP ERS2 kümesi sanal adı ve TCP/IP adresi için DNS girişi tanımlama_ 3. Sanal ana bilgisayar adına atanan IP adresini tanımlamak için **DNS Yöneticisi** > **etki alanı**' nı seçin. ![Şekil 2: SAP Ass/SCS küme yapılandırması için yeni sanal ad ve TCP/IP adresi][sap-ha-guide-figure-3047] _SAP Ass/SCS küme yapılandırması için yeni sanal ad ve TCP/IP adresi_ ### <a name="install-the-sap-first-cluster-node"></a><a name="eb5af918-b42f-4803-bb50-eff41f84b0b0"></a> SAP ilk küme düğümünü yükler 1. Küme düğümü A 'da ilk küme düğümü seçeneğini yürütün. şunu seçin: * **ABAP sistemi**: **ascs** örnek numarası **00** * **Java sistemi**: **SCS** örnek numarası **01** * **ABAP + Java sistemi**: **Ass** örnek numarası **00** ve **SCS** örnek numarası **01** > [!IMPORTANT] > Azure iç yük dengeleyici Yük Dengeleme kurallarında (temel SKU kullanılıyorsa) yapılandırmanın ve seçili SAP örnek numaralarının eşleşmesi gerektiğini unutmayın. 2. Tanımlanan SAP yükleme yordamını izleyin. "Ilk küme düğümü" yükleme başlatma seçeneğinde, "küme paylaşılan disk" öğesini yapılandırma seçeneği olarak seçmek için emin olun. > [!TIP] > SAP yükleme belgeleri, ilk ASCS/SCS küme düğümünün nasıl yükleneceğini açıklar. ### <a name="modify-the-sap-profile-of-the-ascsscs-instance"></a><a name="e4caaab2-e90f-4f2c-bc84-2cd2e12a9556"></a> ASCS/SCS örneğinin SAP profilini değiştirme Sıraya alma çoğaltma sunucusu 1 varsa, aşağıda açıklandığı gibi SAP profili parametresi ekleyin `enque/encni/set_so_keepalive` . Profil parametresi, SAP iş işlemleriyle sıraya alma sunucusu arasındaki bağlantıları çok uzun süre boşta kaldığında kapatmadan önler. SAP parametresi ERS2 için gerekli değildir. 1. ERS1 kullanılıyorsa, bu profile parametresini SAP ASCS/SCS örnek profiline ekleyin. ``` enque/encni/set_so_keepalive = true ``` Hem ERS1 hem de ERS2 için, `keepalive` işletim sistemi PARAMETRELERININ SAP note [1410736](https://launchpad.support.sap.com/#/notes/1410736)' de açıklandığı gibi ayarlandığından emin olun. 2. SAP profili parametre değişikliklerini uygulamak için SAP ASCS/SCS örneğini yeniden başlatın. ### <a name="add-a-probe-port"></a><a name="10822f4f-32e7-4871-b63a-9b86c76ce761"></a> Araştırma bağlantı noktası ekle Tüm küme yapılandırmasının Azure Load Balancer ile çalışmasını sağlamak için iç yük dengeleyicinin araştırma işlevini kullanın. Azure iç yük dengeleyici, genellikle katılan sanal makineler arasında eşit olarak gelen iş yükünü dağıtır. Ancak, yalnızca bir örnek etkin olduğundan, bazı küme yapılandırmalarında bu çalışmaz. Diğer örnek pasif ve iş yükünün hiçbirini kabul edemiyor. Bir araştırma işlevselliği, Azure iç yük dengeleyicinin hangi Örneğin etkin olduğunu algılayarak ve yalnızca etkin örneği hedeflemeye yardımcı olur. > [!IMPORTANT] > Bu örnek yapılandırmada, **Probeport** 620 **NR** olarak ayarlanır. **00** NUMARALı BIR SAP ascs örneği için 620 **00**' dır. Yapılandırmayı SAP örnek numaralarınız ve SAP SID 'niz ile eşleşecek şekilde ayarlamanız gerekecektir. Bir araştırma bağlantı noktası eklemek için, bu PowerShell modülünü küme VM 'lerinden birinde çalıştırın: - SAP ASC/SCS örneği söz konusu olduğunda ```powershell Set-AzureLoadBalancerHealthCheckProbePortOnSAPClusterIPResource -SAPSID SID -ProbePort 62000 ``` - ERS2 kullanıyorsanız, kümelenmiş. Kümelenmemiş olduğundan, ERS1 için araştırma bağlantı noktasını yapılandırmaya gerek yoktur. ```powershell Set-AzureLoadBalancerHealthCheckProbePortOnSAPClusterIPResource -SAPSID SID -ProbePort 62001 -IsSAPERSClusteredInstance $True ``` İşlevin kodu `Set-AzureLoadBalancerHealthCheckProbePortOnSAPClusterIPResource` şöyle görünür: ```powershell function Set-AzureLoadBalancerHealthCheckProbePortOnSAPClusterIPResource { <# .SYNOPSIS Set-AzureLoadBalancerHealthProbePortOnSAPClusterIPResource will set a new Azure Load Balancer Health Probe Port on 'SAP $SAPSID IP' cluster resource. .DESCRIPTION Set-AzureLoadBalancerHealthProbePortOnSAPClusterIPResource will set a new Azure Load Balancer Health Probe Port on 'SAP $SAPSID IP' cluster resource. It will also restart SAP Cluster group (default behavior), to activate the changes. You need to run it on one of the SAP ASCS/SCS Windows cluster nodes. Expectation is that SAP group is installed with official SWPM installation tool, which will set default expected naming convention for: - SAP Cluster Group: 'SAP $SAPSID' - SAP Cluster IP Address Resource: 'SAP $SAPSID IP' .PARAMETER SAPSID SAP SID - 3 characters staring with letter. .PARAMETER ProbePort Azure Load Balancer Health Check Probe Port. .PARAMETER RestartSAPClusterGroup Optional parameter. Default value is '$True', so SAP cluster group will be restarted to activate the changes. .PARAMETER IsSAPERSClusteredInstance Optional parameter.Default value is '$False'. If set to $True , then handle clsutered new SAP ERS2 instance. .EXAMPLE # Set probe port to 62000, on SAP cluster resource 'SAP AB1 IP', and restart the SAP cluster group 'SAP AB1', to activate the changes. Set-AzureLoadBalancerHealthCheckProbePortOnSAPClusterIPResource -SAPSID AB1 -ProbePort 62000 .EXAMPLE # Set probe port to 62000, on SAP cluster resource 'SAP AB1 IP'. SAP cluster group 'SAP AB1' IS NOT restarted, therefore changes are NOT active. # To activate the changes you need to manualy restart 'SAP AB1' cluster group. Set-AzureLoadBalancerHealthCheckProbePortOnSAPClusterIPResource -SAPSID AB1 -ProbePort 62000 -RestartSAPClusterGroup $False .EXAMPLE # Set probe port to 62001, on SAP cluster resource 'SAP AB1 ERS IP'. SAP cluster group 'SAP AB1 ERS' IS restarted, to activate the changes. Set-AzureLoadBalancerHealthCheckProbePortOnSAPClusterIPResource -SAPSID AB1 -ProbePort 62000 -IsSAPERSClusteredInstance $True #> [CmdletBinding()] param( [Parameter(Mandatory=$True)] [ValidateNotNullOrEmpty()] [ValidateLength(3,3)] [string]$SAPSID, [Parameter(Mandatory=$True)] [ValidateNotNullOrEmpty()] [int] $ProbePort, [Parameter(Mandatory=$False)] [bool] $RestartSAPClusterGroup = $True, [Parameter(Mandatory=$False)] [bool] $IsSAPERSClusteredInstance = $False ) BEGIN{} PROCESS{ try{ if($IsSAPERSClusteredInstance){ #Handle clustered SAP ERS Instance $SAPClusterRoleName = "SAP $SAPSID ERS" $SAPIPresourceName = "SAP $SAPSID ERS IP" }else{ #Handle clustered SAP ASCS/SCS Instance $SAPClusterRoleName = "SAP $SAPSID" $SAPIPresourceName = "SAP $SAPSID IP" } $SAPIPResourceClusterParameters = Get-ClusterResource $SAPIPresourceName | Get-ClusterParameter $IPAddress = ($SAPIPResourceClusterParameters | Where-Object {$_.Name -eq "Address" }).Value $NetworkName = ($SAPIPResourceClusterParameters | Where-Object {$_.Name -eq "Network" }).Value $SubnetMask = ($SAPIPResourceClusterParameters | Where-Object {$_.Name -eq "SubnetMask" }).Value $OverrideAddressMatch = ($SAPIPResourceClusterParameters | Where-Object {$_.Name -eq "OverrideAddressMatch" }).Value $EnableDhcp = ($SAPIPResourceClusterParameters | Where-Object {$_.Name -eq "EnableDhcp" }).Value $OldProbePort = ($SAPIPResourceClusterParameters | Where-Object {$_.Name -eq "ProbePort" }).Value $var = Get-ClusterResource | Where-Object { $_.name -eq $SAPIPresourceName } Write-Output "Current configuration parameters for SAP IP cluster resource '$SAPIPresourceName' are:" Get-ClusterResource -Name $SAPIPresourceName | Get-ClusterParameter Write-Output " " Write-Output "Current probe port property of the SAP cluster resource '$SAPIPresourceName' is '$OldProbePort'." Write-Output " " Write-Output "Setting the new probe port property of the SAP cluster resource '$SAPIPresourceName' to '$ProbePort' ..." Write-Output " " $var | Set-ClusterParameter -Multiple @{"Address"=$IPAddress;"ProbePort"=$ProbePort;"Subnetmask"=$SubnetMask;"Network"=$NetworkName;"OverrideAddressMatch"=$OverrideAddressMatch;"EnableDhcp"=$EnableDhcp} Write-Output " " if($RestartSAPClusterGroup){ Write-Output "" Write-Output "Activating changes..." Write-Output " " Write-Output "Taking SAP cluster IP resource '$SAPIPresourceName' offline ..." Stop-ClusterResource -Name $SAPIPresourceName sleep 5 Write-Output "Starting SAP cluster role '$SAPClusterRoleName' ..." Start-ClusterGroup -Name $SAPClusterRoleName Write-Output "New ProbePort parameter is active." Write-Output " " Write-Output "New configuration parameters for SAP IP cluster resource '$SAPIPresourceName':" Write-Output " " Get-ClusterResource -Name $SAPIPresourceName | Get-ClusterParameter }else { Write-Output "SAP cluster role '$SAPClusterRoleName' is not restarted, therefore changes are not activated." } } catch{ Write-Error $_.Exception.Message } } END {} } ``` ### <a name="open-the-windows-firewall-probe-port"></a><a name="4498c707-86c0-4cde-9c69-058a7ab8c3ac"></a> Windows Güvenlik Duvarı araştırma bağlantı noktasını açın Her iki küme düğümünde bir Windows Güvenlik Duvarı araştırması bağlantı noktası açın. Windows Güvenlik Duvarı araştırması bağlantı noktasını açmak için aşağıdaki betiği kullanın. Ortamınız için PowerShell değişkenlerini güncelleştirin. ERS2 kullanıyorsanız, ERS2 araştırma bağlantı noktası için güvenlik duvarı bağlantı noktasını da açmanız gerekir. ```powershell $ProbePort = 62000 # ProbePort of the Azure internal load balancer New-NetFirewallRule -Name AzureProbePort -DisplayName "Rule for Azure Probe Port" -Direction Inbound -Action Allow -Protocol TCP -LocalPort $ProbePort ``` ## <a name="install-the-database-instance"></a><a name="85d78414-b21d-4097-92b6-34d8bcb724b7"></a> Veritabanı örneğini yükler Veritabanı örneğini yüklemek için SAP yükleme belgelerinde açıklanan işlemi izleyin. ## <a name="install-the-second-cluster-node"></a><a name="8a276e16-f507-4071-b829-cdc0a4d36748"></a> İkinci küme düğümünü yükler İkinci kümeyi yüklemek için, SAP yükleme kılavuzunda açıklanan adımları izleyin. ## <a name="install-the-sap-primary-application-server"></a><a name="2477e58f-c5a7-4a5d-9ae3-7b91022cafb5"></a> SAP birincil uygulama sunucusunu yükler PAS 'yi barındırmak için belirlediğiniz sanal makinede birincil uygulama sunucusu (PAS) örneği \<SID\> -dı-0 ' yı yükler. Azure üzerinde hiçbir bağımlılık yoktur. SIOS kullanıyorsanız, hiçbir veri ve özel ayar yoktur. ## <a name="install-the-sap-additional-application-server"></a><a name="0ba4a6c1-cc37-4bcf-a8dc-025de4263772"></a> SAP ek uygulama sunucusunu yükler SAP uygulama sunucusu örneğini barındırmak için belirlediğiniz tüm sanal makinelere bir SAP ek uygulama sunucusu (AAS) yükleyebilirsiniz. ## <a name="test-the-sap-ascsscs-instance-failover"></a><a name="18aa2b9d-92d2-4c0e-8ddd-5acaabda99e9"></a> SAP ASCS/SCS örneği yük devretmesini test etme Seviyelendirilmiş yük devretme testleri için SAP Ass 'nin A düğümünde etkin olduğunu varsaytık. 1. SAP sisteminin A düğümünden A düğümüne başarılı bir şekilde yük devredebildiğini doğrulayın \<SID\> a küme düğümünden b KÜMESINE SAP kümesi grubu yük devretmesi başlatmak için şu seçeneklerden birini seçin: - Yük Devretme Kümesi Yöneticisi - Yük devretme kümesi PowerShell ```powershell $SAPSID = "PR1" # SAP <SID> $SAPClusterGroup = "SAP $SAPSID" Move-ClusterGroup -Name $SAPClusterGroup ``` 2. Windows Konuk işletim sisteminin içindeki küme düğümünü yeniden başlatın. Bu, \<SID\> A düğümünden B DÜĞÜMÜNE SAP küme grubunun otomatik yük devretmesini başlatır. 3. Azure portal küme düğümünü yeniden başlatın. Bu, \<SID\> A düğümünden B DÜĞÜMÜNE SAP küme grubunun otomatik yük devretmesini başlatır. 4. Azure PowerShell kullanarak küme düğümünü yeniden başlatın. Bu, \<SID\> A düğümünden B DÜĞÜMÜNE SAP küme grubunun otomatik yük devretmesini başlatır. 5. Doğrulama - Yük devretmeden sonra, SAP \<SID\> küme grubunun B küme düğümünde çalıştığını doğrulayın. ![Şekil 8: Yük Devretme Kümesi Yöneticisi, SAP \< SID \> kümesi grubu B kümesi düğümünde çalışıyor][sap-ha-guide-figure-5002] _Yük Devretme Kümesi Yöneticisi, SAP \<SID\> kümesi grubu B kümesi düğümünde çalışıyor_ - Yük devretmeden sonra paylaşılan diskin B küme düğümüne takılı olduğundan emin olun. - Yük devretmenin ardından, SIOS kullanıyorsanız, SIOS veri tutan özelliğinin, küme düğümü B 'deki kaynak birim sürücüsünden gelen verileri, A küme düğümü üzerinde hedef birim sürücüleri olarak çoğaltmakta olduğunu doğrulayın. ![Şekil 9: SIOS Dataman yerel birimi B küme düğümünden A 'ya çoğaltır][sap-ha-guide-figure-5003] _SIOS Dataman, yerel birimi B küme düğümünden A kümesine çoğaltır_
70.18847
501
0.766925
tur_Latn
0.909697
d5cd60a959abc99959b0c32cb4950f2446fcf7b6
919
md
Markdown
includes/data-explorer-limits.md
fuatrihtim/azure-docs.tr-tr
6569c5eb54bdab7488b44498dc4dad397d32f1be
[ "CC-BY-4.0", "MIT" ]
null
null
null
includes/data-explorer-limits.md
fuatrihtim/azure-docs.tr-tr
6569c5eb54bdab7488b44498dc4dad397d32f1be
[ "CC-BY-4.0", "MIT" ]
null
null
null
includes/data-explorer-limits.md
fuatrihtim/azure-docs.tr-tr
6569c5eb54bdab7488b44498dc4dad397d32f1be
[ "CC-BY-4.0", "MIT" ]
null
null
null
--- author: ilayrn ms.service: data-explorer ms.topic: include ms.date: 01/20/2020 ms.author: ilayr ms.openlocfilehash: d9e23e74cd980ecf44cd04ad2b6f89dc6a4cf868 ms.sourcegitcommit: 867cb1b7a1f3a1f0b427282c648d411d0ca4f81f ms.translationtype: MT ms.contentlocale: tr-TR ms.lasthandoff: 03/19/2021 ms.locfileid: "76548243" --- Aşağıdaki tabloda Azure Veri Gezgini kümelerine yönelik en fazla sınır açıklanmaktadır. | Kaynak | Sınır | | --- | --- | | Abonelik başına bölge başına küme sayısı | 20 | | Küme başına örnek | 1000 | | Bir kümedeki veritabanlarının sayısı | 10,000 | | Bir kümedeki ekli veritabanı yapılandırmalarının sayısı | 70 | Aşağıdaki tabloda, Azure Veri Gezgini kümelerinde gerçekleştirilen yönetim işlemlerinin sınırları açıklanmaktadır. | Kapsam | İşlem | Sınır | | --- | --- | --- | | Küme | Oku (örneğin, küme al) | 5 dakikada 500 | | Küme | yazma (örneğin, veritabanı oluşturma) | 1000/saat |
30.633333
114
0.752992
tur_Latn
0.99831
d5cd949dcc1f5604426b9dc48e66ab3c82896b90
3,961
md
Markdown
README.md
vanlid/guacamole-auth-hmac
1ce6c8a09b73c4b29c19243fc36f777ac89f6a6e
[ "MIT" ]
1
2021-07-05T09:43:57.000Z
2021-07-05T09:43:57.000Z
README.md
frenkiesp/guacamole-url-auth
9dc2e0c1401e2c6d4bfd22421492d51bb990ee5b
[ "MIT" ]
null
null
null
README.md
frenkiesp/guacamole-url-auth
9dc2e0c1401e2c6d4bfd22421492d51bb990ee5b
[ "MIT" ]
null
null
null
# guacamole-auth-hmac [![Build Status](https://travis-ci.org/grncdr/guacamole-auth-hmac.png?branch=master)](https://travis-ci.org/grncdr/guacamole-auth-hmac) ## Description This project is a plugin for [Guacamole](http://guac-dev.org), an HTML5 based remote desktop solution supporting VNC/RFB, RDP, and SSH. This plugin is an _authentication provider_ that enables stateless, on-the-fly configuration of remote desktop connections that are authorized using a pre-shared key. It is most appropriate for scenarios where you have an existing user authentication & authorization mechanism. ## Building guacamole-auth-hmac uses Maven for managing builds. After installing Maven you can build a suitable jar for deployment with `mvn package`. The resulting jar file will be placed in `target/guacamole-auth-hmac-<version>.jar`. ## Deployment & Configuration **Warning** This plugin relies on API's introduced in Guacamole 0.8.3, so you must be running at least that version before using this plugin. Copy `guacamole-auth-hmac.jar` to the location specified by [`lib-directory`][config-classpath] in `guacamole.properties`. Then set the `auth-provider` property to `com.stephensugden.guacamole.net.hmac.HmacAuthenticationProvider`. `guacamole-auth-hmac` adds two new config keys to `guacamole.properties`: * `secret-key` - The key that will be used to verify URL signatures. Whatever is generating the signed URLs will need to share this value. * `timestamp-age-limit` - A numeric value (in milliseconds) that determines how long a signed request should be valid for. [config-classpath]: http://guac-dev.org/doc/gug/configuring-guacamole.html#idp380240 ## Usage To generate a signed URL for usage with this plugin, simply use the path to Guacamole's built-in `/client.xhtml` as a base, and append the following query parameters: * `id` - A connection ID that must be unique per user session. * `timestamp` - A unix timestamp in milliseconds. (E.G. `time() * 1000` in PHP). This is used to prevent replay attacks. * `signature` - The [request signature][#request-signing] * `guac.protocol` - One of `vnc`, `rdp`, or `ssh`. * `guac.hostname` - The hostname of the remote desktop server to connect to. * `guac.port` - The port number to connect to. * `guac.username` - (_optional_) * `guac.password` - (_optional_) * `guac.*` - (_optional_) Any other configuration parameters recognized by Guacamole can be by prefixing them with `guac.`. ## Request Signing Requests must be signed with an HMAC, where the message content is generated from the request parameters as follows: 1. The parameters `timestamp`, and `guac.protocol` are concatenated. 2. For each of `guac.username`, `guac.password`, `guac.hostname`, and `guac.port`; if the parameter was included in the request, append it's unprefixed name (e.g. - `guac.username` becomes `username`) followed by it's value. ### Request Signing - Example Given a request for the following URL: `client.xhtml?id=example&guac.protocol=rdp&guac.hostname=myserver.internal&guac.port=3389&timestamp=1377143741000` The message to be signed will be the concatenation of the following strings: - `"1377143741000"` - `"rdp"` - `"hostname"` - `"myserver.internal"` - `"port"` - `"3389"` Assuming a secret key of `"secret"`, a `signature` parameter should be appended with a value that is the base-64 encoded value of the hash produced by signing the message `"1377143741000rdphostnamemyserver.internalport3389"` with the key `"secret"`, or `"Iost5ouayLzpKLgx607kY1QUVwY="`. How this signature is produced is dependent on your programming language/platform, but with recent versions of PHP it looks like this: base64_encode(hash_hmac('sha1', $message, $secret)); An [example PHP implementation][example-php] is included in `src/example/php`. [example-php]: https://github.com/grncdr/guacamole-auth-hmac/blob/master/src/example/php ## License MIT License
40.418367
157
0.75183
eng_Latn
0.989691
d5cddffbf847f87eaf59cd87d4b5cb7f5cc23fcf
1,366
md
Markdown
vault/lexicon/G41040.md
mandolyte/uw-obsidian
39e987c4cdc49d2a68e3af6b4e3fc84d1cda916d
[ "MIT" ]
null
null
null
vault/lexicon/G41040.md
mandolyte/uw-obsidian
39e987c4cdc49d2a68e3af6b4e3fc84d1cda916d
[ "MIT" ]
null
null
null
vault/lexicon/G41040.md
mandolyte/uw-obsidian
39e987c4cdc49d2a68e3af6b4e3fc84d1cda916d
[ "MIT" ]
null
null
null
# πιστόω, ῶ. <!-- Status: S2=NeedsReview --> <!-- Lexica used for edits: BDAG, FFM, LN, A-S --> ## Word data * Strongs: G41040. * Alternate spellings: * Principle Parts: * Part of speech: [Verb](http://ugg.readthedocs.io/en/latest/verb.html). * Instances in the New Testament: 1. * All Scriptures cited: Yes ## Etymology: [πιστός]()), * LXX/Hebrew glosses: * Time Period/Ancient Authors: * Related words: * Antonyms for all senses * Synonyms for all senses: ## Senses: ### Sense 1.0: #### Definition: to believe, be assured of, be persuaded or confident (in the New Testament, used in the passive voice, when the action is happening to the subject of the sentence. In the active voice, when the subject is doing the action of the sentence, meaning "to make trustworthy") #### Glosses: to believe, be assured of, be persuaded or confident #### Explanation: #### Citations: to make trustworthy (Thuc., [III Ki 1:36](1Ki 1:36)), hence, to establish ([I Ch 17:14](1Ch 17:14)). Pass. and mid., to be assured of: c. acc. rei, ; [σὺ](../G47710/01.md) [δὲ](../G11610/01.md) [μένε](../G33060/01.md) [ἐν](../G17220/01.md) [οἷς](../G37390/01.md) [ἔμαθες](../G31290/01.md) [καὶ](../G25320/01.md) ἐπιστώθης, ; "You, however, continue in the things that you have learned and have firmly believed," (ULT): [II Ti 3:14](2Ti 3:14).†
21.68254
270
0.658126
eng_Latn
0.900229
d5ce90400a595e50a577936976a3be04ea6ac84f
17,544
md
Markdown
security-updates/SecurityBulletins/2015/ms15-057.md
MicrosoftDocs/security-updates.de-de
38a2d4f22cfaacc722fb19ea2e9485d86d538c8f
[ "CC-BY-4.0", "MIT" ]
1
2020-05-19T20:15:48.000Z
2020-05-19T20:15:48.000Z
security-updates/SecurityBulletins/2015/ms15-057.md
MicrosoftDocs/security-updates.de-de
38a2d4f22cfaacc722fb19ea2e9485d86d538c8f
[ "CC-BY-4.0", "MIT" ]
518
2017-10-12T11:56:08.000Z
2019-12-06T22:49:34.000Z
security-updates/SecurityBulletins/2015/ms15-057.md
MicrosoftDocs/security-updates.de-de
38a2d4f22cfaacc722fb19ea2e9485d86d538c8f
[ "CC-BY-4.0", "MIT" ]
4
2018-05-10T19:44:54.000Z
2021-11-15T11:25:49.000Z
--- TOCTitle: 'MS15-057' Title: 'Microsoft Security Bulletin MS15-057 – Kritisch' ms:assetid: 'ms15-057' ms:contentKeyID: 65883200 ms:mtpsurl: 'https://technet.microsoft.com/de-DE/library/ms15-057(v=Security.10)' --- Microsoft Security Bulletin MS15-057 – Kritisch =============================================== Sicherheitsanfälligkeit in Windows Media Player kann Remotecodeausführung ermöglichen (3033890) ----------------------------------------------------------------------------------------------- Veröffentlicht: 9. Juni 2015 **Version:** 1.0 Kurzzusammenfassung ------------------- Dieses Sicherheitsupdate behebt eine Sicherheitsanfälligkeit in Microsoft Windows. Die Sicherheitsanfälligkeit kann Remotecodeausführung ermöglichen, wenn in Windows Media Player Medieninhalte geöffnet werden, die auf einer in böswilliger Absicht erstellten Webseite gehostet werden. Nutzt ein Angreifer diese Sicherheitsanfälligkeit erfolgreich aus, kann er die vollständige Kontrolle über das betroffene System erlangen. Benutzer mit Konten, die über weniger Systemrechte verfügen, sind davon möglicherweise weniger betroffen als Benutzer mit Administratorrechten. Dieses Sicherheitsupdate wird für Windows Media Player 10 unter Windows Server 2003, für Windows Media Player 11 unter Windows Vista oder Windows Server 2008 und für Windows Media Player 12 unter Windows 7 oder Windows Server 2008 R2 als Kritisch eingestuft. Weitere Informationen finden Sie im Abschnitt **Betroffene Software**. Das Update behebt die Sicherheitsanfälligkeit, indem korrigiert wird, wie Windows Media Player DataObject-Objekte verarbeitet. Weitere Informationen zu dieser Sicherheitsanfälligkeit finden Sie im Abschnitt **Informationen zu Sicherheitsanfälligkeiten**. Weitere Informationen zu diesem Update finden Sie im [Microsoft Knowledge Base-Artikel 3033890](https://support.microsoft.com/de-de/kb/3033890).   Betroffene Software ------------------- Die folgenden Softwareversionen oder -Editionen sind betroffen. Versionen oder Editionen, die nicht aufgeführt sind, haben entweder das Ende ihres Supportlebenszyklus überschritten oder sind nicht betroffen. Besuchen Sie die Website [Microsoft Support Lifecycle](https://support.microsoft.com/lifecycle), um den Supportlebenszyklus für Ihre Softwareversion oder Edition zu ermitteln.  <p> </p> <table style="border:1px solid black;"> <tr> <td style="border:1px solid black;"> **Betriebssystem** </td> <td style="border:1px solid black;"> **Komponente** </td> <td style="border:1px solid black;"> **Maximale Sicherheitsauswirkung** </td> <td style="border:1px solid black;"> **Bewertung des Gesamtschweregrads** </td> <td style="border:1px solid black;"> **Ersetzte Updates**\* </td> </tr> <tr> <td style="border:1px solid black;" colspan="5"> **Windows Server 2003** </td> </tr> <tr> <td style="border:1px solid black;"> Windows Server 2003 Service Pack 2 </td> <td style="border:1px solid black;"> [Windows Media Player 10](https://www.microsoft.com/de-de/download/details.aspx?id=47415) (3033890) </td> <td style="border:1px solid black;"> Remotecodeausführung </td> <td style="border:1px solid black;"> Kritisch </td> <td style="border:1px solid black;"> 2378111 in [MS10-082](https://technet.microsoft.com/de-de/security/bulletin/ms10-082) </td> </tr> <tr> <td style="border:1px solid black;"> Windows Server 2003 x64 Edition Service Pack 2 </td> <td style="border:1px solid black;"> [Windows Media Player 10](https://www.microsoft.com/de-de/download/details.aspx?id=47370) (3033890) </td> <td style="border:1px solid black;"> Remotecodeausführung </td> <td style="border:1px solid black;"> Kritisch </td> <td style="border:1px solid black;"> 2378111 in [MS10-082](https://technet.microsoft.com/de-de/security/bulletin/ms10-082) </td> </tr> <tr> <td style="border:1px solid black;" colspan="5"> **Windows Vista** </td> </tr> <tr> <td style="border:1px solid black;"> Windows Vista Service Pack 2 </td> <td style="border:1px solid black;"> [Windows Media Player 11](https://www.microsoft.com/de-de/download/details.aspx?id=47394) (3033890) </td> <td style="border:1px solid black;"> Remotecodeausführung </td> <td style="border:1px solid black;"> Kritisch </td> <td style="border:1px solid black;"> 2378111 in [MS10-082](https://technet.microsoft.com/de-de/security/bulletin/ms10-082) </td> </tr> <tr> <td style="border:1px solid black;"> Windows Vista x64 Edition Service Pack 2 </td> <td style="border:1px solid black;"> [Windows Media Player 11](https://www.microsoft.com/de-de/download/details.aspx?id=47386) (3033890) </td> <td style="border:1px solid black;"> Remotecodeausführung </td> <td style="border:1px solid black;"> Kritisch </td> <td style="border:1px solid black;"> 2378111 in [MS10-082](https://technet.microsoft.com/de-de/security/bulletin/ms10-082) </td> </tr> <tr> <td style="border:1px solid black;" colspan="5"> **Windows Server 2008** </td> </tr> <tr> <td style="border:1px solid black;"> Windows Server 2008 für 32-Bit-Systeme Service Pack 2 </td> <td style="border:1px solid black;"> [Windows Media Player 11](https://www.microsoft.com/de-de/download/details.aspx?id=47425) (3033890) </td> <td style="border:1px solid black;"> Remotecodeausführung </td> <td style="border:1px solid black;"> Kritisch </td> <td style="border:1px solid black;"> 2378111 in [MS10-082](https://technet.microsoft.com/de-de/security/bulletin/ms10-082) </td> </tr> <tr> <td style="border:1px solid black;"> Windows Server 2008 für x64-basierte Systeme Service Pack 2 </td> <td style="border:1px solid black;"> [Windows Media Player 11](https://www.microsoft.com/de-de/download/details.aspx?id=47392) (3033890) </td> <td style="border:1px solid black;"> Remotecodeausführung </td> <td style="border:1px solid black;"> Kritisch </td> <td style="border:1px solid black;"> 2378111 in [MS10-082](https://technet.microsoft.com/de-de/security/bulletin/ms10-082) </td> </tr> <tr> <td style="border:1px solid black;" colspan="5"> **Windows 7** </td> </tr> <tr> <td style="border:1px solid black;"> Windows 7 für 32-Bit-Systeme Service Pack 1 </td> <td style="border:1px solid black;"> [Windows Media Player 12](https://www.microsoft.com/de-de/download/details.aspx?id=47385) (3033890) </td> <td style="border:1px solid black;"> Remotecodeausführung </td> <td style="border:1px solid black;"> Kritisch </td> <td style="border:1px solid black;"> Keine </td> </tr> <tr> <td style="border:1px solid black;"> Windows 7 für x64-basierte Systeme Service Pack 1 </td> <td style="border:1px solid black;"> [Windows Media Player 12](https://www.microsoft.com/de-de/download/details.aspx?id=47401) (3033890) </td> <td style="border:1px solid black;"> Remotecodeausführung </td> <td style="border:1px solid black;"> Kritisch </td> <td style="border:1px solid black;"> Keine </td> </tr> <tr> <td style="border:1px solid black;" colspan="5"> **Windows Server 2008 R2** </td> </tr> <tr> <td style="border:1px solid black;"> Windows Server 2008 R2 für x64-basierte Systeme Service Pack 1 </td> <td style="border:1px solid black;"> [Windows Media Player 12](https://www.microsoft.com/de-de/download/details.aspx?id=47428) (3033890) </td> <td style="border:1px solid black;"> Remotecodeausführung </td> <td style="border:1px solid black;"> Kritisch </td> <td style="border:1px solid black;"> Keine </td> </tr> </table> \*Die Spalte „Ersetzte Updates‟ enthält nur das letzte Update einer Reihe ersetzter Updates. Eine umfassende Liste der ersetzten Updates finden Sie, wenn Sie zum [Microsoft Update-Katalog](https://catalog.update.microsoft.com/v7/site/home.aspx) wechseln, nach der Update-KB-Nummer suchen und dann die Updatedetails betrachten (die Informationen zu ersetzten Updates befinden sich auf der Registerkarte „Paketdetails‟). Bewertungen des Schweregrads und Kennungen der Sicherheitsanfälligkeiten ------------------------------------------------------------------------ Bei der folgenden Bewertung des Schweregrads wird die potenzielle maximale Auswirkung der Sicherheitsanfälligkeit angenommen. Informationen zur Wahrscheinlichkeit der Ausnutzung der Sicherheitsanfälligkeit in Bezug auf die Bewertung des Schweregrads und die Sicherheitsauswirkung innerhalb von 30 Tagen nach Veröffentlichung dieses Security Bulletins finden Sie im Ausnutzbarkeitsindex im [Bulletin Summary für Juni](https://technet.microsoft.com/de-de/library/security/ms15-jun). <p> </p> <table style="border:1px solid black;"> <tr> <td style="border:1px solid black;" colspan="3"> **Bewertung des Schweregrads und maximale Sicherheitsauswirkung nach betroffener Software** </td> </tr> <tr> <td style="border:1px solid black;"> **Betroffene Software** </td> <td style="border:1px solid black;"> [**Sicherheitsanfälligkeit in Windows Media Player bezüglich Remotecodeausführung über DataObject – CVE-2015-1728**](https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1728) </td> <td style="border:1px solid black;"> **Bewertung des Gesamtschweregrads** </td> </tr> <tr> <td style="border:1px solid black;" colspan="3"> **Windows Server 2003** </td> </tr> <tr> <td style="border:1px solid black;"> Windows Server 2003 Service Pack 2 (3033890) </td> <td style="border:1px solid black;"> **Kritisch** Remotecodeausführung </td> <td style="border:1px solid black;"> Kritisch </td> </tr> <tr> <td style="border:1px solid black;"> Windows Server 2003 x64 Edition Service Pack 2 (3033890) </td> <td style="border:1px solid black;"> **Kritisch** Remotecodeausführung </td> <td style="border:1px solid black;"> Kritisch </td> </tr> <tr> <td style="border:1px solid black;" colspan="3"> **Windows Vista** </td> </tr> <tr> <td style="border:1px solid black;"> Windows Vista Service Pack 2 (3033890) </td> <td style="border:1px solid black;"> **Kritisch** Remotecodeausführung </td> <td style="border:1px solid black;"> Kritisch </td> </tr> <tr> <td style="border:1px solid black;"> Windows Vista x64 Edition Service Pack 2 (3033890) </td> <td style="border:1px solid black;"> **Kritisch** Remotecodeausführung </td> <td style="border:1px solid black;"> Kritisch </td> </tr> <tr> <td style="border:1px solid black;" colspan="3"> **Windows Server 2008** </td> </tr> <tr> <td style="border:1px solid black;"> Windows Server 2008 für 32-Bit-Systeme Service Pack 2 (3033890) </td> <td style="border:1px solid black;"> **Kritisch** Remotecodeausführung </td> <td style="border:1px solid black;"> Kritisch </td> </tr> <tr> <td style="border:1px solid black;"> Windows Server 2008 für x64-basierte Systeme Service Pack 2 (3033890) </td> <td style="border:1px solid black;"> **Kritisch** Remotecodeausführung </td> <td style="border:1px solid black;"> Kritisch </td> </tr> <tr> <td style="border:1px solid black;" colspan="3"> **Windows 7** </td> </tr> <tr> <td style="border:1px solid black;"> Windows 7 für 32-Bit-Systeme Service Pack 1 (3033890) </td> <td style="border:1px solid black;"> **Kritisch** Remotecodeausführung </td> <td style="border:1px solid black;"> Kritisch </td> </tr> <tr> <td style="border:1px solid black;"> Windows 7 für x64-basierte Systeme Service Pack 1 (3033890) </td> <td style="border:1px solid black;"> **Kritisch** Remotecodeausführung </td> <td style="border:1px solid black;"> Kritisch </td> </tr> <tr> <td style="border:1px solid black;" colspan="3"> **Windows Server 2008 R2** </td> </tr> <tr> <td style="border:1px solid black;"> Windows Server 2008 R2 für x64-basierte Systeme Service Pack 1 (3033890) </td> <td style="border:1px solid black;"> **Kritisch** Remotecodeausführung </td> <td style="border:1px solid black;"> Kritisch </td> </tr> </table>   Informationen zu Sicherheitsanfälligkeiten ------------------------------------------ Sicherheitsanfälligkeit in Windows Media Player bezüglich Remotecodeausführung über DataObject – CVE-2015-1728 -------------------------------------------------------------------------------------------------------------- In Windows Media Player liegt eine Sicherheitsanfälligkeit in der Verarbeitung speziell gestalteter DataObject-Objekte vor, die Remotecodeausführung ermöglichen kann. Nutzt ein Angreifer diese Sicherheitsanfälligkeit erfolgreich aus, kann er die vollständige Kontrolle über das betroffene System erlangen. Ein Angreifer kann dann Programme installieren, Daten anzeigen, ändern oder löschen oder neue Konten mit sämtlichen Benutzerrechten erstellen. Benutzer mit Konten, die über weniger Systemrechte verfügen, sind davon möglicherweise weniger betroffen als Benutzer mit Administratorrechten. Um diese Sicherheitsanfälligkeit auszunutzen, muss ein Benutzer ein speziell gestaltetes DataObject-Objekt in Windows Media Player öffnen. Das Update behebt die Sicherheitsanfälligkeit, indem korrigiert wird, wie Windows Media Player DataObject-Objekte verarbeitet. Microsoft hat durch eine koordinierte Offenlegung der Sicherheitsanfälligkeit Informationen zu dieser Sicherheitsanfälligkeit erhalten. Zum Zeitpunkt der Erstveröffentlichung dieses Security Bulletins lagen Microsoft keine Informationen vor, dass diese Sicherheitsanfälligkeit öffentlich für Angriffe auf Benutzer ausgenutzt wurde. ### Schadensbegrenzende Faktoren Für diese Sicherheitsanfälligkeit gibt es noch keine [schadensbegrenzenden Faktoren](https://technet.microsoft.com/de-de/library/security/dn848375.aspx). ### Problemumgehungen Die folgenden [Problemumgehungen](https://technet.microsoft.com/de-de/library/security/dn848375.aspx) könnten hilfreich für Sie sein: - **Entfernen Sie „wmplayer.exe‟ aus Internet Explorer-ElevationPolicy** **Achtung:** Die unkorrekte Verwendung des Registrierungs-Editors kann schwerwiegende Probleme verursachen, die das gesamte System betreffen und eine Neuinstallation des Betriebssystems erforderlich machen. Microsoft kann nicht garantieren, dass Probleme, die von einer falschen Verwendung des Registrierungs-Editors herrühren, behoben werden können. Sie verwenden den Registrierungs-Editor auf eigene Gefahr. Gehen Sie wie folgt vor, um Windows Media Player aus dem Registrierungseintrag ElevationPolicy für Internet Explorer zu entfernen: 1. Führen Sie „regedit.exe‟ aus, und erweitern Sie den folgenden Registrierungsunterschlüssel: ``` HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy ``` 2. Wählen Sie **{6bf52a52-394a-11d3-b153-00c04f79faa6}** aus. 3. Klicken Sie auf das Menü **Datei** und dann auf **Exportieren**. 4. Geben Sie im Dialogfeld **Registrierungsdatei exportieren** die Zeichenfolge **wmplayer.exe\_backup.reg** ein, und klicken Sie dann auf **Speichern**. 5. Klicken Sie auf das Menü **Datei**, wählen Sie **Löschen**, und klicken Sie dann auf **Ja**. 6. Melden Sie sich ab und erneut an, oder starten Sie den Computer neu. **So machen Sie die Problemumgehung rückgängig** 1. Führen Sie „regedit.exe‟ aus. 2. Klicken Sie auf das Menü **Datei** und dann auf **Importieren**. 3. Wählen Sie im Dialogfeld **Registrierungsdatei importieren** die Datei **wmplayer.exe\_backup.reg** aus, und klicken Sie dann auf **Öffnen**. ### Häufig gestellte Fragen (FAQ) **Auf welche Weise können Angreifer die Sicherheitsanfälligkeit ausnutzen?** Diese Sicherheitsanfälligkeit erfordert, dass ein Benutzer ein speziell gestaltetes DataObject-Objekt in Windows Media Player öffnet. In einem webbasierten Angriffsszenario muss ein Angreifer eine Website mit einem speziell gestalteten DataObject-Objekt einrichten, durch das diese Sicherheitsanfälligkeit ausgenutzt wird. Ein Angreifer kann Benutzer nicht zum Besuch einer speziell gestalteten Website zwingen. Der Angreifer muss stattdessen die Benutzer zum Besuch dieser Website verleiten, z. B. indem er sie dazu auffordert, in einer E-Mail oder einer Instant Messenger-Nachricht auf einen Link zur Website des Angreifers zu klicken. **Für welche Systeme stellt diese Sicherheitsanfälligkeit hauptsächlich ein Risiko dar?** Jedes System, auf dem eine betroffene Version von Windows Media Player verwendet wird, ist durch diese Sicherheitsanfälligkeit gefährdet. Danksagung ---------- Microsoft würdigt die Bemühungen derjenigen Benutzer der Sicherheitscommunity, die uns dabei helfen, Kunden durch eine koordinierte Offenlegung von Sicherheitsanfälligkeiten zu schützen. Weitere Informationen finden Sie unter [Danksagung](https://technet.microsoft.com/de-de/library/security/dn903755.aspx).  Haftungsausschluss ------------------ Die Informationen in der Microsoft Knowledge Base werden wie besehen und ohne jede Gewährleistung bereitgestellt. Microsoft schließt alle anderen Garantien, gleich ob ausdrücklich oder konkludent, einschließlich der Garantien der Handelsüblichkeit oder Eignung für einen bestimmten Zweck aus. In keinem Fall kann Microsoft Corporation und/oder deren jeweilige Lieferanten haftbar gemacht werden für Schäden irgendeiner Art, einschließlich direkter, indirekter, zufällig entstandener Schäden, Folgeschäden, Folgen entgangenen Gewinns oder spezieller Schäden, selbst dann nicht, wenn Microsoft Corporation und/oder deren jeweilige Lieferanten auf die mögliche Entstehung dieser Schäden hingewiesen wurde. Weil in einigen Staaten/Rechtsordnungen der Ausschluss oder die Beschränkung einer Haftung für zufällig entstandene Schäden oder Folgeschäden nicht gestattet ist, gilt die obige Einschränkung eventuell nicht für Sie. Revisionen ---------- - V1.0 (9. Juni 2015): Bulletin veröffentlicht. *Seite generiert am 04.06.2015 um 9:11Z-07:00.*
35.95082
919
0.744243
deu_Latn
0.884156
d5cebb0c4dc2ece1a3cf6c873a115df2e2f0c977
1,839
md
Markdown
README.md
alemagio/vue-clickout-handler
284983f0af3d048b50a9965398fd1abbe42405d0
[ "MIT" ]
2
2020-09-10T10:34:08.000Z
2020-09-10T15:58:32.000Z
README.md
alemagio/vue-clickout-handler
284983f0af3d048b50a9965398fd1abbe42405d0
[ "MIT" ]
1
2021-06-03T09:03:20.000Z
2021-06-03T09:03:20.000Z
README.md
alemagio/vue-clickout-handler
284983f0af3d048b50a9965398fd1abbe42405d0
[ "MIT" ]
1
2021-06-03T08:49:58.000Z
2021-06-03T08:49:58.000Z
## Description This is a simple directive to react when a click happens outside of a certain element. ## Installation ``` npm install vue-clickout-handler --save ``` ``` yarn add vue-clickout-handler ``` ## Basic Usage ```js // main.js import { VueClickOut } from 'vue-clickout-handler'; Vue.directive('click-out', VueClickOut) ``` You can pass just a callback and it will be used as handler ```vue <template> <div v-click-out="onClickOut"> ... </div> </template> <script> export default { methods: { onClickOut () { // do something } } } </script> ``` Or you can pass an object to include more options: ```vue <template> <div id="my-div"> </div> <div v-click-out="{ handler: onClickOut, excluded: ['#my-div'], disabled: disabled}"> ... </div> </template> <script> export default { data () { return { disabled: false } }, methods: { onClickOut () { // do something } } } </script> ``` ## Options <table class="options"> <thead> <tr> <th>Option</th> <th>Type</th> <th>Required</th> <th>Description</th> </tr> </thead> <tbody> <tr> <td>handler</td> <td>Function</td> <td>true</td> <td>The function invoked on click-outside event.</td> </tr> <tr> <td>excluded</td> <td>Array</td> <td>false</td> <td>A list of excluded elements, the handler will not be executed if any of these elements are clicked.</td> </tr> <tr> <td>disabled</td> <td>boolean</td> <td>false</td> <td>If true the handler will never be executed.</td> </tr> </tbody> </table>
17.682692
120
0.520935
eng_Latn
0.812534
d5ceea7f52febdf857d0f0e33e489cad85e835ed
537
md
Markdown
Profile/README.md
nikitawootten-nist/ATICC
bc5606b0ef56e78a3be8e3dc55bb60e7ab2b066d
[ "Unlicense" ]
null
null
null
Profile/README.md
nikitawootten-nist/ATICC
bc5606b0ef56e78a3be8e3dc55bb60e7ab2b066d
[ "Unlicense" ]
null
null
null
Profile/README.md
nikitawootten-nist/ATICC
bc5606b0ef56e78a3be8e3dc55bb60e7ab2b066d
[ "Unlicense" ]
null
null
null
# Example InSpec Profile This example shows the implementation of an InSpec profile. Controls Architecture: - 3 Controls for each section of the TIC 3.0 Network PEP Requirements: 1. Tests on the Good Guy Client (ggc) 2. Tests on the Bad Guy Client (bgc) 3. Tests on the SDP Controller (sdp) 4. *Tests on the SDP Gateway (gw) - TIC Sections: 1. Access Control (ac) 2. IP Deny-listing (ip) 3. Host Containment (hc) 4. Network Segmentations (ns) 5. Micro Segmentation (ms) 6. ** AC/IA Controls **
28.263158
70
0.679702
eng_Latn
0.780289
d5cf08f72a905d2c3046b9d064d2265f05678dc2
18,740
md
Markdown
TEDx/Titles_starting_P_to_Z/Race_Space_and_Time_in_the_Making_of_Urban_America_Paul_Lawrie_TEDxUniversityofWinnipeg.md
gt-big-data/TEDVis
328a4c62e3a05c943b2a303817601aebf198c1aa
[ "MIT" ]
91
2018-01-24T12:54:48.000Z
2022-03-07T21:03:43.000Z
cleaned_tedx_data/Titles_starting_P_to_Z/Race_Space_and_Time_in_the_Making_of_Urban_America_Paul_Lawrie_TEDxUniversityofWinnipeg.md
nadaataiyab/TED-Talks-Nutrition-NLP
4d7e8c2155e12cb34ab8da993dee0700a6775ff9
[ "MIT" ]
null
null
null
cleaned_tedx_data/Titles_starting_P_to_Z/Race_Space_and_Time_in_the_Making_of_Urban_America_Paul_Lawrie_TEDxUniversityofWinnipeg.md
nadaataiyab/TED-Talks-Nutrition-NLP
4d7e8c2155e12cb34ab8da993dee0700a6775ff9
[ "MIT" ]
18
2018-01-24T13:18:51.000Z
2022-01-09T01:06:02.000Z
today the world is urban we live in a decidedly urban world for the first time in human history more people live in cities than do not much of this process has been taking place in the Western world for a little bit over a century and a half but now the main point of urban growth in the world is taking place in the global south particularly in China portions of China India Southeast Asia and also Africa as well this shift to the urban has fundamentally changed the ways in which we live it&#39;s changed the ways in which we work in which we play in which we love it&#39;s even changed our mental and physical makeups it&#39;s also fundamentally I would argue informed the way in which we understand space and place I want to just take a minute to unpack those terms what do we mean by what we&#39;re talking about space and place one of the most influential thinkers on how we think about race and space I should say space and place is John Locke the English philosopher now you know cue rolling of eyes I know people didn&#39;t show up on a Friday night to hear me talk at length about it long dead English philosopher but I think it&#39;s important because Locke really illuminates some interesting things about space and place for Locke he argues that space pre-exists our knowledge of it he believed that space was only visible and only comprehensible by the position of points objects and bodies within it so the point at which two or more of these bodies or objects are at rest is what Locke calls place space and place then are dependent on each other but Locke takes it even further he says that if you understand race as related to place if it&#39;s something that you can measure if you can plot if it becomes as we see here a location it can also be commodified or monetized so for Locke place is a site of property and at the turn of the 20th century the rise of the modern city through issues of place space and property into sharp relief questions over who can access these space the right to acquire property where to live where to work how you move through cities and as we all know throughout much of Western history the rights to the rights to place have largely been the purview of those peoples deemed white the challenges of these new urban realities were also especially important or especially difficult for people&#39;s who only a few generations prior had been property themselves that being african-americans so how were they to negotiate these new and unfamiliar spaces ultimately issues of urban space place and race were not simply questions of where but also of when urbanization didn&#39;t just change the way people thought about space and place it changed the ways that people thought about time and since the rise of the modern city it&#39;s been the pace of life the flow the rhythm of the modern city that struck people the most now the old world was a known world it was governed by the rhythms and seasons of the land by planting by harvest by dawn dusk even by the tides it&#39;s a known world it&#39;s where one&#39;s ancestors are buried and there was a deep connection between notions of space and place and most people whether you came from the American South or whether you came from the shadows of Eastern Europe were born lived and died within about the same 10-mile radius yet all this change with a mass migration to cities it unmoored people from the rhythms of the natural world how they understood time as being something instinctive through things such as time standardization through electrification that turned night in today and rapid industrialization all conspired to dramatically alter everyday temporal realities so just as space came to be quantified so too did time with ever-increasing precision in the city time truly became money and the modern urban environment as we see here was awash in these symbols of time whether they be public clocks whether it be the punch clock of factories or the whistles signaling the beginning and end of work and modernity also in many ways which can be defined by speed by pace also had really profound physiological reasons of physiological impacts I should say I just want to read you a brief quote from a jazz historian Joel Dennis Dean who recounts how after spending his undergrad years in Buffalo New York he&#39;s from New York City to begin with he returns to New York one spring day only to find himself knocked off his feet by the Russian crowds so after retiring to a coffee shop to collect himself he realized that he simply was not in gear as he described it so we resolved to kick himself into a higher gear in order to get himself home and make his way through the city and this is really an example of how space and particularly pace of the urban environment can be embodied can be something physiological in how people adapt this notion of the pace of life as the flow or movement of experience that people undergo in the urban environment when we talk of the New York minute that&#39;s a measure or perception of pace New York&#39;s diamond ISM flows from the rapid flow of human capital and financial capital if you stand in the middle of Times Square for 48 hours you can feel this pace right in your bones and all those cities may vary in their real and imagined rhythms the hyperkinetic character of a New York City of Chicago or the shall we say somewhat less Placid pace of a place such as Winnipeg or Buffalo New York most cities do seem to conform to a general temple rhythm of the five-day workweek and 9:00 to 5:00 daily grind which informs activity in certain areas of the city at the end of the workday most of these places empty out as hundreds of thousands of people make their way back to the surrounding suburbs in American cities and I would argue in some Canadian cities this is only interrupted by a weekend pilgrimage back to the city core in order to take advantage of cultural events or sporting events but it&#39;s in these spaces between it&#39;s in these spaces and times between that we find the poor the homeless the indigent disabled disproportionately peoples of color people who are largely disconnected from the schedules of the larger labor market disproportionately dependent on social services with erratic hours and often inaccessible locations for people of limited means all of which gives these areas a decidedly different pace a different rhythm populated by a decidedly different set of people&#39;s so what does it mean when we speak of urban spaces as dead or dynamic is it the volume of people is it the particular type of people is a specific time and how can the living inhabit an area which is said to be dead to better understand these context I would argue that we need to see cities as collections not just of spaces but as collections of time as a landscape of shifting temporal geographies and there&#39;s some really interesting work being done on this notion of how could we perhaps overlay a temporal map of the rhythms of cities over a physical map and you&#39;ll see here an attempt to do so by University by researchers I should say at the federal university in Rio de Janeiro who have done some amazing work in mapping these urban temporal geographies in this case they&#39;re focusing on what they say are the spatial and temporal conditions of formation of social networks namely on encounters as they call it as a key social event they have really interesting ways in which they&#39;re trying to chart that through social classes and through various other social markers so if time is relative then different peoples must experience time differently and in urban America the fault line of difference is race now there was a time when this issue could be seen as black and white urban inner city being seen as a synonym in many ways for blackness but since the dawn of the millennium we&#39;ve seen a real shift in this Elizabeth knee born who is a fellow at the Brookings Institute I&#39;ll just read you a couple of quick quick statistics as she looked at numbers from 2010 to 2014 in the American Community Survey and found that 39 percent of African Americans live in the suburbs 36 percent live in cities 15 percent live in small metropolitan areas and 10 percent live in rural communities just over 7 percent of all African Americans nationwide now live in traditional ghettos much too I&#39;m sure would be the amazement of the current occupant of the White House who continually describes the inner cities as sites of carnage exclusively occupied by African Americans and people of color so when speaking of inner city residents the dominant characteristic is often poverty rather than strictly just race or at least more a broadly based understanding of color so what then are the temporal geographies of the average inner city resident I want to just look at three main elements of this beginning with housing as I&#39;m sure many of you know for the first part of the post-war era housing projects were the dominant form of housing available to inner city residents that consisted is one consisted of one or more concentrated blocks of low-rise or high-rise apartment buildings they were intended to provide housing to low-income residents at below market rates and they were operated by the US Department of Housing and Urban Development or HUD more than 1.2 million households currently live in public housing of some kind most of these houses most of this form of housing public housing are the projects as they were called were built under the architectural notion of defensible space defensible spaces encourages us two of the key elements of this were to encourage a sense of territoriality to provide residents with a sense of ownership and to provide clear sight lines for optimal visual surveillance needed to enforce vagrancy and curfew bylaws these spatial and temporal imperatives were built into the very bricks and mortar with the various forms of sight lines the way angles were utilized the kinds of materials that were used when you pair these with the various curfew and vagrancy statutes it created a unique form of spatial and temporal surveillance and discipline ostensibly of course this was designed to provide residents from safety from perceived external threats but it ended up creating an internal sense of discipline and surveillance for the residents for many residents of the project&#39;s their time and space was very clearly not their own what happens then when people&#39;s move out make their way out of the projects down into the streets into the city streets they often found themselves facing a similar form of ten Perle and spatial discipline with joblessness rates in high-poverty urban areas nearly three times the national average and limited substandard educational opportunities and the jobs that were available to people being of unskilled low wage but temporary jobs in the retail and service sector thousands of young men made their way into the streets to make a living often involved in street level drug economies I don&#39;t say alternate I don&#39;t say alternative or underground because in many of these communities the drug trade is the economy and this is a drug trade predicated on the violent acquisition of territory or corners or turf which were then monetized through the sale of drugs these same corners were spaces subject to constant surveillance and discipline not only from rival gangs but from law enforcement as well who often use long-neglected vagrancy and curfew statutes to clear corners at certain times of day and place black bodies under a strict temporal and spatial discipline to keep black bodies in their place this can&#39;t be separated from the skyrocketing prison population the you have in the US which as we know is the largest jailer in the world it holds the greatest amount of prisoners on earth a disproportionate number of them of course being black men this chilling statistic here provided by Michelle Alexander the author of the new Jim Crow that there are more black men in prison today than there were enslaved in 1850 absolutely mind-blowing and while black women are the fastest-growing sector of the prison population this this is very much a ghetto to Prison Pipeline as many scholars have described it and for many residents this connection between this the temporal and spatial discipline they face at their homes in the streets is then replicated or mirrored in what they experienced when they often make the inevitable trip to prison very much what the scholar eduardo and Edith notes it as we can see the ghetto as prison and the prison as ghetto one of the key aspects of defensible space was situating housing projects proximate to so-called desirable neighbor however as you can see here often this proximity was physically impeded by the establishment of massive multi Lane arterial roads coincidentally of course which were designed to expediency bourbon heights through the city at the greatest possible rate not to any points within the city but to make their way through the city so you can see the Robert Taylor homes I don&#39;t know if you can make that out in Chicago here which are bounded by the Dan Ryan Expressway on one side and other larger two of roads or a very explicit example here in Syracuse in New York this is a turn towards a car centric urban environment and this made residents of the projects often who lack the capital of course to invest in a vehicle disproportionately reliant on public transit which as we know at the turn of the 20th century is facing severe cases of underfunding in the face in particularly United States of suburban control of regional councils and ultimate disinterest in facilitating regional transit authorities in the words of the infamous Albert&#39;s Paterson one of the most vociferous advocates of suburban sprawl in the United States he&#39;s the chief executive of Oakland County a very wealthy affluent suburb that bounds Detroit and being very clear about his intention for how the suburbs should relate to the city what we&#39;re going to do is turn Detroit into an Indian Reservation where we heard all the Indians into the city build a fence around it and then throw in the blankets and corn and quote definitive means to try and confine and restrict racial undesirables to keep black people&#39;s poor peoples of color in their proper place totally cut off from the rhythms of mainstream society fewer buses and trains on the street and erratic or intermediate scheduling hampers many inner city residents attempts to move freely within the city beyond their immediate space and so as the temporal and spatial isolation of the city&#39;s most vulnerable peoples increases and as researchers at the Brookings Institute have again in a similar study proven proximity to jobs and commute times can affect the employment outcome of a city&#39;s most vulnerable citizens between two thousand 2012 residents of high poverty and majority minority neighborhoods experienced particularly pronounced declines in job proximity sometimes spending over three hours on return trips to low-paying retail and service industry work now this matters because people who live closer to jobs are more likely to work they face shorter job searches and spells of joblessness proximity to employment proves particularly important to certain kinds of workers and residents for instance the duration of joblessness among black female or older workers tends to be more sensitive to job accessibility than it is for other kinds of workers for poor residents living closer to jobs increases the likelihood of working and leaving welfare so from the project to the streets to work to the simple ability to move through the city to make one&#39;s way through the city poor people&#39;s of color find themselves confronted with what&#39;s been termed a carceral lang logic at every turn a logic of punishment and confinement that&#39;s rooted in specific malice manifestations of time and space so in conclusion even when we turn to the language of urban renewal or gentrification it&#39;s often weighted with certain assumptions of race space and time too often the peoples we wish to renew or more accurately remove are seen as impediments to progress given our linear understanding of progress this places these people as peoples literally out of time we&#39;re one set of people&#39;s mainly peoples of color come to represent renewal while others as you can see in this advertisement here for a redevelopment in Dalston square in London are seen as representative of best and forgotten and regrettable past whose physical presence must be removed from these renewed or rejuvenated spaces as Locke reminds us place is not neutral it&#39;s a site of property it&#39;s a socio-economic construction place is constantly being contested by socio-economic cultural and political forces forces that I would argue can be better understood through a temporal lens and that we see that time and place are functions of power plain and simple time and place are rooted in power to determine who can access it who can own it who can monetize it and more importantly who cannot time reveals the contours of urban inequality it links the micro inequalities of the day-to-day life of people the daily minutia of bus schedules vagrancy statutes curfew violations work shift work to the macro systems of racial inequality and structural racism and of course this is not an American exclusively American problem I&#39;ve talked at length today about specifically American issues but this is something that defines urban environments across the globe we see how difference and inequality are mediated by spatial and temporal dynamics if nothing else conceiving of the city not simply as a collection of places but also as a collection of times a set of flows of rhythms can help denaturalize the seemingly natural entities we think of of time and space that we don&#39;t really give too much thought as to how they develop it can help architects city planners and citizens and the like conceive of the way that temple and flow can inform or impact on social equality or inequality the temporal geography is which shape and constrain intercept inner city residents are not accidental they are the result of historical design and while we wait may not be able to make up for the mistakes of the past well we may not be able to make the decisions of the past unmade if we adopt new ways of looking at spatial and temporal dynamics of urban inequality it can perhaps better inform the making of more equitable urban environments that do not hold its most vulnerable citizens hostages to times past thank you you [Applause]
37.48
48
0.818303
eng_Latn
0.99999
d5d00ae317797d500a8f49232f596e6034ab27c0
937
md
Markdown
README.md
noteasytodoit/noteasytodoit.github.io
f3f45688eb506487a991623f6e9931b4efa605f9
[ "MIT" ]
null
null
null
README.md
noteasytodoit/noteasytodoit.github.io
f3f45688eb506487a991623f6e9931b4efa605f9
[ "MIT" ]
null
null
null
README.md
noteasytodoit/noteasytodoit.github.io
f3f45688eb506487a991623f6e9931b4efa605f9
[ "MIT" ]
null
null
null
# 깃 블로그 만들기 ## 1. username.github.io라는 repo 생성 ![repo생성](https://github.com/noteasytodoit/noteasytodoit.github.io/blob/master/%EC%9C%A0%EB%A0%88%EC%B9%B4%EC%9A%A9%20%EC%82%AC%EC%A7%841.png) ## 2. jekyll의 테마를 찾아 깃에서 fork를 통해 가져온 뒤 username.github.io에 저장 ![fork](https://github.com/noteasytodoit/noteasytodoit.github.io/blob/master/%EC%9C%A0%EB%A0%88%EC%B9%B4%EC%9A%A9%20%EC%82%AC%EC%A7%842.png) ![github에 저장](https://github.com/noteasytodoit/noteasytodoit.github.io/blob/master/%EC%9C%A0%EB%A0%88%EC%B9%B4%EC%9A%A9%20%EC%82%AC%EC%A7%843.png) ## 3. 적용한 테마에 맞게 `_config.yml`을 변경 ![config변경](https://github.com/noteasytodoit/noteasytodoit.github.io/blob/master/%EC%9C%A0%EB%A0%88%EC%B9%B4%EC%9A%A9%20%EC%82%AC%EC%A7%844.png) ## 4. 배운 내용에 대한 Post를 작성 ![post](https://github.com/noteasytodoit/noteasytodoit.github.io/blob/master/%EC%9C%A0%EB%A0%88%EC%B9%B4%EC%9A%A9%20%EC%82%AC%EC%A7%845.png) [제작된 깃 블로그](https://noteasytodoit.github.io)
58.5625
146
0.724653
kor_Hang
0.350843
d5d0b398d311d6cfc48824157b9b32af82a43481
8,639
md
Markdown
fortios/r/fortios_dnsfilter_profile.md
chrisjaimon2012/tfwriter
1ea629ed386bbe6a8f21617a430dae19ba536a98
[ "MIT" ]
78
2021-01-15T14:10:30.000Z
2022-02-14T09:17:40.000Z
fortios/r/fortios_dnsfilter_profile.md
chrisjaimon2012/tfwriter
1ea629ed386bbe6a8f21617a430dae19ba536a98
[ "MIT" ]
5
2021-04-09T15:21:28.000Z
2022-01-28T19:02:05.000Z
fortios/r/fortios_dnsfilter_profile.md
chrisjaimon2012/tfwriter
1ea629ed386bbe6a8f21617a430dae19ba536a98
[ "MIT" ]
30
2021-01-17T13:16:57.000Z
2022-03-21T12:52:08.000Z
# fortios_dnsfilter_profile [back](../fortios.md) ### Index - [Example Usage](#example-usage) - [Variables](#variables) - [Resource](#resource) - [Outputs](#outputs) ### Terraform ```terraform terraform { required_providers { fortios = ">= 1.11.0" } } ``` [top](#index) ### Example Usage ```terraform module "fortios_dnsfilter_profile" { source = "./modules/fortios/r/fortios_dnsfilter_profile" # block_action - (optional) is a type of string block_action = null # block_botnet - (optional) is a type of string block_botnet = null # comment - (optional) is a type of string comment = null # dynamic_sort_subtable - (optional) is a type of string dynamic_sort_subtable = null # log_all_domain - (optional) is a type of string log_all_domain = null # name - (required) is a type of string name = null # redirect_portal - (optional) is a type of string redirect_portal = null # redirect_portal6 - (optional) is a type of string redirect_portal6 = null # safe_search - (optional) is a type of string safe_search = null # sdns_domain_log - (optional) is a type of string sdns_domain_log = null # sdns_ftgd_err_log - (optional) is a type of string sdns_ftgd_err_log = null # youtube_restrict - (optional) is a type of string youtube_restrict = null dns_translation = [{ addr_type = null dst = null dst6 = null id = null netmask = null prefix = null src = null src6 = null status = null }] domain_filter = [{ domain_filter_table = null }] external_ip_blocklist = [{ name = null }] ftgd_dns = [{ filters = [{ action = null category = null id = null log = null }] options = null }] } ``` [top](#index) ### Variables ```terraform variable "block_action" { description = "(optional)" type = string default = null } variable "block_botnet" { description = "(optional)" type = string default = null } variable "comment" { description = "(optional)" type = string default = null } variable "dynamic_sort_subtable" { description = "(optional)" type = string default = null } variable "log_all_domain" { description = "(optional)" type = string default = null } variable "name" { description = "(required)" type = string } variable "redirect_portal" { description = "(optional)" type = string default = null } variable "redirect_portal6" { description = "(optional)" type = string default = null } variable "safe_search" { description = "(optional)" type = string default = null } variable "sdns_domain_log" { description = "(optional)" type = string default = null } variable "sdns_ftgd_err_log" { description = "(optional)" type = string default = null } variable "youtube_restrict" { description = "(optional)" type = string default = null } variable "dns_translation" { description = "nested block: NestingList, min items: 0, max items: 0" type = set(object( { addr_type = string dst = string dst6 = string id = number netmask = string prefix = number src = string src6 = string status = string } )) default = [] } variable "domain_filter" { description = "nested block: NestingList, min items: 0, max items: 1" type = set(object( { domain_filter_table = number } )) default = [] } variable "external_ip_blocklist" { description = "nested block: NestingList, min items: 0, max items: 0" type = set(object( { name = string } )) default = [] } variable "ftgd_dns" { description = "nested block: NestingList, min items: 0, max items: 1" type = set(object( { filters = list(object( { action = string category = number id = number log = string } )) options = string } )) default = [] } ``` [top](#index) ### Resource ```terraform resource "fortios_dnsfilter_profile" "this" { # block_action - (optional) is a type of string block_action = var.block_action # block_botnet - (optional) is a type of string block_botnet = var.block_botnet # comment - (optional) is a type of string comment = var.comment # dynamic_sort_subtable - (optional) is a type of string dynamic_sort_subtable = var.dynamic_sort_subtable # log_all_domain - (optional) is a type of string log_all_domain = var.log_all_domain # name - (required) is a type of string name = var.name # redirect_portal - (optional) is a type of string redirect_portal = var.redirect_portal # redirect_portal6 - (optional) is a type of string redirect_portal6 = var.redirect_portal6 # safe_search - (optional) is a type of string safe_search = var.safe_search # sdns_domain_log - (optional) is a type of string sdns_domain_log = var.sdns_domain_log # sdns_ftgd_err_log - (optional) is a type of string sdns_ftgd_err_log = var.sdns_ftgd_err_log # youtube_restrict - (optional) is a type of string youtube_restrict = var.youtube_restrict dynamic "dns_translation" { for_each = var.dns_translation content { # addr_type - (optional) is a type of string addr_type = dns_translation.value["addr_type"] # dst - (optional) is a type of string dst = dns_translation.value["dst"] # dst6 - (optional) is a type of string dst6 = dns_translation.value["dst6"] # id - (optional) is a type of number id = dns_translation.value["id"] # netmask - (optional) is a type of string netmask = dns_translation.value["netmask"] # prefix - (optional) is a type of number prefix = dns_translation.value["prefix"] # src - (optional) is a type of string src = dns_translation.value["src"] # src6 - (optional) is a type of string src6 = dns_translation.value["src6"] # status - (optional) is a type of string status = dns_translation.value["status"] } } dynamic "domain_filter" { for_each = var.domain_filter content { # domain_filter_table - (optional) is a type of number domain_filter_table = domain_filter.value["domain_filter_table"] } } dynamic "external_ip_blocklist" { for_each = var.external_ip_blocklist content { # name - (optional) is a type of string name = external_ip_blocklist.value["name"] } } dynamic "ftgd_dns" { for_each = var.ftgd_dns content { # options - (optional) is a type of string options = ftgd_dns.value["options"] dynamic "filters" { for_each = ftgd_dns.value.filters content { # action - (optional) is a type of string action = filters.value["action"] # category - (optional) is a type of number category = filters.value["category"] # id - (optional) is a type of number id = filters.value["id"] # log - (optional) is a type of string log = filters.value["log"] } } } } } ``` [top](#index) ### Outputs ```terraform output "block_action" { description = "returns a string" value = fortios_dnsfilter_profile.this.block_action } output "block_botnet" { description = "returns a string" value = fortios_dnsfilter_profile.this.block_botnet } output "id" { description = "returns a string" value = fortios_dnsfilter_profile.this.id } output "log_all_domain" { description = "returns a string" value = fortios_dnsfilter_profile.this.log_all_domain } output "redirect_portal" { description = "returns a string" value = fortios_dnsfilter_profile.this.redirect_portal } output "redirect_portal6" { description = "returns a string" value = fortios_dnsfilter_profile.this.redirect_portal6 } output "safe_search" { description = "returns a string" value = fortios_dnsfilter_profile.this.safe_search } output "sdns_domain_log" { description = "returns a string" value = fortios_dnsfilter_profile.this.sdns_domain_log } output "sdns_ftgd_err_log" { description = "returns a string" value = fortios_dnsfilter_profile.this.sdns_ftgd_err_log } output "youtube_restrict" { description = "returns a string" value = fortios_dnsfilter_profile.this.youtube_restrict } output "this" { value = fortios_dnsfilter_profile.this } ``` [top](#index)
22.915119
71
0.637458
eng_Latn
0.793352
d5d1660bd32434f905b75031aaec45ed4580a869
7,087
md
Markdown
docs/standard/assembly/friend.md
Jteve-Sobs/docs.de-de
06092136f031dda8715cfe6928a4fdc0ec6c0899
[ "CC-BY-4.0", "MIT" ]
null
null
null
docs/standard/assembly/friend.md
Jteve-Sobs/docs.de-de
06092136f031dda8715cfe6928a4fdc0ec6c0899
[ "CC-BY-4.0", "MIT" ]
null
null
null
docs/standard/assembly/friend.md
Jteve-Sobs/docs.de-de
06092136f031dda8715cfe6928a4fdc0ec6c0899
[ "CC-BY-4.0", "MIT" ]
null
null
null
--- title: Friend-Assemblys ms.date: 08/20/2019 ms.assetid: b65ea7de-0801-477a-a39c-e914c2cc107c dev_langs: - csharp - vb ms.openlocfilehash: a74d4b74ead8492028a092e090f9281231802a87 ms.sourcegitcommit: 7588136e355e10cbc2582f389c90c127363c02a5 ms.translationtype: HT ms.contentlocale: de-DE ms.lasthandoff: 03/15/2020 ms.locfileid: "74348169" --- # <a name="friend-assemblies"></a>Friend-Assemblys Eine *Friend-Assembly* ist eine Assembly, die auf die [Friend-](../../visual-basic/language-reference/modifiers/friend.md) (Visual Basic) oder [internen](../../csharp/language-reference/keywords/internal.md) (C#) Typen und Member einer anderen Assembly zugreifen kann. Wenn Sie eine Assembly als Friend-Assembly identifizieren, müssen Sie Typen und Member nicht mehr als öffentlich markieren, damit andere Assemblys auf sie zugreifen können. Dies ist insbesondere in folgenden Szenarios nützlich: - Wenn der Testcode bei Komponententests in einer separaten Assembly ausgeführt wird, aber Zugriff auf Member in der getesteten Assembly benötigt, die als `internal` in C# oder `Friend` in Visual Basic markiert sind. - Wenn beim Entwickeln einer Klassenbibliothek die Ergänzungen der Bibliothek in separaten Assemblys enthalten sind, aber Zugriff auf Member in vorhandenen Assemblys erfordern, die als `internal` in C# oder `Friend` in Visual Basic markiert sind. ## <a name="remarks"></a>Hinweise Sie können das Attribut <xref:System.Runtime.CompilerServices.InternalsVisibleToAttribute> verwenden, um eine oder mehrere Friend-Assemblys für eine angegebene Assembly zu identifizieren. Im folgenden Beispiel wird das Attribut <xref:System.Runtime.CompilerServices.InternalsVisibleToAttribute> in *Assembly A* verwendet, und *Assembly B* wird als Friend-Assembly angegeben. Dadurch erhält *Assembly B* Zugriff auf alle Typen und Member in *Assembly A*, die als `internal` (C#) oder `Friend` (Visual Basic) markiert sind. > [!NOTE] > Wenn Sie eine Assembly wie *Assembly B* kompilieren, die auf interne Typen oder Member einer anderen Assembly wie *Assembly A* zugreift, müssen Sie den Namen der Ausgabedatei ( *.exe* oder *.dll*) explizit mithilfe der Compileroption **-out** festlegen. Dies ist erforderlich, da der Compiler den Namen für die Assembly, die er erstellt, noch nicht generiert hat, wenn er Bindungen an externe Referenzen vornimmt. Weitere Informationen hierzu finden Sie unter [-out (C#)](../../csharp/language-reference/compiler-options/out-compiler-option.md) oder [-out (Visual Basic)](../../visual-basic/reference/command-line-compiler/out.md). ```csharp using System.Runtime.CompilerServices; using System; [assembly: InternalsVisibleTo("AssemblyB")] // The class is internal by default. class FriendClass { public void Test() { Console.WriteLine("Sample Class"); } } // Public class that has an internal method. public class ClassWithFriendMethod { internal void Test() { Console.WriteLine("Sample Method"); } } ``` ```vb Imports System.Runtime.CompilerServices <Assembly: InternalsVisibleTo("AssemblyB")> ' Friend class. Friend Class FriendClass Public Sub Test() Console.WriteLine("Sample Class") End Sub End Class ' Public class with a Friend method. Public Class ClassWithFriendMethod Friend Sub Test() Console.WriteLine("Sample Method") End Sub End Class ``` Nur Assemblys, die Sie explizit als Friends angeben, können auf die Typen und Member `internal` (C#) oder `Friend` (Visual Basic) zugreifen. Wenn *Assembly B* beispielsweise ein Friend von *Assembly A* ist und *Assembly C* auf *Assembly B* verweist, verfügt *Assembly C* nicht über Zugriff auf die Typen `internal` (C#) oder `Friend` (Visual Basic) in *Assembly A*. Der Compiler führt eine grundlegende Prüfung des Namens der Friend-Assembly durch, der an das Attribut <xref:System.Runtime.CompilerServices.InternalsVisibleToAttribute> übergeben wird. Wenn *Assembly A* die *Assembly B* als Friend-Assembly deklariert, lauten die Validierungsregeln wie folgt: - Wenn *Assembly A* einen starken Namen hat, muss *Assembly B* auch einen starken Namen haben. Der Name der Friend-Assembly, der an das Attribut übergeben wird, muss aus dem Namen der Assembly und dem öffentlichen Schlüssel der Schlüsseldatei mit starkem Namen bestehen, der zum Signieren von *Assembly B* verwendet wird. Der Name der Friend-Assembly, der an das <xref:System.Runtime.CompilerServices.InternalsVisibleToAttribute>-Attribut übergeben wird, kann nicht der starke Name der *Assembly B* sein. Fügen Sie keine Assemblyversion, Kultur, Architektur und kein öffentliches Schlüsseltoken ein. - Wenn *Assembly A* keinen starken Namen hat, sollte der Name der Friend-Assembly nur aus dem Assemblynamen bestehen. Weitere Informationen finden Sie unter [Vorgehensweise: Erstellen von unsignierten Friend-Assemblys](create-unsigned-friend.md). - Wenn *Assembly B* einen starken Namen hat, müssen Sie die Schlüsseldatei mit starkem Namen für *Assembly B* über die Projekteinstellung oder über die Compileroption `/keyfile` in der Befehlszeile angeben. Weitere Informationen finden Sie unter [Vorgehensweise: Erstellen von signierten Friend-Assemblys](create-signed-friend.md). Die Klasse <xref:System.Security.Permissions.StrongNameIdentityPermission> bietet auch die Möglichkeit zur Freigabe von Typen mit folgenden Unterschieden: - <xref:System.Security.Permissions.StrongNameIdentityPermission> gilt für einen einzelnen Typ, während eine Friend-Assembly für die gesamte Assembly gilt. - Wenn Hunderte Typen in *Assembly A* vorliegen, die Sie für *Assembly B* freigeben möchten, müssen Sie <xref:System.Security.Permissions.StrongNameIdentityPermission> zu allen Typen hinzufügen. Wenn Sie eine Friend-Assembly verwenden, müssen Sie die Friend-Beziehung nur einmal deklarieren. - Bei Verwendung von <xref:System.Security.Permissions.StrongNameIdentityPermission> müssen die Typen, die Sie freigeben möchten, als öffentlich deklariert werden. Wenn Sie eine Friend-Assembly verwenden, werden die freigegebenen Typen in `internal` (C#) oder `Friend` (Visual Basic) deklariert. Informationen darüber, wie Sie über eine Moduldatei (eine Datei mit der Dateierweiterung *.netmodule*) auf die Typen und Methoden `internal` (C#) oder `Friend` (Visual Basic) zugreifen, finden Sie unter [-moduleassemblyname (C#)](../../csharp/language-reference/compiler-options/moduleassemblyname-compiler-option.md) oder [-moduleassemblyname (Visual Basic)](../../visual-basic/reference/command-line-compiler/moduleassemblyname.md). ## <a name="see-also"></a>Siehe auch - <xref:System.Runtime.CompilerServices.InternalsVisibleToAttribute> - <xref:System.Security.Permissions.StrongNameIdentityPermission> - [How to: Erstellen von unsignierten Friend-Assemblys](create-unsigned-friend.md) - [How to: Erstellen von signierten Friend-Assemblys](create-signed-friend.md) - [Assemblys in .NET](index.md) - [C#-Programmierhandbuch](../../csharp/programming-guide/index.md) - [Programmierkonzepte (Visual Basic)](../../visual-basic/programming-guide/concepts/index.md)
66.858491
633
0.786793
deu_Latn
0.971536
d5d211e890968bb8dfce2dfc7e3f2997fba1f9ff
1,658
md
Markdown
README.md
benoitc/erlzmq2
a3c572061e58732ac0144bc91da22e36592c37a3
[ "MIT" ]
1
2020-01-21T11:10:53.000Z
2020-01-21T11:10:53.000Z
README.md
benoitc/erlzmq2
a3c572061e58732ac0144bc91da22e36592c37a3
[ "MIT" ]
null
null
null
README.md
benoitc/erlzmq2
a3c572061e58732ac0144bc91da22e36592c37a3
[ "MIT" ]
null
null
null
erlzmq2 ==== NIF based Erlang bindings for the ZeroMQ messaging library. Copyright (c) 2011 Yurii Rashkovskii, Evax Software and Michael Truog Overview ======== The erlzmq2 application provides high-performance NIF based Erlang bindings for the ZeroMQ messaging library. Downloading =========== The erlzmq2 source code can be found on [GitHub](https://github.com/yrashk/erlzmq2) $ git clone http://github.com/zeromq/erlzmq2.git It is also available on [Agner](http://erlagner.org/): $ agner build erlzmq In order to build erlzmq2 against a specific version of ZeroMQ (not `v2.1.11`), use this: $ ZEROMQ_VERSION=v<VERSION> agner build erlzmq Building ======== Build the code $ make If you want to build against a specific version of ZeroMQ (not `v2.1.11`), use this: $ ZEROMQ_VERSION=v<VERSION> make Build the docs $ make docs Run the test suite $ make test Run the benchmarks (requires [python](http://www.python.org) and [matplotlib](http://matplotlib.sourceforge.net/)) $ make bench This will run performance tests and output png graphs in the graphs directory. Please note that to behave properly on your system ZeroMQ might require [some tuning](http://www.zeromq.org/docs:tuning-zeromq). Architecture ============ The bindings use Erlang's [NIF (native implemented functions)](http://www.erlang.org/doc/man/erl_nif.html) interface to achieve the best performance. One extra OS thread and one pair of inproc sockets by context are used to simulate blocking recv calls without affecting the Erlang virtual machine's responsiveness. License ======= The project is released under the MIT license.
