
Registered since September 28th, 2017
Has a total of 4246 bookmarks.
Showing top Tags within 53 bookmarks
howto information development guide reference administration design website software solution service product online business uk tool company linux code server system application web list video marine create data experience description tutorial explanation technology build blog article learn world project boat download windows security lookup free performance javascript technical network control beautiful support london tools course file research purchase library programming image youtube example php construction html opensource quality install community computer profile feature power browser music platform mobile user process work database share manage hardware professional buy industry internet dance advice installation developer 3d search access material customer camera travel test standard review documentation css money engineering develop webdesign engine device photography digital api speed source program management phone discussion question event client story simple water marketing app yacht content setup package fast idea interface account communication cheap compare script study live market easy google resource operation startup monitor training
Tag selected: configuration.
Looking up configuration tag. Showing 53 results. Clear
Saved by uncleflo on January 15th, 2022.
The wait is over and the SolarStop from Lumos has arrived. Our newest product is a freestanding, solar-powered transit shelter equipped with integrated LED lighting and wireless mobile device chargers. This cutting-edge modern, aluminum solar-powered structure is topped off with our bifacial GSX Module System, providing shade and protection from the elements while also producing more than enough energy to keep the batteries fully charged with clean and sustainable solar power! The SolarStop is perfect for meeting the needs of our on-the-go population. The SolarStop is the answer to update existing transit shelters or adding new ones into the upcoming electric transit ecosystem. Easily installed in less than a day, the SolarStop does not require foundations or underground electrical connection, yet provides free, solar energy for charging mobile devices, which will be stored in the SolarStop’s bench 24/7. For urban planners, the Lumos SolarStop is a contemporary, integrated transit shelter that helps meet sustainability and clean energy goals. The SolarStop works anywhere across the country and is ideal for bus stops, light rail, train stations, airports, schools, colleges, and corporate campuses.
solar ecosystem quote shade sustainability transit clean shelter power module inquiry foundation wireless sustainable configuration bench lighting efficient energy electric product corporate beautiful article example sun generate stop bus goal
Saved by uncleflo on May 11th, 2021.
This page describes a few popular React toolchains which help with tasks. The toolchains recommended on this page don’t require configuration to get started. If you don’t experience the problems described above or don’t feel comfortable using JavaScript tools yet, consider adding React as a plain <script> tag on an HTML page, optionally with JSX. This is also the easiest way to integrate React into an existing website. You can always add a larger toolchain if you find it helpful! Create React App is a comfortable environment for learning React, and is the best way to start building a new single-page application in React.
react deploy recommend scratch developer lightweight server guide learn build create configuration package application development webdevelopment environment script javascript tool coding
Saved by uncleflo on May 11th, 2021.
For a long time Webpack was one of the biggest barriers-to-entry for someone wanting to learn React. There's a lot of boilerplate configuration that can be confusing, especially if you're new to React. Even in a talk trying to show how easy React is to set up, it can be very difficult to try and learn each and every step in the setup process. Not too long after React was first out of beta, the team at Facebook made create-react-app. It was an attempt to make spinning up a (very fully-loaded version of a) React app as simple as typing a single command.
boilerplate react parcel trending folder setup confusing node coding configuration documentation package application app howto create explanation information
Saved by uncleflo on April 10th, 2021.
A low-level interface to a growing number of Amazon Web Services. The botocore package is the foundation for the AWS CLI as well as boto3. Assuming that you have Python and virtualenv installed, set up your environment and install the required dependencies like this or you can install the library using pip:
python install pip desktop configuration documentation amazon package interface maintenance resource tool guide webservice service foundation cli core functionality work installation development administration require create
Saved by uncleflo on January 20th, 2021.
These guides go over the proper installation of Python for development purposes, as well as setuptools, pip and virtualenv. This opinionated guide exists to provide both novice and expert Python developers a best practice handbook to the installation, configuration, and usage of Python on a daily basis. There’s a good chance that you already have Python on your operating system. If so, you do not need to install or configure anything else to use Python. Having said that, I would strongly recommend that you install the tools and libraries described in the guides below before you start building Python applications for real-world use. In particular, you should always install Setuptools, Pip, and Virtualenv — they make it much easier for you to use other third-party Python libraries.
python opinionated install novice recommend installation easier configuration guide expert excellent usage tools consider infrastructure operating basis practice start setup management howto
Saved by uncleflo on December 28th, 2019.
