Mostrando 293,881 - 293,900 Resultados de 295,999 Para Buscar '"C "', tiempo de consulta: 0.59s Limitar resultados
  1. 293881
    Publicado 2018
    Tabla de Contenidos: “…The Voice of the Customer (VoC) -- Interview with Fiona McNeill, Global Product Marketing Manager at SAS Institute -- What Is UDA Applied to Product Development? …”
    Libro electrónico
  2. 293882
    Publicado 2018
    Tabla de Contenidos: “…3.9 Refinement of the Data Collection Mechanism and its Interpretation Through the Definition of the Proper Route 210 -- 3.10 Lessons Learnt: Possible Elimination of Slow Fading and a Better Way to Deploy Base Station Antennas 217 -- 3.10.1 Experimental Measurement Setup 225 -- 3.11 Cellular Wireless Propagation Occurs Through the Zenneck Wave and not Surface Waves 227 -- 3.12 Conclusion 233 -- Appendix 3A Sommerfeld Formulation for a Vertical Electric Dipole Radiating Over an Imperfect Ground Plane 234 -- Appendix 3B Asymptotic Evaluation of the Integrals by the Method of Steepest Descent 247 -- Appendix 3C Asymptotic Evaluation of the Integrals When there Exists a Pole Near the Saddle Point 252 -- Appendix 3D Evaluation of Fields Near the Interface 254 -- Appendix 3E Properties of a Zenneck Wave 258 -- Appendix 3F Properties of a Surface Wave 259 -- References 261 -- 4 Methodologies for Ultrawideband Distortionless Transmission/Reception of Power and Information 265 -- Summary 265 -- 4.1 Introduction 266 -- 4.2 Transient Responses from Differently Sized Dipoles 268 -- 4.3 A Travelling Wave Antenna 276 -- 4.4 UWB Input Pulse Exciting a Dipole of Different Lengths 279 -- 4.5 Time Domain Responses of Some Special Antennas 281 -- 4.5.1 Dipole Antennas 281 -- 4.5.2 Biconical Antennas 292 -- 4.5.3 TEM Horn Antenna 299 -- 4.6 Two Ultrawideband Antennas of Century Bandwidth 305 -- 4.6.1 A Century Bandwidth Bi?]…”
    Libro electrónico
  3. 293883
    Publicado 2017
    Tabla de Contenidos: “…10.6.1 Chemical Nonequilibrium Turbulent Flow in a Scramjet Nozzle -- 10.6.1.1 Some Results -- 10.6.2 Shock Wave-Boundary Layer Interactions -- 10.7 CONCLUSIONS -- REFERENCES -- 11 - Measuring Techniques -- 11.1 INTRODUCTION -- 11.2 TEMPERATURE MEASUREMENT -- 11.3 FLOW MEASUREMENT -- 11.3.1 Typical Flow Meters -- 11.3.2 Two-Phase Flow Measurements -- 11.3.3 Microscale Fluid Flow Measurement -- 11.4 LIQUID MASS GAUGING IN MICROGRAVITY -- 11.4.1 Review -- 11.4.2 Compression of Mass Gauging -- 11.4.2.1 Description of Ground Experiments -- 11.4.2.1.1 Experimental Apparatus -- 11.4.2.1.2 Experimental Procedures -- 11.4.2.2 Test Results and Discussion -- 11.4.2.2.1 Normal Tests -- 11.4.2.2.2 Attitude Disturbance Tests -- 11.4.2.2.3 Heat Transfer Tests -- 11.4.3 Summary and Concluding Remarks -- REFERENCES -- 1: Governing Equations for Momentum, Mass, and Energy Transport -- A1.1 CONTINUITY EQUATION (MASS CONSERVATION EQUATION) -- A1.2 THE NAVIER-STOKES EQUATIONS -- A1.2.1 The Stress Tensor σij -- A1.2.2 The Navier-Stokes Equations for Two-Dimensional and Incompressible Flows -- A1.2.3 Derivation of the Complete Temperature Field Equation -- A1.2.3.1 Determination of ΔE ̇ -- A1.2.3.2 Determination of the Heat Transfer Rate Q ̇ -- A1.2.3.3 Determination of the Work Rate W ̇ -- A1.2.3.3.1 The Energy Equation in its Primary Form -- A1.2.3.3.2 Rewriting the Energy Equation -- A1.3 THE BOUNDARY LAYER FORM OF THE TEMPERATURE FIELD EQUATION -- A1.4 BOUNDARY LAYER EQUATIONS FOR THE LAMINAR CASE -- A1.5 DIMENSIONLESS GROUPS AND RULES OF SIMILARITY -- REFERENCES -- 2: Dimensionless Numbers of Relevance in Aerospace Heat Transfer -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- K -- L -- M -- N -- O -- P -- Q -- R -- S -- T -- U -- V -- W -- Back Cover…”
    Libro electrónico
  4. 293884
    Publicado 2002
