Mostrando 3,581 - 3,600 Resultados de 3,668 Para Buscar '"AS355"', tiempo de consulta: 0.19s Limitar resultados
  1. 3581
    por Kumar, Arya
    Publicado 2012
    Tabla de Contenidos: “…3.3 Principle-Centred Leaders -- 3.3.1 Continually Learning -- 3.3.2 Service-oriented -- 3.3.3 Radiate Positive Energy -- 3.3.4 Trust Before Allocation of Resources -- 3.3.5 Lead Balanced Lives -- 3.3.6 See Life as an Adventure -- 3.3.7 Are Synergistic -- 3.3.8 Perspective or Self-renewal -- 3.4 Entrepreneurial Leadership -- 3.5 Components of Entrepreneurial Leadership -- 3.5.1 Determining the Firm's Purpose or Vision -- 3.5.2 Developing Human Capital -- 3.5.3 Sustaining an Effective Organizational Culture -- 3.5.4 Emphasising Ethical Practices -- 3.5.5 Establishing Balanced Organizational Controls -- Key Concepts -- Endnotes -- References -- Conceptual Questions -- Critical Thinking Questions -- Case 3.1: Link_A_Media Devices -- Case 3.2: XYZ Transport -- Case 3.3: Entrepreneurial Profiles -- Chapter 4: Creativity and Business Ideas -- Learning Objectives -- 4.1 Introduction -- 4.1.1 Vertical Vs Lateral Thinking -- 4.2 Creativity and Entrepreneurship -- 4.3 Characteristics of Creative People -- 4.3.1 Unconventional-Society's Standards, Rituals and Norms -- 4.3.2 Independent and Individualistic -- 4.3.3 Sensitive -- 4.3.4 Not Motivated by Money -- 4.3.5 Inventive and Intelligent -- 4.3.6 High Physical Energy and Drive -- 4.3.7 Visionary -- 4.3.8 Humble and Proud -- 4.3.9 Intuitive -- 4.4 Blocks to Creativity -- 4.4.1 Habits -- 4.4.2 Perceptual Blocks -- 4.4.3 Emotional Blocks -- 4.4.4 Environmental Blocks -- 4.4.5 Blocks Within -- 4.4.6 Rules and Traditions -- 4.5 Creativity at Work-a Must for Survival -- 4.6 Sources of New Ideas -- 4.6.1 Consumers -- 4.6.2 Existing Products and Services -- 4.6.3 Distribution Channels -- 4.6.4 Government Policies and Priorities -- 4.6.5 Research and Development (R&D) -- 4.7 Techniques for Generating Ideas -- 4.7.1 Understanding the Problem -- 4.7.2 Towards Solving the Problem…”
    Libro electrónico
  2. 3582
    por Basu, S. K.
    Publicado 2005
    Tabla de Contenidos: “…2.6 Classification on the Basis of Audit Dimension -- 2.6.1 Management Audit -- 2.6.2 Cost Audit -- 2.6.3 Tax Audit -- 2.6.4 Human Resource Audit -- 2.6.5 System Audit -- 2.6.6 Propriety Audit -- 2.6.7 Performance or Efficiency Audit -- 2.6.8 Environmental Audit -- 2.6.9 Social Audit -- 2.6.10 Cash Transaction Audit -- 2.6.11 Energy Audit -- 2.6.12 Secretarial Audit -- Points to Ponder -- Review Questions -- Chapter 3: Techniques and Procedures of Auditing -- 3.1 Introduction -- 3.2 Preparatory Steps before Commencement of Audit -- 3.3 Preparation by the Auditor -- 3.3.1 Audit Planning -- 3.3.2 Audit Programme -- 3.3.3 Audit Notebook -- 3.3.4 Audit Working Papers -- 3.3.5 Audit Files -- 3.3.6 Audit Manual -- 3.3.7 Audit Memorandum -- 3.4 Principles and Techniques of Auditing -- 3.4.1 Important Audit Techniques -- 3.5 Procedures Followed in Course of Audit -- 3.5.1 Audit Evidence -- 3.5.2 Routine Checking -- 3.5.3 Test