Max 5KVA/5KW output solar inverter for 48VDC systems; Supports batteryless operation; Max PV input 500Vdc; Removable LCD control display (20M); Built-in Bluetooth for mobile monitoring(Android App is available); Max 80A MPPT solar charger,Max Solar Power 4000W; Built-in 60A battery charging with EQUALIZATION feature; Total system max charging: 80A; Adjustable AC input voltage 90~280VAC; Supports 50hz or 60hz via LCD program; transformerless, light weight design; Built-in alarms and protections; fuse protection (against dc reverse polarity); Removable USB + RS232 + RS485 + Dry contact communication
inverter charger checkout expiry seller dispatch item buyer grid solar guarantee feedback ebay product china cheap build monitor system operation output protection communication configuration energy power battery all in one house home panel control adjustable
Saved by uncleflo on December 19th, 2019.
This article will walk you through setting up a server with Python 3, MySQL, and Apache2, sans the help of a framework. By the end of this tutorial, you will be fully capable of launching a barebones system into production. Django is often the one-shop-stop for all things Python; it’s compatible with nearly all versions of Python, comes prepackaged with a custom server, and even features a one-click-install database. Setting up a vanilla system without this powerful tool can be tricky, but earns you invaluable insight into server structure from the ground up. This tutorial uses only package installers, namely apt-get and Pip. Package installers are simply small programs that make code installations much more convenient and manageable. Without them, maintaining libraries, modules, and other code bits can become an extremely messy business.
tutorial python apache cluster server database configure browser package replication installation configuration automation install howto explanation information lookup framework development web development web administration libraries
Saved by uncleflo on December 19th, 2019.
The AR series sealed, external ventilation motors are built with IEC unified dimensions and construction configurations. The stator is built with a three-phase winding while the anisotropic rotor is designed to generate the synchronisation torque. Motors in this series are available with 4 and 6 poles. This series is completely maintenance-free and this feature, together with the control through inverter, makes these machines suitable for a large number of applications. Reluctance synchronous motors are mainly used in the textile and glass industry, in the sector of plastic materials and for the applications requiring speed adjustment independently of load values.
stator winding torque voltage dimension generate installation variable delivery maintenance exhibition product external sector motor engine construction configuration rotor design series application require adjustment load industry material item purchase control supplier electric listing connection
Saved by uncleflo on December 17th, 2019.
ITIL, formerly[1] an acronym for Information Technology Infrastructure Library, is a set of detailed practices for IT service management (ITSM) that focuses on aligning IT services with the needs of business. ITIL describes processes, procedures, tasks, and checklists which are not organization-specific nor technology-specific, but can be applied by an organization toward strategy, delivering value, and maintaining a minimum level of competency. It allows the organization to establish a baseline from which it can plan, implement, and measure. It is used to demonstrate compliance and to measure improvement. There is no formal independent third party compliance assessment available for ITIL compliance in an organization. Certification in ITIL is only available to individuals. Since 2013, ITIL has been owned by AXELOS, a joint venture between Capita and the UK Cabinet Office.[2] AXELOS licenses organizations to use the ITIL intellectual property, accredits licensed examination institutes, and manages updates to the framework. Organizations that wish to implement ITIL internally do not require this license.
certification process framework compliant monitor infrastructure configuration improvement guidance it digital service busines procedure technology checklist strategy establish measure demonstrate compliance intellectual license organization good practice
Saved by uncleflo on July 30th, 2019.
Visit the Configurator for custom configurations, CADs, and quotes! Our latest tips, tricks, and information, all in one place! Lee Linear has produced world-class, linear motion components and linear shafting for over 40 years. With the ability to manufacture custom shafting—threading, diameter reduction, keyways, flats, plating, and more—to required standards in a short amount of time, Lee Linear is able to fulfill orders on time, eliminating downtime and increasing profits for our customers.
linear item sample request visit information design place eliminate increase profit customer thread diameter shaft tip trick configuration manufacture company profile build create industry industrial robotics motion control mechanical construct construction
Saved by uncleflo on July 11th, 2019.
It’s a few weeks after AWS re:Invent 2018 and my head is still spinning from all of the information released at this year’s conference. This year I was able to enjoy a few sessions focused on Aurora deep dives. In fact, I walked away from the conference realizing that my own understanding of High Availability (HA), Disaster Recovery (DR), and Durability in Aurora had been off for quite a while. Consequently, I decided to put this blog out there, both to collect the ideas in one place for myself, and to share them in general. Unlike some of our previous blogs, I’m not focused on analyzing Aurora performance or examining the architecture behind Aurora. Instead, I want to focus on how HA, DR, and Durability are defined and implemented within the Aurora ecosystem. We’ll get just deep enough into the weeds to be able to examine these capabilities alone.
aurora durability replication workload redundancy configuration diligence database automation informative replica latency storage layer cluster duplicate priority transaction development administration blog article discussion realize system define examine high availability disaster recovery dr explanation
Saved by uncleflo on July 11th, 2019.
