Customer Views 10.1 THE FIVE ADDITIONAL VIEWS 10.2 THE OVCUSTOMER UTILITY 10.3 CONFIGURING THE HIERARCHICAL SUBMAP BUILDER 10.4 SUMMARY Chapter 11. Scalability and Distribution 9.1 REMOTE CONSOLES 9.2 CONFIGURING THE ON-DEMAND LEVEL FOR A MAP 9.3 CONFIGURING THE POLLING FREQUENCY 9.4 DEFINING FILTERS 9.5 DISTRIBUTED INTERNET MONITORING (DIM) 9.6 SUMMARY Chapter 10. Data Collection and Event Configuration 8.1 CREATING A DATA COLLECTION 8.2 CREATING THRESHOLD AND REARM EVENTS 8.3 CUSTOMIZING EXISTING DATA COLLECTIONS 8.4 CUSTOMIZING EXISTING EVENTS 8.5 TEST YOUR KNOWLEDGE OF DATA COLLECTION AND EVENTS 8.6 DETAILED SOLUTION TO NETWORK PRINTER EXERCISE 8.7 SUMMARY Chapter 9. Advanced Customization 7.1 Application Integration using Application Registration Files (ARFs) 7.2 Application Integration using Web Launcher Registration Files (WLRF) and Network Presenter Registration Files (NPRF) 7.3 Defining Custom Symbols and Fields 7.4 Summary Chapter 8. Customizing NNM from the GUI 6.1 CUSTOMIZING SUBMAPS 6.2 SUMMARY Chapter 7. Network Discovery 5.1 SEEDING INITIAL DISCOVERY 5.2 ADDITIONAL DISCOVERY METHODS 5.3 NETMON POLLING STATISTICS 5.4 CONFIGURING SNMP COMMUNITY NAMES 5.5 FIREWALL CONSIDERATIONS IN NETWORK DISCOVERY 5.6 SUMMARY Chapter 6. Out-of-the-box Network Node Manager 4.1 NNM DISCOVERY 4.2 SYMBOLS AND OBJECTS 4.3 ALARM CATEGORIES 4.4 QUERYING THE MIB 4.5 WEB ACCESS 4.6 SUMMARY Chapter 5. Create a Deployment Plan 3.1 MANAGEMENT REQUIREMENTS 3.2 DEFINE THE MANAGEMENT DOMAIN 3.3 ARE THERE FIREWALLS WITHIN THE MANAGEMENT DOMAIN? 3.4 OUT-OF-BAND NETWORK MANAGEMENT 3.5 BACKUP AND RECOVERY REQUIREMENTS 3.6 AUTHENTICATION, AUTHORIZATION, AND ACCESS CONTROL REQUIREMENTS 3.7 EVENT CORRELATION REQUIREMENTS 3.8 HIGH AVAILABILITY AND FAULT TOLERANCE REQUIREMENTS 3.9 CONFIGURATION AND CHANGE MANAGEMENT PROCESS REQUIREMENTS 3.10 HARDWARE CONFIGURATION REQUIREMENTS 3.11 SUMMARY Chapter 4. TO EVEN GET OFF THE GROUND 2.5 SUMMARY Chapter 3. TO EFFECTIVELY MANAGE THE ENTERPRISE GROWTH 2.3. Why Network and Systems Management Systems Fail 2.1. Introduction to Network Node Manager, Customer Views, and Service Information Portal 1.1 AN SNMP COKE MACHINE 1.2 WHAT NETWORK NODE MANAGER PROVIDES 1.3 WHAT CUSTOMER VIEWS PROVIDES 1.4 WHAT SERVICE INFORMATION PORTAL PROVIDES 1.5 OBTAINING EVALUATION COPIES OF NNM, CV, AND SIP 1.6 ADDITIONAL OPENVIEW PRODUCTS 1.7 SOME HELPFUL URLS Chapter 2. Sitemap HP OpenView System Administration Handbook: Network Node Manager, Customer Views, Service Information Portal, HP OpenView Operations Table of Contents Copyright Praise for HP OpenView System Administration Handbook Hewlett-Packard Professional Books How This Book Is Organized Acknowledgements Who This Book Is For Conventions Used in This Book Part 1: Network Node Manager, Customer Views, and Service Information Portal Chapter 1.The temporary folder, or extract the archive before running the restore command. In this case, either ensure that the current working directory has adequate storage capacity to support If the provided source is a tar file, the NNMi restore command extracts the tar file to a temporary folder in the current With the -force option, the nnmrestore.ovpl command stops all NNMi processes, starts the nmsdbmgr service (if restoring from an online backup of the NNMi database), restores the data, and then restarts all NNMi processes. In restoring an offline backup, NNMi overwrites the Postgres files in the file system, completely replacing the database files For the NNMi database, the nmsdbmgr service must be running. Made revert to their state at the time of the backup. Additionally, any objects that were changed after the backup was That have been created since the backup was made disappear. Objects that were deleted after the backup was made are restored, and objects In restoring an online backup, NNMi copies the file system data to the correct locations and overwrites the contents of theĭatabase tables that were included in the backup. Management server, you must uninstall NNMi from the original NNMi management server. After you restore NNMi on the second NNMi Second NNMi management server means that both servers have the same database UUID. When you are using the global network management function, placing the backup data from one NNMi management server onto a Of operating system and the same NNMi version and patch level.ĭo not restore backup data acquired from an NNMi with a cluster configuration to an NNMi with a single configuration. If you use the nnmrestore.ovpl script to place database records on a second NNMi management server, both NNMi management servers must have the same type The type and scope of the backup determines what NNMi can restore. The NNMi restore script ( nnmrestore.ovpl) places backup data on the NNMi management server.
0 Comments
