Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 168
- Application software 140
- Security measures 140
- Computer security 131
- Engineering & Applied Sciences 116
- Computer networks 106
- Computer Science 79
- Management 74
- Operating systems (Computers) 70
- Computer programs 62
- Computer software 59
- Web site development 59
- Computer programming 51
- Microsoft Windows (Computer file) 48
- Cloud computing 47
- Java (Computer program language) 47
- Artificial intelligence 46
- Business & Economics 46
- Web sites 46
- Safety measures 42
- Microsoft .NET Framework 40
- History 37
- Data processing 36
- Leadership 35
- Social aspects 35
- Database management 34
- Electrical & Computer Engineering 34
- Prevention 34
- Finance 33
- Software engineering 33
-
2781Publicado 2017“…The rapid development of an unusual company emerging from the RWTH Aachen University and now part of Deutsche Post DHL demonstrates how a radically different innovative thinking leads to affordable functionality, It is an e-mobile success story about a vehicle that is customized, economic, ecological, flexible, safe, and reliable. Selected quotes on the StreetScooter: “Approached the issue with common sense. …”
Libro electrónico -
2782Publicado 2023“…By the end, I was coding as quickly as I could in JS/Node, but with all the protection of a compiled and type-safe language. I'm a convert! - JD McCormack, Meta Walk with a master as he guides you down the path of creating fast, rock-solid, modern web applications. …”
Libro electrónico -
2783Publicado 2022“…What you will learn Create a monorepo project with Lerna and NPM workspaces Add realtime support with GraphQL subscriptions Build a frontend with a modular architecture and Material Design UI components to consume the GraphQL API Use GraphQL Code Generator to generate types and code for a type-safe and scalable code base Create Angular modules and smart and dumb components and share data between them Use Apollo Client features such as client-side queries and reactive variables for local state management Who this book is for This Angular GraphQL book is for Angular developers who want to learn how to use GraphQL and Apollo with Angular to build full-stack applications. …”
Libro electrónico -
2784Publicado 2020“…However, before the first autonomous vessel can be released into her actual context of operation, it is necessary to ensure that it is safe and secure. The aim of ISSAV is to promote all aspects of maritime safety and security in the context of autonomous vessels. …”
Libro electrónico -
2785Publicado 2023“…About the Book Building Web APIs with ASP.NET Core teaches you how to write safe, maintainable, and performant REST APIs. It's full of best practices for modern and classic API styles, including REST and GraphQL. …”
Video -
2786Publicado 2023“…About the Book Building Web APIs with ASP.NET Core teaches you how to write safe, maintainable, and performant REST APIs. It's full of best practices for modern and classic API styles, including REST and GraphQL. …”
Grabación no musical -
2787por Arthur Conan Doyle“…Holder feels that he must not leave this rare and precious piece of jewellery in his personal safe at the bank, and so he takes it home with him to lock it up there. …”
Publicado 2014
Texto completo en Odilo
Otros -
2788Publicado 2015“…Another approach to exploit P-gp is represented by ABCB1 gene transfer to transform bone marrow progenitor cells into a drug resistant state which may allow conventional or higher doses of anticancer drug substrates of P-gp to be administered safely after transplantation. More recently the development and introduction in the clinics of anticancer drugs which are not substrates of P-gp (e.g. new microtubule modulators, topoisomerase inhibitors) has provided a new and promising strategy to overcome P-gp tumor drug resistance (P-gp 'evasion'). …”
Libro electrónico -
2789The lost art of connecting the gather, ask, do method for building meaningful business relationshipsPublicado 2021“…Most importantly, readers will learn how to help the other person feel seen, safe and secure. If you can find people's uniqueness or "secret sauce," what McPherson calls their "Chief Differentiating Factor" and show it to them-they'll never forget it. …”
Libro electrónico -
2790Publicado 2022“…Leaners will also explore the basics of how malware works and how to set up a safe environment to analyze malware in a lab. This course is meant to be an introduction to simple tools and techniques for those new to cyber security. …”
Video -
2791Publicado 2016“…Thus, having the alternative of noninvasive elastographic methods for the evaluation of liver fibrosis (maybe together with serum tests such as FibroMax) and knowing the low real life yield of liver biopsy ()and the risk of complications), we can safely conclude that, for daily medical activity, liver biopsy can be avoided in the vast majority of cases. …”
Libro electrónico -
2792Publicado 2022“…It also provides extensive insight into keeping meetings safe, and warning or removing problematic participants. …”
Libro electrónico -
