hexsha
stringlengths 40
40
| size
int64 5
1.04M
| ext
stringclasses 6
values | lang
stringclasses 1
value | max_stars_repo_path
stringlengths 3
344
| max_stars_repo_name
stringlengths 5
125
| max_stars_repo_head_hexsha
stringlengths 40
78
| max_stars_repo_licenses
sequencelengths 1
11
| max_stars_count
int64 1
368k
⌀ | max_stars_repo_stars_event_min_datetime
stringlengths 24
24
⌀ | max_stars_repo_stars_event_max_datetime
stringlengths 24
24
⌀ | max_issues_repo_path
stringlengths 3
344
| max_issues_repo_name
stringlengths 5
125
| max_issues_repo_head_hexsha
stringlengths 40
78
| max_issues_repo_licenses
sequencelengths 1
11
| max_issues_count
int64 1
116k
⌀ | max_issues_repo_issues_event_min_datetime
stringlengths 24
24
⌀ | max_issues_repo_issues_event_max_datetime
stringlengths 24
24
⌀ | max_forks_repo_path
stringlengths 3
344
| max_forks_repo_name
stringlengths 5
125
| max_forks_repo_head_hexsha
stringlengths 40
78
| max_forks_repo_licenses
sequencelengths 1
11
| max_forks_count
int64 1
105k
⌀ | max_forks_repo_forks_event_min_datetime
stringlengths 24
24
⌀ | max_forks_repo_forks_event_max_datetime
stringlengths 24
24
⌀ | content
stringlengths 5
1.04M
| avg_line_length
float64 1.14
851k
| max_line_length
int64 1
1.03M
| alphanum_fraction
float64 0
1
| lid
stringclasses 191
values | lid_prob
float64 0.01
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
8a05ded8b7e6a34f87605696a3ff89d732483177 | 5,569 | md | Markdown | junior-bootcamp.md | coding-club-linz/global-azure-bootcamp-2019 | d490a19e7a034cf90e406e35c4620e6da7ae89b0 | [
"MIT"
] | null | null | null | junior-bootcamp.md | coding-club-linz/global-azure-bootcamp-2019 | d490a19e7a034cf90e406e35c4620e6da7ae89b0 | [
"MIT"
] | null | null | null | junior-bootcamp.md | coding-club-linz/global-azure-bootcamp-2019 | d490a19e7a034cf90e406e35c4620e6da7ae89b0 | [
"MIT"
] | 2 | 2019-03-20T21:07:35.000Z | 2019-04-25T08:58:16.000Z | ---
layout: default
title: Junior Bootcamp 2019
showJuniorJumbotron: true
---
<div class="row">
<div class="col-sm" markdown="1">
Am **27. April 2019** werden im Rahmen des **[Global Azure Bootcamps](http://global.azurebootcamp.net)** auf der ganzen Welt hunderte Workshops zum Thema Cloud Computing und [Microsoft Azure](http://azure.microsoft.com) stattfinden. In Linz machen wir parallel zu dieser Veranstaltung auch wieder das **Junior Bootcamp**, das sich an **junge Coder zwischen 13 und 17 Jahren** richtet.
Habt ihr **schon etwas Erfahrung beim Programmieren** (z.B. mit Scratch, JavaScript, Python oder Ähnlichem)? Dann könnt Ihr im Junior Bootcamp zum ersten Mal Konferenz-Luft schnuppern. Ihr verbringt den Tag mit vielen Entwicklungs-Profis und könnt von international gefragten Expertinnen und Experten lernen.
</div>
<div class="col-sm" markdown="1">
Folgendes könnt Ihr beim Junior-Bootcamp erwarten:
* Sessions, die für Jugendliche mit wenig Programmiererfahrung geeignet sind
* Vortragende, die echte Profis auf ihrem Gebiet sind
* Ihr bekommt viele praktische Tipps, die Ihr sofort nutzen könnt
* Ihr seht, wie eine echte IT-Konferenz abläuft
Die Teilnahme am Event ist dank der [Sponsoren]({{ site.baseurl }}/sponsoren.html) kostenlos.
</div>
</div>
<p class="text-center">
<a class="btn btn-primary btn-lg" href="https://www.eventbrite.de/e/global-azure-bootcamp-austria-2019-tickets-55850997838"
role="button">
Zur Anmeldung
</a>
</p>
# Programm
<div class="container program junior-program">
<div class="row sessions">
<div class="col-md-1 d-none d-md-block">Raum</div>
<div class="col-md-2 d-none d-md-block">E09<br/></div>
<div class="col-md-7 d-none d-md-block">09.08</div>
<div class="col-md-2 d-none d-md-block">15. Stock</div>
</div>
<div class="row break">
<div class="col-md-1">09:00 - 09:40</div>
<div class="col-md-2">Check-In / Getränke und kleine Snacks</div>
<div class="col-md-7 d-none d-md-block"></div>
<div class="col-md-2 d-none d-md-block"></div>
</div>
<div class="row sessions">
<div class="col-md-1">09:40 - 10:30</div>
<div class="col-md-2 d-none d-md-block"></div>
<div class="col-md-7">{% include session-card.html room='09.08' slot=2 %}</div>
<div class="col-md-2 d-none d-md-block"></div>
</div>
<div class="row break">
<div class="col-md-1">10:30 - 10:55</div>
<div class="col-md-2 d-none d-md-block">Getränke und kleine Snacks</div>
<div class="col-md-7 d-none d-md-block"></div>
<div class="col-md-2">Getränke und kleine Snacks</div>
</div>
<div class="row sessions">
<div class="col-md-1">10:55 - 11:45</div>
<div class="col-md-2 d-none d-md-block"></div>
<div class="col-md-7">{% include session-card.html room='09.08' slot=3 %}</div>
<div class="col-md-2 d-none d-md-block"></div>
</div>
<div class="row break">
<div class="col-md-1">11:45 - 12:45</div>
<div class="col-md-2 d-none d-md-block"></div>
<div class="col-md-7 d-none d-md-block"></div>
<div class="col-md-2">Warmes Mittagessen</div>
</div>
<div class="row sessions">
<div class="col-md-1">12:45 - 13:35</div>
<div class="col-md-2 d-none d-md-block"></div>
<div class="col-md-7">{% include session-card.html room='09.08' slot=4 %}</div>
<div class="col-md-2 d-none d-md-block"></div>
</div>
<div class="row break">
<div class="col-md-1">13:35 - 13:50</div>
<div class="col-md-2 d-none d-md-block">Getränke und Kuchen</div>
<div class="col-md-7 d-none d-md-block"></div>
<div class="col-md-2">Getränke und Kuchen</div>
</div>
<div class="row sessions">
<div class="col-md-1">13:50 - 14:40</div>
<div class="col-md-2 d-none d-md-block"></div>
<div class="col-md-7">{% include session-card.html room='09.08' slot=5 %}</div>
<div class="col-md-2 d-none d-md-block"></div>
</div>
<div class="row break">
<div class="col-md-1">14:40 - 14:55</div>
<div class="col-md-2 d-none d-md-block">Getränke und Kuchen</div>
<div class="col-md-7 d-none d-md-block"></div>
<div class="col-md-2">Getränke und Kuchen</div>
</div>
<div class="row sessions">
<div class="col-md-1">14:55 - 15:45</div>
<div class="col-md-2 d-none d-md-block"></div>
<div class="col-md-7">{% include session-card.html room='09.08' slot=6 %}</div>
<div class="col-md-2 d-none d-md-block"></div>
</div>
<div class="row sessions">
<div class="col-md-1">16:00 - 16:15</div>
<div class="col-md-2">
<h3>Abschluss</h3>
<p>Coding Club Linz</p>
</div>
<div class="col-md-7 d-none d-md-block"></div>
<div class="col-md-2 d-none d-md-block"></div>
</div>
</div>
<p> </p>
<p class="text-center">
<a class="btn btn-primary btn-lg" href="https://www.eventbrite.de/e/global-azure-bootcamp-austria-2019-tickets-55850997838"
role="button">
Zur Anmeldung
</a>
</p>
## Räume
Raum | Stockwerk | Beschreibung
- | - | -
E09 | Ergeschoß | Vor dem großen Veranstaltungssaal des Wissensturm starten wir ab 09:30 mit dem Check-In und einem kleine Frühstück. Danach geht's im 9. Stock mit dem Junior Bootcamp weiter.<br/>Du findest im Raum E09 den ganzen Tag über Getränke und kleine Snacks zur Stärkung.
09.08 | 9. Stock | Junior Bootcamp Sessions
15.05 | 15. Stock | Mittagessen und Getränke und Snacks in den Pausen
{: .table }
| 42.838462 | 384 | 0.634405 | deu_Latn | 0.428722 |
8a066fb33d4494a46c54ee983e65e1ad01196869 | 1,273 | md | Markdown | asdf-{{ cookiecutter.plugin_name }}/README.md | looztra/cookiecutter-asdf-plugin | 731f232534ef3c954d86d5eefeae4f9126ebc4e6 | [
"Apache-2.0"
] | 2 | 2021-03-31T08:59:08.000Z | 2021-11-04T16:00:54.000Z | asdf-{{ cookiecutter.plugin_name }}/README.md | looztra/cookiecutter-asdf-plugin | 731f232534ef3c954d86d5eefeae4f9126ebc4e6 | [
"Apache-2.0"
] | null | null | null | asdf-{{ cookiecutter.plugin_name }}/README.md | looztra/cookiecutter-asdf-plugin | 731f232534ef3c954d86d5eefeae4f9126ebc4e6 | [
"Apache-2.0"
] | null | null | null | # asdf-{{ cookiecutter.plugin_name }}
![AllInOne](https://github.com/{{ cookiecutter.plugin_github_coordinates }}/workflows/AllInOne/badge.svg)
[![GitHub license](https://img.shields.io/github/license/{{ cookiecutter.plugin_github_coordinates }}?style=plastic)](https://github.com/{{ cookiecutter.plugin_github_coordinates }}/blob/master/LICENSE)
## Build History
[![Build history](https://buildstats.info/github/chart/{{ cookiecutter.plugin_github_coordinates }}?branch=master)](https://github.com/{{ cookiecutter.plugin_github_coordinates }}/actions)
## {{ cookiecutter.plugin_name }}
<https://github.com/{{ cookiecutter.github_coordinates }}>
## Install
```bash
asdf plugin-add {{ cookiecutter.plugin_name }} https://github.com/{{ cookiecutter.plugin_github_coordinates }}
```
## Use
Check out the [asdf](https://github.com/asdf-vm/asdf) readme for instructions on how to install and manage versions of {{ cookiecutter.plugin_name }}.
## Source code
This source code has been generated with :
```bash
cookiecutter --overwrite-if-exists --directory plugins/{{ cookiecutter.plugin_name }} --no-input https://github.com/looztra/cookiecutter-asdf-plugin
```
{% if cookiecutter.readme_more_content is defined %}{{ cookiecutter.readme_more_content }}{% endif %}
| 37.441176 | 202 | 0.754124 | kor_Hang | 0.225271 |
8a067578effe6ef2737b805922f567ab801a9134 | 5,951 | md | Markdown | articles/cognitive-services/Speech-Service/how-to-text-to-speech.md | kedMertens/azure-docs.ru-ru | 6fd8c58d1385c59d1c3889d6d2b855cd1c6dfd95 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | articles/cognitive-services/Speech-Service/how-to-text-to-speech.md | kedMertens/azure-docs.ru-ru | 6fd8c58d1385c59d1c3889d6d2b855cd1c6dfd95 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | articles/cognitive-services/Speech-Service/how-to-text-to-speech.md | kedMertens/azure-docs.ru-ru | 6fd8c58d1385c59d1c3889d6d2b855cd1c6dfd95 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | ---
title: Использование API преобразования текста в речь в службе "Речь"
description: Ознакомьтесь с тем, как использовать преобразование текста в речь службе "Речь".
titleSuffix: Microsoft Cognitive Services
services: cognitive-services
author: v-jerkin
ms.service: cognitive-services
ms.component: speech-service
ms.topic: article
ms.date: 05/07/2018
ms.author: v-jerkin
ms.openlocfilehash: d19b71542f032111bbd3d9c7f3fe246110377b5d
ms.sourcegitcommit: 2ad510772e28f5eddd15ba265746c368356244ae
ms.translationtype: HT
ms.contentlocale: ru-RU
ms.lasthandoff: 08/28/2018
ms.locfileid: "43127592"
---
# <a name="use-text-to-speech-in-speech-service"></a>Использование функции преобразования текста в речь в голосовых службах
Голосовая служба предоставляет функцию "Преобразование текста в речь" с помощью простого HTTP-запроса. Текст POST запроса будет передан в соответствующую конечную точку, откуда будет возвращен службой в виде звукового файла (`.wav`), в котором будет содержаться синтезированная речь. Затем ваше приложение может использовать этот звук как угодно.
Тело запроса POST для преобразовывания текста в речь может быть обычным текстом (в формате ASCII или UTF8) или документом [SSML](speech-synthesis-markup.md). Для преобразования простых текстовых запросов будет использоваться голос по умолчанию. В большинстве случаев используется текст в формате SSML. HTTP-запрос должен содержать маркер [авторизации](https://docs.microsoft.com/azure/cognitive-services/speech-service/rest-apis#authentication).
Ниже приведены региональные конечные точки преобразования текста в речь. Используйте ту из них, которая соответствует вашей подписке.
[!INCLUDE [](../../../includes/cognitive-services-speech-service-endpoints-text-to-speech.md)]
## <a name="specify-a-voice"></a>Указание голоса
Чтобы указать голос, используйте тег `<voice>` [SSML](speech-synthesis-markup.md). Например:
```xml
<speak version='1.0' xmlns="http://www.w3.org/2001/10/synthesis" xml:lang='en-US'>
<voice name='Microsoft Server Speech Text to Speech Voice (en-US, JessaRUS)'>
Hello, world!
</voice>
</speak>
```
Чтобы узнать список допустимых голосов и их имена см. раздел [Text to Speech voices](supported-languages.md#text-to-speech) (Голоса преобразования текста в речь).
## <a name="make-a-request"></a>Выполнение запроса
HTTP-запрос по преобразованию текста в речь выполняется в режиме POST с текстом, который в теле запроса будет заменен на звук. Максимальная длина тела HTTP-запроса — 1024 символа. Для запроса обязательными являются следующие заголовки.
Заголовок|Значения|Комментарии
-|-|-
|`Content-Type` | `application/ssml+xml` | Формат входного текста.
|`X-Microsoft-OutputFormat`| `raw-16khz-16bit-mono-pcm`<br>`audio-16khz-16kbps-mono-siren`<br>`riff-16khz-16kbps-mono-siren`<br>`riff-16khz-16bit-mono-pcm`<br>`audio-16khz-128kbitrate-mono-mp3`<br>`audio-16khz-64kbitrate-mono-mp3`<br>`audio-16khz-32kbitrate-mono-mp3`<br>`raw-24khz-16bit-mono-pcm`<br>`riff-24khz-16bit-mono-pcm`<br>`audio-24khz-160kbitrate-mono-mp3`<br>`audio-24khz-96kbitrate-mono-mp3`<br>`audio-24khz-48kbitrate-mono-mp3` | Формат выходного звука.
|`User-Agent` |имя приложения; | Обязательным также является имя приложения, длина которого не должна превышать 255 символов.
| `Authorization` | Маркер проверки подлинности можно получить путем предоставления ключа подписки службе токенов. Каждый из маркеров действителен 10 мин. См. раздел [REST APIs: Authentication](rest-apis.md#authentication) (Речевые службы REST API, подраздел "Аутентификация").
> [!NOTE]
> Если у выбранного голоса и формата вывода будет разная скорость передачи звука, то при необходимости звук будет обработан повторно. Форматы входных данных `audio-16khz-16kbps-mono-siren` и `riff-16khz-16kbps-mono-siren` не поддерживают частоту 24кГц.
Ниже приведен пример запроса.
```xml
POST /cognitiveservices/v1
HTTP/1.1
Host: westus.tts.speech.microsoft.com
X-Microsoft-OutputFormat: riff-24khz-16bit-mono-pcm
Content-Type: application/ssml+xml
User-Agent: Test TTS application
Authorization: (authorization token)
<speak version='1.0' xmlns="http://www.w3.org/2001/10/synthesis" xml:lang='en-US'>
<voice name='Microsoft Server Speech Text to Speech Voice (en-US, JessaRUS)'>
Hello, world!
</voice> </speak>
```
В теле ответа со статусом 200 содержится звук в указанном формате вывода.
```
HTTP/1.1 200 OK
Content-Length: XXX
Content-Type: audio/x-wav
Response audio payload
```
Если возникнет ошибка, то будут использованы коды состояния, приведенные ниже. В теле ответа ошибки также содержится описание проблемы.
|Код|ОПИСАНИЕ|Проблема|
|-|-|-|
400 |Ошибка запроса |Обязательный параметр отсутствует, пустой или его значение равно нулю. Или переданное либо обязательному, либо необязательному параметру значение является недопустимым. Распространенной проблемой является слишком длинный заголовок.
401|Не авторизовано |Запрос не авторизован. Убедитесь, что ваш ключ подписки или маркер являются допустимыми.
413|Размер запрашиваемой сущности слишком большой|Входные данные SSM превышают длину 1024 символа.
|502|Недопустимый шлюз | Проблема с сетью или сервером. Может также указывать на недопустимые заголовки.
Дополнительные сведения об API-интерфейсах REST функции "Преобразование текста в речь" см. в разделе [REST APIs](rest-apis.md#text-to-speech) (Речевые службы REST API).
## <a name="next-steps"></a>Дополнительная информация
- [Пробная версия Cognitive Services](https://azure.microsoft.com/try/cognitive-services/)
- [Краткое руководство. Распознавание речи в классическом приложении C++ для Windows с помощью пакета SDK службы "Речь"](quickstart-cpp-windows.md)
- [Краткое руководство. Распознавание речи с помощью пакета SDK службы распознавания речи Cognitive Services C#](quickstart-csharp-dotnet-windows.md)
- [Краткое руководство. Распознавание речи в приложении Java для Android с помощью пакета SDK для службы "Речь"](quickstart-java-android.md)
| 58.920792 | 470 | 0.791296 | rus_Cyrl | 0.838708 |
8a06e94bdd0ef2fbb406626315b6d0c4a30b6e03 | 12,225 | md | Markdown | articles/mysql/flexible-server/concepts-backup-restore.md | miiitch/azure-docs.fr-fr | e313657eaf54f5b2ed1a87723e447fb546a6beb4 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | articles/mysql/flexible-server/concepts-backup-restore.md | miiitch/azure-docs.fr-fr | e313657eaf54f5b2ed1a87723e447fb546a6beb4 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | articles/mysql/flexible-server/concepts-backup-restore.md | miiitch/azure-docs.fr-fr | e313657eaf54f5b2ed1a87723e447fb546a6beb4 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | ---
title: Sauvegarder et restaurer dans un serveur flexible Azure Database pour MySQL
description: Découvrez les concepts de sauvegarde et de restauration avec un serveur flexible Azure Database pour MySQL
author: mksuni
ms.author: sumuth
ms.service: mysql
ms.topic: conceptual
ms.date: 09/21/2020
ms.openlocfilehash: 2d69427f9f11a47cedeccb4b1da38b770952f029
ms.sourcegitcommit: f28ebb95ae9aaaff3f87d8388a09b41e0b3445b5
ms.translationtype: HT
ms.contentlocale: fr-FR
ms.lasthandoff: 03/29/2021
ms.locfileid: "93240764"
---
# <a name="backup-and-restore-in-azure-database-for-mysql-flexible-server-preview"></a>Sauvegarder et restaurer dans un serveur flexible Azure Database pour MySQL (préversion)
> [!IMPORTANT]
> Azure Database pour MySQL – Serveur flexible est actuellement en préversion publique.
Un serveur flexible Azure Database pour MySQL crée automatiquement des sauvegardes de serveur et les stocke de manière sécurisée dans un stockage localement redondant au sein de la région. Les sauvegardes peuvent être utilisées pour restaurer votre serveur à un point dans le temps. La sauvegarde et la restauration sont une partie essentielle de toute stratégie de continuité d’activité, dans la mesure où elles protègent vos données des corruptions et des suppressions accidentelles.
## <a name="backup-overview"></a>Présentation de la sauvegarde
Un serveur flexible prend des sauvegardes de capture instantanée des fichiers de données et les stocke dans un stockage localement redondant. Le serveur effectue également une sauvegarde des journaux des transactions qu’il stocka dans un stockage localement redondant. Celles-ci vous permettent de restaurer un serveur à n’importe quel point dans le temps au sein de votre période de rétention de sauvegarde configurée. La période de rétention de sauvegarde par défaut est de sept jours. Vous pouvez éventuellement configurer la sauvegarde de la base de données de 1 à 35 jours. Toutes les sauvegardes sont chiffrées à l’aide du chiffrement AES 256 bits pour les données stockées au repos.
Vous ne pouvez pas exporter ces fichiers de sauvegarde. Les sauvegardes sont utilisables uniquement pour les opérations de restauration dans le serveur flexible. Vous pouvez également utiliser[mysqldump](../concepts-migrate-dump-restore.md#dump-and-restore-using-mysqldump-utility) à partir d’un client MySQL pour copier une base de données.
## <a name="backup-frequency"></a>Fréquence de sauvegarde
Les sauvegardes sur des serveurs flexibles sont basées sur des captures instantanées. La première sauvegarde de capture instantanée complète est planifiée immédiatement après la création d’un serveur. La première sauvegarde complète de capture instantanée est conservée en tant que sauvegarde de base du serveur. Les sauvegardes de captures instantanées suivantes sont des sauvegardes différentielles uniquement.
Les sauvegardes de captures instantanées différentielles se produisent au moins une fois par jour. Les sauvegardes de captures instantanées différentielles ne se produisent pas selon une planification fixe. Les sauvegardes de captures instantanées différentielles ont lieu toutes les 24 heures, sauf si les journaux binaires dans MySQL dépassent 50 Go depuis la dernière sauvegarde différentielle. Au cours d’une journée, six captures instantanées différentielles maximum sont autorisées. Les sauvegardes des journaux des transactions se produisent toutes les cinq minutes.
## <a name="backup-retention"></a>Rétention des sauvegardes
Les sauvegardes de base de données sont enregistrées dans un stockage localement redondant (LRS) qui est stocké dans trois copies au sein d’une région. Les sauvegardes sont conservées en fonction du paramètre de période de rétention de sauvegarde sur le serveur. Vous pouvez sélectionner une période de rétention comprise entre 1 et 35 jours avec une période de rétention par défaut de sept jours. Vous pouvez définir la période de rétention lors de la création du serveur ou ultérieurement en mettant à jour la configuration de la sauvegarde à l’aide du portail Azure.
La période de rétention de sauvegarde détermine jusqu’à quelle date une opération de restauration à un instant dans le passé peut être effectuée, dans la mesure où elle est basée sur des sauvegardes disponibles. La période de rétention de sauvegarde peut également être traitée comme une fenêtre de récupération du point de vue de la restauration. Toutes les sauvegardes requises pour effectuer une restauration à un instant dans le passé au cours de la période de rétention de sauvegarde sont conservées dans le stockage de sauvegarde. Par exemple, si la période de conservation des sauvegardes est définie sur sept jours, la fenêtre de récupération est considérée comme les sept derniers jours. Dans ce scénario, toutes les sauvegardes nécessaires pour la restauration du serveur au cours des sept derniers jours sont conservées. Avec une fenêtre de rétention de sauvegarde de sept jours, les captures instantanées de base de données et les sauvegardes du journal des transactions sont stockées pour les huit derniers jours (1 jour avant la fenêtre).
## <a name="backup-storage-cost"></a>Coût du stockage de sauvegarde
Le serveur flexible fournit jusqu’à 100 % du stockage de votre serveur provisionné en stockage de sauvegarde sans coût supplémentaire. Tous les stockages de sauvegarde supplémentaires utilisés sont facturés en Go par mois. Par exemple, si vous avez configuré un serveur avec 250 Go de stockage, vous disposez de 250 Go de stockage pour les sauvegardes du serveur sans frais supplémentaires. Si l’utilisation quotidienne de la sauvegarde est de 25 Go, vous pouvez bénéficier jusqu’à 10 jours de stockage de sauvegarde gratuit. Le stockage utilisé pour les sauvegardes de plus de 250 Go est facturé conformément au [modèle de tarification](https://azure.microsoft.com/pricing/details/mysql/).
Vous pouvez utiliser la métrique [Stockage de sauvegarde utilisé](../concepts-monitoring.md) dans Azure MoniTor disponible dans le portail Azure pour surveiller le stockage de sauvegarde consommé par un serveur. La métrique utilisée **Stockage de sauvegarde** représente le total du stockage consommé par l’ensemble des sauvegardes de base de données et des sauvegardes de journaux qui sont conservées en fonction de la période de conservation des sauvegardes définie pour le serveur. Une activité transactionnelle importante sur le serveur peut entraîner une augmentation de l’utilisation du stockage de sauvegarde, quelle que soit la taille totale de la base de données.
Le principal moyen de contrôler le coût du stockage de sauvegarde consiste à définir la période de rétention de sauvegarde appropriée. Vous pouvez sélectionner une période de rétention comprise entre 1 et 35 jours.
> [!IMPORTANT]
> Les sauvegardes à partir d’un serveur de base de données configuré dans une configuration de haute disponibilité redondante interzone se produisent à partir du serveur de base de données principal, car la surcharge est minime avec des sauvegardes de capture instantanée.
> [!IMPORTANT]
> Les sauvegardes géoredondantes ne sont pas prises en charge actuellement avec un serveur flexible.
## <a name="point-in-time-restore"></a>Restauration dans le temps
Dans un serveur flexible Azure Database pour MySQL, l’exécution d’une restauration à un instant dans le passé crée un serveur à partir des sauvegardes du serveur flexible dans la même région que votre serveur source. Elle est créée avec la configuration du serveur d’origine pour le niveau de tarification, la taille de stockage, la période de rétention de sauvegarde et l’option de redondance de sauvegarde. De plus, les étiquettes et les paramètres, par exemple, de réseau virtuel et de pare-feu, sont hérités du serveur source. Le niveau de calcul et de stockage du serveur restauré, la configuration et les paramètres de sécurité peuvent être modifiés une fois la restauration terminée.
> [!NOTE]
> Deux paramètres de serveur sont réinitialisés aux valeurs par défaut (et ne sont pas copiés à partir du serveur principal) après l’opération de restauration
> * time_zone : valeur à définir pour la valeur DEFAULT SYSTEM
> * event_scheduler : valeur définie sur OFF sur le serveur restauré
La restauration à un point dans le temps est utile dans plusieurs scénarios. Vois des cas d’utilisation courants :
- Un utilisateur supprime accidentellement des données de la base de données
- Un utilisateur supprime une table ou une base de données importantes
- Une application d’utilisateur remplace accidentellement des données correctes par des données incorrectes en raison d’un défaut de l’application.
Vous pouvez choisir entre le dernier point de restauration et un point de restauration personnalisé via le [portail Azure](how-to-restore-server-portal.md).
- **Dernier point de restauration** : le dernier point de restauration vous permet de restaurer le serveur à la dernière sauvegarde effectuée sur le serveur source. L’horodateur de la restauration s’affiche également sur le portail. Cette option est utile pour restaurer rapidement le serveur à l’état le plus à jour.
- **Point de restauration personnalisé** : cette option vous permet de choisir n’importe quel point dans le temps au cours de la période de rétention définie pour ce serveur flexible. Cette option est utile pour restaurer le serveur à un point précis dans le temps afin récupérer une erreur de l’utilisateur.
La durée estimée de la récupération dépend de plusieurs facteurs, notamment les tailles des bases de données, la taille de sauvegarde du journal des transactions, la taille de calcul de la référence (SKU) et l’heure de la restauration. La récupération du journal des transactions est la partie la plus longue du processus de restauration. Si l’heure de restauration choisir est plus proche de la planification de sauvegarde complète ou différentielle de l’instantané, les restaurations sont plus rapides, car l’application du journal des transactions est minimale. Pour estimer le temps de récupération précis de votre serveur, nous vous recommandons vivement de le tester dans votre environnement, car il contient trop de variables spécifiques de l’environnement.
> [!IMPORTANT]
> Si vous restaurez un serveur flexible configuré avec une haute disponibilité redondante interzone, le serveur restauré sera configuré dans la même région et la même zone que votre serveur primaire, et déployé en tant que serveur flexible unique en mode non haute disponibilité. Pour un serveur flexible, consultez [Haute disponibilité redondante interzone](concepts-high-availability.md).
> [!IMPORTANT]
> Il n’est **pas** possible de restaurer des serveurs supprimés. Si vous supprimez le serveur, toutes les bases de données qui appartiennent au serveur sont également supprimées, sans pouvoir être restaurées. À l'issue du déploiement, pour protéger les ressources du serveur d'une suppression accidentelle ou de changements inattendus, les administrateurs peuvent utiliser des [verrous de gestion](../../azure-resource-manager/management/lock-resources.md).
## <a name="perform-post-restore-tasks"></a>Effectuer des tâches de post-restauration
Après une restauration à l’aide de l’un des mécanismes de récupération **Dernier point de restauration** ou **Point de restauration personnalisé**, vous devez effectuer les tâches suivantes afin que vos utilisateurs et applications soient de nouveau opérationnels :
- Si le nouveau serveur est destiné à remplacer le serveur d’origine, redirigez les clients et les applications clientes vers le nouveau serveur.
- Vérifiez que les règles de pare-feu et de réseau virtuel appropriées au niveau serveur sont en place pour permettre aux utilisateurs de se connecter.
- Assurez-vous que les connexions et les autorisations appropriées au niveau de la base de données sont en place.
- Configurer les alertes, selon les besoins.
## <a name="next-steps"></a>Étapes suivantes
- Découvrir la [continuité de l’activité](./concepts-business-continuity.md)
- Découvrir la [haute disponibilité avec redondance interzone](./concepts-high-availability.md)
- Découvrir [la sauvegarde et la récupération](./concepts-backup-restore.md)
| 127.34375 | 1,052 | 0.814724 | fra_Latn | 0.991866 |
8a076150cba5138a80c014826cf981e004fba160 | 1,693 | md | Markdown | desktop-src/Msi/logging.md | Lectem/win32 | 03fb201e1ea36e353c335ff063ed993fb5993e61 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | desktop-src/Msi/logging.md | Lectem/win32 | 03fb201e1ea36e353c335ff063ed993fb5993e61 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | desktop-src/Msi/logging.md | Lectem/win32 | 03fb201e1ea36e353c335ff063ed993fb5993e61 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | ---
Description: This per-machine system policy is used only if logging has not been enabled by the &\#0034;/L&\#0034; command line option or by MsiEnableLog.
ms.assetid: 'd8649808-5dc3-4496-8c2f-da9b1512b5aa'
title: Logging (Windows Installer)
ms.topic: article
ms.date: 05/31/2018
---
# Logging (Windows Installer)
This per-machine [system policy](system-policy.md) is used only if logging has not been enabled by the "/L" command line option or by [**MsiEnableLog**](/windows/desktop/api/Msi/nf-msi-msienableloga). If the policy is set in this case, the installer creates a log file in %temp% with the random name: MSI\*.LOG. Specify the logging mode by setting the policy value to a string of characters. Use the same characters to specify logging mode policy as used by the "/L" [command line option](command-line-options.md). Note that you cannot use "+" and "\*" for the policy.
The logging mode can be set using policy, a command line option, or programmatically. For more information about all the methods that are available for setting the logging mode, see [Normal Logging](normal-logging.md) in the [Windows Installer Logging](windows-installer-logging.md) section.
You can prevent confidential information, for example passwords, from being entered into the log file and made visible. For more information, see [Preventing Confidential Information from Being Written into the Log File](preventing-confidential-information-from-being-written-into-the-log-file.md)
## Registry Key
Set the value named Logging under the following registry key.
**HKEY\_LOCAL\_MACHINE**\\**Software**\\**Policies**\\**Microsoft**\\**Windows**\\**Installer**
## Data Type
**REG\_SZ**
| 51.30303 | 568 | 0.76137 | eng_Latn | 0.991878 |
8a0779455e03132a999dbbaa96932e46d6782126 | 1,679 | md | Markdown | docs/setup/easzctl_cmd.md | penghu2/kubeasz | 0faae61d98b7636e1425335cefa34cbab49662c5 | [
"Apache-2.0"
] | 1 | 2019-06-11T06:08:39.000Z | 2019-06-11T06:08:39.000Z | docs/setup/easzctl_cmd.md | liozzazhang/kubeasz | 99c7c0008d1448124e45f9f3d154584dbc4abfc8 | [
"Apache-2.0"
] | 1 | 2019-06-03T09:00:05.000Z | 2019-06-03T09:00:05.000Z | docs/setup/easzctl_cmd.md | liozzazhang/kubeasz | 99c7c0008d1448124e45f9f3d154584dbc4abfc8 | [
"Apache-2.0"
] | 1 | 2019-10-19T10:50:01.000Z | 2019-10-19T10:50:01.000Z | # easzctl 命令行介绍
## 为什么使用 easzctl
作为 kubeasz 项目的推荐命令行脚本,easzctl 十分轻量、简单;(后续会不断完善补充)
- 命令集 1:集群层面操作
- 切换/创建集群 context
- 删除当前集群
- 显示所有集群
- 创建集群
- 创建单机集群(类似 minikube)
- 命令集 2:集群内部操作
- 增加工作节点
- 增加主节点
- 增加 etcd 节点
- 删除 etcd 节点
- 删除任意节点
- 升级集群
- 命令集3:额外操作
- 开启/关闭基础认证
集群 context 由 ansible hosts 配置、roles 配置等组成,用以区分不同的 k8s 集群,从而实现多集群的创建和管理;当然 easzctl 命令行不是必须的,你仍旧可以使用之前熟悉的方式安装/管理集群。
## 典型 easzctl 创建管理的集群拓扑如下
```
+----------------+ +-----------------+
|easzctl 1.1.1.1 | |cluster-aio: |
+--+---+---+-----+ |deploy 4.4.4.4 |
| | | |master 4.4.4.4 |
| | +-------------------->+etcd 4.4.4.4 |
| | |node 4.4.4.4 |
| +--------------+ +-----------------+
| |
v v
+--+------------+ +---+----------------------------+
| cluster-1: | | cluster-2: |
| deploy 2.2.2.1| | deploy 3.3.3.1 |
| master 2.2.2.1| | master 3.3.3.1/3.3.3.2 |
| etcd 2.2.2.2| | etcd 3.3.3.1/3.3.3.2/3.3.3.3 |
| node 2.2.2.3| | node 3.3.3.4/3.3.3.5/3.3.3.6 |
+---------------+ +--------------------------------+
```
## 使用 easzctl 举例
- 随时运行 `easzctl help` 获取命令行提示信息
- 1.创建 context:准备集群名称(例如:test-cluster1),运行 `easzctl checkout test-cluster1`
- 如果 context: test-cluster1 不存在,那么会根据 default 配置创建它;如果存在则切换当前 context 为 test-cluster1
- 2.准备 context 以后,根据你的需要配置 ansible hosts 文件和其他配置,然后运行 `easzctl setup`
- 3.安装成功后,运行 `easzctl list` 显示当前所有集群信息
- 4.重复步骤 1/2 可以创建多个集群
- 5.切换到某个集群 `easzctl checkout xxxx`,然后执行增加/删除节点操作
That's it! 赶紧动手测试吧,欢迎通过 Issues 和 PRs 反馈您的意见和建议!
| 27.080645 | 113 | 0.479452 | yue_Hant | 0.596021 |
8a080b09ee64f4de422007a49f93a415483f820b | 3,815 | md | Markdown | core-plugins/docs/Projection-transform.md | gholler-sopra/hydrator-plugins | 3854d1c3b86058aa5383f972299f9d40a8d09db3 | [
"Apache-2.0"
] | null | null | null | core-plugins/docs/Projection-transform.md | gholler-sopra/hydrator-plugins | 3854d1c3b86058aa5383f972299f9d40a8d09db3 | [
"Apache-2.0"
] | 10 | 2019-01-10T10:37:01.000Z | 2020-02-26T11:12:16.000Z | core-plugins/docs/Projection-transform.md | ThalesGroup/hydrator-plugins | 3854d1c3b86058aa5383f972299f9d40a8d09db3 | [
"Apache-2.0"
] | 2 | 2019-11-26T10:41:37.000Z | 2020-04-22T16:09:01.000Z | # Projection Transform
Description
-----------
Projection Transform is a Guavus Enterprise Accelerator that lets you drop, keep, rename, and cast fields to a different type.
Fields are first dropped or kept, then cast, and then renamed.
For example, suppose the transform is configured to drop the field 'B' and rename the field 'A' to 'B'.
If the transform receives the following input record:
| field name | type | value |
| ---------- | ---- | ------ |
| A | int | 10 |
| B | int | 20 |
field 'B' will first be dropped:
| field name | type | value |
| ---------- | ---- | ------ |
| A | int | 10 |
and then field 'A' will be renamed to 'B':
| field name | type | value |
| ---------- | ---- | ------ |
| B | int | 10 |
Similarly, the transform will first check if it should keep a field, and then rename it if configured to do so.
Use Case
--------
The transform is used when you need to drop fields, keep specific fields, change field types, or rename fields.
For example, you may want to rename a field from ``'timestamp'`` to ``'ts'`` because you want
to write to a database where ``'timestamp'`` is a reserved keyword. You might want to
drop a field named ``'headers'`` because you know it is always empty for your particular
data source. Or, you might want to only keep fields named ``'ip'`` and ``'timestamp'`` and discard
all other fields.
Properties
----------
**drop:** Comma-separated list of fields to drop. For example: ``'field1,field2,field3'``.
**keep:** Comma-separated list of fields to keep. For example: ``'field1,field2,field3'``.
Note: Drop and keep fields cannot *both* be specified. At least one must be null or empty.
**rename:** List of fields to rename. This is a comma-separated list of key-value pairs,
where each pair is separated by a colon and specifies the input and output names.
For example: ``'datestr:date,timestamp:ts'`` specifies that the ``'datestr'`` field should be
renamed to ``'date'`` and the ``'timestamp'`` field should be renamed to ``'ts'``.
**convert:** List of fields to convert to a different type. This is a comma-separated list
of key-value pairs, where each pair is separated by a colon and specifies the field name
and the desired type.
For example: ``'count:long,price:double'`` specifies that the ``'count'`` field should be
converted to a long and the ``'price'`` field should be converted to a double.
Only simple types are supported (boolean, int, long, float, double, bytes, string). Any
simple type can be converted to bytes or a string. Otherwise, a type can only be converted
to a larger type. For example, an int can be converted to a long, but a long cannot be
converted to an int.
Example
-------
This example keeps only the ``'id'`` and ``'cost'`` fields. It also changes the type of the ``'cost'``
field to a double and renames it ``'price'``.
```json
{
"name": "Projection",
"type": "transform",
"properties": {
"drop": "",
"convert": "cost:double",
"rename": "cost:price",
"keep": "id,cost"
}
}
```
For example, if the transform receives this input record:
| field name | type | value |
| ---------- | ------------------- | -------------------- |
| id | string | "abc123" |
| ts | long | 1234567890000 |
| headers | map<string, string> | { "user": "samuel" } |
| cost | float | 8.88 |
It will transform it to this output record:
| field name | type | value |
| ---------- | ------------------- | -------------------- |
| id | string | "abc123" |
| price | double | 8.88 |
| 37.401961 | 126 | 0.595282 | eng_Latn | 0.99925 |
8a089544f0aa2d87cb0d11260a799375a816b264 | 1,671 | md | Markdown | docs/framework/unmanaged-api/profiling/cor-prf-jit-cache-enumeration.md | mtorreao/docs.pt-br | e080cd3335f777fcb1349fb28bf527e379c81e17 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | docs/framework/unmanaged-api/profiling/cor-prf-jit-cache-enumeration.md | mtorreao/docs.pt-br | e080cd3335f777fcb1349fb28bf527e379c81e17 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | docs/framework/unmanaged-api/profiling/cor-prf-jit-cache-enumeration.md | mtorreao/docs.pt-br | e080cd3335f777fcb1349fb28bf527e379c81e17 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | ---
title: Enumeração COR_PRF_JIT_CACHE
ms.date: 03/30/2017
api_name:
- COR_PRF_JIT_CACHE
api_location:
- mscorwks.dll
api_type:
- COM
f1_keywords:
- COR_PRF_JIT_CACHE
helpviewer_keywords:
- COR_PRF_JIT_CACHE enumeration [.NET Framework profiling]
ms.assetid: e7b8f6b4-95bc-4ba5-b9eb-f5590a7326a4
topic_type:
- apiref
ms.openlocfilehash: 0bf17e7c9d8ff16dc8f07e4a386f599284828f40
ms.sourcegitcommit: d8020797a6657d0fbbdff362b80300815f682f94
ms.translationtype: MT
ms.contentlocale: pt-BR
ms.lasthandoff: 11/24/2020
ms.locfileid: "95682231"
---
# <a name="cor_prf_jit_cache-enumeration"></a>Enumeração COR_PRF_JIT_CACHE
Indica o resultado de uma busca de função armazenada em cache.
> [!NOTE]
> `COR_PRF_CACHED_FUNCTION_FOUND` tem um valor de zero, portanto `COR_PRF_JIT_CACHE` não pode ser usado como um substituto booliano.
## <a name="syntax"></a>Sintaxe
```cpp
typedef enum {
COR_PRF_CACHED_FUNCTION_FOUND,
COR_PRF_CACHED_FUNCTION_NOT_FOUND
} COR_PRF_JIT_CACHE;
```
## <a name="members"></a>Membros
|Membro|DESCRIÇÃO|
|------------|-----------------|
|`COR_PRF_FUNCTION_FOUND`|A pesquisa encontrou a função.|
|`COR_PRF_FUNCTION_NOT_FOUND`|A pesquisa não encontrou a função.|
## <a name="requirements"></a>Requisitos
**Plataformas:** confira [Requisitos do sistema](../../get-started/system-requirements.md).
**Cabeçalho:** CorProf. idl, CorProf. h
**Biblioteca:** CorGuids.lib
**.NET Framework versões:**[!INCLUDE[net_current_v10plus](../../../../includes/net-current-v10plus-md.md)]
## <a name="see-also"></a>Confira também
- [Criando perfil de enumerações](profiling-enumerations.md)
| 27.85 | 134 | 0.72711 | por_Latn | 0.269286 |
8a08db61a305495364ce15f7d42eb8f36df100bf | 4,050 | md | Markdown | CHANGELOG.md | amatsuda/rails-i18n | 1801db7a71d283d7ca3c7f857030871481be04b5 | [
"MIT"
] | 1 | 2015-11-05T15:34:14.000Z | 2015-11-05T15:34:14.000Z | CHANGELOG.md | amatsuda/rails-i18n | 1801db7a71d283d7ca3c7f857030871481be04b5 | [
"MIT"
] | null | null | null | CHANGELOG.md | amatsuda/rails-i18n | 1801db7a71d283d7ca3c7f857030871481be04b5 | [
"MIT"
] | null | null | null | ## 0.7.1 (2012-11-24)
- Update Peruvian Spanish (es-PE) translation
- Fix pluralization rules for OneTwoOther
- Fix pluralization rules for Hungarian (hu)
- Update Japanese (ja) translation
- Fix and complete translations of Macedonian (mk), Cyrillic Serbian (sr) and Serbo-Croatian (scr)
## 0.7.0 (2012-10-23)
- Remove Swiss German (gsw-CH) as a duplicate of de-CH
- Remove en-US
- Remove region code from bn-IN, gl-ES, pt-PT and sv-SE
- Move iso-639-2 locales into their own directory
- Add pluralization rule for Upper Sorbian
- Fix grammar mistakes on Bulgarian (bg) translation
- Add Latin American Spanish (es-419) translation
## 0.6.6 (2012-09-07)
- added Uzbek (uz) translation
- added Swiss Italian (it-CH) translation
- fixed Swiss German (de-CH) translation
- added Polish (pl) transliteration
- fixed Greek (el) translation
- added Nepali (ne) translation
- fixed Argentina Spanish (es-AR) translation
## 0.6.5 (2012-07-02)
- fixed Icelandic translation
- fixed Portuguese translation
- completed Vietnamese translation and transliteration
- added Canadian English
- fixed Tagalog delimiter and separator
- fixed Bosinian translation
- fixed French translation
- added Engish (en) translation
- added Spanish (Venizuela) translation
- complted Turkish translation
## 0.6.4 (2012-05-17)
- fixed Croatian translation and pluralization
- added Wolof translation
- fixed Hebrew pluralization
- added Tagalog translation
- fixed Bosinan pluralization
- fixed Lativian pluralization
## 0.6.3 (2012-04-15)
- fixed English (India) translations
- fixed Hebrew pluralization
## 0.6.2 (2012-03-28)
- added a patch for Ruby 1.8.7 support
## 0.6.1 (2012-03-25)
- uses I18n.available_locales to load selected locales
- added transliteration rule for Ukrainian
- completed translations for Mongolian (mn)
## 0.5.2 (2012-03-17)
- fixed Polish pluralization
- fixed Hungarian pluralization
- fixed Belarus pluralization
- completed Croatian translations
## 0.5.1 (2012-03-01)
- pluralization and transliteration work out of the box
- added pluralization rules for non-English-like locales
- added transliteration rule for Russian
- removed translations for will_paginate gem
- brought activemodel and activerecord namespaces back which was removed in 21c8006
## 0.4.0 (2012-02-10)
- removed `activerecord` namespace
- removed `support.select namespace` and updated `helpers.select` when present
- removed the `fun` directory
- added a pluralization rule for French (fr) locale
- replaced pluralization instances of `1` with `%{count}` in French (fr) locale
- modified `datetime.distance_in_words.almost_x_years` for Russion (ru) locale
- changed `number.currency.format.precision` from 3 to 0 for Japanese (ja) locale
## 0.3.0 (2012-01-10)
- loads will_paginate/*.yml if the constant WillPaginate is defined
- filled in missing will_paginate translations for en-US/en-GB/ja/sk
- Friulian(fur) is ready for Rails 2 and 3
- corrected translation for 'too_short' (ro)
- added will_paginate translation (ro)
## 0.2.1 (2011-12-27)
- filled in missing formatting/punctuation translations with their en-US versions
- added en-IN locale
- changed `time.formats.long` for Japanese (ja)
## 0.2.0 (2011-12-04)
- moved :'activerecord.errors.messages.taken' to :'errors.messages.taken'
- moved :'activerecord.errors.messages.record_invalid' to :'errors.messages.record_invalid'
- moved Bulgarian (bg) transliterations into a new 'transliterations' folder
- aliased :'activerecord.errors.template' to :'errors.template'
- aliased :'activerecord.errors.messages' to :'errors.messages'
- updated interpolation syntax for Basque (eu)
- updated interpolation syntax for Peruvian Spanish (es-PE)
- deleted translations that are absent from en-US (with the exception of translations for pluralization)
- converted the Czech (cs) localization file to yml
- converted the Thai (th) localization file to yml
- removed the hard coded Buddhist era from the Thai (th) localization file
- fixed obvious indentation/scoping errors
| 35.526316 | 104 | 0.761235 | eng_Latn | 0.986259 |
8a0977e95ced176ff10e331c79a5da228181fcfa | 1,128 | md | Markdown | examples/olm/README.md | SubhasmitaSw/camel-k | 9fba1db153b79fa792f8c59905a24127b841936d | [
"Apache-2.0"
] | 1 | 2022-03-27T12:07:31.000Z | 2022-03-27T12:07:31.000Z | examples/olm/README.md | SubhasmitaSw/camel-k | 9fba1db153b79fa792f8c59905a24127b841936d | [
"Apache-2.0"
] | null | null | null | examples/olm/README.md | SubhasmitaSw/camel-k | 9fba1db153b79fa792f8c59905a24127b841936d | [
"Apache-2.0"
] | null | null | null | # OPERATOR Lifecycle manager (OLM) installation
Camel K supports as default an installation procedure in order to get all the features offered by [OLM](https://olm.operatorframework.io/). We have in place a default mechanism to discover the presence of OLM installed on your cluster.
NOTE: You can disable the feature by providing the `--olm=false` during the installation procedure.
## Install on Minikube
An interesting way to test locally the OLM is to use the **Minikube OLM addon**. If you have a local Minikube, you can proceed with the following steps to install the OLM:
```
minikube addons enable olm
```
As soon as all the resources are installed, you can now proceed by installing Camel K operator as you used to do, ie:
```
kamel install --global
```
In order to verify the installation, you can check the `ClusterServiceVersion` (CSV) custom resource:
```
kubectl get csv
NAME DISPLAY VERSION REPLACES PHASE
camel-k-operator.v1.8.2 Camel K Operator 1.8.2 camel-k-operator.v1.8.1 Succeeded
```
You can now run any integration as you used to do. | 38.896552 | 235 | 0.724291 | eng_Latn | 0.991164 |
8a09c99302e13204f072e2a48ea12aad0384bb1a | 149,885 | md | Markdown | docs/ssms/release-notes-ssms.md | ccwwta/sql-docs.ru-ru | e24efe5b4703463b803a1ce15e541cec1f4225b3 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | docs/ssms/release-notes-ssms.md | ccwwta/sql-docs.ru-ru | e24efe5b4703463b803a1ce15e541cec1f4225b3 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | docs/ssms/release-notes-ssms.md | ccwwta/sql-docs.ru-ru | e24efe5b4703463b803a1ce15e541cec1f4225b3 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | ---
title: Заметки о выпуске SSMS
description: Заметки о выпуске SQL Server Management Studio (SSMS)
ms.prod: sql
ms.prod_service: sql-tools
ms.technology: ssms
ms.topic: conceptual
ms.assetid: 3dc76cc1-3b4c-4719-8296-f69ec1b476f9
author: dzsquared
ms.author: drskwier
ms.reviewer: maghan
ms.custom: seo-lt-2019
ms.date: 12/17/2020
ms.openlocfilehash: 2e1d3faf6d17417ea1f4a134778ddd9342441231
ms.sourcegitcommit: d8cdbb719916805037a9167ac4e964abb89c3909
ms.translationtype: HT
ms.contentlocale: ru-RU
ms.lasthandoff: 01/20/2021
ms.locfileid: "98596866"
---
# <a name="release-notes-for-sql-server-management-studio-ssms"></a>Заметки о выпуске SQL Server Management Studio (SSMS)
[!INCLUDE [SQL Server ASDB, ASDBMI, ASDW ](../includes/applies-to-version/sql-asdb-asdbmi-asa.md)]
В этой статье приводятся подробные сведения об обновлениях, улучшениях и исправлениях ошибок в текущей и предыдущих версиях SQL Server Management Studio.
## <a name="current-ssms-release"></a>Текущий выпуск SSMS
### <a name="188"></a>18,8
![загрузить](media/download-icon.png) [Загрузить SSMS 18.8](download-sql-server-management-studio-ssms.md)
- Номер выпуска: 18.8
- Номер сборки: 15.0.18369.0
- Дата выпуска: 17 декабря 2020 г.
[Китайский (упрощенное письмо)](https://go.microsoft.com/fwlink/?linkid=2151644&clcid=0x804) | [Китайский (традиционное письмо)](https://go.microsoft.com/fwlink/?linkid=2151644&clcid=0x404) | [Английский (США)](https://go.microsoft.com/fwlink/?linkid=2151644&clcid=0x409) | [Французский](https://go.microsoft.com/fwlink/?linkid=2151644&clcid=0x40c) | [Немецкий](https://go.microsoft.com/fwlink/?linkid=2151644&clcid=0x407) | [Итальянский](https://go.microsoft.com/fwlink/?linkid=2151644&clcid=0x410) | [Японский](https://go.microsoft.com/fwlink/?linkid=2151644&clcid=0x411) | [Корейский](https://go.microsoft.com/fwlink/?linkid=2151644&clcid=0x412) | [Португальский (Бразилия)](https://go.microsoft.com/fwlink/?linkid=2151644&clcid=0x416) | [Русский](https://go.microsoft.com/fwlink/?linkid=2151644&clcid=0x419) | [Испанский](https://go.microsoft.com/fwlink/?linkid=2151644&clcid=0x40a)
SSMS 18.8 является самым современным общедоступным выпуском SSMS. Если вам нужна предыдущая версия SSMS, см. список в разделе [Предыдущие выпуски SSMS](release-notes-ssms.md#previous-ssms-releases).
#### <a name="whats-new-in-188"></a>Новые возможности версии 18.8
[!INCLUDE [ssms-ads-install](../includes/ssms-azure-data-studio-install.md)]
| Изменения | Сведения |
|----------|---------|
| Интеграция установки Azure Data Studio | При установке SSMS также устанавливается Azure Data Studio 1.25.1. |
| Службы Analysis Services | Добавлена поддержка рабочих областей Power BI Premium 2-го поколения. |
| Аудит | Добавлена поддержка EXTERNAL_MONITOR и "operator audit". Дополнительные сведения см. в [документации](/azure/azure-sql/managed-instance/auditing-configure) по конфигурации. |
| Службы Integration Services | Улучшенный мастер создания IR, для которого создание SSISDB не является обязательным при создании SSIS IR |
#### <a name="bug-fixes-in-188"></a>Исправления ошибок в версии 18.8
| Добавления | Сведения |
|----------|---------|
| Возможности доступа | Исправлены проблемы, влияющие на экранный диктор в диалоговом окне ProgressReport |
| Монитор активности | Исправлена проблема, из-за которой контекстное меню "Изменить текст запроса" в сетке "Активные ресурсоемкие запросы" не работает |
| Always Encrypted | Исправлена проблема, из-за которой SSMS может вызвать ошибку времени выполнения ("Класс не найден"). |
| Высокое разрешение и масштабирование | Улучшенный 4k дисплей диалогового окна ProgressReport |
| Высокое разрешение и масштабирование | Исправлена ошибка в форме "Создание расписания — пакет" в Integration Services |
| Общие ошибки SSMS | Исправлена проблема, из-за которой служба SSMS могла выдавать ошибку при попытке отобразить свойства столбца, который имеет начальное значение идентификатора или шаг приращения идентификатора, превышающие размер bigint.
| Общие ошибки SSMS | Исправлена ошибка в SSMS, вызванная пунктом меню Projects Export Templates… (Шаблоны экспорта проектов...), который не должен был отображатся |
| Общие ошибки SSMS | Исправлена проблема, из-за которой служба SSMS могла завершатся сбоем при перечислении резервных копий в папке |
| Общие ошибки SSMS | Устранена проблема, которая приводила к утечке дескрипторов и памяти в SSMS при отображении результатов запросов |
| Общие ошибки SSMS | Исправлена проблема, из-за которой пользователи не могли создавать кластеризованный индекс columnstore для столбцов определенных типов (UniqueIdentifier в SQL 2014 и более поздних версиях, VarCharMax/NVarCharMax/VarBinaryMax в SQL 2017 и более поздних версиях). |
| Общие ошибки SSMS | Исправлена проблема, которую длительное время не удавалось решить, и которая приводила к невозможности изменения порядка столбцов XML в сетке результатов. См. статью [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/32890930). |
| Общие ошибки SSMS | Исправлена проблема, из-за которой SSMS неправильно отображала предупреждение о том, что "отслеживание изменений не поддерживается для базы данных с оптимизированными для операций в памяти объектами". |
| Мастер создания скриптов | Исправлена ошибка, препятствующая перечислению объектов базы данных в SQL Server 2014 и более старых версий. См. статью [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035-sql-server/suggestions/41885587). |
| Средства репликации | Исправлена проблема, при которой Монитор репликации SQL не учитывал параметры автоподключения, что каждый раз приводило к принудительному переподключению пользователя. См. статью [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/40394743). |
| Написание скриптов и SMO | Исправлена проблема, связанная с попыткой использовать параметр "Создать сценарий..." в зашифрованном представлении в базе данных SQL Azure |
| Пользовательский интерфейс XEvent | Исправлена проблема, которая могла приводить к сбою SSMS при переключении с других приложений на SSMS. |
| Пользовательский интерфейс XEvent | Улучшение в версии 18.7 было отменено, поскольку оно привело к ошибке в процессе создания XEvent через наличие дополнительных кавычек. *Это изменение является временным, а улучшение будет добавлено в следующий выпуск и не будет содержать ошибку.* |
#### <a name="known-issues-188"></a>Известные проблемы (в версии 18.8)
| Добавления | Сведения | Обходной путь |
|----------|---------|------------|
| Службы Analysis Services | Ошибка при подключении к службам SSAS через MSMDPUMP.dll. См. статью [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035-sql-server/suggestions/40144696). | Недоступно |
| Службы Analysis Services | В редких случаях при использовании установки обновления для открытия редактора DAX после обновления SSMS может возникать ошибка "Объект не задан экземпляром объекта". | Удаление и повторная установка SQL Server Management Studio. Если повторная установка не помогает, закройте все экземпляры SSMS, выполните резервное копирование, а затем удалите `%AppData%\Microsoft\SQL Server Management Studio` и `%LocalAppData%\Microsoft\SQL Server Management Studio`. |
| Общие ошибки SSMS | В диалоговом окне New Server Audit Specification (Создать спецификацию аудита сервера) может происходить сбой SSMS с ошибкой нарушения прав доступа. | Недоступно |
| Общие ошибки SSMS | Расширения SSMS с использованием объектов SMO должны быть перекомпилированы для нового пакета v161 SMO, предназначенного для среды SSMS. Доступна предварительная версия по адресу https://www.nuget.org/packages/Microsoft.SqlServer.SqlManagementObjects.SSMS/. </br></br> Расширения, скомпилированные для предыдущих версий 160 пакета Microsoft.SqlServer.SqlManagementObjects, по-прежнему будут работать. | Недоступно |
| Службы Integration Services | При импорте пакетов в Integration Services или экспорте из Integration Services, а также при экспорте пакетов из Azure-SSIS Integration Runtime утрачиваются скрипты пакетов, содержащих задачи или компоненты скрипта. | Удалите папку C:\Program Files (x86)\Microsoft SQL Server Management Studio 18\Common7\IDE\CommonExtensions\MSBuild. |
| Службы Integration Services | Удаленные подключения к службам интеграции могут завершаться ошибкой "Указанная служба не существует как установленная служба" в более новой операционной системе. | В разделах Computer\HKEY_CLASSES_ROOT\AppID и Computer\HKEY_CLASSES_ROOT\WOW6432Node\AppID найдите записи, связанные со службами интеграции, и в этих кустах переименуйте раздел реестра с именем "LocalService" на "LocalService_A" для конкретной версии служб интеграции, которую нужно подключить. |
В статье [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035-sql-server) представлены сведения о других известных проблемах. Там же можно отправить отзыв группе разработчиков.
## <a name="previous-ssms-releases"></a>Предыдущие выпуски SSMS
[!INCLUDE[ssms-connect-aazure-ad](../includes/ssms-connect-azure-ad.md)]
Чтобы скачать предыдущую версию SSMS, щелкните ссылку для скачивания в соответствующем разделе.
| Версия SSMS | Номер сборки | Дата выпуска |
|--------------|--------------|--------------|
| [18.7.1](#1871) | 15.0.18358.0 | 27 октября 2020 г. |
| [18,7](#187) | 15.0.18357.0 | 20 октября 2020 г. |
| [18.6](#186) | 15.0.18338.0 | 22 июля 2020 г. |
| [18.5.1](#1851) | 15.0.18333.0 | 9 июня 2020 г. |
| [18.5](#185) | 15.0.18330.0 | 7 апреля 2020 г. |
| [18.4](#184) | 15.0.18206.0 | 4 ноября 2019 г. |
| [18.3.1](#1831) | 15.0.18183.0 | 2 октября 2019 г. |
| [18.2](#182) | 15.0.18142.0 | 25 июля 2019 г. |
| [18.1](#181) | 15.0.18131.0 | 11 июня 2019 г. |
| [18.0](#180) | 15.0.18118.0 | 24 апреля 2019 г. |
| [17.9.1](#1791) | 14.0.17289.0 | 21 ноября 2018 г. |
| [16.5.3](#1653) | 13.0.16106.4 | 30 января 2017 г. |
### <a name="1871"></a>18.7.1
![загрузить](media/download-icon.png) [Загрузить SSMS 18.7](https://go.microsoft.com/fwlink/?linkid=2147207)
- Номер выпуска: 18.7.1
- Номер сборки: 15.0.18358.0
- Дата выпуска: 27 октября 2020 г.
[Китайский (упрощенное письмо)](https://go.microsoft.com/fwlink/?linkid=2147207&clcid=0x804) | [Китайский (традиционное письмо)](https://go.microsoft.com/fwlink/?linkid=2147207&clcid=0x404) | [Английский (США)](https://go.microsoft.com/fwlink/?linkid=2147207&clcid=0x409) | [Французский](https://go.microsoft.com/fwlink/?linkid=2147207&clcid=0x40c) | [Немецкий](https://go.microsoft.com/fwlink/?linkid=2147207&clcid=0x407) | [Итальянский](https://go.microsoft.com/fwlink/?linkid=2147207&clcid=0x410) | [Японский](https://go.microsoft.com/fwlink/?linkid=2147207&clcid=0x411) | [Корейский](https://go.microsoft.com/fwlink/?linkid=2147207&clcid=0x412) | [Португальский (Бразилия)](https://go.microsoft.com/fwlink/?linkid=2147207&clcid=0x416) | [Русский](https://go.microsoft.com/fwlink/?linkid=2147207&clcid=0x419) | [Испанский](https://go.microsoft.com/fwlink/?linkid=2147207&clcid=0x40a)
SSMS 18.7 является самым современным общедоступным выпуском SSMS. Если вам нужна предыдущая версия SSMS, см. список в разделе [Предыдущие выпуски SSMS](release-notes-ssms.md#previous-ssms-releases).
#### <a name="whats-new-in-1871"></a>Новые возможности версии 18.7.1
[!INCLUDE [ssms-ads-install](../includes/ssms-azure-data-studio-install.md)]
#### <a name="bug-fixes-in-1871"></a>Исправления ошибок в версии 18.7.1
| Добавления | Сведения |
|----------|---------|
| Хранилище запросов | Исправлена ошибка, возникающая при щелчке правой кнопкой мыши на узле в обозревателе объектов для хранилища запросов. |
#### <a name="known-issues-1871"></a>Известные проблемы (в версии 18.7.1)
| Добавления | Сведения | Обходной путь |
|----------|---------|------------|
| Службы Analysis Services | Ошибка при подключении к службам SSAS через MSMDPUMP.dll. См. статью [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035-sql-server/suggestions/40144696). | Недоступно |
| Службы Analysis Services | В редких случаях при использовании установки обновления для открытия редактора DAX после обновления SSMS может возникать ошибка "Объект не задан экземпляром объекта". | Чтобы устранить эту проблему, удалите, а затем переустановите SSMS. |
| Редактор запросов DAX | Открытие редактора запросов DAX приводит к ошибке, информирующей о том, что объект не задан экземпляром объекта. | Удаление и повторная установка SQL Server Management Studio. Если повторная установка не помогает, закройте все экземпляры SSMS, выполните резервное копирование, а затем удалите `%AppData%\Microsoft\SQL Server Management Studio` и `%LocalAppData%\Microsoft\SQL Server Management Studio`. |
| Общие ошибки SSMS | В диалоговом окне New Server Audit Specification (Создать спецификацию аудита сервера) может происходить сбой SSMS с ошибкой нарушения прав доступа. | Недоступно |
| Общие ошибки SSMS | Расширения SSMS с использованием объектов SMO должны быть перекомпилированы для нового пакета v161 SMO, предназначенного для среды SSMS. Доступна предварительная версия по адресу https://www.nuget.org/packages/Microsoft.SqlServer.SqlManagementObjects.SSMS/. </br></br> Расширения, скомпилированные для предыдущих версий 160 пакета Microsoft.SqlServer.SqlManagementObjects, по-прежнему будут работать. | Недоступно |
| Мастер создания скриптов | Сбой мастера при попытке выполнить перечисление объектов базы данных в SQL Server 2014 и более поздних версий. См. статью [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035-sql-server/suggestions/41885587). | Используйте SSMS 18.6 для выбора объектов в мастере создания скриптов для SQL 2014 и более ранних версий. |
| Службы Integration Services | При импорте пакетов в Integration Services или экспорте из Integration Services, а также при экспорте пакетов из Azure-SSIS Integration Runtime утрачиваются скрипты пакетов, содержащих задачи или компоненты скрипта. | Удалите папку C:\Program Files (x86)\Microsoft SQL Server Management Studio 18\Common7\IDE\CommonExtensions\MSBuild. |
| Службы Integration Services | Удаленные подключения к службам интеграции могут завершаться ошибкой "Указанная служба не существует как установленная служба" в более новой операционной системе. | В разделах Computer\HKEY_CLASSES_ROOT\AppID и Computer\HKEY_CLASSES_ROOT\WOW6432Node\AppID найдите записи, связанные со службами интеграции, и в этих кустах переименуйте раздел реестра с именем "LocalService" на "LocalService_A" для конкретной версии служб интеграции, которую нужно подключить. |
| Обозреватель объектов | В выпуски SSMS до 18.7 внесено критическое изменение в обозревателе объектов из-за изменений, связанных с [бессерверным пулом SQL для Azure Synapse Analytics](/azure/synapse-analytics/sql/on-demand-workspace-overview). | Чтобы и дальше использовать обозреватель объектов в SSMS с бессерверным пулом SQL для Azure Synapse Analytics, требуется SSMS 18.7 или более поздней версии. |
### <a name="187"></a>18,7
![загрузить](media/download-icon.png) [Загрузить SSMS 18.7](https://go.microsoft.com/fwlink/?linkid=2146265)
- Номер выпуска: 18.7
- Номер сборки: 15.0.18357.0
- Дата выпуска: 20 октября 2020 г.
[Китайский (упрощенное письмо)](https://go.microsoft.com/fwlink/?linkid=2146265&clcid=0x804) | [Китайский (традиционное письмо)](https://go.microsoft.com/fwlink/?linkid=2146265&clcid=0x404) | [Английский (США)](https://go.microsoft.com/fwlink/?linkid=2146265&clcid=0x409) | [Французский](https://go.microsoft.com/fwlink/?linkid=2146265&clcid=0x40c) | [Немецкий](https://go.microsoft.com/fwlink/?linkid=2146265&clcid=0x407) | [Итальянский](https://go.microsoft.com/fwlink/?linkid=2146265&clcid=0x410) | [Японский](https://go.microsoft.com/fwlink/?linkid=2146265&clcid=0x411) | [Корейский](https://go.microsoft.com/fwlink/?linkid=2146265&clcid=0x412) | [Португальский (Бразилия)](https://go.microsoft.com/fwlink/?linkid=2146265&clcid=0x416) | [Русский](https://go.microsoft.com/fwlink/?linkid=2146265&clcid=0x419) | [Испанский](https://go.microsoft.com/fwlink/?linkid=2146265&clcid=0x40a)
SSMS 18.7 является самым современным общедоступным выпуском SSMS. Если вам нужна предыдущая версия SSMS, см. список в разделе [Предыдущие выпуски SSMS](release-notes-ssms.md#previous-ssms-releases).
#### <a name="whats-new-in-187"></a>Новые возможности версии 18.7
[!INCLUDE [ssms-ads-install](../includes/ssms-azure-data-studio-install.md)]
| Изменения | Сведения |
|----------|---------|
| Интеграция установки Azure Data Studio | При установке SSMS также устанавливается Azure Data Studio. |
| Always Encrypted | Чтобы распознать новые конечные точки HSM, необходимо обновить среду SSMS. Это можно выполнить путем использования нового пакета NugetPackage от поставщика AKV. |
| Импорт неструктурированного файла | Повышение эффективности прогнозирования типов данных за счет изучения 300 строк по умолчанию. |
| Импорт неструктурированного файла | Предотвратите объявление столбцов, которые следует объявить как SmallInt, как TinyInt. |
| Импорт неструктурированного файла | Внесено улучшение, позволяющее правильно очищать таблицы хранилища данных при сбое импорта данных. |
| Resource Governor | Добавлена поддержка десятичных значений. |
| Инструкция ShowPlan | Добавлен оператор PREDICT. |
| Пользовательский интерфейс XEvent | Добавлена возможность создавать сценарии расширенных событий с использованием имени wait_type. Пользователи запрашивают использование значения столбца map_value вместо map_key в предикате фильтра wait_type, поскольку значение ключа изменяется во время обновления версии. Исправление: Добавлен флажок, а также предоставлена возможность, благодаря которой пользователи могут выбрать map_value или map_key в качестве значения предиката фильтра wait_type. |
#### <a name="bug-fixes-in-187"></a>Исправления ошибок в версии 18.7
| Добавления | Сведения |
|----------|---------|
| Возможности доступа | Исправлена последовательность перехода кнопок в окне "Следующие параметры не поддерживаются", которая появляется при создании запроса к хранилищу данных. |
| Специальные возможности | Мастер импорта и экспорта: неправильная разметка страницы в режиме высокого разрешения. |
| Монитор активности | Исправлена ошибка, из-за которой монитор активности приостанавливался при открытии вкладки "Процессы". См. статью [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/37050118). |
| Группа доступности AlwaysOn | Исправлена ошибка, из-за которой не работала отработка отказа группы доступности для горизонтального увеличения масштаба для чтения. |
| Службы Analysis Services | Обновлены компоненты Power Query до версии 2.84.982 для сценариев табличных моделей AS. |
| Службы Analysis Services | Исправлена проблема, которая могла приводить к ошибке при попытке подключиться к SSAS через msmdpump.dll. См. статью [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035-sql-server/suggestions/40144696). |
| Резервное копирование и восстановление | Исправлена проблема, из-за которой при выборе пункта "Просмотреть свойства подключения" была обнаружена ошибка SMO в свойстве HostDistribution для SQL 2016 и более ранних версий. |
| Конструктор баз данных | Исправлена проблема, приводившая к сбою SSMS при обработке десятичных чисел. |
| Диаграммы базы данных. | Исправлена проблема, которая могла привести к сбою или зависанию SSMS при использовании диаграмм базы данных, в которых диалоговое окно «Добавить таблицу» могло не отображаться должным образом. |
| Зеркальное отображение базы данных | Исправлена проблема, которая приводила к сбою зеркального отображения конфигурации. См. статью [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035-sql-server/suggestions/32897281). |
| Общие ошибки SSMS | Исправлена проблема, при которой попытка подключения к базе данных SQL Azure могла занять несколько секунд (вход в систему SQL в пользовательской базе данных). |
| Общие ошибки SSMS | Исправлена проблема, из-за которой среда SSMS не выполняла обработку и не отображала захваченные взаимоблокировки (XDL-файлы). |
| Общие ошибки SSMS | Устранена проблема, из-за которой при попытке открыть параметры журнала ошибок для SQL Server 2008 R2 и ниже приводилась ошибка, из-за которой было невозможно найти свойство ErrorLogSizeKb. |
| Общие ошибки SSMS | Общие исправления и улучшения, связанные с поддержкой [бессерверного пула SQL для Azure Synapse Analytics](/azure/synapse-analytics/sql/on-demand-workspace-overview). |
| Импорт неструктурированного файла | Исправлена ошибка, из-за которой мастер не обнаруживал, что файл может использоваться другим приложением, и вместо этого выдавал ошибку. См. статью [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/40761574). |
| Импорт и экспорт приложения уровня данных | Исправлен уровень служб по умолчанию. Теперь при импорте BACPAC-файла будет использоваться Standard S0 (то же самое, что портал Azure и поведение SqlPackage.exe). |
| Импорт неструктурированного файла | Исправлена ошибка, из-за которой мастер не обнаруживал, что файл может использоваться другим приложением, и вместо этого выдавал ошибку. См. статью [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/40761574). |
| Службы Integration Services | Исправлена проблема, из-за которой элементы поля со списком для подписки Azure дублировались в мастере создания IR и мастере миграции заданий, если разные подписки имели одинаковое имя. |
| Службы Integration Services | Исправлена проблема, при которой кнопка "Подключить" иногда не была представлена в мастере создания IR. |
| Службы Integration Services | Исправлена проблема, из-за которой элементы поля "Использовать переменную среды" были не упорядочены в диалоговом окне "Задание значения параметра". |
| IntelliSense | Исправлена проблема аварийного завершения в SSMS, которая могла возникать при выполнении запроса. |
| IntelliSense | Исправлена проблема, из-за которой IntelliSense не работал, если пользователь подключался к группе доступности, настроенной для маршрутизации только для чтения. |
| Связанные серверы | Исправлена проблема, из-за которой пользователь с разрешением "УПРАВЛЕНИЕ СЕРВЕРОМ" (но не в роли sysadmin) не мог добавлять связанный сервер. |
| Средство просмотра журнала | Исправлена проблема, из-за которой для пользователя с разрешениями на просмотр состояния сервера было невозможно просмотреть журналы ошибок SQL Server. См. статью [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/32899204). |
| Обозреватель объектов | Исправлена проблема, из-за которой выбор меню **Запустить PowerShell** на некоторых узлах обозревателя объектов (например, "Управление политиками", "Расширенные события") приводил к неправильному запуску PowerShell. |
| зарегистрированные серверы | Исправлена проблема, из-за которой SSMS аварийно завершал работу при попытке зарегистрировать централизованный сервер управления. |
| зарегистрированные серверы | Исправлена проблема, из-за которой отсутствовали элементы меню для запуска Azure Data Studio с зарегистрированных серверов. |
| Отчеты | Исправлена проблема, из-за которой на панели мониторинга производительности вам не удавалось перейти ко вложенным ссылкам (например, **Дорогостоящие запросы**). Эта проблема была распространена в большинстве локализованных версий SSMS. См. статью [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/41454499). |
| Инструкция ShowPlan | Исправлена проблема, приводившая к аварийному завершению работы среды SSMS при использовании узла поиска для поиска текста. См. статью [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/40421650). |
| Инструкция ShowPlan | Добавление суффикса KB в строку подсказки временно предоставляемого буфера памяти |
| Оценка уязвимости | Исправлена проблема, из-за которой SSMS выдавал ошибку при попытке задать базовые показатели в оценке уязвимости. См. статью [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/40578565). |
| Пользовательский интерфейс XEvent | Исправлена ошибка, из-за которой нажатие F1 не приводило к отображению правильной страницы в DOCS. |
| Пользовательский интерфейс XEvent | Исправлен журнал в средстве просмотра XEvent, в котором всплывающая подсказка неправильно отображала текст, закодированный с помощью суррогатных пар. |
#### <a name="known-issues-187"></a>Известные проблемы (в версии 18.7)
| Добавления | Сведения | Обходной путь |
|----------|---------|------------|
| Службы Analysis Services | Ошибка при подключении к службам SSAS через MSMDPUMP.dll. См. статью [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035-sql-server/suggestions/40144696). | Недоступно |
| Службы Analysis Services | В редких случаях при использовании установки обновления для открытия редактора DAX после обновления SSMS может возникать ошибка "Объект не задан экземпляром объекта". | Чтобы устранить эту проблему, удалите, а затем переустановите SSMS. |
| Общие ошибки SSMS | В диалоговом окне New Server Audit Specification (Создать спецификацию аудита сервера) может происходить сбой SSMS с ошибкой нарушения прав доступа. | Недоступно |
| Общие ошибки SSMS | Расширения SSMS с использованием объектов SMO должны быть перекомпилированы для нового пакета v161 SMO, предназначенного для среды SSMS. Доступна предварительная версия по адресу https://www.nuget.org/packages/Microsoft.SqlServer.SqlManagementObjects.SSMS/. </br></br> Расширения, скомпилированные для предыдущих версий 160 пакета Microsoft.SqlServer.SqlManagementObjects, по-прежнему будут работать. | Недоступно |
| Мастер создания скриптов | Сбой мастера при попытке выполнить перечисление объектов базы данных в SQL Server 2014 и более поздних версий. См. статью [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035-sql-server/suggestions/41885587). | Используйте SSMS 18.6 для выбора объектов в мастере создания скриптов для SQL 2014 и более ранних версий. |
| Службы Integration Services | При импорте пакетов в Integration Services или экспорте из Integration Services, а также при экспорте пакетов из Azure-SSIS Integration Runtime утрачиваются скрипты пакетов, содержащих задачи или компоненты скрипта. Обходное решение. Удалите папку C:\Program Files (x86)\Microsoft SQL Server Management Studio 18\Common7\IDE\CommonExtensions\MSBuild. | Недоступно |
| Службы Integration Services | Удаленные подключения к службам интеграции могут завершаться ошибкой "Указанная служба не существует как установленная служба" в более новой операционной системе. Обходное решение. В разделах Computer\HKEY_CLASSES_ROOT\AppID и Computer\HKEY_CLASSES_ROOT\WOW6432Node\AppID найдите записи, связанные со службами интеграции, и в этих кустах переименуйте раздел реестра с именем "LocalService" на "LocalService_A" для конкретной версии служб интеграции, которую нужно подключить. | Н/Д |
| Обозреватель объектов | В выпуски SSMS до 18.7 внесено критическое изменение в обозревателе объектов из-за изменений, связанных с [бессерверным пулом SQL для Azure Synapse Analytics](/azure/synapse-analytics/sql/on-demand-workspace-overview). | Чтобы и дальше использовать обозреватель объектов в SSMS с бессерверным пулом SQL для Azure Synapse Analytics, требуется SSMS 18.7 или более поздней версии. |
| Хранилище запросов | При щелчке правой кнопкой мыши на узле в обозревателе объектов для хранилища запросов возникает ошибка. | Доступ к элементам следует осуществлять напрямую, развернув узел и щелкнув правой кнопкой мыши отдельные дочерние параметры. |
### <a name="186"></a>18.6
![загрузить](media/download-icon.png) [Загрузить SSMS 18.6](https://go.microsoft.com/fwlink/?linkid=2135491)
- Номер выпуска: 18.6
- Номер сборки: 15.0.18338.0
- Дата выпуска: 22 июля 2020 г.
[Китайский (упрощенное письмо)](https://go.microsoft.com/fwlink/?linkid=2135491&clcid=0x804) | [Китайский (традиционное письмо)](https://go.microsoft.com/fwlink/?linkid=2135491&clcid=0x404) | [Английский (США)](https://go.microsoft.com/fwlink/?linkid=2135491&clcid=0x409) | [Французский](https://go.microsoft.com/fwlink/?linkid=2135491&clcid=0x40c) | [Немецкий](https://go.microsoft.com/fwlink/?linkid=2135491&clcid=0x407) | [Итальянский](https://go.microsoft.com/fwlink/?linkid=2135491&clcid=0x410) | [Японский](https://go.microsoft.com/fwlink/?linkid=2135491&clcid=0x411) | [Корейский](https://go.microsoft.com/fwlink/?linkid=2135491&clcid=0x412) | [Португальский (Бразилия)](https://go.microsoft.com/fwlink/?linkid=2135491&clcid=0x416) | [Русский](https://go.microsoft.com/fwlink/?linkid=2135491&clcid=0x419) | [Испанский](https://go.microsoft.com/fwlink/?linkid=2135491&clcid=0x40a)
#### <a name="whats-new-in-186"></a>Новые возможности версии 18.6
| Изменения | Сведения |
|----------|---------|
| Службы Analysis Services | Обновлено до последней версии клиентских библиотек AS. |
| Аудит | Добавлена поддержка идентификатора действия SENSITIVE_BATCH_COMPLETED_GROUP (строка вместо числа). |
| Аудит | В средство просмотра аудита добавлены следующие поля: affected_rows, response_rows, connection_id, duration_milliseconds и data_sensitivity_information. |
| Классификация данных | Обновлен компонент SSMS для поддержки импорта и экспорта политики, экспортированной с помощью командлетов PowerShell. |
| Импорт неструктурированного файла | Добавлена поддержка файлов фиксированной ширины и обнаружения типов файлов для файлов CSV/TSV, чтобы убедиться, что они анализируются как файлы CSV/TSV соответственно. |
| Службы Integration Services | Добавлена поддержка заданий агента управляемого экземпляра Azure SQL для выполнения пакета служб SSIS из хранилища пакетов в Azure-SSIS IR. |
| Написание скриптов и SMO | Добавлена поддержка динамического маскирования данных в [Azure Synapse Analytics](/azure/synapse-analytics/sql-data-warehouse/sql-data-warehouse-overview-what-is) (ранее — SQL Azure DW). |
| Написание скриптов и SMO | Включена поддержка политики безопасности скриптов в [Azure Synapse Analytics](/azure/synapse-analytics/sql-data-warehouse/sql-data-warehouse-overview-what-is). |
#### <a name="bug-fixes-in-186"></a>Исправления ошибок в версии 18.6
| Добавления | Сведения |
|----------|---------|
| Возможности доступа | Скорректированы цвета границ для специальных возможностей на странице **Общие свойства базы данных** (границы вокруг сетки и поля имени стали темнее для обеспечения контрастности > 3 : 1). |
| Возможности доступа | Добавлена обработка выполнения запроса для обновления экранного диктора (на компьютере должен быть установлен NetFx4.8+). |
| Always Encrypted | Исправлена проблема, когда в диалоговом окне *Новый ключ шифрования столбца* указывается, что параметр CEK не поддерживает анклав, даже если CMK поддерживает анклав. |
| Службы Analysis Services | Исправлена ошибка при просмотре секций Analysis Services, которые могли вызвать необработанное исключение. |
| **Диаграммы базы данных** | Исправлена нерешенная проблема с **диаграммами баз данных**, которая приводила к сбою и повреждению существующих диаграмм и SSMS. Если вы создали или сохранили диаграмму с помощью SSMS 18.0 и 18.5.1 и эта диаграмма включает *текстовую заметку*, вы не сможете открыть такую диаграмму в любой версии SSMS. С помощью этого исправления SSMS 18.6 может открыть и сохранить диаграмму, созданную с помощью SSMS 17.9.1 и более ранних версий. В SSMS 17.9.1 и более ранних версиях также можно открыть диаграмму после ее сохранения в SSMS 18.6. См. статью [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/37992649). |
| Классификация данных | Исправлена проблема, при которой имя столбца не отображается в области рекомендаций панели классификации данных. |
| Общие ошибки SSMS | Устранена проблема, из-за которой свойства базы данных *Размер* и *Доступное пространство* имеют неверные значения для базы данных SQL Azure (уровень службы "Гипермасштабирование"). |
| Общие ошибки SSMS | Исправлена проблема, из-за которой в свойстве базы данных "Размер" указывается максимальный размер вместо фактического размера базы данных SQL Azure. (Примечание: для DW все равно указывается максимальный размер.) |
| Общие ошибки SSMS | Устранены три распространенных источника зависаний в SSMS. |
| Общие ошибки SSMS | Устранено несколько проблем, связанных с диалоговым окном подключения SSMS, когда *забывались* введенные данные (сервер/пользователь/пароли). См. статьи [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/40256401) и [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/40015519). |
| Общие ошибки SSMS | Исправлена ошибка в диалоговом окне **Свойства статистики**, где выбран флажок **Обновить статистику для этих столбцов**, когда нажатие кнопки **OK** не дает никакого результата. Статистика не обновляется, и при попытке создать скрипт действия выдается сообщение *Нет действий для включения в скрипт*. См. статью [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/37799992). |
| Общие ошибки SSMS | Исправлены проблемы, связанные с [CVE-2020-1455](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1455). |
| Импорт и экспорт приложения уровня данных | Исправлена проблема, из-за которой среда SSMS выдавала ошибку при импорте файла BACPAC. См. статью [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/40229137). |
| Службы Integration Services | Исправлена ошибка, при которой клиенты не могли изменить шаг задания агента SQL Server при использовании SSMS версии 18.4 или более ранней для выполнения пакетов служб SSIS в Управляемом экземпляре Azure SQL. |
| Службы Integration Services | Исправлена ошибка, из-за которой на вкладке **Параметры выполнения** отсутствовал параметр **Использовать 32-разрядную среду выполнения** для выполнения пакета служб SSIS в шаге задания агента SQL для локального сервера SQL Server. |
| Редактор и IntelliSense | Исправлена проблема, из-за которой при выборе "Файл" > "Создать" > "Запрос ядра СУБД" появлялось диалоговое окно с сообщением об ошибке. |
| Обозреватель объектов | Исправлена проблема, из-за которой при щелчке правой кнопкой мыши по узлу таблицы или индекса в обозревателе объектов для базы данных SQL Azure было недоступно *окно свойств*. |
| Обозреватель объектов | Устранена ошибка, из-за которой среда SSMS не могла расширить узел баз данных для главного экземпляра в Azure, если на уровне управления возникала ошибка sys.database_service_objectives. |
| Отчеты | Исправлено несколько стандартных отчетов, которые не работали в Linux. </br></br> Пример Отчет о потреблении памяти завершался ошибкой, похожей на "Недопустимый /var/opt/mssql/log/log_116.trc\log.trc..."). |
| Написание скриптов и SMO | Обновлена логика создания баз данных SQL Azure для использования Gen5_2 в качестве SLO по умолчанию. |
| Пользовательский интерфейс XEvent | Исправлена неустраненная проблема (впервые появилась в SSMS 18.0), где при выборе команды "Сохранить в файл XEL" возникала ошибка. См. статью [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/37695592). |
#### <a name="known-issues-186"></a>Известные проблемы (18.6)
| Добавления | Сведения | Обходной путь |
|----------|---------|------------|
| Службы Analysis Services | Ошибка при подключении к службам SSAS через MSMDPUMP.dll. См. статью [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035-sql-server/suggestions/40144696). | Недоступно |
| Общие ошибки SSMS | В диалоговом окне New Server Audit Specification (Создать спецификацию аудита сервера) может происходить сбой SSMS с ошибкой нарушения прав доступа. | Недоступно |
| Общие ошибки SSMS | Расширения SSMS с использованием объектов SMO должны быть перекомпилированы для нового пакета v161 SMO, предназначенного для среды SSMS. Доступна предварительная версия по адресу https://www.nuget.org/packages/Microsoft.SqlServer.SqlManagementObjects.SSMS/. </br></br> Расширения, скомпилированные для предыдущих версий 160 пакета Microsoft.SqlServer.SqlManagementObjects, по-прежнему будут работать. | Недоступно |
| Службы Integration Services | При импорте пакетов в Integration Services или экспорте из Integration Services, а также при экспорте пакетов из Azure-SSIS Integration Runtime утрачиваются скрипты пакетов, содержащих задачи или компоненты скрипта. Обходное решение. Удалите папку C:\Program Files (x86)\Microsoft SQL Server Management Studio 18\Common7\IDE\CommonExtensions\MSBuild. | Недоступно|
| Службы Integration Services | Удаленные подключения к службам интеграции могут завершаться ошибкой "Указанная служба не существует как установленная служба" в более новой операционной системе. Обходное решение. В разделах Computer\HKEY_CLASSES_ROOT\AppID и Computer\HKEY_CLASSES_ROOT\WOW6432Node\AppID найдите записи, связанные со службами интеграции, и в этих кустах переименуйте раздел реестра с именем "LocalService" на "LocalService_A" для конкретной версии служб интеграции, которую нужно подключить. | Недоступно|
### <a name="1851"></a>18.5.1
![загрузить](media/download-icon.png) [Загрузить SSMS 18.5.1](https://go.microsoft.com/fwlink/?linkid=2132606)
- Номер выпуска: 18.5.1
- Номер сборки: 15.0.18333.0
- Дата выпуска: 9 июня 2020 г.
[Китайский (упрощенное письмо)](https://go.microsoft.com/fwlink/?linkid=2132606&clcid=0x804) | [Китайский (традиционное письмо)](https://go.microsoft.com/fwlink/?linkid=2132606&clcid=0x404) | [Английский (США)](https://go.microsoft.com/fwlink/?linkid=2132606&clcid=0x409) | [Французский](https://go.microsoft.com/fwlink/?linkid=2132606&clcid=0x40c) | [Немецкий](https://go.microsoft.com/fwlink/?linkid=2132606&clcid=0x407) | [Итальянский](https://go.microsoft.com/fwlink/?linkid=2132606&clcid=0x410) | [Японский](https://go.microsoft.com/fwlink/?linkid=2132606&clcid=0x411) | [Корейский](https://go.microsoft.com/fwlink/?linkid=2132606&clcid=0x412) | [Португальский (Бразилия)](https://go.microsoft.com/fwlink/?linkid=2132606&clcid=0x416) | [Русский](https://go.microsoft.com/fwlink/?linkid=2132606&clcid=0x419) | [Испанский](https://go.microsoft.com/fwlink/?linkid=2132606&clcid=0x40a)
#### <a name="bug-fixes-in-1851"></a>Исправления ошибок в версии 18.5.1
| Добавления | Сведения |
|----------|---------|
| Службы Analysis Services | Повышение производительности при развертывании списка баз данных при подключении к Azure или серверам Power BI. |
| Службы Analysis Services | Исправлена проблема, при которой при попытке открыть мастер синхронизации баз данных сервера Analysis Services возникала ошибка. |
| Службы Analysis Services | Исправлена проблема, из-за которой пользователям не удавалось запросить SSAS 2017 и более ранние версии с разрешениями на данные ячеек. |
| Общие ошибки SSMS | [Конструктор таблиц — исправлен звуковой сигнал при попытке перейти в сетку конструктора таблиц](https://feedback.azure.com/forums/908035/suggestions/40318435). |
#### <a name="known-issues-1851"></a>Известные проблемы (в версии 18.5.1)
| Добавления | Сведения | Обходной путь |
|----------|---------|------------|
| Общие ошибки SSMS | Существует известная ошибка, связанная со структурой схемы, которая приводит к повреждению существующих схем. Например, вы создаете проект схемы с помощью SSMS 17.9.1, а затем обновляете или сохраняете его с помощью SSMS 18. x, а затем пытаетесь открыть его с помощью 17.9.1. Дополнительные сведения см. в статье [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/37992649). | Недоступно |
| Общие ошибки SSMS | В диалоговом окне New Server Audit Specification (Создать спецификацию аудита сервера) может происходить сбой SSMS с ошибкой нарушения прав доступа. | Недоступно ||
| Написание скриптов и SMO | Расширения SSMS с использованием объектов SMO нужно перекомпилировать для нового пакета v160 SMO. | Недоступно |
| Службы Integration Services | При импорте пакетов в Integration Services или экспорте из Integration Services, а также при экспорте пакетов из Azure-SSIS Integration Runtime утрачиваются скрипты пакетов, содержащих задачи или компоненты скрипта. Инструкции по решению: | Удалите папку C:\Program Files (x86)\Microsoft SQL Server Management Studio 18\Common7\IDE\CommonExtensions\MSBuild. |
### <a name="185"></a>18.5
![скачать](media/download-icon.png) [Скачать SSMS 18.5](https://go.microsoft.com/fwlink/?linkid=2125901)
- Номер выпуска: 18.5
- Номер сборки: 15.0.18330.0
- Дата выпуска: 7 апреля 2020 г.
