From b89bb225349493e69f55fc68b4ce977e59ad53a6 Mon Sep 17 00:00:00 2001 From: Alan Orth Date: Mon, 8 Jul 2019 15:23:05 +0300 Subject: [PATCH] Update notes for 2019-07-08 --- content/posts/2019-07.md | 3 +++ docs/2019-05/index.html | 6 +++--- docs/2019-07/index.html | 12 +++++++++--- docs/sitemap.xml | 12 ++++++------ 4 files changed, 21 insertions(+), 12 deletions(-) diff --git a/content/posts/2019-07.md b/content/posts/2019-07.md index 39c783b6e..37ed6d9ca 100644 --- a/content/posts/2019-07.md +++ b/content/posts/2019-07.md @@ -158,5 +158,8 @@ $ ./fix-metadata-values.py -i 2019-07-04-update-orcids.csv -db dspace -u dspace - Communicate with Atmire about the Solr statistics cores issue - I suspect we might need to get more disk space on DSpace Test so we can try to replicate the production environment more closely +- Meeting with AgroKnow and CTA about their new ICT Update story telling thing + - AgroKnow has developed a React application to display tag clouds based on harvesting metadata and full text from CGSpace items + - We discussed how to host it technically, perhaps we purchase a server to run it on and just give AgroKnow guys access diff --git a/docs/2019-05/index.html b/docs/2019-05/index.html index 853a1cb4e..cfde613d1 100644 --- a/docs/2019-05/index.html +++ b/docs/2019-05/index.html @@ -28,7 +28,7 @@ But after this I tried to delete the item from the XMLUI and it is still present - + @@ -63,7 +63,7 @@ But after this I tried to delete the item from the XMLUI and it is still present "url": "https:\/\/alanorth.github.io\/cgspace-notes\/2019-05\/", "wordCount": "3215", "datePublished": "2019-05-01T07:37:43\x2b03:00", - "dateModified": "2019-06-02T10:58:11\x2b03:00", + "dateModified": "2019-07-08T11:18:51\x2b03:00", "author": { "@type": "Person", "name": "Alan Orth" @@ -510,7 +510,7 @@ UPDATE metadatavalue SET text_lang='es_ES' WHERE resource_type_id=2 AND metadata
  • They specifically mention:

  • -
    The attack that targeted the “Search” functionality of the website, aimed to bypass our mitigation by performing slow but simultaneous searches from 5500 IP addresses.
    +
    The attack that targeted the "Search" functionality of the website, aimed to bypass our mitigation by performing slow but simultaneous searches from 5500 IP addresses.
    diff --git a/docs/sitemap.xml b/docs/sitemap.xml index cc3638f39..5646452bd 100644 --- a/docs/sitemap.xml +++ b/docs/sitemap.xml @@ -4,30 +4,30 @@ https://alanorth.github.io/cgspace-notes/ - 2019-07-06T18:54:34+03:00 + 2019-07-08T11:18:51+03:00 0 https://alanorth.github.io/cgspace-notes/2019-07/ - 2019-07-06T18:54:34+03:00 + 2019-07-08T11:12:32+03:00 https://alanorth.github.io/cgspace-notes/tags/notes/ - 2019-07-06T18:54:34+03:00 + 2019-07-08T11:18:51+03:00 0 https://alanorth.github.io/cgspace-notes/posts/ - 2019-07-06T18:54:34+03:00 + 2019-07-08T11:18:51+03:00 0 https://alanorth.github.io/cgspace-notes/tags/ - 2019-07-06T18:54:34+03:00 + 2019-07-08T11:18:51+03:00 0 @@ -38,7 +38,7 @@ https://alanorth.github.io/cgspace-notes/2019-05/ - 2019-06-02T10:58:11+03:00 + 2019-07-08T11:18:51+03:00