Black Alert
Black Alert
  • 28
  • 6 938
كيفية تشغيل الذكاء الصناعي اوف لاين باستخدام Ollama
شرح مبسط كيف تستخدم Ollama لحتى تشغل ذكاء صناعي عندك اوف لاين على الكومبيوتر.
طبعا مش محتاج اي اتصال بالانترنت لحتى يشتغل
بينفع ل #المؤسسات #الاعمال #التعليم
#الذكاء_الاصطناعى #الذكاء_الاصطناعي #ذكاء_اصطناعي #ذكاء #AI #ollama #privateai
#small_business
มุมมอง: 11

วีดีโอ

🎥 Tutorial: Deploying Google's Gemini AI on AWS | Terraform | APIGW | Python | BitBuckets
มุมมอง 5021 วันที่ผ่านมา
Welcome to Black Alert! In this step-by-step tutorial, we show you how to leverage Terraform, AWS Lambda, and Python to deploy Google's Gemini AI in a scalable and cost-effective way. We specialize in AWS, DevOps, Terraform, AI, and Python, empowering businesses from our base in Dubai. 📞 Contact us: 📱 971581454113 📧 admin@blackalert.agency 🌐 blackalert.agency GitHub repo: github.com/Black-Alert...
Step-by-Step: Building an S3 Module for AWS Buckets with Terraform
มุมมอง 7028 วันที่ผ่านมา
🚀 Welcome to Black Alert Agency's Terraform Tutorial Series! 🚀 In this video, we walk you through creating a reusable Terraform S3 Module for AWS buckets. Whether you're a beginner or an experienced cloud engineer, this step-by-step guide will help you simplify your Terraform code and manage AWS infrastructure more efficiently. 🛠 What You'll Learn: - Writing a reusable Terraform module for S3 b...
اطلالة رائعة على برج خليفة Amazing View Burj Khalifa
มุมมอง 193 หลายเดือนก่อน
زيارة مسائية ل برج خليفة منظر يخطف الانفاس
Relaxing With Rain #lofi​​ #chill​​ #lofihiphop​​
มุมมอง 373 ปีที่แล้ว
Chill and relax, Cup of Coffe :)
Hagia Sofia Istanbul
มุมมอง 624 ปีที่แล้ว
Hagia Sofia Istanbul
RestFul Apis, Python Sanic Framework tutorial
มุมมอง 2.5K4 ปีที่แล้ว
RestFul Apis, Python Sanic Framework tutorial
How to Build RestFul Apis in SpringBoot
มุมมอง 494 ปีที่แล้ว
How to Build RestFul Apis in SpringBoot
Spring Boot from Scratch-Starter Application
มุมมอง 855 ปีที่แล้ว
Spring Boot from Scratch-Starter Application
Java For beginners
มุมมอง 205 ปีที่แล้ว
Java For beginners
freeRadius, mikrotik setup full tutorial
มุมมอง 3216 ปีที่แล้ว
freeRadius, mikrotik setup full tutorial
HiNet Smart Solution Internet Speed Test
มุมมอง 7046 ปีที่แล้ว
HiNet Smart Solution Internet Speed Test
LoadBalancing Using Mikrotik
มุมมอง 3297 ปีที่แล้ว
LoadBalancing Using Mikrotik
Mikrotik PCC Based Load Balancing
มุมมอง 3287 ปีที่แล้ว
Mikrotik PCC Based Load Balancing
Mikrotik VPN L2TP/IPSec الحمايه من النت كت
มุมมอง 3037 ปีที่แล้ว
Mikrotik VPN L2TP/IPSec الحمايه من النت كت
Mikrotik L2TP with IPSec VPN Setup
มุมมอง 9627 ปีที่แล้ว
Mikrotik L2TP with IPSec VPN Setup
HiNet L2TP VPN
มุมมอง 3877 ปีที่แล้ว
HiNet L2TP VPN
HiNet WISP
มุมมอง 597 ปีที่แล้ว
HiNet WISP

ความคิดเห็น

  • @blackalert.agency
    @blackalert.agency 5 หลายเดือนก่อน

    😢😮

  • @osmantv515
    @osmantv515 6 หลายเดือนก่อน

    حلووو استمر

  • @BreveHerat
    @BreveHerat 3 ปีที่แล้ว

    Omg from where you got it 🙃

  • @NigelFurtado
    @NigelFurtado 3 ปีที่แล้ว

    thanks for sharing, but you could've gone in a bit more detail on demonstrating the features you described in the end of your video.

