Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Photography 92
- Digital techniques 62
- Nikon digital cameras 22
- Canon digital cameras 21
- Sound 18
- Recording and reproducing 17
- History of engineering & technology 15
- Lighting 15
- Single-lens reflex cameras 15
- Smart power grids 15
- Computer networks 14
- Data processing 14
- Technology: general issues 13
- Security measures 11
- Development 10
- Digital cameras 10
- Electronics 10
- Management 10
- Programming 10
- Cinematography 9
- Digital video 9
- History 9
- Technique 9
- smart grid 9
- Application software 8
- Design and construction 8
- renewable energy 8
- Documentales 7
- Equipment and supplies 7
- HTML (Document markup language) 7
-
481Publicado 2017Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Industrial Control Systems -- An overview of an Industrial control system -- The view function -- The monitor function -- The control function -- The Industrial control system architecture -- Programmable logic controllers -- Human Machine Interface -- Supervisory Control and Data Acquisition -- Distributed control system -- Safety instrumented system -- The Purdue model for Industrial control systems -- The enterprise zone -- Level 5 - Enterprise network -- Level 4 - Site business planning and logistics -- Industrial Demilitarized Zone -- The manufacturing zone -- Level 3 - Site operations -- Level 2 - Area supervisory control -- Level 1 - Basic control -- Level 0 - Process -- Industrial control system communication media and protocols -- Regular information technology network protocols -- Process automation protocols -- Industrial control system protocols -- Building automation protocols -- Automatic meter reading protocols -- Communication protocols in the enterprise zone -- Communication protocols in the Industrial zone -- Summary -- Chapter 2: Insecure by Inheritance -- Industrial control system history -- Modbus and Modbus TCP/IP -- Breaking Modbus -- Using Python and Scapy to communicate over Modbus -- Replaying captured Modbus packets -- PROFINET -- PROFINET& -- #160 -- packet replay attacks -- S7 communication and the stop CPU vulnerability -- EtherNet/IP and the Common Industrial Protocol -- Shodan: The scariest search engine on the internet -- Common IT protocols found in the ICS -- HTTP -- & -- #160 -- File Transfer Protocol -- Telnet -- Address Resolution Protocol -- ICMP echo request -- Summary -- Chapter 3: Anatomy of an ICS Attack Scenario -- Setting the stage…”
Libro electrónico -
482Publicado 2018Tabla de Contenidos: “…16.5 Virtual Reality Software Design 16.5.1 Virtual Scene Build -- 16.6 Virtual Reality Training Experiment -- 16.7 Conclusion -- Acknowledgements -- References -- Part IV: Internet of Things Technologies and Applications for Health and Medicine -- Chapter 17: Automation of Appliances Using Electroencephalography -- 17.1 Introduction -- 17.2 Background, History and Future Aspects -- 17.3 Brain with Its Main Parts and Their Functions -- 17.4 Working of BCI -- 17.5 BCI Classes -- 17.6 Conclusion -- References -- Chapter 18: Designing A Beautiful Life for Indian Blind Peoples: A Smart Stick -- 18.1 Introduction -- 18.2 Internet of Things -- 18.3 Background -- 18.4 Purpose Approach -- 18.5 Implementation -- 18.6 Advantages and Disadvantages -- 18.7 Conclusion -- References -- Chapter 19: Smart Home: Personal Assistant and Baby Monitoring System -- 19.1 Introduction -- 19.2 Background -- 19.3 Proposed Design and Implementation -- 19.4 Online Energy Meter -- 19.5 Sensors used and Their Working -- 19.6 Conclusion -- References -- End User License Agreement…”
Libro electrónico -
