javascript – Cordova Android sqlite running an existing pre-populated database

My problem is very simple and it is killing me.

I want to use an external sql manager like DB browser (SQLite) for example, to pre-populate a database.

After wanting to use Cordova-sqlite-storage to open it.

something like that:

myDB = window.sqlitePlugin.openDatabase ({name: "myDB.db", location: & # 39; default & # 39;});

But I can't find where is the "default" location to start using the database that I put.

I can't even find the place where it generated the new database, so I'm starting to wonder if it only generates this when running in the Android cache.

So how do I access a pre-populated sqlite database and where do I place the file for the system to use it?

How can you generate a Bitcoin public key from an existing private key using openssl?

I know you can generate a new pair of keys with an order like.

openssl ecparam -genkey -name secp256k1

And the resulting output will contain a New private key with the public key encoded.

Is it possible for openssl to generate the public key directly from an existing private key only?

Just to be clear, I mean the Bitcoin public key and not the public address

Convert an existing table to a partitioned table – SQL Server 2017

I have a large, busy database where 99.9% of the data lives in a table. IOT devices report their time series data in this table.

This table has 7 billion rows and occupies approximately 3.5 TB of space. The database is running out of space on its current drive.

I have another reader available that I would like to start recording new data for this single table.

The challenge here is to do all of this with no downtime or very little (max 30 minutes). I need a strategy to record this new data.

Here's idea 1:

  1. Create a new table called IotSensorData_New which is identical to the main table, but whose partitioning is activated and resides on a new drive (the seed of identity ID is a problem here)
  2. Rename the current large table to IotSensorData_Old, then rename empty IotSensorData_New at IotSensorData
  3. Activate the data importers so that the data begins to be ingested into this new table (again, the ID is of concern since it will start from 1)
  4. Convert old IotSensorData_Old the data in the current table – I don't know exactly how to do this bit

Here's idea 2:

  1. Disable data importers
  2. Convert the current table to partitioning (I understand that the indexes have to be rebuilt if I do this, which would probably take more than 24 hours)
  3. Activate importers

I'm looking for specific steps on how to do it with the least downtime

I am using SQL Server 2017 Enterprise edition.

Metal-as-a-Service in an existing environment

We are considering MaaS for our bare metal server environment to replace the old skool kickstart scripts. Is it possible to "register" (I think that's the correct term) a machine in MaaS without reimagining it? So that MaaS allows it to start normally?

publication – Can I use existing game mechanics in my own designs?

I am not a lawyer. This does not constitute legal advice. If you need legal advice in a practical matter, get a lawyer. Yadda, yadda.

However, these are two well understood parts of game design, so I can comment in general.

Rules cannot be protected by copyright, as they are procedures and processes. The appropriate area of ​​government production monopoly for procedures and processes is patent law. However, the US Patent Office has stated that the rules of the game cannot be patented in the United States. Other countries will be different, but the rules of the game are unlikely to grant patent protection for similar reasons.

Words ("expression") can be protected by copyright. Never reuse words from another game, book, TV show, etc. without written permission or license agreement. Copyright only applies to expressions of ideas, so it only covers text lengths (although the length can be quite short, like the 140 letters of the text). 39; a tweet). Copyright applies to any work, whether or not it has a copyright notice – it is automatic in most jurisdictions. The more unique and recognizable a given combination of words, the less sure you are of using them.

It should be noted in particular that tables are widely regarded as an "expression" of an idea, so game designers avoid copying them even when there is no such thing as 39; another way of representing a set of mechanical details. This has not yet been tested in court, but no one wants to be the first to discover the difficult path. If you look at various D&D dummies such as OSRIC or Lord of the Labyrinth, you will notice that the XP table numbers do not match the originals. It is deliberate.

Individual names or recognizable terms can also be trademarks, but this only really happens with big game brands, as it is expensive to apply and apply for trademarks.

Individual words or compound terms can be authorized in a so-called nominative use where you simply indicate the name protected by copyright by someone else, but this is delicate terrain and if you want to attempt a use registered, you must speak to a lawyer. Individual terms that are generically descriptive also do not benefit from copyright or trademark protection, but you should be sure that the term is generic and is not specific to this expression of the rules.

This division is generally summarized in the game design community as (paraphrasing) "the rules of the game can be copied, but their expression – the words used to convey them – cannot be copied."

Game designers use rule templates from other games all the time. Good designers rarely copy exactly however, because good designers know that a rule is almost never going to adapt to other, different rules, unless it changes to suit them better. However, when direct copying is done, it is completely legal and generally not even a point of professional conflict, as the rest of the game design will be different and the overall game will be something new under the sun. We all love to see new games.

Some designers will quote their inspirations directly in their book. Readers will likely notice similarities anyway, and why not spread the love of games the designer likes?

However, all of this is very specific to games that are released without a bundled license, such as D&D and other games that are released under the Open Games license or one of the Creative Commons licenses. It’s always everything true of games that come with a license, but there are other wrinkles to deal with.

