development

Dubai Metro Affected by BSOD Windows Error!

Dubai Metro Affected by BSOD Windows Error!

On July 19, 2024, Microsoft experienced a significant global outage that affected a wide range of its services, causing major disruptions in various sectors. This event highlighted the critical dependence on cloud-based services and the necessity for robust IT infrastructure and contingency planning. What caused the issue? According to experts, the outages stem partly from a software update for Microsoft Windows operating systems issued by cybersecurity firm CrowdStrike. This update caused unforeseen compatibility issues, leading to widespread connectivity problems across Microsoft’s services. Microsoft swiftly responded by rolling back the changes and closely monitoring the recovery process. However, the residual impact…
Read More
BigO (Big Oh) Notation

BigO (Big Oh) Notation

သာမန်တွေးကြည့်ရင် ကျွန်တော်တို့အသုံးပြုနေတဲ့ device တွေရဲ့ specification ပေါ်မူတည်ပြီး ဘယ်ဟာက မြန်တယ်၊ မမြန်ဘူး စမ်းကြည့်လို့ရနိုင်ပါတယ်။ ဒါပေမဲ့လည်း algorithm တစ်ခုကိုတိုင်းတာဖို့ ဒီလိုစမ်းကြည့်လို့မရသေးပါဘူး။ BigO Notation (Big Oh Notation) ဆိုတာ input size ဘယ်လောက်ရှိသလဲပေါ်မူတည်ပြီး algorithm ရဲ့ complexity ကို တိုင်းတာတာပါ။ Complexity မှာ အဓိကအားဖြင့် time နဲ့ space complexity ဆိုပြီး ၂မျိုးရှိတယ်။ Space Complexityပြသာနာ တစ်ခုကိုရှင်းဖို့ algorithm / program ကိုသုံးရင် memory ဘယ်လောက်ယူလဲကို ဆိုလိုတာပါ။ Time ComplexityAlgorithm ရဲ့ run-time ဘယ်လောက်ရှိသလဲကို တွက်တာ။ BigO ကို တွက်တဲ့နေရာမှာ common complexities တွေ ရှိတယ်။ Constant | O(1) — Excellent/Best (constant time တစ်ကြိမ်ပဲလုပ်ရတဲ့အတွက် input size ဘယ်လောက်ရှိလည်း တွက်ရမယ့် calculation က အရေးမကြီးတော့ဘူး) Logarithm | O(log n) — Good (Calculation ကို တစ်ဝက်စီပိုင်းပိုင်းပြီးလုပ်ဆောင်ရတာ) Linear | O(n) — Fair (Algorithm တစ်ခုကို single loop လုပ်ပြီး linear time နဲ့ရှာရတာ) O(n log n)…
Read More
‘hi’ shows it’s colors

‘hi’ shows it’s colors

I previously introduced ‘hi’ – the Host Information tool to the world and described it’s base functionality. Later, I described how hi can be used to craft more complex notifications. In this article, I’ll describe some of the latest features implemented as part of the v0.4.5 pre-release.Get ‘hi’ on GitHub: https://github.com/jbobbylopez/hi Logging and State Management One of the biggest features introduced is the use of the logging module to implement a logging facility to log every status change event detected by the ‘hi’ tool. State is captured as a JSON file, which is then compared against the current state of…
Read More
Building Fullstack Chatbot with PyTorch, NumPy, NLTK, and Next.js – Complete Tutorial in 2024

Building Fullstack Chatbot with PyTorch, NumPy, NLTK, and Next.js – Complete Tutorial in 2024

Description:In this tutorial, we will build a fullstack chatbot using modern technologies. We will leverage PyTorch for our deep learning model, NumPy for efficient numerical computations, NLTK for natural language processing, and Next.js for the frontend. By the end of this video, you will have a comprehensive understanding of how to integrate these tools to create a powerful chatbot from scratch. https://youtu.be/NoHtQiwoanA Hashtags: Source link lol
Read More
Rebuild Hooks in the Nexca

Rebuild Hooks in the Nexca

Nexca is admin panel that we build recently and this article I gonna explain each hook to understand them better for find the latest update you check them here . useFetch The useFetch hook is used to fetch data such as posts, services, or sections from a specified URL. This hook takes one parameter, which is the URL from which to fetch the data. const data = useFetch('/api/posts/'); Enter fullscreen mode Exit fullscreen mode useGetSection The useGetSection hook is used to fetch data from a specific section. This hook is particularly useful for the client section. It takes three parameters:…
Read More
The IT Auditor’s Secret Sauce for SSPA Compliance

The IT Auditor’s Secret Sauce for SSPA Compliance

In today’s digital landscape, data security and privacy are paramount for maintaining trust and compliance. Microsoft’s Supplier Security and Privacy Assurance (SSPA) program sets a high standard for suppliers, ensuring they adhere to rigorous security and privacy requirements when handling Microsoft’s data. For IT auditors, understanding and effectively implementing the SSPA program is crucial. This guide provides a comprehensive overview of the key elements of the SSPA. Introduction to SSPA Program The Supplier Security and Privacy Assurance (SSPA) program by Microsoft ensures that suppliers handling Microsoft’s data adhere to stringent security and privacy standards. This program mandates suppliers to regularly…
Read More
Five Crucial Security Steps That Every WordPress Administrator Must Implement

Five Crucial Security Steps That Every WordPress Administrator Must Implement

Introduction In a time when cyber threats are ever more complex, securing your WordPress website is essential. Given that WordPress powers more than 40% of all websites, hackers find it to be a profitable target. Making sure your WordPress admin site is safe safeguards your data, reputation, and content. These are five essential security steps that any WordPress administrator should do to protect their website from cyber attacks. 1. Regularly update WordPress, including core, themes, and plugins, to resolve security vulnerabilities. Disregarding updates exposes your site to attacks that exploit these vulnerabilities. Core Updates: Always make sure WordPress is up…
Read More
Space Defender – part 4 – Adding a HUD

Space Defender – part 4 – Adding a HUD

In the previous part we created the enemies and shot them down. In this part we'll add a HUD (Heads Up Display) to show the player's lives, level, and score. Adding a HUD We're going to add a HUD to the game. This will show the player's lives, level, and score. We'll use a simple HTML structure for this, and some CSS to make it look nice.In bigger games the HUD is usually part of the game canvas, but for this tutorial we'll keep it separate to keep things simple. In part 1 we already added all the HTML and…
Read More
Getting the Actual Client IP When Using Application Load Balancer (ALB) in AWS Lambda

Getting the Actual Client IP When Using Application Load Balancer (ALB) in AWS Lambda

When I was new to AWS, I faced an interesting challenge while working on a task to digitally sign a document, which required the client's IP as part of the e-signature. Initially, I was thrilled when the implementation seemed to work perfectly the first time. However, my excitement was short-lived. During testing, I noticed that the same IP address was being returned, even when I accessed the application from different machines. It was then that I realized the IP address I was receiving was not the actual client IP but the IP of the load balancer. This discovery led me…
Read More
[Roast: Day 5] – Creating flow using useState

[Roast: Day 5] – Creating flow using useState

Today it seemed that I’m not moving as quickly as I have the past few days. I started work today on the card that most of the user interaction happens with. And since this is the part I care the most about, this is also taking the most time! I spent a good couple of hours fighting with the form, trying to implement an animation for the form labels. I did eventually get it, but after working on it for so long, I feel like I need a bit of a break. Either way, I found a solution for the…
Read More
No widgets found. Go to Widget page and add the widget in Offcanvas Sidebar Widget Area.