[Китайский (упрощенное письмо)](https://go.microsoft.com/fwlink/?linkid=2125901&clcid=0x804) | [Китайский (традиционное письмо)](https://go.microsoft.com/fwlink/?linkid=2125901&clcid=0x404) | [Английский (США)](https://go.microsoft.com/fwlink/?linkid=2125901&clcid=0x409) | [Французский](https://go.microsoft.com/fwlink/?linkid=2125901&clcid=0x40c) | [Немецкий](https://go.microsoft.com/fwlink/?linkid=2125901&clcid=0x407) | [Итальянский](https://go.microsoft.com/fwlink/?linkid=2125901&clcid=0x410) | [Японский](https://go.microsoft.com/fwlink/?linkid=2125901&clcid=0x411) | [Корейский](https://go.microsoft.com/fwlink/?linkid=2125901&clcid=0x412) | [Португальский (Бразилия)](https://go.microsoft.com/fwlink/?linkid=2125901&clcid=0x416) | [Русский](https://go.microsoft.com/fwlink/?linkid=2125901&clcid=0x419) | [Испанский](https://go.microsoft.com/fwlink/?linkid=2125901&clcid=0x40a)
#### <a name="whats-new-in-185"></a>Новые возможности версии 18.5
| Изменения | Сведения |
|----------|---------|
| Службы Analysis Services | Добавлена поддержка конечной точки Power BI для сопоставления в Azure Analysis Services. |
| Службы Analysis Services | Profiler: добавлена поддержка определения трассировки Analysis Services 15.1. |
| Классификация данных | Добавлена кнопка в представление результатов сканирования оценки уязвимостей (VA), чтобы исправить правило классификации данных при переходе на панель классификации. |
| Классификация данных | Добавлена поддержка ранга конфиденциальности в Классификации данных. |
| Уровень "Гипермасштабирование" | Добавлена поддержка возможности *Импорт приложения уровня данных* (BACPAC-файла) для гипермасштабирования SQL Azure. |
| Службы Integration Services | Добавлена поддержка выполнения пакета служб SSIS из файловой системы в задании агента Управляемого экземпляра (MI). |
| Службы Integration Services | В программе dtexec с поддержкой Azure стала более удобной для пользователей настройка вызова выполнения пакетов Integration Services (SSIS) в Azure-SSIS Integration Runtime.
| Службы Integration Services | Добавлена поддержка подключения Azure-SSIS Integration Runtime и выполнения пакетов служб SSIS в хранилищах пакетов, а также управление этими пакетами.
| Службы Integration Services | Добавлена поддержка миграции локальных заданий агента SSIS в конвейеры и триггеры ADF.
| Службы Integration Services | Улучшено взаимодействие с пользователем при экспорте проектов SSIS из базы данных SSIS. По сравнению со старым процессом экспорта, который предусматривал загрузку и обновление пакетов в проекте SSIS, новый процесс не зависит от версии и не предполагает загрузку и обновление пакетов в проекте SSIS. Вместо этого пакеты сохраняются в проектах в том виде, в котором они находятся в базе данных SSIS, за исключением случаев изменения уровня защиты на EncryptSensitiveWithUserKey. |
| Написание скриптов и SMO | Добавлено новое свойство DwMaterializedViewDistribution для объекта View. |
| Написание скриптов и SMO | Больше не поддерживаются *функциональные ограничения* (эта предварительная версия функции удалена из SQL Azure и локального SQL Server). |
| Написание скриптов и SMO | Добавлена поддержка *записной книжки* в качестве места назначения для мастера создания скриптов. |
| Написание скриптов и SMO | Включена поддержка *бессерверного пула SQL для Azure Synapse Analytics*. |
| Написание скриптов и SMO | [API "Оценка SQL"](../tools/sql-assessment-api/sql-assessment-api-overview.md) — поля Platform, Name и engineEdition теперь могут содержать обычные списки, разделенные запятыми (для *платформ*: \[*Windows*, *Linux*\]), а не только регулярные выражения (для *платформ*: *\/Windows\|Linux\/* ).
| Написание скриптов и SMO | [API "Оценка SQL"](../tools/sql-assessment-api/sql-assessment-api-overview.md) — добавлено 13 правил оценки. Дополнительные сведения см. на [GitHub](https://github.com/microsoft/sql-server-samples/tree/master/samples/manage/sql-assessment-api). |
#### <a name="bug-fixes-in-185"></a>Исправления ошибок в версии 18.5
| Добавления | Сведения |
|----------|---------|
| Возможности доступа | Мастер "Создание расписания" в Фабрике данных SSIS — исправлена проблема, при которой порядок фокусировки не является логическим в режиме сканирования экранного диктора в мастере *Создание расписания*. |
| Возможности доступа | Мастер базы данных с поддержкой переноса — исправлена проблема, при которой средство чтения с экрана не уведомляет об имени таблицы запроса при предоставлении сведений о таблице. |
| Службы Analysis Services | Исправлено кэшированное подключение при создании скриптов в AS с подключением Azure Active Directory (AAD). |
| Всегда включено | Исправлена ошибка, из-за которой первая база данных, добавленная в группу доступности Always On, не присоединялась правильно.
| Всегда включено | Исправлена проблема, из-за которой при попытке отобразить панель мониторинга при подключении к конечной точке кластера больших данных возникала ошибка. |
| Аудит | Исправлена ошибка, из-за которой работа окна слияния журналов аудита аварийно завершалась, если в корневой папке учетной записи хранения была папка с пустым именем. |
| Аудит | Исправлена проблема, при которой в окне слияния журналов аудита не отображались все серверы, если в корне контейнера слишком много элементов. |
| Классификация данных | Исправлена проблема, при которой мастер *Классификация данных* не открывался при работе с базами данных с большим количеством таблиц. |
| Классификация данных | Теперь мы ввели принудительное использование разных идентификаторов GUID для каждой структуры label/infoType и GUID в процессе проверки. |
| Классификация данных | Процесс классификации в SQL Server 2019 теперь не поддерживается. |
| Классификация данных | Исправлены предыдущие проверочные тесты (добавление ранга, удаление недопустимого свойства *InformationTypes*) и добавлены новые для первых двух точек. |
| Классификация данных | Кнопка, расположенная над таблицей классифицированных столбцов, теперь минимизирует панель рекомендаций должным образом. |
| Общие ошибки SSMS | Обновлены версии драйверов MSODBC и MSOLEDB. |
| Общие ошибки SSMS | Устранены по крайней мере две распространенных причины зависания и сбоев в SSMS. |
| Общие ошибки SSMS | Устранен еще один случай зависания диалогового окна *Восстановление* при нажатии кнопки обзора. |
| Общие ошибки SSMS | Исправлен *новый графический пользовательский интерфейс баз данных* бессерверного пула SQL для Azure Synapse Analytics. |
| Общие ошибки SSMS | Исправлены шаблоны *Создать внешнюю таблицу* и *Создать внешний источник данных* для бессерверного пула SQL для Azure Synapse Analytics. |
| Общие ошибки SSMS | Исправлены свойства базы данных, свойства подключения, скрытие отчетов и переименование бессерверного пула SQL для Azure Synapse Analytics. |
| Общие ошибки SSMS | Always Encrypted. Исправлена ошибка, из-за которой раскрывающийся список имен ключей становится доступным только для чтения при выборе нового ключа с поддержкой анклава. |
| Общие ошибки SSMS | Очищена сетка *параметров свойств базы данных* , в которой отображались две *разных категории*. |
| Общие ошибки SSMS | Исправлена проблема, когда полоса прокрутки появлялась с середины в сетке свойств базы данных. |
| Общие ошибки SSMS | Исправлена проблема, которая приводила к сбою SSMS при открытии SQL Server при подключении к серверу Analysis Services. |
| Общие ошибки SSMS | Диалоговое окно подключения — исправлена проблема, при которой не удавалось снять флажок "Запомнить пароль". |
| Общие ошибки SSMS | Исправлена проблема, при которой учетные данные, связанные с сервером или пользователями, всегда запоминались. См. статью [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/37875172). |
| Общие ошибки SSMS | Исправлена проблема, при которой окна редакторов не обновлялись должным образом. Для этого необходимо было отключить аппаратное ускорение в разделе *Инструменты > Параметры > Среда*. См. статью [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/37474042). |
| Общие ошибки SSMS | Исправлена проблема, при которой проверка подлинности Azure Active Directory не работала через прокси-сервер. |
| Высокое разрешение и масштабирование | Исправлена проблема, из-за которой элементы управления в разделе *Свойства индекса* отображались неправильно (кнопки перекрывали сетку). См. статью [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/36030424). |
| Высокое разрешение и масштабирование | Исправлено несколько проблем в диалоговом окне *Свойства базы данных*, когда обрезались элементы управления при отображении на дисплеях с разрешением 4K. |
| Высокое разрешение и масштабирование | Исправлены мастера публикации и подписки для работы с дисплеями с разрешением 4K. |
| Высокое разрешение и масштабирование | Незначительное исправление на новой странице спецификации сервера аудита. |
| Высокое разрешение и масштабирование | Исправлена проблема с отображением мастера высокой доступности на дисплеях с разрешением 4К. |
| Высокое разрешение и масштабирование | Исправлена ошибка, из-за которой пользователь не мог добавить целевой объект в окно Xevent New Session (Новый сеанс Xevent) и Set Session Event Filters (Установка фильтров событий сеанса) в мастере сеансов Xevent при масштабе отображения 125 %. |
| Высокое разрешение и масштабирование | Исправлена ошибка, из-за которой интерфейс *резервного копирования базы данных по URL-адресу* пропадал из поля зрения при масштабировании более 100 %. |
|Импорт неструктурированного файла | Обновлен мастер импорта неструктурированных файлов, позволяющий проверить все на наличие столбца с разрешенными значениями null. См. статью [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/38027137). |
| Обозреватель объектов | Исправлена ошибка, из-за которой в обозревателе объектов могла отображаться неправильная информация при использовании строк подключения в диалоговом окне подключения. |
| Обозреватель объектов | Исправлена ошибка, из-за которой в обозревателе объектов медленно развертывались таблицы баз данных, если в базе данных есть тысячи таблиц (более 20 000). |
| Пользовательский интерфейс хранилища запросов | Исправлен отчет TRC, в котором количество выполнений (для метрики *времени ожидания*) вычислялось неправильно в качестве суммы выполнений для каждой отдельной категории ожидания. В случае одного выполнения запроса он будет зарегистрирован для каждой категории ожидания, которую ожидал запрос. Таким образом, если TRC просто суммирует запросы по категории ожидания, увеличивается количество выполнений. На самом деле в пределах категории ожидания значение должно быть максимальным. |
| Пользовательский интерфейс хранилища запросов | Исправлена ошибка, при которой в подробном представлении TRC отображались неправильные данные, когда результирующий набор фильтровался по верхним X результатам. Это происходило, потому что запрос использовал несколько обобщенных табличных выражений, которые затем объединялись для создания окончательного результирующего набора. Если верхние X результатов вставлялись в CTE, иногда удавалось отфильтровывать необходимые строки. Иногда это может приводить к созданию недетерминированного результирующего набора. Исправление заключается в том, чтобы предложение верхних X результатов не отправлялось принудительно в CTE. |
| Пользовательский интерфейс хранилища запросов | Исправлена проблема со сводкой плана как в виде сетки, так и в виде диаграммы, при которой требовалось время ожидания выполнения последнего запроса. Отсутствие этого столбца нарушает запрос. В наборе изменений предусмотрено добавление этого столбца к CTE статистики времени ожидания. |
| Инструкция ShowPlan | В SSMS улучшены возможности отображения оценочного количества строк для операторов с несколькими выполнениями: 1) свойство *Estimated Number of Rows* (предполагаемое количество строк) изменено на Estimated Number of Rows Per Execution (Расчетное число строк для выполнения); 2) добавлено новое свойство *Estimated Number of Rows for All Executions* (Расчетное число строк для всех выполнений); 3) свойство *Фактическое количество строк* изменено на *Actual Number of Rows for All Executions* (Фактическое число строк для всех выполнений). |
| Агент SQL | Исправлена проблема, из-за которой попытка изменить шаг задания Агента SQL приводила к зависанию пользовательского интерфейса SSMS. SSMS теперь позволяет просматривать (с помощью кнопки *Просмотреть*) файл выходных данных, имя которого токенизировано (по крайней мере в виде простых макросов или токенов, которые поддерживает Агент SQL и которые не определены во время выполнения). Кроме того, служба SSMS не отключает кнопку "Просмотреть", когда пользователь не имеет доступа к файлу (в соответствии с разрешениями SQL). См. статью [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/39063124). |
| Агент SQL | Исправлена последовательность вкладок на странице "Шаг задания". |
| Агент SQL | Кнопки "Далее" и "Назад" на странице "Шаг задания" поменяли местами, чтобы они располагались в логическом порядке. |
| Агент SQL | Изменено окно "Расписание заданий", чтобы не обрезался пользовательский интерфейс. |
| Написание скриптов и SMO | Исправлены возможности создания скриптов бессерверного пула SQL для Azure Synapse Analytics. |
| Написание скриптов и SMO | Удалено явное приведение SQLVARIANT (недопустимый синтаксис T-SQL для SqlOnDemand), что исправляет создание скриптов для SQL по запросу. |
| Написание скриптов и SMO | Исправлена проблема, при которой пропускался коэффициент FILLFACTOR в индексах для SQL Azure. |
| Написание скриптов и SMO | Исправлена проблема, связанная с созданием скриптов для внешних объектов. |
| Написание скриптов и SMO | Исправлена проблема, из-за которой для *создания скриптов* нельзя было выбрать параметр для расширенных свойств для базы данных SQL. Кроме того, исправлено создание скриптов таких расширенных свойств. |
| Написание скриптов и SMO | [API "Оценка SQL"](../tools/sql-assessment-api/sql-assessment-api-overview.md) — была неправильная ссылка на справку в правиле XTPHashAvgChainBuckets. |
| Пользовательский интерфейс XEvent | Исправлена проблема выбора элемента сетки при наведении указателя мыши. См. статьи [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/38262124) и [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035-sql-server/suggestions/37873921). |
#### <a name="known-issues-185"></a>Известные проблемы (в версии 18.5)
| Добавления | Сведения | Обходной путь |
|----------|---------|------------|
- Диаграмма базы данных, созданная в среде SSMS, работающей на одном компьютере, не может быть изменена с другого компьютера (это приведет к сбою SSMS). Дополнительные сведения см. в статье 37992649, [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/37992649).
- При импорте пакетов в Integration Services или экспорте из Integration Services, а также при экспорте пакетов из Azure-SSIS Integration Runtime утрачиваются скрипты пакетов, содержащих задачи или компоненты скрипта. Чтобы устранить эту проблему, удалите папку *C:\Program Files (x86)\Microsoft SQL Server Management Studio 18\Common7\IDE\CommonExtensions\MSBuild*.
- В диалоговом окне New Server Audit Specification (Создать спецификацию аудита сервера) может происходить сбой SSMS с ошибкой нарушения прав доступа.
- Расширения SSMS с использованием объектов SMO должны быть перекомпилированы для нового объекта SMO версии 160 (пакет будет доступен на сайте nuget.org сразу после выпуска SSMS 18.5).
- [Ошибка при подключении к службам SSAS через MSMDPUMP.dll в среде SSMS](https://feedback.azure.com/forums/908035-sql-server/suggestions/40144696-error-when-connecting-to-ssas-via-msmdpump-dll-in).
### <a name="184"></a>18.4
![скачать](media/download-icon.png) [Скачать SSMS 18.4](https://go.microsoft.com/fwlink/?linkid=2108895)
- Номер выпуска: 18.4
- Номер сборки: 15.0.18206.0
- Дата выпуска: 4 ноября 2019 г.
[Китайский (упрощенное письмо)](https://go.microsoft.com/fwlink/?linkid=2108895&clcid=0x804) | [Китайский (традиционное письмо)](https://go.microsoft.com/fwlink/?linkid=2108895&clcid=0x404) | [Английский (США)](https://go.microsoft.com/fwlink/?linkid=2108895&clcid=0x409) | [Французский](https://go.microsoft.com/fwlink/?linkid=2108895&clcid=0x40c) | [Немецкий](https://go.microsoft.com/fwlink/?linkid=2108895&clcid=0x407) | [Итальянский](https://go.microsoft.com/fwlink/?linkid=2108895&clcid=0x410) | [Японский](https://go.microsoft.com/fwlink/?linkid=2108895&clcid=0x411) | [Корейский](https://go.microsoft.com/fwlink/?linkid=2108895&clcid=0x412) | [Португальский (Бразилия)](https://go.microsoft.com/fwlink/?linkid=2108895&clcid=0x416) | [Русский](https://go.microsoft.com/fwlink/?linkid=2108895&clcid=0x419) | [Испанский](https://go.microsoft.com/fwlink/?linkid=2108895&clcid=0x40a)
| Изменения | Сведения |
|----------|---------|
| Классификация данных | Добавлена поддержка пользовательской политики защиты информации для классификации данных. |
| Хранилище запросов | В диалоговое окно свойств добавлен параметр *Макс. план на запрос*. |
| Хранилище запросов | Добавлена поддержка новых пользовательских политик сбора данных. |
| Хранилище запросов | В параметры добавлен **режим записи статистики ожидания** в разделе **Свойства базы данных** на странице **Хранилище запросов**. |
| Написание скриптов и SMO | Добавлена поддержка скрипта материализованного представления в хранилище данных SQL. |
| Написание скриптов и SMO | Включена поддержка *бессерверного пула SQL для Azure Synapse Analytics*. |
| Написание скриптов и SMO | [API оценки SQL](../tools/sql-assessment-api/sql-assessment-api-overview.md) — добавлено 50 правил оценки (подробнее см. на GitHub). |
| Написание скриптов и SMO | [API оценки SQL](../tools/sql-assessment-api/sql-assessment-api-overview.md) — добавлены базовые математические выражения и условия сопоставления с правилами. |
| Написание скриптов и SMO | [API оценки SQL](../tools/sql-assessment-api/sql-assessment-api-overview.md) — добавлена поддержка объекта RegisteredServer. |
| Написание скриптов и SMO | [API оценки SQL](../tools/sql-assessment-api/sql-assessment-api-overview.md) — обновлен способ хранения правил в формате JSON, а также механизм применения переопределений и настроек. |
| Написание скриптов и SMO | [API оценки SQL](../tools/sql-assessment-api/sql-assessment-api-overview.md) — обновлены правила поддержки SQL в Linux. |
| Написание скриптов и SMO | [API оценки SQL](../tools/sql-assessment-api/sql-assessment-api-overview.md) — обновлен формат набора правил JSON и добавлена версия схемы. |
| Написание скриптов и SMO | [API оценки SQL](../tools/sql-assessment-api/sql-assessment-api-overview.md) — обновлены выходные данные командлетов для повышения удобства чтения рекомендаций. |
| Профилировщик XEvent | В сеансы профилировщика XEvent добавлено событие *error_reported*. |
#### <a name="bug-fixes-in-184"></a>Исправления ошибок в выпуске 18.4
| Добавления | Сведения |
|----------|---------|
| Службы Analysis Services | Устранена проблема, из-за которой в редакторе скриптов DAX для многомерных баз данных не отображались таблицы в IntelliSense. |
| Службы Analysis Services | Для преобразования в строку подсистемы используйте средство синтаксического анализа DAX. Это относится к международным разделителям, десятичным знакам и пробелам. |
| Always Encrypted | Устранена проблема, из-за которой при *проверке утверждения* *учитывался регистр*. |
| Always Encrypted | Устранена проблема, из-за которой отчеты об ошибках и предупреждения не работали должным образом. |
| Мастер копирования баз данных | Устранены различные проблемы усечения и макета при отображении этого диалогового окна. |
| Общие ошибки SSMS | Устранена давнишняя проблема, из-за которой среда SSMS не учитывала сведения о соединении, передаваемые в командной строке, если при этом также указывались файлы SQL. |
| Общие ошибки SSMS | Устранена ошибка в SSMS, возникавшая при попытке отобразить защищаемые объекты в объектах фильтра репликации. |
| Общие ошибки SSMS | Устранена проблема удаления параметра командной строки -P за счет того, что среда SSMS теперь должна просматривать свой кэш учетных данных: если необходимые учетные данные найдены, для соединения будут использоваться они. |
| Импорт неструктурированного файла | Устранена проблема, из-за которой функция *импорта неструктурированных файлов* обрабатывала текстовые квалификаторы неправильно. |
| Обозреватель объектов | Устранена проблема, из-за которой при удалении базы данных SQL Azure в обозревателе объектов отображалось неверное сообщение. |
| Результаты запроса | Устранена появившаяся в SSMS 18.3.1 ошибка, из-за которой сетки создавались слишком узкими и в конце самой длинной строки в каждом столбце отображалось многоточие ( *...* ). |
| Средства репликации | Устранена проблема, из-за которой приложение выдавало ошибку ("Не удалось загрузить файл или сборку...") при попытке изменить задания Агента SQL. |
| Написание скриптов и SMO | Устранена проблема, из-за которой команда *Создать скрипт для таблицы...* для хранилища данных SQL, в котором использовались параметры сортировки Japanese_BIN2, не работала.|
| Написание скриптов и SMO | Устранена проблема, из-за которой команда ScriptAlter() завершала выполнение инструкций на сервере.|
| Агент SQL | Устранена проблема, из-за которой пользовательский интерфейс оператора агента не обновлял имя оператора, когда его изменяли в пользовательском интерфейсе, и создать для него скрипт было невозможно. Дополнительные сведения см. в статье [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/32897647).|
#### <a name="known-issues-184"></a>Известные проблемы (18.4)
- Диаграмма базы данных, созданная в среде SSMS, работающей на одном компьютере, не может быть изменена с другого компьютера (это приведет к сбою SSMS). Дополнительные сведения см. в статье [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/37992649).
- При переключении между несколькими окнами запросов возникают проблемы перерисовки. Дополнительные сведения см. в статье [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/37474042). Для решения этой проблемы можно отключить аппаратное ускорение в разделе *"Сервис" > "Параметры"* .
В статье [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035-sql-server) представлены сведения о других известных проблемах. Там же можно отправить отзыв группе разработчиков.
### <a name="1831"></a>18.3.1
![скачать](media/download-icon.png) [Скачать SSMS 18.3.1](https://go.microsoft.com/fwlink/?linkid=2105412)
- Номер выпуска: 18.3.1
- Номер сборки: 15.0.18183.0
- Дата выпуска: 2 октября 2019 г.
[Китайский (упрощенное письмо)](https://go.microsoft.com/fwlink/?linkid=2105412&clcid=0x804) | [Китайский (традиционное письмо)](https://go.microsoft.com/fwlink/?linkid=2105412&clcid=0x404) | [Английский (США)](https://go.microsoft.com/fwlink/?linkid=2105412&clcid=0x409) | [Французский](https://go.microsoft.com/fwlink/?linkid=2105412&clcid=0x40c) | [Немецкий](https://go.microsoft.com/fwlink/?linkid=2105412&clcid=0x407) | [Итальянский](https://go.microsoft.com/fwlink/?linkid=2105412&clcid=0x410) | [Японский](https://go.microsoft.com/fwlink/?linkid=2105412&clcid=0x411) | [Корейский](https://go.microsoft.com/fwlink/?linkid=2105412&clcid=0x412) | [Португальский (Бразилия)](https://go.microsoft.com/fwlink/?linkid=2105412&clcid=0x416) | [Русский](https://go.microsoft.com/fwlink/?linkid=2105412&clcid=0x419) | [Испанский](https://go.microsoft.com/fwlink/?linkid=2105412&clcid=0x40a)
#### <a name="whats-new-in-1831"></a>Новые возможности версии 18.3.1
| Изменения | Сведения |
|----------|---------|
| Классификация данных | Добавление сведений о классификации данных в пользовательский интерфейс свойств столбца (*Тип информации*, *Идентификатор типа информации*, *Метка конфиденциальности* и *Идентификатор метки конфиденциальности* не отображаются в пользовательском интерфейсе SSMS). |
| Редактор и IntelliSense | Обновлена поддержка возможностей, недавно добавленных в SQL Server 2019 (например, *ALTER SERVER CONFIGURATION*). |
| Службы Integration Services | Добавлен новый элемент меню выбора `Tools > Migrate to Azure > Configure Azure-enabled DTExec`, который вызывает выполнение пакетов служб SSIS в Azure-SSIS Integration Runtime как действия "Выполнить пакет SSIS" в конвейерах ADF. |
| Написание скриптов и SMO | Добавлена поддержка скриптов для ограничения уникальности хранилища данных SQL Azure. |
| Написание скриптов и SMO | Классификация данных </br> — Добавлена поддержка SQL версии 10 (SQL 2008) и более поздних версий. </br> — Добавлен новый атрибут конфиденциальности "rank" для SQL версии 15 (SQL 2019) и более поздних версий и базы данных SQL Azure. |
| Написание скриптов и SMO | [API Оценки SQL](../tools/sql-assessment-api/sql-assessment-api-overview.md) — добавлена версия в формат набора правил. |
| Написание скриптов и SMO | [API Оценки SQL](../tools/sql-assessment-api/sql-assessment-api-overview.md) — добавлены новые проверки. |
| Написание скриптов и SMO | [API Оценки SQL](../tools/sql-assessment-api/sql-assessment-api-overview.md) — добавлена поддержка управляемого экземпляра SQL Azure. |
| Написание скриптов и SMO | [API Оценки SQL](../tools/sql-assessment-api/sql-assessment-api-overview.md) — обновленное представление командлетов по умолчанию для отображения результатов в виде таблицы. |
#### <a name="bug-fixes-in-1831"></a>Исправления ошибок в выпуске 18.3.1
| Добавления | Сведения |
|----------|---------|
| Службы Analysis Services | Устранение проблемы масштабирования в редакторе запросов многомерных выражений.|
| Службы Analysis Services | Исправлена проблема в пользовательском интерфейсе XEvent, которая не позволяет пользователям создавать новые сеансы. |
| Развертывание базы данных в SQL Azure | Исправлена проблема (в DacFx), которая приводила к тому, что эта функция не работала.|
| Общие ошибки SSMS | Исправлена проблема, которая приводила к сбою SSMS при использовании функции сортировки в средстве просмотра XEvent. |
| Общие ошибки SSMS | Исправлены старые проблемы, из-за которых восстановление базы данных SSMS могло зависать. </br></br> Дополнительные сведения см. в статье с отзывами пользователей SQL Server. </br> [RESTORE DATABASE — выберите устройства резервного копирования, которые замедляют загрузку](https://feedback.azure.com/forums/908035/suggestions/32899099/). </br> [Среда SSMS 2016 очень медленно работает в диалоговых окнах восстановления базы данных](https://feedback.azure.com/forums/908035/suggestions/32900767/). </br> [Восстановление базы данных выполняется медленно](https://feedback.azure.com/forums/908035/suggestions/32900224/). </br> [Восстановление базы данных с устройства зависает при нажатии "..."](https://feedback.azure.com/forums/908035/suggestions/34281658/). |
| Общие ошибки SSMS | Исправлена проблема, из-за которой язык по умолчанию для всех имен входа отображался как арабский. </br></br> Дополнительные сведения см. в статье с отзывами пользователей SQL Server. [В SSMS 18.2 язык по умолчанию отображается с ошибкой](https://feedback.azure.com/forums/908035/suggestions/38236363). |
| Общие ошибки SSMS | Исправлена сложность в обнаружении диалогового окна *Параметры запроса* (когда пользователь щелкает правой кнопкой мыши окно редактора T-SQL); его размер теперь можно менять.|
| Общие ошибки SSMS | Сообщение *Время выполнения* в таблице результатов или файле (появилось в SSMS 18.2) теперь можно настроить в разделе "Сервис" > "Параметры" > "Выполнение запросов" > "SQL Server" > "Дополнительно" > "Показать время выполнения". |
| Общие ошибки SSMS | В диалоговом окне подключения поля *Пароль Active Directory* и *Интегрированная проверка Active Directory* заменены на поля *Пароль Azure Active Directory* и *Интегрированная проверка Azure Active Directory* соответственно. |
| Общие ошибки SSMS | Исправлена проблема, из-за которой пользователи не могли использовать SSMS для настройки аудита на управляемых экземплярах SQL Azure, если они были расположены с отрицательным смещением по UTC. |
| Общие ошибки SSMS | Устранена проблема в пользовательском интерфейсе XEvent, когда наведение указателя мыши на сетку приводило к выделению строк. </br></br> Дополнительные сведения см. в статье с отзывами пользователей SQL Server. [В пользовательском интерфейсе расширенных событий SSMS действия выделяются при наведении указателя](https://feedback.azure.com/forums/908035/suggestions/38262124). |
| Импорт неструктурированного файла | Исправлена проблема, из-за которой при импорте неструктурированного файла не импортировались все данные, путем предоставления пользователю возможности выбрать простое или расширенное обнаружение типов данных.</br></br> Дополнительные сведения см. в статье с отзывами пользователей SQL Server. [Импорт неструктурированного файла SSMS не позволяет импортировать все данные](https://feedback.azure.com/forums/908035/suggestions/38096989). |
| Службы Integration Services | Добавьте новый тип операции *StartNonCatalogExecution* для отчета по операциям служб SSIS.|
| Службы Integration Services | Исправлена проблема в конвейерах фабрики данных Azure, создаваемых служебной программой `DTExec` с поддержкой Azure, для использования правильного типа параметра. (явно для 18.3.1) |
| Написание скриптов и SMO | Исправлена проблема, которая приводила к возникновению ошибок SMO при выборке свойств при использовании **SMO.Server.SetDefaultInitFields(true)** .|
| Пользовательский интерфейс хранилища запросов | Устранена проблема, из-за которой ось Y не масштабировалась при выборе метрики *Счетчик выполнений* в представлении *Отслеженный запрос*. |
| Оценка уязвимости | Отключены очистка и утверждение базовых показателей для баз данных SQL Azure.|
#### <a name="known-issues-1831"></a>Известные проблемы (18.3.1)
- Диаграмма базы данных, созданная в среде SSMS, работающей на одном компьютере, не может быть изменена с другого компьютера (это приведет к сбою SSMS). Дополнительные сведения см. в статье [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/37992649).
- При переключении между несколькими окнами запросов возникают проблемы перерисовки. Дополнительные сведения см. в статье [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/37474042). Для решения этой проблемы можно отключить аппаратное ускорение в разделе "Сервис" > "Параметры".
В статье [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035-sql-server) представлены сведения о других известных проблемах. Там же можно отправить отзыв группе разработчиков.
### <a name="182"></a>18.2
![скачать](media/download-icon.png) [Скачать SSMS 18.2](https://go.microsoft.com/fwlink/?linkid=2099720)
- Номер выпуска: 18.2
- Номер сборки: 15.0.18142.0
- Дата выпуска: 25 июля 2019 г.
[Китайский (упрощенное письмо)](https://go.microsoft.com/fwlink/?linkid=2099720&clcid=0x804) | [Китайский (традиционное письмо)](https://go.microsoft.com/fwlink/?linkid=2099720&clcid=0x404) | [Английский (США)](https://go.microsoft.com/fwlink/?linkid=2099720&clcid=0x409) | [Французский](https://go.microsoft.com/fwlink/?linkid=2099720&clcid=0x40c) | [Немецкий](https://go.microsoft.com/fwlink/?linkid=2099720&clcid=0x407) | [Итальянский](https://go.microsoft.com/fwlink/?linkid=2094583&clcid=0x410) | [Японский](https://go.microsoft.com/fwlink/?linkid=2099720&clcid=0x411) | [Корейский](https://go.microsoft.com/fwlink/?linkid=2099720&clcid=0x412) | [Португальский (Бразилия)](https://go.microsoft.com/fwlink/?linkid=2099720&clcid=0x416) | [Русский](https://go.microsoft.com/fwlink/?linkid=2099720&clcid=0x419) | [Испанский](https://go.microsoft.com/fwlink/?linkid=2099720&clcid=0x40a)
#### <a name="whats-new-in-182"></a>Новые возможности версии 18.2
| Добавления | Сведения |
|----------|---------|
| Службы Integration Services (SSIS) | Оптимизация производительности для планировщика пакетов служб SSIS в Azure. |
| Редактор и IntelliSense | Добавлена поддержка классификации данных. |
| OPTIMIZE_FOR_SEQUENTIAL_KEY | Добавлена поддержка IntelliSense. |
| OPTIMIZE_FOR_SEQUENTIAL_KEY | Включение оптимизации в ядре СУБД, что позволяет повысить пропускную способность для операций вставки с высокой степенью параллелизма в индекс. Этот параметр предназначен для индексов с состоянием состязания, возникающим при операциях вставки последней страницы (это характерно для индексов с последовательным ключом, включая столбец идентификаторов, последовательность или столбец даты и времени). См. подробности в разделе [CREATE INDEX](../t-sql/statements/create-index-transact-sql.md#sequential-keys). |
| Выполнение запроса или результаты | Добавлено *Время завершения* в сообщениях для отслеживания завершения запросов. |
| Выполнение запроса или результаты | Разрешено отображение дополнительных данных (результат в тексте) и их сохранение в ячейках (результат в сетке). Теперь SSMS допускает до 2 млн символов для обоих вариантов (начиная с 256 и 64 тыс. соответственно). Это также устраняет проблему, из-за которой пользователи не могут получить более 43 680 символов из ячеек сетки. |
| Инструкция ShowPlan | Добавлен новый атрибут в QueryPlan, когда включена [встроенная скалярная функция UDF](../relational-databases/performance/intelligent-query-processing.md#scalar-udf-inlining) (ContainsInlineScalarTsqlUdfs). |
| SMO | Добавлена поддержка *API Оценки SQL*. Дополнительные сведения см. в разделе [SQL Assessment API](../tools/sql-assessment-api/sql-assessment-api-overview.md). |
| | |
#### <a name="bug-fixes-in-182"></a>Исправления ошибок в выпуске 18.2
| Добавления | Сведения |
|------------|-------|
| Возможности доступа | Пользовательский интерфейс XEvent (сетка) обновлен: нажатие клавиши F3 вызывает сортировку. |
| Всегда включено | Исправлена проблема, из-за которой среда SSMS выдавала ошибку при попытке удаления группы доступности (AG). |
| Всегда включено | Устранена проблема, из-за которой среда SSMS неправильно отображала мастер отработки отказа, если реплики были настроены как синхронные при использовании групп доступности с масштабированием для чтения (тип кластера = NONE). Теперь в SSMS доступен мастер для параметра Force_Failover_Allow_Data_Loss, единственный допустимый для типа доступности кластера "NONE". |
| Всегда включено | Исправлена проблема, при которой мастер ограничивал количество допустимых синхронизаций до трех. |
| Классификация данных | Исправлена проблема, из-за которой в среде SSMS происходила ошибка *Индекс (от нуля) должен быть не меньше нуля* при попытке просмотра отчетов о классификации данных в базах данных с уровнями совместимости менее 150. |
| Общие ошибки SSMS | Исправлена проблема, при которой пользователь не смог перейти на панель результатов с горизонтальной прокруткой с помощью колесика мыши. Дополнительные сведения см. в статье [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/34145641). |
| Общие ошибки SSMS | Обновлен *монитор активности* для игнорирования благоприятных типов ожидания SQLTRACE_WAIT_ENTRIES. |
| Общие ошибки SSMS | Устранена проблема, из-за которой не сохранялись некоторые параметры цвета *("Текстовый редактор" > "Вкладка редактора и строка состояния")* . См. статью [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/37924165).
| Общие ошибки SSMS | В диалоговом окне соединения пункт *Azure Active Directory — универсальная с поддержкой MFA* заменен на *Azure Active Directory — универсальная с MFA* (функциональность аналогична, но, надеемся, суть будет яснее). |
| Общие ошибки SSMS | В среде SSMS теперь используются правильные значения по умолчанию при создании базы данных SQL Azure. |
| Общие ошибки SSMS | Исправлена проблема, из-за которой пользователю не удавалось *запустить PowerShell* из узла в окне [Регистрация серверов](register-servers/register-servers.md), если сервер являлся [контейнером SQL Linux](../linux/quickstart-install-connect-docker.md). |
| Импорт неструктурированного файла | Исправлена проблема, из-за которой *импорт неструктурированного файла* не работал после обновления с SSMS 18.0 до 18.1. См. статью [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/37912636). |
| Импорт неструктурированного файла | Исправлена проблема, из-за которой *мастер импорта неструктурированных файлов сообщает о дублировании или неправильном столбце* в CSV-файле с заголовками с символами Юникода. |
| Обозреватель объектов | Устранена проблема, из-за которой некоторые пункты меню (например, *мастер импорта и экспорта* SQL Server) отсутствовали или были отключены при подключении к SQL Express. Дополнительные сведения см. в статье [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/37500016). |
| Обозреватель объектов | Устранена проблема, из-за которой в среде SSMS происходил сбой при перетаскивании объекта из обозревателя объектов в редактор. Дополнительные сведения см. в статье [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/37887988). |
| Обозреватель объектов | Исправлена проблема, при которой переименование баз данных приводило к тому, что в обозревателе объектов отображались неверные имена баз данных. Дополнительные сведения см. в статье [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/37638472). |
| Обозреватель объектов | Устранена давняя проблема, приводившая к возникновению ошибки при попытке развернуть узел *Таблицы* в обозревателе объектов для базы данных, для которой настроено использование параметров сортировки, не поддерживаемых Windows (пользователь не мог развернуть таблицы). Примером таких параметров сортировки может быть Korean_Wansung_Unicode_CI_AS. |
| [Регистрация серверов](register-servers/register-servers.md) | Исправлена проблема, из-за которой при попытке выполнить запрос к нескольким серверам (в *группе* в разделе "Зарегистрированные серверы"), когда зарегистрированный сервер использовал либо *встроенную проверку Active Directory*, либо *универсальную проверку Azure Active Directory с MFA*, происходил сбой, так как SSMS не удавалось подключиться. |
| [Регистрация серверов](register-servers/register-servers.md) | Исправлена проблема, из-за которой при попытке выполнить запрос к нескольким серверам (в *группе* в разделе "Зарегистрированные серверы"), когда зарегистрированный сервер использует либо *проверку пароля Active Directory*, либо *проверку подлинности SQL* подлинности и пользователь решает не сохранять пароль, происходит сбой SSMS. |
| Отчеты | Исправлена проблема в отчетах об *использовании места на диске*, при которой происходит сбой отчета, когда файлы данных имеют большое количество экстентов. |
| Средства репликации | Исправлена проблема, из-за которой монитор репликации не работал с базой данных издателя в группе доступности и распространителем в группе доступности (ранее была исправлена в SSMS 17.x). |
| Агент SQL | Устранена проблема, из-за которой при добавлении, вставке, изменении или удалении шагов задания фокус переносился в первую строку, а не в активную. Дополнительные сведения см. в статье [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/38070892). |
| Написание скриптов и SMO | Исправлена проблема, из-за которой инструкция *CREATE OR ALTER* не приводила к созданию скриптов для объектов, имеющих расширенные свойства. Дополнительные сведения см. в статье [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035-sql-server/suggestions/37236748). |
| Написание скриптов и SMO | Исправлена проблема, из которой SSMS не удавалось правильно создать скрипт CREATE EXTERNAL LIBRARY. Дополнительные сведения см. в статье [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/37868089). |
| Написание скриптов и SMO | Исправлена проблема, из-за которой при попытке *создать скрипты* для базы данных с несколькими тысячами таблиц диалоговое окно прогресса зависает. |
| Написание скриптов и SMO | Устранена проблема, из-за которой не удавалось создавать скрипты для *внешней таблицы* в SQL 2019. |
| Написание скриптов и SMO | Устранена проблема, из-за которой не удавалось создавать скрипты для *внешнего источника данных* в SQL 2019. Дополнительные сведения см. в статье [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/34295080). |
| Написание скриптов и SMO | Устранена проблема, при которой *расширенные свойства* столбцов не вносились в сценарий при выборе базы данных SQL Azure в качестве целевого объекта. Дополнительные сведения см. на сайте [StackOverflow](https://stackoverflow.com/questions/56952337/how-can-i-script-the-descriptions-of-columns-in-ms-sql-server-management-studio). |
| Написание скриптов и SMO | Вставка на последней странице: SMO — добавление свойства *Index.IsOptimizedForSequentialKey*. |
|**Установка SSMS**| **Устранена ошибка, из-за которой программа установки SSMS ошибочно блокировала установку SSMS, сообщая о несоответствующих языках. Проблема могла возникать в некоторых аномальных ситуациях, например при прерванной установке или неправильном удалении предыдущей версии SSMS. Дополнительные сведения см. в статье [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/37483594/).** |
| Профилировщик XEvent | Исправлена проблема со сбоем при закрытии средства просмотра. |
#### <a name="known-issues-182"></a>Известные проблемы (18.2)
- Диаграмма базы данных, созданная в среде SSMS, работающей на одном компьютере, не может быть изменена с другого компьютера (это приведет к сбою SSMS). Дополнительные сведения см. в статье [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/37992649).
- При переключении между несколькими окнами запросов возникают проблемы перерисовки. См. статью [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/37474042). Для решения этой проблемы можно отключить аппаратное ускорение в разделе **Сервис** > **Параметры**.
- Существует ограничение на размер данных, отображаемых из результатов SSMS в сетке, тексте или файле.
- При удалении базы данных SQL Azure в обозревателе объектов выдается ошибка, хотя на самом деле удаление завершается успешно.
- В качестве языка по умолчанию для имен входа SQL в диалоговом окне "Свойства имени входа" может отображаться арабский независимо от языка по умолчанию, на самом деле заданного для имени входа. Чтобы узнать фактический язык по умолчанию для данного имени входа, используйте T-SQL для получения значения **default_language_name** из представления **master.sys.server_principles**.
### <a name="181"></a>18.1
![скачать](media/download-icon.png) [Скачать SSMS 18.1](https://go.microsoft.com/fwlink/?linkid=2094583)
- Номер выпуска: 18.1
- Номер сборки: 15.0.18131.0
- Дата выпуска: 11 июня 2019 г.
[Китайский (упрощенное письмо)](https://go.microsoft.com/fwlink/?linkid=2094583&clcid=0x804) | [Китайский (традиционное письмо)](https://go.microsoft.com/fwlink/?linkid=2094583&clcid=0x404) | [Английский (США)](https://go.microsoft.com/fwlink/?linkid=2094583&clcid=0x409) | [Французский](https://go.microsoft.com/fwlink/?linkid=2094583&clcid=0x40c) | [Немецкий](https://go.microsoft.com/fwlink/?linkid=2094583&clcid=0x407) | [Итальянский](https://go.microsoft.com/fwlink/?linkid=2094583&clcid=0x410) | [Японский](https://go.microsoft.com/fwlink/?linkid=2094583&clcid=0x411) | [Корейский](https://go.microsoft.com/fwlink/?linkid=2094583&clcid=0x412) | [Португальский (Бразилия)](https://go.microsoft.com/fwlink/?linkid=2094583&clcid=0x416) | [Русский](https://go.microsoft.com/fwlink/?linkid=2094583&clcid=0x419) | [Испанский](https://go.microsoft.com/fwlink/?linkid=2094583&clcid=0x40a)
#### <a name="whats-new-in-181"></a>Новые возможности версии 18.1
| Изменения | Сведения |
| :-------| :------|
| Схемы баз данных | [Схемы баз данных были добавлены обратно в SSMS](https://feedback.azure.com/forums/908035/suggestions/37507828).
| SSBDIAGNOSE.EXE |Программа командной строки для диагностики SQL Server возвращена в пакет SSMS.|
| Службы Integration Services (SSIS) | Поддержка планирования пакета служб SSIS, расположенного в каталоге служб SSIS в Azure или в файловой системе, в Azure. Три записи для запуска диалогового окна "Создание расписания": пункт меню *Новое расписание...* , который отображается, если щелкнуть правой кнопкой мыши пакет MSSQL Integration Services в каталоге служб MSSQL Integration Services в Azure; пункт меню *Планирование выполнения пакета MSSQL Integration Services в Azure* в разделе *Миграция в Azure* меню *Сервис* и "Расписание MSSQL Integration Services в Azure", который отображается, если щелкнуть правой кнопкой мыши папку заданий агента SQL Server из управляемого экземпляра SQL Azure.|
#### <a name="bug-fixes-in-181"></a>Исправления ошибок в выпуске 18.1
| Добавления | Сведения |
|---------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| Возможности доступа | Улучшенная доступность пользовательского интерфейса для задания агента. |'
| Возможности доступа | Улучшены специальные возможности на странице "Монитор Stretch": добавлено доступное имя для кнопки *Автообновление*, а также интеллектуальное доступное имя, которое поможет пользователям не только узнать, какая кнопка выбрана, но и понять, к чему приведет ее нажатие. |
| Интеграция со средой ADS| Устранена вероятность сбоя в среде SSMS при попытке использования зарегистрированных в ADS серверов.|
| Конструктор баз данных | Добавлена поддержка параметров сортировки Latin1_General_100_BIN2_UTF8 (доступны в SQL Server 2019 CTP3.0). |
| Классификация данных | Запрещено добавление меток чувствительности к столбцам в таблице журнала, что не поддерживается. |
| Классификация данных | Устранена проблема, связанная с неправильной обработкой уровней совместимости (между сервером и базой данных). |
| Конструктор баз данных | Добавлена поддержка параметров сортировки Latin1_General_100_BIN2_UTF8 (доступны в SQL2019 CTP3.0). |
| Общие ошибки SSMS | Устранена проблема с неправильным созданием сценариев для псевдостолбцов в индексе. |
| Общие ошибки SSMS | Устранена проблема на странице "Свойства входа", из-за которой при выборе кнопки *Добавить учетные данные* кнопки могло появиться исключение "Пустая ссылка". |
| Общие ошибки SSMS | Исправлено отображение размера денежного столбца на странице свойств индекса. |
| Общие ошибки SSMS | Исправлена проблема, когда среда SSMS не учитывает параметры Intellisense из меню *Сервис — Параметры* в окне редактора SQL. |
| Общие ошибки SSMS | Устранена проблема, из-за которой среда SSMS не учитывала параметры справки (автономный режим и Интернет). |
| Высокое разрешение | Фиксированный макет элементов управления в диалоговых окнах ошибок для неподдерживаемых параметров запроса. |
| Высокое разрешение | Исправлен макет элементов управления на странице *Новая группа доступности*, который используется в некоторых локализованных версиях SSMS. |
| Высокое разрешение | Фиксированный макет страницы *Создание расписания задания*. Дополнительные сведения см. в статье [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/37632094). |
| Импорт неструктурированного файла | Устранена проблема, из-за которой строки могли быть незаметно потеряны во время импорта.|
| Редактор и IntelliSense | Сокращен трафик запросов на основе SMO к базе данных SQL Azure для IntelliSense. |
| Редактор и IntelliSense | Исправлена грамматическая ошибка в подсказке, отображаемой при вводе команды T-SQL для создания записи пользователя. Кроме того, исправлено сообщение об ошибке для устранения неоднозначности между пользователями и именами входа. |
| Средство просмотра журнала | Устранена проблема, из-за которой в SSMS всегда открывался журнал текущего сервера (или агента), даже если дважды щелкнуть старый архив в обозревателе объектов. Дополнительные сведения см. в статье [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/37633648). |
| Установка SSMS | Исправлена проблема, которая вызывала ошибку программы установки SSMS, если путь к журналу установки содержит пробелы. Дополнительные сведения см. в статье [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/37496110). |
| Установка SSMS | Устранена проблема, когда происходил выход из SSMS сразу после отображения экране-заставки. </br> Дополнительные сведения см. на сайтах: [Отзывы пользователей SQL Server ](https://feedback.azure.com/forums/908035/suggestions/37502512), [SSMS отказывается запускаться](https://dba.stackexchange.com/questions/238609/ssms-refuses-to-start) и [Администраторы баз данных](https://dba.stackexchange.com/questions/237086/sql-server-management-studio-18-wont-open-only-splash-screen-pops-up). |
| Обозреватель объектов | Снято ограничение на включение *запуска PowerShell* при подключении к SQL в Linux. |
| Обозреватель объектов | Исправлена проблема, которая приводила к сбою SSMS при попытке развернуть узел "Группа горизонтального увеличения масштаба PolyBase" (если есть подключение к вычислительному узлу). |
| Обозреватель объектов | Исправлена проблема, при которой *отключенный* пункт меню оставался включен даже после отключения заданного индекса. Дополнительные сведения см. в статье [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/37735375). |
| Отчеты | Исправление отчетов выводит GrantedQueryMemory в КБ (отчет панели мониторинга производительности SQL). Дополнительные сведения см. в статье [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/37167289). |
| Отчеты | Улучшенная трассировка блока журнала в сценариях Always On. |
| Инструкция ShowPlan | Добавлен новый элемент showplan *SpillOccurred* для схемы showplan. |
| Инструкция ShowPlan | Добавлены удаленные операции чтения (*ActualPageServerReads*, *ActualPageServerReadAheads*, *ActualLobPageServerReads*, *ActualLobPageServerReadAheads*) для схемы showplan. |
| Написание скриптов и SMO | Избегайте запрашивать ограничения границ при создании скриптов для неграфовых таблиц. |
| Написание скриптов и SMO | Снято ограничение классификации конфиденциальности при создании скриптов столбцов с *Классификацией данных*. |
| Написание скриптов и SMO | Устранена проблема, из-за которой команда "Создать сценарий" в графовой таблице вызывала сбой при создании данных. Дополнительные сведения см. в статье [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035-sql-server/suggestions/32898466). |
| Написание скриптов и SMO | Устранена проблема, из-за которой метод EnumObjects() не получал имя схемы для синонима. |
| Написание скриптов и SMO | Устранена проблема в UIConnectionInfo.LoadFromStream(), когда не считывался раздел *AdvancedOptions*, если не был указан пароль. |
| Агент SQL | Исправлена проблема, которая вызывала аварийное завершение SSMS при работе с окном "Свойства задания". Дополнительные сведения см. в статье [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/37164244). |
| Агент SQL | Исправлена проблема, когда кнопка "Просмотреть" в окне *Свойства шага задания* была не всегда включена, что мешало просмотреть вывод шага задания. |
| Пользовательский интерфейс XEvent | Добавлен столбец "Пакет" в списке XEvents для различения событий с одинаковыми именами. |
| Пользовательский интерфейс XEvent | В XEventUI добавлено отсутствующее сопоставление типа класса "ВНЕШНЯЯ БИБЛИОТЕКА". |
#### <a name="known-issues-181"></a>Известные проблемы (18.1)
- При перетаскивании объекта таблицы из обозревателя объектов в редактор запросов может отображаться сообщение об ошибке. Нам известно об этой проблеме, и планируем устранить ее в следующем выпуске.
- После закрытия SSMS 18.1 параметры цвета *Групповые соединения* и *Соединения с одиночным сервером* в разделе "Параметры" -> "Текстовый редактор" -> "Вкладка редактора и строка состояния" -> "Макет и цвета строки состояния" не сохраняются. После повторного открытия SSMS параметры раздела "Макет и цвета строки состояния" возвращаются к значениям по умолчанию (белый цвет).
- Существует ограничение на размер данных, отображаемых из результатов SSMS в сетке, тексте или файле.
- Диаграмма базы данных, созданная в среде SSMS, работающей на одном компьютере, не может быть изменена с другого компьютера (это приведет к сбою SSMS). Дополнительные сведения см. в статье [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/37992649).
### <a name="180"></a>18.0
![скачать](media/download-icon.png) [Скачать SSMS 18.0](https://go.microsoft.com/fwlink/?linkid=2088649)
- Номер выпуска: 18.0
- Номер сборки: 15.0.18118.0
- Дата выпуска: 24 апреля 2019 г.
[Китайский (упрощенное письмо)](https://go.microsoft.com/fwlink/?linkid=2088649&clcid=0x804)| [Китайский (традиционное письмо)](https://go.microsoft.com/fwlink/?linkid=2088649&clcid=0x404)| [Английский (США)](https://go.microsoft.com/fwlink/?linkid=2088649&clcid=0x409)| [Французский](https://go.microsoft.com/fwlink/?linkid=2088649&clcid=0x40c)| [Немецкий](https://go.microsoft.com/fwlink/?linkid=2088649&clcid=0x407)| [Итальянский](https://go.microsoft.com/fwlink/?linkid=2088649&clcid=0x410)| [Японский](https://go.microsoft.com/fwlink/?linkid=2088649&clcid=0x411)| [Корейский](https://go.microsoft.com/fwlink/?linkid=2088649&clcid=0x412)| [Португальский (Бразилия)](https://go.microsoft.com/fwlink/?linkid=2088649&clcid=0x416)| [Русский](https://go.microsoft.com/fwlink/?linkid=2088649&clcid=0x419)| [Испанский](https://go.microsoft.com/fwlink/?linkid=2088649&clcid=0x40a)
#### <a name="whats-new-in-180"></a>Новые возможности версии 18.0
| Изменения| Сведения|
| :-------| :------|
|Поддержка для SQL Server 2019|Это первый выпуск SSMS, который полностью *сочетается* с SQL Server 2019 (compatLevel 150).|
|Поддержка для SQL Server 2019|Поддержка "BATCH_STARTED_GROUP" и "BATCH_COMPLETED_GROUP" в SQL Server 2019 и управляемом экземпляре базы данных SQL.|
|Поддержка для SQL Server 2019|SMO: Добавлена поддержка SMO для встраивания определяемых пользователем функций.|
|Поддержка для SQL Server 2019|GraphDB: Добавление флага в showplan для последовательности Graph TC.|
|Поддержка для SQL Server 2019|Always Encrypted: добавлена поддержка для AEv2 и Enclave.|
|Поддержка для SQL Server 2019|Always Encrypted: диалоговое окно соединения имеет новую вкладку "Always Encrypted", когда пользователь нажимает кнопку "Параметры", чтобы включить и настроить поддержку анклава.|
|Более компактный файл SSMS для скачивания.| Текущий размер — примерно 500 МБ, около половины от размера пакета SSMS 17.x.
|SSMS работает на основе изолированной оболочки Visual Studio 2017|Новая оболочка (среда SSMS работает на основе Visual Studio 2017 15.9.11) включает все исправления специальных возможностей, внесенные в SSMS и Visual Studio, а также все новейшие исправления безопасности.|
|Улучшения специальных возможностей SSMS| Мы проделали большую работу, чтобы устранить проблемы со специальными возможностями во всех инструментах (SSMS, DTA и Profiler).|
|Теперь SSMS можно установить в пользовательской папке| Этот параметр доступен из командной строки (удобно для автоматической установки) и пользовательского интерфейса установки. Передайте этот дополнительный аргумент программе SSMS-Setup-ENU.exe: SSMSInstallRoot=C:\MySSMS18 Новое расположение установки SSMS по умолчанию: %ProgramFiles(x86)%\Microsoft SQL Server Management Studio 18\Common7\IDE\ssms.exe. Это не означает, что SSMS имеет несколько экземпляров.|
|SSMS допускает установку на языке, отличном от языка операционной системы|Блокировка разных языков установки снята. Например, немецкий SSMS можно установить на французскую версию Windows. Если язык операционной системы не соответствует языку SSMS, пользователю следует изменить язык в разделе **Сервис** > **Параметры** > **Международные настройки**; в противном случае SSMS будет отображать интерфейс пользователя на английском языке.|
|SSMS больше не использует компоненты совместно с ядром SQL|Были приняты значительные меры, чтобы избежать совместного использования компонентов с ядром SQL, что часто приводило к проблемам с обслуживанием, так как при установке одного решения перезаписывались файлы другого, и наоборот.|
|SSMS требует NetFx 4.7.2 или более поздней версии|Мы обновили минимальное требование с NetFx4.6.1 до NetFx4.7.2. Теперь можно воспользоваться преимуществами новых функциональных возможностей, предоставляемых этой платформой.|
|Возможность переноса параметров SSMS| При запуске SSMS 18 в первый раз пользователю будет предложено перенести параметры из версии 17.x. Файлы настроек пользователя теперь хранятся в виде обычного XML-файла, улучшая мобильность и допуская редактирование.|
|Поддержка высокого разрешения экрана| Поддержка высокого разрешения включена по умолчанию.|
|SSMS поставляется вместе с драйвером Microsoft OLE DB| См. подробности в разделе [Где скачать драйвер Microsoft OLE DB для SQL Server](../connect/oledb/download-oledb-driver-for-sql-server.md).|
|SSMS не поддерживается в Windows 8. Требуется Windows 10 и Windows Server 2016 версии 1607 (10.0.14393) или более поздней|Из-за новой зависимости от NetFx 4.7.2 SSMS 18.0 не устанавливается на Windows 8, более старых версиях Windows 10 и Windows Server 2016. Программа установки SSMS блокирует эти системы. Windows 8.1 по-прежнему поддерживается.|
|Больше SSMS не добавляется в переменную среды PATH|Путь к SSMS.EXE (и средствам в целом) больше не добавляется в общий путь. Пользователи могут добавить его самостоятельно или, в современной версии Windows, использовать меню "Пуск".|
|Идентификаторы пакетов больше не нужны для разработки расширений SSMS| Раньше SSMS выборочно загружала только хорошо известные пакеты, поэтому разработчикам приходилось регистрировать собственные пакеты. Это больше не требуется.|
|Общие ошибки SSMS|Предоставление параметра конфигурации AUTOGROW_ALL_FILES для файловых групп в SSMS.|
|Общие ошибки SSMS|Из графического пользовательского интерфейса SSMS удалены рискованные параметры "использование упрощенных пулов" и "повышение приоритета". Дополнительные сведения см. на странице [сведений о повышении приоритета и его недостатках](https://deep.data.blog/2010/01/26/priority-boost-details-and-why-its-not-recommended/).
|Общие ошибки SSMS|Новые меню и настраиваемые сочетания клавиш для создания файлов: **CTRL+ALT+N**. Сочетание **CTRL+N** по-прежнему создает новый запрос.|
|Общие ошибки SSMS|Диалоговое окно **Новое правило брандмауэра** теперь позволяет пользователю указать имя правила вместо автоматически созданного от лица этого пользователя имени.|
|Общие ошибки SSMS|Усовершенствована функция IntelliSense в редакторе, особенно для T-SQL версии 140 и выше.|
|Общие ошибки SSMS|В пользовательском интерфейсе SSMS добавлена поддержка UTF-8 в диалоговом окне параметров сортировки.|
|Общие ошибки SSMS|Переход на диспетчер учетных данных Windows для паролей MRU в диалоговом окне соединения. Это решает давнюю проблему с ненадежностью сохранения паролей.|
|Общие ошибки SSMS|Улучшена поддержка в системах с несколькими мониторами, которая гарантирует, что дополнительные диалоговые и всплывающие окна будут появляться на нужном мониторе.|
|Общие ошибки SSMS|Предоставлена конфигурация сервера "контрольная сумма резервной копии по умолчанию" на странице параметров базы данных в диалоговом окне "Свойства сервера". Дополнительные сведения см. в разделе [https://feedback.azure.com/forums/08035-sql-server/suggestions/34634974](https://feedback.azure.com/forums/08035-sql-server/suggestions/34634974).|
|Общие ошибки SSMS|Предоставлен параметр "Максимальный размер файлов журнала ошибок" в разделе "Настройка журналов ошибок SQL Server". Дополнительные сведения см. в разделе [https://feedback.azure.com/forums/908035/suggestions/33624115](https://feedback.azure.com/forums/908035/suggestions/33624115).|
|Общие ошибки SSMS|Добавлен пункт "Миграция в Azure" в меню "Сервис" — мы интегрировали помощник по миграции баз данных и службу Azure Database Migration Service, чтобы предоставить быстрый и удобный доступ для ускорения миграции в Azure.|
|Общие ошибки SSMS|Добавлена логика, предлагающая пользователю зафиксировать открытые транзакции при использовании функции "Изменить подключение".|
|Интеграция с Azure Data Studio|Добавлен пункт меню для запуска или скачивания Azure Data Studio.|
|Интеграция с Azure Data Studio|В обозреватель объектов добавлен пункт меню "Запуск Azure Data Studio".|
|Интеграция с Azure Data Studio|При щелчке правой кнопкой мыши узла базы данных в обозревателе объектов пользователь видит контекстные меню для выполнения запроса или создания записной книжки в Azure Data Studio.|
|Поддержка Azure SQL| Свойства базы данных SLO/Edition/MaxSize теперь принимают пользовательские имена, что облегчает поддержку будущих выпусков базы данных SQL Azure.|
|Поддержка Azure SQL| Добавлена поддержка для номеров SKU виртуальных ядер ("Общего назначения" и "Критически важный для бизнеса"): Gen4_24 и все Gen5.|
|Управляемый экземпляр SQL Azure|Добавлены новые "имена входа Azure AD" как новый тип входа в SMO и SSMS при подключении к управляемым экземплярам SQL Azure.|
|Всегда включено|Повторное хэширование RTO (предполагаемое время восстановления) и RPO (предполагаемая потеря данных) на панели мониторинга SSMS Always On. См. обновленную документацию в [https://docs.microsoft.com/sql/database-engine/availability-groups/windows/monitor-performance-for-always-on-availability-groups](../database-engine/availability-groups/windows/monitor-performance-for-always-on-availability-groups.md).|
|Always Encrypted| Теперь флажок "Включить Always Encrypted" на новой вкладке "Always Encrypted" в диалоговом окне "Соединение с сервером" позволяет легко включить или отключить шифрование Always Encrypted для подключения к базе данных.|
|Always Encrypted с безопасными анклавами.| Добавлено несколько улучшений поддержки Always Encrypted с безопасными анклавами в SQL Server 2019. Текстовое поле для указания URL-адреса аттестации анклава в диалоговом окне подключения к серверу (новая вкладка Always Encrypted). Новый флажок в диалоговом окне "Новый главный ключ столбца" для указания, будет ли новый главный ключ столбца разрешать вычисления анклава. Другие диалоговые окна управления ключами Always Encrypted теперь предоставляют сведения, в каких главных ключах столбца разрешены вычисления анклава.|
|Файлы аудита|Изменен метод проверки подлинности с ключа учетной записи хранения на проверку подлинности на основе Azure AD.|
|Классификация данных| Переупорядочено меню задач классификации данных: добавлено подменю в меню задач базы данных, а также добавлена возможность открыть отчет из меню без предварительного открытия окна классификации данных.|
|Классификация данных|Добавлен новый компонент "Классификация данных" в SMO. Объект столбца теперь предоставляет новые свойства: SensitivityLabelName, SensitivityLabelId, SensitivityInformationTypeName, SensitivityInformationTypeId и IsClassified (только для чтения). См. подробности в разделе [ADD SENSITIVITY CLASSIFICATION (Transact-SQL)](../t-sql/statements/add-sensitivity-classification-transact-sql.md)|
|Классификация данных|Добавлен пункт "Классификационный отчет" в меню "Классификация данных".|
|Классификация данных| Обновлены рекомендации.|
|Повышение уровня совместимости базы данных|Добавлен новый параметр в разделе **_Имя базы данных_ *_ > _* _Задачи_ *_ > _* _Обновление базы данных_ *_. Он запускает новый _* помощник по настройке запросов (QTA)** , который помогает пользователям выполнять следующие действия: сбор базовых показателей производительности перед обновлением уровня совместимости базы данных; переход на требуемый уровень совместимости базы данных; второй этап сбора данных о производительности для той же нагрузки; обнаружение регрессии рабочих нагрузок и предоставление проверенных рекомендаций по повышению их производительности. Это похоже на процесс обновления базы данных, описанный в разделе [Сценарии использования хранилища запросов](../relational-databases/performance/query-store-usage-scenarios.md#CEUpgrade), кроме последнего шага — помощник по обновлению не опирается на последнее известное рабочее состояние при выдаче рекомендаций.|
|Мастер приложений уровня данных|Добавлена поддержка импорта и экспорта приложения уровня данных с графовыми таблицами.|
|Мастер импорта неструктурированных файлов|Добавлена логика для уведомления пользователя о том, что импорт мог вызвать переименование столбцов.|
|Службы Integration Services (SSIS)|Добавлена поддержка функций, позволяющих клиентам планировать запуск пакетов SSIS в средах Azure-SSIS IR облака Azure для государственных организаций.|
|Службы Integration Services (SSIS)|При использовании агента SQL управляемого экземпляра SQL Azure через SSMS вы можете настроить диспетчер подключений и параметров на этапе задания агента SSIS.|
|Службы Integration Services (SSIS)|При подключении к базе данных SQL Azure или управляемому экземпляру Azure SQL можно подключиться к *default* как к исходной базе данных.|
|Службы Integration Services (SSIS)|Добавлен новый элемент **Попробуйте службы SSIS в фабрике данных Azure** в узле "Каталоги служб Integration Services", который можно использовать для запуска мастера создания среды выполнения интеграции и быстрого создания среды выполнения интеграции Azure-SSIS.
|Службы Integration Services (SSIS)|Добавлена кнопка **Создать среду выполнения интеграции MSSQL Integration Services** в мастере создания каталога, которую можно использовать для запуска мастера создания среды выполнения интеграции и быстрого создания среды выполнения интеграции Azure-MSSQL Integration Services.|
|Службы Integration Services (SSIS)|Теперь ISDeploymentWizard поддерживает проверку подлинности SQL, встроенную проверку подлинности Azure Active Directory и проверку пароля Azure Active Directory в режиме командной строки.|
|Службы Integration Services (SSIS)|Мастер развертывания теперь поддерживает создание и развертывание для среды выполнения интеграции SSIS в фабрике данных Azure.|
|Скрипты объектов|Добавлены новые элементы меню для CREATE OR ALTER при написании скриптов объектов.|
|Хранилище запросов|Повышена удобочитаемость некоторых отчетов (общее потребление ресурсов) путем добавления разделителя тысяч для чисел, отображаемых на оси Y диаграмм.|
|Хранилище запросов|Добавлен новый отчет "Статистика ожидания запросов".|
|Хранилище запросов|Добавлена метрика "Число выполнений" в представлении "Отслеживаемый запрос".|
|Средства репликации|Добавлена поддержка указания нестандартных портов в мониторе репликации и SSMS.|
|Инструкция ShowPlan|Добавлено фактическое истекшее время, фактическое и предполагаемое количество строк в узле оператора ShowPlan, если они доступны. Благодаря этому изменению фактический план согласуется с планом статистики активных запросов.|
|Инструкция ShowPlan|Изменены подсказки и добавлен комментарий при нажатии на кнопку "Изменить запрос" в ShowPlan, чтобы уведомить пользователя, что ShowPlan может быть усечен ядром SQL, если запрос содержит более 4000 символов.|
|Инструкция ShowPlan|Добавлена логика для отображения оператора Materializer (внешний выбор).|
|Инструкция ShowPlan|Добавлен новый атрибут showplan BatchModeOnRowStoreUsed для быстрой идентификации запросов, использующих функцию пакетного сканирования rowstore. Каждый раз, когда запрос выполняет пакетное сканирование rowstore, новый атрибут (BatchModeOnRowStoreUsed="true") добавляется к элементу StmtSimple.|
|Инструкция ShowPlan|Добавлена поддержка инструкции Showplan для LocalCube RelOp для DW ROLLUP и CUBE.|
|Инструкция ShowPlan|Новый оператор LocalCube для новой агрегатной функции ROLLUP и CUBE в Azure Synapse Analytics.|
|SMO| Расширение поддержки SMO для создания возобновляемого индекса.|
|SMO| Добавлено новое событие для объектов SMO (PropertyMissing), чтобы разработчикам приложений было проще обнаружить проблемы с производительностью SMO.|
|SMO| Доступно новое свойство DefaultBackupChecksum в объекте конфигурации, которое сопоставляется с конфигурацией сервера "backup checksum default".|
|SMO| Предоставлено новое свойство ProductUpdateLevel для объекта Server, которое соответствует уровню обслуживания для используемой версии SQL (например, CU12, RTM и т. д.).|
|SMO| Предоставлено новое свойство LastGoodCheckDbTime для объекта Database, которое соответствует свойству базы данных lastgoodcheckdbtime. Если такое свойство недоступно, возвращается значение по умолчанию 1/1/1900 12:00:00.|
|SMO|Расположение файла RegSrvr.xml (файл конфигурации зарегистрированного сервера) изменено на "%AppData%\Microsoft\SQL Server Management Studio" (без версии, поэтому его можно совместно использовать для разных версий SSMS)|
|SMO|Добавлено облако-свидетель — новый тип кворума и ресурса.|
|SMO|Добавлена поддержка "ограничений ребер" в SMO и SSMS.|
|SMO|Добавлена поддержка каскадного удаления для пограничных ограничений в SMO и SSMS.|
|SMO|Добавлена поддержка разрешений на чтение и запись для классификации данных.|
|Оценка уязвимости| Включено меню задач оценки уязвимостей для хранилища данных SQL Azure.|
|Оценка уязвимости|Изменен набор правил оценки уязвимостей, которые выполняются на управляемом экземпляре SQL Azure, чтобы результаты оценки уязвимостей могли быть согласованы с базой данных SQL Azure.|
|Оценка уязвимости| Оценка уязвимостей теперь поддерживает хранилище данных SQL Azure.|
|Оценка уязвимости|Добавлена новая возможность экспорта результатов сканирования для оценки уязвимостей в Excel.|
|Средство просмотра XEvent|В средство просмотра XEvent в окне показа планов можно вывести дополнительные XEvents.|
#### <a name="bug-fixes-in-180"></a>Исправления ошибок в выпуске 18.0
| Изменения | Сведения|
|----------|--------|
|Сбои и зависания|Исправлен источник распространенных сбоев SSMS, связанный с объектами интерфейса графических устройств.|
|Сбои и зависания|Исправлен частый источник зависаний и снижения производительности при выборе "Скрипт как создать/изменить/удалить" (удалены ненужные операции принесения объектов SMO).|
|Сбои и зависания|Исправлено зависание системы при подключении к базе данных SQL Azure с помощью многофакторной проверки подлинности, если включены трассировки ADAL.|
|Сбои и зависания|Исправлено зависание системы (или предполагаемое зависание) в динамической статистике запросов при вызове из монитора активности (проблема проявлялась при использовании проверки подлинности SQL Server без заданного параметра "Конфиденциальные данные").|
|Сбои и зависания|Устранено зависание системы при выборе "Отчеты" в обозревателе объектов, которое проявлялось в больших задержках при подключении или временной недоступности ресурсов.|
|Сбои и зависания|Исправлено аварийное завершение работы SSMS, которое происходило при попытке использовать центральный сервер управления и серверы SQL Azure. Дополнительные сведения: [Ошибка приложения SSMS 17.5 и аварийное завершение при использовании центрального сервера управления](https://feedback.azure.com/forums/908035/suggestions/33374884) (на английском языке).|
|Сбои и зависания|Исправлено зависание системы в обозревателе объектов за счет оптимизации получения свойства IsFullTextEnabled.|
|Сбои и зависания|Исправлено зависание системы в мастере копирования баз данных за счет отказа от создания ненужных запросов для получения свойств базы данных.|
|Сбои и зависания|Устранена проблема, из-за которой решение SSMS зависает или дает сбой во время редактирования T-SQL.|
|Сбои и зависания|Устранена проблема, где SSMS зависает при редактировании больших сценариев T-SQL.|
|Сбои и зависания|Устранена проблема, которая приводила к нехватке памяти для SSMS при обработке больших наборов данных, возвращаемых запросами.|
|Общие ошибки SSMS|Исправлена проблема, когда ApplicationIntent не передавался при подключении в разделе "Зарегистрированные серверы".|
|Общие ошибки SSMS|Устранена проблема, из-за которой форма пользовательского интерфейса мастера создания сеанса XEvent неправильно отображалась на мониторах с высоким разрешением.|
|Общие ошибки SSMS|Исправлена проблема при попытке импортировать BACPAC-файл.|
|Общие ошибки SSMS|Устранена проблема, из-за которой при попытке отобразить свойства базы данных с FILEGROWTH > 2048GB возникала ошибка арифметического переполнения.|
|Общие ошибки SSMS|Устранена проблема, из-за которой в отчете панели мониторинга производительности указывались ожидания PAGELATCH и PAGEIOLATCH, которые отсутствовали во вложенных отчетах.|
|Общие ошибки SSMS|Очередной цикл обновлений, чтобы гарантировать, что SSMS будет учитывать ситуацию запуска на нескольких мониторах и открывать диалоговое окно на нужном мониторе.|
|Службы Analysis Services|Устранена проблема, при которой обрезались "Расширенные параметры" в пользовательском интерфейсе XEvent AS.|
|Службы Analysis Services|Устранена проблема с выдачей исключения "Файл не найден" при анализе DAX.|
|База данных SQL Azure|Устранена проблема, при которой список баз данных некорректно заполнялся для окна запроса базы данных SQL Azure при подключении к базе данных пользователя в базе данных SQL Azure вместо базы данных master.|
|База данных SQL Azure|Устранена проблема, из-за которой невозможно было добавить темпоральную таблицу в базу данных SQL Azure.|
|База данных SQL Azure|Включен параметр в подменю "Свойства статистики" меню "Статистика" в Azure, так как он полностью поддерживается уже довольно длительное время.|
|Общая поддержка SQL Azure|Исправлены ошибки в элементах управления пользовательского интерфейса Azure, которые мешали пользователю вывести список подписок Azure (если их было более 50). Кроме того, изменена сортировка. Теперь подписки сортируются по имени, а не по идентификатору. Пользователь сталкивался с этим, например, при попытке восстановить резервную копию по URL-адресу.|
|Общая поддержка SQL Azure|Устранена проблема в элементе управления пользовательского интерфейса Azure, связанная с перечислением подписок, при которой возникала ошибка "Индекс вне допустимого диапазона. Должен быть неотрицательным и меньше, чем размер коллекции", если у пользователя не было подписок в некоторых клиентах. Пользователь сталкивался с этим, например, при попытке восстановить резервную копию по URL-адресу.|
|Общая поддержка SQL Azure|Устранена проблема с указанием целей уровня обслуживания в коде, которая усложняла поддержку новых целей уровня обслуживания SQL Azure в SSMS. Теперь пользователь может войти в Azure и разрешить SSMS извлечь все соответствующие данные по целям уровня обслуживания (выпуск и максимальный размер).|
|Поддержка Управляемого экземпляра SQL Azure|Улучшена и усовершенствована поддержка управляемых экземпляров: отключены неподдерживаемые параметры в пользовательском интерфейсе и исправлена опция просмотра журналов аудита для обработки URL-адреса целевого объекта аудита.|
|Поддержка Управляемого экземпляра SQL Azure|Скрипты мастера создания и публикации скриптов не поддерживают предложения CREATE DATABASE.|
|Поддержка Управляемого экземпляра SQL Azure|Можно включить динамическую статистику запросов для управляемых экземпляров.|
|Поддержка Управляемого экземпляра SQL Azure|Раздел "Свойства базы данных -> Файлы" неправильно создавал скрипты для ALTER DB ADD FILE.|
|Поддержка Управляемого экземпляра SQL Azure|Исправлена регрессия с планировщиком агента SQL, где планирование ONIDLE выбиралось даже при выборе другого типа планирования.|
|Поддержка Управляемого экземпляра SQL Azure|Настройка MAXTRANSFERRATE, MAXBLOCKSIZE для резервного копирования в службе хранилища Azure.|
|Поддержка Управляемого экземпляра SQL Azure|Проблема, при которой резервная копия заключительного фрагмента журнала записывалась в скрипт перед выполнением операции RESTORE (не поддерживается в командной строке).|
|Поддержка Управляемого экземпляра SQL Azure|Мастер создания базы данных неверно записывал в скрипт инструкцию CREATE DATABASE.|
|Поддержка Управляемого экземпляра SQL Azure|Специальная обработка пакетов MSSQL Integration Services в среде SSMS при подключении к управляемым экземплярам.|
|Поддержка Управляемого экземпляра SQL Azure|Устранена проблема, из-за которой отображалась ошибка при попытке использовать монитор активности при подключении к управляемым экземплярам.|
|Поддержка Управляемого экземпляра SQL Azure|Улучшена поддержка учетных данных Azure AD (в обозревателе SSMS).|
|Поддержка Управляемого экземпляра SQL Azure|Улучшено написание скриптов для объектов файловых групп SMO.|
|Поддержка Управляемого экземпляра SQL Azure|Улучшен пользовательский интерфейс для учетных данных.|
|Поддержка Управляемого экземпляра SQL Azure|Добавлена поддержка логической репликации.|
|Поддержка Управляемого экземпляра SQL Azure|Устранена проблема, которая вызывала сбой при щелчке правой кнопкой мыши по базе данных и выборе команды "Импорт приложения уровня данных".|
|Поддержка Управляемого экземпляра SQL Azure|Устранена проблема, которая вызывала появление ошибок при щелчке правой кнопкой мыши по TempDB.|
|Поддержка Управляемого экземпляра SQL Azure|Устранена проблема при создании скрипта инструкции ALTER DB ADD FILE в объектах SMO, из-за которой созданный скрипт T-SQL мог быть пустым.|
|Поддержка Управляемого экземпляра SQL Azure|Улучшено отображение свойств, относящихся к серверу управляемых экземпляров (поколение оборудования, уровень служб, используемое и зарезервированное хранилище).|
|Поддержка Управляемого экземпляра SQL Azure|Устранена проблема, при которой создание скриптов базы данных ("Сценарий как CREATE...") не приводило к добавлению в скрипт дополнительных файловых групп и файлов. Дополнительные сведения см. в разделе [https://feedback.azure.com/forums/908035/suggestions/37326799](https://feedback.azure.com/forums/908035/suggestions/37326799). |
|Резервное копирование, восстановление, присоединение и отсоединение базы данных|Устранена проблема, при которой пользователю не удавалось присоединить базу данных, если имя физического MDF-файла не совпадало с исходным именем файла.|
|Резервное копирование, восстановление, присоединение и отсоединение базы данных|Устранена проблема, из-за которой среда SSMS не находила допустимый план восстановления или находила неоптимальный. Дополнительные сведения см. в разделе [https://feedback.azure.com/forums/908035-sql-server/suggestions/32897752](https://feedback.azure.com/forums/908035-sql-server/suggestions/32897752). |
|Резервное копирование, восстановление, присоединение и отсоединение базы данных|Устранена проблема, когда в мастере подключения баз данных не отображались переименованные вторичные файлы. Теперь файл отображается с комментарием (например, "Не найдено"). Дополнительные сведения см. в разделе [https://feedback.azure.com/forums/908035/suggestions/32897434](https://feedback.azure.com/forums/908035/suggestions/32897434). |
|Мастер копирования баз данных|Когда мастер создания скриптов, переноса или копирования базы данных мастер пытается создать таблицу в таблице в памяти, это не приводит к принудительному включению ansi_padding.|
|Мастер копирования баз данных|В SQL Server 2017 и SQL Server 2019 мастер создания скриптов, переноса или копирования базы данных работает неправильно.|""
|Мастер копирования баз данных|Таблица скрипта мастера создания скриптов, переноса или копирования базы данных создается до создания связанного внешнего источника данных.|
|Диалоговое окно подключения|Включено удаление имен пользователей из предыдущего списка имен пользователей с помощью клавиши DEL. Дополнительные сведения см. в разделе [Разрешить удаление пользователей из окна входа в систему SSMS ](https://feedback.azure.com/forums/908035/suggestions/32897632).|
|Мастер импорта приложений уровня данных|Устранена проблема, когда мастер импорта приложений уровня данных не работал при подключении с помощью Azure Active Directory (Azure AD).|
|Классификация данных|Исправлена проблема с сохранением классификаций на панели классификации данных, когда имеются другие открытые панели классификации данных в других базах данных.|
|Мастер приложений уровня данных|Устранена проблема, из-за которой пользователю не удавалось импортировать приложение уровня данных (.dacpac) вследствие ограниченного доступа к серверу (например, при отсутствии доступа ко всем базам данных на сервере).|
|Мастер приложений уровня данных|Устранена проблема, из-за которой импорт выполнялся крайне медленно, когда на одном сервере SQL Azure было размещено много баз данных.|
|Внешние таблицы|Добавлена поддержка Rejected_Row_Location в шаблон, SMO, IntelliSense и таблицы свойств.|
|Мастер импорта неструктурированных файлов|Устранена проблема, при которой мастер импорта неструктурированных файлов некорректно обрабатывал двойные кавычки (экранирование). Дополнительные сведения см. в разделе [https://feedback.azure.com/forums/908035/suggestions/32897998](https://feedback.azure.com/forums/908035/suggestions/32897998). |
|Мастер импорта неструктурированных файлов|Исправлена проблема, связанная с неправильной обработкой типов с плавающей запятой (в языковых стандартах, которые используют другой разделитель для чисел с плавающей запятой).|
|Мастер импорта неструктурированных файлов|Исправлена проблема, связанная с импортом битов, если значения равны 0 или 1. Дополнительные сведения см. в разделе [https://feedback.azure.com/forums/908035-sql-server/suggestions/32898535](https://feedback.azure.com/forums/908035-sql-server/suggestions/32898535). |
|Мастер импорта неструктурированных файлов|Устранена проблема, из-за которой *числа с плавающей точкой* вводились как значения *NULL*.|
|Мастер импорта неструктурированных файлов|Устранена проблема, при которой мастер импорта не мог обрабатывать отрицательные десятичные значения.|
|Мастер импорта неструктурированных файлов|Устранена проблема, когда мастеру не удавалось импортировать данные из CSV-файлов с одним столбцом.|
|Мастер импорта неструктурированных файлов|Исправлена проблема, из-за которой функция импорта неструктурированного файла не позволяла изменить целевую таблицу, если она уже существовала. Дополнительные сведения см. в разделе [https://feedback.azure.com/forums/908035-sql-server/suggestions/32896186](https://feedback.azure.com/forums/908035-sql-server/suggestions/32896186). |
|Окно справки|Улучшена логика, учитывающая режимы работы в сети и автономной работы (однако еще может остаться несколько проблем, требующих исправления).|
|Окно справки|Исправлена функция справки, которая теперь учитывает подключенный и автономный режимы. Дополнительные сведения см. в разделе [https://feedback.azure.com/forums/908035-sql-server/suggestions/32897791](https://feedback.azure.com/forums/908035-sql-server/suggestions/32897791). |
|Высокий уровень доступности и аварийное восстановление<BR> Группы доступности|Устранена проблема, при которой роли в мастере групп доступности отработки отказа всегда отображаются как "Разрешается".|
|Высокий уровень доступности и аварийное восстановление<BR> Группы доступности|Устранена проблема с неполным отображением предупреждений в панели мониторинга групп доступности SSMS.|
|Службы Integration Services|Устранена проблема параллельной установки, из-за которой мастеру развертывания не удавалось подключиться к SQL Server, если на одном компьютере были установлены SQL Server 2019 и SSMS 18.0.|
|Службы Integration Services|Устранена проблема, когда невозможно изменить задачу плана обслуживания при его разработке.|
|Службы Integration Services|Устранена проблема, из-за которой мастер развертывания зависал при переименовании развертываемого проекта.|
|Службы Integration Services|В компоненте планирования Azure-SSIS IR включены параметры среды.|
|Службы Integration Services|Устранена проблема, когда мастер создания среды выполнения интеграции SSIS перестает отвечать, если клиентская учетная запись относится к нескольким клиентам.|
|Монитор активности заданий|Исправлена проблема сбоев при использовании монитора активности заданий (с фильтрами).|
|Обозреватель объектов|Устранена проблема, из-за которой при попытке развернуть узел "Управление" в обозревателе объектов в SSMS возникало исключение "Невозможно привести объект типа DBNull к другим типам" (неправильно настроенный DataCollector).|
|Обозреватель объектов|Исправлена проблема, при которой обозреватель объектов не вставлял escape-символ для кавычек до вызова "Редактировать верхние N...", вызывая путаницу.|
|Обозреватель объектов|Исправлена проблема, при которой мастер импорта приложения уровня данных не запускался из дерева службы хранилища Azure.|
|Обозреватель объектов|Исправлена проблема в конфигурации Database Mail, при которой состояние флажка TLS/SSL не сохранялось. Дополнительные сведения см. в разделе [https://feedback.azure.com/forums/908035-sql-server/suggestions/32895541](https://feedback.azure.com/forums/908035-sql-server/suggestions/32895541). |
|Обозреватель объектов|Исправлена проблема, при которой в SSMS была неактивна опция закрытия существующих соединений при попытке восстановить базу данных с помощью is_auto_update_stats_async_on.|
|Обозреватель объектов|Устранена проблема, из-за которой при щелчке правой кнопкой мыши по узлам в обозревателе объектов (например, "Таблицы") и попытке выполнить какое-либо действие, например отфильтровать таблицы в меню "Фильтр" > "Параметры фильтра", форма параметров фильтра могла появиться на другом экране — не на том, где активна среда SSMS. Дополнительные сведения см. в разделе [https://feedback.azure.com/forums/908035-sql-server/suggestions/34284106](https://feedback.azure.com/forums/908035-sql-server/suggestions/34284106). |
|Обозреватель объектов|Исправлена давняя проблема, при которой клавиша DELETE не работала в обозревателе объектов при попытке переименовать объект. Дополнительные сведения см. на страницах [https://feedback.azure.com/forums/908035-sql-server/suggestions/33073510](https://feedback.azure.com/forums/908035-sql-server/suggestions/33073510), [https://feedback.azure.com/forums/908035/suggestions/32910247](https://feedback.azure.com/forums/908035/suggestions/32910247) и в других повторяющихся разделах.|
|Обозреватель объектов|При отображении свойств существующих файлов базы данных размер отображается в столбце "Размер (МБ)", а не "Начальный размер (МБ)", который должен отображаться при создании базы данных. Дополнительные сведения см. в разделе [https://feedback.azure.com/forums/908035-sql-server/suggestions/32629024](https://feedback.azure.com/forums/908035-sql-server/suggestions/32629024). |
|Обозреватель объектов|Отключен элемент контекстного меню "Дизайн" в таблицах графов, так как этот тип таблицы не поддерживается в текущей версии SSMS.|
|Обозреватель объектов|Устранена проблема некорректного отображения диалогового окна "Создание расписания задания" на мониторах с высоким разрешением. Дополнительные сведения см. в разделе [https://feedback.azure.com/admin/v3/suggestions/35541262](https://feedback.azure.com/admin/v3/suggestions/35541262). |
|Обозреватель объектов|Исправлен способ отображения размера базы данных ("Размер (МБ)") в сведениях обозревателя объектов: используется всего 2 десятичных разряда и применяется форматирование с помощью разделителя групп разрядов. Дополнительные сведения см. в разделе [https://feedback.azure.com/forums/908035/suggestions/34379308](https://feedback.azure.com/forums/908035/suggestions/34379308).|
|Обозреватель объектов|Устранена проблема, которая вызывала сбой создания пространственного индекса с ошибкой вида "Чтобы выполнить это действие, задайте свойство PartitionScheme".|
|Обозреватель объектов|Немного улучшена работа обозревателя объектов, чтобы он по возможности не выдавал лишних запросов.|
|Обозреватель объектов|Расширена логика для запроса подтверждения при переименовании базы данных для всех объектов схемы (параметр можно настроить).|
|Обозреватель объектов|Добавлена поддержка надлежащего экранирования при фильтрации в обозревателе объектов. Дополнительные сведения см. в разделе [https://feedback.azure.com/forums/908035/suggestions/36678803](https://feedback.azure.com/forums/908035/suggestions/36678803). |
|Обозреватель объектов|Исправлено и улучшено представление сведений обозревателя объектов для отображения чисел с правильными разделителями. Дополнительные сведения см. в разделе [https://feedback.azure.com/forums/908035/suggestions/32900944](https://feedback.azure.com/forums/908035/suggestions/32900944). |
|Обозреватель объектов|Исправлено контекстное меню в узле "Таблицы" при подключении к SQL Express, где отсутствовала выноска "Создать", неправильно указывались таблицы графов и отсутствовала таблица с системным управлением версиями. Дополнительные сведения см. в разделе [https://feedback.azure.com/forums/908035/suggestions/37245529](https://feedback.azure.com/forums/908035/suggestions/37245529). |
|Скрипты объектов|Общее повышение производительности — создание скриптов WideWorldImporters теперь происходит в два раза быстрее по сравнению с SSMS 17.7.|
|Скрипты объектов|При создании сценариев для объектов опускается конфигурации уровня базы данных, которая имеет значения по умолчанию.|
|Скрипты объектов|Не создается динамический T-SQL при создании скрипта. Дополнительные сведения см. в разделе [https://feedback.azure.com/forums/908035-sql-server/suggestions/32898391](https://feedback.azure.com/forums/908035-sql-server/suggestions/32898391). |
|Скрипты объектов|Опускается синтаксис графа "как граница" и "как узел" при создании скрипта для таблицы в SQL Server 2016 и более ранних версий.|
|Скрипты объектов|Устранена проблема, когда возникал сбой написания скриптов для объектов базы данных при подключении к базе данных SQL Azure посредством Azure AD с MFA.|
|Скрипты объектов|Исправлена проблема, при которой попытка создать скрипт для пространственного индекса с использованием GEOMETRY_AUTO_GRID или GEOGRAPHY_AUTO_GRID в базе данных SQL Azure возникала ошибка.|
|Скрипты объектов|Устранена проблема, которая приводила к тому, что в ходе создания скриптов базы данных (из базы данных SQL Azure) целевым всегда выбирался локальный экземпляр SQL Server, даже если параметры создания скриптов обозревателя объектов соответствовали источнику.|
|Скрипты объектов|Устранена проблема, когда при попытке создать скрипт таблицы базы данных в хранилище данных SQL с использованием кластеризованных и некластеризованных индексов создавались неверные инструкции T-SQL.|
|Скрипты объектов|Устранена проблема, когда при попытке создать скрипт таблицы базы данных в хранилище данных SQL с использованием обычных кластеризованных индексов и кластеризованных индексов columnstore создавались неверные (дублирующиеся) инструкции T-SQL.|
|Скрипты объектов|Исправлено создание сценариев секционированных таблиц без значений диапазона (в базах данных хранилища данных SQL).|
|Скрипты объектов|Устранена проблема, при которой пользователь не мог создать скрипт аудита или спецификации аудита SERVER_PERMISSION_CHANGE_GROUP.|
|Скрипты объектов|Устранена проблема, когда пользователь не мог внести в скрипт статистику из хранилища данных SQL. Дополнительные сведения см. в разделе [https://feedback.azure.com/forums/908035-sql-server/suggestions/32897296](https://feedback.azure.com/forums/908035-sql-server/suggestions/32897296). |
|Скрипты объектов|Устранена проблема, когда мастер формирования скриптов показывал ошибки скриптов в таблице, если параметр "Продолжить выполнение сценария при ошибке" имел значение false.|
|Скрипты объектов|Улучшено создание скриптов в SQL Server 2019.|
|Profiler|В Profiler добавлено событие "Aggregate Table Rewrite Query" (Запрос на перезапись агрегатных таблиц).|
|Хранилище запросов|Устранена проблема, когда могло быть выдано исключение "DocumentFrame (SQLEditors)".|
|Хранилище запросов|Устранена проблема, когда при попытке задать настраиваемый интервал времени во встроенных отчетах хранилища запросов пользователь не мог указать период до полудня или после полудня для начального или конечного интервала.|
|Сетка результатов|Исправлена проблема в режиме высокой контрастности (выбранные номера строк не отображаются).|
|Сетка результатов|Устранена проблема, которая приводила к возникновению исключения "Индекс вне диапазона" при щелчке по сетке.|
|Сетка результатов|Устранена проблема, из-за которой игнорировался цвет фона для результата в сетке. Дополнительные сведения см. в разделе [https://feedback.azure.com/forums/908035/suggestions/32895916](https://feedback.azure.com/forums/908035/suggestions/32895916). |
|Инструкция ShowPlan|Новые свойства оператора предоставления памяти отображаются неправильно, если имеется больше одного потока.|
|Инструкция ShowPlan|Добавлены следующие 4 атрибута в RunTimeCountersPerThread действительного плана выполнения XML: HpcRowCount (количество строк, обработанных устройством *hpc*), HpcKernelElapsedUs (истекшее время ожидания для выполняемого ядра), HpcHostToDeviceBytes (количество байтов, переданных из узла на устройство) и HpcDeviceToHostBytes (количество байтов, переданных с устройства в узел).|
|Инструкция ShowPlan|Устранена проблема, где аналогичные узлы плана выделяются в неправильном расположении.|
|SMO|Устранена проблема, из-за которой SMO/ServerConnection некорректно обрабатывал подключения на основе SqlCredential. Дополнительные сведения см. в разделе [https://feedback.azure.com/forums/908035-sql-server/suggestions/33698941](https://feedback.azure.com/forums/908035-sql-server/suggestions/33698941). |
|SMO|Исправлена проблема, при которой в приложении, написанном с использованием SMO, возникала ошибка, если оно пыталось перечислить базы данных с одного сервера в нескольких потоках даже при использовании отдельных экземпляров SqlConnection в каждом потоке.|
|SMO|Исправлены проблемы со снижением производительности в операциях передачи из внешних таблиц.|
|SMO|Устранена проблема в потокобезопасности ServerConnection, которая вызывала в SMO утечку экземпляров SqlConnection при выборе Azure.|
|SMO|Устранена проблема, вызывавшая ошибку StringBuilder.FormatError при попытке восстановить базу данных, в имени которой использовались фигурные скобки.|
|SMO|Устранена проблема, из-за которой для всех баз данных Azure в SMO по умолчанию использовались параметры сортировки без учета регистра для всех сравнений строк вместо параметров сортировки, заданных для базы данных.|
|Редактор SSMS|Устранена проблема в системной таблице SQL, из-за которой после восстановления цветов по умолчанию цвет менялся на травяной вместо зеленого, что затрудняло чтение на белом фоне. Дополнительные сведения см. в разделе [Восстановление неправильного цвета по умолчанию для системной таблицы SQL](https://feedback.azure.com/forums/908035-sql-server/suggestions/32896906). Проблема будет повторяться в локализованных версиях SSMS.|
|Редактор SSMS|Устранена проблема, при которой IntelliSense не работал при подключении к хранилищу данных Azure SQLDW с использованием проверки подлинности Azure Active Directory (Azure AD).|
|Редактор SSMS|Исправлена проблема IntelliSense в Azure, когда у пользователя не было доступа к базе данных **master**.|
|Редактор SSMS|Исправлены фрагменты кода для создания темпоральных таблиц, которые не работали, когда параметры сортировки целевой базы данных зависели от регистра.|
|Редактор SSMS|Новая функция TRANSLATE теперь распознается технологией IntelliSense. Дополнительные сведения см. в разделе [https://feedback.azure.com/forums/908035-sql-server/suggestions/32898430](https://feedback.azure.com/forums/908035-sql-server/suggestions/32898430). |
|Редактор SSMS|Усовершенствованная поддержка в IntelliSense встроенной функции FORMAT. Дополнительные сведения см. в разделе [https://feedback.azure.com/forums/908035-sql-server/suggestions/32898676](https://feedback.azure.com/forums/908035-sql-server/suggestions/32898676). |
|Редактор SSMS|LAG и LEAD теперь распознается как встроенные функции. Дополнительные сведения см. в разделе [https://feedback.azure.com/forums/908035-sql-server/suggestions/32898757](https://feedback.azure.com/forums/908035-sql-server/suggestions/32898757). |
|Редактор SSMS|Исправлена проблема, при которой IntelliSense выдавала предупреждение при использовании "ALTER TABLE...ADD CONSTRAINT...WITH(ONLINE=ON)".|
|Редактор SSMS|Устранена проблема, из-за которой некоторые системные представления и функции с табличными значениями неправильно выделялись цветом.|
|Редактор SSMS|Устранена проблема, где щелчок вкладки редактора может привести к закрытию вкладки вместо получения фокуса. Дополнительные сведения см. в разделе [https://feedback.azure.com/forums/908035/suggestions/37291114](https://feedback.azure.com/forums/908035/suggestions/37291114). |
|Параметры SSMS|Исправлена проблема, при которой страница **Сервис** > **Параметры** > **Обозреватель объектов SQL Server** > **Команды** некорректно изменяла размер.|
|Параметры SSMS|Теперь SSMS по умолчанию отключает автоматическое скачивание DTD в редакторе XMLA, а сам редактор скриптов XMLA (использующий языковую службу XML) по умолчанию блокирует автоматическое скачивание DTD для потенциально вредоносных XMLA-файлов. Для управления этим поведением можно отключить параметр "Автоматически загружать DTD и схемы" в меню **Сервис** > **Параметры** > **Среда** > **Текстовый редактор** > **XML** > **Разное**.|
|Параметры SSMS|Восстановлено сочетание клавиш **CTRL+D**, использовавшееся в прежней версии SSMS. Дополнительные сведения см. в разделе [https://feedback.azure.com/forums/908035/suggestions/35544754](https://feedback.azure.com/forums/908035/suggestions/35544754). |
|конструктор таблиц|Исправлен сбой в функции "Изменить 200 строк".|
|конструктор таблиц|Устранена проблема, при которой конструктор позволял добавлять таблицу при подключении к базе данных SQL Azure.|
|Оценка уязвимости|Устранена проблема, из-за которой результаты проверки загружались некорректно.|
|XEvent|Добавлены два столбца action_name и class_type_desc, показывающие поля идентификатора действия и типа класса в виде читаемых строк.|
|XEvent|Удалено ограничение средства просмотра событий XEvent, которое составляло 1 000 000.|
|Профилировщик XEvent|Устранена проблема, при которой профилировщик XEvent не мог запуститься при подключении к SQL Server с 96 ядрами.|
|Средство просмотра XEvent|Устранена проблема, когда средство просмотра XEvent аварийно завершало работу при попытке сгруппировать события с помощью функций панели инструментов для расширенных событий.|
#### <a name="deprecated-and-removed-features-in-180"></a>Нерекомендуемые и удаленные функции в версии 18.0
Ниже приведены устаревшие и удаленные компоненты SSMS версии 18.0.