Checking -- 3.5.4 Auditing in Depth -- 3.5.5 Cut-off Examination -- 3.5.6 Statistical Sampling -- 3.5.7 Surprise Checking -- 3.5.8 Audit Flow Chart -- 3.5.9 Internal Control Questionnaires -- 3.5.10 Audit Tests -- Points to Ponder -- Review Questions -- Chapter 4: Internal Control, Internal Check and Internal Audit -- 4.1 Introduction -- 4.2 Internal Control -- 4.2.1 Definition -- 4.2.2 Basic Elements of Internal Control -- 4.2.3 Objectives of Internal Control -- 4.2.4 Types of Internal Control -- 4.2.5 Evaluation of Internal Control -- 4.2.6 Internal Control and the Auditor -- 4.2.7 Internal Control in Specific Areas of Business -- 4.2.8 Internal Control Questionnaire -- 4.3 Internal Check -- 4.3.1 Definition -- 4.3.2 General Considerations in Framing a System of Internal Check -- 4.3.3 Objectives of Internal Check -- 4.3.4 Shortcomings of Internal Check System -- 4.3.5 Safeguard Against the Shortcomings of Internal Check…”
    Libro electrónico
  3. 3583
    Publicado 2003
    Tabla de Contenidos: “…-- 3.1.2 RSCT components -- 3.1.3 Resource Management and Control (RMC) subsystem -- 3.1.4 Security -- 3.1.5 Cluster environment -- 3.2 Cluster System Management -- 3.2.1 Supported platforms -- 3.2.2 Client install mechanisms -- 3.2.3 CSM 1.3.2.1 November 2003 -- 3.3 HACMP -- 3.3.1 HACMP overview -- 3.3.2 Role of HACMP -- 3.3.3 Physical components of an HACMP cluster -- 3.4 IBM Virtual Shared Disks -- 3.4.1 Overview of the Virtual Shared Disk components -- 3.4.2 Product packaging -- 3.4.3 Configuration repository -- 3.4.4 Shared external disk access -- 3.4.5 Quorum -- 3.4.6 IBM Recoverable Virtual Shared Disk overview -- 3.4.7 Recovery for concurrent Virtual Shared Disks -- 3.4.8 Disk cable and disk adapter failures -- 3.4.9 Communication adapter failures -- 3.4.10 Technical large pages overview -- 3.4.11 Restrictions for using Virtual Shared Disks -- 3.4.12 Overview of the subsystem device driver (SDD) -- 3.4.13 VSD configuration support for the SDD -- 3.4.14 HPS considerations when using the IP protocol for data transmissions -- 3.5 General Parallel File System 2.1 -- 3.5.1 GPFS overview -- 3.5.2 GPFS 2.1 (APAR IY47306) new features -- 3.5.3 Benefits of using GPFS -- 3.5.4 The basic GPFS structure -- 3.5.5 GPFS RPD cluster -- 3.5.6 GPFS HACMP cluster -- 3.5.7 Recoverability considerations -- 3.5.8 GPFS quorum considerations -- 3.6 Engineering applications -- 3.6.1 Low-level application programming interface (LAPI) -- 3.6.2 LoadLeveler -- 3.6.3 Message passing interface -- 3.6.4 Parallel Environment…”
    Libro electrónico
  4. 3584
    por Arrell, Kathryn
    Publicado 2005
    Tabla de Contenidos: “…Installing Oracle 10g single instance -- 3.1 Installing Oracle Database 10g on zSeries with Linux -- 3.2 Preparing the system environment -- 3.2.1 Setting up the fixed buffer option with ECKDTM disks -- 3.3 Setting up an xWindows interface using VNC -- 3.4 Downloading the code -- 3.4.1 Finding the documentation -- 3.4.2 Checking the Linux kernel settings -- 3.5 Running the Universal Installer -- 3.5.1 Starting the OUI -- 3.5.2 Initial OUI panels -- 3.5.3 Inventory directory panel -- 3.5.4 Changing to root screen for oraInstroot script -- 3.5.5 File location panel -- 3.5.6 Installation type -- 3.5.7 Selecting database configuration…”
