Registered since September 28th, 2017
Has a total of 3739 bookmarks.
Showing top Tags within 48 bookmarks
Tag selected: configuration.
Saved by uncleflo on December 28th, 2019.
Max 5KVA/5KW output solar inverter for 48VDC systems; Supports batteryless operation; Max PV input 500Vdc; Removable LCD control display (20M); Built-in Bluetooth for mobile monitoring(Android App is available); Max 80A MPPT solar charger，Max Solar Power 4000W; Built-in 60A battery charging with EQUALIZATION feature; Total system max charging: 80A; Adjustable AC input voltage 90~280VAC; Supports 50hz or 60hz via LCD program; transformerless, light weight design; Built-in alarms and protections; fuse protection (against dc reverse polarity); Removable USB + RS232 + RS485 + Dry contact communication
inverter charger checkout expiry seller dispatch item buyer grid solar guarantee feedback ebay product china cheap build monitor system operation output protection communication configuration energy power battery all in one house home panel control adjustable
Saved by uncleflo on December 19th, 2019.
This article will walk you through setting up a server with Python 3, MySQL, and Apache2, sans the help of a framework. By the end of this tutorial, you will be fully capable of launching a barebones system into production. Django is often the one-shop-stop for all things Python; it’s compatible with nearly all versions of Python, comes prepackaged with a custom server, and even features a one-click-install database. Setting up a vanilla system without this powerful tool can be tricky, but earns you invaluable insight into server structure from the ground up. This tutorial uses only package installers, namely apt-get and Pip. Package installers are simply small programs that make code installations much more convenient and manageable. Without them, maintaining libraries, modules, and other code bits can become an extremely messy business.
tutorial python apache cluster server database configure browser package replication installation configuration automation install howto explanation information lookup framework development web development web administration libraries
Saved by uncleflo on December 19th, 2019.
The AR series sealed, external ventilation motors are built with IEC unified dimensions and construction configurations. The stator is built with a three-phase winding while the anisotropic rotor is designed to generate the synchronisation torque. Motors in this series are available with 4 and 6 poles. This series is completely maintenance-free and this feature, together with the control through inverter, makes these machines suitable for a large number of applications. Reluctance synchronous motors are mainly used in the textile and glass industry, in the sector of plastic materials and for the applications requiring speed adjustment independently of load values.
stator winding torque voltage dimension generate installation variable delivery maintenance exhibition product external sector motor engine construction configuration rotor design series application require adjustment load industry material item purchase control supplier electric listing connection
Saved by uncleflo on December 17th, 2019.
ITIL, formerly an acronym for Information Technology Infrastructure Library, is a set of detailed practices for IT service management (ITSM) that focuses on aligning IT services with the needs of business. ITIL describes processes, procedures, tasks, and checklists which are not organization-specific nor technology-specific, but can be applied by an organization toward strategy, delivering value, and maintaining a minimum level of competency. It allows the organization to establish a baseline from which it can plan, implement, and measure. It is used to demonstrate compliance and to measure improvement. There is no formal independent third party compliance assessment available for ITIL compliance in an organization. Certification in ITIL is only available to individuals. Since 2013, ITIL has been owned by AXELOS, a joint venture between Capita and the UK Cabinet Office. AXELOS licenses organizations to use the ITIL intellectual property, accredits licensed examination institutes, and manages updates to the framework. Organizations that wish to implement ITIL internally do not require this license.
certification process framework compliant monitor infrastructure configuration improvement guidance it digital service busines procedure technology checklist strategy establish measure demonstrate compliance intellectual license organization good practice
Saved by uncleflo on July 30th, 2019.
Visit the Configurator for custom configurations, CADs, and quotes! Our latest tips, tricks, and information, all in one place! Lee Linear has produced world-class, linear motion components and linear shafting for over 40 years. With the ability to manufacture custom shafting—threading, diameter reduction, keyways, flats, plating, and more—to required standards in a short amount of time, Lee Linear is able to fulfill orders on time, eliminating downtime and increasing profits for our customers.
linear item sample request visit information design place eliminate increase profit customer thread diameter shaft tip trick configuration manufacture company profile build create industry industrial robotics motion control mechanical construct construction
Saved by uncleflo on July 11th, 2019.