2793Publicado 2019“…You're an IT architect or developer moving to the cloud You're an IT security professional tasked with keeping your teams safe in the cloud Prerequisites: General knowledge of computing concepts, such as storage and virtual machines General knowledge of networking, including IP addresses, subnetting, and firewalls If you're new to IT architecture or IT security, you might need some additional introductory courses prior to this one Materials or downloads needed in advance: Code repository for the course: https://resources.oreilly.com/examples/110000448 A useful, open source textbook: Problem Solving with Algorithms and Data Structures using Python Further resources Threat Modeling: Designing for Security, by Adam Shostack is a very good read for anyone who wants more in-depth information on threat modeling Applied Cryptography by Bruce Schneier is the definitive reference for anyone who would like to dig deep into cryptography The online documentation for the different cloud providers is the best, most up-to-date resource for determining how to do exactly what you want to do with that provider; this course teaches you to ask the right questions, but in most cases it doesn't give step-by-step instructions on how to do it, because those would quickly become obsolete…”
Video -
2794Publicado 2021Tabla de Contenidos: “…Shunt Failure 450 10.20 ESD Clamp Element - Width Scaling 450 10.21 ESD Clamp Element - On-resistance 450 10.22 ESD Clamp Element - Safe Operating Area (SOA) 451 10.23 ESD Power Clamp Issues 451 10.24 ESD Power Clamp Issues - Power-up and Power-down 451 10.25 ESD Power Clamp Issues - False Triggering 452 10.26 ESD Power Clamp Issues - Pre-charging 452 10.27 ESD Power Clamp Issues - Post-charging 452 10.28 ESD Power Clamp Design 453 10.29 ESD Power Clamp Design Synthesis - Forward Bias Triggered ESD Power Clamps 456 10.30 Series Stacked RC-triggered ESD Power Clamps 459 10.31 Triple Well Diode String ESD Power Clamp 463 10.32 Bipolar ESD Power Clamps 464 10.33 ESD Power Clamp Design Synthesis - Bipolar ESD Power Clamps 469 10.34 Bipolar ESD Power Clamps with Frequency Trigger Elements: Capacitance-triggered 480 10.35 Silicon Controlled Rectifier Power Clamps 481 References 486 11 ESD Architecture and Floor Planning 491 11.1 ESD Design Floor Plan 491 11.2 Peripheral I/O Design 492 11.3 Pad Limited Peripheral I/O Design Architecture 493 11.4 Pad Limited Peripheral I/O Design Architecture - Staggered I/O 493 11.5 Core Limited Peripheral I/O Design Architecture 495 11.6 Lumped ESD Power Clamp in Peripheral I/O Design Architecture 496 11.7 Lumped ESD Power Clamp in Peripheral I/O Design Architecture in the Semiconductor Chip Corners 496 11.8 Lumped ESD Power Clamp in Peripheral I/O Design Architecture - Power Pads 497 11.9 Lumped ESD Power Clamp in Peripheral I/O Design Architecture - Master/Slave ESD Power Clamp System 498 11.10 Array I/O 498 11.11 Array I/O Nibble Architecture 501 11.12 Array I/O Pair Architecture 503 11.13 Array I/O - Fully Distributed 504 11.14 ESD Architecture - Dummy Bus Architecture 507 11.15 ESD Architecture - Dummy VDD Bus 507 11.16 ESD Architecture - Dummy Ground (VSS) Bus 508 11.17 Native Voltage Power Supply Architecture 508 11.18 Single Power Supply Architecture 509 11.19 Mixed Voltage Architecture 509 11.20 Mixed Voltage Architecture - Single Power Supply 509 11.21 Mixed Voltage Architecture - Dual Power Supply 511 11.22 Mixed Signal Architecture 514 11.23 Digital and Analog Floor Plan - Placement of Analog Circuits 515 11.24 Mixed Signal Architecture - Digital, Analog, and RF Architecture 518 11.25 ESD Power Grid Design 519 11.26 I/O to Core Guard Rings 525 11.27 Within I/O Guard Rings 527 11.28 ESD-to-I/O Off-Chip Driver (OCD) Guard Ring 527 11.29 Guard Rings and Computer Aided Design (CAD) Methods 539 11.30 Summary and Closing Comments 541 References 541 12 ESD Digital Design 551 12.1 Fundamental Concepts of ESD Design 551 12.2 Concepts of ESD Digital Design 551 12.3 Device Response to External Events 552 12.4 Alternative Current Loops 553 12.5 Decoupling of Feedback Loops 554 12.6 Decoupling of Power Rails 554 12.7 Local and Global Distribution 554 12.8 Usage of Parasitic Elements 555 12.9 Unused Section of a Semiconductor Device, Circuit, or Chip Function 556 12.10 Unused Corners 556 12.11 Unused White Space 556 12.12 Impedance Matching Between Floating and Non-floating Networks 556 12.13 Unconnected Structures 557 12.14 Symmetry 557 12.15 Design Synthesis 557 12.16 ESD, Latchup, and Noise 559 12.17 Structures Under Bond Pads 574 12.18 Summary and Closing Comments 575 References 576 13 ESD Analog Design 583 13.1 Analog Design: Local Matching 583 13.2 Analog Design: Global Matching 583 13.3 Symmetry 584 13.4 Analog Design - Local Matching 584 13.5 Analog Design - Global Matching 584 13.6 Common Centroid Design 586 13.7 Common Centroid Arrays 586 13.8 Interdigitation Design 586 13.9 Common Centroid and Interdigitation Design 587 13.10 Dummy Resistor Layout 593 13.11 Thermoelectric Cancelation Layout 593 13.12 Electrostatic Shield 593 13.13 Interdigitated Resistors and ESD Parasitics 594 13.14 Capacitor Element Design 595 13.15 Inductor Element Design 596 13.16 ESD Failure in Inductors 597 13.17 