    Libro electrónico
  5. 3585
    Publicado 2018
    Tabla de Contenidos: “…Kibirov als Ivanhoe und weitere Ritter-Motive 355 -- 8.5. Literatur und Religion (Греко- и римско-кафолические песенки и -- потешки) 356 -- 8.5.1. …”
    Libro electrónico
  6. 3586
    Publicado 2019
    Tabla de Contenidos: “…9.2.3 Importance of Layout Verification and Catastrophic Failure 350 -- 9.3 Chip Package, Test PCB, and Experimental Setup 354 -- 9.3.1 Bonding Diagram and Package 354 -- 9.3.2 Test PCB 355 -- 9.4 Experimental Test Set-Up 355 -- 9.4.1 Planning the Type and Number of Instruments Needed 357 -- 9.4.2 Connecting Lab Instruments 357 -- 9.4.3 Measurement Set-Up Example 358 -- 9.5 ΣΔM Design Examples and Case Studies 359 -- 9.5.1 Programmable-gain ΣΔMs for High Dynamic Range Sensor Interfaces 360 -- 9.5.1.1 Main Design Criteria and Performance Limitations 361 -- 9.5.1.2 SC Realization with Programmable Gain and Double Sampling 362 -- 9.5.1.3 Influence of Chopper Frequency on Flicker Noise 362 -- 9.5.2 Reconfigurable SC-ΣΔMs for Multi-standard Direct Conversion Receivers 364 -- 9.5.2.1 Power-scaling Circuit Techniques 367 -- 9.5.2.2 Experimental Results 368 -- 9.5.3 Using Widely-programmable Gm-LC BP-ΣΔMs for RF Digitizers 368 -- 9.5.3.1 Application Scenario 371 -- 9.5.3.2 Gm-LC BP-ΣΔM High-level Sizing 371 -- 9.5.3.3 BP CT-ΣΔM Loop-Filter Reconfiguration Techniques 375 -- 9.5.3.4 Embedded 4-bit Quantizer with Calibration 378 -- 9.5.3.5 Biasing, Digital Control Programmability and Testability 382 -- 9.6 Summary 385 -- References 386 -- 10 Frontiers, Trends and Challenges: Towards Next-generation 𝚺𝚫 Modulators 389 -- 10.1 State-of-the-Art ADCs: Nyquist-rate versus ΣΔ Converters 390 -- 10.1.1 Conversion Energy 391 -- 10.1.2 Figures of Merit 392 -- 10.2 Comparison of Different Categories of ΣΔ ADCs 393 -- 10.2.1 Aperture Plot of ΣΔMs 406 -- 10.2.2 Energy Plot of ΣΔMs 407 -- 10.3 Empirical and Statistical Analysis of State-of-the-Art ΣΔMs 408 -- 10.3.1 SC versus CT ΣΔMs 408 -- 10.3.2 Technology used in State-of-the-Art ΣΔMs 410 -- 10.3.3 Single-Loop versus Cascade ΣΔMs 410 -- 10.3.4 Single-bit versus Multi-bit ΣΔMs 411.…”
    Libro electrónico
  7. 3587
    por Virtanen, Tuomas
    Publicado 2012
    Tabla de Contenidos: “…Seltzer -- 13.1 Introduction 347 -- 13.2 Traditional Training Methods for Robust Speech Recognition 348 -- 13.3 A Brief Overview of Speaker Adaptive Training 349 -- 13.4 Feature-Space Noise Adaptive Training 351 -- 13.4.1 Experiments using fNAT 352 -- 13.5 Model-Space Noise Adaptive Training 353 -- 13.6 Noise Adaptive Training using VTS Adaptation 355 -- 13.6.1 Vector Taylor Series HMM Adaptation 355 -- 13.6.2 Updating the Acoustic Model Parameters 357.…”
    Libro electrónico
  8. 3588
    Publicado 2014
