New: configurationAll contenthive-129948krhive-196917zzansteemhive-183959hive-166405photographyhive-180932hive-185836uncommonlabhive-183397hive-150122hive-188619hive-101145hive-144064bitcoinhive-145157krsuccesslifehive-193637hive-184714hive-181136hive-109690hive-153970TrendingNewHotLikerslupafilotaxia (75)in wallets • 2 months agoDownloading, Installing and Configuring Decentralised wallets or networks - Part IIntroduction Greetings dear friends, may this post serve to start a series of publications on how to execute the processes of downloading, installation and configuration of wallets or…lupafilotaxia (75)in hive-175254 • 3 months agoElectrostatic discharges and their role in the configuration of biomoleculesWhen we read "electrostatic discharges", we immediately associate it with danger, threat, or death because electrostatic discharges are a sudden flow of static electricity between inorganic and…netlicensing (39)in license • 2 years agoThe NetLicensing Configuration Lifecycle: A Comprehensive GuideSetting up NetLIcensing license management services for a vendor's products involves several steps. Here's a high-level overview of the process:jylieclarkson (31)in sso • 2 years agoAuthentication Using Single Sign On: A Complete GuideA precious resource is time. When you save people time, they respond to your efforts by performing better. This idea is comparable to the (SSOA) single sign on authentication function, which…jylieclarkson (31)in identity • 2 years agoSingle Sign On Open Source SolutionsSSO allows you to access various applications securely with a single set of credentials. NinjaAuth secures the service's data security, which may sound farfetched. Explore NinjaAuth by 500apps and…jylieclarkson (31)in sso • 2 years agoUser authentication software: What is it? Study in depthA user authentication programme makes sure users are authenticated properly before they can access a programme or service. The software makes it simple for organisations to confirm a user's…mfk856298 (27)in backup • 3 years agoHow to take automated backups from WHM?Well, Web Host Manger (WHM) is a web hosting software to provide user-friendly interface to reduce the complexity while performing simple tasks such as uploading files, browsing from directories…kormanocorp (62)in configuration • 3 years ago[번역] Spring Boot의 @ConfigurationProperties 가이드를 번역함. 1. 소개 Spring Boot에는 외부화된 구성과 속성 파일에 정의된 속성에 대한 쉬운 액세스를 포함하여 많은 유용한 기능이 있습니다 . 이전 자습서 에서는 이를 수행할 수 있는 다양한 방법을 설명했습니다. 이제 @ConfigurationProperties 주석을 더 자세히 살펴보겠습니다. 2. 설정 이 튜토리얼은 상당히…kormanocorp (62)in spring • 3 years ago[번역] Spring Boot 웹 애플리케이션 구성baeldung.com/spring-boot-application-configuration/를 번역함. 1. 개요 Spring Boot는 많은 일을 할 수 있습니다. 이 자습서에서는 Boot에서 더 흥미로운 몇 가지 구성 옵션을 살펴보겠습니다. 2. 포트 번호 주요 독립 실행형 응용 프로그램에서 기본 HTTP 포트는 기본적으로…cleanenergygarro (50)in electric • 4 years agoThe Polar Configuration of Earth, Mars, Venus & SaturnSee what our Ancestors were trying to tell us on rocks & cave art... Plasma Discharge Petroglyphs Explained - The Polar Configuration of Earth, Mars, Venus & Saturn... (5 Min. Preview) Symbols…sigewuzhere (25)in steemhunt • 6 years agoConfigCat - Feature Flag and configuration management serviceConfigCat Feature Flag and configuration management service Screenshots View Image View Image Hunter's comment Using feature flags in software development is becoming…twoshortcuts (25)in dtube • 6 years agoMag-254 Pre-configuration stepsMag-254 pre-configuration steps - First thing first, in order to use the IPTV service, you must have an active internet service, with a speed of not less than 2Mbps. Certain restrictions apply and I…twoshortcuts (25)in dtube • 6 years agoMAG-254 configuracion step by step- ENMag254 configuration step by step: In the first part of this tutorial, we covered the pre-installation requirements and the basic steps for connecting your STB MAGxxx and AVOV TV online to your TV.…teamhumble (74)in steemhunt • 6 years agopivpn.io - Simplest OpenVPN setup and configurationpivpn.io Simplest OpenVPN setup and configuration Screenshots Hunter's comment Both the data and control channels use upgraded AES and SHA256 encryption and hash algorithms. Options…kyob (25)in redback • 6 years agoSmartEdge: Simple NAPT configurationRules – how to apply NAT NAT policy should be apply to incoming traffic IP outgoing interface cannot be used in the NAT pool NAT pool must be on separate subnet (not part of interface…snewmark (53)in steemhunt • 6 years agoNix OS - The Purely Functional Linux DistributionNix OS The Purely Functional Linux Distribution Screenshots Hunter's comment Nix OS is a Linux distribution where the system is configured using a functional programming language called…khanshahid (25)in enable • 6 years agoEnable Secret Password and hostename configuration▶️ DTube ▶️ IPFScryptoaritra (27)in emacs • 6 years agoemacs : set up config 11 (highlight-indent-guides)Continuing with the trend, highlight-indent-guides is set for indentation based languages like Python. Also now the video has a better description at the Github README: ▶️ DTube ▶️ IPFSkhanshahid (25)in password • 6 years agoPassword Configuration Cisco Router▶️ DTube ▶️ IPFScryptoaritra (27)in emacs • 6 years agoemacs :set up config 07 (magit)The continuation of the video series on configuring emacs from scratch. In this video, magit is set & a demo is shown. Github repository for the same: ▶️ DTube ▶️ IPFS