Inductor Physical Variables 598 13.18 Inductor Element Design 599 13.19 Diode Design 599 13.20 Analog ESD Circuits 602 13.21 ESD MOSFETs 607 13.24 Analog Differential Pair Common Centroid Design Layout - Signal-pin to Signal-pin and Parasitic ESD Elements 620 13.25 Summary and Closing Comments 624 References 624 14 ESD RF Design 629 14.1 Fundamental Concepts of ESD Design 629 14.2 Fundamental Concepts of RF ESD Design 632 14.3 RF CMOS Input Circuits 637 14.4 RF CMOS Impedance Isolation LC Resonator ESD Networks 647 14.5 RF CMOS LC-diode Networks Experimental Results 648 14.6 RF CMOS LNA ESD Design - Low Resistance ESD Inductor and ESD Diode Clamping Elements in Π-configuration 650 14.7 RF CMOS T-coil Inductor ESD Input Network 653 14.8 RF CMOS Distributed ESD Networks 655 14.9 RF CMOS Distributed ESD-RF Networks 656 14.10 RF CMOS Distributed RF-ESD Networks Using Series Inductors and Dual-diode Shunts 656 14.11 RF CMOS Distributed RF-ESD Networks Using Series Inductors and MOSFET Parallel Shunts 659 14.12 RF CMOS Distributed ESD Networks - Transmission Lines and Co-planar Waveguides 661 14.13 RF CMOS - ESD and RF LDMOS Power Technology 663 14.14 Summary and Closing Comments 666 References 666 15 ESD Power Electronics Design 681 15.1 Reliability Technology Scaling and the Reliability Bathtub Curve 681 15.2 Input Circuitry 686 15.3 Summary and Closing Comments 702 References 702 16 ESD in Advanced CMOS 709 16.1 Interconnects and ESD 709 16.2 Aluminum Interconnects 710 16.3 Interconnects - Vias 714 16.4 Interconnects - Wiring 715 16.5 Junctions 719 16.6 Titanium Silicide 725 16.7 Shallow Trench Isolation 731 16.8 LOCOS-bound ESD Structures 734 16.9 LOCOS-bound p+/n-well Junction Diodes 734 16.10 LOCOS-bound n+ Junction Diodes 736 16.11 LOCOS-bound n-well/Substrate Diodes 737 16.12.…”
Libro electrónico -
2795Publicado 2023“…It requires governments to: - provide physical security and decent working conditions- address diverse needs and psychosocial risk factors, and tackle stigma and discrimination- consider wider measures around childcare, transportation and safe accommodation.1.3. Getting support and protection right enhances retention of the existing workforce and will attract a new generation of HCWs.5. …”
Libro electrónico -
2796Publicado 2020“…For these reasons, “PharmaCaRe Report 2018” represents a useful and valuable tool for political decision-makers in identifying strategies aimed at optimizing the allocation of resources, as well as improving care pathways through constant monitoring, the promotion of higher standards of care and safe, efficient and effective use of drugs…”
Libro electrónico -
2797Publicado 2022“…Deal with unusual backup needs: If you deal with exceptionally large files (such as audio and video files), spend a lot of time on the road away from your usual backup hardware, run Windows on your Mac, or rely on cloud services to store essential data, you'll want to take extra (or different) steps to make sure everything is safely backed up. Manage your media: What happens when a backup drive fills up, or becomes so old that you worry about its future reliability? …”
Libro electrónico -
2798Publicado 2023“…You will learn foundational concepts on how to keep the ICS/SCADA/IoT operational environment safe, secure, and resilient against current and emerging cyber threats. …”
Video -
2799Publicado 2024“…About the Instructor Tommy Norman (CSM, A-CSM, CSPO, CSP, CTC, CEC, CAL, PSM, SAFe Agilist, Microsoft MVP) has had an IT career spanning over 30 years, he has been helping organizations of all sizes and shapes build great software with a practical approach in a multitude of roles. …”
Video -
2800Publicado 2020“…We received submissions on a variety of topics including: novel assessments of learning, drawing on computational techniques for automated, peer, or human-assisted assessment; new methods for validating inferences about human learning from established measures, assessments, or proxies; experimental interventions in large-scale learning environments that show evidence of improved learning outcomes; domain independent interventions inspired by social psychology, behavioral economics, and related fields with the potential to benefit learners in diverse fields and disciplines; domain specific interventions inspired by discipline-based educational research that have the potential to advance teaching and learning of specific ideas, misconceptions, and theories within a field; tools or techniques for personalization and adaptation, based on log data, user modeling, or choice; usability studies and effectiveness studies of design elements for students or instructors; tools and pedagogy to promote community, support learning, or increase retention in atscale environments; new tools and techniques for learning at scale; best practices in the archiving and reuse of learner data in safe, ethical ways; fairness in student predictive models; challenges in learning at scale across the globe; exploration of affordable degrees at scale; innovations in platforms for supporting learning at scale; and platforms to broadly engage individuals of all ages in citizen science. …”
Libro electrónico