- Отладчик T-SQL.
- Диаграммы базы данных.
- Следующие средства больше не устанавливаются в составе SSMS:
- OSQL.EXE
- DReplay.exe
- SQLdiag.exe
- SSBDiagnose.exe
- bcp.exe
- sqlcmd.exe
- Средства Configuration Manager:
- Диспетчер конфигурации SQL Server и диспетчер конфигурации сервера отчетов больше не являются частью установки SSMS.
- Стандартные политики DMF
- Эти политики больше не устанавливаются вместе со средой SSMS. Они перемещены в Git. Пользователи могут скачивать и устанавливать их или что-то в них добавлять по желанию.
- Удален параметр командной строки SSMS "-P".
- По соображениям безопасности удалена возможность указания открытых паролей в командной строке.
- Удалена команда "Создание скриптов > Опубликовать в веб-службе".
- Эта нерекомендуемая функция удалена из пользовательского интерфейса SSMS.
- Удален узел "Обслуживание > Прежние версии" в обозревателе объектов.
- Старые узлы "План обслуживания базы данных" и SQL Mail больше не доступны. Современные узлы Database Mail и "Планы обслуживания" продолжают работать в обычном режиме.
#### <a name="known-issues-180"></a>Известные проблемы (18.0)
- Могут возникнуть проблемы с установкой версии 18.0, при которых не удается запустить SQL Server Management Studio. Если вы столкнетесь с этой проблемой, выполните действия из статьи [SSMS2018 — установлена, но не запускается](https://feedback.azure.com/forums/908035-sql-server/suggestions/37502512-ssms2018-installed-but-will-not-run).
- Существует ограничение на размер данных, отображаемых из результатов SSMS в сетке, тексте или файле.
- При переключении между несколькими окнами запросов возникают проблемы перерисовки. Дополнительные сведения см. в статье [Отзывы пользователей SQL Server](https://feedback.azure.com/forums/908035/suggestions/37474042). Для решения этой проблемы можно отключить аппаратное ускорение в разделе "Сервис" > "Параметры".
### <a name="1791"></a>17.9.1
![скачать](media/download-icon.png) [Скачать SSMS 17.9.1](https://go.microsoft.com/fwlink/?linkid=2043154&clcid=0x409)
- Номер выпуска: 17.9.1
- Номер сборки: 14.0.17289.0
- Дата выпуска: 21 ноября 2018 г.
#### <a name="bug-fixes-in-1791"></a>Исправления ошибок в выпуске 17.9.1
- Устранена проблема, из-за которой при использовании проверки подлинности "Azure Active Directory — универсальная с поддержкой MFA" в редакторе SQL-запросов пользователи могли столкнуться с прерыванием и повторной установкой подключения при каждом вызове запроса. Побочные эффекты закрытия соединения включают неожиданное удаление глобальных временных таблиц и иногда присвоение нового идентификатора SPID для соединения.
- Устранена давняя проблема, при которой план восстановления не может найти план восстановления или создает неэффективный план восстановления при определенных условиях.
- Устранена проблема в мастере импорта приложения уровня данных, которая могла вызывать ошибку при подключении к базе данных SQL Azure.
> [!NOTE]
> При установке на следующие платформы для использования неанглоязычных локализованных выпусков SSMS 17.x требуется [обновление для системы безопасности KB 2862966](https://support.microsoft.com/kb/2862966): Windows 8, Windows 7, Windows Server 2012 и Windows Server 2008 R2.
[Китайский (упрощенное письмо)](https://go.microsoft.com/fwlink/?linkid=2043154&clcid=0x804)| [Китайский (традиционное письмо)](https://go.microsoft.com/fwlink/?linkid=2043154&clcid=0x404)| [Английский (США)](https://go.microsoft.com/fwlink/?linkid=2043154&clcid=0x409)| [Французский](https://go.microsoft.com/fwlink/?linkid=2043154&clcid=0x40c)| [Немецкий](https://go.microsoft.com/fwlink/?linkid=2043154&clcid=0x407)| [Итальянский](https://go.microsoft.com/fwlink/?linkid=2043154&clcid=0x410)| [Японский](https://go.microsoft.com/fwlink/?linkid=2043154&clcid=0x411)| [Корейский](https://go.microsoft.com/fwlink/?linkid=2043154&clcid=0x412)| [Португальский (Бразилия)](https://go.microsoft.com/fwlink/?linkid=2043154&clcid=0x416)| [Русский](https://go.microsoft.com/fwlink/?linkid=2043154&clcid=0x419)| [Испанский](https://go.microsoft.com/fwlink/?linkid=2043154&clcid=0x40a)
#### <a name="uninstall-and-reinstall-ssms-17x"></a>Удаление и повторная установка SSMS 17.x
Если в SSMS возникают проблемы, которые не удается устранить посредством удаления и повторной установки, попробуйте [восстановить](https://support.microsoft.com/help/4028054/windows-10-repair-or-remove-programs) Visual Studio 2015 IsoShell. Если восстановление Visual Studio 2015 IsoShell не помогло решить проблему, выполните следующие действия, которые помогут устранить ряд различных проблем:
1. Удалите SSMS так же, как обычное приложение (в разделе *Приложения и компоненты*, *Программы и компоненты* в зависимости от вашей версии Windows).
2. Удалите Visual Studio 2015 IsoShell **из командной строки с повышенными привилегиями**:
```PUSHD "C:\ProgramData\Package Cache\FE948F0DAB52EB8CB5A740A77D8934B9E1A8E301\redist"```
```vs_isoshell.exe /Uninstall /Force /PromptRestart```
3. Удалите распространяемый пакет Microsoft Visual C++ 2015 так же, как обычное приложение. Если на вашем компьютере есть обе версии x86 и x64, удалите их.
4. Повторно установите Visual Studio 2015 IsoShell **из командной строки с повышенными привилегиями**:
```PUSHD "C:\ProgramData\Package Cache\FE948F0DAB52EB8CB5A740A77D8934B9E1A8E301\redist"```
```vs_isoshell.exe /PromptRestart```
5. Повторно установите SSMS.
6. [Обновите распространяемый пакет Visual C++ 2015 до последней версии](https://support.microsoft.com/help/2977003/the-latest-supported-visual-c-downloads), если он не обновлен.
### <a name="1653"></a>16.5.3
![скачать](media/download-icon.png) [Скачать SSMS 16.5.3](https://go.microsoft.com/fwlink/?LinkID=840946)
- Номер выпуска: 16.5.3
- Номер сборки: 13.0.16106.4
- Дата выпуска: 30 января 2017 г.
[Китайский (упрощенное письмо)](https://go.microsoft.com/fwlink/?linkid=840946&clcid=0x804)| [Китайский (традиционное письмо)](https://go.microsoft.com/fwlink/?linkid=840946&clcid=0x404)| [Английский (США)](https://go.microsoft.com/fwlink/?linkid=840946&clcid=0x409)| [Французский](https://go.microsoft.com/fwlink/?linkid=840946&clcid=0x40c)| [Немецкий](https://go.microsoft.com/fwlink/?linkid=840946&clcid=0x407)| [Итальянский](https://go.microsoft.com/fwlink/?linkid=840946&clcid=0x410)| [Японский](https://go.microsoft.com/fwlink/?linkid=840946&clcid=0x411)| [Корейский](https://go.microsoft.com/fwlink/?linkid=840946&clcid=0x412)| [Португальский (Бразилия)](https://go.microsoft.com/fwlink/?linkid=840946&clcid=0x416)| [Русский](https://go.microsoft.com/fwlink/?linkid=840946&clcid=0x419)| [Испанский](https://go.microsoft.com/fwlink/?linkid=840946&clcid=0x40a)
#### <a name="bug-fixes-in-1653"></a>Исправления ошибок в выпуске 16.5.3
- Устранена проблема, появившаяся в SSMS 16.5.2. Эта проблема приводила к раскрытию узла "Таблица", если в таблице было несколько разреженных столбцов.
- Пользователи могут развертывать пакеты MSSQL Integration Services, содержащие диспетчер подключений OData, который используется для подключения ресурса Microsoft Dynamics AX или CRM Online к каталогу MSSQL Integration Services. Дополнительные сведения см. в разделе [Диспетчер соединений OData](../integration-services/connection-manager/odata-connection-manager.md).
- Настройка Always Encrypted для существующей таблицы завершается с ошибками, в которых указаны посторонние объекты. [Идентификатор Connect 3103181](https://connect.microsoft.com/SQLServer/feedback/details/3103181/setting-up-always-encrypted-on-an-existing-table-fails-with-errors-on-unrelated-objects)
- Настройка Always Encrypted для существующей базы данных с несколькими схемами не работает. [Идентификатор Connect 3109591](https://connect.microsoft.com/SQLServer/feedback/details/3109591/sql-server-2016-always-encrypted-against-existing-database-with-multiple-schemas-doesnt-work)
- Мастер зашифрованного столбца в Always Encrypted завершается с ошибкой из-за того, что база данных содержит представления, ссылающиеся на системные представления. [Идентификатор Connect 3111925](https://connect.microsoft.com/SQLServer/feedback/details/3111925/sql-server-2016-always-encrypted-encrypted-column-wizard-failed-task-failed-due-to-following-error-cannot-save-package-to-file-the-model-has-build-blocking-errors)
- При шифровании с помощью Always Encrypted ошибки из-за обновления модулей после шифрования обрабатываются неправильно.
- В меню *Открыть последние* не отображаются недавно сохраненные файлы. [Идентификатор Connect 3113288](https://connect.microsoft.com/SQLServer/feedback/details/3113288/ssms-2016-open-recent-menu-doesnt-show-recently-saved-files)
- SSMS замедляет работу при щелчке таблицы правой кнопкой мыши (при работе через удаленное подключение в Интернете). [Идентификатор Connect 3114074](https://connect.microsoft.com/SQLServer/feedback/details/3114074/ssms-slow-when-right-clicking-an-index-for-a-table-over-a-remote-internet-connection)
- Устранена проблема с полосой прокрутки конструктора SQL. [Идентификатор Connect 3114856](https://connect.microsoft.com/SQLServer/feedback/details/3114856/bug-in-scrollbar-on-sql-desginer-in-ssms-2016)
- Контекстное меню для таблиц мгновенно зависает
- SSMS иногда выдает исключения в мониторе активности и завершает работу с ошибкой. [Идентификатор Connect 697527](https://connect.microsoft.com/SQLServer/feedback/details/697527/)
- SSMS 2016 аварийно завершает работу с ошибкой "Процесс был завершен из-за внутренней ошибки в среде выполнения .NET: IP 71AF8579 (71AE0000), код выхода 80131506"
## <a name="additional-downloads"></a>Дополнительные скачиваемые файлы
Список всех загрузок для SQL Server Management Studio см. в [центре загрузки Майкрософт](https://www.microsoft.com/download/search.aspx?q=sql%20server%20management%20studio&p=0&r=10&t=&s=Relevancy~Descending).
Чтобы получить последнюю версию среды SQL Server Management Studio, перейдите на страницу [Скачивание SQL Server Management Studio (SSMS)](../ssms/download-sql-server-management-studio-ssms.md). | 146.802155 | 929 | 0.803536 | rus_Cyrl | 0.947984 |
8a0a1fa0ffbd4b9fb3ce5693c86c7973aac6f6fb | 40 | md | Markdown | _includes/04-lists.md | wk-chung/markdown-portfolio | 66dfaf2ffc93d424ce7d99a6d6b08ea09dc1d82a | [
"MIT"
] | null | null | null | _includes/04-lists.md | wk-chung/markdown-portfolio | 66dfaf2ffc93d424ce7d99a6d6b08ea09dc1d82a | [
"MIT"
] | 5 | 2022-03-18T13:19:46.000Z | 2022-03-18T13:31:29.000Z | _includes/04-lists.md | wk-chung/markdown-portfolio | 66dfaf2ffc93d424ce7d99a6d6b08ea09dc1d82a | [
"MIT"
] | null | null | null | 1. :tada:
2. :tada:
3. :tada:
4. :tada:
| 8 | 9 | 0.5 | eus_Latn | 0.220147 |
8a0ae3c7070d563d5311bd11f4fb1880910e1a49 | 4,108 | md | Markdown | node_modules/gl/angle/doc/VTF.md | aaverty/editly | 71bccaf91f8d68609c80ba59425b79e3f94579ad | [
"MIT"
] | 27 | 2016-04-27T01:02:03.000Z | 2021-12-13T08:53:19.000Z | node_modules/gl/angle/doc/VTF.md | aaverty/editly | 71bccaf91f8d68609c80ba59425b79e3f94579ad | [
"MIT"
] | 2 | 2020-03-14T04:03:53.000Z | 2021-09-02T04:26:49.000Z | node_modules/gl/angle/doc/VTF.md | aaverty/editly | 71bccaf91f8d68609c80ba59425b79e3f94579ad | [
"MIT"
] | 17 | 2016-04-27T02:06:39.000Z | 2019-12-18T08:07:00.000Z | # Vertex Texture Fetch
This page details the steps necessary to implement vertex texture fetch in ANGLE
and documents some of the pitfalls that may be encountered along the way.
# Details
Tasks to implement vertex texture support.
1. add/enable vertex shader texture look up functions in compiler & HLSL
translator.
* add texture2DLod, texture2DProjLod (2 variants), textureCubeLod (these
are **only** valid in vertex shaders)
* ensure other (non-bias/non-LOD) texture functions work in vertex shaders
* non-mipmapped textures use the only level available
* mipmapped textures use only the base level (ie level 0).
2. update implementation-dependant constants in Context.h
* MAX\_VERTEX\_TEXTURE\_IMAGE\_UNITS = 4
* MAX\_COMBINED\_TEXTURE\_IMAGE\_UNITS =
MAX\_VERTEX\_TEXTURE\_IMAGE\_UNITS + MAX\_TEXTURE\_IMAGE\_UNITS (ie 20).
* these limits have to change based on the d3d device characteristics. For
example we likely don't want to advertise vertex image units on SM2.0
cards (unless we end up using software vertex processing).
* detection of hardware support for various formats, types, etc.
* As a first pass, use the "hasVertexTextures" check that Aras suggested
to only enable VTF on DX10 NVIDIA and AMD parts, and SM3 Intel parts.
* If this proves insufficient, there are other things we can do, but it
involves using software vertex processing for unsupported formats and
system memory copies of textures -- all stuff which is rather annoying
and likely to hurt performance (see point 4. below).
3. add support and handling for vertex textures/samplers in the API.
* any textures used in a vertex shader need to get assigned to the special
samplers in d3d9
* there are only 4 of them (D3DVERTEXTEXTURESAMPLER0..
D3DVERTEXTEXTURESAMPLER3)
* if a texture is used in both vertex & fragment it counts twice against
the "MAX\_COMBINED" limit (validated in Program::validateSamplers)
* there are a number of places in our code where we have arrays of size,
or iterate over, MAX\_TEXTURE\_IMAGE\_UNITS. These will need to be
changed to operate on MAX\_COMBINED\_TEXTURE\_IMAGE\_UNITS instead. A
(possibly incomplete & outdated) list of areas that need to be updated
is as follows:
* Program.h - increase size of mSamplers
* Context.h - increase size of samplerTexture
* glActiveTexture needs accept values in the range
0..MAX\_COMBINED\_TEXTURE\_IMAGE\_UNITS-1
* Context::~Context
* GetIntegerv (2D\_BINDING, CUBE\_BINDING)
* Context::applyTextures
* Context::detachTexture
* Program::getSamplerMapping
* Program::dirtyAllSamplers
* Program::applyUniform1iv
* Program::unlink
* Program::validateSamplers
4. handling the nasty corner cases: texture formats, filtering and cube
textures.
* OpenGL doesn't provide any restrictions on what formats and/or types of
textures can used for vertex textures, or if filtering can be enabled,
whereas D3D9 does.
* Reference Rasterizer / Software Vertex Processing: all formats & types
supported (including filtering)
* ATI R500 (on Google Code) cards do not support VTF (even though they are
SM 3.0)
* ATI R600 (on Google Code) (and later) and in theory the Intel 965+,
claim to support all texture formats/types we care about and some with
filtering
* NVIDIA cards fall into two camps:
* dx9 SM3 (6&7 series): only R32F & A32B32G32R32F supported for 2D and no
filtering, CUBE or VOL texture support
* dx10 (8+ series): only float texture formats for 2D, CUBE & VOLUME. no
filtering (according to caps)
* further info from Aras P. suggests that all formats are supported on
DX10 hardware, but are just not advertised.
* unsure what they do on these cards under OpenGL. Need to do more
testing, but suspect software fallback.
| 53.350649 | 80 | 0.703749 | eng_Latn | 0.981297 |
8a0b1e54d4053674620df09ef75e47ecd04743ba | 778 | md | Markdown | src/tokens/Spaces/Spaces.md | elevatebart/cc-vocabulary | 76af0534bf6a47c003ac595e54639eea9f769ad0 | [
"MIT"
] | null | null | null | src/tokens/Spaces/Spaces.md | elevatebart/cc-vocabulary | 76af0534bf6a47c003ac595e54639eea9f769ad0 | [
"MIT"
] | null | null | null | src/tokens/Spaces/Spaces.md | elevatebart/cc-vocabulary | 76af0534bf6a47c003ac595e54639eea9f769ad0 | [
"MIT"
] | null | null | null | Vocabulary is meant to be readable, and whitespaces are of paramount importance
in readability considerations. Vocabulary provides a number of spaces in
different units to ensure consistency in the whitespaces throughout the project.
### `em` based
Vocabulary provides a number of spaces calculated as a fraction of the font size
of the element. So in an element with `font-size: 3em`, the sizes are
tripled.
```jsx { "props": { "className": "no-i18n" } }
<div style="font-size: 3em;">
<Spaces units="em"/>
</div>
```
### `rem` based
Vocabulary provides a number of spaces calculated as a fraction of the font size
of the root element. This is set to 16 pixels by default but can be overridden.
```jsx { "props": { "className": "no-i18n" } }
<Spaces units="rem"/>
```
| 31.12 | 80 | 0.722365 | eng_Latn | 0.997678 |
8a0b3bc445fd6461c515c7e38a2aaf698ecd9f4b | 1,861 | md | Markdown | mxnet-week2/README.md | FanW123/MXNET-project | 1c09285b9d4e29082dab04524912b42fa032f8c6 | [
"MIT"
] | null | null | null | mxnet-week2/README.md | FanW123/MXNET-project | 1c09285b9d4e29082dab04524912b42fa032f8c6 | [
"MIT"
] | null | null | null | mxnet-week2/README.md | FanW123/MXNET-project | 1c09285b9d4e29082dab04524912b42fa032f8c6 | [
"MIT"
] | null | null | null | # MXNET-Week2
## Useful git commands
git init # init a repo
git status # check the status of current branch
git clone # clone a repo from github
git add # add untracked files
git commit # make the commit change to the branch
git push # push the changes to github
git pull # pull the changes from github
## Pycharm feature for gtihub
Version Control
Mark down for readme
Terminal
## Setup AWS account
### AWS website
https://aws.amazon.com/
### Sign Up
Email account
Credit Card
~50 us dollar budget for our project if GPU is in your plan
### AWS Deep Learning pre-built instance
https://aws.amazon.com/marketplace/pp/B01M0AXXQB
### Steps to start a GPU instance in AWS
1) Sign up a AWS account with credit card bounded
2) Search for the Deep Learning AMI (free) by the link above
3) Start a new instance from Deep Learnining AMI
1) US West (Oregon) ami-296e7850 -> Lanuch with
2) Enable public ip address
3) select one of them
g2.2xlarge g2.8xlarge p2.xlarge p2.2xlarge p2.8large p2.16xlarge
4) Security Group -> default 22, (optional) 8888 6006 port
5) For storage, 50~100G is sufficient
6) Create and download key-pair, such as "*.pem"
7) run "ssh -i *.epm ec2-user@publicip"
8) When in the instance, run "nvidia-smi" and "nvcc --version" to check the availbility of GPU
### IMPORTANT NOTICE
!!! STOP THE INSTSNCE ONCE YOU DON'T NEED IT
!!! TERMINATE THE INSTANCE WHEN YOU FINSHED THE PROJECT
!!! UNLINK THE CREDIT CARD INFO FROM AWS ONCE YOU DON'T USE AWS
!!! IT COSTS MONEY FOR EVERY SECOND YOU USE THE INSTANCES
### Useful info
Change the type of an instance
Right click on the instance -> Instance Setting -> Change Instance Type
| 33.232143 | 102 | 0.662547 | eng_Latn | 0.70317 |
8a0b649dcffa2aad18a3277bc7c5fb6a51d3f0e1 | 693 | md | Markdown | site/content/docs/commands/pipeline-show.ja.md | MikeOwino/copilot-cli | 93f3ad4c87aa805a9aa96057c09d9f8180d55690 | [
"Apache-2.0"
] | 1 | 2022-03-15T21:01:20.000Z | 2022-03-15T21:01:20.000Z | site/content/docs/commands/pipeline-show.ja.md | dannyrandall/copilot-cli | 2bdd682df09642df2a83d525e95fc42f73f2f161 | [
"Apache-2.0"
] | 34 | 2021-12-18T02:44:13.000Z | 2022-03-30T05:29:44.000Z | site/content/docs/commands/pipeline-show.ja.md | MikeOwino/copilot-cli | 93f3ad4c87aa805a9aa96057c09d9f8180d55690 | [
"Apache-2.0"
] | null | null | null | # pipeline show
```bash
$ copilot pipeline show [flags]
```
## コマンドの概要
`copilot pipeline show` は、Application にデプロイされた Pipeline の構成情報 (アカウント、リージョン、ステージなど) を表示します。
## フラグ
```bash
-a, --app string Name of the application.
-h, --help help for show
--json Optional. Outputs in JSON format.
-n, --name string Name of the pipeline.
--resources Optional. Show the resources in your pipeline.
```
## 実行例
Pipeline "myapp-mybranch" に関する情報をリソース情報を含めて表示します。
```bash
$ copilot pipeline show --name myrepo-mybranch --resources
```
## 出力例
![Running copilot pipeline show](https://raw.githubusercontent.com/kohidave/copilot-demos/master/pipeline-show.svg?sanitize=true)
| 25.666667 | 129 | 0.701299 | eng_Latn | 0.661425 |
8a0b75321817bd51ad4431db942e7dbc70c24e1c | 2,056 | md | Markdown | dynamicsax2012-msdn/disabling-user-customization-of-forms.md | AndreasVolkmann/DynamicsAX2012-msdn | 53dd6d433cc772eb1e207abb8e5bed1c157ee1f1 | [
"CC-BY-4.0",
"MIT"
] | 7 | 2020-05-18T17:20:32.000Z | 2021-11-04T20:39:20.000Z | dynamicsax2012-msdn/disabling-user-customization-of-forms.md | AndreasVolkmann/DynamicsAX2012-msdn | 53dd6d433cc772eb1e207abb8e5bed1c157ee1f1 | [
"CC-BY-4.0",
"MIT"
] | 66 | 2018-08-07T20:05:55.000Z | 2022-01-21T20:00:29.000Z | dynamicsax2012-msdn/disabling-user-customization-of-forms.md | AndreasVolkmann/DynamicsAX2012-msdn | 53dd6d433cc772eb1e207abb8e5bed1c157ee1f1 | [
"CC-BY-4.0",
"MIT"
] | 23 | 2018-08-08T11:57:41.000Z | 2021-08-31T09:04:49.000Z | ---
title: Disabling User Customization of Forms
TOCTitle: Disabling User Customization of Forms
ms:assetid: 847e97c1-d9de-4752-b1a9-967f405e195b
ms:mtpsurl: https://msdn.microsoft.com/en-us/library/Aa676961(v=AX.60)
ms:contentKeyID: 35246165
ms.date: 05/18/2015
mtps_version: v=AX.60
---
# Disabling User Customization of Forms
_**Applies To:** Microsoft Dynamics AX 2012 R3, Microsoft Dynamics AX 2012 R2, Microsoft Dynamics AX 2012 Feature Pack, Microsoft Dynamics AX 2012_
Disabling user customization is the lowest level that can be set for [User Personalization of Forms](user-personalization-of-forms.md). This level requires that you set the AllowUserSetup property on the form control, and set the AllowAdd property on the form data source field to No.
In this mode, only the size and position of the form can be changed. Users cannot change properties on the individual controls.
Because the position and size of the form is saved (the size is saved if the SaveSize property is set to Yes), there is an entry for this form in the SysLastValue table. No personalization is allowed.
This personalization level is relevant in forms that have a fixed size and whose control positions are important. Examples are wizard forms and forms used for touch-sensitive screens. Use of this personalization level also ensures that users cannot hide information in a particular form.
> [!NOTE]
> <P>If you use the AllowUserSetup and AllowAdd properties to prevent user customizations, it affects all users of the form. If customization should be set at run time on a per-user group basis, use the SecurityKey property on the menu item for the form or on individual form controls.</P>
## See also
[Form Control Properties](form-control-properties.md)
[Form Data Source Field Properties](form-data-source-field-properties.md)
**Announcements:** New book: "Inside Microsoft Dynamics AX 2012 R3" now available. Get your copy at the [MS Press Store](https://www.microsoftpressstore.com/store/inside-microsoft-dynamics-ax-2012-r3-9780735685109).
| 52.717949 | 289 | 0.791342 | eng_Latn | 0.982576 |
8a0b7cbf1fe573a9bf71f6b6263a90b056dc7f98 | 3,443 | md | Markdown | mdop/agpm/domain-delegation-tab-agpm40.md | MicrosoftDocs/mdop-docs-pr.ja-jp | b4648e27f33d0a719ab1091e4b45b8d1f04db80a | [
"CC-BY-4.0",
"MIT"
] | 1 | 2021-04-20T21:13:51.000Z | 2021-04-20T21:13:51.000Z | mdop/agpm/domain-delegation-tab-agpm40.md | MicrosoftDocs/mdop-docs-pr.ja-jp | b4648e27f33d0a719ab1091e4b45b8d1f04db80a | [
"CC-BY-4.0",
"MIT"
] | 2 | 2020-07-08T05:41:28.000Z | 2020-07-08T15:26:39.000Z | mdop/agpm/domain-delegation-tab-agpm40.md | MicrosoftDocs/mdop-docs-pr.ja-jp | b4648e27f33d0a719ab1091e4b45b8d1f04db80a | [
"CC-BY-4.0",
"MIT"
] | 1 | 2021-11-04T12:31:13.000Z | 2021-11-04T12:31:13.000Z | ---
title: '[ドメインの委任] タブ'
description: '[ドメインの委任] タブ'
author: dansimp
ms.assetid: 5be5841e-92fb-4af6-aa68-0ae50f8d5141
ms.reviewer: ''
manager: dansimp
ms.author: dansimp
ms.pagetype: mdop
ms.mktglfcycl: manage
ms.sitesec: library
ms.prod: w10
ms.date: 06/16/2016
ms.openlocfilehash: c5f3b5c3b7d8799b383ab48870fcccad0b0c3f73
ms.sourcegitcommit: 354664bc527d93f80687cd2eba70d1eea024c7c3
ms.translationtype: MT
ms.contentlocale: ja-JP
ms.lasthandoff: 06/26/2020
ms.locfileid: "10818637"
---
# [ドメインの委任] タブ
[**変更] コントロール**ウィンドウの [**ドメインの委任**] タブには、アーカイブへのドメインレベルのアクセス権を持つグループポリシー管理者の一覧が表示され、それぞれの役割が示されます。 さらに、このタブでは、AGPM 管理者 (フルコントロール) を使用して、エディター、承認者、校閲者、その他の AGPM 管理者に対してドメインレベルの権限を構成することができます。 [**ドメインの委任**] タブには、ドメインレベルでの高度なグループポリシー管理 (AGPM) の電子メール通知とロールベースの委任の構成という2つのセクションがあります。
## メール通知の設定
このタブの [電子メール通知] セクションには、AGPM で操作が保留中の場合に通知を受け取る承認者が示されます。
<table>
<colgroup>
<col width="50%" />
<col width="50%" />
</colgroup>
<thead>
<tr class="header">
<th align="left">設定</th>
<th align="left">説明</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<td align="left"><p><strong>差出人の電子メールアドレス</strong></p></td>
<td align="left"><p>承認者に通知が送信される AGPM エイリアス。 複数のドメインがある環境では、環境全体で同じエイリアスを使用するか、ドメインごとに異なるエイリアスを使用することができます。</p></td>
</tr>
<tr class="even">
<td align="left"><p><strong>電子メールアドレス</strong></p></td>
<td align="left"><p>通知が送信される承認者の電子メールアドレスのコンマ区切りリスト</p></td>
</tr>
<tr class="odd">
<td align="left"><p><strong>SMTP サーバー</strong></p></td>
<td align="left"><p>メールサーバーの名前 (mail.contoso.com など)</p></td>
</tr>
<tr class="even">
<td align="left"><p><strong>ユーザー名</strong></p></td>
<td align="left"><p>SMTP サーバーへのアクセス権を持つユーザー</p></td>
</tr>
<tr class="odd">
<td align="left"><p><strong>パスワード</strong></p></td>
<td align="left"><p>SMTP サーバーに対する認証のためのユーザーパスワード</p></td>
</tr>
<tr class="even">
<td align="left"><p><strong>パスワードの確認</strong></p></td>
<td align="left"><p>ユーザーのパスワードを確認する</p></td>
</tr>
</tbody>
</table>
## ドメインレベルの役割ベースの委任
このタブの [ロールベースの委任] セクションに表示される、AGPM 管理者は、アーカイブへのアクセス権を持つドメインの各グループとユーザーに対して、許可、拒否、継承された権限を委任することができます。 AGPM 管理者は、標準の AGPM ロール (エディター、承認者、レビュー担当者、AGPM 管理者) を使用するか、グループポリシー管理者ごとに権限のカスタマイズされた組み合わせを使って、ドメイン全体の権限を構成できます。
<table>
<colgroup>
<col width="50%" />
<col width="50%" />
</colgroup>
<thead>
<tr class="header">
<th align="left">ボタン</th>
<th align="left">効果</th>
</tr>
</thead>
<tbody>
<tr class="odd">
<td align="left"><p><strong>Add</strong></p></td>
<td align="left"><p>セキュリティ記述子に新しいエントリを追加します。 Active Directory 内のすべてのユーザーまたはグループをグループポリシーの管理者として追加できます。</p></td>
</tr>
<tr class="even">
<td align="left"><p><strong>[削除]</strong></p></td>
<td align="left"><p>選択したグループポリシーの管理者を [アクセス制御] の一覧から削除します。</p></td>
</tr>
<tr class="odd">
<td align="left"><p><strong>プロパティ</strong></p></td>
<td align="left"><p>選択したグループポリシー管理者のプロパティを表示します。</p></td>
</tr>
<tr class="even">
<td align="left"><p><strong>詳細設定</strong></p></td>
<td align="left"><p><strong>Access コントロールリストエディターを開き </strong> ます。</p></td>
</tr>
</tbody>
</table>
### その他の考慮事項
- 特定のタスクに関連するロールと権限の詳細については、「 [AGPM 管理者タスク](performing-agpm-administrator-tasks-agpm40.md)を実行する」、「[エディタータスクを実行](performing-editor-tasks-agpm40.md)する」、「[承認者タスク](performing-approver-tasks-agpm40.md)を実行する」、「[校閲者タスク](performing-reviewer-tasks-agpm40.md)を実行する」のタスクを参照してください。
### その他の参照情報
- [ユーザー インターフェイス: 高度なグループ ポリシーの管理](user-interface-advanced-group-policy-management-agpm40.md)
- [AGPM 管理者タスクの実行](performing-agpm-administrator-tasks-agpm40.md)
| 26.898438 | 278 | 0.714493 | yue_Hant | 0.67483 |
8a0b976cc2a4861918237244ccaa8b04150c3d79 | 2,048 | md | Markdown | aishek-jquery-animateNumber-8b31991/README.ru.md | jordicases98/frontend-web | 25ca5c75b6f12353e3aa05a9b53012376f200bc6 | [
"MIT"
] | 684 | 2015-01-09T18:42:19.000Z | 2022-03-20T05:49:49.000Z | aishek-jquery-animateNumber-8b31991/README.ru.md | jordicases98/frontend-web | 25ca5c75b6f12353e3aa05a9b53012376f200bc6 | [
"MIT"
] | 27 | 2015-03-08T18:26:41.000Z | 2021-01-11T03:23:14.000Z | aishek-jquery-animateNumber-8b31991/README.ru.md | jordicases98/frontend-web | 25ca5c75b6f12353e3aa05a9b53012376f200bc6 | [
"MIT"
] | 230 | 2015-01-09T16:49:09.000Z | 2022-01-20T09:18:00.000Z | [![Code Climate](https://codeclimate.com/github/aishek/jquery-animateNumber.png)](https://codeclimate.com/github/aishek/jquery-animateNumber)
jquery-animateNumber
====================
[Примеры](http://aishek.github.io/jquery-animateNumber/) | [v0.0.14 – последняя версия](https://github.com/aishek/jquery-animateNumber/releases/tag/v0.0.14)
[README in english](https://github.com/aishek/jquery-animateNumber)
Этот плагин для jQuery позволяет анимировать числа, добавляя к функции $.animate свойства number и numberStep.
Работает с jQuery 1.7.0 или более новой версией (в последний раз тестировался на версии 3.3.1).
## Пример
```html
<p>Уровень качества <span id="fun-level" style="color: red; font-size: 0px;">0 %</span>.</p>
```
```js
// функция $.animateNumber принимает такие же аргументы,
// как и $.animate, дополнительно можно использовать
// параметры 'number' и 'numberStep'
$('#fun-level').animateNumber(
{
number: 100,
color: 'green', // требует jquery.color
'font-size': '50px',
// опциональный аргумент: функция шага анимации числа
// здесь используется, чтобы добавить '%' в конце числа
numberStep: function(now, tween) {
var floored_number = Math.floor(now),
target = $(tween.elem);
target.text(floored_number + ' %');
}
},
{
easing: 'swing',
duration: 1800
}
);
```
[Все примеры](http://aishek.github.io/jquery-animateNumber/)
## Другие плагины для анимации чисел
* [jQuery Numerator](http://plugins.jquery.com/numerator/)
## Разработка
1. `npm install grunt-cli -g`
2. `npm install`
3. `https://github.com/gmarty/grunt-closure-compiler`
4. `grunt watch`
## Note on Patches / Pull Requests
* Сделайте форк.
* Внесите изменения.
* Сделайте пулл-реквест. Ваши изменения в отдельной ветке принесут плюс в карму :)
## Лицензия
jquery-animateNumber является бесплатным ПО, подробности в файле LICENSE.
## Авторы
* [Александр Борисов](https://github.com/aishek)
* [Greg Thornton](https://github.com/xdissent)
* [Tomáš Opekar](https://github.com/topik)
| 28.054795 | 156 | 0.701172 | rus_Cyrl | 0.293058 |
8a0bf7f1355b2f65dfd81a5499ec9b21d0efa0a8 | 2,387 | md | Markdown | README.md | cph2134/Capstone-Project | cf754a88387cf8d1585924bf7147258095f822a0 | [
"MIT"
] | null | null | null | README.md | cph2134/Capstone-Project | cf754a88387cf8d1585924bf7147258095f822a0 | [
"MIT"
] | null | null | null | README.md | cph2134/Capstone-Project | cf754a88387cf8d1585924bf7147258095f822a0 | [
"MIT"
] | null | null | null | # **Stack Support**
Stack Support was created by four brand-new software engineers who had a lot of questions. How do you decide between Front-End, Back-End, and Full-Stack career paths? What really matters on a resume for tech jobs? Should I be working on a back-end language like Ruby, GO or Python? Wouldn't it be great if there was someplace we could connect to more experienced developers and get some answers? Thus, Stack Support was born.
**Try it for yourself!**
Stack support is deployed through Heroku at: https://stacksupport.herokuapp.com/
## **Demo:**
### New User Onboarding
[Images/video of onboarding form and quiz]
### Match with a Mentor
[images of mentor choices and profile page with mentor added]
### Chat
[image of chat with messages]
## **Tech Stack**
**Node.js** Open-source, back-end JavaScript runtime environment that allows for full-stack JavaScript applications.
**Express** A flexible, Node.JS web application framework for building single (and multi) page web applications.
**Postgresql** Open-Source Relational Database
**socket.io** Library for real-time, bidirectional and event-based communication between the browser and the server.
**Redux** For React state management.
**React** Component-based library for building feature-rich, interactive user interfaces.
**Passport.js, jsonwebtoken, bcrypt** Libraries for site-based third-party login and authentication
**Cloudinary** Image hosting and upload
**Formik** Form management
**mui** React UI library
## **Team:**
**Carly Sandler**
[LinkedIn](https://www.linkedin.com/in/carlysandler/)
[GitHub](https://github.com/carlysandler)
**China Hoffman**
[LinkedIn](https://www.linkedin.com/in/chinahoffman/)
[GitHub](https://github.com/cph2134)
**Jill Sherman**
[LinkedIn](https://www.linkedin.com/in/jill-sherman-tech/)
[GitHub](https://github.com/shermanful)
**Kejda Celaj**
[LinkedIn](https://www.linkedin.com/in/kejda-celaj-27370b231/)
[GitHub](https://github.com/thisisacodersworld)
**Explore the Code**
- git clone git@github.com:GraceHopper-Pastry/Capstone-Project.git
- `npm install`
- Create two postgres databases: `capstone-project` and `capstone-project-test`:
## Start
Sync and seed your database by running `npm run seed`.
Run `npm run start:dev` to view the site on http://localhost:8080
| 32.256757 | 426 | 0.730205 | eng_Latn | 0.827622 |
8a0cd4ea5ca7d1cfce020a9fc3007101d96df652 | 4,620 | md | Markdown | README.md | NEWBITALGO/bitcore-lib-bitalgo | 9d469cca017bcb89dba6d6120090dd06413cdb2d | [
"MIT"
] | null | null | null | README.md | NEWBITALGO/bitcore-lib-bitalgo | 9d469cca017bcb89dba6d6120090dd06413cdb2d | [
"MIT"
] | 6 | 2020-07-17T18:47:37.000Z | 2022-02-12T17:07:58.000Z | README.md | NEWBITALGO/bitcore-lib-bitalgo | 9d469cca017bcb89dba6d6120090dd06413cdb2d | [
"MIT"
] | null | null | null | Bitcore-Bitalgo Library
=======
A pure and powerful JavaScript Bitalgo library.
## Principles
Bitalgo is a powerful new peer-to-peer platform for the next generation of financial technology. The decentralized nature of the Bitalgo network allows for highly resilient bitalgo infrastructure, and the developer community needs reliable, open-source tools to implement bitalgo apps and services.
## Get Started
```
npm install bitcore-lib-bitalgo
```
```
bower install bitcore-lib-bitalgo
```
## Documentation
The complete docs are hosted here: [bitcore documentation](http://bitcore.io/guide/). There's also a [bitcore API reference](http://bitcore.io/api/) available generated from the JSDocs of the project, where you'll find low-level details on each bitcore utility.
- [Read the Developer Guide](http://bitcore.io/guide/)
- [Read the API Reference](http://bitcore.io/api/)
To get community assistance and ask for help with implementation questions, please use our [community forums](https://forum.bitcore.io/).
## Examples
* [Generate a random address](https://github.com/NewBitalGo/bitcore-lib-bitalgo/blob/master/docs/examples.md#generate-a-random-address)
* [Generate a address from a SHA256 hash](https://github.com/NewBitalGo/bitcore-lib-bitalgo/blob/master/docs/examples.md#generate-a-address-from-a-sha256-hash)
* [Import an address via WIF](https://github.com/NewBitalGo/bitcore-lib-bitalgo/blob/master/docs/examples.md#import-an-address-via-wif)
* [Create a Transaction](https://github.com/NewBitalGo/bitcore-lib-bitalgo/blob/master/docs/examples.md#create-a-transaction)
* [Sign a Bitalgo message](https://github.com/NewBitalGo/bitcore-lib-bitalgo/blob/master/docs/examples.md#sign-a-bitcoin-message)
* [Verify a Bitalgo message](https://github.com/NewBitalGo/bitcore-lib-bitalgo/blob/master/docs/examples.md#verify-a-bitcoin-message)
* [Create an OP RETURN transaction](https://github.com/NewBitalGo/bitcore-lib-bitalgo/blob/master/docs/examples.md#create-an-op-return-transaction)
* [Create a 2-of-3 multisig P2SH address](https://github.com/NewBitalGo/bitcore-lib-bitalgo/blob/master/docs/examples.md#create-a-2-of-3-multisig-p2sh-address)
* [Spend from a 2-of-2 multisig P2SH address](https://github.com/NewBitalGo/bitcore-lib-bitalgo/blob/master/docs/examples.md#spend-from-a-2-of-2-multisig-p2sh-address)
## Security
We're using Bitcore in production, as are [many others](http://bitcore.io#projects), but please use common sense when doing anything related to finances! We take no responsibility for your implementation decisions.
If you find a security issue, please email security@bitpay.com.
## Contributing
Please send pull requests for bug fixes, code optimization, and ideas for improvement. For more information on how to contribute, please refer to our [CONTRIBUTING](https://github.com/NewBitalGo/bitcore-lib-bitalgo/blob/master/CONTRIBUTING.md) file.
## Building the Browser Bundle
To build a bitcore-lib-bitalgo full bundle for the browser:
```sh
gulp browser
```
This will generate files named `bitcore-lib-bitalgo.js` and `bitcore-lib-bitalgo.min.js`.
You can also use our pre-generated files, provided for each release along with a PGP signature by one of the project's maintainers. To get them, checkout a release commit (for example, https://github.com/NewBitalGo/bitcore-lib-bitalgo/commit/e33b6e3ba6a1e5830a079e02d949fce69ea33546 for v0.12.6).
To verify signatures, use the following PGP keys:
- @braydonf: https://pgp.mit.edu/pks/lookup?op=get&search=0x9BBF07CAC07A276D `D909 EFE6 70B5 F6CC 89A3 607A 9BBF 07CA C07A 276D`
- @gabegattis: https://pgp.mit.edu/pks/lookup?op=get&search=0x441430987182732C `F3EA 8E28 29B4 EC93 88CB B0AA 4414 3098 7182 732C`
- @kleetus: https://pgp.mit.edu/pks/lookup?op=get&search=0x33195D27EF6BDB7F `F8B0 891C C459 C197 65C2 5043 3319 5D27 EF6B DB7F`
- @matiu: https://pgp.mit.edu/pks/lookup?op=get&search=0x9EDE6DE4DE531FAC `25CE ED88 A1B1 0CD1 12CD 4121 9EDE 6DE4 DE53 1FAC`
## Development & Tests
```sh
git clone https://github.com/NewBitalGo/bitcore-lib-bitalgo
cd bitcore-lib-bitalgo
npm install
```
Run all the tests:
```sh
gulp test
```
You can also run just the Node.js tests with `gulp test:node`, just the browser tests with `gulp test:browser`
or create a test coverage report (you can open `coverage/lcov-report/index.html` to visualize it) with `gulp coverage`.
## License
Code released under [the MIT license](https://github.com/NewBitalGo/bitcore-lib-bitalgo/blob/master/LICENSE).
Copyright 2013-2017 BitPay, Inc. Bitcore is a trademark maintained by BitPay, Inc.
Copyright 2016-2017 The NewBitalGo.
| 48.125 | 298 | 0.778571 | eng_Latn | 0.623872 |
8a0ce5a6fbeaf876de4409e1ae077044e1f87786 | 25,627 | md | Markdown | memdocs/intune/protect/troubleshoot-scep-certificate-device-to-ndes.md | eltociear/memdocs.it-it | 73bc3d241db9faf3ea30da6db6586ab2873df3e8 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | memdocs/intune/protect/troubleshoot-scep-certificate-device-to-ndes.md | eltociear/memdocs.it-it | 73bc3d241db9faf3ea30da6db6586ab2873df3e8 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | memdocs/intune/protect/troubleshoot-scep-certificate-device-to-ndes.md | eltociear/memdocs.it-it | 73bc3d241db9faf3ea30da6db6586ab2873df3e8 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | ---
title: Risolvere i problemi di comunicazione tra dispositivo gestito e NDES in Microsoft Intune | Microsoft Docs
description: Risolvere i problemi di comunicazione tra dispositivo gestito e server NDES quando vengono usati profili di certificato SCEP per distribuire i certificati con Intune.
keywords: ''
author: brenduns
ms.author: brenduns
manager: dougeby
ms.date: 08/28/2020
ms.topic: troubleshooting
ms.service: microsoft-intune
ms.subservice: configuration
ms.localizationpriority: high
ms.technology: ''
ms.reviewer: lacranda
ms.suite: ems
search.appverid: MET150
ms.custom: intune-azure
ms.collection: M365-identity-device-management
ms.openlocfilehash: 166681c4cdb2ac3652234c12e50bcb185c43dcbe
ms.sourcegitcommit: e2deac196e5e79a183aaf8327b606055efcecc82
ms.translationtype: HT
ms.contentlocale: it-IT
ms.lasthandoff: 09/14/2020
ms.locfileid: "90076176"
---
# <a name="troubleshoot-device-to-ndes-server-communication-for-scep-certificate-profiles-in-microsoft-intune"></a>Risolvere i problemi di comunicazione tra dispositivo e server NDES per i profili di certificato SCEP in Microsoft Intune
Usare le informazioni seguenti per determinare se un dispositivo che ha ricevuto ed elaborato un profilo di certificato Simple Certificate Enrollment Protocol (SCEP) di Intune è in grado di contattare il servizio Registrazione dispositivi di rete (NDES) per presentare una richiesta di verifica. Nel dispositivo viene generata una chiave privata e la richiesta di firma del certificato (CSR) e la richiesta di verifica vengono passate dal dispositivo al server NDES. Per contattare il server NDES, il dispositivo usa l'URI del profilo di certificato SCEP.
Questo articolo fa riferimento al passaggio 2 della [Panoramica del flusso di comunicazione SCEP](troubleshoot-scep-certificate-profiles.md).
## <a name="review-iis-logs-for-a-connection-from-the-device"></a>Esaminare i log di IIS per una connessione dal dispositivo
I log di IIS includono lo stesso tipo di voci per tutte le piattaforme.
1. Nel server NDES aprire il file di log di IIS più recente disponibile nella cartella seguente: *%SystemDrive%\inetpub\logs\logfiles\w3svc1*
2. Cercare nel log voci simili agli esempi seguenti. Entrambi gli esempi contengono uno stato **200**, visualizzato nella parte finale:
`fe80::f53d:89b8:c3e8:5fec%13 GET /certsrv/mscep/mscep.dll/pkiclient.exe operation=GetCACaps&message=default 80 - fe80::f53d:89b8:c3e8:5fec%13 Mozilla/4.0+(compatible;+Win32;+NDES+client) - 200 0 0 186 0.`
And
`fe80::f53d:89b8:c3e8:5fec%13 GET /certsrv/mscep/mscep.dll/pkiclient.exe operation=GetCACert&message=default 80 - fe80::f53d:89b8:c3e8:5fec%13 Mozilla/4.0+(compatible;+Win32;+NDES+client) - 200 0 0 3567 0`
3. Quando il dispositivo contatta IIS, viene registrata una richiesta HTTP GET per mscep.dll.
Esaminare il codice di stato nella parte finale della richiesta:
- **Codice di stato 200**: questo stato indica che la connessione al server NDES è riuscita.
- **Codice di stato 500**: il gruppo IIS_IURS potrebbe non includere le autorizzazioni corrette. Vedere [Codice di stato 500](#status-code-500) più avanti in questo articolo.
- Se il codice di stato non è 200 o 500:
- Vedere [Testare l'URL del server SCEP](#test-the-scep-server-url) più avanti in questo articolo per convalidare la configurazione.
- Per informazioni sui codici di errore meno comuni, vedere [Codice di stato HTTP in IIS 7 e versioni successive](https://support.microsoft.com/help/943891).
Se la richiesta di connessione non viene registrata, il contatto del dispositivo potrebbe essere bloccato sulla rete tra il dispositivo e il server NDES.
## <a name="review-device-logs-for-connections-to-ndes"></a>Esaminare i log del dispositivo cercando le connessioni a NDES
### <a name="android-devices"></a>Dispositivi Android
Esaminare il [log OMADM dei dispositivi](troubleshoot-scep-certificate-profiles.md#logs-for-android-devices). Cercare voci simili alle seguenti, che vengono registrate quando il dispositivo si connette a NDES:
```
2018-02-27T05:16:08.2500000 VERB Event com.microsoft.omadm.platforms.android.certmgr.CertificateEnrollmentManager 18327 10 There are 1 requests
2018-02-27T05:16:08.2500000 VERB Event com.microsoft.omadm.platforms.android.certmgr.CertificateEnrollmentManager 18327 10 Trying to enroll certificate request: ModelName=AC_51bad41f-3854-4eb5-a2f2-0f7a94034ee8%2FLogicalName_39907e78_e61b_4730_b9fa_d44a53e4111c;Hash=1677525787
2018-02-27T05:16:09.5530000 VERB Event org.jscep.transport.UrlConnectionGetTransport 18327 10 Sending GetCACaps(ca) to https://<server>.msappproxy.net/certsrv/mscep/mscep.dll?operation=GetCACaps&message=ca
2018-02-27T05:16:14.6440000 VERB Event org.jscep.transport.UrlConnectionGetTransport 18327 10 Received '200 OK' when sending GetCACaps(ca) to https://<server>.msappproxy.net/certsrv/mscep/mscep.dll?operation=GetCACaps&message=ca
2018-02-27T05:16:21.8220000 VERB Event org.jscep.message.PkiMessageEncoder 18327 10 Encoding message: org.jscep.message.PkcsReq@2b06f45f[messageData=org.<server>.pkcs.PKCS10CertificationRequest@699b3cd,messageType=PKCS_REQ,senderNonce=Nonce [D447AE9955E624A56A09D64E2B3AE76E],transId=251E592A777C82996C7CF96F3AAADCF996FC31FF]
2018-02-27T05:16:21.8790000 VERB Event org.jscep.message.PkiMessageEncoder 18327 10 Signing pkiMessage using key belonging to [dn=CN=<uesrname>; serial=1]
2018-02-27T05:16:21.9580000 VERB Event org.jscep.transaction.EnrollmentTransaction 18327 10 Sending org.<server>.cms.CMSSignedData@ad57775
```
Le voci chiave includono le stringhe di testo di esempio seguenti:
- There are 1 requests
- Received '200 OK' when sending GetCACaps(ca) to https://\<server>.msappproxy.net/certsrv/mscep/mscep.dll?operation=GetCACaps&message=ca
- Signing pkiMessage using key belonging to [dn=CN=\<username>; serial=1]
La connessione viene registrata anche da IIS nella cartella %SystemDrive%\inetpub\logs\LogFiles\W3SVC1\ del server NDES. Di seguito è riportato un esempio:
```
fe80::f53d:89b8:c3e8:5fec%13 GET /certsrv/mscep/mscep.dll operation=GetCACert&message=ca 443 -
fe80::f53d:89b8:c3e8:5fec%13 Dalvik/2.1.0+(Linux;+U;+Android+5.0;+P01M+Build/LRX21V) - 200 0 0 3909 0
fe80::f53d:89b8:c3e8:5fec%13 GET /certsrv/mscep/mscep.dll operation=GetCACaps&message=ca 443 -
fe80::f53d:89b8:c3e8:5fec%13 Dalvik/2.1.0+(Linux;+U;+Android+5.0;+P01M+Build/LRX21V) - 200 0 0 421
```
### <a name="iosipados-devices"></a>Dispositivi iOS/iPadOS
Esaminare il [log di debug dei dispositivi](troubleshoot-scep-certificate-profiles.md#logs-for-ios-and-ipados-devices). Cercare voci simili alle seguenti, che vengono registrate quando il dispositivo si connette a NDES:
```
debug 18:30:53.691033 -0500 profiled Performing synchronous URL request: https://<server>-contoso.msappproxy.net/certsrv/mscep/mscep.dll?operation=GetCACert&message=SCEP%20Authority\
debug 18:30:54.640644 -0500 profiled Performing synchronous URL request: https://<server>-contoso.msappproxy.net/certsrv/mscep/mscep.dll?operation=GetCACaps&message=SCEP%20Authority\
default 18:30:55.483977 -0500 profiled Attempting to retrieve issued certificate...\
debug 18:30:55.487798 -0500 profiled Sending CSR via GET.\
debug 18:30:55.487908 -0500 profiled Performing synchronous URL request: https://<server>-contoso.msappproxy.net/certsrv/mscep/mscep.dll?operation=PKIOperation&message=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
```
Le voci chiave includono le stringhe di testo di esempio seguenti:
- operation=GetCACert
- Attempting to retrieve issued certificate
- Sending CSR via GET
- operation=PKIOperation
### <a name="windows-devices"></a>Dispositivi Windows
In un dispositivo Windows che esegue una connessione a NDES, è possibile aprire il Visualizzatore eventi di Windows e cercare le indicazioni di una connessione riuscita. Le connessioni vengono registrate come ID evento **36** nel log *DeviceManagement-Enterprise-Diagnostics-Provide* > **Admin** dei dispositivi.
Per aprire il log:
1. Nel dispositivo eseguire **eventvwr.msc** per aprire il Visualizzatore eventi di Windows.
2. Espandere **Registri applicazioni e servizi** > **Microsoft** > **Windows** > **DeviceManagement-Enterprise-Diagnostic-Provider** > **Admin**.
3. Cercare l'evento **36**, simile all'esempio seguente, con la riga chiave **SCEP: Creazione della richiesta di certificato completata**:
```
Event ID: 36
Task Category: None
Level: Information
Keywords:
User: <UserSid>
Computer: <Computer Name>
Description:
SCEP: Certificate request generated successfully. Enhanced Key Usage: (1.3.6.1.5.5.7.3.2), NDES URL: (https://<server>/certsrv/mscep/mscep.dll/pkiclient.exe), Container Name: (), KSP Setting: (0x2), Store Location: (0x1).
```
## <a name="troubleshoot-common-errors"></a>Risolvere gli errori comuni
Le sezioni seguenti consentono di risolvere i problemi di connessione comuni da tutte le piattaforme del dispositivo a NDES.
### <a name="status-code-500"></a>Codice di stato 500
Le connessioni simili all'esempio seguente, con codice di stato 500, indicano che il diritto utente *Rappresenta un client dopo l'autenticazione* non è assegnato al gruppo IIS_IURS nel server NDES. Il valore di stato **500** viene visualizzato alla fine:
```
2017-08-08 20:22:16 IP_address GET /certsrv/mscep/mscep.dll operation=GetCACert&message=SCEP%20Authority 443 - 10.5.14.22 profiled/1.0+CFNetwork/811.5.4+Darwin/16.6.0 - 500 0 1346 31
```
**Per risolvere il problema**:
1. Nel server NDES eseguire **secpol.msc** per aprire Criteri di sicurezza locali.
2. Espandere **Criteri locali** e fare clic su **Assegnazione diritti utente**.
3. Fare doppio clic su **Rappresenta un client dopo l'autenticazione** nel riquadro di destra.
4. Fare clic su **Aggiungi gruppo o utente**, immettere **IIS_IURS** nella casella **Immettere i nomi degli oggetti da selezionare** e fare clic su **OK**.
5. Fare clic su **OK**.
6. Riavviare il computer, quindi riprovare a connettersi dal dispositivo.
### <a name="test-the-scep-server-url"></a>Testare l'URL del server SCEP
Usare la procedura seguente per testare l'URL specificato nel profilo di certificato SCEP.
1. In Intune modificare il profilo di certificato SCEP e copiare l'URL del server. L'URL dovrebbe essere simile a `https://contoso.com/certsrv/mscep/mscep.dll`.
2. Aprire un Web browser e passare all'URL del server SCEP. Il risultato dovrebbe essere: **Errore HTTP 403.0 - Accesso negato**. Questo risultato indica che l'URL funziona correttamente.
Se non viene visualizzato questo errore, selezionare il collegamento più simile all'errore visualizzato per ottenere le indicazioni specifiche per il problema:
- [Viene visualizzato un messaggio generale relativo al servizio Registrazione dispositivi di rete (NDES)](#general-ndes-message)
- [Viene visualizzato "Errore: HTTP 503, servizio non disponibile"](#http-error-503)
- [Viene visualizzato l'errore "GatewayTimeout"](#gatewaytimeout)
- [Viene visualizzato "HTTP 414 URI della richiesta troppo lungo"](#http-414-request-uri-too-long)
- [Viene visualizzato "Impossibile visualizzare questa pagina"](#this-page-cant-be-displayed)
- [Viene visualizzato "500 - Errore interno del server"](#internal-server-error)
#### <a name="general-ndes-message"></a>Messaggio NDES generale
Quando si passa all'URL del server SCEP, viene visualizzato il messaggio del servizio Registrazione dispositivi di rete (NDES) seguente:
![URL server SCEP](../protect/media/troubleshoot-scep-certificate-device-to-ndes/ndes-server-url-message.png)
- **Causa**: questo problema rappresenta in genere un problema di installazione del connettore Microsoft Intune.
Mscep.dll è un'estensione ISAPI che intercetta la richiesta in ingresso e visualizza l'errore HTTP 403 se l'installazione non è corretta.
**Risoluzione**: esaminare il file *SetupMsi.log* per determinare se il connettore Microsoft Intune è stato installato correttamente. Nell'esempio seguente *L'installazione è stata completata* e *Installazione riuscita o stato di errore: 0* indicano un'installazione eseguita correttamente:
```
MSI (c) (28:54) [16:13:11:905]: Product: Microsoft Intune Connector -- Installation completed successfully.
MSI (c) (28:54) [16:13:11:999]: Windows Installer installed the product. Product Name: Microsoft Intune Connector. Product Version: 6.1711.4.0. Product Language: 1033. Manufacturer: Microsoft Corporation. Installation success or error status: 0.
```
Se l'installazione non riesce, rimuovere il connettore Microsoft Intune e quindi reinstallarlo.
Se l'installazione è stata completata correttamente e si continua a ricevere il messaggio NDES generale, eseguire il comando **iisreset** per riavviare IIS.
#### <a name="http-error-503"></a>Errore HTTP 503
Quando si passa all'URL del server SCEP, viene visualizzato l'errore seguente:
![Errore HTTP 503. Il servizio non è disponibile](../protect/media/troubleshoot-scep-certificate-device-to-ndes/service-unavailable.png)
Questo problema in genere è dovuto al fatto che il pool di applicazioni **SCEP** in IIS non è stato avviato. Nel server NDES aprire **Gestione IIS** e passare a **Pool di applicazioni**. Individuare il pool di applicazioni **SCEP** e verificare che sia stato avviato.
Se il pool di applicazioni SCEP non è stato avviato, controllare il registro eventi dell'applicazione nel server:
1. Nel dispositivo eseguire **eventvwr.msc** per aprire **Visualizzatore eventi** e passare a **Registri di Windows** > **Applicazione**.
2. Cercare un evento simile all'esempio seguente in cui il pool di applicazioni si arresta in modo anomalo quando viene ricevuta una richiesta:
```
Log Name: Application
Source: Application Error
Event ID: 1000
Task Category: Application Crashing Events
Level: Error
Keywords: Classic
Description: Faulting application name: w3wp.exe, version: 8.5.9600.16384, time stamp: 0x5215df96
Faulting module name: ntdll.dll, version: 6.3.9600.18821, time stamp: 0x59ba86db
Exception code: 0xc0000005
```
**Cause comuni di un arresto anomalo del pool di applicazioni**:
- **Causa 1**: sono presenti certificati della CA intermedi (non autofirmati) nell'archivio certificati Autorità di certificazione radice disponibile nell'elenco locale del server NDES.
**Risoluzione**: rimuovere i certificati intermedi dall'archivio certificati Autorità di certificazione radice disponibile nell'elenco locale e quindi riavviare il server NDES.
Per identificare tutti i certificati intermedi nell'archivio certificati Autorità di certificazione radice disponibile nell'elenco locale, eseguire il cmdlet di PowerShell seguente: `Get-Childitem -Path cert:\LocalMachine\root -Recurse | Where-Object {$_.Issuer -ne $_.Subject}`
Un certificato che ha gli stessi valori **Rilasciato a** e **Rilasciato da** è un certificato radice. In caso contrario è un certificato intermedio.
Dopo aver rimosso i certificati e aver riavviato il server, eseguire di nuovo il cmdlet di PowerShell per verificare che non siano presenti certificati intermedi. Se sono presenti certificati intermedi, verificare se Criteri di gruppo effettua il push di certificati intermedi nel server NDES. In tal caso, escludere il server NDES da Criteri di gruppo e rimuovere di nuovo i certificati intermedi.
- **Causa 2**: gli URL nell'elenco di revoche di certificati (CRL) sono bloccati o irraggiungibili per i certificati usati dal connettore di certificati di Intune.
**Risoluzione**: abilitare la registrazione aggiuntiva per raccogliere altre informazioni:
1. Aprire il Visualizzatore eventi, fare clic su **Visualizza**, assicurarsi che sia selezionata l'opzione **Visualizza registri analitici e di debug**.
2. Passare a **Registri applicazioni e servizi** > **Microsoft** > **Windows** > **CAPI2** > **Operativo**, fare clic con il pulsante destro del mouse su **Operativo**, quindi fare clic su **Attiva registro**.
3. Dopo aver abilitato la registrazione CAPI2, riprodurre il problema ed esaminare il registro eventi per risolvere il problema.
- **Causa 3**: l'autorizzazione IIS per **CertificateRegistrationSvc** ha l'**Autenticazione di Windows** abilitata.
**Risoluzione**: abilitare **Autenticazione anonima** e disabilitare **Autenticazione di Windows**, quindi riavviare il server NDES.
![Autorizzazioni IIS](../protect/media/troubleshoot-scep-certificate-device-to-ndes/iis-permissions.png)
- **Causa 4**: Il certificato del modulo NDESPolicy è scaduto.
Il log CAPI2 (vedere la risoluzione della Causa 2) visualizzerà gli errori relativi al certificato a cui fa riferimento "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MSCEP\Modules\NDESPolicy\NDESCertThumbprint" al di fuori del periodo di validità del certificato.
**Risoluzione**: aggiornare il riferimento con l'identificazione personale di un certificato valido.
1. Identificare un certificato di sostituzione:
- Rinnovare il certificato esistente
- Selezionare un certificato diverso con proprietà simili come ad esempio oggetto, EKU, tipo di chiave, lunghezza e così via.
- Registrare un nuovo certificato
2. Esportare la chiave del Registro di sistema `NDESPolicy` per eseguire il backup dei valori correnti.
3. Sostituire i dati del valore del Registro di sistema `NDESCertThumbprint` con l'identificazione personale del nuovo certificato, rimuovendo tutti gli spazi vuoti e convertendo il testo in minuscolo.
4. Riavviare i pool di applicazioni IIS NDES o eseguire `iisreset` da un prompt dei comandi con privilegi elevati.
#### <a name="gatewaytimeout"></a>GatewayTimeout
Quando si passa all'URL del server SCEP, viene visualizzato l'errore seguente:
![Errore Gatewaytimeout](../protect/media/troubleshoot-scep-certificate-device-to-ndes/gateway-timeout.png)
- **Causa**: il servizio **Microsoft AAD Application Proxy Connector** non è stato avviato.
**Risoluzione**: eseguire **services.msc** e quindi verificare che il servizio **Microsoft AAD Application Proxy Connector** sia in esecuzione e che **Tipo di avvio** sia impostato su **Automatico**.
#### <a name="http-414-request-uri-too-long"></a>HTTP 414 URI della richiesta troppo lungo
Quando si passa all'URL del server SCEP, viene visualizzato l'errore seguente: `HTTP 414 Request-URI Too Long`
- **Causa**: il filtro delle richieste IIS non è configurato per il supporto degli URL lunghi (query) ricevuti dal servizio NDES. Questo supporto viene configurato quando si [configura il servizio NDES](certificates-scep-configure.md#configure-the-ndes-service) per l'uso con l'infrastruttura per SCEP.
- **Risoluzione**: configurare il supporto degli URL lunghi.
1. Nel server NDES server aprire Gestione IIS, selezionare **Sito Web predefinito** > **Filtro richieste** > **Modifica impostazioni funzionalità** per aprire la pagina **Modifica impostazioni di filtro richieste**.
2. Configurare le seguenti impostazioni:
- **Lunghezza massima URL (byte)** = 65534
- **Lunghezza massima stringa di query in (byte)** = 65534
3. Selezionare **OK** per salvare la configurazione e chiudere Gestione IIS.
4. Convalidare questa configurazione individuando la chiave del Registro di sistema seguente per verificare che abbia i valori indicati:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\HTTP\Parameters
I valori seguenti sono impostati come voci DWORD:
- Nome: **MaxFieldLength**, con un valore decimale di **65534**
- Nome: **MaxRequestBytes**, con un valore decimale di **65534**
5. Riavviare il server NDES.
#### <a name="this-page-cant-be-displayed"></a>Impossibile visualizzare questa pagina
È stato configurato Azure AD Application Proxy. Quando si passa all'URL del server SCEP, viene visualizzato l'errore seguente:
`This page can't be displayed`
- **Causa**: questo problema si verifica quando l'URL esterno SCEP non è corretto nella configurazione di Application Proxy. Un esempio di questo URL è `https://contoso.com/certsrv/mscep/mscep.dll`.
**Risoluzione**: usare il dominio predefinito di *yourtenant.msappproxy.net* per l'URL esterno SCEP nella configurazione di Application Proxy.
#### <a name="500---internal-server-error"></a><a name="internal-server-error"></a>500 - Errore interno del server
Quando si passa all'URL del server SCEP, viene visualizzato l'errore seguente:
![500 - Errore interno del server](../protect/media/troubleshoot-scep-certificate-device-to-ndes/500-internal-server-error.png)
- **Causa 1**: l'account del servizio NDES è bloccato o la password è scaduta.
**Risoluzione**: sbloccare l'account o reimpostare la password.
- **Causa 2**: i certificati MSCEP-RA sono scaduti.
**Risoluzione**: se i certificati MSCEP-RA sono scaduti, reinstallare il ruolo NDES o richiedere nuovi certificati di Crittografia CEP e Agente di registrazione di Exchange (richiesta offline).
Per richiedere nuovi certificati, seguire questa procedura:
1. Nella CA (Certificate Authority) o nella CA emittente, aprire la MMC Modelli di certificato. Verificare che l'utente connesso e il server NDES abbiano le autorizzazioni **Lettura** e **Registrazione** per i modelli di certificato di Crittografia CEP e Agente di registrazione di Exchange (richiesta offline).
2. Controllare i certificati scaduti nel server NDES, copiare le informazioni **Oggetto** del certificato.
3. Aprire la MMC Certificati per l'**Account del computer**.
4. Espandere **Personale**, fare clic con il pulsante destro del mouse su **Certificati**, quindi selezionare **Tutte le attività** > **Richiedi nuovo certificato**.
5. Nella pagina **Richiedi certificato** selezionare **Crittografia CEP**, quindi fare clic su **Sono necessarie ulteriori informazioni per registrare il certificato. Per configurare le impostazioni, fare clic qui**.
![Selezionare la crittografia CEP](../protect/media/troubleshoot-scep-certificate-device-to-ndes/select-scep-encryption.png)
6. In **Proprietà certificato** fare clic sulla scheda **Soggetto**, specificare il **Nome soggetto** in base alle informazioni raccolte nel passaggio 2, fare clic su **Aggiungi**, quindi su **OK**.
7. Completare la registrazione certificato.
8. Aprire la MMC Certificati per l'**Account dell'utente**.
Quando si esegue la registrazione per il certificato di Agente di registrazione di Exchange (richiesta offline), è necessario eseguirla nel contesto utente poiché il **Subject Type** del modello di certificato è impostato su **Utente**.
9. Espandere **Personale**, fare clic con il pulsante destro del mouse su **Certificati**, quindi selezionare **Tutte le attività** > **Richiedi nuovo certificato**.
10. Nella pagina **Richiedi certificato** selezionare **Agente di registrazione di Exchange (richiesta offline)** , quindi fare clic su **Sono necessarie ulteriori informazioni per registrare il certificato. Per configurare le impostazioni, fare clic qui**.
![Selezionare l'agente di registrazione di Exchange](../protect/media/troubleshoot-scep-certificate-device-to-ndes/select-exchange-enrollment-agent.png)
11. In **Proprietà certificato** fare clic sulla scheda **Soggetto**, specificare il **Nome soggetto** in base alle informazioni raccolte nel passaggio 2, fare clic su **Aggiungi**.
![Proprietà del certificato](../protect/media/troubleshoot-scep-certificate-device-to-ndes/certificate-properties.png)
Selezionare la scheda **Chiave privata**, selezionare **Consenti esportazione chiave privata**, quindi fare clic su **OK**.
![Chiave privata](../protect/media/troubleshoot-scep-certificate-device-to-ndes/private-key.png)
12. Completare la registrazione certificato.
13. Esportare il certificato di Agente di registrazione di Exchange (richiesta offline) dall'archivio certificati dell'utente corrente. Nell'Esportazione guidata certificati selezionare **Sì, esporta la chiave privata**.
14. Importare il certificato nell'archivio certificati del computer locale.
15. Nella MMC Certificati eseguire l'azione seguente per ogni nuovo certificato:
Fare clic con il pulsante destro del mouse sul certificato, fare clic su **Tutte le attività** > **Gestisci chiavi private**, aggiungere l'autorizzazione **Lettura** all'account del servizio NDES.
16. Eseguire il comando **iisreset** per riavviare IIS.
## <a name="next-steps"></a>Passaggi successivi
Se il dispositivo si connette correttamente al server NDES per presentare la richiesta di certificato, il passaggio successivo è quello di rivedere il [modulo criteri dei connettori di certificato di Intune](troubleshoot-scep-certificate-ndes-policy-module.md).
| 69.075472 | 1,006 | 0.780037 | ita_Latn | 0.9879 |
8a0d3c8d616625dc3acf6ea407af715e6589c722 | 3,935 | md | Markdown | docs/framework/unmanaged-api/metadata/corattributetargets-enumeration.md | Jteve-Sobs/docs.de-de | 06092136f031dda8715cfe6928a4fdc0ec6c0899 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | docs/framework/unmanaged-api/metadata/corattributetargets-enumeration.md | Jteve-Sobs/docs.de-de | 06092136f031dda8715cfe6928a4fdc0ec6c0899 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | docs/framework/unmanaged-api/metadata/corattributetargets-enumeration.md | Jteve-Sobs/docs.de-de | 06092136f031dda8715cfe6928a4fdc0ec6c0899 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | ---
title: CorAttributeTargets-Enumeration
ms.date: 03/30/2017
api_name:
- CorAttributeTargets
api_location:
- mscoree.dll
api_type:
- COM
f1_keywords:
- CorAttributeTargets
helpviewer_keywords:
- CorAttributeTargets enumeration [.NET Framework metadata]
ms.assetid: 694c0fa0-7011-41a9-9dfd-f0e16ea574b5
topic_type:
- apiref
ms.openlocfilehash: 51741aa3a6d965c1e9743081628d8ad62e8fb04e
ms.sourcegitcommit: 7588136e355e10cbc2582f389c90c127363c02a5
ms.translationtype: MT
ms.contentlocale: de-DE
ms.lasthandoff: 03/12/2020
ms.locfileid: "79176200"
---
# <a name="corattributetargets-enumeration"></a>CorAttributeTargets-Enumeration
Gibt die Anwendungselemente an, auf die Attribute angewendet werden können.
## <a name="syntax"></a>Syntax
```cpp
typedef enum CorAttributeTargets
{
catAssembly = 0x0001,
catModule = 0x0002,
catClass = 0x0004,
catStruct = 0x0008,
catEnum = 0x0010,
catConstructor = 0x0020,
catMethod = 0x0040,
catProperty = 0x0080,
catField = 0x0100,
catEvent = 0x0200,
catInterface = 0x0400,
catParameter = 0x0800,
catDelegate = 0x1000,
catGenericParameter = 0x4000,
catAll =
catAssembly | catModule | catClass | catStruct |
catEnum | catConstructor | catMethod | catProperty |
catField | catEvent | catInterface | catParameter |
catDelegate | catGenericParameter,
catClassMembers =
catClass | catStruct | catEnum | catConstructor |
catMethod | catProperty | catField | catEvent |
catDelegate | catInterface
} CorAttributeTargets;
```
## <a name="members"></a>Members
|Member|Beschreibung|
|------------|-----------------|
|`catAssembly`|Auf Assemblys können Attribute angewendet werden.|
|`catModule`|Attribute können auf ein portables ausführbares Modul (.dll oder .exe) angewendet werden.|
|`catClass`|Auf Klassen können Attribute angewendet werden.|
|`catStruct`|Auf Strukturen, d. h. auf Werttypen, können Attribute angewendet werden.|
|`catEnum`|Auf Enumerationen können Attribute angewendet werden.|
|`catConstructor`|Auf Konstruktoren können Attribute angewendet werden.|
|`catMethod`|Auf Methoden können Attribute angewendet werden.|
|`catProperty`|Auf Eigenschaften können Attribute angewendet werden.|
|`catField`|Auf Felder können Attribute angewendet werden.|
|`catEvent`|Auf Ereignisse können Attribute angewendet werden.|
|`catInterface`|Auf Schnittstellen können Attribute angewendet werden.|
|`catParameter`|Auf Parameter können Attribute angewendet werden.|
|`catDelegate`|Auf Delegaten können Attribute angewendet werden.|
|`catGenericParameter`|Auf generische Parameter können Attribute angewendet werden.|
|`catAll`|Auf jedes Anwendungselement können Attribute angewendet werden.|
|`catClassMembers`|Attribute können auf einen Member einer Klasse angewendet werden.|
## <a name="remarks"></a>Bemerkungen
Die `CorAttributeTargets` Enumerationswerte können mit einem bitweisen ODER-Vorgang kombiniert werden, um die bevorzugte Kombination zu erhalten.
Die `CorAttributeTargets` Parallelen <xref:System.AttributeTargets?displayProperty=nameWithType> zur verwalteten Enumeration.
## <a name="requirements"></a>Requirements (Anforderungen)
**Plattformen:** Informationen finden Sie unter [Systemanforderungen](../../../../docs/framework/get-started/system-requirements.md).
**Kopfzeile:** CorHdr.h
**.NET Framework-Versionen:** [!INCLUDE[net_current_v10plus](../../../../includes/net-current-v10plus-md.md)]
## <a name="see-also"></a>Weitere Informationen
- [Metadatenenumerationen](../../../../docs/framework/unmanaged-api/metadata/metadata-enumerations.md)
| 40.56701 | 148 | 0.698094 | deu_Latn | 0.634823 |
8a0d45d1bcdb20ca3b8f97f7a7649f8006cef638 | 6,409 | md | Markdown | business-central/service-service-posting.md | MicrosoftDocs/dynamics365smb-docs-pr.es-es | 5ed72f3c5f65f0b0287b214eb20430a86d85d169 | [
"CC-BY-4.0",
"MIT"
] | 4 | 2017-08-28T10:41:43.000Z | 2021-12-09T14:44:50.000Z | business-central/service-service-posting.md | MicrosoftDocs/dynamics365smb-docs-pr.es-es | 5ed72f3c5f65f0b0287b214eb20430a86d85d169 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | business-central/service-service-posting.md | MicrosoftDocs/dynamics365smb-docs-pr.es-es | 5ed72f3c5f65f0b0287b214eb20430a86d85d169 | [
"CC-BY-4.0",
"MIT"
] | 1 | 2019-10-12T19:49:50.000Z | 2019-10-12T19:49:50.000Z | ---
title: Registro de servicio
description: La funcionalidad de registro de servicios le permite procesar los documentos de manera eficaz y mantener una política de servicio al cliente satisfactoria.
author: SorenGP
ms.service: dynamics365-business-central
ms.topic: conceptual
ms.devlang: na
ms.tgt_pltfrm: na
ms.workload: na
ms.search.keywords: ''
ms.date: 06/23/2021
ms.author: edupont
ms.openlocfilehash: 8bdfb6986f16c580cef6e1fc7bdde2ef25dab14b
ms.sourcegitcommit: a7cb0be8eae6ece95f5259d7de7a48b385c9cfeb
ms.translationtype: HT
ms.contentlocale: es-ES
ms.lasthandoff: 07/08/2021
ms.locfileid: "6443034"
---
# <a name="service-posting"></a>Registro de servicio
La funcionalidad de registro de servicios le permite procesar los documentos de manera eficaz y mantener una política de servicio al cliente satisfactoria. Puede crear y actualizar documentos registrados, así como crear movimientos en el área de servicio y en otros módulos para garantizar una correcta actualización.
> [!NOTE]
> A continuación se describe el registro del servicio independientemente del modo en que los artículos se controlan en el almacén.
>
> En una ubicación en la que no se haya establecido el control de almacén como elemento obligatorio, las acciones de registro se realizan directamente desde la página **Líneas servicio**. En ubicaciones que requieran control de almacén, las acciones de registro descritas, salvo Enviar y Consumir, se realizan indirectamente mediante distintas funciones de envío de almacén, dependiendo de la configuración. Para obtener más información, vea [Realizar picking de productos con picking inventario](warehouse-how-to-pick-items-with-inventory-picks.md).
## <a name="ship"></a>Envío
La opción enviar permite registrar el tiempo y los productos que se hayan especificado en las líneas de un pedido de servicio una vez haya finalizado el servicio. Se crea un envío registrado y se llevan a cabo actualizaciones en el módulo Inventario y otros módulos de [!INCLUDE[prod_short](includes/prod_short.md)] a fin de reflejar que los productos se han excluido del inventario y se han enviado al cliente. En concreto, se generan movimientos de producto, de valores, de servicio y de garantía.
Si el almacén está configurado para requerir el control de almacén, el envío y el movimiento de los productos de línea de servicio funcionan de la misma forma que para otros documentos de origen. La única diferencia es que los productos de línea de servicio pueden consumirse externa o internamente, lo cual requiere dos funciones diferentes de lanzamiento.
## <a name="invoice"></a>Facturar
Esta opción se utiliza a fin de emitir una factura para el cliente al que desea cobrar el servicio. Normalmente, la factura recoge la diferencia entre la cantidad enviada registrada por la función **Registrar envío** y la cantidad consumida registrada por la función **Registrar consumo**. No se puede facturar algo que no se ha enviado. Al ejecutar la función **Registrar factura**, crea una factura de servicio registrada y actualiza los documentos registrados antes de concordarlos con las cantidades que se incluyen en la factura emitida. Al igual que en otros procedimientos de registro, se generan los movimientos correspondientes, incluidos los de contabilidad.
## <a name="ship-and-invoice"></a>Enviar y facturar
La opción de envío y facturación permite realizar envíos de servicio y de factura al mismo tiempo.
## <a name="ship-and-consume"></a>Enviar y consumir
Con la opción consumo puede registrar los productos, los costes o las horas que se hayan empleado en un servicio pero que no se pueden incluir en la factura del cliente. No se emite una factura, pero puede emitir documentos de envío y de consumo de servicio de forma simultánea a fin de reflejar que algunos productos u horas se han proporcionado al cliente sin cargo alguno. Asimismo, se crean los movimientos correspondientes para registrar el consumo.
> [!NOTE]
> El procedimiento de registro de servicios permite realizar un registro parcial. Puede crear un envío o factura parciales rellenando los campos **Cantidad a enviar** y **Cdad. a facturar** en las líneas de servicio individuales de los pedidos de servicio antes del registro. Tenga en cuenta que no se puede crear una factura de algo que no se ha enviado. Es decir, para poder facturar, debe haber registrado un envío, o bien debe elegir enviar y facturar al mismo tiempo.
Una vez finalizado el registro, podrá ver los documentos de servicio registrados desde las páginas correspondientes **Fact. ventas (servicio) regis.** y **Envío servicio registrado**. Los movimientos registrados que se han creado pueden verse en diversas páginas que contienen movimientos registrados, como **Movs. contabilidad**, **Movs. producto**, **Movs. almacén**, **Movs. servicio**, **Movs. proyectos** y **Movs. garantía**.
## <a name="to-view-information-about-a-posted-service-document"></a>Para ver información sobre un documento de servicio registrado
Cuando se registra una factura, un envío o un abono de servicio, la información del documento se transfiere a las páginas **Fact. ventas (servicio) regis.**, **Envío servicio registrado** o **Abono ventas (servicio) regis.** respectivamente. No puede escribir, modificar ni eliminar información en estas páginas. En ellas puede imprimir un albarán, una factura o un abono.
El procedimiento siguiente utiliza una factura de servicio registrada como ejemplo, pero es posible aplicar el mismo procedimiento a los envíos de servicio registrados y al histórico de abonos.
1. Elija el icono ![Bombilla que abre la función Dígame.](media/ui-search/search_small.png "Dígame qué desea hacer") , escriba **Factura de servicio registrada** y, a continuación, elija el vínculo relacionado.
2. Abra la factura de servicio registrada que desee ver.
3. Para obtener un resumen de la factura registrada, elija la acción **Estadísticas**.
Se abre la página **Estad. pedido servicio**. Dicha página muestra información tal como la cantidad, el importe, el IVA, el coste, los beneficios y el crédito máximo del cliente en el documento registrado.
