Mostrando 481 - 500 Resultados de 633 Para Buscar '"The Meters"', tiempo de consulta: 0.12s Limitar resultados
  1. 481
    Publicado 2017
    Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Industrial Control Systems -- An overview of an Industrial control system -- The view function -- The monitor function -- The control function -- The Industrial control system architecture -- Programmable logic controllers -- Human Machine Interface -- Supervisory Control and Data Acquisition -- Distributed control system -- Safety instrumented system -- The Purdue model for Industrial control systems -- The enterprise zone -- Level 5 - Enterprise network -- Level 4 - Site business planning and logistics -- Industrial Demilitarized Zone -- The manufacturing zone -- Level 3 - Site operations -- Level 2 - Area supervisory control -- Level 1 - Basic control -- Level 0 - Process -- Industrial control system communication media and protocols -- Regular information technology network protocols -- Process automation protocols -- Industrial control system protocols -- Building automation protocols -- Automatic meter reading protocols -- Communication protocols in the enterprise zone -- Communication protocols in the Industrial zone -- Summary -- Chapter 2: Insecure by Inheritance -- Industrial control system history -- Modbus and Modbus TCP/IP -- Breaking Modbus -- Using Python and Scapy to communicate over Modbus -- Replaying captured Modbus packets -- PROFINET -- PROFINET&amp -- #160 -- packet replay attacks -- S7 communication and the stop CPU vulnerability -- EtherNet/IP and the Common Industrial Protocol -- Shodan: The scariest search engine on the internet -- Common IT protocols found in the ICS -- HTTP -- &amp -- #160 -- File Transfer Protocol -- Telnet -- Address Resolution Protocol -- ICMP echo request -- Summary -- Chapter 3: Anatomy of an ICS Attack Scenario -- Setting the stage…”
    Libro electrónico
  2. 482
    Publicado 2018
    Tabla de Contenidos: “…16.5 Virtual Reality Software Design 16.5.1 Virtual Scene Build -- 16.6 Virtual Reality Training Experiment -- 16.7 Conclusion -- Acknowledgements -- References -- Part IV: Internet of Things Technologies and Applications for Health and Medicine -- Chapter 17: Automation of Appliances Using Electroencephalography -- 17.1 Introduction -- 17.2 Background, History and Future Aspects -- 17.3 Brain with Its Main Parts and Their Functions -- 17.4 Working of BCI -- 17.5 BCI Classes -- 17.6 Conclusion -- References -- Chapter 18: Designing A Beautiful Life for Indian Blind Peoples: A Smart Stick -- 18.1 Introduction -- 18.2 Internet of Things -- 18.3 Background -- 18.4 Purpose Approach -- 18.5 Implementation -- 18.6 Advantages and Disadvantages -- 18.7 Conclusion -- References -- Chapter 19: Smart Home: Personal Assistant and Baby Monitoring System -- 19.1 Introduction -- 19.2 Background -- 19.3 Proposed Design and Implementation -- 19.4 Online Energy Meter -- 19.5 Sensors used and Their Working -- 19.6 Conclusion -- References -- End User License Agreement…”
    Libro electrónico
  3. 483
    por Maddaus, Lisa
    Publicado 2013
    Tabla de Contenidos: “…4.2 Forecasting Future Water Demand -- 4.2.1 Method 1 - total per capita water use -- 4.2.2 Method 2 - projection by customer class -- 4.3 Use of Demand Forecasts in Demand Management Planning -- Case Study 5 -- Chapter 5: Developing Water Use Efficiency Goals -- 5.1 Frame Water Use Efficiency Needs -- 5.1.1 Supply -- 5.1.2 Demand -- 5.2 Assessment of Water Savings Potential for Customers -- 5.2.1 Assess water usage by customer category -- 5.2.2 Estimate end uses -- 5.2.3 Understanding water using behaviours to focus efficiency efforts -- 5.3 Describe Current Demand Management Programme -- 5.4 Identify Possible Water Supply Options for Meeting Future Demand -- 5.5 Establishment of Water Efficiency Goals -- Case Study 6 -- Case Study 7 -- Chapter 6: Determining Feasibility of Water-Use Efficiency Measures -- 6.1 Water Distribution Efficiency Measures for Utilities -- 6.1.1 Water system audits, leak detection and repair -- 6.1.2 Metering with tariffs based on volume of water use -- 6.2 Water Efficiency Measures for Customers -- 6.2.1 Developing a list of alternative evaluation measures -- 6.2.2 Water efficient