483por Maddaus, LisaTabla de Contenidos: “…4.2 Forecasting Future Water Demand -- 4.2.1 Method 1 - total per capita water use -- 4.2.2 Method 2 - projection by customer class -- 4.3 Use of Demand Forecasts in Demand Management Planning -- Case Study 5 -- Chapter 5: Developing Water Use Efficiency Goals -- 5.1 Frame Water Use Efficiency Needs -- 5.1.1 Supply -- 5.1.2 Demand -- 5.2 Assessment of Water Savings Potential for Customers -- 5.2.1 Assess water usage by customer category -- 5.2.2 Estimate end uses -- 5.2.3 Understanding water using behaviours to focus efficiency efforts -- 5.3 Describe Current Demand Management Programme -- 5.4 Identify Possible Water Supply Options for Meeting Future Demand -- 5.5 Establishment of Water Efficiency Goals -- Case Study 6 -- Case Study 7 -- Chapter 6: Determining Feasibility of Water-Use Efficiency Measures -- 6.1 Water Distribution Efficiency Measures for Utilities -- 6.1.1 Water system audits, leak detection and repair -- 6.1.2 Metering with tariffs based on volume of water use -- 6.2 Water Efficiency Measures for Customers -- 6.2.1 Developing a list of alternative evaluation measures -- 6.2.2 Water efficient devices, fixtures and fittings -- 6.3 Measure Screening Process -- 6.3.1 Suggested menu of water efficiency measures -- 6.3.2 Example of a screening process -- Case Study 8 -- Case Study 9 -- Case Study 10 -- Case Study 11 -- Chapter 7: Evaluating Cost Effectiveness of Water Efficiency Measures -- 7.1 Approach to Benefit-Cost Analysis -- 7.2 Basis for Benefit-Cost Analysis -- 7.2.1 Responsibility of the efficiency programme manager -- 7.2.2 Benefit-cost analysis methodology -- 7.3 Key Considerations in Estimating Benefits and Costs -- 7.3.1 Utility benefits (avoided costs) -- 7.3.2 Utility costs -- 7.4 Estimated Customer Benefits -- 7.5 Estimated Other Benefits and Costs -- 7.6 Re-evaluation of Programme Cost Effectiveness…”
Publicado 2013
Libro electrónico -
484Publicado 2021Tabla de Contenidos: “…Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- List of Figures -- List of Tables -- Preface -- 1 SynthLab Introduction -- 1.1 What You Need to Know to Use SynthLab Objects and Projects -- 1.2 SynthLab Synth Projects -- 1.3 Synth Components -- 1.4 Basic Software Synth Architecture -- 1.5 SynthLab Voice Architecture -- 1.6 SynthLab C++ Implementation -- 1.7 Why SynthLab Uses This Architecture -- 1.8 SynthLab Object Operational Phases -- Bibliography -- 2 The Synth Engine -- 2.1 Engine Behavior -- 2.2 Engine Architecture -- 2.3 Shared Data -- 2.4 SynthEngine Constructor -- 2.5 Audio and MIDI Block Rendering -- 2.6 SynthEngine Operational Phases -- Bibliography -- 3 Synth Voices, Synth Modules, and Module Cores -- 3.1 Voice Behavior -- 3.2 SynthVoice Modules -- 3.3 SynthVoice Parameters -- 3.4 SynthModule Members -- 3.5 SynthVoice Construction -- 3.6 SynthVoice Operational Phases -- 3.7 SynthModules and ModuleCores -- 3.8 Module Cores -- 3.9 SynthModule/ModuleCore Relationship -- 3.10 Review -- Bibliography -- 4 Synth Operational Modes: Polyphony and Voice-Stealing -- 4.1 The Note-Event Lifecycle -- 4.2 SynthEngine MIDI Processing -- 4.3 SynthEngine Unison Detuning -- 4.4 Voice State and MIDI Event Storage -- 4.5 Voice-Stealing -- 4.6 Polyphony and Voice Timestamps -- 4.7 Review -- Bibliography -- 5 Learning and Using the SynthLab Objects & -- Projects -- 5.1 Designing Modules with the SynthLab-DM Projects -- 5.2 SynthLab-DM Modules Are Dynamic Linked Libraries -- 5.3 Using SynthModules in Your Projects -- 5.4 Using SynthEngines in Your Projects -- 5.5 SynthEngine GUI Design and Parameter Update -- 5.6 Programming the Modulation Matrix -- 5.7 Getting WaveSequencer Status Meter Updates -- Bibliography -- 6 Modulation: Theory and Calculations -- 6.1 SynthLab Mod Knob Mapping -- 6.2 MMA Transforms &…”
Libro electrónico -
