Ако не ви се занимава ето и онлайн конвертор: https://www.epubconverter.com/epub-to-mobi-converter/ недостатъка е, че трябва да смъквате .ePub файловете от Читанката и после да ги качвате в този конвертор за да имате .Mobi файлове. А това без лаптоп си е приключение.
Веднъж мишката забелязала, че стопанинът на фермата е сложил капан за мишки. Тя разказала за това на кокошката, овцата и кравата, но те всичките и отговаряли: – Капанът за мишки е твой проблем, а не наш! Малко по-късно в капана се хванала змия и ухапала жената на фермера. Опитвайки се да я излекуват, сварили на жената супа от кокошката. После заклали овцата, за да нахранят всички, пристигнали да навестят болната. И накрая заклали кравата, за да нахранят гостите, дошли на погребението. И през цялото време мишката наблюдавала от дупката си, мислейки за нещата, които са чужд проблем, докато не станат твой!
От известно време търкалям едно OrangePi Zero и сега ще ви покажа как да контролирате вградените му два светодиода (LED). За основа ползвам armbian 5.90 със linux kernel 4.19.57.
Пускане на червения led: echo 1 > /sys/class/leds/orangepi\:red\:status/brightness Спиране на червения led: echo 0 > /sys/class/leds/orangepi\:red\:status/brightness
Аналогично командите за управление на зеления са: echo 1 > /sys/class/leds/orangepi\:green\:pwr/brightness echo 0 > /sys/class/leds/orangepi\:green\:pwr/brightness
А ето и нещо по-интересно – автоматично мигане на червения: echo "heartbeat" > /sys/class/leds/orangepi\:red\:status/trigger Или мигане на зеления при активност на SD картата: echo "mmc0" > /sys/class/leds/orangepi\:green\:pwr/trigger
От чисто естетическа гледна точка обаче е по-добре да оставите зеления да е за heartbeat, а червения за mmc0. Другите валидни команди за контрол са: none mmc0 mmc1 timer heartbeat backlight default-on
"THE BEER-WARE LICENSE" (Revision 42):
As long as you retain this notice you can do whatever you want with this stuff. If we meet some day, and you think this stuff is worth it, you can buy us a beer in return.
This project is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
От доста време се чудя защо някой азиатци във името си имат Md или Mhd. Дори за известно време си мислех, че е нещо като Dr (доктор) или Eng (инжинер). После си мислех, че е MD (Medical Doctor) при това много сериозно.
Оказа се обаче, че това е късата форма на Muhammad или Mohammad. Може също така и да се види и като Mohd.
A few days ago, WebKit announced that the new Safari versions will include an updated version of Intelligent Tracking Prevention 2.1. Here’s a link to the announcement: https://webkit.org/blog/8613/intelligent-tracking-prevention-2-1/ Now, with a few tests, I’ll show you how this affects you directly. Below you will also find an example of how to bypass the protection.
First, we will start with an usual test of how a cookie is created locally through an API document.cookie. The file that we will use can be found here: https://www.mobilio.bg/demo_cookies.html The methodology is as follows. Upon loading the website, you can see that no cookies appear. After that we create them by pressing the buttons 1-3 and again displaying the cookies. These cookies have an expiry date somewhere around 2021, 2022 and 2023. For convenience, the developer tools have been enabled as to display these same cookies. The images shown are before and after. In the time between the tests the cookies jar has been cleaned as to avoid any interference in the results.
We start with Firefox:
As you can see, the cookies have been created and their expiry dates are several years ahead in the future.
Next comes Chrome:
Similarly, there isn’t any change here. Cookies have several years expiry.
What follows is a desktop Safari (macOS):
And this is where we see ITP in action. Cookies are still the same, but their lives (their expiration is) are limited to a week
Our last test is the Safari (iOS) for mobile. This is where things get a little more complicated. Before the test, let’s first purge the cookie jar. To do that we go to Settings, Safari, Advanced and do the following:
Now that all cookies are purged, we can experiment.
After that, we go back to Settings, Safari, Advanced, Website Data and see that we got some data.
The problem is that we can’t see what these data are. That’s why we need to connect the iOS device with a cable to a macOS and connect to the device from a desktop Safari. Here’s a screenshot:
As you can see, these cookies are capped to a seven day expiry, just like they are for a desktop Safari.