Get All Email Backup Tools in One Package Lite Edition For Personal Use Prices valid up to July 2019
refund recommend categorize convert valid pro guarantee activation customer purchase configuration speed software lifetime tool copy howto wizard online order official price package lite edition personal account secure internet email development administration recover
Saved by uncleflo on July 10th, 2019.
Sass variables are simple: you assign a value to a name that begins with $, and then you can refer to that name instead of the value itself. But despite their simplicity, they're one of the most useful tools Sass brings to the table. Variables make it possible to reduce repetition, do complex math, configure libraries, and much more. A variable declaration looks a lot like a property declaration: it’s written <variable>: <expression>. Unlike a property, which can only be declared in a style rule or at-rule, variables can be declared anywhere you want. To use a variable, just include it in a value.
sass variable repetition compatibility simplicity syntax easier define generate migration development design designer reduce compete declare library configuration property mathematics generation developer code css styling experience howto
Saved by uncleflo on May 24th, 2019.
At AWS, Support goes beyond break-fix and issue resolution. AWS Support provides a mix of tools and technology, people, and programs designed to proactively help you optimize performance, lower costs, and innovate faster. We save time for your team by helping you to move faster in the cloud and focus on your core business. AWS Support brings Amazon’s tradition of customer-obsession to the B2B technology world. We focus on helping you achieve the outcomes you need to make your business successful.
innovate cloud escalation dashboard orchestration amazon agile fix utilization guidance answer delight efficient automation infrastructure help stack architecture avoid configuration customer resolution documentation support employer design demand business solution assist create solve problem administration
Saved by uncleflo on December 23rd, 2018.
You rely on email for business critical communication, so you need to know your email has been delivered to your customers and you need to know who is sending email on your behalf. MxToolbox is your expert on email deliverability. Our newest product, MxToolbox Delivery Center, gives you the insight you need to make email configuration changes and get your emails to your customers' inboxes. MxToolbox Delivery Center is your comprehensive service for understanding email that has been sent "From" your domain. MxToolbox Delivery Center enables you to monitor email delivery information on your 5 Domains and includes 64 Standard Monitors (DNS, SMTP, HTTP, Blacklist, etc).
blacklist delivery insight checks authentication setup monitoring feedback compliance sending reputation confirm monitor configuration learn threat comprehensive mail valid automatically domain server solution email deliver business communication rely product administration developer bounce center toolbox company service howto include
Saved by uncleflo on December 20th, 2018.
Centreon provides RPM packages for its products through the Centreon open source version available free of charge in our repository. These packages have been successfully tested in version 7.x CentOS and Red Hat environments.
centreon installation administration howto reference solution guide step-by-step configuration hardware package architecture information documentation local remove vps
Saved by uncleflo on December 19th, 2018.
Before you start the SSL installation process, please make sure that the CSR code is generated, all validation requirements are met, and the SSL certificate is issued and downloaded. The next prerequisites are intended to ease SSL installation and help you avoid the common pitfalls: Having access to the hosting server configuration over SSH via the terminal; The website should be working over the HTTP connection (default port 80); The private key should be located and matched with the SSL certificate. Check this article to find the private key and match it with the SSL certificate using this tool. As you may know, there are many Linux distributions where an Apache HTTP server can be installed. In this article, we will review SSL installation steps for two major operating system families: Debian-based and RHEL-based ones.
administration guide howto tool ssl process instructions install certificate apache knowledge knowledgebase information technical bash configuration solution
Saved by uncleflo on February 26th, 2018.
At work, we run a simple high-availability (HA) MariaDB setup that consists of an active master that handles all read and write queries from our applications, a passive master that can take over for the active master at any time, and a read-only replication slave (not shown) that we use for backups and analytics. Replication is configured so that the active master follows the passive master, the passive master follows the active master, and the analytics slave follows one of the masters. For the remainders of this post, I will refer to the active master as the master and the passive master as the standby. The benefits of this master-master configuration is that it allows us not only to failover from master to standby if the master becomes unhealthy, but also allows us to perform patching, reboots, lengthy migrations, and other kinds of database maintenance without impacting our users. Well, almost...
high availability mariadb master slave query db dbms backup replication failover painless administration configuration perform patch reboot application remain impact user configure maintain
Saved by uncleflo on December 27th, 2017.