What are the differences between Chief Architect X6 Premier versus Home Designer 2014? Find out with this detailed comparison list. Home Designer Pro is professional home design software for the serious DIY home enthusiast. Chief Architect Home Designer Suite 2018. You can change the designs colors, shapes, and the effects without professional assistance. Home Designer Pro 2017 Crack is a 3D structure designing software for professional builders, designers, architects, & DIY home-based used for designed software who makes able a user toĬoupons Clock. Heres below direct download links for this software. MidwayUSA is a privately held American retailer of various hunting and outdoor-related products. Home Designer Pro is professional home design software for the serious DIY enthusiast. Home Designer Pro 2015 Crack KeygenGet it Here Home Designer Pro 2015 CrackHome Designer Pro 2015 is providing lots of effective yet super easy to. Photo & Graphics tools downloads - Home Designer Pro 2016 (64 bit) by Chief Architect and many more programs. Watch Ashampoo Home Designer Pro 2 Crack (Legit Download) by Greg Benson on Dailymotion here key features of 3d architect home designer pro: create detailed architectural drawing sets for planning applications further enhance 2d drawings with building regulation information add detailed. Knitting Classic Style : knitting classic style ebooks. Home Designer Pro 2014 Crack Mac Home Designer Pro 2014 Crack Mac - Title Ebooks. download with crack, chief architect home designer pro 2017 product key. Home Designer Pro 2018 Crack With Keygen Win + Mac Home Designer Pro 2018 Crack is professional computer software for the serious DIY corporation enthusiast. Home Designer Pro Crack 14 stanmeg Home Designer Pro Crack 14 Home designer suite 2018 how to Home designer suite 2018 serial number. Break down larger tasks into smaller ones to help you get things done. Work in table view and stay organized with your task due dates, and more. This view lets you work in a horizontal tree-structured manner and map out what you have in mind. Visualize your workflow and tasks in this full-width view. This view lets you work horizontally like a Kanban board. Cycle between the List, Mind Map, Org Chart, and Board views to work the way you want. Visualize your projects in several different ways. Outline your notes and map information out in a writing tool and switch back and forth between an outliner and a mind map to help you digest information better. Taskade offers a structured approach when it comes to mind mapping. Taskade is a complete creative stack with advanced features to help you come up with fresh new ideas! Mind mapping with Taskade You and your team can work and chat in the same window, without having to patch several apps together. Two (or more) heads are better than one! Mind maps in Taskade are wired for collaboration. And that means every project, be it a mind map, kanban board, outline, or an ordinary list, can be reshaped and transformed according to your needs. You can use Taskade’s mind mapping component to engage in non-linear, out-of-the-box thinking, accentuate connections between ideas, deal with information overload, and organize knowledge in a simple and effective way.Įverything you do in Taskade is stored in a hierarchical tree-structured database. With Taskade, you can chat, plan, manage projects, assign tasks, and-wait for it-create beautiful mind maps! Taskade is where remote teams get work done. The Y Combinator-backed startup aims to help remote teams and individuals get work done faster and smarter. Taskade is an online productivity and collaboration tool that was founded by John Xie, Dionis Loire, and Stan Chang in 2017. Now, let’s dive in and take a look at the best mind mapping software for Microsoft Windows users. O The Best Mind Mapping Apps and Software for Microsoft Windows Why pay for a mind mapping tool when you can get it for free? Regardless if you’re a seasoned mind mapper or a newbie, Taskade has plenty of features available to help you be more productive. Taskade offers you the ability to create beautiful mind maps and more, all for free. Taskade allows you to effortlessly do this, giving you the ability to switch between outlining information or taking structured notes with the list view and getting a bigger picture of things via a mind map view.Īt the end of the day, the mind mapping tool that you choose should be customizable enough to allow you to be creative and generate better ideas. It’s even better if you can effortlessly switch between views. You should be able to use it the way that you want to, with the ability to highlight key points and create branches from your central idea. The perfect mind mapping software should mimic or closely resemble the feeling of mind mapping by hand. There’s no point in spending more time learning to use a tool than actually being productive with it. If the tool feels like it’s too complicated for you then you should probably give it a pass. However, how many features is exactly one too many? The optimal mind mapping tool should be relatively simple for you to use and require minimal onboarding. We think that the perfect mind mapping tool comes down to 3 things which are: ease of use, customizability, and cost. There’s no shortage of mind-mapping software out there. What exactly should you look out for if you’re in the market for mind mapping software? What Should You Look For in Mind Mapping Software? The best mind mapping software would be tools that closely replicate the feeling of mind mapping with pen and paper. Technological advancements in the 21st century have eventually led us to a point where we can use mind map software to create mind maps digitally.