25.507692
315
0.736429
eng_Latn
0.904811
d5d28943be205a83c3b27b064bcd4943abaeb54c
4,718
md
Markdown
articles/cosmos-db/cassandra-secondary-index.md
julianosaless/azure-docs.pt-br
461791547c9cc2b4df751bb3ed881ce57796f1e4
[ "CC-BY-4.0", "MIT" ]
null
null
null
articles/cosmos-db/cassandra-secondary-index.md
julianosaless/azure-docs.pt-br
461791547c9cc2b4df751bb3ed881ce57796f1e4
[ "CC-BY-4.0", "MIT" ]
null
null
null
articles/cosmos-db/cassandra-secondary-index.md
julianosaless/azure-docs.pt-br
461791547c9cc2b4df751bb3ed881ce57796f1e4
[ "CC-BY-4.0", "MIT" ]
null
null
null
--- title: Indexação na conta de API do Cassandra Azure Cosmos DB description: Saiba como a indexação secundária funciona no Azure Azure Cosmos DB conta de API do Cassandra. author: TheovanKraay ms.service: cosmos-db ms.topic: conceptual ms.date: 04/04/2020 ms.author: thvankra ms.reviewer: sngun ms.openlocfilehash: 7de38097acdbfa1f9c9b90f3051c68dec5465b32 ms.sourcegitcommit: 849bb1729b89d075eed579aa36395bf4d29f3bd9 ms.translationtype: MT ms.contentlocale: pt-BR ms.lasthandoff: 04/28/2020 ms.locfileid: "80758021" --- # <a name="secondary-indexing-in-azure-cosmos-db-cassandra-api"></a>Indexação secundária no Azure Cosmos DB API do Cassandra O API do Cassandra no Azure Cosmos DB aproveita a infraestrutura de indexação subjacente para expor a força de indexação que é inerente à plataforma. No entanto, ao contrário da API do SQL principal, API do Cassandra em Azure Cosmos DB não indexa todos os atributos por padrão. Em vez disso, ele dá suporte à indexação secundária para criar um índice em determinados atributos, que se comportam da mesma forma que o Apache Cassandra. Em geral, não é recomendável executar consultas de filtro nas colunas que não estão particionadas. Você deve usar a sintaxe permitir filtragem explicitamente, o que resulta em uma operação que pode não ter um bom desempenho. No Azure Cosmos DB você pode executar essas consultas em atributos de baixa cardinalidade porque elas se descobrem entre partições para recuperar os resultados. Não é recomendável criar um índice em uma coluna atualizada com frequência. É prudente criar um índice quando você define a tabela. Isso garante que os dados e índices estejam em um estado consistente. Caso você crie um novo índice nos dados existentes, no momento, não é possível rastrear a alteração de progresso do índice para a tabela. Se você precisar acompanhar o progresso dessa operação, precisará solicitar a alteração de progresso por meio de um [tíquete de suporte]( https://docs.microsoft.com/azure/azure-portal/supportability/how-to-create-azure-support-request). > [!NOTE] > Não há suporte para o índice secundário nos seguintes objetos: > - tipos de dados como tipos de coleção congelado, decimal e tipos variantes. > - Colunas estáticas > - Chaves de clustering ## <a name="indexing-example"></a>Exemplo de indexação Primeiro, crie uma tabela e um keyspace de exemplo executando os seguintes comandos no prompt do Shell CQL: ```shell CREATE KEYSPACE sampleks WITH REPLICATION = {'class' : 'SimpleStrategy'}; CREATE TABLE sampleks.t1(user_id int PRIMARY KEY, lastname text) WITH cosmosdb_provisioned_throughput=400; ``` Em seguida, insira dados de usuário de exemplo com os seguintes comandos: ```shell insert into sampleks.t1(user_id,lastname) values (1, 'nishu'); insert into sampleks.t1(user_id,lastname) values (2, 'vinod'); insert into sampleks.t1(user_id,lastname) values (3, 'bat'); insert into sampleks.t1(user_id,lastname) values (5, 'vivek'); insert into sampleks.t1(user_id,lastname) values (6, 'siddhesh'); insert into sampleks.t1(user_id,lastname) values (7, 'akash'); insert into sampleks.t1(user_id,lastname) values (8, 'Theo'); insert into sampleks.t1(user_id,lastname) values (9, 'jagan'); ``` Se você tentar executar a instrução a seguir, encontrará um erro que solicita que você use `ALLOW FILTERING`: ```shell select user_id, lastname from sampleks.t1 where lastname='nishu'; ``` Embora o API do Cassandra ofereça suporte à filtragem de permitir, conforme mencionado na seção anterior, não é recomendável. Em vez disso, você deve criar um índice no conforme mostrado no exemplo a seguir: ```shell CREATE INDEX ON sampleks.t1 (lastname); ``` Depois de criar um índice no campo "LastName", agora você pode executar a consulta anterior com êxito. Com API do Cassandra no Azure Cosmos DB, você não precisa fornecer um nome de índice. Um índice padrão com formato `tablename_columnname_idx` é usado. Por exemplo, ` t1_lastname_idx` é o nome do índice para a tabela anterior. ## <a name="dropping-the-index"></a>Descartando o índice Você precisa saber qual é o nome do índice para descartar o índice. Execute o `desc schema` comando para obter a descrição da tabela. A saída desse comando inclui o nome do índice no formato `CREATE INDEX tablename_columnname_idx ON keyspacename.tablename(columnname)`. Em seguida, você pode usar o nome do índice para descartar o índice, conforme mostrado no exemplo a seguir: ```shell drop index sampleks.t1_lastname_idx; ``` ## <a name="next-steps"></a>Próximas etapas * Saiba como funciona a [indexação automática](index-overview.md) no Azure Cosmos DB * [Recursos do Apache Cassandra compatíveis com a API do Cassandra do Azure Cosmos DB](cassandra-support.md)
61.272727
576
0.78847
por_Latn
0.997179
d5d32326656eafb61e4c4b143ad54d840ef1e035
5,315
md
Markdown
docs/framework/data/adonet/implement-copytodatatable-where-type-not-a-datarow.md
felpasl/docs.pt-br
1b47adcbc2e400f937650f9de1cd0c511e80738e
[ "CC-BY-4.0", "MIT" ]
null
null
null
docs/framework/data/adonet/implement-copytodatatable-where-type-not-a-datarow.md
felpasl/docs.pt-br
1b47adcbc2e400f937650f9de1cd0c511e80738e
[ "CC-BY-4.0", "MIT" ]
null
null
null
docs/framework/data/adonet/implement-copytodatatable-where-type-not-a-datarow.md
felpasl/docs.pt-br
1b47adcbc2e400f937650f9de1cd0c511e80738e
[ "CC-BY-4.0", "MIT" ]
null
null
null
--- title: 'Como: Implementar CopyToDataTable<T> onde o tipo genérico T não é um DataRow' ms.date: 03/30/2017 dev_langs: - csharp - vb ms.assetid: b27b52cf-6172-485f-a75c-70ff9c5a2bd4 ms.openlocfilehash: 1f79bd421d4c504556074468f8ab7e032d3eca43 ms.sourcegitcommit: 14355b4b2fe5bcf874cac96d0a9e6376b567e4c7 ms.translationtype: MT ms.contentlocale: pt-BR ms.lasthandoff: 01/30/2019 ms.locfileid: "55288152" --- # <a name="how-to-implement-copytodatatablet-where-the-generic-type-t-is-not-a-datarow"></a>Como: Implementar CopyToDataTable\<T > em que o tipo genérico T não é um DataRow O objeto de <xref:System.Data.DataTable> é freqüentemente usado para associação de dados. O método <xref:System.Data.DataTableExtensions.CopyToDataTable%2A> recebe os resultados de uma consulta e copia os dados em um <xref:System.Data.DataTable>, que podem ser usados para vinculação de dados. Os métodos de <xref:System.Data.DataTableExtensions.CopyToDataTable%2A> , no entanto, somente operam em uma fonte de <xref:System.Collections.Generic.IEnumerable%601> onde o parâmetro genérico `T` é do tipo <xref:System.Data.DataRow>. Embora isso é útil, não permite que as tabelas são criadas de uma sequência de tipos escalares, as consultas que o projeto tipos anônimos, ou de consultas que executam a tabela join. Este tópico descreve como implementar dois métodos personalizados de extensão de `CopyToDataTable<T>` que aceita um parâmetro genérico `T` de um tipo diferente <xref:System.Data.DataRow>. A lógica para criar <xref:System.Data.DataTable> de uma fonte de <xref:System.Collections.Generic.IEnumerable%601> está contida na classe de `ObjectShredder<T>` , que é empacotada em dois métodos sobrecarregados de extensão de `CopyToDataTable<T>` . O método de `Shred` da classe de `ObjectShredder<T>` retorna <xref:System.Data.DataTable> preenchido e três aceita parâmetros de entrada: uma fonte de <xref:System.Collections.Generic.IEnumerable%601> , um <xref:System.Data.DataTable>, e uma enumeração de <xref:System.Data.LoadOption> . O esquema inicial de <xref:System.Data.DataTable> retornado é baseado no esquema de tipo `T`. Se uma tabela existente é fornecida como entrada, o esquema deve ser consistente com o esquema de tipo `T`. Cada propriedade pública e campo de tipo `T` são convertidos na tabela a <xref:System.Data.DataColumn> retornado. Se a sequência de origem contiver um tipo derivado de `T`, o esquema retornado da tabela é expandido para todas as propriedades públicas e campos adicionais. Para obter exemplos de como usar os métodos `CopyToDataTable<T>` personalizados, confira [Criando uma DataTable com base em uma consulta](../../../../docs/framework/data/adonet/creating-a-datatable-from-a-query-linq-to-dataset.md). ### <a name="to-implement-the-custom-copytodatatablet-methods-in-your-application"></a>Para implementar os métodos CopyToDataTable\<T> personalizados no aplicativo 1. Implementar a classe de `ObjectShredder<T>` para criar <xref:System.Data.DataTable> de uma fonte de <xref:System.Collections.Generic.IEnumerable%601> : [!code-csharp[DP Custom CopyToDataTable Examples#ObjectShredderClass](../../../../samples/snippets/csharp/VS_Snippets_ADO.NET/DP Custom CopyToDataTable Examples/CS/Program.cs#objectshredderclass)] [!code-vb[DP Custom CopyToDataTable Examples#ObjectShredderClass](../../../../samples/snippets/visualbasic/VS_Snippets_ADO.NET/DP Custom CopyToDataTable Examples/VB/Module1.vb#objectshredderclass)] O exemplo anterior pressupõe que as propriedades da `DataColumn` não sejam tipos que permitem valor nulo. Para manipular propriedades com tipos que permitem valor nulo, use o seguinte código: ```csharp DataColumn dc = table.Columns.Contains(p.Name) ? table.Columns[p.Name] : table.Columns.Add(p.Name, Nullable.GetUnderlyingType(p.PropertyType) ?? p.PropertyType); ``` 2. Implementar métodos personalizados de extensão de `CopyToDataTable<T>` em uma classe: [!code-csharp[DP Custom CopyToDataTable Examples#CustomCopyToDataTableMethods](../../../../samples/snippets/csharp/VS_Snippets_ADO.NET/DP Custom CopyToDataTable Examples/CS/Program.cs#customcopytodatatablemethods)] [!code-vb[DP Custom CopyToDataTable Examples#CustomCopyToDataTableMethods](../../../../samples/snippets/visualbasic/VS_Snippets_ADO.NET/DP Custom CopyToDataTable Examples/VB/Module1.vb#customcopytodatatablemethods)] 3. Adicionar a classe de `ObjectShredder<T>` e métodos de extensão de `CopyToDataTable<T>` ao seu aplicativo. ```vb Module Module1 Sub Main() ' Your application code using CopyToDataTable<T>. End Sub End Module Public Module CustomLINQtoDataSetMethods … End Module Public Class ObjectShredder(Of T) … End Class ``` ```csharp class Program { static void Main(string[] args) { // Your application code using CopyToDataTable<T>. } } public static class CustomLINQtoDataSetMethods { … } public class ObjectShredder<T> { … } ``` ## <a name="see-also"></a>Consulte também - [Criando um DataTable de uma consulta](../../../../docs/framework/data/adonet/creating-a-datatable-from-a-query-linq-to-dataset.md) - [Guia de Programação](../../../../docs/framework/data/adonet/programming-guide-linq-to-dataset.md)
67.278481
1,202
0.762747
por_Latn
0.851137
d5d3953c311e73b944906f948847c21796bfbb97
1,754
md
Markdown
articles/supply-chain/warehousing/tasks/create-mobile-device-license-plate-consolidation.md
tradotto/dynamics-365-unified-operations-public
06b4dbaadf8063c41bf25889720675b98c0ba0c5
[ "CC-BY-4.0", "MIT" ]
1
2020-10-09T07:56:12.000Z
2020-10-09T07:56:12.000Z
articles/supply-chain/warehousing/tasks/create-mobile-device-license-plate-consolidation.md
tradotto/dynamics-365-unified-operations-public
06b4dbaadf8063c41bf25889720675b98c0ba0c5
[ "CC-BY-4.0", "MIT" ]
null
null
null
articles/supply-chain/warehousing/tasks/create-mobile-device-license-plate-consolidation.md
tradotto/dynamics-365-unified-operations-public
06b4dbaadf8063c41bf25889720675b98c0ba0c5
[ "CC-BY-4.0", "MIT" ]
1
2021-09-17T06:18:23.000Z
2021-09-17T06:18:23.000Z
--- # required metadata title: Create a mobile device menu item for license plate consolidation description: This procedure shows you how to create a mobile device menu item for license plate consolidation work. author: ShylaThompson manager: AnnBe ms.date: 08/29/2018 ms.topic: business-process ms.prod: ms.service: dynamics-ax-applications ms.technology: # optional metadata ms.search.form: WHSRFMenuItem audience: Application User # ms.devlang: ms.reviewer: josaw ms.search.scope: Core, Operations # ms.tgt_pltfrm: # ms.custom: ms.search.region: Global ms.search.industry: Distribution ms.author: mirzaab ms.search.validFrom: 2016-06-30 ms.dyn365.ops.version: Version 7.0.0 --- # Create a mobile device menu item for license plate consolidation [!include [task guide banner](../../includes/task-guide-banner.md)] This procedure shows you how to create a mobile device menu item for license plate consolidation work. This enables warehouse workers to consolidate items on one license plate with items on another license place within the same location. For example, they might use this if subsequent staging steps were the same on both work orders, so that the work only needs to be performed once for the merged items. You can use this procedure in demo data company USMF. The task would typically be carried out by a warehouse manager. This procedure is for a feature that was added in Dynamics 365 for Operations, version 1611. 1. Go to Warehouse management > Setup > Mobile device > Mobile device menu items. 2. Click New. 3. In the Menu item name field, type a value. 4. In the Title field, type a value. 5. In the Mode field, select 'Indirect'. 6. In the Activity code field, select 'Consolidate license plates'.
41.761905
615
0.77195
eng_Latn
0.98716
d5d3cb2578759d8c23385d289c35dab29565567a
5,075
md
Markdown
articles/commerce/default-customer.md
MicrosoftDocs/Dynamics-365-Operations.pl-pl
fabc82553d43158349e740e44634860e5c927b6d
[ "CC-BY-4.0", "MIT" ]
5
2020-05-18T17:14:43.000Z
2022-03-02T03:47:15.000Z
articles/commerce/default-customer.md
MicrosoftDocs/Dynamics-365-Operations.pl-pl
fabc82553d43158349e740e44634860e5c927b6d
[ "CC-BY-4.0", "MIT" ]
8
2017-12-12T13:01:05.000Z
2021-01-17T16:41:42.000Z
articles/commerce/default-customer.md
MicrosoftDocs/Dynamics-365-Operations.pl-pl
fabc82553d43158349e740e44634860e5c927b6d
[ "CC-BY-4.0", "MIT" ]
4
2019-10-12T18:17:43.000Z
2021-01-17T16:37:51.000Z
--- title: Tworzenie domyślnego odbiorcy description: W tym temacie opisano sposób tworzenia domyślnego odbiorcy używanego podczas tworzenia kanału w Microsoft Dynamics 365 Commerce. author: samjarawan ms.date: 01/27/2020 ms.topic: article ms.prod: '' ms.technology: '' audience: Application User ms.reviewer: v-chgri ms.custom: '' ms.assetid: '' ms.search.region: Global ms.author: samjar ms.search.validFrom: 2020-01-20 ms.dyn365.ops.version: Release 10.0.8 ms.openlocfilehash: ff9e5665ffd82982e09f63e34b30ae6937666231855587ad2f27c5231ead8419 ms.sourcegitcommit: 42fe9790ddf0bdad911544deaa82123a396712fb ms.translationtype: HT ms.contentlocale: pl-PL ms.lasthandoff: 08/05/2021 ms.locfileid: "6720966" --- # <a name="create-a-default-customer"></a>Tworzenie domyślnego odbiorcy [!include [banner](includes/banner.md)] W tym temacie opisano sposób tworzenia domyślnego odbiorcy używanego podczas tworzenia kanału w Microsoft Dynamics 365 Commerce. Podczas tworzenia kanału lub online konieczne jest podanie odbiorcy domyślnego. Domyślny odbiorca można łatwo utworzyć po uprzednim utworzeniu grupy odbiorców i książki adresowej klienta. ## <a name="create-a-customer-group"></a>Tworzenie grupy odbiorców Jeśli nie istnieją jeszcze grupy odbiorców, można ją utworzyć. Przykładami mogą być grupy odpowiadające różnym grupom odbiorców, takim jak hurtownie, handel detaliczny, Internet, pracownicy itd. Aby utworzyć grupę odbiorców, należy wykonać poniższe kroki. 1. W okienku nawigacji przejdź do **Moduły \> Retail i Commerce \> Pracownicy etatpwi \> Grupy uprawnień**. 1. W okienku akcji wybierz opcję **Nowy**. 1. W okienku **Grupa odbiorców** wprowadź identyfikator grupy odbiorców. 1. W razie potrzeby w polu **Opis** wprowadź opis. 1. W razie potrzeby w polu **Warunki płatności** wprowadź wartość. 1. W polu **czas między datą płatności faktury i datą** płatności wprowadź odpowiednią wartość. 1. W polu **Domyślna grupa podatków** wprowadź grupę podatków, jeśli ma ona być stosowana. 1. To pole wyboru **Ceny zawierają podatek**, jeśli ma być stosowane. 1. W polu **Domyślna przyczyna odpisu** wprowadź odpowiednią wartość, jeśli ma zastosowanie. Poniższy obraz pokazuje kilku skonfigurowanych grup odbiorców. ![Grupy odbiorców.](media/customer-groups.png) ## <a name="create-a-customer-address-book"></a>Tworzenie książki adresowej odbiorców Odbiorca musi być skojarzony z książką adresową. Jeśli jeszcze nie została utworzona, należy ją utworzyć. Aby utworzyć książkę adresową odbiorcy należy wykonać poniższe kroki. 1. W okienku nawigacji kliknij kolejno opcje **Moduły \> Retail i commerce \> Ustawienia kanału \> Książki adresowe**. 1. W okienku akcji wybierz opcję **Nowy**. 1. W polu **Nazwa** wprowadź nazwę. 1. W polu **Opis** wprowadź opis. 1. Na okienku akcji wybierz opcję **Zapisz**. Poniższy obraz przedstawia przykład książki adresowej. ![Książka adresowa.](media/address-book.png) ## <a name="create-a-default-customer"></a>Tworzenie domyślnego odbiorcy Aby utworzyć domyślnego odbiorcę, należy wykonać poniższe kroki. 1. W okienku nawigacji przejdź do **Moduły \> Retail i Commerce \> Pracownicy etatpwi \> Wszyscy odbiorcy**. 1. W okienku akcji wybierz opcję **Nowy**. 1. Z listy rozwijanej **Typ** wybierz „Osoba”. 1. Z listy rozwijanej **Konto odbiorcy** wybierz lub wprowadź numer konta (na przykład „100001”). 1. Z listy rozwijanej **Imię** wybierz lub wprowadź nazwę (na przykład „domyślna”). 1. Z listy rozwijanej **Drugie imię** wybierz lub wprowadź nazwę (na przykład „Retail”). 1. Z listy rozwijanej **Nazwisko** wybierz lub wprowadź nazwę (na przykład „Odbiorca”). 1. Z listy rozwijanej **Waluta** wybierz lub wprowadź walutę (na przykład „USD”). 1. Z listy rozwijanej **Waluta** Wybierz utworzoną wcześniej grupę odbiorców. 1. Z listy rozwijanej **Książki adresowe** wybierz istniejącą książkę adresową klienta. 1. Wybierz opcję **Zapisz**, aby zapisać i powrócić do ekranu szczegółów odbiorcy dla nowego odbiorcy. > [!NOTE] > Nie trzeba dodawać adresu dla domyślnego odbiorcy. Poniższy obraz przedstawia przykład tworzenia odbiorcy. ![Domyślne tworzenie odbiorcy.](media/default-customer-creation.png) Poniższy rysunek przedstawia domyślną konfigurację klienta. ![Konfiguracja przykładowa odbiorcy.](media/default-customer-configuration1.png) Większość wartości domyślnych na ekranie szczegóły odbiorcy może pozostać, ale dwie wartości powinny zostać zmienione. 1. Na ekranie szczegóły odbiorcy rozwiń węzeł **Ustawienia domyślne zamówienia sprzedaży**. 1. Z listy rozwijanej **Witryna** wybierz lub wprowadź wstępnie skonfigurowany oddział. 1. Z listy rozwijanej **Magazyn** wybierz lub wprowadź wstępnie skonfigurowany magazyn. Poniższy obraz przedstawia przykład konfiguracji tworzenia odbiorcy. ![Przykład konfiguracji odbiorcy.](media/default-customer-configuration2.png) ## <a name="additional-resources"></a>Dodatkowe zasoby [Omówienie kanałów](channels-overview.md) [Wymagania wstępne dotyczące konfiguracji kanału](channels-prerequisites.md) [!INCLUDE[footer-include](../includes/footer-banner.md)]
44.911504
194
0.788177
pol_Latn
0.999888
d5d3d512f3c441114235128d806378de29f4b4ac
61
md
Markdown
README.md
kasworld/wxpy-stopwatch
e623d0146b5550288b46ef97367653c814321d2e
[ "Apache-2.0" ]
null
null
null
README.md
kasworld/wxpy-stopwatch
e623d0146b5550288b46ef97367653c814321d2e
[ "Apache-2.0" ]
null
null
null
README.md
kasworld/wxpy-stopwatch
e623d0146b5550288b46ef97367653c814321d2e
[ "Apache-2.0" ]
null
null
null
# simple stopwatch ## requirements python 2.x wxpython
7.625
19
0.704918
eng_Latn
0.965707
d5d3dcfafee808be08680ae890401ec0cd367910
643
md
Markdown
content/ecomerce/problemStatement/index.md
josueal1/v4
bfe01fa939d1ef88320249d6587cb35c7494f1a8
[ "MIT" ]
null
null
null
content/ecomerce/problemStatement/index.md
josueal1/v4
bfe01fa939d1ef88320249d6587cb35c7494f1a8
[ "MIT" ]
3
2021-05-16T05:15:34.000Z
2021-06-05T20:26:56.000Z
content/ecomerce/problemStatement/index.md
josueal1/v4
bfe01fa939d1ef88320249d6587cb35c7494f1a8
[ "MIT" ]
null
null
null
--- title: 'Eco-Merce' avatar: './problem-statement.png' --- <h3>What?</h3> This is an online marketplace that allows users to buy and sell eco-friendly, 'green' products. Every item listed on the website is guaranteed to be made of sustainable materials and ethical labor practices. This vision includes the core principles of convenience, affordability, and variety. <hr/> <h3>Why?</h3> Every year we produce over 300 million tons of plastic -- that’s equivalent to 200 million Toyota Corollas -- with just half of that going to single-use plastic. If we continue in this direction, we’ll have more plastic in the ocean than fish by 2050.
53.583333
292
0.765163
eng_Latn
0.998498
d5d4551b62d6ad74601fee70372a0207297f1b41
22,436
md
Markdown
articles/azure-monitor/samples/powershell-samples.md
tsunami416604/azure-docs.hu-hu
aeba852f59e773e1c58a4392d035334681ab7058
[ "CC-BY-4.0", "MIT" ]
null
null
null
articles/azure-monitor/samples/powershell-samples.md
tsunami416604/azure-docs.hu-hu
aeba852f59e773e1c58a4392d035334681ab7058
[ "CC-BY-4.0", "MIT" ]
null
null
null
articles/azure-monitor/samples/powershell-samples.md
tsunami416604/azure-docs.hu-hu
aeba852f59e773e1c58a4392d035334681ab7058
[ "CC-BY-4.0", "MIT" ]
null
null
null
--- title: PowerShell-minták Azure Monitor description: A PowerShell használatával férhet hozzá olyan Azure Monitor-funkciókhoz, mint például az autoscale, a riasztások, a webhookok és a keresési tevékenységek naplói. ms.subservice: '' ms.topic: sample author: bwren ms.author: bwren ms.date: 2/14/2018 ms.custom: devx-track-azurepowershell ms.openlocfilehash: 4f7ddf94bbd077912cf0d7c2adef2eac548274ca ms.sourcegitcommit: 5b93010b69895f146b5afd637a42f17d780c165b ms.translationtype: MT ms.contentlocale: hu-HU ms.lasthandoff: 12/02/2020 ms.locfileid: "96532278" --- # <a name="azure-monitor-powershell-samples"></a>PowerShell-minták Azure Monitor Ebből a cikkből megtudhatja, hogyan érheti el Azure Monitor szolgáltatásait a PowerShell-parancsok segítségével. > [!NOTE] > A Azure Monitor az "Azure-betekintő" nevű új név, 2016. szeptember 25-én. Azonban a névterek és így a következő parancsok továbbra is tartalmazzák a Word- *ismereteket*. [!INCLUDE [updated-for-az](../../../includes/updated-for-az.md)] ## <a name="set-up-powershell"></a>A PowerShell beállítása Ha még nem tette meg, állítsa be a PowerShellt úgy, hogy a számítógépen fusson. További információ: [a PowerShell telepítése és konfigurálása](/powershell/azure/). ## <a name="examples-in-this-article"></a>Példák ebben a cikkben A cikkben szereplő példák bemutatják, hogyan használhatja Azure Monitor parancsmagokat. Áttekintheti Azure Monitor PowerShell-parancsmagok teljes listáját Azure Monitor (betekintő [) parancsmagok](/powershell/module/az.applicationinsights)esetén is. ## <a name="sign-in-and-use-subscriptions"></a>Bejelentkezés és előfizetés használata Először jelentkezzen be az Azure-előfizetésbe. ```powershell Connect-AzAccount ``` Ekkor megjelenik a bejelentkezési képernyő. Miután bejelentkezett a fiókjába, a TenantID és az alapértelmezett előfizetés-azonosító megjelenik. Az összes Azure-parancsmag az alapértelmezett előfizetés kontextusában működik. A következő parancs használatával tekintheti meg az Ön számára elérhető előfizetések listáját: ```powershell Get-AzSubscription ``` A következő parancs futtatásával megtekintheti a munkakörnyezetét (mely előfizetéssel futtatja a parancsokat): ```powershell Get-AzContext ``` Ha módosítani szeretné a munkakörnyezetét egy másik előfizetésre, használja a következő parancsot: ```powershell Set-AzContext -SubscriptionId <subscriptionid> ``` ## <a name="retrieve-activity-log"></a>Tevékenység naplójának beolvasása Használja a [Get-AzLog](/powershell/module/az.monitor/get-azlog) parancsmagot. Az alábbiakban néhány gyakori példát talál. A Tevékenységnapló az elmúlt 90 nap műveleteit tárolja. Az idő előtti dátumok használata hibaüzenetet eredményez. Az alábbi parancsokban megtekintheti, hogy az aktuális dátum/idő milyen időpontot használjon: ```powershell Get-Date ``` Naplóbejegyzések beolvasása ebből az időpontból/dátumból: ```powershell Get-AzLog -StartTime 2019-03-01T10:30 ``` Naplóbejegyzések beolvasása egy idő/dátumtartomány között: ```powershell Get-AzLog -StartTime 2019-01-01T10:30 -EndTime 2015-01-01T11:30 ``` Naplóbejegyzések beolvasása egy adott erőforráscsoporthoz: ```powershell Get-AzLog -ResourceGroup 'myrg1' ``` A naplóbejegyzések beolvasása egy adott erőforrás-szolgáltatótól egy idő/dátumtartomány között: ```powershell Get-AzLog -ResourceProvider 'Microsoft.Web' -StartTime 2015-01-01T10:30 -EndTime 2015-01-01T11:30 ``` Minden naplóbejegyzés beolvasása egy megadott hívóval: ```powershell Get-AzLog -Caller '[email protected]' ``` A következő parancs lekéri az utolsó 1000 eseményt a tevékenység naplójából: ```powershell Get-AzLog -MaxRecord 1000 ``` `Get-AzLog` számos más paramétert is támogat. `Get-AzLog`További információért tekintse meg a referenciát. > [!NOTE] > `Get-AzLog` csak 15 napos előzményt biztosít. 15 napon túl a **-MaxRecords** paraméterrel kérdezheti le az utolsó N eseményt. A 15 napnál régebbi események eléréséhez használja a REST API-t vagy az SDK-t (C#-példa az SDK-t használva). Ha nem adja meg a **StartTime** értékét, akkor az alapértelmezett érték az **EndTime** értéke mínusz egy óra. Ha nem adja meg az **EndTime** értékét, akkor az alapértelmezett érték az aktuális időpont. Minden időpont a UTC időzónában van megadva. > > ## <a name="retrieve-alerts-history"></a>Riasztások előzményeinek beolvasása Az összes riasztási esemény megtekintéséhez a következő példákkal kérdezheti le a Azure Resource Manager naplókat. ```powershell Get-AzLog -Caller "Microsoft.Insights/alertRules" -DetailedOutput -StartTime 2015-03-01 ``` Egy adott riasztási szabály előzményeinek megtekintéséhez használhatja a `Get-AzAlertHistory` parancsmagot, amely a riasztási szabály erőforrás-azonosítójában adható meg. ```powershell Get-AzAlertHistory -ResourceId /subscriptions/s1/resourceGroups/rg1/providers/microsoft.insights/alertrules/myalert -StartTime 2016-03-1 -Status Activated ``` A `Get-AzAlertHistory` parancsmag a különböző paramétereket támogatja. További információ: [Get-AlertHistory](/previous-versions/azure/mt282453(v=azure.100)). ## <a name="retrieve-information-on-alert-rules"></a>Riasztási szabályokkal kapcsolatos információk lekérése A következő parancsok mindegyike egy "legszélesebb" nevű erőforráscsoport esetében működik. A riasztási szabály összes tulajdonságának megtekintése: ```powershell Get-AzAlertRule -Name simpletestCPU -ResourceGroup montest -DetailedOutput ``` Egy erőforráscsoport összes riasztásának beolvasása: ```powershell Get-AzAlertRule -ResourceGroup montest ``` A célként megadott erőforráshoz beállított összes riasztási szabály beolvasása. Például a virtuális gépen beállított összes riasztási szabály. ```powershell Get-AzAlertRule -ResourceGroup montest -TargetResourceId /subscriptions/s1/resourceGroups/montest/providers/Microsoft.Compute/virtualMachines/testconfig ``` `Get-AzAlertRule` más paramétereket is támogat. További információ: [Get-AlertRule](/previous-versions/azure/mt282459(v=azure.100)) . ## <a name="create-metric-alerts"></a>Metrikákhoz kapcsolódó riasztások létrehozása A `Add-AlertRule` parancsmag használatával riasztási szabályt hozhat létre, frissíthet vagy tilthatja le. E-mailek és webhook-tulajdonságok a és a használatával is létrehozhatók `New-AzAlertRuleEmail` `New-AzAlertRuleWebhook` . A riasztási szabály parancsmagban ezeket a tulajdonságokat adja hozzá műveletként a riasztási szabály **műveletek** tulajdonságához. A következő táblázat a riasztások metrika használatával történő létrehozásához használt paramétereket és értékeket ismerteti. | parameter | value | | --- | --- | | Név |simpletestdiskwrite | | A riasztási szabály helye |USA keleti régiója | | ResourceGroup |legtöbbször | | Targetresourceid azonosítója |/subscriptions/s1/resourceGroups/montest/providers/Microsoft.Compute/virtualMachines/testconfig | | A létrehozott riasztás MetricName |\PhysicalDisk (_Total) \ írás gyakorisága (művelet/s). Tekintse `Get-MetricDefinitions` meg a pontos metrikák nevének beolvasását ismertető parancsmagot. | | operátor |GreaterThan | | Küszöbérték (darabszám/mp a metrika esetében) |1 | | WindowSize (óó: PP: SS formátum) |00:05:00 | | gyűjtő (a metrika statisztikája, amely az átlagot használja, ebben az esetben) |Átlag | | Egyéni e-mailek (karakterlánc-tömb) |'[email protected]','[email protected]' | | e-mail küldése a tulajdonosoknak, közreműködőknek és olvasóknak |-SendToServiceOwners | E-mail művelet létrehozása ```powershell $actionEmail = New-AzAlertRuleEmail -CustomEmail [email protected] ``` Webhook-művelet létrehozása ```powershell $actionWebhook = New-AzAlertRuleWebhook -ServiceUri https://example.com?token=mytoken ``` Riasztási szabály létrehozása a CPU% metrika szolgáltatásban klasszikus virtuális gépen ```powershell Add-AzMetricAlertRule -Name vmcpu_gt_1 -Location "East US" -ResourceGroup myrg1 -TargetResourceId /subscriptions/s1/resourceGroups/myrg1/providers/Microsoft.ClassicCompute/virtualMachines/my_vm1 -MetricName "Percentage CPU" -Operator GreaterThan -Threshold 1 -WindowSize 00:05:00 -TimeAggregationOperator Average -Action $actionEmail, $actionWebhook -Description "alert on CPU > 1%" ``` A riasztási szabály beolvasása ```powershell Get-AzAlertRule -Name vmcpu_gt_1 -ResourceGroup myrg1 -DetailedOutput ``` A riasztás hozzáadása parancsmag szintén frissíti a szabályt, ha már létezik riasztási szabály a megadott tulajdonságokhoz. A riasztási szabályok letiltásához adja meg a **-DisableRule** paramétert. ## <a name="get-a-list-of-available-metrics-for-alerts"></a>A riasztásokhoz elérhető metrikák listájának beolvasása A `Get-AzMetricDefinition` parancsmag segítségével megtekintheti az adott erőforráshoz tartozó összes metrika listáját. ```powershell Get-AzMetricDefinition -ResourceId <resource_id> ``` Az alábbi példa egy táblázatot hoz létre a metrika nevével és a hozzá tartozó egységgel. ```powershell Get-AzMetricDefinition -ResourceId <resource_id> | Format-Table -Property Name,Unit ``` A rendelkezésre álló lehetőségek teljes listája a `Get-AzMetricDefinition` [Get-MetricDefinitions](/previous-versions/azure/mt282458(v=azure.100))címen érhető el. ## <a name="create-and-manage-activity-log-alerts"></a>Műveletnapló-riasztások létrehozása és kezelése A `Set-AzActivityLogAlert` parancsmag segítségével beállíthatja a műveletnapló riasztását. A műveletnapló riasztásához először meg kell határoznia a feltételeket szótárként, majd létre kell hoznia egy riasztást, amely ezeket a feltételeket használja. ```powershell $condition1 = New-AzActivityLogAlertCondition -Field 'category' -Equal 'Administrative' $condition2 = New-AzActivityLogAlertCondition -Field 'operationName' -Equal 'Microsoft.Compute/virtualMachines/write' $additionalWebhookProperties = New-Object "System.Collections.Generic.Dictionary``2[System.String,System.String]" $additionalWebhookProperties.Add('customProperty', 'someValue') $actionGrp1 = New-AzActionGroup -ActionGroupId '/subscriptions/<subid>/providers/Microsoft.Insights/actiongr1' -WebhookProperty $additionalWebhookProperties Set-AzActivityLogAlert -Location 'Global' -Name 'alert on VM create' -ResourceGroupName 'myResourceGroup' -Scope '/subscriptions/<subid>' -Action $actionGrp1 -Condition $condition1, $condition2 ``` A további webhook-tulajdonságok nem kötelezőek. Egy műveletnapló-riasztás tartalmát a használatával kérheti vissza `Get-AzActivityLogAlert` . ## <a name="create-and-manage-autoscale-settings"></a>Az autoskálázási beállítások létrehozása és kezelése > [!NOTE] > Cloud Services (Microsoft. ClassicCompute) esetében az autoskálázás 5 perces időtartamot (PT5M) támogat. A többi szolgáltatás esetében az autoscale legalább 1 perces időtartamot támogat (PT1M) Egy erőforrás (webalkalmazás, virtuális gép, felhőalapú szolgáltatás vagy virtuálisgép-méretezési csoport) csak egy, a számára konfigurált méretezési beállítással rendelkezhet. Az egyes autoskálázási beállítások azonban több profillal is rendelkezhetnek. Például egy a teljesítmény-alapú méretezési profilhoz, egy másik pedig egy ütemezett profilhoz. Minden profilhoz több szabály is konfigurálható. Az autoscale használatával kapcsolatos további információkért lásd az [alkalmazások autoskálázását](../../cloud-services/cloud-services-how-to-scale-portal.md)ismertető témakört. A következő lépéseket kell használni: 1. Szabály (ok) létrehozása. 2. Profil (ok) létrehozása a korábban létrehozott szabályoknak a profilokhoz való hozzárendelésével. 3. Nem kötelező: értesítések létrehozása az autoskálázáshoz webhook és e-mail-tulajdonságok konfigurálásával. 4. Az előző lépésekben létrehozott profilok és értesítések leképezésével hozzon létre egy, a cél erőforrásban található névvel rendelkező autoskálázási beállítást. Az alábbi példák bemutatják, hogyan hozhat létre egy virtuálisgép-méretezési csoportra vonatkozó, a CPU-kihasználtság metrikája alapján egy Windows operációs rendszerhez készült, a virtuális gépek méretezésére szolgáló beállítást. Először hozzon létre egy szabályt a felskálázáshoz, és növelje a példányszámot. ```powershell $rule1 = New-AzAutoscaleRule -MetricName "Percentage CPU" -MetricResourceId /subscriptions/s1/resourceGroups/big2/providers/Microsoft.Compute/virtualMachineScaleSets/big2 -Operator GreaterThan -MetricStatistic Average -Threshold 60 -TimeGrain 00:01:00 -TimeWindow 00:10:00 -ScaleActionCooldown 00:10:00 -ScaleActionDirection Increase -ScaleActionValue 1 ``` Ezután hozzon létre egy, a skálázáshoz használandó szabályt a példányszám csökkenésével. ```powershell $rule2 = New-AzAutoscaleRule -MetricName "Percentage CPU" -MetricResourceId /subscriptions/s1/resourceGroups/big2/providers/Microsoft.Compute/virtualMachineScaleSets/big2 -Operator GreaterThan -MetricStatistic Average -Threshold 30 -TimeGrain 00:01:00 -TimeWindow 00:10:00 -ScaleActionCooldown 00:10:00 -ScaleActionDirection Decrease -ScaleActionValue 1 ``` Ezután hozzon létre egy profilt a szabályokhoz. ```powershell $profile1 = New-AzAutoscaleProfile -DefaultCapacity 2 -MaximumCapacity 10 -MinimumCapacity 2 -Rules $rule1,$rule2 -Name "My_Profile" ``` Hozzon létre egy webhook-tulajdonságot. ```powershell $webhook_scale = New-AzAutoscaleWebhook -ServiceUri "https://example.com?mytoken=mytokenvalue" ``` Hozza létre az értesítési tulajdonságot az autoskálázási beállításhoz, beleértve az e-maileket és a korábban létrehozott webhookot. ```powershell $notification1= New-AzAutoscaleNotification -CustomEmails [email protected] -SendEmailToSubscriptionAdministrators SendEmailToSubscriptionCoAdministrators -Webhooks $webhook_scale ``` Végül hozza létre az autoskálázási beállítást a korábban létrehozott profil hozzáadásához. ```powershell Add-AzAutoscaleSetting -Location "East US" -Name "MyScaleVMSSSetting" -ResourceGroup big2 -TargetResourceId /subscriptions/s1/resourceGroups/big2/providers/Microsoft.Compute/virtualMachineScaleSets/big2 -AutoscaleProfiles $profile1 -Notifications $notification1 ``` Az autoscale-beállítások kezelésével kapcsolatos további információkért lásd: [Get-AutoscaleSetting](/previous-versions/azure/mt282461(v=azure.100)). ## <a name="autoscale-history"></a>Az autoskálázás előzményei Az alábbi példa bemutatja, hogyan tekintheti meg a legutóbbi méretezési és riasztási eseményeket. A tevékenység naplójának keresési funkciójának használatával megtekintheti az autoskálázási előzményeket. ```powershell Get-AzLog -Caller "Microsoft.Insights/autoscaleSettings" -DetailedOutput -StartTime 2015-03-01 ``` A `Get-AzAutoScaleHistory` parancsmag használatával lekérheti az automatikusan méretezhető előzményeket. ```powershell Get-AzAutoScaleHistory -ResourceId /subscriptions/s1/resourceGroups/myrg1/providers/microsoft.insights/autoscalesettings/myScaleSetting -StartTime 2016-03-15 -DetailedOutput ``` További információ: [Get-AutoscaleHistory](/previous-versions/azure/mt282464(v=azure.100)). ### <a name="view-details-for-an-autoscale-setting"></a>Egy autoskálázási beállítás részleteinek megtekintése A `Get-Autoscalesetting` parancsmaggal további információkat kérhet le az automatikusan méretezhető beállításról. Az alábbi példa a "myrg1" erőforráscsoport összes autoskálázási beállításának részleteit mutatja be. ```powershell Get-AzAutoscalesetting -ResourceGroup myrg1 -DetailedOutput ``` Az alábbi példa a "myrg1" erőforráscsoport összes autoskálázási beállításának részleteit mutatja be, pontosabban a "MyScaleVMSSSetting" nevű autoskálázási beállítást. ```powershell Get-AzAutoscalesetting -ResourceGroup myrg1 -Name MyScaleVMSSSetting -DetailedOutput ``` ### <a name="remove-an-autoscale-setting"></a>Egy autoskálázási beállítás eltávolítása A `Remove-Autoscalesetting` parancsmag használatával törölheti az egy autoskálázási beállítást. ```powershell Remove-AzAutoscalesetting -ResourceGroup myrg1 -Name MyScaleVMSSSetting ``` ## <a name="manage-log-profiles-for-activity-log"></a>A műveletnapló profiljainak kezelése Létrehozhat egy log- *profilt* , és exportálhatja az adatait a tevékenység naplójából egy Storage-fiókba, és beállíthatja az adatmegőrzést. Igény szerint továbbíthatja az adatait az Event hub-ba is. Ez a szolgáltatás jelenleg előzetes verzióban érhető el, és előfizetéshez csak egy naplózási profilt hozhat létre. A következő parancsmagokat használhatja a jelenlegi előfizetésével a log profilok létrehozásához és kezeléséhez. Kiválaszthat egy adott előfizetést is. Habár a PowerShell alapértelmezés szerint a jelenlegi előfizetést használja, bármikor módosíthatja a következőt: `Set-AzContext` . A műveletnapló konfigurálásával az adott előfizetésen belül bármely Storage-fiókra vagy Event hub-ra irányíthatja az adatútvonalat. Az adatfájlok JSON formátumú blob-fájlként íródnak. ### <a name="get-a-log-profile"></a>Log-profil beolvasása A meglévő log-profilok beolvasásához használja a `Get-AzLogProfile` parancsmagot. ### <a name="add-a-log-profile-without-data-retention"></a>Adatmegőrzés nélküli log-profil hozzáadása ```powershell Add-AzLogProfile -Name my_log_profile_s1 -StorageAccountId /subscriptions/s1/resourceGroups/myrg1/providers/Microsoft.Storage/storageAccounts/my_storage -Location global,westus,eastus,northeurope,westeurope,eastasia,southeastasia,japaneast,japanwest,northcentralus,southcentralus,eastus2,centralus,australiaeast,australiasoutheast,brazilsouth,centralindia,southindia,westindia ``` ### <a name="remove-a-log-profile"></a>Log-profil eltávolítása ```powershell Remove-AzLogProfile -name my_log_profile_s1 ``` ### <a name="add-a-log-profile-with-data-retention"></a>Adatmegőrzést biztosító log-profil hozzáadása Megadhatja a **-RetentionInDays** tulajdonságot a napok számával, pozitív egészként, ahol az adat megmarad. ```powershell Add-AzLogProfile -Name my_log_profile_s1 -StorageAccountId /subscriptions/s1/resourceGroups/myrg1/providers/Microsoft.Storage/storageAccounts/my_storage -Location global,westus,eastus,northeurope,westeurope,eastasia,southeastasia,japaneast,japanwest,northcentralus,southcentralus,eastus2,centralus,australiaeast,australiasoutheast,brazilsouth,centralindia,southindia,westindia -RetentionInDays 90 ``` ### <a name="add-log-profile-with-retention-and-eventhub"></a>Naplózási profil hozzáadása a megőrzéssel és a EventHub Az adatok Storage-fiókba való továbbítása mellett azt is megteheti, hogy egy Event hub-ba is továbbíthatja azt. Ebben az előzetes kiadásban a Storage-fiók konfigurációja kötelező, de az Event hub konfigurációja nem kötelező. ```powershell Add-AzLogProfile -Name my_log_profile_s1 -StorageAccountId /subscriptions/s1/resourceGroups/myrg1/providers/Microsoft.Storage/storageAccounts/my_storage -serviceBusRuleId /subscriptions/s1/resourceGroups/Default-ServiceBus-EastUS/providers/Microsoft.ServiceBus/namespaces/mytestSB/authorizationrules/RootManageSharedAccessKey -Location global,westus,eastus,northeurope,westeurope,eastasia,southeastasia,japaneast,japanwest,northcentralus,southcentralus,eastus2,centralus,australiaeast,australiasoutheast,brazilsouth,centralindia,southindia,westindia -RetentionInDays 90 ``` ## <a name="configure-diagnostics-logs"></a>Diagnosztikai naplók konfigurálása Számos Azure-szolgáltatás további naplókat és telemetria biztosít, amelyek a következők közül választhatnak: - konfigurálható az Azure Storage-fiókban tárolt adatmentéshez - elküldve Event Hubs - elküldjük egy Log Analytics munkaterületre. A műveletet csak erőforrás szintjén lehet végrehajtani. A Storage-fióknak vagy az Event hub-nek ugyanabban a régióban kell lennie, mint a diagnosztikai beállítást futtató célként megadott erőforrásnak. ### <a name="get-diagnostic-setting"></a>Diagnosztikai beállítás beolvasása ```powershell Get-AzDiagnosticSetting -ResourceId /subscriptions/s1/resourceGroups/myrg1/providers/Microsoft.Logic/workflows/andy0315logicapp ``` Diagnosztikai beállítások letiltása ```powershell Set-AzDiagnosticSetting -ResourceId /subscriptions/s1/resourceGroups/myrg1/providers/Microsoft.Logic/workflows/andy0315logicapp -StorageAccountId /subscriptions/s1/resourceGroups/Default-Storage-WestUS/providers/Microsoft.Storage/storageAccounts/mystorageaccount -Enable $false ``` Diagnosztikai beállítás engedélyezése megőrzés nélkül ```powershell Set-AzDiagnosticSetting -ResourceId /subscriptions/s1/resourceGroups/myrg1/providers/Microsoft.Logic/workflows/andy0315logicapp -StorageAccountId /subscriptions/s1/resourceGroups/Default-Storage-WestUS/providers/Microsoft.Storage/storageAccounts/mystorageaccount -Enable $true ``` Diagnosztikai beállítás engedélyezése megőrzéssel ```powershell Set-AzDiagnosticSetting -ResourceId /subscriptions/s1/resourceGroups/myrg1/providers/Microsoft.Logic/workflows/andy0315logicapp -StorageAccountId /subscriptions/s1/resourceGroups/Default-Storage-WestUS/providers/Microsoft.Storage/storageAccounts/mystorageaccount -Enable $true -RetentionEnabled $true -RetentionInDays 90 ``` Diagnosztikai beállítás engedélyezése egy adott naplózási kategória megőrzésével ```powershell Set-AzDiagnosticSetting -ResourceId /subscriptions/s1/resourceGroups/insights-integration/providers/Microsoft.Network/networkSecurityGroups/viruela1 -StorageAccountId /subscriptions/s1/resourceGroups/myrg1/providers/Microsoft.Storage/storageAccounts/sakteststorage -Categories NetworkSecurityGroupEvent -Enable $true -RetentionEnabled $true -RetentionInDays 90 ``` Diagnosztikai beállítás engedélyezése Event Hubs ```powershell Set-AzDiagnosticSetting -ResourceId /subscriptions/s1/resourceGroups/insights-integration/providers/Microsoft.Network/networkSecurityGroups/viruela1 -serviceBusRuleId /subscriptions/s1/resourceGroups/Default-ServiceBus-EastUS/providers/Microsoft.ServiceBus/namespaces/mytestSB/authorizationrules/RootManageSharedAccessKey -Enable $true ``` Diagnosztikai beállítás engedélyezése Log Analytics ```powershell Set-AzDiagnosticSetting -ResourceId /subscriptions/s1/resourceGroups/insights-integration/providers/Microsoft.Network/networkSecurityGroups/viruela1 -WorkspaceId /subscriptions/s1/resourceGroups/insights-integration/providers/providers/microsoft.operationalinsights/workspaces/myWorkspace -Enabled $true ``` Vegye figyelembe, hogy a munkaterület azonosítója tulajdonság a munkaterület *erőforrás-azonosítóját* veszi át. A Log Analytics munkaterület erőforrás-AZONOSÍTÓját a következő paranccsal szerezheti be: ```powershell (Get-AzOperationalInsightsWorkspace).ResourceId ``` Ezek a parancsok kombinálhatók több célhelyre történő adatküldéshez is.
55.672457
780
0.824791
hun_Latn
0.999456
d5d4c19718c9b58a75441d238d95a0e01409b239
46
md
Markdown
_src/cabinets_2/README.md
brainsandspace/brainsandspaceweekly
17cf07dde04436d80bd2efc54c3e2e80bce82228
[ "MIT" ]
null
null
null
_src/cabinets_2/README.md
brainsandspace/brainsandspaceweekly
17cf07dde04436d80bd2efc54c3e2e80bce82228
[ "MIT" ]
1
2017-02-07T03:29:03.000Z
2017-02-07T03:29:49.000Z
_src/cabinets_2/README.md
brainsandspace/brainsandspaceweekly-frontend
17cf07dde04436d80bd2efc54c3e2e80bce82228
[ "MIT" ]
null
null
null
## Nice to Haves - Update reviews in real time
23
29
0.73913
eng_Latn
0.965971
d5d5511c5aebe97557f6835ff148ac76b63a860e
1,018
md
Markdown
sdk/js/README.md
CyberEyeResearchLabs/lorawan-stack
35106a064a5794e9d0f1e74da688a6762e09c6c2
[ "Apache-2.0" ]
2
2021-04-30T20:40:23.000Z
2021-06-10T14:57:42.000Z
sdk/js/README.md
CyberEyeResearchLabs/lorawan-stack
35106a064a5794e9d0f1e74da688a6762e09c6c2
[ "Apache-2.0" ]
1
2021-05-11T22:33:13.000Z
2021-05-11T22:33:13.000Z
sdk/js/README.md
CyberEyeResearchLabs/lorawan-stack
35106a064a5794e9d0f1e74da688a6762e09c6c2
[ "Apache-2.0" ]
null
null
null
# The Things Stack for LoRaWAN JavaScript SDK This is the official SDK for the The Things Stack for LoRaWAN. ## Installation ```bash $ yarn add ttn ``` ## Usage ### Basic Setup ```javascript import TTN from 'ttn' const token = 'paste-your-token-here' const ttn = new TTN(token, { connectionType: 'http', baseURL: 'http://localhost:1885/api/v3', defaultUserId: 'testuser', }) ``` ### Creating Applications ```javascript const appData = { ids: { application_id: 'first-app', }, name: 'Test App', description: 'Some description', } // Via Applications object. const firstApp = await ttn.Applications.create('testuser', appData) // Via Application class. const secondApp = new ttn.Application(appData) await secondApp.save() ``` ## Development ### Building ```bash $ yarn run build ``` This will transpile the source to `/dist` ### Watching Changes ```bash $ yarn run watch ``` ### Testing ```bash $ yarn run jest ``` ## Examples There are some basic usage examples in `/src/examples`
14.970588
67
0.681729
eng_Latn
0.6534
d5d60696d4d5c5b9b09a2ff3784a486434380041
732
md
Markdown
_posts/2018-08-28-newmembers.md
suchestoncampbelllab/suchestoncampbelllab.github.io
a9f8619553965ecf51b5a2ca6b350a3c67698b9d
[ "MIT" ]
null
null
null
_posts/2018-08-28-newmembers.md
suchestoncampbelllab/suchestoncampbelllab.github.io
a9f8619553965ecf51b5a2ca6b350a3c67698b9d
[ "MIT" ]
null
null
null
_posts/2018-08-28-newmembers.md
suchestoncampbelllab/suchestoncampbelllab.github.io
a9f8619553965ecf51b5a2ca6b350a3c67698b9d
[ "MIT" ]
1
2018-06-20T23:34:39.000Z
2018-06-20T23:34:39.000Z
--- layout: post title: The lab grows subtitle: Welcome Yiwen and Hancong! #bigimg: /img/path.jpg #tags: [Fall2018, newmembers] date: 2018-08-28 09:45 --- As the school year starts we are delighted to welcome two new members to the lab. Yiwen Wang who is coming to us from Georgetown University where she got a MS in Biostatistics. She will be pursuing a PhD in Epidemiology in [The College of Public Health](https://cph.osu.edu/epi). Hancong Tang, who recently transferred into the Division of Pharmaceutics and Pharmaceutical Chemistry in the College of Pharmacy, will be pursuing her dissertation research in conjunction with collaborators in the Department of Statistics at Ohio State. Welcome, we are thrilled you are here!
66.545455
575
0.786885
eng_Latn
0.997758
d5d78f7c2724670dd3850ef84eb758f346b46a82
6,646
md
Markdown
WindowsServerDocs/virtualization/hyper-v/learn-more/Generation-2-virtual-machine-security-settings-for-Hyper-V.md
McSpooder/windowsserverdocs
dac52260fdcc3721daf7e32cd45760a0ced96de7
[ "CC-BY-4.0", "MIT" ]
1
2020-11-04T09:57:10.000Z
2020-11-04T09:57:10.000Z
WindowsServerDocs/virtualization/hyper-v/learn-more/Generation-2-virtual-machine-security-settings-for-Hyper-V.md
McSpooder/windowsserverdocs
dac52260fdcc3721daf7e32cd45760a0ced96de7
[ "CC-BY-4.0", "MIT" ]
null
null
null
WindowsServerDocs/virtualization/hyper-v/learn-more/Generation-2-virtual-machine-security-settings-for-Hyper-V.md
McSpooder/windowsserverdocs
dac52260fdcc3721daf7e32cd45760a0ced96de7
[ "CC-BY-4.0", "MIT" ]
null
null
null
--- title: Generation 2 virtual machine security settings for Hyper-V description: Describes the security settings available in Hyper-V Manager for generation 2 virtual machines ms.topic: article ms.assetid: 06ab4f5f-6b8e-4058-8108-76785aa93d4c ms.author: benarm author: BenjaminArmstrong ms.date: 10/04/2016 --- # Generation 2 virtual machine security settings for Hyper-V >Applies To: Windows Server 2016, Microsoft Hyper-V Server 2016, Windows Server 2019, Microsoft Hyper-V Server 2019 Use the virtual machine security settings in Hyper-V Manager to help protect the data and state of a virtual machine. You can protect virtual machines from inspection, theft, and tampering from both malware that may run on the host, and datacenter administrators. The level of security you get depends on the host hardware you run, the virtual machine generation, and whether you set up the service, called the Host Guardian Service, that authorizes hosts to start shielded virtual machines. The Host Guardian Service is a new role in Windows Server 2016. It identifies legitimate Hyper-V hosts and allows them to run a given virtual machine. You'd most commonly set up the Host Guardian Service for a datacenter. But you can create a shielded virtual machine to run it locally without setting up a Host Guardian Service. You can later distribute the shielded virtual machine to a Host Guardian Fabric. If you haven't set up the Host Guardian Service or are running it in local mode on the Hyper-V host and the host has the virtual machine owner's guardian key, you can change the settings described in this topic. An owner of a guardian key is an organization that creates and shares a private or public key to own all virtual machines created with that key. To learn how you can make your virtual machines more secure with the Host Guardian Service, see the following resources. - [Harden the Fabric: Protecting Tenant Secrets in Hyper-V (Ignite video)](https://go.microsoft.com/fwlink/?LinkId=746379) - [Guarded Fabric and Shielded VMs](https://go.microsoft.com/fwlink/?LinkId=746381) ## Secure Boot setting in Hyper-V Manager Secure Boot is a feature available with generation 2 virtual machines that helps prevent unauthorized firmware, operating systems, or Unified Extensible Firmware Interface (UEFI) drivers (also known as option ROMs) from running at boot time. Secure Boot is enabled by default. You can use secure boot with generation 2 virtual machines that run Windows or Linux distribution operating systems. The templates described in the following table refer to the certificates that you need to verify the integrity of the boot process. |Template name|Description| |-----------------|---------------| |Microsoft Windows|Select to secure boot the virtual machine for a Windows operating system.| |Microsoft UEFI Certificate Authority|Select to secure boot the virtual machine for a Linux distribution operating system.| |Open Source Shielded VM|This template is leveraged to secure boot for [Linux-based shielded VMs](../../../security/guarded-fabric-shielded-vm/guarded-fabric-create-a-linux-shielded-vm-template.md).| For more information, see the following topics. - [Windows 10 Security Overview](/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10) - [Should I create a generation 1 or 2 virtual machine in Hyper-V?](../plan/Should-I-create-a-generation-1-or-2-virtual-machine-in-Hyper-V.md) - [Linux and FreeBSD Virtual Machines on Hyper-V](../Supported-Linux-and-FreeBSD-virtual-machines-for-Hyper-V-on-Windows.md) ## Encryption support settings in Hyper-V Manager You can help protect the data and state of the virtual machine by selecting the following encryption support options. - **Enable Trusted Platform Module** - This setting makes a virtualized Trusted Platform Module (TPM) chip available to your virtual machine. This allows the guest to encrypt the virtual machine disk by using BitLocker. - If your Hyper-V host is running Windows 10 1511, you have to enable Isolated User Mode. - **Encrypt State and VM migration traffic** - Encrypts the virtual machine saved state and live migration traffic. ### Enable Isolated User Mode If you select **Enable Trusted Platform Module** on Hyper-V hosts that run versions of Windows earlier than Windows 10 Anniversary Update, you must enable Isolated User Mode. You don't need to do this for Hyper-V hosts that run Windows Server 2016 or Windows 10 Anniversary Update or later. Isolated User Mode is the runtime environment that hosts security applications inside Virtual Secure Mode on the Hyper-V host. Virtual Secure Mode is used to secure and protect the state of the virtual TPM chip. To enable Isolated User Mode on the Hyper-V host that run earlier versions of Windows 10, 1. Open Windows PowerShell as an administrator. 2. Run the following commands: ``` Enable-WindowsOptionalFeature -Feature IsolatedUserMode -Online New-Item -Path HKLM:\SYSTEM\CurrentControlSet\Control\DeviceGuard -Force New-ItemProperty -Path HKLM:\SYSTEM\CurrentControlSet\Control\DeviceGuard -Name EnableVirtualizationBasedSecurity -Value 1 -PropertyType DWord -Force ``` You can migrate a virtual machine with virtual TPM enabled to any host that runs Windows Server 2016, Windows 10 build 10586 or higher versions. But if you migrate it to another host, you may not be able to start it. You must update the Key Protector for that virtual machine to authorize the new host to run the virtual machine. For more information, see [Guarded Fabric and Shielded VMs](https://go.microsoft.com/fwlink/?LinkId=746381) and [System requirements for Hyper-V on Windows Server](../System-requirements-for-Hyper-V-on-Windows.md). ## Security Policy in Hyper-V Manager For more virtual machine security, use the **Enable Shielding** option to disable management features like console connection, PowerShell Direct, and some integration components. If you select this option, **Secure Boot**, **Enable Trusted Platform Module**, and **Encrypt State and VM migration traffic** options are selected and enforced. You can run the shielded virtual machine locally without setting up a Host Guardian Service. But if you migrate it to another host, you may not be able to start it. You must update the Key Protector for that virtual machine to authorize the new host to run the virtual machine. For more information, see [Guarded Fabric and Shielded VMs](https://go.microsoft.com/fwlink/?LinkId=746381). For more information about security in Windows Server, see [Security and Assurance](../../../security/Security-and-Assurance.yml).