    Tabla de Contenidos: “…14.3.1 The Wireless Channel 289 -- 14.3.2 Diversity 290 -- 14.3.3 Channel Coding 291 -- 14.3.4 Interleaving 291 -- 14.3.5 Multi-Antenna Techniques and Multiple-Input Multiple-Output (MIMO) 291 -- 14.4 Access Technology Concepts 295 -- 14.4.1 Frequency Division Multiple Access (FDMA) 295 -- 14.4.2 Time Division Multiple Access (TDMA) 295 -- 14.4.3 Code Division Multiple Access (CDMA) 295 -- 14.4.4 Orthogonal Frequency Division Multiplexing (OFDM) 297 -- 14.4.5 MAC Protocols 299 -- 14.5 Cross-Layer Algorithms 300 -- 14.5.1 Link Adaptation 300 -- 14.5.2 Channel-Dependent Scheduling 300 -- 14.5.3 Automatic Repeat Request (ARQ) and Hybrid ARQ (HARQ) 302 -- 14.6 Example Application: Satellite Broadband Access 303 -- 14.7 Summary 303 -- Further Reading 304 -- 15 WiFi: IEEE 802.11 Wireless LAN 305 -- 15.1 Introduction 305 -- 15.2 Technology Basics 306 -- 15.2.1 System Overview 306 -- 15.2.2 MAC Layer 308 -- 15.2.3 Physical Layer 311 -- 15.3 Technology Evolution 312 -- 15.3.1 802.11 b 312 -- 15.3.2 802.11 a/g 313 -- 15.3.3 802.11 n 314 -- 15.3.4 802.11 ac 316 -- 15.4 WLAN Network Architecture 318 -- 15.5 TV White Space and 802.11 af 320 -- 15.6 Summary 320 -- Further Readings 321 -- 16 UMTS: W-CDMA and HSPA 323 -- 16.1 Introduction 323 -- 16.2 Technology Basics 324 -- 16.2.1 Network Architecture 324 -- 16.2.2 Protocol Architecture 325 -- 16.2.3 Physical Layer (L1) 327 -- 16.2.4 Layer-2 334 -- 16.2.5 Radio Resource Control (RRC) 336 -- 16.3 UMTS Technology Evolution 338 -- 16.3.1 Release 99 338 -- 16.3.2 Release 5: High-Speed Downlink Packet Access (HSDPA) 339 -- 16.3.3 Release 6: Enhanced Uplink 343 -- 16.3.4 Release 7 347 -- 16.3.5 Release 8 and Beyond 348 -- 16.4 CDMA2000 350 -- 16.5 Summary 351 -- Further Readings 352 -- 17 Fourth Generation Systems: LTE and LTE-Advanced 353 -- 17.1 Introduction 353 -- 17.1.1 LTE Standardization 353 -- 17.1.2 LTE Requirements 354 -- 17.2 Release 8: The Basics of LTE 355 -- 17.2.1 Network Architecture 355 -- 17.2.2 PDN Connectivity, Bearers, and QoS Architecture 358.…”
    Libro electrónico
  9. 3589
    por Chavarro Cadena, Jorge Enrique
    Publicado 2022
    Tabla de Contenidos: “…SOLUCIÓN (CON REGISTRO CONTABLE) -- 3.5.5. IMPACTO FISCAL E IMPUESTO DIFERIDO -- CAPÍTULO 4 INGRESOS -- 4.1. …”
    Libro electrónico
  10. 3590
    Publicado 2021
    Tabla de Contenidos: “…Faecal sludge sample collection and handling -- 3.1 INTRODUCTION -- 3.2 SAMPLING OBJECTIVE -- 3.2.1 Containment -- 3.2.2 Collection and transport -- 3.2.3 Treatment -- 3.2.4 End use -- 3.3 REPRESENTATIVENESS -- 3.4 SAMPLING TECHNIQUES -- 3.4.1 Grab sampling -- 3.4.2 Composite sampling -- 3.5 SAMPLING AND MEASURING DEVICES -- 3.5.1 L-stick sludge and scum measuring device -- 3.5.2 Core sampling device -- 3.5.3 Vacuum sludge sampling device -- 3.5.4 Cone-shaped sampling device -- 3.5.5 Grab sampling device - horizontal -- 3.5.6 Grab sampling beaker device - vertical -- 3.5.7 Automatic composite sampler -- 3.5.8 Distance laser measuring device -- 3.5.9 Portable penetrometer -- 3.6 SAMPLING METHODS AND LOCATION -- 3.6.1 Sampling in situ from onsite containment technologies -- 3.6.2 Sampling during emptying of onsite containment technologies -- 3.6.3 Sampling at faecal sludge treatment plants -- 3.7 SAMPLE SIZE -- 3.8 HEALTH AND SAFETY -- 3.9 SAMPLE COLLECTION -- 3.10 RECORDING OF SAMPLE COLLECTION -- 3.11 TRANSPORT -- 3.12 STORAGE AND PRESERVATION -- 3.13 EXAMPLE OF SAMPLING KIT -- 3.14 OUTLOOK -- REFERENCES -- 4. …”