Īrguably, nothing beats the feeling and customizability that a hand-drawn mind map gives you. Traditionally, mind maps would be drawn by hand using pen and paper. By using them, you will be able to visualize your ideas and organize your information on a mind map. Today, there are plenty of mind mapping software that can help you to create digital mind maps. Mind mapping is a way of thinking that helps you to organize your information and ideas visually. 5 Frequently Asked Questions About Mind Mapping Software for Windows and Mac.4 The Best Mind Mapping Apps and Software for Mac.3 The Best Mind Mapping Apps and Software for Microsoft Windows.2 What Should You Look For in Mind Mapping Software?. $ sudo apt-get install aubio evince fftw fluidsynth gtk3 guile librsvg libsmf libxml2 lilypond portaudio portmidi intltoolĭownload the Denemo 1.0. open to the public Denemo is a free music notation program for GNU/Linux. A job can be a single command or a small script that has to be run for each of the lines in the input. and Install Decent Sampler Kontakt 5/6 version: Virtual DJ Software. Follow these instructions for a successful installation: GNU Parallel is a shell tool for executing jobs in parallel using one or more computers. It is not available via PPA, so we have to install it from sources. The GIMP is a freely distributed piece of software for such tasks as image composition, photo retouching and image authoring. Sibelius is a virtual score creation tool which allows composers to easily create new piano scores, developed by Avid. Categories: Music Tools Music Musician Tools. In this article I will show you how to install Denemo 1.0.4 on Ubuntu 13.10 Saucy Salamander, Ubuntu 13.04 Raring Ringtail, Ubuntu 12.10 Quantal Quetzal, Ubuntu 12.04 Precise Pangolin, Ubuntu 10.04 Lucid Lynx, Linux Mint 16 Petra, Linux Mint 15 Olivia, Linux Mint 14 Nadia, Linux Mint 13 Maya, Debian Jessie, Debian Sid, Debian Wheezy and Debian Squeeze. Free gnu denemo download software at UpdateStar - The GIMP is the GNU Image Manipulation Program. LilyPond GNU LilyPond is a computer program for music engraving. Denemo RapidComposer Cross-platform lightweight speed-painting tool for creating music. The latest version available is Denemo 1.0.4. As you may know, Denemo is a Linux music notation program that allows the user to “type music” with the PC-Keyboard, played via MIDI or recorded with an external microphone, plugged into the computer. Note that our policy is not to make links to pages or sites whose subject is proprietary software, and we also. It's easy enough to do on Normal difficulty, but it's a time-consuming business. The first tint of Venombite is awarded for completing 30 Legion dungeons.Unlocking the basic Venombite skin of Subtlety Rogue hidden Artifact transmog will require you to fulfill unique requirements designed specifically for this spec.If you already have some progress with Honor Levels, consider buying our Honor Level boost to reach the desired level. This Subtlety Rogue PvP Artifact skin is awarded for upgrading your Honor Level. After you have unlocked all tints of Subtlety Rogue Valorous Artifact skin you will earn achievement Fighting with Style: Valorous.īloodfeaster is Subtlety Rogue War-Torn Artifact appearance.The third tint of Demon's Embrace can be unlocked by earning the Glory of the Legion Hero achievement which requires to complete all achievements in Legion dungeons.The second tint of Demon's Embrace is awarded for completing the Keystone Master which requires to complete a Mythic+15 dungeon in time.Unlocking the first tint of Demon's Embrace requires you to earn the Unleashed Monstrosities achievement.To unlock the basic Demon's Embrace Artifact skin, most commonly known as the Balance of Power appearance, you will need to complete long and grindy questline Balance of Power and earn the Improving on History achievement which takes several weeks of doing Legion raids.Balance of Power appearance of Subtlety Rogue Artifact is related to completing various Legion PvE activities. After you have unlocked all tints of Subtlety Rogue Upgraded Artifact skin you will earn achievement Fighting with Style: Upgraded.