It’s a few weeks after AWS re:Invent 2018 and my head is still spinning from all of the information released at this year’s conference. This year I was able to enjoy a few sessions focused on Aurora deep dives. In fact, I walked away from the conference realizing that my own understanding of High Availability (HA), Disaster Recovery (DR), and Durability in Aurora had been off for quite a while. Consequently, I decided to put this blog out there, both to collect the ideas in one place for myself, and to share them in general. Unlike some of our previous blogs, I’m not focused on analyzing Aurora performance or examining the architecture behind Aurora. Instead, I want to focus on how HA, DR, and Durability are defined and implemented within the Aurora ecosystem. We’ll get just deep enough into the weeds to be able to examine these capabilities alone.
aurora durability replication workload redundancy configuration diligence database automation informative replica latency storage layer cluster duplicate priority transaction development administration blog article discussion realize system define examine high availability disaster recovery dr explanation
Saved by uncleflo on July 11th, 2019.
Get All Email Backup Tools in One Package Lite Edition For Personal Use Prices valid up to July 2019
refund recommend categorize convert valid pro guarantee activation customer purchase configuration speed software lifetime tool copy howto wizard online order official price package lite edition personal account secure internet email development administration recover
Saved by uncleflo on July 10th, 2019.
Sass variables are simple: you assign a value to a name that begins with $, and then you can refer to that name instead of the value itself. But despite their simplicity, they're one of the most useful tools Sass brings to the table. Variables make it possible to reduce repetition, do complex math, configure libraries, and much more. A variable declaration looks a lot like a property declaration: it’s written <variable>: <expression>. Unlike a property, which can only be declared in a style rule or at-rule, variables can be declared anywhere you want. To use a variable, just include it in a value.
sass variable repetition compatibility simplicity syntax easier define generate migration development design designer reduce compete declare library configuration property mathematics generation developer code css styling experience howto
Saved by uncleflo on May 24th, 2019.
At AWS, Support goes beyond break-fix and issue resolution. AWS Support provides a mix of tools and technology, people, and programs designed to proactively help you optimize performance, lower costs, and innovate faster. We save time for your team by helping you to move faster in the cloud and focus on your core business. AWS Support brings Amazon’s tradition of customer-obsession to the B2B technology world. We focus on helping you achieve the outcomes you need to make your business successful.
innovate cloud escalation dashboard orchestration amazon agile fix utilization guidance answer delight efficient automation infrastructure help stack architecture avoid configuration customer resolution documentation support employer design demand business solution assist create solve problem administration
Saved by uncleflo on December 23rd, 2018.
You rely on email for business critical communication, so you need to know your email has been delivered to your customers and you need to know who is sending email on your behalf. MxToolbox is your expert on email deliverability. Our newest product, MxToolbox Delivery Center, gives you the insight you need to make email configuration changes and get your emails to your customers' inboxes. MxToolbox Delivery Center is your comprehensive service for understanding email that has been sent "From" your domain. MxToolbox Delivery Center enables you to monitor email delivery information on your 5 Domains and includes 64 Standard Monitors (DNS, SMTP, HTTP, Blacklist, etc).
blacklist delivery insight checks authentication setup monitoring feedback compliance sending reputation confirm monitor configuration learn threat comprehensive mail valid automatically domain server solution email deliver business communication rely product administration developer bounce center toolbox company service howto include
Saved by uncleflo on December 20th, 2018.
Centreon provides RPM packages for its products through the Centreon open source version available free of charge in our repository. These packages have been successfully tested in version 7.x CentOS and Red Hat environments.
Saved by uncleflo on December 19th, 2018.
