47 Matching Annotations
  1. May 2024
  2. Feb 2024
    1. A loaded glTF asset does not cast shadows if you just set gltf.scene.castShadow to true. You have to do this for recursively for all meshes.
    2. You have not configured the shadow frustum for your instance of DirectionalLight correctly. Try it with this code: var dlight = new THREE.DirectionalLight( 0xaabbff, 0.3 ); dlight.position.x = 0; dlight.position.y = 750; dlight.position.z = 0; dlight.castShadow = true; dlight.shadow.camera.top = 2500; dlight.shadow.camera.bottom = - 2500; dlight.shadow.camera.left = - 2500; dlight.shadow.camera.right = 2500; dlight.shadow.camera.near = 1; dlight.shadow.camera.far = 1000; dlight.shadow.mapSize.set( 2048, 2048 );
    3. Since MeshBasicMaterial is an unlit material, it can't receive shadows. That means you should use e.g. MeshPhongMaterial for your tiles and floors otherwise you won't see any shadows.
  3. Jun 2023
    1. البقرة -38

      صيد

      الهدى والخوف ليس للانبياء فقط

    1. أيضاً من الأوقات التي يتأكد فيها استحباب السواك: عند قراءة القرآن، والقرآن أفضل الذكر، وغذاء الروح هو ذكر الله جل في علاه، قال النبي صلى الله عليه وسلم: (لا يزال لسانك رطباً بذكر الله)، فاقرءوا القرآن، فإن لكم بكل حرف منه حسنة، ولا أقول: (الم) حرف، ولكن ألف حرف، ولام حرف، وميم حرف، وإذا قرأ المرء القرآن أتى الملك فاقترب من قارئ القرآن، ويا لها من فضيلة! يقترب منه حتى يضع فاه على فم القارئ، فينبغي ويتأكد أن تكون رائحة فم القارئ طيبة؛ لأن الملك يضع فاه على في ابن آدم، وفي الحديث: (إن الملائكة تتأذى مما يتأذى منه بنو آدم).

      مهمه فمه على فيه متى ؟

  4. May 2023
    1. ابراهيم سعيد موسى محمد شاهي

      test

    Annotators

  5. Oct 2022
    1. The app will take care of setting up the proxy address, you don’t have to do anything. 
    2. Share WiFi from Android to Windows 1. Open up your Windows PC, and connect to the WiFi hotspot that says – DIRECT-Android and enters the password that you saw on the app in step 2. If you open up the browser now, you won’t see get internet access even though you are connected to the network. To fix that, you need to set up a proxy IP.

      Tod

    3. And the app called NetShare no root tethering works smartly around this restriction. It first creates a workgroup, which takes the other devices on the same network. Do note, that as of now, the other device doesn’t have access to the internet.  Now, in order to share the internet, the app creates a VPN in Android, which you’ll have to
    1. The newer GPT standard is paired with UEFI BIOS systems

      Can uefi deal with mbr table

    2. Throughout the drive
    3. and have either a black or blue-screen-of-death background color.
    4. The BIOS does things like configure the keyboard, mouse, and other hardware, set the system clock

      todo

    5. support a GPT partition table and a UEFI BIOS.

      todo

    6. very easy to ruin the MBR sector of the drive, making it impossible to boot up again. Then you'll either need to create a recovery USB drive with Windows or Linux and try to repair the MBR, or completely wipe the drive and reinstall the operating system

      todo

    7. As MBR is older, it's usually paired with older Legacy BIOS systems, while GPT is found on newer UEFI systems. This means that MBR partitions have better software and hardware compatibility, though GPT is starting to catch up.

      don't-understand legacy and uefi bios

    8. Unlike an MBR partition table, GPT stores the data about how all the partitions are organized and how to boot the OS throughout the drive. That way if one partition is erased or corrupted, it's still possible to boot and recover some of the data.

      don't-understand

    9. The MBR also contains code to launch the operating system, and it's sometimes called the Boot Loader.

      don't-understand the code or mbr called boot loader

    10. it needs to be configured to use a specific partition scheme or table.A partition table tells the operating system how the partitions and data on the drive are organized

      don't-understand

    11. be

      don't-understand

    1. There are dedicated tools to verify checksum of files in Linux. You can also check hashes in the Nautilus file manager with nautilus-gtkhash extension.

      todo

    1. Receiving a GPG error when running apt-get update? Your default umask may not be set correctly, causing the public key file for the repo to not be detected. Run the following command and then try to update your repo again: sudo chmod a+r /etc/apt/keyrings/docker.gpg.

      todo The following signatures couldn't be verified because the public key is not available: NO_PUBKEY 959FE34E90E51522 Err:14 https://download.docker.com/linux/ubuntu vanessa Release <br /> 404 Not Found [IP: 52.222.144.45 443]