  • @hammadyounas2688
    @hammadyounas2688 3 ปีที่แล้ว

    How can i wrap any code using Sanic Framework

    • @blackalert.agency
      @blackalert.agency 3 ปีที่แล้ว

      You can use blueprints

    • @hammadyounas2688
      @hammadyounas2688 3 ปีที่แล้ว

      @@blackalert.agency How can you help me ?

    • @blackalert.agency
      @blackalert.agency 3 ปีที่แล้ว

      You can refer to their documents and check the information about blueprints

    • @hammadyounas2688
      @hammadyounas2688 3 ปีที่แล้ว

      @@blackalert.agency Can you share any github or any link I will be very thankful to to you

  • @BreveHerat
    @BreveHerat 3 ปีที่แล้ว

    😮

  • @BreveHerat
    @BreveHerat 3 ปีที่แล้ว

    Hi bro

  • @mixgame5663
    @mixgame5663 4 ปีที่แล้ว

    استمر يا بطل

  • @mixgame5663
    @mixgame5663 4 ปีที่แล้ว

    واصل بدون فواصل يا اسطورة يا افضل مبرمج في تاريخ البشرية

  • @mixgame5663
    @mixgame5663 4 ปีที่แล้ว

    استمر

  • @mixgame5663
    @mixgame5663 4 ปีที่แล้ว

    استمر شروحات 100000/10

  • @mixgame5663
    @mixgame5663 4 ปีที่แล้ว

    استمر يا بطل اتمنى لك النجاح في كل عملك

  • @blackalert.agency
    @blackalert.agency 5 ปีที่แล้ว

    /interface ethernet set [ find default-name=ether10 ] name=LOCAL speed=100Mbps set [ find default-name=ether1 ] loop-protect=off name=WAN1 speed=100Mbps set [ find default-name=ether2 ] loop-protect=off name=WAN2 speed=100Mbps set [ find default-name=ether3 ] name=WAN3 speed=100Mbps set [ find default-name=ether4 ] disabled=yes loop-protect=off name=WAN4 \ speed=100Mbps set [ find default-name=ether5 ] name=WAN5 speed=100Mbps set [ find default-name=ether6 ] name=WAN6 speed=100Mbps set [ find default-name=ether7 ] name=WAN7 speed=100Mbps set [ find default-name=ether8 ] speed=100Mbps set [ find default-name=ether9 ] speed=100Mbps set [ find default-name=ether11 ] advertise=\ 10M-half,10M-full,100M-half,100M-full,1000M-half,1000M-full set [ find default-name=ether12 ] advertise=\ 10M-half,10M-full,100M-half,100M-full,1000M-half,1000M-full set [ find default-name=ether13 ] advertise=\ 10M-half,10M-full,100M-half,100M-full,1000M-half,1000M-full /ip pool add name=dhcp_pool0 ranges=192.168.200.21-192.168.200.254 /ip dhcp-server add address-pool=dhcp_pool0 disabled=no interface=LOCAL lease-time=3h10m \ name=dhcp1 /tool user-manager customer set admin access=\ own-routers,own-users,own-profiles,own-limits,config-payment-gw /interface detect-internet set detect-interface-list=all /ip address add address=192.168.200.1/24 interface=LOCAL network=192.168.200.0 add address=192.168.40.108/24 interface=WAN1 network=192.168.40.0 add address=192.168.41.110/24 interface=WAN3 network=192.168.41.0 add address=192.168.42.146/24 interface=WAN4 network=192.168.42.0 add address=192.168.44.112/24 interface=WAN5 network=192.168.44.0 add address=192.168.43.109/24 interface=WAN2 network=192.168.43.0 add address=192.168.46.156/24 interface=WAN6 network=192.168.46.0 /ip cloud set update-time=no /ip dhcp-client add dhcp-options=hostname,clientid interface=WAN3 use-peer-ntp=no /ip dhcp-server network add address=192.168.200.0/24 gateway=192.168.200.1 /ip dns set allow-remote-requests=yes cache-size=5000KiB servers=\ 37.152.3.67,37.152.5.20 /ip firewall mangle add action=mark-connection chain=input comment="WAN1 Conn