485Publicado 2018Tabla de Contenidos: “…Chapter 4: Endpoint Security and Trustworthiness -- Defining an IIoT endpoint -- Motivation and risk-based endpoint protection -- Resource-constrained endpoint protection -- Brownfield scenario considerations -- Endpoint security enabling technologies -- IIoT endpoint vulnerabilities -- Case study - White hack exposes smart grid meter vulnerability -- Use case -- Developing the exploit -- Demonstration -- Establishing trust in hardware -- Hardware security components -- Root of trust - TPM, TEE, and UEFI -- Securing secrets, or sealing -- Endpoint identity and access control -- Initialization and boot process integrity -- Establishing endpoint trust during operations -- Secure updates -- A trustworthy execution ecosystem -- Endpoint data integrity -- Endpoint configuration and management -- Endpoint visibility and control -- Endpoint security using isolation techniques -- Process isolation -- Container isolation -- Virtual isolation -- Physical isolation -- Endpoint physical security -- Machine learning enabled endpoint security -- Endpoint security testing and certification -- Endpoint protection industry standards -- Summary -- Chapter 5: Securing Connectivity and Communications -- Definitions - networking, communications, and connectivity -- Distinguishing features of IIoT connectivity -- Deterministic behavior -- Interoperability - proprietary versus open standards -- Performance characteristics - latency, jitter, and throughput -- Legacy networks with disappearing air gaps -- Access to resource-constrained networks -- Massive transition by connecting the unconnected -- IIoT connectivity architectures -- Multi-tier IIoT-secured connectivity architecture -- Layered databus architecture -- Controls for IIoT connectivity protection -- Secure tunnels and VPNs -- Cryptography controls -- Network segmentation -- Industrial demilitarized zones…”
Libro electrónico -
486Publicado 2024Tabla de Contenidos: “…Provisioned capacity mode -- On-demand capacity mode -- Feature common to both capacity modes - isolating frequently accessed items -- Using auto scaling for provisioned mode -- Cost optimizing with capacity reservations -- Savings calculations -- Reserved capacity metering -- Tools to help identify the capacity to reserve -- Choosing the right capacity mode -- Learning about table classes -- Table class considerations -- Choosing the right table class for your workload -- Summary -- References -- Chapter 10: Request Routers, Storage Nodes, and Other Core Components -- RR -- Role and responsibilities of RRs -- Storage nodes -- Roles and responsibilities of storage nodes -- Auto Admin and Metadata -- Auto Admin -- Metadata -- The journey of a DynamoDB request -- The journey of a read request (GetItem) -- The journey of a write request (PutItem) -- Summary -- References -- Part 4: Advanced Data Management and Caching -- Chapter 11: Backup, Restore, and More -- Understanding backup fundamentals -- On-demand backups -- Continuous backups (PITR) -- Learning about restores -- Export to S3 -- Use cases for Export to S3 -- Exporting table data into S3 -- Performance and cost implications -- Limitations -- Import from S3 -- Sample use case -- Importing from S3 in action -- Performance and cost implications -- Limitations -- Summary -- References -- Chapter 12: Streams and TTL -- DynamoDB Streams -- Feature characteristics -- How it works -- Consuming records from a DynamoDB stream -- Cost implications for utilizing DynamoDB streams -- KDS integration -- Feature characteristics -- AWS Lambda as a stream consumer -- When to use Lambda as a stream consumer -- Architectural patterns that are unlocked with streams -- KCL-based consumer applications -- How it works -- KCL versions and compatibility -- When to use KCL-based consumer applications -- DynamoDB (TTL)…”
