Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Malalts terminals 240
- Cura 112
- Operating systems (Computers) 112
- Mort 101
- Linux 70
- Engineering & Applied Sciences 61
- Computer networks 60
- Historia 53
- Computer Science 52
- Development 49
- Aspectes religiosos 48
- Enfermos terminales 48
- Cuidados paliativos 46
- Application software 45
- Computer programming 45
- Aspectes psicològics 44
- Terminal care 43
- Tractament pal·liatiu 41
- Management 39
- Security measures 37
- TFC 36
- Examinations 35
- Cloud computing 32
- Computer security 31
- Python (Computer program language) 31
- Programming 30
- Certification 29
- Església Catòlica 27
- Mac OS 27
- History 26
-
2141Publicado 2022“…Along the way, you'll gain hands-on experience with modern terminals, shells, and commands, use Linux networking, and learn how to manage your workloads, all with the goal of implementing modern Linux observability. …”
Libro electrónico -
2142Publicado 2022“…In this case, argparse can help build all you need to handle inputs in the terminal. We'll see how a single file named size.py that calculates file sizes can make use of argparse to handle the input in the terminal. …”
Video -
2143
-
2144por Magaña Paz, Carlota ( 1997-)“…Los cuidados paliativos van encaminados a proporcionar al paciente con una enfermedad terminal una mejora en la calidad de vida a través de un abordaje holístico. …”
Publicado 2019
Electrónico -
2145por Ducruet, César“…Such aspects are even more crucial nowadays when the port can be considered as only one element of value-driven supply chains (Robinson, 2002) or as a set of independent terminals operated by global actors (Olivier and Slack, 2006). …”
Publicado 2014
Capítulo de libro electrónico -
2146Publicado 2018“…You will then take a look at various Linux terminal commands and also learn to perform basic operations with them. …”
-
2147por Schiavone, Pietro“…Discernimento è un termine che, nel linguaggio teologico e ascetico, fa riferimento alla possibilità di scoprire quale sia il movente delle nostre azioni. …”
Publicado 2018
Libro -
2148Publicado 2020“…With fast and stable networks, cloud-based display output and audio output are coded, compressed, and transmitted to user terminals, implementing cloud-based VR service content and content rendering. …”
Libro electrónico -
2149Publicado 2012Tabla de Contenidos: “…Human Machine Interface 2.2.1. Remote Terminal Unit (RTU) 2.2.2. Supervisory Station 2.2.3. …”
Libro electrónico -
2150Publicado 2017Tabla de Contenidos: “…-- 7.2.4 netstat - ein Schweizer Messer -- 7.2.5 telnet - mehr als ein Remote Terminal -- 7.2.6 nslookup - Überprüfen der Namensauflösung -- 7.3 Netzwerk-Sniffer Wireshark richtig lesen -- 7.4 Zusammenfassung -- 7.5 Prüfungstipps -- 7.6 Wiederholungsfragen, Übungen und Aufgaben -- 7.7 Lösungen -- Teil II: Ethernet-LANs -- Kapitel 8: Ethernet und Switching-Grundlagen -- 8.1 Das Szenario…”
Libro electrónico -
2151Publicado 2018Tabla de Contenidos: “…Current-Voltage Curves for Thyristors -- 3.3.2. Edge and Surface Terminations -- 3.3.3. Packaging -- 3.4. Dynamic Switching Characteristics -- 3.4.1. …”
Libro electrónico -