devices, fixtures and fittings -- 6.3 Measure Screening Process -- 6.3.1 Suggested menu of water efficiency measures -- 6.3.2 Example of a screening process -- Case Study 8 -- Case Study 9 -- Case Study 10 -- Case Study 11 -- Chapter 7: Evaluating Cost Effectiveness of Water Efficiency Measures -- 7.1 Approach to Benefit-Cost Analysis -- 7.2 Basis for Benefit-Cost Analysis -- 7.2.1 Responsibility of the efficiency programme manager -- 7.2.2 Benefit-cost analysis methodology -- 7.3 Key Considerations in Estimating Benefits and Costs -- 7.3.1 Utility benefits (avoided costs) -- 7.3.2 Utility costs -- 7.4 Estimated Customer Benefits -- 7.5 Estimated Other Benefits and Costs -- 7.6 Re-evaluation of Programme Cost Effectiveness…”
    Libro electrónico
  4. 484
    Publicado 2021
    Tabla de Contenidos: “…Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- List of Figures -- List of Tables -- Preface -- 1 SynthLab Introduction -- 1.1 What You Need to Know to Use SynthLab Objects and Projects -- 1.2 SynthLab Synth Projects -- 1.3 Synth Components -- 1.4 Basic Software Synth Architecture -- 1.5 SynthLab Voice Architecture -- 1.6 SynthLab C++ Implementation -- 1.7 Why SynthLab Uses This Architecture -- 1.8 SynthLab Object Operational Phases -- Bibliography -- 2 The Synth Engine -- 2.1 Engine Behavior -- 2.2 Engine Architecture -- 2.3 Shared Data -- 2.4 SynthEngine Constructor -- 2.5 Audio and MIDI Block Rendering -- 2.6 SynthEngine Operational Phases -- Bibliography -- 3 Synth Voices, Synth Modules, and Module Cores -- 3.1 Voice Behavior -- 3.2 SynthVoice Modules -- 3.3 SynthVoice Parameters -- 3.4 SynthModule Members -- 3.5 SynthVoice Construction -- 3.6 SynthVoice Operational Phases -- 3.7 SynthModules and ModuleCores -- 3.8 Module Cores -- 3.9 SynthModule/ModuleCore Relationship -- 3.10 Review -- Bibliography -- 4 Synth Operational Modes: Polyphony and Voice-Stealing -- 4.1 The Note-Event Lifecycle -- 4.2 SynthEngine MIDI Processing -- 4.3 SynthEngine Unison Detuning -- 4.4 Voice State and MIDI Event Storage -- 4.5 Voice-Stealing -- 4.6 Polyphony and Voice Timestamps -- 4.7 Review -- Bibliography -- 5 Learning and Using the SynthLab Objects &amp -- Projects -- 5.1 Designing Modules with the SynthLab-DM Projects -- 5.2 SynthLab-DM Modules Are Dynamic Linked Libraries -- 5.3 Using SynthModules in Your Projects -- 5.4 Using SynthEngines in Your Projects -- 5.5 SynthEngine GUI Design and Parameter Update -- 5.6 Programming the Modulation Matrix -- 5.7 Getting WaveSequencer Status Meter Updates -- Bibliography -- 6 Modulation: Theory and Calculations -- 6.1 SynthLab Mod Knob Mapping -- 6.2 MMA Transforms &amp…”
    Libro electrónico
  5. 485
    Publicado 2018
    Tabla de Contenidos: “…Chapter 4: Endpoint Security and Trustworthiness -- Defining an IIoT endpoint -- Motivation and risk-based endpoint protection -- Resource-constrained endpoint protection -- Brownfield scenario considerations -- Endpoint security enabling technologies -- IIoT endpoint vulnerabilities -- Case study - White hack exposes smart grid meter vulnerability -- Use case -- Developing the exploit -- Demonstration -- Establishing trust in hardware -- Hardware security components -- Root of trust - TPM, TEE, and UEFI -- Securing secrets, or sealing -- Endpoint identity and access control -- Initialization and boot process integrity -- Establishing endpoint trust during operations -- Secure updates -- A trustworthy execution ecosystem -- Endpoint data integrity -- Endpoint configuration and management -- Endpoint visibility and control -- Endpoint security using isolation techniques -- Process isolation -- Container isolation -- Virtual isolation -- Physical isolation -- Endpoint physical security -- Machine learning enabled endpoint security -- Endpoint security testing and certification -- Endpoint protection industry standards -- Summary -- Chapter 5: Securing Connectivity and Communications -- Definitions - networking, communications, and connectivity -- Distinguishing features of IIoT connectivity -- Deterministic behavior -- Interoperability - proprietary versus open standards -- Performance characteristics - latency, jitter, and throughput -- Legacy networks with disappearing air gaps -- Access to resource-constrained networks -- Massive transition by connecting the unconnected -- IIoT connectivity architectures -- Multi-tier IIoT-secured connectivity architecture -- Layered databus architecture -- Controls for IIoT connectivity protection -- Secure tunnels and VPNs -- Cryptography controls -- Network segmentation -- Industrial demilitarized zones…”
