The researchers measured nighttime light levels in the bedrooms of 863 elderly Japanese adults by placing ceiling-facing light meters at the heads of everyone’s beds for two nights, to approximate as accurately as possible the light they would see while going to sleep. People who saw more than five lux of light at night were much more likely to develop symptoms of depression than those who slept in a completely dark room.
reading scienceProcesses event trace logs or real-time data from instrumented event trace providers and allows you to generate trace analysis reports and CSV (comma-delimited) files for the events generated.
windowsEnables you to retrieve information about event logs and publishers. You can also use this command to install and uninstall event manifests, to run queries, and to export, archive, and clear logs.
windowsEvent Tracing for Windows (ETW) is a high-speed tracing facility provided by the Windows Operating System. ETW is the core tracing facility in Windows on top of which both the Event Log and WPP are built.
Windows Event Log is a management-focused event system, designed for system administrators and IT professionals to easily consume events. Tools such as the Event Viewer and Windows PowerShell interact with the Event Log to receive and display events to users.
Windows Software Trace Pre-Processing (WPP) events are primarily for debugging applications and drivers. WPP does not use the same APIs to log events as ETW and Windows Event Log providers.
windowsEnhanced DNS logging and diagnostics in Windows Server 2012 R2 and later includes DNS Audit events and DNS Analytic events. DNS audit logs are enabled by default, and do not significantly affect DNS server performance. DNS analytical logs are not enabled by default, and typically will only affect DNS server performance at very high DNS query rates.
windows server 2016 windows windows server 2012 dnsIn powershell:
Get-ChildItem "HKLM:SOFTWARE\Microsoft\NET Framework Setup\NDP\v4\Full\" | Get-ItemPropertyValue -Name Release
microsoft
powershell
.net
International list of DevOps conferences for 2018.
devopsWebpack, the amazing module bundling Swiss army knife that you should probably start using, is all about letting you write modular UI code with explicitly declared dependencies.
tutorial javascript cssWe are the Keepers of the Cog. In so being, we also maintain the sacred text wherein lie the simple truths of cycling etiquette known as The Rules. It is in our trust to maintain and endorse this list.
cyclingEben’s guide to leveled logging:
ERROR: "your code is really broken"
WARNING: "your code is broken, but only in a subtle way that will bite you later"
INFO: "irrelevant trivia"
DEBUG: "information that would help you understand what's going on if you had enabled debug logging in production which you didn't"
devops
sysadmin
You don’t have to look hard on the internet to find plenty of useful one-liners in bash, or scripts. And there are guides to bash that seem somewhat intimidating through either their thoroughness or their focus on esoteric detail.
Here I’ve focussed on the things that either confused me or increased my power and productivity in bash significantly, and tried to communicate them in a way that emphasises getting the understanding right.
tutorial bashA completely incomplete guide to packaging a Python module and sharing it with the world on PyPI.
tutorial pythonCreate Sankey diagrams from text input.
Wages [2000] Budget
Interest [25] Budget
Budget [500] Taxes
Budget [450] Housing
Budget [310] Food
Budget [205] Transportation
Budget [400] Health Care
Budget [160] Other Necessities
graphing
free
Create sequence diagrams from test input.
Alice->Bob: Authentication Request
note right of Bob: Bob thinks about it
Bob->Alice: Authentication Response
free
tools
Chrome plugin that monitors websites for changes.
chrome plugin freeImages and Sketch files of popular devices.
design free toolsAWS Summit On-Demand provides online access to all the key sessions recorded live from the 2017 AWS Summit Auckland.
awsUser rights govern the methods by which a user can log on to a system. User rights are applied at the local computer level, and they allow users to perform tasks on a computer or in a domain. User rights include logon rights and permissions. Logon rights control who is authorized to log on to a computer and how they can log on. User rights permissions control access to computer and domain resources, and they can override permissions that have been set on specific objects. User rights are managed in Group Policy under the User Rights Assignment item.
documentation windows securityThe TechNet Library contains technical documentation for IT professionals using Microsoft products, tools, and technologies.
microsoft windows documentation