2152Publicado 2017Tabla de Contenidos: “…Intro -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 Global System for Mobile Communications (GSM) -- 1.1 Circuit-Switched Data Transmission -- 1.1.1 Classic Circuit Switching -- 1.1.2 Virtual Circuit Switching over IP -- 1.2 Standards -- 1.3 Transmission Speeds -- 1.4 The Signaling System Number 7 -- 1.4.1 The Classic SS-7 Protocol Stack -- 1.4.2 SS-7 Protocols for GSM -- 1.4.3 IP-Based SS-7 Protocol Stack -- 1.5 The GSM Subsystems -- 1.6 The Network Subsystem -- 1.6.1 The Mobile Switching Center (MSC), Server and Gateway -- 1.6.2 The Visitor Location Register (VLR) -- 1.6.3 The Home Location Register (HLR) -- 1.6.4 The Authentication Center -- 1.6.5 The Short Messaging Service Center (SMSC) -- 1.7 The Base Station Subsystem (BSS) and Voice Processing -- 1.7.1 Frequency Bands -- 1.7.2 The Base Transceiver Station (BTS) -- 1.7.3 The GSM Air Interface -- 1.7.4 The Base Station Controller (BSC) -- 1.7.5 The TRAU for Voice Encoding -- 1.7.6 Channel Coder and Interleaver in the BTS -- 1.7.7 Ciphering in the BTS and Security Aspects -- 1.7.8 Modulation -- 1.7.9 Voice Activity Detection -- 1.8 Mobility Management and Call Control -- 1.8.1 Cell Reselection and Location Area Update -- 1.8.2 The Mobile-Terminated Call -- 1.8.3 Handover Scenarios -- 1.9 The Mobile Device -- 1.9.1 Architecture of a Voice-Centric Mobile Device -- 1.9.2 Architecture of a Smartphone -- 1.10 The SIM Card -- 1.11 The Intelligent Network Subsystem and CAMEL -- Questions -- References -- Chapter 2 General Packet Radio Service (GPRS) and EDGE -- 2.1 Circuit-Switched Data Transmission over GSM -- 2.2 Packet-Switched Data Transmission over GPRS -- 2.3 The GPRS Air Interface -- 2.3.1 GPRS vs. …”
Libro electrónico -
2153Publicado 2015Tabla de Contenidos: “…Chapter 8: Defect Prediction -- 8.1 Defect Detection Economics -- 8.2 Static Code Defect Prediction -- 8.2.1 Easy to Use -- 8.2.2 Widely Used -- 8.2.3 Useful -- Chapter 9: Effort Estimation -- 9.1 The Estimation Problem -- 9.2 How to Make Estimates -- 9.2.1 Expert-Based Estimation -- 9.2.2 Model-Based Estimation -- 9.2.3 Hybrid Methods -- Chapter 10: Data Mining (Under the Hood) -- 10.1 Data Carving -- 10.2 About the Data -- 10.3 Cohen Pruning -- 10.4 Discretization -- 10.4.1 Other Discretization Methods -- 10.5 Column Pruning -- 10.6 Row Pruning -- 10.7 Cluster Pruning -- 10.7.1 Advantages of Prototypes -- 10.7.2 Advantages of Clustering -- 10.8 Contrast Pruning -- 10.9 Goal Pruning -- 10.10 Extensions for Continuous Classes -- 10.10.1 How RTs Work -- 10.10.2 Creating Splits for Categorical Input Features -- 10.10.3 Splits on Numeric Input Features -- 10.10.4 Termination Condition and Predictions -- 10.10.5 Potential Advantages of RTs for Software Effort Estimation -- 10.10.6 Predictions for Multiple Numeric Goals -- Part III: Sharing Data -- Chapter 11: Sharing Data: Challenges and Methods -- 11.1 Houston, We Have a Problem -- 11.2 Good News, Everyone -- Chapter 12: Learning Contexts -- 12.1 Background -- 12.2 Manual Methods for Contextualization -- 12.3 Automatic Methods -- 12.4 Other Motivation to Find Contexts -- 12.4.1 Variance Reduction -- 12.4.2 Anomaly Detection -- 12.4.3 Certification Envelopes -- 12.4.4 Incremental Learning -- 12.4.5 Compression -- 12.4.6 Optimization -- 12.5 How to Find Local Regions -- 12.5.1 License -- 12.5.2 Installing CHUNK -- 12.5.3 Testing Your Installation -- 12.5.4 Applying CHUNK to Other Models -- 12.6 Inside CHUNK -- 12.6.1 Roadmap to Functions -- 12.6.2 Distance Calculations -- 12.6.2.1 Normalize -- 12.6.2.2 SquaredDifference -- 12.6.3 Dividing the Data -- 12.6.3.1 FastDiv -- 12.6.3.2 TwoDistantPoints…”
Libro electrónico -