    Libro electrónico
  6. 486
    Publicado 2024
    Tabla de Contenidos: “…Provisioned capacity mode -- On-demand capacity mode -- Feature common to both capacity modes - isolating frequently accessed items -- Using auto scaling for provisioned mode -- Cost optimizing with capacity reservations -- Savings calculations -- Reserved capacity metering -- Tools to help identify the capacity to reserve -- Choosing the right capacity mode -- Learning about table classes -- Table class considerations -- Choosing the right table class for your workload -- Summary -- References -- Chapter 10: Request Routers, Storage Nodes, and Other Core Components -- RR -- Role and responsibilities of RRs -- Storage nodes -- Roles and responsibilities of storage nodes -- Auto Admin and Metadata -- Auto Admin -- Metadata -- The journey of a DynamoDB request -- The journey of a read request (GetItem) -- The journey of a write request (PutItem) -- Summary -- References -- Part 4: Advanced Data Management and Caching -- Chapter 11: Backup, Restore, and More -- Understanding backup fundamentals -- On-demand backups -- Continuous backups (PITR) -- Learning about restores -- Export to S3 -- Use cases for Export to S3 -- Exporting table data into S3 -- Performance and cost implications -- Limitations -- Import from S3 -- Sample use case -- Importing from S3 in action -- Performance and cost implications -- Limitations -- Summary -- References -- Chapter 12: Streams and TTL -- DynamoDB Streams -- Feature characteristics -- How it works -- Consuming records from a DynamoDB stream -- Cost implications for utilizing DynamoDB streams -- KDS integration -- Feature characteristics -- AWS Lambda as a stream consumer -- When to use Lambda as a stream consumer -- Architectural patterns that are unlocked with streams -- KCL-based consumer applications -- How it works -- KCL versions and compatibility -- When to use KCL-based consumer applications -- DynamoDB (TTL)…”
    Libro electrónico
  7. 487
    por Godbold, Ashley
    Publicado 2023
    Tabla de Contenidos: “…Invisible button zones -- Examples -- Navigating through Buttons and using First Selected -- Loading scenes with Button presses -- Button Animation Transitions -- Summary -- Chapter 10: UI Text and TextMeshPro -- Technical requirements -- UI Text GameObject -- The Text and Character properties -- The Paragraph properties -- The Color and Material properties -- The Raycast and Maskable properties -- Text-TextMeshPro -- Text Input properties -- Main Settings -- Extra Settings -- TextMeshPro Project Settings -- Working with fonts -- Importing new fonts -- Custom fonts -- Font assets -- Exploring the markup format -- Font style -- Font color -- Font size -- Using style sheets -- Translating text -- Examples -- Creating animated text -- Translating the dialogue -- Custom font -- TextMeshPro - Warped Text with Gradient -- Summary -- Chapter 11: UI Images and Effects -- Technical requirements -- UI Image component properties -- Image Type -- UI effect components -- Shadow -- Outline -- Position As UV1 -- Examples -- Horizontal and circular health/progress meters -- Mute Buttons with sprite swap -- Adding press-and-hold/long-press functionality -- Creating a floating eight-directional virtual analog stick -- Summary -- Chapter 12: Using Masks, Scrollbars, and Scroll Views -- Technical requirements -- Using masks -- The Mask component -- Rect Mask 2D component -- Implementing UI Scrollbars -- The Scrollbar component -- Implementing UI Scroll View -- Scroll Rect component -- Examples -- Making a scroll view from a pre-existing menu -- Summary -- Chapter 13: Other Interactable UI Components -- Technical requirements -- Using UI Toggle -- Toggle component -- Toggle Group component -- UI Slider -- Slider component -- UI Dropdown and Dropdown - TextMeshPro -- Dropdown Template -- The Dropdown component -- UI Input Field -- Input Field component…”
    Libro electrónico
  8. 488
    por Knapp, Eric D.