Mark" in-interface=\ WAN1 new-connection-mark=WAN1_conn passthrough=yes add action=mark-connection chain=input comment="WAN2 Conn Mark" in-interface=\ WAN2 new-connection-mark=WAN2_conn passthrough=yes add action=mark-connection chain=input comment="WAN3 Conn Mark" in-interface=\ WAN3 new-connection-mark=WAN3_conn passthrough=yes add action=mark-connection chain=input comment="WAN4 Conn Mark" in-interface=\ WAN4 new-connection-mark=WAN4_conn passthrough=yes add action=mark-connection chain=input comment="WAN5 Conn Mark" in-interface=\ WAN5 new-connection-mark=WAN5_conn passthrough=yes add action=mark-connection chain=input comment="WAN6 Conn Mark" in-interface=\ WAN6 new-connection-mark=WAN6_conn passthrough=yes add action=mark-routing chain=output comment="Routing to WAN1" \ connection-mark=WAN1_conn new-routing-mark=to_WAN1 passthrough=yes add action=mark-routing chain=output comment="Routing to WAN2" \ connection-mark=WAN2_conn new-routing-mark=to_WAN2 passthrough=yes add action=mark-routing chain=output comment="Routing to WAN3" \ connection-mark=WAN3_conn new-routing-mark=to_WAN3 passthrough=yes add action=mark-routing chain=output comment="Routing to WAN4" \ connection-mark=WAN4_conn new-routing-mark=to_WAN4 passthrough=yes add action=mark-routing chain=output comment="Routing to WAN5" \ connection-mark=WAN5_conn new-routing-mark=to_WAN5 passthrough=yes add action=mark-routing chain=output comment="Routing to WAN6" \ connection-mark=WAN6_conn new-routing-mark=to_WAN6 passthrough=yes add action=accept chain=prerouting comment="WAN1 Sticky Conn" dst-address=\ 192.168.40.0/24 in-interface=LOCAL add action=accept chain=prerouting comment="WAN2 Sticky Conn" dst-address=\ 192.168.43.0/24 in-interface=LOCAL add action=accept chain=prerouting comment="WAN3 Sticky Conn" dst-address=\ 192.168.41.0/24 in-interface=LOCAL add action=accept chain=prerouting comment="WAN4 Sticky Conn" dst-address=\ 192.168.42.0/24 in-interface=LOCAL add action=accept chain=prerouting comment="WAN5 Sticky Conn" dst-address=\ 192.168.44.0/24 in-interface=LOCAL add action=accept chain=prerouting comment="WAN6 Sticky Conn" dst-address=\ 192.168.46.0/24 in-interface=LOCAL add action=mark-connection chain=prerouting comment="BALANCING WAN5" \ dst-address-type=!local new-connection-mark=WAN5_conn passthrough=yes \ per-connection-classifier=both-addresses-and-ports:6/4 add action=mark-connection chain=prerouting comment="BALANCING WAN1" \ dst-address-type=!local new-connection-mark=WAN1_conn passthrough=yes \ per-connection-classifier=both-addresses-and-ports:6/0 add action=mark-connection chain=prerouting comment="BALANCING WAN2" \ dst-address-type=!local new-connection-mark=WAN2_conn passthrough=yes \ per-connection-classifier=both-addresses-and-ports:6/1 add action=mark-connection chain=prerouting comment="BALANCING WAN3" \ dst-address-type=!local new-connection-mark=WAN3_conn passthrough=yes \ per-connection-classifier=both-addresses-and-ports:6/2 add action=mark-connection chain=prerouting comment="BALANCING WAN4" \ dst-address-type=!local new-connection-mark=WAN4_conn passthrough=yes \ per-connection-classifier=both-addresses-and-ports:6/3 add action=mark-connection chain=prerouting comment="BALANCING WAN6" \ dst-address-type=!local new-connection-mark=WAN6_conn passthrough=yes \ per-connection-classifier=both-addresses-and-ports:6/5 add action=mark-routing chain=prerouting comment=\ "MARKING Conn With Routing WAN1" connection-mark=WAN1_conn in-interface=\ LOCAL new-routing-mark=to_WAN1 passthrough=yes add action=mark-routing chain=prerouting comment=\ "MARKING Conn With Routing WAN2" connection-mark=WAN2_conn in-interface=\ LOCAL new-routing-mark=to_WAN2 passthrough=yes add action=mark-routing chain=prerouting comment=\ "MARKING Conn With Routing WAN3" connection-mark=WAN3_conn in-interface=\ LOCAL new-routing-mark=to_WAN3 passthrough=yes add action=mark-routing chain=prerouting comment=\ "MARKING Conn With Routing WAN4" connection-mark=WAN4_conn in-interface=\ LOCAL new-routing-mark=to_WAN4 passthrough=yes add action=mark-routing chain=prerouting comment=\ "MARKING Conn With Routing WAN5" connection-mark=WAN5_conn in-interface=\ LOCAL new-routing-mark=to_WAN5 passthrough=yes add action=mark-routing chain=prerouting comment=\ "MARKING Conn With Routing WAN6" connection-mark=WAN6_conn in-interface=\ LOCAL new-routing-mark=to_WAN6 passthrough=yes /ip firewall nat add action=dst-nat chain=dstnat comment=ssh dst-port=22 in-interface=WAN1 \ protocol=tcp to-addresses=192.168.200.252 to-ports=22 add action=dst-nat chain=dstnat comment=winbox dst-port=8293 in-interface=\ WAN1 protocol=tcp to-addresses=192.168.200.252 to-ports=8293 add action=dst-nat chain=dstnat comment=MYSQL dst-port=3306 in-interface=WAN1 \ protocol=tcp to-addresses=192.168.200.252 to-ports=3306 add action=dst-nat chain=dstnat comment=Website dst-port=81 in-interface=WAN1 \ protocol=tcp to-addresses=192.168.200.252 to-ports=80 add action=dst-nat chain=dstnat comment=WEBMIN dst-port=8295 in-interface=\ WAN1 protocol=tcp to-addresses=192.168.200.252 to-ports=8295 add action=dst-nat chain=dstnat comment=WEBMIN disabled=yes dst-port=8295 \ in-interface=WAN1 protocol=udp to-addresses=192.168.200.252 to-ports=8295 add action=masquerade chain=srcnat out-interface=WAN1 add action=masquerade chain=srcnat out-interface=WAN2 add action=masquerade chain=srcnat out-interface=WAN3 add action=masquerade chain=srcnat out-interface=WAN4 add action=masquerade chain=srcnat out-interface=WAN5 add action=masquerade chain=srcnat out-interface=WAN6 /ip route add check-gateway=ping distance=1 gateway=192.168.40.1 routing-mark=to_WAN1 add check-gateway=ping distance=1 gateway=192.168.43.1 routing-mark=to_WAN2 add check-gateway=ping distance=1 gateway=192.168.41.1 routing-mark=to_WAN3 add check-gateway=ping disabled=yes distance=1 gateway=192.168.42.1 \ routing-mark=to_WAN4 add check-gateway=ping distance=1 gateway=192.168.44.1 routing-mark=to_WAN5 add check-gateway=ping distance=1 gateway=192.168.46.1 routing-mark=to_WAN6 add check-gateway=ping distance=1 gateway=192.168.40.1 add check-gateway=ping distance=2 gateway=192.168.43.1 add check-gateway=ping distance=3 gateway=192.168.41.1 add check-gateway=ping distance=5 gateway=192.168.44.1 add check-gateway=ping distance=6 gateway=192.168.46.1 add check-gateway=ping disabled=yes distance=4 gateway=192.168.42.1 /ip service set telnet disabled=yes set ftp disabled=yes set ssh disabled=yes set api-ssl disabled=yes /ip ssh set allow-none-crypto=yes /system identity set name=HINET-Balancer /tool user-manager database set db-path=user-manager