    2. Add Docker’s official GPG key: $ sudo mkdir -p /etc/apt/keyrings $ curl -fsSL https://download.docker.com/linux/ubuntu/gpg | sudo gpg --dearmor -o /etc/apt/keyrings/docker.gpg Use the following command to set up the repository: $ echo \ "deb [arch=$(dpkg --print-architecture) signed-by=/etc/apt/keyrings/docker.gpg] https://download.docker.com/linux/ubuntu \ $(lsb_release -cs) stable" | sudo tee /etc/apt/sources.list.d/docker.list > /dev/null

      todo

    1. Used to explicitly set the container hostname. If you don't specify the hostname, it defaults to the container ID, which is a randomly generated system GUID.

      todo

    2. Map a TCP port on the host environment (first value) with a TCP port in the container (second value). In this example, SQL Server is listening on TCP 1433 in the container and this container port is then exposed to TCP port 1433 on the host.

      todo

    3. Specify a custom SQL Server collation, instead of the default SQL_Latin1_General_CP1_CI_AS.

      donot understand

    4. The SA_PASSWORD environment variable is deprecated. Please use MSSQL_SA_PASSWORD instead.

      dont understand

    1. The Docker daemon binds to a Unix socket instead of a TCP port. By default that Unix socket is owned by the user root and other users can only access it using sudo. The Docker daemon always runs as the root user. If you don’t want to preface the docker command with sudo, create a Unix group called docker and add users to it. When the Docker daemon starts, it creates a Unix socket accessible by members of the docker group.

      dont understand

  6. Sep 2022
  7. Aug 2022
    1. كُنْتُ قَيْنًا بمَكَّةَ، فَعَمِلْتُ لِلْعَاصِ بنِ وائِلٍ السَّهْمِيِّ سَيْفًا فَجِئْتُ أتَقَاضَاهُ، فَقالَ: لا أُعْطِيكَ حتَّى تَكْفُرَ بمُحَمَّدٍ، قُلتُ: لا أكْفُرُ بمُحَمَّدٍ صلَّى اللهُ عليه وسلَّم حتَّى يُمِيتَكَ اللَّهُ، ثُمَّ يُحْيِيَكَ، قالَ: إذَا أمَاتَنِي اللَّهُ ثُمَّ بَعَثَنِي ولِي مَالٌ ووَلَدٌ، فأنْزَلَ اللَّهُ: {أَفَرَأَيْتَ الَّذِي كَفَرَ بِآيَاتِنَا وَقَالَ لَأُوتَيَنَّ مَالًا وَوَلَدًا * أَطَّلَعَ الْغَيْبَ أَمِ اتَّخَذَ عِنْدَ الرَّحْمَنِ عَهْدًا} [مريم: 77، 78]، قالَ: مَوْثِقًا. الراوي : خباب بن الأرت | المحدث : البخاري | المصدر : صحيح البخاري الصفحة أو الرقم: 4733 | خلاصة حكم المحدث : [صحيح]

      card #hadith

    1.  يُؤْتَى بالمَوْتِ كَهَيْئَةِ كَبْشٍ أمْلَحَ، فيُنادِي مُنادٍ: يا أهْلَ الجَنَّةِ، فَيَشْرَئِبُّونَ ويَنْظُرُونَ، فيَقولُ: هلْ تَعْرِفُونَ هذا؟ فيَقولونَ: نَعَمْ، هذا المَوْتُ، وكُلُّهُمْ قدْ رَآهُ، ثُمَّ يُنادِي: يا أهْلَ النَّارِ، فَيَشْرَئِبُّونَ ويَنْظُرُونَ، فيَقولُ: وهلْ تَعْرِفُونَ هذا؟ فيَقولونَ: نَعَمْ، هذا المَوْتُ، وكُلُّهُمْ قدْ رَآهُ، فيُذْبَحُ، ثُمَّ يقولُ: يا أهْلَ الجَنَّةِ، خُلُودٌ فلا مَوْتَ، ويا أهْلَ النَّارِ، خُلُودٌ فلا مَوْتَ. ثُمَّ قَرَأَ: {وَأَنْذِرْهُمْ يَوْمَ الْحَسْرَةِ إِذْ قُضِيَ الْأَمْرُ وَهُمْ فِي غَفْلَةٍ}، وهَؤُلاءِ في غَفْلَةٍ أهْلُ الدُّنْيا {وَهُمْ لَا يُؤْمِنُونَ} [مريم: 39]. الراوي : أبو سعيد الخدري | المحدث : البخاري | المصدر : صحيح البخاري الصفحة أو الرقم: 4730 | خلاصة حكم المحدث : [صحيح]

      card #hadith

  8. Mar 2022
  9. Nov 2021
    1. The functions defined can be called anywhere within the file or in another file in the directory depending upon the use case. Arguments are the variables that are passed to the function for execution. It is different from parameters as arguments are the actual values that are passed to the function header. The argument values are assigned to the parameters of the function and therefore the function can process these parameters for the final output. The arguments are accessible throughout the program depending upon the scope of the variable assigned. These can be taken from the user end or can be predefined variables

      parameters vs arguments