86.311688
544
0.791604
eng_Latn
0.985926
d5d7bac042a73f3eef86397888f0c8ee13ebedee
424
md
Markdown
README.md
chao0716/learn_dig_grasp_site
d4d4c43c1bb1f41ebfe01eb1f8f56aeddd62f8f5
[ "Apache-2.0" ]
null
null
null
README.md
chao0716/learn_dig_grasp_site
d4d4c43c1bb1f41ebfe01eb1f8f56aeddd62f8f5
[ "Apache-2.0" ]
null
null
null
README.md
chao0716/learn_dig_grasp_site
d4d4c43c1bb1f41ebfe01eb1f8f56aeddd62f8f5
[ "Apache-2.0" ]
2
2021-09-01T08:57:42.000Z
2021-09-01T08:59:05.000Z
## Learning to Grasp by Digging: Data-Driven Dig-Grasping for BinPicking from Clutter **Abstract**. Robotic manipulation can ___ ### Video todo ### Paper You can view the supplemental material [here] (link soon). ### Code and Extras You can find additional resources on [Github]. (Coming Soon) Includes: - The Benchmark - Paper code (architectures, losses, dataloaders, etc.) - Model weights
18.434783
95
0.695755
eng_Latn
0.924332
d5d8873767e71e781977739de1b1204b98409901
12,797
md
Markdown
wdk-ddi-src/content/d3dkmddi/ne-d3dkmddi-_dxgk_queryadapterinfotype.md
hsebs/windows-driver-docs-ddi
d655ca4b723edeff140ca2d9cc1bfafd72fcda97
[ "CC-BY-4.0", "MIT" ]
null
null
null
wdk-ddi-src/content/d3dkmddi/ne-d3dkmddi-_dxgk_queryadapterinfotype.md
hsebs/windows-driver-docs-ddi
d655ca4b723edeff140ca2d9cc1bfafd72fcda97
[ "CC-BY-4.0", "MIT" ]
null
null
null
wdk-ddi-src/content/d3dkmddi/ne-d3dkmddi-_dxgk_queryadapterinfotype.md
hsebs/windows-driver-docs-ddi
d655ca4b723edeff140ca2d9cc1bfafd72fcda97
[ "CC-BY-4.0", "MIT" ]
1
2021-04-22T21:40:43.000Z
2021-04-22T21:40:43.000Z
--- UID: NE:d3dkmddi._DXGK_QUERYADAPTERINFOTYPE title: _DXGK_QUERYADAPTERINFOTYPE (d3dkmddi.h) description: The DXGK_QUERYADAPTERINFOTYPE enumeration indicates the type of information to retrieve. old-location: display\dxgk_queryadapterinfotype.htm ms.assetid: 5cceffb1-853c-4635-b855-d0e3f107c23d ms.date: 04/16/2018 ms.keywords: DXGKQAITYPE_ALLOCATIONGROUP, DXGKQAITYPE_DISPLAY_DRIVERCAPS_EXTENSION, DXGKQAITYPE_DRIVERCAPS, DXGKQAITYPE_GPUMMUCAPS, DXGKQAITYPE_HISTORYBUFFERPRECISION, DXGKQAITYPE_INTEGRATED_DISPLAY_DESCRIPTOR, DXGKQAITYPE_NUMPOWERCOMPONENTS, DXGKQAITYPE_PAGETABLELEVELDESC, DXGKQAITYPE_PHYSICALADAPTERCAPS, DXGKQAITYPE_POWERCOMPONENTINFO, DXGKQAITYPE_POWERCOMPONENTPSTATEINFO, DXGKQAITYPE_PREFERREDGPUNODE, DXGKQAITYPE_QUERYCOLORIMETRYOVERRIDES, DXGKQAITYPE_QUERYSEGMENT, DXGKQAITYPE_QUERYSEGMENT2, DXGKQAITYPE_QUERYSEGMENT3, DXGKQAITYPE_QUERYSEGMENT4, DXGKQAITYPE_SEGMENTMEMORYSTATE, DXGKQAITYPE_UEFIFRAMEBUFFERRANGES, DXGKQAITYPE_UMDRIVERPRIVATE, DXGK_QUERYADAPTERINFOTYPE, DXGK_QUERYADAPTERINFOTYPE enumeration [Display Devices], DmEnums_c4637ac2-b8e0-4c30-a709-5a8ff1ee3fdc.xml, _DXGK_QUERYADAPTERINFOTYPE, d3dkmddi/DXGKQAITYPE_ALLOCATIONGROUP, d3dkmddi/DXGKQAITYPE_DISPLAY_DRIVERCAPS_EXTENSION, d3dkmddi/DXGKQAITYPE_DRIVERCAPS, d3dkmddi/DXGKQAITYPE_GPUMMUCAPS, d3dkmddi/DXGKQAITYPE_HISTORYBUFFERPRECISION, d3dkmddi/DXGKQAITYPE_INTEGRATED_DISPLAY_DESCRIPTOR, d3dkmddi/DXGKQAITYPE_NUMPOWERCOMPONENTS, d3dkmddi/DXGKQAITYPE_PAGETABLELEVELDESC, d3dkmddi/DXGKQAITYPE_PHYSICALADAPTERCAPS, d3dkmddi/DXGKQAITYPE_POWERCOMPONENTINFO, d3dkmddi/DXGKQAITYPE_POWERCOMPONENTPSTATEINFO, d3dkmddi/DXGKQAITYPE_PREFERREDGPUNODE, d3dkmddi/DXGKQAITYPE_QUERYCOLORIMETRYOVERRIDES, d3dkmddi/DXGKQAITYPE_QUERYSEGMENT, d3dkmddi/DXGKQAITYPE_QUERYSEGMENT2, d3dkmddi/DXGKQAITYPE_QUERYSEGMENT3, d3dkmddi/DXGKQAITYPE_QUERYSEGMENT4, d3dkmddi/DXGKQAITYPE_SEGMENTMEMORYSTATE, d3dkmddi/DXGKQAITYPE_UEFIFRAMEBUFFERRANGES, d3dkmddi/DXGKQAITYPE_UMDRIVERPRIVATE, d3dkmddi/DXGK_QUERYADAPTERINFOTYPE, display.dxgk_queryadapterinfotype f1_keywords: - "d3dkmddi/ DXGK_QUERYADAPTERINFOTYPE" req.header: d3dkmddi.h req.include-header: D3dkmddi.h req.target-type: Windows req.target-min-winverclnt: Available starting with Windows Vista. req.target-min-winversvr: req.kmdf-ver: req.umdf-ver: req.ddi-compliance: req.unicode-ansi: req.idl: req.max-support: req.namespace: req.assembly: req.type-library: req.lib: req.dll: req.irql: PASSIVE_LEVEL topic_type: - APIRef - kbSyntax api_type: - HeaderDef api_location: - d3dkmddi.h api_name: - DXGK_QUERYADAPTERINFOTYPE product: - Windows targetos: Windows tech.root: display req.typenames: DXGK_QUERYADAPTERINFOTYPE dev_langs: - c++ ms.custom: 19H1 --- # _DXGK_QUERYADAPTERINFOTYPE enumeration ## -description The DXGK_QUERYADAPTERINFOTYPE enumeration indicates the type of information to retrieve. ## -syntax ```cpp typedef enum _DXGK_QUERYADAPTERINFOTYPE { DXGKQAITYPE_UMDRIVERPRIVATE                   = 0, DXGKQAITYPE_DRIVERCAPS                        = 1, DXGKQAITYPE_QUERYSEGMENT                      = 2, #if (DXGKDDI_INTERFACE_VERSION >= DXGKDDI_INTERFACE_VERSION_WIN7) DXGKQAITYPE_ALLOCATIONGROUP                   = 3, DXGKQAITYPE_QUERYSEGMENT2                     = 4, #endif #if (DXGKDDI_INTERFACE_VERSION >= DXGKDDI_INTERFACE_VERSION_WIN8) DXGKQAITYPE_QUERYSEGMENT3                     = 5, DXGKQAITYPE_NUMPOWERCOMPONENTS                = 6, DXGKQAITYPE_POWERCOMPONENTINFO                = 7, DXGKQAITYPE_PREFERREDGPUNODE                  = 8, #endif #if (DXGKDDI_INTERFACE_VERSION >= DXGKDDI_INTERFACE_VERSION_WDDM1_3) DXGKQAITYPE_POWERCOMPONENTPSTATEINFO          = 9, DXGKQAITYPE_HISTORYBUFFERPRECISION            = 10, #endif #if (DXGKDDI_INTERFACE_VERSION >= DXGKDDI_INTERFACE_VERSION_WDDM2_0) DXGKQAITYPE_QUERYSEGMENT4                     = 11, DXGKQAITYPE_SEGMENTMEMORYSTATE                = 12, DXGKQAITYPE_GPUMMUCAPS                        = 13, DXGKQAITYPE_PAGETABLELEVELDESC                = 14, DXGKQAITYPE_PHYSICALADAPTERCAPS               = 15, DXGKQAITYPE_DISPLAY_DRIVERCAPS_EXTENSION      = 16, #endif #if (DXGKDDI_INTERFACE_VERSION >= DXGKDDI_INTERFACE_VERSION_WDDM2_2) DXGKQAITYPE_INTEGRATED_DISPLAY_DESCRIPTOR   = 17, DXGKQAITYPE_UEFIFRAMEBUFFERRANGES   = 18, DXGKQAITYPE_QUERYCOLORIMETRYOVERRIDES   = 19 } DXGK_QUERYADAPTERINFOTYPE; ``` ## -enum-fields ### -field DXGKQAITYPE_UMDRIVERPRIVATE Indicates private data for the user-mode display driver. ### -field DXGKQAITYPE_DRIVERCAPS Indicates the driver capabilities in a [DXGK_DRIVERCAPS](ns-d3dkmddi-_dxgk_drivercaps.md) structure. ### -field DXGKQAITYPE_QUERYSEGMENT Indicates memory-segment information in a [DXGK_QUERYSEGMENTOUT](ns-d3dkmddi-_dxgk_querysegmentout.md) structure. ### -field DXGKQAITYPE_RESERVED Reserved for system use. Do not use in your driver. Note that this constant occurs starting with Windows 7. ### -field DXGKQAITYPE_QUERYSEGMENT2 Reserved for system use. Do not use in your driver. Note that this constant occurs starting with Windows 7. ### -field DXGKQAITYPE_QUERYSEGMENT3 Indicates memory-segment information in a [DXGK_QUERYSEGMENTOUT3](ns-d3dkmddi-_dxgk_querysegmentout3.md) structure. Supported starting with Windows 8. ### -field DXGKQAITYPE_NUMPOWERCOMPONENTS Indicates the number of power components used by the display miniport driver. For more information, see Remarks. Supported starting with Windows 8. ### -field DXGKQAITYPE_POWERCOMPONENTINFO Indicates information about power components used by the display miniport driver. For more information, see Remarks. Supported starting with Windows 8. ### -field DXGKQAITYPE_PREFERREDGPUNODE Reserved for system use. Do not use in your driver. Supported starting with Windows 8. ### -field DXGKQAITYPE_POWERCOMPONENTPSTATEINFO Reserved for system use. Do not use in your driver. Supported starting with Windows 8.1. ### -field DXGKQAITYPE_HISTORYBUFFERPRECISION Indicates info about the precision of history buffer data used by the display miniport driver. For more information, see Remarks. Supported starting with Windows 8.1. ### -field DXGKQAITYPE_QUERYSEGMENT4 Indicates memory-segment information in a [DXGK_QUERYSEGMENTOUT4](ns-d3dkmddi-_dxgk_querysegmentout4.md) structure. Supported starting with Windows 10. ### -field DXGKQAITYPE_SEGMENTMEMORYSTATE Indicates bad memory ranges in a [DXGK_MEMORYRANGE](ns-d3dkmddi-_dxgk_memoryrange.md) structure. Supported starting with Windows 10. ### -field DXGKQAITYPE_GPUMMUCAPS Indicates physical adapter GPU capabilities. Supported starting with Windows 10. ### -field DXGKQAITYPE_PAGETABLELEVELDESC Reserved for system use. Do not use in your driver. ### -field DXGKQAITYPE_PHYSICALADAPTERCAPS Reserved for system use. Do not use in your driver. ### -field DXGKQAITYPE_DISPLAY_DRIVERCAPS_EXTENSION Reserved for system use. Do not use in your driver. ### -field DXGKQAITYPE_INTEGRATED_DISPLAY_DESCRIPTOR Indicates a request for an integrated panel descriptor where the input buffer to the query will be a DXGK_QUERYINTEGRATEDDISPLAYIN structure and the output buffer is a DXGK_QUERYINTEGRATEDDISPLAYOUT structure. Although this function addresses a target, only DxgKrnl adapter locks are taken over this call, not child device locks. In practice, since this call will be made before the child device is exposed, there should be no concurrent DDI calls which address the same target. > [!NOTE] > Unlike most QueryAdapterInfo calls, the output buffer size is variable although it is still known in advance from the DescriptorLength field of the DXGK_INTEGRATED_DISPLAY_CHILD structure for the target id. The size of the output buffer is: DescriptorLength + FIELD_OFFSET( DXGK_QUERYINTEGRATEDDISPLAYOUT, Descriptor ) ### -field DXGKQAITYPE_UEFIFRAMEBUFFERRANGES Indicates request for the UEFI frame buffer ranges. ### -field DXGKQAITYPE_QUERYCOLORIMETRYOVERRIDES Indicates a request for colorimetry overrides for an external display where the input buffer to the query will be a DXGK_QUERYCOLORIMETRYOVERRIDESIN structure, containing only the target id being addressed and the output buffer is a DXGK_COLORIMETRY structure into which the driver writes overrides for the monitor attached to the target. Although this function addresses a target, only DxgKrnl adapter locks are taken over this call, not child device locks. Since this call will be made before the child device is exposed, there should be no concurrent DDI calls which address the same target. The output buffer is zeroed when passed to the driver. If the driver has no overrides for the monitor, it should return STATUS_SUCCESS and leave the output buffer zeroed. If the driver has overrides, it fill in all fields of the DXGK_COLORIMETRY to describe the monitor capabilities as the OS will not accept partial overrides. ### -field DXGKQAITYPE_DISPLAYID_DESCRIPTOR Indicates a request for an integrated panel descriptor where the input buffer to the query will be a DXGK_QAITARGETIN structure and the output buffer is a DXGK_QUERYINTEGRATEDDISPLAYOUT structure. ### -field DXGKQAITYPE_FRAMEBUFFERSAVESIZE The size of the frame buffer to save to system memory during power transitions. ### -field DXGKQAITYPE_HARDWARERESERVEDRANGES Reserved ranges. ### -field DXGKQAITYPE_INTEGRATED_DISPLAY_DESCRIPTOR2 Indicates a request for an integrated panel descriptor where the input buffer to the query will be a DXGK_QAITARGETIN structure and the output buffer is a [DXGK_QUERYINTEGRATEDDISPLAYOUT2](ns-d3dkmddi-_dxgk_queryintegrateddisplayout2.md) structure. This query replaces use of the DXGKQAITYPE_INTEGRATED_DISPLAY_DESCRIPTOR query for WDDM 2.4 drivers. TypeIntegratedDisplay child devices are reported by calling [DXGKDDI_QUERYADAPTERINFO](nc-d3dkmddi-dxgkddi_queryadapterinfo.md) with the *Type* set to this value. ### -field DXGKQAITYPE_NODEPERFDATA Represents performance data collected per engine from an adapter on an interval basis. ### -field DXGKQAITYPE_ADAPTERPERFDATA Represents performance data collected per adapter on an interval basis. ### -field DXGKQAITYPE_ADAPTERPERFDATA_CAPS Represents data caps that are static and queried once per GPU during initialization. ### -field DXGKQAITYPE_GPUVERSION Used to collect the bios version and GPU architecture name once during GPU initialization. ### -field DXGKQAITYPE_DEVICE_TYPE_CAPS The device type capabilities. ### -field DXGKQAITYPE_WDDMDEVICECAPS The device capabilities that are queried by the OS during device initialization. ### -field DXGKQAITYPE_GPUPCAPS The GPU capabilities for a kernel mode display driver. ## -remarks The display miniport driver must fill the buffer pointed to by the **pOutputData** member of the [DXGKARG_QUERYADAPTERINFO](ns-d3dkmddi-_dxgkarg_queryadapterinfo.md) structure as follows: | DXGKARG_QUERYADAPTERINFO.Type Value| Contents of output buffer pointed to by DXGKARG_QUERYADAPTERINFO.pOutputData | |--|--| | DXGKQAITYPE_UMDRIVERPRIVATE | Proprietary buffer | | DXGKQAITYPE_DRIVERCAPS | Populated [DXGK_DRIVERCAPS](ns-d3dkmddi-_dxgk_drivercaps.md) structure | | DXGKQAITYPE_QUERYSEGMENT | Populated [DXGK_QUERYSEGMENTOUT](ns-d3dkmddi-_dxgk_querysegmentout.md) structure | | DXGKQAITYPE_QUERYSEGMENT3 | Populated [DXGK_QUERYSEGMENTOUT3](ns-d3dkmddi-_dxgk_querysegmentout3.md) structure | | DXGKQAITYPE_NUMPOWERCOMPONENTS | A UINT value that specifies the number of power components used by the display miniport driver | | DXGKQAITYPE_POWERCOMPONENTINFO | Populated [DXGK_POWER_RUNTIME_COMPONENT](ns-d3dkmddi-_dxgk_power_runtime_component.md) structure that provides information about the nth power component, where n is the component index specified by [DXGKARG_QUERYADAPTERINFO](ns-d3dkmddi-_dxgkarg_queryadapterinfo.md).pInputData in a call to the [DxgkDdiQueryAdapterInfo](ns-d3dkmddi-_dxgkarg_queryadapterinfo.md) function | | DXGKQAITYPE_HISTORYBUFFERPRECISION | Populated [DXGKARG_HISTORYBUFFERPRECISION](ns-d3dkmddi-_dxgkarg_historybufferprecision.md) structure | ## -see-also [DXGK_DRIVERCAPS](ns-d3dkmddi-_dxgk_drivercaps.md) [DXGK_POWER_RUNTIME_COMPONENT](ns-d3dkmddi-_dxgk_power_runtime_component.md) [DXGK_QUERYSEGMENTOUT](ns-d3dkmddi-_dxgk_querysegmentout.md) [DXGK_QUERYSEGMENTOUT3](ns-d3dkmddi-_dxgk_querysegmentout3.md) [DXGKARG_HISTORYBUFFERPRECISION](ns-d3dkmddi-_dxgkarg_historybufferprecision.md) [DXGKARG_QUERYADAPTERINFO](ns-d3dkmddi-_dxgkarg_queryadapterinfo.md) [DxgkDdiQueryAdapterInfo](nc-d3dkmddi-dxgkddi_queryadapterinfo.md)
46.198556
1,699
0.799484
yue_Hant
0.404482
d5d8bf592af92386541d9279b14fad032d0e4e18
4,833
md
Markdown
docs/build/dlls-in-visual-cpp.md
a1043710306/cpp-docs.zh-cn
9296fe0d678d41b279e57a9aacb68b67497bbc0c
[ "CC-BY-4.0", "MIT" ]
null
null
null
docs/build/dlls-in-visual-cpp.md
a1043710306/cpp-docs.zh-cn
9296fe0d678d41b279e57a9aacb68b67497bbc0c
[ "CC-BY-4.0", "MIT" ]
null
null
null
docs/build/dlls-in-visual-cpp.md
a1043710306/cpp-docs.zh-cn
9296fe0d678d41b279e57a9aacb68b67497bbc0c
[ "CC-BY-4.0", "MIT" ]
null
null
null
--- title: 在 Visual Studio 中创建 C/C++ DLL description: 概述在 Visual Studio 中使用 C++ 创建和使用 DLL 的原因和方法。 ms.date: 01/27/2020 helpviewer_keywords: - executable files [C++] - dynamic linking [C++] - linking [C++], dynamic vs. static - DLLs [C++] - DLLs [C++], about DLLs ms.assetid: 5216bca4-51e2-466b-b221-0e3e776056f0 ms.openlocfilehash: 7083924f137fa9283da40404c7d15183e59c0b1c ms.sourcegitcommit: 7ecd91d8ce18088a956917cdaf3a3565bd128510 ms.translationtype: HT ms.contentlocale: zh-CN ms.lasthandoff: 03/16/2020 ms.locfileid: "79422828" --- # <a name="create-cc-dlls-in-visual-studio"></a>在 Visual Studio 中创建 C/C++ DLL 在 Windows 中,动态链接库 (DLL) 是作为函数和资源的共享库的一种可执行文件。 动态链接是操作系统功能。 它可使执行文件调用函数或使用存储在单独文件中的资源。 可从使用这些函数和资源的可执行文件中对其分别进行编译和部署。 DLL 不是独立的可执行文件。 DLL 在调用它们的应用程序的上下文中运行。 操作系统将 DLL 加载到应用程序的内存空间中。 此操作要么在加载应用程序时(隐式链接)完成,要么在运行时按需(显式链接)完成 。 DLL 还可以在可执行文件之间轻松共享函数和资源。 多个应用程序可同时访问内存中单个 DLL 副本的内容。 ## <a name="differences-between-dynamic-linking-and-static-linking"></a>动态链接和静态链接之间的差异 静态链接将静态库中的所有对象代码复制到生成时使用它的可执行文件中。 动态链接仅包括 Windows 在运行时用于查找和加载含有数据项或函数的 DLL 所需的信息。 创建 DLL 时,还将创建包含此信息的导入库。 生成调用 DLL 的可执行文件时,链接器会使用导入库中的导出符号来为 Windows 加载程序存储此信息。 当加载程序加载 DLL 时,该 DLL 会映射到你的应用程序的内存空间中。 如果存在,则调用 DLL 中的特殊函数 `DllMain`,以执行 DLL 所需的任何初始化。 <a name="differences-between-applications-and-dlls"></a> ## <a name="differences-between-applications-and-dlls"></a>应用程序和 DLL 之间的区别 尽管 DLL 和应用程序都是可执行文件模块,但它们之间也存在很多不同之处。 对用户来说,最明显的区别在于不能直接运行 DLL。 从系统的角度来看,应用程序和 Dll 之间有两个基本差异: - 一是应用程序可以在系统中同时运行其自身的多个实例。 而 DLL 只能有一个实例。 - 二是应用程序可以作为进程进行加载。 它可以管理诸如堆栈、执行线程、全局内存、文件句柄和消息队列之类的资源。 而 DLL 不能管理这些资源。 <a name="advantages-of-using-dlls"></a> ## <a name="advantages-of-using-dlls"></a>使用 DLL 的优点 与静态链接相比,动态链接到代码和资源有几个优点: - 动态链接可节省内存,减少交换。 许多进程可以同时使用 DLL,并在内存中共享 DLL 只读部分的单个副本。 相反,使用静态链接库构建的每个应用程序都有一个完整的库代码副本,Windows 必须将其加载到内存中。 - 动态链接节省了磁盘空间和带宽。 许多应用程序可以在磁盘上共享 DLL 的单个副本。 相反,使用静态链接库构建的每个应用程序都是将库代码链接到其可执行映像中。 这会占用更多磁盘空间,并需要更多带宽来传输。 - 维护、安全修复和升级会更容易。 当应用程序在 DLL 中使用公共函数时,你可以实现 bug 修复并将更新部署到 DLL。 更新 DLL 时,不需要重新编译或重新链接使用它们的应用程序。 一旦部署了新的 DLL,应用程序就可以使用这些新的 DLL。 相反,当你在静态链接的对象代码中进行修复时,必须重新链接并重新部署使用 DLL 的每个应用程序。 - 可以使用 DLL 提供售后支持。 例如,可以修改显示驱动程序 DLL 以支持应用程序发布时不可用的显示。 - 可以使用显式链接在运行时发现和加载 DLL。 例如,无需重新生成或重新部署就可将新功能添加到你的应用的应用程序扩展。 - 对于用不同编程语言编写的应用程序,使用动态链接可以更轻松地对其提供支持。 用不同编程语言编写的程序只要遵循函数调用约定,就可以调用相同的 DLL 函数。 程序和 DLL 函数必须在以下方面兼容:函数期望将其参数推送到堆栈上的顺序。 函数或应用程序是否负责清理堆栈。 以及,是否有参数在寄存器中传递。 - 动态链接提供了一种扩展 Microsoft 基础类库 (MFC) 类的机制。 可以从现有的 MFC 类派生类,并将它们放在 MFC 扩展 DLL 中供 MFC 应用程序使用。 - 动态链接使创建应用程序的国际版本更容易。 DLL 是一种提供特定于区域设置的资源的便捷方式,使用这种方式创建应用程序的国际版本会更加容易。 你可以将每种语言的字符串和映像放在一个单独的资源 DLL 中,而不是发布应用程序的许多本地化版本。 然后应用程序可以在运行时加载该区域设置的适当资源。 使用 DLL 的潜在缺点是,应用程序不是自包含的。 它依赖于一个独立的 DLL 模块的存在:在安装过程中必须亲自部署或验证的模块。 ## <a name="more-information-on-how-to-create-and-use-dlls"></a>关于如何创建和使用 DLL 的详细信息 以下文章提供了有关如何在 Visual Studio 中创建 C/C++ DLL 的详细信息。 [演练:创建和使用动态链接库 (C++)](walkthrough-creating-and-using-a-dynamic-link-library-cpp.md)\ 介绍如何使用 Visual Studio 创建和使用 DLL。 [DLL 类型](kinds-of-dlls.md)\ 提供有关可生成的不同类型的 DLL 的信息。 [DLL 常见问题](dll-frequently-asked-questions.md)\ 提供有关 DLL 的常见问题解答。 [将可执行文件链接到 DLL](linking-an-executable-to-a-dll.md)\ 描述与 DLL 的显式链接和隐式链接。 [初始化 DLL](run-time-library-behavior.md#initializing-a-dll)\ 介绍加载 DLL 时必须执行的 DLL 初始化代码。 [DLL 和 Visual C++ 运行时库行为](run-time-library-behavior.md)\ 描述运行库 DLL 启动序列。 [LoadLibrary 和 AfxLoadLibrary](loadlibrary-and-afxloadlibrary.md)\ 介绍如何在运行时使用 `LoadLibrary` 和 `AfxLoadLibrary` 显式链接到 DLL。 [GetProcAddress](getprocaddress.md)\ 介绍如何使用 `GetProcAddress` 获取 DLL 中导出函数的地址。 [FreeLibrary 和 AfxFreeLibrary](freelibrary-and-afxfreelibrary.md)\ 介绍当不再需要 DLL 模块时如何使用 `FreeLibrary` 和 `AfxFreeLibrary`。 [动态链接库搜索顺序](/windows/win32/Dlls/dynamic-link-library-search-order)\ 描述 Windows 操作系统用来定位系统上的 DLL 的搜索路径。 [动态链接到 MFC 的规则 MFC DLL 的模块状态](module-states-of-a-regular-dll-dynamically-linked-to-mfc.md)\ 描述动态链接到 MFC 的规则 MFC DLL 的模块状态。 [MFC 扩展 DLL](extension-dlls-overview.md)\ 解释通常实现从现有 MFC 类派生的可重用类的 DLL。 [创建纯资源 DLL](creating-a-resource-only-dll.md)\ 讨论只包含资源(如图标、位图、字符串和对话框等)的纯资源 DLL。 [MFC 应用程序中已本地化的资源:附属 DLL](localized-resources-in-mfc-applications-satellite-dlls.md)\ 提供对附属 DLL 的增强支持,该功能有助于创建针对多种语言进行本地化的应用程序。 [导入和导出](importing-and-exporting.md)\ 描述如何将公共符号导入应用程序或从 DLL 导出函数。 [Active 技术和 DLL](active-technology-and-dlls.md)\ 使对象服务器得以在 DLL 内实现。 [DLL 中的自动化](automation-in-a-dll.md)\ 描述“MFC DLL 向导”中的“自动化”选项提供的内容。 [MFC DLL 命名约定](../mfc/mfc-library-versions.md#mfc-static-library-naming-conventions)\ 讨论 MFC 中包含的 DLL 和库如何遵循结构化命名约定。 [从 Visual Basic 应用程序调用 DLL 函数](calling-dll-functions-from-visual-basic-applications.md)\ 描述如何从 Visual Basic 应用程序中调用 DLL 函数。 ## <a name="related-sections"></a>相关章节 [将 MFC 用作 DLL 的一部分](../mfc/tn011-using-mfc-as-part-of-a-dll.md)\ 描述使你可以将 MFC 库作为 Windows 动态链接库的一部分来使用的规则 MFC DLL。 [MFC 的 DLL 版本](../mfc/tn033-dll-version-of-mfc.md)\ 描述如何将 MFCxx.dll 和 MFCxxD.dll(其中 x 是 MFC 版本号)共享动态链接库用于 MFC 应用程序和 MFC 扩展 DLL。
36.89313
245
0.786675
yue_Hant
0.925858
d5d92948c623906757df7e902a5763b8f9e506c5
1,447
md
Markdown
README.md
jalispran/react-day-picker
ecd49ae5c92ba94c0519a6a00037730952b67c77
[ "MIT" ]
1
2020-12-01T16:43:54.000Z
2020-12-01T16:43:54.000Z
README.md
jalispran/react-day-picker
ecd49ae5c92ba94c0519a6a00037730952b67c77
[ "MIT" ]
null
null
null
README.md
jalispran/react-day-picker
ecd49ae5c92ba94c0519a6a00037730952b67c77
[ "MIT" ]
1
2022-01-07T13:48:29.000Z
2022-01-07T13:48:29.000Z
# react-day-picker Lightweight date picker component for [React.js](http://reactjs.org). <a href="https://www.npmjs.com/package/react-day-picker"> <img src="https://img.shields.io/npm/v/react-day-picker.svg?style=flat-square" alt="npm version"> </a> <a href="http://npm-stat.com/charts.html?package=react-day-picker"> <img src="https://img.shields.io/npm/dm/react-day-picker.svg?style=flat-square" alt="npm downloads"> </a> ## Get started ```bash npm install react-day-picker ``` ```jsx import DayPicker from "react-day-picker"; import "react-day-picker/lib/style.css"; export default function Hello() { return <DayPicker />; } ``` ### Documentation - [Website](http://react-day-picker.js.org) - [Examples](http://react-day-picker.js.org/examples/basic) - [API](http://react-day-picker.js.org/api/DayPicker) - [Changelog](http://react-day-picker.js.org/changelog) - In stuck? [Get support](http://react-day-picker.js.org/support) ### v8 is coming! The next version will be a rewrite in TypeScript. Read more [here](https://github.com/gpbl/react-day-picker/issues/942) or follow the [project status](https://github.com/gpbl/react-day-picker/projects/7). - [master branch](https://github.com/gpbl/react-day-picker/tree/master) is for the upcoming v8 release. - [v7 branch](https://github.com/gpbl/react-day-picker/tree/v7) to send PR for the v7 version. See [packages/react-day-picker](packages/react-day-picker) for more details.
33.651163
204
0.722184
yue_Hant
0.372514
d5d97b520602bf01c2ce79863edcb230c8c22c3f
24
md
Markdown
README.md
vikasdwivedi/az204demo
631b99fc8bd297a13e12b5c1d41a8a0d72adb176
[ "MIT" ]
null
null
null
README.md
vikasdwivedi/az204demo
631b99fc8bd297a13e12b5c1d41a8a0d72adb176
[ "MIT" ]
null
null
null
README.md
vikasdwivedi/az204demo
631b99fc8bd297a13e12b5c1d41a8a0d72adb176
[ "MIT" ]
null
null
null
# az204demo az 204 demo
8
11
0.75
epo_Latn
0.726177
d5d995ec5760afe2e7bf6e15792a04808d9ce1e7
4,184
md
Markdown
_posts/2011-01-16-cmmi.md
javiergamarra/nhpatt.github.io
b0bd69bbc425e2cd39f5b58b7f8d206511a2f8ae
[ "MIT" ]
1
2016-05-09T09:34:35.000Z
2016-05-09T09:34:35.000Z
_posts/2011-01-16-cmmi.md
javiergamarra/nhpatt.github.io
b0bd69bbc425e2cd39f5b58b7f8d206511a2f8ae
[ "MIT" ]
2
2017-07-05T06:28:18.000Z
2021-09-27T21:56:40.000Z
_posts/2011-01-16-cmmi.md
javiergamarra/nhpatt.github.io
b0bd69bbc425e2cd39f5b58b7f8d206511a2f8ae
[ "MIT" ]
null
null
null
--- id: 78 title: CMMI date: 2011-01-16T01:25:30+00:00 author: nhpatt layout: post guid: http://nhpatt.com/cmmi permalink: /cmmi/ jabber_published: - 1295137533 categories: - CMMI - documentación --- Esta semana, por motivos educativos, he preparado una pequeña charla introductoria sobre CMMI. Para algunos la simple mención de este término servirá para produciros sudores fríos, grupo al que pertenezco. De todas formas me ha resultado interesante aprender más sobre CMMI y, sobre todo, la segunda parte de la charla (CMMI y Agile) que comentaré en otro post. Para que mi búsqueda de información y la lectura de [CMMI: guidelines for process&#8230;](http://books.google.es/books?id=EUZsqueGeXoC&printsec=frontcover&dq=cmmi&hl=es&ei=0TEyTam4FI3o4Aa9w_HNCg&sa=X&oi=book_result&ct=result&resnum=1&ved=0CDAQ6AEwAA#v=onepage&q&f=false) no hayan sido en vano, pongo a disposición pública la presentación realizada en [Prezi](https://prezi.com/gpmt8pehkvle/cmmi/). Las dos presentaciones tienen grandes defectos formales (demasiado texto, pocas imágenes) pero servían al fin al que estaban destinadas. Si podéis, os recomiendo que veáis la **presentación en [prezi](https://prezi.com/gpmt8pehkvle/cmmi/)** porque me parece una herramienta fabulosa (pese a que sea Flash), la única pega que le veo es que sólo puedes pasar de &#8220;diapositiva&#8221; con el control habilitado (un click en el espacio de presentación aumenta el zoom pero no pasa a la siguiente). Todas las transiciones son en realidad efectos de zoom realizados automáticamente. Prezi permite, además, exportar tu presentación a varios formatos. Sobre el tema en sí, decir que tengo fobia a las cantidades de **documentación que normalmente se utilizan para aplicar CMMI** (cómo bien ha señalado [@jezis](https://twitter.com/jezis) no son requeridas, son sugeridas pero no obligatorias) pero las ventajas en grandes corporaciones son indiscutibles, los datos son de libre disposición. En el mundo de las PYME, con pocos &#8216;procesos&#8217;, en el que CMMI se ve cómo un requisito para un contrato o una ventaja comparativa, las ventajas desaparecen. Todo esto teniendo en cuenta que las mejoras en productividad (de un 15%-60% en los mejores casos) **son mejoras de &#8220;herramientas&#8221;** (aludiendo a _Peopleware_ o a _Facts and Fallacies_&#8230;), las **mejoras producidas por tener y cuidar a las personas** adecuadas son **mucho más importantes**. Me sorprenden varios datos, el primero que en España seamos el segundo país de Europa con **[mayor implantación de CMMI](http://www.javiergarzas.com/2009/04/cmmi-en-espana-marzo-2009.html)** (el resto buscan [SPICE](http://en.wikipedia.org/wiki/ISO/IEC_15504)). En empresas con mercado en EEUU es comprensible porque allí es un requisito imprescindible para muchos contratos importantes pero aún así es difícil de explicar el gusto nacional por CMMI. Otro dato, más evidente, es que las pequeñas compañías se quedan en el nivel 2-3 mientras que más del 70% de grandes multinacionales son CMMI 5, el coste de conseguir CMMI 5 es inalcanzable para empresas pequeñas. Un hecho curioso es la **eliminación de los niveles de capacidad 4 y 5** en la versión 1.3 de CMMI que salió en Noviembre. La principal razón es por desuso, la mayor parte de compañías apuestan por los niveles de madurez que permiten **comparar más fácilmente entre empresas** (otra muestra más de que lo importante es el nivel en sí y no mejorar los procesos). Si alguien está utilizando (o sufriendo) CMMI en su empresa, que comparta su visión :) Los dos enlaces a las presentaciones son los siguientes (de momento sin CMMI y Agile): * [Presentación en Prezi](https://prezi.com/gpmt8pehkvle/cmmi/) * [Presentación en Google Docs](https://prezi.com/gpmt8pehkvle/cmmi/) Podéis encontrar información sobre CMMI en el siguiente libro (la mayoría de libre disposición): [_CMMI_: _guidelines_ for process integration and product improvement](http://books.google.fr/books?id=EUZsqueGeXoC&printsec=frontcover&dq=CMMI+guidelines&hl=es&ei=zjkyTebXF-OH4gbxscnSCg&sa=X&oi=book_result&ct=result&redir_esc=y) y en [cmmi-dev](<http://www.sei.cmu.edu/library/assets/cmmi-dev-v12-spanish.pdf>)
113.081081
814
0.786568
spa_Latn
0.982811
d5da088c2ade38bd9bb70a3aad2635e174d4799a
1,723
md
Markdown
content/portfolio/Sentiment.md
VIMALRANJEEV/vimal_portfolio_2
b1ba0503b8b74b48cc8d36ef627b83faf325eacf
[ "MIT" ]
null
null
null
content/portfolio/Sentiment.md
VIMALRANJEEV/vimal_portfolio_2
b1ba0503b8b74b48cc8d36ef627b83faf325eacf
[ "MIT" ]
null
null
null
content/portfolio/Sentiment.md
VIMALRANJEEV/vimal_portfolio_2
b1ba0503b8b74b48cc8d36ef627b83faf325eacf
[ "MIT" ]
null
null
null
--- title: IMDB Movie Reviews date: 2019-12-23T15:44:46.000+06:00 image: images/projects/IMDB.jpg category: - Sentiment analysis(NLP) project_images: - images/projects/Sentiment-1.png - images/projects/sentiment-2.png --- ABOUT THE DATASET The Dataset of 50,000 movie reviews from IMDB, labelled by sentiment (positive/negative). Reviews have been preprocessed, and each review is encoded as a sequence of word indexes (integers). For convenience, the words are indexed by their frequency in the dataset, meaning the for that has index 1 is the most frequent word. Use the first 20 words from each review to speed up training, using a max vocab size of 10,000. As a convention, "0" does not stand for a specific word, but instead is used to encode any unknown word ABOUT IMDB IMDb (an acronym for Internet Movie Database) is an online database of information related to films, television programs, home videos, video games, and streaming content online – including cast, production crew and personal biographies, plot summaries, trivia, ratings, and fan and critical reviews. An additional fan feature, message boards, was abandoned in February 2017. Originally a fan-operated website, the database is now owned and operated by IMDb.com, Inc., a subsidiary of Amazon. As of December 2020, IMDb has approximately 7.5 million titles (including episodes) and 10.4 million personalities in its database, as well as 83 million registered users. \[[Code](https://github.com/VIMALRANJEEV/my_work/blob/master/Greatlearning/Sentiment%20analysis/Sequential_Models_in_NLP_assignment.ipynb)\]\[[PDF](https://github.com/VIMALRANJEEV/my_work/blob/master/Greatlearning/Sentiment%20analysis/Sequential_Models_in_NLP_assignment.pdf)\]
78.318182
524
0.799768
eng_Latn
0.974714
d5da8cdf623c418068dd182a7a414fc52eb58fd6
2,246
md
Markdown
coding/python/day01/README.md
dkapanidis/my-tutorials
f3b72c35487782609b556016aba03b275cc6b105
[ "MIT" ]
null
null
null
coding/python/day01/README.md
dkapanidis/my-tutorials
f3b72c35487782609b556016aba03b275cc6b105
[ "MIT" ]
null
null
null
coding/python/day01/README.md
dkapanidis/my-tutorials
f3b72c35487782609b556016aba03b275cc6b105
[ "MIT" ]
null
null
null
# Day 1 - Basic Intro Posted [here](https://www.codingholygrail.com/learn-python-in-10-mins) Learning the basics of python and how it works in less than 10 mins. Python is a great language for web development, data science and scripting. ## Hello World Let's just print a simple hello world message: ```python # hello.py print('hello world') ``` Type `python hello.py` to execute. ## Primitive Types Python has four primitive types: int, float, bool, str. ```python # primitives.py ten = 10 # int pi = 3.14159265359 # float yes = True # bool no = False # bool name = "John Wick" # str print(ten, pi, yes, no, name, len(name)) ``` ```shellsession $ python primitives.py 10 3.14159265359 True False John Wick 9 ``` ## Data Types Apart from the primitive types python has the following data types: - Sequence Types: list, tuple, range - Mapping Types: dict - Set Types: set, frozenset ```python # dataTypes.py fruitsList = ["apple", "banana", "cherry"] fruitsTuple = ("apple", "banana", "cherry") fruitsSet = {"apple", "banana", "cherry"} fruitsFrozenSet = frozenset({"apple", "banana", "cherry"}) x = range(6) print ("list", fruitsList) print ("tuple", fruitsTuple) print ("set", fruitsSet) print ("frozenSet", fruitsFrozenSet) print ("range", x) ``` ## Operations ```python # operations.py add = 3+2 print (add) subtract = 3-2 print (subtract) multiply = 3*2 print (multiply) division = 3/2 print (division) modulus = 3%2 print (modulus) lessThan = 3<2 print (lessThan) greaterThan = 3>2 print(greaterThan) equals = 3==3 print (equals) logicalAnd = (2==2) and (3==3) and (4==4) print (logicalAnd) logicalOr = (2==1) or (2==2) or (2==3) print (logicalOr) logicalNot = not (3==2) print (logicalNot) ``` ## Loops ```python # loops.py fruits = ["apple", "banana", "cherry"] for x in fruits: print(x) # 0,1,2,3,4,5 for x in range(6): print(x) # 5,6,7,8,9,10 for x in range(5,11): print(x) ``` ## Decision Making ```python # decisions.py x = int(input("Enter a number: ")) if x > 0: print(x) else: print(-x) ``` ## Functions ```python # functions.py def printme( str ): "This prints a passed string into this function" print(str) return printme("hello") ```
15.929078
144
0.654942
eng_Latn
0.624057
d5dafa4a7ea5b5c087683d383c06e1fee7e9c99a
20,241
md
Markdown
docs/examples/multi-model-gpt2-triton-pipeline/README.md
outerbounds/tempo
0878ae32ed6163a1c5115f20167d991a28535364
[ "Apache-2.0" ]
75
2021-02-15T09:49:02.000Z
2022-03-31T02:06:38.000Z
docs/examples/multi-model-gpt2-triton-pipeline/README.md
outerbounds/tempo
0878ae32ed6163a1c5115f20167d991a28535364
[ "Apache-2.0" ]
106
2021-02-13T09:25:19.000Z
2022-03-25T16:18:00.000Z
docs/examples/multi-model-gpt2-triton-pipeline/README.md
outerbounds/tempo
0878ae32ed6163a1c5115f20167d991a28535364
[ "Apache-2.0" ]
21
2021-02-12T17:12:50.000Z
2022-03-04T02:09:26.000Z
# Tempo GPT2 Triton ONNX Example ### Workflow Overview In this example we will be doing the following: * Download & optimize pre-trained artifacts * Deploy GPT2 Model and Test in Docker * Deploy GPT2 Pipeline and Test in Docker * Deploy GPT2 Pipeline & Model to Kuberntes and Test ### Install Dependencies ```python %%writefile requirements-dev.txt transformers==4.5.1 torch==1.8.1 tokenizers==0.10.3 tensorflow==2.4.1 tf2onnx==1.8.5 ``` ```python pip install -r requirements-dev.txt ``` ## Download & Optimize pre-trained artifacts ```python !mkdir artifacts/ ``` mkdir: cannot create directory ‘artifacts/’: File exists ```python from transformers import GPT2Tokenizer, TFGPT2LMHeadModel tokenizer = GPT2Tokenizer.from_pretrained("gpt2") model = TFGPT2LMHeadModel.from_pretrained( "gpt2", from_pt=True, pad_token_id=tokenizer.eos_token_id ) ``` All PyTorch model weights were used when initializing TFGPT2LMHeadModel. All the weights of TFGPT2LMHeadModel were initialized from the PyTorch model. If your task is similar to the task the model of the checkpoint was trained on, you can already use TFGPT2LMHeadModel for predictions without further training. ```python model.save_pretrained("./artifacts/gpt2-model", saved_model=True) tokenizer.save_pretrained("./artifacts/gpt2-transformer") ``` WARNING:tensorflow:The parameters `output_attentions`, `output_hidden_states` and `use_cache` cannot be updated when calling a model.They have to be set to True/False in the config object (i.e.: `config=XConfig.from_pretrained('name', output_attentions=True)`). WARNING:tensorflow:AutoGraph could not transform <bound method Socket.send of <zmq.sugar.socket.Socket object at 0x7faebec9aad0>> and will run it as-is. Please report this to the TensorFlow team. When filing the bug, set the verbosity to 10 (on Linux, `export AUTOGRAPH_VERBOSITY=10`) and attach the full output. Cause: module, class, method, function, traceback, frame, or code object was expected, got cython_function_or_method To silence this warning, decorate the function with @tf.autograph.experimental.do_not_convert WARNING: AutoGraph could not transform <bound method Socket.send of <zmq.sugar.socket.Socket object at 0x7faebec9aad0>> and will run it as-is. Please report this to the TensorFlow team. When filing the bug, set the verbosity to 10 (on Linux, `export AUTOGRAPH_VERBOSITY=10`) and attach the full output. Cause: module, class, method, function, traceback, frame, or code object was expected, got cython_function_or_method To silence this warning, decorate the function with @tf.autograph.experimental.do_not_convert WARNING:tensorflow:The parameter `return_dict` cannot be set in graph mode and will always be set to `True`. WARNING:tensorflow:The parameters `output_attentions`, `output_hidden_states` and `use_cache` cannot be updated when calling a model.They have to be set to True/False in the config object (i.e.: `config=XConfig.from_pretrained('name', output_attentions=True)`). WARNING:tensorflow:The parameter `return_dict` cannot be set in graph mode and will always be set to `True`. WARNING:tensorflow:The parameters `output_attentions`, `output_hidden_states` and `use_cache` cannot be updated when calling a model.They have to be set to True/False in the config object (i.e.: `config=XConfig.from_pretrained('name', output_attentions=True)`). WARNING:tensorflow:The parameter `return_dict` cannot be set in graph mode and will always be set to `True`. WARNING:tensorflow:The parameters `output_attentions`, `output_hidden_states` and `use_cache` cannot be updated when calling a model.They have to be set to True/False in the config object (i.e.: `config=XConfig.from_pretrained('name', output_attentions=True)`). WARNING:tensorflow:The parameter `return_dict` cannot be set in graph mode and will always be set to `True`. WARNING:tensorflow:The parameters `output_attentions`, `output_hidden_states` and `use_cache` cannot be updated when calling a model.They have to be set to True/False in the config object (i.e.: `config=XConfig.from_pretrained('name', output_attentions=True)`). WARNING:tensorflow:The parameter `return_dict` cannot be set in graph mode and will always be set to `True`. WARNING:tensorflow:The parameters `output_attentions`, `output_hidden_states` and `use_cache` cannot be updated when calling a model.They have to be set to True/False in the config object (i.e.: `config=XConfig.from_pretrained('name', output_attentions=True)`). WARNING:tensorflow:The parameter `return_dict` cannot be set in graph mode and will always be set to `True`. WARNING:tensorflow:The parameters `output_attentions`, `output_hidden_states` and `use_cache` cannot be updated when calling a model.They have to be set to True/False in the config object (i.e.: `config=XConfig.from_pretrained('name', output_attentions=True)`). WARNING:tensorflow:The parameter `return_dict` cannot be set in graph mode and will always be set to `True`. WARNING:tensorflow:The parameters `output_attentions`, `output_hidden_states` and `use_cache` cannot be updated when calling a model.They have to be set to True/False in the config object (i.e.: `config=XConfig.from_pretrained('name', output_attentions=True)`). WARNING:tensorflow:The parameter `return_dict` cannot be set in graph mode and will always be set to `True`. WARNING:absl:Found untraced functions such as wte_layer_call_and_return_conditional_losses, wte_layer_call_fn, dropout_layer_call_and_return_conditional_losses, dropout_layer_call_fn, ln_f_layer_call_and_return_conditional_losses while saving (showing 5 of 735). These functions will not be directly callable after loading. WARNING:absl:Found untraced functions such as wte_layer_call_and_return_conditional_losses, wte_layer_call_fn, dropout_layer_call_and_return_conditional_losses, dropout_layer_call_fn, ln_f_layer_call_and_return_conditional_losses while saving (showing 5 of 735). These functions will not be directly callable after loading. INFO:tensorflow:Assets written to: ./artifacts/gpt2-model/saved_model/1/assets INFO:tensorflow:Assets written to: ./artifacts/gpt2-model/saved_model/1/assets ('./artifacts/gpt2-transformer/tokenizer_config.json', './artifacts/gpt2-transformer/special_tokens_map.json', './artifacts/gpt2-transformer/vocab.json', './artifacts/gpt2-transformer/merges.txt', './artifacts/gpt2-transformer/added_tokens.json') ```python !mkdir -p artifacts/gpt2-onnx-model/gpt2-model/1/ ``` ```python !python -m tf2onnx.convert --saved-model ./artifacts/gpt2-model/saved_model/1 --opset 11 --output ./artifacts/gpt2-onnx-model/gpt2-model/1/model.onnx ``` 2021-09-07 08:43:11.186716: I tensorflow/stream_executor/platform/default/dso_loader.cc:49] Successfully opened dynamic library libcudart.so.11.0 /home/alejandro/miniconda3/lib/python3.7/runpy.py:125: RuntimeWarning: 'tf2onnx.convert' found in sys.modules after import of package 'tf2onnx', but prior to execution of 'tf2onnx.convert'; this may result in unpredictable behaviour warn(RuntimeWarning(msg)) 2021-09-07 08:43:12.886148: I tensorflow/compiler/jit/xla_cpu_device.cc:41] Not creating XLA devices, tf_xla_enable_xla_devices not set 2021-09-07 08:43:12.886345: W tensorflow/stream_executor/platform/default/dso_loader.cc:60] Could not load dynamic library 'libcuda.so.1'; dlerror: libcuda.so.1: cannot open shared object file: No such file or directory 2021-09-07 08:43:12.886376: W tensorflow/stream_executor/cuda/cuda_driver.cc:326] failed call to cuInit: UNKNOWN ERROR (303) 2021-09-07 08:43:12.886392: I tensorflow/stream_executor/cuda/cuda_diagnostics.cc:156] kernel driver does not appear to be running on this host (DESKTOP-CSLUJOT): /proc/driver/nvidia/version does not exist 2021-09-07 08:43:12.888970: I tensorflow/compiler/jit/xla_gpu_device.cc:99] Not creating XLA devices, tf_xla_enable_xla_devices not set 2021-09-07 08:43:12,892 - WARNING - '--tag' not specified for saved_model. Using --tag serve 2021-09-07 08:43:19,256 - INFO - Signatures found in model: [serving_default]. 2021-09-07 08:43:19,256 - WARNING - '--signature_def' not specified, using first signature: serving_default 2021-09-07 08:43:19,256 - INFO - Output names: ['logits', 'past_key_values'] 2021-09-07 08:43:19.306853: I tensorflow/core/grappler/devices.cc:69] Number of eligible GPUs (core count >= 8, compute capability >= 0.0): 0 2021-09-07 08:43:19.307167: I tensorflow/core/grappler/clusters/single_machine.cc:356] Starting new session 2021-09-07 08:43:19.307630: I tensorflow/compiler/jit/xla_gpu_device.cc:99] Not creating XLA devices, tf_xla_enable_xla_devices not set 2021-09-07 08:43:19.316142: I tensorflow/core/platform/profile_utils/cpu_utils.cc:112] CPU Frequency: 2400005000 Hz 2021-09-07 08:43:19.501937: I tensorflow/core/grappler/optimizers/meta_optimizer.cc:928] Optimization results for grappler item: graph_to_optimize function_optimizer: Graph size after: 3213 nodes (3060), 4128 edges (3974), time = 99.635ms. function_optimizer: function_optimizer did nothing. time = 1.408ms. 2021-09-07 08:43:27.473999: I tensorflow/compiler/jit/xla_gpu_device.cc:99] Not creating XLA devices, tf_xla_enable_xla_devices not set WARNING:tensorflow:From /home/alejandro/miniconda3/lib/python3.7/site-packages/tf2onnx/tf_loader.py:603: extract_sub_graph (from tensorflow.python.framework.graph_util_impl) is deprecated and will be removed in a future version. Instructions for updating: Use `tf.compat.v1.graph_util.extract_sub_graph` 2021-09-07 08:43:29,277 - WARNING - From /home/alejandro/miniconda3/lib/python3.7/site-packages/tf2onnx/tf_loader.py:603: extract_sub_graph (from tensorflow.python.framework.graph_util_impl) is deprecated and will be removed in a future version. Instructions for updating: Use `tf.compat.v1.graph_util.extract_sub_graph` 2021-09-07 08:43:29.353446: I tensorflow/core/grappler/devices.cc:69] Number of eligible GPUs (core count >= 8, compute capability >= 0.0): 0 2021-09-07 08:43:29.353640: I tensorflow/core/grappler/clusters/single_machine.cc:356] Starting new session 2021-09-07 08:43:29.353974: I tensorflow/compiler/jit/xla_gpu_device.cc:99] Not creating XLA devices, tf_xla_enable_xla_devices not set 2021-09-07 08:43:36.123024: I tensorflow/core/grappler/optimizers/meta_optimizer.cc:928] Optimization results for grappler item: graph_to_optimize constant_folding: Graph size after: 2720 nodes (-318), 3646 edges (-319), time = 4489.73486ms. function_optimizer: function_optimizer did nothing. time = 2.24ms. constant_folding: Graph size after: 2720 nodes (0), 3646 edges (0), time = 1504.76294ms. function_optimizer: function_optimizer did nothing. time = 13.628ms. 2021-09-07 08:43:39,251 - INFO - Using tensorflow=2.4.0, onnx=1.9.0, tf2onnx=1.8.5/50049d 2021-09-07 08:43:39,252 - INFO - Using opset <onnx, 11> 2021-09-07 08:43:51,608 - INFO - Computed 0 values for constant folding 2021-09-07 08:44:27,844 - INFO - Optimizing ONNX model 2021-09-07 08:44:38,170 - INFO - After optimization: Cast -123 (311->188), Concat -37 (126->89), Const -1854 (2032->178), Gather +12 (2->14), GlobalAveragePool +50 (0->50), Identity -76 (76->0), ReduceMean -50 (50->0), Shape -37 (112->75), Slice -74 (235->161), Squeeze -198 (223->25), Transpose -12 (61->49), Unsqueeze -361 (435->74) 2021-09-07 08:44:39,069 - INFO - 2021-09-07 08:44:39,069 - INFO - Successfully converted TensorFlow model ./artifacts/gpt2-model/saved_model/1 to ONNX 2021-09-07 08:44:39,069 - INFO - Model inputs: ['attention_mask:0', 'input_ids:0'] 2021-09-07 08:44:39,070 - INFO - Model outputs: ['logits', 'past_key_values'] 2021-09-07 08:44:39,070 - INFO - ONNX model is saved at ./artifacts/gpt2-onnx-model/gpt2-model/1/model.onnx ## Deploy GPT2 ONNX Model in Triton ```python import os ARTIFACT_FOLDER = os.getcwd() + "/artifacts" ``` ```python import numpy as np from tempo.serve.metadata import ModelFramework, ModelDataArgs, ModelDataArg from tempo.serve.model import Model from tempo.serve.pipeline import Pipeline, PipelineModels from tempo.serve.utils import pipeline, predictmethod ``` #### Define as tempo model ```python gpt2_model = Model( name="gpt2-model", platform=ModelFramework.ONNX, local_folder=ARTIFACT_FOLDER + "/gpt2-onnx-model", uri="s3://tempo/gpt2/model", description="GPT-2 ONNX Triton Model", ) ``` Insights Manager not initialised as empty URL provided. #### Deploy gpt2 model to docker ```python from tempo.serve.deploy import deploy_local remote_gpt2_model = deploy_local(gpt2_model) ``` #### Send predictions ```python input_ids = tokenizer.encode("This is a test", return_tensors="tf") attention_mask = np.ones(input_ids.shape.as_list(), dtype=np.int32) gpt2_inputs = { "input_ids:0": input_ids.numpy(), "attention_mask:0": attention_mask } print(gpt2_inputs) gpt2_outputs = remote_gpt2_model.predict(**gpt2_inputs) ``` {'input_ids:0': array([[1212, 318, 257, 1332]], dtype=int32), 'attention_mask:0': array([[1, 1, 1, 1]], dtype=int32)} #### Print single next token generated ```python logits = gpt2_outputs["logits"] # take the best next token probability of the last token of input ( greedy approach) next_token = logits.argmax(axis=2)[0] next_token_str = tokenizer.decode( next_token[-1:], skip_special_tokens=True, clean_up_tokenization_spaces=True ).strip() print(next_token_str) ``` of ## Define Transformer Pipeline ```python @pipeline( name="gpt2-transformer", uri="s3://tempo/gpt2/transformer", local_folder=ARTIFACT_FOLDER + "/gpt2-transformer/", models=PipelineModels(gpt2_model=gpt2_model), description="A pipeline to use either an sklearn or xgboost model for Iris classification", ) class GPT2Transformer: def __init__(self): try: self.tokenizer = GPT2Tokenizer.from_pretrained("/mnt/models/") except: self.tokenizer = GPT2Tokenizer.from_pretrained(ARTIFACT_FOLDER + "/gpt2-transformer/") @predictmethod def predict(self, payload: str) -> str: count = 0 # TODO: Update to allow this to be passed as parameters max_gen_len = 10 # TODO: Update to work for multiple sentences gen_sentence = payload while count < max_gen_len: input_ids = self.tokenizer.encode(gen_sentence, return_tensors="tf") attention_mask = np.ones(input_ids.shape.as_list(), dtype=np.int32) gpt2_inputs = { "input_ids:0": input_ids.numpy(), "attention_mask:0": attention_mask } gpt2_outputs = self.models.gpt2_model.predict(**gpt2_inputs) logits = gpt2_outputs["logits"] # take the best next token probability of the last token of input ( greedy approach) next_token = logits.argmax(axis=2)[0] next_token_str = self.tokenizer.decode( next_token[-1:], skip_special_tokens=True, clean_up_tokenization_spaces=True ).strip() gen_sentence += " " + next_token_str count += 1 return gen_sentence ``` INFO:tempo:Initialising Insights Manager with Args: ('', 1, 1, 3, 0) WARNING:tempo:Insights Manager not initialised as empty URL provided. #### Test locally against deployed model ```python gpt2_transformer = GPT2Transformer() ``` ```python gpt2_output = gpt2_transformer.predict("I love artificial intelligence") ``` ```python print(gpt2_output) ``` I love artificial intelligence , but I 'm not sure if it 's worth ## Deploy GPT2 Transformer to Docker and Test * In preparation for running our models we save the Python environment needed for the orchestration to run as defined by a `conda.yaml` in our project. ```python %%writefile artifacts/gpt2-transformer/conda.yaml name: tempo-gpt2 channels: - defaults dependencies: - python=3.7.10 - pip: - transformers==4.5.1 - tokenizers==0.10.3 - tensorflow==2.4.1 - dill - mlops-tempo - mlserver - mlserver-tempo ``` Overwriting artifacts/gpt2-transformer/conda.yaml #### Save environment and pipeline artifact ```python from tempo.serve.loader import save save(GPT2Transformer) ``` INFO:tempo:Initialising Insights Manager with Args: ('', 1, 1, 3, 0) WARNING:tempo:Insights Manager not initialised as empty URL provided. INFO:tempo:Saving environment INFO:tempo:Saving tempo model to /home/alejandro/Programming/kubernetes/seldon/tempo/docs/examples/multi-model-gpt2-triton-pipeline/artifacts/gpt2-transformer/model.pickle INFO:tempo:Using found conda.yaml INFO:tempo:Creating conda env with: conda env create --name tempo-cb69ce65-9d45-4683-bdfd-592f735994f1 --file /tmp/tmp1vsizgk7.yml INFO:tempo:packing conda environment from tempo-cb69ce65-9d45-4683-bdfd-592f735994f1 Collecting packages... Packing environment at '/home/alejandro/miniconda3/envs/tempo-cb69ce65-9d45-4683-bdfd-592f735994f1' to '/home/alejandro/Programming/kubernetes/seldon/tempo/docs/examples/multi-model-gpt2-triton-pipeline/artifacts/gpt2-transformer/environment.tar.gz' [########################################] | 100% Completed | 49.2s INFO:tempo:Removing conda env with: conda remove --name tempo-cb69ce65-9d45-4683-bdfd-592f735994f1 --all --yes #### Deploy locally on Docker * Here we test our models using production images but running locally on Docker. This allows us to ensure the final production deployed model will behave as expected when deployed. ```python from tempo import deploy_local remote_transformer = deploy_local(gpt2_transformer) ``` ```python remote_transformer.predict("I love artificial intelligence") ``` "I love artificial intelligence , but I 'm not sure if it 's worth" ```python remote_transformer.undeploy() ``` INFO:tempo:Undeploying gpt2-transformer INFO:tempo:Undeploying gpt2-model ## Deploy to Kubernetes * Here we illustrate how to run the final models in "production" on Kubernetes by using Tempo to deploy ### Prerequisites Create a Kind Kubernetes cluster with Minio and Seldon Core installed using Ansible as described [here](https://tempo.readthedocs.io/en/latest/overview/quickstart.html#kubernetes-cluster-with-seldon-core). ```python !kubectl create ns production !kubectl apply -f k8s/rbac -n production ``` Error from server (AlreadyExists): namespaces "production" already exists secret/minio-secret configured serviceaccount/tempo-pipeline unchanged role.rbac.authorization.k8s.io/tempo-pipeline unchanged rolebinding.rbac.authorization.k8s.io/tempo-pipeline-rolebinding unchanged ```python from tempo.examples.minio import create_minio_rclone import os create_minio_rclone(os.getcwd()+"/rclone.conf") ``` ```python from tempo.serve.loader import upload upload(gpt2_transformer) upload(gpt2_model) ``` INFO:tempo:Uploading /home/alejandro/Programming/kubernetes/seldon/tempo/docs/examples/multi-model-gpt2-triton-pipeline/artifacts/gpt2-transformer/ to s3://tempo/gpt2/transformer INFO:tempo:Uploading /home/alejandro/Programming/kubernetes/seldon/tempo/docs/examples/multi-model-gpt2-triton-pipeline/artifacts/gpt2-onnx-model to s3://tempo/gpt2/model ```python from tempo.serve.metadata import SeldonCoreOptions runtime_options = SeldonCoreOptions(**{ "remote_options": { "namespace": "production", "authSecretName": "minio-secret" } }) ``` ```python from tempo import deploy_remote remote_gpt2_transformer = deploy_remote(gpt2_transformer, options=runtime_options) ``` ```python remote_gpt2_transformer.predict("I love artificial intelligence") ``` "I love artificial intelligence , but I 'm not sure if it 's worth" ```python remote_gpt2_transformer.undeploy() ``` INFO:tempo:Undeploying gpt2-transformer INFO:tempo:Undeploying gpt2-model ```python ```
41.562628
338
0.743837
eng_Latn
0.736779
d5db1f2cf775caf8f8e76df7130029247e85cf73
13,500
md
Markdown
articles/azure-app-configuration/use-key-vault-references-dotnet-core.md
eltociear/azure-docs.fr-fr
3302b8be75f0872cf7d7a5e264850849ac36e493
[ "CC-BY-4.0", "MIT" ]
null
null
null
articles/azure-app-configuration/use-key-vault-references-dotnet-core.md
eltociear/azure-docs.fr-fr
3302b8be75f0872cf7d7a5e264850849ac36e493
[ "CC-BY-4.0", "MIT" ]
null
null
null
articles/azure-app-configuration/use-key-vault-references-dotnet-core.md
eltociear/azure-docs.fr-fr
3302b8be75f0872cf7d7a5e264850849ac36e493
[ "CC-BY-4.0", "MIT" ]
null
null
null
--- title: Tutoriel concernant l’utilisation de références Key Vault avec Azure App Configuration dans une application ASP.NET Core | Microsoft Docs description: Dans ce tutoriel, vous apprenez à utiliser les références Key Vault avec Azure App Configuration depuis une application ASP.NET Core services: azure-app-configuration documentationcenter: '' author: lisaguthrie manager: maiye editor: '' ms.assetid: '' ms.service: azure-app-configuration ms.workload: tbd ms.devlang: csharp ms.topic: tutorial ms.date: 04/08/2020 ms.author: lcozzens ms.custom: mvc ms.openlocfilehash: 4641c50f0579e2a8db514df58c0401eb2173d793 ms.sourcegitcommit: 58faa9fcbd62f3ac37ff0a65ab9357a01051a64f ms.translationtype: HT ms.contentlocale: fr-FR ms.lasthandoff: 04/29/2020 ms.locfileid: "81309050" --- # <a name="tutorial-use-key-vault-references-in-an-aspnet-core-app"></a>Tutoriel : Utiliser des références Key Vault dans une application ASP.NET Core Dans ce tutoriel, vous apprenez à utiliser le service Azure App Configuration avec Azure Key Vault. App Configuration et Key Vault sont des services complémentaires utilisés côte à côte dans la plupart des déploiements d’applications. App Configuration vous aide à utiliser ces services ensemble en créant des clés qui référencent des valeurs stockées dans Key Vault. Lorsque le service App Configuration crée de telles clés, il stocke les URI des valeurs Key Vault plutôt que les valeurs elles-mêmes. Votre application utilise le fournisseur client de App Configuration pour récupérer les références Key Vault, tout comme pour toutes les autres clés stockées dans App Configuration. Dans ce cas, les valeurs stockées dans App Configuration sont des URI qui référencent les valeurs dans le coffre de clés. Elles ne sont pas des valeurs de coffre de clés ou des informations d’identification. Étant donné que le fournisseur client reconnaît les clés comme des références Key Vault, il utilise Key Vault pour récupérer leurs valeurs. Votre application est chargée de s’authentifier correctement auprès d’App Configuration et auprès de Key Vault. Les deux services ne communiquent pas directement. Ce tutoriel vous montre comment implémenter des références Key Vault dans votre code. Il s’appuie sur l’application web introduite dans les guides de démarrage rapide. Avant de continuer, terminez d’abord l’étape [Créer une application ASP.NET Core avec App Configuration](./quickstart-aspnet-core-app.md). Vous pouvez utiliser l’éditeur de code de votre choix pour exécuter les étapes de ce tutoriel. Par exemple, [Visual Studio Code](https://code.visualstudio.com/) est un éditeur de code multiplateforme qui est disponible pour les systèmes d’exploitation Windows, macOS et Linux. Dans ce tutoriel, vous allez apprendre à : > [!div class="checklist"] > * Créer une clé App Configuration qui référence une valeur stockée dans Key Vault. > * Accéder à la valeur de cette clé à partir d’une application web ASP.NET Core. ## <a name="prerequisites"></a>Prérequis Avant d’effectuer ce tutoriel, installez le [kit SDK .NET Core](https://dotnet.microsoft.com/download). [!INCLUDE [quickstarts-free-trial-note](../../includes/quickstarts-free-trial-note.md)] ## <a name="create-a-vault"></a>Création d'un coffre 1. Sélectionnez l’option **Créer une ressource** dans le coin supérieur gauche du Portail Azure : ![La sortie après la création du coffre de clés](./media/quickstarts/search-services.png) 1. Dans la zone de recherche, entrez **Key Vault**. 1. Dans la liste des résultats, sélectionnez **Coffres de clés** sur la gauche. 1. Dans **Coffres de clés**, sélectionnez **Ajouter**. 1. Sur la droite, dans **Créer un coffre de clés**, renseignez les informations suivantes : - Sélectionnez **Abonnement** pour choisir un abonnement. - Dans **Groupe de ressources**, sélectionnez **Créer un nouveau** et entrez un nom de groupe de ressources. - Dans **Nom du coffre de clés**, un nom unique est requis. Pour ce tutoriel, entrez **Contoso-vault2**. - Dans la liste déroulante **Région**, choisissez un emplacement. 1. Conservez les valeurs par défaut des autres options **Création d’un coffre de clés**. 1. Sélectionnez **Create** (Créer). À ce stade, votre compte Azure est le seul autorisé à accéder à ce nouveau coffre. ![La sortie après la création du coffre de clés](./media/quickstarts/vault-properties.png) ## <a name="add-a-secret-to-key-vault"></a>Ajouter un secret au coffre de clés Pour ajouter un secret au coffre, vous n’avez qu’à effectuer deux autres étapes. Dans ce cas, ajoutez un message que vous pouvez utiliser pour tester la récupération de Key Vault. Le message est appelé **Message** et vous stockez la valeur « Hello from Key Vault » dedans. 1. Depuis les pages des propriétés Key Vault, sélectionnez **Secrets**. 1. Sélectionnez **Générer/Importer**. 1. Dans le volet **Créer un secret**, saisissez les valeurs suivantes : - **Options de chargement** : Entrez **Manuel**. - **Name** : Entrez **Message**. - **Valeur** : Entrez **Hello from Key Vault**. 1. Conservez les valeurs par défaut des autres propriétés **Créer un secret**. 1. Sélectionnez **Create** (Créer). ## <a name="add-a-key-vault-reference-to-app-configuration"></a>Ajouter une référence Key Vault à App Configuration 1. Connectez-vous au [portail Azure](https://portal.azure.com). Sélectionnez **Toutes les ressources**, puis sélectionnez l’instance du magasin App Configuration que vous avez créée dans le guide de démarrage rapide. 1. Sélectionnez **Explorateur de configuration**. 1. Sélectionnez **+ Créer** > **Référence Key Vault**, puis choisissez les valeurs suivantes : - **Clé** : Sélectionnez **TestApp:Settings:KeyVaultMessage**. - **Étiquette** : Laissez cette valeur vide. - **Abonnement**, **Groupe de ressources** et **Key Vault** : Entrez les valeurs correspondant au coffre de clés que vous avez créé à la section précédente. - **Secret** : Sélectionnez le secret nommé **Message** que vous avez créé dans la section précédente. ## <a name="connect-to-key-vault"></a>Se connecter à Key Vault 1. Dans ce tutoriel, vous utilisez un principal de service pour l’authentification auprès de KeyVault. Pour créer ce principal de service, utilisez la commande Azure CLI [az ad sp create-for-rbac](/cli/azure/ad/sp?view=azure-cli-latest#az-ad-sp-create-for-rbac) : ```azurecli az ad sp create-for-rbac -n "http://mySP" --sdk-auth ``` Cette opération retourne une série de paires clé/valeur : ```console { "clientId": "7da18cae-779c-41fc-992e-0527854c6583", "clientSecret": "b421b443-1669-4cd7-b5b1-394d5c945002", "subscriptionId": "443e30da-feca-47c4-b68f-1636b75e16b3", "tenantId": "35ad10f1-7799-4766-9acf-f2d946161b77", "activeDirectoryEndpointUrl": "https://login.microsoftonline.com", "resourceManagerEndpointUrl": "https://management.azure.com/", "sqlManagementEndpointUrl": "https://management.core.windows.net:8443/", "galleryEndpointUrl": "https://gallery.azure.com/", "managementEndpointUrl": "https://management.core.windows.net/" } ``` 1. Exécutez la commande suivante pour autoriser le principal du service à accéder à votre coffre de clés : ```cmd az keyvault set-policy -n <your-unique-keyvault-name> --spn <clientId-of-your-service-principal> --secret-permissions delete get list set --key-permissions create decrypt delete encrypt get list unwrapKey wrapKey ``` 1. Ajoutez des variables d’environnement pour stocker les valeurs de *clientId*, *clientSecret* et *tenantId*. #### <a name="windows-command-prompt"></a>[Invite de commandes Windows](#tab/cmd) ```cmd setx AZURE_CLIENT_ID <clientId-of-your-service-principal> setx AZURE_CLIENT_SECRET <clientSecret-of-your-service-principal> setx AZURE_TENANT_ID <tenantId-of-your-service-principal> ``` #### <a name="powershell"></a>[PowerShell](#tab/powershell) ```PowerShell $Env:AZURE_CLIENT_ID = <clientId-of-your-service-principal> $Env:AZURE_CLIENT_SECRET = <clientSecret-of-your-service-principal> $Env:AZURE_TENANT_ID = <tenantId-of-your-service-principal> ``` #### <a name="bash"></a>[Bash](#tab/bash) ```bash export AZURE_CLIENT_ID = <clientId-of-your-service-principal> export AZURE_CLIENT_SECRET = <clientSecret-of-your-service-principal> export AZURE_TENANT_ID = <tenantId-of-your-service-principal> ``` --- > [!NOTE] > Ces informations d’identification Key Vault sont utilisées uniquement dans votre application. Votre application s’authentifie directement auprès de Key Vault à l’aide de ces informations d’identification. Elles ne sont jamais transmises au service App Configuration. 1. Redémarrez votre terminal pour charger ces nouvelles variables d’environnement. ## <a name="update-your-code-to-use-a-key-vault-reference"></a>Mettre à jour votre code pour utiliser une référence Key Vault 1. Ajoutez une référence aux packages NuGet requis en exécutant la commande suivante : ```dotnetcli dotnet add package Azure.Identity ``` 1. Ouvrez *Program.cs* et ajoutez des références aux packages requis suivants : ```csharp using Azure.Identity; ``` 1. Mettez à jour la méthode `CreateWebHostBuilder` pour utiliser App Configuration en appelant la méthode `config.AddAzureAppConfiguration`. Incluez l’option `ConfigureKeyVault` et transmettez les informations d’identification correctes à votre coffre de clés. #### <a name="net-core-2x"></a>[.NET Core 2.x](#tab/core2x) ```csharp public static IWebHostBuilder CreateWebHostBuilder(string[] args) => WebHost.CreateDefaultBuilder(args) .ConfigureAppConfiguration((hostingContext, config) => { var settings = config.Build(); config.AddAzureAppConfiguration(options => { options.Connect(settings["ConnectionStrings:AppConfig"]) .ConfigureKeyVault(kv => { kv.SetCredential(new DefaultAzureCredential()); }); }); }) .UseStartup<Startup>(); ``` #### <a name="net-core-3x"></a>[.NET Core 3.x](#tab/core3x) ```csharp public static IHostBuilder CreateHostBuilder(string[] args) => Host.CreateDefaultBuilder(args) .ConfigureWebHostDefaults(webBuilder => webBuilder.ConfigureAppConfiguration((hostingContext, config) => { var settings = config.Build(); config.AddAzureAppConfiguration(options => { options.Connect(settings["ConnectionStrings:AppConfig"]) .ConfigureKeyVault(kv => { kv.SetCredential(new DefaultAzureCredential()); }); }); }) .UseStartup<Startup>()); ``` 1. Quand vous avez initialisé la connexion à App Configuration, vous avez configuré la connexion à Key Vault en appelant la méthode `ConfigureKeyVault`. Après l’initialisation, vous pouvez accéder aux valeurs des références Key Vault de la même façon que vous accédez aux valeurs des clés App Configuration normales. Pour voir ce processus en action, ouvrez *Index.cshtml* dans **Affichages** > **Dossier de base**. Remplacez son contenu par le code ci-dessous : ```html @using Microsoft.Extensions.Configuration @inject IConfiguration Configuration <style> body { background-color: @Configuration["TestApp:Settings:BackgroundColor"] } h1 { color: @Configuration["TestApp:Settings:FontColor"]; font-size: @Configuration["TestApp:Settings:FontSize"]px; } </style> <h1>@Configuration["TestApp:Settings:Message"] and @Configuration["TestApp:Settings:KeyVaultMessage"]</h1> ``` Vous accédez à la valeur de la référence Key Vault **TestApp:Settings:KeyVaultMessage** de la même façon que vous accédez à la valeur de configuration **TestApp:Settings:Message**. ## <a name="build-and-run-the-app-locally"></a>Générer et exécuter l’application localement 1. Pour générer l’application à l’aide de l’interface CLI .NET Core, exécutez la commande suivante dans l’interpréteur de commandes : ```dotnetcli dotnet build ``` 1. Une fois la génération terminée, utilisez la commande suivante pour exécuter l’application web localement : ```dotnetcli dotnet run ``` 1. Ouvrez une fenêtre de navigateur, puis accédez à `http://localhost:5000`, qui est l’URL par défaut de l’application web hébergée localement. ![Démarrage rapide du lancement d’application locale](./media/key-vault-reference-launch-local.png) ## <a name="clean-up-resources"></a>Nettoyer les ressources [!INCLUDE [azure-app-configuration-cleanup](../../includes/azure-app-configuration-cleanup.md)] ## <a name="next-steps"></a>Étapes suivantes Dans ce tutoriel, vous créez une clé App Configuration qui référence une valeur stockée dans Key Vault. Pour savoir comment ajouter une identité de service gérée par Azure qui simplifie l’accès à App Configuration et à Key Vault, passez au tutoriel suivant. > [!div class="nextstepaction"] > [Intégration des identités managées](./howto-integrate-azure-managed-service-identity.md)
50.185874
529
0.717556
fra_Latn
0.874262
d5dc6de0cc820397709ec939efd8e33f12f57486
2,300
md
Markdown
_posts/2007/2007-08-31-summer-2007-post-mortem.md
gvwilson/thirdb
4a78ed7aef83c97d0ce95e73f20372a3482e1dd2
[ "CC-BY-4.0" ]
14
2016-07-23T02:36:15.000Z
2021-11-01T20:13:03.000Z
_posts/2007/2007-08-31-summer-2007-post-mortem.md
gvwilson/thirdb
4a78ed7aef83c97d0ce95e73f20372a3482e1dd2
[ "CC-BY-4.0" ]
102
2015-12-30T09:38:08.000Z
2021-11-02T11:34:33.000Z
_posts/2007/2007-08-31-summer-2007-post-mortem.md
gvwilson/thirdb
4a78ed7aef83c97d0ce95e73f20372a3482e1dd2
[ "CC-BY-4.0" ]
8
2018-01-07T14:36:47.000Z
2021-02-23T07:33:57.000Z
--- title: "Summer 2007 Post Mortem" date: 2007-08-31 14:16:17 year: 2007 --- We held the post-mortem for the summer's projects yesterday. It went well---the summer, I mean, not just the post-mortem. Here are the main points: <table> <tr> <td align="center"><strong>Good</strong></td> <td align="center"><strong>Bad</strong></td> </tr> <tr> <td valign="top"> <ul> <li>Industry/prof visits</li> <li>Learned a lot (group work)</li> <li>Learning the internals of a large system</li> <li>Making friends</li> <li>Excellent office space</li> <li>Learned that software engineering can actually be interesting</li> <li>Doing something new (building real code!)</li> <li>Martin + Tony worked independently very well</li> <li>Had a good OLM deployment plan</li> <li>No personality clashes</li> <li>Good data model for new ticketing system</li> <li>Group lunches</li> <li>Speed Scrabble</li> <li>Python</li> <li>Learning (self-)discipline</li> <li>The Google podcast</li> <li>Self-administration of machines (fun to do, fun to learn)</li> <li>Hardware was good</li> <li>Regular status meetings were useful and a good learning experience</li> <li>OLM testing</li> <li>Talk with Jay Goldman</li> <li>Sharing problems on the mailing list</li> <li>Jeff Balogh's visit</li> <li>We did it!</li> </ul> </td> <td valign="top"> <ul> <li>Working solo on UTest</li> <li>Dealing with Ant</li> <li>Falling behind on collaboration with partner</li> <li>No real time plan for the last month (before deployment)</li> <li>Hardware problems that were never resolved</li> <li>No contact with previous teams</li> <li>Python and Eclipse</li> <li>Too much time spent in email</li> <li>Supervisors were too hands off</li> <li>Didn't get deployed on schedule</li> <li>Didn't get in the habit of "talking tickets"</li> <li>Status meetings didn't turn in to design meetings</li> <li>Interface to new ticketing system</li> <li>Greg's absence (length and timing)</li> <li>The old dashboard code</li> <li>Should have had bi-weekly demos</li> <li>Initial nervousness (a.k.a. "startup shakes")</li> <li>Having meetings at 9:00 AM</li> <li>Not enough documentation (but we haven't done any better)</li> <li>Supervisors couldn't cover for each other during absences</li> </ul> </td> </tr> </table>
34.328358
149
0.706522
eng_Latn
0.875214
d5dd941006ed249ffea342245d2024027d91317b
843
md
Markdown
README.md
Univesp-Computacao/bot_help
153e79c1a60698ed94b9758ef5a926f83b12cf43
[ "MIT" ]
null
null
null
README.md
Univesp-Computacao/bot_help
153e79c1a60698ed94b9758ef5a926f83b12cf43
[ "MIT" ]
null
null
null
README.md
Univesp-Computacao/bot_help
153e79c1a60698ed94b9758ef5a926f83b12cf43
[ "MIT" ]
null
null
null
# Bot Helper @botheper_bot ### O que este bot faz? Este bot exibe os comandos das principais tecnologias da informação, começando por Git, Linux e Docker. Desenvolvido em Python com a biblioteca python-telegram-bot e hospedado no railway.app. ## Proximos passos do Projeto + Menu interativos - Nivel Iniciante + - [python Telegram bot](https://github.com/python-telegram-bot/python-telegram-bot) - Domingo 03/04/2022 + API Gitub - Busca commits + - [API github](https://docs.github.com/pt/rest/guides/getting-started-with-the-rest-api) + Suporte a Markdown - Nivel Iniciante + - [python Telegram bot](https://github.com/python-telegram-bot/python-telegram-bot) + Retorna arquivos PDF - Nivel Iniciante + - [python Telegram bot](https://github.com/python-telegram-bot/python-telegram-bot) + CI/CD - Futuramente + Testes - Furutamente
40.142857
143
0.754448
por_Latn
0.651228
d5dddf0c8cfda599672c29e561f5039ff7e072ae
2,588
md
Markdown
configs/twins/README.md
littleSunlxy/mmsegmentation
9e4d74def0bc570c719fb3605caca82a2648a111
[ "Apache-2.0" ]
null
null
null
configs/twins/README.md
littleSunlxy/mmsegmentation
9e4d74def0bc570c719fb3605caca82a2648a111
[ "Apache-2.0" ]
null
null
null
configs/twins/README.md
littleSunlxy/mmsegmentation
9e4d74def0bc570c719fb3605caca82a2648a111
[ "Apache-2.0" ]
null
null
null
# Twins: Revisiting the Design of Spatial Attention in Vision Transformers ## Introduction <!-- [ALGORITHM] --> <a href="https://github.com/Meituan-AutoML/Twins">Official Repo</a> <details> <summary align="right"><a href="https://arxiv.org/pdf/2104.13840.pdf">Twins (arXiv'2021)</a></summary> ```latex @article{liu2021Swin, title={Swin Transformer: Hierarchical Vision Transformer using Shifted Windows}, author={Liu, Ze and Lin, Yutong and Cao, Yue and Hu, Han and Wei, Yixuan and Zhang, Zheng and Lin, Stephen and Guo, Baining}, journal={arXiv preprint arXiv:2103.14030}, year={2021} } ``` </details> ## Usage ``pip install timm==0.3.2`` #### Training To train Twins-SVT-B on ImageNet using 8 gpus for 300 epochs, run ```python python -m torch.distributed.launch --nproc_per_node=8 --use_env main.py --model alt_gvt_base --batch-size 128 --data-path path_to_imagenet --dist-eval --drop-path 0.3 ``` #### Evaluation To evaluate the performance of Twins-SVT-L on ImageNet using one GPU, run ```python python main.py --eval --resume alt_gvt_large.pth --model alt_gvt_large --data-path path_to_imagenet ``` This script convert model from `PRETRAIN_PATH` and store the converted model in `STORE_PATH`. ## Results and models ### ADE20K | Model | Alias in the paper | mIoU(ss/ms) | FLOPs(G)|#Params (M) | URL | Log | | --- | --- | --- | --- | --- |--- |---| | PCPVT-Small| Twins-PCPVT-S | 46.2/47.5 | 234 | 54.6 | [pcpvt_small.pth](https://drive.google.com/file/d/1PkkBULZZUhIkFKq_D9db1DXUIHwIPlvp/view?usp=sharing) | [pcpvt_s.txt](/logs/upernet_pcpvt_s.txt) | PCPVT-Base | Twins-PCPVT-B | 47.1/48.4 | 250 | 74.3 | [pcpvt_base.pth](https://drive.google.com/file/d/16sCd0slLLz6xt3C2ma3TkS9rpMS9eezT/view?usp=sharing) | [pcpvt_b.txt](/logs/upernet_pcpvt_b.txt) | PCPVT-Large| Twins-PCPVT-L | 48.6/49.8 | 269 | 91.5 | [pcpvt_large.pth](https://drive.google.com/file/d/1wsU9riWBiN22fyfsJCHDFhLyP2c_n8sk/view?usp=sharing) | [pcpvt_l.txt](/logs/upernet_pcpvt_l.txt) | ALTGVT-Small | Twins-SVT-S | 46.2/47.1 | 228 | 54.4 | [alt_gvt_small.pth](https://drive.google.com/file/d/18OhG0sbAJ5okPj0zn-8YTydKG9jS8TUx/view?usp=sharing) |[svt_s.txt](/logs/upernet_svt_s.txt) | ALTGVT-Base | Twins-SVT-B | 47.4/48.9 | 261 | 88.5 | [alt_gvt_base.pth](https://drive.google.com/file/d/1LNtdvACihmKO6XyBPoJDxbrd6AuHVVvq/view?usp=sharing)|[svt_b.txt](/logs/upernet_svt_b.txt) | ALTGVT-Large | Twins-SVT-L | 48.8/50.2 | 297 | 133 | [alt_gvt_large.pth](https://drive.google.com/file/d/1xS91hytfzuMZ5Rgb-W-cOJ9G7ptjVwlO/view?usp=sharing)|[svt_l.txt](/logs/upernet_svt_l.txt)
44.62069
202
0.711747
yue_Hant
0.350244
d5df3d15952501b87c29e6832b65494f782e01a0
1,712
md
Markdown
README.md
colleencancel/Eye-Exercise
7ec4c9b0e40f26d76edbd29bc7c2bb6c2f9a733e
[ "Unlicense" ]
null
null
null
README.md
colleencancel/Eye-Exercise
7ec4c9b0e40f26d76edbd29bc7c2bb6c2f9a733e
[ "Unlicense" ]
null
null
null
README.md
colleencancel/Eye-Exercise
7ec4c9b0e40f26d76edbd29bc7c2bb6c2f9a733e
[ "Unlicense" ]
null
null
null
# Eye Exercise MIT xPRO This project was part of the course work required in the MIT xPRO Full-Stack development course. #### Description A project to track the movement of the mouse. When the mouse pointer is moved there are two eyes which follow the movement of the mouse on the screen. This projects uses mouse movement detection. #### How to Run Download the files that are in the Eye Exercise directory. Open a new tab in your browser window. Drag and drop the index.html file onto the new tab. Move mouse around on browser to see eyes move. #### Future improvements Adding additional detail to the page to make it more visually interesting #### MIT License Copyright (c) 2021 Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
74.434783
460
0.793808
eng_Latn
0.937263
d5df5c73c586bcdc5f5b67f6c35aaad7a19796b6
1,730
md
Markdown
README.md
SniperCZE/sms-gateway
22339d59326336b198c8b86aa9098c4925cfbafc
[ "MIT" ]
2
2021-04-06T13:49:29.000Z
2021-04-18T09:55:40.000Z
README.md
SniperCZE/sms-gateway
22339d59326336b198c8b86aa9098c4925cfbafc
[ "MIT" ]
null
null
null
README.md
SniperCZE/sms-gateway
22339d59326336b198c8b86aa9098c4925cfbafc
[ "MIT" ]
null
null
null
# sms-gateway Open source / open hardware multiline SMS gateway with HTTP api and RabbitMQ consumer, enclosed in nice 1U custom case. ## Work in progress! This repo is under development. There is no guarantee that any part of it will not change in the future. Models, schemas and part lists are not final. ## Idea I would like to have SMS gateway for sending SMS, which: - receives messages with HTTP API or RabbitMQ queue - works without active Internet connection - can be scaled up, can be HA - looks good - is not expensive ![SMS gateway block schema](https://github.com/SniperCZE/sms-gateway/blob/master/block-diagram.jpg) ## Electronics Whole idea is based on raspberry pi minicomputers with SIM800L GSM modules and some custom PCBs. All schematics are KiCAD (https://kicad.org/) projects. ### Power I'am using one input of 230V AC, converted to 5V DC for every components. There is custom designed PDU board inside of gateway interconnecting all components. Ethernet switch, thermometer and raspberries are powered directly with 5V, GSM module SIM800L must be powered with 4.3V, so I'm using basic diode 1N4007 to drop 5V to 4.3V. ![SMS gateway power distribution](https://github.com/SniperCZE/sms-gateway/blob/master/power-block-diagram.jpg) ## Mechanics I will have to build custom 1U rack case for this project. You can find here models ad FreeCAD (https://www.freecadweb.org/) project. FreeCAD workbenches needed: - `KiCadStepUp` - integration of KiCAD - `Fasteners` - screws and nuts - `Sheet metal` - Support of metal sheet bending - `Exploded assembly` - Generation of assembly animation ## Software Every piece of software for my gateway is written in python with some bash scripts and systemd units.
