Mostrando 21,321 - 21,340 Resultados de 21,342 Para Buscar '"4:3"', tiempo de consulta: 0.57s Limitar resultados
  1. 21321
  2. 21322
    Publicado 2021
    Tabla de Contenidos: “…29 2.15 Conductors, Semiconductors, and Insulators 30 2.16 Static Dissipative Materials 30 2.17 ESD and Materials 31 2.18 Electrification and Coulomb's Law 31 2.19 Electromagnetism and Electrodynamics 33 2.20 Electrical Breakdown 33 2.21 Electro-Quasistatics and Magnetoquasistatics 36 2.22 Electrodynamics and Maxwell's Equations 36 2.23 Electrostatic Discharge (ESD) 36 2.24 Electromagnetic Compatibility (EMC) 37 2.25 Electromagnetic Interference (EMI) 37 2.26 Fundamentals of Manufacturing and Electrostatics 37 2.27 Materials, Tooling, Human Factors, and Electrostatic Discharge 38 2.28 Materials and Human-induced Electric Fields 39 2.29 Manufacturing Environment and Tooling 39 2.30 Manufacturing Equipment and ESD Manufacturing Problems 39 2.31 Manufacturing Materials 39 2.32 Measurement and Test Equipment 40 2.33 Manufacturing Testing for Compliance 41 2.34 Grounding and Bonding Systems 42 2.35 Work Surfaces 42 2.36 Wrist Straps 43 2.37 Constant Monitors 43 2.38 Footwear 43 2.39 Floors 44 2.40 Personnel Grounding with Garments 44 2.41 Garments 44 2.42 Air Ionization 44 2.43 Seating 45 2.44 Packaging and Shipping 46 2.45 Trays 46 2.46 ESD Identification 46 2.47 ESD Program Auditing 46 2.48 ESD On-Chip Protection 47 2.49 ESD, EOS, EMI, EMC, and Latchup 47 2.50 Manufacturing Electrical Overstress (EOS) 48 2.51 EMI 50 2.52 EMC 50 2.53 Summary and Closing Comments 50 References 50 3 ESD Standards 55 3.1 Factory - Flooring 55 3.2 Factory - Resistance Measurement of Materials 56 3.3 JEDEC 58 3.4 International Electro-Technical Commission (IEC) 59 3.5 IEEE 59 3.6 Department of Defense (DOD) 59 3.7 Military Standards 59 3.8 SAE 60 3.9 Summary and Closing Comments 60 Questions and Answers 60 References 61 4 ESD Testing 65 4.1 Electrostatic Discharge (ESD) Testing 65 4.2 ESD Models 65 4.3 HBM Test System 69 4.4 HBM Two-pin Test System 69 4.5 Machine Model (MM) 69 4.6 Small Charge Model (SCM) 70 4.7 Small Charge Model Source 71 4.8 CDM Pulse Waveform 72 4.9 HMM Equivalent Circuit 77 4.10 HMM Test Equipment 77 4.11 HMM Test Configuration 78 4.12 HMM Fixture Board 78 4.13 Transmission Line Pulse (TLP) 82 4.14 TLP Test Systems 84 4.15 IEC 61000-4-2 87 4.16 Equivalent Circuit 89 4.17 Test Equipment 89 4.18 Cable Discharge Event (CDE) 90 4.19 CDE Pulse Waveform 93 4.20 Equivalent Circuit 93 4.21 Commercial Test Systems 94 4.22 Systems Electromagnetic Interference (EMI) 95 4.23 Electromagnetic Compatibility (EMC) 95 4.24 Electrical Overstress (EOS) 95 4.25 Latchup 95 4.26 Electrical Overstress (EOS) 95 4.27 EOS Sources - Lightning 96 4.28 EOS Sources - Electromagnetic Pulse (EMP) 97 4.29 Electromagnetic Compatibility 97 4.30 Summary and Closing Comments 100 References 100 5 ESD Device Physics 117 5.1 Electro-thermal Instability 117 5.2 Stable System 118 5.3 Unstable System 118 5.4 Differential Relation of Voltage and Current 120 5.5 Time Constant Hierarchy 121 5.6 Thermal Physics Time Constants 121 5.7 Adiabatic, Thermal Diffusion Time Scale and Steady State 121 5.8 Electro-quasistatic and Magnetoquasistatics 122 5.9 Electrical Instability 124 5.10 Thermal Physics Time Constants 125 5.11 Adiabatic, Thermal Diffusion Time Scale and Steady State 126 5.12 Electrical Instability and Breakdown 126 5.13 Spatial Instability and Electro-thermal Current Constriction 127 5.14 Equipotential Surface 127 5.15 Heat Flow 128 5.16 Conservation of Heat 128 5.17 Electric Potential and Temperature Gradient 128 5.18 Electric Energy, Resistivity, and Thermal Conductivity 129 5.19 Breakdown 131 5.20 Electron Current Continuity Relationship 136 5.21 Air Breakdown and Peak Currents 138 5.22 Electro-thermal Instability 139 5.23 Mathematical Methods - Green's Function and Method of Images 