Before you start the SSL installation process, please make sure that the CSR code is generated, all validation requirements are met, and the SSL certificate is issued and downloaded. The next prerequisites are intended to ease SSL installation and help you avoid the common pitfalls: Having access to the hosting server configuration over SSH via the terminal; The website should be working over the HTTP connection (default port 80); The private key should be located and matched with the SSL certificate. Check this article to find the private key and match it with the SSL certificate using this tool. As you may know, there are many Linux distributions where an Apache HTTP server can be installed. In this article, we will review SSL installation steps for two major operating system families: Debian-based and RHEL-based ones.
Saved by uncleflo on February 26th, 2018.
At work, we run a simple high-availability (HA) MariaDB setup that consists of an active master that handles all read and write queries from our applications, a passive master that can take over for the active master at any time, and a read-only replication slave (not shown) that we use for backups and analytics. Replication is configured so that the active master follows the passive master, the passive master follows the active master, and the analytics slave follows one of the masters. For the remainders of this post, I will refer to the active master as the master and the passive master as the standby. The benefits of this master-master configuration is that it allows us not only to failover from master to standby if the master becomes unhealthy, but also allows us to perform patching, reboots, lengthy migrations, and other kinds of database maintenance without impacting our users. Well, almost...
Saved by uncleflo on December 27th, 2017.
HAProxy is a free, very fast and reliable solution offering high availability, load balancing, and proxying for TCP and HTTP-based applications. It is particularly suited for very high traffic web sites and powers quite a number of the world's most visited ones. Over the years it has become the de-facto standard opensource load balancer, is now shipped with most mainstream Linux distributions, and is often deployed by default in cloud platforms. Since it does not advertise itself, we only know it's used when the admins report it :-) Its mode of operation makes its integration into existing architectures very easy and riskless, while still offering the possibility not to expose fragile web servers to the net. Each version brought its set of features on top of the previous one. Upwards compatibility is a very important aspect of HAProxy, and even version 1.5 is able to run with configurations made for version 1.0 13 years before. Version 1.6 dropped a few long-deprecated keywords and suggests alternatives. The most differenciating features of each version are listed below :
proxy load balancer solution availability proxying tcp http application traffic website power standard opensource linux distribution architecture operation feature compatibility configuration explanation software server howto free fast webserver development administration production business high availability
Saved by uncleflo on December 27th, 2017.
At the first Docker Helsinki Meetup for 2017 on January 17th, we heard about three interesting use cases of the ins and outs of how Docker is used in production at Solita, Zalando and Pipedrive. We also heard about the good, the bad and the ugly of running Docker in production. Solita's Use Case: Firstly, Heikki Simperi from Solita explained how his company uses Docker to handle the various apps and systems associated with their management of the Finnish National Railway Service (VR), as well as the problems they've run into when using Docker. Solita runs a variety of their own apps on Docker, including a navigator for train drivers, a construction notification system and a traffic controller app. Heikki reiterated that it's important for the downtime to be minimal when the apps involved are ones responsible for railway management and that "anything over a 3-5 min downtime causes delays for trains, but nobody dies". Most of the issues they experienced using Docker were related to building an image, having a private repository, removing or starting up a container, or a bug inside an app. Overall, the running usage of the Docker platform has been stable, with "zero downtime". The problems have lessened after upgrading to each new Docker version and they are experiencing less and less problems as time goes on. They are looking forward to the release of Docker 1.12 on a stable channel from Red Hat.
kontena docker production use case case system it information system app management experience downtime involvement release process workflow development administration guide howto business company enterprise corporation large extensive deployment security patch container image hub pipeline tools configuration script file test distribution linux engine option
Saved by uncleflo on June 27th, 2017.