ĭemon's Embrace is Subtlety Rogue Valorous Artifact appearance, also known as Balance of Power skin.To unlock the third tint of Shadowblade Artifact you will need to earn This Side Up Archeology achievement which takes a minimum of 16 weeks to complete.Unlocking Shadowblade second tint will require you to earn the Part of History achievement.Originally, to unlock Shadowblade first tint you had to unlock every trait of the Subtlety Rogue Artifact ability tree, but since the Legion Artifacts were disabled after BFA expansion release this tint is now automatically awarded for completing the Class Hall campaign of Rogue.Unlocking the basic Shadowblade Artifact skin you will need to complete Class Hall campaign and earn Forged for Battle achievement.Subtlety Rogue Classic Artifact appearance is unlocked by completing the introductory Legion quest chain. You can buy each Subtlety Rogue Artifact skin separately or get them all at discounted price! So, let us see in detail which Subtlety Rogue artifact skins you can get. With our Subtlety Rogue Artifact appearances boost you can get 6 different skins for your Fangs of the Devourer, each of them comes in 4 different colors which makes a total of 24 different variants of Subtlety Rogue Artifact weapon. What Subtlety Rogue Artifact weapon appearances can you get? Just place the order, tell us your preferred playing schedule and our players will start farming any of Subtlety Rogue Artifact appearances for your collection. Do you want to save your time and avoid the boring farming of Subtlety Rogue Artifact appearances? Then this service is for you!īuying Subtlety Rogue Artifact weapon transmog from our PRO players is an easy way to skip the boring routine and enjoy more pleasant parts of the game. Unlocking all Artifact styles and tints of Fangs of the Devourer will require completing a lot of different content from you: from massive and boring quest chains, hard and grindy PvE activities and farming PvP kills to camping world bosses. And of course the most beautiful skins of Subtlety Rogue Artifact weapon are NOT the basic appearance so you will need to work hard to unlock all Subtlety Rogue Artifact skins! It's easy to get the basic Fangs of the Devourer appearance by simply doing the Legion quests, but customizing your Subtlety Rogue Artifact with different skins and tints will take much of your time. Fangs of the Devourer is Subtlety Rogue Legion Artifact Weapon and would become a legendary addition to your transmog weapon collection. "Start-up" is how quickly the attack comes out from the instant you press the button. The top part shows attack level, damage and block damage. When you choose a move on this list, the table to the right displays its data. Here’s an example, in this case Black Canary’s standing light attack. All you need to do is check out the move list. Luckily for us, Injustice 2 comes with frame data information built into the game. The information is precious to high-level players, who seize on the tiniest edges. These are the questions that frame data answers, definitively. You know that you can hit my opponent after they try that unsafe move, but how hard can you hit them? Do you need to jab them or can you use an even stronger attack? You know that a jab is fast, but how fast exactly is it? What moves will it counter? If Superman and Batman both throw a punch at the same time, who will hit first? (Batman, by two frames.) Over the years, fighting game players who already understood the basic concept of initiative (who moves first?) started to research the numbers to gain a more concrete understanding. Each frame is a unit of time, one 60th of a second. This is not just a technical detail but part of the game design. Injustice 2, like most modern fighting games, runs at 60 frames per second. It’s an advanced topic and can seem nebulous, but it’s really not that strange once you understand a few key facts. You may have heard about "frames" or "frame data" in fighting game discussion. In this section, we’re going to dangle a little bit of advanced theory in front of you. There seems to be a lot of competition in the VPN service provider space, with several companies contesting for significant portions of the expanding VPN market. Have it bookmarked on your browser so you could easily access the VPN router settings whenever you need.Virtual Private Networks are significant in ensuring secure connections and privacy when using the internet it is no wonder the number of users keeps increasing. That’s the router’s IP address we talked about before. You will often find yourself dealing with slower performance, intrusive ads, and possibly even have your online activity logged and sold to third parties. Free VPN service providers may not have the security standards of paid ones. Make sure your VPN client isn’t going to waste on a VPN router that can’t fully support it. However, not all VPN routers support them. WireGuard, IKEv2, and OpenVPN are the best, most secure ones on the market. Newer encryption standards are faster and more secure. Look for the latest encryption standards.Don’t have a VPN running on both your router and your device – your VPN-protected router has got you covered! Doubling up on the VPN