HAProxy is a free, very fast and reliable solution offering high availability, load balancing, and proxying for TCP and HTTP-based applications. It is particularly suited for very high traffic web sites and powers quite a number of the world's most visited ones. Over the years it has become the de-facto standard opensource load balancer, is now shipped with most mainstream Linux distributions, and is often deployed by default in cloud platforms. Since it does not advertise itself, we only know it's used when the admins report it :-) Its mode of operation makes its integration into existing architectures very easy and riskless, while still offering the possibility not to expose fragile web servers to the net. Each version brought its set of features on top of the previous one. Upwards compatibility is a very important aspect of HAProxy, and even version 1.5 is able to run with configurations made for version 1.0 13 years before. Version 1.6 dropped a few long-deprecated keywords and suggests alternatives. The most differenciating features of each version are listed below :
proxy load balancer solution availability proxying tcp http application traffic website power standard opensource linux distribution architecture operation feature compatibility configuration explanation software server howto free fast webserver development administration production business high availability
Saved by uncleflo on December 27th, 2017.
At the first Docker Helsinki Meetup for 2017 on January 17th, we heard about three interesting use cases of the ins and outs of how Docker is used in production at Solita, Zalando and Pipedrive. We also heard about the good, the bad and the ugly of running Docker in production. Solita's Use Case: Firstly, Heikki Simperi from Solita explained how his company uses Docker to handle the various apps and systems associated with their management of the Finnish National Railway Service (VR), as well as the problems they've run into when using Docker. Solita runs a variety of their own apps on Docker, including a navigator for train drivers, a construction notification system and a traffic controller app. Heikki reiterated that it's important for the downtime to be minimal when the apps involved are ones responsible for railway management and that "anything over a 3-5 min downtime causes delays for trains, but nobody dies". Most of the issues they experienced using Docker were related to building an image, having a private repository, removing or starting up a container, or a bug inside an app. Overall, the running usage of the Docker platform has been stable, with "zero downtime". The problems have lessened after upgrading to each new Docker version and they are experiencing less and less problems as time goes on. They are looking forward to the release of Docker 1.12 on a stable channel from Red Hat.
kontena docker production use case case system it information system app management experience downtime involvement release process workflow development administration guide howto business company enterprise corporation large extensive deployment security patch container image hub pipeline tools configuration script file test distribution linux engine option
Saved by uncleflo on June 27th, 2017.
Putting a website on the internet means exposing that website to hacking attempts, port scans, traffic sniffers and data miners. If you’re lucky, you might get some legitimate traffic as well, but not if someone takes down or defaces your site first. Most of us know to look for the lock icon when we're browsing to make sure a site is secure, but that only scratches the surface of what can be done to protect a web server. Even SSL itself can be done many ways, and some are much better than others. Cookies store sensitive information from websites; securing these can prevent impersonation. Additionally, setting a handful of configuration options can protect both your website against attacks and your customer’s data from compromise. Here are 13 steps to harden your website and greatly increase the resiliency of your web server.
website security online prevent preventative technical development checklist reference list defence traffic legitimate expose attempt secure ssl configuration option increase customer resilient data harden sniffer information commercial blog article read
Saved by uncleflo on October 14th, 2016.
For details about installing SNMP agents in Windows systems, refer to Installing SNMP Agent on Windows Systems.
configuration config setup snmp windows server details monitor network performance install application manage howto administration step-by-step win7
Saved by uncleflo on September 8th, 2016.
Last week my house had some electrical issues, and our landlord came round to take a look at things. During this time, my computer got turned off without warning when a fuse was removed. It recovered fine, but next time I went to shut down in a hurry, Firefox was hanging around, and I wanted it dead. I chose to kill it and shut down—a mistake I would soon regret.
recover firefox session rant technology internet data restore migrate operating system computer destroy lose software configuration administration
Saved by uncleflo on September 4th, 2016.
A lot of us would like to take part in the 360 degree video revolution but when you look on the sites at what is needed it all seems a little pricey. After all, these are only 1080p camera which every mobile phone has and the technology is not that expensive unless you want the branded cameras or very high end optics and sensors. All of these cameras when fitted with the cover case can go under water as well to 30m apparently.
camera virtual reality gopro vr 360 stereoscopy phone sensor review compare comparison configuration hardware how technology
Saved by uncleflo on March 26th, 2015.
An instance uses access control list (ACL) rules, also called access control rules, to control what data users can access and how they can access it. ACL rules require users to pass a set of requirements in order to gain access to particular data. The system searches for ACL rules that match both the object and operation the user wants to access. If there are no matching ACL rules for the object and operation combination, then the object does not require any additional security checks and the instance grants the user access to them. By default, the system provides ACL rules to restrict access to all database and configuration operations.
acl rules object database configuration operation check instance access security system administration script control permission