- Go to Gmail.
- In the search box, type the search operator.
Search operators you can use
Tip: Once you do a search using search operators, you can use the results to set up a filter for these messages.
|What you can search by||Search operator & example|
|Specify the sender||
|Specify a recipient||
|Words in the subject line||
|Messages that match multiple terms||
|Remove messages from your results||
|Find messages with words near each other. Use the number to say how many words apart the words can be Add quotes to find messages in which the word you put first stays first.||
|Messages that have a certain label||
|Messages that have an attachment||
|Messages that have a Google Drive, Docs, Sheets, or Slides attachment or link||
|Messages that have a YouTube video||
|Messages from a mailing list||
|Attachments with a certain name or file type||
|Search for an exact word or phrase||
|Group multiple search terms together||
|Messages in any folder, including Spam and Trash||
|Search for messages that are marked as important||
|Starred, snoozed, unread, or read messages||
|Messages that include an icon of a certain color||
|Recipients in the cc or bcc field||
|Search for messages sent during a certain time period||
|Search for messages older or newer than a time period using d (day), m (month), and y (year)||
|Search by email for delivered messages||
|Messages in a certain category||
|Messages larger than a certain size in bytes||
|Messages larger or smaller than a certain size in bytes||
|Results that match a word exactly||
|Messages with a certain message-id header||
|Messages that have or don’t have a label||
Note: When using numbers as part of your query, a
space or a dash (-) will separate a number while a dot (.) will be a
decimal. For example,
01.2047-100 is considered 2 numbers: 01.2047 and 100.
REFRESH FAST Categories
There are three ways to categorize a materialized view’s ability to be fast refreshed.
- It can never be fast refreshed.
- It can always be fast refreshed.
- It can be fast refreshed after certain kinds of changes to the base table but not others.
For the first case Oracle will raise an error if you try to create such a materialized view with its refresh method defaulted to REFRESH FAST. In the example below table T does not have a materialized view log on it. Materialized views based on T cannot therefore be fast refreshed. If we attempt to create such a materialized view we get an error.
create materialized view MV REFRESH FAST as select * from t2 ; as select * from t2 * ERROR at line 3: ORA-23413: table "SCOTT"."T2" does not have a materialized view log
“A recap of front-end development in 2017” @TreyHuffine https://levelup.gitconnected.com/a-recap-of-front-end-development-in-2017-7072ce99e727
“Our Relationships Are Mirrors for Ourselves” by Brianna Wiest https://link.medium.com/H9oEQUXCsS
Most controversial editor for me Vim. For me it is quintessence of Unix.
'runtimepath' with ease. In practical terms, pathogen.vim
makes it super easy to install plugins and runtime files in their own
Very powerfully and simple solution for 10g+ database.
Source: Run Library Script
For the last 5 years or so I’ve been using VMware’s Unity mode to seamlessly run Linux applications on Windows without having to dual boot.
Overall, it was a pretty solid set up but it had a few annoying issues. It got to the point where I woke up one day and backed up my source code and then rage uninstalled VMware followed by deleting the 100GB VM image.
There was no going back. I had to find a new solution.
Spoiler alert: This new set up is the best way I’ve come across to run both Linux and Windows together. If you’re on Windows and want to also run Linux tools (even graphical apps and Docker) you’ll learn how to set everything up by reading this article.
Recently I had to solve a problem of a very slow transfer of files between two computers on a LAN network using Ethernet cable. Both machines had Windows 7 x64 installed and the transfer speed was ridiculously slow at 10-15kb/s. Using Task Manager under Networking tab, Network Utilization was showing only around 0.25% for Local Area Connection.
I looked around the web for solutions and found quite a few suggestions how to tackle this problem. Those that I tried and the one that finally solved my problem are discussed here.
Turning off “Remote Differential Compression”
One of the first suggestions that I came across was to turn off this Windows Feature in Windows 7.
This suggestion is common on the web but it turns out to be just a myth.
This is 100% false. Neither Windows Update or file copy operations use RDC at all.
So I ignored this suggestion and continued looking.
Disabling “TCP Auto-Tuning”
This is another common suggestion that I came across and it uses NETSH command-line utility used for displaying and modifying the network configuration. To make the necessary changes, we need to run that utility as an Administrator.
- Open Command Prompt as Administrator:
- Click on Start Menu
- Type Command in search box
- Command Prompt will show up in results. Right-click on it to open Context Menu
- Select Run as administrator
- If User Account Control Window shows up asking if you want to allow the following program to make changes, select Yes
netsh interface tcp set global autotuning=disabled
- Restart the computer
- To verify that the auto-tuning is still disabled type in Command Prompt:
netsh interface tcp show global
This suggestion still didn’t solve my problem, so I looked further, but before doing that I wanted to set Auto-tuning back to the default value by typing
netsh interface tcp set global autotuning=normal in the Command Prompt (running as an Administrator).
