The fundamental idea of Event Sourcing is that of ensuring every change to the state of an application is captured in an event object, and that these event objects are themselves stored in the sequence they were applied for the same lifetime as the application state itself.
Event Sourcing is an architectural pattern.
There are 4 different execution modes:
Note: There is a corresponding
Get-ExecutionPolicy command to output the current execution mode.
Active Directory allows administrators to create a hierarchy within a domain that meets the needs of their organization.
The object class of choice for building these hierarchies is the class organizationalUnit, a general-purpose container that can be used to group most other object classes together for administrative purposes.
An organizational unit in Active Directory is analogous to a directory in the file system; it is a container that can hold other objects.
Lighthouse is an open-source, automated tool for improving the quality of web pages.
You can run it against any web page, public or requiring authentication.
It has audits for performance, accessibility, progressive web apps, and more.
You can run Lighthouse:
Chrome (version 60) has a new Audits panel, powered by Lighthouse.
Albedo is the fraction of solar energy reflected from the Earth back into space.
It is a measure of the reflectivity of the earth's surface.
Lint is a Unix utility that flags some suspicious and non-portable constructs (likely to be bugs) in C language source code.
Generically, a lint or linter is any tool that flags suspicious usage in software written in any computer language.
The term lint-like behavior is sometimes applied to the process of flagging suspicious language usage.
Lint-like tools generally perform static analysis of source code.
The Windows Subsystem for Linux (WSL) is a new Windows 10 feature that enables you to run native Linux command-line tools directly on Windows, alongside your traditional Windows desktop and modern store apps.
WSL provides an application called Bash.exe that, when started, opens a Windows console running the Bash shell.
WSL cannot run Linux apps. WSL is a tool aimed at enabling users who need them to run Bash and core Linux command-line tools on Windows.
WSL does not aim to support GUI desktops or applications (e.g. Gnome, KDE, etc.)
An MITM attack is a form of eavesdropping where communication between two users is monitored and modified by an unauthorized party.
The attacker actively eavesdrops by intercepting a public key message exchange and retransmits the message while replacing the requested key with his own.
MITM attack is also known as:
Martin Fowler: Refactoring is a controlled technique for improving the design of an existing code base. Its essence is applying a series of small behavior-preserving transformations.
The controlled technique involves code structures to provide the techniques to insure the behavior of the piece of software is retained while transforming code.
Unit testing and testing harnesses are a major part of providing techniques to auto-test the transformed code.
NuGet behavior is controlled by settings in NuGet.Config files.
NuGet.Config is an XML file containing a top-level <configuration> node, which then contains the section elements described in this topic. Each section then contains zero or more <add> elements with key and value attributes.
With Visual Studio 2017+ and NuGet 4.0+, the machine-wide NuGet.Config is now located at %ProgramFiles(x86)%\NuGet\Config\ to improve security in multi-user scenarios.
The Coco Framework is an open-source system that enables high-scale, confidential blockchain networks.
Coco achieves this by designing specifically for confidential consortiums, where nodes and actors are explicitly declared and controlled. Based on these requirements, Coco presents an alternative approach to ledger construction, giving enterprises the scalability, distributed governance and enhanced confidentiality they need without sacrificing the inherent security and immutability they expect.
You allocate to the stack when you’re defining things in a local scope where you know exactly the memory block size you need, such as primitive data types, arrays of a set size, etc.
The stack is a self-managing memory store that you don’t have to worry about – it’s super fast at allocating and clearing memory all by itself.
For other memory allocations, such as objects, buffers, strings, or global variables, you allocate to the heap.
Compared to the stack, the heap is not self-managing. Memory allocated to the heap will sit there throughout the duration of the program and can change state at any point in time as you manually allocate/deallocate to it.
A SaaS company:
Asymptotic Notations are languages that allow us to analyze an algorithm’s running time by identifying its behavior as the input size for the algorithm increases. This is also known as an algorithm’s growth rate.
The HTTP 407 Proxy Authentication Required client error status response code indicates that the request has not been applied because it lacks valid authentication credentials for a proxy server that is between the browser and the server that can access the requested resource.
This status is sent with a Proxy-Authenticate header that contains information on how to authorize correctly.
$filter: The expression specified with $filter is evaluated for each resource in the collection, and only items where the expression evaluates to true are included in the response.
serviceRoot/People?$filter=FirstName eq 'Scott'
$orderby: The $orderby system query option allows clients to request resources in either ascending order using asc or descending order using desc.
$count: The $count system query option allows clients to request a count of the matching resources included with the resources in the response.
$select: The $select system query option allows the clients to requests a limited set of properties for each entity
$top & $skip: The $top system query option requests the number of items in the queried collection to be included in the result. The $skip query option requests the number of items in the queried collection that are to be skipped and not included in the result.
$expand: The $expand system query option specifies the related resources to be included in line with retrieved resources.
Accenture, Microsoft Team Up on Blockchain-Based Digital ID Network
Blockchain, first developed as a public ledger of all transactions in the digital currency bitcoin, is increasingly being used to securely track data in other fields.
"Without an identity you can't access education, financial services, healthcare, you name it. You are disenfranchised and marginalized from society," David Treat, a managing director in Accenture's financial services practice, said in an interview.
"Having a digital identity is a basic human right."
RSS: Residual Sum of Squares
It is a measure of the discrepancy between the data and an estimation model.
A small RSS indicates a tight fit of the model to the data. It is used as an optimality criterion in parameter selection and model selection.
RSS is the sum of the squares of residuals (deviations predicted from actual empirical values of data).
In statistics and optimization, errors and residuals are two closely related and easily confused measures of the deviation of an observed value of an element of a statistical sample from its "theoretical value".
Residual of an observed value is the difference between the observed value and the estimated value of the quantity of interest.