|
This article
The beginning (Introduction and Purpose of Microservice) looks like being copied from here .
The again if you have a look at "Data Sovereignty" -part and compare it to "Data Sovereignty Per Microservice" in here, it feels just like condensed explanation from msdn...
Any opinions?
|
|
|
|
|
The numbered list is copy, paste, and minor tweak.
The "author": SHANIR A - Professional Profile[^] - he'll need a good kicking as well.
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
AntiTwitter: @DalekDave is now a follower!
|
|
|
|
|
That's what I was afraid of
Thank you for confirming!
|
|
|
|
|
No second Chance? I'm sure, same can happen to others (incl. me) but because they a are more frequently on they will get first a warning.
btw: Yes I'm aware about the rules.
modified 19-Jan-21 21:04pm.
|
|
|
|
|
0x01AA wrote: No second Chance? I'm sure, same can happen to others (incl. me) but because they a are more frequently on they will get first a warning.
I know what you mean, but then again the article seems to be a copy-paste with only minor modifications. Also some references were mentioned, but not the ones that seemed to be the original sources. This gives a feeling that plagiarism was intentional, not by accident.
Have a look at Sean's r typical answer to plagiarism: over here
|
|
|
|
|
I see all these arguments. But I like to remember also "then and when" to "keep care" when reporting. This because sometimes I have the feeling that reporting becomes a discipline here.
modified 19-Jan-21 21:04pm.
|
|
|
|
|
I think Wendelius did exactly the right thing - asked for a 2nd opinion, but was able to identify a potential source. That to me is applying "discipline" when reporting.
The rules are quite clear - plagiarism will simply not be tolerated at all. It is lying - it is not acceptable in most societies and it is not acceptable on this site. It's not as if the member only just joined - he's been around for over 2 years so has had plenty of opportunity to learn how it is.
Reporting of spam can be more difficult - has the link been included in the post because it is an example of the problem or because the member is site-driving? It's not always obvious.
But then, responding to a post in this forum by reporting an article, post or member should not be a blind act - each member should act on their own conscience when reporting.
|
|
|
|
|
Plagiarist terminated.
"These people looked deep within my soul and assigned me a number based on the order in which I joined."
- Homer
|
|
|
|
|
All gone
modified 22-Jun-17 10:21am.
|
|
|
|
|
All gone
modified 22-Jun-17 10:21am.
|
|
|
|
|
All gone
modified 22-Jun-17 10:20am.
|
|
|
|
|
All gone
modified 22-Jun-17 10:20am.
|
|
|
|
|
|
All gone
modified 22-Jun-17 10:20am.
|
|
|
|
|
All gone
modified 22-Jun-17 10:20am.
|
|
|
|
|
All gone
modified 22-Jun-17 10:19am.
|
|
|
|
|
|
|
This: Firebase Cloud Messaging[^]
From this: Rajasekhar Donkala - Professional Profile[^]
Is copied from this: Firebase Cloud Messaging | Firebase[^]
Search both for "Using FCM, you can notify a client app that new email or other data is available to sync. You can send notification messages to drive user reengagement and retention. For use cases such as instant messaging, a message can transfer a payload of up to 4KB to a client app."
And this: "An FCM implementation includes two main components for sending and receiving:"
And ... oh, you get the idea ...
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
AntiTwitter: @DalekDave is now a follower!
|
|
|
|
|
All gone
modified 22-Jun-17 10:19am.
|
|
|
|
|
All gone
modified 22-Jun-17 10:19am.
|
|
|
|
|
All gone
modified 22-Jun-17 10:18am.
|
|
|
|
|
All gone
modified 16-Jun-17 16:38pm.
|
|
|
|
|
Sean smash!
"These people looked deep within my soul and assigned me a number based on the order in which I joined."
- Homer
|
|
|
|
|
Just wow!
|
|
|
|