42.195122
331
0.775145
eng_Latn
0.986273
d5dfa329e36c73d7a20fa3394c09beae1392546c
938
md
Markdown
README.md
diegoportela99/Job-Scraper
1f400f366cb3c7116632b76b0749e3d9a68992ab
[ "MIT" ]
1
2021-08-19T15:12:11.000Z
2021-08-19T15:12:11.000Z
README.md
diegoportela99/Job-Scraper
1f400f366cb3c7116632b76b0749e3d9a68992ab
[ "MIT" ]
2
2021-08-19T14:59:36.000Z
2021-08-19T21:43:01.000Z
README.md
diegoportela99/Job-Scraper
1f400f366cb3c7116632b76b0749e3d9a68992ab
[ "MIT" ]
1
2021-08-19T15:12:47.000Z
2021-08-19T15:12:47.000Z
# Job-Scraper 🕸️ Designed for the data extraction on the indeed job hosted website [Indeed.com.au](https://au.indeed.com/), however scalable to be used on other websites The program is written in python 3. ![alt text](image/Spider-Crawlerweb-shine.png) ## Features 🌟 * Active Proxy Hopping * Multi-Threaded Proxy Checking * CSV Local Data Store ## How to run the code 🚀 ```diff + THIS PROGRAM IS ONLY FOR EDUCATIONAL PURPOSES AND WAS NOT INTENDED FOR MALICIOUS OR SPITEFUL PURPOSES ``` It's very easy you just need to do the following below! 1. Run requirements.txt ``` python install -r requirements.txt ``` 2. run python indeed_scraper ``` python indeed_scraper.py ``` ### Current Issues The program does not currently work for other hosted websites as it is hard coded to pull date from indeed, future requirements would be to add an automated version for extrating the text from each endpoint.
27.588235
208
0.733475
eng_Latn
0.957739
d5e073c808357221d02ebfec9d7f72cd369db886
459
md
Markdown
ed/r/rpc/README.md
cn007b/stash
bae604d3056f09b9b6c6b3e0282f02c829801f5c
[ "MIT" ]
null
null
null
ed/r/rpc/README.md
cn007b/stash
bae604d3056f09b9b6c6b3e0282f02c829801f5c
[ "MIT" ]
null
null
null
ed/r/rpc/README.md
cn007b/stash
bae604d3056f09b9b6c6b3e0282f02c829801f5c
[ "MIT" ]
1
2021-11-26T05:40:08.000Z
2021-11-26T05:40:08.000Z
RPC (Remote Procedure Call) - RPC - interprocess communication technique. May work over TCP, HTTP, etc. Problems: * How should the client react if there are no servers running or RPC server is down for a long time? * Should a client have some kind of timeout for the RPC? * If the server malfunctions and raises an exception, should it be forwarded to the client? * Protecting against invalid incoming messages (eg checking bounds, type) before processing.
38.25
100
0.779956
eng_Latn
0.997215
d5e0857bbe2c8fedbd7f13e4803207501f416d66
190
md
Markdown
episodes/327.md
BoyanTodorov/Ognena-Pustinya
8a184c1c5894a81049e9fef999a95cca92384804
[ "WTFPL" ]
null
null
null
episodes/327.md
BoyanTodorov/Ognena-Pustinya
8a184c1c5894a81049e9fef999a95cca92384804
[ "WTFPL" ]
null
null
null
episodes/327.md
BoyanTodorov/Ognena-Pustinya
8a184c1c5894a81049e9fef999a95cca92384804
[ "WTFPL" ]
null
null
null
## 327. Замаян от гъстите облаци лютив пушек, падаш на земя пред пламтящата гора. Последното, което чуваш, са злобни крясъци на войниците. Загиваш тук и задачата ти ще остава неизпълнена.
23.75
62
0.784211
bul_Cyrl
0.999952
d5e17c7af97e466a60b75044d4762212e6d0ccfc
4,526
md
Markdown
articles/storage/common/storage-account-manage.md
ianychoi/azure-docs.ko-kr
e8831792859f1af945f9036f5ff75292892cdc88
[ "CC-BY-4.0", "MIT" ]
null
null
null
articles/storage/common/storage-account-manage.md
ianychoi/azure-docs.ko-kr
e8831792859f1af945f9036f5ff75292892cdc88
[ "CC-BY-4.0", "MIT" ]
null
null
null
articles/storage/common/storage-account-manage.md
ianychoi/azure-docs.ko-kr
e8831792859f1af945f9036f5ff75292892cdc88
[ "CC-BY-4.0", "MIT" ]
null
null
null
--- title: Azure Portal - Azure Storage에서 스토리지 계정 설정 관리 | Microsoft Docs description: Azure Portal에서 액세스 제어 설정 구성, 계정 액세스 키 재생성, 액세스 계층 변경 또는 계정에서 사용하는 복제 유형 수정을 포함하여 저장소 계정 설정을 관리하는 방법에 대해 알아봅니다. 또한 포털에서 저장소 계정을 삭제하는 방법도 알아봅니다. services: storage author: tamram ms.service: storage ms.topic: article ms.date: 03/05/2019 ms.author: tamram ms.openlocfilehash: fa574558afeec5a7706482a142c0187e6a34bdb3 ms.sourcegitcommit: 3102f886aa962842303c8753fe8fa5324a52834a ms.translationtype: MT ms.contentlocale: ko-KR ms.lasthandoff: 04/23/2019 ms.locfileid: "61484277" --- # <a name="manage-storage-account-settings-in-the-azure-portal"></a>Azure Portal에서 저장소 계정 설정 관리 저장소 계정에 대한 다양한 설정은 [Azure Portal](https://portal.azure.com)에서 사용할 수 있습니다. 이 문서에서는 이러한 설정 및 해당 설정을 사용하는 방법에 대해 설명합니다. ## <a name="access-control"></a>액세스 제어 Azure Storage Blob storage 및 Queue storage를 통해 역할 기반 액세스 제어 (RBAC)에 대 한 Azure Active Directory를 사용 하 여 인증을 지원합니다. Azure AD로 인증 하는 방법에 대 한 자세한 내용은 참조 하세요. [Authenticate 권한을 Azure blob 및 Azure Active Directory를 사용 하 여 큐](storage-auth-aad.md)합니다. Azure Portal의 **액세스 제어** 설정은 RBAC 역할을 사용자, 그룹, 서비스 주체 및 관리 ID에 할당하는 간단한 방법을 제공합니다. RBAC 역할을 할당 하는 방법에 대 한 자세한 내용은 참조 하세요. [RBAC 사용 하 여 blob 및 큐 데이터에 대 한 관리 액세스 권한을](storage-auth-aad-rbac.md)합니다. > [!NOTE] > Azure AD 자격 증명을 통한 사용자 또는 애플리케이션 권한 부여는 다른 인증 수단보다 보안 수준이 높고 사용이 간편합니다. 애플리케이션에서 공유 키 인증을 계속 사용할 수 있는 동안 Azure AD를 사용하면 코드에서 계정 액세스 키를 저장하지 않아도 됩니다. SAS(공유 액세스 서명)를 계속 사용하여 저장소 계정의 리소스에 세분화된 액세스 권한을 부여할 수도 있습니다. 하지만 Azure AD에서는 SAS 토큰을 관리하거나 손상된 SAS를 해지하는 방법을 걱정할 필요 없이 유사한 기능을 제공합니다. ## <a name="tags"></a>태그들 Azure Storage는 사용자 지정된 분류를 사용하여 Azure 리소스 구성을 위한 Azure Resource Manager 태그를 지원합니다. 저장소 계정에 태그를 적용하여 논리적 방식으로 구독 내에서 그룹화할 수 있습니다. 저장소 계정에서 태그 이름은 128자로 제한되며 태그 값은 256자로 제한됩니다. 자세한 내용은 [태그를 사용하여 Azure 리소스 구성](../../azure-resource-manager/resource-group-using-tags.md)을 참조하세요. ## <a name="access-keys"></a>액세스 키 저장소 계정을 만들 때 Azure는 두 개의 512비트 저장소 계정 액세스 키를 생성합니다. 이러한 키를 사용하여 공유 키를 통해 저장소 계정에 대한 액세스 권한을 부여할 수 있습니다. 애플리케이션을 중단하지 않고 키를 회전 및 다시 생성할 수 있으며 정기적으로 그렇게 하는 것이 좋습니다. [!INCLUDE [storage-account-key-note-include](../../../includes/storage-account-key-note-include.md)] ### <a name="view-and-copy-access-keys"></a>액세스 키 보기 및 복사 저장소 계정 자격 증명을 보려면: 1. [Azure Portal](https://portal.azure.com)로 이동합니다. 2. 저장소 계정을 찾습니다. 3. 저장소 계정 개요의 **설정** 섹션에서 **액세스 키**를 선택합니다. 계정 액세스 키는 물론 각 키의 전체 연결 문자열이 나타납니다. 4. **key1** 아래에서 **키** 값을 찾고, **복사** 단추를 클릭하여 계정 키를 복사합니다. 5. 또는 전체 연결 문자열을 복사할 수 있습니다. **key1** 아래에서 **연결 문자열** 값을 찾고, **복사** 단추를 클릭하여 연결 문자열을 복사합니다. ![Azure portal에서 액세스 키를 확인 하는 방법을 보여 주는 스크린샷](media/storage-manage-account/portal-connection-string.png) ### <a name="regenerate-access-keys"></a>액세스 키 다시 생성 저장소 계정을 안전하게 유지하려면 액세스 키를 정기적으로 다시 생성하는 것이 좋습니다. 키를 회전할 수 있도록 두 개의 액세스 키가 할당됩니다. 키를 회전할 경우, 애플리케이션이 프로세스 전체에 대해 Azure Storage에 대한 액세스를 유지하는지 확인해야 합니다. > [!WARNING] > 액세스 키를 다시 생성하면 저장소 계정 키에 종속된 모든 애플리케이션과 Azure 서비스에 영향을 미칠 수 있습니다. 계정 키를 사용하여 스토리지 계정에 액세스하는 모든 클라이언트는 미디어 서비스, 클라우드, 데스크톱 및 모바일 응용 프로그램, Azure Storage용 그래픽 사용자 인터페이스 응용 프로그램(예: [Azure Storage Explorer](https://azure.microsoft.com/features/storage-explorer/))을 포함하여 새로운 키를 사용하도록 업데이트되어야 합니다. 저장소 계정 키를 회전하려면 다음 프로세스를 따릅니다. 1. 보조 키를 사용 하도록 응용 프로그램 코드에서 연결 문자열을 업데이트합니다. 2. 저장소 계정의 기본 액세스 키를 다시 생성합니다. Azure Portal의 **액세스 키** 블레이드에서 **Key1 다시 생성**을 클릭하고 **예**를 클릭하여 새 키를 생성하려는 것을 확인합니다. 3. 새 기본 액세스 키를 참조하도록 코드의 연결 문자열을 업데이트합니다. 4. 같은 방식으로 보조 액세스 키를 다시 생성합니다. ## <a name="account-configuration"></a>계정 구성 저장소 계정을 만든 후 해당 구성을 수정할 수 있습니다. 예를 들어, 데이터를 복제하는 방식을 변경하거나 계정의 액세스 계층을 핫(Hot)에서 쿨(Cool)로 변경할 수 있습니다. [Azure Portal](https://portal.azure.com)에서 저장소 계정으로 이동하고 **설정**에서 **구성**을 클릭하여 계정 구성을 확인하거나 변경합니다. 저장소 계정 구성 변경으로 추가 비용이 발생할 수 있습니다. 자세한 내용은 [Azure Storage 가격 책정](https://azure.microsoft.com/pricing/details/storage/) 페이지를 참조하세요. ## <a name="delete-a-storage-account"></a>저장소 계정 삭제 더 이상 사용하지 않는 저장소 계정을 제거하려면 [Azure 포털](https://portal.azure.com)의 저장소 계정으로 이동하여 **삭제**를 클릭합니다. 저장소 계정 삭제는 계정의 모든 데이터를 포함한 전체 계정을 삭제합니다. > [!WARNING] > 삭제된 저장소 계정을 복원할 수 없거나 삭제 전에 포함된 콘텐츠를 검색할 수 없습니다. 계정을 삭제하기 전에 저장할 내용을 백업했는지 확인합니다. 또한 해당 계정의 리소스에 대해 true를 유지합니다. Blob, 테이블, 큐 또는 파일을 삭제하면 영구적으로 삭제됩니다. > Azure 가상 머신과 연결된 저장소 계정을 삭제하려고 하는 경우 아직 사용 중인 저장소 계정에 대한 오류가 발생할 수 있습니다. 이 오류의 문제를 해결하는 도움말은 [저장소 계정을 삭제할 때 오류 문제 해결](../common/storage-resource-manager-cannot-delete-storage-account-container-vhd.md)을 참조하세요. ## <a name="next-steps"></a>다음 단계 - [Azure Storage 계정 개요](storage-account-overview.md) - [저장소 계정을 만드는](storage-quickstart-create-account.md)
50.853933
293
0.717852
kor_Hang
1.00001
d5e24230c272e27577bccc8894d274467a8d0c19
781
md
Markdown
README.md
lksengineer/premios-platzi
9a6156846aaf56d60caead2715540fddbb8a52c9
[ "OML" ]
2
2022-03-05T00:17:18.000Z
2022-03-16T15:55:23.000Z
README.md
lksengineer/premios-platzi
9a6156846aaf56d60caead2715540fddbb8a52c9
[ "OML" ]
null
null
null
README.md
lksengineer/premios-platzi
9a6156846aaf56d60caead2715540fddbb8a52c9
[ "OML" ]
null
null
null
# Platzi adwards web app Platzi awards is an web app in which users can vote for favorite courses, teachers and school within the web platform ## Installation Can **_clone_** the repository with **SSH** `$ git clone [email protected]:lksengineer/premios-platzi.git` Or **_clone_** the repository with **HTTPS** `$ git clone https://github.com/lksengineer/premios-platzi.git` Or **_donwload_** in **.zip** format. `https://github.com/lksengineer/premios-platzi/archive/refs/heads/master.zip` ## How to use Select one of the answer options for each question. Click vote. And you will have already voted for your favorite school, teacher and course in the Platzi Awards ## How to contribute You can **_create_** a **pull request** to the project ## Licencia Open Sourcee
24.40625
161
0.743918
eng_Latn
0.975495
d5e3244e0d649306a82c58a06f93718ba93f6bfe
15,151
md
Markdown
articles/traffic-manager/traffic-manager-endpoint-types.md
OpenLocalizationTestOrg/azure-docs-pr16_de-DE
bf18172a4f9060051b3861ff8930d9f0303f7f10
[ "CC-BY-3.0", "CC-BY-4.0", "MIT" ]
null
null
null
articles/traffic-manager/traffic-manager-endpoint-types.md
OpenLocalizationTestOrg/azure-docs-pr16_de-DE
bf18172a4f9060051b3861ff8930d9f0303f7f10
[ "CC-BY-3.0", "CC-BY-4.0", "MIT" ]
null
null
null
articles/traffic-manager/traffic-manager-endpoint-types.md
OpenLocalizationTestOrg/azure-docs-pr16_de-DE
bf18172a4f9060051b3861ff8930d9f0303f7f10
[ "CC-BY-3.0", "CC-BY-4.0", "MIT" ]
null
null
null
<properties pageTitle="Typen von Datenverkehr Manager Endpunkt | Microsoft Azure" description="Dieser Artikel erläutert die verschiedene Arten von Endpunkten, die mit Azure Datenverkehr Manager verwendet werden können" services="traffic-manager" documentationCenter="" authors="sdwheeler" manager="carmonm" editor="" /> <tags ms.service="traffic-manager" ms.devlang="na" ms.topic="article" ms.tgt_pltfrm="na" ms.workload="infrastructure-services" ms.date="10/11/2016" ms.author="sewhee" /> # <a name="traffic-manager-endpoints"></a>Datenverkehr Manager Endpunkte Microsoft Azure Datenverkehr-Manager können Sie steuern, wie Netzwerkdatenverkehr an Anwendung Bereitstellungen in verschiedenen Rechenzentren ausgeführt verteilt ist. Sie konfigurieren jede Anwendung Bereitstellung als 'Endpunkt' in den Datenverkehr Manager. Wenn Datenverkehr Manager eine DNS-eingeht, wählt es einen Endpunkt in der DNS-Antwort zurückgegeben. Datenverkehr Manager basiert die Auswahl auf den aktuellen Status der Endpunkt und den Datenverkehr-routing Methode. Weitere Informationen finden Sie unter [Funktionsweise von Datenverkehr-Manager](traffic-manager-how-traffic-manager-works.md). Es gibt drei Arten von Endpunkt von Datenverkehr Manager unterstützt: - **Azure Endpunkte** werden für in Azure gehostete Dienste verwendet. - **Externe Endpunkte** werden für außerhalb Azure, entweder lokal oder mit einem anderen Hostinganbieter gehostet Dienste verwendet. - **Endpunkte geschachtelt** werden verwendet, um die Datenverkehr Manager Profile zum Erstellen von flexibler Datenverkehr-routing Phishingversuchen zur Unterstützung von der Anforderungen größere und komplexere Bereitstellungen kombinieren. Es ist keine Einschränkung wie die Endpunkte des verschiedene Typen in einem einzigen Datenverkehr Manager Profil kombiniert werden. Jedes Profil kann beliebige Kombination von Endpunkttypen enthalten. Den folgenden Abschnitten wird jeder Endpunkttyp ausführlicher beschrieben. ## <a name="azure-endpoints"></a>Azure Endpunkte Azure Endpunkte werden zur Azure-basierte Dienste in den Datenverkehr Manager verwendet. Die folgenden Azure Ressourcentypen werden unterstützt: - 'Klassisch' IaaS virtuellen Computern und PaaS cloud Services. - Web Apps - Öffentl.IP Ressourcen (die mit virtuellen Computern verbunden werden direkt oder über ein Lastenausgleich Azure). Die Öffentl.IP müssen einen DNS-Namen zugewiesen, in einem Manager Datenverkehr Profil verwendet werden soll. Öffentl.IP Ressourcen sind Azure Ressourcenmanager Ressourcen. Sie sind nicht in der klassischen Bereitstellungsmodell vorhanden. Daher sind nur in unterstützten Datenverkehr Vorgesetzten Azure Ressourcenmanager Erfahrung. Andere Endpunkttypen werden per Ressourcenmanager, und das Bereitstellungsmodell klassischen unterstützt. Bei der Verwendung von Azure Endpunkte erkennt Datenverkehr Manager, wenn eine 'Klassisch' IaaS VM, Cloud-Dienst oder eine Web App angehalten und gestartet wird. Dieser Status wird in den Endpunkt Status angezeigt. Details finden Sie unter [den Datenverkehr Manager Endpunkt überwachen](traffic-manager-monitoring.md#endpoint-and-profile-status) . Der zugrunde liegenden angehalten ist, führt den Datenverkehr Manager keine integritätsprüfungen Endpunkt oder direkte Datenverkehr an den Endpunkt aus. Kein Datenverkehr-Manager der angehaltenen Instanz Abrechnung Ereignisse auftreten. Wenn der Dienst neu gestartet wird, ist Abrechnung Lebensläufe und den Endpunkt zum Empfangen von Datenverkehr berechtigt. Diese Erkennung gilt nicht für Öffentl.IP Endpunkte. ## <a name="external-endpoints"></a>Externe Endpunkte Externe Endpunkte sind für Dienste außerhalb Azure verwendet. Beispielsweise ein Dienst lokal gehostet oder mit einem anderen Anbieter. Externe Endpunkte können einzeln verwendet oder mit Azure Endpunkten in demselben Datenverkehr Manager Profil kombiniert werden. Kombinieren von Azure Endpunkte mit externen Endpunkten ermöglicht verschiedenen Szenarios: - Verwenden Sie entweder eine aktive oder Aktiv / Passiv Failover-Modell Azure höhere Redundanz für eine vorhandene Anwendung lokal bereitgestellt. - Erweitern Sie zum Verringern der Anwendung Wartezeit für Benutzer auf der ganzen Welt eine vorhandene lokale Anwendung zu zusätzlichen geografischen Standorten in Azure ein. Weitere Informationen finden Sie unter [Datenverkehr Manager "Leistung" Daten-routing](traffic-manager-routing-methods.md#performance-traffic-routing-method). - Verwenden von Azure Bereitstellung von zusätzlicher Kapazität für eine vorhandene lokale Anwendung, fortlaufend oder als 'Burst Cloud' Lösung für eine Sammlung Nachfrage entsprechen. In bestimmten Fällen, es ist sinnvoll, externe Endpunkte verwenden, um Azure Dienste verweisen (Beispiele finden Sie in den [häufig gestellte Fragen](#faq)). In diesem Fall sind integritätsprüfungen bei der Azure Endpunkte Tarifs nicht externe Endpunkte in Rechnung gestellt. Jedoch im Gegensatz zu Azure Endpunkte, wenn Sie beenden oder löschen den zugrunde liegenden Dienst Gesundheit überprüfen Abrechnung verwendet, bis Sie deaktivieren oder löschen Sie den Endpunkt im Datenverkehr-Manager. ## <a name="nested-endpoints"></a>Geschachtelte Endpunkte Geschachtelte Endpunkte Kombinieren mehrerer Datenverkehr Manager Profile um flexible Datenverkehr-routing Phishingversuchen erstellen und die Anforderungen größeren, komplexen Bereitstellungen unterstützen. Mit Endpunkten geschachtelt wird ein Profil 'Kind' als Endpunkt eines Profils 'Parent' hinzugefügt. Das untergeordnete und das übergeordnete Profile können andere Endpunkte eines beliebigen Typs, einschließlich andere geschachtelte Profile enthalten. Weitere Informationen finden Sie unter [geschachtelte Datenverkehr-Manager-Profilen](traffic-manager-nested-profiles.md). ## <a name="web-apps-as-endpoints"></a>Web Apps als Endpunkte Einige weitere Aspekte sollten bei Web Apps als Endpunkte in den Datenverkehr Manager konfigurieren: 1. Nur Web Apps auf "Standard" SKU oder höher, die für die Verwendung mit den Datenverkehr Manager berechtigt sind. Hinzufügen einer Web-App von einer niedrigere SKU Versuche fehl. Herunterstufen von der SKUs einer vorhandenen Web App führt in den Datenverkehr Manager Datenverkehr in die Web App nicht mehr zu senden. 2. Wenn Sie ein Endpunkt eine HTTP-Anforderung empfängt, wird 'Host' Header in der Besprechungsanfrage um zu bestimmen, welche Web App die Anfrage service sollte. Der Host-Header enthält den DNS-Namen verwendet, um die Anfrage, beispielsweise 'contosoapp.azurewebsites.net' einleiten. Wenn Sie einen anderen Namen für die DNS-Web-App verwenden zu können, muss der DNS-Name als einen benutzerdefinierten Domänennamen für die App registriert sein. Wenn Sie einen Endpunkt Web App als Azure Endpunkt hinzufügen, wird der DNS-Manager Datenverkehr Profilname automatisch für die App registriert. Diese Registrierung wird automatisch entfernt, wenn Sie der Endpunkt gelöscht wird. 3. Jedes Profil Datenverkehr Manager kann jeder Region Azure höchstens eine Web App-Endpunkt aufweisen. Wenn Sie für diese Einschränkung umgehen können Sie eine Web App als externe Endpunkt konfigurieren. Weitere Informationen finden Sie unter den [häufig gestellte Fragen](#faq). ## <a name="enabling-and-disabling-endpoints"></a>Aktivieren und Deaktivieren von Endpunkten Deaktivieren von außen liegenden Tabellenblättern in den Datenverkehr Manager kann nützlich sein, den Datenverkehr vorübergehend von außen liegenden Tabellenblättern zu entfernen, die Wartungsmodus oder, die erneut bereitgestellt wird. Nachdem Sie der Endpunkt erneut ausgeführt wird, kann es wieder aktiviert werden. Endpunkte können aktiviert und deaktiviert, über den Datenverkehr Manager-Portal PowerShell, CLI oder REST-API, die sowohl Ressourcenmanager und das Bereitstellungsmodell klassischen unterstützt werden. >[AZURE.NOTE] Deaktivieren einen Endpunkt Azure hat nichts mit Bereitstellungszustand in Azure. Ein Azure Service (z. B. bleibt eines virtuellen Computers oder Web App ausgeführt wird und zum Empfang von Datenverkehr, auch wenn in den Datenverkehr Manager deaktiviert. Datenverkehr kann direkt an die Instanz des Diensts und nicht über die DNS-Manager Datenverkehr Profilname berücksichtigt werden. Weitere Informationen finden Sie unter [Funktionsweise der Datenverkehr-Manager](traffic-manager-how-traffic-manager-works.md). Die aktuelle Berechtigung jedes Endpunkts Datenverkehr empfangen hängt die folgenden Faktoren aus: - Das Profil Status (aktiviert/deaktiviert) - Der Endpunkt Status (aktiviert/deaktiviert) - Die Ergebnisse der Gesundheit für diesen Endpunkt überprüft Details finden Sie unter [den Datenverkehr Manager Endpunkt überwachen](traffic-manager-monitoring.md#endpoint-and-profile-status). >[AZURE.NOTE] Da Ebene der DNS-Manager Datenverkehr funktioniert, kann es nicht vorhandene Verbindungen an einem beliebigen Endpunkt beeinflussen. Wenn Sie ein Endpunkt nicht verfügbar ist, weist Datenverkehr Manager neue Verbindungen mit einem anderen Endpunkt aus. Der Host hinter den Endpunkt deaktiviert oder fehlerhaft kann jedoch weiterhin Verkehr über vorhandene Verbindungen erhalten, bis Sie diese Sitzungen beendet werden. Applikationen sollte die Sitzungsdauer, um den Datenverkehr in abzuleiten aus vorhandene Verbindungen zulassen beschränken. Wenn alle Endpunkte in einem Profil deaktiviert sind, oder wenn das Profil selbst deaktiviert ist, klicken Sie dann den Datenverkehr Manager eine 'NXDOMAIN' Antwort an eine neue DNS-Abfrage sendet. ## <a name="faq"></a>Häufig gestellte Fragen ### <a name="can-i-use-traffic-manager-with-endpoints-from-multiple-subscriptions"></a>Kann ich den Datenverkehr Manager mit Endpunkten aus mehrere Abonnements verwenden? Es ist nicht möglich, mit Azure Web Apps, Endpunkte aus mehrere Abonnements verwenden. Azure Web Apps erfordert, dass alle benutzerdefinierten Domänennamen mit Web Apps verwendet nur innerhalb eines einzelnen Abonnements verwendet wird. Es ist nicht möglich, Web Apps aus mehreren Abonnements mit dem gleichen Domänennamen zu verwenden. Für andere Endpunkttypen ist es möglich, den Datenverkehr Manager mit Endpunkten aus mehr als einem Abonnement verwenden. Wie Sie den Datenverkehr Manager konfigurieren, hängt davon ab, ob Sie das Bereitstellungsmodell klassischen oder die Ressourcenmanager Oberfläche verwenden. - In der Ressourcenmanager Endpunkte aus einem beliebigen Abonnement können als nach den Datenverkehr Manager hinzugefügt werden, solange die Person, die Konfiguration des Profils Datenverkehr Manager Lesezugriff auf den Endpunkt verfügt. Diese Berechtigungen können mit [Azure Ressourcenmanager rollenbasierte Access-Steuerelements (RBAC)](../active-directory/role-based-access-control-configure.md)erteilt werden. - In der klassischen Bereitstellung Modell-Schnittstelle erfordert Datenverkehr Manager an, dass Cloud Services oder Web Apps konfiguriert als Azure Endpunkte im selben Abonnement als den Datenverkehr-Manager-Profil befinden. Cloud-Dienstendpunkte in anderen Abonnements können mit den Datenverkehr Manager als 'externe' Endpunkte hinzugefügt werden. Diese externen Endpunkte als Azure Endpunkte, anstatt die externe Rate in Rechnung gestellt werden. ### <a name="can-i-use-traffic-manager-with-cloud-service-staging-slots"></a>Kann ich den Datenverkehr Manager mit der Cloud-Dienst 'Staging' verwenden? Ja. Cloud-Dienst staging' Steckplätze kann in den Datenverkehr Manager als externe Endpunkte konfiguriert sein. Integritätsprüfungen werden weiterhin Rate Azure Endpunkte belastet. Da der externe Endpunkttyp verwendet wird, werden Änderungen an der zugrunde liegenden Dienst nicht automatisch übernommen. Mit externen Endpunkten kann nicht Datenverkehr Manager erkennen, wenn die Cloud-Dienst beendet oder gelöscht wird. Daher weiterhin den Datenverkehr-Manager für integritätsprüfungen Abrechnung bis der Endpunkt deaktiviert oder gelöscht wird. ### <a name="does-traffic-manager-support-ipv6-endpoints"></a>Unterstützt den Datenverkehr Manager IPv6 Endpunkte? Datenverkehr Manager bietet aktuell keine IPv6 addressible Namenserver. Datenverkehr Manager kann jedoch weiterhin von IPv6-Clients Herstellen einer Verbindung mit IPv6 Endpunkte verwendet werden. Ein Client werden keine DNS-Anfragen direkt auf den Datenverkehr Manager gestellt. In diesem Fall verwendet der Client einen rekursive DNS-Dienst an. Ein reine IPv6-Client sendet Anfragen an die rekursive DNS-Dienst mit IPv6. Klicken Sie dann sollte der Dienst rekursive wenden Sie sich an den Datenverkehr Manager Namenserver IPv4 verwenden können. Datenverkehr Manager reagiert mit der DNS-Name des Endpunkts an. Um einen Endpunkt IPv6 unterstützen, muss der Endpunkt DNS-Name auf die IPv6-Adresse zeigen DNS AAAA Datensatz vorhanden. Integritätsprüfungen Datenverkehr Manager unterstützt nur IPv4-Adressen. Der Dienst muss einen Endpunkt IPv4 auf dem gleichen DNS-Namen verfügbar zu machen. ### <a name="can-i-use-traffic-manager-with-more-than-one-web-app-in-the-same-region"></a>Kann ich den Datenverkehr Manager mit mehr als einem Web-App in der gleichen Region verwenden? Normalerweise ist Datenverkehr Manager verwendet, um den Datenverkehr in die Anwendung bereitgestellt, die in unterschiedlichen Regionen direkte. Allerdings können sie auch verwendet werden, wo eine Anwendung mehrere Bereitstellung in derselben Region hat. Die Endpunkte Datenverkehr Manager Azure lässt nicht mehr als eine Web App-Endpunkt aus derselben Azure Region das gleiche Datenverkehr Manager Profil hinzugefügt werden. Die folgenden Schritte bieten für diese Einschränkung umgehen: 1. Überprüfen Sie, dass Ihre Endpunkte in anderen Web app'skalieren Einheiten' sind. Ein Domänenname muss einer einzelnen Website in einem angegebenen Mengen Einheit zuordnen. Daher freigeben nicht zwei Web Apps in derselben Skala Einheit Datenverkehr Manager Profil. 2. Fügen Sie Ihres Domänennamens Eitelkeit als eine benutzerdefinierte Hostname bei jeder Web App an hinzu. Jede Web-App muss sich in einer anderen Maßstab Einheit. Alle Web Apps müssen den gleichen Abonnement gehören. 3. Hinzufügen einer (und nur eine) Web App-Endpunkt zu Ihrem Profil Datenverkehr Manager als Azure Endpunkt. 4. Hinzufügen von jede zusätzliche Web App-Endpunkt zu Ihrem Profil Datenverkehr Manager als externe Endpunkt. Externe Endpunkte können nur in das Modell zur Bereitstellung von Ressourcenmanager hinzugefügt werden. 5. Erstellen Sie einen DNS-CNAME-Eintrag in Ihrer Eitelkeit-Domäne, die auf Ihre Datenverkehr Manager DNS-Profilname verweist (<>.... trafficmanager.net). 6. Zugriff auf Ihre Website über den Eitelkeit Domänennamen nicht den Datenverkehr Manager DNS-Profilnamen ein. ## <a name="next-steps"></a>Nächste Schritte - Erfahren Sie, [den Datenverkehr Manager wie funktioniert](traffic-manager-how-traffic-manager-works.md). - Informationen Sie zu den Datenverkehr Manager [Endpunkt Überwachung und automatisches Failover](traffic-manager-monitoring.md). - Informationen Sie zu den Datenverkehr Manager [Datenverkehr Weiterleitung Methoden](traffic-manager-routing-methods.md).
117.449612
760
0.830506
deu_Latn
0.99896
d5e415b890696ea1b1efc64ee7428bd72c7dec75
6,173
md
Markdown
windows/client-management/mdm/enterprisedesktopappmanagement2-xsd.md
alhopper-msft/windows-itpro-docs
aa750cb58f34fe45770d24f13648ada9a3100f5b
[ "CC-BY-4.0", "MIT" ]
null
null
null
windows/client-management/mdm/enterprisedesktopappmanagement2-xsd.md
alhopper-msft/windows-itpro-docs
aa750cb58f34fe45770d24f13648ada9a3100f5b
[ "CC-BY-4.0", "MIT" ]
null
null
null
windows/client-management/mdm/enterprisedesktopappmanagement2-xsd.md
alhopper-msft/windows-itpro-docs
aa750cb58f34fe45770d24f13648ada9a3100f5b
[ "CC-BY-4.0", "MIT" ]
null
null
null
--- title: EnterpriseDesktopAppManagement XSD description: This topic contains the XSD schema file for the EnterpriseDesktopAppManagement configuration service provider’s DownloadInstall parameter. ms.assetid: 60980257-4F48-4A68-8E8E-1EF0A3F090E2 ms.author: maricia ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower --- # EnterpriseDesktopAppManagement XSD This topic contains the XSD schema file for the EnterpriseDesktopAppManagement configuration service provider’s DownloadInstall parameter. ``` syntax <?xml version="1.0" encoding="utf-8"?> <xs:schema attributeFormDefault="unqualified" elementFormDefault="qualified" xmlns:xs="http://www.w3.org/2001/XMLSchema"> <xs:element name="Data"> <xs:complexType> <xs:sequence> <xs:element name="MsiInstallJob"> <xs:complexType> <xs:sequence> <xs:element name="Product"> <xs:complexType> <xs:sequence> <xs:element name="Download"> <xs:complexType> <xs:sequence> <xs:element name="ContentURLList"> <xs:complexType> <xs:sequence> <xs:element maxOccurs="unbounded" name="ContentURL" type="xs:string" /> </xs:sequence> </xs:complexType> </xs:element> </xs:sequence> </xs:complexType> </xs:element> <xs:element name="Validation"> <xs:complexType> <xs:sequence> <xs:element name="FileHash" type="xs:string" /> </xs:sequence> </xs:complexType> </xs:element> <xs:element name="Enforcement"> <xs:complexType> <xs:sequence> <xs:element name="CommandLine" type="xs:string" /> <xs:element name="TimeOut" type="xs:unsignedByte" /> <xs:element name="RetryCount" type="xs:unsignedByte" /> <xs:element name="RetryInterval" type="xs:unsignedByte" /> </xs:sequence> </xs:complexType> </xs:element> </xs:sequence> <xs:attribute name="Version" type="xs:string" use="required" /> </xs:complexType> </xs:element> </xs:sequence> <xs:attribute name="id" type="xs:string" use="required" /> </xs:complexType> </xs:element> </xs:sequence> </xs:complexType> </xs:element> </xs:schema> ``` The following table describes the various elements and attributes of the XSD file:   | Name | Description | |----------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | MsiInstallJob | Root element | | id | The application identifier for the application being installed. | | Product | Child element of MsiInstallJob | | Version | String representation of the application version | | Download | Child element of Product. Container for download configuration information. | | ContentURLList | Child element of Download. Contains list of one or more content download URL locators in the form of ContentURL elements. | | ContentURL | Location that content should be downloaded from. Must be a property formatted URL that points to the MSI file. | | Validation | Contains information used to validate content authenticity. | | FileHash | SHA256 hash value of file content. | | Enforcement | Installation properties to be used when installing this MSI | | CommandLine | Command-line options to be used when calling MSIEXEC.exe | | Timeout | Amount of time in minutes that the installation process can run before the installer considers the installation may have failed and no longer monitors the installation operation. | | RetryCount | Number of times the download and installation operation will be retried before the installation will be marked as failed. | | RetryInterval | Amount of time in minutes between retry operations. |      
58.790476
199
0.409687
eng_Latn
0.822848
d5e45904d6467bb49b4d6f9c6ad9f22f59d0eb9a
8,359
md
Markdown
docs/vs-2015/data-tools/data-user-interface-elements.md
Ash-Shaun/visualstudio-docs
787c3856e6cbfc65d97612854fc093785dc5573a
[ "CC-BY-4.0", "MIT" ]
1
2019-04-06T02:01:40.000Z
2019-04-06T02:01:40.000Z
docs/vs-2015/data-tools/data-user-interface-elements.md
Ash-Shaun/visualstudio-docs
787c3856e6cbfc65d97612854fc093785dc5573a
[ "CC-BY-4.0", "MIT" ]
1
2018-10-08T17:51:50.000Z
2018-10-08T17:51:50.000Z
docs/vs-2015/data-tools/data-user-interface-elements.md
Ash-Shaun/visualstudio-docs
787c3856e6cbfc65d97612854fc093785dc5573a
[ "CC-BY-4.0", "MIT" ]
null
null
null
--- title: "Data User Interface Elements | Microsoft Docs" ms.custom: "" ms.date: "2018-06-30" ms.prod: "visual-studio-dev14" ms.reviewer: "" ms.suite: "" ms.tgt_pltfrm: "" ms.topic: "article" f1_keywords: - "vs.data.tablemappings" - "vs.datasource.choosebindingsourcedialog" - "vs.datasource.choosedatasourceinstancedlg" - "vs.data.editrelation" - "DSD_EditMultiKey" - "vs.datasource.RealtionBuilder" - "vs.xmldesigner.editkey" - "vs.xmldesigner.choosekey" - "vs.data.generatedataset" - "vs.data.configurationerror" - "vs.data.DSD_MissingConnections_Message" - "vs.datasource.choosedesigndatasourcedlg" - "vs.data.datapreview" - "vs.data.editforeignkeyconstraint" - "vs.datasource.choosedataconectordialog" - "vs.data.dataadapterpreview" - "vs.data.configurationwizard" - "vs.data.datapreviewdialog" - "DSD_EditMultiKeyHelpID" - "vs.data.advancedoptions" - "vs.data.previewscript" - "vs.data.datasourcelogin" - "vs.syncdesigner.syncnowconflictiondialog" dev_langs: - "VB" - "CSharp" - "C++" - "aspx" helpviewer_keywords: - "dialog boxes, data" - "data [Visual Studio], dialog boxes" ms.assetid: 90943baf-5bd1-4eef-927f-f82485979fde caps.latest.revision: 18 author: gewarren ms.author: gewarren manager: "ghogen" robots: noindex,nofollow --- # Data User Interface Elements [!INCLUDE[vs2017banner](../includes/vs2017banner.md)] This section contains information about all the dialog boxes and wizards that you use when designing data access in your [!INCLUDE[vbprvb](../includes/vbprvb-md.md)] or Visual C# applications. [!INCLUDE[note_settings_general](../includes/note-settings-general-md.md)] ## In This Section [Data Smart Tags](http://msdn.microsoft.com/en-us/1e0a848f-c57b-47ab-b884-eaaa40726f43) Provides information on some smart tag commands that are available for data. [Add Dataset Dialog Box](http://msdn.microsoft.com/en-us/0e03c0ff-212b-4bfa-ac51-3c2adb71ead0) Puts an existing typed dataset or a new untyped dataset (an instance of the **System.Data.Dataset** class) onto a form or component. [Advanced SQL Generation Options Dialog Box](http://msdn.microsoft.com/en-us/41420450-1ff4-4a1a-b85b-6f6901538fef) Allows you to control how SQL statements or stored procedures are created for a data adapter by specifying options for updates, optimistic concurrency, and refreshing the dataset. [Choose a Data Source Instance Dialog Box](http://msdn.microsoft.com/en-us/51c47f06-fdc5-453e-9178-0a5a2c5c9f34) Allows you to select the desired dataset from a list of datasets in your project. [Choose a Data Source to Merge with Dialog Box](http://msdn.microsoft.com/en-us/accafff7-f6bd-481c-a121-fe8a76cd681d) Allows you to select which data source to merge with when multiple data sources are available. [Choose Key Dialog Box](http://msdn.microsoft.com/en-us/4ddbfbb7-a80a-412a-b80d-291d86376ca3) Allows you select a key when a column participates in a multi-key constraint. [Collection Editors](http://msdn.microsoft.com/library/030095bd-fb9a-4b21-b628-fc1cc5985bb7) Provides links to topics about different collection editors that allow you to create and edit individual members of a collection. [Connections Missing](http://msdn.microsoft.com/en-us/bb9b2e12-7f76-4ee5-acbb-5d20116ee044) Informs you when a dataset contains a reference to a connection string that is not in application settings. [Data Adapter Configuration Error Dialog Box](http://msdn.microsoft.com/en-us/9ce65cd2-0c7d-4f51-8685-d68be5f3009b) Displays one or more errors that occurred while Visual Studio was attempting to create an instance of a data adapter and set its properties. [Data Adapter Configuration Wizard](http://msdn.microsoft.com/en-us/efff90cb-0e4c-4eb3-87dc-65dd9d418809) Configures SQL commands or stored procedures that a data adapter uses to read data into a dataset from a database and write it back again. The topic describes how to run the wizard and what to do after the wizard has completed. [Data Adapter Preview Dialog Box](http://msdn.microsoft.com/en-us/1f614cd3-4530-457e-84af-00ccbaea08cc) Allows you to see how data will be filled into a dataset by a data adapter, which is useful for testing that the adapter is returning the data you expect, that table mappings work properly, and the effect of different parameter values. [Data Source Login Dialog Box](http://msdn.microsoft.com/en-us/6f2d9a57-53c3-4841-bd37-a3643eb68d2e) Allows you to request access to a data source (typically a database) for which you have not already been authenticated. [DataSet Tab, Toolbox](http://msdn.microsoft.com/en-us/fa5f2d6f-924d-4262-ba1b-e9e7f90e7764) Displays the objects you can add to a typed dataset. [Do you want to include the password in the connection string Dialog Box](http://msdn.microsoft.com/en-us/193696a7-5213-4396-8328-05ac2df6ee94) Allows you to control whether a password is embedded into the connection string. [Edit Key Dialog Box](http://msdn.microsoft.com/en-us/f5c80e39-3a42-4284-b222-6ca009fd9675) Allows you to define and edit keys. [Foreign Key Constraint Dialog Box](http://msdn.microsoft.com/en-us/45d15629-1f4d-40a7-8708-c9ddfebedc1e) Allows you to place a foreign key constraint on one or more columns in a dataset table that is related to another table. [Generate Dataset Dialog Box](http://msdn.microsoft.com/en-us/c0efdbaf-13b1-4ee8-ade6-f8a784126cdc) Allows you to generate a new typed dataset from information provided by one or more data adapters and to add tables to an existing dataset. [Multiple BindingSources Dialog Box](http://msdn.microsoft.com/en-us/db76f70c-4fb5-479d-9b64-a67158d48f97) Allows you to select which <xref:System.Windows.Forms.BindingSource> to use when more than one <xref:System.Windows.Forms.BindingSource> is available. [Preview Data Dialog Box](http://msdn.microsoft.com/en-us/aa4f0d04-2695-4bb8-946d-54a97ae7287f) Allows you to review the data returned by queries in your project. [Preview SQL Script Dialog Box](http://msdn.microsoft.com/en-us/e9571e8b-821c-492d-9bc8-b44eba898bdd) Appears as part of the [Data Adapter Configuration Wizard](http://msdn.microsoft.com/en-us/efff90cb-0e4c-4eb3-87dc-65dd9d418809) to allow you to see the SQL script the wizard will use to create stored procedures to read and write data. [Relation Dialog Box](http://msdn.microsoft.com/en-us/ab8f4b0e-af4c-4725-a550-e2b2ebe43a02) Allows you to create a relationship (a **DataRelation** object) that maintains information about parent-child records in two data tables in a dataset. [Search Criteria Builder Dialog Box](http://msdn.microsoft.com/library/0b306b92-f35e-45ef-a4be-3f653cd00c3d) Allows you to create a parameterized query on a data-bound Windows Form, and automatically add the controls required to run the query. [Table Mappings Dialog Box](http://msdn.microsoft.com/en-us/fb4cec1e-f3c8-4773-b409-c2de15293fea) Allows you to specify which columns in a database table or other data source are equivalent to columns in a dataset table. [Unique Constraint Dialog Box](http://msdn.microsoft.com/en-us/e71a60d7-fae2-4bd0-a1e8-43aae351707d) Allows you to place a unique constraint on one or more columns in a table in an untyped dataset. ## Related Sections [Accessing Data](../data-tools/accessing-data-in-visual-studio.md) Provides links to topics that describe how to access data in your Visual Basic and Visual C# applications. ## See Also [Overview of Data Applications in Visual Studio](../data-tools/overview-of-data-applications-in-visual-studio.md) [Connecting to Data in Visual Studio](../data-tools/connecting-to-data-in-visual-studio.md) [Preparing Your Application to Receive Data](http://msdn.microsoft.com/library/c17bdb7e-c234-4f2f-9582-5e55c27356ad) [Fetching Data into Your Application](../data-tools/fetching-data-into-your-application.md) [Bind controls to data in Visual Studio](../data-tools/bind-controls-to-data-in-visual-studio.md) [Editing Data in Your Application](../data-tools/editing-data-in-your-application.md) [Validating Data](http://msdn.microsoft.com/library/b3a9ee4e-5d4d-4411-9c56-c811f2b4ee7e) [Saving Data](../data-tools/saving-data.md)
59.283688
238
0.76301
eng_Latn
0.796925
d5e56127eaff04dc3dacafc0998941b72889d54c
121
md
Markdown
README.md
Bingxuebao/MyWeather
8c1cf7461a0c019b36dfd94beb82fed331fd7429
[ "MIT" ]
null
null
null
README.md
Bingxuebao/MyWeather
8c1cf7461a0c019b36dfd94beb82fed331fd7429
[ "MIT" ]
null
null
null
README.md
Bingxuebao/MyWeather
8c1cf7461a0c019b36dfd94beb82fed331fd7429
[ "MIT" ]
null
null
null
# MyWeather 个人天气应用: 利用开放API获取网络数据,本地解析加载呈现再应用界面上。 使用的知识:android基本组建及UI的使用,http协议,json数据解析,Asynctask异步加载,listview的优化
20.166667
67
0.842975
yue_Hant
0.23527
d5e566d6238ef891d189522df6803d0d177125ab
104,652
md
Markdown
assets/lagda/Cubical.Foundations.Equiv.md
anqurvanillapy/ice1000.github.io
3ce31eb9c483e36e8a1b087c85cbd9eeb55cfac9
[ "MIT" ]
null
null
null
assets/lagda/Cubical.Foundations.Equiv.md
anqurvanillapy/ice1000.github.io
3ce31eb9c483e36e8a1b087c85cbd9eeb55cfac9
[ "MIT" ]
null
null
null
assets/lagda/Cubical.Foundations.Equiv.md
anqurvanillapy/ice1000.github.io
3ce31eb9c483e36e8a1b087c85cbd9eeb55cfac9
[ "MIT" ]
null
null
null
--- layout: page permalink: /lagda/Cubical.Foundations.Equiv.html inline_latex: true agda: true --- <body> {% raw %} <pre class="Agda"> <a id="1" class="Comment">{- Theory about equivalences Definitions are in Core/Glue.agda but re-exported by this module - isEquiv is a proposition ([isPropIsEquiv]) - Any isomorphism is an equivalence ([isoToEquiv]) There are more statements about equivalences in Equiv/Properties.agda: - if f is an equivalence then (cong f) is an equivalence - if f is an equivalence then precomposition with f is an equivalence - if f is an equivalence then postcomposition with f is an equivalence -}</a> <a id="469" class="Symbol">{-#</a> <a id="473" class="Keyword">OPTIONS</a> <a id="481" class="Pragma">--cubical</a> <a id="491" class="Pragma">--safe</a> <a id="498" class="Symbol">#-}</a> <a id="502" class="Keyword">module</a> <a id="509" href="Cubical.Foundations.Equiv.html" class="Module">Cubical.Foundations.Equiv</a> <a id="535" class="Keyword">where</a> <a id="542" class="Keyword">open</a> <a id="547" class="Keyword">import</a> <a id="554" href="Cubical.Foundations.Function.html" class="Module">Cubical.Foundations.Function</a> <a id="583" class="Keyword">open</a> <a id="588" class="Keyword">import</a> <a id="595" href="Cubical.Foundations.Prelude.html" class="Module">Cubical.Foundations.Prelude</a> <a id="623" class="Keyword">open</a> <a id="628" class="Keyword">import</a> <a id="635" href="Cubical.Foundations.Isomorphism.html" class="Module">Cubical.Foundations.Isomorphism</a> <a id="667" class="Keyword">open</a> <a id="672" class="Keyword">import</a> <a id="679" href="Cubical.Foundations.GroupoidLaws.html" class="Module">Cubical.Foundations.GroupoidLaws</a> <a id="713" class="Keyword">open</a> <a id="718" class="Keyword">import</a> <a id="725" href="Cubical.Core.Glue.html" class="Module">Cubical.Core.Glue</a> <a id="743" class="Keyword">public</a> <a id="752" class="Keyword">using</a> <a id="758" class="Symbol">(</a> <a id="760" href="Agda.Builtin.Cubical.Glue.html#868" class="Record">isEquiv</a> <a id="768" class="Symbol">;</a> <a id="770" href="Agda.Builtin.Cubical.Glue.html#971" class="Field">equiv-proof</a> <a id="782" class="Symbol">;</a> <a id="784" href="Agda.Builtin.Cubical.Glue.html#1051" class="Function Operator">_≃_</a> <a id="788" class="Symbol">;</a> <a id="790" href="Agda.Builtin.Cubical.Glue.html#1143" class="Function">equivFun</a> <a id="799" class="Symbol">;</a> <a id="801" href="Agda.Builtin.Cubical.Glue.html#1455" class="Function">equivProof</a> <a id="812" class="Symbol">)</a> <a id="815" class="Keyword">private</a> <a id="825" class="Keyword">variable</a> <a id="838" href="Cubical.Foundations.Equiv.html#838" class="Generalizable">ℓ</a> <a id="840" href="Cubical.Foundations.Equiv.html#840" class="Generalizable">ℓ&#39;</a> <a id="843" href="Cubical.Foundations.Equiv.html#843" class="Generalizable">ℓ&#39;&#39;</a> <a id="848" class="Symbol">:</a> <a id="850" href="Agda.Primitive.html#423" class="Postulate">Level</a> <a id="860" href="Cubical.Foundations.Equiv.html#860" class="Generalizable">A</a> <a id="862" href="Cubical.Foundations.Equiv.html#862" class="Generalizable">B</a> <a id="864" href="Cubical.Foundations.Equiv.html#864" class="Generalizable">C</a> <a id="866" class="Symbol">:</a> <a id="868" href="Cubical.Core.Primitives.html#957" class="Function">Type</a> <a id="873" href="Cubical.Foundations.Equiv.html#838" class="Generalizable">ℓ</a> <a id="fiber"></a><a id="876" href="Cubical.Foundations.Equiv.html#876" class="Function">fiber</a> <a id="882" class="Symbol">:</a> <a id="884" class="Symbol">∀</a> <a id="886" class="Symbol">{</a><a id="887" href="Cubical.Foundations.Equiv.html#887" class="Bound">A</a> <a id="889" class="Symbol">:</a> <a id="891" href="Cubical.Core.Primitives.html#957" class="Function">Type</a> <a id="896" href="Cubical.Foundations.Equiv.html#838" class="Generalizable">ℓ</a><a id="897" class="Symbol">}</a> <a id="899" class="Symbol">{</a><a id="900" href="Cubical.Foundations.Equiv.html#900" class="Bound">B</a> <a id="902" class="Symbol">:</a> <a id="904" href="Cubical.Core.Primitives.html#957" class="Function">Type</a> <a id="909" href="Cubical.Foundations.Equiv.html#840" class="Generalizable">ℓ&#39;</a><a id="911" class="Symbol">}</a> <a id="913" class="Symbol">(</a><a id="914" href="Cubical.Foundations.Equiv.html#914" class="Bound">f</a> <a id="916" class="Symbol">:</a> <a id="918" href="Cubical.Foundations.Equiv.html#887" class="Bound">A</a> <a id="920" class="Symbol">→</a> <a id="922" href="Cubical.Foundations.Equiv.html#900" class="Bound">B</a><a id="923" class="Symbol">)</a> <a id="925" class="Symbol">(</a><a id="926" href="Cubical.Foundations.Equiv.html#926" class="Bound">y</a> <a id="928" class="Symbol">:</a> <a id="930" href="Cubical.Foundations.Equiv.html#900" class="Bound">B</a><a id="931" class="Symbol">)</a> <a id="933" class="Symbol">→</a> <a id="935" href="Cubical.Core.Primitives.html#957" class="Function">Type</a> <a id="940" class="Symbol">(</a><a id="941" href="Agda.Primitive.html#636" class="Primitive">ℓ-max</a> <a id="947" href="Cubical.Foundations.Equiv.html#838" class="Generalizable">ℓ</a> <a id="949" href="Cubical.Foundations.Equiv.html#840" class="Generalizable">ℓ&#39;</a><a id="951" class="Symbol">)</a> <a id="953" href="Cubical.Foundations.Equiv.html#876" class="Function">fiber</a> <a id="959" class="Symbol">{</a><a id="960" class="Argument">A</a> <a id="962" class="Symbol">=</a> <a id="964" href="Cubical.Foundations.Equiv.html#964" class="Bound">A</a><a id="965" class="Symbol">}</a> <a id="967" href="Cubical.Foundations.Equiv.html#967" class="Bound">f</a> <a id="969" href="Cubical.Foundations.Equiv.html#969" class="Bound">y</a> <a id="971" class="Symbol">=</a> <a id="973" href="Cubical.Core.Primitives.html#5705" class="Function">Σ[</a> <a id="976" href="Cubical.Foundations.Equiv.html#976" class="Bound">x</a> <a id="978" href="Cubical.Core.Primitives.html#5705" class="Function">∈</a> <a id="980" href="Cubical.Foundations.Equiv.html#964" class="Bound">A</a> <a id="982" href="Cubical.Core.Primitives.html#5705" class="Function">]</a> <a id="984" href="Cubical.Foundations.Equiv.html#967" class="Bound">f</a> <a id="986" href="Cubical.Foundations.Equiv.html#976" class="Bound">x</a> <a id="988" href="Agda.Builtin.Cubical.Path.html#381" class="Function Operator">≡</a> <a id="990" href="Cubical.Foundations.Equiv.html#969" class="Bound">y</a> <a id="equivIsEquiv"></a><a id="993" href="Cubical.Foundations.Equiv.html#993" class="Function">equivIsEquiv</a> <a id="1006" class="Symbol">:</a> <a id="1008" class="Symbol">∀</a> <a id="1010" class="Symbol">{</a><a id="1011" href="Cubical.Foundations.Equiv.html#1011" class="Bound">A</a> <a id="1013" class="Symbol">:</a> <a id="1015" href="Cubical.Core.Primitives.html#957" class="Function">Type</a> <a id="1020" href="Cubical.Foundations.Equiv.html#838" class="Generalizable">ℓ</a><a id="1021" class="Symbol">}</a> <a id="1023" class="Symbol">{</a><a id="1024" href="Cubical.Foundations.Equiv.html#1024" class="Bound">B</a> <a id="1026" class="Symbol">:</a> <a id="1028" href="Cubical.Core.Primitives.html#957" class="Function">Type</a> <a id="1033" href="Cubical.Foundations.Equiv.html#840" class="Generalizable">ℓ&#39;</a><a id="1035" class="Symbol">}</a> <a id="1037" class="Symbol">(</a><a id="1038" href="Cubical.Foundations.Equiv.html#1038" class="Bound">e</a> <a id="1040" class="Symbol">:</a> <a id="1042" href="Cubical.Foundations.Equiv.html#1011" class="Bound">A</a> <a id="1044" href="Agda.Builtin.Cubical.Glue.html#1051" class="Function Operator">≃</a> <a id="1046" href="Cubical.Foundations.Equiv.html#1024" class="Bound">B</a><a id="1047" class="Symbol">)</a> <a id="1049" class="Symbol">→</a> <a id="1051" href="Agda.Builtin.Cubical.Glue.html#868" class="Record">isEquiv</a> <a id="1059" class="Symbol">(</a><a id="1060" href="Agda.Builtin.Cubical.Glue.html#1143" class="Function">equivFun</a> <a id="1069" href="Cubical.Foundations.Equiv.html#1038" class="Bound">e</a><a id="1070" class="Symbol">)</a> <a id="1072" href="Cubical.Foundations.Equiv.html#993" class="Function">equivIsEquiv</a> <a id="1085" href="Cubical.Foundations.Equiv.html#1085" class="Bound">e</a> <a id="1087" class="Symbol">=</a> <a id="1089" href="Agda.Builtin.Sigma.html#264" class="Field">snd</a> <a id="1093" href="Cubical.Foundations.Equiv.html#1085" class="Bound">e</a> <a id="equivCtr"></a><a id="1096" href="Cubical.Foundations.Equiv.html#1096" class="Function">equivCtr</a> <a id="1105" class="Symbol">:</a> <a id="1107" class="Symbol">∀</a> <a id="1109" class="Symbol">{</a><a id="1110" href="Cubical.Foundations.Equiv.html#1110" class="Bound">A</a> <a id="1112" class="Symbol">:</a> <a id="1114" href="Cubical.Core.Primitives.html#957" class="Function">Type</a> <a id="1119" href="Cubical.Foundations.Equiv.html#838" class="Generalizable">ℓ</a><a id="1120" class="Symbol">}</a> <a id="1122" class="Symbol">{</a><a id="1123" href="Cubical.Foundations.Equiv.html#1123" class="Bound">B</a> <a id="1125" class="Symbol">:</a> <a id="1127" href="Cubical.Core.Primitives.html#957" class="Function">Type</a> <a id="1132" href="Cubical.Foundations.Equiv.html#840" class="Generalizable">ℓ&#39;</a><a id="1134" class="Symbol">}</a> <a id="1136" class="Symbol">(</a><a id="1137" href="Cubical.Foundations.Equiv.html#1137" class="Bound">e</a> <a id="1139" class="Symbol">:</a> <a id="1141" href="Cubical.Foundations.Equiv.html#1110" class="Bound">A</a> <a id="1143" href="Agda.Builtin.Cubical.Glue.html#1051" class="Function Operator">≃</a> <a id="1145" href="Cubical.Foundations.Equiv.html#1123" class="Bound">B</a><a id="1146" class="Symbol">)</a> <a id="1148" class="Symbol">(</a><a id="1149" href="Cubical.Foundations.Equiv.html#1149" class="Bound">y</a> <a id="1151" class="Symbol">:</a> <a id="1153" href="Cubical.Foundations.Equiv.html#1123" class="Bound">B</a><a id="1154" class="Symbol">)</a> <a id="1156" class="Symbol">→</a> <a id="1158" href="Cubical.Foundations.Equiv.html#876" class="Function">fiber</a> <a id="1164" class="Symbol">(</a><a id="1165" href="Agda.Builtin.Cubical.Glue.html#1143" class="Function">equivFun</a> <a id="1174" href="Cubical.Foundations.Equiv.html#1137" class="Bound">e</a><a id="1175" class="Symbol">)</a> <a id="1177" href="Cubical.Foundations.Equiv.html#1149" class="Bound">y</a> <a id="1179" href="Cubical.Foundations.Equiv.html#1096" class="Function">equivCtr</a> <a id="1188" href="Cubical.Foundations.Equiv.html#1188" class="Bound">e</a> <a id="1190" href="Cubical.Foundations.Equiv.html#1190" class="Bound">y</a> <a id="1192" class="Symbol">=</a> <a id="1194" href="Cubical.Foundations.Equiv.html#1188" class="Bound">e</a> <a id="1196" class="Symbol">.</a><a id="1197" href="Agda.Builtin.Sigma.html#264" class="Field">snd</a> <a id="1201" class="Symbol">.</a><a id="1202" href="Agda.Builtin.Cubical.Glue.html#971" class="Field">equiv-proof</a> <a id="1214" href="Cubical.Foundations.Equiv.html#1190" class="Bound">y</a> <a id="1216" class="Symbol">.</a><a id="1217" href="Agda.Builtin.Sigma.html#252" class="Field">fst</a> <a id="equivCtrPath"></a><a id="1222" href="Cubical.Foundations.Equiv.html#1222" class="Function">equivCtrPath</a> <a id="1235" class="Symbol">:</a> <a id="1237" class="Symbol">∀</a> <a id="1239" class="Symbol">{</a><a id="1240" href="Cubical.Foundations.Equiv.html#1240" class="Bound">A</a> <a id="1242" class="Symbol">:</a> <a id="1244" href="Cubical.Core.Primitives.html#957" class="Function">Type</a> <a id="1249" href="Cubical.Foundations.Equiv.html#838" class="Generalizable">ℓ</a><a id="1250" class="Symbol">}</a> <a id="1252" class="Symbol">{</a><a id="1253" href="Cubical.Foundations.Equiv.html#1253" class="Bound">B</a> <a id="1255" class="Symbol">:</a> <a id="1257" href="Cubical.Core.Primitives.html#957" class="Function">Type</a> <a id="1262" href="Cubical.Foundations.Equiv.html#840" class="Generalizable">ℓ&#39;</a><a id="1264" class="Symbol">}</a> <a id="1266" class="Symbol">(</a><a id="1267" href="Cubical.Foundations.Equiv.html#1267" class="Bound">e</a> <a id="1269" class="Symbol">:</a> <a id="1271" href="Cubical.Foundations.Equiv.html#1240" class="Bound">A</a> <a id="1273" href="Agda.Builtin.Cubical.Glue.html#1051" class="Function Operator">≃</a> <a id="1275" href="Cubical.Foundations.Equiv.html#1253" class="Bound">B</a><a id="1276" class="Symbol">)</a> <a id="1278" class="Symbol">(</a><a id="1279" href="Cubical.Foundations.Equiv.html#1279" class="Bound">y</a> <a id="1281" class="Symbol">:</a> <a id="1283" href="Cubical.Foundations.Equiv.html#1253" class="Bound">B</a><a id="1284" class="Symbol">)</a> <a id="1286" class="Symbol">→</a> <a id="1290" class="Symbol">(</a><a id="1291" href="Cubical.Foundations.Equiv.html#1291" class="Bound">v</a> <a id="1293" class="Symbol">:</a> <a id="1295" href="Cubical.Foundations.Equiv.html#876" class="Function">fiber</a> <a id="1301" class="Symbol">(</a><a id="1302" href="Agda.Builtin.Cubical.Glue.html#1143" class="Function">equivFun</a> <a id="1311" href="Cubical.Foundations.Equiv.html#1267" class="Bound">e</a><a id="1312" class="Symbol">)</a> <a id="1314" href="Cubical.Foundations.Equiv.html#1279" class="Bound">y</a><a id="1315" class="Symbol">)</a> <a id="1317" class="Symbol">→</a> <a id="1319" href="Cubical.Core.Primitives.html#1694" class="Function">Path</a> <a id="1324" class="Symbol">_</a> <a id="1326" class="Symbol">(</a><a id="1327" href="Cubical.Foundations.Equiv.html#1096" class="Function">equivCtr</a> <a id="1336" href="Cubical.Foundations.Equiv.html#1267" class="Bound">e</a> <a id="1338" href="Cubical.Foundations.Equiv.html#1279" class="Bound">y</a><a id="1339" class="Symbol">)</a> <a id="1341" href="Cubical.Foundations.Equiv.html#1291" class="Bound">v</a> <a id="1343" href="Cubical.Foundations.Equiv.html#1222" class="Function">equivCtrPath</a> <a id="1356" href="Cubical.Foundations.Equiv.html#1356" class="Bound">e</a> <a id="1358" href="Cubical.Foundations.Equiv.html#1358" class="Bound">y</a> <a id="1360" class="Symbol">=</a> <a id="1362" href="Cubical.Foundations.Equiv.html#1356" class="Bound">e</a> <a id="1364" class="Symbol">.</a><a id="1365" href="Agda.Builtin.Sigma.html#264" class="Field">snd</a> <a id="1369" class="Symbol">.</a><a id="1370" href="Agda.Builtin.Cubical.Glue.html#971" class="Field">equiv-proof</a> <a id="1382" href="Cubical.Foundations.Equiv.html#1358" class="Bound">y</a> <a id="1384" class="Symbol">.</a><a id="1385" href="Agda.Builtin.Sigma.html#264" class="Field">snd</a> <a id="1390" class="Comment">-- The identity equivalence</a> <a id="idIsEquiv"></a><a id="1418" href="Cubical.Foundations.Equiv.html#1418" class="Function">idIsEquiv</a> <a id="1428" class="Symbol">:</a> <a id="1430" class="Symbol">∀</a> <a id="1432" class="Symbol">(</a><a id="1433" href="Cubical.Foundations.Equiv.html#1433" class="Bound">A</a> <a id="1435" class="Symbol">:</a> <a id="1437" href="Cubical.Core.Primitives.html#957" class="Function">Type</a> <a id="1442" href="Cubical.Foundations.Equiv.html#838" class="Generalizable">ℓ</a><a id="1443" class="Symbol">)</a> <a id="1445" class="Symbol">→</a> <a id="1447" href="Agda.Builtin.Cubical.Glue.html#868" class="Record">isEquiv</a> <a id="1455" class="Symbol">(</a><a id="1456" href="Cubical.Foundations.Function.html#177" class="Function">idfun</a> <a id="1462" href="Cubical.Foundations.Equiv.html#1433" class="Bound">A</a><a id="1463" class="Symbol">)</a> <a id="1465" href="Agda.Builtin.Cubical.Glue.html#971" class="Field">equiv-proof</a> <a id="1477" class="Symbol">(</a><a id="1478" href="Cubical.Foundations.Equiv.html#1418" class="Function">idIsEquiv</a> <a id="1488" href="Cubical.Foundations.Equiv.html#1488" class="Bound">A</a><a id="1489" class="Symbol">)</a> <a id="1491" href="Cubical.Foundations.Equiv.html#1491" class="Bound">y</a> <a id="1493" class="Symbol">=</a> <a id="1497" class="Symbol">((</a><a id="1499" href="Cubical.Foundations.Equiv.html#1491" class="Bound">y</a> <a id="1501" href="Agda.Builtin.Sigma.html#236" class="InductiveConstructor Operator">,</a> <a id="1503" href="Cubical.Foundations.Prelude.html#856" class="Function">refl</a><a id="1507" class="Symbol">)</a> <a id="1509" href="Agda.Builtin.Sigma.html#236" class="InductiveConstructor Operator">,</a> <a id="1511" class="Symbol">λ</a> <a id="1513" href="Cubical.Foundations.Equiv.html#1513" class="Bound">z</a> <a id="1515" href="Cubical.Foundations.Equiv.html#1515" class="Bound">i</a> <a id="1517" class="Symbol">→</a> <a id="1519" href="Cubical.Foundations.Equiv.html#1513" class="Bound">z</a> <a id="1521" class="Symbol">.</a><a id="1522" href="Agda.Builtin.Sigma.html#264" class="Field">snd</a> <a id="1526" class="Symbol">(</a><a id="1527" href="Cubical.Core.Primitives.html#549" class="Primitive Operator">~</a> <a id="1529" href="Cubical.Foundations.Equiv.html#1515" class="Bound">i</a><a id="1530" class="Symbol">)</a> <a id="1532" href="Agda.Builtin.Sigma.html#236" class="InductiveConstructor Operator">,</a> <a id="1534" class="Symbol">λ</a> <a id="1536" href="Cubical.Foundations.Equiv.html#1536" class="Bound">j</a> <a id="1538" class="Symbol">→</a> <a id="1540" href="Cubical.Foundations.Equiv.html#1513" class="Bound">z</a> <a id="1542" class="Symbol">.</a><a id="1543" href="Agda.Builtin.Sigma.html#264" class="Field">snd</a> <a id="1547" class="Symbol">(</a><a id="1548" href="Cubical.Core.Primitives.html#549" class="Primitive Operator">~</a> <a id="1550" href="Cubical.Foundations.Equiv.html#1515" class="Bound">i</a> <a id="1552" href="Cubical.Core.Primitives.html#500" class="Primitive Operator">∨</a> <a id="1554" href="Cubical.Foundations.Equiv.html#1536" class="Bound">j</a><a id="1555" class="Symbol">))</a> <a id="idEquiv"></a><a id="1559" href="Cubical.Foundations.Equiv.html#1559" class="Function">idEquiv</a> <a id="1567" class="Symbol">:</a> <a id="1569" class="Symbol">∀</a> <a id="1571" class="Symbol">(</a><a id="1572" href="Cubical.Foundations.Equiv.html#1572" class="Bound">A</a> <a id="1574" class="Symbol">:</a> <a id="1576" href="Cubical.Core.Primitives.html#957" class="Function">Type</a> <a id="1581" href="Cubical.Foundations.Equiv.html#838" class="Generalizable">ℓ</a><a id="1582" class="Symbol">)</a> <a id="1584" class="Symbol">→</a> <a id="1586" href="Cubical.Foundations.Equiv.html#1572" class="Bound">A</a> <a id="1588" href="Agda.Builtin.Cubical.Glue.html#1051" class="Function Operator">≃</a> <a id="1590" href="Cubical.Foundations.Equiv.html#1572" class="Bound">A</a> <a id="1592" href="Cubical.Foundations.Equiv.html#1559" class="Function">idEquiv</a> <a id="1600" href="Cubical.Foundations.Equiv.html#1600" class="Bound">A</a> <a id="1602" class="Symbol">=</a> <a id="1604" class="Symbol">(</a><a id="1605" href="Cubical.Foundations.Function.html#177" class="Function">idfun</a> <a id="1611" href="Cubical.Foundations.Equiv.html#1600" class="Bound">A</a> <a id="1613" href="Agda.Builtin.Sigma.html#236" class="InductiveConstructor Operator">,</a> <a id="1615" href="Cubical.Foundations.Equiv.html#1418" class="Function">idIsEquiv</a> <a id="1625" href="Cubical.Foundations.Equiv.html#1600" class="Bound">A</a><a id="1626" class="Symbol">)</a> <a id="1629" class="Comment">-- Proof using isPropIsContr. This is slow and the direct proof below is better</a> <a id="isPropIsEquiv&#39;"></a><a id="1710" href="Cubical.Foundations.Equiv.html#1710" class="Function">isPropIsEquiv&#39;</a> <a id="1725" class="Symbol">:</a> <a id="1727" class="Symbol">(</a><a id="1728" href="Cubical.Foundations.Equiv.html#1728" class="Bound">f</a> <a id="1730" class="Symbol">:</a> <a id="1732" href="Cubical.Foundations.Equiv.html#860" class="Generalizable">A</a> <a id="1734" class="Symbol">→</a> <a id="1736" href="Cubical.Foundations.Equiv.html#862" class="Generalizable">B</a><a id="1737" class="Symbol">)</a> <a id="1739" class="Symbol">→</a> <a id="1741" href="Cubical.Foundations.Prelude.html#5588" class="Function">isProp</a> <a id="1748" class="Symbol">(</a><a id="1749" href="Agda.Builtin.Cubical.Glue.html#868" class="Record">isEquiv</a> <a id="1757" href="Cubical.Foundations.Equiv.html#1728" class="Bound">f</a><a id="1758" class="Symbol">)</a> <a id="1760" href="Agda.Builtin.Cubical.Glue.html#971" class="Field">equiv-proof</a> <a id="1772" class="Symbol">(</a><a id="1773" href="Cubical.Foundations.Equiv.html#1710" class="Function">isPropIsEquiv&#39;</a> <a id="1788" href="Cubical.Foundations.Equiv.html#1788" class="Bound">f</a> <a id="1790" href="Cubical.Foundations.Equiv.html#1790" class="Bound">u0</a> <a id="1793" href="Cubical.Foundations.Equiv.html#1793" class="Bound">u1</a> <a id="1796" href="Cubical.Foundations.Equiv.html#1796" class="Bound">i</a><a id="1797" class="Symbol">)</a> <a id="1799" href="Cubical.Foundations.Equiv.html#1799" class="Bound">y</a> <a id="1801" class="Symbol">=</a> <a id="1805" href="Cubical.Foundations.Prelude.html#7778" class="Function">isPropIsContr</a> <a id="1819" class="Symbol">(</a><a id="1820" href="Cubical.Foundations.Equiv.html#1790" class="Bound">u0</a> <a id="1823" class="Symbol">.</a><a id="1824" href="Agda.Builtin.Cubical.Glue.html#971" class="Field">equiv-proof</a> <a id="1836" href="Cubical.Foundations.Equiv.html#1799" class="Bound">y</a><a id="1837" class="Symbol">)</a> <a id="1839" class="Symbol">(</a><a id="1840" href="Cubical.Foundations.Equiv.html#1793" class="Bound">u1</a> <a id="1843" class="Symbol">.</a><a id="1844" href="Agda.Builtin.Cubical.Glue.html#971" class="Field">equiv-proof</a> <a id="1856" href="Cubical.Foundations.Equiv.html#1799" class="Bound">y</a><a id="1857" class="Symbol">)</a> <a id="1859" href="Cubical.Foundations.Equiv.html#1796" class="Bound">i</a> <a id="1862" class="Comment">-- Direct proof that computes quite ok (can be optimized further if</a> <a id="1930" class="Comment">-- necessary, see:</a> <a id="1949" class="Comment">-- https://github.com/mortberg/cubicaltt/blob/pi4s3_dimclosures/examples/brunerie2.ctt#L562</a> <a id="isPropIsEquiv"></a><a id="2042" href="Cubical.Foundations.Equiv.html#2042" class="Function">isPropIsEquiv</a> <a id="2056" class="Symbol">:</a> <a id="2058" class="Symbol">(</a><a id="2059" href="Cubical.Foundations.Equiv.html#2059" class="Bound">f</a> <a id="2061" class="Symbol">:</a> <a id="2063" href="Cubical.Foundations.Equiv.html#860" class="Generalizable">A</a> <a id="2065" class="Symbol">→</a> <a id="2067" href="Cubical.Foundations.Equiv.html#862" class="Generalizable">B</a><a id="2068" class="Symbol">)</a> <a id="2070" class="Symbol">→</a> <a id="2072" href="Cubical.Foundations.Prelude.html#5588" class="Function">isProp</a> <a id="2079" class="Symbol">(</a><a id="2080" href="Agda.Builtin.Cubical.Glue.html#868" class="Record">isEquiv</a> <a id="2088" href="Cubical.Foundations.Equiv.html#2059" class="Bound">f</a><a id="2089" class="Symbol">)</a> <a id="2091" href="Agda.Builtin.Cubical.Glue.html#971" class="Field">equiv-proof</a> <a id="2103" class="Symbol">(</a><a id="2104" href="Cubical.Foundations.Equiv.html#2042" class="Function">isPropIsEquiv</a> <a id="2118" href="Cubical.Foundations.Equiv.html#2118" class="Bound">f</a> <a id="2120" href="Cubical.Foundations.Equiv.html#2120" class="Bound">p</a> <a id="2122" href="Cubical.Foundations.Equiv.html#2122" class="Bound">q</a> <a id="2124" href="Cubical.Foundations.Equiv.html#2124" class="Bound">i</a><a id="2125" class="Symbol">)</a> <a id="2127" href="Cubical.Foundations.Equiv.html#2127" class="Bound">y</a> <a id="2129" class="Symbol">=</a> <a id="2133" class="Keyword">let</a> <a id="2137" href="Cubical.Foundations.Equiv.html#2137" class="Bound">p2</a> <a id="2140" class="Symbol">=</a> <a id="2142" href="Cubical.Foundations.Equiv.html#2120" class="Bound">p</a> <a id="2144" class="Symbol">.</a><a id="2145" href="Agda.Builtin.Cubical.Glue.html#971" class="Field">equiv-proof</a> <a id="2157" href="Cubical.Foundations.Equiv.html#2127" class="Bound">y</a> <a id="2159" class="Symbol">.</a><a id="2160" href="Agda.Builtin.Sigma.html#264" class="Field">snd</a> <a id="2170" href="Cubical.Foundations.Equiv.html#2170" class="Bound">q2</a> <a id="2173" class="Symbol">=</a> <a id="2175" href="Cubical.Foundations.Equiv.html#2122" class="Bound">q</a> <a id="2177" class="Symbol">.</a><a id="2178" href="Agda.Builtin.Cubical.Glue.html#971" class="Field">equiv-proof</a> <a id="2190" href="Cubical.Foundations.Equiv.html#2127" class="Bound">y</a> <a id="2192" class="Symbol">.</a><a id="2193" href="Agda.Builtin.Sigma.html#264" class="Field">snd</a> <a id="2199" class="Keyword">in</a> <a id="2202" href="Cubical.Foundations.Equiv.html#2137" class="Bound">p2</a> <a id="2205" class="Symbol">(</a><a id="2206" href="Cubical.Foundations.Equiv.html#2122" class="Bound">q</a> <a id="2208" class="Symbol">.</a><a id="2209" href="Agda.Builtin.Cubical.Glue.html#971" class="Field">equiv-proof</a> <a id="2221" href="Cubical.Foundations.Equiv.html#2127" class="Bound">y</a> <a id="2223" class="Symbol">.