141 5.24 Mathematical Methods - Green's Function and Method of Images 143 5.25 Mathematical Methods - Integral Transforms of the Heat Conduction Equation 148 5.26 Flux Potential Transfer Relations Matrix Methodology 152 5.27 Heat Equation Variable Conductivity 154 5.28 Mathematical Methods - Boltzmann Transformation 156 5.29 Mathematical Methods - The Duhamel Formulation 158 5.30 Spherical Source Tasca Model 160 5.31 Wunsch-Bell Model 163 5.32 The Smith and Littau Model 166 5.33 The Arkihpov-Astvatsaturyan-Godovosyn-Rudenko Model 168 5.34 The Vlasov-Sinkevitch Model 169 5.35 The Dwyer, Franklin and Campbell Model 169 5.36 Negative Differential Resistor and Resistor Ballasting 174 5.37 Ash Model - Nonlinear Failure Power Thresholds 176 5.38 Statistical Models for ESD Prediction 178 5.39 Summary and Closing Comments 180 References 180 6 ESD Events and Protection Circuits 189 6.1 Human Body Model (HBM) 189 6.2 Machine Model (MM) 191 6.3 Charged Device Model 193 6.4 Human Metal Model (HMM) 197 6.5 IEC 61000-4-2 History 204 6.6 IEC 61000-4-5 209 6.7 Cable Discharge Event (CDE) 213 6.8 CDM Scope 215 References 219 7 ESD Failure Mechanism 235 7.1 Tables of CMOS ESD Failure Mechanisms 235 7.2 LOCOS Isolation-Defined CMOS 235 7.3 LOCOS-bound Thick Oxide MOSFET 241 7.4 LOCOS-Bound Structures 242 7.5 Shallow Trench Isolation (STI) 245 7.6 STI Pull-down ESD Failure Mechanism 245 7.7 STI Pull-Down and Gate Wrap-Around 246 7.8 MOSFETs 247 7.9 LOCOS-bound Thick Oxide MOSFET 252 7.10 Bipolar Transistor Devices 254 7.11 Silicide Blocked N-diffusion Resistors 259 7.12 Silicon Germanium ESD Failure Mechanisms 259 7.13 Silicon Germanium Carbon ESD Failure Mechanisms 259 7.14 Gallium Arsenide Technology ESD Failure Mechanisms 260 7.15 Indium Gallium Arsenide ESD Failure Mechanisms 261 7.16 Micro Electromechanical (MEM) Systems 263 7.17 Micro-mirror Array Failures 265 7.18 EOS Bond Pad and Interconnect Failure 269 7.19 Summary and Closing Comments 272 References 273 8 ESD Design Synthesis 281 8.1 ESD Design Synthesis and Architecture Flow 281 8.2 ESD Design - the Signal Path and the Alternate Current Path 287 8.3 ESD Electrical Circuit and Schematic Architecture Concepts 289 8.4 The Ideal ESD Network 289 8.5 Mapping Semiconductor Chips and ESD Designs 293 8.6 Mapping across Semiconductor Fabricators 294 8.7 ESD Design Mapping across Technology Generations 295 8.8 ESD Networks, Sequencing, and Chip Architecture 306 8.9 ESD Layout and Floorplan-related Concepts 314 8.10 ESD Architecture and Floor-planning 323 8.11 Digital and Analog CMOS Architecture 347 8.12 Digital and Analog Floorplan - Placement of Analog Circuits 348 8.13 Mixed-signal Architecture - Digital, Analog, and RF Architecture 350 8.14 Summary and Closing Comments 351 Questions 351 References 352 9 On-chip ESD Protection Circuits - Input Circuitry 363 9.1 Receivers and ESD 363 9.2 Receivers and Receiver Delay Time 363 9.3 ESD Loading Effect on Receiver Performance 364 9.4 Receivers and HBM 365 9.5 Receivers and CDM 366 9.6 Receivers and Receiver Evolution 368 9.7 Receiver Circuits with Half-pass Transmission Gate 368 9.8 Receiver with Full-pass Transmission Gate 371 9.9 Receiver, Half-pass Transmission Gate, and Keeper Network 373 9.10 Receiver, Half-pass Transmission Gate, and the Modified Keeper Network 377 9.11 Receiver Circuits with Pseudo-zero VT Half-pass Transmission Gates 379 9.12 Receiver with Zero VT Transmission Gate 381 9.13 Receiver Circuits with Bleed Transistors 383 9.14 Receiver Circuits with Test Functions 384 9.15 Receiver with…”
    Libro electrónico
  3. 21323
    Publicado 2022