    Tabla de Contenidos: “…2.10 Handling a zip File Inside a String -- Problem -- Solution -- Discussion -- See Also -- 2.11 Archiving a Tree of Files into a Compressed tar File -- Problem -- Solution -- Discussion -- See Also -- 2.12 Sending Binary Data to Standard Output Under Windows -- Problem -- Solution -- Discussion -- See Also -- 2.13 Using a C++-like iostream Syntax -- Problem -- Solution -- Discussion -- See Also -- 2.14 Rewinding an Input File to the Beginning -- Problem -- Solution -- Discussion -- See Also -- 2.15 Adapting a File-like Object to a True File Object -- Problem -- Solution -- Discussion -- See Also -- 2.16 Walking Directory Trees -- Problem -- Solution -- Discussion -- See Also -- 2.17 Swapping One File Extension for Another Throughout a Directory Tree -- Problem -- Solution -- Discussion -- See Also -- 2.18 Finding a File Given a Search Path -- Problem -- Solution -- Discussion -- See Also -- 2.19 Finding Files Given a Search Path and a Pattern -- Problem -- Solution -- Discussion -- See Also -- 2.20 Finding a File on the Python Search Path -- Problem -- Solution -- Discussion -- See Also -- 2.21 Dynamically Changing the Python Search Path -- Problem -- Solution -- Discussion -- See Also -- 2.22 Computing the Relative Path from One Directory to Another -- Problem -- Solution -- Discussion -- See Also -- 2.23 Reading an Unbuffered Character in a Cross-Platform Way -- Problem -- Solution -- Discussion -- See Also -- 2.24 Counting Pages of PDF Documents on Mac OS X -- Problem -- Solution -- Discussion -- See Also -- 2.25 Changing File Attributes on Windows -- Problem -- Solution -- Discussion -- See Also -- 2.26 Extracting Text from OpenOffice.org Documents -- Problem -- Solution -- Discussion -- See Also -- 2.27 Extracting Text from Microsoft Word Documents -- Problem -- Solution -- Discussion -- See Also -- 2.28 File Locking Using a Cross-Platform API…”
    Libro electrónico
  5. 293885
    Publicado 2010
    Tabla de Contenidos: “…-- Chapter 3 Create a Compelling Vision -- Tell a Story -- Chapter 4 Core Values Drive Behavior -- Make It Personal -- Chapter 5 The "C" Word -- What Do Pizza and Shoes Have in Common? …”
    Libro electrónico
  6. 293886
    Publicado 2002
    Tabla de Contenidos: “…JFS/JFS2 and VxFS command comparison tables -- Appendix C. Sample installation scripts -- Appendix D. The VERITAS Cluster Server for AIX -- Executive overview -- Components of a VERITAS cluster -- Cluster resources -- Cluster configurations -- Cluster communication -- Cluster installation and setup -- Cluster administration facilities -- HACMP and VERITAS Cluster Server compared -- Components of an HACMP cluster -- Cluster resources -- Cluster configurations -- Cluster communications -- Cluster installation and setup -- Cluster administration facilities -- HACMP and VERITAS Cluster Server feature comparison summary -- Abbreviations and acronyms -- Related publications -- IBM Redbooks -- Other resources -- Referenced Web sites -- How to get IBM Redbooks -- IBM Redbooks collections -- Index -- Back cover…”
    Libro electrónico
  7. 293887
    por Schilling, Martin
    Publicado 2022
    Tabla de Contenidos: “…Practice 30: Creating a crystal-clear picture of your target customers -- Practice 31: Aligning your product value proposition with the underserved needs of your customers -- Practice 32: Developing your roadmap as a communication tool with the right prioritization logic -- Product management basics -- Practice 33: Getting the brand and product design right early on -- Practice 34: Building a thriving user research engine quickly -- Practice 35: Implementing best-in-class product management tools -- 6 Technology Excellence: Creating scalable and secure tech platforms for future growth -- Practice 36: Establishing the right technology OKRs -- Organzational charts and roles -- Practice 37: Defining the roles &amp -- responsibilities for a technology function -- Practice 38: Scaling the right technology roles at the right time -- Your way of agile development -- Practice 39: Creating your own version of agile development -- Development operations (DevOps) -- Practice 40: Establishing lean software development principles -- Practice 