Design Pattern
Origin The idea originates from construction work and civil engineering architecture work. Definition A general solution to a recurring problem.
Origin The idea originates from construction work and civil engineering architecture work. Definition A general solution to a recurring problem.
Introduction fc position ease box interval due front 2.50 2 1.00 2021-08-08T07:36:20Z ref What is init? In Linux, init is a abbreviation for Initialization. The init is a daemon process which starts as soon as the computer starts and continue running till, it is shutdown. In-fact init is the first process that starts when a computer boots, making it the parent of all other running processes directly or indirectly and hence typically it is assigned “pid=1“....
Summary ref Custom Kubernetes controller. A operator is an application-specific controller that extends the functionality of the Kubernetes API to create, configure, and manage instances of complex applications on behalf of a Kubernetes user. It builds upon the basic Kubernetes resource and controller concepts, but includes domain or application-specific knowledge to automate the entire life cycle of the software it manages. In Kubernetes, controllers of the control plane implement control loops that repeatedly compare the desired state of the cluster to its actual state....
First meeting ATTACH Questions Why signer is required? This is optional, based on the configured workflow. Points Start up started in 2017 from KFUPM Enterpreneur Institute. Raised 1.5 Million from Aramco. Next DocCerts: https://next.doccerts.com Already onboarded Universities already adopted blockchain solution Doc Cert Solution Issuer and Signer of certificates Any one can request for a certificate from outside for signing....
Questions API data source connection to Canvas apps Multiple APi, combinations of API and database Canvas vs PowerBI? difference Canvas is for building low code apps for mobile and tablet. PowerBI dashboard can also be displayed inside the Canvas. PowerBI publish datasets? Combine API with database data source. yes, combination possible....
No google Not so confident on frontend Camera TODO Env separation
Summary Difficult to tamper data on block chain Blockchain is the secure database, information is stored on a difficult to tamper with network, and it costs money to store data. Questions compared with signing? linkage, Which two network? more options Etherum and IBM block chain network, information stored public? public and private networks. data stored public data. Can cantorl what type of information can be stored related to degree on network....
Summary is a request for storage by a user. It is similar to a Pod. Pods consume node resources and PVCs consume PV resources. Pods can request specific levels of resources (CPU and Memory). Claims can request specific size and access modes (e.g., they can be mounted ReadWriteOnce, ReadOnlyMany or ReadWriteMany, see AccessModes). While PersistentVolumeClaims allow a user to consume abstract storage resources, it is common that users need PersistentVolumes with varying properties, such as performance, for different problems....
Summary wiki In computer systems security, role-based access control (RBAC)[1][2] or role-based security[3] is an approach to restricting system access to authorized users. It is an approach to implement mandatory access control (MAC) or discretionary access control (DAC). [kubeternetes official](https://kubernetes.io/docs/reference/access-authn-authz/rbac/#:~:text=Role%2Dbased%20access%20control%20(RBAC,individual%20users%20within%20your%20organization.) Role-based access control (RBAC) is a method of regulating access to computer or network resources based on the roles of individual users within your organization.