connections will decrease your internet speed. The more servers a VPN provider offers, the greater your options. If you want speed, connect to a VPN server that is closest to your location. A pre-configured VPN router can save you some trouble! Tips to get the most out of your VPN router Or you can just ditch the current router (don’t forget to recycle) and get a VPN router instead. Now follow the steps above in How to set up a VPN router.Navigate to the VPN tab under Services and check the “Enable” bubble next to “Start Open VPN Client.” Make sure your router is connected to the internet.Enter that in your browser as a URL, and you’ll be asked to set a new username and password. Again, make sure it’s the right file for your browser, then upload it and wait. Many router interfaces have it under “Administration.” Click around until you find it. This is very important as the process can void your warranty or even make the router no longer work. Download the bin files from the DD-WRT website for your specific router.Use the search box to find the model of your router (you can also try OpenWRT or Tomato if you can’t find your model on DD-WRT). Check if your router is supported by going to the DD-WRT website. If you haven’t changed them, you should find them in the router’s manual ( Tip : you can access most routers by typing in “ admin ” for both username and password ). This should bring up a prompt that asks you for your router’s username and password. To access your router, enter the IP from Step 1 in your browser like you would a URL. Find out your router’s IP address (follow the instructions from Step 1 of the How to set up a VPN on a route r instructions above).If your router is not already VPN client-compatible, you can usually set it up with third party firmware to fix the issue. Depending on your router’s model and brand, this section may be somewhere else. Usually found under the advanced settings of your router. You will find your router’s IP address displayed next to “Router.”.Here, select “Wi-Fi” -> “Advanced…” -> “TCP/IP.”.Open “ System Preferences” from the Apple menu.You should see your router’s IP address on the “ Default Gateway ” line.A console window will appear type “ ipconfig ” in it and press “ Enter.Open the “ Start ” menu, type in and select “ Command Prompt.If you don’t know your router’s IP address, here’s how you can find it: Access it by entering your router’s IP (Internet Protocol) address in your browser, just like a URL. If you don’t have one, consider purchasing Surfshark VPN subscription !Īnd once the VPN part is covered, let’s begin with the technical setup: VPN installation begins with the VPN itself. New in 8! Registered Valentina Projects can serve Valentina Forms to Valentina Studio.net client rewritten to meet the new syntax standards for Managed Code New in 8.2.1! ICU upgraded from 5.3 to 5.8.New in 8.3! Valentina Server is now fully multi-threaded (not as a separate download).New in 8.7! Valentina SQLite Server now supports remote handling of BLOBs.New in 9! Docker for Valentina Server, on Linux, Mac OS and Windows.New in 9! Support the new, more efficient Valentina 9 protocol SQLite upgraded to 3.2.6.New in 9! SET PASSWORD OF username IDENTIFIED BY old_password TO new_password.New in 9! Scheduler of Valentina Server can work with a backup of a Valentina Project.New in 9! Get the number of licenses for VDB/SQLite/Reports by SNMP.Valentina Server includes across the board improvements to management and deployment. Update before the end of your update period at a discounted rate.Updated examples for C++, Python, Xojo and more.Diagnose, compress, clone, defragment, reindex and dump data.Direct, next business day support, with more advanced support options available.12 full months of technology upgrades from your data of purchase.Print directly from Valentina Server to an attached printer.32 / 64 bit natively on Windows, Linux and macOS, Raspberry Pi (Debian, ARM 7).Report Server and Form Server integrates with MySQL, MariaDB, MS SQL Server, SQLite (Valentina SQLite Server), ValentinaDB (ValentinaDB ADK, ValentinaDB Database Server, PostgreSQL.REST based access opens integration to most mobile platforms also works with Xojo Web Edition.30+ Native Drivers for Client Application Access.Administer your databases with free Valentina Studio.Highly secure with SSL and powerful, built in encryption.Remotely Register/unregister Valentina Projects.Add/drop users, groups, manage privileges.See Valentina Studio Pro for more information on Valentina Forms Serve Valentina Forms to users of Valentina Studio. Valentina SQLite Database Server with full multi-access, industry standard server features.ValentinaDB Database Server based on ultra-fast, object-relational columnar technology, including Valentina DB KeyValue database *.