    “…The complete Certified Cloud Security Professional video course with CCSK extras by Dean Bushmiller Domain 1 Cloud Concepts, Architecture and Design 1.1 Understand cloud computing concepts Cloud computing definitions Cloud computing roles and responsibilities Key cloud computing characteristics Building block technologies 1.2 Describe cloud reference architecture Cloud computing activities Cloud service capabilities Cloud service categories IaaS, PaaS, SaaS Cloud deployment models Cloud shared considerations , auditability, regulatory, outsourcing 1.3 Understand security concepts relevant to cloud computing Cryptography and key management Identity and access control Data and media sanitization Network security Virtualization security Common threats Security hygiene 1.4 Understand design principles of secure cloud computing Cloud secure data lifecycle Cloud-based business continuity and disaster recovery plan Business impact analysis Functional security requirements Security considerations and responsibilities for different cloud categories Cloud design patterns Enterprise Architecture DevOps security 1.5 Evaluate cloud service providers Verification against criteria System/subsystem product certifications Domain 2 Cloud Data Security 2.1 Describe cloud data concepts Cloud data life cycle phases Data dispersion Data flows 2.2 Design and implement cloud data storage architectures Storage types Threats to storage types 2.3 Design and apply data security technologies and strategies Encryption and key management Hashing Data obfuscation Tokenization Data loss prevention Keys, secrets and certificates management 2.4 Implement data discovery Structured data Unstructured data Semi-structured data Data location 2.5 Plan and implement data classification Data classification policies Data mapping Data labeling 2.6 Design and implement Information Rights Management Legal hold 2.7 Design and implement auditability, traceability and accountability of data events Definition of event sources and requirement of event attributes address, geolocation Logging, storage and analysis of data events Chain of custody and non repudiation Domain 3 Cloud Platform and Infrastructure Security 3.1 Comprehend cloud infrastructure and platform components Physical environment Network and communications Compute Virtualization Storage Management plane 3.2 Design a secure data center Logical design Physical design Environmental design Design resilient 3.3 Analyze risks associated with cloud infrastructure and platforms Risk assessment Cloud vulnerabilities, threats and attacks Risk mitigation strategies 3.4 Plan and implementation of security controls Physical and environmental protection System, storage and communication protection Identification, authentication and authorization in cloud environments Audit mechanisms correlation, packet capture 3.5 Plan business continuity and disaster recovery Business continuity and disaster recovery strategies Business requirements , Recovery Point Objective Creation, implementation and testing of plan Domain 4 Cloud Application Security 4.1 Advocate training and awareness for application security Cloud development basics Common pitfalls Common cloud vulnerabilities OWASP Top 10 4.2 Describe the Secure Software Development Life Cycle process Business requirements Phases and methodologies 4.3 Apply the Secure Software Development Life Cycle Cloud specific risks Threat modeling STRIDE and DREAD Avoid common vulnerabilities during development Secure coding Application Security Verification Standard Software configuration management and versioning 4.4 Apply cloud software assurance and validation Functional and non functional testing Security testing methodologies SAST DAST Quality assurance Abuse case testing 4.5 Use verified secure software Securing application programming interfaces Supply chain management Third party software management Validated open source software 4.6 Comprehend the specifics of cloud application architecture Supplemental security components , Database Activity Monitoring, Extensible Markup Language firewalls, application programming interface gateway Cryptography Sandboxing