## <a name="see-also"></a>Consulte también
[Registrar pedidos de servicio](service-how-to-post-service-orders.md)
[Crear pedidos de servicio](service-how-to-create-service-orders.md)
[!INCLUDE[footer-include](includes/footer-banner.md)] | 101.730159 | 670 | 0.790451 | spa_Latn | 0.997046 |
8a0d47494d5235c5ff72cdcd7bbd43a52e175735 | 17,711 | md | Markdown | examples/pxScene2d/external/libnode-v8.9.4/doc/guides/maintaining-V8.md | maciej-barczak-red/pxCore | a4c320cfa0f8c5629d7de34ddb2c393b18ac2a50 | [
"Apache-2.0"
] | null | null | null | examples/pxScene2d/external/libnode-v8.9.4/doc/guides/maintaining-V8.md | maciej-barczak-red/pxCore | a4c320cfa0f8c5629d7de34ddb2c393b18ac2a50 | [
"Apache-2.0"
] | null | null | null | examples/pxScene2d/external/libnode-v8.9.4/doc/guides/maintaining-V8.md | maciej-barczak-red/pxCore | a4c320cfa0f8c5629d7de34ddb2c393b18ac2a50 | [
"Apache-2.0"
] | null | null | null | # Maintaining V8 in Node.js
## Background
V8 follows the Chromium release schedule. The support horizon for Chromium is
very different from the support horizon that Node.js needs to provide to its
users. As a result Node.js needs to support a version of V8 for quite a bit
longer than what upstream needs to support. Since V8 doesn't have an LTS
supported branch, there is no official process around how the V8 branches in
Node.js are maintained.
This document attempts to document the current processes and proposes a workflow
for maintaining the V8 branches in Node.js LTS and Current releases and how the
Node.js and V8 teams at Google can help.
## V8 Release Schedule
V8 and Chromium follow a [roughly 6-week release cadence](https://www.chromium.org/developers/calendar). At any given time there are three V8 branches that are **active**.
For example, at the time of this writing:
* **Stable**: V8 5.4 is currently shipping as part of Chromium stable. This branch was created approx. 6 weeks before from when V8 5.3 shipped as stable.
* **Beta**: V8 5.5 is currently in beta. It will be promoted to stable next; approximately 6 weeks after V8 5.4 shipped as stable.
* **Master**: V8 tip-of-tree corresponds to V8 5.6. This branch gets regularly released as part of the Chromium **canary** builds. This branch will be promoted to beta next when V8 5.5 ships as stable.
All older branches are considered **abandoned**, and are not maintained by the
V8 team.
### V8 merge process overview
The process for backporting bug fixes to active branches is officially documented [on the V8 wiki](https://github.com/v8/v8/wiki/Merging%20&%20Patching). The summary of the process is:
* V8 only supports active branches. There is no testing done on any branches older than the current stable/beta/master.
* A fix needing backport is tagged w/ *merge-request-x.x* tag. This can be done by anyone interested in getting the fix backported. Issues with this tag are reviewed by the V8 team regularly as candidates for backporting.
* Fixes need some 'baking time' before they can be approved for backporting. This means waiting a few days to ensure that no issues are detected on the canary/beta builds.
* Once ready, the issue is tagged w/ *merge-approved-x.x* and one can do the actual merge by using the scripts on the [wiki page](https://github.com/v8/v8/wiki/Merging%20&%20Patching).
* Merge requests to an abandoned branch will be rejected.
* Only bug fixes are accepted for backporting.
## Node.js Support Requirements
At any given time Node.js needs to be maintaining a few different V8 branches
for the various Current, LTS, and nightly releases. At present this list
includes the following branches<sup>1</sup>:
<table>
<tr>
<td><strong>Release</strong>
</td>
<td><strong>Support Start</strong>
</td>
<td><strong>Support End</strong>
</td>
<td><strong>V8 version</strong>
</td>
<td><strong>V8 branch released</strong>
</td>
<td><strong>V8 branch abandoned</strong>
</td>
</tr>
<tr>
<td>Node.js 4.x
</td>
<td>2015-10-01
</td>
<td>April 2018
</td>
<td>4.5
</td>
<td>2015-09-01
</td>
<td>2015-10-13
</td>
</tr>
<tr>
<td>Node.js 6.x
</td>
<td>2016-04-01
</td>
<td>April 2019
</td>
<td>5.1
</td>
<td>2016-05-31
</td>
<td>2016-06-26
</td>
</tr>
<tr>
<td>Node.js 8.x
</td>
<td>2017-05-30
</td>
<td>December 2019
</td>
<td>6.1 (soon to be 6.2)
</td>
<td>2017-10-17 (6.2)
</td>
<td>~2017-12-05 (6.2)
</td>
</tr>
<tr>
<td>Node.js 9.x
</td>
<td>2017-10-31
</td>
<td>April 2018
</td>
<td>6.2
</td>
<td>2017-10-17
</td>
<td>~2017-12-05
</td>
</tr>
<tr>
<td>master
</td>
<td>N/A
</td>
<td>N/A
</td>
<td>6.2
</td>
<td>2017-10-17
</td>
<td>~2017-12-05
</td>
</tr>
</table>
The versions of V8 used in Node.js v4.x and v6.x have already been abandoned by
upstream V8. However, Node.js needs to continue supporting these branches for
many months (Current branches) or several years (LTS branches).
## Maintenance Process
Once a bug in Node.js has been identified to be caused by V8, the first step is
to identify the versions of Node.js and V8 affected. The bug may be present in
multiple different locations, each of which follows a slightly different
process.
* Unfixed bugs. The bug exists in the V8 master branch.
* Fixed, but needs backport. The bug may need porting to one or more branches.
* Backporting to active branches.
* Backporting to abandoned branches.
* Backports identified by the V8 team. Bugs identified by upstream V8 that we haven't encountered in Node.js yet.
### Unfixed Upstream Bugs
If the bug can be reproduced on the [`vee-eight-lkgr` branch](https://github.com/v8/node/tree/vee-eight-lkgr), Chromium canary, or V8 tip-of-tree, and the test case is valid, then the bug needs to be fixed upstream first.
* Start by opening a bug upstream [using this template](https://bugs.chromium.org/p/v8/issues/entry?template=Node.js%20upstream%20bug).
* Make sure to include a link to the corresponding Node.js issue (if one exists).
* If the fix is simple enough, you may fix it yourself; [contributions](https://github.com/v8/v8/wiki/Contributing) are welcome.
* V8's build waterfall tests your change.
* Once the bug is fixed it may still need backporting, if it exists in other V8 branches that are still active or are branches that Node.js cares about. Follow the process for backporting below.
### Backporting to Active Branches
If the bug exists in any of the active V8 branches, we may need to get the fix backported. At any given time there are [two active branches](https://build.chromium.org/p/client.v8.branches/console) (beta and stable) in addition to master. The following steps are needed to backport the fix:
* Identify which version of V8 the bug was fixed in.
* Identify if any active V8 branches still contain the bug:
* A tracking bug is needed to request a backport.
* If there isn't already a V8 bug tracking the fix, open a new merge request bug using this [Node.js specific template](https://bugs.chromium.org/p/v8/issues/entry?template=Node.js%20merge%20request).
* If a bug already exists
* Add a reference to the GitHub issue.
* Attach *merge-request-x.x* labels to the bug for any active branches that still contain the bug. (e.g. merge-request-5.3, merge-request-5.4)
* Add ofrobots-at-google.com to the cc list.
* Once the merge has been approved, it should be merged using the [merge script documented in the V8 wiki](https://github.com/v8/v8/wiki/Merging%20&%20Patching). Merging requires commit access to the V8 repository. If you don't have commit access you can indicate someone on the V8 team can do the merge for you.
* It is possible that the merge request may not get approved, for example if it is considered to be a feature or otherwise too risky for V8 stable. In such cases we float the patch on the Node.js side. See the process on 'Backporting to Abandoned branches'.
* Once the fix has been merged upstream, it can be picked up during an update of the V8 branch, (see below).
### Backporting to Abandoned Branches
Abandoned V8 branches are supported in the Node.js V8 repository. The fix needs
to be cherry-picked in the Node.js repository and V8-CI must test the change.
* For each abandoned V8 branch corresponding to an LTS branch that is affected by the bug:
* Open a cherry-pick PR on nodejs/node targeting the appropriate *vY.x-staging* branch (e.g. *v6.x-staging* to fix an issue in V8-5.1).
* Increase the patch level version in `v8-version.h`. This will not cause any problems with versioning because V8 will not publish other patches for this branch, so Node.js can effectively bump the patch version.
* In some cases the patch may require extra effort to merge in case V8 has changed substantially. For important issues we may be able to lean on the V8 team to get help with reimplementing the patch.
* Run the Node.js [V8-CI](https://ci.nodejs.org/job/node-test-commit-v8-linux/) in addition to the [Node.js CI](https://ci.nodejs.org/job/node-test-pull-request/).
An example for workflow how to cherry-pick consider the bug
[RegExp show inconsistent result with other browsers](https://crbug.com/v8/5199).
From the bug we can see that it was merged by V8 into 5.2 and 5.3, and not into
V8 5.1 (since it was already abandoned). Since Node.js `v6.x` uses V8 5.1, the
fix needed to be cherry-picked. To cherry-pick, here's an example workflow:
* Download and apply the commit linked-to in the issue (in this case a51f429). `curl -L https://github.com/v8/v8/commit/a51f429.patch | git am -3 --directory=deps/v8`. If the branches have diverged significantly, this may not apply cleanly. It may help to try to cherry-pick the merge to the oldest branch that was done upstream in V8. In this example, this would be the patch from the merge to 5.2. The hope is that this would be closer to the V8 5.1, and has a better chance of applying cleanly. If you're stuck, feel free to ping @ofrobots for help.
* Modify the commit message to match the format we use for V8 backports and replace yourself as the author. `git commit --amend --reset-author`. You may want to add extra description if necessary to indicate the impact of the fix on Node.js. In this case the original issue was descriptive enough. Example:
```console
deps: cherry-pick a51f429 from V8 upstream
Original commit message:
[regexp] Fix case-insensitive matching for one-byte subjects.
The bug occurs because we do not canonicalize character class ranges
before adding case equivalents. While adding case equivalents, we abort
early for one-byte subject strings, assuming that the ranges are sorted.
Which they are not.
R=marja@chromium.org
BUG=v8:5199
Review-Url: https://codereview.chromium.org/2159683002
Cr-Commit-Position: refs/heads/master@{#37833}
Refs: https://github.com/v8/v8/commit/a51f429772d1e796744244128c9feeab4c26a854
PR-URL: https://github.com/nodejs/node/pull/7833
```
* Open a PR against the `v6.x-staging` branch in the Node.js repo. Launch the normal and [V8-CI](https://ci.nodejs.org/job/node-test-commit-v8-linux/) using the Node.js CI system. We only needed to backport to `v6.x` as the other LTS branches weren't affected by this bug.
### Backports Identified by the V8 team
For bugs found through the browser or other channels, the V8 team marks bugs
that might be applicable to the abandoned branches in use by Node.js. This is
done through manual tagging by the V8 team and through an automated process that
tags any fix that gets backported to the stable branch (as it is likely
candidate for backporting further).
Such fixes are tagged with the following labels in the V8 issue tracker:
* `NodeJS-Backport-Review` ([V8](https://bugs.chromium.org/p/v8/issues/list?can=1&q=label%3ANodeJS-Backport-Review), [Chromium](https://bugs.chromium.org/p/chromium/issues/list?can=1&q=label%3ANodeJS-Backport-Review)): to be reviewed if this is applicable to abandoned branches in use by Node.js. This list if regularly reviewed by the Node.js team at Google to determine applicability to Node.js.
* `NodeJS-Backport-Approved` ([V8](https://bugs.chromium.org/p/v8/issues/list?can=1&q=label%3ANodeJS-Backport-Approved), [Chromium](https://bugs.chromium.org/p/chromium/issues/list?can=1&q=label%3ANodeJS-Backport-Approved)): marks bugs that are deemed relevant to Node.js and should be backported.
* `NodeJS-Backport-Done` ([V8](https://bugs.chromium.org/p/v8/issues/list?can=1&q=label%3ANodeJS-Backport-Done), [Chromium](https://bugs.chromium.org/p/chromium/issues/list?can=1&q=label%3ANodeJS-Backport-Done)): Backport for Node.js has been performed already.
* `NodeJS-Backport-Rejected` ([V8](https://bugs.chromium.org/p/v8/issues/list?can=1&q=label%3ANodeJS-Backport-Rejected), [Chromium](https://bugs.chromium.org/p/chromium/issues/list?can=1&q=label%3ANodeJS-Backport-Rejected)): Backport for Node.js is not desired.
The backlog of issues with such is regularly reviewed by the node-team at Google
to shepherd through the backport process. External contributors are welcome to
collaborate on the backport process as well. Note that some of the bugs may be
security issues and will not be visible to external collaborators.
## Updating V8
Node.js keeps a vendored copy of V8 inside of deps/ directory. In addition
Node.js may need to float patches that do not exist upstream. This means that
some care may need to be taken to update the vendored copy of V8.
### Minor updates (patch level)
Because there may be floating patches on the version of V8 in Node.js, it is
safest to apply the patch level updates as a patch. For example, imagine that
upstream V8 is at 5.0.71.47 and Node.js is at 5.0.71.32. It would be best to
compute the diff between these tags on the V8 repository, and then apply that
patch on the copy of V8 in Node.js. This should preserve the patches/backports
that Node.js may be floating (or else cause a merge conflict).
The rough outline of the process is:
```shell
# Assuming your fork of Node.js is checked out in $NODE_DIR
# and you want to update the Node.js master branch.
# Find the current (OLD) version in
# $NODE_DIR/deps/v8/include/v8-version.h
cd $NODE_DIR
git checkout master
git merge --ff-only origin/master
git checkout -b V8_NEW_VERSION
curl -L https://github.com/v8/v8/compare/${V8_OLD_VERSION}...${V8_NEW_VERSION}.patch | git apply --directory=deps/v8
# You may want to amend the commit message to describe the nature of the update
```
V8 also keeps tags of the form *5.4-lkgr* which point to the *Last Known Good
Revision* from the 5.4 branch that can be useful in the update process above.
### Major Updates
We upgrade the version of V8 in Node.js master whenever a V8 release goes stable
upstream, that is, whenever a new release of Chrome comes out.
Upgrading major versions would be much harder to do with the patch mechanism
above. A better strategy is to
1. Audit the current master branch and look at the patches that have been floated since the last major V8 update.
1. Replace the copy of V8 in Node.js with a fresh checkout of the latest stable V8 branch. Special care must be taken to recursively update the DEPS that V8 has a compile time dependency on (at the moment of this writing, these are only trace_event and gtest_prod.h)
1. Refloat (cherry-pick) all the patches from list computed in 1) as necessary. Some of the patches may no longer be necessary.
To audit for floating patches:
```shell
git log --oneline deps/v8
```
To replace the copy of V8 in Node.js, use the `[update-v8](https://gist.github.com/targos/8da405e96e98fdff01a395bed365b816)` script<sup>2</sup>. For example, if you want to replace the copy of V8 in Node.js with the branch-head for V8 5.1 branch:
```shell
cd $NODE_DIR
rm -rf deps/v8
path/to/update-v8 branch-heads/5.1
```
You may want to look at the commits created by the above scripts, and squash
them once you have reviewed them.
This should be followed up with manual refloating of all relevant patches.
## Proposal: Using a fork repo to track upstream V8
The fact that Node.js keeps a vendored, potentially edited copy of V8 in deps/
makes the above processes a bit complicated. An alternative proposal would be to
create a fork of V8 at `nodejs/v8` that would be used to maintain the V8
branches. This has several benefits:
* The process to update the version of V8 in Node.js could be automated to track
the tips of various V8 branches in `nodejs/v8`.
* It would simplify cherry-picking and porting of fixes between branches as the version bumps in `v8-version.h` would happen as part of this update instead of on every change.
* It would simplify the V8-CI and make it more automatable.
* The history of the V8 branch in `nodejs/v8` becomes purer and it would make it
easier to pull in the V8 team for help with reviewing.
* It would make it simpler to setup an automated build that tracks Node.js master + V8 lkgr integration build.
This would require some tooling to:
* A script that would update the V8 in a specific Node.js branch with V8 from upstream (dependent on branch abandoned vs. active).
* We need a script to bump V8 version numbers when a new version of V8 is
promoted from `nodejs/v8` to `nodejs/node`.
* Enabled the V8-CI build in Jenkins to build from the `nodejs/v8` fork.
## Proposal: Dealing with the need to float patches to a stable/beta
Sometimes upstream V8 may not want to merge a fix to their stable branches, but
we might. An example of this would be a fix for a performance regression that
only affects Node.js and not the browser. At the moment we don't have a
mechanism to deal with this situation. If we float a patch and bump the V8
version, we might run into a problem if upstream releases a fix with the same
version number.
One idea we have been kicking around is that we could move to a 5-place version
number in V8, e.g.: 5.4.500.30.${embedder}. The ${embedder} represents the
number of patches an embedder is floating on top of an official V8 version. This
would also help with auditing the floating patches in the Node.js commit
history.
We are trying this out in https://github.com/nodejs/node/pull/9754. If this ends
up working, we will investigate making this change upstream.
<!-- Footnotes themselves at the bottom. -->
### Notes
<sup>1</sup>Node.js 0.12 and older are intentionally omitted from this document as their support is ending soon.
<sup>2</sup>@targos is working on [a port of this script](https://github.com/targos/update-v8).
| 50.747851 | 552 | 0.746655 | eng_Latn | 0.99674 |
8a0d7c150d747bbefebef1a6faedfd5d0644f392 | 218 | md | Markdown | _watches/M20210205_070912_TLP_2.md | Meteoros-Floripa/meteoros.floripa.br | 7d296fb8d630a4e5fec9ab1a3fb6050420fc0dad | [
"MIT"
] | 5 | 2020-01-22T17:44:06.000Z | 2020-01-26T17:57:58.000Z | _watches/M20210205_070912_TLP_2.md | Meteoros-Floripa/site | 764cf471d85a6b498873610e4f3b30efd1fd9fae | [
"MIT"
] | null | null | null | _watches/M20210205_070912_TLP_2.md | Meteoros-Floripa/site | 764cf471d85a6b498873610e4f3b30efd1fd9fae | [
"MIT"
] | 2 | 2020-05-19T17:06:27.000Z | 2020-09-04T00:00:43.000Z | ---
layout: watch
title: TLP2 - 05/02/2021 - M20210205_070912_TLP_2T.jpg
date: 2021-02-05 07:09:12
permalink: /2021/02/05/watch/M20210205_070912_TLP_2
capture: TLP2/2021/202102/20210204/M20210205_070912_TLP_2T.jpg
---
| 27.25 | 62 | 0.784404 | fra_Latn | 0.033571 |
8a0e1bc45484cb6e19abf01d615d67928b1971c9 | 232 | md | Markdown | release_summary.md | BurntBanana/checkpoint | b1e59317bfbd3838aa0288b06459210cf063b7d1 | [
"MIT"
] | 41 | 2020-06-06T18:22:56.000Z | 2022-01-22T15:51:57.000Z | release_summary.md | BurntBanana/checkpoint | b1e59317bfbd3838aa0288b06459210cf063b7d1 | [
"MIT"
] | 8 | 2020-07-21T13:38:57.000Z | 2022-03-26T20:37:26.000Z | release_summary.md | BurntBanana/checkpoint | b1e59317bfbd3838aa0288b06459210cf063b7d1 | [
"MIT"
] | 2 | 2020-07-21T13:28:49.000Z | 2021-03-29T03:53:35.000Z | ## Summary
- Updated lodash to 4.17.19 to fix [security vulnerability](https://github.com/advisories/GHSA-p6mc-m468-83gw)
- Edited grenrc for proper formatting of commit hash
- Added codecov pull request comment
- Added codacy badge | 46.4 | 110 | 0.784483 | eng_Latn | 0.867624 |
8a0e382a882d9d066761dfdcd30c7a22ea1999b6 | 628 | md | Markdown | docs/Facility.Definition/ServiceInfo/ServiceInfo.md | JTOne123/Facility | c4eaf3047f0cc2d8e30dce9dda64f5b977853d67 | [
"MIT"
] | null | null | null | docs/Facility.Definition/ServiceInfo/ServiceInfo.md | JTOne123/Facility | c4eaf3047f0cc2d8e30dce9dda64f5b977853d67 | [
"MIT"
] | null | null | null | docs/Facility.Definition/ServiceInfo/ServiceInfo.md | JTOne123/Facility | c4eaf3047f0cc2d8e30dce9dda64f5b977853d67 | [
"MIT"
] | null | null | null | # ServiceInfo constructor
Creates a service.
```csharp
public ServiceInfo(string name, IEnumerable<ServiceMemberInfo> members,
IEnumerable<ServiceAttributeInfo> attributes = null, string summary = null,
IEnumerable<string> remarks = null, params ServicePart[] parts)
```
## See Also
* class [ServiceMemberInfo](../ServiceMemberInfo.md)
* class [ServiceAttributeInfo](../ServiceAttributeInfo.md)
* class [ServicePart](../ServicePart.md)
* class [ServiceInfo](../ServiceInfo.md)
* namespace [Facility.Definition](../../Facility.Definition.md)
<!-- DO NOT EDIT: generated by xmldocmd for Facility.Definition.dll -->
| 31.4 | 80 | 0.746815 | yue_Hant | 0.806521 |
8a0ea19460157ee637061cc8ba646b8fd4315ebd | 217 | md | Markdown | content/photos/2021-07-07-museum-neuruppin-staircase.md | kremalicious/blog | 601d0277908066b70c2a8029fc6e556600928967 | [
"MIT"
] | 43 | 2018-10-07T03:27:31.000Z | 2022-01-31T17:54:33.000Z | content/photos/2021-07-07-museum-neuruppin-staircase.md | kremalicious/blog | 601d0277908066b70c2a8029fc6e556600928967 | [
"MIT"
] | 590 | 2018-09-12T22:31:12.000Z | 2022-03-31T13:24:13.000Z | content/photos/2021-07-07-museum-neuruppin-staircase.md | kremalicious/blog | 601d0277908066b70c2a8029fc6e556600928967 | [
"MIT"
] | 12 | 2018-10-07T14:50:42.000Z | 2021-09-16T22:30:00.000Z | ---
date: 2021-07-07T14:46:34.000Z
title: Museum Neuruppin Staircase
image: 2021-07-07-museum-neuruppin-staircase.jpg
---
Staircase within the old building of the [Museum Neuruppin](https://www.museum-neuruppin.de)
| 24.111111 | 92 | 0.764977 | eng_Latn | 0.327142 |
8a0f2c74248e27480275f3c08ea5ae5b51b80f07 | 3,956 | md | Markdown | docs/json-schema/ts-defs-definitions-driverinputs.md | resxar/ossf-cve-benchmark | 7e434d345747d8cab6c48db93ec6b02b0f278154 | [
"MIT"
] | 100 | 2020-12-09T13:50:19.000Z | 2022-03-09T00:58:18.000Z | docs/json-schema/ts-defs-definitions-driverinputs.md | resxar/ossf-cve-benchmark | 7e434d345747d8cab6c48db93ec6b02b0f278154 | [
"MIT"
] | 314 | 2020-12-09T22:56:02.000Z | 2022-03-28T06:06:02.000Z | docs/json-schema/ts-defs-definitions-driverinputs.md | djredman99-org/ossf-cve-benchmark | b25f9f12377d46193b5c00a3912588c4a0e57644 | [
"MIT"
] | 28 | 2020-12-09T13:50:07.000Z | 2022-03-07T03:25:39.000Z | # Untitled object in Generated schema types from src/persistent-types.ts Schema
```txt
https://github.com/ossf-cve-benchmark/ossf-cve-benchmark/schemas/ts-defs.schema.json#/definitions/DriverInputs
```
The inputs accessible to the drivers that are executed by the `run` command (the inputs are provided as a JSON file, pointed to by the last commandline argument).
| Abstract | Extensible | Status | Identifiable | Custom Properties | Additional Properties | Access Restrictions | Defined In |
| :------------------ | ---------- | -------------- | ------------ | :---------------- | --------------------- | ------------------- | ------------------------------------------------------------------- |
| Can be instantiated | No | Unknown status | No | Forbidden | Forbidden | none | [ts-defs.schema.json\*](ts-defs.schema.json "open original schema") |
## DriverInputs Type
`object` ([Details](ts-defs-definitions-driverinputs.md))
# undefined Properties
| Property | Type | Required | Nullable | Defined by |
| :---------------- | -------- | -------- | -------------- | :--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| [bcves](#bcves) | `array` | Required | cannot be null | [Generated schema types from src/persistent-types.ts](ts-defs-definitions-driverinputs-properties-bcves.md "https://github.com/ossf-cve-benchmark/ossf-cve-benchmark/schemas/ts-defs.schema.json#/definitions/DriverInputs/properties/bcves") |
| [config](#config) | `object` | Required | cannot be null | [Generated schema types from src/persistent-types.ts](ts-defs-definitions-config.md "https://github.com/ossf-cve-benchmark/ossf-cve-benchmark/schemas/ts-defs.schema.json#/definitions/DriverInputs/properties/config") |
| [toolID](#toolid) | `string` | Required | cannot be null | [Generated schema types from src/persistent-types.ts](ts-defs-definitions-driverinputs-properties-toolid.md "https://github.com/ossf-cve-benchmark/ossf-cve-benchmark/schemas/ts-defs.schema.json#/definitions/DriverInputs/properties/toolID") |
## bcves
The benchmark CVEs to analyze.
`bcves`
- is required
- Type: `object[]` ([BCVE](ts-defs-definitions-bcve.md))
- cannot be null
- defined in: [Generated schema types from src/persistent-types.ts](ts-defs-definitions-driverinputs-properties-bcves.md "https://github.com/ossf-cve-benchmark/ossf-cve-benchmark/schemas/ts-defs.schema.json#/definitions/DriverInputs/properties/bcves")
### bcves Type
`object[]` ([BCVE](ts-defs-definitions-bcve.md))
## config
A configuration object.
`config`
- is required
- Type: `object` ([Config](ts-defs-definitions-config.md))
- cannot be null
- defined in: [Generated schema types from src/persistent-types.ts](ts-defs-definitions-config.md "https://github.com/ossf-cve-benchmark/ossf-cve-benchmark/schemas/ts-defs.schema.json#/definitions/DriverInputs/properties/config")
### config Type
`object` ([Config](ts-defs-definitions-config.md))
## toolID
The ID of the tool that is being run.
`toolID`
- is required
- Type: `string`
- cannot be null
- defined in: [Generated schema types from src/persistent-types.ts](ts-defs-definitions-driverinputs-properties-toolid.md "https://github.com/ossf-cve-benchmark/ossf-cve-benchmark/schemas/ts-defs.schema.json#/definitions/DriverInputs/properties/toolID")
### toolID Type
`string`
| 54.191781 | 307 | 0.576087 | eng_Latn | 0.506784 |
8a0f5524f244069cc12243af7c838cb6c56cca39 | 2,737 | md | Markdown | articles/service-fabric/service-fabric-reliable-actors-enumerate.md | riwaida/azure-docs.ja-jp | 2beaedf3fc0202ca4db9e5caabb38d0d3a4f6f5b | [
"CC-BY-4.0",
"MIT"
] | 1 | 2020-05-27T07:43:21.000Z | 2020-05-27T07:43:21.000Z | articles/service-fabric/service-fabric-reliable-actors-enumerate.md | riwaida/azure-docs.ja-jp | 2beaedf3fc0202ca4db9e5caabb38d0d3a4f6f5b | [
"CC-BY-4.0",
"MIT"
] | null | null | null | articles/service-fabric/service-fabric-reliable-actors-enumerate.md | riwaida/azure-docs.ja-jp | 2beaedf3fc0202ca4db9e5caabb38d0d3a4f6f5b | [
"CC-BY-4.0",
"MIT"
] | 1 | 2020-05-21T03:03:13.000Z | 2020-05-21T03:03:13.000Z | ---
title: Azure Service Fabric でのアクターの列挙
description: Azure Service Fabric アプリケーションでの Reliable Actors とそのメタデータの列挙について、例を使用して説明します。
author: vturecek
ms.topic: conceptual
ms.date: 03/19/2018
ms.author: vturecek
ms.openlocfilehash: 1516c9005a7c4dd0adcb279e9954e5f882c575c1
ms.sourcegitcommit: 2ec4b3d0bad7dc0071400c2a2264399e4fe34897
ms.translationtype: HT
ms.contentlocale: ja-JP
ms.lasthandoff: 03/27/2020
ms.locfileid: "75645601"
---
# <a name="enumerate-service-fabric-reliable-actors"></a>Service Fabric Reliable Actors を列挙する
Reliable Actors サービスでは、クライアントは、サービスがホストしているアクターに関するメタデータを列挙できます。 アクター サービスはパーティション分割されたステートフル サービスであるため、列挙はパーティションごとに実行されます。 各パーティションには多数のアクターが含まれる可能性があるため、列挙はページングされた結果のセットとして返されます。 ページはすべてのページが読み取られるまでループされます。 次の例は、アクター サービスの 1 つのパーティションに含まれるすべてのアクティブ アクターのリストを作成する方法を示しています。
```csharp
IActorService actorServiceProxy = ActorServiceProxy.Create(
new Uri("fabric:/MyApp/MyService"), partitionKey);
ContinuationToken continuationToken = null;
List<ActorInformation> activeActors = new List<ActorInformation>();
do
{
PagedResult<ActorInformation> page = await actorServiceProxy.GetActorsAsync(continuationToken, cancellationToken);
activeActors.AddRange(page.Items.Where(x => x.IsActive));
continuationToken = page.ContinuationToken;
}
while (continuationToken != null);
```
```Java
ActorService actorServiceProxy = ActorServiceProxy.create(
new URI("fabric:/MyApp/MyService"), partitionKey);
ContinuationToken continuationToken = null;
List<ActorInformation> activeActors = new ArrayList<ActorInformation>();
do
{
PagedResult<ActorInformation> page = actorServiceProxy.getActorsAsync(continuationToken);
while(ActorInformation x: page.getItems())
{
if(x.isActive()){
activeActors.add(x);
}
}
continuationToken = page.getContinuationToken();
}
while (continuationToken != null);
```
## <a name="next-steps"></a>次のステップ
* [アクターの状態管理](service-fabric-reliable-actors-state-management.md)
* [アクターのライフサイクルとガベージ コレクション](service-fabric-reliable-actors-lifecycle.md)
* [アクターの API リファレンス ドキュメント](https://msdn.microsoft.com/library/azure/dn971626.aspx)
* [.NET サンプル コード](https://github.com/Azure-Samples/service-fabric-dotnet-getting-started)
* [Java サンプル コード](https://github.com/Azure-Samples/service-fabric-java-getting-started)
<!--Image references-->
[1]: ./media/service-fabric-reliable-actors-platform/actor-service.png
[2]: ./media/service-fabric-reliable-actors-platform/app-deployment-scripts.png
[3]: ./media/service-fabric-reliable-actors-platform/actor-partition-info.png
[4]: ./media/service-fabric-reliable-actors-platform/actor-replica-role.png
[5]: ./media/service-fabric-reliable-actors-introduction/distribution.png
| 36.986486 | 277 | 0.785166 | yue_Hant | 0.592056 |
8a0fa392692ecd87e58556ef2a7d9845d66536e6 | 727 | md | Markdown | articles/virtual-machines-linux-tutorial.md | mimig1/azure-content | 8e5cbb341022113f87b8dafcdcb96386de90ad9f | [
"CC-BY-3.0"
] | 1 | 2016-09-14T17:37:06.000Z | 2016-09-14T17:37:06.000Z | articles/virtual-machines-linux-tutorial.md | mimig1/azure-content | 8e5cbb341022113f87b8dafcdcb96386de90ad9f | [
"CC-BY-3.0"
] | null | null | null | articles/virtual-machines-linux-tutorial.md | mimig1/azure-content | 8e5cbb341022113f87b8dafcdcb96386de90ad9f | [
"CC-BY-3.0"
] | null | null | null | <properties linkid="manage-linux-tutorial-vm-from-galllery" urlDisplayName="Create a virtual machine" pageTitle="Create a virtual machine running Linux in Azure" metaKeywords="Azure Linux vm, Linux vm" description="Learn how to capture an image of an Azure virtual machine (VM) running Linux. " metaCanonical="" services="virtual-machines" documentationCenter="" title="" authors="kathydav" solutions="" manager="dongill" editor="tysonn" />
<tags ms.service="virtual-machines" ms.workload="infrastructure-services" ms.tgt_pltfrm="vm-linux" ms.devlang="na" ms.topic="article" ms.date="01/01/1900" ms.author="kathydav" />
[WACOM.INCLUDE [CreateVirtualMachineLinuxTutorial](../includes/CreateVirtualMachineLinuxTutorial.md)]
| 80.777778 | 440 | 0.781293 | eng_Latn | 0.206956 |
8a1072653da19b38809037658f25f95f5d678cc0 | 3,260 | md | Markdown | docs/integration-services/system-stored-procedures/catalog-restore-project-ssisdb-database.md | Jteve-Sobs/sql-docs.de-de | 9843b0999bfa4b85e0254ae61e2e4ada1d231141 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | docs/integration-services/system-stored-procedures/catalog-restore-project-ssisdb-database.md | Jteve-Sobs/sql-docs.de-de | 9843b0999bfa4b85e0254ae61e2e4ada1d231141 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | docs/integration-services/system-stored-procedures/catalog-restore-project-ssisdb-database.md | Jteve-Sobs/sql-docs.de-de | 9843b0999bfa4b85e0254ae61e2e4ada1d231141 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | ---
description: catalog.restore_project (SSISDB-Datenbank)
title: catalog.restore_project (SSISDB-Datenbank) | Microsoft-Dokumentation
ms.custom: ''
ms.date: 03/04/2017
ms.prod: sql
ms.prod_service: integration-services
ms.reviewer: ''
ms.technology: integration-services
ms.topic: language-reference
ms.assetid: 8adee525-579b-4d2f-b807-e2ecc07fb2e9
author: chugugrace
ms.author: chugu
ms.openlocfilehash: 6ad50f86bc3c4f6f52262df591c1504139590cab
ms.sourcegitcommit: e700497f962e4c2274df16d9e651059b42ff1a10
ms.translationtype: HT
ms.contentlocale: de-DE
ms.lasthandoff: 08/17/2020
ms.locfileid: "88422104"
---
# <a name="catalogrestore_project-ssisdb-database"></a>catalog.restore_project (SSISDB-Datenbank)
[!INCLUDE[sqlserver-ssis](../../includes/applies-to-version/sqlserver-ssis.md)]
[!INCLUDE [SQL Server](../../includes/applies-to-version/sqlserver.md)]
Stellt die frühere Version eines Projekts im [!INCLUDE[ssISnoversion](../../includes/ssisnoversion-md.md)]-Katalog wieder her.
## <a name="syntax"></a>Syntax
```sql
catalog.restore_project [ @folder_name = ] folder_name
, [ @project_name = ] project _name
, [ @object_version_lsn = ] object_version_lsn
```
## <a name="arguments"></a>Argumente
[ @folder_name = ] *folder_name*
Der Name des Ordners, der das Projekt enthält. Der *folder_name* ist **nvarchar(128)** .
[ @project _name = ] *project_name*
Der Name des Projekts. Der *project_name* ist **nvarchar(128)** .
[ @object_version_lsn = ] *object_version_lsn*
Die Version des Projekts. Der *object_version_lsn* ist **bigint**.
## <a name="return-code-value"></a>Rückgabecodewert
0 (Erfolg)
## <a name="result-sets"></a>Resultsets
Wenn der **project_name** gefunden wird, werden Projektdetails als *varbinary(MAX)* im Resultset zurückgegeben.
Wenn das Projekt nicht im angegebenen Ordner wiederhergestellt werden kann, wird**NO RESULT SET** zurückgegeben.
## <a name="permissions"></a>Berechtigungen
Diese gespeicherte Prozedur erfordert eine der folgenden Berechtigungen:
- READ-Berechtigung und MODIFY-Berechtigung für das Projekt
- Mitgliedschaft in der Datenbankrolle **ssis_admin**
- Mitgliedschaft in der Serverrolle **sysadmin**
## <a name="errors-and-warnings"></a>Fehler und Warnungen
In der folgenden Liste werden einige Bedingungen beschrieben, die möglicherweise einen Fehler oder eine Warnung auslösen:
- Die Projektversion ist nicht vorhanden oder entspricht nicht dem Projektnamen.
- Das Projekt ist nicht vorhanden.
- Der Benutzer verfügt nicht über die entsprechenden Berechtigungen.
## <a name="remarks"></a>Bemerkungen
Wenn ein Projekt wiederhergestellt wird, werden allen Parametern Standardwerte zugewiesen, und alle Umgebungsverweise bleiben unverändert. Die maximale Anzahl von Projektversionen, die im Katalog beibehalten werden, wird durch die Katalogeigenschaft **MAX_VERSIONS_PER_PROJECT** bestimmt, wie in der [catalog_property](../../integration-services/system-views/catalog-catalog-properties-ssisdb-database.md)-Sicht gezeigt.
> [!WARNING]
> Umgebungsverweise sind möglicherweise nicht mehr gültig, nachdem ein Projekt wiederhergestellt wurde.
| 39.756098 | 423 | 0.747239 | deu_Latn | 0.929227 |
8a10d39c4e37299f66c30298d5c7fe9cc833acac | 1,232 | md | Markdown | ja/src/notation/README.md | lo48576/fbx-book | 9da106914df8438f19d3d15397ef4f20e76aefa6 | [
"CC-BY-4.0"
] | 2 | 2020-02-08T18:22:05.000Z | 2020-02-09T07:00:10.000Z | ja/src/notation/README.md | lo48576/fbx-book | 9da106914df8438f19d3d15397ef4f20e76aefa6 | [
"CC-BY-4.0"
] | null | null | null | ja/src/notation/README.md | lo48576/fbx-book | 9da106914df8438f19d3d15397ef4f20e76aefa6 | [
"CC-BY-4.0"
] | null | null | null | # 本書での記法
本章では、本書におけるデータ型や値の記法を導入する。
これらは本書での解説のための記法であり、 FBX データ内部にそのような記法が出現することを意味しない。
## 型の表現
本書では原則的に、データ型の表現としてプログラミング言語 Rust の型の記法を用いる。
具体的には、以下のようなものを用いる。
| 表記 | 内容 | 補足・詳細 |
|------|------|------------|
| `bool` | 真偽値 | 値は `true` と `false` 。内部表現が `0` と `1` とは限らない。 |
| `u8` | 符号なし8ビット整数 | |
| `u16` | 符号なし16ビット整数 | |
| `u32` | 符号なし32ビット整数 | |
| `u64` | 符号なし64ビット整数 | |
| `i16` | 符号付き16ビット整数 | 2の補数表現 |
| `i32` | 符号付き32ビット整数 | 2の補数表現 |
| `i64` | 符号付き64ビット整数 | 2の補数表現 |
| `f32` | 32ビット浮動小数点数 | IEEE 754 |
| `f64` | 64ビット浮動小数点数 | IEEE 754 |
| `[T; n]` | 要素数 `n` の、型 `T` の配列 | |
| `String` | 長さ無指定の文字列データ | UTF-8 |
| `Vec<T>` | 要素数無指定の、型 `T` の配列 | |
| `Vec<u8>` | 長さ無指定のバイナリデータ | 符号なし8ビット整数の配列と見做せる |
## 値の表現
データ中に現れる数値などを記述するとき、 `42` や `0xff` や `3.14` のように表現する。
もし桁が大きな数値であれば、読みやすさのためアンダースコア `_` を挿入することがある。
たとえば `0xcobebeef` は `0xcobe_beef` 、 `1000000` は `1_000_000` などのように表現することもある。
バイナリデータを記述するときは、 `[c0 be be ef]` のように `[` と `]` で囲って1バイトずつ16進数を空白区切りで並べて記述する。
1バイトは16進数2桁で表現する。
データは数値やその他の型として読んだ後の値を表現するかバイト列として1バイトずつ記すため、エンディアンを気にする必要はない。
文字列は `foobar` のように表現する。
これらが数値やバイナリデータと混同するおそれのある文字列値であるときは、文字列である旨明示する。
明示がないときは、数値やその他の型の値として優先して解釈するものとする。
特殊な記号や非印字文字などは `\x00` や `foo\x00bar` のように `\x` に続けて16進数2桁で表現する。
| 28.651163 | 77 | 0.680195 | jpn_Jpan | 0.951083 |
8a11790519be43e2f09463188e5b47fce1fcd968 | 10,307 | md | Markdown | docs/redis-proxy/info.md | HundredBai/camellia | f6931bbd87f587da065753a5d1d80ed1457348b2 | [
"MIT"
] | null | null | null | docs/redis-proxy/info.md | HundredBai/camellia | f6931bbd87f587da065753a5d1d80ed1457348b2 | [
"MIT"
] | null | null | null | docs/redis-proxy/info.md | HundredBai/camellia | f6931bbd87f587da065753a5d1d80ed1457348b2 | [
"MIT"
] | 3 | 2022-01-03T18:11:21.000Z | 2022-03-23T04:12:13.000Z | ## info命令获取相关信息示例
proxy实现了info命令,支持返回如下信息:Server/Clients/Route/Upstream/Memory/GC/Stats/Upstream-Info,含义分别表示:
* Server 表示服务器的信息,包括proxy版本、proxy端口、操作系统类型和版本、虚拟机版本、java版本等
* Clients 会返回连接proxy的客户端连接数
* Route 路由信息,包括路由配置数量和路由配置
* Upstream 后端redis连接数
* Memory 内存
* GC 垃圾回收相关信息
* Stats 统计信息(请求次数、QPS等)
* Upstream-Info 后端redis集群的信息,包括后端redis的内存使用率、版本、主从分布情况、slot分布情况等
你可以直接输入info,则返回除了Upstream-Info之外的所有信息,如下:
```
127.0.0.1:6380> info
# Server
camellia_redis_proxy_version:v1.0.46 ##proxy版本
redis_version:6.2.5 ##spring actuator默认会使用info命令返回的redis_version字段来做健康检查,这里直接返回一个固定的版本号
available_processors:4 ##cpu核数
netty_boss_thread:1 ##netty的bossGroup的线程数,默认=1
netty_work_thread:4 ##netty的工作线程数,默认=cpu核数
arch:amd64 ##系统架构
os_name:Linux ##操作系统名称
os_version:4.9.0-3-amd64 ##操作系统版本
system_load_average:0.22 ##系统load
tcp_port:6380 ##proxy的服务端口
http_console_port:16379 ##proxy的console端口
uptime_in_seconds:295 ##proxy启动时长(秒)
uptime_in_days:0 ##proxy启动时长(天)
vm_vendor:Oracle Corporation ##虚拟机厂商
vm_name:Java HotSpot(TM) 64-Bit Server VM ##虚拟机名称
vm_version:25.202-b08 ##虚拟机版本
jvm_info:mixed mode ##虚拟机info
java_version:1.8.0_202 ##java版本
# Clients
connect_clients:14 ##客户端连接数
connect_clients_1_default:10 ##bid=1,bgroup=default的客户端连接数
connect_clients_2_default:4 ##bid=2,bgroup=default的客户端连接数
# Route
route_nums:6 ##路由配置数量
route_conf_20_default:redis://***********@10.201.48.171:6379 ##路由配置,表示bid=1以及bgroup=default的配置
route_conf_1_default:redis-cluster://@10.177.0.64:8801,10.177.0.64:8802,10.177.0.65:8803,10.177.0.65:8804,10.177.0.66:8805,10.177.0.66:8806
route_conf_11_default:redis://***********@10.201.48.171:6379
route_conf_27_default:redis://***********@10.201.48.171:6379
route_conf_9_default:redis://***********@10.201.48.171:6379
route_conf_3_default:{"type":"simple","operation":{"read":"redis-cluster://@10.177.0.64:8801,10.177.0.64:8802,10.177.0.65:8803,10.177.0.65:8804,10.177.0.66:8805,10.177.0.66:8806","type":"rw_separate","write":{"resources":["redis-cluster://@10.177.0.64:8801,10.177.0.64:8802,10.177.0.65:8803,10.177.0.65:8804,10.177.0.66:8805,10.177.0.66:8806","redis://***********@10.201.48.171:6379"],"type":"multi"}}}
# Upstream
upstream_redis_nums:17 ##后端redis连接数
upstream_redis_nums[@10.177.0.69:8803]:4 ##后端redis连接数,具体某个ip:port的连接数
upstream_redis_nums[***********@10.201.48.171:6379]:5
upstream_redis_nums[@10.177.0.64:8802]:4
upstream_redis_nums[@10.177.0.64:8801]:4
# Memory ##proxy的内存信息
free_memory:309393192
free_memory_human:295.06M
total_memory:377487360
total_memory_human:360.00M
max_memory:7635730432
max_memory_human:7.11G
heap_memory_init:536870912
heap_memory_init_human:512.00M
heap_memory_used:68094168
heap_memory_used_human:64.94M
heap_memory_max:7635730432
heap_memory_max_human:7.11G
heap_memory_committed:377487360
heap_memory_committed_human:360.00M
non_heap_memory_init:2555904
non_heap_memory_init_human:2.44M
non_heap_memory_used:32339792
non_heap_memory_used_human:30.84M
non_heap_memory_max:-1
non_heap_memory_max_human:-1B
non_heap_memory_committed:33882112
non_heap_memory_committed_human:32.31M
# GC
gc0_name:G1 Young Generation ##gc的回收器类型
gc0_collection_count:3 ##gc累计次数
gc0_collection_time:3 ##gc累计时间
gc1_name:G1 Old Generation
gc1_collection_count:0
gc1_collection_time:0
# Stats
commands_count:4158008 ##proxy启动至今的请求数
read_commands_count:928037 ##proxy启动至今的读请求数
write_commands_count:3229970 ##proxy启动至今的写请求数
avg_commands_qps:34183.18 ##proxy启动至今的平均QPS
avg_read_commands_qps:7629.44 ##proxy启动至今的平均读QPS
avg_write_commands_qps:26553.74 ##proxy启动至今的平均写QPS
monitor_interval_seconds:60 ##统计周期,单位秒
last_commands_qps:29304.43 ##proxy上一个统计周期的QPS
last_read_commands_qps:6426.05 ##proxy上一个统计周期的读QPS
last_write_commands_qps:22878.38 ##proxy上一个统计周期的写QPS
```
你也可以只打印其中一项,比如只想看内存信息,则如下(info后面的参数是忽略大小写的):
```
127.0.0.1:6380> info memory
# Memory
free_memory:309393192
free_memory_human:295.06M
total_memory:377487360
total_memory_human:360.00M
max_memory:7635730432
max_memory_human:7.11G
heap_memory_init:536870912
heap_memory_init_human:512.00M
heap_memory_used:68094168
heap_memory_used_human:64.94M
heap_memory_max:7635730432
heap_memory_max_human:7.11G
heap_memory_committed:377487360
heap_memory_committed_human:360.00M
non_heap_memory_init:2555904
non_heap_memory_init_human:2.44M
non_heap_memory_used:32339792
non_heap_memory_used_human:30.84M
non_heap_memory_max:-1
non_heap_memory_max_human:-1B
non_heap_memory_committed:33882112
non_heap_memory_committed_human:32.31M
```
特别的,Upstream-Info必须是指定之后才能返回(此时返回的是默认路由),如下:
```
127.0.0.1:6381> info upstream-info
# Upstream-Info
route_conf:{"type":"sharding","operation":{"operationMap":{"0-2-4":{"read":"redis-sentinel-slaves://@127.0.0.1:26379/master1?withMaster=true","type":"rw_separate","write":"redis-sentinel://@127.0.0.1:26379/master1"},"1-3-5":"redis-cluster://@10.189.28.62:7008,10.189.28.60:7001,10.189.28.62:7011"},"bucketSize":6}}
upstream_cluster_count:3 ##本路由后端redis集群数量
upstream0_url:redis-cluster://@10.189.28.62:7008,10.189.28.60:7001,10.189.28.62:7011 ##本路由包含的redis集群地址1
upstream1_url:redis-sentinel://@127.0.0.1:26379/master1 ##本路由包含的redis集群地址2
upstream2_url:redis-sentinel-slaves://@127.0.0.1:26379/master1?withMaster=true ##本路由包含的redis集群地址3
## Upstream0 ##本路由包含的某个redis集群相关的信息
url:redis-cluster://@10.189.28.62:7008,10.189.28.60:7001,10.189.28.62:7011 ##地址,这是一个redis-cluster
### redis-cluster-info
cluster_state:ok ##集群状态
cluster_slots_assigned:16384 ##集群分配的slot数量
cluster_slots_ok:16384 ##集群状态ok的slot数量
cluster_slots_pfail:0 ##pfail状态的slot数量
cluster_slots_fail:0 ##fail状态的slot数量
cluster_known_nodes:6 ##集群的节点数
cluster_size:3 ##集群大小,即主节点数量
cluster_safety:yes ##如果master没有slave,或者有一个ip的master节点占了所有master节点的一半以上,则认为集群是不安全的,参考:https://redis.io/topics/cluster-spec
cluster_maxmemory:9663676416 ##集群总内存大小
cluster_maxmemory_human:9.00G ##集群总内存大小(可读性)
cluster_used_memory:2304452928 ##集群已用内存大小
cluster_used_memory_human:2.15G ##集群已用内存大小(可读性)
cluster_memory_used_rate:0.2384654482205709 ##集群内存使用率
cluster_memory_used_rate_human:23.87% ##集群内存使用率(百分比)
### redis-cluster-node-info ##集群节点信息(主从节点分别情况、slot分布情况、内存使用情况)
node0:master=10.189.28.62:7008@17008,slave=[10.189.28.60:7003@17003],slots=5461-10922,maxmemory=3.00G,used_memory=733.38M,memory_used_rate=23.87%
node1:master=10.189.28.60:7001@17001,slave=[10.189.28.62:7010@17010],slots=10923-16383,maxmemory=3.00G,used_memory=733.38M,memory_used_rate=23.87%
node2:master=10.189.28.62:7011@17011,slave=[10.189.28.62:7009@17009],slots=0-5460,maxmemory=3.00G,used_memory=733.38M,memory_used_rate=23.87%
### redis-node-info
#### node0 ##节点信息
master_url=10.189.28.62:7008@17008 ##节点url
redis_version:4.0.9 ##redis版本
used_memory:768150976 ##已用内存大小
used_memory_human:732.57M ##已用内存大小(可读性)
maxmemory:3221225472 ##最大内存
maxmemory_human:3.00G ##最大内存(可读性)
memory_used_rate:0.2384654482205709 ##内存使用率
memory_used_rate_human:23.85% ##内存使用率(百分比)
maxmemory_policy:allkeys-lru ##key淘汰策略
hz:10 ##hz,提高它的值将会占用更多的cpu,当然相应的redis将会更快的处理同时到期的许多key,以及更精确的去处理超时
role:master ##节点类型
connected_slaves:1 ##从节点数量
slave0:ip=10.189.28.60,port=7003,state=online,offset=88682163709,lag=0 ##从节点信息
db0:keys=3639485,expires=3639482,avg_ttl=1621629354933212 ##key的分布情况(数量、带ttl的数量、平均ttl)
#### node1
master_url=10.189.28.60:7001@17001
redis_version:4.0.9
used_memory:768150976
used_memory_human:3.77M
maxmemory:3221225472
maxmemory_human:3.00G
memory_used_rate:0.2384654482205709
memory_used_rate_human:23.85%
maxmemory_policy:allkeys-lru
hz:10
role:master
connected_slaves:1
slave0:ip=10.189.28.62,port=7010,state=online,offset=253642106463,lag=0
db0:keys=297,expires=294,avg_ttl=62496349
#### node2
master_url=10.189.28.62:7011@17011
redis_version:4.0.9
used_memory:768150976
used_memory_human:732.05M
maxmemory:3221225472
maxmemory_human:3.00G
memory_used_rate:0.2382984757423401
memory_used_rate_human:23.83%
maxmemory_policy:allkeys-lru
hz:10
role:master
connected_slaves:1
slave0:ip=10.189.28.62,port=7009,state=online,offset=186569832085,lag=1
db0:keys=3634796,expires=3634791,avg_ttl=1621629354943862
## Upstream1
url:redis-sentinel://@127.0.0.1:26379/master1
### redis-node-info
master_url:@127.0.0.1:6380
redis_version:6.0.6
used_memory:2437680
used_memory_human:2.32M
maxmemory:3221225472
maxmemory_human:3.00G
memory_used_rate:0.23873232305049896
memory_used_rate_human:23.87%
maxmemory_policy:noeviction
hz:10
role:master
connected_slaves:1
slave0:ip=127.0.0.1,port=6379,state=online,offset=570473,lag=1
db0:keys=12231212,expires=3634791,avg_ttl=123444
## Upstream2
url:redis-sentinel-slaves://@127.0.0.1:26379/master1?withMaster=true
### redis-node-info
master_url:@127.0.0.1:6380
redis_version:6.0.6
used_memory:2437680
used_memory_human:2.32M
maxmemory:3.00G
maxmemory_human:3.00G
memory_used_rate:0.23873232305049896
memory_used_rate_human:23.87%
maxmemory_policy:noeviction
hz:10
role:master
connected_slaves:1
slave0:ip=127.0.0.1,port=6379,state=online,offset=570473,lag=1
db0:keys=12231212,expires=3634791,avg_ttl=123444
```
此外,如果proxy上配置了多条路由,那么你可以指定bid和bgroup返回特定路由的后端upstream信息,如下(例子中返回了bid=1以及bgroup=default的后端信息):
```
127.0.0.1:6381> info upstream-info 1 default
# Upstream-Info
route_conf:redis://@127.0.0.1:6379
bid:1
bgroup:default
upstream_cluster_count:1
upstream0_url:redis://@127.0.0.1:6379
## Upstream0
url:redis://@127.0.0.1:6379
### redis-node-info
redis_version:6.0.6
used_memory:2082800
used_memory_human:1.99M
maxmemory:0
maxmemory_human:0B
memory_used_rate:0.0
memory_used_rate_human:0.00%
maxmemory_policy:noeviction
hz:10
role:master
connected_slaves:0
db0:keys=39,expires=0,avg_ttl=0
```
除了使用redis协议来获取info信息外,你还可以基于console的http-api来执行并获取info信息:
你可以访问 http://127.0.0.1:16379/info 来获取信息(支持json格式化),如下:
* txt形式:
<img src="redis-proxy-info-api-txt.png" width="50%" height="50%">
* json格式化:
<img src="redis-proxy-info-api-json.png" width="50%" height="50%">
你也可以使用section参数,如下:
* txt形式:
<img src="redis-proxy-info-api-section-txt.png" width="50%" height="50%">
* json格式化:
<img src="redis-proxy-info-api-section-json.png" width="50%" height="50%">
也支持upstream-info,如下:
* txt形式:
<img src="redis-proxy-upstream-info-api-txt.png" width="50%" height="50%">
* json格式化:
<img src="redis-proxy-upstream-info-api-json.png" width="50%" height="50%"> | 34.129139 | 402 | 0.789949 | yue_Hant | 0.249475 |
8a11d62168bb756b90f8f90a280d77d30cc580db | 3,885 | md | Markdown | windows-365/enterprise/health-checks.md | NeighborGeek/memdocs | 1036d8e32401c58ee36f767c015cb42026cd88fd | [
"CC-BY-4.0",
"MIT"
] | 128 | 2020-03-25T15:32:58.000Z | 2022-03-31T05:14:45.000Z | windows-365/enterprise/health-checks.md | NeighborGeek/memdocs | 1036d8e32401c58ee36f767c015cb42026cd88fd | [
"CC-BY-4.0",
"MIT"
] | 2,503 | 2020-03-10T04:28:18.000Z | 2022-03-31T22:02:04.000Z | windows-365/enterprise/health-checks.md | NeighborGeek/memdocs | 1036d8e32401c58ee36f767c015cb42026cd88fd | [
"CC-BY-4.0",
"MIT"
] | 543 | 2020-03-10T04:15:05.000Z | 2022-03-31T22:47:29.000Z | ---
# required metadata
title: On-premises network connection health checks in Windows 365
titleSuffix:
description: Learn about the health checks that are automatically run on on-premises network connections.
keywords:
author: ErikjeMS
ms.author: erikje
manager: dougeby
ms.date: 08/02/2021
ms.topic: how-to
ms.service: cloudpc
ms.subservice:
ms.localizationpriority: high
ms.technology:
ms.assetid:
# optional metadata
#ROBOTS:
#audience:
ms.reviewer: mattsha
ms.suite: ems
search.appverid: MET150
#ms.tgt_pltfrm:
ms.custom: intune-azure; get-started
ms.collection: M365-identity-device-management
---
# On-premises network connections health checks
A unique feature of Windows 365 is the on-premises network connection (OPNC) health checks. The health checks are periodically run to make sure that
- Cloud PC provisioning is successful.
- End-user Cloud PC experiences are optimal.
## On-premises network connection status
In the **On-premises network connection** tab, every OPNC created displays a status. This status helps you determine if new Cloud PCs can be expected to provision successfully, and that existing end-users are having an optimal Cloud PC experience.
Statuses include:
- **Running checks**: The health checks are currently running. The OPNC list view automatically refreshes every five minutes. Wait for the checks to complete before attempting to assign it to a provisioning policy.
- **Checks successful**: All health checks passed. The OPNC is ready for use.
- **Checks successful with warnings**: All critical health checks passed. However at least one non-critical check may have issues. An example of a check that may trigger this state is the hybrid Azure AD join sync check. Hybrid Azure AD join sync can take up to 90 minutes, so we check much of the hybrid Azure AD join sync service but can’t confirm the device sync succeeded until later. OPNCs with this status can be used by provisioning policies.
- **Checks failed**: One or more required checks failed. An OPNC can’t be used if it's in a failed state. You’ll have to resolve the underlying issue and Retry the health checks.
## Status error details
Every failed OPNC or success with warning error state includes the technical details behind the failure. Select the **View details** link for each failed check to view more information on the failure. After you’ve fixed the underlying issue, **Retry** the health check to re-run the tests.
## Supported checks
- **DNS can resolve Active Directory domain**: Resolve the provided Active Directory domain name.
- **Active directory domain join**: A domain join using the credentials, domain, and OU provided.
- **Endpoint connectivity**: Connectivity to the required [URL/endpoints](requirements-network.md).
- **Azure AD device sync (warning)**: Azure AD sync is enabled on the Azure AD tenant, and the computer object is being synced within 90 minutes.
- **Azure subnet IP address usage**: Sufficient IP addresses are available in the provided Azure subnet.
- **Azure tenant readiness**: The defined Azure subscription is enabled and ready for use. No Azure policy restrictions are blocking Windows 365 resources from being created.
- **Azure virtual network readiness**: The defined vNet is in a Windows 365 supported region.
- **First party app permissions exist on Azure subscription**: Sufficient permissions exist on the Azure subscription.
- **First party app permissions exist on Azure resource group**: Sufficient permissions exist on the Azure resource group.
- **First party app permissions exist on Azure virtual network**: Sufficient permissions exist on the Azure vNet.
- **Environment and configuration is ready**: Underlying infrastructure is ready for provisioning to succeed.
<!-- ########################## -->
## Next steps
[Learn more about on-premises network connections](on-premises-network-connections.md).
| 54.71831 | 449 | 0.779665 | eng_Latn | 0.993958 |
8a1243d98c30868b2c72d1d706b3c12639e7153c | 1,030 | md | Markdown | content/posts/favicons.md | AverageMarcus/til | 1a6315fa5fdf1fcabb648c775c03504d5e96901d | [
"MIT"
] | null | null | null | content/posts/favicons.md | AverageMarcus/til | 1a6315fa5fdf1fcabb648c775c03504d5e96901d | [
"MIT"
] | null | null | null | content/posts/favicons.md | AverageMarcus/til | 1a6315fa5fdf1fcabb648c775c03504d5e96901d | [
"MIT"
] | null | null | null | ---
title: "How to get the favicon of any site"
date: 2020-11-10T09:49:37+01:00
draft: false
tags:
-
images:
- https://opengraph.cluster.fun/opengraph/?siteTitle=Today%20I%20learnt...&title=How%20to%20get%20the%20favicon%20of%20any%20site&tags=favicon&image=https%3A%2F%2Fmarcusnoble.co.uk%2Fimages%2Fmarcus.jpg&twitter=Marcus_Noble_&github=AverageMarcus&website=www.MarcusNoble.co.uk
---
If you ever find yourself needing to display a small icon for a 3rd party URL but don't want to have to crawl the site to pull out the favicon URL then you can make use of a Google CDN:
```
https://s2.googleusercontent.com/s2/favicons?domain_url=https://www.bbc.co.uk/
```
Example: ![](https://s2.googleusercontent.com/s2/favicons?domain_url=https://www.bbc.co.uk/)
You can even provide any page, not just the root URL.
e.g. `https://s2.googleusercontent.com/s2/favicons?domain_url=https://www.bbc.co.uk/news/newsbeat-54838856`: ![](https://s2.googleusercontent.com/s2/favicons?domain_url=https://www.bbc.co.uk/news/newsbeat-54838856)
| 46.818182 | 275 | 0.763107 | yue_Hant | 0.307007 |
8a126bf153e3e1fb1d63d7289cde2f3c31dd63b5 | 785 | md | Markdown | 2007/CVE-2007-3228.md | justinforbes/cve | 375c65312f55c34fc1a4858381315fe9431b0f16 | [
"MIT"
] | 2,340 | 2022-02-10T21:04:40.000Z | 2022-03-31T14:42:58.000Z | 2007/CVE-2007-3228.md | justinforbes/cve | 375c65312f55c34fc1a4858381315fe9431b0f16 | [
"MIT"
] | 19 | 2022-02-11T16:06:53.000Z | 2022-03-11T10:44:27.000Z | 2007/CVE-2007-3228.md | justinforbes/cve | 375c65312f55c34fc1a4858381315fe9431b0f16 | [
"MIT"
] | 280 | 2022-02-10T19:58:58.000Z | 2022-03-26T11:13:05.000Z | ### [CVE-2007-3228](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3228)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
PHP remote file inclusion vulnerability in saf/lib/PEAR/PhpDocumentor/Documentation/tests/bug-559668.php in Sitellite CMS 4.2.12 and earlier might allow remote attackers to execute arbitrary PHP code via a URL in the FORUM[LIB] parameter. NOTE: by default, access to the PhpDocumentor directory tree is blocked by .htaccess.
### POC
#### Reference
- https://www.exploit-db.com/exploits/4071
#### Github
No PoCs found on GitHub currently.
| 43.611111 | 324 | 0.759236 | eng_Latn | 0.376295 |
8a13fe4ffda073c3eb18f6155f5efce5e121c871 | 66 | md | Markdown | docs/06-links.md | bukinoshita/netlify-docs | c452672e6714cb95b5918c3ae2ea34ee3119ec9c | [
"MIT"
] | 12 | 2017-12-08T17:24:05.000Z | 2022-02-04T13:46:01.000Z | docs/06-links.md | bukinoshita/netlify-docs | c452672e6714cb95b5918c3ae2ea34ee3119ec9c | [
"MIT"
] | 13 | 2017-12-08T18:25:40.000Z | 2022-03-08T22:40:13.000Z | docs/06-links.md | bukinoshita/netlify-docs | c452672e6714cb95b5918c3ae2ea34ee3119ec9c | [
"MIT"
] | 2 | 2018-12-10T10:16:04.000Z | 2020-10-18T07:56:06.000Z | ## Links
* [Github](https://github.com/bukinoshita/netlify-docs)
| 16.5 | 55 | 0.712121 | zul_Latn | 0.323743 |
8a1442c73d0a5219c4c9e4a0ac137d5eebbd7b48 | 7,113 | md | Markdown | maximofernandez/content/si/ud1-1.md | maximofernandezriera/docdock | 6f1f4ca00cd5fb3da9dc2a16d20012e7306cda5b | [
"MIT"
] | null | null | null | maximofernandez/content/si/ud1-1.md | maximofernandezriera/docdock | 6f1f4ca00cd5fb3da9dc2a16d20012e7306cda5b | [
"MIT"
] | null | null | null | maximofernandez/content/si/ud1-1.md | maximofernandezriera/docdock | 6f1f4ca00cd5fb3da9dc2a16d20012e7306cda5b | [
"MIT"
] | null | null | null | +++
title = "Sistemas informáticos"
date = "2017-04-24T18:36:24+02:00"
type="slide"
hidden=true
theme = "black"
[revealOptions]
transition= 'concave'
controls= true
controlsTutorial= true
progress= true
history= true
center= true
+++
# 1.2. Introducción a los sistemas operativos
---
# sistema operativo
Aunque una de las funciones del sistema operativo permite el acceso del software al hardware, no es imprescindible. Hay sistemas informáticos que no tienen sistema operativo. Por tanto, el sistema informático no es imprescindible.
---
Sistema operativo - Objetivos
El sistema operativo tiene tres objetivos principales:
Comodidad: hace que el ordenador sea más fácil de utilizar
Eficiencia: permite que los recursos del sistema se utilicen de forma más eficiente
Capacidad de evolución: está construido de manera que permita un desarrollo continuo (actualizaciones, correcciones, nuevos servicios, ...)
---
Sistema operativo - Funciones principales
Las funciones principales que debe realizar un sistema operativo son las siguientes:
Administración de procesos
Administración de recursos
Administración de memoria
Proporcionar una interfaz para comunicarse con el usuario
Gestión de usuarios y permisos
El núcleo (kernel) del sistema operativo administra todas estas funciones.
---
Sistema operativo - Funciones principales
Administración de procesos:
Los sistemas informáticos están preparados para ejecutar diferentes procesos a la vez. El sistema operativo se encarga de decidir el orden de procesamiento de los diferentes programas que se están ejecutando.
Administración de recursosç
El S.O. tiene la capacidad de distribuir los diferentes recursos (p.e. memoria y dispositivos) entre los procesos. El SO tiene un registro que le permite conocer qué recursos están disponibles y cuáles se están utilizando, durante cuánto tiempo, por qué proceso, etc.
---
Sistema operativo - Funciones principales
Administración de la memoria:
Supervisa qué áreas de la memoria están en uso y cuáles están libres. Además, determina cuánta memoria asignará a un proceso y en qué momento. También libera la memoria cuando un proceso ya no es requerida para un proceso.
Algunos sistemas de almacenamiento: ext4, NTFS y exFAT.
Gestión de usuarios y permisos:
Aplica una serie de permisos a los usuarios que les permiten acceder al sistema y así poder evitar acciones que afectan al trabajo que están realizando otros usuarios.
---
Sistema operativo - Funciones principales
Proporcionar una interfaz para comunicarse con el usuario:
Esta puede ser tanto una interfaz gráfica (GUI) o como una interfaz donde se pueda introducir y recibir información en forma de texto (línea de comandos).
---
Sistema operativo - Clasificación
Existen diferentes formas por las que se pueden clasificar los sistemas operativos:
Según la cantidad de procesos que pueden gestionar de forma simultánea:
---
MONOTAREA
Sólo admiten un programa al sistema. El programa es cargado en memoria y es allí hasta que acaba de ser ejecutado. Durante este periodo no se puede ejecutar ningún otro programa.
Realiza tareas secuencialmente.
MULTITAREA
Pueden admitir uno o más programas de uno o más usuarios simultáneamente.
---
Sistema operativo - Clasificación
Según el número de usuarios del sistema:
monousuario
Sólo permiten en un determinado momento la conexión de un único usuario a la vez en el sistema. Utilizan técnicas de monoprogramació ejecutando un único programa o pueden ser sistemas multiprogramados, que facilitan al usuario la ejecución de varios programas a la vez.
Por ejemplo, el sistema operativo DOS ..
MULTIUSUARIO
Varios usuarios pueden trabajar simultáneamente.
Por ejemplo, UNIX.
---
Sistema operativo - Clasificación
Según el número de procesadores:
MONOPROCESO
El sistema informático sólo dispone de un procesador. Por tanto, sólo permite realizar un proceso a la vez.
multiproceso
El sistema informático dispone de varios procesadores. Por lo tanto, permite ejecutar diferentes tareas al mismo tiempo, debido a que ofrecen realizar varios procesos de forma simultánea.
---
Sistema operativo - Clasificación
Según los servicios que ofrecen:
CENTRALIZADOS
Todos los recursos se encuentran en una misma máquina (mainframe).
DISTRIBUIDOS
Los recursos utilizados pueden estar en diferentes máquinas que deben estar conectadas en red.
---
No se debe confundir el sistema distribuido con el sistema en red:
En un sistema operativo en red los diversos sistemas informáticos están interconectados (por ejemplo, red local de ordenadores). Cada uno tiene su propio software y hardware.
En un sistema operativo distribuido, el software distribuye las tareas en la red y los usuarios no saben donde se realizan las tareas.
---
Sistema operativo - Clasificación
Según el tipo de licencia:
PROPIETARIOS
Aquellas que tienen limitaciones de uso.
Son propiedad de alguna empresa.
LIBRES
Permiten utilizar el programa libremente.
La licencia es el contrato entre los desarrolladores de software y el usuario. Se definen con precisión los derechos y deberes de cada parte.
---
Sistema operativo - Clasificación
Hay varios tipos de licencias. Estas especifican las acciones que puedes realizar sobre el software adquirido.
Por ejemplo:
Licencia GPL (sistema operativo Linux): permite la copia modificación y redistribución del software. la licencia y no deja de ser válida si se efectúan cambios en el hardware. No ofrece garantía.
Licencia EULA (sistema operativo Windows XP): se prohíbe la copia. La licencia puede dejar de ser válida si se efectúan cambios en el hardware. Garantía los primeros 90 días.
---
Sistema operativo - Inicios
El concepto de "Sistema Operativo" aparece en los años 50 cuando IBM desarrolló el primer sistema operativo.
En los años 60 se produce una revolución en este campo. Aparecen conceptos como multitarea, multiusuario y multiproceso. Durante las primeras décadas, los sistemas operativos eran monotasca, monousuario y monoprocés.
A finales de los 60 aparece UNIX, es la base de la gran mayoría de los sistemas operativos actuales (solaris, Mac OS, ...).
En los años 80, se lanzó el sistema operativo MS-DOS, el primer sistema operativo de Microsoft, con la idea de que todo el mundo pudiera tener un ordenador en su casa.
---
Sistema operativo -
Inicios - MS-DOS
Este sistema operativo dejaba que el proceso que se estaba ejecutando pudiera tener acceso a todos los recursos que quisiera. En consecuencia, había muchos problemas de seguridad.
No era multiusuario.
No era multitarea.
En primeras versiones no podía trabajar con más de 64KB de RAM. A partir de la versión 7.1 ya soportaba sistemas de ficheros FAT32 con 4GiB de limitación.
---
Sistema operativo - Tendencias
Multiproceso: administrar los procesadores para repartir el trabajo de forma equilibrada.
Sistemas más tolerantes a fallos: sistemas de errores para facilitar la tarea de corrección.
Sistemas abiertos: estandarización en las comunicaciones, interfaces de usuario y aplicaciones.
Interfaces de usuario (GUI) más amigables.
Sistemas operativos ligeros. Por ejemplo, Windows 10 ocupa unos 10 GB en disco.
| 44.735849 | 269 | 0.808801 | spa_Latn | 0.997225 |
8a1449c06e345bb51c489b6b64e9cfdfd2b80604 | 1,395 | md | Markdown | desktop-src/HyperV_v2/about-hyper-v-management.md | citelao/win32 | bf61803ccb0071d99eee158c7416b9270a83b3e4 | [
"CC-BY-4.0",
"MIT"
] | 4 | 2021-07-26T16:18:49.000Z | 2022-02-19T02:00:21.000Z | desktop-src/HyperV_v2/about-hyper-v-management.md | citelao/win32 | bf61803ccb0071d99eee158c7416b9270a83b3e4 | [
"CC-BY-4.0",
"MIT"
] | 2 | 2020-04-09T17:00:51.000Z | 2020-04-09T18:30:01.000Z | desktop-src/HyperV_v2/about-hyper-v-management.md | citelao/win32 | bf61803ccb0071d99eee158c7416b9270a83b3e4 | [
"CC-BY-4.0",
"MIT"
] | 2 | 2020-07-19T02:58:48.000Z | 2021-03-06T21:09:47.000Z | ---
Description: This section contains info for Hyper-V management.
ms.assetid: B0F5E19F-36A6-4965-A119-42AF601A64BE
title: About Hyper-V management
ms.topic: article
ms.date: 05/31/2018
---
# About Hyper-V management
This section contains info for Hyper-V management.
## In this section
| Topic | Description |
|-------------------------------------------------------------------------------------------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| [Backing up and restoring virtual machines](backing-up-and-restoring-virtual-machines.md)<br/> | Hyper-V uses the Volume Shadow Copy Service (VSS) to backup and restore virtual machines.<br/> |
| [Virtual machine generation identifier](virtual-machine-generation-identifier.md)<br/> | Windows 8 and Windows Server 2012 introduce the ability for software that is running on a virtual machine to detect that a time shift event may have occurred.<br/> |
| 42.272727 | 277 | 0.425806 | eng_Latn | 0.754381 |
8a14ef21d5d6c0e97baf8fd86642fc6837af4de9 | 6,511 | md | Markdown | articles/media-services/media-services-dotnet-dynamic-manifest.md | anhashia/azure-docs | 91daeda3290100efffd247ad62962a8a8d659a67 | [
"CC-BY-3.0"
] | null | null | null | articles/media-services/media-services-dotnet-dynamic-manifest.md | anhashia/azure-docs | 91daeda3290100efffd247ad62962a8a8d659a67 | [
"CC-BY-3.0"
] | null | null | null | articles/media-services/media-services-dotnet-dynamic-manifest.md | anhashia/azure-docs | 91daeda3290100efffd247ad62962a8a8d659a67 | [
"CC-BY-3.0"
] | null | null | null | ---
title: Creating Filters with Azure Media Services .NET SDK
description: This topic describes how to create filters so your client can use them to stream specific sections of a stream. Media Services creates dynamic manifests to achieve this selective streaming.
services: media-services
documentationcenter: ''
author: Juliako
manager: erikre
editor: ''
ms.assetid: 2f6894ca-fb43-43c0-9151-ddbb2833cafd
ms.service: media-services
ms.workload: media
ms.tgt_pltfrm: na
ms.devlang: ne
ms.topic: article
ms.date: 07/18/2016
ms.author: juliako;cenkdin
---
# Creating Filters with Azure Media Services .NET SDK
> [!div class="op_single_selector"]
> * [.NET](media-services-dotnet-dynamic-manifest.md)
> * [REST](media-services-rest-dynamic-manifest.md)
>
>
Starting with 2.11 release, Media Services enables you to define filters for your assets. These filters are server side rules that will allow your customers to choose to do things like: playback only a section of a video (instead of playing the whole video), or specify only a subset of audio and video renditions that your customer's device can handle (instead of all the renditions that are associated with the asset). This filtering of your assets is achieved through **Dynamic Manifest**s that are created upon your customer's request to stream a video based on specified filter(s).
For more detailed information related to filters and Dynamic Manifest, see [Dynamic manifests overview](media-services-dynamic-manifest-overview.md).
This topic shows how to use Media Services .NET SDK to create, update, and delete filters.
Note if you update a filter, it can take up to 2 minutes for streaming endpoint to refresh the rules. If the content was served using this filter (and cached in proxies and CDN caches), updating this filter can result in player failures. It is recommend to clear the cache after updating the filter. If this option is not possible, consider using a different filter.
## Types used to create filters
The following types are used when creating filters:
* **IStreamingFilter**. This type is based on the following REST API [Filter](http://msdn.microsoft.com/library/azure/mt149056.aspx)
* **IStreamingAssetFilter**. This type is based on the following REST API [AssetFilter](http://msdn.microsoft.com/library/azure/mt149053.aspx)
* **PresentationTimeRange**. This type is based on the following REST API [PresentationTimeRange](http://msdn.microsoft.com/library/azure/mt149052.aspx)
* **FilterTrackSelectStatement** and **IFilterTrackPropertyCondition**. These types are based on the following REST APIs [FilterTrackSelect and FilterTrackPropertyCondition](http://msdn.microsoft.com/library/azure/mt149055.aspx)
## Create/Update/Read/Delete global filters
The following code shows how to use .NET to create, update,read, and delete asset filters.
string filterName = "GlobalFilter_" + Guid.NewGuid().ToString();
List<FilterTrackSelectStatement> filterTrackSelectStatements = new List<FilterTrackSelectStatement>();
FilterTrackSelectStatement filterTrackSelectStatement = new FilterTrackSelectStatement();
filterTrackSelectStatement.PropertyConditions = new List<IFilterTrackPropertyCondition>();
filterTrackSelectStatement.PropertyConditions.Add(new FilterTrackNameCondition("Track Name", FilterTrackCompareOperator.NotEqual));
filterTrackSelectStatement.PropertyConditions.Add(new FilterTrackBitrateRangeCondition(new FilterTrackBitrateRange(0, 1), FilterTrackCompareOperator.NotEqual));
filterTrackSelectStatement.PropertyConditions.Add(new FilterTrackTypeCondition(FilterTrackType.Audio, FilterTrackCompareOperator.NotEqual));
filterTrackSelectStatements.Add(filterTrackSelectStatement);
// Create
IStreamingFilter filter = _context.Filters.Create(filterName, new PresentationTimeRange(), filterTrackSelectStatements);
// Update
filter.PresentationTimeRange = new PresentationTimeRange(timescale: 500);
filter.Update();
// Read
var filterUpdated = _context.Filters.FirstOrDefault();
Console.WriteLine(filterUpdated.Name);
// Delete
filter.Delete();
## Create/Update/Read/Delete asset filters
The following code shows how to use .NET to create, update,read, and delete asset filters.
string assetName = "AssetFilter_" + Guid.NewGuid().ToString();
var asset = _context.Assets.Create(assetName, AssetCreationOptions.None);
string filterName = "AssetFilter_" + Guid.NewGuid().ToString();
// Create
IStreamingAssetFilter filter = asset.AssetFilters.Create(filterName,
new PresentationTimeRange(),
new List<FilterTrackSelectStatement>());
// Update
filter.PresentationTimeRange =
new PresentationTimeRange(start: 6000000000, end: 72000000000);
filter.Update();
// Read
asset = _context.Assets.Where(c => c.Id == asset.Id).FirstOrDefault();
var filterUpdated = asset.AssetFilters.FirstOrDefault();
Console.WriteLine(filterUpdated.Name);
// Delete
filterUpdated.Delete();
## Build streaming URLs that use filters
For information on how to publish and deliver your assets, see [Delivering Content to Customers Overview](media-services-deliver-content-overview.md).
The following examples show how to add filters to your streaming URLs.
**MPEG DASH**
http://testendpoint-testaccount.streaming.mediaservices.windows.net/fecebb23-46f6-490d-8b70-203e86b0df58/BigBuckBunny.ism/Manifest(format=mpd-time-csf, filter=MyFilter)
**Apple HTTP Live Streaming (HLS) V4**
http://testendpoint-testaccount.streaming.mediaservices.windows.net/fecebb23-46f6-490d-8b70-203e86b0df58/BigBuckBunny.ism/Manifest(format=m3u8-aapl, filter=MyFilter)
**Apple HTTP Live Streaming (HLS) V3**
http://testendpoint-testaccount.streaming.mediaservices.windows.net/fecebb23-46f6-490d-8b70-203e86b0df58/BigBuckBunny.ism/Manifest(format=m3u8-aapl-v3, filter=MyFilter)
**Smooth Streaming**
http://testendpoint-testaccount.streaming.mediaservices.windows.net/fecebb23-46f6-490d-8b70-203e86b0df58/BigBuckBunny.ism/Manifest(filter=MyFilter)
## Media Services learning paths
[!INCLUDE [media-services-learning-paths-include](../../includes/media-services-learning-paths-include.md)]
## Provide feedback
[!INCLUDE [media-services-user-voice-include](../../includes/media-services-user-voice-include.md)]
## See Also
[Dynamic manifests overview](media-services-dynamic-manifest-overview.md)
| 48.589552 | 586 | 0.773767 | eng_Latn | 0.581378 |
8a1563ba4b699af9d34125f7cf3b9de36b89cbcf | 44 | md | Markdown | README.md | luther38/XivDbWeb | 204d066232c04dce0ea5a03ec55f160cfbc62659 | [
"MIT"
] | null | null | null | README.md | luther38/XivDbWeb | 204d066232c04dce0ea5a03ec55f160cfbc62659 | [
"MIT"
] | null | null | null | README.md | luther38/XivDbWeb | 204d066232c04dce0ea5a03ec55f160cfbc62659 | [
"MIT"
] | null | null | null | # XivDbWeb
Flask interface to view XIV data
| 14.666667 | 32 | 0.795455 | eng_Latn | 0.546604 |
8a15692335b2cb1cda89ad786bea7690bdc60011 | 1,087 | md | Markdown | gpdb-doc/markdown/ref_guide/modules/hstore.html.md | haolinw/gpdb | 16a9465747a54f0c61bac8b676fe7611b4f030d8 | [
"PostgreSQL",
"Apache-2.0"
] | null | null | null | gpdb-doc/markdown/ref_guide/modules/hstore.html.md | haolinw/gpdb | 16a9465747a54f0c61bac8b676fe7611b4f030d8 | [
"PostgreSQL",
"Apache-2.0"
] | null | null | null | gpdb-doc/markdown/ref_guide/modules/hstore.html.md | haolinw/gpdb | 16a9465747a54f0c61bac8b676fe7611b4f030d8 | [
"PostgreSQL",
"Apache-2.0"
] | null | null | null | # hstore
The `hstore` module implements a data type for storing sets of \(key,value\) pairs within a single Greenplum Database data field. This can be useful in various scenarios, such as rows with many attributes that are rarely examined, or semi-structured data.
The Greenplum Database `hstore` module is equivalent to the PostgreSQL `hstore` module. There are no Greenplum Database or MPP-specific considerations for the module.
## <a id="topic_reg"></a>Installing and Registering the Module
The `hstore` module is installed when you install Greenplum Database. Before you can use any of the data types or functions defined in the module, you must register the `hstore` extension in each database in which you want to use the objects. Refer to [Installing Additional Supplied Modules](../../install_guide/install_modules.html) for more information.
## <a id="topic_info"></a>Module Documentation
See [hstore](https://www.postgresql.org/docs/9.4/hstore.html) in the PostgreSQL documentation for detailed information about the data types and functions defined in this module.
| 72.466667 | 356 | 0.787489 | eng_Latn | 0.990471 |
8a157e4c72be8017b1ed86af5d548b906f2863e8 | 2,835 | md | Markdown | README.md | rajputarjun2001/EduSmart | 44831fcd0f38dece42aa3f198d33c2abaa7fdcc0 | [
"MIT"
] | null | null | null | README.md | rajputarjun2001/EduSmart | 44831fcd0f38dece42aa3f198d33c2abaa7fdcc0 | [
"MIT"
] | null | null | null | README.md | rajputarjun2001/EduSmart | 44831fcd0f38dece42aa3f198d33c2abaa7fdcc0 | [
"MIT"
] | null | null | null | # 🎓 EduSmart
<a href="#contributing"><img alt="Contributions Welcome" src="https://img.shields.io/badge/contributions-welcome-brightgreen?style=for-the-badge&labelColor=black&logo=github"></a> <a href="https://github.com/gauravsinhaweb/EduSmart/blob/master/LICENSE"> <img alt="GitHub License MIT" src="https://img.shields.io/github/license/gauravsinhaweb/EduSmart?style=for-the-badge&labelColor=black&logo=github"> </a>
## 🤗 Contributing
Check out the [Contribution Guide](CONTRIBUTING.md) for local setup and contribution information.
## 🏷 Tagline:
Lets Make it Real
<!-- ![3d](https://user-images.githubusercontent.com/64855593/132103582-1ef1652d-a5da-4dbc-ba45-ae4ee4b4e640.gif) -->
#
<img src="https://user-images.githubusercontent.com/64855593/132103582-1ef1652d-a5da-4dbc-ba45-ae4ee4b4e640.gif" width="250px" >
## 🧐 Problem Addressed:
During the course of the pandemic, E-learning has proven to be an efficient an effective mode of learning. For the past year, students have been stuck in their homes attending classes online. Often, these classes are boring and lack engagement making it harder for students to retain what they have learned. Courses with practical or hands-on elements are especially challenging to teach online. This makes the ability to visualize crucial in subjects such as Aerospace, Biology, and many others. With this application, we focus on solving the problem of visualization in online classes by using 3D, Augmented reality to give life-like simulations of various models and make the learning process more impactful and engaging. With built-in interactivity, students can ask questions synchronously and get instant feedback.
## 🔴 Live demo
The site is deployed throught Vercel, and you can access it [here](https://edu-smart.vercel.app/)
Check out the presentation for more details [here](https://www.canva.com/design/DAEpFl8JPvs/4wUFIgirVNxxOuMvdLS7MQ/view?utm_content=DAEpFl8JPvs&utm_campaign=designshare&utm_medium=link&utm_source=sharebutton)
## 📺 Demo video:
Check out the complete demo video [here](https://youtu.be/WpuTS0YcoEQ)
## 🚀 Main Features:
- Interactive 3D Models
- Click on the Perseverance Rover and get information about different parts
- Learn with Augmented Reality
- Chatbot Assistant
## 💻 Tech Stack:
- SAWO Labs
- React Js
- Node Js
- Express Js
- Socket IO
- React-three-fiber
- echoAR
- Tailwind CSS & CSS
## 🤝 Credits:
- Passwordless Authentication: [sawolabs.com](https://sawolabs.com/)
- AR: [echoAR](https://www.echoar.xyz/)
- 3D Models: [sketchfab.com](https://sketchfab.com)
## 🖼️ Previews of the site:
![1](https://user-images.githubusercontent.com/75125943/135756188-d82bc259-4c02-4c18-b6bf-11189b980bed.PNG)
![2](https://user-images.githubusercontent.com/75125943/135756196-751706c2-26d8-44b4-b937-725bb92c0ad4.PNG)
#### `#happy hacking!`
| 48.87931 | 820 | 0.773898 | eng_Latn | 0.717996 |
8a15874032c0ea11af749f963ef98500657431ba | 5,712 | md | Markdown | articles/hdinsight/domain-joined/apache-domain-joined-run-hive.md | ningchencontact/azure-docs.zh-tw | 85eb44c48f6993d41f51f680ad19190e0a1cac0b | [
"CC-BY-4.0",
"MIT"
] | null | null | null | articles/hdinsight/domain-joined/apache-domain-joined-run-hive.md | ningchencontact/azure-docs.zh-tw | 85eb44c48f6993d41f51f680ad19190e0a1cac0b | [
"CC-BY-4.0",
"MIT"
] | null | null | null | articles/hdinsight/domain-joined/apache-domain-joined-run-hive.md | ningchencontact/azure-docs.zh-tw | 85eb44c48f6993d41f51f680ad19190e0a1cac0b | [
"CC-BY-4.0",
"MIT"
] | null | null | null | ---
title: 在已加入網域的 HDInsight 中設定 Hive 原則 - Azure
description: 了解如何在加入網域的 Azure HDInsight 服務中針對 Hive 設定 Apache Ranger 原則。
services: hdinsight
ms.service: hdinsight
author: omidm1
ms.author: omidm
editor: jasonwhowell
ms.custom: hdinsightactive
ms.topic: conceptual
ms.date: 04/17/2018
ms.openlocfilehash: 8579c3c13ace1f97d2400a4fc6e2e9a63c2c4d26
ms.sourcegitcommit: 1f0587f29dc1e5aef1502f4f15d5a2079d7683e9
ms.translationtype: HT
ms.contentlocale: zh-TW
ms.lasthandoff: 08/07/2018
ms.locfileid: "39599685"
---
# <a name="configure-hive-policies-in-domain-joined-hdinsight"></a>在已加入網域的 HDInsight 中設定 Hive 原則
了解如何針對 Hive 設定 Apache Ranger 原則。 在本文中,您會建立兩個 Ranger 原則來限制 hivesampletable 的存取權。 HDInsight 叢集隨附 hivesampletable。 設定原則之後,您可以使用 Excel 和 ODBC 驅動程式連接到 HDInsight 中的 Hive 資料表。
## <a name="prerequisites"></a>必要條件
* 已加入網域的 HDInsight 叢集。 請參閱[設定已加入網域的 HDInsight 叢集](apache-domain-joined-configure.md)。
* 安裝 Office 2016、Office 2013 Professional Plus、Office 365 Pro Plus、Excel 2013 Standalone 或 Office 2010 Professional Plus 的工作站。
## <a name="connect-to-apache-ranger-admin-ui"></a>連線到 Apache Ranger 系統管理 UI
**到 Ranger 系統管理 UI**
1. 從瀏覽器連線到 Ranger 系統管理 UI。 URL 是 https://<ClusterName>.azurehdinsight.net/Ranger/。
> [!NOTE]
> Ranger 會使用與 Hadoop 叢集不同的認證。 若要避免瀏覽器使用快取的 Hadoop 認證,請使用新的 InPrivate 瀏覽器視窗連線至 Ranger 系統管理 UI。
>
>
2. 使用叢集系統管理員網域使用者名稱和密碼進行登入:
![HDInsight 已加入網域的 Ranger 首頁](./media/apache-domain-joined-run-hive/hdinsight-domain-joined-ranger-home-page.png)
目前,Ranger 僅適用於 Yarn 和 Hive。
## <a name="create-domain-users"></a>建立網域使用者
如需如何建立 hiveruser1 和 hiveuser2 的相關資訊,請參閱[建立已加入網域的 HDInsight 叢集](apache-domain-joined-configure-using-azure-adds.md#create-a-domain-joined-hdinsight-cluster)。 在本教學課程中,您會使用兩個使用者帳戶。
## <a name="create-ranger-policies"></a>建立 Ranger 原則
在這一節中,您會建立兩個 Ranger 原則以供存取 hivesampletable。 您會提供不同資料行集的選取權限。 兩個使用者均是按照[建立已加入網域的 HDInsight 叢集](apache-domain-joined-configure-using-azure-adds.md#create-a-domain-joined-hdinsight-cluster)所建立。 在下一節中,您將在 Excel 中測試這兩個原則。
**建立 Ranger 原則**
1. 開啟 Ranger 系統管理 UI。 請參閱[連接到 Apache Ranger 系統管理 UI](#connect-to-apache-ranager-admin-ui)。
2. 按一下 [Hive] 下的 **<ClusterName>_hive**。 您會看到兩個預先設定的原則。
3. 按一下 [新增原則],然後輸入下列值︰
* 原則名稱︰read-hivesampletable-all
* Hive 資料庫︰預設值
* 資料表:hivesampletable
* Hive 資料欄:*
* 選取使用者:hiveuser1
* 權限:選取
![HDInsight 已加入網域的 Ranger Hive 原則設定](./media/apache-domain-joined-run-hive/hdinsight-domain-joined-configure-ranger-policy.png).
