sharepoint online – Microsoft 365 modern search : how to go beyond full text search

In SharePoint classic, I used to configure a global serach center, with refiners on columns added in pages or documents libraries. Please may you give me information of how to perform this kind of requirements in :

  • modern SharePoint pages
  • global Microsoft 365 search?

Full text search is really good, but not enough considering metadata.

unity – Creating a Full Stadium of People, Ready as a Game Asset (ie. not too CPU intensive)

In answer to one of your comments:

I actually have the same question, but regarding the seats in the stadium. Would it be better to make them in maya (all of them) or is it better to import just one chair mesh to Unity and place them procedurally?

There is extra performance overhead for multiple GameObjects; for example, it’s faster to render one mesh containing 100 chairs than to render a single chair mesh 100 times. You can reduce overhead by doing manual instanced rendering using Graphics.DrawMeshInstanced() but that is done with code and can be an extra headache to set up. I’d suggest grouping multiple chairs into one mesh.

However, you should not put all of the chairs in the entire arena into a single mesh, as this prevents frustum culling from working. Frustum culling refers to skipping render of objects that are not inside the camera’s boundaries. If all of the chairs are in a single mesh that wraps all the way around the arena, that means that at least some of the chairs will be visible to the camera no matter what direction the camera is pointed, preventing frustum culling. I once worked on a racing game for mobile where the artist had made the barrier around the entire track as a single 200k poly mesh. This ended up causing major performance issues because the engine could never cull any part of the barrier, so we eventually had to break the barrier into segments.

I would suggest grouping chairs into sections, and making each section a single mesh. This way you have less overhead than if each chair was its own object, but frustum culling will still work for sections of chairs that are not in front of the camera.

EDIT: As DMGregory noted in a comment, in the likely event that the chairs are completely stationary, you can also use static batching to have Unity automatically combine multiple instances of a mesh into a single mesh. So for example, if you imported a mesh containing 1 chair and added 500 copies of that chair to the scene, using static batching you could let Unity combine multiple chairs into a single mesh. I do not know offhand how this would work with frustum culling.

sql server – How to free some space in a MSSQL Express Edition that is full

Using Microsoft SQL Server 2016 (RTM) – 13.0.1601.5 (X64) Express Edition (64-bit)

I have a database that reaches the full space (10Gb) every month.

In order to free up some space I do a bacpac, create a new database with the bacpac and skrink it 2 times.

The database gets from 10Gb to 6Gb, and application using this database gets faster (I think the bacpac refreshes the indexes).

Is there a SQL command to do this? Can I do this in a production database?

Thank you

hard drive – Disk Is Full Error When Copying Large Folders Onto Empty HDD

Bought myself a brand new Seagate HDD (formatted in exFAT). I tried copying over a bunch of folders to back up (160 GB worth) and I am met with the below error message. This is strange, because there is absolutely nothing on the HDD. I tried reformatting it to Mac OS Extended (Journaled) thinking it would help since that format is optimized for Mac OS, but unfortunately, I am met with the same error message. How can I get around this? By the way this is on Big Sur.

Error Message

windows – Why some installers ask for the full name and company of the user?

It fell out of fashion recently, but in the 90s and early 00s it seemed that every Windows program that had an installer – including Windows itself – asked for the full name of the user and the company or organization they worked for. In most software, I don’t recall this information being used anywhere other than being displayed in “About” dialog boxes. So… why was it a thing? What was the rationale behind asking for it and storing it on the disk?

I’m not talking about shareware – in that case the name was usually bound to the registration code that “transformed” the free trial into the full version. I’m talking mostly about regular commercial software, bought in big boxes, that usually did not have a “free” version to differentiate at all.

I know of some cases where this info was actually used for something. I believe it might have been used by MS Office when saving files, as metadata to put in the “Author” field. Floppy releases of Windows 95 actually stored this info permanently in the boot sector of one of the install floppies on first use, with no easy way to change it, so that the install media were essentially tied to the original owner – but obviously that didn’t apply to CD editions. But these are exceptions to the rule – in most software, it did seemingly nothing. Preinstalled software even tended to put some generic values there (like “IBM Customer” in case of Windows 3.x preinstalled on old ThinkPads).

So… was it perhaps somehow useful for technical support? Or maybe it was a way to know whom to ask for the certificates of authenticity and whatnot in case the copyright police comes in (particularly in larger companies)? Those are just wild guesses that come to my mind.

penetration test – What are the ways to attack the client if you have full control of the server, over an RDP or SSH connection?

I am not sure whether I accurately captured this question with the title, so let me explain it.

I have a penetration testing scenario where I am on the network with two machines, Machine A and Machine B. I have complete control over Machine B and am trying to leverage that to get access to Machine A. Machine A appears to be some variant of Linux (I pinged it and the response had a TTL value of 64, but I know this could be spoofed which is why it is only my guess), and Machine B is Ubuntu Linux.

An nmap scan of Machine A found that port 443 was open and port 22 was filtered. I have drawn the conclusion that Machine A accepts SSH connections via port 22, but behind some rule or firewall.

Machine A acts as a bastion, so the web application on port 443 (which I have already tested for vulnerabilities and found none) lets authenticated users have an interactive RDP or SSH session with machines on the network, from the context of Machine A. So I can log into the web application that Machine A is hosting and connect via a browser over to Machine B via RDP or SSH.

Because I have full control over Machine B and can get Machine A to connect to it, what RDP or SSH attacks are there that I can leverage? I am thinking primarily of whether or not there’s a way to have Machine B make Machine A redirect the session to localhost, which would mean Machine A would connect back to itself over SSH in a session I can interact with.

Note: I am aware of SSH reverse tunneling, but that requires special configuration on Machine A’s side when the connection is established, and I don’t have access to that.

pathfinder 1e – Full attacking with natural while grappling or being grappled

My GM said that a creature with several appenges can full attack with all of their natural attacks towards me?

I know that the grapple rules specify “Instead of attempting to break or reverse the grapple, you can take any action that doesn’t require two hands to perform, such as cast a spell or make an attack or full attack with a light or one-handed weapon against any creature within your reach, including the creature that is grappling you”
I’m reading the a light weapon meaning it’s a single light weapon and not all, such as a dagger, is this incorrect?

p.s. Are hands and appendeges in any way connected or are the grappling rules completely broken while you’re using anything other than hands, say tentacles etc

My GM is a stickler for rules, so any answers with sources is greatly appreciated.

server – ubuntu–vg-ubuntu–lv partition full for no apparent reason?

I am using ubuntu server on a few machines but it seems 2 of them are afflicted with this issue while the others are totally normal. Both machines are very barebones, outside of the ubuntu server OS there is very few additional installs and nothing which accounts for the massive disk usage.

I tried using tips from previous posts here, checking with du, wajig large, ncdu but nothing shows what is using this vast amount of space. It seems this space is not accounted for at all yet is being blocked from use as if it was full.

Below are images of df -h indicating the disk is near-full (deleted some logs to free space from 0 and install ncdu) and the ncdu printout *note /media is space utilized by HDD on the server since I mount them there. It does not contain anything from the partition in question so it can be ignored.

df -h printout


wajig large printout

eCart Web – Ecommerce/Store Full Website

Admin submitted a new resource:

eCart Web – Ecommerce/Store Full Website – eCart Web – Ecommerce/Store Full Website

View attachment 31678

You Will Get:​

  • PHP source code
  • Full Document of project that explain step by step process.

Read more