Putting a website on the internet means exposing that website to hacking attempts, port scans, traffic sniffers and data miners. If you’re lucky, you might get some legitimate traffic as well, but not if someone takes down or defaces your site first. Most of us know to look for the lock icon when we're browsing to make sure a site is secure, but that only scratches the surface of what can be done to protect a web server. Even SSL itself can be done many ways, and some are much better than others. Cookies store sensitive information from websites; securing these can prevent impersonation. Additionally, setting a handful of configuration options can protect both your website against attacks and your customer’s data from compromise. Here are 13 steps to harden your website and greatly increase the resiliency of your web server.
website security online prevent preventative technical development checklist reference list defence traffic legitimate expose attempt secure ssl configuration option increase customer resilient data harden sniffer information commercial blog article read
Saved by uncleflo on October 14th, 2016.
For details about installing SNMP agents in Windows systems, refer to Installing SNMP Agent on Windows Systems.
Saved by uncleflo on September 8th, 2016.
Last week my house had some electrical issues, and our landlord came round to take a look at things. During this time, my computer got turned off without warning when a fuse was removed. It recovered fine, but next time I went to shut down in a hurry, Firefox was hanging around, and I wanted it dead. I chose to kill it and shut down—a mistake I would soon regret.
Saved by uncleflo on September 4th, 2016.
A lot of us would like to take part in the 360 degree video revolution but when you look on the sites at what is needed it all seems a little pricey. After all, these are only 1080p camera which every mobile phone has and the technology is not that expensive unless you want the branded cameras or very high end optics and sensors. All of these cameras when fitted with the cover case can go under water as well to 30m apparently.
Saved by uncleflo on March 26th, 2015.
An instance uses access control list (ACL) rules, also called access control rules, to control what data users can access and how they can access it. ACL rules require users to pass a set of requirements in order to gain access to particular data. The system searches for ACL rules that match both the object and operation the user wants to access. If there are no matching ACL rules for the object and operation combination, then the object does not require any additional security checks and the instance grants the user access to them. By default, the system provides ACL rules to restrict access to all database and configuration operations.
Saved by uncleflo on December 10th, 2014.
Running an Internationalization / Localization [or i18n / L10n] friendly website can be tricky, and sometimes downright maddening for those who haven’t yet delved into the world of Unicode. Allowing your users to post in whichever language and / or characters of their choice to your site is crucial for any modern website.
Saved by uncleflo on October 11th, 2014.
One of the most common tasks performed by Apache and htaccess is the manipulation of a URL and configuring a redirect for a specific page. Creating a single page redirect in Apache is a simple task, which uses mod_alias module.
Saved by uncleflo on October 11th, 2014.
We need to tell Apache where and what to rewrite. You have two options here - more commonly, you can place the code in a .htaccess file. This is nothing more than a text file which when present in a directory will be interpreted by Apache. You may already be familiar with a .htaccess file, as these allow you set all kinds of server options, e.g. as a custom 404 error page. The other alternative is only available if you have root access and that is to place the code inside your httpd.conf. See load issues for more information. Throughout this tutorial, I am assuming you are using a .htaccess file in the root of your domain (i.e. http://example.com/.htaccess), unless otherwise stated.
module rewrite apache httpd lamp php linux rule condition setup configure guide url htaccess access web server engine host virtual website seo google index text tutorial configuration error link base pattern syntax howto
Saved by uncleflo on September 2nd, 2014.
The primary objectives of this lab are to introduce the concept of stress and strain concentration factors in notched structural configurations. The notion of stress concentration is experimentally explored qualitatively, using photoelasticity, and quantitatively, using experimental, analytical, and numerical methods. 2.002 Mechanics and Materials II, Spring 2004
laboratory isotropic linear elastic stress concentration mit edx MITx 2.01x objective introduce concept strain factor configuration experiment explore photo elasticity method numerical analyse mechanic material demonstration pdf elements of structures element structure
Saved by uncleflo on May 29th, 2014.
Lecture by Professor Oussama Khatib for Introduction to Robotics (CS223A) in the Stanford Computer Science Department. In the first lecture of the quarter, Professor Khatib provides an overview of the course. CS223A is an introduction to robotics which covers topics such as Spatial Descriptions, Forward Kinematics, Inverse Kinematics, Jacobians, Dynamics, Motion Planning and Trajectory Generation, Position and Force Control, and Manipulator Design.