> [!NOTE]
> 如果 [選取使用者] 中未填入網域使用者,請稍等一下讓 Ranger 與 AAD 同步處理。
>
>
4. 按一下 [新增] 以儲存規則。
5. 重複最後兩個步驟,使用下列屬性建立另一個原則︰
* 原則名稱︰read-hivesampletable-devicemake
* Hive 資料庫︰預設值
* 資料表:hivesampletable
* Hive 資料行︰clientid、devicemake
* 選取使用者:hiveuser2
* 權限:選取
## <a name="create-hive-odbc-data-source"></a>建立 Hive ODBC 資料來源
在[建立 Hive ODBC 資料來源](../hadoop/apache-hadoop-connect-excel-hive-odbc-driver.md)中可找到相關指示。
| 屬性 |說明 |
| --- | --- |
| 資料來源名稱 | 為資料來源指定名稱 |
| Host | 輸入 <HDInsightClusterName>.azurehdinsight.net。 例如,myHDICluster.azurehdinsight.net |
| Port | 使用 **443** (此連接埠已從 563 變更為 443)。 |
| 資料庫 | 使用**預設值** |
| Hive 伺服器類型 | 選取 [Hive Server 2] |
| 機制 | 選取 [Azure HDInsight 服務] |
| HTTP 路徑 | 保留為空白。 |
| 使用者名稱 | 輸入 hiveuser1@contoso158.onmicrosoft.com。 更新網域名稱 (如果不同的話)。 |
| 密碼 | 輸入 hiveuser1 的密碼。 |
請務必先按一下 [測試],再儲存資料來源。
## <a name="import-data-into-excel-from-hdinsight"></a>從 HDInsight 將資料匯入 Excel 中
在上一節中,您已設定兩個原則。 hiveuser1 具有所有資料行的選取權限,而 hiveuser2 具有兩個資料行的選取權限。 本節中,您可以模擬兩位使用者將資料匯入 Excel 中。
1. 在 Excel 中開啟新的或現有的活頁簿。
2. 在 [資料] 索引標籤上按一下 [從其他資料來源],然後按一下 [從資料連接精靈],以啟動 [資料連接精靈]。
![開啟資料連接精靈][img-hdi-simbahiveodbc.excel.dataconnection]
3. 選取 [ODBC DSN] 作為資料來源,然後按 [下一步]。
4. 從 ODBC 資料來源中,選取您在上一個步驟中建立的資料來源名稱,然後按 [下一步] 。
5. 在精靈中重新輸入叢集的密碼,然後按一下 [確定]。 等待 [選取資料庫及資料表] 對話方塊開啟。 這可能需要幾秒鐘的時間。
6. 選取 **hivesampletable**,然後按 [下一步]。
7. 按一下 [完成] 。
8. 在 [匯入資料] 對話方塊中,您可以變更或指定查詢。 若要執行此動作,請按一下 [屬性] 。 這可能需要幾秒鐘的時間。
9. 按一下 [定義] 索引標籤。命令文字如下:
SELECT * FROM "HIVE"."default"."hivesampletable"
您定義的 Ranger 原則,hiveuser1 會有所有資料行的選取權限。 所以此查詢適用於 hiveuser1 的認證,但此查詢不適用於 hiveuser2 的認證。
![連接屬性][img-hdi-simbahiveodbc-excel-connectionproperties]
10. 按一下 [確定] 以關閉 [連接屬性] 對話方塊。
11. 按一下 [確定] 以關閉 [匯入資料] 對話方塊。
12. 重新輸入 hiveuser1 的密碼,然後按一下 [確定]。 經過數秒後,資料即會匯入至 Excel。 完成時,您會看到 11 個資料行的資料。
測試您在上一節中建立的第二個原則 (read-hivesampletable-devicemake)
1. 在 Excel 中新增工作表。
2. 依照上一個程序匯入資料。 您會進行的唯一變更是使用 hiveuser2 的認證,而非使用 hiveuser1 的認證。 這會失敗,因為 hiveuser2 只有查看兩個資料行的權限。 您會收到下列錯誤︰
[Microsoft][HiveODBC] (35) Error from Hive: error code: '40000' error message: 'Error while compiling statement: FAILED: HiveAccessControlException Permission denied: user [hiveuser2] does not have [SELECT] privilege on [default/hivesampletable/clientid,country ...]'.
3. 依照相同程序匯入資料。 這次使用 hiveuser2 的認證,並且修改 select 陳述式,從︰
SELECT * FROM "HIVE"."default"."hivesampletable"
至:
SELECT clientid, devicemake FROM "HIVE"."default"."hivesampletable"
完成時,您會看到已匯入 2 個資料行的資料。
## <a name="next-steps"></a>後續步驟
* 如需設定已加入網域的 HDInsight 叢集,請參閱[設定已加入網域的 HDInsight 叢集](apache-domain-joined-configure.md)。
* 如需管理已加入網域的 HDInsight 叢集,請參閱[管理已加入網域的 HDInisight 叢集](apache-domain-joined-manage.md)。
* 若要在已加入網域的 HDInsight 叢集上使用 SSH 執行 Hive 查詢,請參閱[搭配 HDInsight 使用 SSH](../hdinsight-hadoop-linux-use-ssh-unix.md#domainjoined)。
* 如需使用 Hive JDBC 連接 Hive,請參閱 [使用 Hive JDBC 驅動程式連接到 Azure HDInsight 上的 Hive](../hadoop/apache-hadoop-connect-hive-jdbc-driver.md)
* 如需使用 Hive ODBC 將 Excel 連接到 Hadoop,請參閱[使用 Microsoft Hive ODBC 驅動程式將 Excel 連接到 Hadoop](../hadoop/apache-hadoop-connect-excel-hive-odbc-driver.md)
* 如需使用 Power Query 將 Excel 連接到 Hadoop,請參閱[使用 Power Query 將 Excel 連接到 Hadoop](../hadoop/apache-hadoop-connect-excel-power-query.md)
| 40.8 | 276 | 0.738796 | yue_Hant | 0.936763 |
8a15bd4df21522a4db08a3f20ec6480acabc9d53 | 2,781 | md | Markdown | _posts/2020-03-23-python-calling-static-methods-within-the-same-class.md | erikyao/erikyao.github.io | e5cd2af3f4f0bb5e46c9ab5c332cb05bfcd1ed83 | [
"MIT"
] | 4 | 2015-08-04T13:12:57.000Z | 2019-10-22T07:30:26.000Z | _posts/2020-03-23-python-calling-static-methods-within-the-same-class.md | erikyao/erikyao.github.io | e5cd2af3f4f0bb5e46c9ab5c332cb05bfcd1ed83 | [
"MIT"
] | null | null | null | _posts/2020-03-23-python-calling-static-methods-within-the-same-class.md | erikyao/erikyao.github.io | e5cd2af3f4f0bb5e46c9ab5c332cb05bfcd1ed83 | [
"MIT"
] | null | null | null | ---
layout: post
title: "Python: calling static methods within the same class / recursive static methods"
description: ""
category: Python
tags: []
---
{% include JB/setup %}
假设我们有一个 `class Test`,有一个 `@staticmethod foo`:
```python
class Test:
@staticmethod
def foo():
print("foo")
```
那么对于下面三种情况:
1. `class Test` 有一个 member method 要 call `foo`
2. `class Test` 有一个 `@classmethod` 要 call `foo`
3. `class Test` 有一个 `@staticmethod` 要 call `foo`
我们应该怎么写代码?
## 1. When a member method calls `@staticmethod foo`
用 `self.foo()`、`self.__class__.foo()` 或者 class 全称 `Test.foo()` 都可以:
```python
class Test:
@staticmethod
def foo():
print("foo")
def bar(self):
self.foo()
def baz(self):
self.__class__.foo()
def qux(self):
Test.foo()
t = Test()
t.bar() # Output: foo
t.baz() # Output: foo
t.qux() # Output: foo
```
## 2. When a `@classmethod` calls `@staticmethod foo`
依葫芦画瓢,此时用 `cls.foo()` 或者 class 全称调用都行:
```python
class Test:
@staticmethod
def foo():
print("foo")
@classmethod
def bar(cls):
cls.foo()
@classmethod
def baz(cls):
Test.foo()
Test.bar() # Output: foo
Test.baz() # Output: foo
```
## 3. When another `@staticmethod` calls `@staticmethod foo`
这种情况下,你既没有 `self` 也没有 `cls`,所以你此时**只能**用 class 全称去调用。**不用前缀直接调用是非法的:**
```python
class Test:
@staticmethod
def foo():
print("foo")
@staticmethod
def bar():
foo() # WRONG
@staticmethod
def baz():
Test.foo() # OK
Test.bar() # NameError: name 'foo' is not defined
Test.baz() # Output: foo
```
总结一下就是:
1. 有 handle (`self` 或 `cls`) 就用 handle
2. 没有 handle 就用 class 全称
然后,由于 `@staticmethod` calls `@staticmethod` 的这套规则**对 `@staticmethod` 的递归调用一样适用**,然后我个人不太喜欢用 class 全称,所以下面这样的写法我就觉得别扭:
```python
from functools import lru_cache
class Fibonacci:
@staticmethod
@lru_cache(maxsize=32)
def generate(n):
"""
Generate the n-th element in the Fibonacci sequence. n starts from 0
"""
if n == 0:
return 0
elif n == 1:
return 1
else:
return Fibonacci.generate(n-1) + Fibonacci.generate(n-2)
Fibonacci.generate(5) # Output: 5
```
感觉这种情况下用 `@classmethod` 做递归写起来会更好看一点:
```python
from functools import lru_cache
class Fibonacci:
@classmethod
@lru_cache(maxsize=32)
def generate(cls, n):
"""
Generate the n-th element in the Fibonacci sequence. n starts from 0
"""
if n == 0:
return 0
elif n == 1:
return 1
else:
return cls.generate(n-1) + cls.generate(n-2)
Fibonacci.generate(5) # Output: 5
``` | 19.447552 | 117 | 0.580726 | eng_Latn | 0.505897 |
8a15cce9edaebbb3feca84c60cabf0985521ced2 | 1,173 | md | Markdown | README.md | ondras12345/Arduino-alarm-clock | 2fe1c2c802d3e58ae25a383a8736e82e54c1f75f | [
"MIT"
] | null | null | null | README.md | ondras12345/Arduino-alarm-clock | 2fe1c2c802d3e58ae25a383a8736e82e54c1f75f | [
"MIT"
] | null | null | null | README.md | ondras12345/Arduino-alarm-clock | 2fe1c2c802d3e58ae25a383a8736e82e54c1f75f | [
"MIT"
] | null | null | null | # Arduino-alarm-clock
Arduino alarm clock using a DS3231 RTC and a LCD
**WARNING**: This project is still under development.
# Features
- configurable number (default 6, max 16) of
[configurable](./docs/manual.md#Alarms) alarms
- snooze feature with configurable time and count
- a different [ringing](./docs/manual.md#Ringing) tone when snooze cannot be
used (last ringing)
- a LED strip that slowly lights up before the alarm sounds
([ambient](./docs/manual.md#Ambient-LED-strip))
- 2 separate buttons (snooze and stop). Stop can be installed further away
from the bed, so that the user cannot reach it while still laying.
- a 16x2 character LCD with a rotary encoder for configuration
([GUI](./docs/manual.md#LCD))
- a serial port (UART) text-based configuration interface
([CLI](./docs/manual.md#Serial-CLI))
## TODO
- buzzer loudness ramp-up
- melodies for the buzzer
# Requirements
- https://github.com/adafruit/RTClib >=1.5.0 (RTClib PR #149)
- https://github.com/johnrickman/LiquidCrystal_I2C
- https://github.com/thomasfredericks/Bounce2
- https://github.com/PaulStoffregen/Encoder
# Docs
See the [manual][manual].
[manual]: ./docs/manual.md
| 30.076923 | 76 | 0.741688 | eng_Latn | 0.825882 |
8a162646e591fab8fe19090380039820e086500a | 1,302 | md | Markdown | docs/interfaces/irewardsselector.md | Bytebit-Org/roblox-RewardContainers | 7ace6a173df8439a4e3e1a9726419d5e92a5254f | [
"MIT"
] | 4 | 2021-03-04T21:08:12.000Z | 2022-02-13T23:32:35.000Z | docs/interfaces/irewardsselector.md | Bytebit-Org/roblox-RewardContainers | 7ace6a173df8439a4e3e1a9726419d5e92a5254f | [
"MIT"
] | null | null | null | docs/interfaces/irewardsselector.md | Bytebit-Org/roblox-RewardContainers | 7ace6a173df8439a4e3e1a9726419d5e92a5254f | [
"MIT"
] | null | null | null | [@rbxts/reward-containers](../README.md) / IRewardsSelector
# Interface: IRewardsSelector
Provides the interface for selecting rewards
## Implemented by
* [*ConstantRewardsSelector*](../classes/constantrewardsselector.md)
* [*RepeatingSeriesRewardsSelector*](../classes/repeatingseriesrewardsselector.md)
* [*WeightedRewardsSelector*](../classes/weightedrewardsselector.md)
## Table of contents
### Methods
- [selectRewards](irewardsselector.md#selectrewards)
- [selectRewardsAsync](irewardsselector.md#selectrewardsasync)
## Methods
### selectRewards
▸ **selectRewards**(): readonly [*Reward*](../README.md#reward)<string\>[]
Selects a list of rewards
**Returns:** readonly [*Reward*](../README.md#reward)<string\>[]
Defined in: [src/interfaces/IRewardsSelector.d.ts:10](https://github.com/Bytebit-Org/roblox-RewardContainers/blob/7501d5d/src/interfaces/IRewardsSelector.d.ts#L10)
___
### selectRewardsAsync
▸ **selectRewardsAsync**(): *Promise*<readonly [*Reward*](../README.md#reward)<string\>[]\>
Asynchronously selects a list of rewards
**Returns:** *Promise*<readonly [*Reward*](../README.md#reward)<string\>[]\>
Defined in: [src/interfaces/IRewardsSelector.d.ts:15](https://github.com/Bytebit-Org/roblox-RewardContainers/blob/7501d5d/src/interfaces/IRewardsSelector.d.ts#L15)
| 30.27907 | 163 | 0.754992 | eng_Latn | 0.468249 |
8a16563c7154fab593e9bfff65a6aad7496dfb2b | 1,674 | md | Markdown | FML/README.md | heyuemao/AI_Southampton_Exam_Guide | 475476a2c61f7f0bc47c419440241e8372fc3a6c | [
"MIT"
] | 2 | 2020-12-02T02:23:10.000Z | 2020-12-23T17:11:21.000Z | FML/README.md | wangjieyao/AI_Southampton_Exam_Guide | 6cb34bc17de016178454552c1af12ad5fd1f7c47 | [
"MIT"
] | null | null | null | FML/README.md | wangjieyao/AI_Southampton_Exam_Guide | 6cb34bc17de016178454552c1af12ad5fd1f7c47 | [
"MIT"
] | null | null | null | # Foundation of machine learning
## 介绍
尼软酱老师也是会出大部分原题的。所以题目做过了,再背背,问题不大。🙄
值得注意的是,我在这里不仅给了FML的知识整理,也给了AML的往年试卷答案。为什么给了AML呢?因为AML里面的很多题目也会出现在FML里的,我也是后来才发现。而AML是有官方答案的。所以你们可以通过看看AML的答案来寻找一些原题。🥶
## 资料
1. [AML往年答案](https://github.com/RobinLuoNanjing/AI_Southampton_Exam_Guide/tree/main/FML/AML)
2. [FML 14-15 答案解析](https://github.com/RobinLuoNanjing/AI_Southampton_Exam_Guide/blob/main/FML/FML14-15%20%E7%AD%94%E6%A1%88%E8%A7%A3%E6%9E%90%20%E7%89%88%E6%9C%AC0.1%20Luo%20.docx)
3. [FML 17-18 答案解析](https://github.com/RobinLuoNanjing/AI_Southampton_Exam_Guide/blob/main/FML/FML%2017-18%E7%AD%94%E6%A1%88%E8%A7%A3%E6%9E%90%20%E7%89%88%E6%9C%AC0.5%20Luo.docx)
## Book
1. [Bishop-Pattern-Recognition-and-Machine-Learning-2006](https://github.com/RobinLuoNanjing/AI_Southampton_Exam_Guide/blob/main/FML/Book/Bishop-Pattern-Recognition-and-Machine-Learning-2006.pdf)
2. [Neural Network and Deep Learning-ch](https://github.com/RobinLuoNanjing/AI_Southampton_Exam_Guide/blob/main/FML/Book/Neural%20Network%20and%20Deep%20Learning-ch.pdf)
3. [PRML中文版-模式识别与机器学习](https://github.com/RobinLuoNanjing/AI_Southampton_Exam_Guide/blob/main/FML/Book/PRML%E4%B8%AD%E6%96%87%E7%89%88-%E6%A8%A1%E5%BC%8F%E8%AF%86%E5%88%AB%E4%B8%8E%E6%9C%BA%E5%99%A8%E5%AD%A6%E4%B9%A0.pdf)
4. [周志华-机器学习](https://github.com/RobinLuoNanjing/AI_Southampton_Exam_Guide/blob/main/FML/Book/%E5%91%A8%E5%BF%97%E5%8D%8E-%E6%9C%BA%E5%99%A8%E5%AD%A6%E4%B9%A0.pdf)
5. [艾伯特Pattern Recognition and Machine Learning中文版aibbtcom](https://github.com/RobinLuoNanjing/AI_Southampton_Exam_Guide/blob/main/FML/Book/%E8%89%BE%E4%BC%AF%E7%89%B9Pattern%20Recognition%20and%20Machine%20Learning%E4%B8%AD%E6%96%87%E7%89%88aibbtcom.pdf)
| 79.714286 | 255 | 0.79092 | yue_Hant | 0.886948 |
8a173277671beac38fc2d4ae7f4d036b7c357d7d | 2,111 | md | Markdown | docs/mfc/manipulating-the-tool-tip-control.md | insurgent92/cpp-docs.ko-kr | 06a8d8eee5c911618f014fb0d58059afd10553f0 | [
"CC-BY-4.0",
"MIT"
] | 3 | 2019-10-11T07:41:28.000Z | 2021-06-29T08:27:00.000Z | docs/mfc/manipulating-the-tool-tip-control.md | jacking75/cpp-docs.ko-kr | a3d97df4004aac6e595d7bdb04957fd517fb0a82 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | docs/mfc/manipulating-the-tool-tip-control.md | jacking75/cpp-docs.ko-kr | a3d97df4004aac6e595d7bdb04957fd517fb0a82 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | ---
title: 도구 설명 컨트롤 조작
ms.date: 11/04/2016
helpviewer_keywords:
- CToolTipCtrl class [MFC], manipulating tool tip attributes
- tool tips [MFC], attributes
ms.assetid: 3600afe5-712a-4b56-8456-96e85fe879af
ms.openlocfilehash: 2624f6c1da0e771b34d590d787c00e53ee6ff62e
ms.sourcegitcommit: 6052185696adca270bc9bdbec45a626dd89cdcdd
ms.translationtype: MT
ms.contentlocale: ko-KR
ms.lasthandoff: 10/31/2018
ms.locfileid: "50625929"
---
# <a name="manipulating-the-tool-tip-control"></a>도구 설명 컨트롤 조작
클래스 `CToolTipCtrl` 멤버의 그룹에는 다양 한 특성을 제어 하는 함수를 제공 합니다 `CToolTipCtrl` 개체 및 도구 설명 창이 있습니다.
팝업을 초기 및 도구 설명 창이 설정 하 고 호출 하 여 검색할 수에 대 한 기간을 reshow [GetDelayTime](../mfc/reference/ctooltipctrl-class.md#getdelaytime) 하 고 [SetDelayTime](../mfc/reference/ctooltipctrl-class.md#setdelaytime)합니다.
다음 함수를 사용 하 여 도구 설명 창의 모양을 변경 합니다.
- [GetMargin](../mfc/reference/ctooltipctrl-class.md#getmargin) 하 고 [SetMargin](../mfc/reference/ctooltipctrl-class.md#setmargin) 도구 설명 테두리와 도구 사이의 너비 팁 텍스트를 검색 하 고 설정 합니다.
- [GetMaxTipWidth](../mfc/reference/ctooltipctrl-class.md#getmaxtipwidth) 하 고 [SetMaxTipWidth](../mfc/reference/ctooltipctrl-class.md#setmaxtipwidth) 도구의 최대 너비를 팁 창 설정 및 검색 합니다.
- [GetTipBkColor](../mfc/reference/ctooltipctrl-class.md#gettipbkcolor) 하 고 [SetTipBkColor](../mfc/reference/ctooltipctrl-class.md#settipbkcolor) 도구의 배경색 팁 창 설정 및 검색 합니다.
- [GetTipTextColor](../mfc/reference/ctooltipctrl-class.md#gettiptextcolor) 하 고 [SetTipTextColor](../mfc/reference/ctooltipctrl-class.md#settiptextcolor) 도구의 텍스트 색 팁 창 설정 및 검색 합니다.
WM_LBUTTONXXX 메시지와 같은 중요 한 메시지를 통보 하 여 도구 설명 컨트롤에서 도구 설명 컨트롤에 메시지를 릴레이 해야 합니다. 이 릴레이 대 한 최상의 메서드를 호출 하는 것 [CToolTipCtrl::RelayEvent](../mfc/reference/ctooltipctrl-class.md#relayevent)를 `PreTranslateMessage` 소유자 창의 함수입니다. 다음 예제에서는 가능한 방법 중 하나를 보여 줍니다 (도구 설명 컨트롤 라고 `m_ToolTip`):
[!code-cpp[NVC_MFCControlLadenDialog#41](../mfc/codesnippet/cpp/manipulating-the-tool-tip-control_1.cpp)]
도구 설명 창이 즉시 제거 하려면 호출을 [팝](../mfc/reference/ctooltipctrl-class.md#pop) 멤버 함수입니다.
## <a name="see-also"></a>참고 항목
[CToolTipCtrl 사용](../mfc/using-ctooltipctrl.md)<br/>
[컨트롤](../mfc/controls-mfc.md)
| 50.261905 | 277 | 0.757461 | kor_Hang | 0.998876 |
8a1767ff8d4578fac5aa186674a8ccd1c4fef1c1 | 4,182 | md | Markdown | kittypedia/KITTY-1001.md | cryptocopycats/kittyverse | 98a887518e60ff0b2e705d14dedee533ef92149f | [
"CC0-1.0"
] | 19 | 2019-01-11T08:15:11.000Z | 2021-10-06T07:07:05.000Z | kittypedia/KITTY-1001.md | cryptocopycats/kittyverse | 98a887518e60ff0b2e705d14dedee533ef92149f | [
"CC0-1.0"
] | null | null | null | kittypedia/KITTY-1001.md | cryptocopycats/kittyverse | 98a887518e60ff0b2e705d14dedee533ef92149f | [
"CC0-1.0"
] | 6 | 2019-08-14T18:38:00.000Z | 2021-08-14T08:55:07.000Z | # Kitty #1001
Genes (256-Bit Integer Number):
- Base 10 (Decimal): 512955438081049600613224346938352058409509756310147795204209859701881294
- Base 2 (Binary): 01001-01001-01001-01001 00110-00111-00111-00100 00001-00001-01110-00001 01001-01111-01110-01110 00000-00101-00101-00000 00110-00110-00100-00100 01101-01000-00110-01000 00001-00011-00011-00000 00101-00101-00101-00110 00110-00101-00101-00011 01001-01000-01001-01001 01011-01110-01110-01110
- Base 2⁵ = 32
- (Kai): aaaa 7885 22f2 agff 1661 7755 e979 2441 6667 7664 a9aa cfff
- (Codes): 09-09-09-09 06-07-07-04 01-01-14-01 09-15-14-14 00-05-05-00 06-06-04-04 13-08-06-08 01-03-03-00 05-05-05-06 06-05-05-03 09-08-09-09 11-14-14-14
Fur (FU) - Genes 0-3
|Gene |Binary |Kai |Code | Name | |
|------|---------|-----|-----|----------|---|
| 0 | 01110 | f | FU14 |**Ragamuffin** | d |
| 1 | 01110 | f | FU14 |Ragamuffin | r1 |
| 2 | 01110 | f | FU14 |Ragamuffin | r2 |
| 3 | 01011 | c | FU11 |Himalayan | r3 |
d = dominant, r1 = 1st order recessive, r2 = 2nd order recessive, r3 = 3rd order recessive
Pattern (PA) - Genes 4-7
|Gene |Binary |Kai |Code | Name | |
|------|---------|-----|-----|----------|---|
| 4 | 01001 | a | PA09 |**Luckystripe** | d |
| 5 | 01001 | a | PA09 |Luckystripe | r1 |
| 6 | 01000 | 9 | PA08 |Calicool | r2 |
| 7 | 01001 | a | PA09 |Luckystripe | r3 |
Eye Color (EC) - Genes 8-11
|Gene |Binary |Kai |Code | Name | |
|------|---------|-----|-----|----------|---|
| 8 | 00011 | 4 | EC03 |**Mintgreen** | d |
| 9 | 00101 | 6 | EC05 |Sizzurp | r1 |
| 10 | 00101 | 6 | EC05 |Sizzurp | r2 |
| 11 | 00110 | 7 | EC06 |Chestnut | r3 |
Eye Shape (ES) - Genes 12-15
|Gene |Binary |Kai |Code | Name | |
|------|---------|-----|-----|----------|---|
| 12 | 00110 | 7 | ES06 |**Crazy** | d |
| 13 | 00101 | 6 | ES05 |Simple | r1 |
| 14 | 00101 | 6 | ES05 |Simple | r2 |
| 15 | 00101 | 6 | ES05 |Simple | r3 |
Base Color (BC) - Genes 16-19
|Gene |Binary |Kai |Code | Name | |
|------|---------|-----|-----|----------|---|
| 16 | 00000 | 1 | BC00 |**Shadowgrey** | d |
| 17 | 00011 | 4 | BC03 |Orangesoda | r1 |
| 18 | 00011 | 4 | BC03 |Orangesoda | r2 |
| 19 | 00001 | 2 | BC01 |Salmon | r3 |
Highlight Color (HC) - Genes 20-23
|Gene |Binary |Kai |Code | Name | |
|------|---------|-----|-----|----------|---|
| 20 | 01000 | 9 | HC08 |**Swampgreen** | d |
| 21 | 00110 | 7 | HC06 |Royalpurple | r1 |
| 22 | 01000 | 9 | HC08 |Swampgreen | r2 |
| 23 | 01101 | e | HC13 |Lemonade | r3 |
Accent Color (AC) - Genes 24-27
|Gene |Binary |Kai |Code | Name | |
|------|---------|-----|-----|----------|---|
| 24 | 00100 | 5 | AC04 |**Granitegrey** | d |
| 25 | 00100 | 5 | AC04 |Granitegrey | r1 |
| 26 | 00110 | 7 | AC06 |Kittencream | r2 |
| 27 | 00110 | 7 | AC06 |Kittencream | r3 |
Wild Element (WE) - Genes 28-31
|Gene |Binary |Kai |Code | Name | |
|------|---------|-----|-----|----------|---|
| 28 | 00000 | 1 | WE00 |**∅** | d |
| 29 | 00101 | 6 | WE05 |∅ | r1 |
| 30 | 00101 | 6 | WE05 |∅ | r2 |
| 31 | 00000 | 1 | WE00 |∅ | r3 |
Mouth (MO) - Genes 32-35
|Gene |Binary |Kai |Code | Name | |
|------|---------|-----|-----|----------|---|
| 32 | 01110 | f | MO14 |**Happygokitty** | d |
| 33 | 01110 | f | MO14 |Happygokitty | r1 |
| 34 | 01111 | g | MO15 |Soserious | r2 |
| 35 | 01001 | a | MO09 |Pouty | r3 |
Environment (EN) - Genes 36-39
|Gene |Binary |Kai |Code | Name | |
|------|---------|-----|-----|----------|---|
| 36 | 00001 | 2 | EN01 |**∅** | d |
| 37 | 01110 | f | EN14 |∅ | r1 |
| 38 | 00001 | 2 | EN01 |∅ | r2 |
| 39 | 00001 | 2 | EN01 |∅ | r3 |
Secret Y Gene (SE) - Genes 40-43
|Gene |Binary |Kai |Code | Name | |
|------|---------|-----|-----|----------|---|
| 40 | 00100 | 5 | SE04 |**∅** | d |
| 41 | 00111 | 8 | SE07 |∅ | r1 |
| 42 | 00111 | 8 | SE07 |∅ | r2 |
| 43 | 00110 | 7 | SE06 |∅ | r3 |
Purrstige (PU) - Genes 44-47
|Gene |Binary |Kai |Code | Name | |
|------|---------|-----|-----|----------|---|
| 44 | 01001 | a | PU09 |**∅** | d |
| 45 | 01001 | a | PU09 |∅ | r1 |
| 46 | 01001 | a | PU09 |∅ | r2 |
| 47 | 01001 | a | PU09 |∅ | r3 |
| 34.561983 | 306 | 0.483501 | yue_Hant | 0.150408 |
8a18095978616c99dc1ce23903d7033e8b67e4e7 | 729 | md | Markdown | oasis/oasisctl-lock-policy.md | kurtishouser/docs | c0cf8ce75437291d70812923eb2c86a4e5c54955 | [
"Apache-2.0"
] | 18 | 2019-05-15T12:28:13.000Z | 2022-03-21T05:59:59.000Z | oasis/oasisctl-lock-policy.md | kurtishouser/docs | c0cf8ce75437291d70812923eb2c86a4e5c54955 | [
"Apache-2.0"
] | 380 | 2019-04-30T14:08:19.000Z | 2022-03-31T19:17:26.000Z | oasis/oasisctl-lock-policy.md | kurtishouser/docs | c0cf8ce75437291d70812923eb2c86a4e5c54955 | [
"Apache-2.0"
] | 60 | 2018-08-01T10:18:59.000Z | 2022-03-23T08:03:06.000Z | ---
layout: default
description: Description of the oasisctl lock policy command
title: Oasisctl Lock Policy
---
# Oasisctl Lock Policy
Lock a backup policy
## Synopsis
Lock a backup policy
```
oasisctl lock policy [flags]
```
## Options
```
-d, --backup-policy-id string Identifier of the backup policy
-h, --help help for policy
```
## Options inherited from parent commands
```
--endpoint string API endpoint of the ArangoDB Oasis (default "api.cloud.arangodb.com")
--format string Output format (table|json) (default "table")
--token string Token used to authenticate at ArangoDB Oasis
```
## See also
* [oasisctl lock](oasisctl-lock.html) - Lock resources
| 19.702703 | 95 | 0.670782 | eng_Latn | 0.884272 |
8a18210de1f8966aaca1a7654be5d6a9ef1953a7 | 2,483 | md | Markdown | docs/airnode/v0.5/grp-providers/README.md | bdrhn9/api3-docs | 4a85be81af5c6f99bd869e5ac7062e00b11f0fb5 | [
"MIT"
] | null | null | null | docs/airnode/v0.5/grp-providers/README.md | bdrhn9/api3-docs | 4a85be81af5c6f99bd869e5ac7062e00b11f0fb5 | [
"MIT"
] | 1 | 2022-03-25T04:53:09.000Z | 2022-03-25T04:53:09.000Z | docs/airnode/v0.5/grp-providers/README.md | bdrhn9/api3-docs | 4a85be81af5c6f99bd869e5ac7062e00b11f0fb5 | [
"MIT"
] | null | null | null | ---
title: Overview
---
<TitleSpan>API Providers</TitleSpan>
# {{$frontmatter.title}}
<VersionWarning/>
An **API Provider** is you, if you wish to publish data from your API to
on-chain contracts which are called requesters. You can do so by building an
Airnode. An Airnode is a first-party oracle that will push off-chain API data to
any on-chain requester. See the [Developer](../grp-developers/) section to learn
more about how developers will use your Airnode.
See the [Guides](guides/build-an-airnode/) section in the API Provider docs to
build the necessary files required to deploy an Airnode. The diagrams below
illustrate the required components to successfully deploy an Airnode to AWS, GCP
or a Docker Container.
:::: tabs
::: tab AWS
![image](../assets/images/api-provider-overview-aws.png)
1. <p class="diagram-line" style="color:black;"><b>config.json</b>: Contains the Airnode's configuration. The OIS object is important as it maps an API to Airnode endpoints.</p>
2. <p class="diagram-line" style="color:green;margin-top:10px;"><b>secrets.env</b>: Values that should not be exposed in config.json.</p>
3. <p class="diagram-line" style="color:blue;margin-top:10px;">aws.env: AWS credentials required by the Docker deployer image.</p>
4. <p class="diagram-line" style="color:gray;margin-top:10px;"><b>Docker deployer image</b>: Deploys Airnode using its deploy command.</p>
:::
::: tab GCP
![image](../assets/images/api-provider-overview-gcp.png)
1. <p class="diagram-line" style="color:black;"><b>config.json</b>: Contains the Airnode's configuration. The OIS object is important as it maps an API to Airnode endpoints.</p>
2. <p class="diagram-line" style="color:green;margin-top:10px;"><b>secrets.env</b>: Values that should not be exposed in config.json.</p>
3. <p class="diagram-line" style="color:gray;margin-top:10px;"><b>Docker deployer image</b>: Deploys Airnode using its deploy command.</p>
:::
::: tab Container
![image](../assets/images/api-provider-overview-container.png)
1. <p class="diagram-line" style="color:black;"><b>config.json</b>: Contains the Airnode's configuration. The OIS object is important as it maps an API to Airnode endpoints.</p>
2. <p class="diagram-line" style="color:green;margin-top:10px;"><b>secrets.env</b>: Values that should not be exposed in config.json.</p>
3. <p class="diagram-line" style="color:gray;margin-top:10px;"><b>Docker client image</b>: Deploys Airnode using its deploy command.</p>
:::
::::
| 44.339286 | 177 | 0.732179 | eng_Latn | 0.912072 |
8a184f09717f25e741fb9f4a28dddf3703add542 | 1,877 | md | Markdown | docs/ssms/menu-help/choose-search-folders-dialog-box-visual-studio.md | lxyhcx/sql-docs.zh-cn | e63de561000b0b4bebff037bfe96170d6b61c908 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | docs/ssms/menu-help/choose-search-folders-dialog-box-visual-studio.md | lxyhcx/sql-docs.zh-cn | e63de561000b0b4bebff037bfe96170d6b61c908 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | docs/ssms/menu-help/choose-search-folders-dialog-box-visual-studio.md | lxyhcx/sql-docs.zh-cn | e63de561000b0b4bebff037bfe96170d6b61c908 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | ---
title: “选择搜索文件夹”对话框 (Visual Studio) | Microsoft Docs
ms.custom: ''
ms.date: 01/19/2017
ms.prod: sql
ms.prod_service: sql-tools
ms.component: ssms-menu
ms.reviewer: ''
ms.suite: sql
ms.technology: ssms
ms.tgt_pltfrm: ''
ms.topic: conceptual
f1_keywords:
- vs.lookin
ms.assetid: 2eaba888-68b2-4bc1-8f62-e96e710c3db9
caps.latest.revision: 4
author: stevestein
ms.author: sstein
manager: craigg
ms.openlocfilehash: 20843ef85241c596c756d7bc0ad45776168d7105
ms.sourcegitcommit: 1740f3090b168c0e809611a7aa6fd514075616bf
ms.translationtype: HT
ms.contentlocale: zh-CN
ms.lasthandoff: 05/03/2018
---
# <a name="choose-search-folders-dialog-box-visual-studio"></a>“选择搜索文件夹”对话框 (Visual Studio)
[!INCLUDE[appliesto-ss-asdb-asdw-pdw-md](../../includes/appliesto-ss-asdb-asdw-pdw-md.md)]
使用该对话框,您可以组合、保存和修改自己命名的搜索文件夹集,并指定文件夹的搜索顺序。 若要显示此对话框,请在“在文件中查找”、“在文件中替换”或“查找和替换”窗口上,选择“查找范围”下拉列表旁的“浏览(...)”按钮。
向“选择的文件夹”列表中添加文件夹,在“文件夹集”字段中为此文件夹集键入名称,再单击“应用”保存此文件夹集。 然后,在“在文件中查找”和“在文件中替换”的“查找范围”下拉列表中,可以通过名称来选择此自定义搜索范围。 若要从“查找范围”列表中删除自定义文件夹集,请在“文件夹集”字段中选择其名称,再单击“删除”。
## <a name="options"></a>“常规”
以下控件可用于帮助您组合、保存和修改自己命名的搜索文件夹集。
**文件夹集**
列出可用于搜索的目录。 若要创建新的文件夹集,请输入名称,向“选择的文件夹”列表中添加一组搜索文件夹,再单击“应用”。
**应用**
将在“选择的文件夹”列表中列出的搜索文件夹集另存为命名文件夹集。 然后,可以在“查找和替换”窗口的所有选项卡上的“查找范围”字段中选择此文件夹集。 使“选择搜索文件夹”对话框保持打开状态。
**删除**
从“文件夹集”字段以及“查找和替换”窗口的所有选项卡上的“查找范围”字段中删除选定的文件夹集。
**可用文件夹**
从此下拉列表中选择驱动器或文件夹以填充“文件夹列表”。
**文件夹列表**
列出在“可用文件夹”下拉列表中选择的卷内的可用驱动器和文件夹。 双击以展开所列出的任意驱动器或文件夹。 选择一个文件夹,或按住 Shfit 或 Ctrl 键以选择多个文件夹。 单击“添加(>)”将所选文件夹添加到“选择的文件夹”列中。
**Parent**
在文件夹层次结构中,将“文件夹列表”中的选择内容向上移动一级。
**添加(>)**
将在“文件夹列表”中所选文件夹添加到“选择的文件夹”列表中。
**删除(<)**
从“选择的文件夹”列表中删除所选文件夹。
**选择的文件夹**
列出从“文件夹列表”中添加的文件夹。 这些文件夹将包括在所命名的“文件夹集”中。
**应用**
将在“选择的文件夹”列表中列出的搜索文件夹集另存为命名文件夹集。 然后,可以在“查找和替换”窗口的所有选项卡上的“查找范围”字段中选择此文件夹集。 关闭“选择搜索文件夹”对话框。
| 28.876923 | 157 | 0.727224 | yue_Hant | 0.441107 |
8a187b9e3911bb2bbba5ea59f9015a7824403417 | 11,421 | md | Markdown | src/content/learn/index.md | astutejoe/ethereum-org-website | 22e726ea47669e9177839c2b8ce27e93f7f7a888 | [
"MIT"
] | null | null | null | src/content/learn/index.md | astutejoe/ethereum-org-website | 22e726ea47669e9177839c2b8ce27e93f7f7a888 | [
"MIT"
] | null | null | null | src/content/learn/index.md | astutejoe/ethereum-org-website | 22e726ea47669e9177839c2b8ce27e93f7f7a888 | [
"MIT"
] | null | null | null | ---
title: Community guides and resources
description: A set of technical and non-technical articles, guides, and resources to learn about Ethereum.
lang: en
sidebar: true
sidebarDepth: 2
---
# Community guides and resources {#learn-about-ethereum}
**Welcome to ethereum.org/learn, a set of resources to help you learn more about Ethereum.** This page includes technical **and** non-technical articles, guides, and resources. If you’re totally new to Ethereum, [we suggest you start here](/what-is-ethereum/).
Here are some excellent starting points:
- [Decentralizing Everything](https://www.youtube.com/watch?v=WSN5BaCzsbo&feature=youtu.be) _Sep 18, 2017 - Vitalik Buterin (Video)_
- [Why Decentralization Matters](https://medium.com/s/story/why-decentralization-matters-5e3f79f7638e) _Feb 18, 2018 - Chris Dixon_
- [The Year in Ethereum 2020](https://jjmstark.medium.com/the-year-in-ethereum-2020-98123e5f160d) _Jan 20, 2021 - Josh Stark and Evan Van Ness_
- [Ethereum is game-changing technology, literally](https://medium.com/@virgilgr/ethereum-is-game-changing-technology-literally-d67e01a01cf8) _Mar 29, 2019 - Virgil Griffith_
In addition to the information on this page, there are many community-built resources worth exploring:
- [EthHub](https://docs.ethhub.io) _Comprehensive knowledge base for all things Ethereum_
- [District0x](https://education.district0x.io/general-topics/understanding-ethereum/) _An educational resource about Ethereum targeted at beginners_
- [Ethereum.wiki](https://eth.wiki) _A community-built wiki about Ethereum’s technology_
- [Ethereum Foundation YouTube](https://www.youtube.com/channel/UCNOfzGXD_C9YMYmnefmPH0g) _Videos and talks about Ethereum_
- [Week in Ethereum News](https://weekinethereumnews.com/) _A weekly newsletter covering key developments across the ecosystem_
- [What’s new in Eth2](https://eth2.news) _A regular newsletter about Ethereum development_
- [ethresear.ch forum](https://ethresear.ch/) _Deeper technical discussions on Ethereum for scaling and beyond_
- [ETHGlobal](https://ethglobal.co) _An Ethereum hackathon series - attend one near you!_
## How Ethereum works {#how-ethereum-works}
High-level explanations of Ethereum and blockchain technology generally.
- [How does Ethereum work, anyway?](https://medium.com/@preethikasireddy/how-does-ethereum-work-anyway-22d1df506369) _Sept 27, 2017 - Preethi Kasireddy_
- [A Gentle Introduction to Ethereum](https://bitsonblocks.net/2016/10/02/gentle-introduction-ethereum/) _Oct 2, 2016 - Antony Lewis_
- [Introduction to Blockchain through Cryptoeconomics - Part 1](https://medium.com/blockchain-at-berkeley/introduction-to-blockchain-through-cryptoeconomics-part-1-bitcoin-369f245067f9) _Jan 26, 2018 - Zubin Koticha_
- [Introduction to Blockchain through Cryptoeconomics - Part 2](https://medium.com/mechanism-labs/introduction-to-bitcoin-through-cryptoeconomics-part-2-proof-of-work-and-nakamoto-consensus-1252f6a6c012) _July 19, 2018 - Zubin Koticha_
- [Understanding Ethereum](https://allan-gulley.medium.com/understanding-ethereum-819c2096b613?sk=c89f3aa5a4fd8b5fa0dae3042a3fa011) _Apr 27, 2021 - Allan Gulley_
- [Ethereum's original Whitepaper](/whitepaper/)
## Smart contracts {#smart-contracts}
A “smart contract” is simply a piece of code that is running on Ethereum. It’s called a “contract” because code that runs on Ethereum can control valuable things like ETH or other digital assets.
- Want to learn how to program on Ethereum with smart contracts? [ethereum.org/developers](/developers/)
- [What is a Smart Contract?](https://github.com/ethereumbook/ethereumbook/blob/develop/07smart-contracts-solidity.asciidoc#what-is-a-smart-contract) _Nov 12, 2018 - Andreas M. Antonopoulos, Gavin Wood_
- [What are Smart Contracts/Decentralized Applications?](https://docs.ethhub.io/ethereum-basics/what-is-ethereum/#what-are-smart-contracts-and-decentralized-applications) _Updated often - Ethhub_
## Ethereum development {#ethereum-development}
Aspiring Ethereum developer? Check out our developer portal. It's got documentation, tutorials, and other resources for learning how to build Ethereum products. [View developer portal](/developers/learning-tools/)
## Proof-of-work and Mining {#proof-of-work-and-mining}
Ethereum currently uses a system called "proof-of-work". This allows the Ethereum network to agree on the state of all information recorded on the Ethereum blockchain, and prevents certain kinds of economic attacks.
- [What does it mean to mine Ethereum?](https://docs.ethhub.io/using-ethereum/mining/) _Updated often - Ethhub_
You can learn more about [proof of work](/developers/docs/consensus-mechanisms/pow/) and [mining](/developers/docs/consensus-mechanisms/pow/mining/) within our developer documentation.
After [the merge](/upgrades/merge/), Ethereum will be moving to a different system called "proof-of-stake". [Read more about consensus layer upgrades below](#consensus-layer-upgrades).
## Clients and Nodes {#clients-and-nodes}
The Ethereum network is made up of many nodes, each of which runs compatible client software.
You can [learn how to run a node of your own](/developers/docs/nodes-and-clients/#running-your-own-node) or find a [comprehensive list of all Ethereum clients](/developers/docs/nodes-and-clients/#execution-clients) within our developer documentation.
## Enterprise Ethereum {#enterprise-ethereum}
Enterprise Ethereum refers to private, consortium, and hybrid implementations of the Ethereum codebase for business applications. Companies across the globe are already using Enterprise Ethereum to streamline financial markets, manage supply chains, and create new business models.
Read more about [Enterprise Ethereum](/enterprise/).
## Improving Ethereum’s scalability {#improving-ethereums-scalability}
There are many efforts underway to make Ethereum more “scalable” by improving its speed and overall transaction throughput. Generally these are sorted into “Layer 1” and “Layer 2” solutions.
“Layer 1” refers to improving the core Ethereum protocol. Ethereum has a set of upgrades planned for the continual improvement of both the [execution layer](#execution-layer-upgrades) and the [consensus layer](#consensus-layer-upgrades).
“Layer 2” refers to technologies that are built “on top” of the base Ethereum protocol, enabling greater scalability without compromising on security. There are also “off-chain” technologies like side-chains, which enable greater scalability by making a different set of security tradeoffs.
[More on Layer 2](/developers/docs/scaling/layer-2-rollups/)
## Consensus layer upgrades {#consensus-layer-upgrades}
A set of upgrades (originally known as 'Serenity' or 'Eth2') that aim to upgrade the Ethereum protocol's core for a more scalable, sustainable future, utilizing a proof-of-stake consensus layer.
[Learn everything you need to know about Ethereum upgrades](/upgrades/).
## Execution layer upgrades {#execution-layer-upgrades}
Execution layer upgrades are a separate area of research from the consensus layer. The goal is to continue to improve and maintain the execution layer of Ethereum while the consensus layer is developed and implemented.
For more information, see [EthHub’s explainer page about Ethereum's execution layer](https://docs.ethhub.io/ethereum-roadmap/ethereum-1.x/)
## Cryptoeconomics {#cryptoeconomics}
“Cryptoeconomics” is the practical science of building distributed systems, where properties of those systems are secured by financial incentives, and where the economic mechanisms are guaranteed by cryptography. It is the general term for the practice of designing and scaling blockchains like Ethereum and Bitcoin.
- [Cryptoeconomics.study](https://cryptoeconomics.study/)
- [Intro to Cryptoeconomics](https://www.youtube.com/watch?v=F0FCI8GxO5I) _(Video) Aug 19, 2018 - Karl Floersch_
- [Making Sense of Cryptoeconomics](https://medium.com/l4-media/making-sense-of-cryptoeconomics-5edea77e4e8d) _Nov 16 2017 - Josh Stark_
## Critique and skepticism {#critique-and-skepticism}
Critical views of Ethereum and Cryptocurrencies.
- [Ethereum’s roadmap isn’t ambitious enough](https://decryptmedia.com/6136/vulcanize-rick-dudley-ethereum-roadmap-makerdao-polkadot) _March 27, 2019 - Interview with Rick Dudley_
- [The Challenges of Building Ethereum Infrastructure](https://medium.com/@lopp/the-challenges-of-building-ethereum-infrastructure-87e443e47a4b) _Jan 8, 2018 - Jameson Lopp_
- [Parsimonious Answers to Difficult Questions](https://www.youtube.com/watch?v=GOkSg0BuSdw&feature=youtu.be) _(Video) March 10, 2019 - Rick Dudley_
- [There’s no good reason to trust blockchain technology](https://www.wired.com/story/theres-no-good-reason-to-trust-blockchain-technology/) _Feb 6, 2019 - Bruce Schneier_
## Books and podcasts {#books-and-podcasts}
Books on Ethereum and Cryptocurrencies:
- [Out of the Ether: The Amazing Story of Ethereum and the $55 Million Heist that Almost Destroyed It All](https://www.goodreads.com/book/show/55360267-out-of-the-ether) _September 29, 2020 - Matthew Leising_
- [The Infinite Machine: How an Army of Crypto-hackers Is Building the Next Internet with Ethereum](https://www.goodreads.com/en/book/show/50175330-the-infinite-machine) _July 14, 2020 - Camila Russo_
- [The Age of Cryptocurrency: How Bitcoin and the Blockchain Are Challenging the Global Economic Order](https://www.goodreads.com/en/book/show/22174460-the-age-of-cryptocurrency) _January 12, 2016 - Paul Vigna, Michael J. Casey_
- [The Truth Machine: The Blockchain and the Future of Everything](https://www.goodreads.com/en/book/show/34964890-the-truth-machine) _February 27, 2018 - Paul Vigna, Michael J. Casey_
- [Digital Gold: Bitcoin and the Inside Story of the Misfits and Millionaires Trying to Reinvent Money](https://www.goodreads.com/book/show/23546676-digital-gold) _May 24, 2021 - Nathaniel Popper_
- [Kings of Crypto: One Startup's Quest to Take Cryptocurrency Out of Silicon Valley and Onto Wall Street](https://www.goodreads.com/en/book/show/56274031-kings-of-crypto) _December 15, 2020 - Jeff John Roberts_
- [Mastering Ethereum](https://github.com/ethereumbook/ethereumbook) _December 23, 2018 – Andreas M. Antonopoulos, Gavin Wood Ph.D. _
Podcasts addressing Ethereum and Cryptocurrencies:
- [Into the Ether](https://podcast.ethhub.io/) _A podcast focusing on all things Ethereum and DeFi_
- [Bankless](http://podcast.banklesshq.com/) _A guide to Crypto finance_
- [Uncommon Core](https://uncommoncore.co/podcast/) _Explores the transformative nature of trust-minimized currency and financial services_
- [Zero Knowledge](https://www.zeroknowledge.fm/) _Goes deep into the tech that will power the emerging decentralised web and the community building this_
- [Epicenter](https://epicenter.tv/) _Explores the technical, economic, and social implications of the Crypto industry_
- [Unchained](https://unchainedpodcast.com/) _dives deep into the people building the decentralized internet, the details of this technology that could underpin our future, and some of the thorniest topics in crypto, such as regulation, security and privacy_
## Archived / No longer maintained: {#archived--no-longer-maintained}
Resources about Ethereum-related projects and resources which have been deprecated or are no longer maintained.
- [Deprecated Software](/deprecated-software/) _A list of deprecated software, dapps, and documentation_
| 81 | 316 | 0.793976 | eng_Latn | 0.915468 |
8a189759493b904ea395780c63500f437fcc4543 | 2,440 | md | Markdown | WindowsServerDocs/remote/multipoint-services/Set-Up-a-Station.md | huache/windowsserverdocs.zh-cn | a39065b2fd3ef28c99a27b6c91372b058e4422f8 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | WindowsServerDocs/remote/multipoint-services/Set-Up-a-Station.md | huache/windowsserverdocs.zh-cn | a39065b2fd3ef28c99a27b6c91372b058e4422f8 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | WindowsServerDocs/remote/multipoint-services/Set-Up-a-Station.md | huache/windowsserverdocs.zh-cn | a39065b2fd3ef28c99a27b6c91372b058e4422f8 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | ---
title: 设置工作站
description: 了解如何在 MultiPoint Services 中设置工作站
ms.topic: article
ms.assetid: dce05b6c-795e-43b2-9920-026550b873c5
author: lizap
manager: dongill
ms.author: elizapo
ms.date: 08/04/2016
ms.openlocfilehash: b50022a19ea472f68dad1032a2fe0abeb46ae910
ms.sourcegitcommit: dfa48f77b751dbc34409aced628eb2f17c912f08
ms.translationtype: MT
ms.contentlocale: zh-CN
ms.lasthandoff: 08/07/2020
ms.locfileid: "87946910"
---
# <a name="set-up-a-station"></a>设置工作站
MultiPoint 服务工作站** 通常包括工作站集线器**、鼠标、键盘和视频显示器。 本主题描述如何将硬件设备连接到工作站集线器,以创建 MultiPoint 服务工作站。
工作站集线器是一种将外围设备连接到 MultiPoint 服务系统中的计算机的硬件设备。 MultiPoint 服务支持两种类型的工作站集线器:
- **USB 集线器:** 一种符合通用串行总线 2.0 或更高规格的通用多端口 USB 扩展集线器。 此类集线器通常有两个、四个或更多个 USB 端口,可以将多个 USB 设备连接到计算机上的单个 USB 端口。 USB 集线器通常是由外部供电或总线供电的独立设备。 作为工作站集线器配合 MultiPoint 服务使用时,建议使用带有四个或更多端口的集线器。
> [!IMPORTANT]
> 如果你打算将键盘和鼠标以外的 USB 设备连接到集线器,为达到最佳性能,建议使用外部供电的集线器。
- **多功能中心:** 通过 USB 端口连接到计算机的扩展集线器,并允许将各种非 USB 设备连接到集线器,包括视频显示器。 多功能中心由特定硬件制造商生成,可能需要安装特定于设备的驱动程序。
如要添加工作站到 MultiPoint 服务系统,首先确保具有足够的连接端口可供要使用的工作站硬件利用。 此外,你必须为你的 MultiPoint 服务系统* (cal) 提供适当数量的客户端访问许可证*。
## <a name="setting-up-station-hardware"></a>设置工作站硬件
本节中的过程描述如何将 MultiPoint 服务工作站硬件连接到不同类型的工作站集线器。
### <a name="to-set-up-a-station-with-a-usb-hub"></a>通过 USB 集线器设置工作站
1. 连接新工作站前,请先*结束*所有用户*会话*,然后关闭计算机和 MultiPoint 服务系统中的其他设备。
2. 将新的视频显示器电缆连接到计算机上的视频显示端口,如下图所示:
![与基于 USB 集线器的系统连接的视频图像](./media/WMSVideoConnection.gif)
3. 将新的 USB 集线器连接到计算机上的开放 USB 端口:
![MultiPoint Server USB 集线器连接图像](./media/WMSUSBHubConnection.gif)
4. 将键盘和鼠标连接到 USB 集线器:
![USB 集线器输入设备连接图像](./media/WMSUSBDeviceConnection.gif)
5. 将视频显示器的电源线连接到电源插座。
6. 打开计算机。
7. MultiPoint 服务启动。 按照新工作站的视频显示器上显示的说明将设备关联到新的工作站。
### <a name="to-set-up-a-station-with-a-multifunction-hub"></a>通过多功能集线器设置工作站
1. 连接新工作站前,先结束所有用户会话,然后关闭计算机和 MultiPoint 服务系统中其他用电设备。
2. 将新的视频显示器电缆连接到多功能集线器上的 DVI 或 VGA 视频显示端口,如下图所示:
![多功能集线器和视频连接图像](./media/WMSMultifunctionHubVideoConnection.gif)
3. 将新的多功能集线器连接到计算机上的开放 USB 端口:
![多功能集线器连接图像](./media/WMSMultifunctionHubConnection.gif)
4. 将键盘和鼠标连接到多功能集线器上的 PS2 或 USB 连接器:
![多功能集线器和 PS2 连接器图像](./media/WMSMultifunctionHubPS2Connection.gif)
5. 将视频显示器的电源线连接到电源插座。
6. 打开计算机。
7. MultiPoint 服务启动。 如果系统提示,请按照新工作站的视频显示器上显示的说明*将设备关联*到新的工作站。
## <a name="see-also"></a>另请参阅
[结束用户会话](End-a-User-Session.md)
[重新启动或关机](Restart-or-Shut-Down.md)
[管理工作站硬件](Manage-Station-Hardware.md)
[使用 USB 设备](Work-with-USB-Devices.md) | 29.756098 | 184 | 0.772541 | yue_Hant | 0.924003 |
8a18babc18499911bae06dabffc82b8eb28a17b6 | 483 | md | Markdown | components/popover/demo/basic.md | unicorn1984/mkrc | d338fb7853b13c983169d35dc613bbe2b5c34964 | [
"MIT"
] | null | null | null | components/popover/demo/basic.md | unicorn1984/mkrc | d338fb7853b13c983169d35dc613bbe2b5c34964 | [
"MIT"
] | null | null | null | components/popover/demo/basic.md | unicorn1984/mkrc | d338fb7853b13c983169d35dc613bbe2b5c34964 | [
"MIT"
] | null | null | null | ---
order: 0
title:
zh-CN: 基本
en-US: Basic
---
## zh-CN
最简单的用法,浮层的大小由内容区域决定。
## en-US
The most basic example. The size of the floating layer depends on the contents region.
````jsx
import { Popover, Button } from 'mkrc';
const content = (
<div>
<p>Content</p>
<p>Content</p>
</div>
);
ReactDOM.render(
<Popover content={content} title="Title">
<Button type="primary">Hover me</Button>
</Popover>
, mountNode);
````
<style>
p {
margin: 0;
}
</style>
| 12.710526 | 86 | 0.614907 | eng_Latn | 0.637053 |
8a18eee9239b5a8659b0ecd1fc56082f3f3cf0f5 | 1,242 | md | Markdown | docs/ado/reference/adox-api/deleterule-property-adox.md | shohei1029/sql-docs.ja-jp | 8336d34a3767cf8fd41cf2334af49160274e5585 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | docs/ado/reference/adox-api/deleterule-property-adox.md | shohei1029/sql-docs.ja-jp | 8336d34a3767cf8fd41cf2334af49160274e5585 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | docs/ado/reference/adox-api/deleterule-property-adox.md | shohei1029/sql-docs.ja-jp | 8336d34a3767cf8fd41cf2334af49160274e5585 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | ---
description: DeleteRule プロパティ (ADOX)
title: DeleteRule プロパティ (ADOX) |Microsoft Docs
ms.prod: sql
ms.prod_service: connectivity
ms.technology: ado
ms.custom: ''
ms.date: 01/19/2017
ms.reviewer: ''
ms.topic: reference
apitype: COM
f1_keywords:
- _Key::put_DeleteRule
- _Key::DeleteRule
- _Key::GetDeleteRule
- _Key::PutDeleteRule
- _Key::get_DeleteRule
helpviewer_keywords:
- DeleteRule property [ADOX]
ms.assetid: 87bd4c0a-cae3-4007-a939-4193acaa00ac
author: rothja
ms.author: jroth
ms.openlocfilehash: 66c34576605f028401ec0cad513599ee264f542f
ms.sourcegitcommit: 917df4ffd22e4a229af7dc481dcce3ebba0aa4d7
ms.translationtype: MT
ms.contentlocale: ja-JP
ms.lasthandoff: 02/10/2021
ms.locfileid: "100050142"
---
# <a name="deleterule-property-adox"></a>DeleteRule プロパティ (ADOX)
主キーが削除されたときに実行されるアクションを示します。
## <a name="settings-and-return-values"></a>設定と戻り値
[Ruleenum](./ruleenum.md)定数のいずれかを指定できる **Long 型** の値を設定して返します。 既定値は **adRINone** です。
## <a name="remarks"></a>解説
このプロパティは、既にコレクションに追加されている [キー](./key-object-adox.md) オブジェクトに対しては読み取り専用です。
## <a name="applies-to"></a>適用対象
[Key オブジェクト (ADOX)](./key-object-adox.md)
## <a name="see-also"></a>参照
[DeleteRule プロパティの例 (VB)](./deleterule-property-example-vb.md) | 28.883721 | 87 | 0.744767 | yue_Hant | 0.376493 |
8a190ac014aed24314f27fb93be6fec868f52b89 | 1,793 | md | Markdown | _posts/7/2021-04-07-daniel-radcliffe.md | chito365/ukdat | 382c0628a4a8bed0f504f6414496281daf78f2d8 | [
"MIT"
] | null | null | null | _posts/7/2021-04-07-daniel-radcliffe.md | chito365/ukdat | 382c0628a4a8bed0f504f6414496281daf78f2d8 | [
"MIT"
] | null | null | null | _posts/7/2021-04-07-daniel-radcliffe.md | chito365/ukdat | 382c0628a4a8bed0f504f6414496281daf78f2d8 | [
"MIT"
] | null | null | null | ---
id: 9115
title: Daniel Radcliffe
date: 2021-04-07T06:39:37+00:00
author: victor
layout: post
guid: https://ukdataservers.com/daniel-radcliffe/
permalink: /04/07/daniel-radcliffe
tags:
- Husband
- Wife
- Boyfriend
- Girlfriend
category: Marriage Guides
---
* some text
{: toc}
## Who is Daniel Radcliffe
Actor best known for playing the wizard-in-training Harry Potter in the landmark Harry Potter film franchise. The role earned him numerous awards including multiple Teen Choice Awards and MTV Movie Awards as well as a National Movie Award for Best Male Performance in 2007. In 2019, he’d begin starring as Craig in the TBS series Miracle Workers.
## Prior to Popularity
He made his acting debut in BBC’s adaptation of Dickens’ David Copperfield when he was 10 years old.
## Random data
After the final installment of Harry Potter, he played leading roles in the films The Woman in Black, Kill Your Darlings, and Horns. He also earned recognition for his performance in the stage production How to Succeed in Business Without Really Trying.
## Family & Everyday Life of Daniel Radcliffe
His parents are literary agent Alan George Radcliffe and casting agent Marcia Jeannine Gresham. He dated actress Laura O’Toole, whom he met while acting in the stage production Equus, from 2007 to 2008. He began dating actress Erin Darke in 2012.
## People Related With Daniel Radcliffe
He co-starred with Emma Watson and Rupert Grint in the Harry Potter films.
| 26.367647 | 353 | 0.650307 | eng_Latn | 0.995274 |
8a1930eb829bdf748e761334f05183d52dcb4cf5 | 28,223 | md | Markdown | tutorials/deploy-grails-to-google-cloud/index.md | tjwebb/community | 02d3871360adc189523c3248febb7c9157a22a9d | [
"Apache-2.0",
"CC-BY-4.0"
] | 1 | 2019-12-12T08:59:01.000Z | 2019-12-12T08:59:01.000Z | tutorials/deploy-grails-to-google-cloud/index.md | tjwebb/community | 02d3871360adc189523c3248febb7c9157a22a9d | [
"Apache-2.0",
"CC-BY-4.0"
] | 9 | 2019-01-24T22:49:13.000Z | 2019-02-07T23:19:14.000Z | tutorials/deploy-grails-to-google-cloud/index.md | tjwebb/community | 02d3871360adc189523c3248febb7c9157a22a9d | [
"Apache-2.0",
"CC-BY-4.0"
] | 1 | 2019-01-24T22:20:56.000Z | 2019-01-24T22:20:56.000Z | ---
title: Deploy a Grails app to App Engine flexible environment
description: Deploy a Grails 3 app to App Engine flexible environment and learn how to use Cloud Storage and Cloud SQL.
author: sdelamo
tags: Cloud SQL, App Engine, Java, Grails, Cloud Storage
date_published: 2017-08-08
---
*Sergio del Amo (Object Computing, Inc.)*
*August 2017*
*Grails Version: 3.3.0*
## Getting Started
In this guide, you deploy a Grails 3 application to
[Google App Engine flexible environment][flex], upload images to
[Google Cloud Storage][storage] and use a MySQL database provided by
[Google Cloud SQL][cloud_sql].
## Costs
This guide uses paid services. You may need to enable Billing in Google Cloud to
complete some steps in this guide.
### What you will need
To complete this guide, you need the following:
- Some time on your hands
- A decent text editor or IDE
- JDK 1.7 or greater installed with JAVA_HOME configured appropriately
### How to complete the guide
To get started do the following:
1. [Download][download] and unzip the source or Clone the Git repository:
git clone https://github.com/grails-guides/grails-google-cloud.git
The Grails guides repositories contain two folders:
- `initial`: An initial project. A Grails app with additional code to give
you a head start.
- `complete`: A completed example. It is the result of working through the
steps presented by the guide and applying those changes to the `initial`
folder.
1. Change directory into the `initial` folder:
cd initial
[download]: https://github.com/grails-guides/grails-google-cloud/archive/master.zip
## Writing the application
### Domain class
The `initial` project includes a Grails domain class to map `Book` instances to
a MySQL table.
A domain class fulfills the M in the Model View Controller (MVC) pattern and
represents a persistent entity that is mapped onto an underlying database
table. In Grails a domain is a class that lives in the grails-app/domain
directory.
_grails-app/domain/demo/Book.groovy_
```groovy
package demo
import grails.compiler.GrailsCompileStatic
@GrailsCompileStatic
class Book {
String name
String featuredImageUrl
String fileName
static constraints = {
name unique: true
featuredImageUrl nullable: true
fileName nullable: true
}
}
```
### Seed data
When the application starts, it loads some seed data. In particular, it loads a
list of books.
Modify `BootStrap.groovy`:
_grails-app/init/demo/BootStrap.groovy_
```groovy
package demo
import groovy.transform.CompileStatic
@CompileStatic
class BootStrap {
def init = { servletContext ->
Book.saveAll(
new Book(name: 'Grails 3: A Practical Guide to Application Development'),
new Book(name: 'Falando de Grails',),
new Book(name: 'The Definitive Guide to Grails 2'),
new Book(name: 'Grails in Action'),
new Book(name: 'Grails 2: A Quick-Start Guide'),
new Book(name: 'Programming Grails')
)
}
def destroy = {
}
}
```
### Root URL
You want to display the books persisted when the Grails app starts
(`BootStrap.groovy`) in the home page of the application.
Map the home page to be resolved by `BookController` by modifying
`UrlMappings.groovy`
Replace:
_grails-app/controllers/demo/UrlMappings.groovy_
"/"(view:"/index")
with:
_grails-app/controllers/demo/UrlMappings.groovy_
'/'(controller: 'book')
The `initial` project modifies slightly the output of the Grails static
scaffolding command `generate-all` to provide CRUD functionality for the domain
class `Book`.
You can find the code: `BookController`, `BookGormService` and GSP views in the
\§ 21`
`initial` project.
## Google Cloud SDK
1. Signup for [Google Cloud Platform](https://console.cloud.google.com/) and
create a new project:
![Create Project](https://storage.googleapis.com/gcp-community/tutorials/deploy-grails-to-google-cloud/create-project.png)
![Create Project](https://storage.googleapis.com/gcp-community/tutorials/deploy-grails-to-google-cloud/create-project-2.png)
The previous image shows a project named **grailsgooglecloud**.
1. Install [Cloud SDK](https://cloud.google.com/sdk/downloads) for your
operating system.
1. After you have installed the SDK, run the `init` command in your terminal:
gcloud init
It prompts you to select the Google account and the project which you want
to use.
## App Engine
This guide deploys a Grails application to
[App Engine flexible environment][flex].
App Engine allows developers to focus on doing what they do best: writing
code. Based on Compute Engine, the App Engine flexible environment
automatically scales your app up and down while balancing the load.
Microservices, authorization, SQL and NoSQL databases, traffic splitting,
logging, versioning, security scanning, and content delivery networks are all
supported natively.
Run the command:
gcloud app create
to initialize an App Engine application within the current Google Cloud project.
NOTE: You need to choose the region where you want your App Engine application
located.
### Google App Engine Gradle plugin
To deploy to App Engine, add the [Google App Engine Gradle plugin][plugin] to
your project.
1. Add the plugin as a `buildscript` dependency.
_build.gradle_
buildscript {
repositories {
mavenLocal()
maven { url "https://repo.grails.org/grails/core" }
}
dependencies {
classpath "org.grails:grails-gradle-plugin:$grailsVersion"
classpath "com.bertramlabs.plugins:asset-pipeline-gradle:2.14.1"
classpath "org.grails.plugins:hibernate5:${gormVersion-".RELEASE"}"
classpath 'com.google.cloud.tools:appengine-gradle-plugin:1.3.2'
}
}
1. Apply the plugin:
_build.gradle_
apply plugin:"eclipse"
apply plugin:"idea"
apply plugin:"war"
apply plugin:"org.grails.grails-web"
apply plugin:"org.grails.grails-gsp"
apply plugin:"asset-pipeline"
apply plugin:"codenarc"
apply plugin: 'com.google.cloud.tools.appengine'
[plugin]: https://github.com/GoogleCloudPlatform/app-gradle-plugin
### Application deployment configuration
To deploy to Google App Engine, add the file `src/main/appengine/app.yaml`.
It describes the application’s deployment configuration:
_src/main/appengine/app.yaml_
```yaml
runtime: java
env: flex
runtime_config:
jdk: openjdk8
server: jetty9
health_check:
enable_health_check: False
resources:
cpu: 1
memory_gb: 2.3
manual_scaling:
instances: 1
```
Here, `app.yaml` specifies the runtime used by the app, and sets `env: flex`,
specifying that the app uses the [flexible environment][flex].
The minimal `app.yaml` application configuration file shown above is
sufficient for a simple Grails application. Depending on the size, complexity,
and features that your application uses, you may need to change and extend
this basic configuration file. For more information on what can be configured
via `app.yaml`, please see the [Configuring Your App with app.yaml][configure]
guide.
For more information on how the Java runtime works, see
[Java 8 / Jetty 9.3 Runtime][jetty].
[configure]: https://cloud.google.com/appengine/docs/flexible/java/configuring-your-app-with-app-yaml
[jetty]: https://cloud.google.com/appengine/docs/flexible/java/dev-jetty9
### SpringBoot Jetty
As shown in the previous app engine configuration file, the app uses Jetty.
Grails is built on top of SpringBoot. Following SpringBoot’s documentation, you
need to do the following changes to [deploy to Jetty instead of Tomcat][boot].
1. Replace:
_build.gradle_
compile "org.springframework.boot:spring-boot-starter-tomcat"
with:
_build.gradle_
provided "org.springframework.boot:spring-boot-starter-jetty"
1. Exclude the tomcat-juli other dependency as well:
_build.gradle_
configurations {
compile.exclude module: "tomcat-juli"
compile.exclude module: "spring-boot-starter-tomcat"
}
[boot]: https://docs.spring.io/spring-boot/docs/current/reference/html/howto-embedded-servlet-containers.html
## Cloud SQL
This guide’s Grails application uses a MySQL database created with
[Cloud SQL][cloud_sql].
Cloud SQL is a fully-managed database service that makes it easy to set up,
maintain, manage, and administer your relational PostgreSQL BETA and MySQL
databases in the cloud. Cloud SQL offers high performance, scalability, and
convenience. Hosted on Google Cloud Platform, Cloud SQL provides a database
infrastructure for applications running anywhere.
### Enable the Cloud SQL API
If you have not enabled Cloud SQL and the Cloud SQL API already, go to your
project dashboard and enable them:
![](https://storage.googleapis.com/gcp-community/tutorials/deploy-grails-to-google-cloud/cloudsql-1.png)
![](https://storage.googleapis.com/gcp-community/tutorials/deploy-grails-to-google-cloud/cloudsql-2.png)
![](https://storage.googleapis.com/gcp-community/tutorials/deploy-grails-to-google-cloud/cloudsql-3.png)
![](https://storage.googleapis.com/gcp-community/tutorials/deploy-grails-to-google-cloud/cloudsql-4.png)
![](https://storage.googleapis.com/gcp-community/tutorials/deploy-grails-to-google-cloud/cloudsqlapi-1.png)
### Create a Cloud SQL Instance
[Create a new instance of Cloud SQL](https://console.cloud.google.com/sql)
associated to the same project which you created before:
1. Go to the Cloud SQL section of the console:
![](https://storage.googleapis.com/gcp-community/tutorials/deploy-grails-to-google-cloud/cloudsql-5.png)
1. The next screenshots illustrate the process:
![](https://storage.googleapis.com/gcp-community/tutorials/deploy-grails-to-google-cloud/cloudsql-6.png)
![](https://storage.googleapis.com/gcp-community/tutorials/deploy-grails-to-google-cloud/cloudsql-7.png)
![](https://storage.googleapis.com/gcp-community/tutorials/deploy-grails-to-google-cloud/cloudsql-8.png)
![](https://storage.googleapis.com/gcp-community/tutorials/deploy-grails-to-google-cloud/cloudsql-9.png)
1. Once the instance is ready, create a database:
![](https://storage.googleapis.com/gcp-community/tutorials/deploy-grails-to-google-cloud/cloudsql-10.png)
![](https://storage.googleapis.com/gcp-community/tutorials/deploy-grails-to-google-cloud/cloudsql-11.png)
![](https://storage.googleapis.com/gcp-community/tutorials/deploy-grails-to-google-cloud/cloudsql-12.png)
### Datasource using Cloud SQL
As described in [Using Cloud SQL with a flexible environment][flex_cloud_sql]
documentation, you need to add several runtime dependencies and configure the
production URL to use the Cloud SQL MySQL database which you created before.
1. Add the MySQL dependencies JDBC library and Cloud SQL MySQL Socket Factory:
_build.gradle_
runtime 'mysql:mysql-connector-java:8.0.16'
runtime 'com.google.cloud.sql:mysql-socket-factory-connector-j-8:1.0.14'
1. Replace the `production` environment `datasource` configuration to point to the
Cloud SQL MySQL database in `application.yml`:
_grails-app/conf/application.yml_
production:
dataSource:
dialect: org.hibernate.dialect.MySQL5InnoDBDialect
driverClassName: com.mysql.cj.jdbc.Driver
dbCreate: update
url: jdbc:mysql://google/grailsgooglecloud?socketFactory=com.google.cloud.sql.mysql.SocketFactory&cloudSqlInstance=inner-topic-174815:us-central1:grailsgooglecloud&useSSL=true
username: root
password: grailsgooglecloud
The production datasource URL uses a custom URL which is built with several components:
jdbc:mysql://google/[DATABASE_NAME]?socketFactory=com.google.cloud.sql.mysql.SocketFactory&cloudSqlInstance=[INSTANCE_NAME]&useSSL=true
- For `[DATABASE_NAME]`, use the database name you used when you created the
database.
- For `[INSTANCE_NAME]`, use your instance name, which is visible in your Cloud
SQL instance details:
![](https://storage.googleapis.com/gcp-community/tutorials/deploy-grails-to-google-cloud/cloudsql-13.png)
- For this guide, use username `root`, and use the password which you entered when you created the SQL instance; see previous sections.
The [Cloud SQL Socket Factory for JDBC drivers Github Repository][factory]
contains a tool in `examples/getting-started` that can help generate the JDBC
URL and verify that connectivity can be established.
[flex_cloud_sql]: https://cloud.google.com/appengine/docs/flexible/java/using-cloud-sql
[factory]: https://github.com/GoogleCloudPlatform/cloud-sql-jdbc-socket-factory
## Cloud Storage
The app allows users to upload a book cover image. To store the images in GCP, use [Cloud Storage][storage].
Cloud Storage is unified object storage for developers and enterprises,
from live data serving to data analytics/ML to data archiving.
[Enable the Cloud Storage API](https://console.cloud.google.com/flows/enableapi?apiid=storage_api,logging,sqladmin.googleapis.com&redirect=https://console.cloud.google.com&_ga=1.20629880.1963584502.1488379440) for the project, if you have not enabled it already.
![Screenshot showing how to locate API Manager](https://storage.googleapis.com/gcp-community/tutorials/deploy-grails-to-google-cloud/cloudstorage-1.png)
![Screenshot showing how to search for Cloud Storage](https://storage.googleapis.com/gcp-community/tutorials/deploy-grails-to-google-cloud/cloudstorage-2.png)
![Screenshot showing Enable button](https://storage.googleapis.com/gcp-community/tutorials/deploy-grails-to-google-cloud/cloudstorage-3.png)
1. You can create a Cloud Storage Bucket as illustrated in the images below.
Name the bucket **grailsbucket**:
![Screenshot showing the Storage menu](https://storage.googleapis.com/gcp-community/tutorials/deploy-grails-to-google-cloud/cloudstorage-4.png)
![Screenshot showing the create bucket option](https://storage.googleapis.com/gcp-community/tutorials/deploy-grails-to-google-cloud/cloudstorage-5.png)
![Screenshot showing how to name and create a bucket](https://storage.googleapis.com/gcp-community/tutorials/deploy-grails-to-google-cloud/cloudstorage-6.png)
1. Add Cloud Storage dependency to your project dependencies:
_build.gradle_
compile 'com.google.cloud:google-cloud-storage:1.84.0'
1. Exclude `com.google.guava:guava-jdk5` too:
_build.gradle_
configurations {
compile.exclude module: "tomcat-juli"
compile.exclude module: "spring-boot-starter-tomcat"
compile.exclude(group: "com.google.guava", module: "guava-jdk5")
}
1. Append these configuration (Cloud Storage Bucket and Project id) parameters
to `application.yml`:
_grails-app/conf/application.yml_
---
googlecloud:
projectid: grailsgooglecloud
cloudStorage:
bucket: grailsbucket
These configuration parameters are used by the services described below.
1. Create a Grails command object to manage file upload parameters.
_grails-app/controllers/demo/FeaturedImageCommand.groovy_
package demo
import grails.compiler.GrailsCompileStatic
import grails.validation.Validateable
import org.springframework.web.multipart.MultipartFile
@GrailsCompileStatic
class FeaturedImageCommand implements Validateable {
MultipartFile featuredImageFile
Long id
Long version
static constraints = {
id nullable: false
version nullable: false
featuredImageFile validator: { MultipartFile val, FeaturedImageCommand obj ->
if ( val == null ) {
return false
}
if ( val.empty ) {
return false
}
['jpeg', 'jpg', 'png'].any { String extension ->
val.originalFilename?.toLowerCase()?.endsWith(extension)
}
}
}
}
1. Add two controller actions to `BookController`:
_grails-app/controllers/demo/BookController.groovy_
UploadBookFeaturedImageService uploadBookFeaturedImageService
@Transactional(readOnly = true)
def editFeaturedImage(Book book) {
respond book
}
@CompileDynamic
def uploadFeaturedImage(FeaturedImageCommand cmd) {
if (cmd.hasErrors()) {
respond(cmd.errors, model: [book: cmd], view: 'editFeaturedImage')
return
}
def book = uploadBookFeaturedImageService.uploadFeaturedImage(cmd)
if (book == null) {
notFound()
return
}
if (book.hasErrors()) {
respond(book.errors, model: [book: book], view: 'editFeaturedImage')
return
}
request.withFormat {
form multipartForm {
flash.message = message(code: 'default.updated.message', args: [message(code: 'book.label', default: 'Book'), book.id])
redirect book
}
'*' { respond book, [status: OK] }
}
}
1. The previous controller actions use a service to manage the business logic.
Create `UploadBookFeaturedImageService.groovy`:
_grails-app/services/demo/UploadBookFeaturedImageService.groovy_
package demo
import groovy.util.logging.Slf4j
import groovy.transform.CompileStatic
@Slf4j
@CompileStatic
class UploadBookFeaturedImageService {
BookGormService bookGormService
GoogleCloudStorageService googleCloudStorageService
private static String fileSuffix() {
new Date().format('-YYYY-MM-dd-HHmmssSSS')
}
Book uploadFeaturedImage(FeaturedImageCommand cmd) {
String fileName = "${cmd.featuredImageFile.originalFilename}${fileSuffix()}"
log.info "cloud storage file name $fileName"
String fileUrl = googleCloudStorageService.storeMultipartFile(fileName, cmd.featuredImageFile)
log.info "cloud storage media url $fileUrl"
def book = bookGormService.updateFeaturedImageUrl(cmd.id, cmd.version, fileName, fileUrl)
if ( !book || book.hasErrors() ) {
googleCloudStorageService.deleteFile(fileName)
}
book
}
}
1. Encapsulate the code which interacts with Cloud Storage in a service:
_grails-app/services/demo/GoogleCloudStorageService.groovy_
package demo
import com.google.cloud.storage.Acl
import com.google.cloud.storage.BlobId
import com.google.cloud.storage.BlobInfo
import com.google.cloud.storage.Storage
import com.google.cloud.storage.StorageOptions
import grails.config.Config
import grails.core.support.GrailsConfigurationAware
import org.springframework.web.multipart.MultipartFile
import groovy.transform.CompileStatic
@SuppressWarnings('GrailsStatelessService')
@CompileStatic
class GoogleCloudStorageService implements GrailsConfigurationAware {
Storage storage = StorageOptions.defaultInstance.service
// Google Cloud Platform project ID.
String projectId
// Cloud Storage Bucket
String bucket
@Override
void setConfiguration(Config co) {
projectId = co.getRequiredProperty('googlecloud.projectid', String)
bucket = co.getProperty('googlecloud.cloudStorage.bucket', String, projectId)
}
String storeMultipartFile(String fileName, MultipartFile multipartFile) {
storeInputStream(fileName, multipartFile.inputStream)
}
String storeInputStream(String fileName, InputStream inputStream) {
BlobInfo blobInfo = storage.create(readableBlobInfo(bucket, fileName), inputStream)
blobInfo.mediaLink
}
String storeBytes(String fileName, byte[] bytes) {
BlobInfo blobInfo = storage.create(readableBlobInfo(bucket, fileName), bytes)
blobInfo.mediaLink
}
private static BlobInfo readableBlobInfo(String bucket, String fileName) {
BlobInfo.newBuilder(bucket, fileName)
// Modify access list to allow all users with link to read file
.setAcl([Acl.of(Acl.User.ofAllUsers(), Acl.Role.READER)])
.build()
}
boolean deleteFile(String fileName) {
BlobId blobId = BlobId.of(bucket, fileName)
storage.delete(blobId)
}
}
1. If the upload of an image to Google Cloud is successful, save the reference
to the media URL in our domain class. Add this method to the
`BookGormService` class:
_grails-app/services/demo/BookGormService.groovy_
@SuppressWarnings('LineLength')
Book updateFeaturedImageUrl(Long id, Long version, String fileName, String featuredImageUrl, boolean flush = false) {
Book book = Book.get(id)
if ( !book ) {
return null
}
book.version = version
book.fileName = fileName
book.featuredImageUrl = featuredImageUrl
book.save(flush: flush)
book
}
1. Create a file named `grails-app/views/book/editFeaturedImage.gsp` from the
content found in [editFeaturedImage.gsp](https://github.com/GoogleCloudPlatform/community/blob/master/tutorials/deploy-grails-to-google-cloud/editFeaturedImage.gsp).
## Deploying the App
To deploy the app to Google App Engine run:
./gradlew appengineDeploy
Initial deployment may take a while. When finished, you can access your app:
![Grails app deployed in Google Cloud](https://storage.googleapis.com/gcp-community/tutorials/deploy-grails-to-google-cloud/welcometograils.png)
Go to the [Versions](https://console.cloud.google.com/appengine/versions) section in the App Engine administration panel and see the deployed app.
## Logging
For the version which you would like to inspect, select **Logs** in the diagnose dropdown:
![Logs dropdown](https://storage.googleapis.com/gcp-community/tutorials/deploy-grails-to-google-cloud/logs.png)
Application log messages written to stdout and stderr are automatically collected and can be viewed in the Logs Viewer.
1. Create a controller and log with level INFO and verify the log statement is
visible in the Log Viewer:
_grails-app/controllers/demo/LegalController.groovy_
package demo
import groovy.transform.CompileStatic
import groovy.util.logging.Slf4j
@CompileStatic
@Slf4j
class LegalController {
def index() {
log.info 'inside legal controller'
render 'Legal Terms'
}
}
1. Add the next line to `grails-app/conf/logback.groovy`:
logger 'demo', INFO, ['STDOUT'], false
to log `INFO` statements of classes under package `demo` to `STDOUT`
appender with additivity `false`.
If you redeploy the app to App Engine and access the `/legal` end point, you
will see the logging statements in Log Viewer.
Check the [Writing Application Logs](https://cloud.google.com/appengine/docs/flexible/java/writing-application-logs) documentation to read more about logs in the flexible environment.
Write your application logs using stdout for output and stderr for errors. Note
that this does not provide log levels that you can use for filtering in the Logs
Viewer; however, the Logs Viewer does provide other filtering, such as text,
timestamp, etc.
## Cleaning up
When you finish this guide, clean up the resources you created on Google Cloud
Platform so you won't be billed for them in the future. The following sections
describe how to delete or turn off these resources.
### Deleting the project
The easiest way to eliminate billing is to delete the project you created for
the tutorial.
To delete the project:
Deleting a project has the following consequences:
- If you used an existing project, you'll also delete any other work you've done
in the project.
- You can't reuse the project ID of a deleted project. If you created a custom
project ID that you plan to use in the future, you should delete the resources
inside the project instead. This ensures that URLs that use the project ID,
such as an appspot.com URL, remain available.
- If you are exploring multiple tutorials and quickstarts, reusing projects
instead of deleting them prevents you from exceeding project quota limits.
1. In the Cloud Platform Console, go to the Projects page.
[GO TO THE PROJECTS PAGE](https://console.cloud.google.com/iam-admin/projects)
1. In the project list, select the project you want to delete and click
**Delete project**. After selecting the checkbox next to the project name,
click **Delete project**.
1. In the dialog, type the project ID, and then click Shut down to delete the
project.
**Deleting or turning off specific resources**
You can individually delete or turn off some of the resources that you created
during the tutorial.
### Deleting app versions
To delete an app version:
1. In the Cloud Platform Console, go to the App Engine Versions page.
[GO TO THE VERSIONS PAGE](https://console.cloud.google.com/appengine/versions)
1. Click the checkbox next to the non-default app version you want to delete.
Note: The only way you can delete the default version of your App Engine app
is by deleting your project. However, you can stop the default version in
the Cloud Platform Console. This action shuts down all instances associated
with the version. You can restart these instances later if needed.
In the App Engine standard environment, you can stop the default version
only if your app has manual or basic scaling.
1. Click the **Delete** button at the top of the page to delete the app version.
### Deleting Cloud SQL instances
To delete a Cloud SQL instance:
1. In the Cloud Platform Console, go to the SQL Instances page.
[GO TO THE SQL INSTANCES PAGE](https://console.cloud.google.com/sql/instances)
1. Click the name of the SQL instance you want to delete.
1. Click the **Delete** button at the top of the page to delete the instance.
### Deleting Cloud Storage buckets
To delete a Cloud Storage bucket:
1. In the Cloud Platform Console, go to the Cloud Storage browser.
[GO TO THE CLOUD STORAGE BROWSER](https://console.cloud.google.com/storage/browser)
1. Click the checkbox next to the bucket you want to delete.
1. Click the **Delete** button at the top of the page to delete the bucket.
## Learn More
Visit [Grails Guides](http://guides.grails.org) to learn more.
Moreover, if you want to learn more about Google Cloud and Grails integration,
checkout a more complete sample app.
The [Google Cloud Bookshelf with Grails](https://grails-samples.github.io/google-bookshelf/)
application shows how to use a variety of Google Cloud Platform products,
including some of the services described in this guides and other services such
as:
- Google [Cloud Vision API](https://cloud.google.com/vision/)
- Google [Cloud Translation API](https://cloud.google.com/translate)
- Authentication using [Google Identity Platform](https://developers.google.com/identity/)
[flex]: https://cloud.google.com/appengine/docs/flexible/
[storage]: https://cloud.google.com/storage/
[cloud_sql]: https://cloud.google.com/sql/
| 35.103234 | 262 | 0.706764 | eng_Latn | 0.773725 |
8a1957879edd28efd9a1e5b22607a2c3e993b1e3 | 654 | md | Markdown | 10-32bit-enter/README.md | XinShuoWang/os-tutorial | 03999ebc9ffeddacde94971cc3e0c762eec829cc | [
"BSD-3-Clause"
] | null | null | null | 10-32bit-enter/README.md | XinShuoWang/os-tutorial | 03999ebc9ffeddacde94971cc3e0c762eec829cc | [
"BSD-3-Clause"
] | null | null | null | 10-32bit-enter/README.md | XinShuoWang/os-tutorial | 03999ebc9ffeddacde94971cc3e0c762eec829cc | [
"BSD-3-Clause"
] | null | null | null | *你可能需要提前查询的概念:中断、流水线*
**目标:进入到32位保护模式中并测试我们之前两节教程里面编写的代码**
进入到32位模式的步骤:
1. 关闭中断
2. 加载GDT
3. 将控制寄存器`cr0`置位
4. 通过发出一个远跳转来刷新CPU pipeline
5. 更新所有段寄存器
6. 更新栈
7. 进入到32位模式中运行第一段代码
我们将把上述步骤封装到一个名为`32bit-switch.asm`的文件中。
这里还要解释一下什么是远跳转:
```
JMP指令是从程序当前执行的地方无条件转移到另一个地方执行。
这种转移可以是一个短(short)转移(偏移量在[-128, 127]范围内)、近(near)转移(偏移量在[-32K, 32K]范围内)、远(far)转移(在不同的代码段之间转移)。
短和近转移是段内转移,JMP指令只把目标指令位置的偏移量赋值指令指针寄存器IP,从而实现转移功能。
远转移是段间转移,JMP指令不仅会改变指令指针寄存器IP的值,而且还会改变代码段寄存器CS的值。
```
在进入32位模式后,我们将调用`BEGIN_PM`,这是我们实际有用的代码(例如内核代码等)的入口点,你可以在`32bit-main.asm`中看到实现上述功能的代码。
编译并运行最后一个文件,您将在屏幕上看到两条消息,需要注意的是第二条信息会在屏幕的**左上角**进行打印,请注意观察!
