Registered since September 28th, 2017
Has a total of 3393 bookmarks.
Showing top Tags within 71 bookmarks
Tag selected: documentation.
Saved by uncleflo on January 18th, 2019.
The waterfall model is a relatively linear sequential design approach for certain areas of engineering design. In software development, it tends to be among the less iterative and flexible approaches, as progress flows in largely one direction ("downwards" like a waterfall) through the phases of conception, initiation, analysis, design, construction, testing, deployment and maintenance. The waterfall development model originated in the manufacturing and construction industries; where the highly structured physical environments meant that design changes became prohibitively expensive much sooner in the development process. When first adopted for software development, there were no recognized alternatives for knowledge-based creative work.
waterfall iterative incremental phase linear revise agile code structure verify conflict documentation software acknowledge initiation specification model test discrete modify howto methodology system design approach development method administration administrator supervisor business workflow
Saved by uncleflo on January 6th, 2019.
We supply generic versions of graphics drivers for general purposes. Computer manufacturers might have changed the features, incorporated customizations, or made other changes to the graphics driver software or software packaging. To avoid potential installation incompatibilities, we recommend that you check first with your computer manufacturer and use the driver software provided by them. Click or select your operating system for a video demonstration of manual installation steps.
browser install verify manually setup documentation installation feedback demonstration graphics driver restricted steps recommended useful consider operating product article support information terms howto device card windows intel system video potential customization manufacture software packaging computer version purpose incompatible performance
Saved by uncleflo on December 20th, 2018.
Centreon provides RPM packages for its products through the Centreon open source version available free of charge in our repository. These packages have been successfully tested in version 7.x CentOS and Red Hat environments.
Saved by uncleflo on October 23rd, 2018.
The Exchange API is for developers looking to create automated betting systems or custom betting interfaces for themselves or for Betfair customers. The Exchange API is available for the Global, Spanish and Italian Betfair Exchange. The API contains a powerful set of features that enable advanced market navigation, search, odds retrieval, bet placement and sports related data retrieval. The Exchange API is made up of the following key components: Betting API - Contains Exchange markets navigation, odds retrieval and bet placement operations. Reporting functionality relating to settled bets is also available; Accounts API - Contains account related operations such as the ability to retrieve your available account balance as well as Vendor Services API operations that are available to licensed Software Vendors; Exchange Stream API - allows you to subscribe to market changes (both price and definitions) and orders; Heartbeat API - allows you to automatically cancel unmatched bets in the event of your API client/s losing connectivity; Race Status API - allows you to establish the status of a horse race or greyhound market both prior to and after the start of the race.
bet betting sports developer automated system custom interface exchange api feature advanced market navigation sport data placement operation account customer powerful report software automation subscribe program documentation development administration explanation lookup reference
Saved by uncleflo on September 14th, 2018.
The Monetra® Payment Software is designed for seamless integration with a variety of third party applications, including accounting, POS and web-based systems across numerous platforms. For further inquiries not detailed in the documentation, please contact us.
Saved by uncleflo on April 18th, 2018.
MySQL enables client sessions to acquire table locks explicitly for the purpose of cooperating with other sessions for access to tables, or to prevent other sessions from modifying tables during periods when a session requires exclusive access to them. A session can acquire or release locks only for itself. One session cannot acquire locks for another session or release locks held by another session. Locks may be used to emulate transactions or to get more speed when updating tables. This is explained in more detail later in this section. LOCK TABLES explicitly acquires table locks for the current client session. Table locks can be acquired for base tables or views. You must have the LOCK TABLES privilege, and the SELECT privilege for each object to be locked.
Saved by uncleflo on April 7th, 2018.
This article demonstrates how to create and dispatch DOM events. Such events are commonly called synthetic events, as opposed to the events fired by the browser itself.
Saved by uncleflo on January 24th, 2018.
This page describes the behavior of the reference client. The Bitcoin protocol is specified by the behavior of the reference client, not by this page. In particular, while this page is quite complete in describing the network protocol, it does not attempt to list all of the rules for block or transaction validity.