</a><a id="2224" href="Agda.Builtin.Sigma.html#252" class="Field">fst</a><a id="2227" class="Symbol">)</a> <a id="2229" href="Cubical.Foundations.Equiv.html#2124" class="Bound">i</a> <a id="2234" href="Agda.Builtin.Sigma.html#236" class="InductiveConstructor Operator">,</a> <a id="2236" class="Symbol">λ</a> <a id="2238" href="Cubical.Foundations.Equiv.html#2238" class="Bound">w</a> <a id="2240" href="Cubical.Foundations.Equiv.html#2240" class="Bound">j</a> <a id="2242" class="Symbol">→</a> <a id="2244" href="Cubical.Core.Primitives.html#667" class="Primitive">hcomp</a> <a id="2250" class="Symbol">(λ</a> <a id="2253" href="Cubical.Foundations.Equiv.html#2253" class="Bound">k</a> <a id="2255" class="Symbol">→</a> <a id="2257" class="Symbol">λ</a> <a id="2259" class="Symbol">{</a> <a id="2261" class="Symbol">(</a><a id="2262" href="Cubical.Foundations.Equiv.html#2124" class="Bound">i</a> <a id="2264" class="Symbol">=</a> <a id="2266" href="Agda.Primitive.Cubical.html#143" class="InductiveConstructor">i0</a><a id="2268" class="Symbol">)</a> <a id="2270" class="Symbol">→</a> <a id="2272" href="Cubical.Foundations.Equiv.html#2137" class="Bound">p2</a> <a id="2275" href="Cubical.Foundations.Equiv.html#2238" class="Bound">w</a> <a id="2277" href="Cubical.Foundations.Equiv.html#2240" class="Bound">j</a> <a id="2307" class="Symbol">;</a> <a id="2309" class="Symbol">(</a><a id="2310" href="Cubical.Foundations.Equiv.html#2124" class="Bound">i</a> <a id="2312" class="Symbol">=</a> <a id="2314" href="Agda.Primitive.Cubical.html#171" class="InductiveConstructor">i1</a><a id="2316" class="Symbol">)</a> <a id="2318" class="Symbol">→</a> <a id="2320" href="Cubical.Foundations.Equiv.html#2170" class="Bound">q2</a> <a id="2323" href="Cubical.Foundations.Equiv.html#2238" class="Bound">w</a> <a id="2325" class="Symbol">(</a><a id="2326" href="Cubical.Foundations.Equiv.html#2240" class="Bound">j</a> <a id="2328" href="Cubical.Core.Primitives.html#500" class="Primitive Operator">∨</a> <a id="2330" href="Cubical.Core.Primitives.html#549" class="Primitive Operator">~</a> <a id="2332" href="Cubical.Foundations.Equiv.html#2253" class="Bound">k</a><a id="2333" class="Symbol">)</a> <a id="2363" class="Symbol">;</a> <a id="2365" class="Symbol">(</a><a id="2366" href="Cubical.Foundations.Equiv.html#2240" class="Bound">j</a> <a id="2368" class="Symbol">=</a> <a id="2370" href="Agda.Primitive.Cubical.html#143" class="InductiveConstructor">i0</a><a id="2372" class="Symbol">)</a> <a id="2374" class="Symbol">→</a> <a id="2376" href="Cubical.Foundations.Equiv.html#2137" class="Bound">p2</a> <a id="2379" class="Symbol">(</a><a id="2380" href="Cubical.Foundations.Equiv.html#2170" class="Bound">q2</a> <a id="2383" href="Cubical.Foundations.Equiv.html#2238" class="Bound">w</a> <a id="2385" class="Symbol">(</a><a id="2386" href="Cubical.Core.Primitives.html#549" class="Primitive Operator">~</a> <a id="2388" href="Cubical.Foundations.Equiv.html#2253" class="Bound">k</a><a id="2389" class="Symbol">))</a> <a id="2392" href="Cubical.Foundations.Equiv.html#2124" class="Bound">i</a> <a id="2422" class="Symbol">;</a> <a id="2424" class="Symbol">(</a><a id="2425" href="Cubical.Foundations.Equiv.html#2240" class="Bound">j</a> <a id="2427" class="Symbol">=</a> <a id="2429" href="Agda.Primitive.Cubical.html#171" class="InductiveConstructor">i1</a><a id="2431" class="Symbol">)</a> <a id="2433" class="Symbol">→</a> <a id="2435" href="Cubical.Foundations.Equiv.html#2238" class="Bound">w</a> <a id="2437" class="Symbol">})</a> <a id="2459" class="Symbol">(</a><a id="2460" href="Cubical.Foundations.Equiv.html#2137" class="Bound">p2</a> <a id="2463" href="Cubical.Foundations.Equiv.html#2238" class="Bound">w</a> <a id="2465" class="Symbol">(</a><a id="2466" href="Cubical.Foundations.Equiv.html#2124" class="Bound">i</a> <a id="2468" href="Cubical.Core.Primitives.html#500" class="Primitive Operator">∨</a> <a id="2470" href="Cubical.Foundations.Equiv.html#2240" class="Bound">j</a><a id="2471" class="Symbol">))</a> <a id="equivEq"></a><a id="2475" href="Cubical.Foundations.Equiv.html#2475" class="Function">equivEq</a> <a id="2483" class="Symbol">:</a> <a id="2485" class="Symbol">(</a><a id="2486" href="Cubical.Foundations.Equiv.html#2486" class="Bound">e</a> <a id="2488" href="Cubical.Foundations.Equiv.html#2488" class="Bound">f</a> <a id="2490" class="Symbol">:</a> <a id="2492" href="Cubical.Foundations.Equiv.html#860" class="Generalizable">A</a> <a id="2494" href="Agda.Builtin.Cubical.Glue.html#1051" class="Function Operator">≃</a> <a id="2496" href="Cubical.Foundations.Equiv.html#862" class="Generalizable">B</a><a id="2497" class="Symbol">)</a> <a id="2499" class="Symbol">→</a> <a id="2501" class="Symbol">(</a><a id="2502" href="Cubical.Foundations.Equiv.html#2502" class="Bound">h</a> <a id="2504" class="Symbol">:</a> <a id="2506" href="Cubical.Foundations.Equiv.html#2486" class="Bound">e</a> <a id="2508" class="Symbol">.</a><a id="2509" href="Agda.Builtin.Sigma.html#252" class="Field">fst</a> <a id="2513" href="Agda.Builtin.Cubical.Path.html#381" class="Function Operator">≡</a> <a id="2515" href="Cubical.Foundations.Equiv.html#2488" class="Bound">f</a> <a id="2517" class="Symbol">.</a><a id="2518" href="Agda.Builtin.Sigma.html#252" class="Field">fst</a><a id="2521" class="Symbol">)</a> <a id="2523" class="Symbol">→</a> <a id="2525" href="Cubical.Foundations.Equiv.html#2486" class="Bound">e</a> <a id="2527" href="Agda.Builtin.Cubical.Path.html#381" class="Function Operator">≡</a> <a id="2529" href="Cubical.Foundations.Equiv.html#2488" class="Bound">f</a> <a id="2531" href="Cubical.Foundations.Equiv.html#2475" class="Function">equivEq</a> <a id="2539" href="Cubical.Foundations.Equiv.html#2539" class="Bound">e</a> <a id="2541" href="Cubical.Foundations.Equiv.html#2541" class="Bound">f</a> <a id="2543" href="Cubical.Foundations.Equiv.html#2543" class="Bound">h</a> <a id="2545" class="Symbol">=</a> <a id="2547" class="Symbol">λ</a> <a id="2549" href="Cubical.Foundations.Equiv.html#2549" class="Bound">i</a> <a id="2551" class="Symbol">→</a> <a id="2553" class="Symbol">(</a><a id="2554" href="Cubical.Foundations.Equiv.html#2543" class="Bound">h</a> <a id="2556" href="Cubical.Foundations.Equiv.html#2549" class="Bound">i</a><a id="2557" class="Symbol">)</a> <a id="2559" href="Agda.Builtin.Sigma.html#236" class="InductiveConstructor Operator">,</a> <a id="2561" href="Cubical.Foundations.Prelude.html#7591" class="Function">isProp→PathP</a> <a id="2574" class="Symbol">(λ</a> <a id="2577" href="Cubical.Foundations.Equiv.html#2577" class="Bound">i</a> <a id="2579" class="Symbol">→</a> <a id="2581" href="Cubical.Foundations.Equiv.html#2042" class="Function">isPropIsEquiv</a> <a id="2595" class="Symbol">(</a><a id="2596" href="Cubical.Foundations.Equiv.html#2543" class="Bound">h</a> <a id="2598" href="Cubical.Foundations.Equiv.html#2577" class="Bound">i</a><a id="2599" class="Symbol">))</a> <a id="2602" class="Symbol">(</a><a id="2603" href="Cubical.Foundations.Equiv.html#2539" class="Bound">e</a> <a id="2605" class="Symbol">.</a><a id="2606" href="Agda.Builtin.Sigma.html#264" class="Field">snd</a><a id="2609" class="Symbol">)</a> <a id="2611" class="Symbol">(</a><a id="2612" href="Cubical.Foundations.Equiv.html#2541" class="Bound">f</a> <a id="2614" class="Symbol">.</a><a id="2615" href="Agda.Builtin.Sigma.html#264" class="Field">snd</a><a id="2618" class="Symbol">)</a> <a id="2620" href="Cubical.Foundations.Equiv.html#2549" class="Bound">i</a> <a id="2623" class="Keyword">module</a> <a id="2630" href="Cubical.Foundations.Equiv.html#2630" class="Module">_</a> <a id="2632" class="Symbol">(</a><a id="2633" href="Cubical.Foundations.Equiv.html#2633" class="Bound">w</a> <a id="2635" class="Symbol">:</a> <a id="2637" href="Cubical.Foundations.Equiv.html#860" class="Generalizable">A</a> <a id="2639" href="Agda.Builtin.Cubical.Glue.html#1051" class="Function Operator">≃</a> <a id="2641" href="Cubical.Foundations.Equiv.html#862" class="Generalizable">B</a><a id="2642" class="Symbol">)</a> <a id="2644" class="Keyword">where</a> <a id="2652" href="Cubical.Foundations.Equiv.html#2652" class="Function">invEq</a> <a id="2658" class="Symbol">:</a> <a id="2660" href="Cubical.Foundations.Equiv.html#2641" class="Bound">B</a> <a id="2662" class="Symbol">→</a> <a id="2664" href="Cubical.Foundations.Equiv.html#2637" class="Bound">A</a> <a id="2668" href="Cubical.Foundations.Equiv.html#2652" class="Function">invEq</a> <a id="2674" href="Cubical.Foundations.Equiv.html#2674" class="Bound">y</a> <a id="2676" class="Symbol">=</a> <a id="2678" href="Agda.Builtin.Sigma.html#252" class="Field">fst</a> <a id="2682" class="Symbol">(</a><a id="2683" href="Agda.Builtin.Sigma.html#252" class="Field">fst</a> <a id="2687" class="Symbol">(</a><a id="2688" href="Agda.Builtin.Sigma.html#264" class="Field">snd</a> <a id="2692" href="Cubical.Foundations.Equiv.html#2633" class="Bound">w</a> <a id="2694" class="Symbol">.</a><a id="2695" href="Agda.Builtin.Cubical.Glue.html#971" class="Field">equiv-proof</a> <a id="2707" href="Cubical.Foundations.Equiv.html#2674" class="Bound">y</a><a id="2708" class="Symbol">))</a> <a id="2714" href="Cubical.Foundations.Equiv.html#2714" class="Function">secEq</a> <a id="2720" class="Symbol">:</a> <a id="2722" href="Cubical.Foundations.Isomorphism.html#471" class="Function">section</a> <a id="2730" href="Cubical.Foundations.Equiv.html#2652" class="Function">invEq</a> <a id="2736" class="Symbol">(</a><a id="2737" href="Cubical.Foundations.Equiv.html#2633" class="Bound">w</a> <a id="2739" class="Symbol">.</a><a id="2740" href="Agda.Builtin.Sigma.html#252" class="Field">fst</a><a id="2743" class="Symbol">)</a> <a id="2747" href="Cubical.Foundations.Equiv.html#2714" class="Function">secEq</a> <a id="2753" href="Cubical.Foundations.Equiv.html#2753" class="Bound">x</a> <a id="2755" class="Symbol">=</a> <a id="2757" class="Symbol">λ</a> <a id="2759" href="Cubical.Foundations.Equiv.html#2759" class="Bound">i</a> <a id="2761" class="Symbol">→</a> <a id="2763" href="Agda.Builtin.Sigma.html#252" class="Field">fst</a> <a id="2767" class="Symbol">(</a><a id="2768" href="Agda.Builtin.Sigma.html#264" class="Field">snd</a> <a id="2772" class="Symbol">(</a><a id="2773" href="Agda.Builtin.Sigma.html#264" class="Field">snd</a> <a id="2777" href="Cubical.Foundations.Equiv.html#2633" class="Bound">w</a> <a id="2779" class="Symbol">.</a><a id="2780" href="Agda.Builtin.Cubical.Glue.html#971" class="Field">equiv-proof</a> <a id="2792" class="Symbol">(</a><a id="2793" href="Agda.Builtin.Sigma.html#252" class="Field">fst</a> <a id="2797" href="Cubical.Foundations.Equiv.html#2633" class="Bound">w</a> <a id="2799" href="Cubical.Foundations.Equiv.html#2753" class="Bound">x</a><a id="2800" class="Symbol">))</a> <a id="2803" class="Symbol">(</a><a id="2804" href="Cubical.Foundations.Equiv.html#2753" class="Bound">x</a> <a id="2806" href="Agda.Builtin.Sigma.html#236" class="InductiveConstructor Operator">,</a> <a id="2808" class="Symbol">(λ</a> <a id="2811" href="Cubical.Foundations.Equiv.html#2811" class="Bound">j</a> <a id="2813" class="Symbol">→</a> <a id="2815" href="Agda.Builtin.Sigma.html#252" class="Field">fst</a> <a id="2819" href="Cubical.Foundations.Equiv.html#2633" class="Bound">w</a> <a id="2821" href="Cubical.Foundations.Equiv.html#2753" class="Bound">x</a><a id="2822" class="Symbol">))</a> <a id="2825" href="Cubical.Foundations.Equiv.html#2759" class="Bound">i</a><a id="2826" class="Symbol">)</a> <a id="2831" href="Cubical.Foundations.Equiv.html#2831" class="Function">retEq</a> <a id="2837" class="Symbol">:</a> <a id="2839" href="Cubical.Foundations.Isomorphism.html#586" class="Function">retract</a> <a id="2847" href="Cubical.Foundations.Equiv.html#2652" class="Function">invEq</a> <a id="2853" class="Symbol">(</a><a id="2854" href="Cubical.Foundations.Equiv.html#2633" class="Bound">w</a> <a id="2856" class="Symbol">.</a><a id="2857" href="Agda.Builtin.Sigma.html#252" class="Field">fst</a><a id="2860" class="Symbol">)</a> <a id="2864" href="Cubical.Foundations.Equiv.html#2831" class="Function">retEq</a> <a id="2870" href="Cubical.Foundations.Equiv.html#2870" class="Bound">y</a> <a id="2872" class="Symbol">=</a> <a id="2874" class="Symbol">λ</a> <a id="2876" href="Cubical.Foundations.Equiv.html#2876" class="Bound">i</a> <a id="2878" class="Symbol">→</a> <a id="2880" href="Agda.Builtin.Sigma.html#264" class="Field">snd</a> <a id="2884" class="Symbol">(</a><a id="2885" href="Agda.Builtin.Sigma.html#252" class="Field">fst</a> <a id="2889" class="Symbol">(</a><a id="2890" href="Agda.Builtin.Sigma.html#264" class="Field">snd</a> <a id="2894" href="Cubical.Foundations.Equiv.html#2633" class="Bound">w</a> <a id="2896" class="Symbol">.</a><a id="2897" href="Agda.Builtin.Cubical.Glue.html#971" class="Field">equiv-proof</a> <a id="2909" href="Cubical.Foundations.Equiv.html#2870" class="Bound">y</a><a id="2910" class="Symbol">))</a> <a id="2913" href="Cubical.Foundations.Equiv.html#2876" class="Bound">i</a> <a id="equivToIso"></a><a id="2916" href="Cubical.Foundations.Equiv.html#2916" class="Function">equivToIso</a> <a id="2927" class="Symbol">:</a> <a id="2929" class="Symbol">∀</a> <a id="2931" class="Symbol">{</a><a id="2932" href="Cubical.Foundations.Equiv.html#2932" class="Bound">ℓ</a> <a id="2934" href="Cubical.Foundations.Equiv.html#2934" class="Bound">ℓ&#39;</a><a id="2936" class="Symbol">}</a> <a id="2938" class="Symbol">{</a><a id="2939" href="Cubical.Foundations.Equiv.html#2939" class="Bound">A</a> <a id="2941" class="Symbol">:</a> <a id="2943" href="Cubical.Core.Primitives.html#957" class="Function">Type</a> <a id="2948" href="Cubical.Foundations.Equiv.html#2932" class="Bound">ℓ</a><a id="2949" class="Symbol">}</a> <a id="2951" class="Symbol">{</a><a id="2952" href="Cubical.Foundations.Equiv.html#2952" class="Bound">B</a> <a id="2954" class="Symbol">:</a> <a id="2956" href="Cubical.Core.Primitives.html#957" class="Function">Type</a> <a id="2961" href="Cubical.Foundations.Equiv.html#2934" class="Bound">ℓ&#39;</a><a id="2963" class="Symbol">}</a> <a id="2965" class="Symbol">→</a> <a id="2967" href="Cubical.Foundations.Equiv.html#2939" class="Bound">A</a> <a id="2969" href="Agda.Builtin.Cubical.Glue.html#1051" class="Function Operator">≃</a> <a id="2971" href="Cubical.Foundations.Equiv.html#2952" class="Bound">B</a> <a id="2973" class="Symbol">→</a> <a id="2975" href="Cubical.Foundations.Isomorphism.html#673" class="Record">Iso</a> <a id="2979" href="Cubical.Foundations.Equiv.html#2939" class="Bound">A</a> <a id="2981" href="Cubical.Foundations.Equiv.html#2952" class="Bound">B</a> <a id="2983" href="Cubical.Foundations.Equiv.html#2916" class="Function">equivToIso</a> <a id="2994" class="Symbol">{</a><a id="2995" class="Argument">A</a> <a id="2997" class="Symbol">=</a> <a id="2999" href="Cubical.Foundations.Equiv.html#2999" class="Bound">A</a><a id="3000" class="Symbol">}</a> <a id="3002" class="Symbol">{</a><a id="3003" class="Argument">B</a> <a id="3005" class="Symbol">=</a> <a id="3007" href="Cubical.Foundations.Equiv.html#3007" class="Bound">B</a><a id="3008" class="Symbol">}</a> <a id="3010" href="Cubical.Foundations.Equiv.html#3010" class="Bound">e</a> <a id="3012" class="Symbol">=</a> <a id="3014" href="Cubical.Foundations.Isomorphism.html#751" class="InductiveConstructor">iso</a> <a id="3018" class="Symbol">(</a><a id="3019" href="Cubical.Foundations.Equiv.html#3010" class="Bound">e</a> <a id="3021" class="Symbol">.</a><a id="3022" href="Agda.Builtin.Sigma.html#252" class="Field">fst</a><a id="3025" class="Symbol">)</a> <a id="3027" class="Symbol">(</a><a id="3028" href="Cubical.Foundations.Equiv.html#2652" class="Function">invEq</a> <a id="3034" href="Cubical.Foundations.Equiv.html#3010" class="Bound">e</a> <a id="3036" class="Symbol">)</a> <a id="3038" class="Symbol">(</a><a id="3039" href="Cubical.Foundations.Equiv.html#2831" class="Function">retEq</a> <a id="3045" href="Cubical.Foundations.Equiv.html#3010" class="Bound">e</a><a id="3046" class="Symbol">)</a> <a id="3048" class="Symbol">(</a><a id="3049" href="Cubical.Foundations.Equiv.html#2714" class="Function">secEq</a> <a id="3055" href="Cubical.Foundations.Equiv.html#3010" class="Bound">e</a><a id="3056" class="Symbol">)</a> <a id="invEquiv"></a><a id="3059" href="Cubical.Foundations.Equiv.html#3059" class="Function">invEquiv</a> <a id="3068" class="Symbol">:</a> <a id="3070" href="Cubical.Foundations.Equiv.html#860" class="Generalizable">A</a> <a id="3072" href="Agda.Builtin.Cubical.Glue.html#1051" class="Function Operator">≃</a> <a id="3074" href="Cubical.Foundations.Equiv.html#862" class="Generalizable">B</a> <a id="3076" class="Symbol">→</a> <a id="3078" href="Cubical.Foundations.Equiv.html#862" class="Generalizable">B</a> <a id="3080" href="Agda.Builtin.Cubical.Glue.html#1051" class="Function Operator">≃</a> <a id="3082" href="Cubical.Foundations.Equiv.html#860" class="Generalizable">A</a> <a id="3084" href="Cubical.Foundations.Equiv.html#3059" class="Function">invEquiv</a> <a id="3093" href="Cubical.Foundations.Equiv.html#3093" class="Bound">f</a> <a id="3095" class="Symbol">=</a> <a id="3097" href="Cubical.Foundations.Isomorphism.html#2598" class="Function">isoToEquiv</a> <a id="3108" class="Symbol">(</a><a id="3109" href="Cubical.Foundations.Isomorphism.html#751" class="InductiveConstructor">iso</a> <a id="3113" class="Symbol">(</a><a id="3114" href="Cubical.Foundations.Equiv.html#2652" class="Function">invEq</a> <a id="3120" href="Cubical.Foundations.Equiv.html#3093" class="Bound">f</a><a id="3121" class="Symbol">)</a> <a id="3123" class="Symbol">(</a><a id="3124" href="Agda.Builtin.Sigma.html#252" class="Field">fst</a> <a id="3128" href="Cubical.Foundations.Equiv.html#3093" class="Bound">f</a><a id="3129" class="Symbol">)</a> <a id="3131" class="Symbol">(</a><a id="3132" href="Cubical.Foundations.Equiv.html#2714" class="Function">secEq</a> <a id="3138" href="Cubical.Foundations.Equiv.html#3093" class="Bound">f</a><a id="3139" class="Symbol">)</a> <a id="3141" class="Symbol">(</a><a id="3142" href="Cubical.Foundations.Equiv.html#2831" class="Function">retEq</a> <a id="3148" href="Cubical.Foundations.Equiv.html#3093" class="Bound">f</a><a id="3149" class="Symbol">))</a> <a id="invEquivIdEquiv"></a><a id="3153" href="Cubical.Foundations.Equiv.html#3153" class="Function">invEquivIdEquiv</a> <a id="3169" class="Symbol">:</a> <a id="3171" class="Symbol">(</a><a id="3172" href="Cubical.Foundations.Equiv.html#3172" class="Bound">A</a> <a id="3174" class="Symbol">:</a> <a id="3176" href="Cubical.Core.Primitives.html#957" class="Function">Type</a> <a id="3181" href="Cubical.Foundations.Equiv.html#838" class="Generalizable">ℓ</a><a id="3182" class="Symbol">)</a> <a id="3184" class="Symbol">→</a> <a id="3186" href="Cubical.Foundations.Equiv.html#3059" class="Function">invEquiv</a> <a id="3195" class="Symbol">(</a><a id="3196" href="Cubical.Foundations.Equiv.html#1559" class="Function">idEquiv</a> <a id="3204" href="Cubical.Foundations.Equiv.html#3172" class="Bound">A</a><a id="3205" class="Symbol">)</a> <a id="3207" href="Agda.Builtin.Cubical.Path.html#381" class="Function Operator">≡</a> <a id="3209" href="Cubical.Foundations.Equiv.html#1559" class="Function">idEquiv</a> <a id="3217" href="Cubical.Foundations.Equiv.html#3172" class="Bound">A</a> <a id="3219" href="Cubical.Foundations.Equiv.html#3153" class="Function">invEquivIdEquiv</a> <a id="3235" class="Symbol">_</a> <a id="3237" class="Symbol">=</a> <a id="3239" href="Cubical.Foundations.Equiv.html#2475" class="Function">equivEq</a> <a id="3247" class="Symbol">_</a> <a id="3249" class="Symbol">_</a> <a id="3251" href="Cubical.Foundations.Prelude.html#856" class="Function">refl</a> <a id="compEquiv"></a><a id="3257" href="Cubical.Foundations.Equiv.html#3257" class="Function">compEquiv</a> <a id="3267" class="Symbol">:</a> <a id="3269" href="Cubical.Foundations.Equiv.html#860" class="Generalizable">A</a> <a id="3271" href="Agda.Builtin.Cubical.Glue.html#1051" class="Function Operator">≃</a> <a id="3273" href="Cubical.Foundations.Equiv.html#862" class="Generalizable">B</a> <a id="3275" class="Symbol">→</a> <a id="3277" href="Cubical.Foundations.Equiv.html#862" class="Generalizable">B</a> <a id="3279" href="Agda.Builtin.Cubical.Glue.html#1051" class="Function Operator">≃</a> <a id="3281" href="Cubical.Foundations.Equiv.html#864" class="Generalizable">C</a> <a id="3283" class="Symbol">→</a> <a id="3285" href="Cubical.Foundations.Equiv.html#860" class="Generalizable">A</a> <a id="3287" href="Agda.Builtin.Cubical.Glue.html#1051" class="Function Operator">≃</a> <a id="3289" href="Cubical.Foundations.Equiv.html#864" class="Generalizable">C</a> <a id="3291" href="Cubical.Foundations.Equiv.html#3257" class="Function">compEquiv</a> <a id="3301" href="Cubical.Foundations.Equiv.html#3301" class="Bound">f</a> <a id="3303" href="Cubical.Foundations.Equiv.html#3303" class="Bound">g</a> <a id="3305" class="Symbol">=</a> <a id="3307" href="Cubical.Foundations.Isomorphism.html#2598" class="Function">isoToEquiv</a> <a id="3336" class="Symbol">(</a><a id="3337" href="Cubical.Foundations.Isomorphism.html#751" class="InductiveConstructor">iso</a> <a id="3341" class="Symbol">(λ</a> <a id="3344" href="Cubical.Foundations.Equiv.html#3344" class="Bound">x</a> <a id="3346" class="Symbol">→</a> <a id="3348" href="Cubical.Foundations.Equiv.html#3303" class="Bound">g</a> <a id="3350" class="Symbol">.</a><a id="3351" href="Agda.Builtin.Sigma.html#252" class="Field">fst</a> <a id="3355" class="Symbol">(</a><a id="3356" href="Cubical.Foundations.Equiv.html#3301" class="Bound">f</a> <a id="3358" class="Symbol">.</a><a id="3359" href="Agda.Builtin.Sigma.html#252" class="Field">fst</a> <a id="3363" href="Cubical.Foundations.Equiv.html#3344" class="Bound">x</a><a id="3364" class="Symbol">))</a> <a id="3390" class="Symbol">(λ</a> <a id="3393" href="Cubical.Foundations.Equiv.html#3393" class="Bound">x</a> <a id="3395" class="Symbol">→</a> <a id="3397" href="Cubical.Foundations.Equiv.html#2652" class="Function">invEq</a> <a id="3403" href="Cubical.Foundations.Equiv.html#3301" class="Bound">f</a> <a id="3405" class="Symbol">(</a><a id="3406" href="Cubical.Foundations.Equiv.html#2652" class="Function">invEq</a> <a id="3412" href="Cubical.Foundations.Equiv.html#3303" class="Bound">g</a> <a id="3414" href="Cubical.Foundations.Equiv.html#3393" class="Bound">x</a><a id="3415" class="Symbol">))</a> <a id="3441" class="Symbol">(λ</a> <a id="3444" href="Cubical.Foundations.Equiv.html#3444" class="Bound">y</a> <a id="3446" class="Symbol">→</a> <a id="3448" class="Symbol">(</a><a id="3449" href="Cubical.Foundations.Prelude.html#1057" class="Function">cong</a> <a id="3454" class="Symbol">(</a><a id="3455" href="Cubical.Foundations.Equiv.html#3303" class="Bound">g</a> <a id="3457" class="Symbol">.</a><a id="3458" href="Agda.Builtin.Sigma.html#252" class="Field">fst</a><a id="3461" class="Symbol">)</a> <a id="3463" class="Symbol">(</a><a id="3464" href="Cubical.Foundations.Equiv.html#2831" class="Function">retEq</a> <a id="3470" href="Cubical.Foundations.Equiv.html#3301" class="Bound">f</a> <a id="3472" class="Symbol">(</a><a id="3473" href="Cubical.Foundations.Equiv.html#2652" class="Function">invEq</a> <a id="3479" href="Cubical.Foundations.Equiv.html#3303" class="Bound">g</a> <a id="3481" href="Cubical.Foundations.Equiv.html#3444" class="Bound">y</a><a id="3482" class="Symbol">)))</a> <a id="3486" href="Cubical.Foundations.Prelude.html#1705" class="Function Operator">∙</a> <a id="3488" class="Symbol">(</a><a id="3489" href="Cubical.Foundations.Equiv.html#2831" class="Function">retEq</a> <a id="3495" href="Cubical.Foundations.Equiv.html#3303" class="Bound">g</a> <a id="3497" href="Cubical.Foundations.Equiv.html#3444" class="Bound">y</a><a id="3498" class="Symbol">))</a> <a id="3524" class="Symbol">(λ</a> <a id="3527" href="Cubical.Foundations.Equiv.html#3527" class="Bound">y</a> <a id="3529" class="Symbol">→</a> <a id="3531" class="Symbol">(</a><a id="3532" href="Cubical.Foundations.Prelude.html#1057" class="Function">cong</a> <a id="3537" class="Symbol">(</a><a id="3538" href="Cubical.Foundations.Equiv.html#2652" class="Function">invEq</a> <a id="3544" href="Cubical.Foundations.Equiv.html#3301" class="Bound">f</a><a id="3545" class="Symbol">)</a> <a id="3547" class="Symbol">(</a><a id="3548" href="Cubical.Foundations.Equiv.html#2714" class="Function">secEq</a> <a id="3554" href="Cubical.Foundations.Equiv.html#3303" class="Bound">g</a> <a id="3556" class="Symbol">(</a><a id="3557" href="Cubical.Foundations.Equiv.html#3301" class="Bound">f</a> <a id="3559" class="Symbol">.</a><a id="3560" href="Agda.Builtin.Sigma.html#252" class="Field">fst</a> <a id="3564" href="Cubical.Foundations.Equiv.html#3527" class="Bound">y</a><a id="3565" class="Symbol">)))</a> <a id="3569" href="Cubical.Foundations.Prelude.html#1705" class="Function Operator">∙</a> <a id="3571" class="Symbol">(</a><a id="3572" href="Cubical.Foundations.Equiv.html#2714" class="Function">secEq</a> <a id="3578" href="Cubical.Foundations.Equiv.html#3301" class="Bound">f</a> <a id="3580" href="Cubical.Foundations.Equiv.html#3527" class="Bound">y</a><a id="3581" class="Symbol">)))</a> <a id="compEquivIdEquiv"></a><a id="3586" href="Cubical.Foundations.Equiv.html#3586" class="Function">compEquivIdEquiv</a> <a id="3603" class="Symbol">:</a> <a id="3605" class="Symbol">{</a><a id="3606" href="Cubical.Foundations.Equiv.html#3606" class="Bound">A</a> <a id="3608" href="Cubical.Foundations.Equiv.html#3608" class="Bound">B</a> <a id="3610" class="Symbol">:</a> <a id="3612" href="Cubical.Core.Primitives.html#957" class="Function">Type</a> <a id="3617" href="Cubical.Foundations.Equiv.html#838" class="Generalizable">ℓ</a><a id="3618" class="Symbol">}</a> <a id="3620" class="Symbol">(</a><a id="3621" href="Cubical.Foundations.Equiv.html#3621" class="Bound">e</a> <a id="3623" class="Symbol">:</a> <a id="3625" href="Cubical.Foundations.Equiv.html#3606" class="Bound">A</a> <a id="3627" href="Agda.Builtin.Cubical.Glue.html#1051" class="Function Operator">≃</a> <a id="3629" href="Cubical.Foundations.Equiv.html#3608" class="Bound">B</a><a id="3630" class="Symbol">)</a> <a id="3632" class="Symbol">→</a> <a id="3634" href="Cubical.Foundations.Equiv.html#3257" class="Function">compEquiv</a> <a id="3644" class="Symbol">(</a><a id="3645" href="Cubical.Foundations.Equiv.html#1559" class="Function">idEquiv</a> <a id="3653" href="Cubical.Foundations.Equiv.html#3606" class="Bound">A</a><a id="3654" class="Symbol">)</a> <a id="3656" href="Cubical.Foundations.Equiv.html#3621" class="Bound">e</a> <a id="3658" href="Agda.Builtin.Cubical.Path.html#381" class="Function Operator">≡</a> <a id="3660" href="Cubical.Foundations.Equiv.html#3621" class="Bound">e</a> <a id="3662" href="Cubical.Foundations.Equiv.html#3586" class="Function">compEquivIdEquiv</a> <a id="3679" href="Cubical.Foundations.Equiv.html#3679" class="Bound">e</a> <a id="3681" class="Symbol">=</a> <a id="3683" href="Cubical.Foundations.Equiv.html#2475" class="Function">equivEq</a> <a id="3691" class="Symbol">_</a> <a id="3693" class="Symbol">_</a> <a id="3695" href="Cubical.Foundations.Prelude.html#856" class="Function">refl</a> <a id="LiftEquiv"></a><a id="3701" href="Cubical.Foundations.Equiv.html#3701" class="Function">LiftEquiv</a> <a id="3711" class="Symbol">:</a> <a id="3713" class="Symbol">{</a><a id="3714" href="Cubical.Foundations.Equiv.html#3714" class="Bound">A</a> <a id="3716" class="Symbol">:</a> <a id="3718" href="Cubical.Core.Primitives.html#957" class="Function">Type</a> <a id="3723" href="Cubical.Foundations.Equiv.html#838" class="Generalizable">ℓ</a><a id="3724" class="Symbol">}</a> <a id="3726" class="Symbol">→</a> <a id="3728" href="Cubical.Foundations.Equiv.html#3714" class="Bound">A</a> <a id="3730" href="Agda.Builtin.Cubical.Glue.html#1051" class="Function Operator">≃</a> <a id="3732" href="Cubical.Foundations.Prelude.html#8638" class="Record">Lift</a> <a id="3737" class="Symbol">{</a><a id="3738" class="Argument">i</a> <a id="3740" class="Symbol">=</a> <a id="3742" href="Cubical.Foundations.Equiv.html#838" class="Generalizable">ℓ</a><a id="3743" class="Symbol">}</a> <a id="3745" class="Symbol">{</a><a id="3746" class="Argument">j</a> <a id="3748" class="Symbol">=</a> <a id="3750" href="Cubical.Foundations.Equiv.html#840" class="Generalizable">ℓ&#39;</a><a id="3752" class="Symbol">}</a> <a id="3754" href="Cubical.Foundations.Equiv.html#3714" class="Bound">A</a> <a id="3756" href="Cubical.Foundations.Equiv.html#3701" class="Function">LiftEquiv</a> <a id="3766" class="Symbol">=</a> <a id="3768" href="Cubical.Foundations.Isomorphism.html#2598" class="Function">isoToEquiv</a> <a id="3779" class="Symbol">(</a><a id="3780" href="Cubical.Foundations.Isomorphism.html#751" class="InductiveConstructor">iso</a> <a id="3784" href="Cubical.Foundations.Prelude.html#8701" class="InductiveConstructor">lift</a> <a id="3789" href="Cubical.Foundations.Prelude.html#8718" class="Field">lower</a> <a id="3795" class="Symbol">(λ</a> <a id="3798" href="Cubical.Foundations.Equiv.html#3798" class="Bound">_</a> <a id="3800" class="Symbol">→</a> <a id="3802" href="Cubical.Foundations.Prelude.html#856" class="Function">refl</a><a id="3806" class="Symbol">)</a> <a id="3808" class="Symbol">(λ</a> <a id="3811" href="Cubical.Foundations.Equiv.html#3811" class="Bound">_</a> <a id="3813" class="Symbol">→</a> <a id="3815" href="Cubical.Foundations.Prelude.html#856" class="Function">refl</a><a id="3819" class="Symbol">))</a> <a id="3823" class="Comment">-- module _ {ℓ ℓ&#39;} {A : Type ℓ} {B : Type ℓ&#39;} where</a> <a id="3876" class="Comment">-- invEquivInvol : (f : A ≃ B) → invEquiv (invEquiv f) ≡ f</a> <a id="3937" class="Comment">-- invEquivInvol f i .fst = fst f</a> <a id="3973" class="Comment">-- invEquivInvol f i .snd = propIsEquiv (fst f) (snd (invEquiv (invEquiv f))) (snd f) i</a> <a id="Contr→Equiv"></a><a id="4064" href="Cubical.Foundations.Equiv.html#4064" class="Function">Contr→Equiv</a> <a id="4076" class="Symbol">:</a> <a id="4078" href="Cubical.Foundations.Prelude.html#5524" class="Function">isContr</a> <a id="4086" href="Cubical.Foundations.Equiv.html#860" class="Generalizable">A</a> <a id="4088" class="Symbol">→</a> <a id="4090" href="Cubical.Foundations.Prelude.html#5524" class="Function">isContr</a> <a id="4098" href="Cubical.Foundations.Equiv.html#862" class="Generalizable">B</a> <a id="4100" class="Symbol">→</a> <a id="4102" href="Cubical.Foundations.Equiv.html#860" class="Generalizable">A</a> <a id="4104" href="Agda.Builtin.Cubical.Glue.html#1051" class="Function Operator">≃</a> <a id="4106" href="Cubical.Foundations.Equiv.html#862" class="Generalizable">B</a> <a id="4108" href="Cubical.Foundations.Equiv.html#4064" class="Function">Contr→Equiv</a> <a id="4120" href="Cubical.Foundations.Equiv.html#4120" class="Bound">Actr</a> <a id="4125" href="Cubical.Foundations.Equiv.html#4125" class="Bound">Bctr</a> <a id="4130" class="Symbol">=</a> <a id="4132" href="Cubical.Foundations.Isomorphism.html#2598" class="Function">isoToEquiv</a> <a id="4143" class="Symbol">(</a><a id="4144" href="Cubical.Foundations.Isomorphism.html#751" class="InductiveConstructor">iso</a> <a id="4148" class="Symbol">(λ</a> <a id="4151" href="Cubical.Foundations.Equiv.html#4151" class="Bound">_</a> <a id="4153" class="Symbol">→</a> <a id="4155" href="Agda.Builtin.Sigma.html#252" class="Field">fst</a> <a id="4159" href="Cubical.Foundations.Equiv.html#4125" class="Bound">Bctr</a><a id="4163" class="Symbol">)</a> <a id="4165" class="Symbol">(λ</a> <a id="4168" href="Cubical.Foundations.Equiv.html#4168" class="Bound">_</a> <a id="4170" class="Symbol">→</a> <a id="4172" href="Agda.Builtin.Sigma.html#252" class="Field">fst</a> <a id="4176" href="Cubical.Foundations.Equiv.html#4120" class="Bound">Actr</a><a id="4180" class="Symbol">)</a> <a id="4182" class="Symbol">(</a><a id="4183" href="Agda.Builtin.Sigma.html#264" class="Field">snd</a> <a id="4187" href="Cubical.Foundations.Equiv.html#4125" class="Bound">Bctr</a><a id="4191" class="Symbol">)</a> <a id="4193" class="Symbol">(</a><a id="4194" href="Agda.Builtin.Sigma.html#264" class="Field">snd</a> <a id="4198" href="Cubical.Foundations.Equiv.html#4120" class="Bound">Actr</a><a id="4202" class="Symbol">))</a> <a id="PropEquiv→Equiv"></a><a id="4206" href="Cubical.Foundations.Equiv.html#4206" class="Function">PropEquiv→Equiv</a> <a id="4222" class="Symbol">:</a> <a id="4224" class="Symbol">(</a><a id="4225" href="Cubical.Foundations.Equiv.html#4225" class="Bound">Aprop</a> <a id="4231" class="Symbol">:</a> <a id="4233" href="Cubical.Foundations.Prelude.html#5588" class="Function">isProp</a> <a id="4240" href="Cubical.Foundations.Equiv.html#860" class="Generalizable">A</a><a id="4241" class="Symbol">)</a> <a id="4243" class="Symbol">(</a><a id="4244" href="Cubical.Foundations.Equiv.html#4244" class="Bound">Bprop</a> <a id="4250" class="Symbol">:</a> <a id="4252" href="Cubical.Foundations.Prelude.html#5588" class="Function">isProp</a> <a id="4259" href="Cubical.Foundations.Equiv.html#862" class="Generalizable">B</a><a id="4260" class="Symbol">)</a> <a id="4262" class="Symbol">(</a><a id="4263" href="Cubical.Foundations.Equiv.html#4263" class="Bound">f</a> <a id="4265" class="Symbol">:</a> <a id="4267" href="Cubical.Foundations.Equiv.html#860" class="Generalizable">A</a> <a id="4269" class="Symbol">→</a> <a id="4271" href="Cubical.Foundations.Equiv.html#862" class="Generalizable">B</a><a id="4272" class="Symbol">)</a> <a id="4274" class="Symbol">(</a><a id="4275" href="Cubical.Foundations.Equiv.html#4275" class="Bound">g</a> <a id="4277" class="Symbol">:</a> <a id="4279" href="Cubical.Foundations.Equiv.html#862" class="Generalizable">B</a> <a id="4281" class="Symbol">→</a> <a id="4283" href="Cubical.Foundations.Equiv.html#860" class="Generalizable">A</a><a id="4284" class="Symbol">)</a> <a id="4286" class="Symbol">→</a> <a id="4288" class="Symbol">(</a><a id="4289" href="Cubical.Foundations.Equiv.html#860" class="Generalizable">A</a> <a id="4291" href="Agda.Builtin.Cubical.Glue.html#1051" class="Function Operator">≃</a> <a id="4293" href="Cubical.Foundations.Equiv.html#862" class="Generalizable">B</a><a id="4294" class="Symbol">)</a> <a id="4296" href="Cubical.Foundations.Equiv.html#4206" class="Function">PropEquiv→Equiv</a> <a id="4312" href="Cubical.Foundations.Equiv.html#4312" class="Bound">Aprop</a> <a id="4318" href="Cubical.Foundations.Equiv.html#4318" class="Bound">Bprop</a> <a id="4324" href="Cubical.Foundations.Equiv.html#4324" class="Bound">f</a> <a id="4326" href="Cubical.Foundations.Equiv.html#4326" class="Bound">g</a> <a id="4328" class="Symbol">=</a> <a id="4330" href="Cubical.Foundations.Isomorphism.html#2598" class="Function">isoToEquiv</a> <a id="4341" class="Symbol">(</a><a id="4342" href="Cubical.Foundations.Isomorphism.html#751" class="InductiveConstructor">iso</a> <a id="4346" href="Cubical.Foundations.Equiv.html#4324" class="Bound">f</a> <a id="4348" href="Cubical.Foundations.Equiv.html#4326" class="Bound">g</a> <a id="4350" class="Symbol">(λ</a> <a id="4353" href="Cubical.Foundations.Equiv.html#4353" class="Bound">b</a> <a id="4355" class="Symbol">→</a> <a id="4357" href="Cubical.Foundations.Equiv.html#4318" class="Bound">Bprop</a> <a id="4363" class="Symbol">(</a><a id="4364" href="Cubical.Foundations.Equiv.html#4324" class="Bound">f</a> <a id="4366" class="Symbol">(</a><a id="4367" href="Cubical.Foundations.Equiv.html#4326" class="Bound">g</a> <a id="4369" href="Cubical.Foundations.Equiv.html#4353" class="Bound">b</a><a id="4370" class="Symbol">))</a> <a id="4373" href="Cubical.Foundations.Equiv.html#4353" class="Bound">b</a><a id="4374" class="Symbol">)</a> <a id="4376" class="Symbol">λ</a> <a id="4378" href="Cubical.Foundations.Equiv.html#4378" class="Bound">a</a> <a id="4380" class="Symbol">→</a> <a id="4382" href="Cubical.Foundations.Equiv.html#4312" class="Bound">Aprop</a> <a id="4388" class="Symbol">(</a><a id="4389" href="Cubical.Foundations.Equiv.html#4326" class="Bound">g</a> <a id="4391" class="Symbol">(</a><a id="4392" href="Cubical.Foundations.Equiv.html#4324" class="Bound">f</a> <a id="4394" href="Cubical.Foundations.Equiv.html#4378" class="Bound">a</a><a id="4395" class="Symbol">))</a> <a id="4398" href="Cubical.Foundations.Equiv.html#4378" class="Bound">a</a><a id="4399" class="Symbol">)</a> <a id="homotopyNatural"></a><a id="4402" href="Cubical.Foundations.Equiv.html#4402" class="Function">homotopyNatural</a> <a id="4418" class="Symbol">:</a> <a id="4420" class="Symbol">{</a><a id="4421" href="Cubical.Foundations.Equiv.html#4421" class="Bound">f</a> <a id="4423" href="Cubical.Foundations.Equiv.html#4423" class="Bound">g</a> <a id="4425" class="Symbol">:</a> <a id="4427" href="Cubical.Foundations.Equiv.html#860" class="Generalizable">A</a> <a id="4429" class="Symbol">→</a> <a id="4431" href="Cubical.Foundations.Equiv.html#862" class="Generalizable">B</a><a id="4432" class="Symbol">}</a> <a id="4434" class="Symbol">(</a><a id="4435" href="Cubical.Foundations.Equiv.html#4435" class="Bound">H</a> <a id="4437" class="Symbol">:</a> <a id="4439" class="Symbol">∀</a> <a id="4441" href="Cubical.Foundations.Equiv.html#4441" class="Bound">a</a> <a id="4443" class="Symbol">→</a> <a id="4445" href="Cubical.Foundations.Equiv.html#4421" class="Bound">f</a> <a id="4447" href="Cubical.Foundations.Equiv.html#4441" class="Bound">a</a> <a id="4449" href="Agda.Builtin.Cubical.Path.html#381" class="Function Operator">≡</a> <a id="4451" href="Cubical.Foundations.Equiv.html#4423" class="Bound">g</a> <a id="4453" href="Cubical.Foundations.Equiv.html#4441" class="Bound">a</a><a id="4454" class="Symbol">)</a> <a id="4456" class="Symbol">{</a><a id="4457" href="Cubical.Foundations.Equiv.html#4457" class="Bound">x</a> <a id="4459" href="Cubical.Foundations.Equiv.html#4459" class="Bound">y</a> <a id="4461" class="Symbol">:</a> <a id="4463" href="Cubical.Foundations.Equiv.html#860" class="Generalizable">A</a><a id="4464" class="Symbol">}</a> <a id="4466" class="Symbol">(</a><a id="4467" href="Cubical.Foundations.Equiv.html#4467" class="Bound">p</a> <a id="4469" class="Symbol">:</a> <a id="4471" href="Cubical.Foundations.Equiv.html#4457" class="Bound">x</a> <a id="4473" href="Agda.Builtin.Cubical.Path.html#381" class="Function Operator">≡</a> <a id="4475" href="Cubical.Foundations.Equiv.html#4459" class="Bound">y</a><a id="4476" class="Symbol">)</a> <a id="4478" class="Symbol">→</a> <a id="4498" href="Cubical.Foundations.Equiv.html#4435" class="Bound">H</a> <a id="4500" href="Cubical.Foundations.Equiv.html#4457" class="Bound">x</a> <a id="4502" href="Cubical.Foundations.Prelude.html#1705" class="Function Operator">∙</a> <a id="4504" href="Cubical.Foundations.Prelude.html#1057" class="Function">cong</a> <a id="4509" href="Cubical.Foundations.Equiv.html#4423" class="Bound">g</a> <a id="4511" href="Cubical.Foundations.Equiv.html#4467" class="Bound">p</a> <a id="4513" href="Agda.Builtin.Cubical.Path.html#381" class="Function Operator">≡</a> <a id="4515" href="Cubical.Foundations.Prelude.html#1057" class="Function">cong</a> <a id="4520" href="Cubical.Foundations.Equiv.html#4421" class="Bound">f</a> <a id="4522" href="Cubical.Foundations.Equiv.html#4467" class="Bound">p</a> <a id="4524" href="Cubical.Foundations.Prelude.html#1705" class="Function Operator">∙</a> <a id="4526" href="Cubical.Foundations.Equiv.html#4435" class="Bound">H</a> <a id="4528" href="Cubical.Foundations.Equiv.html#4459" class="Bound">y</a> <a id="4530" href="Cubical.Foundations.Equiv.html#4402" class="Function">homotopyNatural</a> <a id="4546" href="Cubical.Foundations.Equiv.html#4546" class="Bound">H</a> <a id="4548" href="Cubical.Foundations.Equiv.html#4548" class="Bound">p</a> <a id="4550" class="Symbol">=</a> <a id="4552" href="Cubical.Foundations.Equiv.html#4593" class="Function">homotopyNatural&#39;</a> <a id="4569" href="Cubical.Foundations.Equiv.html#4546" class="Bound">H</a> <a id="4571" href="Cubical.Foundations.Equiv.html#4548" class="Bound">p</a> <a id="4573" href="Cubical.Foundations.Prelude.html#1705" class="Function Operator">∙</a> <a id="4575" href="Cubical.Foundations.Prelude.html#3125" class="Function">□≡∙</a> <a id="4579" class="Symbol">_</a> <a id="4581" class="Symbol">_</a> <a id="4585" class="Keyword">where</a> <a id="4593" href="Cubical.Foundations.Equiv.html#4593" class="Function">homotopyNatural&#39;</a> <a id="4610" class="Symbol">:</a> <a id="4612" class="Symbol">{</a><a id="4613" href="Cubical.Foundations.Equiv.html#4613" class="Bound">f</a> <a id="4615" href="Cubical.Foundations.Equiv.html#4615" class="Bound">g</a> <a id="4617" class="Symbol">:</a> <a id="4619" href="Cubical.Foundations.Equiv.html#860" class="Generalizable">A</a> <a id="4621" class="Symbol">→</a> <a id="4623" href="Cubical.Foundations.Equiv.html#862" class="Generalizable">B</a><a id="4624" class="Symbol">}</a> <a id="4626" class="Symbol">(</a><a id="4627" href="Cubical.Foundations.Equiv.html#4627" class="Bound">H</a> <a id="4629" class="Symbol">:</a> <a id="4631" class="Symbol">∀</a> <a id="4633" href="Cubical.Foundations.Equiv.html#4633" class="Bound">a</a> <a id="4635" class="Symbol">→</a> <a id="4637" href="Cubical.Foundations.Equiv.html#4613" class="Bound">f</a> <a id="4639" href="Cubical.Foundations.Equiv.html#4633" class="Bound">a</a> <a id="4641" href="Agda.Builtin.Cubical.Path.html#381" class="Function Operator">≡</a> <a id="4643" href="Cubical.Foundations.Equiv.html#4615" class="Bound">g</a> <a id="4645" href="Cubical.Foundations.Equiv.html#4633" class="Bound">a</a><a id="4646" class="Symbol">)</a> <a id="4648" class="Symbol">{</a><a id="4649" href="Cubical.Foundations.Equiv.html#4649" class="Bound">x</a> <a id="4651" href="Cubical.Foundations.Equiv.html#4651" class="Bound">y</a> <a id="4653" class="Symbol">:</a> <a id="4655" href="Cubical.Foundations.Equiv.html#860" class="Generalizable">A</a><a id="4656" class="Symbol">}</a> <a id="4658" class="Symbol">(</a><a id="4659" href="Cubical.Foundations.Equiv.html#4659" class="Bound">p</a> <a id="4661" class="Symbol">:</a> <a id="4663" href="Cubical.Foundations.Equiv.html#4649" class="Bound">x</a> <a id="4665" href="Agda.Builtin.Cubical.Path.html#381" class="Function Operator">≡</a> <a id="4667" href="Cubical.Foundations.Equiv.html#4651" class="Bound">y</a><a id="4668" class="Symbol">)</a> <a id="4670" class="Symbol">→</a> <a id="4693" href="Cubical.Foundations.Equiv.html#4627" class="Bound">H</a> <a id="4695" href="Cubical.Foundations.Equiv.html#4649" class="Bound">x</a> <a id="4697" href="Cubical.Foundations.Prelude.html#1705" class="Function Operator">∙</a> <a id="4699" href="Cubical.Foundations.Prelude.html#1057" class="Function">cong</a> <a id="4704" href="Cubical.Foundations.Equiv.html#4615" class="Bound">g</a> <a id="4706" href="Cubical.Foundations.Equiv.html#4659" class="Bound">p</a> <a id="4708" href="Agda.Builtin.Cubical.Path.html#381" class="Function Operator">≡</a> <a id="4710" href="Cubical.Foundations.Prelude.html#1057" class="Function">cong</a> <a id="4715" href="Cubical.Foundations.Equiv.html#4613" class="Bound">f</a> <a id="4717" href="Cubical.Foundations.Equiv.html#4659" class="Bound">p</a> <a id="4719" href="Cubical.Foundations.Prelude.html#3058" class="Function Operator">□</a> <a id="4721" href="Cubical.Foundations.Equiv.html#4627" class="Bound">H</a> <a id="4723" href="Cubical.Foundations.Equiv.html#4651" class="Bound">y</a> <a id="4727" href="Cubical.Foundations.Equiv.html#4593" class="Function">homotopyNatural&#39;</a> <a id="4744" class="Symbol">{</a><a id="4745" class="Argument">f</a> <a id="4747" class="Symbol">=</a> <a id="4749" href="Cubical.Foundations.Equiv.html#4749" class="Bound">f</a><a id="4750" class="Symbol">}</a> <a id="4752" class="Symbol">{</a><a id="4753" class="Argument">g</a> <a id="4755" class="Symbol">=</a> <a id="4757" href="Cubical.Foundations.Equiv.html#4757" class="Bound">g</a><a id="4758" class="Symbol">}</a> <a id="4760" href="Cubical.Foundations.Equiv.html#4760" class="Bound">H</a> <a id="4762" class="Symbol">{</a><a id="4763" href="Cubical.Foundations.Equiv.html#4763" class="Bound">x</a><a id="4764" class="Symbol">}</a> <a id="4766" class="Symbol">{</a><a id="4767" href="Cubical.Foundations.Equiv.html#4767" class="Bound">y</a><a id="4768" class="Symbol">}</a> <a id="4770" href="Cubical.Foundations.Equiv.html#4770" class="Bound">p</a> <a id="4772" href="Cubical.Foundations.Equiv.html#4772" class="Bound">i</a> <a id="4774" href="Cubical.Foundations.Equiv.html#4774" class="Bound">j</a> <a id="4776" class="Symbol">=</a> <a id="4782" href="Cubical.Core.Primitives.html#667" class="Primitive">hcomp</a> <a id="4788" class="Symbol">(λ</a> <a id="4791" href="Cubical.Foundations.Equiv.html#4791" class="Bound">k</a> <a id="4793" class="Symbol">→</a> <a id="4795" class="Symbol">λ</a> <a id="4797" class="Symbol">{</a> <a id="4799" class="Symbol">(</a><a id="4800" href="Cubical.Foundations.Equiv.html#4772" class="Bound">i</a> <a id="4802" class="Symbol">=</a> <a id="4804" href="Agda.Primitive.Cubical.html#143" class="InductiveConstructor">i0</a><a id="4806" class="Symbol">)</a> <a id="4808" class="Symbol">→</a> <a id="4810" href="Cubical.Foundations.Prelude.html#1526" class="Function">compPath-filler</a> <a id="4826" class="Symbol">(</a><a id="4827" href="Cubical.Foundations.Equiv.html#4760" class="Bound">H</a> <a id="4829" href="Cubical.Foundations.Equiv.html#4763" class="Bound">x</a><a id="4830" class="Symbol">)</a> <a id="4832" class="Symbol">(</a><a id="4833" href="Cubical.Foundations.Prelude.html#1057" class="Function">cong</a> <a id="4838" href="Cubical.Foundations.Equiv.html#4757" class="Bound">g</a> <a id="4840" href="Cubical.Foundations.Equiv.html#4770" class="Bound">p</a><a id="4841" class="Symbol">)</a> <a id="4843" href="Cubical.Foundations.Equiv.html#4791" class="Bound">k</a> <a id="4845" href="Cubical.Foundations.Equiv.html#4774" class="Bound">j</a> <a id="4866" class="Symbol">;</a> <a id="4868" class="Symbol">(</a><a id="4869" href="Cubical.Foundations.Equiv.html#4772" class="Bound">i</a> <a id="4871" class="Symbol">=</a> <a id="4873" href="Agda.Primitive.Cubical.html#171" class="InductiveConstructor">i1</a><a id="4875" class="Symbol">)</a> <a id="4877" class="Symbol">→</a> <a id="4879" href="Cubical.Foundations.Prelude.html#2874" class="Function">compPath&#39;-filler</a> <a id="4896" class="Symbol">(</a><a id="4897" href="Cubical.Foundations.Prelude.html#1057" class="Function">cong</a> <a id="4902" href="Cubical.Foundations.Equiv.html#4749" class="Bound">f</a> <a id="4904" href="Cubical.Foundations.Equiv.html#4770" class="Bound">p</a><a id="4905" class="Symbol">)</a> <a id="4907" class="Symbol">(</a><a id="4908" href="Cubical.Foundations.Equiv.html#4760" class="Bound">H</a> <a id="4910" href="Cubical.Foundations.Equiv.html#4767" class="Bound">y</a><a id="4911" class="Symbol">)</a> <a id="4913" href="Cubical.Foundations.Equiv.html#4791" class="Bound">k</a> <a id="4915" href="Cubical.Foundations.Equiv.html#4774" class="Bound">j</a> <a id="4936" class="Symbol">;</a> <a id="4938" class="Symbol">(</a><a id="4939" href="Cubical.Foundations.Equiv.html#4774" class="Bound">j</a> <a id="4941" class="Symbol">=</a> <a id="4943" href="Agda.Primitive.Cubical.html#143" class="InductiveConstructor">i0</a><a id="4945" class="Symbol">)</a> <a id="4947" class="Symbol">→</a> <a id="4949" href="Cubical.Foundations.Prelude.html#1057" class="Function">cong</a> <a id="4954" href="Cubical.Foundations.Equiv.html#4749" class="Bound">f</a> <a id="4956" href="Cubical.Foundations.Equiv.html#4770" class="Bound">p</a> <a id="4958" class="Symbol">(</a><a id="4959" href="Cubical.Foundations.Equiv.html#4772" class="Bound">i</a> <a id="4961" href="Cubical.Core.Primitives.html#451" class="Primitive Operator">∧</a> <a id="4963" class="Symbol">(</a><a id="4964" href="Cubical.Core.Primitives.html#549" class="Primitive Operator">~</a> <a id="4966" href="Cubical.Foundations.Equiv.html#4791" class="Bound">k</a><a id="4967" class="Symbol">))</a> <a id="4989" class="Symbol">;</a> <a id="4991" class="Symbol">(</a><a id="4992" href="Cubical.Foundations.Equiv.html#4774" class="Bound">j</a> <a id="4994" class="Symbol">=</a> <a id="4996" href="Agda.Primitive.Cubical.html#171" class="InductiveConstructor">i1</a><a id="4998" class="Symbol">)</a> <a id="5000" class="Symbol">→</a> <a id="5002" href="Cubical.Foundations.Prelude.html#1057" class="Function">cong</a> <a id="5007" href="Cubical.Foundations.Equiv.html#4757" class="Bound">g</a> <a id="5009" href="Cubical.Foundations.Equiv.html#4770" class="Bound">p</a> <a id="5011" class="Symbol">(</a><a id="5012" href="Cubical.Foundations.Equiv.html#4772" class="Bound">i</a> <a id="5014" href="Cubical.Core.Primitives.html#500" class="Primitive Operator">∨</a> <a id="5016" href="Cubical.Foundations.Equiv.html#4791" class="Bound">k</a><a id="5017" class="Symbol">)</a> <a id="5019" class="Symbol">})</a> <a id="5032" class="Symbol">(</a><a id="5033" href="Cubical.Foundations.Equiv.html#4760" class="Bound">H</a> <a id="5035" class="Symbol">(</a><a id="5036" href="Cubical.Foundations.Equiv.html#4770" class="Bound">p</a> <a id="5038" href="Cubical.Foundations.Equiv.html#4772" class="Bound">i</a><a id="5039" class="Symbol">)</a> <a id="5041" href="Cubical.Foundations.Equiv.html#4774" class="Bound">j</a><a id="5042" class="Symbol">)</a> <a id="Hfa≡fHa"></a><a id="5045" href="Cubical.Foundations.Equiv.html#5045" class="Function">Hfa≡fHa</a> <a id="5053" class="Symbol">:</a> <a id="5055" class="Symbol">∀</a> <a id="5057" class="Symbol">{</a><a id="5058" href="Cubical.Foundations.Equiv.html#5058" class="Bound">A</a> <a id="5060" class="Symbol">:</a> <a id="5062" href="Cubical.Core.Primitives.html#957" class="Function">Type</a> <a id="5067" href="Cubical.Foundations.Equiv.html#838" class="Generalizable">ℓ</a><a id="5068" class="Symbol">}</a> <a id="5070" class="Symbol">(</a><a id="5071" href="Cubical.Foundations.Equiv.html#5071" class="Bound">f</a> <a id="5073" class="Symbol">:</a> <a id="5075" href="Cubical.Foundations.Equiv.html#5058" class="Bound">A</a> <a id="5077" class="Symbol">→</a> <a id="5079" href="Cubical.Foundations.Equiv.html#5058" class="Bound">A</a><a id="5080" class="Symbol">)</a> <a id="5082" class="Symbol">→</a> <a id="5084" class="Symbol">(</a><a id="5085" href="Cubical.Foundations.Equiv.html#5085" class="Bound">H</a> <a id="5087" class="Symbol">:</a> <a id="5089" class="Symbol">∀</a> <a id="5091" href="Cubical.Foundations.Equiv.html#5091" class="Bound">a</a> <a id="5093" class="Symbol">→</a> <a id="5095" href="Cubical.Foundations.Equiv.html#5071" class="Bound">f</a> <a id="5097" href="Cubical.Foundations.Equiv.html#5091" class="Bound">a</a> <a id="5099" href="Agda.Builtin.Cubical.Path.html#381" class="Function Operator">≡</a> <a id="5101" href="Cubical.Foundations.Equiv.html#5091" class="Bound">a</a><a id="5102" class="Symbol">)</a> <a id="5104" class="Symbol">→</a> <a id="5106" class="Symbol">∀</a> <a id="5108" href="Cubical.Foundations.Equiv.html#5108" class="Bound">a</a> <a id="5110" class="Symbol">→</a> <a id="5112" href="Cubical.Foundations.Equiv.html#5085" class="Bound">H</a> <a id="5114" class="Symbol">(</a><a id="5115" href="Cubical.Foundations.Equiv.html#5071" class="Bound">f</a> <a id="5117" href="Cubical.Foundations.Equiv.html#5108" class="Bound">a</a><a id="5118" class="Symbol">)</a> <a id="5120" href="Agda.Builtin.Cubical.Path.html#381" class="Function Operator">≡</a> <a id="5122" href="Cubical.Foundations.Prelude.html#1057" class="Function">cong</a> <a id="5127" href="Cubical.Foundations.Equiv.html#5071" class="Bound">f</a> <a id="5129" class="Symbol">(</a><a id="5130" href="Cubical.Foundations.Equiv.html#5085" class="Bound">H</a> <a id="5132" href="Cubical.Foundations.Equiv.html#5108" class="Bound">a</a><a id="5133" class="Symbol">)</a> <a id="5135" href="Cubical.Foundations.Equiv.html#5045" class="Function">Hfa≡fHa</a> <a id="5143" class="Symbol">{</a><a id="5144" class="Argument">A</a> <a id="5146" class="Symbol">=</a> <a id="5148" href="Cubical.Foundations.Equiv.html#5148" class="Bound">A</a><a id="5149" class="Symbol">}</a> <a id="5151" href="Cubical.Foundations.Equiv.html#5151" class="Bound">f</a> <a id="5153" href="Cubical.Foundations.Equiv.html#5153" class="Bound">H</a> <a id="5155" href="Cubical.Foundations.Equiv.html#5155" class="Bound">a</a> <a id="5157" class="Symbol">=</a> <a id="5161" href="Cubical.Foundations.Equiv.html#5153" class="Bound">H</a> <a id="5163" class="Symbol">(</a><a id="5164" href="Cubical.Foundations.Equiv.html#5151" class="Bound">f</a> <a id="5166" href="Cubical.Foundations.Equiv.html#5155" class="Bound">a</a><a id="5167" class="Symbol">)</a> <a id="5194" href="Cubical.Foundations.Prelude.html#2574" class="Function Operator">≡⟨</a> <a id="5197" href="Cubical.Foundations.GroupoidLaws.html#431" class="Function">rUnit</a> <a id="5203" class="Symbol">(</a><a id="5204" href="Cubical.Foundations.Equiv.html#5153" class="Bound">H</a> <a id="5206" class="Symbol">(</a><a id="5207" href="Cubical.Foundations.Equiv.html#5151" class="Bound">f</a> <a id="5209" href="Cubical.Foundations.Equiv.html#5155" class="Bound">a</a><a id="5210" class="Symbol">))</a> <a id="5213" href="Cubical.Foundations.Prelude.html#2574" class="Function Operator">⟩</a> <a id="5217" href="Cubical.Foundations.Equiv.html#5153" class="Bound">H</a> <a id="5219" class="Symbol">(</a><a id="5220" href="Cubical.Foundations.Equiv.html#5151" class="Bound">f</a> <a id="5222" href="Cubical.Foundations.Equiv.html#5155" class="Bound">a</a><a id="5223" class="Symbol">)</a> <a id="5225" href="Cubical.Foundations.Prelude.html#1705" class="Function Operator">∙</a> <a id="5227" href="Cubical.Foundations.Prelude.html#856" class="Function">refl</a> <a id="5250" href="Cubical.Foundations.Prelude.html#2574" class="Function Operator">≡⟨</a> <a id="5253" href="Cubical.Foundations.Prelude.html#1057" class="Function">cong</a> <a id="5258" class="Symbol">(</a><a id="5259" href="Cubical.Foundations.Prelude.html#1705" class="Function Operator">_∙_</a> <a id="5263" class="Symbol">(</a><a id="5264" href="Cubical.Foundations.Equiv.html#5153" class="Bound">H</a> <a id="5266" class="Symbol">(</a><a id="5267" href="Cubical.Foundations.Equiv.html#5151" class="Bound">f</a> <a id="5269" href="Cubical.Foundations.Equiv.html#5155" class="Bound">a</a><a id="5270" class="Symbol">)))</a> <a id="5274" class="Symbol">(</a><a id="5275" href="Cubical.Foundations.Prelude.html#893" class="Function">sym</a> <a id="5279" class="Symbol">(</a><a id="5280" href="Cubical.Foundations.GroupoidLaws.html#1702" class="Function">rCancel</a> <a id="5288" class="Symbol">(</a><a id="5289" href="Cubical.Foundations.Equiv.html#5153" class="Bound">H</a> <a id="5291" href="Cubical.Foundations.Equiv.html#5155" class="Bound">a</a><a id="5292" class="Symbol">)))</a> <a id="5296" href="Cubical.Foundations.Prelude.html#2574" class="Function Operator">⟩</a> <a id="5300" href="Cubical.Foundations.Equiv.html#5153" class="Bound">H</a> <a id="5302" class="Symbol">(</a><a id="5303" href="Cubical.Foundations.Equiv.html#5151" class="Bound">f</a> <a id="5305" href="Cubical.Foundations.Equiv.html#5155" class="Bound">a</a><a id="5306" class="Symbol">)</a> <a id="5308" href="Cubical.Foundations.Prelude.html#1705" class="Function Operator">∙</a> <a id="5310" href="Cubical.Foundations.Equiv.html#5153" class="Bound">H</a> <a id="5312" href="Cubical.Foundations.Equiv.html#5155" class="Bound">a</a> <a id="5314" href="Cubical.Foundations.Prelude.html#1705" class="Function Operator">∙</a> <a id="5316" href="Cubical.Foundations.Prelude.html#893" class="Function">sym</a> <a id="5320" class="Symbol">(</a><a id="5321" href="Cubical.Foundations.Equiv.html#5153" class="Bound">H</a> <a id="5323" href="Cubical.Foundations.Equiv.html#5155" class="Bound">a</a><a id="5324" class="Symbol">)</a> <a id="5333" href="Cubical.Foundations.Prelude.html#2574" class="Function Operator">≡⟨</a> <a id="5336" href="Cubical.Foundations.GroupoidLaws.html#3414" class="Function">assoc</a> <a id="5342" class="Symbol">_</a> <a id="5344" class="Symbol">_</a> <a id="5346" class="Symbol">_</a> <a id="5348" href="Cubical.Foundations.Prelude.html#2574" class="Function Operator">⟩</a> <a id="5352" class="Symbol">(</a><a id="5353" href="Cubical.Foundations.Equiv.html#5153" class="Bound">H</a> <a id="5355" class="Symbol">(</a><a id="5356" href="Cubical.Foundations.Equiv.html#5151" class="Bound">f</a> <a id="5358" href="Cubical.Foundations.Equiv.html#5155" class="Bound">a</a><a id="5359" class="Symbol">)</a> <a id="5361" href="Cubical.Foundations.Prelude.html#1705" class="Function Operator">∙</a> <a id="5363" href="Cubical.Foundations.Equiv.html#5153" class="Bound">H</a> <a id="5365" href="Cubical.Foundations.Equiv.html#5155" class="Bound">a</a><a id="5366" class="Symbol">)</a> <a id="5368" href="Cubical.Foundations.Prelude.html#1705" class="Function Operator">∙</a> <a id="5370" href="Cubical.Foundations.Prelude.html#893" class="Function">sym</a> <a id="5374" class="Symbol">(</a><a id="5375" href="Cubical.Foundations.Equiv.html#5153" class="Bound">H</a> <a id="5377" href="Cubical.Foundations.Equiv.html#5155" class="Bound">a</a><a id="5378" class="Symbol">)</a> <a id="5385" href="Cubical.Foundations.Prelude.html#2574" class="Function Operator">≡⟨</a> <a id="5388" href="Cubical.Foundations.Prelude.html#1057" class="Function">cong</a> <a id="5393" class="Symbol">(λ</a> <a id="5396" href="Cubical.Foundations.Equiv.html#5396" class="Bound">x</a> <a id="5398" class="Symbol">→</a> <a id="5401" href="Cubical.Foundations.Equiv.html#5396" class="Bound">x</a> <a id="5403" href="Cubical.Foundations.Prelude.html#1705" class="Function Operator">∙</a> <a id="5405" class="Symbol">(</a><a id="5406" href="Cubical.Foundations.Prelude.html#893" class="Function">sym</a> <a id="5410" class="Symbol">(</a><a id="5411" href="Cubical.Foundations.Equiv.html#5153" class="Bound">H</a> <a id="5413" href="Cubical.Foundations.Equiv.html#5155" class="Bound">a</a><a id="5414" class="Symbol">)))</a> <a id="5418" class="Symbol">(</a><a id="5419" href="Cubical.Foundations.Equiv.html#4402" class="Function">homotopyNatural</a> <a id="5435" href="Cubical.Foundations.Equiv.html#5153" class="Bound">H</a> <a id="5437" class="Symbol">(</a><a id="5438" href="Cubical.Foundations.Equiv.html#5153" class="Bound">H</a> <a id="5440" href="Cubical.Foundations.Equiv.html#5155" class="Bound">a</a><a id="5441" class="Symbol">))</a> <a id="5444" href="Cubical.Foundations.Prelude.html#2574" class="Function Operator">⟩</a> <a id="5448" class="Symbol">(</a><a id="5449" href="Cubical.Foundations.Prelude.html#1057" class="Function">cong</a> <a id="5454" href="Cubical.Foundations.Equiv.html#5151" class="Bound">f</a> <a id="5456" class="Symbol">(</a><a id="5457" href="Cubical.Foundations.Equiv.html#5153" class="Bound">H</a> <a id="5459" href="Cubical.Foundations.Equiv.html#5155" class="Bound">a</a><a id="5460" class="Symbol">)</a> <a id="5462" href="Cubical.Foundations.Prelude.html#1705" class="Function Operator">∙</a> <a id="5464" href="Cubical.Foundations.Equiv.html#5153" class="Bound">H</a> <a id="5466" href="Cubical.Foundations.Equiv.html#5155" class="Bound">a</a><a id="5467" class="Symbol">)</a> <a id="5469" href="Cubical.Foundations.Prelude.html#1705" class="Function Operator">∙</a> <a id="5471" href="Cubical.Foundations.Prelude.html#893" class="Function">sym</a> <a id="5475" class="Symbol">(</a><a id="5476" href="Cubical.Foundations.Equiv.html#5153" class="Bound">H</a> <a id="5478" href="Cubical.Foundations.Equiv.html#5155" class="Bound">a</a><a id="5479" class="Symbol">)</a> <a id="5481" href="Cubical.Foundations.Prelude.html#2574" class="Function Operator">≡⟨</a> <a id="5484" href="Cubical.Foundations.Prelude.html#893" class="Function">sym</a> <a id="5488" class="Symbol">(</a><a id="5489" href="Cubical.Foundations.GroupoidLaws.html#3414" class="Function">assoc</a> <a id="5495" class="Symbol">_</a> <a id="5497" class="Symbol">_</a> <a id="5499" class="Symbol">_)</a> <a id="5502" href="Cubical.Foundations.Prelude.html#2574" class="Function Operator">⟩</a> <a id="5506" href="Cubical.Foundations.Prelude.html#1057" class="Function">cong</a> <a id="5511" href="Cubical.Foundations.Equiv.html#5151" class="Bound">f</a> <a id="5513" class="Symbol">(</a><a id="5514" href="Cubical.Foundations.Equiv.html#5153" class="Bound">H</a> <a id="5516" href="Cubical.Foundations.Equiv.html#5155" class="Bound">a</a><a id="5517" class="Symbol">)</a> <a id="5519" href="Cubical.Foundations.Prelude.html#1705" class="Function Operator">∙</a> <a id="5521" href="Cubical.Foundations.Equiv.html#5153" class="Bound">H</a> <a id="5523" href="Cubical.Foundations.Equiv.html#5155" class="Bound">a</a> <a id="5525" href="Cubical.Foundations.Prelude.html#1705" class="Function Operator">∙</a> <a id="5527" href="Cubical.Foundations.Prelude.html#893" class="Function">sym</a> <a id="5531" class="Symbol">(</a><a id="5532" href="Cubical.Foundations.Equiv.html#5153" class="Bound">H</a> <a id="5534" href="Cubical.Foundations.Equiv.html#5155" class="Bound">a</a><a id="5535" class="Symbol">)</a> <a id="5539" href="Cubical.Foundations.Prelude.html#2574" class="Function Operator">≡⟨</a> <a id="5542" href="Cubical.Foundations.Prelude.html#1057" class="Function">cong</a> <a id="5547" class="Symbol">(</a><a id="5548" href="Cubical.Foundations.Prelude.html#1705" class="Function Operator">_∙_</a> <a id="5552" class="Symbol">(</a><a id="5553" href="Cubical.Foundations.Prelude.html#1057" class="Function">cong</a> <a id="5558" href="Cubical.Foundations.Equiv.html#5151" class="Bound">f</a> <a id="5560" class="Symbol">(</a><a id="5561" href="Cubical.Foundations.Equiv.html#5153" class="Bound">H</a> <a id="5563" href="Cubical.Foundations.Equiv.html#5155" class="Bound">a</a><a id="5564" class="Symbol">)))</a> <a id="5568" class="Symbol">(</a><a id="5569" href="Cubical.Foundations.GroupoidLaws.html#1702" class="Function">rCancel</a> <a id="5577" class="Symbol">_)</a> <a id="5580" href="Cubical.Foundations.Prelude.html#2574" class="Function Operator">⟩</a> <a id="5584" href="Cubical.Foundations.Prelude.html#1057" class="Function">cong</a> <a id="5589" href="Cubical.Foundations.Equiv.html#5151" class="Bound">f</a> <a id="5591" class="Symbol">(</a><a id="5592" href="Cubical.Foundations.Equiv.html#5153" class="Bound">H</a> <a id="5594" href="Cubical.Foundations.Equiv.html#5155" class="Bound">a</a><a id="5595" class="Symbol">)</a> <a id="5597" href="Cubical.Foundations.Prelude.html#1705" class="Function Operator">∙</a> <a id="5599" href="Cubical.Foundations.Prelude.html#856" class="Function">refl</a> <a id="5617" href="Cubical.Foundations.Prelude.html#2574" class="Function Operator">≡⟨</a> <a id="5620" href="Cubical.Foundations.Prelude.html#893" class="Function">sym</a> <a id="5624" class="Symbol">(</a><a id="5625" href="Cubical.Foundations.GroupoidLaws.html#431" class="Function">rUnit</a> <a id="5631" class="Symbol">_)</a> <a id="5634" href="Cubical.Foundations.Prelude.html#2574" class="Function Operator">⟩</a> <a id="5638" href="Cubical.Foundations.Prelude.html#1057" class="Function">cong</a> <a id="5643" href="Cubical.Foundations.Equiv.html#5151" class="Bound">f</a> <a id="5645" class="Symbol">(</a><a id="5646" href="Cubical.Foundations.Equiv.html#5153" class="Bound">H</a> <a id="5648" href="Cubical.Foundations.Equiv.html#5155" class="Bound">a</a><a id="5649" class="Symbol">)</a> <a id="5651" href="Cubical.Foundations.Prelude.html#2780" class="Function Operator">∎</a> <a id="equivPi"></a><a id="5654" href="Cubical.Foundations.Equiv.html#5654" class="Function">equivPi</a> <a id="5664" class="Symbol">:</a> <a id="5666" class="Symbol">∀{</a><a id="5668" href="Cubical.Foundations.Equiv.html#5668" class="Bound">F</a> <a id="5670" class="Symbol">:</a> <a id="5672" href="Cubical.Foundations.Equiv.html#860" class="Generalizable">A</a> <a id="5674" class="Symbol">→</a> <a id="5676" class="PrimitiveType">Set</a> <a id="5680" href="Cubical.Foundations.Equiv.html#838" class="Generalizable">ℓ</a><a id="5681" class="Symbol">}</a> <a id="5683" class="Symbol">{</a><a id="5684" href="Cubical.Foundations.Equiv.html#5684" class="Bound">G</a> <a id="5686" class="Symbol">:</a> <a id="5688" href="Cubical.Foundations.Equiv.html#860" class="Generalizable">A</a> <a id="5690" class="Symbol">→</a> <a id="5692" class="PrimitiveType">Set</a> <a id="5696" href="Cubical.Foundations.Equiv.html#840" class="Generalizable">ℓ&#39;</a><a id="5698" class="Symbol">}</a> <a id="5702" class="Symbol">→</a> <a id="5704" class="Symbol">((</a><a id="5706" href="Cubical.Foundations.Equiv.html#5706" class="Bound">x</a> <a id="5708" class="Symbol">:</a> <a id="5710" href="Cubical.Foundations.Equiv.html#860" class="Generalizable">A</a><a id="5711" class="Symbol">)</a> <a id="5713" class="Symbol">→</a> <a id="5715" href="Cubical.Foundations.Equiv.html#5668" class="Bound">F</a> <a id="5717" href="Cubical.Foundations.Equiv.html#5706" class="Bound">x</a> <a id="5719" href="Agda.Builtin.Cubical.Glue.html#1051" class="Function Operator">≃</a> <a id="5721" href="Cubical.Foundations.Equiv.html#5684" class="Bound">G</a> <a id="5723" href="Cubical.Foundations.Equiv.html#5706" class="Bound">x</a><a id="5724" class="Symbol">)</a> <a id="5726" class="Symbol">→</a> <a id="5728" class="Symbol">(((</a><a id="5731" href="Cubical.Foundations.Equiv.html#5731" class="Bound">x</a> <a id="5733" class="Symbol">:</a> <a id="5735" href="Cubical.Foundations.Equiv.html#860" class="Generalizable">A</a><a id="5736" class="Symbol">)</a> <a id="5738" class="Symbol">→</a> <a id="5740" href="Cubical.Foundations.Equiv.html#5668" class="Bound">F</a> <a id="5742" href="Cubical.Foundations.Equiv.html#5731" class="Bound">x</a><a id="5743" class="Symbol">)</a> <a id="5745" href="Agda.Builtin.Cubical.Glue.html#1051" class="Function Operator">≃</a> <a id="5747" class="Symbol">((</a><a id="5749" href="Cubical.Foundations.Equiv.html#5749" class="Bound">x</a> <a id="5751" class="Symbol">:</a> <a id="5753" href="Cubical.Foundations.Equiv.html#860" class="Generalizable">A</a><a id="5754" class="Symbol">)</a> <a id="5756" class="Symbol">→</a> <a id="5758" href="Cubical.Foundations.Equiv.html#5684" class="Bound">G</a> <a id="5760" href="Cubical.Foundations.Equiv.html#5749" class="Bound">x</a><a id="5761" class="Symbol">))</a> <a id="5764" href="Cubical.Foundations.Equiv.html#5654" class="Function">equivPi</a> <a id="5772" href="Cubical.Foundations.Equiv.html#5772" class="Bound">k</a> <a id="5774" class="Symbol">.