能走到这一步属实不易,行百里者半九十,加油!下一步我们将实现一个简单的内核。 | 24.222222 | 92 | 0.80581 | zho_Hans | 0.554783 |
8a198cc29e669876af7e9ba5339d744cc2385506 | 1,659 | md | Markdown | azureadps-2.0-preview/AzureAD/Get-AzureADMSApplicationTemplate.md | Makovec/azure-docs-powershell-azuread | 402b6e83213305514cea7cc11d3b95a276c76818 | [
"CC-BY-4.0",
"MIT"
] | 171 | 2016-10-17T18:22:37.000Z | 2022-03-27T12:58:15.000Z | azureadps-2.0-preview/AzureAD/Get-AzureADMSApplicationTemplate.md | Makovec/azure-docs-powershell-azuread | 402b6e83213305514cea7cc11d3b95a276c76818 | [
"CC-BY-4.0",
"MIT"
] | 716 | 2016-11-01T22:57:45.000Z | 2022-03-31T17:38:48.000Z | azureadps-2.0-preview/AzureAD/Get-AzureADMSApplicationTemplate.md | Makovec/azure-docs-powershell-azuread | 402b6e83213305514cea7cc11d3b95a276c76818 | [
"CC-BY-4.0",
"MIT"
] | 361 | 2016-09-30T02:28:51.000Z | 2022-03-24T05:38:50.000Z | ---
external help file: Microsoft.Open.MS.GraphBeta.PowerShell.dll-Help.xml
Module Name: AzureADPreview
online version:
schema: 2.0.0
---
# Get-AzureADMSApplicationTemplate
## SYNOPSIS
Retrieve a list of applicationTemplate objects
## SYNTAX
### GetQuery (Default)
```
Get-AzureADMSApplicationTemplate [<CommonParameters>]
```
### GetById
```
Get-AzureADMSApplicationTemplate -Id <String> [<CommonParameters>]
```
## DESCRIPTION
This cmdlet allows users to get a list of all the application templates or a specific application template.
## EXAMPLES
### 1. Gets a list of application template objects
```
PS C:\> $all_templates = Get-AzureADMSApplicationTemplate
```
This command gets all the application template objects
### 2. Gets an application template object
```
PS C:\> $template = Get-AzureADMSApplicationTemplate -Id e8b7b394-057d-4203-a93a-1879c28ece38
```
This command gets an application template object for the given id
## PARAMETERS
### -Id
The unique identifier of an application template
```yaml
Type: String
Parameter Sets: GetById
Aliases:
Required: True
Position: Named
Default value: None
Accept pipeline input: True (ByPropertyName, ByValue)
Accept wildcard characters: False
```
### CommonParameters
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216).
## INPUTS
## OUTPUTS
### Microsoft.Online.Administration.ApplicationTemplate
## NOTES
## RELATED LINKS
| 23.366197 | 315 | 0.769741 | yue_Hant | 0.565314 |
8a1a4f17406e48b22f3e763debba708836f05be5 | 1,843 | md | Markdown | Doc/dbcmd/why-to-use.md | Apps72/Dev.Data | 002f006d0a44017c93d310fc0d4fa4fa1974ef28 | [
"MIT"
] | 16 | 2016-12-19T08:19:35.000Z | 2021-06-15T22:14:30.000Z | Doc/dbcmd/why-to-use.md | Apps72/Dev.Data | 002f006d0a44017c93d310fc0d4fa4fa1974ef28 | [
"MIT"
] | 19 | 2016-06-03T12:14:16.000Z | 2021-08-03T15:01:15.000Z | Doc/dbcmd/why-to-use.md | Apps72/Dev.Data | 002f006d0a44017c93d310fc0d4fa4fa1974ef28 | [
"MIT"
] | 8 | 2017-08-31T12:56:58.000Z | 2021-04-08T14:18:31.000Z | # Why to use DatabaseCommand?
I developed a first version of this project several years ago. My personal reasons are mainly.
These criteria are based on years of experience in the development of applications connected to databases and they only commit me.
---
**DatabaseCommand** is a very lightweight command library that is based on SQL queries and never modifies these queries.
Software development often requires data to be stored in a relational database such as SQL Server or Oracle. It is very important that the performance is optimal. Solutions such as **Entity Framework** generate most of the queries for you, which often leads to slow data retrieval several months after the project is put into production.
DatabaseCommand is very simple and very powerful, similar to the [**Dapper** project](https://github.com/DapperLib/Dapper).
The big difference with **Dapper**, is that **DatabaseCommand** is not based on extension methods, but on a more configurable object (for logs, traces, properties, ...). A best practice is to add a methode `GetDatabaseCommand()` from a **DataService** object.
Therefore, **DatabaseCommand** can be built and configured once and globally in the application. This allows for a centralized further development. This simplifies maintenance and the risk of errors.
DatabaseCommand has a more detailed syntax, which helps to understand and maintain the code. " (_Denis Voituron_)
---
## Samples:
**Using Dapper**
```csharp
var dog = connection.Query<Dog>("SELECT Age = @Age, Id = @Id", new { Age = (int?)null, Id = guid });
```
**Using DatabaseCommand**
```CSharp
using (var cmd = new DatabaseCommand(connection))
{
cmd.CommandText = "SELECT Age = @Age, Id = @Id";
cmd.AddParameter("@Age", (int?)null);
cmd.AddParameter("@Id", guid);
var dog = cmd.ExecuteTable<Dog>();
}
``` | 48.5 | 337 | 0.746609 | eng_Latn | 0.994536 |
8a1a5a684f7c69350fd6db5378594e9c94acfbc0 | 4,677 | md | Markdown | _posts/2019-03-02-Refactor-note.md | mihooke/mihooke.github.io | 6133e1ccbc48b448ae3ec295d96a5ae1ce2c3d66 | [
"MIT"
] | null | null | null | _posts/2019-03-02-Refactor-note.md | mihooke/mihooke.github.io | 6133e1ccbc48b448ae3ec295d96a5ae1ce2c3d66 | [
"MIT"
] | null | null | null | _posts/2019-03-02-Refactor-note.md | mihooke/mihooke.github.io | 6133e1ccbc48b448ae3ec295d96a5ae1ce2c3d66 | [
"MIT"
] | 1 | 2018-08-23T06:15:01.000Z | 2018-08-23T06:15:01.000Z | ---
layout: post
title: "《重构》笔记"
categories: Refactor
tags: Refactor BadCode OO Object
---
书中有一句名言:要嗅到坏代码的味道
# --重新组织函数--
1. Extract Method-提炼函数,从大的函数中提炼出小函数,消除临时变量,提炼关键要看函数名称和函数本体之间的语义距离。
2. Inline Method-内联函数,若函数调用中不需要一层间接性,可直接把函数内容复制到调用处
3. Inline Temp-内联临时变量,一个临时变量,被表达式赋了一次值,则可以去掉这个临时变量,取而代之的是这个表达式
4. Replace Temp With Query-以查询取代临时变量,临时变量被表达式赋值了,可以把表达式提取到一个函数中
5. Introduce Explaining Variable-引入解释性变量,如果逻辑表达式复杂,可以用临时变量来说明表达式的意义
6. Split Temporary Variable-分解临时变量,如果一个临时变量承担了多个责任,应该使用多个临时变量
7. Replace Method With Method Object-以函数对象取代函数,如果有一个大型函数,无法使用Extract Method完成分解,就可以用此法,把临时对象封装到新的对象中,新的对象用成员函数来完成各个临时变量的工作
8. Substitute Algorithm-替换算法,一段程序实现方法看上去比较笨,换一种写法
# --在对象之间搬移特性--
1. Move Method-移动函数,在一个类中,对另一个类的某些属性调用多了,可以考虑在后者中添加一个函数,前者调用后者,只保留委托调用
2. Move Field-移动字段,同上,某个成员变量移到另一个类中
3. Extract Class-提炼类,某个类做了多类事情
4. Inline Class-内联类,某个类没有做太多事情
5. Hide Delegate-隐藏委托关系,将委托类声明为私有的
6. Remove Middle Man-移除中间人,某个类做了委托类更多的工作,可以直接让用户调用委托类的接口
7. Introduce Foreign Method-引入外部函数,服务类没有提供此接口,但这个功能理应在服务类中,并且服务类不可修改,可用外部函数实现
8. Introduce Local Extension-引入本地扩展,需要为服务类提供一些函数,但服务类不可修改,可引入新的类来做,新的类可以是子类继承服务类,也可以是包装类,包装服务类所有的功能
# --重新组织数据--
1. Self Encapsulate Field-自封装字段,类内访问成员变量,可根据自己喜好封装为取值函数
2. Replace Data Value With Object-以对象取代数据值,某些成员变量可封装在一个单独的类中
3. Change Value To Reference-将值对象改为引用对象,当多个实例需要拥有一个对象时,可利用静态工厂函数预生成若干对象,然后从中取值
4. Change Reference To Value
5. Replace Array With Object-以对象取代数组,一个数组的元素代表不同东西,用对象来表示
6. Duplicate Observed Data-赋值被监视的数据,Gui的数据有时候需要在逻辑层保留一份拷贝使用,需要把它复制到新的对象中,使用observer模式来同步数据
7. Change Unidirectional Association To Bidirectional-将单向关联改为双向关联,两个类之间关系的单向引用,如a调用了b,现在需要在b中调用a的方法,让其中一个类(最好是单个类)作为控制角色
8. Change Bidirectional Association To Unidirectional-将双向关联改为单向关联
9. Replace Magic Number With Symbolic Constant-以字面常量取代魔数
10. Encapsulate Field-封装字段,Public成员变量变为private,并提供相应public成员函数来访问这些成员变量
11. Replace Record With Data Class-以数据类取代记录,这些记录是以非面向对象程序存在的,新建类表示这个记录
12. Replace Type Code With Class-以类取代类型码,比如枚举,或者一些常量数字,都有特定含义,此类存在没有类型检查,将它们封装在一个类里面,并通过成员函数来访问这些类型码
13. Replace Type Code With Subclass-以子类取代类型码,若用类取代会影响宿主类的行为,可以用子类多态来处理变化行为
14. Replace Type Code With State/Strategy-以state/Strategy模式取代类型码,类型码无法通过子类消除,并且会影响类的行为,可利用state/Strategy模式,将类型码独立成类,如果有switch判断,可以分出子类来表现不同的行为
15. Replace Subclass With Field-以字段取代子类,子类只是函数的返回值不同,可在父类中增加成员变量来表示子类的行为,并消除子类
# --简化条件表达式--
1. Decompose Conditional-分解条件表达式,把if条件提取到一个函数中,同样if和else下面的语句也分别提取到函数中
2. Consolidate Conditional Expression-合并条件表达式,检查条件不同,但结果相同,可以合并条件到一起或提取为函数,类似情况还有嵌套条件判断,可用逻辑与合并条件;合理利用三元操作符条件表达式
3. Consolidate Duplicate Conditional Fragments-合并重复的条件片段,If和else下面的语句有相同的,何以提取出来
4. Remove Control Flag-移除控制标记,控制标记即控制循环的标记,可以不必遵守条件判断的单一出口原则,适当使用break或continue或return来跳出循环
5. Replace Nested Conditional With Guard Clauses-以卫语句取代嵌套条件表达式,卫语句是如果某个检查条件很罕见,就应该单独检查,单独检查的语句就是卫语句;嵌套条件判断分为多个卫语句,可以让函数有多个出口
6. Replace Conditional With Polymorphism-以多态取代条件表达式,根据对象类型的不同作为条件,可抽象子类
7. Introduce Assertion-引入断言,某段代码需要对程序状态做出某种假设,可以用断言明确表现这种假设
# --简化函数调用--
1. Rename Method-函数改名,要想成为一个真正的编程高手,起名的水平是至关重要的
2. Add Parameter-添加参数
3. Remove Parameter-移除参数
4. Separate Query From Modifier-将查询函数和修改函数分离
5. Parameterize Method-令函数携带参数,相同功能的函数内部可能只有某几个变量不一样,可以把它们提取到参数中
6. Replace Parameter With Explicit Methods-以明确函数取代参数,函数内根据参数的类型来做不同的事情,可把不同的事情明确地放在新的函数中,从而原来函数的参数就可以去掉了
7. Preserve Whole Object-保持对象完整,从某个对象中取出若干值,并作为函数的参数,可修改为参数传递整个对象
8. Replaceparameter With Method-以函数取代参数,对象调用某个函数,并把返回值作为另一个函数的参数,而后者也可以调用前一个函数,可以改为直接让后者调用前者,从而缩短参数列表
9. Introduce Parameter Object-引入参数对象,函数的参数总是一起出现,可以考虑把一起出现的参数封装在一个类中,转而传递对象
10. Remove Setting Method-移除设值函数,如果某个成员变量,希望在初始化后不再改变,可以把设值函数去掉
11. Hide Method-隐藏函数,成员函数没有被其他类用到,设为private
12. Replace Constructor With Factory Method-以工厂函数取代构造函数
13. Replace Error Code With Exception-以异常取代错误码,函数以错误码来表示异常时,可把错误码改成异常
14. Replace Exception With Test-以测试取代异常,异常不能被滥用,只适合用在意料外的情况,假如某个判断条件可以预先知道,可换为条件测试来判断
# --处理概括关系--
概括关系主要指继承体系中的关系
1. Pull Up Field-上移字段,两个子类有相同的成员变量,可将此移至父类中
2. Pull Up Method-函数上移
3. Pull Up Constructor Body-构造函数本体上移,子类的构造函数本体几乎完全一致,可提取共同部分到父类中
4. Push Down Method-函数下移,父类中函数只被部分子类使用,可移到相应的子类中
5. Push Down Field-字段下移
6. Extract Subclass-提炼子类,类中的某些特性只被部分实例用到,可把这些特性提炼到一个新的子类中
7. Extract Superclass-提炼超类
8. Extract Interface-提炼接口
9. Collapse Hierarchy-折叠继承体系,父类与子类无太大区别
10. Form Template Method-塑造模板函数,子类们有个函数行为相似,细节操作上不同,可把函数相同部分提到父类中,子类中调用新的提炼函数
11. Replace Inheritance With Delegation-以委托取代继承,某个子类只使用父类接口的一部分,或根本不需要继承而来的数据,可用委托代替继承关系
12. Replace Delegation With Inheritance-以继承取代委托
# --大型重构--
1. Tease Apart Inheritance-梳理并分解继承体系,某个类做了若干件不同的事,就需要拆解此类
2. Convert Procedural Design To Objects-将过程化设计转化为对象设计
3. Separate Domain From Presentation-将领域和显示分离,MVC模式
4. Extract Hierarchy-提炼继承体系,某个类做了太多工作,其中一部分以大量条件表达式完成,可以以一个子类来表示特殊情况 | 45.852941 | 142 | 0.853111 | yue_Hant | 0.792884 |
8a1b5cb41f3e2198ffff09341b1274de45e7ee4a | 1,885 | md | Markdown | api/qsharp/microsoft.quantum.machinelearning.controlledrotation.md | MicrosoftDocs/quantum-docs-pr.ja-JP | 2140849661b2d85b54d9e9a1cba037c13eb8cf4b | [
"CC-BY-4.0",
"MIT"
] | 2 | 2020-05-19T20:13:26.000Z | 2020-06-17T14:35:26.000Z | api/qsharp/microsoft.quantum.machinelearning.controlledrotation.md | MicrosoftDocs/quantum-docs-pr.ja-JP | 2140849661b2d85b54d9e9a1cba037c13eb8cf4b | [
"CC-BY-4.0",
"MIT"
] | 17 | 2020-05-04T10:59:47.000Z | 2020-07-18T15:51:09.000Z | api/qsharp/microsoft.quantum.machinelearning.controlledrotation.md | MicrosoftDocs/quantum-docs-pr.ja-JP | 2140849661b2d85b54d9e9a1cba037c13eb8cf4b | [
"CC-BY-4.0",
"MIT"
] | 3 | 2020-05-09T11:56:28.000Z | 2021-11-15T09:19:44.000Z | ---
uid: Microsoft.Quantum.MachineLearning.ControlledRotation
title: ユーザー定義型の制御
ms.date: 1/23/2021 12:00:00 AM
ms.topic: article
qsharp.kind: udt
qsharp.namespace: Microsoft.Quantum.MachineLearning
qsharp.name: ControlledRotation
qsharp.summary: Describes a controlled rotation in terms of its target and control indices, rotation axis, and index into a model parameter vector.
ms.openlocfilehash: 231afe65da3640218cbc97b9d49eae21bf6e1786
ms.sourcegitcommit: 71605ea9cc630e84e7ef29027e1f0ea06299747e
ms.translationtype: MT
ms.contentlocale: ja-JP
ms.lasthandoff: 01/26/2021
ms.locfileid: "98847393"
---
# <a name="controlledrotation-user-defined-type"></a>ユーザー定義型の制御
名前空間: [Microsoft. Quantum の e ラーニング](xref:Microsoft.Quantum.MachineLearning)
パッケージ: [Microsoft. Quantum.](https://nuget.org/packages/Microsoft.Quantum.MachineLearning)
ターゲットと制御のインデックス、回転軸、およびモデルパラメーターベクターへのインデックスに関して、制御されたローテーションについて説明します。
```qsharp
newtype ControlledRotation = ((TargetIndex : Int, ControlIndices : Int[]), Axis : Pauli, ParameterIndex : Int);
```
## <a name="named-items"></a>名前付き項目
### <a name="targetindex--int"></a>TargetIndex: [Int](xref:microsoft.quantum.lang-ref.int)
この制御された回転のターゲット qubit のインデックス。
### <a name="controlindices--int"></a>ControlIndices: [Int](xref:microsoft.quantum.lang-ref.int)[]
この回転のためのコントロール qubit インデックスの配列。
### <a name="axis--pauli"></a>Axis: [P# li](xref:microsoft.quantum.lang-ref.pauli)
この回転の軸。
### <a name="parameterindex--int"></a>ParameterIndex: [Int](xref:microsoft.quantum.lang-ref.int)
この回転の角度を説明するモデルパラメーターベクターのインデックス。
## <a name="example"></a>例
次の例は、レジスタ内の最初の qubit の $X $ 軸についての回転と、2番目の qubit で制御され、シーケンシャルモデルの4番目のパラメーターによって指定された角度を表します。
```qsharp
let controlledRotation = ControlledRotation(
(0, [1]),
PauliX,
3
)
```
## <a name="remarks"></a>解説
制御されないローテーションは `ControlIndices` 、インデックスの空の配列にを設定することによって表すことができ `new Int[0]` ます。 | 30.403226 | 147 | 0.766048 | yue_Hant | 0.522511 |
8a1b8cb9a44ebfdb6d34def43eeba2e259b3e713 | 111 | md | Markdown | README.md | elanode/nginx-docker-dev | f228064ef23f8f2a78f7caab3f2a77a7e5267cd4 | [
"MIT"
] | null | null | null | README.md | elanode/nginx-docker-dev | f228064ef23f8f2a78f7caab3f2a77a7e5267cd4 | [
"MIT"
] | null | null | null | README.md | elanode/nginx-docker-dev | f228064ef23f8f2a78f7caab3f2a77a7e5267cd4 | [
"MIT"
] | null | null | null | # Nginx Docker Development
This repo is for building the nginx docker image for Elanode's development process
| 27.75 | 82 | 0.81982 | eng_Latn | 0.987019 |
8a1c15683a40aabe4dd12d983fe656875eb39eef | 2,838 | md | Markdown | src/test/scripts/linux-test/README.md | mmitche/core-setup | d40b87f29ddc3d69e44b1978df1c996523f426b7 | [
"MIT"
] | null | null | null | src/test/scripts/linux-test/README.md | mmitche/core-setup | d40b87f29ddc3d69e44b1978df1c996523f426b7 | [
"MIT"
] | null | null | null | src/test/scripts/linux-test/README.md | mmitche/core-setup | d40b87f29ddc3d69e44b1978df1c996523f426b7 | [
"MIT"
] | null | null | null | This project has the purpose to automate verification test for .NET Core Runtime and SDK linux packages.
To have this test running in your local machine do the following steps:
1. Download VerificationTestOnDocker.sh, RuntimeInstallation.sh, SdkInstallation.sh, images.txt in the same folder
2. Update images.txt with images name you want to run the installation test
3. Run $ ./VerificationTestOnDocker.sh \<package> \<version> \<command>
The options are:
* \<package>
* runtime - verification test for .NET Core Runtime Linux packages
* sdk - verification test for .NET Core SDK Linux packages
* \<version>
* latest - install the latest available .NET Core package from our master repository
* \<number> - install the package corresponding to this version number
* \<command>
* install - verification test for install
* install uninstall - verification test for install and uninstall
The script VerificationTestOnDocker.sh is responsible for read a file (images.txt) containing docker images and run a docker container for each image specified in that file. Inside each container it will be executed the script to install .NET Runtime (RuntimeInstallation.sh) or .NET SDK (SdkInstallation.sh).
Both scripts RuntimeInstallation.sh and SdkInstallation.sh automatically identify what distro and version is running in the current machine and can install and uninstall the latest version of .NET Core Runtime/Sdk packages corresponding to that distro & version. The installation's stdout for all containers is redirected to a single file (logfile.txt). In the end of this file (logfile.txt) it's also displayed the results of the test, printing for each distro and version the result 'failed' or 'passed'.
.NET Core packages are downloaded from the blob https://dotnetcli.blob.core.windows.net/dotnet
This project takes in account:
-> dotnet-sdk depends on dotnet-runtime and aspnet-runtime
-> aspnet-runtime depends on dotnet-runtime (can be different to what dotnet-sdk depends on)
-> dotnet-runtime-deps depends on system packages
-> .NET Core runtime carries: dotnet-runtime-deps, dotnet-host, dotnet-hostfxr and dotnet-runtime.
Changes on how dotnet runtime packages are structured or modification on the packages dependencies may affect the verification test result.
This verification test depends on docker images and the test result can be a false negative if the image doesn't carry some system packages required to have a proper runtime package installation.
The scrip allows automated test only for the following distro & version:
| Distro | Version |
|--------|---------|
| Ubuntu | 14.04, 16.04, 18.04 |
| Debian | 8, 9 |
| Centos | 7 |
| Fedora | 27 |
| OpenSUSE | 42 |
| Oracle Linux | 7 |
| RHEL | 7 |
| SLES | 12 |
| 56.76 | 507 | 0.748767 | eng_Latn | 0.986561 |
8a1c476815c1c9fbaa0ef0660472736dd9c1d2f6 | 443 | md | Markdown | content/en/armory-enterprise/release-notes/rn-armory-agent/agent-plugin/agent-plug-v-0-9-51.md | armory/docs-hugo | b66ff7b32f631579938cf39b514edef5f48ec033 | [
"Apache-2.0",
"CC0-1.0"
] | null | null | null | content/en/armory-enterprise/release-notes/rn-armory-agent/agent-plugin/agent-plug-v-0-9-51.md | armory/docs-hugo | b66ff7b32f631579938cf39b514edef5f48ec033 | [
"Apache-2.0",
"CC0-1.0"
] | 10 | 2020-05-29T19:55:17.000Z | 2020-06-09T17:50:20.000Z | content/en/armory-enterprise/release-notes/rn-armory-agent/agent-plugin/agent-plug-v-0-9-51.md | armory/docs-hugo | b66ff7b32f631579938cf39b514edef5f48ec033 | [
"Apache-2.0",
"CC0-1.0"
] | null | null | null | ---
title: v0.9.51 Armory Agent Clouddriver Plugin (2022-05-09)
toc_hide: true
version: 00.09.51
---
### Fixes
* Fixed an issue of an Agent instance being unable to register again when an exception was thrown during the first registration. It also allows Agent to register again in cases that a reconnection is issued such as when using `tokenCommand` and the token expires.
**Note:** this fix does not depend on a specific Agent version.
| 34.076923 | 263 | 0.760722 | eng_Latn | 0.999457 |
8a1d31c37e3c818d456f468796ff868521f6e8fe | 3,888 | md | Markdown | _posts/2019-01-10-days-like-these.md | sarahseewhy/sarahseewhy.github.io | bd3b294901973e0ecc430492e2f8b82cd8a11b46 | [
"MIT"
] | null | null | null | _posts/2019-01-10-days-like-these.md | sarahseewhy/sarahseewhy.github.io | bd3b294901973e0ecc430492e2f8b82cd8a11b46 | [
"MIT"
] | null | null | null | _posts/2019-01-10-days-like-these.md | sarahseewhy/sarahseewhy.github.io | bd3b294901973e0ecc430492e2f8b82cd8a11b46 | [
"MIT"
] | null | null | null | ---
layout: post
title: There will be days
date: 2019-01-10
---
This post’s title is from my favourite Van Morrison [song](https://en.wikipedia.org/wiki/Days_Like_This_(song)). It's a reminder that among all the great days, and there are many, there will in fact be days when situations leave me wondering.
When I entered software development I’d not only heard about the industry’s stereotypes, its reputation as a profession that can be unfriendly to women (at best and not limited to), I’d studied them in depth.
My masters dissertations focused on the history of gender and computer science. I’ve got a PhD proposal all packaged up, collecting dust in Google Drive, exploring constructions of gender in software development (that’s the tl;dr version). I spent years reading studies of gender, history, and social science.
But it never fails to shock me when I experience something I’ve only read about in books, academic journals, or the media.
To be clear, my identities are affirmed, validated, reaffirmed, and revalidated, constantly – every day. The fact that these shocks are few and far between speaks to that constant process of affirmation and validation which I benefit from and which so many developers do not.
It’s because I benefit that I tend not to want to write or talk publicly about them. I’m not convinced my voice will add much to the conversation and it may detract from marginalised voices.
I also don’t write because I’m ambivalent about prescribing bias to an act of human forgetfulness. We all screw up. When our minds are deep in a problem or a discussion it’s a challenge to be fully aware; to solve that knotty problem or debate ideas, _and_ remember the impact of our words or actions and how they may fit into the fabric of social systems and histories.
I've not yet figured out how to balance intent with impact when I'm faced with an interaction which doesn't feel quite right. Almost always a number of factors are involved, some of which can be connected to broader patterns of power structures. I also know that, as a colleague phrased it, I'm "unconsciously pattern matching with previous experiences", which can influence my reaction.
For the most part I let the moments pass, never really forgetting, and maybe adding another drop to the bucket of "I'm not enough"/"I don't belong". I move on to the next day and the next challenge.
Then there’s a question of repercussions following an act of self-revelation. I’ve participated in some incredible communities: extreme programming, software crafting, makers academy. I work at a company I love, in a team which I think is unique in its support and joyful programming, and I’ve attended, and plan to attend more, fascinating conferences and meetups.
I’ve also seen too many folks in tech who write openly about their experiences be dismissed. It makes me cautious. As much as I have faith in these communities to be the best versions of themselves I know that’s not always possible – and I’ve stayed silent.
Yet I’ve wanted to write about these shocks almost from the very moment I began my path to become a developer because well, they’ve happened from the very start and they will continue to happen.
And now, five years on, when I think about whether I should remain silent or speak I can’t help but think of the philosopher poet [Audre Lorde’s](https://en.wikipedia.org/wiki/Your_Silence_Will_Not_Protect_You) essay [“The Transformation of Silence into Language and Action”](https://www.csusm.edu/sjs/documents/silenceintoaction.pdf)<sup>*</sup> and her words remind me of the power of speaking.
So I’m writing this.
<br>
<sup>*<sup> Lorde, Audre. “The Transformation of Silence into Language and Action”. 1998. In [_Sister Outsider_](https://www.penguinrandomhouse.com/books/198292/sister-outsider-by-audre-lorde/9781580911863/), 40-44. Freedom, CA: The Crossing Press.
| 102.315789 | 396 | 0.78678 | eng_Latn | 0.999604 |
8a1dcc84a0917b149d8b89f2b4b740e89215895f | 331 | md | Markdown | pages/cloud/cloud_dashboard_container_infrastructure.md | cloudcentral/help.cloudcentral.com.au | 0e18b8bb5ba783f1593263d479dd57a6f582601e | [
"MIT",
"BSD-3-Clause"
] | null | null | null | pages/cloud/cloud_dashboard_container_infrastructure.md | cloudcentral/help.cloudcentral.com.au | 0e18b8bb5ba783f1593263d479dd57a6f582601e | [
"MIT",
"BSD-3-Clause"
] | null | null | null | pages/cloud/cloud_dashboard_container_infrastructure.md | cloudcentral/help.cloudcentral.com.au | 0e18b8bb5ba783f1593263d479dd57a6f582601e | [
"MIT",
"BSD-3-Clause"
] | null | null | null | ---
title: Manage Container Infrastructure using the dashboard
tags: [dashboard, container_infra]
keywords: dashboard, container_infra
last_updated: May 20, 2019
summary: "How to manage Container Infrastructure using the dashboard"
sidebar: cloud_sidebar
permalink: cloud_dashboard_container_infrastructure.html
folder: cloud
---
| 27.583333 | 69 | 0.827795 | eng_Latn | 0.617799 |
8a1e2d120bf2aa67643101e84b2c0ac8837027fe | 1,870 | md | Markdown | _wiki/Bill-Atkinson-productivity.md | Billstax/johngrib.github.io | a91a2576c19af6d683fd917e8e3b1fd5969f2030 | [
"MIT"
] | 65 | 2017-12-08T06:16:48.000Z | 2022-03-29T12:25:25.000Z | _wiki/Bill-Atkinson-productivity.md | Billstax/johngrib.github.io | a91a2576c19af6d683fd917e8e3b1fd5969f2030 | [
"MIT"
] | 174 | 2017-01-24T14:08:00.000Z | 2022-03-20T11:07:04.000Z | _wiki/Bill-Atkinson-productivity.md | Billstax/johngrib.github.io | a91a2576c19af6d683fd917e8e3b1fd5969f2030 | [
"MIT"
] | 86 | 2017-12-08T23:45:42.000Z | 2022-01-13T17:40:33.000Z | ---
layout : wiki
title : 빌 앳킨슨(Bill Atkinson)의 생산성
summary : 프로그램을 6배 빠르게 하고, 보고서에 -2000 줄을 작성했다고 써내다
date : 2018-02-08 12:06:18 +0900
updated : 2020-07-29 22:21:31 +0900
tag : story Bill-Atkinson Steve-Jobs
toc : true
public : true
parent : [[people]]
latex : false
---
* TOC
{:toc}
## 개발하는 데 얼마나 걸렸나요?
>
**How long did it take?**
A reporter asked Steve Jobs, “How many man-years did it take to write Quick Draw?” Steve asked Bill, who said, “Well, I worked on it on and off for four years.” Steve then told the reporter, “Twenty-four man-years”. Steve figured, with ample justification, that one Atkinson year was the equivalent of six ordinary programmer years.
한 기자가 스티브 잡스에게 "Quick Draw 개발에 얼만큼의 man-year가 필요했습니까?" 라고 질문했다.
스티브 잡스가 빌 앳킨슨에게 어땠냐고 물어보니
"글쎄, 4년간 열심히 일하긴 했지"라는 대답이 돌아왔다.
그러자 스티브 잡스가 "24 man-years 입니다." 라고 기자에게 대답했다.
스티브 잡스는 빌 앳킨슨의 1년이 평범한 프로그래머 6명의 1년과 맞먹는다고 생각했던 것이다.
## 프로그래머 생산성 측정 방법
>
**How do you measure programmer productivity?**
When the Lisa team was pushing to finalize their software in 1982, project managers started requiring programmers to submit weekly forms reporting on the number of lines of code they had written. Bill Atkinson thought that was silly. For the week in which he had rewritten QuickDraw’s region calculation routines to be six times faster and 2000 lines shorter, he put “-2000″ on the form. After a few more weeks the managers stopped asking him to fill out the form, and he gladly complied.
1982년, Lisa팀이 소프트웨어를 완성할 무렵의 이야기이다.
프로젝트 관리자들이 프로그래머들에게 일주일간 작성한 코드 라인 수를 주간 보고서에 적어 내라는 지시를 내렸다.
그 지시가 정말 멍청한 생각이라고 여긴 빌 앳킨슨은 일주일간 QuickDraw의 지역 계산 루틴을 6배 빠르게 하고 2000 라인을 줄인 다음, 주간 보고 양식에 "-2000"을 써서 냈다.
몇 주 후 부터 관리자들은 문제의 양식을 작성하라는 요구를 포기했고 그는 상황을 흐뭇하게 받아들였다.
## Links
* [MacPaint and QuickDraw Source Code](http://www.computerhistory.org/atchm/macpaint-and-quickdraw-source-code/ )
| 36.666667 | 488 | 0.733155 | kor_Hang | 0.99771 |
8a1e43c97ad0c880674c471379956ba396d3981d | 2,834 | md | Markdown | README.md | ojullien/bash-install | 9836b9b6c01829cf4d180716d29325d36af31f17 | [
"MIT"
] | 1 | 2019-07-08T18:47:55.000Z | 2019-07-08T18:47:55.000Z | README.md | ojullien/bash-install | 9836b9b6c01829cf4d180716d29325d36af31f17 | [
"MIT"
] | 17 | 2019-08-07T13:03:48.000Z | 2020-11-19T09:43:56.000Z | README.md | ojullien/bash-install | 9836b9b6c01829cf4d180716d29325d36af31f17 | [
"MIT"
] | null | null | null | # Bash-Install
Simple tool for configuring a fresh debian/ubuntu installation with just one command.
*Note: I use this script for my own projects, it contains only the features I need.*
## Table of Contents
[Installation](#installation) | [Features](#features) | [Test](#test) | [Contributing](#contributing) | [License](#license)
## Installation
Requires: a Debian/Ubuntu version of linux and a Bash version ~4.4. [bash-sys](https://github.com/ojullien/bash-sys) installed. SSH is already installed and configured.
1. [Download a release](https://github.com/ojullien/bash-install/releases) or clone this repository.
2. Use [scripts/install.sh](scripts/install.sh) to automatically install the application in the /opt/oju/bash project folder.
3. If needed, add `PATH="$PATH:/opt/oju/bash/bin"` to the .profile files.
4. Update the [config.sh](src/app/install/config.sh) configuration file.
## Features
With just one command, this tool installs and configures all the softwares I need on a fresh debian/ubuntu server installation, like:
1. Initial update and upgrade
i. update source.list
ii. update system
iii. upgrade system
2. Install or modify .bashrc, .bash_alias, .bash_profile, .profile files
3. Configure swap
4. Uninstall packages (vim-tiny, ...)
5. Install system packages (dkms, build-essential, util-linux, deborphan, localepurge, hdparm, smartmontools, ...)
6. Install and configure app packages (vim, fail2ban, ftp, mlocate, chkrootkit, logwatch, ...)
7. Optimize SSD
The local user name is defined in the [config.sh](src/app/savesystemconf/config.sh) file.
```bash
Usage: install.sh [options]
options
-h | --help Show this help.
-l | --active-log Log mode. Content outputs are logged in a file.
-n | --no-display Display mode. Nothing is displayed in terminal.
-t | --trace Display var and constants.
-v | --version Show the version.
-w | --wait Wait user. Wait for user input between actions.
```
## Test
I didn't write any line of 'unit test' code. Sorry.
## Contributing
Thanks you for taking the time to contribute. Please fork the repository and make changes as you'd like.
As I use these scripts for my own projects, they contain only the features I need. But If you have any ideas, just open an [issue](https://github.com/ojullien/bash-install/issues/new/choose) and tell me what you think. Pull requests are also warmly welcome.
If you encounter any **bugs**, please open an [issue](https://github.com/ojullien/bash-install/issues/new/choose).
Be sure to include a title and clear description,as much relevant information as possible, and a code sample or an executable test case demonstrating the expected behavior that is not occurring.
## License
This project is open-source and is licensed under the [MIT License](LICENSE).
| 42.939394 | 257 | 0.737474 | eng_Latn | 0.98115 |
8a1ef64e08b30988c3e8e2544129eaa68f21449c | 10 | md | Markdown | README.md | owner-fxm/fxm | 7d669e75f15019260bd30b51e8c2a0006ed5c441 | [
"Apache-2.0"
] | null | null | null | README.md | owner-fxm/fxm | 7d669e75f15019260bd30b51e8c2a0006ed5c441 | [
"Apache-2.0"
] | null | null | null | README.md | owner-fxm/fxm | 7d669e75f15019260bd30b51e8c2a0006ed5c441 | [
"Apache-2.0"
] | null | null | null | # fxm
fxm
| 3.333333 | 5 | 0.6 | por_Latn | 0.306508 |
8a1f0e4edd0a98f918cf1104e222831b54f00625 | 1,035 | md | Markdown | docs/framework/unmanaged-api/debugging/icordebugeditandcontinuesnapshot-getrwdatarva-method.md | skahack/docs.ja-jp | 7f7fac4879f8509f582c3ee008776ae7d4dde227 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | docs/framework/unmanaged-api/debugging/icordebugeditandcontinuesnapshot-getrwdatarva-method.md | skahack/docs.ja-jp | 7f7fac4879f8509f582c3ee008776ae7d4dde227 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | docs/framework/unmanaged-api/debugging/icordebugeditandcontinuesnapshot-getrwdatarva-method.md | skahack/docs.ja-jp | 7f7fac4879f8509f582c3ee008776ae7d4dde227 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | ---
title: ICorDebugEditAndContinueSnapshot::GetRwDataRVA メソッド
ms.date: 03/30/2017
api_name:
- ICorDebugEditAndContinueSnapshot.GetRwDataRVA
api_location:
- mscordbi.dll
api_type:
- COM
f1_keywords:
- ICorDebugEditAndContinueSnapshot::GetRwDataRVA
helpviewer_keywords:
- GetRwDataRVA method [.NET Framework debugging]
- ICorDebugEditAndContinueSnapshot::GetRwDataRVA method [.NET Framework debugging]
ms.assetid: 3e07b233-dd41-45ba-a4f9-662e4b006f1f
topic_type:
- apiref
author: rpetrusha
ms.author: ronpet
ms.openlocfilehash: 31ad3032b50298e08f349049adab8aa18a09f12e
ms.sourcegitcommit: 9b552addadfb57fab0b9e7852ed4f1f1b8a42f8e
ms.translationtype: MT
ms.contentlocale: ja-JP
ms.lasthandoff: 04/23/2019
ms.locfileid: "61996079"
---
# <a name="icordebugeditandcontinuesnapshotgetrwdatarva-method"></a>ICorDebugEditAndContinueSnapshot::GetRwDataRVA メソッド
`GetRwDataRVA` は互換性のために残されています。 このメソッドを呼び出さないでください。
## <a name="see-also"></a>関連項目
- [デバッグ インターフェイス](../../../../docs/framework/unmanaged-api/debugging/debugging-interfaces.md)
| 31.363636 | 119 | 0.819324 | yue_Hant | 0.530769 |
8a1fec8dd183a95d92e1479d0660fddfc732a77d | 1,641 | md | Markdown | docs/connect/jdbc/reference/getdatetimeoffset-sqlserverresultset.md | PiJoCoder/sql-docs | 128b255506c47eb05e19770a6bf5edfbdaa817ec | [
"CC-BY-4.0",
"MIT"
] | 1 | 2021-03-04T18:16:27.000Z | 2021-03-04T18:16:27.000Z | docs/connect/jdbc/reference/getdatetimeoffset-sqlserverresultset.md | PiJoCoder/sql-docs | 128b255506c47eb05e19770a6bf5edfbdaa817ec | [
"CC-BY-4.0",
"MIT"
] | null | null | null | docs/connect/jdbc/reference/getdatetimeoffset-sqlserverresultset.md | PiJoCoder/sql-docs | 128b255506c47eb05e19770a6bf5edfbdaa817ec | [
"CC-BY-4.0",
"MIT"
] | 1 | 2021-01-15T10:07:40.000Z | 2021-01-15T10:07:40.000Z | ---
title: "getDateTimeOffset (SQLServerResultSet) | Microsoft Docs"
ms.custom: ""
ms.date: "01/19/2017"
ms.prod: "sql-non-specified"
ms.reviewer: ""
ms.suite: ""
ms.technology:
- "drivers"
ms.tgt_pltfrm: ""
ms.topic: "article"
ms.assetid: 60ec0499-1c2a-4476-9e32-03b9d698fe54
caps.latest.revision: 13
author: "MightyPen"
ms.author: "genemi"
manager: "jhubbard"
---
# getDateTimeOffset (SQLServerResultSet)
[!INCLUDE[Driver_JDBC_Download](../../../includes/driver_jdbc_download.md)]
Retrieves the value of the designated column as a [DateTimeOffset Class](../../../connect/jdbc/reference/datetimeoffset-class.md) object in the Java programming language given the parameter index.
## Overload List
|Name|Description|
|----------|-----------------|
|[getDateTimeOffset Method (int)](../../../connect/jdbc/reference/getdatetimeoffset-int-sqlserverresultset.md)|Retrieves the value of the designated column as a [DateTimeOffset Class](../../../connect/jdbc/reference/datetimeoffset-class.md) object in the Java programming language given the parameter index.|
|[getDateTimeOffset (java.lang.string)](../../../connect/jdbc/reference/getdatetimeoffset-java-lang-string-sqlserverresultset.md)|Retrieves the value of the designated column as a [DateTimeOffset Class](../../../connect/jdbc/reference/datetimeoffset-class.md) object in the Java programming language given the parameter index.|
## See Also
[setDateTimeOffset(int, java.sql.DateTimeOffset) (SQLServerStatement)](../../../connect/jdbc/reference/setdatetimeoffset-int-java-sql-datetimeoffset-sqlserverstatement.md)
| 49.727273 | 329 | 0.728824 | eng_Latn | 0.257591 |
8a20ec29530ce0f288f8b83d2b2437698751c626 | 47 | md | Markdown | content/gallery/2007-11-15-12-01-00--outside-of-the-villa.jpg/index.md | Jaza/worldtrip | ddddb1601594daa8234405d2ff64f3406799fcea | [
"Apache-2.0"
] | null | null | null | content/gallery/2007-11-15-12-01-00--outside-of-the-villa.jpg/index.md | Jaza/worldtrip | ddddb1601594daa8234405d2ff64f3406799fcea | [
"Apache-2.0"
] | null | null | null | content/gallery/2007-11-15-12-01-00--outside-of-the-villa.jpg/index.md | Jaza/worldtrip | ddddb1601594daa8234405d2ff64f3406799fcea | [
"Apache-2.0"
] | null | null | null |
+++
draft = false
+++
_Outside of the villa._
| 7.833333 | 23 | 0.617021 | eng_Latn | 0.994354 |
8a2122302dd61d0c2f75e6e08b99fb1155f32373 | 160,837 | md | Markdown | README.md | rorymbyrne/personal-security-checklist | ccc3b861bc9d0a671ca1e4a1823e94d3552ae876 | [
"CC-BY-4.0"
] | null | null | null | README.md | rorymbyrne/personal-security-checklist | ccc3b861bc9d0a671ca1e4a1823e94d3552ae876 | [
"CC-BY-4.0"
] | null | null | null | README.md | rorymbyrne/personal-security-checklist | ccc3b861bc9d0a671ca1e4a1823e94d3552ae876 | [
"CC-BY-4.0"
] | 1 | 2021-02-20T21:06:28.000Z | 2021-02-20T21:06:28.000Z | [![Awesome](https://awesome.re/badge-flat2.svg)](https://github.com/zbetcheckin/Security_list)
[![PRs Welcome](https://img.shields.io/badge/PRs-welcome-brightgreen.svg?style=flat-square)](http://makeapullrequest.com)
[![License](https://img.shields.io/badge/LICENSE-CC_BY_4.0-00a2ff?&style=flat-square)](https://creativecommons.org/licenses/by/4.0/)
[![Contributors](https://img.shields.io/github/contributors/lissy93/personal-security-checklist?color=%23ffa900&style=flat-square)](https://github.com/Lissy93/personal-security-checklist/graphs/contributors)
<p align="center"><img src="https://i.ibb.co/rGQK71g/personal-security-checklist-6.png" /></p>
*<p align="center">A curated checklist of tips to protect your digital security and privacy</p>*
### Contents
[<img src="https://i.ibb.co/XbyGTrP/1-authentication-2-36x36.png" width="28" height="28" /> Authentication](#authentication)<br>
[<img src="https://i.ibb.co/8KMrdbX/2-internet-36x36.png" width="28" height="28" /> Browsing the Web](#web-browsing)<br>
[<img src="https://i.ibb.co/7NrXW3L/5-email-36x36.png" width="28" height="28" /> Email](#emails)<br>
[<img src="https://i.ibb.co/DrWJBT9/13-messaging-36x36.png" width="28" height="28" /> Secure Messaging](#secure-messaging)<br>
[<img src="https://i.ibb.co/GFYyXMd/6-social-media-36x36.png" width="28" height="28" /> Social Media](#social-media)<br>
[<img src="https://i.ibb.co/0VTZQpH/3-networking-36x36.png" width="28" height="28" /> Networks](#networking)<br>
[<img src="https://i.ibb.co/F3WwqsV/7-phones-36x36.png" width="28" height="28" /> Mobile Phones](#mobile-devices)<br>
[<img src="https://i.ibb.co/ZftcgJq/8-computers-36x36.png" width="28" height="28" /> Personal Computers](#personal-computers)<br>
[<img src="https://i.ibb.co/b2S9372/9-smart-home-36x36.png" width="28" height="28" /> Smart Home](#smart-home)<br>
[<img src="https://i.ibb.co/4JTqL5y/12-finance-36x36.png" width="28" height="28" /> Personal Finance](#personal-finance)<br>
[<img src="https://i.ibb.co/KVPV1Lk/10-human-36x36.png" width="28" height="28" /> Human Aspect](#sensible-computing)<br>
[<img src="https://i.ibb.co/9NbhBww/11-physical-36x36.png" width="28" height="28" /> Physical Security](#physical-security)<br>
**Too long? 🦒** See the [TLDR version](/2_TLDR_Short_List.md) instead.
### See Also
- [Why Privacy & Security Matters](/0_Why_It_Matters.md)
- [Privacy-Respecting Software](/5_Privacy_Respecting_Software.md)
- [Privacy & Security Gadgets](/6_Privacy_and-Security_Gadgets.md)
- [Further Links + More Awesome Stuff](/4_Privacy_And_Security_Links.md)
----
## Authentication
Most reported data breaches are caused by the use of weak, default or stolen passwords (according to [this Verizon report](http://www.verizonenterprise.com/resources/reports/rp_dbir-2016-executive-summary_xg_en.pdf)).
Use long, strong and unique passwords, manage them in a secure password manager, enable 2-factor authentication, keep on top of breaches and take care while logging into your accounts.
**Security** | **Priority** | **Details and Hints**
--- | --- | ---
**Use a Strong Password** | Recommended | If your password is too short, or contains dictionary words, places or names- then it can be easily cracked through brute force, or guessed by someone. The easiest way to make a strong password, is by making it long (12+ characters)- consider using a 'passphrase', made up of many words. Alternatively, use a password generator to create a long, strong random password. Have a play with [HowSecureIsMyPassword.net](https://howsecureismypassword.net), to gen an idea of how quickly common passwords can be cracked. Read more about creating strong passwords: [securityinabox.org](https://securityinabox.org/en/guide/passwords)
**Don't reuse Passwords** | Recommended | If someone was to reuse a password, and one site they had an account with suffered a leak (data breaches occur aprox. every [39 seconds](https://eng.umd.edu/news/story/study-hackers-attack-every-39-seconds)), then a criminal could easily gain unauthorized access to their other accounts. This is usually done through large-scale automated login requests, and it is called Credential Stuffing. Unfortunately this is all too common, but it's simple to protect against- use a different password for each of your online accounts
**Use a Secure Password Manager** | Recommended | For most people it is going to be near-impossible to remember hundreds of strong and unique passwords. A password manager is an application that generates, stores and auto-fills your login credentials for you. All your passwords will be encrypted against 1 master passwords (which you must remember, and it should be very strong). Most password managers have browser extensions and mobile apps, so whatever device you are on, your passwords can be auto-filled. A good all-rounder is [BitWarden](https://bitwarden.com), or see [Recommended Password Managers](/5_Privacy_Respecting_Software.md#password-managers)
**Enable 2-Factor Authentication** | Recommended | 2FA is where you must provide both something you know (a password) and something you have (such as a code on your phone) to log in. This means that if anyone has got your password (e.g. through phishing, malware or a data breach), they will no be able to log into your account. It's easy to get started, download [an authenticator app](/5_Privacy_Respecting_Software.md#2-factor-authentication) onto your phone, and then go to your account security settings and follow the steps to enable 2FA. Next time you log in on a new device, you will be prompted for the code that displays in the app on your phone (it works without internet, and the code usually changes every 30-seconds)
**Sign up for Breach Alerts** | Optional | After a websites suffers a significant data breach, the leaked data often ends up on the internet. There are several websites that collect these leaked records, and allow you to search your email address to check if you are in any of their lists. [Firefox Monitor](https://monitor.firefox.com), [Have i been pwned](https://haveibeenpwned.com) and [Breach Alarm](https://breachalarm.com) allow you to sign up for monitoring, where they will notify you if your email address appears in any new data sets. It is useful to know as soon as possible when this happens, so that you can change your passwords for the affected accounts. Have i been pwned also has domain-wide notification, where you can receive alerts if any email addresses under your entire domain appear (useful if you use aliases for [anonymous forwarding](/5_Privacy_Respecting_Software.md#anonymous-mail-forwarding))
**Keep Backup Codes Safe** | Optional | When you enable multi-factor authentication, you will usually be given several codes that you can use if your 2FA method is lost, broken or unavailable. Keep these codes somewhere safe, to prevent loss or unauthorised access. You could store them in your password manager, in an encrypted note, or write them down somewhere safe
**Shield your Password/ PIN** | Optional | When typing your password in public places, ensure you are not in direct line of site of a CCTV camera and that no one is able to see over your shoulder. Cover your password or pin code while you type, and do not reveal any plain text passwords on screen
**Update Passwords Periodically** | Optional | Database leaks and breaches are common, and it is likely that several of your passwords are already somewhere online. Occasionally updating passwords of security-critical accounts can help mitigate this. But providing that all your passwords are long, strong and unique, there is no need to do this too often- annually should be sufficient. Enforcing mandatory password changes within organisations is [no longer recommended](https://duo.com/decipher/microsoft-will-no-longer-recommend-forcing-periodic-password-changes), as it encourages colleagues to select weaker passwords
**Don’t save your password in browsers** | Optional | Most modern browsers offer to save your credentials when you log into a site. Don’t allow this, as they are not always encrypted, hence could allow someone to gain access into your accounts. Instead use a dedicated password manager to store (and auto-fill) your passwords
**Be cautious when logging in on someone else’s device** | Optional | When using someone else's machine, ensure that you're in a private/ incognito session (Use Ctrl+Shift+N/ Cmd+Shift+N). This will ensure that none of your credentials, cookies, browsing history of session data gets saved. Ideally you should avoid logging into your accounts on other people's computer, since you can't be sure their system is clean. Be especially cautious of public machines, as malware and tracking is more common here
**Avoid password hints** | Optional | Some sites allow you to set password hints. Using this feature can make it easier for social engineers to guess your credentials
**Never answer online security questions truthfully** | Optional | If a site asks security questions (such as place of birth, mother's maiden name or first car etc), don't provide real answers. It is a trivial task for hackers to find out this information online or through social engineering. Instead, create a fictitious answer, and store it inside your password manager
**Don’t use a 4-digit PIN** | Optional | Don’t use a short PIN to access your smartphone or computer. Instead, use a text password or much longer pin. Numeric passphrases are easy crack, (A 4-digit pin has 10,000 combinations, compared to 7.4 million for a 4-character alpha-numeric code)
**Avoid using SMS for 2FA** | Optional | When enabling multi-factor authentication, opt for app-based codes or a hardware token, if supported. SMS is susceptible to a number of common threats, such as [SIM-swapping](https://www.maketecheasier.com/sim-card-hijacking) and [interception](https://secure-voice.com/ss7_attacks). There's also no guarantee of how securely your phone number will be stored, or what else it will be used for. From a practical point of view, SMS will only work when you have signal, and can be slow
**Avoid using your PM to Generate OTPs** | Advanced | Many password managers are also able to generate 2FA codes. It is best not to use your primary password manager as your 2FA authenticator as well, since it would become a single point of failure if compromised. Instead use a dedicated [authenticator app](/5_Privacy_Respecting_Software.md#2-factor-authentication) on your phone or laptop
**Avoid Face Unlock** | Advanced | Most phones and laptops offer a facial recognition authentication feature, using the camera to compare a snapshot of your face with a stored hash. It may be very convenient, but there are numerous ways to [fool it](https://www.forbes.com/sites/jvchamary/2017/09/18/security-apple-face-id-iphone-x/) and gain access to the device, through digital photos and reconstructions from CCTV footage. Unlike your password- there are likely photos of your face on the internet, and videos recorded by surveillance cameras
**Watch out for Keyloggers** | Advanced | A hardware [keylogger](https://en.wikipedia.org/wiki/Hardware_keylogger) is a physical device planted between your keyboard and the USB port, which intercepts all key strokes, and sometimes relays data to a remote server. It gives a hacker access to everything typed, including passwords. The best way to stay protected, is just by checking your USB connection after your PC has been unattended. It is also possible for keyloggers to be planted inside the keyboard housing, so look for any signs that the case has been tampered with, and consider bringing your own keyboard to work. Data typed on a virtual keyboard, pasted from the clipboard or auto-filled by a password manager can not be intercepted by a hardware keylogger, so if you are on a public computer, consider typing passwords with the on-screen keyboard
**Consider a Hardware Token** | Advanced | A U2F/ FIDO2 security key is a USB (or NFC) device that you insert while logging in to an online service, in to verify your identity, instead of entering a OTP from your authenticator. [SoloKey](https://solokeys.com) and [NitroKey](https://www.nitrokey.com) are examples of such keys. They bring with them several security benefits, since the browser communicates directly with the device and cannot be fooled as to which host is requesting authentication, because the TLS certificate is checked. [This post](https://security.stackexchange.com/a/71704) is a good explanation of the security of using FIDO U2F tokens. Of course it is important to store the physical key somewhere safe, or keep it on your person. Some online accounts allow for several methods of 2FA to be enabled
**Consider Offline Password Manager** | Advanced | For increased security, an encrypted offline password manager will give you full control over your data. [KeePass](https://keepass.info) is a popular choice, with lots of [plugins](https://keepass.info/plugins.html) and community forks with additional compatibility and functionality. Popular clients include: [KeePassXC](https://keepassxc.org) (desktop), [KeePassDX](https://www.keepassdx.com) (Android) and [StrongBox](https://apps.apple.com/us/app/strongbox-password-safe/id897283731) (iOS). The drawback being that it may be slightly less convenient for some, and it will be up to you to back it up, and store it securely
**Consider Unique Usernames** | Advanced | Having different passwords for each account is a good first step, but if you also use a unique username, email or phone number to log in, then it will be significantly harder for anyone trying to gain unauthorised access. The easiest method for multiple emails, is using auto-generated aliases for anonymous mail forwarding. This is where [anything]@yourdomain.com will arrive in your inbox, allowing you to use a different email for each account (see [Mail Alias Providers](/5_Privacy_Respecting_Software.md#anonymous-mail-forwarding)). Usernames are easier, since you can use your password manager to generate, store and autofill these. Virtual phone numbers can be generated through your VOIP provider
**Recommended Software**: [Password Managers](/5_Privacy_Respecting_Software.md#password-managers) | [2FA Authenticators](/5_Privacy_Respecting_Software.md#2-factor-authentication)
## Web Browsing
Most websites on the internet will use some form of tracking, often to gain insight into their users behaviour and preferences. This data can be incredibly detailed, and so is extremely valuable to corporations, governments and intellectual property thieves. Data breaches and leaks are common, and deanonymizing users web activity is often a trivial task
There are two primary methods of tracking; stateful (cookie-based), and stateless (fingerprint-based). Cookies are small pieces of information, stored in your browser with a unique ID that is used to identify you. Browser fingerprinting is a highly accurate way to identify and track users wherever they go online. The information collected is quite comprehensive, and often includes browser details, OS, screen resolution, supported fonts, plugins, time zone, language and font preferences, and even hardware configurations.
This section outlines the steps you can take, to be better protected from threats, minimise online tracking and improve privacy. A summarized shorter version of this list can be found [here](/2_TLDR_Short_List.md#browsing)
**Security** | **Priority** | **Details and Hints**
--- | --- | ---
**Ensure Website is Legitimate** | Basic | It may sound obvious, but when you logging into any online accounts, double check the URL is correct. When visiting new websites, look for common signs that it could be unsafe: Browser warnings, redirects, on-site spam and pop-ups. You can also check a website using a tool, such as: [Virus Total URL Scanner](https://www.virustotal.com/gui/home/url), [IsLegitSite](https://www.islegitsite.com), [Google Safe Browsing Status](https://transparencyreport.google.com/safe-browsing/search) if you are unsure
**Watch out for Browser Malware** | Basic | Your system or browser can be compromised by spyware, miners, browser hijackers, malicious redirects, adware etc. You can usually stay protected, just by: ignoring pop-ups, be wary of what your clicking, don't proceed to a website if your browser warns you it may be malicious. Common sighs of browser malware include: default search engine or homepage has been modified, toolbars, unfamiliar extensions or icons, significantly more ads, errors and pages loading much slower than usual. These articles from Heimdal explain [signs of browser malware](https://heimdalsecurity.com/blog/warning-signs-operating-system-infected-malware), [how browsers get infected](https://heimdalsecurity.com/blog/practical-online-protection-where-malware-hides) and [how to remove browser malware](https://heimdalsecurity.com/blog/malware-removal)
**Use a Privacy-Respecting Browser** | Recommended | [Firefox](https://www.mozilla.org/en-US/firefox/new) and [Brave](https://brave.com) are secure, private-by-default browsers. Both are fast, open source, user-friendly and available on all major operating systems. Your browser has access to everything that you do online, so if possible, avoid Google Chrome, Microsoft IE and Apple Safari as (without correct configuration) all three of them, collect usage data, call home and allow for invasive tracking. See more: [Privacy Browsers](/5_Privacy_Respecting_Software.md#browsers)
**Use a Private Search Engine** | Recommended | Using a privacy-preserving, non-tracking search engine, will ensure your search terms are not logged, or used against you. Consider [DuckDuckGo](https://duckduckgo.com), [Quant](https://www.qwant.com), or [SearX](https://searx.me) (self-hosted). Google implements some [incredibly invasive](https://hackernoon.com/data-privacy-concerns-with-google-b946f2b7afea) tracking policies, and have a history of displaying [biased search results](https://www.businessinsider.com/evidence-that-google-search-results-are-biased-2014-10). Therefore Google, along with Bing, Baidu, Yahoo and Yandex are incompatible with anyone looking to protect their privacy. It is recommended to update your [browsers default search](https://duckduckgo.com/install) to a privacy-respecting search engine
**Remove Unnecessary Browser Addons** | Recommended | Extensions are able to see, log or modify anything you do in the browser, and some innocent looking browser apps, have malicious intentions. Websites can see which extensions you have installed, and may use this to enhance your fingerprint, to more accurately identify/ track you. Both Firefox and Chrome web stores allow you to check what permissions/access rights an extension requires before you install it. Check the reviews. Only install extensions you really need, and removed those which you haven't used in a while
**Keep Browser Up-to-date** | Recommended | Browser vulnerabilities are constantly being [discovered](https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=browser) and patched, so it’s important to keep it up to date, to avoid a zero-day exploit. You can [see which browser version your using here](https://www.whatismybrowser.com/), or follow [this guide](https://www.whatismybrowser.com/guides/how-to-update-your-browser/) for instructions on how to update. Some browsers will auto-update to the latest stable version
**Check for HTTPS** | Recommended | If you enter information on a non-HTTPS website, this data is transported unencrypted and can therefore be read by anyone who intercepts it. Do not enter any data on a non-HTTPS website, but also do not let the green padlock give you a false sense of security, just because a website has SSL certificate, does not mean that it is legitimate or trustworthy. <br>[HTTPS-Everywhere](https://www.eff.org/https-everywhere) (developed by the EFF) is a lightweight, open source (on [GitHub](https://github.com/EFForg/https-everywhere)) browser addon, that by enables HTTPS encryption automatically on sites that are known to support it. Is included in Brave, Tor and mobile Onion-Browser, and is available for [Chromium](https://chrome.google.com/webstore/detail/https-everywhere/gcbommkclmclpchllfjekcdonpmejbdp), [Firefox](https://addons.mozilla.org/en-US/firefox/addon/https-everywhere/) and [Opera](https://addons.opera.com/en/extensions/details/https-everywhere/)
**Use DNS-over-HTTPS** | Recommended | Traditional DNS makes requests in plain text for everyone to see. It allows for eavesdropping and manipulation of DNS data through man-in-the-middle attacks. Whereas [DNS-over-HTTPS](https://en.wikipedia.org/wiki/DNS_over_HTTPS) performs DNS resolution via the HTTPS protocol, meaning data between you and your DNS resolver is encrypted. A popular option is [CloudFlare's 1.1.1.1](https://1.1.1.1/help), or [compare providers](https://www.privacytools.io/providers/dns)- it is simple to [enable](https://www.maketecheasier.com/enable-dns-over-https-various-browsers) in-browser. Note that DoH comes with it's [own issues](https://blog.mozilla.org/netpolicy/2020/02/25/the-facts-mozillas-dns-over-https-doh/), mostly preventing web filtering
**Multi-Session Containers** | Recommended | Compartmentalisation is really important to keep different aspects of your browsing separate. For example, using different profiles for work, general browsing, social media, online shopping etc will reduce the number associations that data brokers can link back to you. One option is to make use of [Firefox Containers](https://support.mozilla.org/en-US/kb/containers) which is designed exactly for this purpose. Alternatively, you could use [different browsers for different tasks](https://medium.com/fast-company/incognito-mode-wont-keep-your-browsing-private-do-this-instead-dd64bc812010) (Brave, Firefox, Tor etc). For Chromium-based browsers, you can create and use [Profiles](https://www.chromium.org/developers/creating-and-using-profiles), or an extension such as [SessionBox](https://sessionbox.io), however this addon is not open source
**Use Incognito** | Recommended | When using someone else's machine, ensure that you're in a private/ incognito session (Use `Ctrl+Shift+N`/ `Cmd+Shift+N`). This will prevent browser history, cookies and some data being saved, but is not [fool-proof](https://www.howtogeek.com/117776/htg-explains-how-private-browsing-works-and-why-it-doesnt-offer-complete-privacy/)- you can still be tracked
**Understand Your Browser Fingerprint** | Recommended | Browser [Fingerprinting](https://pixelprivacy.com/resources/browser-fingerprinting) is an incredibly accurate method of tracking, where a website identifies you based on your device information, including: browser and OS versions, headers, time zone, installed fonts, plugins and applications and sometimes device hardware among other data points. You can view your fingerprint at [amiunique.org](https://amiunique.org/fp)- The aim is to be as un-unique as possible
**Manage Cookies** | Recommended | Clearing cookies regularly is one step you can take to help reduce websites from tracking you. Cookies may also store your session token, which if captured, would allow someone to access your accounts without credentials (often called [Session Hijacking](https://en.wikipedia.org/wiki/Session_hijacking)). <br>To mitigate this you should [clear cookies](https://kb.iu.edu/d/ahic) often. [Self Destructing Cookies](https://add0n.com/self-destructing-cookies.html) is a browser addon, which will kill cookies when you close the browser
**Block Third-Party Cookies** | Recommended | [Third-party cookies](https://en.wikipedia.org/wiki/HTTP_cookie#Privacy_and_third-party_cookies) placed on your device by a website other than the one you’re visiting. This poses a privacy risk, as a 3rd entity can collect data from your current session. [This guide](https://www.digitalcitizen.life/how-disable-third-party-cookies-all-major-browsers) explains how you can disable 3rd-party cookies, and you can [check here](https://www.whatismybrowser.com/detect/are-third-party-cookies-enabled) ensure this worked
**Block Ads** | Recommended | Using an ad-blocker can help improve your privacy, by blocking the trackers that ads implement. [uBlock Origin](https://github.com/gorhill/uBlock) is a very efficient and open source browser addon, developed by Raymond Hill. <br>When 3rd-party ads are displayed on a webpage, they have the ability to track you, gathering personal information about you and your habits, which can then be sold, or used to show you more targeted ads, and some ads are plain malicious or fake. Blocking ads also makes pages load faster, uses less data and provides a less cluttered experience
**Block Third-Party Trackers** | Recommended | Blocking trackers will help to stop websites, advertisers, analytics and more from tracking you in the background. [Privacy Badger](https://privacybadger.org), [DuckDuckGo Privacy Essentials](https://help.duckduckgo.com/duckduckgo-help-pages/desktop/adding-duckduckgo-to-your-browser/), [uBlock Origin](https://github.com/gorhill/uBlock) and [uMatrix](https://github.com/gorhill/uMatrix) (advanced) are all very effective, open source tracker-blockers available for all major browsers. Alternatively you can block trackers at the network level, with something like [Pi-Hole](https://pi-hole.net) (on your home server) or [Diversion](https://diversion.ch) (Asus routers running Merlin firmware. Some VPNs offer basic tracking blocking (such as [TrackStop on PerfectPrivacy](https://www.perfect-privacy.com/en/features/trackstop?a_aid=securitychecklist))
**Beware of Redirects** | Optional | While some redirects are harmless, others, such as [Unvalidated redirects](https://www.credera.com/blog/technology-insights/java/top-10-web-security-risks-unvalidated-redirects-forwards-10/) are used in phishing attacks, it can make a malicious link seem legitimate. If you are unsure about a redirect URL, you can check where it forwards to with a tool like [RedirectDetective](https://redirectdetective.com). It is also recommended to disable redirects in your [browser settings](https://appuals.com/how-to-stop-automatic-redirects-on-google-firefox-and-edge/).
**Do Not Sign Into Your Browser** | Optional | Many browsers allow you to sign in, in order to sync history, bookmarks and other browsing data across devices. However this not only allows for further data collection, but also increases attack surface through providing another avenue for a malicious actor to get hold of personal information. For Chrome users, you can get around forced sign-in by navigating to [chrome://flags](chrome://flags/#account-consistency) and disabling the `account-consistency` flag. If you still need to sync bookmarks + browser data between devices, there are open source [alternatives](/5_Privacy_Respecting_Software.md#bonus-3---self-hosted-services), such as [xBrowserSync](https://www.xbrowsersync.org)
**Disallow Prediction Services** | Optional | Some browsers allow for prediction services, where you receive real-time search results or URL auto-fill. If this is enabled then data is sent to Google (or your default search engine) with every keypress, rather than when you hit enter. You may wish to disable this to reduce the amount of data collected
**Avoid G Translate for Webpages** | Optional | When you visit a web page written in a foreign language, you may be prompted to install the Google Translate extension. Be aware that Google [collects all data](https://www.linkedin.com/pulse/google-translate-privacy-confidentiality-concerns-alex-gheorghe/) (including input fields), along with details of the current user. Instead use a translation service that is not linked to your browser
**Disable Web Notifications** | Optional | Browser push notifications are a common method for criminals to encourage you to click their link, since it is easy to spoof the source. Be aware of this, and for instructions on disabling browser notifications, see [this article](https://blog.malwarebytes.com/security-world/technology/2019/01/browser-push-notifications-feature-asking-abused)
**Disable Automatic Downloads** | Optional | Drive-by downloads is a common method of getting harmful files onto a users device. This can be mitigated by [disabling auto file downloads](https://www.ghacks.net/2017/05/18/you-should-disable-automatic-downloads-in-chrome-right-now/), and be cautious of websites which prompt you to download files unexpectedly
**Disallow Access to Sensors** | Optional | Mobile websites can [tap into your device sensors](https://www.wired.com/story/mobile-websites-can-tap-into-your-phones-sensors-without-asking/) without asking. If you grant these permissions to your browser once, then all websites are able to use these capabilities, without permission or notification, take a look at the [sensor-js](https://sensor-js.xyz) study for more. The best solution is to not grant any permissions to your browser, and to use a privacy browser such as FireFox Focus ([Android](https://play.google.com/store/apps/details?id=org.mozilla.focus) / [iOS](https://apps.apple.com/app/id1055677337)) or DuckDuckGo ([Android](https://play.google.com/store/apps/details?id=com.duckduckgo.mobile.android&hl=en_US) / [iOS](https://apps.apple.com/us/app/duckduckgo-privacy-browser/id663592361))
**Disallow Location** | Optional | Location Services lets sites ask for your physical location to improve your experience. This should be disabled in settings ([see how](https://support.ipvanish.com/hc/en-us/articles/360037874554-How-to-Disable-Location-Tracking-on-Browsers)). Note that there are still other methods of determining your approximate location (IP address, time zone, device info, DNS etc)
**Disallow Camera/ Microphone access** | Optional | Check browser settings to ensure that no websites are granted access to [webcam](https://www.howtogeek.com/210921/how-to-disable-your-webcam-and-why-you-should/) or microphone. It may also be beneficial to use [physical protection](/6_Privacy_and-Security_Gadgets.md) such as a webcam cover and microphone blocker
**Disable Browser Password Saves** | Optional | Do not allow your browser to store usernames and passwords. These can be easily viewed or accessed. Chrome does protect this data behind your Windows credentials, but these can be simple to obtain thanks to password reset utilities such as [Offline NT Password and Registry Editor](https://www.lifewire.com/offline-nt-password-and-registry-editor-review-2626147). Instead use a password manager
**Disable Browser Autofill** | Optional | Turn off autofill for any confidential or personal details. This feature was designed to make online shopping and general browsing more convenient, but storing this sensitive information (names, addresses, card details, search terms etc) can be extremely harmful if your browser is compromised in any way. Instead, if essential, consider using your password manager's Notes feature to store and fill your data
**Protect from Exfil Attack** | Optional | The CSS Exfiltrate attack is a where credentials and other sensitive details can be snagged with just pure CSS, meaning even blocking JavaScript cannot prevent it, read more [this article](https://www.mike-gualtieri.com/posts/stealing-data-with-css-attack-and-defense) by Mike Gualtieri. You can stay protected, with the CSS Exfil Protection plugin (for [Chrome](https://chrome.google.com/webstore/detail/css-exfil-protection/ibeemfhcbbikonfajhamlkdgedmekifo) and [Firefox](https://addons.mozilla.org/en-US/firefox/addon/css-exfil-protection/)) which sanitizes and blocks any CSS rules which may be designed to steal data. Check out the [CSS Exfil Vulnerability Tester](https://www.mike-gualtieri.com/css-exfil-vulnerability-tester) to see if you could be susceptible.
**Deactivate ActiveX** | Optional | [ActiveX](https://en.wikipedia.org/wiki/ActiveX) is a browser extension API that built into Microsoft IE, and enabled by default. It's not commonly used by legitimate sites any more, but since it gives plugins intimate access rights, and can be dangerous, therefore you should disable it ([see how](https://www.howtogeek.com/162282/what-activex-controls-are-and-why-theyre-dangerous/))
**Deactivate Flash** | Optional | Adobe Flash is infamous for its history of security vulnerabilities (with over [1000 issues](https://www.cvedetails.com/vulnerability-list/vendor_id-53/product_id-6761/Adobe-Flash-Player.html)!). See [how to disable Flash](https://www.tomsguide.com/us/disable-flash-how-to,news-21335.html) and [Flash alternatives](https://www.comparitech.com/blog/information-security/flash-vulnerabilities-security). Adobe will end support for Flash Player in December 2020
**Disable WebRTC** | Optional | [WebRTC](https://webrtc.org/) allows high-quality audio/video communication and peer-to-peer file-sharing straight from the browser. However it can pose as a privacy leak, especially if you are not using a proxy or VPN. In FireFox WebRTC can be disabled, by searching for, and disabling `media.peerconnection.enabled` in about:config. For other browsers, the [WebRTC-Leak-Prevent](ttps://github.com/aghorler/WebRTC-Leak-Prevent) extension can be installed. [uBlockOrigin](https://github.com/gorhill/uBlock) also allows WebRTC to be disabled. To learn more, [check out this guide](https://buffered.com/privacy-security/how-to-disable-webrtc-in-various-browsers/)
**Spoof HTML5 Canvas Sig** | Optional | [Canvas Fingerprinting](https://en.wikipedia.org/wiki/Canvas_fingerprinting) allows websites to identify and track users very accurately though exploiting the rendering capabilities of the [Canvas Element](https://en.wikipedia.org/wiki/Canvas_element). You can use the [Canvas-Fingerprint-Blocker](https://add0n.com/canvas-fingerprint-blocker.html) extension to spoof your fingerprint or use [Tor](https://www.torproject.org) - Check if you are susceptible [here](https://webbrowsertools.com/canvas-fingerprint/)
**Spoof User Agent** | Optional | The [user agent](https://en.wikipedia.org/wiki/User_agent) is a string of text, telling the website what device, browser and version you are using. It is used in part to generate your fingerprint, so switching user agent periodically is one small step you can take to become less unique. You can switch user agent manually in the Development tools, or use an extension like [Chameleon](https://sereneblue.github.io/chameleon) (Firefox) or [User-Agent Switcher](https://chrome.google.com/webstore/detail/user-agent-switcher-for-c/djflhoibgkdhkhhcedjiklpkjnoahfmg) (Chrome)
**Disregard DNT** | Optional | [Do Not Track](https://www.eff.org/issues/do-not-track) is a HTTP header, supported by all major browsers, once enabled is intended to flag to a website that you do not wish to be tracked. Enabling Do Not Track has very limited impact, since many websites do not respect or follow this. Since it is rarely used, it may also add to your signature, making you more unique, and therefore actually easier to track
**Prevent HSTS Tracking** | Optional | HTTP Strict Transport Security (HSTS) was designed to help secure websites, by preventing HTTPS downgrading attacks. However [privacy concerns](https://arstechnica.com/information-technology/2015/01/browsing-in-privacy-mode-super-cookies-can-track-you-anyway) have been raised, as it allowed site operators to plant super-cookies, and continue to track users in incognito. It can be disabled by visiting `chrome://net-internals/#hsts` in Chromium-based browsers, or following [this guide for Firefox](https://www.ghacks.net/2015/10/16/how-to-prevent-hsts-tracking-in-firefox/), and [this guide](https://appuals.com/how-to-clear-or-disable-hsts-for-chrome-firefox-and-internet-explorer/) for other browsers
**Prevent Automatic Browser Connections** | Optional | Even when you are not using your browser, it may call home to report on usage activity, analytics and diagnostics. You may wish to disable some of this, which can be done through the settings, see instructions for: [Firefox](https://support.mozilla.org/en-US/kb/how-stop-firefox-making-automatic-connections), [Chrome](https://www.ghacks.net/2018/01/20/how-to-block-the-chrome-software-reporter-tool-software_reporter_tool-exe/), [Brave](https://support.brave.com/hc/en-us/articles/360017905872-How-do-I-enable-or-disable-automatic-crash-reporting-)
**Enable 1st-Party Isolation** | Optional | First party isolation means that all identifier sources and browser state are scoped (isolated) using the URL bar domain, this can greatly reduce tracking. In Firefox (under `network.cookie.cookieBehavior`), it is now possible to block cross-site and social media trackers, and isolate remaining cookies. Alternatively, to enable/disable with 1-click, see the [First Party Isolation](https://addons.mozilla.org/en-US/firefox/addon/first-party-isolation/) add-on
**Strip Tracking Params from URLs** | Advanced | Websites often append additional GET paramaters to URLs that you click, to identify information like source/ referrer. You can [sanitize manually](https://12bytes.org/articles/tech/firefox/firefox-search-engine-cautions-and-recommendations#Sanitizing_manually), or use an extensions like [ClearUrls](https://github.com/KevinRoebert/ClearUrls) (for [Chrome](https://chrome.google.com/webstore/detail/clearurls/lckanjgmijmafbedllaakclkaicjfmnk) / [Firefox](https://addons.mozilla.org/en-US/firefox/addon/clearurls/)) or [SearchLinkFix](https://github.com/palant/searchlinkfix) (for [Chrome](https://chrome.google.com/webstore/detail/google-search-link-fix/cekfddagaicikmgoheekchngpadahmlf) / [Firefox](https://addons.mozilla.org/el/firefox/addon/google-search-link-fix/)) to strip tracking data from URLs automatically in the background
**First Launch Security** | Advanced | After installing a web browser, the first time you launch it (prior to configuring it's privacy settings), most browsers will call home (send a request to Microsoft, Apple, Google or other developer) and send over your device details (as outlined in [this journal article](https://www.scss.tcd.ie/Doug.Leith/pubs/browser_privacy.pdf)). Therefore, after installing a browser, you should first disable your internet connection, then launch it and go into settings and configure privacy options, before reenabling your internet connectivity. This does not apply to all browsers, in [this article](https://brave.com/brave-tops-browser-first-run-network-traffic-results) Brave claims to be the on of the only browser to call out to a single, controlled TLD exclusively
**Use The Tor Browser** | Advanced | [The Tor Project](https://www.torproject.org) provides a browser that encrypts and routes your traffic through multiple nodes, keeping users safe from interception and tracking. The main drawbacks are speed and user experience, as well as the possibility of DNS leaks from other programs (see [potential drawbacks](https://github.com/Lissy93/personal-security-checklist/issues/19)) but generally Tor is one of the more secure browser options for anonymity on the web
**Disable JavaScript** | Advanced | Many modern web apps are JavaScript-based, so disabling it will greatly decrease your browsing experience. But if you really want to go all out, then it will really reduce your attack surface, mitigate a lot of client-side tracking and [JavaScript malware](https://heimdalsecurity.com/blog/javascript-malware-explained/)
**Recommended Software**
- [Privacy Browsers](/5_Privacy_Respecting_Software.md#browsers)
- [Non-Tracking Search Engines](/5_Privacy_Respecting_Software.md#search-engines)
- [Browser Extensions for Security](/5_Privacy_Respecting_Software.md#browser-extensions)
- [Secure Browser & Bookmark Sync](/5_Privacy_Respecting_Software.md#browser-sync)
## Emails
Nearly 50 years since the first email was sent, it's still very much a big part of our day-to-day life, and will continue to be for the near future. So considering how much trust we put in them, it’s surprising how fundamentally insecure this infrastructure is. Email-related fraud [is on the up](https://www.csoonline.com/article/3247670/email/email-security-in-2018.html), and without taking basic measures you could be at risk.
If a hacker gets access to your emails, it provides a gateway for your other accounts to be compromised (through password resets), therefore email security is paramount for your digital safety.
The big companies providing "free" email service, don't have a good reputation for respecting users privacy: Gmail was caught giving [third parties full access](https://www.wsj.com/articles/techs-dirty-secret-the-app-developers-sifting-through-your-gmail-1530544442) to user emails and also [tracking all of your purchases](https://www.cnbc.com/2019/05/17/google-gmail-tracks-purchase-history-how-to-delete-it.html). Yahoo was also caught scanning emails in real-time [for US surveillance agencies](http://news.trust.org/item/20161004170601-99f8c) Advertisers [were granted access](https://thenextweb.com/insider/2018/08/29/both-yahoo-and-aol-are-scanning-customer-emails-to-attract-advertisers) to Yahoo and AOL users messages to “identify and segment potential customers by picking up on contextual buying signals, and past purchases.”
**Security** | **Priority** | **Details and Hints**
--- | --- | ---
**Have more than one email address** | Recommended | Consider using a different email address for security-critical communications from trivial mail such as newsletters. This compartmentalization could reduce amount of damage caused by a data breach, and also make it easier to recover a compromised account
**Keep Email Address Private** | Recommended | Do not share your primary email publicly, as mail addresses are often the starting point for most phishing attacks
**Keep your Account Secure** | Recommended | Use a long and unique password, enable 2FA and be careful while logging in. Your email account provides an easy entry point to all your other online accounts for an attacker
**Disable Automatic Loading of Remote Content** | Recommended | Email messages can contain remote content such as images or stylesheets, often automatically loaded from the server. You should disable this, as it exposes your IP address and device information, and is often used for tracking. For more info, see [this article](https://www.theverge.com/2019/7/3/20680903/email-pixel-trackers-how-to-stop-images-automatic-download)
**Don’t connect third-party apps to your email account** | Optional | If you give a third-party app or plug-in (such as Unroll.me, Boomerang, SaneBox etc) full access to your inbox, they effectively have full unhindered access to all your emails and their contents, which poses [significant security and privacy risks](https://zeltser.com/risks-of-email-search-services/)
**Don't Share Sensitive Data via Email** | Optional | Emails are very easily intercepted. Further to this you can’t be sure of how secure your recipient's environment is. Therefore emails cannot be considered safe for exchanging confidential or personal information, unless it is encrypted/ or both parties are using a secure mail provider
**Consider Switching to a Secure Mail Provider** | Optional | Secure and reputable email providers such as [ProtonMail](https://protonmail.com) and [Tutanota](https://tutanota.com) allow for end-to-end encryption, full privacy as well as more security-focused features. Unlike typical email providers, your mailbox cannot be read by anyone but you, since all messages are encrypted. Providers such as Google, Microsoft and Yahoo scan messages for advertising, analytics and law enforcement purposes, but this poses a serious security threat
**Use Smart Key** | Advanced | OpenPGP also [does not support](https://www.eff.org/deeplinks/2013/08/pushing-perfect-forward-secrecy-important-web-privacy-protection) Forward secrecy, which means if either your or the recipient's private key is ever stolen, all previous messages encrypted with it will be exposed. Therefore, you should take great care to keep your private keys safe. One method of doing so, is to use a USB Smart Key to sign or decrypt messages, allowing you to do so without your private key leaving the USB device. Devices which support this include [NitroKey](https://www.nitrokey.com/), [YubiKey 5](https://www.yubico.com/products/yubikey-5-overview/) (See [Yubico Neo](https://developers.yubico.com/ykneo-openpgp/)), [Smart Card](https://www.floss-shop.de/en/security-privacy/smartcards/13/openpgp-smart-card-v3.3) (See [guide](https://spin.atomicobject.com/2014/02/09/gnupg-openpgp-smartcard/)), [OnlyKey](https://onlykey.io/)
**Use Aliasing / Anonymous Forwarding** | Advanced | Email aliasing allows messages to be sent to [anything]@my-domain.com and still land in your primary inbox. Effectively allowing you to use a different, unique email address for each service you sign up for. This means if you start receiving spam, you can block that alias and determine which company leaked your email address. More importantly, you do not need to reveal your real email address to any company. <br>[Anonaddy](https://anonaddy.com) and [SimpleLogin](https://simplelogin.io/?slref=bridsqrgvrnavso) are open source anonymous email forwarding service allowing you to create unlimited email aliases, with a free plan
**Subaddressing** | Optional | An alternative to aliasing is [subaddressing](https://en.wikipedia.org/wiki/Email_address#Subaddressing), where anything after the `+` symbol is omitted during mail delivery, for example you the address yourname+tag@example.com denotes the same delivery address as yourname@example.com. This was defined in [RCF-5233](https://tools.ietf.org/html/rfc5233), and supported by most major mail providers (inc Gmail, YahooMail, Outlook, FastMail and ProtonMail). It enables you to keep track of who shared/ leaked your email address, but unlike aliasing it will not protect against your real address being revealed
**Use a Custom Domain** | Advanced | Using a custom domain, means that even you are not dependent on the address assigned my your mail provider. So you can easily switch providers in the future and do not need to worry about a service being discontinued
**Sync with a client for backup** | Advanced | Further to the above, to avoid loosing temporary or permanent access to your emails during an unplanned event (such as an outage or account lock). Thunderbird can sync/ backup messages from multiple accounts via IMAP and store locally on your primary device
**Be Careful with Mail Signatures** | Advanced | You do not know how secure of an email environment the recipient of your message may have. There are several extensions (such as [ZoomInfo](https://www.zoominfo.com)) that automatically crawl messages, and create a detailed database of contact information based upon email signitures, and sometimes message content. If you send an email to someone who has something like this enabled, then you are unknowingly entering your details into this database
**Be Careful with Auto-Replies** | Advanced | Out-of-office automatic replies are very useful for informing people there will be a delay in replying, but all too often people reveal too much information- which can be used in social engineering and targeted attacks
**Choose the Right Mail Protocol** | Advanced | Do not use outdated protocols (below IMAPv4 or POPv3), both have known vulnerabilities and out-dated security.
**Self-Hosting** | Advanced | Self-hosting your own mail server is not recommended for non-advanced users, since correctly securing it is critical yet requires strong networking knowledge - [read more](https://www.reddit.com/r/selfhosted/comments/6h88qf/on_selfhosted_mail_servers/). That being said, if you run your own mail server, you will have full control over your emails. [Mail-in-a-box](https://github.com/mail-in-a-box/mailinabox) and [docker-mailserver](https://github.com/tomav/docker-mailserver) are ready-to-deploy correctly-configured mail servers that provide a good starting point
**Always use TLS Ports** | Advanced | There are SSL options for POP3, IMAP, and SMTP as standard TCP/IP ports. They are easy to use, and widely supported so should always be used instead of plaintext email ports. By default, the ports are: POP3= 995, IMAP=993 and SMTP= 465
**DNS Availability** | Advanced | For self-hosted mail servers, to prevent DNS problems impacting availability- use at least 2 MX records, with secondary and tertiary MX records for redundancy when the primary MX record fails
**Prevent DDoS and Brute Force Attacks** | Advanced | For self-hosted mail servers (specifically STMP), limit your total number of simultaneous connections, and maximum connection rate to reduce the impact of attempted bot attacks
**Maintain IP Blacklist** | Advanced | For self-hosted mail servers, you can improve spam filters and harden security, through maintaining an up-to-date local IP blacklist and a spam URI realtime block lists to filter out malicious hyperlinks. You may also want to activate a [reverse DNS lookup](https://en.wikipedia.org/wiki/Reverse_DNS_lookup) system
**Recommended Software:**
- [Encrypted Email Providers](/5_Privacy_Respecting_Software.md#encrypted-email)
- [Anonymous Mail Forwarding](/5_Privacy_Respecting_Software.md#anonymous-mail-forwarding)
- [Pre-Configured Mail Servers](/5_Privacy_Respecting_Software.md#pre-configured-mail-servers)
## Secure Messaging
**Security** | **Priority** | **Details and Hints**
--- | --- | ---
**Only Use Fully End-to-End Encrypted Messengers** | Recommended | [End-to-end encryption](https://en.wikipedia.org/wiki/End-to-end_encryption) is a system of communication where messages are encrypted on your device and not decrypted until they reach the intend recipient. This ensures that any actor who intercepts traffic cannot read the message contents, nor can the anybody with access to the central servers where data is stored. Note that if an app is not completely open source, the extent to which the encryption is implemented cannot be verified, and it should not be trusted.
**Use only Open Source Messaging Platforms** | Recommended | If code is open source then it can be independently examined and audited by anyone qualified to do so, to ensure that there are no backdoors, vulnerabilities, or other security issues. Therefore propriety applications should not be trusted for communicating sensitive information. In open source echosystems, bugs are raised transparently and are usually fixed quickly, and version histories can show who added what, and when. When downloading a pre-built package, you can verify that it has not been tampered with by [doing a hash check](https://proprivacy.com/guides/how-why-and-when-you-should-hash-check) and comparing the digital signatures. It's important to note that, no piece of software that it totally bug free, and hence never truly secure or private- being open source, is in no way a guarantee that something is safe
**Use a "Trustworthy" Messaging Platform** | Recommended | When selecting an encrypted messaging app, ensure it's fully open source. It should be stable and actively maintained. Ideally it should be backed by reputable developers or at least be fully clear where funding originates from and/ or what their revenue model is. It should have undergone an independent code audit, with results publicly published
**Check Security Settings** | Recommended | Enable security settings, including contact verification, security notifications and encryption. Disable optional non-security features such as read receipt, last online and typing notification. If the app supports cloud sync either for backup or for access through a desktop or web app companion, this increases the attack surface and so should be disabled
**Ensure your Recipients Environment is Secure** | Recommended | Your conversation can only be as secure as the weakest link. Often the easiest way to infiltrate a communications channel, is to target the individual or node with the least protection. They may not even be aware that their environment has been compromised, leading to sensitive information being captured by an adversary. The best solution to this is to educate and inform the participants in your conversation, about good security practices. Focus on secure authentication, device encryption, network security and malware prevention
**Disable Cloud Services** | Recommended | Some mobile messaging apps offer a web or desktop companion. This not only increases attack surface, but it has been linked to several [critical security issues](https://www.perimeterx.com/tech-blog/2020/whatsapp-fs-read-vuln-disclosure/), and should therefore be avoided, if possible. Some messaging apps also offer a cloud backup feature. Again there a serious security issues with many of these implementations, for example WhatsApp [backups are not encrypted](https://www.ghacks.net/2018/09/04/whatsapp-backups-android/), and so with this feature available, you chat history may be breached. Again, this should be [disabled](https://www.techuntold.com/stop-whatsapp-backup-iphone-android/).