    Libro electrónico
  11. 3591
    Publicado 2017
    Tabla de Contenidos: “…3.3.5 Recycling and Reprocessing of Building Products -- 3.4 CO2 Emission, Greenhouse Effect, and Carbon Footprint -- 3.4.1 Some Real Facts and Figures -- 3.4.2 Statistical Analysis of Some Real Examples -- 3.5 Recyclate Property Examples -- 3.5.1 Polyamides Examples -- 3.5.1.1 Industrially Recycled Polyamide -- 3.5.2 Polystyrene and ABS Examples -- 3.5.3 Polypropylene Examples -- 3.5.4 Examples of Polycarbonate, PC/ABS, and PC/PBT Alloys -- 3.5.5 Examples of Polyetherimide -- 3.6 Recycled Materials Often Bring Also Cost and Pollution Savings -- 3.7 Some Limitations to Recycled Material Use -- 3.7.1 UL's Recommendations on the Use of Regrind -- 3.7.2 Producer Recommendations -- Further Reading -- Websites -- 4 - Renewable Plastics Derived From Natural Polymers -- 4.1 Brief Inventory of Renewable Polymers -- 4.2 Ready-to-Use Thermoplastic Blends and Derivatives of Starch -- 4.2.1 Mater-Bi® by Novamont (http://www.novamont.com/default.asp?…”
    Libro electrónico
  12. 3592
    por Lovelace, Mary
    Publicado 2005
    Tabla de Contenidos: “…3.1.1 Configurations -- 3.1.2 Installation prerequisites -- 3.1.3 TCP/IP ports used by TotalStorage Productivity Center -- 3.1.4 Default databases created during install -- 3.2 Pre-installation check list -- 3.2.1 User IDs and security -- 3.2.2 Certificates and key files -- 3.3 Services and service accounts -- 3.3.1 Starting and stopping the managers -- 3.3.2 Uninstall Internet Information Services -- 3.3.3 SNMP install -- 3.4 IBM TotalStorage Productivity Center for Fabric -- 3.4.1 The computer name -- 3.4.2 Database considerations -- 3.4.3 Windows Terminal Services -- 3.4.4 Tivoli NetView -- 3.4.5 Personal firewall -- 3.4.6 Change the HOSTS file -- 3.5 Installation process -- 3.5.1 Prerequisite product install: DB2 and WebSphere -- 3.5.2 Installing IBM Director -- 3.5.3 Tivoli Agent Manager -- 3.5.4 IBM TotalStorage Productivity Center for Disk and Replication Base -- 3.5.5 IBM TotalStorage Productivity Center for Disk -- 3.5.6 IBM TotalStorage Productivity Center for Replication -- 3.5.7 IBM TotalStorage Productivity Center for Fabric -- Chapter 4. …”
    Libro electrónico
  13. 3593
    Publicado 2022