Libro electrónico -
487por Godbold, AshleyTabla de Contenidos: “…Invisible button zones -- Examples -- Navigating through Buttons and using First Selected -- Loading scenes with Button presses -- Button Animation Transitions -- Summary -- Chapter 10: UI Text and TextMeshPro -- Technical requirements -- UI Text GameObject -- The Text and Character properties -- The Paragraph properties -- The Color and Material properties -- The Raycast and Maskable properties -- Text-TextMeshPro -- Text Input properties -- Main Settings -- Extra Settings -- TextMeshPro Project Settings -- Working with fonts -- Importing new fonts -- Custom fonts -- Font assets -- Exploring the markup format -- Font style -- Font color -- Font size -- Using style sheets -- Translating text -- Examples -- Creating animated text -- Translating the dialogue -- Custom font -- TextMeshPro - Warped Text with Gradient -- Summary -- Chapter 11: UI Images and Effects -- Technical requirements -- UI Image component properties -- Image Type -- UI effect components -- Shadow -- Outline -- Position As UV1 -- Examples -- Horizontal and circular health/progress meters -- Mute Buttons with sprite swap -- Adding press-and-hold/long-press functionality -- Creating a floating eight-directional virtual analog stick -- Summary -- Chapter 12: Using Masks, Scrollbars, and Scroll Views -- Technical requirements -- Using masks -- The Mask component -- Rect Mask 2D component -- Implementing UI Scrollbars -- The Scrollbar component -- Implementing UI Scroll View -- Scroll Rect component -- Examples -- Making a scroll view from a pre-existing menu -- Summary -- Chapter 13: Other Interactable UI Components -- Technical requirements -- Using UI Toggle -- Toggle component -- Toggle Group component -- UI Slider -- Slider component -- UI Dropdown and Dropdown - TextMeshPro -- Dropdown Template -- The Dropdown component -- UI Input Field -- Input Field component…”
Publicado 2023
Libro electrónico -
488por Knapp, Eric D.Tabla de Contenidos: “…Type of service, class of service, and quality of service -- Network hops -- Network security controls -- Safety instrumented systems -- Special considerations -- Wide area connectivity -- Smart grid network considerations -- Advanced metering infrastructure -- Summary -- 6 - Industrial Network Protocols -- Overview of industrial network protocols -- Fieldbus protocols -- Modicon communication bus (Modbus) -- What it does -- How it works -- Variants -- Modbus RTU and Modbus ASCII -- Modbus TCP -- Modbus plus or Modbus+ -- Where it is used -- Security concerns -- Security recommendations -- Distributed network protocol (DNP3) -- What it does -- How it works -- Secure DNP3 -- Where it is used -- Security concerns -- Security recommendations -- Process fieldbus (PROFIBUS) -- Security concerns -- Security recommendations -- Industrial ethernet protocols -- Ethernet industrial protocol (EtherNet/IP) -- Security concerns -- Security recommendations -- PROFINET -- Security concerns -- Security recommendations -- EtherCAT -- Security concerns -- Security recommendations -- Ethernet POWERLINK -- Security concerns -- Security recommendations -- SERCOS III -- Security concerns -- Security recommendations -- Backend protocols -- Object linking and embedding for process control -- What it does -- How it works -- Where it is used -- Security concerns -- Security recommendations -- Intercontrol center communications protocol (ICCP/IEC 60870-6 TASE.2) -- What it does -- How it works -- Where it is used -- Security concerns -- Security improvements over Modbus -- Security recommendations -- IEC 61850, 60870-5-101, and 60870-5-104 -- How they work -- 60870-5-101 and 60870-5-104 -- IEC 61850 -- Security concerns -- Security recommendations -- AMI and the smart grid -- Security concerns -- Security recommendations -- Industrial protocol simulators -- Modbus/TCP -- DNP3…”