  • @fouadalhorani1407
    @fouadalhorani1407 5 ปีที่แล้ว

    تبعثلي اياه ع الايميل اخي اذا بي مجال

    • @blackalert.agency
      @blackalert.agency 5 ปีที่แล้ว

      رح انشره ببلك

    • @fouadalhorani1407
      @fouadalhorani1407 5 ปีที่แล้ว

      @@blackalert.agency الله يجزاك الف خير والشكر الك اخي

    • @fouadalhorani1407
      @fouadalhorani1407 5 ปีที่แล้ว

      @@blackalert.agency اسف ع ازعاجك بس اذا امكن وين نشرت الرول الدمج

    • @fouadalhorani1407
      @fouadalhorani1407 5 ปีที่แล้ว

      @@blackalert.agency السلام عليكم يعطيك الف عافية اخي فراس عدلت متل ما قلت ولكن ما زبط الدمج ممكن تدخل اني ديسك لو سمحت وتشوف وين الغلط صار لو سمحت

  • @fouadalhorani1407
    @fouadalhorani1407 5 ปีที่แล้ว

    ما هي طريقة الدمج لو سمحت واذا ممكن الرول

  • @fouadalhorani1407
    @fouadalhorani1407 5 ปีที่แล้ว

    السلام عليكم لو سمحت اخي ممكن رول الدمج لو سمحت

    • @blackalert.agency
      @blackalert.agency 5 ปีที่แล้ว

      اكيد اخي

    • @fouadalhorani1407
      @fouadalhorani1407 5 ปีที่แล้ว

      @@blackalert.agency فيك تبعثو ع الايميل ؟

    • @blackalert.agency
      @blackalert.agency 5 ปีที่แล้ว

      نشرتلك الرول عدل الاي بي مع المنافذ لكرت الشبكة بالتوفيق

  • @efriyda5058
    @efriyda5058 6 ปีที่แล้ว

    yang di tunjukin interface microtic

  • @efriyda5058
    @efriyda5058 6 ปีที่แล้ว

    mana buktinya kalo itu hinet?

  • @onlyfullmovie313
    @onlyfullmovie313 6 ปีที่แล้ว

    Coba tesnya setelah fup berapa...

  • @blackalert.agency
    @blackalert.agency 7 ปีที่แล้ว

    if any body want to know the way how to do this method of load balancing give me a comment and i will do it

    • @muhamadkhalaf6556
      @muhamadkhalaf6556 6 ปีที่แล้ว

      hi had you try link aggregation ?

    • @blackalert.agency
      @blackalert.agency 6 ปีที่แล้ว

      Muhammad khalaf hi ,unfortenetly i did not because link aggregiatio. Needs more hardware and you need to deal with a company specialized at aggregiation

    • @muhamadkhalaf6556
      @muhamadkhalaf6556 6 ปีที่แล้ว

      do you think its powerful than pcc and nth ?

    • @blackalert.agency
      @blackalert.agency 6 ปีที่แล้ว

      Muhammad khalaf sure

  • @technology_would
    @technology_would 7 ปีที่แล้ว

    يا اخى ليش الفة الطويلة هذى وانتا لم تستخدم هوتسبوت ؟؟ (اصلا البرودباند لا يتم اختراقة من برامج النت كات وغيرة) وانت استغنيت عنة واستخدمت L2tp الاقل حماية من الـ PPPOE ياريت تتابع احدث اختراق لبروتكول L2tp,PPTP من هنا || blog.hidemyass.com/2016/09/26/sweet-32-birthday-attack-what-is-it-and-whowhat-does-it-affect/

    • @blackalert.agency
      @blackalert.agency 7 ปีที่แล้ว

      شكرا للفت الانتباه اطيب الامنيات