    Publicado 2024
    Tabla de Contenidos: “…Type of service, class of service, and quality of service -- Network hops -- Network security controls -- Safety instrumented systems -- Special considerations -- Wide area connectivity -- Smart grid network considerations -- Advanced metering infrastructure -- Summary -- 6 - Industrial Network Protocols -- Overview of industrial network protocols -- Fieldbus protocols -- Modicon communication bus (Modbus) -- What it does -- How it works -- Variants -- Modbus RTU and Modbus ASCII -- Modbus TCP -- Modbus plus or Modbus+ -- Where it is used -- Security concerns -- Security recommendations -- Distributed network protocol (DNP3) -- What it does -- How it works -- Secure DNP3 -- Where it is used -- Security concerns -- Security recommendations -- Process fieldbus (PROFIBUS) -- Security concerns -- Security recommendations -- Industrial ethernet protocols -- Ethernet industrial protocol (EtherNet/IP) -- Security concerns -- Security recommendations -- PROFINET -- Security concerns -- Security recommendations -- EtherCAT -- Security concerns -- Security recommendations -- Ethernet POWERLINK -- Security concerns -- Security recommendations -- SERCOS III -- Security concerns -- Security recommendations -- Backend protocols -- Object linking and embedding for process control -- What it does -- How it works -- Where it is used -- Security concerns -- Security recommendations -- Intercontrol center communications protocol (ICCP/IEC 60870-6 TASE.2) -- What it does -- How it works -- Where it is used -- Security concerns -- Security improvements over Modbus -- Security recommendations -- IEC 61850, 60870-5-101, and 60870-5-104 -- How they work -- 60870-5-101 and 60870-5-104 -- IEC 61850 -- Security concerns -- Security recommendations -- AMI and the smart grid -- Security concerns -- Security recommendations -- Industrial protocol simulators -- Modbus/TCP -- DNP3…”
    Libro electrónico
  9. 489
    Publicado 2018
    Tabla de Contenidos: “…Resetting signals -- Listing traps -- Using traps inside a function -- Running scripts or processes even if the user logs out -- Creating dialog boxes with the dialog utility -- Creating a message box (msgbox) -- Creating a message box (msgbox) with a title -- The yes/no box (yesno) -- The input box (inputbox) -- The textbox (textbox) -- A password box -- The checklist box (checklist) -- The menu box (menu) -- The radiolist box (radiolist) -- The progress meter box (gauge) -- Summary -- Chapter 12: System Startup and Customizing a Linux System -- System startup, inittab, and run levels -- The kernel startup and init process -- Understanding run levels -- System initialization boot scripts -- User initialization scripts -- System-wide setting scripts -- User level settings - default files -- Summary -- Chapter 13: Pattern Matching and Regular Expressions with sed and awk -- The basics of regular expressions -- sed - non-interactive stream editor -- Understanding sed -- Addressing in sed -- How to modify a file with sed -- Printing - the p command -- Deleting - the d command -- Substitution - the s command -- Range of selected lines the comma -- Multiple edits - the e command -- Reading from files - the r command -- Writing to files - the w command -- Appending - the a command -- Inserting - the i command -- Changing - the c command -- Transform - the y command -- Quit - the q command -- Holding and getting - the h and g commands -- Holding and exchanging - the h and x commands -- sed scripting -- Using awk -- The meaning of awk -- Using awk -- Input from files -- Input from commands -- How awk works -- awk commands from within a file -- Records and fields -- Records -- The record separator -- The 0 variable -- The NR variable -- Fields -- Field separators -- The input field separator -- Patterns and actions -- Patterns -- Actions…”
    Libro electrónico
  10. 490
    por Vanderburg, Eric A.