    Tabla de Contenidos: “…3.3.1 Purpose of System -- 3.3.2 Description -- 3.3.3 Safety/Integrity Aspects -- 3.3.4 Key Integration Aspects -- 3.3.5 Key Interfaces -- 3.3.6 Key Design Drivers -- 3.3.7 Modelling -- 3.3.8 References -- 3.3.9 Sizing Considerations -- 3.3.10 Future Considerations -- 3.4 Hydraulic Power Generation and Distribution -- 3.4.1 Purpose of the System -- 3.4.2 Description -- 3.4.3 Safety/Integrity Aspects -- 3.4.4 Key Integration Aspects -- 3.4.5 Key Interfaces -- 3.4.6 Key Design Drivers -- 3.4.7 Modelling -- 3.4.8 References -- 3.4.9 Sizing Considerations -- 3.4.10 Future Considerations -- 3.5 Bleed Air System -- 3.5.1 Purpose of the System -- 3.5.2 Description -- 3.5.3 Safety/Integrity Aspects -- 3.5.4 Key Integration Aspects -- 3.5.5 Key Interfaces -- 3.5.6 Key Design Drivers -- 3.5.7 Modelling -- 3.5.8 References -- 3.5.9 Sizing Considerations -- 3.5.10 Future Considerations -- 3.6 Secondary Power Systems -- 3.6.1 Purpose of System -- 3.6.2 Description -- 3.6.3 Safety/Integrity Aspects -- 3.6.4 Key Integration Aspects -- 3.6.5 Key Interfaces -- 3.6.6 Key Design Drivers -- 3.6.7 Modelling -- 3.6.8 References -- 3.6.9 Sizing Considerations -- 3.6.10 Future Considerations -- 3.7 Emergency Power Systems -- 3.7.1 Purpose of System -- 3.7.2 Description -- 3.7.3 Safety/Integrity Aspects -- 3.7.4 Key Integration Aspects -- 3.7.5 Key Interfaces -- 3.7.6 Key Design Drivers -- 3.7.7 Modelling -- 3.7.8 References -- 3.7.9 Sizing Considerations -- 3.7.10 Future Considerations -- 3.8 Flight Control System -- 3.8.1 Purpose of System -- 3.8.2 Description -- 3.8.3 Safety/Integrity Aspects -- 3.8.4 Key Integration Aspects -- 3.8.5 Key Interfaces -- 3.8.6 Key Design Drivers -- 3.8.7 Modelling -- 3.8.8 References -- 3.8.9 Sizing Considerations -- 3.8.10 Future Considerations -- 3.9 Landing Gear -- 3.9.1 Purpose of System -- 3.9.2 Description…”
    Libro electrónico
  14. 3594
    Publicado 2023
    Tabla de Contenidos: “…3.3.1 Centralized System and Its Physiognomies -- 3.3.2 Advantages -- 3.3.3 Disadvantages of Centralized System -- 3.4 Distributed System Architecture -- 3.4.1 Advantages of Distributed System Architecture -- 3.4.2 Drawbacks of Distributed System Architecture -- 3.5 Data Communication Taking Place in Distributed IoT Environment -- 3.5.1 Internet of Things (IoT) Protocol -- 3.5.2 Constrained Application Protocol (CoAP) -- 3.5.3 Message Queuing Telemetry Transport (MQTT) -- 3.5.4 Wi-Fi -- 3.5.5 Zigbee -- 3.5.6 Extensible Messaging and Presence Protocol (XMPP) -- 3.5.7 Data Distribution Service (DDS) -- 3.5.8 Advanced Message Queuing Protocol (AMQP) -- 3.5.9 Smart Home and IoT Applications: An Example -- 3.5.10 IoT Services, Machines and Applications -- 3.5.11 Sensor-Based IoT Services -- 3.5.12 Application in IoT Environment -- 3.5.13 Future of IoT in a COVID-19 Pandemic -- 3.6 Conclusion -- References -- Chapter 4 Contribution of Cloud-Based Services in Post-Pandemic Technology Sustainability and Challenges: A Future Direction -- 4.1 Introduction -- 4.2 Cloud-Based Solutions -- 4.2.1 Information and Communications Technology -- 4.2.2 Artificial Intelligence and Machine Learning -- 4.2.3 Data Analytics and Business Intelligence -- 4.3 Impact of Industry 4.0 in the Cloud Computing Industry -- 4.3.1 Agriculture and Forestry -- 4.3.2 Entertainment, Media, and Hospitality -- 4.3.3 Robotics and Automation, Manufacturing and Maintenance -- 4.4 Significance and Impact of Cloud in the Pandemic Outbreak -- 4.5 Conclusion and Future Directions -- References -- Chapter 5 Network Security in Evolving Networking Technologies: Developments and Future Directions -- 5.1 Introduction -- 5.2 Background on Attacks, Security Services and Challenges -- 5.2.1 Types of Attacks Possible on Network -- 5.2.2 Security Services -- 5.2.3 Challenges…”