2154Publicado 2016Tabla de Contenidos: “…Chapter 8: Atomic Types and Operations -- 8.1 Introduction -- 8.2 C++11 std::atomic< -- T> -- Class -- 8.2.1 Member Functions -- 8.3 Lock-Free Algorithms -- 8.3.1 Updating an Arbitrary, Global Data Item -- 8.3.2 AReduction Class -- 8.4 Synchronizing Thread Operations -- 8.4.1 Memory Models and Memory Ordering Options -- 8.4.2 Using the Relaxed Model -- 8.4.3 Global Order in Sequential Consistency -- 8.4.4 Comparing Sequential Consistency and Acquire-Release -- 8.4.5 Consume Instead of Acquire Semantics -- 8.4.6 Usefulness of memory_order_acq_rel -- 8.5 Examples of Atomic Synchronizations -- 8.5.1 SPINLOCK Class -- 8.5.2 Circular Buffer Class -- 8.6 TBB atomic< -- T> -- Class -- 8.6.1 Memory Ordering Options -- 8.7 Windows Atomic Services -- 8.8 Summary -- Chapter 9: High-Level Synchronization Tools -- 9.1 Introduction and Overview -- 9.2 General Comments on High-Level Synchronization Tools -- 9.3 Overview of the vath Synchronization Utilities -- 9.3.1 Code Organization -- 9.4 Timers -- 9.4.1 Using a Timer -- 9.4.2 Comment on Implementation -- 9.5 Boolean Locks -- 9.5.1 Using the BLock Class -- 9.5.2 BLock Examples -- 9.5.3 Boolean Locks Implementing Spin Waits -- 9.6 SynchP< -- T> -- Template Class -- 9.6.1 Using SynchP< -- T> -- Objects -- 9.6.2 Comments -- 9.6.3 SynchP< -- T> -- Examples -- 9.6.4 OpenMP Version: The OSynchP< -- T> -- Class -- 9.7 Idle and Spin Barriers -- 9.7.1 Using the Barrier Classes -- 9.7.2 ABarrier Implementation -- 9.8 Blocking Barriers -- 9.8.1 Using a Blocking Barrier -- 9.8.2 First Simple Example -- 9.8.3 Programming a Simple SPMD Thread Pool -- How the worker threads are launched -- How main() drives the worker thread activity -- How worker threads terminate -- Full example -- 9.9 ThQueue< -- T> -- Class -- Design requirements -- 9.9.1 Using the ThQueue< -- T> -- Queue…”
Libro electrónico -
2155Publicado 2016Tabla de Contenidos: “…5.5 Estimating reinvestment needs for valuation -- 5.5.1 Net capital expenditures -- 5.5.2 Working capital investments -- 5.5.3 Estimation of net capital expenditure for China National Petroleum Corporation -- 5.6 Forecasting growth -- 5.6.1 Revenue forecast models -- 5.6.2 Forecast of income statement items -- 5.6.3 Forecast of balance sheet items -- 5.6.3.1 Estimation of historical growth rates to forecast future growth -- 5.6.3.2 Analysts estimation of growth rates -- 5.6.3.3 Estimation of growth rate through fundamentals -- 5.6.3.3.1 Estimation of growth rate of EPS: Apple Inc -- 5.6.3.3.2 The growth rate in EPS can also be estimated through fundamentals -- 5.6.3.3.3 Estimation of growth rate of net Income: Apple Inc -- 5.6.3.3.4 Estimation of expected growth rate of net income: Apple Inc -- 5.6.3.3.5 Estimation of growth rate of Indian Oil Corporation -- 5.6.3.3.6 Estimation of growth rate from fundamentals -- 5.6.3.3.7 Estimation of growth rate in net income -- 5.6.3.3.8 Estimation of growth rate in operating income -- References -- 6 Discounted cash flow valuation models -- 6.1 Introduction -- 6.2 Dividend discount model -- 6.2.1 Special cases of DDM -- 6.2.1.1 The constant growth DDM (Gordon growth model) -- 6.2.1.2 Two-stage DDM model -- 6.2.1.3 Financial characteristics of high growth and stable growth firms -- 6.2.1.4 Two-stage H-model -- 6.2.1.5 Three-stage dividend growth model -- 6.2.2 Reflections on terminal value -- 6.2.3 Practical difficulties in estimation of parameters in the DCF models -- 6.2.4 Research studies related to DDM -- 6.2.5 Estimation of value of ICBC through dividend models -- 6.2.5.1 Valuation of ICBC using the stable DDM model -- 6.2.5.2 Estimation of growth rate from fundamentals -- 6.2.5.3 Valuation of ICBC using the two-stage DDM model -- 6.2.6 Valuation of Reliance Industries Ltd using DDM…”