Application virtualization and orchestration 4.7 Design appropriate identity and access management solutions Federated identity Identity providers Single sign on Multi factor authentication Cloud access security broker Secrets management Domain 5 Cloud Security Operations 5.1 Build and implement physical and logical infrastructure for cloud environment Hardware specific security configuration requirements and Trusted Platform Module Installation and configuration of management tools Virtual hardware specific security configuration requirements , Hypervisor types Installation of guest operating system virtualization toolsets 5.2 Operate and maintain physical and logical infrastructure for cloud environment Access controls for local and remote access , secure terminal access, Secure Shell, console based access mechanisms, jumpboxes, virtual client Secure network configuration , Transport Layer Security, Dynamic Host Configuration Protocol, Domain Name System Security Extensions, virtual private network Network security controls , intrusion prevention systems, honeypots, vulnerability assessments, network security groups, bastion host Operating system hardening through the application of baselines, monitoring and remediation Patch management Infrastructure as Code strategy Availability of clustered hosts Availability of guest operating system Performance and capacity monitoring Hardware monitoring Configuration of host and guest operating system backup and restore functions Management plane 5.3 Implement operational controls and standards Change management Continuity management Information security management Continual service improvement management Incident management Problem management Release management Deployment management Configuration management Service level management Availability management Capacity management 5.4 Support digital forensics Forensic data collection methodologies Evidence management Collect, acquire, and preserve digital evidence 5.5 Manage communication with relevant parties Vendors Customers Partners Regulators Other stakeholders 5.6 Manage security operations Security operations center Intelligent monitoring of security controls , intrusion prevention systems, honeypots, network security groups, artificial intelligence Log capture and analysis , log management Incident management Vulnerability assessments Domain 6 Legal, Risk and Compliance 6.1 Articulate legal requirements and unique risks within the cloud environment Conflicting international legislation Evaluation of legal risks specific to cloud computing Legal framework and guidelines eDiscovery Forensics requirements 6.2 Understand privacy issues Difference between contractual and regulated private data , personally identifiable information Country specific legislation related to private data , personally identifiable information Jurisdictional differences in data privacy Standard privacy requirements Privacy Impact Assessments 6.3 Understand audit process, methodologies, and required adaptations for a cloud environment Internal and external audit controls Impact of audit requirements Identify assurance challenges of virtualization and cloud Types of audit reports Restrictions of audit scope statements Gap analysis Audit planning Internal information security management system Internal information security controls system Policies Identification and involvement of relevant stakeholders Specialized compliance requirements for highly regulated industries Impact of distributed information technology model 6.4 Understand implications of cloud to enterprise risk management Assess providers risk management programs Difference between data owner/controller vs. data custodian/processor Regulatory transparency requirements , General Data Protection Regulation Risk treatment Different risk frameworks Metrics for risk management Assessment of risk environment 6.5 Understand outsourcing and cloud contract design Business requirements , master service agreement, statement of work Vendor management Contract management Supply chain management…”