Disabling “Large Send Offload (LSO)”
Large Send Offload is a technique of improving network performance while at the same time reducing CPU overhead. Apparently it does not work very well, so it was suggested to disable it. If you would like to know about LSO, check this MSDN article from 2001.
LSO is an option located in a Device Manager under your network adapter, so this solution requires Administrator Privileges.
Follow these steps:
- Open Start Menu, right-click on Computer and select Properties
- Under Control Panel Home located on the left side of the window click on Device Manager
- You will get a list of all devices on your machine. Expand Network Adapters.
- Find your Network Card and double-click on it.
- Select Advanced tab. You will get a list filled with different options.
- Select Large Send Offload V2 (IPv4) and set the value to Disabled
- Do the same for Large Send Offload V2 (IPv6) if it is available
- Click OK
After clicking OK, I tried to send a file over the LAN network. The transfer speed started very slow, but it was gradually picking up speed. I decided to restart the computer and try to send that file again and this time it worked like a charm.
Now that sending of files worked as it should, I also checked speed for receiving files. It turned out that it was still slow but all I had to do to fix that was to disable Large Send Offload V2 on the other computer. Once done, the problem was solved for receiving files as well.
In this post we examined different ways to solve slow speed on a LAN network. One of them is just a common myth, but for other two you need to have administrator privileges. I hope you found this article useful. Consider sharing it on a social networks. Comments are also welcome.
If you solved your slow LAN speed problem in a different way, let me know how and I might add that solution to the list.
netsh interface tcp show global
Very useful information for ppl uses lot of script works in Linux enviroment
Koszty stałe (roczne) utrzymania strony WWW u providera to hosting + domena.
84.87 pln/y https://hosting.linux.pl/hosting.html lub szybsze rozwiązanie na SSD Szybki SSD 4GB 158.6pln/y (wg mnie warto zainwestować w SSD)
Domena w zależności od nazwy od kilku złotych za rejestrację do 200pln za przedłużenie za rok https://hosting.linux.pl/domeny-cennik.html . Tu cena zależny od nazwy jaką wybierasz. Czyli koło ~110pln/y trzeba liczyć.
Wybór template wyglądu strony z bogatej listy darmowych oraz płatnych templatów. Jeżeli płatny to jednorazowo ~60$ mail firmowy (skrzynka lub przekierowanie) – tu jest potrzebna konfiguracja na serwerze
WordPress (CMS) jest darmowy – trzeba założyć bazę i wgrać go na serwer.
Wtyczki & automatyzacje
Wtyczki i autonomizacje w zależności od potrzeb – tu potrzebna konfiguracja i sensowny dobór dodatków –> zapewniam site działający, backupowany i odporny na ataki. Jeżeli warto będzie coś kupić to wtedy o tym powiem ale raczej wyniknie to z kontekstu prac.
Grafika i teksty
Grafikę i tekst potrzebuję z Tobą/Wami obgadać tak abyśmy mieli wspólną koncepcję co będzie na stronie. Wiąże się to też ze znakiem graficznym i zdjęciami które warto zrobić dobrze i obrobić (Photoshop/watermark/logo). Lepiej dać mniej ale bardzo dobrej jakości niż coś z telefonu. Rozwiązanie jest na tyle intuicyjne że poprawki w tekście menu itp będzie mgli wprowadzać sami
Sklep oraz rezerwacje
Sklep zamówienia/rezerwacje online – jest jak najbardziej do zrobienia ale strona musi na siebie zarabiać. Proponuję to potraktować jako oddzielny temat.
SEO (Search Engine Optimization) – dołączenie i konfiguracja site do Google Analytics .
DevSecOps involves creating a ‘Security as Code’ culture with ongoing, flexible collaboration between release engineers and security teams with the aim of bridging traditional gaps between IT and security while ensuring fast, safe delivery of code. In this era where online presence is paramount and a source that makes trading convenient and easy where personal data can be controlled on internet platforms, it is important to be security conscious. With the pros of online services, there are also the cons and this include cyber threats which explores business vulnerability to breach data and security therefore causing possible harm. With that said, it is important to make everyone in the software development life cycle responsible for security to prevent possible threats in the company.
DevSecOps is more about changing IT culture and people’s mindsets when it comes to security measured online and there are various tools to support the development, in this article we will discuss only the top 5 tools to use in 2018.