41: Establishing technical DevOps practices for continuous delivery -- Practice 42: Enabling a team of doers through the right DevOps culture -- Scalable architecture -- Practice 43: Creating a "good enough" software architecture that can evolve over time -- Practice 44: Establishing a resilient cloud architecture -- Information security -- Practice 45: Mitigating the top 10 web applications' security risks -- Practice 46: Integrating the key information security practices into design, development and deployment early on -- Data management -- Practice 47: Democratizing data with self-service data tools while building a scalable data architecture -- 7 B2C Marketing Excellence: Scaling up with minimal expense and maximum customer retention -- OKRs -- Practice 48: Establishing the right marketing OKRs…”
    Libro electrónico
  8. 293888
    Publicado 2022
    Tabla de Contenidos: “…Presentation of the approach of Sammoud et al. (2020c) -- 8.5. Authentication techniques based on biometrics and machine learning -- 8.5.1. …”
    Libro electrónico
  9. 293889
    por OECD
    Publicado 2022
    Tabla de Contenidos: “…Annexe technique -- Questionnaire -- Gestion du questionnaire -- Champ d'appilcation du questionnaire -- Application de groupes d'âge normalisés aux structures et aux programmes d'enseignement -- Informations « sans objet » et « manquantes » -- Agrégation des informations pour l'ensemble des programmes d'enseignement et des structures au sein des pays et territoires -- Visualisation des indicateurs dans le rapport et le site web qui l'accompagne -- Traitement des données infranationales -- Rapports nationaux de base -- Glossaire des termes clés -- Annexe C. Liste des tableaux disponibles en ligne -- Annexe D. …”
    Libro electrónico
  10. 293890
    Publicado 2024
    Tabla de Contenidos: “…uniq -- Counting -- wc -- head -- tail -- tee -- awk -- sed -- Practical pipe patterns -- "Top X", with count -- curl | bash -- Security considerations for curl | sudo | bash -- Filtering and searching with grep -- grep and tail for log monitoring -- find and xargs for bulk file operations -- sort, uniq, and reverse numerical sort for data analysis -- awk and sort for reformatting data and field-based processing -- sed and tee for editing and backup -- ps, grep, awk, xargs, and kill for process management -- tar and gzip for backup and compression -- Advanced: inspecting file descriptors -- Conclusion -- Chapter 12: Automating Tasks with Shell Scripts -- Why you need Bash scripting basics -- Basics -- Variables -- Setting -- Getting -- Bash versus other shells -- Shebangs and executable text files, aka scripts -- Common Bash settings (options/arguments) -- /usr/bin/env -- Special characters and escaping -- Command substitution -- Testing -- Testing operators -- [[ file and string testing ]] -- Useful operators for string testing -- Useful operators for file testing -- (( arithmetic testing )) -- Conditionals: if/then/else -- ifelse -- Loops -- C-style loops -- for...in -- While -- Variable exporting -- Functions -- Prefer local variables -- Input and output redirection -- &lt -- : input redirection -- &gt -- and &gt -- &gt -- : output redirection -- Use 2&gt -- &amp -- 1 to redirect STDERR and STDOUT -- Variable interpolation syntax - {} -- Limitations of shell scripts -- Conclusion -- Citations -- Chapter 13: Secure Remote Access with SSH -- Public key cryptography primer -- Message encryption -- Message signing -- SSH keys -- Exceptions to these rules -- Logging in and authenticating -- Practical project: Set up a key-based login to a remote server -- Step 1: Open your terminal on the SSH client (not the server) -- Step 2: Generate the key pair…”
    Libro electrónico
  11. 293891
    por Ballard, Chuck
    Publicado 2005