Publicado 2024
Libro electrónico -
489Publicado 2018Tabla de Contenidos: “…Resetting signals -- Listing traps -- Using traps inside a function -- Running scripts or processes even if the user logs out -- Creating dialog boxes with the dialog utility -- Creating a message box (msgbox) -- Creating a message box (msgbox) with a title -- The yes/no box (yesno) -- The input box (inputbox) -- The textbox (textbox) -- A password box -- The checklist box (checklist) -- The menu box (menu) -- The radiolist box (radiolist) -- The progress meter box (gauge) -- Summary -- Chapter 12: System Startup and Customizing a Linux System -- System startup, inittab, and run levels -- The kernel startup and init process -- Understanding run levels -- System initialization boot scripts -- User initialization scripts -- System-wide setting scripts -- User level settings - default files -- Summary -- Chapter 13: Pattern Matching and Regular Expressions with sed and awk -- The basics of regular expressions -- sed - non-interactive stream editor -- Understanding sed -- Addressing in sed -- How to modify a file with sed -- Printing - the p command -- Deleting - the d command -- Substitution - the s command -- Range of selected lines the comma -- Multiple edits - the e command -- Reading from files - the r command -- Writing to files - the w command -- Appending - the a command -- Inserting - the i command -- Changing - the c command -- Transform - the y command -- Quit - the q command -- Holding and getting - the h and g commands -- Holding and exchanging - the h and x commands -- sed scripting -- Using awk -- The meaning of awk -- Using awk -- Input from files -- Input from commands -- How awk works -- awk commands from within a file -- Records and fields -- Records -- The record separator -- The 0 variable -- The NR variable -- Fields -- Field separators -- The input field separator -- Patterns and actions -- Patterns -- Actions…”
Libro electrónico -
490por Vanderburg, Eric A.Tabla de Contenidos: “…Off-Premises Hosting -- Orchestration Platforms -- Multicloud -- Cloud Characteristics and Terms -- Elasticity -- Demand-Driven Service -- Pay-as-You-Grow -- Chargeback -- Ubiquitous Access -- Metering -- Multitenancy -- Cloud Bursting -- Baselines -- Source and Target Hosts -- Existing Systems -- Cloud Elements -- Advanced Cloud Services -- Machine Learning and Artificial Intelligence -- Serverless -- Exercise 1-1: Creating a Basic Serverless Application on AWS Lambda -- Internet of Things -- Chapter Review -- Questions -- Answers -- Chapter 2 Disk Storage Systems -- Disk Types and Configurations -- Rotational Media -- Solid State Drive -- USB Drive -- Tape -- Interface Types -- Access Speed -- Redundant Array of Independent Disks (RAID) -- Write Once, Read Many (WORM) -- Tiering -- Performance Levels of Each Tier -- Policies -- File System Types -- Unix File System -- Extended File System -- File Allocation Table File System -- New Technology File System -- Exercise 2-1: Formatting a Disk with the NTFS Partition in Windows -- Resilient File System -- Virtual Machine File System -- Z File System -- Chapter Review -- Questions -- Answers -- Chapter 3 Storage Networking -- Storage Types and Technologies -- Direct Attached Storage -- Storage Area Network…”
Publicado 2021
Libro electrónico -