    Libro electrónico
  15. 3595
    Publicado 2003
    Tabla de Contenidos: “…Deployment architecture -- 3.1 IBM Tivoli Storage Resource Manager architecture -- 3.2 IBM Tivoli Storage Resource Manager Server -- 3.2.1 Discovery of unmanaged Windows systems -- 3.2.2 Scripts -- 3.3 IBM Tivoli Storage Resource Manager Agent -- 3.4 Deployment considerations -- 3.4.1 Repository database -- 3.4.2 CIM/OM server placement -- 3.4.3 NAS Agent placement -- 3.4.4 Novell NetWare Agent placement -- 3.5 Deployment scenarios -- 3.5.1 Standalone Server installation with local database -- 3.5.2 Standalone Server installation with remote database -- 3.5.3 Standby Server installation for HA using remote database -- 3.5.4 Windows cluster install of IBM Tivoli Storage Resource Manager Server -- 3.5.5 AIX cluster installation of IBM Tivoli Storage Resource Manager Server -- Part 3 Installation and basic operations -- Chapter 4. …”
    Libro electrónico
  16. 3596
    Publicado 2018
    Tabla de Contenidos: “…-- 3.5.2 Exporting data to text files -- 3.5.3 Exporting data to JSON text files -- 3.5.4 Exporting data to CSV text files -- 3.5.5 Exporting data to a database -- 3.5.6 Exporting data to MongoDB -- 3.5.7 Exporting data to MySQL -- 3.6 Building complete data conversions -- 3.7 Expanding the process -- Summary -- Chapter 4: Working with unusual data -- 4.1 Getting the code and data -- 4.2 Importing custom data from text files -- 4.3 Importing data by scraping web pages -- 4.3.1 Identifying the data to scrape -- 4.3.2 Scraping with Cheerio -- 4.4 Working with binary data -- 4.4.1 Unpacking a custom binary file -- 4.4.2 Packing a custom binary file -- 4.4.3 Replacing JSON with BSON -- 4.4.4 Converting JSON to BSON -- 4.4.5 Deserializing a BSON file -- Summary -- Chapter 5: Exploratory coding -- 5.1 Expanding your toolkit -- 5.2 Analyzing car accidents -- 5.3 Getting the code and data -- 5.4 Iteration and your feedback loop -- 5.5 A first pass at understanding your data -- 5.6 Working with a reduced data sample -- 5.7 Prototyping with Excel -- 5.8 Exploratory coding with Node.js -- 5.8.1 Using Nodemon -- 5.8.2 Exploring your data -- 5.8.3 Using Data-Forge -- 5.8.4 Computing the trend column -- 5.8.5 Outputting a new CSV file -- 5.9 Exploratory coding in the browser -- Putting it all together…”
    Libro electrónico
  17. 3597
    por Akepogu, Ananda Rao
    Publicado 1900