    Tabla de Contenidos: “…Data consolidation examples -- DB2 Migration ToolKit -- Consolidating with the MTK -- Example: Oracle 9i to DB2 UDB -- Example: SQL Server 2000 to DB2 UDB -- Consolidating with WebSphere II -- Example - Oracle 9i to DB2 UDB -- Example - SQL Server to DB2 UDB -- Appendix C. Data mapping matrix and code for EDW -- Source to target data mapping matrix -- SQL ETL Code to populate the EDW -- Appendix D. …”
    Libro electrónico
  12. 293892
    Publicado 2004
    Tabla de Contenidos: “…Commands -- The big picture -- igt-add-cmmconnectionfactory -- igt-add-user -- igt-change-port -- igt-change-timeout -- igt-container-status -- igt-delete-ca -- igt-delete-cmmconnectionfactory -- igt-delete-user -- igt-deploy-gar -- igt-grid-cert-request -- igt-grid-default-ca -- igt-import-ca -- igt-install-certs -- igt-list-users -- igt-set-admin-user -- igt-setenv.sh -- igt-start-container -- igt-stop-container -- igt-undeploy-gar -- globus-domainname -- globus-hostname -- globus-url-copy -- grid-cert-info -- grid-change-pass-phrase -- grid-mapfile-add-entry -- grid-mapfile-check-consistency -- grid-mapfile-delete-entry -- grid-proxy-destroy -- grid-proxy-info -- grid-proxy-init -- managed-job-globusrun -- ogsi-add-service -- ogsi-create-service -- ogsi-destroy-service -- ogsi-find-service-data-by-xpath -- ogsi-get-gwsdl-port-types -- ogsi-notification-sink -- ogsi-notification-sink-notifyer -- ogsi-notification-topic-listener -- ogsi-remove-service -- ogsi-request-termination -- ogsi-resolve-handle -- ogsi-set-service-data-by-name -- Other Globus commands -- Appendix C. Script the installation -- Basics for scripting -- Scripting the IBM Grid Toolbox installation -- Scripting the Apache Ant installation -- Scripting the GridFTP installation…”
    Libro electrónico
  13. 293893
    Publicado 2003
    Tabla de Contenidos: “…-- 12.4 Business rules and system rules -- 12.5 Business rules -- 12.6 Business system rules -- 12.7 Rules and business processes -- 12.8 The physical location of rules -- 12.9 Rules and formal logic -- 12.10 Logic and the Rule archetype pattern -- 12.11 RuleElement -- 12.12 Operator -- 12.13 Proposition -- 12.14 Variable and DateVariable -- 12.15 RuleContext -- 12.16 Rule -- 12.17 Rule evaluation -- 12.18 ActivityRule -- 12.19 RuleSet -- 12.20 RuleOverride -- 12.21 Summary -- Summary -- Archetype glossary -- Bibliography -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J -- K -- L -- M.…”
    Libro electrónico
  14. 293894
    Publicado 2002
    Tabla de Contenidos: “…Additional material -- Locating the Web material -- Using the Web material -- How to use the Web material -- Glossary -- A -- B -- C -- D -- E -- F -- G -- H -- I -- L -- M -- N -- O -- P -- R -- S -- T -- U -- V -- Abbreviations and acronyms -- Related publications -- IBM Redbooks -- Other resources…”
    Libro electrónico
  15. 293895
    Publicado 2002
    Tabla de Contenidos: “…Additional information on Host Publisher -- Host Publisher installation log -- Host Publisher configuration information -- Host Publisher version information -- Host Publisher documentation -- Appendix C. Language support -- Related publications -- IBM Redbooks -- Other resources -- Referenced Web sites -- How to get IBM Redbooks -- IBM Redbooks collections -- Index -- Back cover…”
    Libro electrónico
  16. 293896
    Publicado 2002
    Tabla de Contenidos: “…Sample switch management script -- Appendix C. Hints and tips -- PSSP hints and tips -- Identifying Ethernet adapters on the pSeries p660…”
    Libro electrónico
  17. 293897
    Publicado 2013
    Tabla de Contenidos: “…7 Limits of the Welfarist Approach and Alternatives -- 7.1 Issues with the Welfarist Approach -- 7.2 Alternatives -- A.1 Formal Derivation of the Optimal Nonlinear Tax Rate -- A.2 Optimal Bottom Tax Rate in the Mirrlees Model -- Appendix -- Acknowledgments -- References -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- K -- L -- M -- N -- O -- P -- R -- S -- T -- U -- V -- W -- Z.…”
    Libro electrónico
  18. 293898
    por Gierer, Gerald
    Publicado 2013