Instead, it’s the level of detail at hand. It’s not so much because of its unique character – in fact, it’s just another action title with Nazi-like scum to shoot and a badass hero in the centre of it all. This is simply one the most beautiful games in existence. What would it look like? The answer is: like Metal Slug. Imagine if Super Nintendo had a powered-up “Pro” version, and some of the most talented 2D artists were to design a game for it. As you can imagine, these memorable moments are what makes Metal Slug stand out from other run-and-gun titles, which tend to take a humourless view on the art of destruction. Enemy soldiers display a wide range of emotions explosions send them flying into the air with blood-curdling screams, while at other points – unaware of your presence – they indulge in bonefire chats or a spot of sunbathing. The visuals really are stunning, even after 20 years this is 2D artwork at its finest, boasting detailed characters, rich backgrounds and plenty of offbeat humour. You won’t find any gigantic mechanised crabs but you will find an impressive selection of screen-filling military ordinance, all of which you’re expected to take down. In this opening game, the theme is kept strictly military, avoiding the rather outlandish and largely nonsensical plots introduced in later entries. This simplicity may be viewed as a shortcoming, but in all honesty Metal Slug is such a refined and enjoyable romp that it actually feels tighter and more enjoyable than some of its gung-ho sequels, many of which piled on the sprites (and the absurdity) to the point where some scenes looked downright silly and slowdown was a real issue. Later Slug games introduced a wide range of alternative vehicles – some of which felt a little on the gimmicky side – but by sticking to a single option here there’s a certain purity to the experience. This “Super Vehicle” pops up at predetermined points in each of the game’s levels, and is capable of taking a fair amount of punishment before it explodes and your character is forcibly ejected. The setting surely requires no explanation you’re tasked with taking down an entire army of enemies using a series of guns – many of which can be collected in the field by saving POWs and have limited ammo – grenades and (of course) the titular Metal Slug tank. METAL SLUG Switch NSP Free Download Romslab Parental educational level affected high ability judgment, but only through its relation with school achievement. Girls were less likely to be perceived as highly able than boys with similar levels of ability. High ability judgments by teachers were found to depend more on everyday school achievement (GPA) than on cognitive ability (IQ) itself, even when teachers were urged to distinguish between achievement and ability. Building on a large survey among 7th graders and their teachers, this study considers which student characteristics affect teacher and peer recognition of high ability students. They can be valuable components of many products that protect against free radical attack and also prevent diseases associated mainly with oxidative stress.Īccurate teacher judgments of student cognitive ability are crucial to effective instruction. These studies show that algae extracts have great potential in the cosmetics, pharmaceutical or agricultural industries. Nine phenolic compounds (gallic acid, chlorogenic acid, syringic acid, p-coumaric acid, myricetin, 3,4-dihydroxybenzoic acid, vanillic acid, 4-hydroxybenzoic acid and rutin) were identified using qualitative analysis by high-performance liquid chromatography. Regardless of the extraction method and extractant used, both phenolic acids and flavonoids, were determined in all tested extracts. The analysis was carried out using colourimetric and spectrophotometric methods as well as the method of high-performance liquid chromatography. The extracts were analysed for the assessment of their antioxidant activity, which is one of the commonly described properties of phenolic compounds. The obtained results show that the microwave-assisted extraction with water was the most effective for isolation of phenolic compounds and antioxidants. Three types of extraction and five different solvents with different polarity were used to isolate antioxidants, including phenolic compounds. For the first time, the impact of the extraction type and the kind of solvent on the efficiency of antioxidant isolation from freshwater algae was determined. Different types of extraction and extractants were used to isolate these bioactive compounds. This work focuses on the isolation and determination of phenolic compounds from freshwater algae of the species Cladophora glomerata. However, there is little data on the chemical composition of algae obtained from freshwater. This interest is due to the presence of a variety of biologically active compounds that give algae extracts a broad spectrum of biological and functional properties. The growing number of publications proves that these algae are an interesting and essential natural resource. Marine algae biomass has gained widespread interest in the world of science and many industries. |