    Video
  4. 21324
  5. 21325
  6. 21326
  7. 21327
  8. 21328
  9. 21329
  10. 21330
    991005696499706719
  11. 21331
  12. 21332
  13. 21333
  14. 21334
  15. 21335
  16. 21336
  17. 21337
  18. 21338
    Publicado 2023
    “…: 2.40-what-is-colab.mp4 Using Bard to enhance notebook development: 2.41-using-bard-to-enhance-productivity.mp4 Exploring Life Expectency in a Notebook: 2.42-life-expectancy-eda.mp4 Load a DataFrame with sensitive data: 2.43-Load-a-DataFrame-with-sensitive-information.mp4 Using MLFlow with Databricks Notebooks: 2.44-mlops-mlflow-tracking.mp4 End to End ML with MLFlow and Databricks: 2.45-end-to-end-ml-with-mlflow-and-databricks.mp4 Comparing DataFrame Libraries between Rust and Python: 2.46-comparing-dataframe-libs-rust-python.mp4 Lesson 3: Data Engineering Libraries and Tools with Rust Parquet file writing and reading with Rust: 2.50-parquet-read-write-rust.mp4 Arrow & Parquet in Rust: 2.51-arrow-parquet-rust.mp4 Serverless functions with Rust and AWS Lambda: 2.52-serverless-rust-aws-lambda.mp4 Polars library overview: 2.53-polars-library-overview.mp4 Building RESTful APIs with Rocket: 2.54-building-restful-apis-rocket.mp4 Utilizing Async Rust in Web Development: 2.55-utilizing-async-rust-web-development.mp4 Applying Data Cleaning Techniques with Rust: 2.56-applying-data-cleaning-rust.mp4 Deploying Rust Applications in a Kubernetes Environment: 2.57-deploying-rust-apps-kubernetes.mp4 Section 4: Designing Data Processing Systems in Rust Lesson 1: Getting Started with Rust Data Pipelines (Including ETL) Jack and the Beanstalk Data Pipelines: 4.1-jack-beanstalk-building-data-pipelines.mp4 Open Source Data Engineering - Pros and Cons: 4.2-open-source-de-pro-con.mp4 Core Components of Data Engineering Pipelines: 4.3-core-components-data-engineering-pipelines.mp4 Rust AWS Step Functions Pipeline: 4.4-rust-aws-step-functions.mp4 Rust AWS Lambda Async S3 Size Calculator: 4.5-rust-async-s3-size-calculator-lambda.mp4 What is Distroless: 4.6-what-is-distroless.mp4 Demo Deploying Rust Microservices on GCP: 4.7-demo-build-deploy-rust-microservice-cloud-run.mp4 Lesson 2: Using Rust and Python for LLMs, ONNX, Hugging Face, and PyTorch Pipelines Introduction to Hugging Face Hub: 4.10-intro-hugging-face-hub.mp4 Rust PyTorch Pre-trained Model Ecosystem: 4.11-rust-pytorch-pretrained-models-ecosystem.mp4 Rust GPU Hugging Face Translator: 4.12-rust-gpu-hugging-face-translator.mp4 Rust PyTorch High-Performance Options: 4.13-high-performance-pytorch-rust-demo.mp4 Rust CUDA PyTorch Stress Test: 4.14-building-cuda-enabled-stress-test-with-rust-pytorch.mp4 EFS ONNX Rust Inference with AWS Lambda: 4.15-efs-onnx-lambda-rust-inference-mlops.mp4 Theory behind model fine-tuning: 4.16-intro-fine-tuning-theory.mp4 Doing Fine Tuning: 4.17-doing-fine-tuning.mp4 Lesson 3: Building SQL Solutions with Rust, Generative AI and Cloud Selecting the correct database on GCP: 4.20-gcp-optimize-database-solution.mp4 Rust SQLite Hugging Face Zero Shot Classifier: 4.21-rust-sqlite-hugging-face-zero-shot-classifier-demo.mp4 Prompt Engineering for BigQuery: 4.22-big-query-prompt-engineering-v3.mp4 Big Query to Colab Pipeline: 4.23-bq-colab-pipeline-v2.mp4 Exploring Data with Big Query: 4.24-exploring-data-google-bigquery-v2.mp4 Using Public Datasets for Data Science: 4.25-using-public-datasets.mp4 Querying Log files with BigQuery: 4.26-demo-big-query-log-query.mp4 There is no one size database: 4.27-one-size-database.mp4 Course Conclusion: 4.28-conclusion.mp4 Learning Objectives By the end of this Course, you will be able to: Leverage Rust's robust data structures and collections for efficient data manipulation. …”
    Video
  19. 21339
  20. 21340