Saved by uncleflo on December 28th, 2017.
HHVM is an open-source virtual machine designed for executing programs written in Hack and PHP. HHVM uses a just-in-time (JIT) compilation approach to achieve superior performance while maintaining the development flexibility that PHP provides. HHVM supports Hack, PHP 5 and the major features of PHP 7. We are aware of minor incompatibilities, so please open issues when you find them. HHVM also supports many extensions as well. HHVM should be used together with a webserver like the built in, easy to deploy Proxygen, or a FastCGI-based webserver on top of nginx or Apache.
hhvm opensource virtual execute program jit compile performance perform development issue extension webserver fastcgi administration improve production apache nginx maintenance code developer server implementation facebook support documentation download github installation install source host website run howto report fix
Saved by uncleflo on July 10th, 2017.
Sodium is a modern, easy-to-use software library for encryption, decryption, signatures, password hashing and more. It is a portable, cross-compilable, installable, packageable fork of NaCl, with a compatible API, and an extended API to improve usability even further. Its goal is to provide all of the core operations needed to build higher-level cryptographic tools. Sodium supports a variety of compilers and operating systems, including Windows (with MinGW or Visual Studio, x86 and x86_64), iOS and Android. The design choices emphasize security, and "magic constants" have clear rationales. And despite the emphasis on high security, primitives are faster across-the-board than most implementations of the NIST standards.
encryption decryption software sodium natrium modern easy hash password protection extend package system windows core operation usability php development administration security code library implement perl installation documentation instructions
Saved by uncleflo on June 23rd, 2017.
Rust is a systems programming language that runs blazingly fast, prevents segfaults, and guarantees thread safety. If you haven’t seen Rust at all yet, the first thing you should read is the introduction to the book, The Rust Programming Language. It will give you a good idea of what Rust is like, show you how to install it, and explain its syntax and concepts. Upon completing the book, you’ll be an intermediate Rust developer, and will have a good grasp of the fundamental ideas behind Rust.
Saved by uncleflo on May 15th, 2017.
HTML_QuickForm 3.2.14 Welcome to HTML_QuickForm! This documentation was generated by phpDocumentor v1.4.4 Documentation generated on Wed, 09 Dec 2015 23:11:33 +0000 by phpDocumentor 1.4.4. PEAR Logo Copyright © PHP Group 2004.
Saved by uncleflo on April 12th, 2017.
The modules can be used to add additional functionalities to Centreon. It is possible to install modules using the YUM utility or source files (*.tar.gz). Community modules, under licence GPL v2, developed by the Centreon community; Core modules, under licence GPL v2, developed by the Centreon team; Proprietary modules, subject to a licence, developed by Centreon
Saved by uncleflo on April 12th, 2017.
Centreon (since version 2.4) offers a custom view system which allows user to view one or different widgets in the same page : Home > Custom views. You may have specific needs that are not yet covered by our widget catalog and this tutorial will explain to you how to write your first widget for Centreon.
Saved by uncleflo on December 9th, 2016.
You want to create a new module for Centreon 2 or to adapt an existing one? You’re at the right place! You should know Centreon contains a page dedicated to the installation and the uninstallation of modules (Administration > Modules). To make the module appears on this page, its directory must be placed inside Cetreon’s modules/ directory.
Saved by uncleflo on December 9th, 2016.
Event handlers are optional system commands (scripts or executables) that are run whenever a host or service state change occurs.
Saved by uncleflo on November 14th, 2016.
This page shows a very simple wxWidgets program that can be used as a skeleton for your own code. While it does nothing very useful, it introduces a couple of important concepts and explains how to write a working wxWidgets application. First, you have to include wxWidgets' header files, of course. This can be done on a file by file basis (such as wx/window.h) or using one global include (wx/wx.h) which includes most of the commonly needed headers (although not all of them as there are simply too many wxWidgets headers to pull in all of them). For the platforms with support for precompiled headers, as indicated by WX_PRECOMP, this global header is already included by wx/wxprec.h so we only include it for the other ones:
Saved by uncleflo on October 12th, 2016.