1. Data management
This is an important tool for everyone who needs security, it helps you to manage the data you share and enables you search, improve and create useful information for data which can be generated. It may not be able to store all your data but it is a vital tool that can help you backup your operation.
2. Threat detection and response
This tool helps you correlate threat indications from firewalls or host sensors then respond to them immediately by resolving the issue with a cleanup as well as update your drive. In the process, it can scan your device to identify possible threats and check the performance and speed.
3. Lifecycle management
In large firms, top management make decisions and share it with other staffs in the enterprise for everyone to be aligned with the strategy and in the process of sharing data, public or private information’s can be distributed which can be confidential. To avoid the risk of getting those information’s to the wrong party the company needs to use an enterprise lifecycle management tool that can provide visibility, backlogs and an insight into the integration server to guarantee an end-to-end compliance with security, privacy and other regulatory requirements.
4. Security unit testing
Security Unit Testing tools help you scan for application security flaws in real time while developers help your business achieve its goals. As much as you can use a tool, you also need a developer to help you test early and development lifecycle to integrate into the existing development toolchain for your e-commerce web design. You also need a Magento support if you are not a developer, to help you with your service, performance update and the maintenance of your ecommerce business.
This tool automatically analyzes any information a user provides to check for any potential threat based on accurate threat intelligence. This tool also provides the mitigating security requirements and test cases to ensure security implementation.
Yes finaly i instaled Windows 10
Using datemodified: in Windows File Explorer in Windows Vista, Windows 7, and Windows 8 allows you to find any files that have been modified by a date of your choice. Using this tip can be helpful for anyone who has lost a file but know when they last modified the file. Follow the steps below to get the date or date range window shown in the picture.
Open the Windows File Explorer
In the search box, in the top right corner of the window type datemodified:
After datemodified: has been typed the “Select a date or date range” window will appear, select the date or date range for when you believe the file was last modified.
Depending on the dates this search may take a few seconds to a minute to complete.
Psychoterapia Gestalt: istotne reguły
Poniżej znajduje się lista fundamentalnych zasad psychoterapii Gestalt, zaproponowana przez Claudio Naranjo:
Żyj teraz, to znaczy, przejmuj się teraźniejszością, raczej niż przeszłością lub przyszłością.
Żyj tutaj, to znaczy, połącz się z tym co jest obecne, zamiast tego co jest nieobecne.
Przestań sobie wyobrażać: przeżywaj to co jest realne.
Porzuć niepotrzebne myśli; zamiast tego, odczuwaj i obserwuj.
Wybierz wyrażanie się zamiast manipulować, wyjaśniać, usprawiedliwiać lub oceniać.
Oddaj się bólowi i nieprzyjemnościom w tym samym stopniu co przyjemnościom; nie ograniczaj swojej zdolności do bycia świadomym.
Nie akceptuj niczyich „powinieneś” lub „musisz” tylko swoje własne.
Weź całkowitą odpowiedzialność za swoje akcje, uczucia i myśli.
Zaakceptuj to kim jesteś i jaki jesteś.
Esencja psychoterapii Gestalt mieści się w tych zasadach, które generują rozległy i gruntowny proces wiodący do osobistego rozwoju.
Psychoterapia Gestalt patrzy na pacjentów, jako pełnych potencjału, wystarczająco by przezwyciężyć wszelkie przeciwności losu i poznać jej lub jego własne szczęście.
„Weź pod uwagę, że twój pacjent jest zdolną i kompletną osobą, która potrafi wykonać trudne czynności, bez twojej pomocy, która może przeciwstawić się bólowi i zawsze będzie do tego zdolna. Jak na osobę, która zbacza czasem na złą ścieżkę i uczy się na swoich błędach.
Szanuj jego odporność, szanuj jego zdolność do niezależnego zarządzania jego własnymi niepokojami i lękami, szanuj tą jego stronę, która jest zdrowa i zdolna do adaptacji, jego metody. Przyjmij jego zdolność do wsparcia samego siebie i jego ludzkiego potencjału.”
– Fritz Perls.1974-
The DB-Engines Ranking ranks database management systems according to their popularity. The ranking is updated monthly.
Read more about the method of calculating the scores.
Hello, now i worked at connect solar panels ZeverSolar with http://pvoutput.org service. Best information I found here: https://pvoutput.org/help.html#autoupload-zevercloud
The Zevercloud auto uploader retrieves power data from your Zevercloud account and automates the data upload to
PVOutput every 20 minutes. Energy data is calculated from power readings.