491Tabla de Contenidos: “…Centralized Splitting -- An Even More Practical Centralized Splitting Architecture -- Greenfields -- Brownfields -- CABLE COLOR CODES -- AERIAL OR UNDERGROUND: A DECISION MADE FOR YOU -- Aerial Plant -- Optical Ground Wire -- Snowshoes in the Summer -- Underground Plant -- New Developments -- Existing Developments -- To Conduit or Not to Conduit -- Trace Your Cable -- CONNECTING FIBERS -- Fusion Splicing -- Connectorization -- Preterminated Drop Cable -- INSIDE CABLING -- Bend Radius -- Fiber for Indoor Installation -- Ribbon Fibers -- OPTICAL PERFORMANCE OF THE FTTX NETWORK -- DESIGN METHODOLOGIES -- EPON Optics -- PX20 Optics at OLT and at ONT -- PX20 OLT, PX10 ONT -- More on the Penalty -- GPON Optics -- Class B+ Optics at the OLT and ONT -- TESTING OPTICAL NETWORKS -- Visible Light Source -- Optical Level Meter -- Optical Time Domain Reflectometer -- THE DUMB, SIMPLE, STUPID STUFF -- Mixing Green and Blue -- Lesson Learned -- Fiber is Fiber is Fiber -- Lesson Learned -- What, Mark My Cable Route Accurately? …”
Libro electrónico -
492Publicado 2013Tabla de Contenidos: “…Statutory Compliance -- Workforce Profile -- Typical Configurations and Customizations -- What to Watch Out For -- Conclusion -- Chapter 10: Enterprise Asset Management Analytics -- Description of the Business Process -- Business Benefits -- Key Stakeholders -- Cross-Functional Analysis -- Subject Areas -- Asset Failure Analysis -- Asset History -- Asset Maintenance Cost -- Asset Maintenance Work Orders -- Asset Meter Reading -- Asset Quality -- Inventory Aging -- Maintenance Material Usage -- Maintenance Resource Availability -- Maintenance Resource Usage -- MRO Inventory -- Common Configurations and What to Watch Out For -- Conclusion -- Chapter 11: Project Analytics -- Description of the Business Process -- Business Benefits -- Key Stakeholders -- Cross-Functional Analysis -- Procurement and Spend Analytics -- Financial Analytics -- Subject Areas -- Metrics and KPIs…”
Libro electrónico -
493Publicado 2023Tabla de Contenidos: “…The properties of sound -- Microphone types -- Microphone pickup patterns -- Microphone placement -- Syncing audio -- Auto-syncing audio to video -- Manually syncing audio to video -- Fixing sound -- De-Esser -- Removing hum -- Changing stereo to mono -- Noise reduction -- Voice isolation -- Summary -- Questions -- Further reading -- Chapter 4: Adding Narration, Voice Dubbing, and Subtitles -- Technical requirements -- Welcome to the Edit page -- Edit Index -- Sound Library -- Metadata -- Mixer -- Importance of subtitles and closed captions -- Legal requirements to add subtitles to your video -- Subtitling and SEO -- Lower thirds -- Subtitles versus closed captions -- Creating and working with subtitles -- Creating your own subtitles -- Adding a new subtitle clip -- Adding a new subtitle track -- Renaming a subtitle track -- Changing default subtitle settings -- Formatting our subtitles -- Exporting and importing subtitles -- Exporting subtitles to upload to YouTube or Vimeo -- Exporting subtitles in the File menu -- Exporting subtitles in the Subtitle track header -- Exporting subtitles on the Deliver page -- Importing subtitles into Resolve -- Positioning subtitle clips on the Timeline -- Welcome to the Fairlight page -- Index -- Meters -- ADR -- Creating a new audio track -- Patching, arming, and recording -- Patching tracks -- Arming tracks -- Recording audio -- Voice dubbing in Fairlight using ADR -- Creating a new Timeline using selected footage -- Adding scene cuts -- Scene Detect -- Ripple deleting clips on the Edit page -- Ripple-deleting clips on the Cut page -- Smooth Cut -- The ADR interface -- Summary -- Questions -- Further reading -- Chapter 5: Creating Additional Sound -- Technical requirements -- Enhancing the vocals -- Pitch -- Vocal Channel -- Dialogue Processor -- Importing audio effects plug-ins…”
Libro electrónico -