In computer networking and databases, the three-phase commit protocol (3PC) is a distributed algorithm which lets all nodes in a distributed system agree to commit a transaction. Unlike the two-phase commit protocol (2PC) however, 3PC is non-blocking. Specifically, 3PC places an upper bound on the amount of time required before a transaction either commits or aborts. This property ensures that if a given transaction is attempting to commit via 3PC and holds some resource locks, it will release the locks after the timeout.
Saved by uncleflo on September 8th, 2016.
Finite Element Method Magnetics - HomePage. Download, Documentation, FAQ, Linux Support, Examples, User Contributions, Miscellaneous, Related Links, Author. Finite Element Method Magnetics
Saved by uncleflo on July 19th, 2016.
Schema.org is a collaborative, community activity with a mission to create, maintain, and promote schemas for structured data on the Internet, on web pages, in email messages, and beyond. Schema.org vocabulary can be used with many different encodings, including RDFa, Microdata and JSON-LD. These vocabularies cover entities, relationships between entities and actions, and can easily be extended through a well-documented extension model. Over 10 million sites use Schema.org to markup their web pages and email messages. Many applications from Google, Microsoft, Pinterest, Yandex and others already use these vocabularies to power rich, extensible experiences. Schema.org is sponsored by Google, Microsoft, Yahoo and Yandex. The vocabularies are developed by an open community process, using the firstname.lastname@example.org mailing list and through GitHub. A shared vocabulary makes it easier for webmasters and developers to decide on a schema and get the maximum benefit for their efforts. It is in this spirit that the sponsors, together with the larger community have come together, to provide a shared collection of schemas.
schema data information definition collection community development administration creation structured internet understand machine interpretation automation vocabularies site application documentation app developer develop process
Saved by uncleflo on July 14th, 2016.
This tutorial outlines the steps for creating a two-piece cored mold using Reoflex® 40 urethane rubber from Smooth-On. About Smooth-On: You may never have heard of us, but you've seen our products at work. If you've ever been to the movies, admired a piece of sculpture, marveled at detailed architectural ornamentation or used a telephone; then you've encountered the handiwork of people who use Smooth-On rubbers, plastics, foams and other products to turn their ideas into 3-dimensional reality.
Saved by uncleflo on April 4th, 2015.
This will set up Evolution to access your Hotmail account. If this is your first account to be set up, a wizard will open when you first start Evolution. Otherwise you will have to add an account by using the following Evolution menu item Edit>Preferences>Mail Accounts>Add
Saved by uncleflo on March 26th, 2015.
SELinux (Security Enhanced Linux) is a Mandatory Access Control system built on Linux's LSM (Linux Security Modules) interface. In practice, the kernel queries SELinux before each system call to know whether the process is authorized to do the given operation. SELinux uses a set of rules — collectively known as a policy — to authorize or forbid operations. Those rules are difficult to create. Fortunately, two standard policies (targeted and strict) are provided to avoid the bulk of the configuration work. With SELinux, the management of rights is completely different from traditional Unix systems. The rights of a process depend on its security context. The context is defined by the identity of the user who started the process, the role and the domain that the user carried at that time. The rights really depend on the domain, but the transitions between domains are controlled by the roles. Finally, the possible transitions between roles depend on the identity.
Saved by uncleflo on March 26th, 2015.
In addition to the tasks often performed by users in Section 44.1, “End User Control of SELinux”, SELinux administrators could be expected to perform a number of additional tasks. These tasks typically require root access to the system. Such tasks are significantly easier under the targeted policy. For example, there is no need to consider adding, editing, or deleting Linux users from the SELinux users, nor do you need to consider roles. This section covers the types of tasks required of an administrator who maintains Red Hat Enterprise Linux running SELinux.
Saved by uncleflo on March 26th, 2015.
Administrators can expect to do most of the same things that users do in Section 5.1 End User Control of SELinux, plus a number of additional tasks that are usually done only at the root level. Using the targeted policy makes tasks measurably easier for the administrator. For example, there is no need to consider adding, editing, or deleting Linux users from the SELinux users, nor do you need to consider roles.