**Secure Group Chats** | Recommended | That the risk of compromise will rise exponentially, the more participants are in a group, as the attack surface increases. There is also a higher chance that an adversary lurking among the members can go unnoticed. Periodically check that all participants are legitimate, and ensure only trusted members have admin privileges. It may sometimes be worth only sharing sensitive information within smaller groups. Note that with some messengers, not all group chats are encrypted (especially if one recipient is on an [older](https://graziadaily.co.uk/life/real-life/whatsapp-group-chats-actually-encrypted-theres-way-find/) version)
**Create a Safe Environment for Communication** | Recommended | There are several stages where your digital communications could be monitored or intercepted. This includes: Your or your participants device, your ISP, national gateway or government logging, the messaging provider, the servers. You can help protect from these risks by: paying attention to your surroundings, keeping your devices up-to-date, avoiding malware, watching out for phishing attacks, relying on trustworthy services, creating strong passwords and second-factor authentication, using encryption and helping those with whom you communicate do the same. If you are concerned about your communications being intercepted, consider using a reputable VPN provider, or routing traffic through Tor
**Agree on a Communication Plan** | Optional | In certain situations (such as attending a protest, communicating with a source or traveling to a risky location), it may be worth making a communication plan. This should include primary and backup methods of securely getting in hold with each other, (in order to avoid falling back on insecure technologies). You may wish to include procedures to implement in potential situations, e.g. to signal for help or assistance
**Strip Meta-Data from Media** | Optional | [Metadata](https://www.maketecheasier.com/understanding-metadata-and-privacy/) is "Data about Data" or additional information attached to a file or transaction. When you send a photo, audio recording, video or document you may be revealing more than you intended to, or [leaking your location](https://nakedsecurity.sophos.com/2012/12/03/john-mcafee-location-exif/). For example [Exif data](https://en.wikipedia.org/wiki/Exif) attached to images typically includes: Device name and model, author, time & date taken, GPS location (latitude & longitude) and photography information. In order to protect privacy, you should [remove](https://en.wikipedia.org/wiki/Metadata_removal_tool) this data before uploading and file or media item. Some apps strip this information out automatically, but they may be logging it before doing so
**Defang URLs** | Optional | Sending links via WhatsApp, Slack, Apple Messenger, Wire, Facebook and other services can unintentionally [expose your personal information](https://hunch.ly/osint-articles/osint-article-how-to-blow-your-online-cover). This is because, when a thumbnail or preview is generated- it happens on the client-side, and therefore causes your IP, user-agent, device info to be logged. This broadcasts to the website owner that you are discussing that website. One way around this, is to [defang](https://privacymatters.ubc.ca/blocking-email-links-why-we-use-hxxp-emails) your URLs (e.g. `https://www.example.com` --> `hxxps://www[.]example[.]com`), using a VPN will also help protect your IP
**Verify your Recipient** | Optional | Your communication is only as secure as it's weakest link- Always ensure you are talking to the intended recipient, and that they have not been compromised. One method for doing so is to use an app which supports contact verification. This is a powerful feature that enables users to trust the destination, and ensure the conversation has not been hijacked. It usually takes the form of comparing fingerprint codes, even over a phone call or in real life via scanning a QR code. If you believe you may be targeted, use a secure messenger that provides reliable indicators of compromise, where both parties will be notified if there have been any changes
**Enable Ephemeral Messages** | Optional | You cannot always rely on the physical security of your device. Self-destructing messages is a really neat feature the causes your messages to automatically delete after a set amount of time. This means that if your device is lost, stolen or seized, an adversary will only have access to the most recent communications. Unlike remote erase, disappearing messages does not require your device to be remotely accessible or have signal. You are able to vary this time frame from weeks all the way down to just a few seconds, depending on your threat model. Without disappearing messages enabled, you should periodically delete conversation history, in case your device is breached
**Avoid SMS** | Optional | SMS may be convenient, but it's [not secure](https://en.wikipedia.org/wiki/SMS#Vulnerabilities). It is susceptible to threats, such as [interception](https://en.wikipedia.org/wiki/IMSI-catcher), [sim swapping](https://www.schneier.com/blog/archives/2020/01/sim_hijacking.html), manipulation and [malware](https://www.securitynewspaper.com/2019/09/13/hack-any-mobile-phone-with-just-a-sms). If you must use SMS, then you should encrypt messages before sending. One option is to use [Silence](https://silence.im/), an Android app that provides end-to-end encryption for SMS
**Watch out for Trackers** | Optional | A tracker is a piece of software meant to collect data about you or your usages. Be wary of messaging applications with trackers, as the detailed usage statistics they collect are often very evasive, and can sometimes reveal your identity as well as personal information that you would otherwise not intend to share. You can check how many, and which trackers a given app uses, by searching it in [Exodus Privacy](https://reports.exodus-privacy.eu.org/en/)
**Consider Jurisdiction** | Advanced | The jurisdictions where the organisation is based, and data is hosted should also be taken into account. As in some territories, organisations are forced to comply with local government regulations, which can require them to keep logs of all users interactions and metadata, or hand over encryption keys. Where possible, avoid [Five Eyes](https://en.wikipedia.org/wiki/Five_Eyes) and other [International Cooperatives](https://en.wikipedia.org/wiki/Five_Eyes#Other_international_cooperatives), and countries with poor respect for user privacy such as China, Russia, Singapore and Malaysia.
**Use an Anonymous Platform** | Advanced | If you believe you may be targeted, you should opt for an anonymous messaging platform that does not require a phone number, or any other personally identifiable information to sign up or use. Even using false or temporary information (such as a burner sim, VOIP number, temporary or forwarding email address, made-up details etc) cannot be grantee anonymity, and may put you at risk. As well as this you should download the app over Tor, outside of Google Play / Apple App Store, create an anonymous identity, only run the app while connected through Tor and ideally sandbox it to prevent data leaks (using a separate profile, virtual machine or even a secondary device)
**Ensure Forward Secrecy is Supported** | Advanced | Opt for a platform that implements [forward secrecy](https://en.wikipedia.org/wiki/Forward_secrecy). This is where your app generates a new encryption key for every message. It means that if your adversary has obtained the private encryption key from one party, they will not be able to use it to decrypt any previously captured messages
**Consider a Decentralized Platform** | Advanced | If all data flows through a central provider, you have to trust them with your data and meta-data. You cannot verify that the system running is authentic without back doors, and they may be subject to local laws, court orders or censorship, and if that provider ceases to operate, the entire network will be unavailable for that duration. Whereas with a decentralized system, there are no central servers to compromise, and no single point of failure. It cannot be raided, shut down, or forced to turn over data. Some decentralized platforms also route traffic through the Tor network, which provides an additional layer of anonymity and security.
**Recommended Software**
- [Secure Messaging Apps](/5_Privacy_Respecting_Software.md#encrypted-messaging)
- [P2P Messaging Platforms](/5_Privacy_Respecting_Software.md#p2p-messaging)
## Social Media
Online communities have existed since the invention of the internet, and give people around the world the opportunity to connect, communicate and share. Although these networks are a great way to promote social interaction and bring people together, that have a dark side - there are some serious [Privacy Concerns with Social Networking Services](https://en.wikipedia.org/wiki/Privacy_concerns_with_social_networking_services), and these social networking sites are owned by private corporations, and that they make their money by collecting data about individuals and selling that data on, often to third party advertisers.
Secure your account, lock down your privacy settings, but know that even after doing so, all data intentionally and non-intentionally uploaded is effectively public. If possible, avoid using conventional social media networks.
**Security** | **Priority** | **Details and Hints**
--- | --- | ---
**Secure your Account** | Recommended | Profiles media profiles get stolen or taken over all too often. To protect your account: use a unique and strong password, and enable 2-factor authentication. See the [Authentication](#authentication) section for more tips
**Check Privacy Settings** | Recommended | Most social networks allow you to control your privacy settings. Ensure that you are comfortable with what data you are currently exposing and to whom. But remember, privacy settings are only meant to protect you from other members of the social network- they do not shield you or your data from the owners of the network. See how to set privacy settings, with [this guide](https://securityinabox.org/en/guide/social-networking/web)
**Think of All Interactions as Public** | Recommended | There are still numerous methods of viewing a users 'private' content across many social networks. Therefore, before uploading, posting or commenting on anything, think "Would I mind if this was totally public?"
**Think of All Interactions as Permanent** | Recommended | Pretty much every post, comment, photo etc is being continuously backed up by a myriad of third-party services, who archive this data and make it indexable and publicly available almost [forever](https://www.inc.com/meredith-fineman/what-we-post-online-is-forever-and-we-need-a-reminder.html). Sites like Ceddit, and [/r/undelete](https://www.reddit.com/r/undelete/), [Politwoops](https://projects.propublica.org/politwoops/), The [Way Back Machine](https://archive.org/web/) allow anyone to search through deleted posts, websites and media. Therefore it's important to not unintentially reveal too much information, and to consider what the implications would be if it were to go 'viral'
**Don't Reveal too Much** | Recommended | Profile information creates a goldmine of info for hackers, the kind of data that helps them personalize phishing scams. Avoid sharing too much detail (DoB, Hometown, School etc)
**Be Careful what you Upload** | Recommended | Status updates, comments, check-ins and media can unintentionally reveal a lot more than you intended them to (such as location, preferences, contacts/ relationships etc). This is especially relevant to photos and videos, which may show things in the background (documents, road names/ signs, credit cards, electronic devices), even more so when there are multiple images uploaded
**Don't Share Email or Phone Number** | Recommended | Posting your real email address or mobile number, gives hackers, trolls and spammers more munition to use against you, and can also allow seperate alliases, profiles or data points to be connected
**Don't Grant Unnecessary Permissions** | Recommended | By default many of the popular social networking apps will ask for permission to access your contacts, call log, location, messaging history etc.. If they don’t need this access, don’t grant it. For Android users, check out [Bouncer](https://play.google.com/store/apps/details?id=com.samruston.permission) - an app that gives you the ability to grant permissions temporarily
**Be Careful of 3rd-Party Integrations** | Recommended | Avoid signing up for accounts using a Social Network login, revoke access to social apps you no longer use, see instructions for: [Facebook](https://www.facebook.com/settings?tab=applications), [Twitter](https://twitter.com/settings/applications), [Insta](https://www.instagram.com/accounts/manage_access/) and [LinkedIn](https://www.linkedin.com/psettings/permitted-services)
**Avoid Publishing Geo Data while still Onsite** | Recommended | If you plan to share any content that reveals a location (such as 'checking in', sharing photos, or status updates that reveal your location), then wait until you have left that place. This is particularly important when you are taking a trip, at a restaurant, campus, hotel/ resort, public building or airport- as it may alert the wrong people to your exact whereabouts
**Remove metadata before uploading media** | Optional | Most smartphones and some cameras automatically attach a comprehensive set of additional data (called [EXIF data](https://en.wikipedia.org/wiki/Exif)) to each photograph. This usually includes things like time, date, location, camera model, user etc. It can reveal a lot more data than you intended to share. Remove this data before uploading. You can remove meta data [without any special software](https://www.howtogeek.com/203592/what-is-exif-data-and-how-to-remove-it/), use [a CLI tool](https://www.funkyspacemonkey.com/how-to-remove-exif-metadata), or a desktop tool like [EXIF Tage Remover](https://rlvision.com/exif/)
**Consider Spoofing GPS in home visinity** | Advanced | Even if you yourself never use social media, strip geo-data from all media and disable device radios- there is always going to be others who are not as careful, and could reveal your location. For example, if you have guests, family members or visitors to your home residence, their device will likley be recording GPS and logging data. One method around this, is to use an SDR to [spoof GPS signals](https://www.rtl-sdr.com/tag/gps-spoofing/), causing all devices in the visinity to believe they are in a different, pre-defined location
**Consider False Information** | Advanced | If you just want to read, and do not intend on posting too much- consider using an alias name, and false contact details. Remember that there are still methods of tracing your account back to you, but this could mitigate a lot of threats. Consider using separate accounts/identities, or maybe different pseudonyms, for different campaigns and activities. Don't link accounts in any way- don't comment on / liking inter-account posts, avoid logging in from the same IP and use different passwords (so the accounts cannot be linked in the case of a data breach)
**Don’t have any social media accounts** | Advanced | Social media is fundamentally un-private, so for maximum online security and privacy, avoid using any mainstream social networks
**Recommended Software**
- [Alternative Social Media](/5_Privacy_Respecting_Software.md#social-networks)
- [Alternative Video Platforms](/5_Privacy_Respecting_Software.md#video-platforms)
- [Alternative Blogging Platforms](/5_Privacy_Respecting_Software.md#blogging-platforms)
- [News Readers and Aggregation](/5_Privacy_Respecting_Software.md#news-readers-and-aggregation)
## Networking
This section covers how you connect your devices to the internet securely, including configuring your router and setting up a VPN.
**Security** | **Priority** | **Details and Hints**
--- | --- | ---
**Use a VPN** | Recommended | Use a reputable, paid-for VPN. This can help protect sites you visit logging your real IP, reduce the amount of data your ISP can collect and increase protection on public WiFi. However VPNs alone do not make you anonymous or stop tracking, it's important to understand their [limitations](/5_Privacy_Respecting_Software.md#word-of-warning-2). <br>[ProtonVPN](https://protonvpn.com) and [Mullvad](https://mullvad.net) may be good options for many, but for an unbiased comparison, see: [That One Privacy Site](https://thatoneprivacysite.net). Select a service with a good reputation, that does not keep logs, and is not in the [5-eyes](https://en.wikipedia.org/wiki/Five_Eyes) jurisdiction
**Change your Router Password** | Recommended | After getting a new router, change the password. Default router passwords are publicly available (see [default-password.info](https://default-password.info)), meaning anyone within proximity would be able to connect. See [here](https://www.lifewire.com/how-to-change-your-wireless-routers-admin-password-2487652), for a guide on changing router password
**Use WPA2, and a strong password** | Recommended | There are different authentication protocols for connecting to WiFi. Currently the most secure is options are [WPA2](https://en.wikipedia.org/wiki/IEEE_802.11i-2004) and [WPA3](https://www.pcmag.com/news/what-is-wpa3-more-secure-wi-fi) (on newer routers). WEP and WPA are moderately [easy to crack](https://null-byte.wonderhowto.com/how-to/hack-wi-fi-cracking-wep-passwords-with-aircrack-ng-0147340/). Ensure it is strong: 12+ alpha-numeric characters, avoiding dictionary words. You can set this within your routers admin panel
**Keep router firmware up-to-date** | Recommended | Manufacturers release firmware updates that fix security vulnerabilities, implement new standards and sometimes add features/ improve the performance your router. It's important to have the latest firmware installed, to avoid a malicious actor exploiting an un-patched vulnerability. <br>You can usually do this by navigating to [192.168.0.1](192.168.0.1) or [192.168.1.1](192.168.1.1), entering the admin credentials (on the back of you of your router, not your WiFi password!), and follow the instructions, see: [Asus](https://www.asus.com/support/FAQ/1005484/), [D-Link](https://eu.dlink.com/uk/en/support/faq/routers/mydlink-routers/dir-810l/how-do-i-upgrade-the-firmware-on-my-router), [Linksys (older models)](https://www.linksys.com/us/support-article?articleNum=140365), [NetGear](https://kb.netgear.com/23442/How-do-I-update-my-NETGEAR-router-s-firmware-using-the-Check-button-in-the-router-web-interface) and [TP-Link](https://www.tp-link.com/us/support/faq/688/). Some newer routers update automatically
**Implement a Network-Wide VPN** | Optional | If you configure your VPN on your router, firewall or home server, then traffic from all devices will be encrypted and routed through it, without needing individual VPN apps. This reduces the chance: of IP leaks, VPN app crashes, and provides VPN access to devices which don't support VPN clients (TV's, Smart Hubs, IoT devices etc)
**Protect against DNS leaks** | Optional | When using a VPN, it is extremely important to exclusively use the DNS server of your VPN provider or secure service. For OpenVPN, you can add: `block-outside-dns` to your config file (which will have the extension `.ovn` or `.conf`). If you are unable to do this, then see [this article](https://www.dnsleaktest.com/how-to-fix-a-dns-leak.html) for further instructions. You can check for leaks, using a [DNS Leak Test](https://www.dnsleaktest.com/)
**Use a secure VPN Protocol** | Optional | [OpenVPN](https://en.wikipedia.org/wiki/OpenVPN) and [WireGuard](https://www.wireguard.com/) are open source, lightweight and secure [tunneling protocol](https://en.wikipedia.org/wiki/Tunneling_protocol)s. Avoid using [PPTP](https://en.wikipedia.org/wiki/Point-to-Point_Tunneling_Protocol) or [SSTP](https://en.wikipedia.org/wiki/Secure_Socket_Tunneling_Protocol). [L2TP](https://en.wikipedia.org/wiki/Layer_2_Tunneling_Protocol) can be good, but only when configured correctly
**Secure DNS** | Optional | Use [DNS-over-HTTPS](https://en.wikipedia.org/wiki/DNS_over_HTTPS) which performs DNS resolution via the HTTPS protocol, encrypting data between you and your DNS resolver. Although DoH is [not perfect](https://www.netsparker.com/blog/web-security/pros-cons-dns-over-https/), it does remove the need for trust - see [CoudFlares 1.1.1.1 Docs](https://1.1.1.1/help) for more details
**Avoid the free router from your ISP** | Optional | Typically they’re manufactured cheaply in bulk in China, with insecure propriety firmware that doesn't recieve regular security updates. Consider an open source router (such as [Turris MOX](https://www.turris.cz/en/mox/overview/)) or a comercial router with [secure firmware](/5_Privacy_Respecting_Software.md#router-firmware)
**Whitelist MAC Addresses** | Optional | You can whitelist MAC addresses in your router settings, disallowing any unknown devices to immediately connect to your network, even if they know your credentials. Note that a malicious actor may be able to bypass this, by cloning their address to appear the same as one of your trusted devices, but it will add an extra step
**Change the Router’s Local IP Address** | Optional | It is possible for a malicious script in your web browser, to exploit a cross site scripting vulnerability, accessing known-vulnerable routers at their local IP address and tampering with them (known as [CSRF Attack](https://decoded.avast.io/threatintel/router-exploit-kits-an-overview-of-routercsrf-attacks-and-dns-hijacking-in-brazil/)). Updating your routers local IP address, so that it is not the default (usually 192.168.0.1 or [similar](https://www.softwaretestinghelp.com/default-router-ip-address-list/)), can help protect you from some of these automated attacks
**Don't Reveal Personal Info in SSID** | Optional | You should update your network name, choosing an SSID that does not identify you, include your flat number / address, and does not specify the device brand/ model. It may be beneficial to avoid something very unique, as services like [Wigle](https://www.wigle.net/)'s WiFi map can link an SSID directly back to your home address. This may also slightly aid in deterring an opportunistic attacker, as it indicates the router is being conscientiously administered. See, [how to update SSID](https://www.lifewire.com/change-the-wifi-name-ssid-on-a-router-818337)
**Opt-Out Router Listings** | Optional | WiFi SSIDs is scanned, logged and then published on various websites (such as [Wiggle WiFi SSID Map](https://www.wigle.net/)), which is a serious privacy concern for some. You can [opt-out of many of these listings](https://www.ghacks.net/2014/10/29/add-_nomap-to-your-routers-ssid-to-have-it-ignored-by-google-and-mozilla/), by adding `_nomap` to the end of your SSID (WiFi network name)
**Hide your SSID** | Optional | Your routers Service Set Identifier is simply the network name. If it is not visible, it may receive less abuse. However understand that finding hidden networks is a [trivial task](https://www.acrylicwifi.com/en/blog/hidden-ssid-wifi-how-to-know-name-of-network-without-ssid/) (e.g. with [Kismet](https://www.kismetwireless.net/)). See, [how to hide SSID](https://www.lifewire.com/hide-your-wireless-network-from-your-internet-leeching-neighbors-2487655)
**Disable WPS** | Optional | Wi-FI Protected Setup provides an easier method to connect, without entering a long WiFi password, it often involves a physical button on your router, entering an 8-digit PIN, or tapping an NFC. It may be convenient, but WPS introduces a series of [major security issues](https://www.computerworld.com/article/2476114/the-woops-of-wps--wi-fi-protected-setup--raises-its-ugly-head-again.html), allowing an attacker to bypass the password, and gain easy access into your network. See, [how to disable WPS](https://www.howtogeek.com/176124/wi-fi-protected-setup-wps-is-insecure-heres-why-you-should-disable-it/)
**Disable UPnP** | Optional | Universal Plug and Play allows applications to automatically forward a port on your router, saving you the hassle of forwarding ports manually. However, it has a long history of [serous security issues](https://www.howtogeek.com/122487/htg-explains-is-upnp-a-security-risk/), and so it is recommended to turn this feature off. See, [how to disable UPnP](https://lifehacker.com/disable-upnp-on-your-wireless-router-already-1844012366)
**Use a Guest Network for Guests** | Optional | Do not grant access to your primary WiFi network to visitors, as it enables them to interact with other devices on the network (such as printers, IoT/ smart home devices, network-attached storage/ servers etc). Even if it is someone you trust, you cannot guarantee that their device has not been compromised in some way. Some routers offer the ability to enable a separate 'guest' network, which provides isolation and is able to expire after a given time frame. For a more comprehensive network, the same outcome can be achieved using [a VLAN and separate access point](http://alduras.com/wp/guest-wifi-network-why-vlans/). See, [how to enable guest network](https://www.lifewire.com/guest-network-for-home-tutorial-818204)
**Change your Router's Default IP** | Optional | Modifying your router admin panels default IP address will makes it more difficult for malicious scripts in your web browser targeting local IP addresses, as well as adding an extra step for local network hackers
**Kill unused processes and services on your router** | Optional | Services like Telnet and SSH (Secure Shell) that provide command-line access to devices should never be exposed to the internet and should also be disabled on the local network unless they're actually needed. In general, [any service that’s not used should be disabled](https://www.securityevaluators.com/knowledge/case_studies/routers/soho_service_hacks.php) to reduce attack surface
**Disable UPnP** | Optional | Universal Plug and Play may allow you to save time with Port Forwarding, but it opens doors to many [security risks](https://www.howtogeek.com/122487/htg-explains-is-upnp-a-security-risk/). It can be disabled from your routers admin panel
**Don't have Open Ports** | Optional | Close any open ports on your router that are not needed. Open ports provide an easy entrance for hackers. You can use a port scanner (such as [AngryIP](https://angryip.org)), or a [web service](https://www.yougetsignal.com/tools/open-ports/)
**Disable Unused Remote Access Protocols** | Optional | When protocols such as PING, Telnet, SSH, UPnP and HNAP etc are enabled, they allow your router to be probed from anywhere in the world, and so should be disabled if not in use. Instead of setting their relevant ports to 'closed', set them to 'stealth' so that no response is given to unsolicited external communications that may come from attackers probing your network
**Disable Cloud-Based Management** | Optional | You should treat your routers admin panel with the upmost care, as considerable damage can be caused if an attacker is able to gain access. You should take great care when accessing this page, ensuring you always log out, or considering Incognito mode. Most routers offer a 'remote access' feature, allowing you to access the admin web interface from anywhere in the world, using your username and password. This greatly increases attack surface, and opens your network up to a host of threats, and should therefore be disabled. You could also take it a step further, disable the admin interface over WiFi, meaning the settings can only be modified when using a direct Ethernet connection. Note that disabling cloud management may not be possible on some modern mesh-based routers
**Manage Range Correctly** | Optional | It's common to want to pump your routers range to the max, and often this is necessary, especially if you live in a large house, or desire coverage in outdoor spaces. But if you reside in a smaller flat, and have neighbors close by, your attack surface is increased when your WiFi network can be picked up across the street. It maybe worth carefully configuring your networks, and device antennas to provide coverage only within your operating area/ apartment. One method of doing so, it to utilize the 5-GHz band, which provides a faster link speed, but a lesser range, and is easily blocked by thick walls
**Route all traffic through Tor** | Advanced | VPNs have their weaknesses- you are simply moving your trust from your ISP/ mobile carrier to a VPN provider- Tor is much more anonymous. For optimum security, route all your internet traffic through the Tor network. On Linux you can use [TorSocks](https://gitweb.torproject.org/torsocks.git) or [Privoxy](https://www.privoxy.org/), for Windows you can use [Whonix](https://www.whonix.org/), and on OSX [follow thsese instructions](https://maymay.net/blog/2013/02/20/howto-use-tor-for-all-network-traffic-by-default-on-mac-os-x/), for Kali see [TorGhost](https://github.com/SusmithKrishnan/torghost). Alternativley, you can use [OnionPi](https://learn.adafruit.com/onion-pi/overview) to use Tor for all your connected devices, by [configuring a Raspberry Pi to be a Tor Hotspot](https://lifehacker.com/how-to-anonymize-your-browsing-with-a-tor-powered-raspb-1793869805)
**Disable WiFi on all Devices** | Advanced | Connecting to even a secure WiFi network increases your attack surface. Disabling your home WiFi and connect each device via Ethernet, and turning off WiFi on your phone and using a USB-C/ Lightening to Ethernet cable will protect against WiFi exploits, as Edward Snowden [says here](https://twitter.com/snowden/status/1175431946958233600?lang=en).
**Recommended Software**
- [Virtual Private Networks](/5_Privacy_Respecting_Software.md#virtual-private-networks)
- [Mix Networks](/5_Privacy_Respecting_Software.md#mix-networks)
- [Router Firmware](/5_Privacy_Respecting_Software.md#router-firmware)
- [Open Source Proxies](/5_Privacy_Respecting_Software.md#proxies)
- [DNS Providers](/5_Privacy_Respecting_Software.md#dns)
- [Firewalls](/5_Privacy_Respecting_Software.md#firewalls)
- [Network Analysis Tools](/5_Privacy_Respecting_Software.md#network-analysis)
- [Self-Hosted Network Security Tools](#self-hosted-network-security)
## Mobile Devices
Smart phones have revolutionized so many aspects of life and brought the world to our fingertips. For many of us, smart phones are our primary means of communication, entertainment and access to knowledge. But while they've brought convenience to whole new level, there's some ugly things going on behind the screen.
Geo-tracking is used to trace our every move, and we have little control over who has this data- your phone is even able to [track your location without GPS](https://gizmodo.com/how-to-track-a-cellphone-without-gps-or-consent-1821125371). Over the years numerous reports that surfaced, outlining ways in which your phone's [mic can eavesdrop](https://www.independent.co.uk/life-style/gadgets-and-tech/news/smartphone-apps-listening-privacy-alphonso-shazam-advertising-pool-3d-honey-quest-a8139451.html), and the [camera can watch you](https://www.businessinsider.com/hackers-governments-smartphone-iphone-camera-wikileaks-cybersecurity-hack-privacy-webcam-2017-6)- all without your knowledge or consent. And then there's the malicious apps, lack of security patches and potential/ likely backdoors.
Using a smart phone generates a lot of data about you- from information you intentionally share, to data silently generated from your actions. It can be scary to see what Google, Microsoft, Apple and Facebook know about us- sometimes they know more than our closest family. It's hard to comprehend what your data will reveal, especially in conjunction with other data.
This data is used for [far more than just advertising](https://internethealthreport.org/2018/the-good-the-bad-and-the-ugly-sides-of-data-tracking/) - more often it's used to rate people for finance, insurance and employment. Targeted ads can even be used for fine-grained surveillance (see [ADINT](https://adint.cs.washington.edu))
More of us are concerned about how [governments use collect and use our smart phone data](https://www.statista.com/statistics/373916/global-opinion-online-monitoring-government/), and rightly so, federal agencies often [request our data from Google](https://www.statista.com/statistics/273501/global-data-requests-from-google-by-federal-agencies-and-governments/), [Facebook](https://www.statista.com/statistics/287845/global-data-requests-from-facebook-by-federal-agencies-and-governments/), Apple, Microsoft, Amazon, and other tech companies. Sometimes requests are made in bulk, returning detailed information on everybody within a certain geo-fence, [often for innocent people](https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html). And this doesn't include all of the internet traffic that intelligence agencies around the world have unhindered access to.
**Security** | **Priority** | **Details and Hints**
--- | --- | ---
**Encrypt your Device** | Recommended | In order to keep your data safe from physical access, use file encryption. To enable, for Android: `Settings --> Security --> Encryption`, or for iOS: `Settings --> TouchID & Passcode --> Data Protection`. This will mean if your device is lost or stolen, no one will have access to your data
**Turn off connectivity features that aren’t being used** | Recommended | When you're not using WiFi, Bluetooth, NFC etc, turn those features off. There are several common threats that utilise these features
**Keep app count to a minimum** | Recommended | Uninstall apps that you don’t need or use regularly. As apps often run in the background, slowing your device down, but also collecting data.
**App Permissions** | Recommended | Don’t grant apps permissions that they don’t need. For Android, [Bouncer](https://play.google.com/store/apps/details?id=com.samruston.permission) is an app that allows you you to grant temporary/ 1-off permissions.
**Only install Apps from official source** | Recommended | Applications on Apple App Store and Google Play Store are scanned and cryptographically signed, making them less likely to be malicious. Avoid downloading .apk or .ipa files from unverified source, unless you know it is safe. Also check the reviews, and app info before downloading a new application.
**Be Careful of Phone Charging Threats** | Optional | [Juice Jacking](https://www.fcc.gov/juice-jacking-dangers-public-usb-charging-stations) is when hackers use public charging stations to install malware on your smartphone or tablet through a compromised USB port. You can mitigate this, either by using a power bank or AC wall charger, or by using a simple data blocker device (See [USB Condom](https://shop.syncstop.com/products/usb-condom?variant=35430087052) or [PortaPow Blocker](http://portablepowersupplies.co.uk/))
**Set up a mobile carrier PIN** | Recommended | [SIM hijacking](https://securelist.com/large-scale-sim-swap-fraud/90353/) is when a hacker is able to get your mobile number transferred to their sim (often through social engineering your mobile carrier). This then allows them to receive 2FA SMS codes (enabling them to access your secure accounts, such as banking), or to pose as you. The easiest way to protect against this is to set up a PIN through your mobile provider, thus disallowing anyone without this PIN to make any changes to your account. Using a non-SMS based 2FA method will reduce the damage, [Read more](https://us.norton.com/internetsecurity-mobile-sim-swap-fraud.html) about the sim swap scam.
**Opt-out of Caller ID Listings** | Optional | When one of your friends or colleagues has your number in their contacts, and also has a caller ID app, then your Name, Phone Number and any other saved contact details will be uploaded. To keep your details private, you can unlist it here: [TrueCaller](https://www.truecaller.com/unlisting), [CallApp](https://callapp.com/how-to/unlist-phone-number), [SyncMe](https://sync.me/optout), [cia-app](https://cia-app.com/self-service/delist-number), [Hiya](https://hiyahelp.zendesk.com/hc/en-us/requests/new?ticket_form_id=824667). Note that it is possible to opt-out, even before your number has been added, and this will prevent your details being uploaded in the future.
**Opt-out of personalized ads** | Optional | In order for ads to be personalized, Google collects data about you, you can slightly reduce the amount they collect by opting-out of seeing personalized ads. See [this guide](https://www.androidguys.com/tips-tools/how-to-disable-personalized-ads-on-android/), for Android instructions.
**Erase after too many login attempts** | Optional | To protect against an attacker brute forcing your pin, if you lose your phone, set your device to erase after too many failed login attempts. See [this iPhone guide](https://www.howtogeek.com/264369/how-to-erase-your-ios-device-after-too-many-failed-passcode-attempts/). You can also do this via Find my Phone, but this increased security comes at a cost of decreased privacy.
**Monitor Trackers** | Optional | A tracker is a piece of software meant to collect data about you or your usages. [εxodus](https://reports.exodus-privacy.eu.org/en/) is a great service which lets you search for any app, by its name, and see which trackers are embedded in it. They also have [an app](https://play.google.com/store/apps/details?id=org.eu.exodus_privacy.exodusprivacy) which shows trackers and permissions for all your installed apps.
**Use a Mobile Firewall** | Optional | To prevent applications from leaking privacy-sensitive data, you can install a firewall app. This will allow you to block specific apps from making data requests, either in the background, or when on WiFi or mobile data. Consider [NetGuard](https://www.netguard.me/) (Android) or [LockDown](https://apps.apple.com/us/app/lockdown-apps/id1469783711) (iOS), or see more [Firewalls](/5_Privacy_Respecting_Software.md#firewalls)
**Reduce Background Activity** | Optional | For Android, [SuperFreeze](https://f-droid.org/en/packages/superfreeze.tool.android) makes it possible to entirely freeze all background activities on a per-app basis. Intended purpose is to speed up your phone, and prolong battery life, but this app is also a great utility to stop certain apps from collecting data and tracking your actions while running in the background
**Sandbox Mobile Apps** | Optional | Prevent permission-hungry apps from accessing your private data with [Island](https://play.google.com/store/apps/details?id=com.oasisfeng.island). It is a sandbox environment to clone selected apps and isolate them from accessing your personal data outside the sandbox (including call logs, contacts, photos and etc.) even if related permissions are granted
**Tor Traffic** | Advanced | [Orbot](https://guardianproject.info/apps/orbot/) provides a system-wide [Tor](https://www.torproject.org/) connection, which will help protect you from surveillance and public WiFi threats
**Avoid Custom Virtual Keyboards** | Optional | Android and iOS allow you to download and use third-party keyboard apps. These apps will be able to access everything that you type on your phone/ tablet: passwords, messages, search terms etc. It is recommended to stick with your devices stock keyboard. If you choose to use one of these apps, ensure it is reputable, block internet access (can be done with a [firewall app](/5_Privacy_Respecting_Software.md#firewalls)), don't grant it permissions it does not need, and turn off analytics or other invasive features in it's settings. [This article](https://zeltser.com/third-party-keyboards-security) by Lenny Zelster explains things further
**Restart Device Regularly** | Optional | Over the years there have vulnerabilities relating to memory exploits (such as [CVE-2015-6639](https://www.cvedetails.com/cve/CVE-2015-6639) + [CVE-2016-2431](https://www.cvedetails.com/cve/CVE-2016-2431)). Restarting your phone at least once a week will clear the app state cached in memory. A side benefit is that your device may run more smoothly after a restart.
**Avoid SMS** | Optional | SMS may be convenient, but it's [not particularly secure](https://www.fortherecordmag.com/archives/0315p25.shtml). It is susceptible to threats, such as interception, sim swapping (see [this article](https://www.forbes.com/sites/kateoflahertyuk/2020/01/21/the-surprising-truth-about-sms-security)), manipulation and malware (see [this article](https://www.securitynewspaper.com/2019/09/13/hack-any-mobile-phone-with-just-a-sms)). <br>SMS should not be used to receive 2FA codes, (as demonstrated in the video in [this article](https://www.theverge.com/2017/9/18/16328172/sms-two-factor-authentication-hack-password-bitcoin)), instead use an [authenticator app](/5_Privacy_Respecting_Software.md#2-factor-authentication). SMS should not be used for communication, instead use an [encrypted messaging app](/5_Privacy_Respecting_Software.md#encrypted-messaging), such as [Signal](https://signal.org)
**Keep your Number Private** | Optional | [MySudo](https://mysudo.com/) allows you to create and use virtual phone numbers for different people or groups. This is great for compartmentalisation. Alternativley, use a VOIP provider like [Google Voice](https://voice.google.com) or [Skype](https://www.skype.com/en/features/online-number/), or for temporary usage you can use a service like [iNumbr](https://www.inumbr.com). Where possible, avoid giving out your real phone number while creating accounts online.
**Watch out for Stalkerware** | Optional | This is a malware that is installed directly onto your device by someone you know (partner, parent, boss etc.). It allows them to see your location, messages and other app data remotely. The app likely won't show up in your app draw, (but may visible in `Settings --> Applications --> View All`). Sometimes they can be disguised as a non-conspicuous app (such as a game, flashlight or calculator) which initially don't appear suspicious at all. Look out for unusual battery usage, network requests or high device temperature. If you suspect that stalkerware is on your device, the best way to get rid of it is through a factory reset. See [this guide](https://blog.malwarebytes.com/stalkerware/2019/10/how-to-protect-against-stalkerware-a-murky-but-dangerous-mobile-threat/) for more details
**Favor the Browser, over Dedicated App** | Optional | Where possible, consider using a secure browser to access sites, rather than installing dedicatd applications. Both Android and iOS applications often have invasive permissions, allowing them intimate access to sensitive data and your devices sensors and radios. But [the extent to what these apps can access](https://www.wired.com/story/app-permissions/) is often not clear, and even [zero-permission apps](https://www.leviathansecurity.com/blog/zero-permission-android-applications) can see more data than you think: accessing phone sensors, vendor ID's and determine which other apps you have installed. All this is enough to identity you. In some situations you can still use a service, without having to install an application, through accessing it via the browser, and this can help mitigate a lot of the issues cause by untrustworthy apps
**Consider running a custom ROM (Android)** | Advanced | For Android users, if your concerned about your device manufacturer collecting too much personal information, consider a privacy-focused custom ROM, such as [Lineage](https://lineageos.org) or [GrapheneOS](https://grapheneos.org) - [see more](/5_Privacy_Respecting_Software.md#mobile-operating-systems)
**Recommended Software**
- [Mobile Apps, for Security + Privacy](/5_Privacy_Respecting_Software.md#mobile-apps)
- [Encrypted Messaging](/5_Privacy_Respecting_Software.md#encrypted-messaging)
- [Mobile Operation Systems](/5_Privacy_Respecting_Software.md#mobile-operating-systems)
## Personal Computers
Although Windows and OS X are easy to use and convenient, they both are far from secure. Your OS provides the interface between hardware and your applications, so if compromised can have detrimental effects.
**Security** | **Priority** | **Details and Hints**
--- | --- | ---
**Keep your System up-to-date** | Recommended | New vulnerabilities are constantly being discovered. System updates contain fixes/ patches for these security issues, as well as improve performance and sometimes add new features. You should install new updates when prompted, to avoid any critical issues on your system from being exploited
**Encrypt your Device** | Recommended | If your computer is stolen, seized or falls into the wrong hands, without full disk encryption anyone is able to access all of your data, without a password (by booting to a live USB or removing the hard drive). You can enable encryption very easily, using [BitLocker](https://support.microsoft.com/en-us/help/4028713/windows-10-turn-on-device-encryption) for Windows, [FileVault](https://support.apple.com/en-us/HT204837) on MacOS, or by enabling [LUKS](https://en.wikipedia.org/wiki/Linux_Unified_Key_Setup) on Linux, during install. Or using an open source, program, such as [VeraCrypt](https://www.veracrypt.fr/en/Home.html) or [DiskCryptor](https://www.diskcryptor.org/). For encrypting cloud files, consider [Cryptomator](https://cryptomator.org/) or [CryFS](https://www.cryfs.org/). Note that you should select a long and strong password, and keep it somewhere safe, as there is no way to recover your password if you loose it
**Backup Important Data** | Recommended | Maintaining a copy of important data will prevent loss in the case of ransomware, theft or damage to your system. You should encrypt these backups, to keep the data safe. One solution would be to use [Cryptomator](https://cryptomator.org/) to encrypt files, and then sync them to a regular cloud storage provider. Or you could have a USB drive, with an encrypted volume (e.g. using [VeraCrypt](https://www.veracrypt.fr/en/Home.html)). The best backup solution, should include 2 additional copies of your data- such as a physical off-site copy, and a cloud copy of your data
**Be Careful Plugging USB Devices into your Computer** | Recommended | Think before inserting a USB device into your PC, as there are many threats that come in the form of a USB device. Something like a [USB Killer](https://usbkill.com/products/usb-killer-v3) will destroy your computer, by rapidly charging and discharging capacitors. A Bad USB (such as [Malduino](https://malduino.com/) or [Rubber Ducky](https://shop.hak5.org/products/usb-rubber-ducky-deluxe)), will act as a keyboard, once plugged in, it will proceed to rapidly type commands at lighning speed, often with severe consequences. There's also remote access tools (such as the [OMG Cable](https://hackaday.com/tag/omg-cable/) or [P4wnP1_aloa](https://github.com/RoganDawes/P4wnP1_aloa)), giving a hacker full remote access to your PC, even after the device has been removed. And of course, there's traditional USB drives, that contain malware that infect your device once inserted. <br>One solution to this, is to make a USB sanitizer, using [CIRCLean](https://www.circl.lu/projects/CIRCLean/) on a Raspberry Pi. It allows you to plug an obtained USB device into the Pi, and it'll convert the untrusted documents into a readable but disarmed format, and save them on a new USB key, which you can then safely insert into your computer
**Activate Screen-Lock when Idle** | Recommended | Get in the habit of locking your computer, whenever you step away from it. Reduce the amount of time that your computer is idle for, before the screensaver activates, and ensure that it will lock when the mouse is moved, so no one can access your data, when you step away from your desk. In Windows, check `Personalization --> Screensaver --> On resume, display login screen`, and in MacOS, check `Security & Privacy --> General --> Require password immediately after screensaver starts`. In Linux, `Brightness & Lock --> Require my password when waking up from suspend`. Better still, never leave your computer unattended, even in trusted environments
**Disable Cortana or Siri** | Recommended | Using a voice-controlled assistant, sends commands back to Microsoft or Apple as well as data about your files for local search, which have some [serious privacy implications](https://www.theatlantic.com/technology/archive/2016/05/the-privacy-problem-with-digital-assistants/483950/). They're always listening, waiting for the trigger word, and this can lead to parts of conversations being accidentally recorded. To disable this, in Windows, navigate to `Settings --> Cortana` and switch it to `Off`. You should also stop your speech, typing and handwriting patterns being sent to Microsoft, since this can be used to identify you, as well as potentially leaking sensitive data - navigate to `Settings --> Privacy --> Speech, Inking, & Typing`, and click `Turn off`. In Mac it's not easy to fully disable Siri, but you can stop it from always listening, go to `System Preferences --> Siri`, and uncheck `Enable Siri`
**Review your Installed Apps** | Recommended | It’s good practice to keep installed applications to a minimum. Not only does this keep your machine lean, it also reduces your exposure to vulnerabilities. You should also clear application cache's regularly. As well as looking through your application list manually, there are also tools that make this easier, such as [BleachBit](https://www.bleachbit.org/)
**Manage Permissions** | Recommended | In a similar way to phones, your OS can grant certain permissions to applications. It's important to keep control over which apps and services have access to your location, camera, microphone, contacts, calendar and other account information. Some systems let you restrict which apps can send or recieve messages, as well as which apps can which processes can control radios such as Bluetooth and WiFi. In Windows, navigate to `Settings --> Privacy`, and for MacOS, go to `System Preferences --> Security & Privacy --> Privacy`. <br>Note that there are other methods that apps can use to access this data, and this is just one step towards protecting it. You should check back regularly, as sometimes system updates can cause some privacy settings to be modified or reverted
**Disallow Usage Data from being sent to the Cloud** | Recommended | Both Windows and MacOS collect usage information or feedback, which is send to the cloud for analytics, diagnostics and research. Although this data should be anonymized, it can often be linked back to your identity when compared with other usage data. In Windows, there is no way to disable this fully, but you can limit it- navigate to `Settings --> Privacy --> Feedback & diagnostics`, and select `Basic`. You also have the option to disallow your advertising ID from being shared with apps on your system. In MacOS, it can be turned off fully, go to `System Preferences --> Privacy --> Diagnostics & Usage`, and untick both options
**Avoid Quick Unlock** | Recommended | Use a password to unlock your computer, ensure it is long and strong. Avoid biometrics such as facial recognition and fingerprint. These can be spoofed, allowing an intruder access to your account. Also, for Windows devices, avoid using a short PIN to unlock your machine.
**Power Off Computer, instead of Standby** | Recommended | You must shut down your device when not in use, in order for the disk to be encrypted. Leaving it in standby/ sleep mode keeps your data in an unencrypted state, and vulnerable to theft. Microsoft even recommends [disabling the sleep functionality](https://docs.microsoft.com/en-us/windows/security/information-protection/bitlocker/bitlocker-security-faq#what-are-the-implications-of-using-the-sleep-or-hibernate-power-management-options) all together, once BitLocker is enabled. This only applies to encrypted disks, and is true for FileVault (MacOS), BitLocker (Windows), VeraCrypt, Self-Encrypting Drives and most other disk encryption methods. Another reason to shut down, is because the machine is completely offline while it is off, and cannot be hacked remotely. It also can't communicate with a command and control server, if it has already been infected with an exploit
**Don't link your PC with your Microsoft or Apple Account** | Optional | Create a local account only. This will prevent some data about your usage being uploaded and synced between devices. Avoid syncing your iPhone or Android device to your computer, as this will automatically lead to it being associated with your Apple, Microsoft or Google account. <br>If sync is important to you, there are open source services that encrypt you data, and sync between devices. For example [XBrowserSync](https://www.xbrowsersync.org/) for bookmarks, history and browser data, [ETESync](https://www.etesync.com/accounts/signup/?referrer=QK6g) for calendar, contacts and tasks, [Syncthing](https://syncthing.net/) for files, folders and filesystems
**Check which Sharing Services are Enabled** | Optional | The ability to share files and services with other machines within your network, can be useful, but also acts as a gateway for common threats. You should disable the network sharing features that you are not using. For Windows, navigate to `Control Panel --> Network and Internet --> Network and Sharing Center --> Advanced sharing settings`, and for MacOS, just go to `System Preferences --> Sharing` and disable anything that you do not need. For Windows users, you should ensure that [remote desktop is disabled](https://www.laptopmag.com/articles/disable-remote-desktop). And also control apps’ ability to sync with non-pairing devices, such as beacons that transmit advertising information- this is also in the privacy settings
**Don't use Root/ Admin Account for Non-Admin Tasks** | Optional | You should not use administrator / root account for general use. Instead, use an unprivileged user account, and temporarily elevate permissions when you need to make administrator changes. This will [mitigate a large proportion of vulnerabilities](https://www.ghacks.net/2017/02/23/non-admin-accounts-mitigate-94-of-critical-windows-vulnerabilities/), because a malicious program or an attacker can do significantly less damage without an administrator power. See [this guide for Windows and MacOS](https://www.maketecheasier.com/why-you-shouldnt-use-admin-account/), on how to implement this. You should also ensure that a password is required for all system wide changes, as this helps protect against malware doing widespread damage. In Windows this is enabled by default, in MacOS, navigate to `System Preferences --> Security & Privacy --> General --> Advanced`
**Block Webcam + Microphone** | Optional | To prevent the potential risk of [being watched](https://opendatasecurity.io/hackers-can-watch-you-via-your-webcam/) through your webcam, consider covering it with a sticker, slider or electrical tape, while it's not being used. There are also application solutions- such as [Oversight](https://objective-see.com/products/oversight.html) (MacOS) or [CamWings](https://schiffer.tech/camwings.html) (Windows) - for ultimate protection, consider physically [removing the webcam](https://www.wired.com/story/remove-the-mic-from-your-phone/) all together. Blocking unauthorized audio recording, can be done with a [mic block](https://mic-lock.com/), which works by disabling the primary sound input source- but is not fool proof
**Use a Privacy Filter** | Optional | A lot of information can be gleaned just from glancing at someones screen over their shoulder. When working in a public space (train, coffee shop, share office), use a [screen privacy filter](https://www.3m.com/3M/en_US/company-us/all-3m-products/~/All-3M-Products/Privacy-Screen-Protectors/Privacy-Products/Black-Privacy/?N=5002385+8710873+8711017+8725317+8725356+8725359+3294857497). This will allow you to see the content of your screen when looking straight on, but for anyone looking at a slight angle, your screen will appear black.
**Physically Secure Device** | Optional | When working from a laptop think about using a [Kensington Lock](https://www.kensington.com/solutions/product-category/security/) to secure your device to a permanent fixture. To help protect against an opportunistic local attack, consider utilizing [port locks](https://lindy.com/en/technology/port-blockers/), to prevent or slow down an intruder from dropping a malicious payload onto your device. Ideally never leave your laptop or other devices unattended
**Don't Charge Devices from your PC** | Optional | Connecting your smart phone to a computer can be a security risk, it's possible for [a self-signed malicious app](https://www.pcworld.com/article/2465320/the-biggest-iphone-security-risk-could-be-connecting-one-to-a-computer.html) to be installed, without your knowledge. Also both iPhone or Android device have sync capabilities, which can lead to data being unintentionally shared. If you need to charge your device, consider using a [USB data-blocker](/6_Privacy_and-Security_Gadgets.md#usb-data-blockers).
**Randomize your hardware address on Wi-Fi** | Optional | A [MAC Address](https://en.wikipedia.org/wiki/MAC_address) is an identifier given to a device (specifically the Network Interface Controller), and is is one method used to identify, and track you across different WiFi networks. Some devices allow you to modify or randomize how this address appears. See how, on [Windows](https://support.microsoft.com/en-us/help/4027925/windows-how-and-why-to-use-random-hardware-addresses), [MacOS](https://poweruser.blog/how-to-spoof-the-wifi-mac-address-on-a-macbook-25e11594a932) and [Linux](https://itsfoss.com/change-mac-address-linux/). <br>You should also disallow you device from automatically connect to open Wi-Fi networks
**Use a Firewall** | Optional | A firewall is a program which monitors incoming and outgoing traffic, and allows you to blocks internet access for certain applications. This is useful to stop apps from collecting data, calling home, or downloading unnecessary content- correctly configured, firewalls can help protect against remote access attacks, as well as protect your privacy. <br>Your system will have a built-in firewall (Check it's enabled: [Windows](https://support.microsoft.com/en-us/help/4028544/windows-10-turn-windows-defender-firewall-on-or-off), [Mac OS](https://support.apple.com/en-us/HT201642), [Ubuntu](https://wiki.ubuntu.com/UncomplicatedFirewall) and other [Linux ditros](https://www.tecmint.com/start-stop-disable-enable-firewalld-iptables-firewall)). Alternatively, for greater control, consider: [LuLu](https://objective-see.com/products/lulu.html) (MacOS), [gufw](http://gufw.org/) (Linux), [LittleSnitch](https://github.com/evilsocket/opensnitch), [SimpleWall](https://github.com/henrypp/simplewall) (Windows), there's plenty more [firewall apps](/5_Privacy_Respecting_Software.md#firewalls) available
**Protect Against Software Keyloggers** | Optional | A software keylogger is a malicious application running in the background that logs (and usually relays to a server) every key you press, aka all data that you type (passwords, emails, search terms, financial details etc). The best way to stay protected, is to keep your systems security settings enabled, and periodically check for rootkits- which will detect most loggers. Another option, is to use a key stroke encryption tool. For Windows there is [GhostPress](https://schiffer.tech/ghostpress.html), [Spy Shelter](https://www.spyshelter.com/) or [KeyScrambler](https://www.qfxsoftware.com) (developed by Qian Wang) which encrypt your keystrokes at the keyboard driver level, and then decrypting them at the application level, meaning any software keylogger would just receive encrypted data.
**Check Keyboard Connection** | Optional | Check your keyboards USB cable before using, bring your own keyboard to work and watch out for sighs that it may have been tampered with. A hardware keylogger is a physical device that either sits between your keyboard and the USB connection into your PC, or is implanted into a keyboard. It intercepts and stores keystrokes, and in some cases can remotely upload them. Unlike a software logger, they can not be detected from your PC, but also they can not intercept data from virtual keyboards (like [OSK](https://support.microsoft.com/en-us/help/10762/windows-use-on-screen-keyboard)), clipboard or auto-fill password managers.
**Prevent Keystroke Injection Attacks** | Optional | Always lock your PC when you step away from it (however this is not fool-proof, and [can be circumvented](https://www.youtube.com/watch?v=a4OyqaqFDW0)). For Linux, there is [USBGuard](https://github.com/USBGuard/usbguard), and for Windows there's [DuckHunt](https://github.com/pmsosa/duckhunt), which will detect super fast (badUSB-level super-fast) it will block input until the attack stops. Alternatively, Windows Group Policy can also be [configured to not trust new devices by default](https://www.itechtics.com/enable-gpedit-windows-10-home/). [Port Blockers](https://lindy.com/en/technology/port-blockers/) provide some level of physical protection, which may prevent an opportunistic attack, but can be circumvented fairly easily
**Don't use Free Anti-Virus** | Optional | The included security tools, which come with bundled your operating system (such as Windows Defender), should be adequate at protecting against threats. Free anti-virus applications are often more of a hinder than a help- as they require admin permissions, full access to all data and settings, and internet access. They usually collect a lot of data, which is uploaded to the cloud and sometimes [sold to third-parties](https://www.forbes.com/sites/thomasbrewster/2019/12/09/are-you-one-of-avasts-400-million-users-this-is-why-it-collects-and-sells-your-web-habits/). Therefore, you should avoid programs such as Avast, AVG, Norton, Kasperky, Avira etc- even the paid plans come with privacy concerns. If you need a dedicated anti-virus application, consider [CalmAV](https://www.clamav.net/), which is open source. And for scanning 1-off files, [VirusTotal](https://www.virustotal.com/) is a useful tool
**Periodically check for Rootkits** | Advanced | You should regularly check for rootkits (which may allow an attacker full control over your system), you can do this with a tool like [chkrootkit](http://www.chkrootkit.org/), once installed just run `sudo chkrootkit`. For Windows users, see [rootkit-revealer](https://docs.microsoft.com/en-us/sysinternals/downloads/rootkit-revealer) or [gmer](http://www.gmer.net/)
**BIOS Boot Password** | Advanced | A BIOS or UEFI password once enabled, will need to be entered before the system can be booted, which may help to prevent an inexperienced hacker from getting into your OS, booting from a USB, tampering with BIOS as well as other actions. However, it can be easy to bypass, don't put too much trust in this - it should only be used as an additional step, to exhaust your adversaries resources a little faster. [Here is a guide on how to enable password](https://www.howtogeek.com/186235/how-to-secure-your-computer-with-a-bios-or-uefi-password/).
**Use a Security-Focused Operating System** | Advanced | Microsoft, Apple and Google all have practices that violate users privacy, switching to Linux will mitigate most of these issues. For more advanced users, consider a security-focused distro- such as [QubeOS](https://www.qubes-os.org/), which allows for compartmentalization of applications and data, and has strong encryption and Tor networking build in. For some actions, [Tails](https://tails.boum.org/) a live operating system with no memory persistence is as close as you can get to not leaving a data trail on your system. BSD is also great for security, see [FreeBSD](https://www.freebsd.org/) and [OpenBSD](https://www.openbsd.org/). Even a general purpose distro, will be much better for privacy compared to a propriety counterpart: [Fedora](https://getfedora.org/), [Debian](https://www.debian.org/), [Arch](https://www.archlinux.org/) / [Manjaro](https://manjaro.org/), [see more](/5_Privacy_Respecting_Software.md#pc-operating-systems)
**Make Use of VMs** | Advanced | If your job, or any of your activity could endanger your system, or put you at risk, then virtual machines are a great tool to isolate this from your primary system. They allow you to test suspicious software, and analyse potentially dangerous files, while keeping your host system safe. They also provide a host of other features, from quick recovery using snapshots, to the ability to replicate configurations easily, and have multiple VMs running simultaneously. Taking this a step further, VMs can be use for compartmentalization, with a host system performing the single task of spawning VMs (systems like [ProxMox](https://www.proxmox.com/en/), is designed for exactly this). Be aware that virtual machines do not grantee security, and vulnerabilities, named [VM-Escapes](https://en.wikipedia.org/wiki/Virtual_machine_escape), may allow for data in memory to leak into the host system
**Compartmentalize** | Advanced | Security by [Compartmentalization](https://en.wikipedia.org/wiki/Compartmentalization_(information_security)) is a strategy, where you isolate different programs and data sources from one another as much as possible. That way, attackers who gain access to one part of the system are not able to compromise all of the user’s privacy, and corporate tracking or government surveillance shouldn't be able to link together different compartments. At the simplest level, you could use separate browsers or [multi-account containers](https://support.mozilla.org/en-US/kb/containers) for different activities, but taking it further you could have a virtual machine for each category (such as work, shopping, social etc). Alternativley, consider [Qubes OS](https://www.qubes-os.org), which is designed for exactly this, and sandboxes each app in it's own Xen Hypervisor VM, while still providing great user experience
**Disable Undesired Features (Windows)** | Advanced | Microsoft Windows 10 is far from lean, and comes with many bundles "features" that run in the background, collecting data and using resources. Consider disabling are: Windows Script Host, AutoRun + AutoPlay, powershell.exe and cmd.exe execution via Windows Explorer, and the execution of commonly abused file extensions. In MS Office, consider disabling Office Macros, OLE object execution, ActiveX, DDE and Excel Links. There are tools that may make these fixes, and more easier, such as [HardenTools](https://github.com/securitywithoutborders/hardentools), or [ShutUp10](https://www.oo-software.com/en/shutup10). Note: This should only be done if you are competent Windows user, as modifying the registry can cause issues
**Secure Boot** | Advanced | For Windows users, ensure that [Secure Boot](https://docs.microsoft.com/en-us/windows-hardware/design/device-experiences/oem-secure-boot) is enabled. This security standard, ensures that your device boots only to trusted software when the PC starts. It prevents malware, such as a rootkit from maliciously replacing your boot loader, which could have serious consequences. Some Linux distros also work with secure boot (if they've applied to have their boot loaders signed by Microsoft), while others are incompatible (in which case, secure boot will need to be disabled)
**Secure SSH Access** | Advanced | If you access your system remotely, via SSH you should take steps to protect it from automated and targeted attacks. Change the port away from 22, use SSH keys to authenticate, disallow root login with a password and consider using a firewall, and only allow certain IPs to gain SSH access, consider using a Virtual Private Cloud as a gateway. Carry out regular service audits, to discover the services running on your system. For more info, see [this guide, on OpenSSH security tweeks](https://www.cyberciti.biz/tips/linux-unix-bsd-openssh-server-best-practices.html)
**Close Un-used Open Ports** | Advanced | Some daemons listen on external ports, if they are not needed, then they are [exposed to exploits](https://www.acunetix.com/blog/articles/danger-open-ports-trojan-trojan/). Turning off these listening services will protect against some remote exploits, and may also improve boot time. To check for listening services, just run `netstat -lt`
**Implement Mandatory Access Control** | Advanced | Restricting privileged access enables users to define rules, that limit how applications can run, or affect other processes and files. This means, that if a vulnerability is exploited, or your system is compromised, the damage will be limited. There are many options available, such as [Rule Set Based Access Control](https://www.rsbac.org/), [AppArmor](https://gitlab.com/apparmor) or [SELinux](https://github.com/SELinuxProject)
**Use Canary Tokens** | Advanced | Breaches happen, but the longer it takes for you to find out about it, the more damage is done. A [canary trap](https://en.wikipedia.org/wiki/Canary_trap) can help you know that someone's gained access to your files or emails much faster, and gain a bit of inform about the incident. A canary token is a file, email, note or webpage that's like a little hacker honeypot, something that looks appealing to them once they've gained access to your system. When they open the file, unknowingly to them, a script is run which will not only alert you of the breach, but also grab some of the intruders system details. These have been used to catch Dropbox employees opening users files, and Yahoo Mail employees reading emails. <br>[CanaryTokens.org](https://canarytokens.org/generate) and [BlueCloudDrive](https://blueclouddrive.com/generate) are excellent sites, that you can use to generate your tokens. Then just leave them somewhere prominent on your system. [Learn more](https://blog.thinkst.com/p/canarytokensorg-quick-free-detection.html) about canary tokens, or see [this guide](https://resources.infosecinstitute.com/how-to-protect-files-with-canary-tokens/) for details on how to create them yourself.
**Recommended Software**
- [Secure Operating Systems](/5_Privacy_Respecting_Software.md#pc-operating-systems)
- [Linux Defenses](/5_Privacy_Respecting_Software.md#linux-defences)
- [Windows Defenses](/5_Privacy_Respecting_Software.md#windows-defences)
- [Mac OS Defenses](/5_Privacy_Respecting_Software.md#mac-os-defences)
- [Anti-Malware](/5_Privacy_Respecting_Software.md#anti-malware)
- [Firewalls](/5_Privacy_Respecting_Software.md#firewalls)
- [File Encryption](/5_Privacy_Respecting_Software.md#file-encryption)
## Smart Home
Home assistants (such as Google Home, Alexa and Siri) and other internet connected devices collect large amounts of personal data (including voice samples, location data, home details and logs of all interactions). Since you have limited control on what is being collected, how it's stored, and what it will be used for, this makes it hard to recommend any consumer smart-home products to anyone who cares about privacy and security.
Security vs Privacy: There are many smart devices on the market that claim to increase the security of your home while being easy and convenient to use (Such as Smart Burglar Alarms, Internet Security Cameras, Smart Locks and Remote access Doorbells to name a few). These devices may appear to make security easier, but there is a trade-off in terms of privacy: as they collect large amounts of personal data, and leave you without control over how this is stored or used. The security of these devices is also questionable, since many of them can be (and are being) hacked, allowing an intruder to bypass detection with minimum effort.
The most privacy-respecting option, would be to not use "smart" internet-connected devices in your home, and not to rely on a security device that requires an internet connection. But if you do, it is important to fully understand the risks of any given product, before buying it. Then adjust settings to increase privacy and security. The following checklist will help mitigate the risks associated with internet-connected home devices.
**Security** | **Priority** | **Details and Hints**
--- | --- | ---
**Rename devices to not specify brand/model** | Recommended | If your device name shows what brand or model it is, it will make it easier for a malicious actor launch an attack targeting a specific device. For example avoid names like "Nest Cam", "Yale Lock YRD 256" or "Hive Thermostat". It's usually easy to change the device's default name.
**Disable microphone and camera when not in use** | Recommended | Smart speakers and other voice controlled devices store sound clips on a server (and sometimes monitored by employees to improve the speech detection), any accidental recordings could disclose sensitive or personal data. A targeted attack could also allow someone to gain control of a microphone/ camera, so using the hardware switch to turn it off will help protect from that.
**Understand what data is collected, stored and transmitted** | Recommended | Before purchasing any smart home device, do some research - and ensure that you understand, and are comfortable with what is being collected and how it is stored and used. Don't buy devices that share anything with third parties, and check the data [breach]([https://www.dehashed.com/breach](https://www.dehashed.com/breach)) database.
**Set privacy settings, and opt out of sharing data with third parties** | Recommended | Once installed, go to settings in the app, and under privacy ensure the strictest options are selected. Usually by default, the most possible data is being collected.
**Don't link your smart home devices to your real identity** | Recommended | Use a unique user name and password which does not identify you, your family, your location or any other personal details. When creating an account for a new smart home device, do not sign up/log in with Facebook, Google or any other third-party service.
**Keep firmware up-to-date** | Recommended | Ensure firmware versions on smart devices are up-to-date and software patches have been applied. Most smart home apps will notify you when a new firmware version is available, so all you have to do it accept and install.
**Protect your Network** | Recommended | On many smart home devices, anybody connected to your home WiFi is able to view the device content (such as camera footages, or motion statistics). So ensure that your WiFi and home networks are properly secured with a strong password and up-to-date firmware. (See the [Router Section](#your-router) for more details)
**Be wary of wearables** | Optional | Wearable smart devices allow companies to log even more data than ever before; they can track your every move to know exactly where you are and what you are doing at any given time. Again, you as the consumer have no control over what is done with that data.
**Don't connect your home's critical infrastructure to the Internet** | Optional | While a smart thermostat, burglar alarm, smoke detector and other appliances may seem convenient, they by design can be accessed remotely, meaning a hacker can gain control of your entire home, without even needing to be nearby. And by breaching multiple devices, the effects can be very serious.
**Mitigate Alexa/ Google Home Risks** | Optional | It is a known fact that voice-activated assistants collect a lot of personal data, and open the door to a mirage of security issues. Consider switching to [Mycroft](https://mycroft.ai/) which is an open source alternative, with much better privacy. Alternativley, if you wish to continue using your current voice assistant, check out [Project Alias](https://github.com/bjoernkarmann/project_alias), which prevents idle listening
**Monitor your home network closely** | Optional | Check your local network for suspicious activity. One of the easier methods to do this is with [FingBox](https://amzn.to/38mdw8F), but you can also do it directly [through some routers](https://www.howtogeek.com/222740/how-to-the-monitor-the-bandwidth-and-data-usage-of-individual-devices-on-your-network/).
**Deny Internet access where possible** | Advanced | If possible deny the device/ app internet access, and use it only on your local network. You can configure a firewall to block certain devices from sending or receiving from the internet.
**Assess risks** | Advanced | Assess risks with your audience and data in mind: Be mindful of whose data is being collected, e.g. kids. Manage which devices can operate when (such as turning cameras off when you are at home, or disabling the internet for certain devices at specific times of day)
**Recommended Software**
- [Home Automation](/5_Privacy_Respecting_Software.md#home-automation)
- [AI Voice Assistants](/5_Privacy_Respecting_Software.md#ai-voice-assistants)
## Personal Finance
Credit card fraud is the most common form of identity theft (with [133,015 reports in the US in 2017 alone](https://www.experian.com/blogs/ask-experian/identity-theft-statistics/)), and a total loss of $905 million, which was a 26% increase from the previous year. The with a median amount lost per person was $429 in 2017. It's more important than ever to take basic steps to protect yourself from falling victim
Note about credit cards: Credit cards have technological methods in place to detect and stop some fraudulent transactions. Major payment processors implement this, by mining huge amounts of data from their card holders, in order to know a great deal about each persons spending habits. This data is used to identify fraud, but is also sold onto other data brokers. Credit cards are therefore good for security, but terrible for data privacy.
**Security** | **Priority** | **Details and Hints**
--- | --- | ---
**Sign up for Fraud Alerts and Credit Monitoring** | Recommended | A Fraud Alert is a note on your credit report, that asks any business seeking your credit report to contact you to confirm your identity before granting credit in your name. Credit Monitoring tracks your credit history, and will alert you to any suspicious activity. You can enable fraud alerts and credit monitoring through credit the bureau's websites: [Experian](https://www.experian.com/fraud/center.html), [TransUnion](https://www.transunion.com/fraud-alerts) or [Equifax](https://www.freeze.equifax.com/)
**Apply a Credit Freeze** | Recommended | A credit freeze will prevent anyone from requesting your credit report, hence stop someone applying for a financial product in your name, or a corporation requesting your details without your consent. You will need to temporarily disable your credit freeze before getting a loan, or any other financial product. You can freeze your credit through credit the bureau's website: [Experian](https://www.experian.com/freeze/center.html), [TransUnion](https://www.transunion.com/credit-freeze) and [Equifax](https://www.freeze.equifax.com/)
**Use Virtual Cards** | Optional | Virtual card numbers let you pay for items without revealing your real card or banking details. They also offer additional features, such as single-use cards and spending limits for each card. This means you will not be charged more than you specified, or ongoing subscriptions or in the case of a data breach. [Privacy.com](https://privacy.com/join/VW7WC), [MySudo](https://mysudo.com/) and [others](/5_Privacy_Respecting_Software.md#virtual-credit-cards) offer this service
**Use Cash for Local Transactions** | Optional | Unlike any digital payment method, cash is virtually untraceable. Using cash for local and everyday purchases will prevent any financial institution building up a comprehensive data profile based on your spending habits
**Use Cryptocurrency for Online Transactions** | Optional | Unlike card payments, most cryptocurrencies are not linked to your real identity. Many blockchains have a public record, of all transaction matadata, on a public, immutable ledger. So where possible, opt for a privacy-focused currency, such as [Monero](https://www.getmonero.org) or [ZCash](https://z.cash). If you are using a widley- supported currency (such as [Tether](https://tether.to/), [BitCoin](https://bitcoin.org/), [LiteCoin](https://litecoin.com/), [Ripple](https://ripple.com/xrp/), [Etherium](https://ethereum.org/en/) etc), take steps to [distance yourself from the transaction details](https://coinsutra.com/anonymous-bitcoin-transactions/). See more [privacy-respecting crypto currencies](/5_Privacy_Respecting_Software.md#cryptocurrencies).
**Store Crypto Securely** | Advanced | Generate wallet address offline, never let your private key touch the internet and preferably avoid storing it on an internet-connected device. Use a secure wallet, such as [Wasabi](https://www.wasabiwallet.io/), or a hardware wallet, like [Trezor](https://trezor.io/) or [ColdCard](https://coldcardwallet.com/). For long-term storage consider a paper wallet, or a more robust alternative, such as [CryptoSteel](https://cryptosteel.com/how-it-works)
**Buy Crypto Anonymously** | Advanced | If you are buying a common cryptocurrency (such as BitCoin), purchasing it from an exchange with your debit/ credit card, will link directly back to your real identity. Instead use a service like [LocalBitcoins](https://localbitcoins.com), an anonymous exchange, such as [Bisq](https://bisq.network), or buy from a local BitCoin ATM ([find one here](https://coinatmradar.com)). Avoid any exchange that implements [KYC](https://en.wikipedia.org/wiki/Know_your_customer)
**Tumble/ Mix Coins** | Advanced | Before converting BitCoin back to currency, consider using a [bitcoin mixer](https://en.bitcoin.it/wiki/Mixing_service), or [CoinJoin](https://en.bitcoin.it/wiki/CoinJoin) to make your transaction harder to trace. (Some wallets, such as [Wasabi](https://www.wasabiwallet.io/) support this nativley)
**Use an Alias Details for Online Shopping** | Advanced | When you pay for goods or services online, you do not know for sure who will have access to your data, or weather it will be stored securley. Consider using an alias name, [forwarding email address](/5_Privacy_Respecting_Software.md#anonymous-mail-forwarding)/ VOIP number, and don't reveal any of your true information. (For Amazon purchases, you can an Amazon gift card with cash, and use an Amazon Locker or local pickup location)
**Use alternate delivery address** | Advanced | When online shopping, if possible get goods delivered to an address that is not associated to you. For example, using a PO Box, forwarding address, corner-shop collection or pickup box
**Recommended Software**
- [Virtual Credit Cards](/5_Privacy_Respecting_Software.md#virtual-credit-cards)
- [Cryptocurrencies](/5_Privacy_Respecting_Software.md#cryptocurrencies)
- [Crypto Wallets](/5_Privacy_Respecting_Software.md#crypto-wallets)
- [Crypto Exchanges](/5_Privacy_Respecting_Software.md#crypto-exchanges)
- [Other Payment Methods](/5_Privacy_Respecting_Software.md#other-payment-methods)
- [Budgeting Tools](/5_Privacy_Respecting_Software.md#budgeting-tools)
## Sensible Computing
Many data breaches, hacks and attacks are caused by human error. The following list contains steps you should take, to reduce the risk of this happening to you. Many of them are common sense, but it's worth takin note of.
**Security** | **Priority** | **Details and Hints**
--- | --- | ---
**Verify Recipients** | Recommended | Emails are easy for an attacker to spoof, and unfortunately happens all too often. So whenever an email asks you to take a sensitive action, first verify that the sender is authentic, and when possible enter the URL yourself (rather than clicking a link in the message)
**Don’t Trust Your Popup Notifications** | Recommended | It is a trivial task for a malicious actor to deploy fake pop-ups, either on your PC, phone or browser. If you click a popup, ensure the URL is correct before entering any information
**Never Leave Device Unattended** | Recommended | Even with a strong password, it's straight-forward to retrieve the data from your phone or computer (unless it is encrypted). If you lose your device, and have find my phone enabled, then remotely erase it
**Prevent Camfecting** | Recommended | It is a good idea to invest in some webcam covers, and microphone blockers to protect against [*camfecting*](https://en.wikipedia.org/wiki/Camfecting), where a malicious actor, or app is able spy on you and your physical space, without your knowledge. See [this guide](https://blog.malwarebytes.com/hacking-2/2019/09/15000-webcams-vulnerable-how-to-protect-webcam-hacking/) for more tips. Mute home assistants, (Alexa, Google Home and Siri) when you are not using them, or at least when you are discussing anything sensitive or anything conversation involving personal details
**Stay protected from shoulder surfers** | Recommended | Be sure to not let anyone 'shoulder surf' (read what is on your screen, when in public space). As they may be able to gather sensitive information about you. You could apply a privacy screen to your [laptop](https://amzn.to/2H7pOX7) and [mobile](https://amzn.to/39oHWrA), in order to restrict data being read from an angle
**Educate yourself about phishing attacks** | Recommended | Phishing is an attempt to obtain sensitive information (like an account password) by disguising as a trustworthy person or company. In recent years phishing attacks have become increasingly sophisticated and hackers are learning to use data that people put on the web to create highly specific and targeted attacks. Check the URL before entering any information. Understand the context- were you expecting the email or message, does it feel normal? Employ general good security practices will also help: Use 2FA, don't reuse passwords, close accounts you no longer use and backup your data. See these guides on: [How to Protect against Common Phishing Attacks](https://www.tripwire.com/state-of-security/security-awareness/6-common-phishing-attacks-and-how-to-protect-against-them) and [The Anatomy of a Phishing Email](https://www.howtogeek.com/58642/online-security-breaking-down-the-anatomy-of-a-phishing-email/)
**Watch out for Stalkerware** | Recommended | This is a malware that is installed directly onto your device by someone you know (partner, parent, boss etc). It allows them to see your location, messages and other app data remotely. The app likely won't show up in your app draw, (but may visible in Settings --> Applications --> View All). Sometimes they can be disguised as a non-conspicuous app (such as a game, flashlight or calculator) which initially don't appear suspicious at all. Look out for unusual battery usage, network requests or high device temperature. If you suspect that stalker ware is on your device, the best way to get rid of it is through a factory reset
**Install Reputable Software from Trusted Sources** | Recommended | It may seem obvious, but so much of the malware many PC users encounter is often as a result of accidentally downloading and installing bad software. Also, some legitimate applications try to offer you slightly dodgy freeware (such as toolbars, anti-virus, and other utilities). Be sure to pay attention while completing the installation process. Only download software from legitimate sources (often this isn't the top result in Google) so it's important to double check before downloading. Before installing, check it in [Virus Total](https://www.virustotal.com), which scans installable files using multiple AV checkers
**Store personal data securely** | Recommended | Backing up important data is important. But ensure that all information that is stored on your phone/laptop, USB or in a cloud is encrypted. That way, if it is accessed by a hacker (which unfortunately is all too common), it will be almost impossible for them to get to your personal files. For USB devices, see [VeraCrypt](https://www.veracrypt.fr/en/Home.html). For cloud backup, see [Cryptomator](https://cryptomator.org), and for your phone and laptop, see [this guide](https://www.howtogeek.com/260507/psa-encrypt-your-pc-phone-and-tablet-now.-youll-regret-it-later-if-you-dont)
**Do not assume a site is secure, just because it is `HTTPS`** | Recommended | Unlike HTTP, data sent over HTTPS is encrypted. However that does not mean you should trust that website by default. HTTPS Certificates can be obtained by anybody, so a cloned or scam site may have a valid certificate (as denoted by the padlock icon). Always check the URL, and don't enter any personal details unless you are certain a website is legitimate. Avoid entering data on any site that is not HTTPS
**Use Virtual Cards when paying online** | Optional | There are risks involved in entering your card details on any website. Credit cards have better consumer protection, compared to debit or bank cards, meaning you are more likely to be recompensated for fraudulent transactions, however they collect and sometimes sell your transaction history. A better option would be to pay with a virtual, 1-time card. This will mean that even if those credentials are compromised a hacker will not be able to lift any of your money. You can also set limits, or create single-use cards, to prevent being over-charged. [Privacy.com](https://privacy.com/join/VW7WC) offer virtual payment cards for that you can use anywhere on the internet, as does [Revolut Premium](revolut.ngih.net/Q9jdx)
**Review application permissions** | Optional | Ensure that no app have unnecessary access to your photos, camera, location, contacts, microphone, call logs etc. See these guides for how to manage app permissions on [Android](https://www.howtogeek.com/230683/how-to-manage-app-permissions-on-android-6.0) and [iOS](https://www.howtogeek.com/211623/how-to-manage-app-permissions-on-your-iphone-or-ipad). On Android, there is a great app called [Exodus Privacy](https://play.google.com/store/apps/details?id=org.eu.exodus_privacy.exodusprivacy), that displays all permissions, and trackers for each of your installed apps
**Opt-out of public lists** | Optional | In many countries there are public databases that include citizens names, addresses, contact numbers and more. This can often result in unwanted contact from marketing companies, but in some cases used for harassment, stalking and fraud. [This guide](https://www.worldprivacyforum.org/2015/08/consumer-tips-top-ten-opt-outs) from The World Privacy Forum provides good instructions for how to approach this. This includes opting out of: Marketing, Financial Institution Listings, Mail Spam, FERPA Education Listings, Data Brokers and Advertising, as well as joining the National Do Not Call Registry
**Never Provide Additional PII When Opting-Out** | Optional | When removing yourself from less mainstream data sharing services, do not enter any additional intormation in the opt-out form than what is already publicly availible through that site. There have been cases where this extra info is used elsewhere to add more details to your record
**Opt-out of data sharing** | Optional | Many apps, services and software automatically opt you in for data collection and sharing. You should opt-out of this, for instructions on how to opt-out, see [Simple Opt Out](https://simpleoptout.com). <br>Often this collected data is sold onto third-parties, who combine multiple data sets together, allowing them to easily deduce your identity, along with your habits, purchases, personal details, location etc
**Review and update social media privacy** | Optional | Companies regularly update their terms, and that often leads to you being opted back. Check you Facebook, Twitter, Google etc. activity and privacy settings. See also [re-consent](https://github.com/cliqz-oss/re-consent) and [Jumbo](https://www.jumboprivacy.com) which are tools aimed at making this clearer and easier
**Compartmentalize** | Advanced | [Compartmentalization](https://en.wikipedia.org/wiki/Compartmentalization_(information_security)) is where to keep several categories of digital activity and files totally separate from each other. It means that if one area is breached, then an attacker will only have a proportion of your data, and the rest will still be safe. For example, store your work and personal files on separate devices, or use different web browsers for different types of activity, or even run certain tasks in a contained VM or on a separate device (such as having a work phone, and personal phone, or using a separate browser for social media/ chat rooms, or even running a VM for using specialist software)
**WhoIs Privacy Guard** | Advanced | Owning your own domain can prevent you loosing access to your email addresses, or being locked-in with a certain provider. However if you do not use a privacy guard, or enter false web admin details, your data will be publicly accessible through a [WhoIs](https://who.is) search. Most reputable domain registrars will have a WhoIs Privacy option
**Use a forwarding address** | Advanced | Have all mail addressed to a PO Box or forwarding address, to prevent any commerce, utility, finance, media or other companies knowing your read address. This would give you an extra layer of protecting if they suffered a breach, sold on personal details or were presented with a court order
**Use anonymous payment methods** | Advanced | Paying online with credit or debit card involves entering personal details, including name and residential address. Paying with cryptocurrency will not require you to enter any identifiable information. Both [Monero](https://www.getmonero.org) and [Zcash](https://z.cash/) are totally anonymous, and so best for privacy. See also: [Anonymous Payment Methods](/5_Privacy_Respecting_Software.md#payment-methods)
**See also**: [Online Tools](/5_Privacy_Respecting_Software.md#online-tools)
## Physical Security
Public records often include sensitive personal data (full name, date of birth, phone number, email, address, ethnicity etc), and are gathered from a range of sources (census records, birth/ death/ marriage certificates, voter registrants, marketing information, customer databases, motor vehicle records, professional/ business licenses and all court files in full detail). This sensitive personal information is [easy and legal to access](https://www.consumerreports.org/consumerist/its-creepy-but-not-illegal-for-this-website-to-provide-all-your-public-info-to-anyone/), which raises some [serious privacy concerns](https://privacyrights.org/resources/public-records-internet-privacy-dilemma) (identity theft, personal safety risks/ stalkers, destruction of reputations, dossier society)
CCTV is one of the major ways that the corporations, individuals and the government tracks your movements. In London, UK the average person is caught on camera about 500 times per day. This network is continuing to grow, and in many cities around the world, facial recognition is being rolled out, meaning the state can know the identity of residents on the footage in real-time.
Strong authentication, encrypted devices, patched software and anonymous web browsing may be of little use if someone is able to physically compromise you, your devices and your data. This section outlines some basic methods for physical security
**Security** | **Priority** | **Details and Hints**
--- | --- | ---
**Destroy Sensitive Documents** | Recommended | Instead of disposing of paperwork in the trash, you should first shred it, or take steps to redact any personally identifiable information. This will help protect you from identity theft, reduce the chance of blackmail and keep confidential data confidential
**Opt-Out of Public Records** | Recommended | People search websites (such as [WhitePages](https://www.whitepages.com), [Spokeo](https://www.spokeo.com) and [Radaris](https://radaris.com)) list public records, including: full name, date of birth, address, and phone number. Some sites go further, showing place of work, previous addresses, criminal records and photos. This is bad for privacy, and can make you a target for fraud. It is recommended to contact these sites, and opt-out from these listings. Methods for doing so range considerably between countries and states, see [Personal Data Removal Workbook](https://inteltechniques.com/data/workbook.pdf) by Michael Bazzell or [Word Privacy Forum Opt-Out Guide](https://www.worldprivacyforum.org/2015/08/consumer-tips-top-ten-opt-outs/) or The LifeWire [Remove Personal Information Guide](https://www.lifewire.com/remove-personal-information-from-internet-3482691) to get started
**Don't Reveal Info on Inbound Calls** | Recommended | Only share sensitive personal data on outbound calls/ communications that you have initiated. Ensure the phone number is correct, and listen for anything that doesn't sound right. If a company phones you, and asks any questions, hang up and phone them back on their official number
**Stay Alert** | Recommended | Stay aware of your surroundings. Whenever you step into a new environment, take a moment to assess potential risks. Listen to your instincts, when approached by an unknown individual. Ensure you are not being followed, when you approach your home address. Understand basic self-defense principle, and know how to put them into practice to defend yourself, if needed
**Secure Perimeter** | Recommended | Maintain physical and structural integrity to all locations where devices with personal info are stored, and ensure steps have been put in place to stop any unauthorized access. Minimize external access: doors, windows, vents. Maintain locking devices responsibly: Keep keys safe, don't use guessable combinations, have multiple locks, change locks after a breach or potential risk. Consider intrusion detection systems, such as alarms and closed circuit monitoring. Make sure walls are structurally sound, and if there is a drop ceiling, ensure walls continue up into the ceiling. When inside - don't trust door chain lock and cover door peep hole
**Physically Secure Devices** | Recommended | Use a Kensington lock to secure your device. Never leave devices unattended. Cover your web cam, consider a microphone block or disable it when not in use, use a USB data blocker when charging devices, use a privacy screen when working in public spaces
**Keep Devices Out of Direct Sight** | Recommended | It is possible for an adversary to [communicate with voice assistants with lasers](https://arstechnica.com/information-technology/2019/11/researchers-hack-siri-alexa-and-google-home-by-shining-lasers-at-them/) at a certain frequency. This can be mitigated by keeping devices out direct line of sight from windows. Any electronics visible from outside, may also pose a risk from theft, and hence should be stored somewhere safe
**Protect your PIN** | Recommended | When entering a code or password (such as unlocking device, withdrawing money from an ATM, or inputting a building access code), ensure that no one is watching over your shoulder, and they you are not in direct line of sight of a camera. Cover the keypad while entering the code to shield your PIN. After entering your PIN on a touch screen device, wipe over the screen to ensure your PIN can not be determined from smudge marks left by skin.
**Check for Skimmers** | Recommended | Before entering your card into an ATM, check for any signs that it may have been tampered with. You could use a card [skimmer detector](https://lab401.com/products/hunter-cat-card-skimmer-detector), or try to pull the card intake device to ensure it's firmly fitted. Watch out for other signs of compromise, such as small cameras, keypad covers or blockage on the cash out slot. This also applies to any public device that requires biometric or personal data to complete an action.
**Protect your Home Address** | Optional | Don't set your home address in your phones settings, instead consider selecting a location in a similar region to where you live. Consider storing devices in faraday cage when at your home address. For deliveries, consider using an alias names, and if possible a forwarding or pickup address for receiving online deliveries. You could also combine this with anonymous payment (such as virtual card numbers/ privacy.com, cryptocurrency or cash), and a forwarding email address or VOIP number
**Use a PIN, Not Biometrics** | Advanced | For situations where law enforcement may be involved (such as a protest, or journalism), if your device is seized, authorities can not force you to hand over your device pin code, however they can ask for your fingerprint or face scan to unlock a device. Therefore in these situations disable biometric unlock.
**Reduce exposure to CCTV** | Advanced | Wearing a hat, hoodie, dark glasses or face cover can make it harder for your identity to be known. Less busy streets tend to have fewer cameras. Knowing where cameras in your local area are, can help you avoid being caught on them. See more in [this article](http://snallabolaget.com/hiding-from-surveillance-how-and-why) by Snälla Bolaget
**Anti-Facial Recognition Clothing** | Advanced | Most facial-recognition methods can be easily tricked with certain [patterns](https://www.theguardian.com/technology/2017/jan/04/anti-surveillance-clothing-facial-recognition-hyperface). Example products from: [Adversarial Fashion](https://adversarialfashion.com) or this item on [Redbubble](https://www.redbubble.com/i/t-shirt/Anti-Surveillance-Clothing-by-Naamiko/24714049.1YYVU).
**Reduce Night Vision Exposure** | Advanced | Infrared night vision cameras are very easy to block, by using a small IR light source, which is invisible to the human eye, but blinds night vision cameras. Alternatively super-reflective glasses (see [Reflectacles](https://www.reflectacles.com)) can also fool night vision cameras.
**Protect your DNA** | Advanced | DNA is totally unique person-to-person, and can directly identify you. Therefore it is important to avoid sharing this information, [do not submit your DNA to heritage websites](https://internethealthreport.org/2019/23-reasons-not-to-reveal-your-dna/), be careful about [where you leave your DNA](https://youtu.be/MoX_BDWZUG0).
----
#### There's more to check out!
- [Why Privacy & Security Matters](/0_Why_It_Matters.md)
- [Privacy-Respecting Software](/5_Privacy_Respecting_Software.md)
- [Privacy & Security Gadgets](/6_Privacy_and-Security_Gadgets.md)
- [Further Links + More Awesome Stuff](/4_Privacy_And_Security_Links.md)
#### Other Awesome Security Lists
- @sbilly/[awesome-security](https://github.com/sbilly/awesome-security)
- @0x4D31/[awesome-threat-detection](https://github.com/0x4D31/awesome-threat-detection)
- @hslatman/[awesome-threat-intelligence](https://github.com/hslatman/awesome-threat-intelligence)
- @PaulSec/[awesome-sec-talks](https://github.com/PaulSec/awesome-sec-talks)
- @Zbetcheckin/[security_list](https://github.com/zbetcheckin/Security_list)
[See More](/4_Privacy_And_Security_Links.md#other-github-security-lists)
----
## Notes
*Thanks for visiting, hope you found something useful here :) Contributions are welcome, and much appreciated - to propose an edit [raise an issue](https://github.com/Lissy93/personal-security-checklist/issues/new/choose), or [open a PR](https://github.com/Lissy93/personal-security-checklist/pull/new/master). See: [`CONTRIBUTING.md`](/.github/CONTRIBUTING.md).*
*I owe a lot of thanks others who've conducted research, written papers, developed software all in the interest of privacy and security. Full attributions and references found in [`ATTRIBUTIONS.md`](/ATTRIBUTIONS.md).*
*Disclaimer: This is not an exhaustive list, and aims only to be taken as guide.*
*Licensed under [Creative Commons, CC BY 4.0](https://creativecommons.org/licenses/by/4.0/), © [Alicia Sykes](https://aliciasykes.com) 2020*
[![Attribution 4.0 International](https://licensebuttons.net/l/by/3.0/88x31.png)](/LICENSE.md)
---
Get in touch 📬
[![Alicia Sykes on Twitter](https://img.shields.io/twitter/follow/Lissy_Sykes?style=social&logo=twitter)](https://twitter.com/Lissy_Sykes)
[![Alicia Sykes on GitHub](https://img.shields.io/github/followers/lissy93?label=Lissy93&style=social)](https://github.com/Lissy93)
[![Alicia Sykes on Mastodon](https://img.shields.io/mastodon/follow/1032965?domain=https%3A%2F%2Fmastodon.social)](https://mastodon.social/web/accounts/1032965)
[![Alicia Sykes on Keybase](https://img.shields.io/badge/aliciasykes--lightgrey?style=social&logo=Keybase)](https://keybase.io/aliciasykes)
[![Alicia Sykes's PGP](https://img.shields.io/badge/PGP--lightgrey?style=social&logo=Let%E2%80%99s%20Encrypt)](https://keybase.io/aliciasykes/pgp_keys.asc)
[![Alicia Sykes's Website](https://img.shields.io/badge/aliciasykes.com--lightgrey?style=social&logo=Tencent%20QQ)](https://aliciasykes.com)
----
Found this helpful? Consider sharing it with others, to help them also improve their digital security 😇
[![Share on Twitter](https://img.shields.io/badge/Share-Twitter-17a2f3?style=for-the-badge&logo=Twitter)](http://twitter.com/share?text=Check%20out%20the%20Personal%20Cyber%20Security%20Checklist-%20an%20ultimate%20list%20of%20tips%20for%20protecting%20your%20digital%20security%20and%20privacy%20in%202020%2C%20with%20%40Lissy_Sykes%20%F0%9F%94%90%20%20%F0%9F%9A%80&url=https://github.com/Lissy93/personal-security-checklist)
[![Share on LinkedIn](https://img.shields.io/badge/Share-LinkedIn-0077b5?style=for-the-badge&logo=LinkedIn)](
http://www.linkedin.com/shareArticle?mini=true&url=https://github.com/Lissy93/personal-security-checklist&title=The%20Ultimate%20Personal%20Cyber%20Security%20Checklist&summary=%F0%9F%94%92%20A%20curated%20list%20of%20100%2B%20tips%20for%20protecting%20digital%20security%20and%20privacy%20in%202020&source=https://github.com/Lissy93)
[![Share on Facebook](https://img.shields.io/badge/Share-Facebook-4267b2?style=for-the-badge&logo=Facebook)](https://www.linkedin.com/shareArticle?mini=true&url=https%3A//github.com/Lissy93/personal-security-checklist&title=The%20Ultimate%20Personal%20Cyber%20Security%20Checklist&summary=%F0%9F%94%92%20A%20curated%20list%20of%20100%2B%20tips%20for%20protecting%20digital%20security%20and%20privacy%20in%202020&source=)
[![Share on Mastodon](https://img.shields.io/badge/Share-Mastodon-56a7e1?style=for-the-badge&logo=Mastodon)](https://mastodon.social/web/statuses/new?text=Check%20out%20the%20Ultimate%20Personal%20Cyber%20Security%20Checklist%20by%20%40Lissy93%20on%20%23GitHub%20%20%F0%9F%94%90%20%E2%9C%A8)
| 304.61553 | 1,301 | 0.78735 | eng_Latn | 0.992154 |
8a220dd8e4b12dd25c34185f7c2cddac8eadcbc6 | 7,805 | md | Markdown | README.md | ExclamationLabs/cordova-promise-fs | ee565cfd4475c41bbc5dc0ecd4e2fac21b6e3988 | [
"MIT"
] | 93 | 2015-01-05T06:10:00.000Z | 2021-11-02T20:47:55.000Z | README.md | ExclamationLabs/cordova-promise-fs | ee565cfd4475c41bbc5dc0ecd4e2fac21b6e3988 | [
"MIT"
] | 25 | 2015-01-08T21:52:31.000Z | 2020-10-22T07:37:00.000Z | README.md | ExclamationLabs/cordova-promise-fs | ee565cfd4475c41bbc5dc0ecd4e2fac21b6e3988 | [
"MIT"
] | 55 | 2015-01-16T13:43:50.000Z | 2021-12-16T02:16:37.000Z | cordova-promise-fs
==========
> Wraps the Cordova (and Chrome) File API in convenient functions (that return a Promise)
Are you entangled in a async callback mess to get even the simplest task done? Wait no longer -- here is **cordova-promise-fs**!