494por Hersent, OlivierTabla de Contenidos: “…13.2.1 ZigBee IP 213 -- 13.2.2 ZigBee SEP 2.0 Resources 214 -- 13.3 Function Sets and Device Types 217 -- 13.3.1 Base Function Set 218 -- 13.3.2 Group Enrollment 221 -- 13.3.3 Meter 223 -- 13.3.4 Pricing 223 -- 13.3.5 Demand Response and Load Control Function Set 224 -- 13.3.6 Distributed Energy Resources 227 -- 13.3.7 Plug-In Electric Vehicle 227 -- 13.3.8 Messaging 230 -- 13.3.9 Registration 231 -- 13.4 ZigBee SE 2.0 Security 232 -- 13.4.1 Certificates 232 -- 13.4.2 IP Level Security 232 -- 13.4.3 Application-Level Security 235 -- 14 The ETSI M2M Architecture 237 -- 14.1 Introduction to ETSI TC M2M 237 -- 14.2 System Architecture 238 -- 14.2.1 High-Level Architecture 238 -- 14.2.2 Reference Points 239 -- 14.2.3 Service Capabilities 240 -- 14.3 ETSI M2M SCL Resource Structure 242 -- 14.3.1 SCL Resources 244 -- 14.3.2 Application Resources 244 -- 14.3.3 Access Right Resources 248 -- 14.3.4 Container Resources 248 -- 14.3.5 Group Resources 250 -- 14.3.6 Subscription and Notification Channel Resources 251 -- 14.4 ETSI M2M Interactions Overview 252 -- 14.5 Security in the ETSI M2M Framework 252 -- 14.5.1 Key Management 252 -- 14.5.2 Access Lists 254 -- 14.6 Interworking with Machine Area Networks 255 -- 14.6.1 Mapping M2M Networks to ETSI M2M Resources 256 -- 14.6.2 Interworking with ZigBee 1.0 257 -- 14.6.3 Interworking with C.12 262 -- 14.6.4 Interworking with DLMS/COSEM 264 -- 14.7 Conclusion on ETSI M2M 266 -- Part V KEY APPLICATIONS OF THE INTERNET OF THINGS -- 15 The Smart Grid 271 -- 15.1 Introduction 271 -- 15.2 The Marginal Cost of Electricity: Base and Peak Production 272 -- 15.3 Managing Demand: The Next Challenge of Electricity Operators . . . and / Why M2M Will Become a Key Technology 273 -- 15.4 Demand Response for Transmission System Operators (TSO) 274 -- 15.4.1 Grid-Balancing Authorities: The TSOs 274 -- 15.4.2 Power Shedding: Who Pays What? …”
Publicado 2012
Libro electrónico -
495Publicado 2017“…A practical guide to help you undertand the ability of Apache jMeter to load and performance test various server types in a more efficient way. …”
Libro electrónico -
496Publicado 2022“…"Sustainable Networks in Smart Grid presents global challenges in smart metering with renewable energy resources, micro-grid design, communication technologies, big data, privacy and security in the smart grid. …”
Libro electrónico -
497Publicado 2020Tabla de Contenidos: “…PROPIEDAD BACKGROUND-ATTACHMENT -- PROPIEDAD BACKGROUND-CLIP -- PROPIEDAD BACKGROUND-IMAGE -- PROPIEDAD BACKGROUND-ORIGIN -- PROPIEDAD BACKGROUND-POSITION -- PROPIEDAD BACKGROUND-REPEAT -- PROPIEDAD BACKGROUND-SIZE -- PROPIEDAD CLIP-PATH -- I PROPIEDAD OBJECT-FIT -- PROPIEDAD OBJECT-POSITION -- IMÁGENES RECEPTIVAS Y ADAPTATIVAS -- ADAPTACIÓN DE IMÁGENES MEDIANTE PROPIEDADES CSS -- ADAPTACIÓN DE IMÁGENES MEDIANTE CONSULTAS DE MEDIOS -- SELECCIÓN DE IMÁGENES MEDIANTE IMG Y SRCSET -- SELECCIÓN DE IMÁGENES MEDIANTE PICTURE Y SOURCE -- VIDEOS RECEPTIVOS -- USABILIDAD Y ACCESIBILIDAD EN LOS ELEMENTOS MULTIMEDIA -- EN IMÁGENES -- EN AUDIO Y VÍDEO -- PRÁCTICA 4: ESTRUCTURA, TEXTOS E IMÁGENES DE "UNIVERSES" -- RECURSOS PARA HACER LA PRÁCTICA -- RESOLUCIÓN -- PRÁCTICA 5: BANNER DE "UNIVERSES" A PANTALLA COMPLETA -- RESOLUCIÓN -- 5- TABLAS -- ELEMENTOS DISPONIBLES EN HTML5 -- ELEMENTO CAPTION -- ELEMENTO TABLE -- ELEMENTO COLGROUP -- ELEMENTO THEAD -- ELEMENTO TBODY -- ELEMENTO TFOOT -- ELEMENTO TR -- ELEMENTO TH -- ELEMENTO TD -- ELEMENTOS DISPONIBLES EN CSS -- PROPIEDAD BORDER-COLLAPSE -- PROPIEDAD BORDER-SPACING -- PROPIEDAD CAPTION-SIDE -- PROPIEDAD EMPTY-CELLS -- PROPIEDAD TABLE-LAYOUT -- CREACIÓN DE TABLAS RESPONSIVE -- MEDIANTE BARRAS DE DESPLAZAMIENTO -- MEDIANTE CONSULTAS DE MEDIOS -- MEDIANTE OCULTACIÓN DE COLUMNAS