Libro electrónico -
2156por Lovelace, MaryTabla de Contenidos: “…3.1.1 Configurations -- 3.1.2 Installation prerequisites -- 3.1.3 TCP/IP ports used by TotalStorage Productivity Center -- 3.1.4 Default databases created during install -- 3.2 Pre-installation check list -- 3.2.1 User IDs and security -- 3.2.2 Certificates and key files -- 3.3 Services and service accounts -- 3.3.1 Starting and stopping the managers -- 3.3.2 Uninstall Internet Information Services -- 3.3.3 SNMP install -- 3.4 IBM TotalStorage Productivity Center for Fabric -- 3.4.1 The computer name -- 3.4.2 Database considerations -- 3.4.3 Windows Terminal Services -- 3.4.4 Tivoli NetView -- 3.4.5 Personal firewall -- 3.4.6 Change the HOSTS file -- 3.5 Installation process -- 3.5.1 Prerequisite product install: DB2 and WebSphere -- 3.5.2 Installing IBM Director -- 3.5.3 Tivoli Agent Manager -- 3.5.4 IBM TotalStorage Productivity Center for Disk and Replication Base -- 3.5.5 IBM TotalStorage Productivity Center for Disk -- 3.5.6 IBM TotalStorage Productivity Center for Replication -- 3.5.7 IBM TotalStorage Productivity Center for Fabric -- Chapter 4. …”
Publicado 2005
Libro electrónico -
2157Publicado 2016Tabla de Contenidos: “…15.6 NRZI (Non-Return-to-Zero-Inverted) Coding and Decoding -- 15.6.1 NRZI Coding and Decoding in VHDL -- 15.6.2 NRZI Coding and Decoding in Verilog -- 15.7 RS-232 -- 15.7.1 Introduction -- 15.7.2 RS-232 Baud Rate Generator -- 15.7.3 RS-232 Receiver -- 15.8 Universal Serial Bus -- 15.9 Summary -- Part 4: Optimizing Designs -- Chapter 16: Design Optimization -- 16.1 Introduction -- 16.2 Techniques for Logic Optimization -- 16.3 Improving Performance -- 16.4 Critical Path Analysis -- 16.5 Summary -- Chapter 17: Behavioral Modeling in using HDLs -- 17.1 Introduction -- 17.2 How to Go from RTL to Behavioral HDL Descriptions -- 17.3 Implementing the Behavioral Model using VHDL -- 17.4 Implementing the Behavioral Model using Verilog -- 17.5 Summary -- Chapter 18: Mixed Signal Modeling -- 18.1 Introduction -- 18.2 Basic Modeling Approach for VHDL-AMS -- 18.3 Introduction to VHDL-AMS -- 18.4 VHDL-AMS Analog Pins: TERMINALS -- 18.5 Mixed Domain Modeling -- 18.6 VHDL-AMS Analog Variables: Quantities -- 18.7 Simultaneous Equations in VHDL-AMS -- 18.8 A VHDL-AMS Example: A DC Voltage Source -- 18.9 A VHDL-AMS Example: Resistor -- 18.10 Differential Equations in VHDL-AMS -- 18.11 Mixed-Signal Modeling with VHDL-AMS -- 18.12 A Basic Switch Model -- 18.13 Basic VHDL-AMS Comparator Model -- 18.14 Multiple Domain Modeling -- 18.15 Introduction to Verilog-AMS -- 18.16 Verilog-AMS: Analog ports -- 18.17 Mixed Domain Modeling in Verilog-AMS -- 18.18 Verilog-AMS Analog Variables -- 18.19 Verilog-AMS Analog Equations -- 18.20 A Verilog-AMS Example -- 18.20.1 DC Voltage Source -- 18.20.2 Resistor -- 18.21 Differential Equations in Verilog-AMS -- 18.22 Mixed Signal Modeling with Verilog-AMS -- 18.23 Multiple Domain Modeling using Verilog-AMS -- 18.24 Summary -- Chapter 19: Design Optimization Example: DES -- 19.1 Introduction -- 19.2 The Data Encryption Standard…”
Libro electrónico -
2158Publicado 2020Tabla de Contenidos: “…Building a virtual pentest platform -- A.1 Creating an Ubuntu virtual machine -- A.2 Additional OS dependencies -- A.2.1 Managing Ubuntu packages with apt -- A.2.2 Installing CrackMapExec -- A.2.3 Customizing your terminal look and feel -- A.3 Installing Nmap -- A.3.1 NSE: The Nmap scripting engine -- A.3.2 Operating system dependencies -- A.3.3 Compiling and installing from source -- A.3.4 Exploring the documentation -- A.4 The Ruby scripting language -- A.4.1 Installing Ruby Version Manager -- A.4.2 Writing an obligatory Hello World example -- A.5 The Metasploit framework -- A.5.1 Operating system dependencies -- A.5.2 Necessary Ruby gems -- A.5.3 Setting up PostgreSQL for Metasploit -- A.5.4 Navigating the msfconsole -- appendix B. …”