</a><a id="5775" href="Agda.Builtin.Sigma.html#252" class="Field">fst</a> <a id="5779" href="Cubical.Foundations.Equiv.html#5779" class="Bound">f</a> <a id="5781" href="Cubical.Foundations.Equiv.html#5781" class="Bound">x</a> <a id="5783" class="Symbol">=</a> <a id="5785" href="Cubical.Foundations.Equiv.html#5772" class="Bound">k</a> <a id="5787" href="Cubical.Foundations.Equiv.html#5781" class="Bound">x</a> <a id="5789" class="Symbol">.</a><a id="5790" href="Agda.Builtin.Sigma.html#252" class="Field">fst</a> <a id="5794" class="Symbol">(</a><a id="5795" href="Cubical.Foundations.Equiv.html#5779" class="Bound">f</a> <a id="5797" href="Cubical.Foundations.Equiv.html#5781" class="Bound">x</a><a id="5798" class="Symbol">)</a> <a id="5800" href="Cubical.Foundations.Equiv.html#5654" class="Function">equivPi</a> <a id="5808" href="Cubical.Foundations.Equiv.html#5808" class="Bound">k</a> <a id="5810" class="Symbol">.</a><a id="5811" href="Agda.Builtin.Sigma.html#264" class="Field">snd</a> <a id="5815" class="Symbol">.</a><a id="5816" href="Agda.Builtin.Cubical.Glue.html#971" class="Field">equiv-proof</a> <a id="5828" href="Cubical.Foundations.Equiv.html#5828" class="Bound">f</a> <a id="5832" class="Symbol">.</a><a id="5833" href="Agda.Builtin.Sigma.html#252" class="Field">fst</a> <a id="5837" class="Symbol">.</a><a id="5838" href="Agda.Builtin.Sigma.html#252" class="Field">fst</a> <a id="5842" href="Cubical.Foundations.Equiv.html#5842" class="Bound">x</a> <a id="5844" class="Symbol">=</a> <a id="5846" href="Cubical.Foundations.Equiv.html#1096" class="Function">equivCtr</a> <a id="5855" class="Symbol">(</a><a id="5856" href="Cubical.Foundations.Equiv.html#5808" class="Bound">k</a> <a id="5858" href="Cubical.Foundations.Equiv.html#5842" class="Bound">x</a><a id="5859" class="Symbol">)</a> <a id="5861" class="Symbol">(</a><a id="5862" href="Cubical.Foundations.Equiv.html#5828" class="Bound">f</a> <a id="5864" href="Cubical.Foundations.Equiv.html#5842" class="Bound">x</a><a id="5865" class="Symbol">)</a> <a id="5867" class="Symbol">.</a><a id="5868" href="Agda.Builtin.Sigma.html#252" class="Field">fst</a> <a id="5872" href="Cubical.Foundations.Equiv.html#5654" class="Function">equivPi</a> <a id="5880" href="Cubical.Foundations.Equiv.html#5880" class="Bound">k</a> <a id="5882" class="Symbol">.</a><a id="5883" href="Agda.Builtin.Sigma.html#264" class="Field">snd</a> <a id="5887" class="Symbol">.</a><a id="5888" href="Agda.Builtin.Cubical.Glue.html#971" class="Field">equiv-proof</a> <a id="5900" href="Cubical.Foundations.Equiv.html#5900" class="Bound">f</a> <a id="5904" class="Symbol">.</a><a id="5905" href="Agda.Builtin.Sigma.html#252" class="Field">fst</a> <a id="5909" class="Symbol">.</a><a id="5910" href="Agda.Builtin.Sigma.html#264" class="Field">snd</a> <a id="5914" href="Cubical.Foundations.Equiv.html#5914" class="Bound">i</a> <a id="5916" href="Cubical.Foundations.Equiv.html#5916" class="Bound">x</a> <a id="5918" class="Symbol">=</a> <a id="5920" href="Cubical.Foundations.Equiv.html#1096" class="Function">equivCtr</a> <a id="5929" class="Symbol">(</a><a id="5930" href="Cubical.Foundations.Equiv.html#5880" class="Bound">k</a> <a id="5932" href="Cubical.Foundations.Equiv.html#5916" class="Bound">x</a><a id="5933" class="Symbol">)</a> <a id="5935" class="Symbol">(</a><a id="5936" href="Cubical.Foundations.Equiv.html#5900" class="Bound">f</a> <a id="5938" href="Cubical.Foundations.Equiv.html#5916" class="Bound">x</a><a id="5939" class="Symbol">)</a> <a id="5941" class="Symbol">.</a><a id="5942" href="Agda.Builtin.Sigma.html#264" class="Field">snd</a> <a id="5946" href="Cubical.Foundations.Equiv.html#5914" class="Bound">i</a> <a id="5948" href="Cubical.Foundations.Equiv.html#5654" class="Function">equivPi</a> <a id="5956" href="Cubical.Foundations.Equiv.html#5956" class="Bound">k</a> <a id="5958" class="Symbol">.</a><a id="5959" href="Agda.Builtin.Sigma.html#264" class="Field">snd</a> <a id="5963" class="Symbol">.</a><a id="5964" href="Agda.Builtin.Cubical.Glue.html#971" class="Field">equiv-proof</a> <a id="5976" href="Cubical.Foundations.Equiv.html#5976" class="Bound">f</a> <a id="5980" class="Symbol">.</a><a id="5981" href="Agda.Builtin.Sigma.html#264" class="Field">snd</a> <a id="5985" class="Symbol">(</a><a id="5986" href="Cubical.Foundations.Equiv.html#5986" class="Bound">g</a> <a id="5988" href="Agda.Builtin.Sigma.html#236" class="InductiveConstructor Operator">,</a> <a id="5990" href="Cubical.Foundations.Equiv.html#5990" class="Bound">p</a><a id="5991" class="Symbol">)</a> <a id="5993" href="Cubical.Foundations.Equiv.html#5993" class="Bound">i</a> <a id="5995" class="Symbol">.</a><a id="5996" href="Agda.Builtin.Sigma.html#252" class="Field">fst</a> <a id="6000" href="Cubical.Foundations.Equiv.html#6000" class="Bound">x</a> <a id="6002" class="Symbol">=</a> <a id="6004" href="Cubical.Foundations.Equiv.html#1222" class="Function">equivCtrPath</a> <a id="6017" class="Symbol">(</a><a id="6018" href="Cubical.Foundations.Equiv.html#5956" class="Bound">k</a> <a id="6020" href="Cubical.Foundations.Equiv.html#6000" class="Bound">x</a><a id="6021" class="Symbol">)</a> <a id="6023" class="Symbol">(</a><a id="6024" href="Cubical.Foundations.Equiv.html#5976" class="Bound">f</a> <a id="6026" href="Cubical.Foundations.Equiv.html#6000" class="Bound">x</a><a id="6027" class="Symbol">)</a> <a id="6029" class="Symbol">(</a><a id="6030" href="Cubical.Foundations.Equiv.html#5986" class="Bound">g</a> <a id="6032" href="Cubical.Foundations.Equiv.html#6000" class="Bound">x</a> <a id="6034" href="Agda.Builtin.Sigma.html#236" class="InductiveConstructor Operator">,</a> <a id="6036" class="Symbol">λ</a> <a id="6038" href="Cubical.Foundations.Equiv.html#6038" class="Bound">j</a> <a id="6040" class="Symbol">→</a> <a id="6042" href="Cubical.Foundations.Equiv.html#5990" class="Bound">p</a> <a id="6044" href="Cubical.Foundations.Equiv.html#6038" class="Bound">j</a> <a id="6046" href="Cubical.Foundations.Equiv.html#6000" class="Bound">x</a><a id="6047" class="Symbol">)</a> <a id="6049" href="Cubical.Foundations.Equiv.html#5993" class="Bound">i</a> <a id="6051" class="Symbol">.</a><a id="6052" href="Agda.Builtin.Sigma.html#252" class="Field">fst</a> <a id="6056" href="Cubical.Foundations.Equiv.html#5654" class="Function">equivPi</a> <a id="6064" href="Cubical.Foundations.Equiv.html#6064" class="Bound">k</a> <a id="6066" class="Symbol">.</a><a id="6067" href="Agda.Builtin.Sigma.html#264" class="Field">snd</a> <a id="6071" class="Symbol">.</a><a id="6072" href="Agda.Builtin.Cubical.Glue.html#971" class="Field">equiv-proof</a> <a id="6084" href="Cubical.Foundations.Equiv.html#6084" class="Bound">f</a> <a id="6088" class="Symbol">.</a><a id="6089" href="Agda.Builtin.Sigma.html#264" class="Field">snd</a> <a id="6093" class="Symbol">(</a><a id="6094" href="Cubical.Foundations.Equiv.html#6094" class="Bound">g</a> <a id="6096" href="Agda.Builtin.Sigma.html#236" class="InductiveConstructor Operator">,</a> <a id="6098" href="Cubical.Foundations.Equiv.html#6098" class="Bound">p</a><a id="6099" class="Symbol">)</a> <a id="6101" href="Cubical.Foundations.Equiv.html#6101" class="Bound">i</a> <a id="6103" class="Symbol">.</a><a id="6104" href="Agda.Builtin.Sigma.html#264" class="Field">snd</a> <a id="6108" href="Cubical.Foundations.Equiv.html#6108" class="Bound">j</a> <a id="6110" href="Cubical.Foundations.Equiv.html#6110" class="Bound">x</a> <a id="6112" class="Symbol">=</a> <a id="6114" href="Cubical.Foundations.Equiv.html#1222" class="Function">equivCtrPath</a> <a id="6127" class="Symbol">(</a><a id="6128" href="Cubical.Foundations.Equiv.html#6064" class="Bound">k</a> <a id="6130" href="Cubical.Foundations.Equiv.html#6110" class="Bound">x</a><a id="6131" class="Symbol">)</a> <a id="6133" class="Symbol">(</a><a id="6134" href="Cubical.Foundations.Equiv.html#6084" class="Bound">f</a> <a id="6136" href="Cubical.Foundations.Equiv.html#6110" class="Bound">x</a><a id="6137" class="Symbol">)</a> <a id="6139" class="Symbol">(</a><a id="6140" href="Cubical.Foundations.Equiv.html#6094" class="Bound">g</a> <a id="6142" href="Cubical.Foundations.Equiv.html#6110" class="Bound">x</a> <a id="6144" href="Agda.Builtin.Sigma.html#236" class="InductiveConstructor Operator">,</a> <a id="6146" class="Symbol">λ</a> <a id="6148" href="Cubical.Foundations.Equiv.html#6148" class="Bound">k</a> <a id="6150" class="Symbol">→</a> <a id="6152" href="Cubical.Foundations.Equiv.html#6098" class="Bound">p</a> <a id="6154" href="Cubical.Foundations.Equiv.html#6148" class="Bound">k</a> <a id="6156" href="Cubical.Foundations.Equiv.html#6110" class="Bound">x</a><a id="6157" class="Symbol">)</a> <a id="6159" href="Cubical.Foundations.Equiv.html#6101" class="Bound">i</a> <a id="6161" class="Symbol">.</a><a id="6162" href="Agda.Builtin.Sigma.html#264" class="Field">snd</a> <a id="6166" href="Cubical.Foundations.Equiv.html#6108" class="Bound">j</a> <a id="6169" class="Comment">-- Some helpful notation:</a> <a id="_≃⟨_⟩_"></a><a id="6195" href="Cubical.Foundations.Equiv.html#6195" class="Function Operator">_≃⟨_⟩_</a> <a id="6202" class="Symbol">:</a> <a id="6204" class="Symbol">(</a><a id="6205" href="Cubical.Foundations.Equiv.html#6205" class="Bound">X</a> <a id="6207" class="Symbol">:</a> <a id="6209" href="Cubical.Core.Primitives.html#957" class="Function">Type</a> <a id="6214" href="Cubical.Foundations.Equiv.html#838" class="Generalizable">ℓ</a><a id="6215" class="Symbol">)</a> <a id="6217" class="Symbol">→</a> <a id="6219" class="Symbol">(</a><a id="6220" href="Cubical.Foundations.Equiv.html#6205" class="Bound">X</a> <a id="6222" href="Agda.Builtin.Cubical.Glue.html#1051" class="Function Operator">≃</a> <a id="6224" href="Cubical.Foundations.Equiv.html#862" class="Generalizable">B</a><a id="6225" class="Symbol">)</a> <a id="6227" class="Symbol">→</a> <a id="6229" class="Symbol">(</a><a id="6230" href="Cubical.Foundations.Equiv.html#862" class="Generalizable">B</a> <a id="6232" href="Agda.Builtin.Cubical.Glue.html#1051" class="Function Operator">≃</a> <a id="6234" href="Cubical.Foundations.Equiv.html#864" class="Generalizable">C</a><a id="6235" class="Symbol">)</a> <a id="6237" class="Symbol">→</a> <a id="6239" class="Symbol">(</a><a id="6240" href="Cubical.Foundations.Equiv.html#6205" class="Bound">X</a> <a id="6242" href="Agda.Builtin.Cubical.Glue.html#1051" class="Function Operator">≃</a> <a id="6244" href="Cubical.Foundations.Equiv.html#864" class="Generalizable">C</a><a id="6245" class="Symbol">)</a> <a id="6247" class="Symbol">_</a> <a id="6249" href="Cubical.Foundations.Equiv.html#6195" class="Function Operator">≃⟨</a> <a id="6252" href="Cubical.Foundations.Equiv.html#6252" class="Bound">f</a> <a id="6254" href="Cubical.Foundations.Equiv.html#6195" class="Function Operator">⟩</a> <a id="6256" href="Cubical.Foundations.Equiv.html#6256" class="Bound">g</a> <a id="6258" class="Symbol">=</a> <a id="6260" href="Cubical.Foundations.Equiv.html#3257" class="Function">compEquiv</a> <a id="6270" href="Cubical.Foundations.Equiv.html#6252" class="Bound">f</a> <a id="6272" href="Cubical.Foundations.Equiv.html#6256" class="Bound">g</a> <a id="_■"></a><a id="6275" href="Cubical.Foundations.Equiv.html#6275" class="Function Operator">_■</a> <a id="6278" class="Symbol">:</a> <a id="6280" class="Symbol">(</a><a id="6281" href="Cubical.Foundations.Equiv.html#6281" class="Bound">X</a> <a id="6283" class="Symbol">:</a> <a id="6285" href="Cubical.Core.Primitives.html#957" class="Function">Type</a> <a id="6290" href="Cubical.Foundations.Equiv.html#838" class="Generalizable">ℓ</a><a id="6291" class="Symbol">)</a> <a id="6293" class="Symbol">→</a> <a id="6295" class="Symbol">(</a><a id="6296" href="Cubical.Foundations.Equiv.html#6281" class="Bound">X</a> <a id="6298" href="Agda.Builtin.Cubical.Glue.html#1051" class="Function Operator">≃</a> <a id="6300" href="Cubical.Foundations.Equiv.html#6281" class="Bound">X</a><a id="6301" class="Symbol">)</a> <a id="6303" href="Cubical.Foundations.Equiv.html#6275" class="Function Operator">_■</a> <a id="6306" class="Symbol">=</a> <a id="6308" href="Cubical.Foundations.Equiv.html#1559" class="Function">idEquiv</a> <a id="6317" class="Keyword">infixr</a> <a id="6325" class="Number">0</a> <a id="6327" href="Cubical.Foundations.Equiv.html#6195" class="Function Operator">_≃⟨_⟩_</a> <a id="6334" class="Keyword">infix</a> <a id="6342" class="Number">1</a> <a id="6344" href="Cubical.Foundations.Equiv.html#6275" class="Function Operator">_■</a> </pre> {% endraw %} </body>
584.648045
2,478
0.680006
yue_Hant
0.440049
d5e5970b37e5d5b55e69109223fdd0b59bd28728
1,036
md
Markdown
estimate/add_medicine_estimate.md
trananhchuong/learn-js
17ed5e16ac09334d89b65b317a17271482921367
[ "MIT" ]
null
null
null
estimate/add_medicine_estimate.md
trananhchuong/learn-js
17ed5e16ac09334d89b65b317a17271482921367
[ "MIT" ]
null
null
null
estimate/add_medicine_estimate.md
trananhchuong/learn-js
17ed5e16ac09334d89b65b317a17271482921367
[ "MIT" ]
null
null
null
# Feature "Medicine Management" Estimate: (13 days) ### Upload file CSV (3 days) 1. Form update file CSV (2 days) 2. Integrate API update (1 day) ### Medicine setting (2 days) 1. Build UI & form edit (1 days) 2. Integrate API update (1 day) ### Add Medicine (3 days) 1. Form add medicine (3 days): - Build UI (1 day) - Validate form (1 day) - Integrate API save (1 day) ### Show list medicine (4 days): 1. Build UI display list of medicine (2 days) 2. Pagination function (1 day) 3. Update/delete medicine function (1 day) ### Testing & bug fixing (1 day) ### Medicine api backend support #### function save medicine csv: - Api save csv (excel) list medicine: - detail: save list medicine in file csv - function download template prototype #### function CRUD medicine: - Api get list units of medicine - Api add medicine - Api update medicine - Api delete medicine - #### function display list medicine to dashboard - Api get medicine list
25.268293
51
0.646718
eng_Latn
0.589929
d5e5f86abef0b3edbd719227b4036f7d5280b121
589
md
Markdown
api/Visio.Application.Visible.md
RichardCory/VBA-Docs
1240462311fb77ee051d4e8b7d7a434d7d020dd3
[ "CC-BY-4.0", "MIT" ]
2
2020-03-09T13:24:12.000Z
2020-03-09T16:19:11.000Z
api/Visio.Application.Visible.md
MarkFern/VBA-Docs
b84627cc8e24acfd336d1e9761a9ddd58f19d352
[ "CC-BY-4.0", "MIT" ]
null
null
null
api/Visio.Application.Visible.md
MarkFern/VBA-Docs
b84627cc8e24acfd336d1e9761a9ddd58f19d352
[ "CC-BY-4.0", "MIT" ]
null
null
null
--- title: Application.Visible property (Visio) keywords: vis_sdr.chm10014650 f1_keywords: - vis_sdr.chm10014650 ms.prod: visio api_name: - Visio.Application.Visible ms.assetid: 48b0a402-3655-b6aa-19da-145d2c7ceadf ms.date: 06/08/2017 localization_priority: Normal --- # Application.Visible property (Visio) Determines whether an object is visible. Read/write. ## Syntax _expression_.**Visible** _expression_ A variable that represents an [Application](./Visio.Application.md) object. ## Return value Boolean [!include[Support and feedback](~/includes/feedback-boilerplate.md)]
19
89
0.777589
eng_Latn
0.63003
d5e7e2c3845eff851d55a86f4e6bce0e04ffa1bc
1,563
md
Markdown
AplicatieThread/Readme.md
newparts/Android
f5c89a9da7b9b778de08d6f335004fdaca0c56ed
[ "MIT" ]
null
null
null
AplicatieThread/Readme.md
newparts/Android
f5c89a9da7b9b778de08d6f335004fdaca0c56ed
[ "MIT" ]
null
null
null
AplicatieThread/Readme.md
newparts/Android
f5c89a9da7b9b778de08d6f335004fdaca0c56ed
[ "MIT" ]
23
2020-01-15T15:02:39.000Z
2020-01-15T17:23:03.000Z
Nume proiect: AplicatieThread Autor: Iuliu Bakcsi Descriere: Executarea de operatii de rulare indelungata pe firul principal al aplicatiei poate provoca inghetarea interfetei aplicatiei in cateva secunde fortandu-ne sa inchidem aplicatia. Pentru a evita acest lucru trebuie sa mutam operatiile de acest tip pe un thread separat. In Android pentru a realiza acest demers avem la indemana mai multe modalitati de executie. Fie cream o clasa care extinde Thread si inlocuieste metoda rulata, fie implementam o interfata Runnable apoi implementam interfata la un nou obiect Thread. Aceste clase Java de bază construiesc bazele pentru clase precum AsyncTask, HandlerThread și ThreadPoolExecutor. O alta varianta de trimitere a codului din thread de fundal inapoi la threadul UI se poate printr-un handler care trimite un runnable la MessageQueue din threadul UI. Pentru a asocia Handlerul cu Looperul threadului principal il punem la dispozitie pe firul principal sau il transmitem pe Looper.getMainLooper la constructor. In loc sa cream un handler, putem folosi, de asemenea, metoda View classes post sau metoda runOnUiThread, care utilizeaza handler-ul principal in interiorul aplicatiei. Tehnologii folosite (inclusiv biblioteci externe): Android Studio, Java Cum se compileaza / ruleaza: AplicatieThread ruleaza un Thread in background setat la secunda. Pentru a testa functionalitatea aplicatiei am setat schimbarea aspectului unui buton dupa 5 secunde. Pentru verificarea rularii aplicatiei in timp ce este activ threadul am folosit un buton switch.
71.045455
327
0.829814
ron_Latn
0.999043
d5e8f10c1b6e8715ef66655ded265f7768b4850e
2,774
md
Markdown
documentation/3.1ReleaseNotes.md
extratone/bilge
475769a4aa338183b3ee8ca8e2e2be2c27eec29b
[ "Unlicense" ]
21
2020-11-23T16:09:03.000Z
2022-03-26T01:53:45.000Z
documentation/3.1ReleaseNotes.md
extratone/bilge
475769a4aa338183b3ee8ca8e2e2be2c27eec29b
[ "Unlicense" ]
272
2020-11-22T08:24:38.000Z
2022-03-31T00:21:37.000Z
documentation/3.1ReleaseNotes.md
extratone/bilge
475769a4aa338183b3ee8ca8e2e2be2c27eec29b
[ "Unlicense" ]
1
2021-09-14T08:18:13.000Z
2021-09-14T08:18:13.000Z
# Bilge 3.1 Release Notes Howdy Writeas/WriteFreely people! In this release, I hope I have finally delivered a fairly-polished, relatively thoroughly-tested, and _even somewhat intuitively personalizable_ style configuration for you! I'm going to (at least this once) be excruciatingly thorough in my presentation of what changes I've decided worth this release, why I set about modifying them, and precisely how they were implemented. Largely to demonstrate in-depth CSS configuration within our particular/somewhat niche CMS environment in a visual/semi-chronological medium. ## Changes * #49 - Added a super-cropped, sortolf web-optimized capture of @taroyabuki's [single-page Unicode project](https://github.com/taroyabuki/onepage-unicode-chars). * #61 - With Write.as's addition of [Rich Media Embed support](https://discuss.write.as/t/rich-media-embeds/2425) via Embedly, I originally started this Issue with the intention of going back through *the entire* *Psalms* archive and converting every supported HTML embed into the raw URL of the targets. I made some significant progress, but ultimately decided to use my time doing something else and wait to apply this treatment to older posts until/unless I have another reason to edit a given post in the future. To track the state of embeds on Writeas, going forward, see: [the embedas repo](https://github.com/embedas/go-embed), [the Gist I created](https://gist.github.com/extratone/750847103dd5cd9da52fbd51b1c2e378) (and will do my best to keep regularly updated) and *The Psalms*' updated [public test page](https://bilgel.world/test). * #24 - The Hypothes.is sidebar was being a pain in the ass because I accidentally configured it to expand immediately upon anyone landing on the page... That's been resolved. * #54 - Added CSS for code blocks including syntax highlighting. Here's how it should look: ![3.1 Code Block](https://user-images.githubusercontent.com/43663476/116017125-58831e00-a604-11eb-94b2-c7778c0aab1a.png) * #39 - Added CSS for Tables as well. (Not quite satisfied with the look but it's certainly better than it was.) ![3.1 Tables](https://user-images.githubusercontent.com/43663476/116124603-1dc3c900-a68a-11eb-8248-1f21647a8a66.png) * #125 - Added CSS for GitHub Gists since they are explicitly supported by the new media embed integration. *Definitely* have more to do, but the result should suffice for a while. ![3.1 Gists](https://user-images.githubusercontent.com/43663476/117018118-d5c02a00-acb9-11eb-87b4-177fda02e738.png) *** **For the next release**, I *really will* take care of #52 Footnotes... But it's going to be a hot minute. ![Screenshot_2021-05-01 Colophon](https://user-images.githubusercontent.com/43663476/116802031-2591cc00-aad5-11eb-9b35-bdd82ebfea6e.png)
89.483871
844
0.785508
eng_Latn
0.981834
d5e97c2e9f736531ed9c9a8f99f7a9fcca1e893d
688
md
Markdown
shared/README.md
vam-google/gapic-generator-ruby
ec712cc717307d94bfbd14085aafeed8809c7041
[ "Apache-2.0" ]
26
2018-10-29T20:07:46.000Z
2022-03-10T15:52:04.000Z
shared/README.md
vam-google/gapic-generator-ruby
ec712cc717307d94bfbd14085aafeed8809c7041
[ "Apache-2.0" ]
365
2018-11-02T21:56:39.000Z
2022-03-08T03:59:20.000Z
shared/README.md
vam-google/gapic-generator-ruby
ec712cc717307d94bfbd14085aafeed8809c7041
[ "Apache-2.0" ]
23
2018-10-31T23:45:28.000Z
2022-02-16T18:14:46.000Z
# Shared files and tasks for Ruby API Client Generator gems This directory contains the tasks and files used for the gapic generator gems. Including the repository for the shared protos and their binary files, as well as the mechanism to generate new binary files. ## Usage ### Generating Binary Input files The binary input files can be generated using the `gen` rake task: ```sh $ cd shared $ bundle update $ bundle exec rake gen ``` ## Showcase Tests This project includes a functional test suite for the Ruby GAPIC generator. See [Showcase](https://github.com/googleapis/gapic-showcase) for more details. ```sh $ cd shared $ bundle update $ bundle exec rake test:showcase ```
23.724138
79
0.761628
eng_Latn
0.98496
d5e9a63eaa4c8ec1aad00862704fedff8946ec4c
16,032
md
Markdown
docs/vs-2015/modeling/add-custom-architecture-validation-to-layer-diagrams.md
rfakhouri/visualstudio-docs.cs-cz
3d540a168c09a23b855f746696062fd9954b8dd5
[ "CC-BY-4.0", "MIT" ]
null
null
null
docs/vs-2015/modeling/add-custom-architecture-validation-to-layer-diagrams.md
rfakhouri/visualstudio-docs.cs-cz
3d540a168c09a23b855f746696062fd9954b8dd5
[ "CC-BY-4.0", "MIT" ]
null
null
null
docs/vs-2015/modeling/add-custom-architecture-validation-to-layer-diagrams.md
rfakhouri/visualstudio-docs.cs-cz
3d540a168c09a23b855f746696062fd9954b8dd5
[ "CC-BY-4.0", "MIT" ]
null
null
null
--- title: Přidání ověřování vlastní architektury do diagramů vrstev | Dokumentace Microsoftu ms.date: 11/15/2016 ms.prod: visual-studio-dev14 ms.technology: vs-ide-modeling ms.topic: conceptual helpviewer_keywords: - layer diagrams, adding custom validation ms.assetid: fed7bc08-295a-46d6-9fd8-fb537f1f75f1 caps.latest.revision: 44 author: gewarren ms.author: gewarren manager: jillfra ms.openlocfilehash: 920b15d1cd4f7ed0ec11614a50f5dd32e050995a ms.sourcegitcommit: 47eeeeadd84c879636e9d48747b615de69384356 ms.translationtype: HT ms.contentlocale: cs-CZ ms.lasthandoff: 04/23/2019 ms.locfileid: "63432399" --- # <a name="add-custom-architecture-validation-to-layer-diagrams"></a>Přidání ověření vlastní architektury do diagramů vrstev [!INCLUDE[vs2017banner](../includes/vs2017banner.md)] V sadě Visual Studio uživatelé mohou ověřit zdrojový kód v projektu proti vrstvě modelu, tak, aby mohli ověřit, že zdrojový kód odpovídá závislostem na diagramu vrstvy. Existuje standardní ověřovací algoritmus, ale můžete definovat vlastní rozšíření ověřování. Když uživatel vybere **ověřit architekturu** příkaz na diagramu vrstvy, je vyvolána metoda standardního ověření, následovaný všemi rozšířeními ověření, které byly nainstalovány. > [!NOTE] > Ověření v diagramu vrstvy není stejné jako ověření v diagramech UML. V diagramu vrstev je hlavním účelem porovnat diagram pomocí programového kódu v dalších částech tohoto řešení. Rozšíření ověření vrstvy můžete zabalit do Visual Studio integrace rozšíření (VSIX), které můžete distribuovat ostatním uživatelům aplikace Visual Studio. V rozšíření VSIX můžete umístit svůj validátor buď samostatně, nebo ho můžete zkombinovat ve stejném souboru VSIX jako další rozšíření. Měli byste psát kód validátoru ve svém vlastním projektu sady Visual Studio, není ve stejném projektu jako další rozšíření. > [!WARNING] > Po vytvoření projektu ověření zkopírujte [ukázkový kód](#example) na konci tohoto tématu a upravte, vlastních potřeb. ## <a name="requirements"></a>Požadavky Zobrazit [požadavky](../modeling/extend-layer-diagrams.md#prereqs). ## <a name="defining-a-layer-validator-in-a-new-vsix"></a>Definování ověřování vrstvy v novém souboru VSIX Nejrychlejší způsob vytváření validátoru je použití šablony projektu. To umístí kód a VSIX manifest do stejného projektu. #### <a name="to-define-an-extension-by-using-a-project-template"></a>Definování rozšíření pomocí šablony projektu 1. Vytvoření projektu v novém řešení pomocí **nový projekt** příkaz **souboru** nabídky. 2. V **nový projekt** dialogovém okně **projekty modelování**vyberte **rozšíření ověřování návrháře vrstev**. Šablona vytvoří projekt, který obsahuje malý příklad. > [!WARNING] > Do šablony makethe fungovat správně: > > - Upravte volání `LogValidationError` odebrat volitelné argumenty `errorSourceNodes` a `errorTargetNodes`. > - Pokud používáte vlastní vlastnosti, použijte aktualizace uvedené v [přidání vlastních vlastností do diagramů vrstev](../modeling/add-custom-properties-to-layer-diagrams.md). 3. Upravte kód, aby definoval vaše ověření. Další informace najdete v tématu [programování ověření](#programming). 4. Chcete-li otestovat rozšíření, naleznete v tématu [ladění ověřování vrstev](#debugging). > [!NOTE] > Vaše metoda bude volána pouze za zvláštních okolností a zarážky nebudou fungovat automaticky. Další informace najdete v tématu [ladění ověřování vrstev](#debugging). 5. Chcete-li nainstalovat rozšíření v instanci hlavní aplikace [!INCLUDE[vsprvs](../includes/vsprvs-md.md)], nebo v jiném počítači, vyhledejte **VSIX** ve *bin\\* . Zkopírujte ho do počítače, ve které chcete nainstalovat a poklepejte na něj. Chcete-li ho odinstalovat, použijte **rozšíření a aktualizace** na **nástroje** nabídky. ## <a name="adding-a-layer-validator-to-a-separate-vsix"></a>Přidání validátoru vrstvy do samostatného souboru VSIX Pokud chcete vytvořit jeden VSIX, který obsahuje validátory vrstvy, příkazy a další rozšíření, doporučujeme vytvořit jeden projekt k definování VSIX a samostatné projekty pro obslužné rutiny. Informace o dalších typech rozšíření modelu naleznete v tématu [modelů a diagramů UML rozšířit](../modeling/extend-uml-models-and-diagrams.md). #### <a name="to-add-layer-validation-to-a-separate-vsix"></a>Přidání ověření vrstvy do samostatného souboru VSIX 1. Vytvořte projekt knihovny tříd v nové nebo existující řešení sady Visual Studio. V **nový projekt** dialogové okno, klikněte na tlačítko **Visual C#** a potom klikněte na tlačítko **knihovny tříd**. Tento projekt bude obsahovat třídu ověřování vrstvy. 2. Určete nebo vytvořte VSIX projekt ve vašem řešení. Projekt VSIX obsahuje soubor s názvem **source.extension.vsixmanifest**. Pokud budete muset přidat projekt VSIX, postupujte podle těchto kroků: 1. V **nový projekt** dialogového okna zvolte **Visual C#** , **rozšiřitelnost**, **projekt VSIX**. 2. V **Průzkumníka řešení**, v místní nabídce projektu VSIX **nastavit jako spouštěný projekt**. 3. V **source.extension.vsixmanifest**v části **prostředky**, přidejte vrstvu ověřování projektu jako komponentu MEF: 1. Zvolte **nové**. 2. V **přidat nové aktivum** dialogovém okně nastavení: **Type** = **Microsoft.VisualStudio.MefComponent** **Zdroj** = **projekt v aktuálním řešení** **Projekt** = *projektu program pro ověření* 4. Musíte taky přidat ji jako vrstvu ověřování: 1. Zvolte **nové**. 2. V **přidat nové aktivum** dialogovém okně nastavení: **Type** = **Microsoft.VisualStudio.ArchitectureTools.Layer.Validator**. To však není jednou z možností v rozevíracím seznamu. Je nutné zadat z klávesnice. **Zdroj** = **projekt v aktuálním řešení** **Projekt** = *projektu program pro ověření* 5. Vraťte se do projektu ověření vrstvy a přidejte následující odkazy projektu: |**Referenční informace**|**To umožňuje provést**| |-------------------|------------------------------------| |Microsoft.VisualStudio.GraphModel.dll|Přečtěte si graf architektury| |Microsoft.VisualStudio.ArchitectureTools.Extensibility.CodeSchema.dll|Přečtěte si, že v modelu DOM kódu spojený s vrstvami| |Microsoft.VisualStudio.ArchitectureTools.Extensibility.Layer.dll|Přečtěte si model vrstva| |Microsoft.VisualStudio.ArchitectureTools.Extensibility|Číst a aktualizovat tvary a diagramy.| |System.ComponentModel.Composition|Definovat součást ověřování pomocí Managed Extensibility Framework (MEF)| |Microsoft.VisualStudio.Modeling.Sdk.[version]|Definovat rozšíření modelování| 6. Zkopírujte ukázkový kód na konci tohoto tématu do souboru třídy v projektu knihovny ověřování tak, aby obsahovala kód pro ověření. Další informace najdete v tématu [programování ověření](#programming). 7. Chcete-li otestovat rozšíření, naleznete v tématu [ladění ověřování vrstev](#debugging). > [!NOTE] > Vaše metoda bude volána pouze za zvláštních okolností a zarážky nebudou fungovat automaticky. Další informace najdete v tématu [ladění ověřování vrstev](#debugging). 8. Chcete-li nainstalovat VSIX v instanci hlavní aplikace [!INCLUDE[vsprvs](../includes/vsprvs-md.md)], nebo v jiném počítači, vyhledejte **VSIX** ve **bin** adresáře projektu VSIX. Zkopírujte ho do počítače, ve které chcete nainstalovat VSIX. Poklikejte na soubor VSIX v Průzkumníku Windows. (Průzkumník souborů v systému Windows 8.) Chcete-li ho odinstalovat, použijte **rozšíření a aktualizace** na **nástroje** nabídky. ## <a name="programming"></a> Ověření programování K definování ověření přípony vrstvy definujete třídu, která má následující vlastnosti: - Celková forma deklarace je následující: ``` using System.ComponentModel.Composition; using Microsoft.VisualStudio.ArchitectureTools.Extensibility.CodeSchema; using Microsoft.VisualStudio.ArchitectureTools.Extensibility.Layer; using Microsoft.VisualStudio.GraphModel; ... [Export(typeof(IValidateArchitectureExtension))] public partial class Validator1Extension : IValidateArchitectureExtension { public void ValidateArchitecture(Graph graph) { GraphSchema schema = graph.DocumentSchema; ... } } ``` - Pokud zjistíte chybu, můžete ji ohlásit pomocí `LogValidationError()`. > [!WARNING] > Nepoužívejte volitelné parametry `LogValidationError`. Pokud uživatel vyvolá **ověřit architekturu** příkaz nabídky, systém modulu runtime vrstvy zanalyzuje vrstvy a jejich artefakty k vytvoření grafu. Graf má čtyři části: - Modely vrstvy [!INCLUDE[vsprvs](../includes/vsprvs-md.md)] řešení, které jsou reprezentovány jako uzly a odkazy v grafu. - Kód, položky projektu a další artefakty, které jsou definovány v řešení a reprezentovány jako uzly a odkazy, které představují závislosti zjištěné v procesu analýzy. - Propojení z uzlů vrstvy do uzlů kódových artefaktů. - Uzly, které představují chyby zjištěné validátorem. Pokud byl vytvořen graf, je volána metoda standardního ověření. Po jejím dokončení, všechny metody nainstalovaných rozšíření ověřování jsou zavolány v nespecifikovaném pořadí. Graf je předán pro každou `ValidateArchitecture` metodu, která může prohledávat graf a podávat zprávy o chybách, které nalezne. > [!NOTE] > Toto není stejný jako proces ověření, který je použit pro diagramy UML a není stejný jako proces ověření, který lze použít v jazycích specifické pro doménu. Metody ověřování by neměly měnit model vrstvy nebo kód, který se ověřuje. Model grafu je definován v <xref:Microsoft.VisualStudio.GraphModel>. Jeho hlavní třídy jsou <xref:Microsoft.VisualStudio.GraphModel.GraphNode> a <xref:Microsoft.VisualStudio.GraphModel.GraphLink>. Každý uzel a každý odkaz má jednu nebo více kategorií, které určují typ prvku nebo vztahu, který představuje. Uzly typického grafu jsou následující kategorie: - Dsl.LayerModel - Dsl.Layer - Dsl.Reference - CodeSchema_Type - CodeSchema_Namespace - CodeSchema_Type - CodeSchema_Method - CodeSchema_Field - CodeSchema_Property Propojení z vrstev do prvků v kódu mají kategorii "Představuje". ## <a name="debugging"></a> Ladění ověřování Chcete-li ladit rozšíření ověřování vrstvy, stiskněte CTRL + F5. Experimentální instanci [!INCLUDE[vsprvs](../includes/vsprvs-md.md)] otevře. V tomto případě otevřete nebo vytvořte model vrstev. Tento model musí být přidružen ke kódu a musí mít alespoň jednu závislost. ### <a name="test-with-a-solution-that-contains-dependencies"></a>Otestujte řešení, která obsahuje závislosti Ověření není provedena, pokud jsou k dispozici následující vlastnosti: - Na diagramu vrstvy je alespoň jeden odkaz závislosti. - Existují vrstvy v modelu, které jsou spojeny s prvky kódu. Při prvním spuštění experimentální instance [!INCLUDE[vsprvs](../includes/vsprvs-md.md)] k testování rozšíření ověřování otevřete nebo vytvořte řešení, které má tyto vlastnosti. ### <a name="run-clean-solution-before-validate-architecture"></a>Spusťte čisté řešení před ověřením architektury Pokaždé, když aktualizujete kód pro ověření, použijte **Vyčistit řešení** příkaz **sestavení** nabídky v experimentálním řešení před otestováním příkazu ověřit. To je nezbytné, protože výsledky ověření jsou ukládány do mezipaměti. Pokud jste neaktualizovali diagram testovací vrstvy nebo jeho kód, nebude provedeno metody ověřování. ### <a name="launch-the-debugger-explicitly"></a>Spustit ladicí program explicitně Ověřování je spuštěno v samostatném procesu. Zarážky ve vaší metodě ověřování tedy nebudou aktivovány. Je nutné připojit ladicí program k procesu explicitně po spuštění ověření. Chcete-li připojit ladicí program k procesu ověřování, vložte volání `System.Diagnostics.Debugger.Launch()` na začátku své metody ověřování. Jakmile se zobrazí dialogové okno ladění, vyberte hlavní instanci [!INCLUDE[vsprvs](../includes/vsprvs-md.md)]. Alternativně můžete vložit volání do `System.Windows.Forms.MessageBox.Show()`. Když se objeví okno zpráv, přejděte na hlavní instanci [!INCLUDE[vsprvs](../includes/vsprvs-md.md)] a na **ladění** klikněte na nabídku **připojit k procesu**. Vyberte proces, který je pojmenován **Graphcmd.exe**. Experimentální instanci vždy spusťte stisknutím kombinace kláves CTRL + F5 (**spustit bez ladění**). ### <a name="deploying-a-validation-extension"></a>Nasazení rozšíření ověřování Chcete-li nainstalovat rozšíření ověřování v počítači, na kterém je nainstalován vhodnou verzi sady Visual Studio, otevřete soubor VSIX v cílovém počítači. K instalaci na počítač, na kterém [!INCLUDE[esprbuild](../includes/esprbuild-md.md)] je nainstalovaný, musíte ručně extrahovat obsah souboru VSIX do složky Extensions. Další informace najdete v tématu [nasazení rozšíření pro modelování vrstev](../modeling/deploy-a-layer-model-extension.md). ## <a name="example"></a> Příklad kódu ```csharp using System; using System.ComponentModel.Composition; using System.Globalization; using System.Linq; using System.Text.RegularExpressions; using Microsoft.VisualStudio.ArchitectureTools.Extensibility.CodeSchema; using Microsoft.VisualStudio.ArchitectureTools.Extensibility.Layer; using Microsoft.VisualStudio.GraphModel; namespace Validator3 { [Export(typeof(IValidateArchitectureExtension))] public partial class Validator3Extension : IValidateArchitectureExtension { /// <summary> /// Validate the architecture /// </summary> /// <param name="graph">The graph</param> public void ValidateArchitecture(Graph graph) { if (graph == null) throw new ArgumentNullException("graph"); // Uncomment the line below to debug this extension during validation // System.Windows.Forms.MessageBox.Show("Attach 2 to GraphCmd.exe with process id " + System.Diagnostics.Process.GetCurrentProcess().Id); // Get all layers on the diagram foreach (GraphNode layer in graph.Nodes.GetByCategory("Dsl.Layer")) { System.Threading.Thread.Sleep(100); // Get the required regex property from the layer node string regexPattern = "^[a-zA-Z]+$"; //layer[customPropertyCategory] as string; if (!string.IsNullOrEmpty(regexPattern)) { Regex regEx = new Regex(regexPattern); // Get all referenced types in this layer including those from nested layers so each // type is validated against all containing layer constraints. foreach (GraphNode containedType in layer.FindDescendants().Where(node => node.HasCategory("CodeSchema_Type"))) { // Check the type name against the required regex CodeGraphNodeIdBuilder builder = new CodeGraphNodeIdBuilder(containedType.Id, graph); string typeName = builder.Type.Name; if (!regEx.IsMatch(typeName)) { // Log an error string message = string.Format(CultureInfo.CurrentCulture, Resources.InvalidTypeNameMessage, typeName); this.LogValidationError(graph, typeName + "TypeNameError", message, GraphErrorLevel.Error, layer); } } } } } } } ``` ## <a name="see-also"></a>Viz také [Rozšíření diagramů vrstev](../modeling/extend-layer-diagrams.md)
56.650177
450
0.722867
ces_Latn
0.999718
d5e9f850412ab4aea66f15996fc31040aab09ead
3,924
md
Markdown
Labs/L02_Entropy.md
nikcleju/IT20172018
e23bcb9edff230db236c3d1d342699d95b5f7564
[ "CC-BY-4.0" ]
1
2019-06-23T05:23:21.000Z
2019-06-23T05:23:21.000Z
Labs/L02_Entropy.md
nikcleju/IT20172018
e23bcb9edff230db236c3d1d342699d95b5f7564
[ "CC-BY-4.0" ]
null
null
null
Labs/L02_Entropy.md
nikcleju/IT20172018
e23bcb9edff230db236c3d1d342699d95b5f7564
[ "CC-BY-4.0" ]
2
2019-06-23T05:23:13.000Z
2021-04-02T05:13:27.000Z
--- title: Computing entropy of data subtitle: Information Theory Lab 2 documentclass: scrartcl fontsize: 12pt --- ## Objective Understand the concepts of entropy and discrete memoryless source. Model a data file as a sequence of independent 1-byte random variables and compute its entropy. # Theoretical notions The entropy of a discrete memoryless source is defined as: $$H(S) = \sum_i p(s_i) \cdot \log_2 (p(s_i))$$ See the lecture notes for more details. # Practical issues A file is a sequence of 1-byte values (i.e. between 0 and 255). If we ignore all interdependencies in the data, we can consider the bytes as **independently drawn from a discrete memoryless source** with 256 different possible messages. * Note: this is a (simplifying) model, in reality the data values are not independent, but depending strongly on the surrounding values. The distribution of the source can be estimated by counting the number of apparitions of every byte value in the file, and dividing to the total number of bytes. For example, if the byte value 55 appears 1000 times in a 9000-byte file, its probability is $1/9$. # Exercises 1. Write a C program to compute the entropy of a file. * The program shall receive the name of the file as a command-line argument: `entropy.exe myfile.txt` * The program should follow the following steps: * Open the file for reading (in binary format) * Count the number of apparitions of every byte value: * hold an array of 256 counters, one for every possibly byte value * repeatedly read one byte from the file * increment the counter corresponding to the byte read * also store and increment a counter for the total number of bytes * Compute the probability of every byte value: divide each byte counter to the global counter * Compute the entropy, based on the probabilities * Show the result 1. Use the program to estimate the entropy of the following data files: - a Romanian language text (`textRO.txt`); - an English language text (`textRO.txt`); - an executable file (*.exe) - a JPG image file 3. Considering the computed entropy for `textRO.txt`, estimate how many bits would be sufficient to encode the file, and compare with the actual file size. Archive the file in the *.zip* format and compare the resulting size with your estimated size. 4. Modify the program to list the probabilities of the letters `a` to `z`. Compare the probabilities for Romanian and English. Are they different? For what letters? ## Implementation hints * The counters can be implemented as a vector of integers, with size 256, such that `counter[i]` is the counter for the byte value `i`. When the value `i` is read from the file, incrementing the corresponding counter is done easily with `counter[i]++`. * You will need another vector for probabilities (real values). * The following C functions may be used for file-based operations. Look up their documentation on the Internet (e.g. *cplusplus.com*, or Google search). * `fopen(...)`, to open a file for reading; * `fread(...)`, to read byte data from the file; * `fclose()`, to close the file when finished. * There is no function in C for computing $\log_2(x)$. You can compute this using the logarithm conversion formula: $$\log_2(x) = \frac{\log_b(x)}{\log_b(2)},$$ using one of the existing logarithms in C: `log()` (natural logarithm) or `log10()` (logartithm base 10). # Final questions 1. Suppose we consider pairs of two consecutive bytes as the messages of the source. What are the drawbacks of this implementation? How will the computed entropy be in this case? 2. Repeatedly reading 1 byte from a file on the disk is inefficient. Can we improve the program by reading data in larger chunks? Think / describe what needs to be changed.
43.6
117
0.7263
eng_Latn
0.998916
d5ea7bf299e48c6ab77e0aeb3b3a49805078d960
137
md
Markdown
pages/activities/twelve-bar-blues.md
music-practice-tools/music-practice-tools
183a90e3ac0b3ca05277674db9ec10758aa56fae
[ "MIT" ]
3
2020-06-28T22:10:39.000Z
2021-08-20T03:35:08.000Z
pages/activities/twelve-bar-blues.md
music-practice-tools/music-practice-tools
183a90e3ac0b3ca05277674db9ec10758aa56fae
[ "MIT" ]
1
2020-06-28T14:36:00.000Z
2020-06-29T16:39:27.000Z
pages/activities/twelve-bar-blues.md
music-practice-tools/music-practice-tools
183a90e3ac0b3ca05277674db9ec10758aa56fae
[ "MIT" ]
null
null
null
--- title: Twelve Bar Blues date: 2020-09-29 order: 2 tags: --- | I | IV | I | I | | IV | IV | I | I | | V | IV | I | V |
12.454545
23
0.416058
yue_Hant
0.433595
d5eae12d97175be0d461b62f5f39065cf1b9dbda
10,121
md
Markdown
docs/src/integrators/rk.md
JuliaGNI/GeometricIntegrators.jl
bf1ca810d75e43c1d89e4981beea35451858155a
[ "MIT" ]
6
2020-12-29T10:41:35.000Z
2022-03-21T11:48:39.000Z
docs/src/integrators/rk.md
JuliaGNI/GeometricIntegrators.jl
bf1ca810d75e43c1d89e4981beea35451858155a
[ "MIT" ]
15
2020-11-16T16:45:50.000Z
2022-03-09T17:51:11.000Z
docs/src/integrators/rk.md
michakraus/GeometricIntegrators.jl
fcca462f25a1f9d5ff0954d5d71ef7cd1389ab3e
[ "MIT" ]
2
2021-05-05T12:54:38.000Z
2021-12-17T18:19:13.000Z
```@meta CurrentModule = GeometricIntegrators.Tableaus ``` # Runge-Kutta Methods Runge-Kutta methods exploit the **Fundamental Theorem of Calculus**, which states that the solution of an initial-value problem ```math \begin{aligned} \dot{x} (t) &= f(t, x(t)) , & x(t_{n}) &= x_{n} , \end{aligned} ``` at time $t_{n+1}$ is given by ```math x (t_{n+1}) = x (t_{n}) + \int \limits_{t_{n}}^{t_{n+1}} \dot{x} (t) \, dt . ``` Runge-Kutta methods are constructed by approximating the integral by some quadrature formula with $s$ nodes $c_{i}$ and corresponding weights $b_{i}$ to obtain $x_{n+1} \approx x (t_{n+1})$ by ```math \begin{aligned} x_{n+1} &= x_{n} + h \sum \limits_{i=1}^{s} b_{i} \dot{X}_{n,i} , & \dot{X}_{n,i} &= f(t_{n} + c_{i} h, X_{n,i}) , \end{aligned} ``` where the internal stage values $X_{n,i} \approx x(t_{n} + c_{i} h)$ for $i = 1, ..., s$ are determined by another quadrature formula, approximating the integral ```math x(t_{n} + c_{i} h) = x (t_{n}) + \int \limits_{t_{n}}^{t_{n} + c_i h} \dot{x} (t) \, dt , ``` namely ```math X_{n,i} = x_{n} + h \sum \limits_{j=1}^{s} a_{ij} \dot{X}_{n,j} , ``` with the same vector field values $\dot{X}_{n,j}$ used for the computation of $x_{n+1}$. **Definition:** Runge-Kutta methods are numerical one-step methods ```math \begin{aligned} X_{n,i} &= x_{n} + h \sum \limits_{j=1}^{s} a_{ij} \, f(t_{n} + c_{j} h, X_{n,j}) , \\ x_{n+1} &= x_{n} + h \sum \limits_{j=1}^{s} b_{j} \, f(t_{n} + c_{j} h, X_{n,j}) , \end{aligned} ``` defined by a set of nodes $c_i$, weights $b_i$ and coefficients $a_{ij}$ with $i,j = 1, ..., s$, summarized in the Butcher tableau ```math \begin{array}{c|c} c & a \\ \hline & b^{T} \\ \end{array} = \begin{array}{c|cccc} c_{1} & a_{11} & a_{12} & \dots & a_{1s} \\ c_{2} & a_{21} & a_{22} & \dots & a_{2s} \\ \vdots & \vdots & \vdots & \ddots & \vdots \\ c_{s} & a_{s1} & a_{s2} & \dots & a_{ss} \\ \hline & b_{1} & b_{2} & \dots & b_{s} \\ \end{array} ``` Most properties of the methods, such as order or stability, can be analysed just by posing conditions on the Butcher tableau. ## Common Runge-Kutta Methods GeometricIntegrators.jl provides various explicit and implicit (both diagonally and fully implicit) Runge-Kutta methods. For many methods, tabulated coefficients are included, namely | Function and Aliases | Stages | Order | |:---------------------------------------------------------------|:-------|:------| | **Explicit Methods** | | | | [`TableauExplicitEuler`](@ref), [`TableauForwardEuler`](@ref) | 1 | 1 | | [`TableauExplicitMidpoint`](@ref) | 2 | 2 | | [`TableauHeun2`](@ref) | 2 | 2 | | [`TableauHeun3`](@ref) | 3 | 3 | | [`TableauKutta`](@ref), [`TableauKutta3`](@ref) | 3 | 3 | | [`TableauRalston2`](@ref) | 2 | 2 | | [`TableauRalston3`](@ref) | 3 | 3 | | [`TableauRunge`](@ref), [`TableauRunge2`](@ref) | 2 | 2 | | [`TableauRK416`](@ref), [`TableauRK4`](@ref) | 4 | 4 | | [`TableauRK438`](@ref) | 4 | 4 | | [`TableauSSPRK3`](@ref) | 3 | 3 | | **Diagonally Implicit Methods** | | | | [`TableauCrankNicolson`](@ref) | 2 | 2 | | [`TableauCrouzeix`](@ref) | 2 | 3 | | [`TableauKraaijevangerSpijker`](@ref) | 2 | 2 | | [`TableauQinZhang`](@ref) | 2 | 2 | | **Fully Implicit Methods** | | | | [`TableauImplicitEuler`](@ref), [`TableauBackwardEuler`](@ref) | 1 | 1 | | [`TableauImplicitMidpoint`](@ref) | 2 | 2 | | [`TableauSRK3`](@ref) | 3 | 4 | The coefficients of other methods are computed on-the-fly as described in the following. ## Simplifying Assumptions The construction of many Runge-Kutte methods, in particular the Gauß, Lobatto and Radau methods, relies on the so-called simplifying assumptions: ```math \begin{aligned} B(\sigma): & \sum \limits_{i=1}^{s} b_{i} c_{i}^{k-1} = \frac{1}{k} , & k = 1 , \, ... , \, \sigma , \\ % C(\eta): & \sum \limits_{j=1}^{s} a_{ij} c_{j}^{k-1} = \frac{c_{i}^{k}}{k} , & i = 1, \, ... , \, s , \; k = 1 , \, ... , \, \eta , \\ % D(\zeta): & \sum \limits_{i=1}^{s} b_{i} c_{i}^{k-1} a_{ij} = \frac{b_{j}}{k} ( 1 - c_{j}^{k} ) , & j = 1, \, ... , \, s , \; k = 1 , \, ... , \, \zeta . \end{aligned} ``` These assumptions provide order conditions for a Runge-Kutta method given by $(a_{ij}, b_{i}, c_{i})$. The condition $B(p)$ implies that the quadrature rule $(b_{i}, c_{i})$ is of order $p$. Furthermore, the following theorem holds: **Theorem (Butcher 1964)**: If the coefficients $(a_{ij}, b_{i}, c_{i})$ of a Runge-Kutta method satisfy $B(\sigma)$, $C(\eta)$, $D(\zeta)$ with $\sigma \le \eta + \zeta + 1$ and $\sigma \le 2 \eta + 2$, then the method is of order $\sigma$. ## Gauß, Lobatto and Radau Methods Gauß methods are collocation methods using the nodes and weights of Gaußian quadrature formulas. The nodes are the zeros of the shifted Legendre polynomials of degree $s$, ```math \frac{d^{s}}{dx^{s}} \big( x^{s} (x-1)^{s} \big) . ``` In a similar fashion, the nodes of the Radau I and II and the Lobatto III methods are defined as the roots of the polynomials ```math \begin{aligned} & \frac{d^{s-1}}{dx^{s-1}} \big( x^s (x-1)^{s-1} \big) && \text{(Radau I)} , \\ & \frac{d^{s-1}}{dx^{s-1}} \big( x^{s-1} (x-1)^s \big) && \text{(Radau II)} , \\ & \frac{d^{s-2}}{dx^{s-2}} \big( x^{s-1} (x-1)^{s-1} \big) && \text{(Lobatto III)} . \end{aligned} ``` The weights $b_{1}, ..., b_{s}$ are chosen such that the methods satisfy $B(\sigma)$, that is $B(s)$, for the Gauß methods, $B(s-1)$ for the Radau methods, and $B(s-2)$ for the Lobatto methods. The coefficients $a_{ij}$ for $i,j = 1, ..., s$ are obtained by the simplifying assumption $C(s)$ for the Gauß, Radau IIA and Lobatto IIIA methods, and by the simplifying assumption $D(s)$ for the Radau IA and Lobatto IIIB methods. The coefficients of the Lobatto IIIC methods are determined by setting $a_{i,1} = b_1$ for $i = 1, ..., s$ and solving the simplifying assumption $C(s-1)$, while the coefficients of the Lobatto IIIC̄ methods are determined by setting $a_{i,s} = 0$ and solving $C(s-1)$. Note that the Lobatto IIIC̄ methods are sometimes also called Lobatto III or Lobatto III*. For reasons of code symmetry we chose to stick with the less common name Lobatto IIIC̄. The Lobatto IIID and IIIE methods are obtained by combining the tableaus of the Lobatto IIIC and IIIC̄ and the Lobatto IIIA and IIIB methods, respectively, i.e., ```math \begin{aligned} a_{ij}^{D} &= \tfrac{1}{2} ( a_{ij}^{C} + a_{ij}^{C̄} ) & & \text{and} & a_{ij}^{E} &= \tfrac{1}{2} ( a_{ij}^{A} + a_{ij}^{B} ) . \end{aligned} ``` While the Lobatto IIIA, IIIB, IIIC and IIIC̄ methods are not symplectic on their own (although the Lobatto IIIA-IIIB and IIIC-IIIC̄ pairs constitute symplectic partitioned Runge-Kutta methods), the Lobatto IIID and IIIE methods are each symplectic by themselves. The Gauß methods are of order $2s$, the Radau methods or order $2s-1$ and the Lobatto methods are of order $2s-2$, with the exception of the Lobatto IIIF method. This method has been specifically constructed to be of order $2s$ as described in [[Fangzong:2016](@cite)]. The Lobatto IIIG method is constructed in a similar fashion as the Lobatto IIID and IIIE methods by averaging the coefficients of the Lobatto IIIF method with its symplectic complement, i.e., ```math a_{ij}^{G} = \tfrac{1}{2} ( a_{ij}^{F} + \bar{a}_{ij}^{F} ) , ``` where the coffiecients $\bar{a}_{ij}^{F}$ are determined by ```math \begin{aligned} b_{i} \bar{a}^{F}_{ij} + \bar{b}_{j} a^{F}_{ji} &= b_{i} \bar{b}_{j} & & \text{and} & \bar{b}_{i} &= b_{i} . \end{aligned} ``` The tableaus of all of the above methods can be computed for an arbitrary number of stages $s$ and thus to arbitrary order. ### Constructors The following methods are provided for the construction of the tableaus for the previously described methods: | Function | Method | |:--------------------------------------------|:----------------------------| | [`TableauGauss(s, T=Float64)`](@ref) | Gauß-Legendre with s stages | | [`TableauLobattoIIIA(s, T=Float64)`](@ref) | Lobatto IIIA with s stages | | [`TableauLobattoIIIB(s, T=Float64)`](@ref) | Lobatto IIIB with s stages | | [`TableauLobattoIIIC(s, T=Float64)`](@ref) | Lobatto IIIC with s stages | | [`TableauLobattoIIIC̄(s, T=Float64)`](@ref) | Lobatto IIIC̄ with s stages | | [`TableauLobattoIIID(s, T=Float64)`](@ref) | Lobatto IIID with s stages | | [`TableauLobattoIIIE(s, T=Float64)`](@ref) | Lobatto IIIE with s stages | | [`TableauLobattoIIIF(s, T=Float64)`](@ref) | Lobatto IIIF with s stages | | [`TableauLobattoIIIG(s, T=Float64)`](@ref) | Lobatto IIIG with s stages | | [`TableauRadauIA(s, T=Float64)`](@ref) | Radau IA with s stages | | [`TableauRadauIB(s, T=Float64)`](@ref) | Radau IB with s stages | | [`TableauRadauIIA(s, T=Float64)`](@ref) | Radau IIA with s stages | | [`TableauRadauIIB(s, T=Float64)`](@ref) | Radau IIB with s stages | The first argument `s` refers to the number of stages ($s \ge 1$ for Gauß and $s \ge 2$ for all other methods). The second argument specifies the number type of the coefficients. Internally, all coefficients are computed using `BigFloat` and then converted to the requested number type, defaulting to `Float64`. ## Implicit Equations **TODO**
52.440415
448
0.570596
eng_Latn
0.912031
d5eb22580225fde0189ceeb09cf5900db4959f71
1,344
md
Markdown
miniprogram/src/article/0-0.md
viewerw/harmonicaHomeCloud
878c0935f70668fe8b474b0b912ce8e2fe034efc
[ "MIT" ]
null
null
null
miniprogram/src/article/0-0.md
viewerw/harmonicaHomeCloud
878c0935f70668fe8b474b0b912ce8e2fe034efc
[ "MIT" ]
2
2021-03-09T15:30:51.000Z
2021-05-10T08:57:40.000Z
miniprogram/src/article/0-0.md
viewerw/harmonicaHomeCloud
878c0935f70668fe8b474b0b912ce8e2fe034efc
[ "MIT" ]
null
null
null
简谱起源于 18 世纪的法国,在中国得到了最广泛的传播和使用。\n\n 简谱是一种简易的记谱法,即利用一些数字记号或符号,将音的长短、高低、强弱、顺序记录下来。\n\n 一份用简谱记录的谱子,应该包括调号、拍号、音符和小节、小节线、终止线等最基本的记号或符号。下面我们以贝多芬的《欢乐颂》为例来认识简谱的基本构成。\n\n 欢乐颂![](cloud://production-emhx9.7072-production-emhx9/article/WechatIMG333.jpeg)\n\n ## 一、简谱的基本构成\n\n #### 1.调号\n\n 调号是用以确定歌曲、乐曲音高的符号。调号写在简谱的左上方。它表示该曲应该用哪个“调”来演唱或演奏(关于调的内容,在本书第七章《调与调式》会有详细讲解)。 \n\n 不同的调用不同的调号标记。如《欢乐颂》的调号 1 = C,表示这是一首用 C 调演奏的曲子。同理,当一首简谱曲子为 D 调时,其调号就为 1 = D。一首简谱曲子为 E 调时,其调号就为 1 = E。以此类推。 \n\n #### 2.拍号 \n\n 拍号就是节拍记号,用分数的形式来标记,通常写在简谱首页左上角调号之后。 \n\n 如:《欢乐颂》简谱拍号为 4/4。拍号的读法是先读分母,再读分子,分母表示以几分音符为一拍,分子表示每一小节有几拍(关于节拍、拍子的内容,在本书第四章《节拍与节奏》会有详细讲解)。 \n\n 拍号的位置还有另一种写法,在乐曲中间需要变换拍子的时候,则需要在所变换拍子的那一小节写出新的拍号,直到再次变换拍子。 \n\n 例: \n\n ![](cloud://production-emhx9.7072-production-emhx9/article/WechatIMG349.jpeg) \n\n #### 3.音符 \n\n 音符是记录音的高低、长短的符号,在简谱中用阿拉伯数字 1、 2、 3、 4、 5、 6、 7 来表示。音符之间通过一定的节奏、节拍组织起来,便构成了一段具有音乐形象的旋律。(关于音符的内容,在本书第三章《音符与休止符》会有详细讲解。) \n\n #### 4.小节、小节线 \n\n 音乐按照一定的规律组成的最小的节拍组织就是小节,这个有规律的节拍组织依次循环往复组成了一首乐曲。在两个小节之间的竖线叫小节线。(关于小节、小节线的内容,在本书第四章《节拍与节奏》会有详细讲解。) \n\n #### 5.常用记号 \n\n 为了更科学、规范地记谱,简谱中有很多常用的记号,如省略记号、反复记号等。在《欢乐颂》里的连线记号就是在简谱中经常出现的记号之一。(关于常用记号的内容,在本书第八章《常用记号》会有讲解。) \n\n 当连线记号记在相同音高的音符上时,称为“延音线”,表示只需要唱、奏第一个音,时值为连线内所有音符的时值总和。当连线记号记在不同音高的音符上时,称为“圆滑线”,表示连线内的音符要唱、奏得连贯。 \n\n ![](cloud://production-emhx9.7072-production-emhx9/article/WechatIMG350.jpeg)
30.545455
263
0.764881
yue_Hant
0.295214
d5eb7cecac582a67499bfe60644e2cf5c8fc85f8
796
md
Markdown
content/user-manual/app-service-manage/service-rollback.md
lxm/rainbond-docs
ef88a8b9de6d868ab32deb960bbaba4d56bda2c2
[ "CC-BY-4.0" ]
null
null
null
content/user-manual/app-service-manage/service-rollback.md
lxm/rainbond-docs
ef88a8b9de6d868ab32deb960bbaba4d56bda2c2
[ "CC-BY-4.0" ]
null
null
null
content/user-manual/app-service-manage/service-rollback.md
lxm/rainbond-docs
ef88a8b9de6d868ab32deb960bbaba4d56bda2c2
[ "CC-BY-4.0" ]
null
null
null
--- title: 服务版本管理 description: Rainbond服务版本的管理和版本回滚文档 hidden: true weight: 5018 --- ### 服务版本管理 服务每次成功部署后,都会生成一个服务版本,每个版本对应一次代码提交(基于源码创建),或者一个镜像版本(Docker 镜像创建) 通过 `构建版本管理` 功能,可以将服务回滚到指定版本,Rainbond 默认保留服务构建成功的版本。 <img src="https://static.goodrain.com/images/docs/3.6/user-manual/manage/app-rollback01.png" width="100%" /> 版本管理中可以查询当前运行的版本,构建的历史版本和版本构建成功率。每一个版本都可以追溯代码提交记录或源镜像记录。 ### 版本回滚 ### <img src="https://static.goodrain.com/images/docs/3.6/user-manual/manage/app-rollback02.png" width="100%" /> 服务可以随时回滚到历史构建成功的版本,Rainbond回滚操作与升级类似,采用滚动的方式进行。 {{% notice info %}} - 多节点服务回滚操作采用滚动升级方式,因此时不会影响服务,但会有较短的时间同时存在 2 种版本的情况。 - Rainbond 5.X版本中对于服务回滚只会回滚代码和镜像运行环境,对服务配置(端口、环境变量、内存设置等)不会回滚到历史状态。 - 若你需要将应用整体回滚到历史的状态,包括持久化数据,请使用[应用备份与恢复机制](/user-manual/app-manage/app-backup/) {{% /notice %}}
24.875
112
0.767588
yue_Hant
0.736702
d5ebedd553458676ae69cb0f509a7e7666f898bb
3,825
md
Markdown
docs/_code/profiling.md
tsmanner/cpp-conditional-stream
48191b17e83db7a3113dcd0c5ba7965d26562235
[ "MIT" ]
null
null
null
docs/_code/profiling.md
tsmanner/cpp-conditional-stream
48191b17e83db7a3113dcd0c5ba7965d26562235
[ "MIT" ]
3
2021-05-19T16:40:32.000Z
2021-05-22T00:27:44.000Z
docs/_code/profiling.md
tsmanner/cpp-conditional-stream
48191b17e83db7a3113dcd0c5ba7965d26562235
[ "MIT" ]
null
null
null
--- title: Profiling Results classes: wide --- | System | CPU | Memory | Disk | `ofstream`<br>`prof.txt` | `ofstream`<br>`/dev/null` | `ostringstream` | "blackhole"<br>`streambuf` | `ofstream`<br>failbit | `ConditionalOStream` |-------------|---------------|--------|------------------------------|--------------------------|---------------------------|-----------------|----------------------------|-----------------------|---------------------- | WSL2 Debian | i7-8565U | 32GB | Intel M.2 SSDPEKK- F512G8L | 10.7935s | 7.78622s | 7.37819s | 5.94589s | 2.66578s | 0.538241s | WSL2 Debian | Ryzen 7 3800X | 32GB | Sabrent M.2 Rocket 4.0 500GB | 7.74714s | 6.69068s | 5.84889s | 4.17527s | 2.11662s | 0.550667s | NixOS 20.09 | Ryzen 7 1700 | 32GB | PNY CS1311 240GB SSD | 9.88139s | 7.96852s | 7.35156s | 5.09152s | 2.67259s | 0.684588s ## Test Function **tests/profiling/profile.h** ```cpp #include <chrono> #include <iostream> // 100,000,000 constexpr unsigned iterations = 100000000; template <typename StreamType> void time_streaming(StreamType &stream) { auto value = "hello world\n"; auto t0 = std::chrono::steady_clock::now(); for (unsigned i = 0; i < iterations; ++i) { stream << i << ": " << value; } auto t1 = std::chrono::steady_clock::now(); std::chrono::duration<long double> dt = t1 - t0; std::cout << "Streaming took " << dt.count() << "s\n"; } ``` ## Stream to a file **tests/profiling/ofstream.cpp** ```cpp #include <iostream> #include <fstream> #include "conditional_ostream.h" #include "profile.h" int main() { auto stream = std::ofstream("ofstream.cpp.txt", std::ios::trunc); time_streaming(stream); return 0; } ``` ## Stream to `/dev/null` **tests/profiling/devnull.cpp** ```cpp #include <iostream> #include <fstream> #include "conditional_ostream.h" #include "profile.h" int main() { auto stream = std::ofstream("/dev/null", std::ios::out); time_streaming(stream); return 0; } ``` ## Stream to a `std::ostringstream` **tests/profiling/ostringstream.cpp** ```cpp #include <iostream> #include <sstream> #include "conditional_ostream.h" #include "profile.h" int main() { std::ostringstream stream; time_streaming(stream); return 0; } ``` ## Stream to a "blackhole" This includes an implementation of a `std::streambuf` that ignores all input, borrowed from [Deduplicator on the Code Review Stack Exchange](https://codereview.stackexchange.com/a/260936). **tests/profiling/nullbuffer.cpp** ```cpp #include <iostream> #include <iterator> #include <streambuf> #include "conditional_ostream.h" #include "profile.h" class blackhole_buf final : public std::streambuf { char_type target[64]; std::streamsize xsputn(const char_type*, std::streamsize n) { return n; } int_type overflow(int_type = traits_type::eof()) { setp(target, std::end(target)); return 0; } }; int main() { blackhole_buf buf {}; std::ostream stream { &buf }; time_streaming(stream); return 0; } ``` ## Stream with failbit set **tests/profiling/failbit.cpp** ```cpp #include <iostream> #include <fstream> #include "conditional_ostream.h" #include "profile.h" int main() { auto stream = std::ofstream(); stream.setstate(std::ios::failbit); time_streaming(stream); return 0; } ``` ## Stream to a `ConditionalOStream` **tests/profiling/conditional.cpp** ```cpp #include <iostream> #include "conditional_ostream.h" #include "profile.h" int main() { ConditionalOStream stream {}; time_streaming(stream); return 0; } ```
25.331126
219
0.583007
eng_Latn
0.466153
d5ec6f17d857abf547cc40343f30596aaf0962ca
2,466
md
Markdown
articles/automation/change-tracking/manage-scope-configurations.md
doracpphp/azure-docs.ja-jp
92d3ca6b9bf4bdae67568790c3c429c0533ca9e9
[ "CC-BY-4.0", "MIT" ]
161
2017-08-28T07:45:11.000Z
2022-03-01T06:53:52.000Z
articles/automation/change-tracking/manage-scope-configurations.md
doracpphp/azure-docs.ja-jp
92d3ca6b9bf4bdae67568790c3c429c0533ca9e9
[ "CC-BY-4.0", "MIT" ]
6,139
2017-06-27T14:43:19.000Z
2022-01-14T05:54:35.000Z
articles/automation/change-tracking/manage-scope-configurations.md
doracpphp/azure-docs.ja-jp
92d3ca6b9bf4bdae67568790c3c429c0533ca9e9
[ "CC-BY-4.0", "MIT" ]
456
2017-06-27T13:57:03.000Z
2022-03-30T08:41:01.000Z
--- title: Azure Automation の Change Tracking とインベントリのデプロイのスコープを制限する description: この記事では、スコープ構成を使用して、Change Tracking とインベントリのデプロイのスコープを制限する方法について説明します。 services: automation ms.subservice: change-inventory-management ms.date: 10/14/2020 ms.topic: conceptual ms.openlocfilehash: 6eb9a20920f0a340491459f0875fc85b90dfa193 ms.sourcegitcommit: f28ebb95ae9aaaff3f87d8388a09b41e0b3445b5 ms.translationtype: HT ms.contentlocale: ja-JP ms.lasthandoff: 03/29/2021 ms.locfileid: "92209170" --- # <a name="limit-change-tracking-and-inventory-deployment-scope"></a>Change Tracking とインベントリのデプロイのスコープを制限する この記事では、[Change Tracking とインベントリ](overview.md)機能を使用して VM に変更をデプロイする際のスコープ構成の操作方法について説明します。 詳細については、「[Azure Monitor での監視ソリューションのターゲット設定 (プレビュー)](../../azure-monitor/insights/solution-targeting.md)」を参照してください。 ## <a name="about-scope-configurations"></a>スコープ構成について スコープ構成は、Change Tracking とインベントリのスコープを特定のコンピューターに限定するために使用される、1 つ以上の保存された検索条件 (クエリ) のグループです。 スコープ構成は、有効にするコンピューターを対象として設定するために、Log Analytics ワークスペース内で使用されます。 この機能から変更にコンピューターを追加すると、ワークスペース内の保存した検索条件にも、そのコンピューターが追加されます。 ## <a name="set-the-scope-limit"></a>スコープの制限を設定する Change Tracking とインベントリのデプロイのスコープを制限するには、次のようにします。 1. [Azure portal](https://portal.azure.com) にサインインします。 2. Azure Portal で **[すべてのサービス]** を選択します。 リソースの一覧で、「**Automation**」と入力します。 入力を始めると、入力内容に基づいて一覧から候補が絞り込まれます。 **[Automation アカウント]** を選択します。 3. Automation アカウントの一覧で、変更履歴とインベントリを有効にしたときに選択したアカウントを選択します。 4. お使いの Automation アカウントで、 **[関連リソース]** の下にある **[リンクされたワークスペース]** を選択します。 5. **[ワークスペースに移動]** をクリックします。 6. **[Workspace Data Sources]\(ワークスペース データ ソース\)** の下の **[Scope Configurations (Preview)]\(スコープ構成 (プレビュー)\)** を選択します。 7. `MicrosoftDefaultScopeConfig-ChangeTracking` スコープ構成の右側にある省略記号を選択し、 **[編集]** をクリックします。 8. 編集ペインで **[コンピューター グループの選択]** を選択します。 [コンピューター グループ] ペインに、スコープ構成を作成するために使用された、保存された検索条件が表示されます。 Change Tracking とインベントリで使用される保存済みの検索条件は次のとおりです。 |名前 |カテゴリ |エイリアス | |---------|---------|---------| |MicrosoftDefaultComputerGroup | ChangeTracking | ChangeTracking__MicrosoftDefaultComputerGroup | 9. 保存した検索条件を選択して、グループの設定に使用されるクエリを表示および編集します。 次の図は、クエリとその結果を示しています。 ![保存した検索条件](media/manage-scope-configurations/logsearch.png) ## <a name="next-steps"></a>次のステップ * 変更履歴とインベントリの操作については、[変更履歴とインベントリの管理](manage-change-tracking.md)に関するページを参照してください。 * この機能に関する一般的な問題のトラブルシューティングについては、「[Change Tracking と Inventory に関する問題のトラブルシューティング](../troubleshoot/change-tracking.md)」を参照してください。
44.836364
217
0.784672
yue_Hant
0.756323
d5ecd06ee78b1e8baddc21ab52a78038cc3dfea9
20
md
Markdown
contributions/hoggerel.md
20172104246/ncov-report
ccb62054d580e2bbe95ef6d5593fbbe84d13d657
[ "Apache-2.0" ]
3
2020-12-03T06:55:47.000Z
2020-12-20T12:36:54.000Z
contributions/hoggerel.md
20172104246/ncov-report
ccb62054d580e2bbe95ef6d5593fbbe84d13d657
[ "Apache-2.0" ]
null
null
null
contributions/hoggerel.md
20172104246/ncov-report
ccb62054d580e2bbe95ef6d5593fbbe84d13d657
[ "Apache-2.0" ]
null
null
null
This is my first pr
10
19
0.75
eng_Latn
1.00001
d5ecfdfc2de4e57af43bcb21218107da5b37f176
386
md
Markdown
README.md
FrauBSD/ssd_report
f30ad0feceb257ca874dc8c0a0a508c1a1defb2a
[ "BSD-2-Clause" ]
10
2018-06-18T03:41:44.000Z
2022-02-24T17:51:42.000Z
README.md
FrauBSD/ssd_report
f30ad0feceb257ca874dc8c0a0a508c1a1defb2a
[ "BSD-2-Clause" ]
3
2018-09-04T08:52:35.000Z
2022-02-05T21:26:40.000Z
README.md
FrauBSD/ssd_report
f30ad0feceb257ca874dc8c0a0a508c1a1defb2a
[ "BSD-2-Clause" ]
null
null
null
[//]: # ($FrauBSD: ssd_report/README.md 2018-07-04 06:46:46 +0000 freebsdfrau $) # Welcome to [FrauBSD.org/ssd\_report](https://fraubsd.org/ssd_report)! Report SSD health by looking at SMART data ## Foreword The following is required before using `git commit` in this project. > `$ .git-hooks/install.sh` This will ensure the FrauBSD keyword is expanded/updated for each commit.