I notice that you are talking about "gifts", "classes", "spells" and "skills". These four elements taken together indicate to me that you plan to use the rules of one of the editions of Wizards of the Coast Dungeons & Dragons. In this case, you must be extremely careful. The 3rd edition of the game is under OGL license. It gives you permission to use various parts of the system and nomenclature that you wouldn't normally be able to use without worrying about legal action, and in exchange, this requires additional restrictions that copyright / trademark / patent does not normally impose, such as avoiding certain terms. But more importantly, WotC (Hasbro) is a big fish in a small pond, and even the legal uses of D&D products will likely catch their eye. do not accepting their OGL license for the release of a large-scale game or product is a good way to get their unfortunate legal attention, even if your use is totally par- overboard. However, using OGL is a good way to play with WotC's toys and have a reasonable expectation of immunity from any legal action. Many game designers have chosen this path.

(The 4th edition is a whole different pot of fish – there is a license, but it is very restrictive. Walk lightly when writing systems inspired by 4th.)

And finally, all of this is moot if you don't publish, design a game for personal use, don't release the game informally, or if you're not or under the radar of the owner of the intellectual property. If you publish it somewhere (for example, post it on a forum or something), there is always an infinitesimal chance from whom you copied and get a legal nastygram, but the probability is low . That's not to say it's a good idea, but rather a comment on the likelihood that the legalities are relevant if you do it for private use or limited private distribution.

Integration ux – How to collaborate and define a new style guide for an existing business design?

As a naïve designer, I have a hard time defining a style guide. There is a style guide created with Adobe XD. As a team effort, we would like to improve and manage the style guide. A reasonable and productive solution is to use Frontify. Unfortunately, the company is running out of budget and we have to look for an alternative that can provide the same functionality as Frontify.

Anyone facing the same problem?

authentication – Simple and universal way to password protect existing web services exposed to the Internet

There are many tools, devices, and programs that run an http server by default and expose a user interface on port 80. Even my coffee machine has a web user interface that it provides on port 80.

Now it is easy to make these existing web servers available via the Internet by simply doing port forwarding on the Internet facing NAT.

I want to do it, but I want to protect password access in a simple, generic and secure way.

The easiest way would be to NOT expose them and only access them via a VPN connection. Currently, I'm doing this – but I want to be able to access VPN-free services from anywhere on the web.

So let's say I have three http services in my Lan that I can access locally on


Now I want to be able to access it on the Internet by going to


But for each of them, I want them to be accessible ONLY after some form of user password authentication.

I do not need individual users / passwords for the different servers. Maybe all the same.

What is a simple but secure way to expose these three services to the Internet, without having to alter the http servers on these devices themselves? (By secure, I mean that without knowing the password, this will not create a trivial security breach. I don't care about attacks from the middle man or so).

Tools I have to solve this problem:

  • Addition of an additional server running any Linux distribution / services on the local network
  • Define port forwarding on my NAT

Map the existing folder in the default document library with the team channel in MSTeams when creating teams from an existing SharePoint site

I want to create a team from one of the existing SharePoint team sites.

I know how to do it, but I'm concerned about the existing folders / files that are present in the SharePoint default document library. I want to map this existing folder / files to the team channel. (As I understand it, every time we create a new team channel, it creates a folder in the default SharePoint document library. I want exactly the reverse procedure, that is, the folder channels existing.)

For example, suppose there is a folder name Digital Initiatives which contains files. I want a channel name Digital Initiatives default to create when I create teams from the SharePoint site.

I'm not sure if it's possible or not.

If this is possible, can someone please guide you on how to get there.

And if that is not possible, any bypass identifier that someone has already implemented.

Thank you very much in advance.

encryption – Is there an existing obfuscation scheme that makes the encrypted text indistinguishable from the plain text?

Suppose a totalitarian government (in the name of the fight against terrorism / protection of intellectual property):

  1. has prohibited encryption itself – encryption is only approved in cases where the state has reviewed the design and has ensured that it can decrypt / inspect the message, and has made any unapproved encryption a criminal offense
  2. has full control over everything entering and leaving the network at the ISP level, as well as everything going through web services

How could two citizens, Alice and Bob, using an approved (and monitored) instant messaging service to establish a secure communication line, hide the fact that communication is encrypted, that is, make unencrypted data indistinguishable, or at least make it impossible to calculate or calculate to distinguish it from plain text?

For example, no one would assume that the following message is encrypted:

  • On the other side of the Great Wall, we can reach all over the world.

But we would assume that the following is:

  • WZ2A805Wq3rzpiuzE + ZCulgDrn76pVRW5PVUJ4DDadFQD4P9PsTeegbo5CAkqI4yZrO // p
    sYT + ZQkqZ6IrSGng ==

  • 599D80F34E56AB7AF3A62BB313E642BA

For the purposes of this question, we assume the following technical details:

  1. instant messaging service is only text, binary data is not allowed (in an instant messaging framework, sending small binary fragments mainly in both directions would probably raise suspicions anyway)
  2. communications between Alice and the instant messaging service, Bob and the instant messaging service, are both end-to-end encrypted. Eve government official has a copy of the decryption key used by the instant messaging service
  3. proof that the message is encrypted is not required. That is to say. Eve doesn't need to know the plain text or the algorithm used to produce the ciphertext. It only needs to say, with a reasonably low false positive rate, if a message is the result of encryption
  4. the endpoint is secure, no backdoor or malware on the computer / router, etc.

I would like to know if there is reliable research on this, is it feasible or not, and if possible, an existing protocol or algorithm developed for it?

Eve, in case you are looking, I ask you for academic purposes only. 😄