Libro electrónico -
2159Publicado 2010Tabla de Contenidos: “…11.1.4 Public import Declarations -- 11.1.5 Static import Declarations -- 11.1.6 Selective imports -- 11.1.7 Renaming in imports -- 11.1.8 The module Declaration -- 11.1.9 Module Summaries -- 11.2 Safety -- 11.2.1 Defined and Undefined Behavior -- 11.2.2 The @safe, @trusted, and @system Attributes -- 11.3 Module Constructors and Destructors -- 11.3.1 Execution Order within a Module -- 11.3.2 Execution Order across Modules -- 11.4 Documentation Comments -- 11.5 Interfacing with C and C++ -- 11.6 Deprecated -- 11.7 Version Declarations -- 11.8 Debug Declarations -- 11.9 D's Standard Library -- 12 Operator Overloading -- 12.1 Overloading Operators -- 12.2 Overloading Unary Operators -- 12.2.1 Using mixin to Consolidate Operator Definitions -- 12.2.2 Postincrement and Postdecrement -- 12.2.3 Overloading the cast Operator -- 12.2.4 Overloading Ternary Operator Tests and if Tests -- 12.3 Overloading Binary Operators -- 12.3.1 Operator Overloading [sup(2)] -- 12.3.2 Commutativity -- 12.4 Overloading Comparison Operators -- 12.5 Overloading Assignment Operators -- 12.6 Overloading Indexing Operators -- 12.7 Overloading Slicing Operators -- 12.8 The Operator -- 12.9 Overloading foreach -- 12.9.1 Foreach with Iteration Primitives -- 12.9.2 Foreach with Internal Iteration -- 12.10 Defining Overloaded Operators in Classes -- 12.11 And Now for Something Completely Different: opDispatch -- 12.11.1 Dynamic Dispatch with opDispatch -- 12.12 Summary and Quick Reference -- 13 Concurrency -- 13.1 Concurrentgate -- 13.2 A Brief History of Data Sharing -- 13.3 Look, Ma, No (Default) Sharing -- 13.4 Starting a Thread -- 13.4.1 Immutable Sharing -- 13.5 Exchanging Messages between Threads -- 13.6 Pattern Matching with receive -- 13.6.1 First Match -- 13.6.2 Matching Any Message -- 13.7 File Copying-with a Twist -- 13.8 Thread Termination -- 13.9 Out-of-Band Communication…”
Libro electrónico -
2160por Nartovich, AleksandrTabla de Contenidos: “…Creating a Web browser interface for your 5250 application -- Outline -- Learning objectives -- 8.1 Prerequisites for creating a new WebFacing project -- 8.1.1 Downloading and installing the latest service pack for WDSC -- 8.1.2 Installing WebFacing PTFs on OS/400 -- 8.1.3 Host servers -- 8.1.4 Starting the WebFacing server -- 8.1.5 Number of virtual terminals (QAUTOVRT) -- 8.2 Creating your first WebFacing project -- 8.2.1 Getting started with the IBM WebFacing Tool -- 8.3 A look at the WebFacing project properties -- 8.4 Testing your application within Development Studio Client -- 8.4.1 Configuring UTF-8 support -- 8.4.2 Unit testing your application -- 8.4.3 Ending the test environment -- 8.5 Stepping through the sample application -- 8.5.1 Starting the application -- 8.5.2 The first application panel -- 8.5.3 Converting a window subfile -- 8.6 Running a WebFacing application in WebSphere -- 8.6.1 Transferring an application to the iSeries server -- 8.6.2 Deploying to WebSphere Application Server -- Summary -- Key terms and concepts -- Other helpful resources -- Questions -- Exercise -- On-going study -- Chapter 9. …”
Publicado 2004
Libro electrónico