Here, as you can see the life of the cookies is 10 years.
10 years again.
Desktop Safari (macOS):
Here too we see our cookie with 10 years of expiry.
Mobile Safari (iOS):
Here again we need to connect the iOS with macOS in order to see properly the data.
I intentionally left the old cookies here together with the new ones so that you can see how 3 of them have a life of one week and one (the new one) of them expires in 2029.
Why will this little change play a big role in the future?
Over the years, many tracking, advertising and analytics systems began to systematically abuse online tracing. This is the reason our browsers are stuck from piles of useless cookies that we, as users, do not need at all, they just don’t serve us. The only people for whom cookies carry some information are the owners of the above-mentioned networks. In fact, just loading an ad code leads to the recording of many many cookies from other advertising networks because of their resale free advertising slots. Social sharing buttons are another example. When I’m logged on to a social network I have an authentication cookie on my device. And when I visit a site with social sharing buttons in it, based on these cookies, the social network knows which sites I have been visiting. There are other examples, but let’s not dig into too much technical stuff.
But why will we still be affected anyway?
After the hasty joy of less tracking comes the sad news. Alas, we, as webmasters, will also be affected just because of the use of Analytics products.
This scenario is entering the website from somewhere and performing some action. The simplest example is visiting a site for locksmiths repairs, plumbers or even HVAC repairs. In this case, the user performs usually one action which is most often to find their way on the website and see whether they can use the services for their particiular district. After a phone contact follows. This same visitor may or may not return within the next couple of days. In this case, perhaps 80-90% of the site visits are from new users.
This scenario is a bit more complicated and involves several visits of the user. A simple example is the news publisher or an e-commerce site. In this case the user visits the site from some source – search, ads, social media or directly. Then they continue visiting the website – directly, via search, remarketing, social media, mail marketing, etc. Due to the nature of these visits, it is important to measure the first visit and the user’s entire path across the website in all his returning visits. If this is e-commerce, the duration can be a week, but very often the journey itself can last for weeks or even months. We may also have a one-time purchase or multiple purchases over time.
Traditionally Google Analytics keeps the cookies for 2 years from the moment of the first visit. This is more than enough to measure user activity. This also makes it possible to accordingly analyze the new and the returning users.
The answer to these two scenarios is relatively easy.
In the first case, we have a low interactivity on the website and therefore the the loss of cookies will not affect the measurement of the users. Additionally, the website target audience are their new clients from the website. Having used the service, visitors usually do not return to the website. In fact, these websites are not so pesky for the reporting of the user activity. So if you have a website falling into this category you have nothing to worry about.
In the second case, however, we have a website with high interactivity. Here the loss of cookies is already fatal for the website. From now on, the website will not be able to monitor and measure effectively user activity. It it these websites that are the real danger, entering your personal space. Typically, there is one or more ad networks, one or several analytics scripts, and several tracking scripts. At the same time, they have implemented integration with at least one social network. If you have a website falling in this category, you have all the sufficent grounds to worry about this change.
And now, let’s make a pseudo login which will extend the life of our cookie to 10 years:
As you can see, you can extend the life of an existing cookie. But, unfortunately, this will require the calling of some code on a server. And many of the tracking, advertisements and analytics products and services use serverless solutions to deliver information to their end customers. Now these services will have to change the way they deliver files to end-users if they want to offer their users the right reporting for Safari users beyond that seven day expiry period.
Of course, the above is not the final solution and such a workaround will work for some time. There is no guarantee that if tomorrow Apple release ITP 2.2 or 3.0, the mechanism will continue to work as it does now. It is absolutely possible that the final version of the ITP is slightly different and the tests I have made are wrong. But one thing is certain – from now on, the reporting of consumer actions will be one little bit harder than it was before.
Yet, I am a big fan of the slightly anonymous browsing of the Internet. Once a month I clean up all websites data:
Additionally I have set Safari by default to open in private mode:
„попадат под най-страшното определение за човека, съществото с илюзии, формулирано от Лао Дзъ: Който не знае къде отива, отива другаде.
Те винаги, дори когато им се струва, че успяват, попадат другаде. Това е тяхна задължителна съдба“