## Getting started
```bash
# fetch code using bower
bower install cordova-promise-fs
bower install bluebird # a library that follows the Promise/A+ spec
# ...or npm...
npm install cordova-promise-fs
npm install bluebird # a library that follows the Promise/A+ spec
# install Cordova and plugins
cordova platform add ios
cordova plugin add cordova-plugin-file
cordova plugin add cordova-plugin-file-transfer # optional
```
**IMPORTANT:** For iOS, use Cordova 3.7.0 or higher (due to a [bug](https://github.com/AppGyver/steroids/issues/534) that affects requestFileSystem).
Or just download and include [CordovaPromiseFS.js](https://raw.githubusercontent.com/markmarijnissen/cordova-promise-fs/master/dist/CordovaPromiseFS.js).
## Usage
### Initialize & configuration
```javascript
var fs = CordovaPromiseFS({
persistent: true, // or false
storageSize: 20*1024*1024, // storage size in bytes, default 20MB
concurrency: 3 // how many concurrent uploads/downloads?
Promise: require('promiscuous') // Your favorite Promise/A+ library!
});
```
The Promise option expects a Promise library that follows the [Promise/A+ spec](https://promisesaplus.com/), such as bluebird ([github](https://github.com/petkaantonov/bluebird), [download](https://raw.githubusercontent.com/markmarijnissen/cordova-app-loader/master/www/lib/bluebird.js)), promiscuous ([github](https://github.com/RubenVerborgh/promiscuous),[file](https://raw.githubusercontent.com/RubenVerborgh/promiscuous/master/promiscuous.js)) or [Angular's $q](https://docs.angularjs.org/api/ng/service/$q).
**Note on concurrency:** Concurrent uploads/downloads completely trash your mobile application. That's why I've put a concurrency limit on the number of downloads/uploads. Meteor sets this number on 30. In my experimental testing, I found 3 much more reasonable.
### Browsing files
```javascript
fs.exists(filename) // checks if file exists. returns fileEntry or false.
fs.file(filename) // returns a fileEntry
fs.dir(path) // returns a dirEntry
fs.list(path,optionString)// return array with filenames (including path)
optionString = 'r' // recursive list
optionString = 'd' // only list directories
optionString = 'f' // only list files
optionString = 'e' // return results as FileEntry/DirectoryEntry (instead as path-string)
optionString = 'rfe' // mix options! return entries of all files, recursively
```
### Reading files
```javascript
fs.read(filename) // returns text-content of a file
fs.readJSON(filename) // returns JSON-parsed contents of a file
fs.toUrl(filename) // returns URL to be used in js/html/css (file://....)
fs.toInternalURL(filename)// returns cordova internal URL (cdvfile://....)
fs.toDataURL(filename) // returns Base64 encoded Data URI
```
### Writing files
```javascript
fs.write(filename,data) // writes a Blob, a String, or data (as JSON). Ensures directory exists.
```
### File operations
```javascript
fs.create(filename) // creates a file
fs.ensure(path) // ensures directory exists
fs.move(src,dest) // move from src to dist. Ensures dest directory exists.
fs.moveDir(src,dest)
fs.copy(src,dest) // copy from src to dist. Ensures dest directory exists.
fs.remove(src) // removes file. Resolves even if file was already removed.
fs.remove(src,true) // removes file. Rejects when file does not exist.
fs.removeDir(path)
```
### Upload and download
FileTransfers with automatric retry and concurrency limit!
```javascript
var promise = fs.upload(source,destination,[options],[onprogress]);
var promise = fs.upload(source,destination,[onprogress]);
var promise = fs.download(source,destination,[options],[onprogress]);
var promise = fs.download(source,destination,[onprogress]);
options.trustAllHosts
options.retry = [1000,2000,3000] // retry attemps: millisecond to wait before trying again.
// plus all normal cordova-file-transfer options
// upload/download augments the promise with two extra functions:
promise.progress(function(progressEvent){...})
promise.abort();
// Gotcha: progress and abort() are unchainable;
fs.upload(...).then(...) // won't return the augmented promise, just an ordinary one!
```
### Utilities
```javascript
fs.fs // returns promise for the FileSystem
fs.filename(path) // converts path to filename (last part after /)
fs.dirname(path) // converts path dirname (everything except part after last /)
fs.deviceready // deviceready promise
fs.options // options
fs.isCordova // is Cordova App?
```
### Normalized path
In CordovaPromiseFS, all filenames and paths are normalized:
* Directories should end with a `/`.
* Filenames and directories should never start with a `/`.
* `"./"` is converted to `""`
* ".." and "." are resolved.
This allows you to concatenate normalized paths, i.e.
```javascript
normalize('dir1/dir2') === normalize('dir1') + normalize('dir2') === 'dir1/dir2/';
```
If you're storing or saving paths, it is recommended to `normalize` them first to avoid comparison problems. (i.e. paths are not recognized as the same because of a missing trailing slash).
Beware: the original `entry.fullPath` might return a path which starts with a `/`. This causes problems on Android, i.e.
```javascript
var path = filesystem.root.fullPath; // returns something starting with a `/`
filesystem.root.getDirectory(path); // NullPointer error in android. Stupid!
```
This problem is solved in CordovaPromiseFS.
## Changelog
### 1.2.5 (05/05/2017)
* Added Crosswalk
* Bugfix: list will return more than 100 entries
### 1.1.0 (05/05/2016)
* Fixed bug: download/upload support for different Cordova FileSystems.
### 1.0.0 (07/02/2016)
* Fixed bug in list function, thanks @sebastian-greco
* Improved code readability of transfer, thanks @youjenli
* There is no this, thanks @m0ppers
* Accept string as FileSystem, thanks @dortzur
* Normalize ".." in paths, thanks @starquake
### 0.13.0 (16/09/2015)
* Merged pull request from @Ijzerenhein. Fixed Chrome Persistent storage quota issue and added directory methods.
### 0.12.0 (17/03/2015)
* Merged pull request from @jakgra. Now you can write to hidden folders on Android. Thanks!
### 0.11.0 (17/03/2015)
* Minor improvements in upload
### 0.10.0 (21/12/2014)
* Support for other fileSystems (undocumented hack)
### 0.9.0 (28/11/2014)
* Normalize path everywhere.
### 0.8.0 (27/11/2014)
* Added test-suite, fixed few minor bugs.
### 0.7.0 (14/11/2014)
* bugfix toInternalURL functions and fix download argument order
### 0.6.0 (13/11/2014)
* Chrome Support!
### 0.5.0 (06/11/2014)
* Use `webpack` for the build proces
* Fixed many small bugs
### 0.4.0 (06/11/2014)
* Various small changes
* Added `CordovaPromiseFS.js` for everybody who does not use Browserify/Webpack
### 0.3.0 (05/11/2014)
* Added `list` options (list `r`ecursively, only `f`iles, only `d`irectories, return result as `e`ntries)
### 0.2.0 (05/11/2014)
* Added `upload` and `download` methods with concurrency limit
## Contribute
Convert CommonJS to a browser-version:
```bash
npm install webpack -g
npm run-script prepublish
```
Run tests: Navigate to `/test/index.html`, for example:
```bash
npm install static -g
static .
# http://localhost:8080/test/index.html
```
Feel free to contribute to this project in any way. The easiest way to support this project is by giving it a star.
## Contact
- @markmarijnissen
- http://www.madebymark.nl
- info@madebymark.nl
© 2014 - Mark Marijnissen
| 33.497854 | 512 | 0.721204 | eng_Latn | 0.888293 |
8a22c0c77a1d7975ad8c3af1bf7dd12e2eacbfa8 | 3,317 | md | Markdown | docs/error-messages/compiler-errors-2/compiler-error-c2660.md | morra1026/cpp-docs.ko-kr | 77706f3bffb88ed46b244c46184289a3b683f661 | [
"CC-BY-4.0",
"MIT"
] | 3 | 2019-10-11T07:41:28.000Z | 2021-06-29T08:27:00.000Z | docs/error-messages/compiler-errors-2/compiler-error-c2660.md | morra1026/cpp-docs.ko-kr | 77706f3bffb88ed46b244c46184289a3b683f661 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | docs/error-messages/compiler-errors-2/compiler-error-c2660.md | morra1026/cpp-docs.ko-kr | 77706f3bffb88ed46b244c46184289a3b683f661 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | ---
title: 컴파일러 오류 C2660
ms.date: 11/04/2016
f1_keywords:
- C2660
helpviewer_keywords:
- C2660
ms.assetid: 2e01a1db-4f00-4df6-a04d-cb6f70a6922b
ms.openlocfilehash: 3f236f18faa92df660ed677df293373fe9f0800c
ms.sourcegitcommit: 6052185696adca270bc9bdbec45a626dd89cdcdd
ms.translationtype: MT
ms.contentlocale: ko-KR
ms.lasthandoff: 10/31/2018
ms.locfileid: "50626696"
---
# <a name="compiler-error-c2660"></a>컴파일러 오류 C2660
'function': 함수는 숫자 매개 변수를 사용 하지 않는
잘못 된 개수의 매개 변수를 사용 하 여 함수를 호출 합니다.
C2660 실수로 동일한 이름의 MFC 멤버 함수는 대신 Windows API 함수를 호출 하는 경우에 발생할 수 있습니다. 이 문제 해결:
- 함수 호출 멤버 함수 호출의 형식에 맞게 조정 합니다.
- 범위 결정 연산자를 사용 하 여 (`::`) 전역 네임 스페이스에서 함수 이름을 검색 하도록 컴파일러에 지시 합니다.
## <a name="example"></a>예제
다음 샘플 C2660를 생성합니다.
```
// C2660.cpp
void func( int, int ) {}
int main() {
func( 1 ); // C2660 func( int ) not declared
func( 1, 0 ); // OK
}
```
## <a name="example"></a>예제
C2660 직접 관리 되는 형식의 Dispose 메서드를 호출 하려는 경우에 발생할 수 있습니다. 자세한 내용은 [소멸자 및 종료자](../../dotnet/how-to-define-and-consume-classes-and-structs-cpp-cli.md#BKMK_Destructors_and_finalizers)합니다. 다음 샘플 C2660를 생성합니다.
```
// C2660_a.cpp
// compile with: /clr
using namespace System;
using namespace System::Threading;
void CheckStatus( Object^ stateInfo ) {}
int main() {
ManualResetEvent^ event = gcnew ManualResetEvent( false );
TimerCallback^ timerDelegate = gcnew TimerCallback( &CheckStatus );
Timer^ stateTimer = gcnew Timer( timerDelegate, event, 1000, 250 );
stateTimer->Dispose(); // C2660
stateTimer->~Timer(); // OK
}
```
## <a name="example"></a>예제
C2660 파생된 클래스 함수를 숨기는 경우 발생 합니다.
```
// C2660b.cpp
// C2660 expected
#include <stdio.h>
class f {
public:
void bar() {
printf_s("in f::bar\n");
}
};
class f2 : public f {
public:
void bar(int i){printf("in f2::bar\n");}
// Uncomment the following line to resolve.
// using f::bar; // - using declaration added
// or
// void bar(){__super::bar();}
};
int main() {
f2 fObject;
fObject.bar();
}
```
## <a name="example"></a>예제
C2660 인덱싱된 속성을 올바르게 호출 하는 경우에 발생할 수 있습니다.
```
// C2660c.cpp
// compile with: /clr
ref class X {
double d;
public:
X() : d(1.9) {}
property double MyProp[] {
double get(int i) {
return d;
}
} // end MyProp definition
};
int main() {
X ^ MyX = gcnew X();
System::Console::WriteLine(MyX->MyProp(1)); // C2660
System::Console::WriteLine(MyX->MyProp[1]); // OK
}
```
## <a name="example"></a>예제
C2660 인덱싱된 속성을 올바르게 호출 하는 경우에 발생할 수 있습니다.
```
// C2660d.cpp
// compile with: /clr
ref class A{
public:
property int default[int,int] {
int get(int a, int b) {
return a + b;
}
}
};
int main() {
A^ a = gcnew A;
int x = a[3][5]; // C2660
int x2 = a[3,5]; // OK
}
```
## <a name="example"></a>예제
C2660 new 연산자 형식이 바깥쪽 형식 이외의 개체를 생성 하지만 템플릿 클래스의 새 연산자를 정의 하는 경우에 발생할 수 있습니다.
```
// C2660e.cpp
// compile with: /c
#include <malloc.h>
template <class T> class CA {
private:
static T** line;
void* operator new (size_t, int i) {
return 0;
}
void operator delete(void* pMem, int i) {
free(pMem);
}
public:
CA () { new (1) T(); } // C2660
// try the following line instead
// CA () { new (1) CA<int>(); }
};
typedef CA <int> int_CA;
void AAA() {
int_CA list;
}
``` | 19.17341 | 201 | 0.617425 | kor_Hang | 0.994127 |
8a230bf960cda3150c7d8efc5940f7c2d02877ff | 407 | md | Markdown | _posts/2021/2021-03-20-eintracht-entfuhrt-punkt-aus-leipzig.md | eintracht-stats/eintracht-stats.github.io | 9d1cd3d82bff1b70106e3b5cf3c0da8f0d07bb43 | [
"MIT"
] | null | null | null | _posts/2021/2021-03-20-eintracht-entfuhrt-punkt-aus-leipzig.md | eintracht-stats/eintracht-stats.github.io | 9d1cd3d82bff1b70106e3b5cf3c0da8f0d07bb43 | [
"MIT"
] | 1 | 2021-04-01T17:08:43.000Z | 2021-04-01T17:08:43.000Z | _posts/2021/2021-03-20-eintracht-entfuhrt-punkt-aus-leipzig.md | eintracht-stats/eintracht-stats.github.io | 9d1cd3d82bff1b70106e3b5cf3c0da8f0d07bb43 | [
"MIT"
] | null | null | null | ---
layout: post
title: Eintracht entführt Punkt aus Leipzig
---
Erneut hat die Eintracht bei einem Spitzenteam gepunktet: Bei RB Leipzig gelang dank eines Tores von Kamada ein 1:1. Die Meisterschaftsträume der Sachsen bekommen dadurch einen herben Dämpfer, während unsere Champions League Hoffnung noch ein bisschen weiterlebt. Gegen Union muss vor der Länderspielpause nun aber mal wieder ein Sieg her... | 67.833333 | 341 | 0.813268 | deu_Latn | 0.996807 |
8a2374e4f99b253320fb59a72c741cedfec1d9d1 | 1,081 | md | Markdown | pegasus/sites.v3/code.org/views/workshop_affiliates/28132137_bio.md | code-dot-org/code-dot-org | 3fd13c77f37823f3f71ae2675e6e4e1fd77905d1 | [
"Apache-2.0"
] | 772 | 2015-01-01T14:52:37.000Z | 2022-03-29T17:07:10.000Z | pegasus/sites.v3/code.org/views/workshop_affiliates/28132137_bio.md | SNOmad1/code-dot-org | 3fd13c77f37823f3f71ae2675e6e4e1fd77905d1 | [
"Apache-2.0"
] | 13,529 | 2015-01-05T19:59:18.000Z | 2022-03-31T23:07:43.000Z | pegasus/sites.v3/code.org/views/workshop_affiliates/28132137_bio.md | SNOmad1/code-dot-org | 3fd13c77f37823f3f71ae2675e6e4e1fd77905d1 | [
"Apache-2.0"
] | 494 | 2015-01-09T00:32:46.000Z | 2022-03-29T17:12:02.000Z | ## Elizabeth Nations
[ejnations@gmail.com](mailto: ejnations@gmail.com)
Liz has taught computer science courses to both elementary level and high school level students using Code.org curriculum and has enjoyed helping other teachers implement Code.org into their classrooms. She has a Bachelor's in Accounting and MBA from Western New Mexico University and her teaching credentials from Eastern New Mexico University.
She has 4 years of teaching experience and 5 years of coding experience--both teaching students and adults.
In addition to facilitating and teaching, she works directly with the New Mexico regional partner, Computer Science Alliance of New Mexico to organize Computer Science trainings and workshops throughout the state. She and her husband also own their own business which offers computer consulting services in their area.
She has been married to her husband, Rusty, for 14 years and they have two children: Ryan (11) and Madison (8). In her free time, she enjoys reading, hiking, camping and fishing. She loves animals and is a huge sports fan! | 180.166667 | 421 | 0.80481 | eng_Latn | 0.99988 |
8a23da53bc96ba2868c70f61a2daf1a9ee4818dd | 2,249 | md | Markdown | README.md | aaronhmiller/rebound | ff01fac489a2ce03c57b39316264199c9d8e9a0d | [
"MIT"
] | null | null | null | README.md | aaronhmiller/rebound | ff01fac489a2ce03c57b39316264199c9d8e9a0d | [
"MIT"
] | null | null | null | README.md | aaronhmiller/rebound | ff01fac489a2ce03c57b39316264199c9d8e9a0d | [
"MIT"
] | null | null | null | # rebound
[aaron's copy]
Rebound is a command-line tool that instantly fetches Stack Overflow results when you get a compiler error. Just use the `rebound` command to execute your file.
![Placeholder Demo](docs/demo.gif)
__Featured in:__ [50 Most Popular Python Projects in 2018](https://boostlog.io/@bily809/50-most-popular-python-projects-in-2018-5aea8e1c47018500491f4361), the top of [r/Python](https://www.reddit.com/r/Python/comments/8cwq72/i_made_a_commandline_tool_that_instantly_fetches/), [awesome-cli-apps](https://github.com/agarrharr/awesome-cli-apps), [awesome-shell](https://github.com/alebcay/awesome-shell), [terminals-are-sexy](https://github.com/k4m4/terminals-are-sexy), and [awesome-mac](https://github.com/jaywcjlove/awesome-mac).
## Installation
>Requires Python 3.0 or higher.
Rebound works on MacOS, Linux, and Windows (if you use Cygwin), with binary downloads available for [every release.](https://github.com/shobrook/rebound/releases) You can also install it with pip:
`$ pip install rebound-cli`
or apt-get if you're using Linux:
`$ sudo apt-get install rebound-cli`
## Usage
Running a file with `rebound` is just as easy as compiling it normally:
`$ rebound [file_path]`
This will execute the file, pull the error message, and let you browse related Stack Overflow questions and answers without leaving the terminal.
__Supported file types:__ Python, Node.js, Ruby, Golang, and Java.
## Contributing
To make a contribution, fork the repo, make your changes and then submit a pull request. Please try to adhere to the existing style. If you've discovered a bug or have a feature request, create an [issue](https://github.com/shobrook/rebound/issues/new) and I'll take care of it!
__Pending Features:__
* Improved text formatting (i.e. for duplicate questions, markdown, blockquotes, clickable links, etc.)
* Improved search result accuracy by extracting potential search terms from the stack trace
* Support for more languages
## Technologies
Rebound is written in Python and built on Urwid. Beautiful Soup is used to scrape Stack Overflow content and subprocess for catching compiler errors.
## Acknowledgements
Special thanks to [@rndusr](https://github.com/rndusr) for helping with the scrollbar.
| 47.851064 | 530 | 0.778124 | eng_Latn | 0.972999 |
8a241ea69b58e73800279bf455e2e5a04b87b21b | 1,484 | md | Markdown | README.md | ptbrown35/MATLAB-MIP | 7fa570901719db84eec33519132277f149bede2d | [
"MIT"
] | 1 | 2018-03-13T10:39:35.000Z | 2018-03-13T10:39:35.000Z | README.md | ptbrown35/MATLAB-MIP | 7fa570901719db84eec33519132277f149bede2d | [
"MIT"
] | null | null | null | README.md | ptbrown35/MATLAB-MIP | 7fa570901719db84eec33519132277f149bede2d | [
"MIT"
] | null | null | null | # MATLAB-MIP
### MATLAB controlled MIP
### Project Goals
* Run eduMIP examples through MATLAB Simulink
* Use Simulink's UI to simplify interfacing with the Robotics Cape
* Make simple examples for blink and basic balancing
### Roboticscape Functionality
* Raw Barometer Data: pressure, temperature, altitude
* Raw IMU Data: 3-axis acceleration, 3-axis gyro
### Example Simulations: beta/test_models
* MIP Math Model (mip_model.slx): Successive Loop Closure example with MIP theoretical plants and controllers
* Template (template.slx): good starting point for new MATLAB MIP hardware simulations
* Barometer Test (barometer_test.slx): returns raw pressure, temperature, altitude
* IMU Test (imu_test.slx): returns raw 3-axis acceleration, 3-axis gyro
* Complimentary Filter (complimentary_filter.slx): returns body tilt angle from filtered accel/gyro data
* Barebones MIP Balancing (mip_balance.slx): MIP balancing with user defined controllers
* User Friendly MIP Balancing (mip_balance_resets.slx): MIP balancing with start, upright, and tip conditions
### Resources
* [Robotics Cape User Manual](http://strawsondesign.com/#!manual-install)
* [Robotics Cape Installer](https://github.com/StrawsonDesign/Robotics_Cape_Installer/releases)
* [Simulink Coder Support Package for BeagleBone Blue Hardware](https://www.mathworks.com/matlabcentral/fileexchange/64925-simulink-coder-support-package-for-beaglebone-blue-hardware)
* [Labview MIP](https://github.com/ktalke12/Labview-MiP)
| 54.962963 | 183 | 0.79717 | eng_Latn | 0.491842 |
8a242409d5133004ee49f11520bd15af7518479f | 818 | md | Markdown | _posts/2019-07-21-nao-queremos-propaganda-negativa-do-brasil-diz-bolsonaro-sobre-dados-do-desmatamento-na-amazonia.md | tatudoquei/tatudoquei.github.io | a3a3c362424fda626d7d0ce2d9f4bead6580631c | [
"MIT"
] | null | null | null | _posts/2019-07-21-nao-queremos-propaganda-negativa-do-brasil-diz-bolsonaro-sobre-dados-do-desmatamento-na-amazonia.md | tatudoquei/tatudoquei.github.io | a3a3c362424fda626d7d0ce2d9f4bead6580631c | [
"MIT"
] | null | null | null | _posts/2019-07-21-nao-queremos-propaganda-negativa-do-brasil-diz-bolsonaro-sobre-dados-do-desmatamento-na-amazonia.md | tatudoquei/tatudoquei.github.io | a3a3c362424fda626d7d0ce2d9f4bead6580631c | [
"MIT"
] | 1 | 2022-01-13T07:57:24.000Z | 2022-01-13T07:57:24.000Z | ---
layout: post
item_id: 2667357673
title: >-
'Não queremos propaganda negativa do Brasil', diz Bolsonaro sobre dados do desmatamento na Amazônia
author: Tatu D'Oquei
date: 2019-07-21 13:56:00
pub_date: 2019-07-21 13:56:00
time_added: 2019-07-22 22:02:56
category:
tags: []
---
BRASÍLIA — O presidente Jair Bolsonaro afirmou, neste domingo, que a maneira como os dados do Instituto Nacional de Pesquisas Espaciais (Inpe) sobre o desmatamento da Amazônia têm sido divulgados prejudica a imagem do país no exterior.
**Link:** [https://oglobo.globo.com/sociedade/nao-queremos-propaganda-negativa-do-brasil-diz-bolsonaro-sobre-dados-do-desmatamento-na-amazonia-23822932](https://oglobo.globo.com/sociedade/nao-queremos-propaganda-negativa-do-brasil-diz-bolsonaro-sobre-dados-do-desmatamento-na-amazonia-23822932)
| 45.444444 | 294 | 0.784841 | por_Latn | 0.925822 |
8a2428983468b99ef09fa6d1f80d1196925b1ac3 | 3,560 | md | Markdown | content/blog/FCM/index.md | liliatabea/myPortfolio | ca352880f83557758f03e23056069efb5d098554 | [
"MIT"
] | null | null | null | content/blog/FCM/index.md | liliatabea/myPortfolio | ca352880f83557758f03e23056069efb5d098554 | [
"MIT"
] | null | null | null | content/blog/FCM/index.md | liliatabea/myPortfolio | ca352880f83557758f03e23056069efb5d098554 | [
"MIT"
] | null | null | null | ---
title: Future Cities Magazine
date: "2004-06-21"
thumbnail: ./FCM_cover.jpg
description: Design of a magazine that showcases research, edited for the general public.
client: ETH Singapore SEC Ltd
published: "2013–2017"
---
The Future Cities Magazine is a magazine published bi-annually by the [Future Cities Laboratory](https://fcl.ethz.ch/). It serves as a format to showcase research, edited for the general public. Articles are usually about four to ten pages long, allowing the authors to give detailed insight into their work.
I was responsible for the identity, design and print coordination of the magazine. In collaboration with Uta Bogenrieder, I designed several editions and developed a template for subsequent issues.
<div class="kg-card kg-image-card" style="box-shadow: 0 5px 10px rgba(0, 0, 0, 0.1), 10px 20px 25px rgba(0, 0, 0, 0.25);">
![FCM Missing Map spread](./FCM_spread1a.jpg)
</div>
<div class="kg-card kg-image-card kg-width-wide ">
![FCM Missing Map foto](./FCM_spread1b.jpg)
</div>
The overall look is light and airy, combining maximum readability with the presentation of high-quality, large-format images. The page size is 205 × 274 mm and enables many layout options, and reading comfort.
<div class="kg-card kg-image-card" style="box-shadow: 0 5px 10px rgba(0, 0, 0, 0.1), 10px 20px 25px rgba(0, 0, 0, 0.25);">
![FCM pixels spread](./FCM_spread2a.jpg)
</div>
<div class="kg-card kg-image-card kg-width-wide ">
![FCM pixels foto](./FCM_spread2b.jpg)
</div>
Text flows over either one or two columns. Additionally, there are many options for more sophisticated typography.
<div class="kg-card kg-image-card" style="box-shadow: 0 5px 10px rgba(0, 0, 0, 0.1), 10px 20px 25px rgba(0, 0, 0, 0.25);">
![FCM Sumatra plantation spread](./FCM_spread3a.jpg)
</div>
<div class="kg-card kg-image-card ">
![FCM Sumatra plantation foto](./FCM_spread3b.jpg)
</div>
The most extensive issue was a 166 page compendium by the chair of Prof. Marc Angélil, edited by Sascha Roesler, on Natural Ventilation in Singapore and on Sumatra.
<div class="kg-card kg-image-card" style="box-shadow: 0 5px 10px rgba(0, 0, 0, 0.1), 10px 20px 25px rgba(0, 0, 0, 0.25);">
![FCM South-East-Asia maps spread](./FCM_spread_4a.jpg)
</div>
<div class="kg-card kg-image-card kg-width-wide ">
![FCM South-East-Asia maps foto](./FCM_spread_4b.jpg)
</div>
A picture series by artist Katja Jug, printed full bleed on uncoated paper, was featured.
<div class="kg-card kg-image-card ">
![FCM Katja Jug images](./FCM_spread_kj-a.jpg)
</div>
<div class="kg-card kg-image-card kg-width-full ">
![FCM Katja Jug images](./FCM_spread_kj-b.jpg)
</div>
It was a real challenge to assemble the diverse material, brush up the 300+ images and infographics, and layout the whole content in order to purposefully communicate the research findings. The design proved to be robust and flexible enough for the nitty gritty content.
<div class="kg-card kg-image-card" style="box-shadow: 0 5px 10px rgba(0, 0, 0, 0.1), 10px 20px 25px rgba(0, 0, 0, 0.25);">
![FCM batak house construction spread](./FCM_spread5a.jpg)
</div>
<div class="kg-card kg-image-card ">
![FCM batak house construction foto](./FCM_spread5b.jpg)
</div>
<div class="kg-card kg-image-card kg-width-wide ">
![FCM what the climate foto](./FCM_spread5e.jpg)
</div>
<div class="kg-card kg-image-card ">
![FCM HDB ventilation foto](./FCM_spread5c.jpg)
</div>
<div class="kg-card kg-image-card kg-width-wide ">
![FCM Strait of Singapore foto](./FCM_spread5d.jpg)
</div>
| 31.22807 | 308 | 0.725281 | eng_Latn | 0.867159 |
8a24898eb1eb5d206de5bb73bff79a30cd26f208 | 1,125 | md | Markdown | X. Appendices/B.1. Meta-data format.md | argellee/Spring-Boot-Reference-Guide | 2f93893e83345cfc604705e76da4fbb7a8f3babf | [
"MIT"
] | 4 | 2017-12-27T02:47:50.000Z | 2019-10-14T11:59:45.000Z | X. Appendices/B.1. Meta-data format.md | argellee/Spring-Boot-Reference-Guide | 2f93893e83345cfc604705e76da4fbb7a8f3babf | [
"MIT"
] | null | null | null | X. Appendices/B.1. Meta-data format.md | argellee/Spring-Boot-Reference-Guide | 2f93893e83345cfc604705e76da4fbb7a8f3babf | [
"MIT"
] | 2 | 2017-11-30T03:05:12.000Z | 2018-09-21T00:50:26.000Z | ### 附录B.1. 元数据格式
配置元数据位于jars文件中的`META-INF/spring-configuration-metadata.json`,它们使用一个具有"groups"或"properties"分类节点的简单JSON格式:
```json
{"groups": [
{
"name": "server",
"type": "org.springframework.boot.autoconfigure.web.ServerProperties",
"sourceType": "org.springframework.boot.autoconfigure.web.ServerProperties"
}
...
],"properties": [
{
"name": "server.port",
"type": "java.lang.Integer",
"sourceType": "org.springframework.boot.autoconfigure.web.ServerProperties"
},
{
"name": "server.servlet-path",
"type": "java.lang.String",
"sourceType": "org.springframework.boot.autoconfigure.web.ServerProperties"
"defaultValue": "/"
}
...
]}
```
每个"property"是一个配置节点,用户可以使用特定的值指定它。例如,`server.port`和`server.servlet-path`可能在`application.properties`中如以下定义:
```properties
server.port=9090
server.servlet-path=/home
```
"groups"是高级别的节点,它们本身不指定一个值,但为properties提供一个有上下文关联的分组。例如,`server.port`和`server.servlet-path`属性是`server`组的一部分。
**注**:不需要每个"property"都有一个"group",一些属性可以以自己的形式存在。
| 26.785714 | 109 | 0.647111 | yue_Hant | 0.119973 |
8a24bdca512b609c644665ea372ad6929ac54fc9 | 6,768 | md | Markdown | docs/build/exporting-and-importing-using-afx-ext-class.md | ANKerD/cpp-docs.pt-br | 6910dc17c79db2fee3f3616206806c5f466b3f00 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | docs/build/exporting-and-importing-using-afx-ext-class.md | ANKerD/cpp-docs.pt-br | 6910dc17c79db2fee3f3616206806c5f466b3f00 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | docs/build/exporting-and-importing-using-afx-ext-class.md | ANKerD/cpp-docs.pt-br | 6910dc17c79db2fee3f3616206806c5f466b3f00 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | ---
title: Exportando e importando usando AFX_EXT_CLASS | Microsoft Docs
ms.custom: ''
ms.date: 11/04/2016
ms.technology:
- cpp-tools
ms.topic: conceptual
f1_keywords:
- afx_ext_class
dev_langs:
- C++
helpviewer_keywords:
- AFX_EXT_CLASS macro
- exporting classes [C++]
- importing DLLs [C++]
- extension DLLs [C++], exporting classes
- executable files [C++], importing classes
- exporting DLLs [C++], AFX_EXT_CLASS macro
ms.assetid: 6b72cb2b-e92e-4ecd-bcab-c335e1d1cfde
author: corob-msft
ms.author: corob
ms.workload:
- cplusplus
ms.openlocfilehash: 46964b4babc7d7afd4b523ee37981296e9f7dc57
ms.sourcegitcommit: 92f2fff4ce77387b57a4546de1bd4bd464fb51b6
ms.translationtype: MT
ms.contentlocale: pt-BR
ms.lasthandoff: 09/17/2018
ms.locfileid: "45711926"
---
# <a name="exporting-and-importing-using-afxextclass"></a>Exportando e importando usando AFX_EXT_CLASS
[DLLs de extensão do MFC](../build/extension-dlls-overview.md) use a macro **AFX_EXT_CLASS** exportar classes; os executáveis vinculados a DLL de extensão do MFC usam a macro para importar classes. Com o **AFX_EXT_CLASS** macro, os mesmos arquivos de cabeçalho que são usados para criar a DLL pode ser usado com os executáveis vinculados à DLL de extensão do MFC.
No arquivo de cabeçalho para a sua DLL, adicione a **AFX_EXT_CLASS** palavra-chave para a declaração de sua classe, da seguinte maneira:
```cpp
class AFX_EXT_CLASS CMyClass : public CDocument
{
// <body of class>
};
```
Essa macro é definida pelo MFC como `__declspec(dllexport)` quando os símbolos do pré-processador `_AFXDLL` e `_AFXEXT` são definidos. Mas a macro é definida como `__declspec(dllimport)` quando `_AFXDLL` é definido e `_AFXEXT` não está definido. Quando definido, o símbolo do pré-processador `_AFXDLL` indica que a versão compartilhada do MFC está sendo usada por um executável de destino (uma DLL ou um aplicativo). Quando ambos `_AFXDLL` e `_AFXEXT` são definidos, isso indica que o executável de destino é uma DLL de extensão do MFC.
Porque `AFX_EXT_CLASS` é definido como `__declspec(dllexport)` ao exportar de uma DLL de extensão do MFC, você pode exportar classes inteiras sem colocar os nomes decorados para todos os símbolos dessa classe no arquivo. def.
Embora você possa evitar a criação de um arquivo. def e todos os nomes decorados para a classe com esse método, a criação de um arquivo. def é mais eficiente porque os nomes podem ser exportados por ordinal. Para usar o método de exportação do arquivo. def, coloque o código a seguir no início e no final do seu arquivo de cabeçalho:
```cpp
#undef AFX_DATA
#define AFX_DATA AFX_EXT_DATA
// <body of your header file>
#undef AFX_DATA
#define AFX_DATA
```
> [!CAUTION]
> Tenha cuidado ao exportar funções embutidas, pois eles podem criar a possibilidade de conflitos de versão. Uma função embutida é expandida em código do aplicativo; Portanto, se você posteriormente reescrever a função, ele não for atualizado, a menos que o aplicativo em si é recompilado. Normalmente, funções de DLL podem ser atualizadas sem recompilar os aplicativos que usá-los.
## <a name="exporting-individual-members-in-a-class"></a>Exportar membros individuais em uma classe
Às vezes, você talvez queira exportar membros individuais da sua classe. Por exemplo, se você estiver exportando um `CDialog`-derivado da classe, você só precisará exportar o construtor e o `DoModal` chamar. Você pode usar `AFX_EXT_CLASS` nos membros individuais, você precisa exportar.
Por exemplo:
```cpp
class CExampleDialog : public CDialog
{
public:
AFX_EXT_CLASS CExampleDialog();
AFX_EXT_CLASS int DoModal();
...
// rest of class definition
...
};
```
Porque você não estiver exportando todos os membros da classe, você poderá encontrar um problema adicional devido à maneira que funcionam de macros do MFC. Na verdade, várias das macros de auxiliares do MFC declararam ou definem membros de dados. Portanto, esses membros de dados também devem ser exportados de sua DLL.
Por exemplo, o `DECLARE_DYNAMIC` macro é definida da seguinte maneira ao compilar uma DLL de extensão do MFC:
```cpp
#define DECLARE_DYNAMIC(class_name) \
protected: \
static CRuntimeClass* PASCAL _GetBaseClass(); \
public: \
static AFX_DATA CRuntimeClass class##class_name; \
virtual CRuntimeClass* GetRuntimeClass() const; \
```
A linha que começa com estática `AFX_DATA` está declarando um objeto estático dentro de sua classe. Para exportar essa classe corretamente e acessar as informações de tempo de execução de um executável do cliente, você deve exportar esse objeto estático. Porque o objeto estático é declarado com o modificador `AFX_DATA`, você só precisa definir `AFX_DATA` ser `__declspec(dllexport)` ao criar sua DLL e defini-lo como `__declspec(dllimport)` ao criar o executável do cliente. Porque `AFX_EXT_CLASS` já está definido dessa forma, você só precisa redefinir `AFX_DATA` para ser o mesmo que `AFX_EXT_CLASS` em torno de sua definição de classe.
Por exemplo:
```cpp
#undef AFX_DATA
#define AFX_DATA AFX_EXT_CLASS
class CExampleView : public CView
{
DECLARE_DYNAMIC()
// ... class definition ...
};
#undef AFX_DATA
#define AFX_DATA
```
Como o MFC sempre usa o `AFX_DATA` símbolo em itens de dados, ele define em suas macros, essa técnica de funciona para todos esses cenários. Por exemplo, ele funciona para `DECLARE_MESSAGE_MAP`.
> [!NOTE]
> Se você estiver exportando a classe inteira em vez de membros selecionados da classe, membros de dados estáticos são exportados automaticamente.
### <a name="what-do-you-want-to-do"></a>O que você deseja fazer?
- [Exportar de uma DLL usando arquivos. def](../build/exporting-from-a-dll-using-def-files.md)
- [Exportar de uma DLL usando dllexport](../build/exporting-from-a-dll-using-declspec-dllexport.md)
- [Exportar funções de C++ para uso em executáveis da linguagem C](../build/exporting-cpp-functions-for-use-in-c-language-executables.md)
- [Exportar funções de C para uso em executáveis C ou da linguagem C++](../build/exporting-c-functions-for-use-in-c-or-cpp-language-executables.md)
- [Determinar qual método de exportação usar](../build/determining-which-exporting-method-to-use.md)
- [Importar para um aplicativo usando __declspec(dllimport)](../build/importing-into-an-application-using-declspec-dllimport.md)
- [Inicialize um DLL](../build/run-time-library-behavior.md#initializing-a-dll)
### <a name="what-do-you-want-to-know-more-about"></a>Que mais você deseja saber?
- [Nomes decorados](../build/reference/decorated-names.md)
- [Importando e exportando funções embutidas](../build/importing-and-exporting-inline-functions.md)
- [Importações mútuas](../build/mutual-imports.md)
## <a name="see-also"></a>Consulte também
[Exportando de uma DLL](../build/exporting-from-a-dll.md) | 48 | 640 | 0.772311 | por_Latn | 0.996497 |
8a25951c960aee55d158ae55aba8b5f81de033ce | 729 | md | Markdown | articles/virtual-network/virtual-networks-faq.md | yfakariya/azure-content-jajp | 69be88c0fee4443d5dcab82bf4aed6a155fea287 | [
"CC-BY-3.0"
] | 2 | 2016-09-23T01:46:35.000Z | 2016-09-23T05:12:58.000Z | articles/virtual-network/virtual-networks-faq.md | yfakariya/azure-content-jajp | 69be88c0fee4443d5dcab82bf4aed6a155fea287 | [
"CC-BY-3.0"
] | null | null | null | articles/virtual-network/virtual-networks-faq.md | yfakariya/azure-content-jajp | 69be88c0fee4443d5dcab82bf4aed6a155fea287 | [
"CC-BY-3.0"
] | 1 | 2020-11-04T04:29:27.000Z | 2020-11-04T04:29:27.000Z | <properties
pageTitle="Virtual Network FAQ"
description="Azure の仮想ネットワーク (VNet) に関する FAQ"
services="virtual-network"
documentationCenter="na"
authors="telmosampaio"
manager="carmonm"
editor="tysonn" />
<tags
ms.service="virtual-network"
ms.devlang="na"
ms.topic="article"
ms.tgt_pltfrm="na"
ms.workload="infrastructure-services"
ms.date="03/15/2016"
ms.author="telmos" />
# Virtual Network FAQ
[AZURE.INCLUDE [virtual-networks-vnet-faq-include](../../includes/virtual-networks-vnet-faq-include.md)]
## Virtual Network Cross-premises Connectivity (VPN)
仮想ネットワーク VPN の最新の FAQ については、[VPN ゲートウェイ FAQ](../vpn-gateway/vpn-gateway-vpn-faq.md) を参照してください。
<!---HONumber=AcomDC_0323_2016--> | 28.038462 | 104 | 0.714678 | eng_Latn | 0.224602 |
8a266f09a416a0b3cfa6f0aa8fa7bf12ac556ad3 | 351 | md | Markdown | JavaScript DSA/JSDSA_Day35/README.md | pooja-gera/TheWireUsChallenge | 18abb5ff3fd31b7dbfef41b8008f91d3fac029d3 | [
"MIT"
] | null | null | null | JavaScript DSA/JSDSA_Day35/README.md | pooja-gera/TheWireUsChallenge | 18abb5ff3fd31b7dbfef41b8008f91d3fac029d3 | [
"MIT"
] | null | null | null | JavaScript DSA/JSDSA_Day35/README.md | pooja-gera/TheWireUsChallenge | 18abb5ff3fd31b7dbfef41b8008f91d3fac029d3 | [
"MIT"
] | 1 | 2021-05-21T09:30:41.000Z | 2021-05-21T09:30:41.000Z | ## Day 35
---
### Find the middle element of a singly linked list
For this challenge, write a code to find the middle element of a singly linked list. To make things more interesting, try doing this in a single pass, i.e., you can traverse the list only once.
Example: 1 -> 3 -> 2 -> 5 -> 9
Your code should return 2 (since it is the middle element) | 43.875 | 193 | 0.717949 | eng_Latn | 0.999413 |
8a26ee91f1b3e500aed3ad95e3eababc935938af | 1,530 | md | Markdown | smartusersymbols/README.md | darkdragon-001/smartusersymbols | 49672395fe914cb31858ae8d27668c75b3fb693f | [
"MIT"
] | null | null | null | smartusersymbols/README.md | darkdragon-001/smartusersymbols | 49672395fe914cb31858ae8d27668c75b3fb693f | [
"MIT"
] | null | null | null | smartusersymbols/README.md | darkdragon-001/smartusersymbols | 49672395fe914cb31858ae8d27668c75b3fb693f | [
"MIT"
] | 1 | 2022-02-08T05:11:14.000Z | 2022-02-08T05:11:14.000Z | # Smart User Symbols Extension for Python-Markdown
## Usage
markdown.markdown(some_text, extensions=[SmartUserSymbolsExtension(option='value')])
or
markdown.markdown(some_text, extensions=['smartusersymbols'], extension_configs={'smartusersymbols': {'option': 'value'}})
## Configuration
### Default substitutions
- `symbols`: Symbols _(default: `True`)_
- `dice`: Dice _(default: `True`)_
- `arrows`: Arrows _(default: `True`)_
- `numbers`: Numbers in circles _(default: `True`)_
- `fractions`: Fractions _(default: `True`)_
- `math`: Math _(default: `True`)_
- `roman`: Roman numbers _(default: `True`)_
- `greek`: Greek letters _(default: `False`)_
- `ordinal_numbers`: Ordinal Numbers _(default: `True`)_
### User substiutions
**Option name:** `substitutions`
**Format:** Three different possibilities
- List of substitution pairs (most efficient)
[
('<-', '←'),
('<=', '≤'),
('%%%', lambda s: 'LaTeX'.lower())
]
- Dictionary (ensure unique keys)
{
'<-': '←',
'<=': '≤',
'%%%': lambda s: ('MyStRiNg'+s).lower()
}
- String with key/value pairs:
- Line syntax: `sss=c`.
- Last `=` is used to split.
- Whitespace is *not* removed.
- Comment syntax: `;COMMENT`.
- Empty lines are ignored.
"""
<-=←
<==≤
"""
## Documentation
Generate tables with all default symbol definitions
python3 ./smartusersymbols/smartusersymbols_patterns.py > tab.md
| 23.181818 | 126 | 0.602614 | eng_Latn | 0.455707 |
8a271624912ae929d5e5d2acde45028b09b52133 | 3,488 | md | Markdown | docs/_posts/2021-01-12-aws_network_access_control_list_deleted.md | drewchurch/security_content | 94950c337a9d59081ef08e53ee9c827f6f8169e9 | [
"Apache-2.0"
] | null | null | null | docs/_posts/2021-01-12-aws_network_access_control_list_deleted.md | drewchurch/security_content | 94950c337a9d59081ef08e53ee9c827f6f8169e9 | [
"Apache-2.0"
] | null | null | null | docs/_posts/2021-01-12-aws_network_access_control_list_deleted.md | drewchurch/security_content | 94950c337a9d59081ef08e53ee9c827f6f8169e9 | [
"Apache-2.0"
] | null | null | null | ---
title: "AWS Network Access Control List Deleted"
excerpt: "Disable or Modify Cloud Firewall"
categories:
- Cloud
last_modified_at: 2021-01-12
toc: true
toc_label: ""
tags:
- Anomaly
- T1562.007
- Disable or Modify Cloud Firewall
- Defense Evasion
- Splunk Security Analytics for AWS
- Splunk Enterprise
- Splunk Enterprise Security
- Splunk Cloud
- Actions on Objectives
---
[Try in Splunk Security Cloud](https://www.splunk.com/en_us/cyber-security.html){: .btn .btn--success}
#### Description
Enforcing network-access controls is one of the defensive mechanisms used by cloud administrators to restrict access to a cloud instance. After the attacker has gained control of the AWS console by compromising an admin account, they can delete a network ACL and gain access to the instance from anywhere. This search will query the AWS CloudTrail logs to detect users deleting network ACLs.
- **Type**: Anomaly
- **Product**: Splunk Security Analytics for AWS, Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
- **Datamodel**:
- **Last Updated**: 2021-01-12
- **Author**: Bhavin Patel, Patrick Bareiss, Splunk
- **ID**: ada0f478-84a8-4641-a3f1-d82362d6fd75
#### ATT&CK
| ID | Technique | Tactic |
| ----------- | ----------- | -------------- |
| [T1562.007](https://attack.mitre.org/techniques/T1562/007/) | Disable or Modify Cloud Firewall | Defense Evasion |
#### Search
```
`cloudtrail` eventName=DeleteNetworkAclEntry requestParameters.egress=false
| fillnull
| stats count min(_time) as firstTime max(_time) as lastTime by userName userIdentity.principalId eventName requestParameters.egress src userAgent
| `security_content_ctime(firstTime)`
| `security_content_ctime(lastTime)`
| `aws_network_access_control_list_deleted_filter`
```
#### Associated Analytic Story
* [AWS Network ACL Activity](/stories/aws_network_acl_activity)
#### How To Implement
You must install the AWS App for Splunk (version 5.1.0 or later) and Splunk Add-on for AWS (version 4.4.0 or later), then configure your AWS CloudTrail inputs.
#### Required field
* _time
* eventName
* requestParameters.egress
* userName
* userIdentity.principalId
* src
* userAgent
#### Kill Chain Phase
* Actions on Objectives
#### Known False Positives
It's possible that a user has legitimately deleted a network ACL.
#### RBA
| Risk Score | Impact | Confidence | Message |
| ----------- | ----------- |--------------|--------------|
| 5.0 | 10 | 50 | User $user_arn$ from $src$ has sucessfully deleted network ACLs entry (eventName= $eventName$), such that the instance is accessible from anywhere |
#### Reference
#### Test Dataset
Replay any dataset to Splunk Enterprise by using our [`replay.py`](https://github.com/splunk/attack_data#using-replaypy) tool or the [UI](https://github.com/splunk/attack_data#using-ui).
Alternatively you can replay a dataset into a [Splunk Attack Range](https://github.com/splunk/attack_range#replay-dumps-into-attack-range-splunk-server)
* [https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1562.007/aws_delete_acl/aws_cloudtrail_events.json](https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1562.007/aws_delete_acl/aws_cloudtrail_events.json)
[*source*](https://github.com/splunk/security_content/tree/develop/detections/cloud/aws_network_access_control_list_deleted.yml) \| *version*: **2** | 34.88 | 391 | 0.732798 | eng_Latn | 0.648512 |
8a272bc47bb1cf6a6d67db36401961afd78ba5a0 | 3,330 | md | Markdown | CHANGELOG.md | karimation/img-cli | e2f774fb951bb543cc3ea52855d2d48de5fe6420 | [
"MIT"
] | 12 | 2018-06-22T10:31:21.000Z | 2018-12-14T09:18:23.000Z | CHANGELOG.md | karimation/img-downloader | e2f774fb951bb543cc3ea52855d2d48de5fe6420 | [
"MIT"
] | 9 | 2020-05-30T14:45:34.000Z | 2021-09-02T11:57:15.000Z | CHANGELOG.md | karimation/img-downloader | e2f774fb951bb543cc3ea52855d2d48de5fe6420 | [
"MIT"
] | 2 | 2020-09-05T08:48:37.000Z | 2021-05-19T22:39:05.000Z | # [1.2.0](https://github.com/selmi-karim/img-cli/compare/v1.1.6...v1.2.0) (2020-05-30)
### Features
* add gpr ([8a74630](https://github.com/selmi-karim/img-cli/commit/8a746302b12008016bf1ff0c720b3724bb83d5a3))
## [1.1.6](https://github.com/selmi-karim/img-cli/compare/v1.1.5...v1.1.6) (2020-05-30)
### Bug Fixes
* ci registry update ([f6c094a](https://github.com/selmi-karim/img-cli/commit/f6c094a88a965bb6f78b64fb9acc4720aeaea186))
## [1.1.5](https://github.com/selmi-karim/img-cli/compare/v1.1.4...v1.1.5) (2020-05-30)
### Bug Fixes
* registry scop ([e58f28b](https://github.com/selmi-karim/img-cli/commit/e58f28b695ed495de5a1a22af6b6c1be2c265979))
## [1.1.4](https://github.com/selmi-karim/img-cli/compare/v1.1.3...v1.1.4) (2020-05-30)
### Bug Fixes
* npm registry ([41f71e6](https://github.com/selmi-karim/img-cli/commit/41f71e6b5dc451fb6d3c3cf262bba4ca05a1ea7e))
## [1.1.3](https://github.com/selmi-karim/img-cli/compare/v1.1.2...v1.1.3) (2020-05-30)
### Bug Fixes
* publish with semantic release ([ea83fbd](https://github.com/selmi-karim/img-cli/commit/ea83fbd56a6974381a3d5389717bb748ce422df5))
## [1.1.2](https://github.com/selmi-karim/img-cli/compare/v1.1.1...v1.1.2) (2020-05-30)
### Bug Fixes
* npm registry config ([ae9f3cf](https://github.com/selmi-karim/img-cli/commit/ae9f3cf75363ec1811b12758883a1f0281841708))
## [1.1.1](https://github.com/selmi-karim/img-cli/compare/v1.1.0...v1.1.1) (2020-05-30)
### Bug Fixes
* publish to npm ci ([e454753](https://github.com/selmi-karim/img-cli/commit/e4547531ccc1d2ca8223053f8b8037f6daecc0eb))
# [1.1.0](https://github.com/selmi-karim/img-cli/compare/v1.0.4...v1.1.0) (2020-05-30)
### Features
* sync gpr & npm ([4d45987](https://github.com/selmi-karim/img-cli/commit/4d4598768dd93315642571a431bb0140bdefc701))
## [1.0.4](https://github.com/selmi-karim/img-cli/compare/v1.0.3...v1.0.4) (2020-05-30)
### Bug Fixes
* publish config scope ([1c035c3](https://github.com/selmi-karim/img-cli/commit/1c035c35044ea9ae41f910dc2339d1add7b5ab11))
## [1.0.3](https://github.com/selmi-karim/img-cli/compare/v1.0.2...v1.0.3) (2020-05-30)
### Bug Fixes
* package scope ([4cd016f](https://github.com/selmi-karim/img-cli/commit/4cd016f5cc0beb001a8546113ba2c583fec8b349))
* publish config ([b0a933d](https://github.com/selmi-karim/img-cli/commit/b0a933d53f82b3c00dd084cc2c6d79b617b4b38e))
* semantic release assets ([2e8d6b8](https://github.com/selmi-karim/img-cli/commit/2e8d6b8966983bdc599a89443ed30b7b925f95ce))
## [1.0.2](https://github.com/selmi-karim/img-cli/compare/v1.0.1...v1.0.2) (2020-05-30)
### Bug Fixes
* publish to gpr ([033019e](https://github.com/selmi-karim/img-cli/commit/033019eadff0358fd99dd56e905052094bed767c))
## [1.0.1](https://github.com/selmi-karim/img-cli/compare/v1.0.0...v1.0.1) (2020-05-30)
### Bug Fixes
* pipeline naming ([168abc8](https://github.com/selmi-karim/img-cli/commit/168abc8c42e525465f0d44b289c09ba5677c2273))
# 1.0.0 (2020-05-30)
### Bug Fixes
* commitlint config ([187bc63](https://github.com/selmi-karim/img-cli/commit/187bc63977252c300810b92821be3ed789d6181f))
* remove stylelint ([37c912b](https://github.com/selmi-karim/img-cli/commit/37c912b069de2ad1f8f6fb9d51a3eb722f483f7f))
* reposity url ([76baff9](https://github.com/selmi-karim/img-cli/commit/76baff9de961273ac4288f648bb8fb46ec990091))
| 35.052632 | 131 | 0.733333 | yue_Hant | 0.180195 |
8a272c41274f7e3d6bd8ae24d186207140399646 | 13,368 | md | Markdown | articles/azure-monitor/learn/mobile-center-quickstart.md | karoldeland/azure-docs.fr-fr | ebb12f93459e6f9cf38b50b296d81a2322949780 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | articles/azure-monitor/learn/mobile-center-quickstart.md | karoldeland/azure-docs.fr-fr | ebb12f93459e6f9cf38b50b296d81a2322949780 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | articles/azure-monitor/learn/mobile-center-quickstart.md | karoldeland/azure-docs.fr-fr | ebb12f93459e6f9cf38b50b296d81a2322949780 | [
"CC-BY-4.0",
"MIT"
] | null | null | null | ---
title: Superviser des applications mobiles avec Azure Monitor Application Insights
description: Fournit des instructions permettant de configurer rapidement une application mobile pour sa supervision avec Azure Monitor Application Insights et App Center
ms.subservice: application-insights
ms.topic: quickstart
author: mrbullwinkle
ms.author: mbullwin
ms.date: 06/26/2019
ms.reviewer: daviste
ms.custom: mvc
ms.openlocfilehash: a59a6841a1db3cecfe52c54135b42f5b6a095ce3
ms.sourcegitcommit: c2065e6f0ee0919d36554116432241760de43ec8
ms.translationtype: HT
ms.contentlocale: fr-FR
ms.lasthandoff: 03/26/2020
ms.locfileid: "77660289"
---
# <a name="start-analyzing-your-mobile-app-with-app-center-and-application-insights"></a>Commencer à analyser votre application mobile avec App Center et Application Insights
Ce démarrage rapide vous guide tout au long de la connexion de l’instance App Center de votre application à Application Insights. Avec Application Insights, vous pouvez interroger, segmenter, filtrer et analyser vos données de télémétrie avec davantage d’outils puissants que ceux disponibles à partir du service [Analytics](https://docs.microsoft.com/mobile-center/analytics/) d’App Center.
## <a name="prerequisites"></a>Conditions préalables requises
Pour effectuer ce démarrage rapide, les éléments suivants sont requis :
- Un abonnement Azure.
- Une application iOS, Android, Xamarin, Universal Windows ou React Native.
Si vous n’avez pas d’abonnement Azure, créez un compte [gratuit](https://azure.microsoft.com/free/) avant de commencer.
## <a name="sign-up-with-app-center"></a>S’inscrire auprès d’App Center
Pour commencer, créez un compte et [inscrivez-vous à App Center](https://appcenter.ms/signup?utm_source=ApplicationInsights&utm_medium=Azure&utm_campaign=docs).
## <a name="onboard-to-app-center"></a>Intégrer l’application à App Center
Avant de pouvoir utiliser Application Insights avec votre application mobile, vous devez intégrer celle-ci à [App Center](https://docs.microsoft.com/mobile-center/). Application Insights ne reçoit pas de données de télémétrie directement de votre application mobile. Au lieu de cela, votre application envoie les données de télémétrie d’événements personnalisés à App Center. Ensuite, App Center exporte en continu des copies de ces événements personnalisés vers Application Insights à mesure que les événements sont reçus. (Cela ne concerne pas le [Kit de développement logiciel (SDK) JS Application Insights](https://github.com/Microsoft/ApplicationInsights-JS) ou le [plug-in React Native](https://github.com/Microsoft/ApplicationInsights-JS/tree/master/vNext/extensions/applicationinsights-react-native) dont la télémétrie est envoyée directement à Application Insights.)
Pour intégrer votre application, suivez le démarrage rapide d’App Center pour chaque plateforme qu’elle prend en charge. Créez des instances distinctes d’App Center pour chaque plateforme :
* [iOS](https://docs.microsoft.com/mobile-center/sdk/getting-started/ios)
* [Android](https://docs.microsoft.com/mobile-center/sdk/getting-started/android)
* [Xamarin](https://docs.microsoft.com/mobile-center/sdk/getting-started/xamarin)
* [Windows universel](https://docs.microsoft.com/mobile-center/sdk/getting-started/uwp)
* [React Native](https://docs.microsoft.com/mobile-center/sdk/getting-started/react-native)
## <a name="track-events-in-your-app"></a>Suivre les événements dans votre application
Une fois votre application intégrée à App Center, vous devez la modifier pour envoyer les données de télémétrie des événements personnalisés à l’aide du Kit de développement logiciel (SDK) App Center. Les événements personnalisés sont le seul type de données de télémétrie App Center qui est exporté vers Application Insights.
Pour envoyer des événements personnalisés à partir d’applications iOS, utilisez la méthode `trackEvent` ou `trackEvent:withProperties` dans le Kit de développement logiciel (SDK) App Center. [Découvrez plus en détail le suivi des événements à partir des applications iOS.](https://docs.microsoft.com/mobile-center/sdk/analytics/ios)
```Swift
MSAnalytics.trackEvent("Video clicked")
```
Pour envoyer des événements personnalisés à partir d’applications Android, utilisez la méthode `trackEvent` dans le Kit de développement logiciel (SDK) App Center. [Découvrez plus en détail le suivi des événements à partir des applications Android.](https://docs.microsoft.com/mobile-center/sdk/analytics/android)
```Java
Analytics.trackEvent("Video clicked")
```
Pour envoyer des événements personnalisés à partir d’autres plateformes d’applications, utilisez les méthodes `trackEvent` dans leurs Kits de développement logiciel (SDK) App Center.
Pour vous assurer que vos événements personnalisés sont reçus, accédez à l’onglet **Événements** sous la section **Analytique** dans App Center. Quelques minutes peuvent s’écouler entre l’envoi des événements à partir de votre application et leur affichage.
## <a name="create-an-application-insights-resource"></a>Création d’une ressource Application Insights dans Azure
Dès que votre application envoie des événements personnalisés et que ces derniers sont reçus par App Center, vous devez créer une ressource Application Insights de type App Center dans le Portail Azure :
1. Connectez-vous au [portail Azure](https://portal.azure.com/).
2. Sélectionnez **Créer une ressource** > **Outils de développement** > **Application Insights**.
> [!NOTE]
> Si c’est la première fois que vous créez une ressource Application Insights, vous pouvez en apprendre davatange en vous rendant sur la documentation [Créer une ressource Application Insights](https://docs.microsoft.com/azure/azure-monitor/app/create-new-resource).
Une boîte de configuration s’affiche. Utilisez le tableau ci-dessous pour remplir les champs d’entrée.
| Paramètres | Valeur | Description |
| ------------- |:-------------|:-----|
| **Nom** | Une valeur globale unique, comme « myApp-iOS » | Nom identifiant l’application que vous analysez |
| **Groupe de ressources** | Un nouveau groupe de ressources, ou un groupe de ressources existant à partir du menu | Groupe de ressources dans lequel créer la ressource Application Insights |
| **Lieu** | Un emplacement à partir du menu | Choisissez un emplacement près de chez vous ou proche de l’endroit où votre application est hébergée |
3. Cliquez sur **Créer**.
Si votre application prend en charge plusieurs plateformes (iOS, Android, etc.), il est préférable de créer des ressources Application Insights distinctes, à raison d’une par plateforme.
## <a name="export-to-application-insights"></a>Exporter vers Application Insights
Dans votre nouvelle ressource Application Insights sur la page **Vue d’ensemble**. Copiez la clé d’instrumentation depuis votre ressource.
Dans l’instance [App Center](https://appcenter.ms/) pour votre application :
1. Dans la page **Paramètres**, cliquez sur **Exporter**.
2. Choisissez **Nouvelle exportation**, choisissez **Application Insights**, puis cliquez sur **Personnaliser**.
3. Collez la clé d’instrumentation Application Insights dans la zone.
4. Acceptez d’accroître l’utilisation de l’abonnement Azure contenant votre ressource Application Insights. Chaque ressource Application Insights est gratuite pour le premier Go de données reçues par mois. [Découvrez plus en détail les tarifs Application Insights.](https://azure.microsoft.com/pricing/details/application-insights/)
N’oubliez pas de répéter ce processus pour chaque plateforme prise en charge par votre application.
Une fois [l’exportation](https://docs.microsoft.com/mobile-center/analytics/export) configurée, chaque événement personnalisé reçu par App Center est copié dans Application Insights. Plusieurs minutes pouvant s’écouler avant que les événements n’atteignent Application Insights, s’ils n’apparaissent pas immédiatement, attendez un peu avant d’effectuer des diagnostics.
Pour que vous disposiez de davantage de données à la première connexion, les 48 heures d’événements personnalisés les plus récentes dans App Center sont automatiquement exportées vers Application Insights.
## <a name="start-monitoring-your-app"></a>Démarrer la surveillance de votre application
Application Insights peut interroger, segmenter, filtrer et analyser les données de télémétrie des événements personnalisés à partir de vos applications, au-delà des outils d’analytique fournis par App Center.
1. **Interroger les données de télémétrie de vos événements personnalisés.** Dans la page **Vue d’ensemble** d’Application Insights, choisissez **Logs (Analytics)** .
Le portail Application Insights Logs (Analytics) associé à votre ressource Application Insights s’ouvre. Le portail Logs (Analytics) vous permet d’interroger directement vos données à l’aide du langage de requête Log Analytics ; vous pouvez ainsi poser des questions arbitrairement complexes sur votre application et ses utilisateurs.
Ouvrez un nouvel onglet dans le portail Logs (Analytics), puis collez la requête suivante. Elle retourne pour chaque événement personnalisé et par ordre décroissant le nombre d’utilisateurs distincts ayant envoyé cet événement à partir de votre application au cours des dernières 24 heures.
```AIQL
customEvents
| where timestamp >= ago(24h)
| summarize dcount(user_Id) by name
| order by dcount_user_Id desc
```
![Portail Logs (Analytics)](./media/mobile-center-quickstart/analytics-portal-001.png)
1. Sélectionnez la requête en cliquant n’importe où sur celle-ci dans l’éditeur de texte.
2. Ensuite, cliquez sur **Accéder** pour exécuter la requête.
Découvrez-en plus sur [Application Insights Analytics](../../azure-monitor/app/analytics.md) et le [langage de requête Log Analytics](https://aka.ms/LogAnalyticsLanguageReference).
2. **Segmenter et filtrer les données de télémétrie de vos événements personnalisés.** Dans la page **Vue d’ensemble** d’Application Insights, choisissez **Utilisateurs** dans la table des matières.
![Icône de l’outil Utilisateurs](./media/mobile-center-quickstart/users-icon-001.png)
L’outil Utilisateurs affiche le nombre d’utilisateurs de votre application qui ont cliqué sur certains boutons, visité certains écrans ou effectué toute autre action faisant de votre part l’objet d’un suivi en tant qu’événement avec le Kit de développement logiciel (SDK) App Center. Si vous recherchez un moyen de segmenter et de filtrer vos événements App Center, l’outil Utilisateurs est un excellent choix.
![Outil Utilisateurs](./media/mobile-center-quickstart/users-001.png)
Par exemple, segmentez l’utilisation par zone géographique en choisissant **Pays ou région** dans le menu déroulant **Et par**.
3. **Analyser des modèles de conversion, de rétention et navigation dans votre application.** Dans la page **Vue d’ensemble** d’Application Insights, choisissez **Flux d’utilisateurs** dans la table des matières.
![Outil Flux d’utilisateurs](./media/mobile-center-quickstart/user-flows-001.png)
L’outil Flux d’utilisateurs visualise les événements qu’envoie les utilisateurs après un événement de début. Il est utile pour obtenir une vue d’ensemble de la façon dont les utilisateurs parcourent votre application. Il peut aussi révéler des endroits de votre application où les utilisateurs ne vont plus ou répètent la même action encore et encore.
Outre Flux d’utilisateurs, Application Insights dispose de plusieurs outils d’analyse du comportement des utilisateurs pour répondre à des questions spécifiques :
* **Entonnoirs**, pour analyser et surveiller le taux de conversion.
* **Rétention**, pour analyser dans quelle mesure votre application conserve les utilisateurs au fil du temps.
* **Classeurs**, pour combiner des visualisations et du texte dans un rapport partageable.
* **Cohortes**, pour nommer et enregistrer des groupes d’utilisateurs ou d’événements spécifiques afin qu’ils puissent être facilement référencés à partir d’autres outils d’analytique.
## <a name="clean-up-resources"></a>Nettoyer les ressources
Si vous ne souhaitez pas continuer à utiliser Application Insights avec App Center, désactivez l’exportation dans App Center, puis supprimez la ressource Application Insights. Ainsi, vous ne serez plus facturé par Application Insights pour cette ressource.
Pour désactiver l’exportation dans App Center :
1. Dans App Center, accédez à **Paramètres** et choisissez **Exporter**.
2. Cliquez sur l’exportation d’Application Insights à supprimer, puis cliquez sur **Supprimer l’exportation** en bas et confirmez l’opération.
Pour supprimer la ressource Application Insights :
1. Dans le menu de gauche du portail Azure, cliquez sur **Groupes de ressources**, puis choisissez le groupe de ressources dans lequel votre ressource Application Insights a été créée.
2. Ouvrez la ressource Application Insights à supprimer. Ensuite, cliquez sur **Supprimer** dans le menu supérieur de la ressource, puis confirmez l’opération. Cette opération supprime définitivement la copie des données qui ont été exportées vers Application Insights.
## <a name="next-steps"></a>Étapes suivantes
> [!div class="nextstepaction"]
> [Comprendre comment les clients utilisent votre application](../../azure-monitor/app/usage-overview.md)
| 78.175439 | 875 | 0.788824 | fra_Latn | 0.957294 |
8a274bf58de328e57b50337b93027684be952e4a | 388 | md | Markdown | README.md | dongli/fishman | 7139ab1f7b0b55434445938099a8c08cceb48fd6 | [
"MIT"
] | 10 | 2019-04-18T07:49:32.000Z | 2020-01-14T07:16:57.000Z | README.md | dongli/fishman | 7139ab1f7b0b55434445938099a8c08cceb48fd6 | [
"MIT"
] | 2 | 2019-04-19T14:53:21.000Z | 2019-04-19T14:56:14.000Z | README.md | dongli/fishman | 7139ab1f7b0b55434445938099a8c08cceb48fd6 | [
"MIT"
] | 3 | 2019-11-14T14:47:41.000Z | 2021-10-08T15:06:53.000Z | # Introduction
This project is used to generate Spherical Centroidal Voronoi Tessellation (SCVT) mesh for using in geophysical modeling. All the codes are written in Fortran. Currently we only added the Delaunay triangulation and corresponding Voronoi diagram codes, so stay tuned!
![](https://user-images.githubusercontent.com/367959/56429642-3f995100-62f6-11e9-8008-4c931ff07c47.jpg)
| 64.666667 | 266 | 0.819588 | eng_Latn | 0.94241 |
8a274e8ae4b72f5ba691dadcea4fb9dc81d77e8d | 74 | md | Markdown | README.md | igorzel/nodemcu_devices_soft | 55f6e3997aa29350544a9aef6653e7060320bce6 | [
"MIT"
] | null | null | null | README.md | igorzel/nodemcu_devices_soft | 55f6e3997aa29350544a9aef6653e7060320bce6 | [
"MIT"
] | null | null | null | README.md | igorzel/nodemcu_devices_soft | 55f6e3997aa29350544a9aef6653e7060320bce6 | [
"MIT"
] | null | null | null | # nodemcu_devices_soft
Lua scripts for smart home devices running Nodemcu
| 24.666667 | 50 | 0.851351 | eng_Latn | 0.934719 |
8a27ca3df391d10f122b217de865887127481b83 | 2,633 | md | Markdown | foundry-linux-server-setup.md | tiagosomda/foundry-vtt-server | b82c201dc9da58c044b99bb262875b5bdfae5706 | [
"MIT"
] | 1 | 2020-06-04T20:32:35.000Z | 2020-06-04T20:32:35.000Z | foundry-linux-server-setup.md | tiagosomda/foundry-vtt-server | b82c201dc9da58c044b99bb262875b5bdfae5706 | [
"MIT"
] | null | null | null | foundry-linux-server-setup.md | tiagosomda/foundry-vtt-server | b82c201dc9da58c044b99bb262875b5bdfae5706 | [
"MIT"
] | null | null | null | # Foundry VTT Linux Server Setup
## Create Linux VM
- vm settings to be determined
- add inbound port rule
- source : *
- destination : 24670
- protocol : TCP
## Install Tools on VM
- open a bash terminal
- ssh into the terminal
- `ssh <username>@<vm's ip address>`
- run the following commands:
- `sudo apt-get update`
- `sudo apt install make`
- `sudo apt install gcc`
- this one is only required for running no ip
- `sudo apt install unzip`
- `wget -qO- https://raw.githubusercontent.com/nvm-sh/nvm/v0.35.3/install.sh | bash`
- `source ~/.bashrc`
- `nvm install nvm install v12.17.0`
## Download FoundryVTT
- download the foundry nodejs zip to your device
- open a bash terminal
- copy the zip into the vm previously created
- `scp foundryvtt-0.6.0.zip <username>@<vm's ip address>`
- ssh into the vm
- unzip `foundryvtt-0.6.0.zip` into a desired location
- `unzip foundryvtt-0.6.0.zip -d foundry/bin/foundryvtt-0.6.0/`
- create foundry vtt data folder
- `mkdir foundry/data`
## Setup NoIp service
### Reserve Hostname on No IP
- create account on https://www.noip.com/
- reserve a host name
- I recommend using a free domain such as "servegame.com"
- there are other domains to pick from as well
- I am using "foundry.servegame.com" as an example here
### Setup VM to out update its IP address
This will allow you to access your foundry vtt instance via an url like this:
- http://foundry.servegame.com:24670
Here are the full instructions:
- https://www.noip.com/support/knowledgebase/installing-the-linux-dynamic-update-client-on-ubuntu/
It basically sums up to these steps:
- `cd /usr/local/src/`
- `sudo wget http://www.noip.com/client/linux/noip-duc-linux.tar.gz`
- `sudo tar xf noip-duc-linux.tar.gz`
- `cd noip-2.1.9-1/`
- `sudo make install`
- you will be prompted with:
- login/email for noip.com
- password for the above login/email noip.com account
- if you want to sync all host names to this machine - pick no : N
- it will then ask if you want to update for each of the host names you have in the account. Say yes to the one you want
- in our case : `foundry.servegame.com`
- how often you want to update the host with the VM's ip address
- pick the default : 30
- `sudo /usr/local/bin/noip2 -C`
- you will be prompted again with the same questions
- `sudo /usr/local/bin/noip2`
## Start Server
- open a bash terminal and ssh into the server
- `ssh <username>@<vm's ip address>`
- start foundry vtt server
- `node $HOME/foundry/bin/foundryvtt-0.6.0/resources/app/main.js --dataPath=$HOME/foundry/data --port=24670`
| 35.581081 | 126 | 0.701481 | eng_Latn | 0.963046 |
8a27eb7c64a368f1da4fe19e6807dcf63dd8001c | 3,643 | md | Markdown | README.md | yuuhakobe/yuuhakobe | e4e0aa6aa7a1cb27bbf514c0f39382ad32199adf | [
"Apache-2.0"
] | 4 | 2021-01-05T19:51:56.000Z | 2021-01-06T13:27:11.000Z | README.md | yuuhakobe/yuuhakobe | e4e0aa6aa7a1cb27bbf514c0f39382ad32199adf | [
"Apache-2.0"
] | null | null | null | README.md | yuuhakobe/yuuhakobe | e4e0aa6aa7a1cb27bbf514c0f39382ad32199adf | [
"Apache-2.0"
] | null | null | null | <a> <img src="https://github.com/yuuhakobe/yuuhakobe/blob/main/assets/hakobeFioletFixed-min.jpg" alt="banner image"> </a>
### About me
My name is Yuu and i'm 17 years old programmer! <br />
I'm web and python developer! <br />
I'm student of cybersecurity in school Latvia PIKC Saldus Tehnikums <br />
Now i learning JavaScript | beginer on freelance <br />
I live in Latvia and i can speak on 4 languages - russian, latvian, english and japanese! <br />
### Languages and Tools
![HTML](https://img.shields.io/badge/-HTML-DD4B25?style=for-the-badge&logo=html5&logoColor=ffffff)
![CSS](https://img.shields.io/badge/-CSS-1572B6?style=for-the-badge&logo=css3&logoColor=ffffff)
![PHP](https://img.shields.io/badge/-PHP-777BB4?style=for-the-badge&logo=php&logoColor=ffffff)
![SQL](https://img.shields.io/badge/-SQL-4479A1?style=for-the-badge&logo=mysql&logoColor=ffffff)
![PY](https://img.shields.io/badge/-Python-3776AB?style=for-the-badge&logo=python&logoColor=ffffff)
![LINUX](https://img.shields.io/badge/-LINUX-FCC624?style=for-the-badge&logo=linux&logoColor=ffffff)
![Pawn](https://img.shields.io/badge/-PAWN-FF8700?style=for-the-badge&logo=planet&logoColor=ffffff)
![GIT](https://img.shields.io/badge/-GIT-F05032?style=for-the-badge&logo=git&logoColor=ffffff)
![github](https://img.shields.io/badge/-GITHUB-181717?style=for-the-badge&logo=github&logoColor=ffffff)
![VSC](https://img.shields.io/badge/-VSC-007ACC?style=for-the-badge&logo=visual-studio-code&logoColor=ffffff)
![sublime](https://img.shields.io/badge/-Sublime-FF9800?style=for-the-badge&logo=sublime-text&logoColor=ffffff)
![ps](https://img.shields.io/badge/-PhotoShop-31A8FF?style=for-the-badge&logo=Adobe-photoshop&logoColor=ffffff)
![FIGMA](https://img.shields.io/badge/-FIGMA-F24E1E?style=for-the-badge&logo=figma&logoColor=ffffff)
### Contact us
email - yuuhakobe1200@gmail.com <br />
discord - yuuhakobe#1112 <br />
phone - +(371) 25-511-203 <br />
### Folow me
[![YouTube](https://img.shields.io/badge/-YouTube-FF0000?style=for-the-badge&logo=YouTube&logoColor=FFFFFF)][youtube]
[![Instagram](https://img.shields.io/badge/-Instagram-B4068E?style=for-the-badge&logo=instagram&logoColor=FFFFFF)][instagram]
[![Telegram](https://img.shields.io/badge/-Telegram-27A0D9?style=for-the-badge&logo=telegram&logoColor=FFFFFF)][telegram]
[![LinkedIn](https://img.shields.io/badge/-LinkedIn-007BB6?style=for-the-badge&logo=linkedin&logoColor=FFFFFF)][linkedin]
[![Vkontakte](https://img.shields.io/badge/-Vkontakte-4F7DB3?style=for-the-badge&logo=Vk&logoColor=FFFFFF)][vk]
[![Twitter](https://img.shields.io/badge/-Twitter-1C9DEB?style=for-the-badge&logo=Twitter&logoColor=FFFFFF)][twitter]
[![Steam](https://img.shields.io/badge/-Steam-1B2838?style=for-the-badge&logo=steam&logoColor=FFFFFF)](https://steamcommunity.com/id/ThisIsHakobeBitch/)
### Stats
![Anurag's github stats](https://github-readme-stats.vercel.app/api?username=yuuhakobe&show_icons=true&theme=react)
[![Top Langs](https://github-readme-stats.vercel.app/api/top-langs/?username=yuuhakobe&layout=compact&theme=react)](https://github.com/anuraghazra/github-readme-stats)
[<img alt="CodeWars" height="50px" width="300px" src="https://www.codewars.com/users/yuuhakobe/badges/large" />][codewars]
[linkedin]: https://www.linkedin.com/in/yuu-hakobe-a1a146203/
[steam]: https://steamcommunity.com/id/ThisIsHakobeBitch/
[twitter]: https://twitter.com/Yuu23290394/
[vk]: https://vk.com/yuuhakobe/
[telegram]: https://t.me/yuuhakobe/
[instagram]: https://www.instagram.com/raivis.yuuhakobe/
[youtube]: https://www.youtube.com/channel/UCPRxtrwRtgYfmCpgUoJ_DQw/
[codewars]: https://www.codewars.com/users/yuuhakobe/
| 67.462963 | 167 | 0.757617 | yue_Hant | 0.617587 |
8a2833d57f35cad7a63d10f99d6fa38a39b44f96 | 4,164 | md | Markdown | README.md | zsunberg/QuickPOMDPs.jl | 404d0025bfc335c1b85a2618c3aebc899be1d1d7 | [
"MIT"
] | null | null | null | README.md | zsunberg/QuickPOMDPs.jl | 404d0025bfc335c1b85a2618c3aebc899be1d1d7 | [
"MIT"
] | null | null | null | README.md | zsunberg/QuickPOMDPs.jl | 404d0025bfc335c1b85a2618c3aebc899be1d1d7 | [
"MIT"
] | null | null | null | # QuickPOMDPs
[![Build Status](https://travis-ci.org/JuliaPOMDP/QuickPOMDPs.jl.svg?branch=master)](https://travis-ci.org/JuliaPOMDP/QuickPOMDPs.jl)
[![Docs - Stable](https://img.shields.io/badge/docs-stable-blue.svg)](https://JuliaPOMDP.github.io/QuickPOMDPs.jl/stable)
[![Docs - Dev](https://img.shields.io/badge/docs-dev-blue.svg)](https://JuliaPOMDP.github.io/QuickPOMDPs.jl/dev)
[![Coverage Status](https://coveralls.io/repos/JuliaPOMDP/QuickPOMDPs.jl/badge.svg?branch=master&service=github)](https://coveralls.io/github/JuliaPOMDP/QuickPOMDPs.jl?branch=master)
[![codecov.io](http://codecov.io/github/JuliaPOMDP/QuickPOMDPs.jl/coverage.svg?branch=master)](http://codecov.io/github/JuliaPOMDP/QuickPOMDPs.jl?branch=master)
Simplified interfaces for specifying [POMDPs.jl](https://github.com/JuliaPOMDP/POMDPs.jl) models.
The package contains two interfaces - the Quick interface, and the Discrete Explicit interface.
**Please see [the documentation](https://JuliaPOMDP.github.io/QuickPOMDPs.jl/stable) for more information on each.**
The package can also be used from **[Python](https://www.python.org)** via [pyjulia](https://github.com/JuliaPy/pyjulia). See [examples/tiger.py](https://github.com/JuliaPOMDP/QuickPOMDPs.jl/blob/master/examples/tiger.py) for an example.
## Quick Interface
The Quick Interface exposes nearly all of the features of POMDPs.jl as constructor keyword arguments. [Documentation](https://juliapomdp.github.io/QuickPOMDPs.jl/stable/quick/), Mountain Car Example:
```julia
mountaincar = QuickMDP(
gen = function (s, a, rng)
x, v = s
vp = clamp(v + a*0.001 + cos(3*x)*-0.0025, -0.07, 0.07)
xp = x + vp
if xp > 0.5
r = 100.0
else
r = -1.0
end
return (sp=(xp, vp), r=r)
end,
actions = [-1., 0., 1.],
initialstate = Deterministic((-0.5, 0.0)),
discount = 0.95,
isterminal = s -> s[1] > 0.5
)
```
Tiger POMDP Example:
```julia
tiger = QuickPOMDP(
states = ["left", "right"],
actions = ["left", "right", "listen"],
observations = ["left", "right"],
initialstate = Uniform(["left", "right"]),
discount = 0.95,
transition = function (s, a)
if a == "listen"
return Deterministic(s) # tiger stays behind the same door
else # a door is opened
return Uniform(["left", "right"]) # reset
end
end,
observation = function (s, a, sp)
if a == "listen"
if sp == "left"
return SparseCat(["left", "right"], [0.85, 0.15]) # sparse categorical distribution
else
return SparseCat(["right", "left"], [0.85, 0.15])
end
else
return Uniform(["left", "right"])
end
end,
reward = function (s, a)
if a == "listen"
return -1.0
elseif s == a # the tiger was found
return -100.0
else # the tiger was escaped
return 10.0
end
end
)
```
## Discrete Explicit Interface
The Discrete Explicit Interface is an older, less powerful interface suitable for problems with small discrete state, action, and observation spaces. Though it is less powerful, the interface may be pedagogically useful because each element of the (S, A, O, R, T, Z, γ) tuple for a POMDP and (S, A, R, T, γ) tuple for an MDP is defined explicitly in a straightforward manner. [Documentation](https://juliapomdp.github.io/QuickPOMDPs.jl/stable/discrete_explicit/), Tiger POMDP Example:
```julia
S = [:left, :right]
A = [:left, :right, :listen]
O = [:left, :right]
γ = 0.95
function T(s, a, sp)
if a == :listen
return s == sp
else # a door is opened
return 0.5 #reset
end
end
function Z(a, sp, o)
if a == :listen
if o == sp
return 0.85
else
return 0.15
end
else
return 0.5
end
end
function R(s, a)
if a == :listen
return -1.0
elseif s == a # the tiger was found
return -100.0
else # the tiger was escaped
return 10.0
end
end
m = DiscreteExplicitPOMDP(S,A,O,T,Z,R,γ)
```
| 33.312 | 484 | 0.623679 | eng_Latn | 0.561208 |
8a28a85b715ed594405ef21b71216ba6dd1e6234 | 6,135 | md | Markdown | microsoft-365/security/defender/eval-defender-endpoint-enable-eval.md | MicrosoftDocs/microsoft-365-docs-pr.ru-RU | 947749e0452218e6138a4670c79234ef2ff931d0 | [
"CC-BY-4.0",
"MIT"
] | 6 | 2020-05-18T20:11:53.000Z | 2022-03-09T07:28:00.000Z | microsoft-365/security/defender/eval-defender-endpoint-enable-eval.md | MicrosoftDocs/microsoft-365-docs-pr.ru-RU | 947749e0452218e6138a4670c79234ef2ff931d0 | [
"CC-BY-4.0",
"MIT"
] | 2 | 2022-02-09T06:46:54.000Z | 2022-02-09T06:47:26.000Z | microsoft-365/security/defender/eval-defender-endpoint-enable-eval.md | MicrosoftDocs/microsoft-365-docs-pr.ru-RU | 947749e0452218e6138a4670c79234ef2ff931d0 | [
"CC-BY-4.0",
"MIT"
] | 6 | 2019-10-09T19:42:18.000Z | 2021-10-09T11:05:00.000Z | ---
title: Включить microsoft Defender для оценки конечной точки
description: Включите Microsoft 365 Defender пробную или пилотную среду, включая проверку состояния лицензии и конечные точки на борту
search.product: eADQiWindows 10XVcnh
search.appverid: met150
ms.prod: m365-security
ms.mktglfcycl: deploy
ms.sitesec: library
ms.pagetype: security
f1.keywords:
- NOCSH
ms.author: macapara
author: mjcaparas
ms.date: 07/09/2021
ms.localizationpriority: medium
manager: dansimp
audience: ITPro
ms.collection:
- M365-security-compliance
- m365solution-overview
- m365solution-evalutatemtp
ms.topic: conceptual
ms.technology: m365d
ms.openlocfilehash: ddf7af50edd8f86ec7bc176d851ae2ba98b8fa51
ms.sourcegitcommit: d4b867e37bf741528ded7fb289e4f6847228d2c5
ms.translationtype: MT
ms.contentlocale: ru-RU
ms.lasthandoff: 10/06/2021
ms.locfileid: "60181155"
---
# <a name="enable-microsoft-defender-for-endpoint-evaluation-environment"></a>Включить среду оценки конечных точек Microsoft Defender
В этой статье вы сможете с помощью производственных устройств принять меры по настройке среды оценки для Microsoft Defender для конечной точки.
> [!TIP]
> Microsoft Defender для endpoint также поставляется с лабораторией оценки в продукте, где можно добавить предварительно настроенные устройства и запустить моделирование для оценки возможностей платформы. В лаборатории имеется упрощенная настройка, которая поможет быстро продемонстрировать значение Microsoft Defender для конечной точки, включая руководство по многим функциям, таким как расширенный анализ охоты и аналитики угроз. Дополнительные сведения см. в [дополнительных сведениях о возможностях Оценки.](../defender-endpoint/evaluation-lab.md) <br> Основное отличие руководства, представленного в этой статье, от лаборатории оценки состоит в том, что среда оценки использует производственные устройства, в то время как лаборатория оценки использует непроизводимые устройства.
Чтобы включить оценку для Microsoft Defender для конечной точки, используйте следующие действия.
![Действия, чтобы включить Microsoft Defender для конечной точки в среде оценки Microsoft Defender.](../../media/defender/m365-defender-endpoint-eval-enable-steps.png)
- [Шаг 1. Проверка состояния лицензии](#step-1-check-license-state)
- [Шаг 2. Конечные точки на борту](#step-2-onboard-endpoints-using-any-of-the-supported-management-tools)
## <a name="step-1-check-license-state"></a>Этап 1. Проверка состояния лицензии
Сначала необходимо проверить состояние лицензии, чтобы убедиться, что оно было правильно заложено. Это можно сделать через центр администрирования или через **портал Microsoft Azure.**
1. Чтобы просмотреть лицензии, перейдите на портал **Microsoft Azure и** перейдите в раздел лицензии Microsoft Azure [портала](https://portal.azure.com/#blade/Microsoft_AAD_IAM/LicensesMenuBlade/Products).
![Изображение страницы лицензирования Azure.](../../media/defender/atp-licensing-azure-portal.png)
1. Поочередно в центре администрирования перейдите к **подпискам на** > **биллинг.**
На экране вы увидите все предварительные лицензии и их текущее **состояние.**
![Изображение лицензий на выставление счета.](../../media/defender/atp-billing-subscriptions.png)
## <a name="step-2-onboard-endpoints-using-any-of-the-supported-management-tools"></a>Этап 2. Конечные точки на борту с использованием любого из поддерживаемых средств управления
После проверки правильного состояния лицензии можно запустить бортовые устройства в службу.
Для оценки Microsoft Defender для конечной точки рекомендуется выбрать несколько Windows для проведения оценки.
Вы можете использовать любой из поддерживаемых средств управления, но Intune обеспечивает оптимальную интеграцию. Дополнительные сведения см. в [веб-сайте Configure Microsoft Defender for Endpoint в Microsoft Intune.](/mem/intune/protect/advanced-threat-protection-configure#enable-microsoft-defender-for-endpoint-in-intune)
В [разделе Развертывание](../defender-endpoint/deployment-strategy.md) Plan описаны общие действия, которые необходимо предпринять для развертывания Defender для конечной точки.
Просмотрите это видео, чтобы получить краткий обзор процесса работы с бортовой частью и узнать о доступных средствах и методах.
> [!VIDEO https://www.microsoft.com/videoplayer/embed/RE4bGqr]
### <a name="onboarding-tool-options"></a>Параметры onboarding tool
В следующей таблице перечислены доступные средства, основанные на конечной точке, которую необходимо использовать на борту.
Конечная точка | Параметры инструмента
:---|:---
**Windows** | [Локальный скрипт (до 10 устройств),](../defender-endpoint/configure-endpoints-script.md)групповой политики [,](../defender-endpoint/configure-endpoints-gp.md) [Microsoft Endpoint Manager/](../defender-endpoint/configure-endpoints-mdm.md)Диспетчер мобильных устройств , [Microsoft Endpoint Configuration Manager](../defender-endpoint/configure-endpoints-sccm.md), [сценарии VDI](../defender-endpoint/configure-endpoints-vdi.md), [интеграция](../defender-endpoint/configure-server-endpoints.md#integration-with-azure-defender) с Azure Defender
**macOS** | [Локальные сценарии](../defender-endpoint/mac-install-manually.md) [, Microsoft Endpoint Manager](../defender-endpoint/mac-install-with-intune.md), [JAMF Pro](../defender-endpoint/mac-install-with-jamf.md), управление [мобильными устройствами](../defender-endpoint/mac-install-with-other-mdm.md)
**Linux Server** | [Локальный](../defender-endpoint/linux-install-manually.md) [сценарий](../defender-endpoint/linux-install-with-puppet.md), Кукольный , [Ansible](../defender-endpoint/linux-install-with-ansible.md)
**iOS** | [На основе приложения](../defender-endpoint/ios-install.md)
**Android** | [Microsoft Endpoint Manager](../defender-endpoint/android-intune.md)
## <a name="next-step"></a>Следующий шаг
[Настройка пилотного проекта для Microsoft Defender для конечной точки](eval-defender-endpoint-pilot.md)
Возвращение к обзору [оценки Microsoft Defender для конечной точки](eval-defender-endpoint-overview.md)
Возвращайся к обзору [для оценки и пилотных Microsoft 365 Defender](eval-overview.md)
| 63.247423 | 785 | 0.803586 | rus_Cyrl | 0.770087 |