25.733333
80
0.735751
eng_Latn
0.955191
d5ed294b45c8490aae585834b5677cf76aea011c
2,400
md
Markdown
Cryptography/We want Nudes instead of Nukes/README.md
Nhaatj/CTFlearn-Writeups
5defbc3357fec0699552cec4e9e508896af04075
[ "MIT" ]
1
2021-03-23T07:24:53.000Z
2021-03-23T07:24:53.000Z
Cryptography/We want Nudes instead of Nukes/README.md
Nhaatj/CTFlearn-Writeups
5defbc3357fec0699552cec4e9e508896af04075
[ "MIT" ]
null
null
null
Cryptography/We want Nudes instead of Nukes/README.md
Nhaatj/CTFlearn-Writeups
5defbc3357fec0699552cec4e9e508896af04075
[ "MIT" ]
null
null
null
## We want Nudes instead of Nukes The main idea of getting the flag is to alter the IV before the decryption happens, so it gives a different, altered result of our choice. #### Step-1: The description of the challenge: ``` Donald has gone completely crazy. To prevent world chaos, you kidnapped him. Right before the kidnapping he tried to send one encrypted message to his wife Melania. Luckily you intercepted the message. Donald admits that he used AES-CBC encryption - a block cipher operating with a block length of 16 bytes. (here represented by 32 characters). The message was: {391e95a15847cfd95ecee8f7fe7efd66,8473dcb86bc12c6b6087619c00b6657e} The format contains first the Initialization vector(IV) and then the cipher text(c) separated by a colon all wrapped in curly braces. {IV,c} After torturing him by stealing his hairpiece, he tells you the plain text of the message is: FIRE_NUKES_MELA! As a passionate hacker you of course try to take advantage of this message. To get the flag alter the message that Melania will read: SEND_NUDES_MELA! Submit the flag in the format: flag{IV,c} The characters are hexlified, and one byte is represented by two characters; e.g. the string "84" represents the character "F" of the message and so on. ``` #### Step-2: We know the IV (Initialization Vector) and the original plaintext, so if we reverse the `XOR` operation, the state of the ciphertext can be known right before it being finally decrypted with the IV. The main idea being `(Output) XOR (Initial Vector) = Plaintext` (Where Output is AES' output right before the XOR) #### Step-3: I wrote this script `exploit.py` that does the XOR operation with the given hashes to us. ```py IV = bytearray.fromhex("391e95a15847cfd95ecee8f7fe7efd66") CT = bytearray.fromhex("8473dcb86bc12c6b6087619c00b6657e") # Hashes from the description of challenge ORIGINAL_MESSAGE = bytearray.fromhex( "464952455f4e554b45535f4d454c4121") # FIRE_NUKES_MELA! ALTERED_MESSAGE = bytearray.fromhex( "53454e445f4e554445535f4d454c4121") # SEND_NUDES_MELA! ALTERED_IV = bytearray() # XOR for i in range(16): ALTERED_IV.append(ALTERED_MESSAGE[i] ^ ORIGINAL_MESSAGE[i] ^ IV[i]) print(f'Flag: flag{{{ALTERED_IV.hex()},{CT.hex()}}}') ``` When we run this as `python3 exploit.py` #### Step-4: Finally, the flag becomes: `flag{2c1289a05847cfd65ecee8f7fe7efd66,8473dcb86bc12c6b6087619c00b6657e}`
46.153846
345
0.77375
eng_Latn
0.989675
d5ee98e7e9786ade75b184c584fc567b33d203dd
6,849
md
Markdown
README.md
wakakajp/LefexWork
b76739681abadc0dacc5f33d42dd63a3dfd8d9d6
[ "MIT" ]
1
2018-08-20T06:45:00.000Z
2018-08-20T06:45:00.000Z
README.md
wakakajp/LefexWork
b76739681abadc0dacc5f33d42dd63a3dfd8d9d6
[ "MIT" ]
null
null
null
README.md
wakakajp/LefexWork
b76739681abadc0dacc5f33d42dd63a3dfd8d9d6
[ "MIT" ]
null
null
null
[@Lefe_x](https://weibo.com/5953150140) 就是我,正在做 [#iOS知识小集#](https://github.com/southpeak/iOS-tech-set) ,喜欢分享,努力做一名极客。喜欢分享写作。一名 **iOSer**。**喜欢 Node,微信小程序和前端**。一旦有新的文章,我会第一时间同步到这里和微博。 ### iOS * [为什么我还在写 CocoaPods 的教程](https://github.com/lefex/LefexWork/blob/master/blog/iOS/%E4%B8%BA%E4%BB%80%E4%B9%88%E6%88%91%E8%BF%98%E5%9C%A8%E5%86%99-CocoaPods-%E7%9A%84%E6%95%99%E7%A8%8B.md) * [以不一样的方式理解SDWebImage](https://github.com/lefex/LefexWork/blob/master/blog/iOS/%E4%BB%A5%E4%B8%8D%E4%B8%80%E6%A0%B7%E7%9A%84%E6%96%B9%E5%BC%8F%E7%90%86%E8%A7%A3SDWebImage.md) * [导出微信iOS数据库](https://github.com/lefex/LefexWork/blob/master/blog/iOS/%E5%AF%BC%E5%87%BA%E5%BE%AE%E4%BF%A1iOS%E6%95%B0%E6%8D%AE%E5%BA%93.md) * [读懂「 唱吧KTVHTTPCache 」设计思想](https://github.com/lefex/LefexWork/blob/master/blog/iOS/%E8%AF%BB%E6%87%82%E3%80%8C-%E5%94%B1%E5%90%A7KTVHTTPCache-%E3%80%8D%E8%AE%BE%E8%AE%A1%E6%80%9D%E6%83%B3.md) * [给 iOS 开发者的 RxSwift(一)](https://github.com/lefex/LefexWork/blob/master/blog/iOS/%E7%BB%99-iOS-%E5%BC%80%E5%8F%91%E8%80%85%E7%9A%84-RxSwift%EF%BC%88%E4%B8%80%EF%BC%89.md) * [【iOS-国际化】如何把国际化时需要3天的工作量缩减到10分钟](https://github.com/lefex/LefexWork/blob/master/blog/iOS/%E3%80%90iOS-%E5%9B%BD%E9%99%85%E5%8C%96%E3%80%91%E5%A6%82%E4%BD%95%E6%8A%8A%E5%9B%BD%E9%99%85%E5%8C%96%E6%97%B6%E9%9C%80%E8%A6%813%E5%A4%A9%E7%9A%84%E5%B7%A5%E4%BD%9C%E9%87%8F%E7%BC%A9%E5%87%8F%E5%88%B010%E5%88%86%E9%92%9F.md) * [使用 Xcode 工具更快的发现 Bug](https://github.com/lefex/LefexWork/blob/master/blog/iOS/%E4%BD%BF%E7%94%A8-Xcode-%E5%B7%A5%E5%85%B7%E6%9B%B4%E5%BF%AB%E7%9A%84%E5%8F%91%E7%8E%B0-Bug.md) * [iOS 11 这个特性你知道吗?](https://github.com/lefex/LefexWork/blob/master/blog/iOS/iOS-11-%E8%BF%99%E4%B8%AA%E7%89%B9%E6%80%A7%E4%BD%A0%E7%9F%A5%E9%81%93%E5%90%97%EF%BC%9F.md) * [iOS 11 适配看这篇还不够?](https://github.com/lefex/LefexWork/blob/master/blog/iOS/iOS-11-%E9%80%82%E9%85%8D%E7%9C%8B%E8%BF%99%E7%AF%87%E8%BF%98%E4%B8%8D%E5%A4%9F%EF%BC%9F.md) * [使用 Promise 优雅滴避免回调地狱](https://github.com/lefex/LefexWork/blob/master/blog/iOS/Promise.md) * [事件响应](https://github.com/lefex/LefexWork/blob/master/blog/iOS-tips/%E4%BA%8B%E4%BB%B6%E5%93%8D%E5%BA%94.md) * [+ (void)load 和 + (void)initialize](https://github.com/lefex/LefexWork/blob/master/blog/iOS-tips/%2B-(void)load-%E5%92%8C-%2B-(void)initialize.md) * [密语项目的一点思考,可能会帮到你](https://github.com/lefex/LefexWork/blob/master/blog/iOS/%E5%AF%86%E8%AF%AD%E9%A1%B9%E7%9B%AE%E7%9A%84%E4%B8%80%E7%82%B9%E6%80%9D%E8%80%83%EF%BC%8C%E5%8F%AF%E8%83%BD%E4%BC%9A%E5%B8%AE%E5%88%B0%E4%BD%A0.md) * [工作中常用的工具](https://github.com/lefex/LefexWork/blob/master/blog/common/%E5%B7%A5%E4%BD%9C%E4%B8%AD%E5%B8%B8%E7%94%A8%E7%9A%84%E5%B7%A5%E5%85%B7.md) * [Block 是如何实现的?如何避免循环引用?](https://github.com/lefex/LefexWork/blob/master/blog/iOS/Block-%E6%98%AF%E5%A6%82%E4%BD%95%E5%AE%9E%E7%8E%B0%E7%9A%84%EF%BC%9F%E5%A6%82%E4%BD%95%E9%81%BF%E5%85%8D%E5%BE%AA%E7%8E%AF%E5%BC%95%E7%94%A8%EF%BC%9F.md) * [Block-使用总结](https://github.com/lefex/LefexWork/blob/master/blog/iOS/Block-%E4%BD%BF%E7%94%A8%E6%80%BB%E7%BB%93.md) * [Sqlite的使用](https://github.com/lefex/LefexWork/blob/master/blog/common/Sqlite%E7%9A%84%E4%BD%BF%E7%94%A8.md) * [JSPatch 使用中遇到的问题汇总](https://github.com/lefex/LefexWork/blob/master/blog/iOS/JSPatch-%E4%BD%BF%E7%94%A8%E4%B8%AD%E9%81%87%E5%88%B0%E7%9A%84%E9%97%AE%E9%A2%98%E6%B1%87%E6%80%BB.md) ### 微信小程序 * [从零开始部署小程序服务器(腾讯云)](https://github.com/lefex/LefexWork/blob/master/blog/miniProgram/%E4%BB%8E%E9%9B%B6%E5%BC%80%E5%A7%8B%E9%83%A8%E7%BD%B2%E5%B0%8F%E7%A8%8B%E5%BA%8F%E6%9C%8D%E5%8A%A1%E5%99%A8%EF%BC%88%E8%85%BE%E8%AE%AF%E4%BA%91%EF%BC%89.md) * [从iOS来看微信小程序](https://github.com/lefex/LefexWork/blob/master/blog/miniProgram/%E4%BB%8EiOS%E6%9D%A5%E7%9C%8B%E5%BE%AE%E4%BF%A1%E5%B0%8F%E7%A8%8B%E5%BA%8F.md) * [微信小程序开发遇到的坑](http://www.jianshu.com/p/c75333656eae) * [从微信小程序看待FlexBox布局](https://github.com/lefex/LefexWork/blob/master/blog/miniProgram/%E4%BB%8E%E5%BE%AE%E4%BF%A1%E5%B0%8F%E7%A8%8B%E5%BA%8F%E7%9C%8B%E5%BE%85FlexBox%E5%B8%83%E5%B1%80.md) * [微信小程序开发遇到的坑](https://github.com/lefex/LefexWork/blob/master/blog/miniProgram/%E5%BE%AE%E4%BF%A1%E5%B0%8F%E7%A8%8B%E5%BA%8F%E5%BC%80%E5%8F%91%E9%81%87%E5%88%B0%E7%9A%84%E5%9D%91.md) * [微信小程序开发(一):准备](https://github.com/lefex/LefexWork/blob/master/blog/miniProgram/%E5%BE%AE%E4%BF%A1%E5%B0%8F%E7%A8%8B%E5%BA%8F%E5%BC%80%E5%8F%91(%E4%B8%80)%EF%BC%9A%E5%87%86%E5%A4%87.md) ### Python * [更人性化的找出 iOS 中未使用的图](https://github.com/lefex/LefexWork/blob/master/blog/python/%E6%9B%B4%E4%BA%BA%E6%80%A7%E5%8C%96%E7%9A%84%E6%89%BE%E5%87%BA-iOS-%E4%B8%AD%E6%9C%AA%E4%BD%BF%E7%94%A8%E7%9A%84%E5%9B%BE.md) * [如何 【1秒】找出国际化文件(en.lproj/Localizable.strings)语法错误](https://github.com/lefex/LefexWork/blob/master/blog/python/%E5%A6%82%E4%BD%95%20%E3%80%901%E7%A7%92%E3%80%91%E6%89%BE%E5%87%BA%E5%9B%BD%E9%99%85%E5%8C%96%E6%96%87%E4%BB%B6.md) * [如何找出国际化文件(xxxx.strings)中未国际化的文件](https://github.com/lefex/LefexWork/blob/master/blog/python/%E5%A6%82%E4%BD%95%E6%89%BE%E5%87%BA%E5%9B%BD%E9%99%85%E5%8C%96%E6%96%87%E4%BB%B6(xxxx.strings)%E4%B8%AD%E6%9C%AA%E5%9B%BD%E9%99%85%E5%8C%96%E7%9A%84%E6%96%87%E4%BB%B6.md) ### Node * [MongoDB数据库](https://github.com/lefex/LefexWork/blob/master/blog/node/MongoDB%E6%95%B0%E6%8D%AE%E5%BA%93.md) * [MySQL](https://github.com/lefex/LefexWork/blob/master/blog/node/MySQL.md) * [Node 开篇介绍](https://github.com/lefex/LefexWork/blob/master/blog/node/Node-%E5%BC%80%E7%AF%87%E4%BB%8B%E7%BB%8D.md) ### C++ * [iOS 开发者应该掌握些 C++ 知识](https://github.com/lefex/LefexWork/blob/master/blog/C%2B%2B/iOS%20%E5%BC%80%E5%8F%91%E8%80%85%E5%BA%94%E8%AF%A5%E6%8E%8C%E6%8F%A1%E4%BA%9B%20C%2B%2B%20%E7%9F%A5%E8%AF%86.md) ### 其它 * [Linux 命令与 Shell 脚本](https://github.com/lefex/LefexWork/blob/master/blog/shell/Linux%20%E4%B8%8E%20Shell%20%E8%84%9A%E6%9C%AC.md) * [JS Tips](https://github.com/lefex/LefexWork/blob/master/blog/node/JS-Tips.md) * [RN开发(一):准备](https://github.com/lefex/LefexWork/blob/master/blog/reactNative/RN%E5%BC%80%E5%8F%91(%E4%B8%80)%EF%BC%9A%E5%87%86%E5%A4%87.md) * [你已经会用 Git 了吗?](https://github.com/lefex/LefexWork/blob/master/blog/git/%E4%BD%A0%E5%B7%B2%E7%BB%8F%E4%BC%9A%E7%94%A8-Git-%E4%BA%86%E5%90%97%EF%BC%9F.md) * [Git的使用](https://github.com/lefex/LefexWork/blob/master/blog/git/Git%E7%9A%84%E4%BD%BF%E7%94%A8.md) * [iOS git 规范](https://github.com/lefex/LefexWork/blob/master/blog/git/iOS%20git%20%E8%A7%84%E8%8C%83.md) * [【图片+例子】学习正则表达式](http://www.jianshu.com/p/75115e9b2101) * [iTerm 提高你的开发效率](https://github.com/lefex/LefexWork/blob/master/blog/common/iTerm--%E6%8F%90%E9%AB%98%E4%BD%A0%E7%9A%84%E5%BC%80%E5%8F%91%E6%95%88%E7%8E%87.md) ### 开源项目 * [TCZLocalizableTool](https://github.com/lefex/TCZLocalizableTool) * [PMFMDB的使用](https://github.com/lefex/LefexWork/blob/master/blog/iOS/PMFMDB%E7%9A%84%E4%BD%BF%E7%94%A8.md) ### 总结 * [其实可以走的更远](https://github.com/lefex/LefexWork/blob/master/blog/summary/%E5%85%B6%E5%AE%9E%E5%8F%AF%E4%BB%A5%E8%B5%B0%E7%9A%84%E6%9B%B4%E8%BF%9C.md)
96.464789
319
0.712075
yue_Hant
0.605416
6aceeb9cfdd05cddc4ed3f9e2b979e26cc273267
479
md
Markdown
HTM/ProgrGuide/Functions/ICurrentView/MovePrevious.md
LianaKh/as4x-docs
08a6b99daf956442c3cf534596767568982462b2
[ "MIT" ]
null
null
null
HTM/ProgrGuide/Functions/ICurrentView/MovePrevious.md
LianaKh/as4x-docs
08a6b99daf956442c3cf534596767568982462b2
[ "MIT" ]
14
2019-05-30T10:47:31.000Z
2022-03-29T14:11:37.000Z
HTM/ProgrGuide/Functions/ICurrentView/MovePrevious.md
LianaKh/as4x-docs
08a6b99daf956442c3cf534596767568982462b2
[ "MIT" ]
13
2019-05-30T07:27:22.000Z
2022-03-29T13:59:56.000Z
--- layout: page title: "ICurrentView/MovePrevious" --- # MovePrevious մեթոդ [См. также](../ICurrentView.md) Օրինակ [Применяется к](../ICurrentView.md) Նշորդը տեղափոխում է նախորդ տող։ Մեթոդը առաջին տողի վրա կանչելուց [BOF](BOF.md)-ը դառնում է `True`, իսկ [BOF](BOF.md)-ի `True` արժեքի դեպքում կանչելուց առաջանում է սխալ։ ## Շարահյուսություն ``` vb object.MovePrevious ``` Բաղադրիչներն են՝ | Պարամետր | Նկարագրություն | |--|--| | object | Ընթացիկ դիտելու ձևի հղում։ |
18.423077
168
0.701461
hye_Armn
0.945912
6acf8082f1b951f6a1c1c956c9afe51a5aa16385
61
md
Markdown
README.md
wcrbrm/k8s-golang-template
6f3cfd86ff18ccdf6de9b7f533551a1e144d75c5
[ "MIT" ]
null
null
null
README.md
wcrbrm/k8s-golang-template
6f3cfd86ff18ccdf6de9b7f533551a1e144d75c5
[ "MIT" ]
null
null
null
README.md
wcrbrm/k8s-golang-template
6f3cfd86ff18ccdf6de9b7f533551a1e144d75c5
[ "MIT" ]
null
null
null
# k8s-golang-template Golang application helm charts for K8s
20.333333
38
0.819672
eng_Latn
0.685797
6acfae3050ae7737ff89e0806fd2424f44f49e91
897
md
Markdown
AlchemyInsights/activate-microsoft-forms.md
isabella232/OfficeDocs-AlchemyInsights-pr.pt-PT
90231c80c97b1b9ed11265c724351335698b74e2
[ "CC-BY-4.0", "MIT" ]
1
2020-05-19T19:07:32.000Z
2020-05-19T19:07:32.000Z
AlchemyInsights/activate-microsoft-forms.md
MicrosoftDocs/OfficeDocs-AlchemyInsights-pr.pt-PT
0ab4044e197cacbe672dd3619523546c471d53c2
[ "CC-BY-4.0", "MIT" ]
4
2020-06-02T23:16:58.000Z
2022-02-09T06:59:55.000Z
AlchemyInsights/activate-microsoft-forms.md
isabella232/OfficeDocs-AlchemyInsights-pr.pt-PT
90231c80c97b1b9ed11265c724351335698b74e2
[ "CC-BY-4.0", "MIT" ]
4
2019-10-09T20:26:06.000Z
2021-10-09T10:39:37.000Z
--- title: Ativar o Microsoft Forms ms.author: pebaum author: pebaum manager: scotv ms.audience: Admin ms.topic: article ms.service: o365-administration ROBOTS: NOINDEX, NOFOLLOW localization_priority: Normal ms.collection: Adm_O365 ms.custom: - "2544" - "9000672" ms.openlocfilehash: 7b6e76994ae9fe0f95cb8ebcb1ea18bcb373b2bc4ed22c63ef17f7a896b6b5c6 ms.sourcegitcommit: b5f7da89a650d2915dc652449623c78be6247175 ms.translationtype: MT ms.contentlocale: pt-PT ms.lasthandoff: 08/05/2021 ms.locfileid: "53937940" --- # <a name="activate-microsoft-forms-for-an-organization"></a>Ativar o Microsoft Forms para uma organização Um administrador pode ativos ou desligá-los para a organização. Saiba como [verificar a ativação da licença e o estado do Azure CollabDBService](https://support.office.com/article/Turn-off-or-turn-on-Microsoft-Forms-8dcbf3ab-f2d6-459a-b8be-8d9892132a43) para o seu inquilino.
37.375
275
0.816054
por_Latn
0.450402
6acfbf53c4240466e069a233ba3fac52cbf8d789
10,337
md
Markdown
articles/data-lake-store/data-lake-store-archive-eventhub-capture.md
changeworld/azure-docs.it-
34f70ff6964ec4f6f1a08527526e214fdefbe12a
[ "CC-BY-4.0", "MIT" ]
1
2017-06-06T22:50:05.000Z
2017-06-06T22:50:05.000Z
articles/data-lake-store/data-lake-store-archive-eventhub-capture.md
changeworld/azure-docs.it-
34f70ff6964ec4f6f1a08527526e214fdefbe12a
[ "CC-BY-4.0", "MIT" ]
41
2016-11-21T14:37:50.000Z
2017-06-14T20:46:01.000Z
articles/data-lake-store/data-lake-store-archive-eventhub-capture.md
changeworld/azure-docs.it-
34f70ff6964ec4f6f1a08527526e214fdefbe12a
[ "CC-BY-4.0", "MIT" ]
7
2016-11-16T18:13:16.000Z
2017-06-26T10:37:55.000Z
--- title: Acquisire i dati da Hub eventi a Azure Data Lake Storage Gen1 description: Informazioni su come usare Azure Data Lake Storage Gen1 per acquisire i dati ricevuti da Hub eventi di Azure. Per iniziare, verificare i prerequisiti. author: twooley ms.service: data-lake-store ms.topic: how-to ms.date: 05/29/2018 ms.author: twooley ms.openlocfilehash: 8be242369ecae2c809a38428284c9ddcad440e3f ms.sourcegitcommit: f28ebb95ae9aaaff3f87d8388a09b41e0b3445b5 ms.translationtype: MT ms.contentlocale: it-IT ms.lasthandoff: 03/29/2021 ms.locfileid: "91578241" --- # <a name="use-azure-data-lake-storage-gen1-to-capture-data-from-event-hubs"></a>Usare Azure Data Lake Storage Gen1 per acquisire dati da Hub eventi Informazioni su come usare Azure Data Lake Storage Gen1 per acquisire i dati ricevuti da Hub eventi di Azure. ## <a name="prerequisites"></a>Prerequisiti * **Una sottoscrizione di Azure**. Vedere [Ottenere una versione di prova gratuita di Azure](https://azure.microsoft.com/pricing/free-trial/). * **Un account Azure Data Lake Storage Gen1**. Per istruzioni su come crearne uno, vedere [Iniziare a usare Azure Data Lake Storage Gen1](data-lake-store-get-started-portal.md). * **Uno spazio dei nomi di hub eventi**. Per istruzioni, vedere [Creare uno spazio dei nomi di Hub eventi](../event-hubs/event-hubs-create.md#create-an-event-hubs-namespace). Assicurarsi che l'account Data Lake Storage Gen1 e lo spazio dei nomi di Hub eventi si trovino nella stessa sottoscrizione di Azure. ## <a name="assign-permissions-to-event-hubs"></a>Assegnare autorizzazioni a Hub eventi In questa sezione si crea una cartella nell'account in cui si vuole acquisire i dati da Hub eventi. È anche possibile assegnare autorizzazioni a Hub eventi, in modo da consentire la scrittura di dati in un account Data Lake Storage Gen1. 1. Aprire l'account Data Lake Storage Gen1 in cui si desidera acquisire i dati da Hub eventi e quindi fare clic su **Esplora dati**. ![Esplora dati Data Lake Storage Gen1](./media/data-lake-store-archive-eventhub-capture/data-lake-store-open-data-explorer.png "Esplora dati Data Lake Storage Gen1") 1. Fare clic su **Nuova cartella** e quindi immettere un nome per la cartella in cui si vuole acquisire i dati. ![Crea una nuova cartella in Data Lake Storage Gen1](./media/data-lake-store-archive-eventhub-capture/data-lake-store-create-new-folder.png "Crea una nuova cartella in Data Lake Storage Gen1") 1. Assegnare le autorizzazioni alla radice di Data Lake Storage Gen1. a. Fare clic su **Esplora dati**, selezionare la radice dell'account Data Lake Storage Gen1 e quindi fare clic su **Accesso**. ![Screenshot di Esplora dati con la radice dell'account e l'opzione di accesso denominata.](./media/data-lake-store-archive-eventhub-capture/data-lake-store-assign-permissions-to-root.png "Assegnare le autorizzazioni per la radice Data Lake Storage Gen1") b. In **Accesso** fare clic su **Aggiungi**, fare clic su **Selezionare l'utente o il gruppo** e quindi cercare `Microsoft.EventHubs`. ![Screenshot della pagina di accesso con l'opzione Aggiungi, selezionare l'opzione utente o gruppo e l'opzione Microsoft Eventhubs denominata.](./media/data-lake-store-archive-eventhub-capture/data-lake-store-assign-eventhub-sp.png "Assegnare le autorizzazioni per la radice Data Lake Storage Gen1") Fare clic su **Seleziona**. c. In **Assegna autorizzazioni** fare clic su **Selezionare le autorizzazioni**. Impostare **Autorizzazioni** su **Esegui**. Impostare **Aggiungi a** su **Questa cartella e tutti gli elementi figlio**. Impostare **Aggiungi come** su **Una voce di autorizzazione di accesso e una voce di autorizzazione predefinita**. > [!IMPORTANT] > Questo è un semplice metodo per garantire l'accesso alla cartella di destinazione quando si crea una nuova gerarchia di cartelle per l'acquisizione dei dati ricevuti da Hub eventi di Azure. Tuttavia, l'aggiunta delle autorizzazioni a tutti gli elementi figlio di una cartella di livello principale con molti file e cartelle figlio può richiedere molto tempo. Se la cartella radice contiene un numero elevato di file e cartelle, potrebbe essere più veloce aggiungere le autorizzazioni di **esecuzione** per `Microsoft.EventHubs` singolarmente a ogni cartella nel percorso della cartella di destinazione finale. ![Screenshot della sezione assegna autorizzazioni con l'opzione seleziona autorizzazioni denominata. La sezione selezionare le autorizzazioni si trova accanto all'opzione Esegui, Aggiungi a e Aggiungi come.](./media/data-lake-store-archive-eventhub-capture/data-lake-store-assign-eventhub-sp1.png "Assegnare le autorizzazioni per la radice Data Lake Storage Gen1") Fare clic su **OK**. 1. Assegnare le autorizzazioni per la cartella nell'account Data Lake Storage Gen1 in cui si desidera acquisire i dati. a. Fare clic su **Esplora dati**, selezionare la cartella nell'account Data Lake Storage Gen1 e quindi fare clic su **Accesso**. ![Screenshot di Esplora dati con una cartella nell'account e l'opzione di accesso denominata out.](./media/data-lake-store-archive-eventhub-capture/data-lake-store-assign-permissions-to-folder.png "Assegnare le autorizzazioni per la cartella Data Lake Storage Gen1") b. In **Accesso** fare clic su **Aggiungi**, fare clic su **Selezionare l'utente o il gruppo** e quindi cercare `Microsoft.EventHubs`. ![Screenshot della pagina di accesso a Esplora dati con l'opzione Aggiungi, selezionare l'opzione utente o gruppo e l'opzione Microsoft Eventhubs denominata.](./media/data-lake-store-archive-eventhub-capture/data-lake-store-assign-eventhub-sp.png "Assegnare le autorizzazioni per la cartella Data Lake Storage Gen1") Fare clic su **Seleziona**. c. In **Assegna autorizzazioni** fare clic su **Selezionare le autorizzazioni**. Impostare **Autorizzazioni** su **Leggi, Scrivi** ed **Esegui**. Impostare **Aggiungi a** su **Questa cartella e tutti gli elementi figlio**. Impostare infine **Aggiungi come** su **Una voce di autorizzazione di accesso e una voce di autorizzazione predefinita**. ![Screenshot della sezione assegna autorizzazioni con l'opzione seleziona autorizzazioni denominata. La sezione seleziona autorizzazioni si trova accanto a essa con le opzioni di lettura, scrittura ed esecuzione, l'opzione Aggiungi a e l'opzione Aggiungi come denominata.](./media/data-lake-store-archive-eventhub-capture/data-lake-store-assign-eventhub-sp-folder.png "Assegnare le autorizzazioni per la cartella Data Lake Storage Gen1") Fare clic su **OK**. ## <a name="configure-event-hubs-to-capture-data-to-data-lake-storage-gen1"></a>Configurare Hub eventi per acquisire i dati in Data Lake Storage Gen1 In questa sezione si crea un hub eventi in uno spazio dei nomi di Hub eventi. È anche possibile configurare l'Hub eventi per acquisire i dati in un account Azure Data Lake Storage Gen1. Questa sezione presuppone che sia già stato creato uno spazio dei nomi di Hub eventi. 1. Dal riquadro **Panoramica** dello spazio dei nomi di Hub eventi fare clic su **+ Hub eventi**. ![Screenshot del riquadro Panoramica con l'opzione Hub eventi denominata.](./media/data-lake-store-archive-eventhub-capture/data-lake-store-create-event-hub.png "Creare un hub eventi") 1. Fornire i valori seguenti per configurare Hub eventi per acquisire i dati in Data Lake Storage Gen1. ![Screenshot della finestra di dialogo Crea Hub eventi con la casella di testo nome, l'opzione di acquisizione, l'opzione del provider di acquisizione, l'opzione Seleziona Data Lake Store e l'opzione percorso Data Lake denominata out.](./media/data-lake-store-archive-eventhub-capture/data-lake-store-configure-eventhub.png "Creare un hub eventi") a. Specificare un nome per l'hub eventi. b. Per questa esercitazione, impostare **Numero di partizioni** e **Conservazione messaggi** sui valori predefiniti. c. Impostare **Acquisisci** su **Sì**. Impostare **Intervallo di tempo** (frequenza di acquisizione) e **Intervallo dimensioni** (dimensioni dei dati da acquisire). d. Per **Provider di acquisizione** selezionare **Azure Data Lake Store** e quindi selezionare l'account di Data Lake Storage Gen1 creato in precedenza. Per il **Percorso Data Lake**, immettere il nome della cartella creata nell'account Data Lake Storage Gen1. È sufficiente fornire il percorso relativo della cartella. e. Lasciare il valore predefinito per **Formati dei nomi file di acquisizione di esempio**. Questa opzione controlla la struttura di cartelle che viene creata nella cartella di acquisizione. f. Fare clic su **Crea**. ## <a name="test-the-setup"></a>Testare la configurazione È ora possibile testare la soluzione inviando i dati all'hub di eventi di Azure. Seguire le istruzioni in [Inviare eventi a Hub eventi di Azure](../event-hubs/event-hubs-dotnet-framework-getstarted-send.md). Una volta avviato l'invio dei dati, verranno visualizzati i dati riflessi in Data Lake Storage Gen1 con la struttura di cartelle specificata. Ad esempio, viene visualizzata in Data Lake Storage Gen 1 una struttura di cartelle,come illustrato nello screenshot seguente. ![Dati EventHub di esempio in Data Lake Storage Gen1](./media/data-lake-store-archive-eventhub-capture/data-lake-store-eventhub-data-sample.png "Dati EventHub di esempio in Data Lake Storage Gen1") > [!NOTE] > Anche se non ci sono messaggi in arrivo in Hub eventi, Hub eventi scrive file vuoti con solo le intestazioni nell'account Data Lake Storage Gen1. I file vengono scritti con lo stesso intervallo di tempo specificato durante la creazione di Hub di eventi. > > ## <a name="analyze-data-in-data-lake-storage-gen1"></a>Analizzare i dati in Data Lake Storage Gen1 Una volta che i dati si trovano in Data Lake Storage Gen1, è possibile eseguire processi di analisi per elaborarli ed esaminarli. Vedere l'[esempio USQL Avro](https://github.com/Azure/usql/tree/master/Examples/AvroExamples) relativo a come eseguire questa operazione usando Azure Data Lake Analytics. ## <a name="see-also"></a>Vedi anche * [Proteggere i dati in Data Lake Storage Gen1](data-lake-store-secure-data.md) * [Copiare i dati dai BLOB di Archiviazione di Azure a Data Lake Storage Gen1](data-lake-store-copy-data-azure-storage-blob.md)
84.04065
618
0.774983
ita_Latn
0.996185
6acfd637218829d00debb957571ff3721fd6d7ff
35,849
md
Markdown
frameworks/cassandra/README.md
krisis/dcos-commons
715d27f3e43a5e25b8ecb4beed97333b136fdd9a
[ "Apache-2.0" ]
1
2021-01-06T21:14:00.000Z
2021-01-06T21:14:00.000Z
frameworks/cassandra/README.md
krisis/dcos-commons
715d27f3e43a5e25b8ecb4beed97333b136fdd9a
[ "Apache-2.0" ]
null
null
null
frameworks/cassandra/README.md
krisis/dcos-commons
715d27f3e43a5e25b8ecb4beed97333b136fdd9a
[ "Apache-2.0" ]
null
null
null
# DC/OS Apache Cassandra Service Documentation ## Table of Contents - [Overview](#overview) - Features - [Quick Start](#quick-start) - [Installing and Customizing](#installing-and-customizing) - Prerequisites - Installation from the DC/OS CLI - Installation from the DC/OS Web Interface - Service Settings - Service Name - Data Center - Rack - Remote Seeds - Backup/Restore Strategy - Cassandra Settings - Node Settings - Node Count - CPU - Memory - JMX Port - Storage Port - SSL Storage Port - Native Transport Port - RPC Port - Disk Type - Placement Constraints - [Uninstalling](#uninstalling) - [Connecting Clients](#connecting-clients) - Discovering Endpoints - Connecting Clients to Endpoints - [Managing](#managing) - Updating Configuration - Adding a Node - Resizing a Node - Updating Placement Constraints - Restarting a Node - Replacing a Node - Configuring Multi-data-center Deployments - [Disaster Recovery](#disaster-recovery) - Backup - Restore - [Troubleshooting](#troubleshooting) - Accessing Logs - [Limitations](#limitations) - Accessibility of nodes in multi-data-center deployments - [Support](#support) - Supported Versions <a name="overview"></a> # Overview DC/OS Apache Cassandra is an automated service that makes it easy to deploy and manage Apache Cassandra on [DC/OS](https://mesosphere.com/product/). Apache Cassandra is a distributed NoSQL database offering high availability, fault tolerance and scalability across data centers. For more information on Apache Cassandra, see the Apache Cassandra [documentation](http://cassandra.apache.org/doc/latest/). <a name="features"></a> ## Features * Easy installation * Simple horizontal scaling of Cassandra nodes * Straightforward backup and restore of data out of the box * Multi-datacenter replication support * Rack-aware scheduling with placement constraints <a name="quick-start"></a> # Quick Start 1. Install DC/OS on your cluster. See [the documentation](https://docs.mesosphere.com/latest/administration/installing/) for instructions. 1. If you are using open source DC/OS, install DC/OS Apache Cassandra with the following command from the DC/OS CLI. If you are using Enterprise DC/OS, you may need to follow additional instructions. See the Install and Customize section for more information. ``` dcos package install beta-cassandra ``` You can also install DC/OS Apache Cassandra from [the DC/OS web interface](https://docs.mesosphere.com/latest/usage/webinterface/). 1. The service will now deploy with a default configuration. You can monitor its deployment via the Services UI in the DC/OS Dashboard. 1. Connect a client to the DC/OS Apache Cassandra service. ``` dcos beta-cassandra endpoints ["node"] dcos beta-cassandra endpoints node { "address": [ "10.0.1.125:9042", "10.0.2.152:9042", "10.0.1.22:9042" ], "dns": [ "node-1-server.cassandra.mesos:9042", "node-0-server.cassandra.mesos:9042", "node-2-server.cassandra.mesos:9042" ], "vip": "node.cassandra.l4lb.thisdcos.directory:9042" } ``` 1. Write some data to your cluster: ``` dcos node ssh --master-proxy --leader core@ip-10-0-6-153 ~ docker run -it cassandra:3.0.13 cqlsh node-0-server.cassandra.mesos > CREATE KEYSPACE space1 WITH REPLICATION = { 'class' : 'SimpleStrategy', 'replication_factor' : 3 }; > USE space1; > CREATE TABLE testtable1 (key varchar, value varchar, PRIMARY KEY(key)); > INSERT INTO space1.testtable1(key, value) VALUES('testkey1', 'testvalue1'); > SELECT * FROM testtable1; ``` <a name="installing-and-customizing"></a> # Installing and Customizing The default DC/OS Apache Cassandra installation provides reasonable defaults for trying out the service, but may not be sufficient for production use. You may require different configurations depending on the context of the deployment. ## Prerequisities - If you are using Enterprise DC/OS, you may [need to provision a service account](https://docs.mesosphere.com/1.9/security/service-auth/custom-service-auth/) before installing DC/OS Apache Cassandra. Only someone with `superuser` permission can create the service account. - `strict` [security mode](https://docs.mesosphere.com/1.9/administration/installing/custom/configuration-parameters/#security) requires a service account. - In `permissive` security mode a service account is optional. - `disabled` security mode does not require a service account. - Your cluster must have at least 3 private nodes. ## Installation from the DC/OS CLI To start a basic test cluster, run the following command on the DC/OS CLI. Enterprise DC/OS users must follow additional instructions. [More information about installing DC/OS Apache Cassandra on Enterprise DC/OS](https://docs.mesosphere.com/1.9/security/service-auth/custom-service-auth/). ```shell dcos package install beta-cassandra ``` You can specify a custom configuration in an `options.json` file and pass it to `dcos package install` using the `--options` parameter. ``` $ dcos package install beta-cassandra --options=<options>.json ``` For more information about building the `options.json` file, see the [DC/OS documentation](https://docs.mesosphere.com/latest/usage/managing-services/config-universe-service/) for service configuration access. ## Installation from the DC/OS Web Interface You can [install DC/OS Apache Cassandra from the DC/OS web interface](https://docs.mesosphere.com/1.9/usage/managing-services/install/). If you install DC/OS Apache Cassandra from the web interface, you must install the DC/OS Apache Cassandra CLI subcommands separately. From the DC/OS CLI, enter: ```bash dcos package install beta-cassandra --cli ``` Choose `ADVANCED INSTALLATION` to perform a custom installation. <a name="service-settings"></a> ## Service Settings <a name="service-name"></a> ### Service Name You must configure each instance of DC/OS Apache Cassandra in a given DC/OS cluster with a different service name. You can configure the service name in the **service** section of the advanced installation section of the DC/OS web interface. The default service name (used in many examples here) is `cassandra`. * **In DC/OS CLI options.json**: `name`: string (default: `cassandra`) * **DC/OS web interface**: The service name cannot be changed after the cluster has started. <a name="data-center"></a> ### Data Center You can configure the name of the logical data center that this Cassandra cluster runs in. This sets the `dc` property in the `cassandra-rackdc.properties` file. * **In DC/OS CLI options.json**: `data_center`: string (default: `dc1`) * **DC/OS web interface**: `CASSANDRA_LOCATION_DATA_CENTER`: `string` <a name="rack"></a> ### Rack You can configure the name of the rack that this Cassandra cluster runs in. This sets the `rack` property in the `cassandra-rackdc.properties` file. * **In DC/OS CLI options.json**: `rack`: string (default: `rac1`) * **DC/OS web interface**: `CASSANDRA_LOCATION_RACK`: `string` <a name="remote-seeds"></a> ### Remote Seeds You can configure the remote seeds from another Cassandra cluster that this cluster should communicate with to establish cross-data-center replication. This should be a comma-separated list of node hostnames, such as `node-0-server.cassandra.mesos,node-1-server.cassandra.mesos`. For more information on multi-data-center configuration, see [Configuring Multi-data-center Deployments](#configuring-multi-data-center-deployments). * **In DC/OS CLI options.json**: `remote_seeds`: string (default: `""`) * **DC/OS web interface**: `TASKCFG_ALL_REMOTE_SEEDS`: `string` <a name="backup-restore-strategy"></a> ### Backup/Restore Strategy You can configure whether the creation, transfer, and restoration of backups occurs in serial or in parallel across nodes. This option must be set to either `serial` or `parallel`. Running backups and restores in parallel has the potential to saturate your network. For this reason, we recommend that you use the default configuration for backup strategy. * **In DC/OS CLI options.json**: `backup_restore_strategy`: string (default: `"serial"`) * **DC/OS web interface**: `BACKUP_RESTORE_STRATEGY`: `string` <a name="cassandra-settings"></a> ## Cassandra Settings You can configure most of the settings exposed in Apache Cassandra's `cassandra.yaml` configuration file in DC/OS Apache Cassandra. For information about these settings, see the Apache Cassandra [documentation](http://cassandra.apache.org/doc/latest/configuration/cassandra_config_file.html). Settings that you can configure include: * `cluster_name` * `num_tokens` * `hinted_handoff_enabled` * `max_hint_window_in_ms` * `hinted_handoff_throttle_in_kb` * `max_hints_delivery_threads` * `hints_flush_period_in_ms` * `max_hints_file_size_in_mb` * `batchlog_replay_throttle_in_kb` * `authenticator` * `authorizer` * `partitioner` * `key_cache_save_period` * `row_cache_size_in_mb` * `row_cache_save_period` * `commitlog_sync_period_in_ms` * `commitlog_segment_size_in_mb` * `commitlog_total_space_in_mb` * `concurrent_reads` * `concurrent_writes` * `concurrent_counter_writes` * `concurrent_materialized_view_writes` * `memtable_allocation_type` * `index_summary_resize_interval_in_minutes` * `storage_port` * `ssl_storage_port` * `start_native_transport` * `native_transport_port` * `start_rpc` * `rpc_port` * `rpc_keepalive` * `thrift_framed_transport_size_in_mb` * `tombstone_warn_threshold` * `tombstone_failure_threshold` * `column_index_size_in_kb` * `batch_size_warn_threshold_in_kb` * `batch_size_fail_threshold_in_kb` * `compaction_throughput_mb_per_sec` * `sstable_preemptive_open_interval_in_mb` * `read_request_timeout_in_ms` * `range_request_timeout_in_ms` * `write_request_timeout_in_ms` * `counter_write_request_timeout_in_ms` * `internode_compression` * `cas_contention_timeout_in_ms` * `truncate_request_timeout_in_ms` * `request_timeout_in_ms` * `dynamic_snitch_update_interval_in_ms` * `dynamic_snitch_reset_interval_in_ms` * `dynamic_snitch_badness_threshold` * `roles_update_interval_in_ms` * `permissions_update_interval_in_ms` * `key_cache_keys_to_save` * `row_cache_keys_to_save` * `counter_cache_keys_to_save` * `file_cache_size_in_mb` * `memtable_heap_space_in_mb` * `memtable_offheap_space_in_mb` * `memtable_cleanup_threshold` * `memtable_flush_writers` * `listen_on_broadcast_address` * `internode_authenticator` * `native_transport_max_threads` * `native_transport_max_frame_size_in_mb` * `native_transport_max_concurrent_connections` * `native_transport_max_concurrent_connections_per_ip` * `rpc_min_threads` * `rpc_max_threads` * `rpc_send_buff_size_in_bytes` * `rpc_recv_buff_size_in_bytes` * `concurrent_compactors` * `stream_throughput_outbound_megabits_per_sec` * `inter_dc_stream_throughput_outbound_megabits_per_sec` * `streaming_socket_timeout_in_ms` * `phi_convict_threshold` * `buffer_pool_use_heap_if_exhausted` * `disk_optimization_strategy` * `max_value_size_in_mb` * `otc_coalescing_strategy` <a name="node-settings"></a> ## Node Settings Adjust the following settings to customize the amount of resources allocated to each node. DC/OS Apache Cassandra's [system requirements](http://cassandra.apache.org/doc/latest/operating/hardware.html) must be taken into consideration when adjusting these values. Reducing these values below those requirements may result in adverse performance and/or failures while using the service. Each of the following settings can be customized under the **node** configuration section. <a name="node-count"></a> ### Node Count Customize the `Node Count` setting (default 3) under the **node** configuration section. Consult the Apache Cassandra documentation for minimum node count requirements. * **In DC/OS CLI options.json**: `count`: integer (default: `3`) * **DC/OS web interface**: `NODES`: `integer` <a name="cpu"></a> ### CPU You can customize the amount of CPU allocated to each node. A value of `1.0` equates to one full CPU core on a machine. Change this value by editing the **cpus** value under the **node** configuration section. Turning this too low will result in throttled tasks. * **In DC/OS CLI options.json**: `cpus`: number (default: `0.5`) * **DC/OS web interface**: `CASSANDRA_CPUS`: `number` <a name="memory"></a> ### Memory You can customize the amount of RAM allocated to each node. Change this value by editing the **mem** value (in MB) under the **node** configuration section. Turning this too low will result in out of memory errors. The `heap.size` setting must also be less than this value to prevent out of memory errors resulting from the Java Virtual Machine attempting to allocate more memory than is available to the Cassandra process. * **In DC/OS CLI options.json**: `mem`: integer (default: `10240`) * **DC/OS web interface**: `CASSANDRA_MEMORY_MB`: `integer` <a name="jmx-port"></a> ### JMX Port You can customize the port that Apache Cassandra listens on for JMX requests, such as those issued by `nodetool`. * **In DC/OS CLI options.json**: `jmx_port`: integer (default: `7199`) * **DC/OS web interface**: `TASKCFG_ALL_JMX_PORT`: `integer` <a name="storage-port"></a> ### Storage Port You can customize the port that Apache Cassandra listens on for inter-node communication. * **In DC/OS CLI options.json**: `storage_port`: integer (default: `7000`) * **DC/OS web interface**: `TASKCFG_ALL_CASSANDRA_STORAGE_PORT`: `integer` <a name="ssl-storage-port"></a> ### SSL Storage Port You can customize the port that Apache Cassandra listens on for inter-node communication over SSL. * **In DC/OS CLI options.json**: `ssl_storage_port`: integer (default: `7001`) * **DC/OS web interface**: `TASKCFG_ALL_CASSANDRA_SSL_STORAGE_PORT`: `integer` <a name="native-transport-port"></a> ### Native Transport Port You can customize the port that Apache Cassandra listens on for CQL queries. * **In DC/OS CLI options.json**: `native_transport_port`: integer (default: `9042`) * **DC/OS web interface**: `TASKCFG_ALL_CASSANDRA_NATIVE_TRANSPORT_PORT`: `integer` <a name="rpc-port"></a> ### RPC Port You can customize the port that Apache Cassandra listens on for Thrift RPC requests. * **In DC/OS CLI options.json**: `rpc_port`: integer (default: `9160`) * **DC/OS web interface**: `TASKCFG_ALL_CASSANDRA_RPC_PORT`: `integer` <a name="disk-type"></a> ### Disk Type The service supports two volume types: - `ROOT` volumes are effectively an isolated directory on the root volume, sharing IO/spindles with the rest of the host system. - `MOUNT` volumes are a dedicated device or partition on a separate volume, with dedicated IO/spindles. Using `MOUNT` volumes requires [additional configuration on each DC/OS agent system](https://docs.mesosphere.com/1.9/storage/mount-disk-resources/), so the service currently uses `ROOT` volumes by default. To ensure reliable and consistent performance in a production environment, you should configure `MOUNT` volumes on the machines that will run the service in your cluster and then configure the following as `MOUNT` volumes: To configure the disk type: * **In DC/OS CLI options.json**: `disk_type`: string (default: `ROOT`) * **DC/OS web interface**: `CASSANDRA_DISK_TYPE`: `string` <a name="placement-constraints"></a> ### Placement Constraints Placement constraints allow you to customize where Apache Cassandra nodes are deployed in the DC/OS cluster. Placement constraints support all [Marathon operators](http://mesosphere.github.io/marathon/docs/constraints.html) with this syntax: `field:OPERATOR[:parameter]`. For example, if the reference lists `[["hostname", "UNIQUE"]]`, use `hostname:UNIQUE`. * **In DC/OS CLI options.json**: `placement_constraint`: string (default: `""`) * **DC/OS web interface**: `PLACEMENT_CONSTRAINT`: `string` <a name="uninstalling"></a> # Uninstalling Follow these steps to uninstall the service. 1. Uninstall the service. From the DC/OS CLI, enter `dcos package uninstall`. 1. Clean up remaining reserved resources with the framework cleaner script, `janitor.py`. [More information about the framework cleaner script](https://docs.mesosphere.com/1.9/deploying-services/uninstall/#framework-cleaner). To uninstall an instance named `cassandra` (the default), run: ``` MY_SERVICE_NAME=cassandra dcos package uninstall --app-id=$MY_SERVICE_NAME beta-cassandra dcos node ssh --master-proxy --leader "docker run mesosphere/janitor /janitor.py \ -r $MY_SERVICE_NAME-role \ -p $MY_SERVICE_NAME-principal \ -z dcos-service-$MY_SERVICE_NAME" ``` <a name="connecting-clients"></a> # Connecting Clients Clients communicating with Apache Cassandra use the Cassandra Query Language (CQL) to issue queries and write data to the cluster. CQL client libraries exist in many languages, and Apache Cassandra ships with a utility called `cqlsh` that enables you to issue queries against an Apache Cassandra cluster from the command line. <a name="discovering-endpoints"></a> ## Discovering Endpoints Once the service is running, you may view information about its endpoints via either of the following methods: - CLI: - List endpoint types: `dcos beta-cassandra endpoints` - View endpoints for an endpoint type: `dcos beta-cassandra endpoints <endpoint>` - Web: - List endpoint types: `<dcos-url>/service/cassandra/v1/endpoints` - View endpoints for an endpoint type: `<dcos-url>/service/cassandra/v1/endpoints/<endpoint>` The DC/OS Apache Cassandra Service currently exposes only the `node` endpoint type, which shows the locations for all Cassandra nodes in the cluster. To see node addresses, run `dcos beta-cassandra endpoints node`. A typical response will look like the following: ```json { "address": [ "10.0.0.49:9042", "10.0.2.253:9042", "10.0.1.27:9042" ], "dns": [ "node-2-server.cassandra.mesos:9042", "node-0-server.cassandra.mesos:9042", "node-1-server.cassandra.mesos:9042" ], "vip": "node.cassandra.l4lb.thisdcos.directory:9042" } ``` In general, the `.mesos` endpoints will only work from within the same DC/OS cluster. From outside the cluster you can either use the direct IPs, or set up a proxy service that acts as a frontend to your DC/OS Apache Cassandra instance. For development and testing purposes, you can use [DC/OS Tunnel](https://docs.mesosphere.com/latest/administration/access-node/tunnel/) to access services from outside the cluster, but this option is not suitable for production use. <a name="connecting-clients-to-endpoints"></a> ## Connecting Clients to Endpoints To connect to a DC/OS Apache Cassandra cluster using `cqlsh`, first SSH into a host in your DC/OS cluster: ``` dcos node ssh --leader --master-proxy ``` Then, use the `cassandra` Docker image to run `cqlsh`, passing as an argument the address of one of the Apache Cassandra nodes in the cluster: ``` docker run cassandra:3.0.13 cqlsh node-0-server.cassandra.mesos ``` This will open an interactive shell from which you can issue queries and write to the cluster. To ensure that the `cqlsh` client and your cluster are using the same CQL version, be sure to use the version of the `cassandra` Docker image that corresponds to the version of Apache Cassandra being run in your cluster. The version installed by the DC/OS Apache Cassandra Service is 3.0.13. <a name="managing"></a> # Managing <a name="updating-configuration"></a> ## Updating Configuration Edit the runtime environment of the scheduler to make configuration changes. After making a change, the scheduler will be restarted, and it will automatically deploy any detected changes to the service, one node at a time. For example, a given change will first be applied to the `node-0` pod, then `node-1`, and so on. Nodes are configured with a "Readiness check" to ensure that the underlying service appears to be in a healthy state before continuing with applying a given change to the next node in the sequence. However, this basic check is not foolproof and reasonable care should be taken to ensure that a given configuration change will not negatively affect the behavior of the service. Some changes, such as decreasing the number of nodes or changing volume requirements, are not supported after initial deployment. See [Limitations](#limitations). To see a full listing of available options, run `dcos package describe --config beta-cassandra` in the CLI, or browse the DC/OS Apache Cassandra Service install dialog in the DC/OS Dashboard. <a name="adding-a-node"></a> ### Adding a Node The service deploys 3 nodes by default. This may be customized at initial deployment or after the cluster is already running via the `NODES` environment variable. Shrinking the cluster is not supported. If you decrease this value, the scheduler will complain about the configuration change until it's reverted back to its original value or a larger one. <a name="resizing-a-node"></a> ### Resizing a Node The CPU and Memory requirements of each node may be increased or decreased as follows: - CPU (1.0 = 1 core): `CASSANDRA_CPUS` - Memory (in MB): `CASSANDRA_MEMORY_MB`. To prevent out of memory errors, you must ensure that the `TASKCFG_ALL_CASSANDRA_HEAP_SIZE` environment variable is less than `$CASSANDRA_MEMORY_MB`. Note: volume requirements (type and/or size) can not be changed after initial deployment. <a name="updating-placement-constraints"></a> ### Updating Placement Constraints Placement constraints may be updated after initial deployment using the following procedure. See [Service Settings](#service-settings) above for more information on placement constraints. Let's say we have the following deployment of our nodes - Placement constraint of: `hostname:LIKE:10.0.10.3|10.0.10.8|10.0.10.26|10.0.10.28|10.0.10.84` - Tasks: ``` 10.0.10.3: node-0 10.0.10.8: node-1 10.0.10.26: node-2 10.0.10.28: empty 10.0.10.84: empty ``` `10.0.10.8` is being decommissioned and we should move away from it. Steps: 1. Remove the decommissioned IP and add a new IP to the placement rule whitelist by editing `PLACEMENT_CONSTRAINT`: ``` hostname:LIKE:10.0.10.3|10.0.10.26|10.0.10.28|10.0.10.84|10.0.10.123 ``` 1. Redeploy `node-1` from the decommissioned node to somewhere within the new whitelist: `dcos beta-cassandra pods replace node-1` 1. Wait for `node-1` to be up and healthy before continuing with any other replacement operations. <a name="restarting-a-node"></a> ## Restarting a Node This operation will restart a node, while keeping it at its current location and with its current persistent volume data. This may be thought of as similar to restarting a system process, but it also deletes any data that is not on a persistent volume. 1. Run `dcos beta-cassandra pods restart node-<NUM>`, e.g. `node-2`. <a name="replacing-a-node"></a> ## Replacing a Node This operation will move a node to a new system and will discard the persistent volumes at the prior system to be rebuilt at the new system. Perform this operation if a given system is about to be offlined or has already been offlined. **Note:** Nodes are not moved automatically. You must perform the following steps manually to move nodes to new systems. You canbuild your own automation to perform node replacement automatically according to your own preferences. 1. Run `dcos beta-cassandra pods replace node-<NUM>` to halt the current instance with id `<NUM>` (if still running) and launch a new instance elsewhere. For example, let's say `node-2`'s host system has died and `node-2` needs to be moved. ``` dcos beta-cassandra pods replace node-2 ``` <a name="configuring-multi-data-center-deployments"></a> ## Configuring Multi-data-center Deployments To replicate data across data centers, Apache Cassandra requires that you configure each cluster with the addresses of the seed nodes from every remote cluster. Here's what starting a multi-data-center Apache Cassandra deployment would like, running inside of a single DC/OS cluster. Launch the first cluster with the default configuration: ``` dcos package install beta-cassandra ``` Create an `options.json` file for the second cluster that specifies a different service name and data center name: ```json { "service": { "name": "cassandra2", "data_center": "dc2" } } ``` Launch the second cluster with these custom options: ``` dcos package install beta-cassandra --options=<options>.json ``` Get the list of seed node addresses for the first cluster from the scheduler HTTP API: ```json DCOS_AUTH_TOKEN=$(dcos config show core.dcos_acs_token) DCOS_URL=$(dcos config show core.dcos_url) curl -H "authorization:token=$DCOS_AUTH_TOKEN" $DCOS_URL/service/cassandra/v1/seeds {"seeds": ["10.0.0.1", "10.0.0.2"]} ``` In the DC/OS UI, go to the configuration dialog for the second cluster (whose service name is `cassandra2`) and update the `TASKCFG_ALL_REMOTE_SEEDS` environment variable to `10.0.0.1,10.0.0.2`. This environment variable may not already be present in a fresh install. To add it, click the plus sign at the bottom of the list of environment variables, and then fill in its name and value in the new row that appears. Get the seed node addresses for the second cluster the same way: ``` curl -H "authorization:token=$DCOS_AUTH_TOKEN" $DCOS_URL/service/cassandra2/v1/seeds {"seeds": ["10.0.0.3", "10.0.0.4"]} ``` In the DC/OS UI, go to the configuration dialog for the first cluster (whose service name is `cassandra`) and update the `TASKCFG_ALL_REMOTE_SEEDS` environment variable to `10.0.0.3,10.0.0.4`, again adding the variable with the plus sign if it's not already present. Both schedulers will restart after the configuration update, and each cluster will communicate with the seed nodes from the other cluster to establish a multi-data-center topology. Repeat this process for each new cluster you add, appending a comma-separated list of that cluster's seeds to the `TASKCFG_ALL_REMOTE_SEEDS` environment variable for each existing cluster, and adding a comma-separated list of each existing cluster's seeds to the newly-added cluster's `TASKCFG_ALL_REMOTE_SEEDS` environment variable. <a name="disaster-recovery"></a> # Disaster Recovery <a name="backup"></a> ## Backup ### Backing Up to S3 You can backup an entire cluster's data and schema to Amazon S3 using the `backup-s3` plan. This plan requires the following parameters to run: - `SNAPSHOT_NAME`: the name of this snapshot. Snapshots for individual nodes will be stored as S3 folders inside of a top level `snapshot` folder. - `CASSANDRA_KEYSPACES`: the Cassandra keyspaces to backup. The entire keyspace, as well as its schema, will be backed up for each keyspace specified. - `AWS_ACCESS_KEY_ID`: the access key ID for the AWS IAM user running this backup. - `AWS_SECRET_ACCESS_KEY`: the secret access key for the AWS IAM user running this backup. - `AWS_REGION`: the region of the S3 bucket being used to store this backup. - `S3_BUCKET_NAME`: the name of the S3 bucket to store this backup in. Make sure that you provision your nodes with enough disk space to perform a backup. Apache Cassandra backups are stored on disk before being uploaded to S3, and will take up as much space as the data currently in the tables, so you'll need half of your total available space to be free to backup every keyspace at once. As noted in the documentation for the [backup/restore strategy configuration option](#backup-restore-strategy), it is possible to run transfers to S3 either in serial or in parallel, but care must be taken not to exceed any throughput limits you may have in your cluster. Throughput depends on a variety of factors, including uplink speed, proximity to region where the backups are being uploaded and downloaded, and the performance of the underlying storage infrastructure. You should perform periodic tests in your local environment to understand what you can expect from S3. You can configure whether snapshots are created and uploaded in serial, the default, or in parallel (see [backup/restore strategy](#backup-restore-strategy)), but the serial backup/restore strategy is recommended. You can initiate this plan from the command line: ``` SNAPSHOT_NAME=<my_snapshot> CASSANDRA_KEYSPACES="space1 space2" AWS_ACCESS_KEY_ID=<my_access_key_id> AWS_SECRET_ACCESS_KEY=<my_secret_access_key> AWS_REGION=us-west-2 S3_BUCKET_NAME=backups dcos cassandra plan start backup-s3 -p SNAPSHOT_NAME=$SNAPSHOT_NAME -p "CASSANDRA_KEYSPACES=$CASSANDRA_KEYSPACES" -p AWS_ACCESS_KEY_ID=$AWS_ACCESS_KEY_ID -p AWS_SECRET_ACCESS_KEY=$AWS_SECRET_ACCESS_KEY -p AWS_REGION=$AWS_REGION -p S3_BUCKET_NAME=$S3_BUCKET_NAME ``` If you're backing up multiple keyspaces, they must be separated by spaces and wrapped in quotation marks when supplied to the `plan start` command, as in the example above. If the `CASSANDRA_KEYSPACES` parameter isn't supplied, then every keyspace in your cluster will be backed up. **IMPORTANT**: To ensure that sensitive information, such as your AWS secret access key, remains secure, make sure that you've set the `core.dcos_url` configuration property in the DC/OS CLI to an HTTPS URL. ### Backing up to Azure You can also back up to Microsoft Azure using the `backup-azure` plan. This plan requires the following parameters to run: - `SNAPSHOT_NAME`: the name of this snapshot. Snapshots for individual nodes will be stored as gzipped tarballs with the name `node-<POD_INDEX>.tar.gz`. - `CASSANDRA_KEYSPACES`: the Cassandra keyspaces to backup. The entire keyspace, as well as its schema, will be backed up for each keyspace specified. - `CLIENT_ID`: the client ID for the Azure service principal running this backup. - `TENANT_ID`: the tenant ID for the tenant that the service principal belongs to. - `CLIENT_SECRET`: the service principal's secret key. - `AZURE_STORAGE_ACCOUNT`: the name of the storage account that this backup will be sent to. - `AZURE_STORAGE_KEY`: the secret key associated with the storage account. - `CONTAINER_NAME`: the name of the container to store this backup in. You can initiate this plan from the command line in the same way as the Amazon S3 backup plan: ``` dcos cassandra plan start backup-azure -p SNAPSHOT_NAME=$SNAPSHOT_NAME -p "CASSANDRA_KEYSPACES=$CASSANDRA_KEYSPACES" -p CLIENT_ID=$CLIENT_ID -p TENANT_ID=$TENANT_ID -p CLIENT_SECRET=$CLIENT_SECRET -p AZURE_STORAGE_ACCOUNT=$AZURE_STORAGE_ACCOUNT -p AZURE_STORAGE_KEY=$AZURE_STORAGE_KEY -p CONTAINER_NAME=$CONTAINER_NAME ``` <a name="restore"></a> ## Restore All restore plans will restore the schema from every keyspace backed up with the backup plan and populate those keyspaces with the data they contained at the time the snapshot was taken. Downloading and restoration of backups will use the configured backup/restore strategy. This plan assumes that the keyspaces being restored do not already exist in the current cluster, and will fail if any keyspace with the same name is present. ### Restoring From S3 Restoring cluster data is similar to backing it up. The `restore-s3` plan assumes that your data is stored in an S3 bucket in the format that `backup-s3` uses. The restore plan has the following parameters: - `SNAPSHOT_NAME`: the snapshot name from the `backup-s3` plan. - `AWS_ACCESS_KEY_ID`: the access key ID for the AWS IAM user running this restore. - `AWS_SECRET_ACCESS_KEY`: the secret access key for the AWS IAM user running this restore. - `AWS_REGION`: the region of the S3 bucket being used to store the backup being restored. - `S3_BUCKET_NAME`: the name of the S3 bucket where the backup is stored. To initiate this plan from the command line: ``` SNAPSHOT_NAME=<my_snapshot> AWS_ACCESS_KEY_ID=<my_access_key_id> AWS_SECRET_ACCESS_KEY=<my_secret_access_key> AWS_REGION=us-west-2 S3_BUCKET_NAME=backups dcos beta-cassandra plan start backup-s3 "SNAPSHOT_NAME=$SNAPSHOT_NAME,AWS_ACCESS_KEY_ID=$AWS_ACCESS_KEY_ID,AWS_SECRET_ACCESS_KEY=$AWS_SECRET_ACCESS_KEY,AWS_REGION=$AWS_REGION,S3_BUCKET_NAME=$S3_BUCKET_NAME" ``` ### Restoring From Azure You can restore from Microsoft Azure using the `restore-azure` plan. This plan requires the following parameters to run: - `SNAPSHOT_NAME`: the name of this snapshot. Snapshots for individual nodes will be stored as gzipped tarballs with the name `node-<POD_INDEX>.tar.gz`. - `CLIENT_ID`: the client ID for the Azure service principal running this backup. - `TENANT_ID`: the tenant ID for the tenant that the service principal belongs to. - `CLIENT_SECRET`: the service principal's secret key. - `AZURE_STORAGE_ACCOUNT`: the name of the storage account that this backup will be sent to. - `AZURE_STORAGE_KEY`: the secret key associated with the storage account. - `CONTAINER_NAME`: the name of the container to store this backup in. You can initiate this plan from the command line in the same way as the Amazon S3 restore plan: ``` dcos cassandra plan start restore-azure -p SNAPSHOT_NAME=$SNAPSHOT_NAME -p CLIENT_ID=$CLIENT_ID -p TENANT_ID=$TENANT_ID -p CLIENT_SECRET=$CLIENT_SECRET -p AZURE_STORAGE_ACCOUNT=$AZURE_STORAGE_ACCOUNT -p AZURE_STORAGE_KEY=$AZURE_STORAGE_KEY -p CONTAINER_NAME=$CONTAINER_NAME ``` <a name="troubleshooting"></a> # Troubleshooting <a name="accessing-logs"></a> ## Accessing Logs Logs for the scheduler and all service nodes can be viewed from the DC/OS web interface. - Scheduler logs are useful for determining why a node isn't being launched (this is under the purview of the Scheduler). - Node logs are useful for examining problems in the service itself. In all cases, logs are generally piped to files named `stdout` and/or `stderr`. To view logs for a given node, perform the following steps: 1. Visit <dcos-url> to access the DC/OS web interface. 1. Navigate to `Services` and click on the service to be examined (default `cassandra`). 1. In the list of tasks for the service, click on the task to be examined (scheduler is named after the service, nodes are each `node-<NUM>-server`). 1. In the task details, click on the `Logs` tab to go into the log viewer. By default, you will see `stdout`, but `stderr` is also useful. Use the pull-down in the upper right to select the file to be examined. You can also access the logs via the Mesos UI: 1. Visit <dcos-url>/mesos to view the Mesos UI. 1. Click the `Frameworks` tab in the upper left to get a list of services running in the cluster. 1. Navigate into the correct framework for your needs. The scheduler runs under `marathon` with a task name matching the service name (default _`PKGNAME`_). Service nodes run under a framework whose name matches the service name (default _`PKGNAME`_). 1. You should now see two lists of tasks. `Active Tasks` are tasks currently running, and `Completed Tasks` are tasks that have exited. Click the `Sandbox` link for the task you wish to examine. 1. The `Sandbox` view will list files named `stdout` and `stderr`. Click the file names to view the files in the browser, or click `Download` to download them to your system for local examination. Note that very old tasks will have their Sandbox automatically deleted to limit disk space usage. <a name="limitations"></a> # Limitations - For multi-data-center configurations, the hostnames for the seed nodes in each cluster must be routable from every other cluster. Typically, DC/OS hosts are members of a private subnet that is not routable from external hosts, so further network configuration is required to achieve this. <a name="support"></a> # Support ## Supported Versions The DC/OS Apache Cassandra Service runs Cassandra v3.0.13. It supports DC/OS version 1.8 and later.
52.258017
577
0.763982
eng_Latn
0.965984
6ad195289d6c257d68fd03a42e38641c9055fefd
87
md
Markdown
import-back/README.md
Xuanwo/openacid.github.io
6e347aff98b25f6cd02acf7acb81ede98c78f6fa
[ "MIT" ]
2
2021-11-09T21:04:56.000Z
2022-01-03T14:50:22.000Z
import-back/README.md
Xuanwo/openacid.github.io
6e347aff98b25f6cd02acf7acb81ede98c78f6fa
[ "MIT" ]
24
2019-02-01T05:40:37.000Z
2022-02-09T16:55:35.000Z
import-back/README.md
Xuanwo/openacid.github.io
6e347aff98b25f6cd02acf7acb81ede98c78f6fa
[ "MIT" ]
1
2021-11-09T21:04:57.000Z
2021-11-09T21:04:57.000Z
This folder contains articles imported from web as markdown, with all medias uploaded.
