Mostrando 2,981 - 3,000 Resultados de 3,026 Para Buscar '"Médium"', tiempo de consulta: 0.08s Limitar resultados
  1. 2981
    por Cox, Christopher 1965-
    Publicado 2014
    Tabla de Contenidos: “…8.2 Transmission of Scheduling Messages on the PDCCH 139 -- 8.2.1 Downlink Control Information 139 -- 8.2.2 Resource Allocation 140 -- 8.2.3 Example: DCI Format 1 141 -- 8.2.4 Radio Network Temporary Identifiers 142 -- 8.2.5 Transmission and Reception of the PDCCH 143 -- 8.3 Data Transmission on the PDSCH and PUSCH 144 -- 8.3.1 Transport Channel Processing 144 -- 8.3.2 Physical Channel Processing 146 -- 8.4 Transmission of Hybrid ARQ Indicators on the PHICH 148 -- 8.4.1 Introduction 148 -- 8.4.2 Resource Element Mapping of the PHICH 148 -- 8.4.3 Physical Channel Processing of the PHICH 149 -- 8.5 Uplink Control Information 149 -- 8.5.1 Hybrid ARQ Acknowledgements 149 -- 8.5.2 Channel Quality Indicator 150 -- 8.5.3 Rank Indication 151 -- 8.5.4 Precoding Matrix Indicator 151 -- 8.5.5 Channel State Reporting Mechanisms 151 -- 8.5.6 Scheduling Requests 152 -- 8.6 Transmission of Uplink Control Information on the PUCCH 153 -- 8.6.1 PUCCH Formats 153 -- 8.6.2 PUCCH Resources 154 -- 8.6.3 Physical Channel Processing of the PUCCH 155 -- 8.7 Uplink Reference Signals 155 -- 8.7.1 Demodulation Reference Signal 155 -- 8.7.2 Sounding Reference Signal 156 -- 8.8 Power Control 157 -- 8.8.1 Uplink Power Calculation 157 -- 8.8.2 Uplink Power Control Commands 158 -- 8.8.3 Downlink Power Control 159 -- 8.9 Discontinuous Reception 159 -- 8.9.1 Discontinuous Reception and Paging in RRC_IDLE 159 -- 8.9.2 Discontinuous Reception in RRC_CONNECTED 159 -- References 161 -- 9 Random Access 163 -- 9.1 Transmission of Random Access Preambles on the PRACH 163 -- 9.1.1 Resource Element Mapping 163 -- 9.1.2 Preamble Sequence Generation 165 -- 9.1.3 Signal Transmission 165 -- 9.2 Non-Contention-Based Procedure 166 -- 9.3 Contention-Based Procedure 167 -- References 169 -- 10 Air Interface Layer 2 171 -- 10.1 Medium Access Control Protocol 171 -- 10.1.1 Protocol Architecture 171 -- 10.1.2 Timing Advance Commands 173 -- 10.1.3 Buffer Status Reporting 173 -- 10.1.4 Power Headroom Reporting 173 -- 10.1.5 Multiplexing and De-multiplexing 174.…”
    Libro electrónico
  2. 2982
    Publicado 2017
    “…Skill Level Intermediate In this video, you'll learn: The fundamentals, domain terms, and language of BOSH How to build your own BOSH releases, gaining confidence that you understand exactly what's deployed on your network How to fully automate your deployments, unlocking a huge potential in predictability and testability How BOSH detects VM issues and automatically recovers them for you How to monitor your deployments with BOSH How to colocate your own tools into your BOSH deployment Who Should Take This Course Operators and DevOps professionals managing medium to large networks of virtual machines. Also useful for Cloud Foundry and Concourse enthusiasts, and those providing managed services and consulting to Cloud Foundry users. …”
    Video
  3. 2983
    Publicado 2014
    “…Coupled with 10 GB iSCSI, FlashSystem is positioned to bring extreme performance to small and medium-sized businesses (SMB) and growth markets. …”
    Libro electrónico
  4. 2984
    Publicado 2016
    “…Hence it is the language of choice for data scientists to prototype, visualize, and run data analyses on small and medium-sized data sets. This is a unique book that helps bridge the gap between machine learning and web development. …”
    Libro electrónico
  5. 2985
    Publicado 2016
    “…And JavaScript provides an excellent medium for this approach. By learning how to expose JavaScript's true identity as a functional language, we can implement web apps that are more powerful, easier to maintain and more reliable. …”
    Libro electrónico
  6. 2986
    Publicado 2016
    “…Omar Santos, a Cisco Product Security Incident Response Team (PSIRT) technical leader and author of Network Security with NetFlow and IPFIX, the CCNA Security 210-260 Official Cert Guide, and other key security video and book titles by Cisco Press demonstrates how NetFlow can be used by large enterprises and small-to-medium-sized businesses to meet critical network challenges. …”
    Video
  7. 2987
    Publicado 2017
    “…Written by a lead member of Mediums DevOps team, this book explains how to treat infrastructure as code, meaning you can bring resources online and offline as necessary with the code as easily as you control your software. …”
    Libro electrónico
  8. 2988
    Publicado 2015
    “…The configuration is very visual and often more easily explained with this medium than any other delivery mechanism. This LiveLesson uses the most current version of SQL Server, but almost all the content can be applied to SQL Server versions as far back as 2005, and in some cases, even older versions of SQL Server. …”