A PETICIÓN DE USUARIO -- USABILIDAD Y ACCESIBILIDAD EN LAS TABLAS -- PRÁCTICA 6: PÁGINA "DÓNDE ESTAMOS" DE "UNIVERES" -- RECURSOS PARA HACER LA PRÁCTICA -- RESOLUCIÓN -- 6- FORMULARIOS -- TIPOS DE FORMULARIO -- FORMULARIOS DE CONTACTO -- FORMULARIOS DE SUSCRIPCIÓN -- FORMULARIOS DE ACCESO -- FORMULARIOS DE REGISTRO -- FORMULARIOS DE ENTRADA GENERAL -- ELEMENTOS DISPONIBLES EN HTML5 -- ELEMENTO FORM -- ELEMENTO BUTTON -- ELEMENTO DATALIST -- ELEMENTO FIELDSET -- ELEMENTO INPUT -- ELEMENTO LABEL -- ELEMENTO LEGEND -- ELEMENTO METER…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
498Publicado 2021Tabla de Contenidos: “…Completing the Code -- Deploy and Execute -- Summary -- Chapter 10: Project 1: Building an LED Power Meter -- Overview -- Required Components -- Set Up the Hardware -- Write the Code -- Debug Output -- New Project -- Initialize GPIO -- Controlling the LEDs -- Code for the MCP3008 -- Deploy and Execute -- Summary -- Chapter 11: Project 2: Measuring Light -- Overview -- Required Components -- Set Up the Hardware -- Write the Code -- New Project -- Lighting Providers -- User Interface -- Controlling the LED -- Completing the Main Class -- Code for the MCP3008 -- Code for the PWM -- Deploy and Execute -- Summary -- Chapter 12: Project 3: Using Weather Sensors -- Overview -- Required Components -- Set Up the Hardware -- Write the Code -- New Project -- Add a C# Runtime Component Project -- BMP280 Class -- User Interface -- Add References -- Reading the Weather Data -- Deploy and Execute -- Summary -- Chapter 13: Project 4: Using MySQL to Store Data -- What Is MySQL? …”
Libro electrónico -
499Publicado 2017Tabla de Contenidos: “…Review of Shielded VMs and Host Guardian Service -- Deploying Shielded VMs -- Creating and Using Hyper-V Templates -- Hyper-V Integration Services and Supported Operating Systems -- Migrating Physical Servers and Virtual Machines to Hyper-V Virtual Machines -- Upgrading and Migrating from Previous Versions -- Stand-Alone Hosts -- Clusters -- The Bottom Line -- Chapter 6 Maintaining a Hyper-V Environment -- Patch Planning and Implementation -- Leveraging WSUS -- Patching Hyper-V Clusters -- Malware Configurations -- Backup Planning -- Defragmentation with Hyper-V -- Using Checkpoints -- Using Service Templates -- Performance Tuning and Monitoring with Hyper-V -- Resource Metering -- Monitoring -- The Bottom Line -- Chapter 7 Failover Clustering and Migration Technologies -- Failover Clustering Basics -- Understanding Quorum and Why It's Important -- Quorum Basics -- Modifying Cluster Vote Configuration -- Advanced Quorum Options and Forcing Quorums -- Geographically Distributed Clusters -- Why Use Clustering with Hyper-V? …”
Libro electrónico -
500Publicado 2017Tabla de Contenidos: “…Note continued: Creating a virtual machine -- Add or remove memory in running a VM -- Configure dynamic memory -- Configure Non-Uniform Memory Access (NUMA) support -- Configure smart paging -- Configure resource metering -- Manage Integration Services -- Create and configure Generation 1 and 2 VMs and determine appropriate usage scenarios -- Implement enhanced session mode -- Create Linux and FreeBSD VMs -- Install and configure Linux Integration Services (LIS) -- Install and configure FreeBSD Integration Services (BIS) -- Implement Secure Boot for Windows and Linux environments -- Move and convert VMs from previous versions of Hyper-V to Windows Server 2016 Hyper-V -- Export and import VMs -- Implement Discrete Device Assignment (DDA) -- Skill 3.3 Configure Hyper-V storage -- Create VHDs and VHDX files using Hyper-V Manager -- Create shared VHDX files -- Configure differencing disks -- Modify virtual hard disks -- Configure pass-through disks…”
Libro electrónico