29
76
0.827586
eng_Latn
0.999927
6ad2004d71a0dcf31cb71c18b5b686ff13ff1014
5,362
md
Markdown
docs/onsite/version-history.md
SuperOfficeDocs/superoffice-docs
6696af195598bf1baebada1c0624b5d833cd68e3
[ "MIT" ]
2
2022-02-15T22:41:17.000Z
2022-03-30T07:17:15.000Z
docs/onsite/version-history.md
acdavidh/superoffice-docs
873de11300c32857c73c4131b8fb50152931ac28
[ "MIT" ]
155
2021-04-20T11:50:13.000Z
2022-03-30T11:23:26.000Z
docs/onsite/version-history.md
SuperOfficeDocs/superoffice-docs
6696af195598bf1baebada1c0624b5d833cd68e3
[ "MIT" ]
8
2021-05-14T15:14:04.000Z
2022-03-31T08:07:12.000Z
--- title: Onsite version history uid: version_history description: SuperOffice version history overview author: {github-id} keywords: onsite, version, history, release so.topic: reference so.envir: onsite # so.client: --- # SuperOffice Onsite version history An overview of Release names, with Release number, Date, and Build number. It does not contain Red Alerts or [CRM Online release versions][1]. | Onsite Release Name | Release number | Date | Build number | |-----|-----|-----|-----| | 6.1 Main Release | 6.1.1.540 | 2007/06/21 | | | 6.1 SR1 | 6.1.2.70 | 2008/02/16 | | | 6.2 Release | 6.2.1.550 | 2008/12/18 | | | 6.3 Release | 6.3.1.110 | 2009/09/16 | | | 7.0 Beta 1 | 7.0.3832b.1100 | 2010/06/30 | | | 6.3 SR1 | 6.3.2.528 | 2010/09/14 | | | 7.0 Beta 2 | 7.0.3923.000 | 2010/09/28 | | | 7.0 RC | 7.0.3974.000 | 2010/11/18 | | | 7.0 | 7.0.4003.1200 (a) | 2010/12/17 | | | 6.3 SR2 (with 7.0 MailLink) | 6.3.3.700 | 2011/02/18 | | | 7.0 SR1 RC | 7.0.4145.0 | 2011/05/10 | | | 7.0 SR1 | 7.0.4167.1700 | 2011/06/01 | | | 7.0 SR2 | 7.0.4265.1600 | 2011/09/05 | | | 7.0 SR3 | 7.0.4421.0 | 2012/02/10 | | | 7.0 SR3 actually released | 7.0.4465.a | 2012/03/23 | | | 7.1 Beta 1 | 7.1.4364.a | 2011/12/14 | | | 7.1 Beta 2 | 7.1.4394.b | 2012/01/13 | | | 7.1 Beta 3 | 7.1.4433.b | 2012/02/20 | | | 7.1 Beta 3 - 2 | 7.1.4437.a | 2012/02/24 | | | 7.1 RC | 7.1.4472 | 2012/03/30 | | | 7.1 RC SO internal w invitations | 7.1.4484.a | 2012/04/11 | | | 7.1 | 7.1.4507.a | 2012/05/04 | | | 7.1 SR1 | 7.1.4724.100 | 2012/12/14 | | | 7.1 SR1.b | 7.1.4760.100 | 15.01.2013 | | | 7.1 SR2 | 7.1.4816.100 | 14.03.2013 | | | 7.2 Visma.Net | 7.2.4680 web | 24.10.2012 | | | 7.2 SR1 | 7.2.4919.100 web | 20.06.2013 | | | 7.5 Alpha (Quote & EIS) | 7.5.4924 | 25.06.2013 | | | 7.5 Beta 1 | 7.5.5021.b | 01.10.2013 | | | 7.5 Beta 2 | 7.5.5055 | 04.11.2013 | | | 7.5 Beta 2 Internal | 7.5.5080 | 28.11.2013 | | | 7.5 RC1 | 7.5.5098 | 16.12.2014 | | | 7.5 RC2 | 7.5.5141.a, CS 7.5.5142.a | 28.01.2014 | | | 7.5 | 7.5.5154.a | 10.02.2014 | | | 7.5 HotFix 1 | 7.5.5163.a | 19.02.2014 | | | 7.5 Patch 1 | 7.5.5199.a | 07.04.2014 | | | 7.5 Patch 2 | 7.5.5253 | 20.05.2014 | | | 7.5 SR1 | 7.5.5543 | 06.03.2015 | | | 7.5 SR2 | 7.5.5885.b | 11.02.2016 | | | 8.0 Beta 2 | 8.0.5752.b | 01.10.2016 | | | 8.0 Beta 3 | 8.0.5767 | 16.10.2015 | | | 8.0 RC1 | 8.0.5781.c | 30.10.2015 | | | 8.0 RC2 | 8.0.5795 | 13.11.2015 | | | 8.0 FRC | 8.0.5816 | 04.12.2015 | | | 8.0 | 8.0.5828.a | 16.12.2015 | | | 8.0 SR1 | 8.0.5893.a | 22.02.2016 | | | 8.0 SR2 | 8.0.6004 | 09.06.2016 | 2016-22 | | 8.0 SR2 Patch1 | 8.0.6018 | 23.06.2016 | | | 8.0 SR3 | 8.0.6102.c | 15.09.2016 | 2016-35.5 | | 8.0 SR4 | 8.0.6144 | 28.10.2016 | | | 8.0 SR5 | 8.0.6352 | 23.05.2017 | | | 8.0 SR6 | 8.0.6465 | 15.09.2017 | | | 8.1 R01 | 8.0.6499 | 19.10.2017 | 2017.10.17-3 | | 8.1 R02 | 8.1.6514.1619 | 15.11.2017 | 2017.11.01-3 | | 8.1 R03 | 8.1.6536.16 | 27.11.2017 | 2017.11.23-01 | | 8.2 R01 | 8.2.6550.1025 | 18.12.2017 | 2017.12.07-03 | | 8.2 R02 | (Onsite skipped) | 16.01.2018 | | | 8.2 R03 | 8.2.6617.1308 | 14.02.2018 | 2018.02.12-03 | | 8.2 R04 | | 13.03.2018 | 2018.03.09-05 | | 8.2 R05 | (Onsite skipped) | | | | 8.2 R06 | 8.2.6689.1603 | | 2018.04.25-01 | | 8.3 R01 | 8.3.6718.18 | 24.05.2018 | | | 8.3 R02 | | 21.06.2018 | 2018.06.21-01 | | 8.3 R03 | (Onsite skipped) | | | | 8.3 R04 | | 28.08.2018 | 2018.08.24-01 | | 8.4 R01 | | 21.09.2018 | 2018.09.20-03 | | 8.4 R02 | | 09.10.2018 | 2018.10.03-01 | | 8.4 R03 | | 06.11.2018 | 2018.11.05-03 | | 8.4 R04 | | 11.12.2018 | 2018.12.07-01 | | 8.4 R05 | | 29.01.2019 | 2019.01.25 | | 8.4 R06 | | 18.02.2019 | 2019.02.11-01 | | 8.4 R07 | | 15.03.2019 | 2019.03.15-01 | | 8.4 R08 | | 10.04.2019 | 2019.04.09-01 | | 8.5 R01 | | 14.05.2019 | 2019.05.13-02 | | 8.5 R02 | | 06.06.2019 | 2019.06.03-01 | | 8.5 R03 | | 03.07.2019 | 2019.07.01-01 | | 8.5 R04 | | 04.09.2019 | 2019.09.03-01 | | 8.5 R05 | | 02.10.2019 | 2019.10.02-01 | | 8.5 R06 | | 23.10.2019 | 2019.10.15-01 | | 8.5 R07 | | 13.11.2019 | 2019.11.05-02 | | 8.5 R08 | (Onsite skipped) | | | | 8.5 R09 | 08.01.2020 | 2020.01.09-03 | | 8.5 R10 | | 12.02.2020 | 2020.02.11-04 | | 8.5 R11 | | 05.03.2020 | 2020.02.27-02 | | 8.5 R12 | | 25.03.2020 | 2020.03.25-01 | | 8.5 R13 | | 15.04.2020 | 2020.04.15-01 | | 8.5 R14 | | 13.05.2020 | 2020.05.12-01 | | 8.5 R15 | | 03.06.2020 | 2020.06.02-01 | | 8.5 R15 Hotfix | Web hotfix only | 12.10.2020 | | | 8.5 R16 | | 16.12.2020 | 2020.12.15-02 | | 9.1 R01 | (Onsite skipped) | | | | 9.1 R02 | | 27.08.2020 | 2020.08.26-03 | | 9.1 R03 | | 08.10.2020 | 2020.10.06-03 | | 9.2 R01 | (Onsite skipped) | | | | 9.2 R02 | (Onsite skipped) | | | | 9.2 R03 | | 16.12.2020 | 2020.12.15-04 | | 9.2 R04 | (Onsite skipped) | | | | 9.2 R05 | (Onsite skipped) | | | | 9.2 R06 | (Onsite skipped) | | | | 9.2 R07 | | 16.04.2021 | 2021.04.27-02 | | 9.2 R08 | (Onsite skipped) | | | | 9.2 R09 | | 27.05.2021 | 2021.05.25-04 | | 9.2 R10 | | 07.07.2021 | 2021-07.02-02 | | 9.2 R11 | (Onsite skipped) | | | | 9.2 R12 | | 23.09.2021 | 2021.09.22-01 | | 10.0.1 | (Onsite skipped) | | | | 10.0.2 | | 11.11.2021 | 2021.11.11-03 | | 10.0.3 | (Onsite skipped) | | | | 10.0.4 | (Onsite skipped) | | | <!-- Referenced links --> [1]: ../online/version-history.md
40.621212
75
0.536367
yue_Hant
0.084555
6ad237e25b2848b4d7ae3bf3211669735d01d4ba
9,259
md
Markdown
articles/storage/tables/table-storage-design-modeling.md
gliljas/azure-docs.sv-se-1
1efdf8ba0ddc3b4fb65903ae928979ac8872d66e
[ "CC-BY-4.0", "MIT" ]
null
null
null
articles/storage/tables/table-storage-design-modeling.md
gliljas/azure-docs.sv-se-1
1efdf8ba0ddc3b4fb65903ae928979ac8872d66e
[ "CC-BY-4.0", "MIT" ]
null
null
null
articles/storage/tables/table-storage-design-modeling.md
gliljas/azure-docs.sv-se-1
1efdf8ba0ddc3b4fb65903ae928979ac8872d66e
[ "CC-BY-4.0", "MIT" ]
null
null
null
--- title: Modellerings relationer i Azure Table Storage design | Microsoft Docs description: Förstå modell processen när du utformar din lösning för tabell lagring. services: storage author: MarkMcGeeAtAquent ms.service: storage ms.topic: article ms.date: 04/23/2018 ms.author: sngun ms.subservice: tables ms.openlocfilehash: 25082c107fbc0feeb533aa2b4fc56cff960e778d ms.sourcegitcommit: 849bb1729b89d075eed579aa36395bf4d29f3bd9 ms.translationtype: MT ms.contentlocale: sv-SE ms.lasthandoff: 04/28/2020 ms.locfileid: "75457560" --- # <a name="modeling-relationships"></a>Modellera relationer I den här artikeln beskrivs modell processen som hjälper dig att utforma dina lagrings lösningar för Azure-tabeller. Att skapa domän modeller är ett viktigt steg i utformningen av komplexa system. Normalt använder du modellerings processen för att identifiera entiteter och relationerna mellan dem som ett sätt att förstå företags domänen och informera utformningen av ditt system. Det här avsnittet fokuserar på hur du kan översätta några av de vanliga Relations typerna i domän modeller till design för Table service. Processen för att mappa från en logisk data modell till en fysisk NoSQL-baserad data modell skiljer sig från den som användes när du skapar en Relations databas. Design av Relations databaser förutsätter vanligt vis en data normaliserings process som är optimerad för att minimera redundans – och en deklarativ fråge funktion som sammanfattar hur databasen fungerar. ## <a name="one-to-many-relationships"></a>En-till-många-relationer En-till-många-relationer mellan företags domän objekt inträffar ofta: till exempel är en avdelning många anställda. Det finns flera sätt att implementera en-till-många-relationer i Table service var och en med-och nack delar som kan vara relevanta för det specifika scenariot. Överväg exemplet på ett stort företag med flera nationella organisationer med tusentals avdelningar och personal enheter där varje avdelning har många anställda och varje medarbetare som är kopplad till en speciell avdelning. En metod är att lagra separata avdelnings-och anställdas enheter, till exempel följande: ![Lagra separata avdelnings-och personal enheter](media/storage-table-design-guide/storage-table-design-IMAGE01.png) Det här exemplet visar en implicit en-till-många-relation mellan typerna baserat på **PartitionKey** -värdet. Varje avdelning kan ha många anställda. I det här exemplet visas även en avdelnings enhet och dess relaterade anställdas entiteter i samma partition. Du kan välja att använda olika partitioner, tabeller eller till och med lagrings konton för de olika enhets typerna. En annan metod är att avnormalisera dina data och lagra endast anställdas enheter med avnormaliserade avdelnings data som visas i följande exempel. I det här scenariot kanske det här avnormaliserade tillvägagångs sättet inte är det bästa om du har ett krav för att kunna ändra informationen om en avdelnings hanterare, eftersom du måste uppdatera varje anställd på avdelningen för att göra detta. ![Anställd entitet](media/storage-table-design-guide/storage-table-design-IMAGE02.png) Mer information finns i avsnittet om [avnormaliserings mönster](table-storage-design-patterns.md#denormalization-pattern) senare i den här hand boken. I följande tabell sammanfattas de olika metoderna och nack delar med var och en av de metoder som beskrivs ovan för att lagra personal-och avdelnings enheter som har en en-till-många-relation. Du bör också fundera över hur ofta du förväntar dig att utföra olika åtgärder: det kan vara acceptabelt att ha en design som innehåller en dyr åtgärd om åtgärden bara sker sällan. <table> <tr> <th>Metod</th> <th>Fördelar</th> <th>Nackdelar</th> </tr> <tr> <td>Separata entitetstyper, samma partition, samma tabell</td> <td> <ul> <li>Du kan uppdatera en avdelnings enhet med en enda åtgärd.</li> <li>Du kan använda en EGT för att upprätthålla konsekvens om du har ett krav på att ändra en avdelnings enhet när du uppdaterar/infogar/tar bort en anställds entitet. Om du till exempel underhåller ett antal anställda för varje avdelning.</li> </ul> </td> <td> <ul> <li>Du kan behöva hämta både en anställd och en avdelnings enhet för vissa klient aktiviteter.</li> <li>Lagrings åtgärder sker i samma partition. På hög transaktions volymer kan detta resultera i ett hotspot-område.</li> <li>Du kan inte flytta en medarbetare till en ny avdelning med hjälp av en EGT.</li> </ul> </td> </tr> <tr> <td>Separata entitetstyper, olika partitioner eller tabeller eller lagrings konton</td> <td> <ul> <li>Du kan uppdatera en avdelnings enhet eller en anställds entitet med en enda åtgärd.</li> <li>På hög transaktions volymer kan detta hjälpa till att sprida belastningen över flera partitioner.</li> </ul> </td> <td> <ul> <li>Du kan behöva hämta både en anställd och en avdelnings enhet för vissa klient aktiviteter.</li> <li>Du kan inte använda EGTs för att upprätthålla konsekvens när du uppdaterar/infogar/tar bort en medarbetare och uppdaterar en avdelning. Du kan till exempel uppdatera ett antal anställda i en avdelnings enhet.</li> <li>Du kan inte flytta en medarbetare till en ny avdelning med hjälp av en EGT.</li> </ul> </td> </tr> <tr> <td>Avnormalisera till en enhets typ</td> <td> <ul> <li>Du kan hämta all information som du behöver med en enskild begäran.</li> </ul> </td> <td> <ul> <li>Det kan vara dyrt att upprätthålla konsekvens om du behöver uppdatera avdelnings information (Detta kräver att du uppdaterar alla anställda på en avdelning).</li> </ul> </td> </tr> </table> Hur du väljer mellan dessa alternativ och vilka av-och nack delar som är mest signifikanta beror på dina specifika program scenarier. Till exempel hur ofta ändrar du avdelnings enheter. behöver alla dina anställda-frågor ytterligare avdelnings information. hur nära är du på skalbarhets gränserna för dina partitioner eller ditt lagrings konto? ## <a name="one-to-one-relationships"></a>En-till-en-relationer Domän modeller kan innehålla en-till-en-relationer mellan entiteter. Om du behöver implementera en en-till-en-relation i Table service måste du också välja hur du länkar de två relaterade entiteterna när du behöver hämta dem. Den här länken kan vara antingen implicit, baserat på en konvention i nyckel värden eller explicit genom att en länk lagras i form av **PartitionKey** -och **RowKey** -värden i varje entitet till dess relaterade entitet. En beskrivning av huruvida du bör lagra relaterade entiteter i samma partition finns i avsnittet [en-till-många-relationer](#one-to-many-relationships). Det finns också implementerings överväganden som kan leda till att du implementerar en-till-en-relationer i Table service: * Hantering av stora entiteter (mer information finns i [mönster för stora entiteter](table-storage-design-patterns.md#large-entities-pattern)). * Implementera åtkomst kontroller (mer information finns i kontrol lera åtkomst med signaturer för delad åtkomst). ## <a name="join-in-the-client"></a>Anslut till klienten Även om det finns olika sätt att modellera relationer i Table service bör du inte glömma att de två huvudsakliga orsakerna till att använda Table service är skalbarhet och prestanda. Om du hittar flera relationer som äventyrar prestanda och skalbarhet för din lösning, bör du fråga dig själv om det är nödvändigt att bygga alla data relationer i tabell designen. Du kanske kan förenkla designen och förbättra skalbarheten och prestandan för din lösning om du låter klient programmet utföra alla nödvändiga kopplingar. Om du till exempel har små tabeller som innehåller data som inte ändras ofta kan du hämta dessa data en gång och cachelagra den på klienten. Detta kan undvika upprepade turer för att hämta samma data. I exemplen som vi har tittat på i den här hand boken är en uppsättning avdelningar i en liten organisation troligt vis liten och ändra sällan så att det blir en bra kandidat för data som klient programmet kan ladda ned en gång och cachelagra som att slå upp data. ## <a name="inheritance-relationships"></a>Arvs relationer Om klient programmet använder en uppsättning klasser som utgör en del av en arvs relation som representerar affär senheter, kan du enkelt spara dessa entiteter i Table service. Du kan till exempel ha följande uppsättning klasser definierade i klient programmet där **personen** är en abstrakt klass. ![Abstrakt person klass](media/storage-table-design-guide/storage-table-design-IMAGE03.png) Du kan spara instanser av de två konkreta klasserna i Table service med hjälp av en enda person tabell med hjälp av entiteter i som ser ut så här: ![Person tabell](media/storage-table-design-guide/storage-table-design-IMAGE04.png) Mer information om hur du arbetar med flera olika entitetstyper i samma tabell i klient koden finns i avsnittet arbeta med heterogena entitetstyper senare i den här hand boken. Detta ger exempel på hur du kan identifiera enhets typen i klient koden. ## <a name="next-steps"></a>Nästa steg - [Mönster för tabelldesign](table-storage-design-patterns.md) - [Utforma för frågor](table-storage-design-for-query.md) - [Kryptera tabell data](table-storage-design-encrypt-data.md) - [Utforma för dataändring](table-storage-design-for-modification.md)
71.775194
771
0.799222
swe_Latn
0.999983
6ad3de0dded0c366f0755fe6cc2bb07ca19aa723
39
md
Markdown
Prerequisite.md
vineeth-cnbr/SLAC-2018
338adf5ddcd3b03d713c6b143c3e9dcec27f0af1
[ "MIT" ]
1
2018-03-09T08:21:17.000Z
2018-03-09T08:21:17.000Z
Prerequisite.md
vineeth-cnbr/SLAC-2018
338adf5ddcd3b03d713c6b143c3e9dcec27f0af1
[ "MIT" ]
9
2021-03-21T16:31:06.000Z
2022-01-12T20:52:50.000Z
Prerequisite.md
vineeth-cnbr/slac2018
338adf5ddcd3b03d713c6b143c3e9dcec27f0af1
[ "MIT" ]
3
2020-05-26T07:38:36.000Z
2021-03-21T16:34:00.000Z
Details in [package.json](package.json)
39
39
0.794872
eng_Latn
0.367213
6ad47e47df4a51819d518405b7214f0cb10a5d19
760
md
Markdown
_posts/Python/F/filecmp/filecmp/2021-01-01-filecmp.md
w3api/w3api
681462ece7265723031a88bec5285209d0e125bf
[ "MIT" ]
1
2021-09-15T20:32:10.000Z
2021-09-15T20:32:10.000Z
_posts/Python/F/filecmp/filecmp/2021-01-01-filecmp.md
w3api/w3api
681462ece7265723031a88bec5285209d0e125bf
[ "MIT" ]
20
2021-01-17T01:13:46.000Z
2021-06-20T21:16:02.000Z
_posts/Python/F/filecmp/filecmp/2021-01-01-filecmp.md
w3api/w3api
681462ece7265723031a88bec5285209d0e125bf
[ "MIT" ]
2
2021-09-15T20:32:08.000Z
2022-02-20T16:57:46.000Z
--- title: filecmp.filecmp permalink: /Python/filecmp/filecmp/ date: 2021-01-01 key: Python.F.filecmp.filecmp category: python tags: ['clase python', 'filecmp'] sidebar: nav: python --- {% include w3api/datos.html clase=site.data.Python.F.filecmp.filecmp.metodos valor="filecmp/filecmp" %} ## Descripción {{site.data.Python.F.filecmp.filecmp.description }} ## Sintaxis ~~~python {{ site.data.Python.F.filecmp.filecmp.sintaxis }}~~~ ## Atributos * [DEFAULT_IGNORES](/Python/filecmp/filecmp/DEFAULT_IGNORES/) ## Ejemplo ~~~python {{ site.data.Python.F.filecmp.filecmp.code}} ~~~ ## Artículos <ul> {%- for _ldc in site.data.Python.F.filecmp.filecmp.ldc -%} <li> <a href="{{_ldc['url'] }}">{{ _ldc['nombre'] }}</a> </li> {%- endfor -%} </ul>
20.540541
103
0.672368
yue_Hant
0.521344
6ad49270f79dee439c9e441287532bbb57a2ddf1
11,963
md
Markdown
_posts/2020-10-27-kubernetes-webhooks-made-easy-with-openfaas.md
iboonox/openfaas.github.io
c5e9d8e21456159190fe7778a9889c5a51d1edf3
[ "MIT" ]
null
null
null
_posts/2020-10-27-kubernetes-webhooks-made-easy-with-openfaas.md
iboonox/openfaas.github.io
c5e9d8e21456159190fe7778a9889c5a51d1edf3
[ "MIT" ]
null
null
null
_posts/2020-10-27-kubernetes-webhooks-made-easy-with-openfaas.md
iboonox/openfaas.github.io
c5e9d8e21456159190fe7778a9889c5a51d1edf3
[ "MIT" ]
null
null
null
--- title: "Kubernetes Webhooks made easy with OpenFaaS" description: "In this post you'll learn how to write Kubernetes Admission webhooks using OpenFaaS functions" date: 2020-10-27 image: /images/2020-10-27-k8s-validatingwebhook-openfaas/puzzle.jpg categories: - arkade - kubectl - faas-cli - admissionwebhooks - validatingadmissionwebhooks - k8s extensibility author_staff_member: batuhan dark_background: true --- In this post you'll learn how to write Kubernetes Admission webhooks using OpenFaaS functions <p align="center"> <img height="128" src="/images/openfaas/kubernetes.png"> </p> ## Introduction to Kubernetes Admission webhooks Admission webhooks are HTTP callbacks that receive admission requests and do something with them. You can define two types of admission webhooks, validating admission webhook and mutating admission webhook. Mutating admission webhooks are invoked first, and can modify objects sent to the API server to enforce custom defaults. After all object modifications are complete, and after the incoming object is validate by the API server, validating admission webhooks are invoked and can reject requests to enforce custom policies. Using OpenFaaS in this design, we can focus on our core logic more than designing the microservice itself and simply create application without being worry about how to build and deploy. ## The Scenario Let's assume, in our company, we have some requirements that we must meet while deploying applications onto the Kubernetes cluster. We need to set some required labels to our Kubernetes manifest. Unless we specify the required labels our request will reject. So, in order to apply those requirements to the Kubernetes cluster to ensure the best practices, we can use Kubernetes [ValidatingAdmissionWebhook](https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#validatingadmissionwebhook) and [OpenFaaS](https://www.openfaas.com) together. Since ValidatingAdmissionWebhooks intercepts requests to the apiserver, OpenFaaS functions includes a little code to check required labels and determines the request either allowed or not. Webhook Admission Server is just plain http server that adhere to Kubernetes API. For each Pod create request to the apiserver(I said Pod because we specify which kind of resources that we consider while registering our webhook to the apiserver using [ValidatingWebhookConfiguration](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.19/#validatingwebhookconfiguration-v1-admissionregistration-k8s-io) resource) the ValidatingAdmissionWebhook sends an admissionReview([API](https://github.com/kubernetes/kubernetes/blob/release-1.19/pkg/apis/admission/types.go) for reference) to the relevant webhook admission server. The webhook admission server gathers information like object, oldobject, and userInfo from admissionReview's AdmissionRequest and sends AdmissionRequest to the serverless function through the OpenFaaS Gateway. The function checks the required labels exist on Pod and determines the request either valid or not and then sends back the AdmissionResponse whose Allowed and Result fields are filled with the admission decision to the webhook admission server then the webhook admission servers sends back a admissionReview to the apiserver. * Kubernetes API -> Webhook (w/TLS) -> OpenFaaS Gateway (w/HTTP) -> OpenFaaS Function ![Workflow](/images/2020-10-27-k8s-validatingwebhook-openfaas/admission-controller-phases.png) > Credit: [https://kubernetes.io/blog/2019/03/21/a-guide-to-kubernetes-admission-controllers/](https://kubernetes.io/blog/2019/03/21/a-guide-to-kubernetes-admission-controllers/) Supporting TLS for external webhook server is also required because admission is a high security operation. As part of the process, we need to create a TLS certificate signed by the Kubernetes CA to secure the communication between the webhook server and apiserver. ### Prerequisites ##### Arkade * [arkade](https://get-arkade.dev) is The OpenFaaS community built tool for Kubernetes developers, with arkade you can easily install all necessary cli tools to your host and deploy apps to the cluster. ```sh $ curl -sLS https://dl.get-arkade.dev | sudo sh ``` ##### KinD (Kubernetes in Docker) * Kubernetes is our recommendation for teams running at scale, but in this demo we will be using [KinD](https://kind.sigs.k8s.io/docs/user/quick-start/) for the sake of simplicity. ```sh $ arkade get kind ``` ##### kubectl * You can control your cluster using [kubectl](https://github.com/kubernetes/kubectl) CLI. ```sh $ arkade get kubectl ``` ##### faas-cli * [faas-cli](https://github.com/openfaas/faas-cli) is an official CLI for OpenFaaS , with "faas-cli" you can build and deploy functions easily. ```sh $ arkade get faas-cli ``` ### Setup ### 1. Setup a Kubernetes Cluster with KinD You can start a Kubernetes cluster with KinD if you don't have one already ```bash $ arkade get kind $ kind create cluster ``` ### 2. Deploy OpenFaaS to our local Kubernetes Cluster with arkade: * Install a OpenFaaS ```sh $ arkade install openfaas ``` Read the output from the installation and run the commands given to you. You can access them again at any time with `arkade info openfaas` ### 3. Clone the project * Clone the sample from GitHub ```sh $ git clone https://github.com/developer-guy/admission-webhook-example-with-openfaas $ cd admission-webhook-example-with-openfaas ``` * Let's explore the structure of the project. ``` deployment/ --> includes necessary manifests and scripts for the deployment of the project functions/ --> includes templates and the requiredlabel function itself Dockerfile --> includes instructions to build an image of the project build --> automated way to build and push an image of the project ``` ### 4. Deploy ValidatingAdmissionWebhook * We will generate the TLS certificates required for the ValidatingAdmissionWebhook using the following: [Kubernetes TLS Certificates Management](https://kubernetes.io/docs/tasks/tls/managing-tls-in-a-cluster/) ```sh $ cd deployment $ sh webhook-create-signed-cert.sh ``` * Get the Certificate Authority (CA) from the local cluster ```sh $ export CA_BUNDLE=$(kubectl config view --minify --flatten -o json | jq -r '.clusters[] | select(.name == "'$(kubectl config current-context)'") | .cluster."certificate-authority-data"') $ sed -e "s|\${CA_BUNDLE}|${CA_BUNDLE}|g" validatingwebhook.yaml | kubectl apply -f - $ cd .. ``` * Build the project ```sh $ export DOCKER_USER="docker-hub-username" $ ./build ``` Now edit `deployment.yaml` and set 'DOCKER_USER' to the above. * Deploy it project ```sh $ cd deployment $ kubectl apply -f rbac.yaml,service.yaml,deployment.yaml ``` ### 5. Build and Deploy OpenFaaS Function (Optional) * Pull the [golang-middleware](https://github.com/openfaas-incubator/golang-http-template) template from [OpenFaaS Official Template Store](https://github.com/openfaas/store) ```sh $ faas-cli template store list # check available templates in store $ faas-cli template store describe golang-middleware # describe the specific template $ faas-cli template store pull golang-middleware ``` * Create the function ```sh $ export OPENFAAS_PREFIX=$DOCKER_USER $ faas-cli new requiredlabel --lang go-middleware $ cd requiredlabel $ go mod init requiredlabel $ # fill the handler.go with the corresponding code $ go get ``` * Deploy the function ```sh $ cd functions $ faas-cli up -f requiredlabel.yml --build-arg GO111MODULE=on # (build-push-deploy) make sure you are using your docker hub username. i.e: devopps ``` * Verify the functions that are working in `openfaas-fn` namespace ```sh $ kubectl get pods --namespace openfaas-fn ``` ### 6. Test the whole workflow * The purpose of this PoC is that to validate that pods has required `labels`. Which means you must have that labels: ```yaml app.kubernetes.io/name: sleep app.kubernetes.io/instance: sleep app.kubernetes.io/version: "0.1" app.kubernetes.io/component: dummy app.kubernetes.io/part-of: admission-webhook-example app.kubernetes.io/managed-by: kubernetes ``` * Any Pod who have above labels is valid for us. ```sh `deployment/sleep.yaml` -> Incorrect, not-valid (We should deny this creation request.) `deployment/sleep-no-validation.yaml` -> Skip-validation (Based on `admission-webhook-example.qikqiak.com/validate: "false"` annotation, we skipped validation.) `deployment/sleep-with-labels.yaml` -> Correct, valid (We should accept this creation request.) ``` ### 7. A way of extend the operation event and function In this demo, we only consider the Pod create request by specifying _operations_ at the ValidatingWebhookConfiguration's [matching request rules](https://kubernetes.io/docs/reference/access-authn-authz/extensible-admission-controllers/#matching-requests-rules) section in the [deployment/validatingwebhook.yaml](https://github.com/developer-guy/admission-webhook-example-with-openfaas/blob/master/deployment/validatingwebhook.yaml) file. If we want to extend the operations, we can add a new [operation](https://github.com/kubernetes/kubernetes/blob/release-1.19/pkg/apis/admission/types.go#L158) for the Pods like _DELETE_, _UPDATE_, _CONNECT_ etc. By specifying a new operation, now apiserver being started to send a new event for this operation additional to create request. Now we can specify more than one serverless function for the operation types by checking request operation type. For [example](https://github.com/developer-guy/admission-webhook-example-with-openfaas/blob/master/functions/requiredlabel/handler.go#L109): ```go switch req.Kind.Kind { case "Pod": switch req.Operation { case v1beta1.Create: // do something for create operation case v1beta1.Delete: // do something for delete operation } } ``` Also you can specify function name and namespace that you want to use while deploying the webhook server using these environment variables: ```yaml env: - name: FUNCTION_NAME value: requiredlabel - name: FUNCTION_NAMESPACE value: openfaas-fn ``` ### Taking it further * Mutating webhooks You could take this example and convert it from validating webhooks to mutating webhooks. This is useful when a user wants to upgrade or modify objects that are created, such as adding which user created them, or adding a compulsory memory limit. * Adding more functions In the example I used a single function, however, you could register more than one function, so that you can then have a function for validating memory limits, and a separate one for checking that a minimum set of labels are present ### Join the community Do you have questions, comments or suggestions? Tweet to [@openfaas](https://twitter.com/openfaas). > Want to support our work? You can become a sponsor as an individual or a business via GitHub Sponsors with tiers to suit every budget and benefits for you in return. [Check out our GitHub Sponsors Page](https://github.com/sponsors/openfaas/) ### Acknowledgements * Special Thanks to [Alex Ellis](https://twitter.com/alexellisuk) for all guidance and for merging changes into OpenFaaS to better support this workflow. * Special Thanks to [Furkan Türkal](https://twitter.com/furkanturkaI) for all the support. ### References * [https://medium.com/ibm-cloud/diving-into-kubernetes-mutatingadmissionwebhook-6ef3c5695f74](https://medium.com/ibm-cloud/diving-into-kubernetes-mutatingadmissionwebhook-6ef3c5695f74) * [https://blog.alexellis.io/get-started-with-openfaas-and-kind/](https://blog.alexellis.io/get-started-with-openfaas-and-kind/) * [https://github.com/morvencao/kube-mutating-webhook-tutorial](https://github.com/morvencao/kube-mutating-webhook-tutorial) * [https://github.com/developer-guy/admission-webhook-example-with-openfaas](https://github.com/developer-guy/admission-webhook-example-with-openfaas)
45.835249
1,170
0.774304
eng_Latn
0.9502
6ad4ab36fa4e9811546c12b967ad5b933c994713
14,274
md
Markdown
gan/README.md
sarthakpati/Red-GAN
45cee4ca73fb2c0665b76e3df049184511d18bc6
[ "MIT" ]
20
2020-04-24T08:52:37.000Z
2022-01-23T15:05:50.000Z
gan/README.md
sarthakpati/Red-GAN
45cee4ca73fb2c0665b76e3df049184511d18bc6
[ "MIT" ]
null
null
null
gan/README.md
sarthakpati/Red-GAN
45cee4ca73fb2c0665b76e3df049184511d18bc6
[ "MIT" ]
4
2020-05-11T20:18:23.000Z
2021-03-18T19:06:14.000Z
[![License CC BY-NC-SA 4.0](https://img.shields.io/badge/license-CC4.0-blue.svg)](https://raw.githubusercontent.com/nvlabs/SPADE/master/LICENSE.md) ![Python 3.6](https://img.shields.io/badge/python-3.6-green.svg) # Red-GAN The implementation is in large adopted from SPADE-GAN (https://github.com/NVlabs/SPADE) ### Installation The following requirements should be installed for training the GAN code: ```torch>=1.0.0 torchvision dominate>=2.3.1 dill scikit-image ``` ### Help #### Train The train.py script is used for training. Executing the help statement `python3 train.py -h` shows available training options: ```` usage: train.py [-h] [--gpu_ids GPU_IDS] [--checkpoints_dir CHECKPOINTS_DIR] [--model MODEL] [--norm_G NORM_G] [--norm_D NORM_D] [--norm_E NORM_E] [--batchSize BATCHSIZE] [--preprocess_mode {resize_and_crop,crop,scale_width,scale_width_and_crop,scale_shortside,scale_shortside_and_crop,fixed,none}] [--load_size LOAD_SIZE] [--crop_size CROP_SIZE] [--aspect_ratio ASPECT_RATIO] [--label_nc LABEL_NC] [--contain_dontcare_label] [--dataroot DATAROOT] [--dataset_mode DATASET_MODE] [--serial_batches] [--no_flip] [--nThreads NTHREADS] [--max_dataset_size MAX_DATASET_SIZE] [--load_from_opt_file] [--cache_filelist_write] [--cache_filelist_read] [--display_winsize DISPLAY_WINSIZE] [--netG NETG] [--ngf NGF] [--init_type INIT_TYPE] [--init_variance INIT_VARIANCE] [--z_dim Z_DIM] --segmentator SEGMENTATOR [--instance] [--nef NEF] [--use_vae] [--display_freq DISPLAY_FREQ] [--print_freq PRINT_FREQ] [--save_latest_freq SAVE_LATEST_FREQ] [--save_epoch_freq SAVE_EPOCH_FREQ] [--no_html] [--debug] [--tf_log] [--continue_train] [--which_epoch WHICH_EPOCH] [--niter NITER] [--niter_decay NITER_DECAY] [--optimizer OPTIMIZER] [--beta1 BETA1] [--beta2 BETA2] [--lr LR] [--D_steps_per_G D_STEPS_PER_G] [--ndf NDF] [--lambda_feat LAMBDA_FEAT] [--lambda_vgg LAMBDA_VGG] [--no_ganFeat_loss] [--vgg_loss] [--gan_mode GAN_MODE] [--netD NETD] [--no_TTUR] [--lambda_kld LAMBDA_KLD] optional arguments: -h, --help show this help message and exit --name NAME name of the experiment. It decides where to store samples and models (default: label2coco) --gpu_ids GPU_IDS gpu ids: e.g. 0 0,1,2, 0,2. use -1 for CPU (default: 0) --checkpoints_dir CHECKPOINTS_DIR models are saved here (default: ./checkpoints) --model MODEL which model to use (default: pix2pix) --norm_G NORM_G instance normalization or batch normalization (default: spectralinstance) --norm_D NORM_D instance normalization or batch normalization (default: spectralinstance) --norm_E NORM_E instance normalization or batch normalization (default: spectralinstance) --phase PHASE train, val, test, etc (default: train) --batchSize BATCHSIZE input batch size (default: 1) --preprocess_mode {resize_and_crop,crop,scale_width,scale_width_and_crop,scale_shortside,scale_shortside_and_crop,fixed,none} scaling and cropping of images at load time. (default: none) --load_size LOAD_SIZE Scale images to this size. The final image will be cropped to --crop_size. (default: 1024) --crop_size CROP_SIZE Crop to the width of crop_size (after initially scaling the images to load_size.) (default: 512) --aspect_ratio ASPECT_RATIO The ratio width/height. The final height of the load image will be crop_size/aspect_ratio (default: 1.0) --label_nc LABEL_NC # of input label classes without unknown class. If you have unknown class as class label, specify --contain_dopntcare_label. (default: 182) --contain_dontcare_label if the label map contains dontcare label (dontcare=255) (default: False) --dataroot DATAROOT --dataset_mode DATASET_MODE --serial_batches if true, takes images in order to make batches, otherwise takes them randomly (default: False) --no_flip if specified, do not flip the images for data argumentation (default: False) --nThreads NTHREADS # threads for loading data (default: 0) --max_dataset_size MAX_DATASET_SIZE Maximum number of samples allowed per dataset. If the dataset directory contains more than max_dataset_size, only a subset is loaded. (default: 9223372036854775807) --load_from_opt_file load the options from checkpoints and use that as default (default: False) --cache_filelist_write saves the current filelist into a text file, so that it loads faster (default: False) --cache_filelist_read reads from the file list cache (default: False) --display_winsize DISPLAY_WINSIZE display window size (default: 400) --netG NETG selects model to use for netG (pix2pixhd | spade) (default: spade) --ngf NGF # of gen filters in first conv layer (default: 64) --init_type INIT_TYPE network initialization [normal|xavier|kaiming|orthogonal] (default: xavier) --init_variance INIT_VARIANCE variance of the initialization distribution (default: 0.02) --z_dim Z_DIM dimension of the latent z vector (default: 256) --segmentator SEGMENTATOR path to the segmentator network (default: None) --instance if specified, add instance map as input (default: False) --nef NEF # of encoder filters in the first conv layer (default: 16) --use_vae enable training with an image encoder. (default: False) --display_freq DISPLAY_FREQ frequency of showing training results on screen (default: 100) --print_freq PRINT_FREQ frequency of showing training results on console (default: 100) --save_latest_freq SAVE_LATEST_FREQ frequency of saving the latest results (default: 5000) --save_epoch_freq SAVE_EPOCH_FREQ frequency of saving checkpoints at the end of epochs (default: 10) --no_html do not save intermediate training results to [opt.checkpoints_dir]/[opt.name]/web/ (default: False) --debug only do one epoch and displays at each iteration (default: False) --tf_log if specified, use tensorboard logging. Requires tensorflow installed (default: False) --continue_train continue training: load the latest model (default: False) --which_epoch WHICH_EPOCH which epoch to load? set to latest to use latest cached model (default: latest) --niter NITER # of iter at starting learning rate. This is NOT the total #epochs. Totla #epochs is niter + niter_decay (default: 50) --niter_decay NITER_DECAY # of iter to linearly decay learning rate to zero (default: 0) --optimizer OPTIMIZER --beta1 BETA1 momentum term of adam (default: 0.5) --beta2 BETA2 momentum term of adam (default: 0.999) --lr LR initial learning rate for adam (default: 0.0002) --D_steps_per_G D_STEPS_PER_G number of discriminator iterations per generator iterations. (default: 1) --ndf NDF # of discrim filters in first conv layer (default: 64) --lambda_feat LAMBDA_FEAT weight for feature matching loss (default: 10.0) --lambda_vgg LAMBDA_VGG weight for vgg loss (default: 10.0) --no_ganFeat_loss if specified, do *not* use discriminator feature matching loss (default: False) --vgg_loss if specified, use VGG feature matching loss (default: False) --gan_mode GAN_MODE (ls|original|hinge) (default: hinge) --netD NETD (n_layers|multiscale|image) (default: multiscale) --no_TTUR Use TTUR training scheme (default: False) --lambda_kld LAMBDA_KLD ```` #### Example command ````bash python3 train.py --name isic_training --dataset_mode isic --label_dir ./datasets/isic/fold_2/train/segmentation_masks --image_dir ./datasets/isic/fold_2/train/images --dataroot ./datasets/isic/fold_2/train --batchSize 8 --niter 100 --no_pairing_check --gpu_ids=0 --segmentator ./checkpoints/isic_fold_2/model_epochs100_percent100_isic_256 ```` test.py script is used for evaluation. Executing the statement `python3 test.py -h`, outputs: ```` usage: test.py [-h] [--name NAME] [--gpu_ids GPU_IDS] [--checkpoints_dir CHECKPOINTS_DIR] [--model MODEL] [--norm_G NORM_G] [--norm_D NORM_D] [--norm_E NORM_E] [--phase PHASE] [--batchSize BATCHSIZE] [--preprocess_mode {resize_and_crop,crop,scale_width,scale_width_and_crop,scale_shortside,scale_shortside_and_crop,fixed,none}] [--load_size LOAD_SIZE] [--crop_size CROP_SIZE] [--aspect_ratio ASPECT_RATIO] [--label_nc LABEL_NC] [--contain_dontcare_label] [--dataroot DATAROOT] [--dataset_mode DATASET_MODE] [--serial_batches] [--no_flip] [--nThreads NTHREADS] [--max_dataset_size MAX_DATASET_SIZE] [--load_from_opt_file] [--cache_filelist_write] [--cache_filelist_read] [--display_winsize DISPLAY_WINSIZE] [--netG NETG] [--ngf NGF] [--init_type INIT_TYPE] [--init_variance INIT_VARIANCE] [--z_dim Z_DIM] --segmentator SEGMENTATOR [--instance] [--nef NEF] [--use_vae] [--results_dir RESULTS_DIR] [--which_epoch WHICH_EPOCH] [--how_many HOW_MANY] [--condition_class CONDITION_CLASS] optional arguments: -h, --help show this help message and exit --name NAME name of the experiment. It decides where to store samples and models (default: label2coco) --gpu_ids GPU_IDS gpu ids: e.g. 0 0,1,2, 0,2. use -1 for CPU (default: 0) --checkpoints_dir CHECKPOINTS_DIR models are saved here (default: ./checkpoints) --model MODEL which model to use (default: pix2pix) --norm_G NORM_G instance normalization or batch normalization (default: spectralinstance) --norm_D NORM_D instance normalization or batch normalization (default: spectralinstance) --norm_E NORM_E instance normalization or batch normalization (default: spectralinstance) --phase PHASE train, val, test, etc (default: train) --batchSize BATCHSIZE input batch size (default: 1) --preprocess_mode {resize_and_crop,crop,scale_width,scale_width_and_crop,scale_shortside,scale_shortside_and_crop,fixed,none} scaling and cropping of images at load time. (default: scale_width_and_crop) --load_size LOAD_SIZE Scale images to this size. The final image will be cropped to --crop_size. (default: 256) --crop_size CROP_SIZE Crop to the width of crop_size (after initially scaling the images to load_size.) (default: 256) --aspect_ratio ASPECT_RATIO The ratio width/height. The final height of the load image will be crop_size/aspect_ratio (default: 1.0) --label_nc LABEL_NC # of input label classes without unknown class. If you have unknown class as class label, specify --contain_dopntcare_label. (default: 182) ```` #### Example command ```bash python3 test.py --name BRATS_training --dataset_mode brats --label_dir ./datasets/BRATS_dataset_splices/fold_4/train_label_full --image_dir_t1ce ./datasets/BRATS_dataset_splices/fold_4/train_t1ce_img_full --image_dir_t1 ./datasets/BRATS_dataset_splices/fold_4/train_t1_img_full --image_dir_t2 ./datasets/BRATS_dataset_splices/fold_4/train_t2_img_full --image_dir_flair ./datasets/BRATS_dataset_splices/fold_4/train_flair_img_full --dataroot ./datasets/BRATS_dataset_splices/fold_4 --batchSize 16 --no_pairing_check --gpu_ids=0 --segmentator ./checkpoints/fold_4/model_epochs100_percent0_pure_vis --results_dir /home/qasima/venv_spade/SPADE/results/BRATS_training_scanner_4/fold_4/ --condition_class 0 ``` ### Additional Note: If the parameter `--segmentator` is not set (by specifying the segmentor path), then the third player is not included in the architecture, which results in the vanilla [SPADE](https://github.com/NVlabs/SPADE/blob/master/README.md) architecture.
59.475
700
0.598431
eng_Latn
0.691767
6ad4cc2d11362b852fca244fbd1504aed15f3538
293
md
Markdown
_pages/navigation/database.md
Atercatus/Atercatus.github.io
5889b1d00aadd999476e1ec9e2d05ebfaaf5a9cb
[ "MIT" ]
null
null
null
_pages/navigation/database.md
Atercatus/Atercatus.github.io
5889b1d00aadd999476e1ec9e2d05ebfaaf5a9cb
[ "MIT" ]
9
2020-01-04T17:07:34.000Z
2020-01-06T08:57:47.000Z
_pages/navigation/database.md
Atercatus/Atercatus.github.io
5889b1d00aadd999476e1ec9e2d05ebfaaf5a9cb
[ "MIT" ]
2
2020-02-16T16:24:05.000Z
2021-02-17T06:31:58.000Z
--- title: Database layout: collection permalink: /database/ collection: database author_profile: true entries_layout: grid classes: wide sort_by: date # date (default) title sort_order: forward # forward (default), reverse header: # overlay_image: /assets/images/boost-tv/boostcamp.png ---
20.928571
56
0.771331
eng_Latn
0.391246
6ad5e2599d1b983ecc06df448f068ed53129d2cf
23
md
Markdown
README.md
mmarcec007/mark-marcec.github.io
76fc4b08f84258d3dff438519d3f60bdeceedb45
[ "MIT" ]
null
null
null
README.md
mmarcec007/mark-marcec.github.io
76fc4b08f84258d3dff438519d3f60bdeceedb45
[ "MIT" ]
null
null
null
README.md
mmarcec007/mark-marcec.github.io
76fc4b08f84258d3dff438519d3f60bdeceedb45
[ "MIT" ]
null
null
null
# mark-marcec.github.io
23
23
0.782609
vie_Latn
0.173534
6ad690af5c81d938389d42fc19f1bdd20e9c60c2
1,962
md
Markdown
_drafts/2015-05-xx-usb-hub-check.md
kazuhito-m/kazuhito-m.github.io
3df8137ef0d630985ea3c7731829e1f311593973
[ "MIT" ]
null
null
null
_drafts/2015-05-xx-usb-hub-check.md
kazuhito-m/kazuhito-m.github.io
3df8137ef0d630985ea3c7731829e1f311593973
[ "MIT" ]
null
null
null
_drafts/2015-05-xx-usb-hub-check.md
kazuhito-m/kazuhito-m.github.io
3df8137ef0d630985ea3c7731829e1f311593973
[ "MIT" ]
1
2018-05-13T11:58:50.000Z
2018-05-13T11:58:50.000Z
--- published: false layout: post title: RaspberryPIで無線LAN設定 category: tech tags: [raspberrypi,usb,linux] --- ラズパイを「一台一仕事のサーバ」として運用していきたい三浦としては…「何処に置いても動作する」にしておきたいわけです。 ということで、RaspberryPIに無線LANを設定します。 ## 使う道具 + RaspberryPI(マーク1) + USB無線LANユニット - WLI-UC-GNM ## 参考にしたサイト + http://denshikousaku.net/raspberry-pi-wifi-lan-usb …上のLANユニット…「力いっぱい地雷認定」されてんじゃねーかw ## やったこと ### ラズパイにログインして、認識してるか確認。 ```bash pi@raspberrypi ~ $ lsusb | grep -i LAN Bus 001 Device 004: ID 0411:01a2 BUFFALO INC. (formerly MelCo., Inc.) WLI-UC-GNM Wireless LAN Adapter [Ralink RT8070] ``` ### 設定を吐き出させる。 ``` pi@raspberrypi ~ $ wpa_passphrase Your_SSID Your_Passphrase network={ ssid="Your_SSID" #psk="Your_Passphrase" psk=なんかなんか } pi@raspberrypi ~ ``` ### /etc の設定ファイルに付け加える。 ```bash pi@raspberrypi ~ $ sudo vim /etc/wpa_supplicant/wpa_supplicant.conf ctrl_interface=DIR=/var/run/wpa_supplicant GROUP=netdev update_config=1 # ここから以下が追加 network={ ssid="Your_SSID" #psk="Your_Passphrase" psk=なんかなんか } ``` 参考にしたサイトには、上記のpsk=の下に「WPA-PSKの設定」があったのだが…追加すると繋がらなかったので、ただssidとpskだけにした。 ※恐らく「セキュリティ的にガバガバ」なんだろうと思うけど、本気でやりたかったら以下サイトをしらべながら設定すべし。(TODO) [http://www.youchikurin.com/blog/2007/06/linuxlan_1.html](http://www.youchikurin.com/blog/2007/06/linuxlan_1.html) ### ネットワークカードの設定を追加。 ``` pi@raspberrypi ~ $ sudo cp -a /etc/network/interfaces /etc/network/interfaces.org pi@raspberrypi ~ $ sudo vi /etc/network/interfaces auto lo iface lo inet loopback auto eth0 allow-hotplug eth0 iface eth0 inet manual auto wlan0 allow-hotplug wlan0 # 以下、コメントアウト&追加 # iface wlan0 inet manual iface wlan0 inet static address 192.168.1.32 netmask 255.255.255.0 gateway 192.168.1.1 wpa-conf /etc/wpa_supplicant/wpa_supplicant.conf ``` ### ネットワークの再起動 ```bash pi@raspberrypi ~ $ sudo service networking restart ``` あとは、無線LAN側のIPにLAN内からsshして、繋がったら有線を抜くべし。 ## やってみて + USBの無線LANユニットが(記事の地雷指定どおり)目玉焼き焼けそうな発熱 + セキュリティ設定が甘い(と思われる) ので、ココらへんをTODOにして、もうちょい改善していくつもりです。
18.509434
117
0.752803
yue_Hant
0.445822
6ad6e75e289da514d4f855d77dadc5a0ffc96102
4,867
md
Markdown
Skype/SfbServer/manage/health-and-monitoring/conference-summary-subreport.md
isabella232/OfficeDocs-SkypeForBusiness.de-DE
36002f4e7303a572fe24c40db59e1ae6c48207d0
[ "CC-BY-4.0", "MIT" ]
null
null
null
Skype/SfbServer/manage/health-and-monitoring/conference-summary-subreport.md
isabella232/OfficeDocs-SkypeForBusiness.de-DE
36002f4e7303a572fe24c40db59e1ae6c48207d0
[ "CC-BY-4.0", "MIT" ]
1
2021-10-09T18:09:59.000Z
2021-10-09T18:09:59.000Z
Skype/SfbServer/manage/health-and-monitoring/conference-summary-subreport.md
isabella232/OfficeDocs-SkypeForBusiness.de-DE
36002f4e7303a572fe24c40db59e1ae6c48207d0
[ "CC-BY-4.0", "MIT" ]
null
null
null
--- title: Zusammenfassender Konferenzunterbericht in Skype for Business Server ms.reviewer: '' ms.author: v-cichur author: cichur manager: serdars audience: ITPro ms.topic: article ms.prod: skype-for-business-itpro f1.keywords: - NOCSH ms.localizationpriority: medium ms.assetid: 2fc1d2bf-34f5-4093-a6e2-250ec1f1b004 description: 'Zusammenfassung: Erfahren Sie mehr über den zusammenfassenden Konferenzunterbericht in Skype for Business Server.' ms.openlocfilehash: 66ca2c80bb20026540e74c0ffd28c32be7f7343a ms.sourcegitcommit: 556fffc96729150efcc04cd5d6069c402012421e ms.translationtype: MT ms.contentlocale: de-DE ms.lasthandoff: 08/26/2021 ms.locfileid: "58630599" --- # <a name="conference-summary-subreport-in-skype-for-business-server"></a>Zusammenfassender Konferenzunterbericht in Skype for Business Server **Zusammenfassung:** Erfahren Sie mehr über den zusammenfassenden Konferenzunterbericht in Skype for Business Server. Der zusammenfassende Konferenzunterbericht stellt eine Gesamtübersicht zu gescheiterten Konferenzsitzungen bereit, bei denen Fehler aufgetreten sind. Diese gescheiterten Sitzungen sind weiter nach Sitzungstyp unterteilt: Konferenzzustandsobjekt-Sitzungen und MCU-Sitzungen. ## <a name="filters"></a>Filter Mithilfe von Filtern können Sie eine gezieltere Datenauswahl erreichen oder die zurückgegebenen Daten auf unterschiedliche Weise anzeigen. In der folgenden Tabelle werden die Filter aufgelistet, die Sie im zusammenfassenden Konferenzunterbericht verwenden können. **Filter im zusammenfassenden Konferenzunterbericht** |**Name**|**Beschreibung**| |:-----|:-----| |**From** <br/> |Anfangsdatum und -uhrzeit für den Zeitraum. Wenn die Daten nach Stunden angezeigt werden sollen, geben Sie Anfangsdatum und -uhrzeit wie folgt ein: <br/> 7.07.2015 13:00 Uhr <br/> Wenn Sie keinen Anfangszeitpunkt eingeben, beginnt der Bericht automatisch am angegebenen Tag um 12:00 Uhr. Zum Anzeigen der Daten nach Tag geben Sie nur das Datum ein: <br/> 7/7/2015 <br/> Sollen die Daten nach Woche oder Monat angezeigt werden, geben Sie irgendein Datum ein, das in die anzuzeigende Woche oder den anzuzeigenden Monat fällt (Sie müssen nicht den ersten Tag der Woche oder des Monats eingeben): <br/> 7/3/2015 <br/> Eine Woche läuft immer von Sonntag bis einschließlich Samstag. <br/> | |**Ziel** <br/> |Enddatum und -uhrzeit für den Zeitraum. Wenn die Daten nach Stunden angezeigt werden sollen, geben Sie Enddatum und -uhrzeit wie folgt ein: <br/> 7.07.2015 13:00 Uhr <br/> Wenn Sie keinen Endzeitpunkt eingeben, endet der Bericht automatisch am angegebenen Tag um 12:00 Uhr. Zum Anzeigen der Daten nach Tag geben Sie nur das Datum ein: <br/> 7/7/2015 <br/> Sollen die Daten nach Woche oder Monat angezeigt werden, geben Sie irgendein Datum ein, das in die anzuzeigende Woche oder den anzuzeigenden Monat fällt (Sie müssen nicht den ersten Tag der Woche oder des Monats eingeben): <br/> 7/3/2015 <br/> Eine Woche läuft immer von Sonntag bis einschließlich Samstag. <br/> | |**Pool** <br/> |Vollqualifizierter Domänenname (FQDN) des Registrierungsstellenpools oder Edgeservers. Sie können einen einzelnen Pool auswählen, oder auf **[Alle]** klicken, um die Daten für alle Pools anzuzeigen. Diese Dropdownliste wird basierend auf den Datensätzen in der Datenbank automatisch ausgefüllt.<br/> | ## <a name="metrics"></a>Metriken In der folgenden Tabelle sind die Metriken aufgelistet, die im zusammenfassenden Konferenzunterbericht angegeben werden. **Metriken im zusammenfassenden Konferenzunterbericht** |**Name**|**Kann nach dieser Metrik sortiert werden?**|**Beschreibung**| |:-----|:-----|:-----| |**Konferenzen insgesamt** <br/> |Nein <br/> |Gesamtzahl der Konferenzen, die durchgeführt wurden. <br/> | |**Konferenzsitzungen insgesamt** <br/> |Nein <br/> |Gesamtzahl der Konferenzsitzungen. Eine einzelne Konferenz kann mehrere Sitzungen haben. Beispielsweise kann eine Konferenz sowohl eine Konferenzzustandsobjekt-Sitzung als auch eine MCU-Sitzung umfassen. <br/> | |**Sitzungsfehlerrate insgesamt** <br/> |Nein <br/> |Prozentsatz aller gescheiterten Konferenzen. <br/> | |**Konferenzzustandsobjekt-Sitzungen** <br/> |Nein <br/> |Gesamtanzahl der Konferenzzustandsobjekt-Sitzungen. <br/> | |**Fehlerrate für Konferenzzustandsobjekt** <br/> |Nein <br/> |Prozentsatz der gescheiterten Konferenzzustandsobjekt-Sitzungen. <br/> | |MCU-Sitzungen <br/> |Nein <br/> |Gesamtanzahl der MCU-Sitzungen. <br/> | |**MCU-Fehlerrate** <br/> |Nein <br/> |Prozentsatz der gescheiterten MCU-Sitzungen. <br/> | |**MCU-Sitzungen nach Modalität** <br/> |Nein <br/> |Gesamtanzahl der MCU-Sitzungen, gruppiert nach Modalität (z. B. Chatkonferenz). <br/> | |**Fehlerrate nach Modalität** <br/> |Nein <br/> |Prozentsatz der gescheiterten MCU-Sitzungen, gruppiert nach Modalität (z. B. Chatkonferenz). <br/> |
82.491525
708
0.770495
deu_Latn
0.994693
6ad74138043f58f1a9c5c324ad2ecb85cc7a9a91
1,845
markdown
Markdown
_posts/2017/2017-11-19-hello-blog.markdown
raw-coder/raw-coder.github.io
a3d67e58fcdd26c490dacf2c76501ab4d2d5ba48
[ "MIT" ]
1
2021-06-10T14:26:52.000Z
2021-06-10T14:26:52.000Z
_posts/2017/2017-11-19-hello-blog.markdown
raw-coder/raw-coder.github.io
a3d67e58fcdd26c490dacf2c76501ab4d2d5ba48
[ "MIT" ]
null
null
null
_posts/2017/2017-11-19-hello-blog.markdown
raw-coder/raw-coder.github.io
a3d67e58fcdd26c490dacf2c76501ab4d2d5ba48
[ "MIT" ]
null
null
null
--- layout: post title: "블로그를 시작하다" summary: "블로그를 시작하다" author: raw-coder date: '2017-11-19 00:00:00 +0900' category: life thumbnail: /assets/img/blog.jpg keywords: life permalink: /blog/hello-blog/ usemathjax: false --- ## 블로그를 시작하며 > 나는 좀더 많은 사람들의 삶에 도움을 주는 사람이 되고 싶었다. 그래서 개발자가 되기로 결심했다. 개발자로서 커리어를 시작하기 전, 나는 어느 대기업 부설 생산기술연구소의 연구원이었다. 거대한 공장의 생산관리 혹은 일정관리와 관련된 몇 가지 시스템의 새로운 기능을 제안하고, 만들고, 개선하는 일을 했다. 연구 제안을 하고, 하청을 주고 프로토타입 시스템을 만들어보고(감독하고), 좋은 효과가 있었음을 논문을 쓰거나 자료를 작성하여 증명하는 일을 하는 사람들 중에 하나였다. 좋은 회사였고 의미있는 일이었지만, 난 솔직히 좀 재미없었다. 내가 하고 있는 일은 좁은 시각으로 보자면, 사무실에 앉아서 생산계획을 수립하고, 노동자들에게 업무지시를 하는 관리자 몇 명을 위한 일이었다. 난 좀더 많은 사람들의 삶에 도움을 줄 수 있는 일이 하고 싶어졌다. 그래서 30살이 넘어 퇴사를 했다. > 세상이 학교 다닐때처럼 녹록하지는 않았지만, 그래도 개발자는 될 수 있었다. 운이 좋았다. 대책도 없이 잘 다니던 좋은 회사를 그만두고 고생도 많이 했다. 몇 달 쉬면서 여행도 다니고, 어학공부도 하면서 가고 싶었던 회사에 입사원서를 몇 군데 넣으면 이직이 쉽게 될 지 알았지만, 그렇지 않았다. 참 오래동안 취뽀와 영어학원을 전전한 끝에 간신히 개발자는 될 수 있었다. 사실 운이 좋았다. 개발자가 되려는 컴퓨터 전공자들은 다 기피한다는 악성 대형 SI 프로젝트들이 수많은 신입 개발자들을 블랙홀처럼 빨아들이고 있었다. 내가 입사한 그 회사는 그해 신입 개발자로 300명 이상을 채용했다. 그중에 나도 하나였다. > 첫 프로젝트는 엉망이었지만, 나는 그저 감사하기만 했다. 그리고 열심히 했다. 개발자로서 나의 커리어의 첫 줄을 장식하게 된 프로젝트는 국가의 세금과 관련된 시스템을 대대적으로 새롭게(!) 만드는 초대형 SI 프로젝트였다. 공공 SI 프로젝트에 처음 투입된 초보 개발자는 문서로 정의된 비즈니스 로직(주로 단순 CRUD)을 구현하고 물량을 뽑아내는 역할을 하게 되는데, 나는 그중 하나였다. 사용할 수 있는 기술은 이미 정해져있었고, 수많은 가이드 문서가 코드의 자유를 옥죄어 오는 환경이었다. 닭장 같은 사무실에 앉아 하루종일 비슷한 화면을 찍어내야하는 일이었지만, 나는 초보 개발자였다. 모든 것이 새로웠고 하루하루 배우고 새로운 경험을 하는 일이 반복되었다. 물론 두, 세달 정도 지나니 반복작업, 노가다가 시작되긴 했었다. 그럼에도 불구하고, 나 정도의 일천한 경험과 실력을 가진 초보 개발자가 개발자로서 커리어를 시작할 수 있음에 감사하면서 나는 3년 가까운 프로젝트 투입 기간동안 정말 열심히 개발(컨트롤 + C, V)했다. 열심히 배워서 다음 프로젝트에서는 더 잘하고 싶었다. 더 좋은 코드를 작성하고 싶었다. > 블로그를 시작하자. 첫 프로젝트를 마치고, 본사에 복귀하여 4개 정도의 프로젝트를 경험하고, 이제 경력 4년을 가진 개발자가 되었다. 연말이 되어 나 자신을 되돌아 보게 되면서 생각했다. 슬프지만 난 여전히 초보 개발자를 벗어나지 못했다. 생각없이 열심히만 하지 말자. 야매는 싫다. 정말 잘하고 싶다고 생각했다. 그리고 결심했다! 조금씩 나아지는 모습을 만들자. 그래서 블로그를 시작하게 된다.
31.271186
189
0.704065
kor_Hang
1.00001
6ad75133cd097e2160bb320abd4aa7dbe5d1e0f2
347
md
Markdown
docs/CONTRIBUTING.md
cwerm/npmify
86472cfd830f004ed8c04b77b577633ad473e02a
[ "MIT" ]
1
2019-07-16T14:24:08.000Z
2019-07-16T14:24:08.000Z
docs/CONTRIBUTING.md
cwerm/npmify
86472cfd830f004ed8c04b77b577633ad473e02a
[ "MIT" ]
6
2019-07-16T20:24:32.000Z
2019-07-23T23:34:47.000Z
docs/CONTRIBUTING.md
cwerm/npmify
86472cfd830f004ed8c04b77b577633ad473e02a
[ "MIT" ]
1
2019-07-21T22:54:40.000Z
2019-07-21T22:54:40.000Z
# Contributing to NPMify Keep in mind that this is a living document, and in the _very_ early stages. The goal is to keep the process as easy and open as possible. - To contribute code, fork this repo and make your changes. When you're done implementing your feature/bug fix, simply open a PR. - To open an issue, just open an issue. Easy peasy.
57.833333
138
0.766571
eng_Latn
0.999524
6ad7a80ba88badf096515e03e29729ca06cfbd17
4,362
md
Markdown
articles/supply-chain/procurement/procurement-sourcing-workflows.md
MicrosoftDocs/Dynamics-365-Operations.th-th
027178e956d20941008e2a21ceb7eab33a166bb1
[ "CC-BY-4.0", "MIT" ]
1
2021-04-20T21:13:46.000Z
2021-04-20T21:13:46.000Z
articles/supply-chain/procurement/procurement-sourcing-workflows.md
MicrosoftDocs/Dynamics-365-Operations.th-th
027178e956d20941008e2a21ceb7eab33a166bb1
[ "CC-BY-4.0", "MIT" ]
7
2017-12-13T13:15:10.000Z
2019-04-30T11:45:57.000Z
articles/supply-chain/procurement/procurement-sourcing-workflows.md
MicrosoftDocs/Dynamics-365-Operations.th-th
027178e956d20941008e2a21ceb7eab33a166bb1
[ "CC-BY-4.0", "MIT" ]
11
2018-06-19T08:33:55.000Z
2021-10-13T09:20:34.000Z
--- title: ลำดับงานการจัดซื้อและการจัดหา description: องค์กรบางองค์กรต้องการให้ใบขอซื้อและใบสั่งซื้อ ได้รับการอนุมัติโดยผู้ใช้อื่นที่ไม่ใช่บุคคลที่ป้อนธุรกรรม เพื่อตั้งค่ากระบวนการอนุมัติ คุณสามารถสร้างลำดับงานได้ author: Henrikan ms.date: 12/01/2020 ms.topic: article ms.prod: '' ms.technology: '' ms.search.form: WorkflowTableListPageRnr audience: Application User ms.reviewer: kamaybac ms.custom: 2074 ms.assetid: e54a1d59-b9fb-421b-821d-01f32878aa9b ms.search.region: Global ms.author: henrikan ms.search.validFrom: 2016-02-28 ms.dyn365.ops.version: AX 7.0.0 ms.openlocfilehash: a819093d9ee6f999e637281e54905968fe361566 ms.sourcegitcommit: 3b87f042a7e97f72b5aa73bef186c5426b937fec ms.translationtype: HT ms.contentlocale: th-TH ms.lasthandoff: 09/29/2021 ms.locfileid: "7575547" --- # <a name="procurement-and-sourcing-workflows"></a>ลำดับงานการจัดซื้อและการจัดหา [!include [banner](../includes/banner.md)] องค์กรบางองค์กรต้องการให้ใบขอซื้อและใบสั่งซื้อ ได้รับการอนุมัติโดยผู้ใช้อื่นที่ไม่ใช่บุคคลที่ป้อนธุรกรรม เพื่อตั้งค่ากระบวนการอนุมัติ คุณสามารถสร้างลำดับงานได้ ลำดับงานแสดงถึงกระบวนการทางธุรกิจ โดยจะกำหนดวิธีการที่เอกสารหมุนเวียนในระบบ และระบุว่าใครต้องทำงานให้เสร็จสมบูรณ์หรืออนุมัติเอกสาร มีประโยชน์มากมายสำหรับการใช้ระบบลำดับงานในองค์กรของคุณดังต่อไปนี้ - **กระบวนการที่สอดคล้องกัน** — คุณสามารถกำหนดกระบวนการอนุมัติสำหรับเอกสารเฉพาะ เช่น ใบขอซื้อและรายงานค่าใช้จ่าย การใช้ระบบลำดับงานช่วยให้แน่ใจว่าเอกสารจะได้รับการประมวลผลและอนุมัติในลักษณะที่สอดคล้องกันและมีประสิทธิภาพ - **การติดตามกระบวนการ** — คุณสามารถติดตามสถานะ ประวัติ และเมตริกประสิทธิภาพของอินสแตนซ์ลำดับงานเฉพาะ ซึ่งจะช่วยคุณกำหนดว่าควรทำการเปลี่ยนแปลงกับลำดับงานเพื่อปรับปรุงประสิทธิภาพหรือไม่ - **รายการงานส่วนกลาง**— ผู้ใช้สามารถดูรายการงานส่วนกลางเพื่อดูงานในลำดับงานและการอนุมัติที่กำหนดให้ลำดับงานทั้งหมดที่จะเข้าร่วมในระหว่างนั้น ซึ่งพร้อมใช้งานในหน้ารายการงาน ## <a name="the-types-of-workflows-that-you-can-create"></a>ชนิดของลำดับงานที่คุณสามารถสร้างได้ ชนิดลำดับงานต่อไปนี้จะพร้อมใช้งานสำหรับการจัดซื้อและการจัดหา | ชนิดข้อมูล | ใช้ชนิดนี้กับ | |---|---| | การตรวจทานใบขอซื้อ | สร้างการทบทวนและลำดับงานการอนุมัติสำหรับใบขอซื้อ | | การตรวจทานรายการใบขอซื้อ | สร้างการทบทวนและลำดับงานการอนุมัติสำหรับรายการใบขอซื้อ | | ลำดับงานใบสั่งซื้อ | สร้างลำดับงานการตรวจทานและการอนุมัติสำหรับใบสั่งซื้อ | | ลำดับงานรายการใบสั่งซื้อ | สร้างลำดับงานการตรวจทานและการอนุมัติสำหรับรายการใบสั่งซื้อ | | ลำดับงานการเพิ่มใบสมัครของผู้จัดจำหน่าย | สร้างการทบทานและลำดับงานการอนุมัติสำหรับการเพิ่มผู้จัดจำหน่ายใหม่ โดยใช้คำขอของผู้จัดจำหน่าย | > [!IMPORTANT] > เมื่อคุณกำลังเพิ่มลำดับงานใหม่ คุณอาจจะเห็นลำดับงานที่ล้าสมัยต่อไปนี้แสดงรายการอยู่ในกล่องโต้ตอบ **สร้างลำดับงาน** ข้อมูลเหล่านี้เกี่ยวข้องกับฟังก์ชัน *การยืนยันการรับสินค้า* ที่พร้อมใช้งานใน [Dynamics AX 2012](/dynamicsax-2012/appuser-itpro/set-up-procurement-and-sourcing-workflows) แต่ขณะนี้ไม่สนับสนุน ลำดับงานเหล่านี้ไม่ได้รับการสนับสนุนในขณะนี้ > > - ลำดับงานการแจ้งเตือนวันที่ครบกำหนดจัดส่ง > - ลำดับงานการแจ้งเตือนใบแจ้งหนี้ที่ได้รับ > - ลำดับงานการแจ้งเตือนใบรับสินค้าล้มเหลว > - ลำดับงานการแจ้งเตือนการปฏิเสธใบรับสินค้าที่ยังไม่ได้ยืนยัน ## <a name="creating-a-workflow"></a>การสร้างแผนงาน เมื่อต้องการสร้างลำดับงาน ให้ไปที่การจัดซื้อและการจัดหา &gt; การตั้งค่า &gt; การจัดซื้อและการจัดหาลำดับงาน และสร้างลำดับงานใหม่โดยการเลือกชนิดของลำดับงานที่คุณต้องการสร้าง ในผืนผ้าใบลำดับงาน คุณสามารถลากองค์ประกอบลำดับงานลงในโปรแกรมออกแบบ และลิงค์องค์ประกอบไปยังขั้นตอน ควรตั้งค่าคอนฟิกองค์ประกอบลำดับงาน สำหรับการอนุมัติและองค์ประกอบลำดับงาน คุณสามารถตั้งค่าคอนฟิกที่ผู้เข้าร่วมควรดำเนินการ ## <a name="types-of-participants"></a>ชนิดของผู้เข้าร่วม คุณสามารถกำหนดขั้นตอนการอนุมัติให้กลุ่มหรือผู้เข้าร่วมต่อไปนี้ | กลุ่มผู้ใช้ | คำอธิบาย | |---|---| | ผู้เข้าร่วม | กำหนดขั้นตอนการอนุมัติให้กับสมาชิกของกลุ่มหรือบทบาท | | ลำดับชั้น | กำหนดขั้นตอนการอนุมัติให้กับผู้ใช้ในลำดับชั้นขององค์กรเฉพาะ | | ผู้ใช้ลำดับงาน | กำหนดขั้นตอนการอนุมัติให้กับผู้ใช้ของลำดับงานนี้ | | คิว | กำหนดขั้นตอนการอนุมัติให้กับคิวรายการงาน | | ผู้ใช้ | กำหนดขั้นตอนการอนุมัติให้กับผู้ใช้เฉพาะ | ## <a name="additional-resources"></a>ทรัพยากรเพิ่มเติม - [การกำหนดลำดับงานของกระบวนการทางธุรกิจสำหรับใบขอซื้อ](https://www.microsoft.com/download/details.aspx?id=101821) - [ลำดับงานของใบขอซื้อ](purchase-requisitions-workflow.md) - [เตรียมความพร้อมผู้จัดจำหน่าย](vendor-onboarding.md) [!INCLUDE[footer-include](../../includes/footer-banner.md)]
53.195122
352
0.739798
tha_Thai
0.998939
6ad8921c26f83fdaee7416f98390ad7e740a8251
5,148
md
Markdown
msteams-platform/troubleshoot/faq.md
vule-msft/msteams-docs
f033ebf510acc57c9a906a85691c99de60a2536c
[ "CC-BY-4.0", "MIT" ]
null
null
null
msteams-platform/troubleshoot/faq.md
vule-msft/msteams-docs
f033ebf510acc57c9a906a85691c99de60a2536c
[ "CC-BY-4.0", "MIT" ]
null
null
null
msteams-platform/troubleshoot/faq.md
vule-msft/msteams-docs
f033ebf510acc57c9a906a85691c99de60a2536c
[ "CC-BY-4.0", "MIT" ]
null
null
null
--- title: Frequently asked questions description: Answers to frequently asked questions about developing apps for Microsoft Teams keywords: teams apps faq faqs ms.date: 12/07/2018 --- # Frequently asked questions (Microsoft Teams developer platform) ## Setting up ### What technology should I use to build my bot or tab? Tabs are web content that you build and deploy, so you can use any technology you want. Because bots must be built with the Bot Framework, we recommend you use one of the languages supported by the Bot Builder SDK: .NET/C# or Node.js. Although the Bot Framework also provides REST APIs usable by any language you choose, the SDK provides additional functionality and helper functions to simplify the development process. We also provide Teams-specific .NET and Node.js [extensions for the Bot Builder SDK](~/get-started/code#microsoft-teams-extensions-for-the-bot-builder-sdk) to make integration with the Teams platform even easier. ### Where do I sign up to start building Teams apps? 1. You must have access to Microsoft Teams via an Office 365 subscription 2. If you are building a bot you must [register it with Bot Framework](~/concepts/bots/bots-create) 3. App publishing requires you [register as a Microsoft app developer](//developer.microsoft.com/en-us/store/register) ## Teams apps and authentication with guest users and Microsoft Teams free On July 12, 2018, Microsoft announced a new edition of Microsoft Teams: *Microsoft Teams free*. This allows users to create their own Teams organizations of up to 300 users for free (not a free trial; free, period). You can find more information about Microsoft Teams free [here](https://support.office.com/article/6d79a648-6913-4696-9237-ed13de64ae3c). There are no significant limitations in Microsoft Teams free in terms of how many apps you can use, what they can do or, for the most part, which apps are available. Some of the Teams apps are not available, for example, because they are designed to work with Office 365 services that aren't included in Microsoft Teams free. Most apps will work in Microsoft Teams free with no modifications. However, apps which require users to log into Azure Active Directory (Azure AD) may need to make some minor changes. If you want to ensure your app works with Microsoft Teams free, and your app requires users to log into Azure AD, here's what to do: * Ensure that the endpoint you call is in the form [http://login.microsoftonline.com/**TENANT_ID**/oauth2/authorize?...]() and **not** [https://login.microsoftonline.com/**common**/oauth2/authorize?...]() * To obtain **TENANT_ID**, use the [bot context](~/concepts/bots/bots-context) or the [tab context](~/concepts/tabs/tabs-context) APIs * This will also ensure [Guest users](https://docs.microsoft.com/en-us/MicrosoftTeams/guest-access) can login using your app For a more exhaustive discussion, see [Azure AD tab authentication](~/concepts/authentication/auth-tab-aad) and [Azure AD bot authentication](~/concepts/authentication/auth-bot-aad). For a Node.js source code example of an app that does Azure AD authentication and will work on with Microsoft Teams free, see the [Microsoft Teams Authentication Sample](https://github.com/OfficeDev/microsoft-teams-sample-auth-node) app. ## Bots ### How can my bot access the ID of a user in personal chat? To can obtain the profile information of the user who is chatting with your bot, see [Fetching user profile in personal chat](~/concepts/bots/bots-context#fetching-user-profile-in-11-chat). (The process is almost identical to [Fetching the team roster](~/concepts/bots/bots-context#fetching-the-team-roster).) ### How can my bot access or listen to all messages in a channel? Bots in channels receive messages only when they are explicitly @mentioned. There is no way to grant your bot access to conversations in which they are not mentioned. ## Distribution ### How can I distribute my Microsoft Teams app? Microsoft Teams apps can be distributed to end users via AppSource and the in-product app-discovery system. For more information, see [Publish your Microsoft Teams app to AppSource](~/publishing/apps-publish). Microsoft Teams app packages can be manually distributed to your colleagues or other end users and uploaded by them via the [uploading process](~/concepts/apps/apps-upload). Please note that apps distributed in this format are not tested, validated, or trusted by Microsoft. ### What account do I use to create an AppSource or Dev Center account? An AppSource developer account is based on a [Microsoft account](https://account.microsoft.com/account), so you should use an existing Microsoft account or create one for this purpose. If you already have a Windows Store developer account, you must use the original owner Microsoft account for the Seller Dashboard experience. Although the Windows Store portal allows Azure Active Directory association, the Seller Dashboard is a separate system that works only with your original Microsoft account. --- >Not seeing your question? Submit your own; we listen to the developer community across [several channels](~/feedback).
76.835821
420
0.784965
eng_Latn
0.997523
6ad927ef162041af859bbcdbfd6987372a2ecd3d
1,573
md
Markdown
doc/models/loyalty-event-filter.md
Chetan-Gemini/square-ruby-sdk
883bab8c56adcea93d428fbcfa24201194b7bdaa
[ "Apache-2.0" ]
null
null
null
doc/models/loyalty-event-filter.md
Chetan-Gemini/square-ruby-sdk
883bab8c56adcea93d428fbcfa24201194b7bdaa
[ "Apache-2.0" ]
null
null
null
doc/models/loyalty-event-filter.md
Chetan-Gemini/square-ruby-sdk
883bab8c56adcea93d428fbcfa24201194b7bdaa
[ "Apache-2.0" ]
null
null
null
## Loyalty Event Filter The filtering criteria. If the request specifies multiple filters, the endpoint uses a logical AND to evaluate them. ### Structure `LoyaltyEventFilter` ### Fields | Name | Type | Tags | Description | | --- | --- | --- | --- | | `loyalty_account_filter` | [`Loyalty Event Loyalty Account Filter Hash`](/doc/models/loyalty-event-loyalty-account-filter.md) | Optional | Filter events by loyalty account. | | `type_filter` | [`Loyalty Event Type Filter Hash`](/doc/models/loyalty-event-type-filter.md) | Optional | Filter events by event type. | | `date_time_filter` | [`Loyalty Event Date Time Filter Hash`](/doc/models/loyalty-event-date-time-filter.md) | Optional | Filter events by date time range. | | `location_filter` | [`Loyalty Event Location Filter Hash`](/doc/models/loyalty-event-location-filter.md) | Optional | Filter events by location. | | `order_filter` | [`Loyalty Event Order Filter Hash`](/doc/models/loyalty-event-order-filter.md) | Optional | Filter events by the order associated with the event. | ### Example (as JSON) ```json { "loyalty_account_filter": { "loyalty_account_id": "loyalty_account_id8" }, "type_filter": { "types": [ "REDEEM_REWARD", "DELETE_REWARD", "ADJUST_POINTS" ] }, "date_time_filter": { "created_at": { "start_at": "start_at0", "end_at": "end_at2" } }, "location_filter": { "location_ids": [ "location_ids0", "location_ids1", "location_ids2" ] }, "order_filter": { "order_id": "order_id2" } } ```
29.679245
176
0.664336
eng_Latn
0.454508