    Tabla de Contenidos: “…3.3 Types of Algorithms -- 3.3.1 Brute Force Algorithms -- 3.3.2 Divide and Conquer Algorithms -- 3.3.3 Dynamic Programming Algorithms -- 3.3.4 Greedy Algorithms -- 3.3.5 Branch and Bound Algorithms -- 3.3.6 Recursive Algorithms -- 3.3.7 Back Tracking Algorithms -- 3.3.8 Randomized Algorithms -- 3.3.9 Hill Climbing Algorithms -- 3.4 Performance Analysis -- 3.4.1 Properties of the Best Algorithms -- 3.5 Space Complexity -- 3.5.1 Instruction Space -- 3.5.2 Text Section of a Program -- 3.5.3 Data Space -- 3.5.4 Stack Space -- 3.5.5 Calculating the Instruction Space -- 3.5.6 Calculating the Data Space -- 3.5.7 Size of Data Section -- 3.5.8 Size of Rodata Section -- 3.5.9 Size of bss Section -- 3.6 Apriori Analysis -- 3.7 Asymptotic Notation -- 3.7.1 Big oh Notation (O) -- 3.7.2 Omega Notation (Ω) -- 3.7.3 Theta Notation (θ) -- 3.7.4 Little oh Notation(o) -- 3.8 Time Complexity -- 3.8.1 Time Complexity Analysis of Bubble Sort -- 3.8.2 Time Complexity Analysis of Selection Sort -- 3.9 Worst Case, Average Case and Best Case Complexity -- 3.9.1 Worst Case -- 3.9.2 Average Case -- 3.9.3 Best Case -- Summary -- Exercises -- Chapter 4 Arrays -- 4.1 Introduction -- 4.1.1 Array -- 4.2 Array Types -- 4.2.1 Single-dimensional Array -- 4.2.2 Multi-dimensional Array -- 4.2.3 N-dimensional Array -- 4.3 Array Representation -- 4.4 Initializing Arrays -- 4.5 Accessing Values of an Array -- 4.6 Array Operations -- 4.6.1 Traversing -- 4.6.2 Insertion -- 4.6.3 Deletion -- 4.6.4 Sorting -- 4.6.5 Searching -- 4.7 Arrays as Parameters -- 4.8 Character Sequences -- 4.9 Applications -- Summary -- Exercises -- Chapter 5 Linked List -- 5.1 Introduction -- 5.2 Representation of Linked List in Memory -- 5.2.1 Static Representation -- 5.2.2 Dynamic Representation -- 5.3 Singly Linked List -- 5.3.1 Operations -- 5.4 Circular Linked List -- 5.4.1 Merging of Two Circular Lists…”
    Libro electrónico
  18. 3598
    por Gallegos Ruiz, Amalia
    Publicado 2017
    Tabla de Contenidos: “….) -- 3.5.2 PRIMERA FORMA NORMAL (1FN) -- 3.5.3 SEGUNDA FORMA NORMAL (2FN) -- 3.5.4 TERCERA FORMA NORMAL (3FN) -- 3.5.5 OTRAS FORMAS NORMALES (4FN, 5FN) -- 3.5.6 DESNORMALIZACIÓN. …”
    Libro electrónico
  19. 3599
    Publicado 2017
    Tabla de Contenidos: “…Only two work -- Chapter Ten Selecting Long-Term Winners: Don't Look for the Needle-Buy the Haystack -- A fund failure rate of almost 80 percent -- A death in the family -- The odds against success are terrible: Only two out of 355 funds have delivered truly superior performance -- The Magellan Fund story -- The Contrafund story -- Living by the sword, dying by the sword -- Look (forward) before you leap -- Don't look for the needle, buy the haystack…”
    Libro electrónico
  20. 3600
    por Credle, Rufus
    Publicado 2005
    Tabla de Contenidos: “…Security management -- 3.1 Password maintenance -- 3.1.1 Proxy authentication with Content Access Service -- 3.1.2 Changing the Portal database username and password -- 3.2 Credential Vault -- 3.2.1 How Credential Vault works -- 3.2.2 Using Credential Vault -- 3.3 Surfacing an application -- 3.4 Managing security -- 3.5 Integrating LDAP -- 3.5.1 Performance considerations -- 3.5.2 LDAP architecture and schema layout considerations -- 3.5.3 Using an LDAP server cluster -- 3.5.4 Using a single LDAP image -- 3.5.5 LDAP, WebSphere Portal, and the Q/A environment…”
    Libro electrónico