A good document from Microsoft, comparing the various service offerings from Azure and AWS titled Cloud Service Map.
||Allows users to deploy, manage, and maintain
OS and server software; instance types provide
configurations of CPU/RAM.
|Elastic Compute Cloud (EC2)
Source: AWS to Azure services comparison
Western Michigan University has a very handy reference guide on distinguishing the various forms of Alumni and Emeriti.
|Term ||Description/Definition ||Example |
|Alumna || Singular female i.e. a female graduate or former student of a particular school, college, or university. ||Jane is an alumna. |
|Alumnus ||Singular male i.e. a male graduate or former student of a particular school, college, or university. ||John is an alumnus. |
|Alumnae ||Plural female i.e. female graduates or former student of a particular school, college, or university. || Jane and Mary are alumnae. |
|Alumni ||Plural male and plural when both men and women are included. ||John, Jane and Mary are alumni. |
|Emerita || Singular female i.e. a female professor having retired but allowed to retain her title as an honor. ||Jane is an emerita. |
|Emeritus ||Singular male i.e. a male professor having retired but allowed to retain his title as an honor. ||John is an emeritus. |
|Emeritae || Plural female i.e. female professors having retired but allowed to retain their title as an honor ||Jane and Mary are emeritae. |
|Emeriti ||Plural male and plural when both men and women are included. ||John, Jane and Mary are emeriti. |
A good tool from Willem Broekema to help with organizing and managing your Twitter lists.
Product Link: TwitterListManager
After some recent infrastructure changes, I noticed that certain group policies were not being applied due to network connectivity lag as a result of how our systems were setup. To resolve this, I stumbled on a post that describes a Group Policy setting that can force the computer to wait for full network connectivity before logon.
To enable this setting:
- Open the Local Group Policy Editor
- Expand Computer Configuration
- Expand Administrative Templates
- Expand System
- Expand Logon
- Enable the Always wait for the network at computer startup and logon setting
- Restart your computer
Ed Sutton on the dangers of big data and how everything we do, online or offline, leaves a digital footprint behind. He describes how every purchase with a card, every search, every movement with a smart device and every social media interaction (Likes, Retweets etc.) get stored. When used in aggregate, this data reflect a social and identity fingerprint that uniquely identifies you and furthermore can predict your behaviors and responses.
The Big Five: Openness (how open are you to new experiences?), Conscientiousness (how much of a perfectionist are you?), Extroversion (how sociable are you?), Agreeableness (how considerate and cooperative are you?), and Neuroticism (how sensitive/vulnerable are you?). With these five dimensions (O.C.E.A.N.), you can determine fairy precisely what kind of person you are dealing with—their needs and fears as well as how they are likely to behave.
Source: Trump Knows You Better Than You Know Yourself