The Plant Key can be obtained by logging into your
zevercloud account at http://solarcloud.zeversolar.com. Test your settings by open the following URL:
The App Key and App Secretis provided by
PVOutput Integration Service
PVOutput Integration Service allows
PV logging (Generation) and energy monitoring (Consumption) data to be collected and uploaded to http://pvoutput.org
The following monitoring log file formats are supported:
Here is the API documentation for
Look down at example the first attempt with strings set to “1”, later one is after changing it to “2”.
Sending such request to inverter
wget -qO- results in response as follows:
1 1 EAB96173XXXXXXX NXVWWXSRRT7XXXXXXX M11 16B21-663R+16B21-XXXXXX 09:28 30/07/2017 OK 1 SX000660117XXXXXXXXX 2264 2.20 OK Error
1,2 - unknown 3 - Registry ID 4 - Registry Key 5 - Hardware Version 6 - Software version 7 - Time 8 - Communication status with ZeverCloud 9 - unknown 10 - SN. 11 - Pac(W) 12 - E_Today(KWh) 13 - Status 14 - unknown
Information is refreshed every 30s.
While serving a humanitarian and ecclesiastical mission at the age of 20, I learned potentially the most important lesson of my life.
How you spend your morning determines your success in life.
How you spend your morning determines who you will become.
How you spend your morning determines whether you become world-class at something, or remain merely average.
How you spend your morning is the difference between making tens of millions of dollars and making less than 100 grand.
How you spend your morning determines how well you:
- spend your time
- choose your friends
- choose your lover
- choose your career
- perform in your work
- influence the world
I didn’t understand how important my morning was at the beginning of my mission. But it quickly became very apparent.
As a missionary, the first several hours of the day are dedicated to getting ready, studying, and planning.
After a few months in “the mission field,” I noticed that most missionaries dragged themselves out of bed, and dragged themselves through their studies.
My experience was different. For the first time in my life, I experienced the power of learning. I felt the nourishment of feeding my mind and soul. To quote Oliver Wendell Holmes, Jr.:
“A mind that is stretched by a new experience can never go back to its old dimensions.”
I started waking up earlier than prescribed to read more and more. Rather than reading one hour each morning as recommended, I was reading three or four.
Within six months, it became apparent that my thinking and teaching abilities were accelerating at rocket speed. I began to stand out as a missionary.
The following quote by Jeffrey Holland became crystal clear to me:
“I frequently say to missionaries in the field, ‘You make or break your mission every morning of your life. You tell me how those morning hours go until you are on the street in your mission, whatever time it is; you tell me how those hours go, and I will tell you how your day will go, I will tell you how your month will go, I will tell you how your year will go and how your mission and your life will go.’”
“How you spend your morning determines your success in life.” @BenjaminPHardy https://journal.thriveglobal.com/you-make-or-break-your-life-between-5-7-am-70e2717f9e67
Two weeks ago, the ISO C++ standard meeting took place in Jacksonville. Today I want to make a short detour and write about the revolutionary decision that was made in the Jacksonville meeting. Additionally, I refer to the Will no Longer Have Pointers by Fluent C++. The standard committee decided that pointers will be deprecated in C++20 and will with very high probability removed in C++23.
To be honest, what seems like a revolution is only the last step in a long evolution. First, let me explain the big picture.
The evolution of pointers in C++
Pointers are part of C++ since the first beginning. We got them from C. From the first beginning there was always the tendency in C++ to make the handling with pointers more type-safe without paying the extra cost.
With C++98 we got std::auto_ptr to express exclusive ownership. But std::auto_ptr had a big issue. When you copy an std::auto_ptr the resource will be moved. What looks like a copy operation was actually a move operation. The graphic shows the surprising behaviour of an std::auto_ptr.
This was extremely bad and the reason for a lot of serious bugs; therefore, we got std::unique_ptr with C++11 and std::auto_ptr was deprecated in C++11 and finally removed in C++17. Additionally, we got std::shared_ptr and std::weak_ptr in C++11 for handling shared ownership. You can not copy but move an std::unique_ptr and if you copy or assign an std::shared_ptr, the internal reference counter will be increased. Have a look here:
Since C++11 C++ has a multithreading library. This makes the handling with std::shared_ptr quite challenging because an std::shared_ptr is per definition shared but not thread-safe. Only the control-block is thread-safe but not the access to its resource. That means, modifying the reference counter is an atomic operation and you have the guarantee that the resource will be deleted exactly once. This is the reason we will get with C++20 atomic smart pointers: std::atomic_shared_ptr and std::atmic_weak_ptr. Read the details in the proposal: Atomic Smart Pointers.