    Video
  9. 2989
    Publicado 2016
    “…Learn: • How to mine the worst experiences of your life for your pitch • How to tell me, show me, and sign me up in one minute • How to make a good impression through any medium • The dos and don’ts of pitching etiquette—and how to correct common mistakes • The unspoken rules in Silicon Valley A former mentor at 500 Startups, where she was a pitching coach to world-changing companies at one of the largest incubators in the U.S., Perruchet shares her proven methodology, insider advice, and hands-on exercises. …”
    Libro electrónico
  10. 2990
    Publicado 2008
    “…To demonstrate IP video at work, they also present an extensive set of case studies from large, medium-size, and small companies in many leading industries. …”
    Libro electrónico
  11. 2991
    Publicado 2015
    “…Coupled with 10 GB iSCSI, the FlashSystem is positioned to bring extreme performance to small and medium-sized businesses (SMB) and growth markets. …”
    Libro electrónico
  12. 2992
    Publicado 2004
    “…Now offered in many models, the PIX Firewall is perfectly suited to meet the requirements of small offices (501 model), medium to large businesses (506E, 515E, and 525 models), and large enterprise and service provider customers (525 and 535 models and the Firewall Services Module). …”
    Libro electrónico
  13. 2993
    Publicado 2013
    “…Enterprises, as well as small- and medium-sized organizations, adopt virtualization as a more agile way of scaling IT to meet business needs. …”
    Video
  14. 2994
    Publicado 2017
    “…What You Will Learn Familiarize yourself with the different components of the Elastic Stack Get to know the new functionalities introduced in Elastic Stack 6.0 Effectively build your data pipeline to get data from terabytes or petabytes of data into Elasticsearch and Logstash for searching and logging Use Kibana to visualize data and tell data stories in real-time Secure, monitor, and use the alerting and reporting capabilities of Elastic Stack Take your Elastic application to an on-premise or cloud-based production environment In Detail The Elastic Stack is a powerful combination of tools for distributed search, analytics, logging, and visualization of data from medium to massive data sets. The newly released Elastic Stack 6.0 brings new features and capabilities that empower users to find unique, actionable insights through these techniques. …”
    Libro electrónico
  15. 2995
    Publicado 2018
    “…This book embodies the spirit of great mentors, across every medium, and imparts a wizard-like cleverness to its readers. …”
    Libro electrónico
  16. 2996
    Publicado 2019
    “…In other words (no matter if your task is easy, medium or complex) having this knowledge under your tool belt is a must, not an option. …”
    Libro electrónico
  17. 2997
    Publicado 2008
    “…Related Titles: Networking for Home and Small Businesses, CCNA Discovery Learning Guide ISBN-10: 1-58713-209-5 ISBN-13: 978-1-58713-209-4 Working at a Small-to-Medium Business or ISP, CCNA Discovery Learning Guide ISBN-10: 1-58713-210-9 ISBN-13: 978-1-58713-210-0 Scott Bennett, CCNA, CCAI, has been an instructor for both Capital Center High School Technology Institute and Portland Community College. …”
    Libro electrónico
  18. 2998
    Publicado 2022
    “…What you will learn Understand the CTI lifecycle which makes the foundation of the study Form a CTI team and position it in the security stack Explore CTI frameworks, platforms, and their use in the program Integrate CTI in small, medium, and large enterprises Discover intelligence data sources and feeds Perform threat modelling and adversary and threat analysis Find out what Indicators of Compromise (IoCs) are and apply the pyramid of pain in threat detection Get to grips with writing intelligence reports and sharing intelligence Who this book is for This book is for security professionals, researchers, and individuals who want to gain profound knowledge of cyber threat intelligence and discover techniques to prevent varying types of cyber threats. …”
    Libro electrónico
  19. 2999
    Publicado 2023
    “…He actively contributes to the development community through GitHub and Medium, sharing valuable insights and knowledge. With a high instructor rating, thousands of positive reviews, and over 57,000 students, Mehmet is a trusted source for learning about microservices and software architecture…”
    Video
  20. 3000
    por Louvel, Liliane
    Publicado 2016
    “…Les notions techniques propres au medium et à son histoire : perspective, cadres, cadrages, couleur, effets d’anamorphose, Véronique, nature morte, portrait, figure, illusion, dispositifs, genres et styles..., peuvent faire système et constituer un outil opératoire pour ouvrir « l’œil du texte ». …”
    Electrónico