    Tabla de Contenidos: “…Testing the DAO Layer with Spring and JUnit -- Unit testing overview -- The benefits of unit testing -- Configuring the test environment -- The jdbc.properties file -- The logback.xml file -- The test-persistence.xml file -- Introducing the Spring IoC container -- Exploring the testingContext.xml file -- The Spring XML namespaces -- The property file configuration -- Creating the JDBC DataSource -- Defining helper beans -- Defining the EntityManagerFactory class -- Configuring the transaction manager -- Autowiring beans -- Thanks for the plumbing! …”
    Libro electrónico
  19. 293899
    Publicado 2009
    Tabla de Contenidos: “…Booting the .vm File from ROMMON -- Verifying the Software Installation -- Installing Packages -- TURBOBOOT Considerations for the c12000 Platform -- Booting the Standby RP -- Upgrading to a Major Cisco IOS XR Version Using mini.pie -- Install Rollback -- Removing Inactive Packages -- Performing an Install Audit -- Disk Backup and Recovery -- Creating a Backup Disk with Golden Disk -- Disk Mirroring -- Creating a Disk Partition -- Turning On Disk Mirroring -- Install Health Checks -- Verifying MD5 Signature of a PIE or an SMU -- Anticipating Disk Space Usage -- Testing a PIE or SMU Installation -- Verifying the config-register -- Clearing Configuration Inconsistency -- Chapter 4 Configuration Management -- Understanding Distributed Configuration Management -- Control Plane Configuration Management -- Data Plane Configuration Management -- Understanding Configuration Planes -- Admin Plane -- Shared Plane -- Local Plane -- Components of Configuration Management -- Configuration Manager -- Configuration File System -- Role of SysDB in Configuration Management -- Replicated Data Service File System -- Understanding the Two-Stage Commit Model -- Building the Target Configuration -- Commit Operation -- Commit Confirmed Option -- Commit Failures -- Configuration Failures During Startup -- Configuration Features in Cisco IOS XR -- Deleting Physical Interface -- Configuration Navigation -- Default Running Configuration Behavior -- Troubleshooting Configuration Inconsistencies -- Configuration Session Lock -- Avoiding a Commit Operation and Clearing the Target Configurations -- Option 1: Unlock the Configuration Session -- Option 2: Use the clear Command -- Option 3: Use the abort Command -- Option 4: Use the end or exit Commands -- Configuration Management During Hardware and Software Change Events…”
    Libro electrónico
  20. 293900
    Publicado 2018
    Tabla de Contenidos: “…-- Adding our RGB LED to the REPL -- Controlling our LED from the command-line interface -- Summary -- Questions -- Further reading -- Chapter 4: Bringing in Input with Buttons -- Technical requirements -- Using inputs in robotics projects -- Digital versus analog input -- How to handle analog input with the Raspberry Pi -- Analog GPIO expanders -- Using input devices with digital interfaces -- How Johnny-Five handles input -- The structure of a typical Johnny-Five project -- The beginning - including libraries and creating our board object -- The board ready event handler -- Constructing our component objects -- Input event handlers and output device manipulation -- The Johnny-Five button object -- The button object -- Button events -- Wiring up buttons -- Putting a button on a breadboard -- Using a pull-down resistor -- Adding buttons to our RGB LED project -- Wiring everything up -- Using the power and ground side rails -- Wiring up the buttons -- Button 1 - stop and start rainbow -- Refactoring the rainbow cycle -- Button 2 - next color -- Summary -- Questions -- Further reading -- Chapter 5: Using a Light Sensor to Create a Night-Light -- Technical requirements -- Using an analog sensor with the Pi -- Finding the right sensors for your Pi project -- I2C devices -- SPI -- How to determine if your sensor will work with Johnny-Five -- The ambient light sensor -- Wiring up the sensor -- Writing a program to get readings and print them to the command line -- The Johnny-Five sensor events…”
    Libro electrónico