    Publicado 2021
    Tabla de Contenidos: “…Off-Premises Hosting -- Orchestration Platforms -- Multicloud -- Cloud Characteristics and Terms -- Elasticity -- Demand-Driven Service -- Pay-as-You-Grow -- Chargeback -- Ubiquitous Access -- Metering -- Multitenancy -- Cloud Bursting -- Baselines -- Source and Target Hosts -- Existing Systems -- Cloud Elements -- Advanced Cloud Services -- Machine Learning and Artificial Intelligence -- Serverless -- Exercise 1-1: Creating a Basic Serverless Application on AWS Lambda -- Internet of Things -- Chapter Review -- Questions -- Answers -- Chapter 2 Disk Storage Systems -- Disk Types and Configurations -- Rotational Media -- Solid State Drive -- USB Drive -- Tape -- Interface Types -- Access Speed -- Redundant Array of Independent Disks (RAID) -- Write Once, Read Many (WORM) -- Tiering -- Performance Levels of Each Tier -- Policies -- File System Types -- Unix File System -- Extended File System -- File Allocation Table File System -- New Technology File System -- Exercise 2-1: Formatting a Disk with the NTFS Partition in Windows -- Resilient File System -- Virtual Machine File System -- Z File System -- Chapter Review -- Questions -- Answers -- Chapter 3 Storage Networking -- Storage Types and Technologies -- Direct Attached Storage -- Storage Area Network…”
    Libro electrónico
  11. 491
    Tabla de Contenidos: “…Centralized Splitting -- An Even More Practical Centralized Splitting Architecture -- Greenfields -- Brownfields -- CABLE COLOR CODES -- AERIAL OR UNDERGROUND: A DECISION MADE FOR YOU -- Aerial Plant -- Optical Ground Wire -- Snowshoes in the Summer -- Underground Plant -- New Developments -- Existing Developments -- To Conduit or Not to Conduit -- Trace Your Cable -- CONNECTING FIBERS -- Fusion Splicing -- Connectorization -- Preterminated Drop Cable -- INSIDE CABLING -- Bend Radius -- Fiber for Indoor Installation -- Ribbon Fibers -- OPTICAL PERFORMANCE OF THE FTTX NETWORK -- DESIGN METHODOLOGIES -- EPON Optics -- PX20 Optics at OLT and at ONT -- PX20 OLT, PX10 ONT -- More on the Penalty -- GPON Optics -- Class B+ Optics at the OLT and ONT -- TESTING OPTICAL NETWORKS -- Visible Light Source -- Optical Level Meter -- Optical Time Domain Reflectometer -- THE DUMB, SIMPLE, STUPID STUFF -- Mixing Green and Blue -- Lesson Learned -- Fiber is Fiber is Fiber -- Lesson Learned -- What, Mark My Cable Route Accurately? …”
    Libro electrónico
  12. 492
    Publicado 2013
    Tabla de Contenidos: “…Statutory Compliance -- Workforce Profile -- Typical Configurations and Customizations -- What to Watch Out For -- Conclusion -- Chapter 10: Enterprise Asset Management Analytics -- Description of the Business Process -- Business Benefits -- Key Stakeholders -- Cross-Functional Analysis -- Subject Areas -- Asset Failure Analysis -- Asset History -- Asset Maintenance Cost -- Asset Maintenance Work Orders -- Asset Meter Reading -- Asset Quality -- Inventory Aging -- Maintenance Material Usage -- Maintenance Resource Availability -- Maintenance Resource Usage -- MRO Inventory -- Common Configurations and What to Watch Out For -- Conclusion -- Chapter 11: Project Analytics -- Description of the Business Process -- Business Benefits -- Key Stakeholders -- Cross-Functional Analysis -- Procurement and Spend Analytics -- Financial Analytics -- Subject Areas -- Metrics and KPIs…”
    Libro electrónico
  13. 493
    Publicado 2023
    Tabla de Contenidos: “…The properties of sound -- Microphone types -- Microphone pickup patterns -- Microphone placement -- Syncing audio -- Auto-syncing audio to video -- Manually syncing audio to video -- Fixing sound -- De-Esser -- Removing hum -- Changing stereo to mono -- Noise reduction -- Voice isolation -- Summary -- Questions -- Further reading -- Chapter 4: Adding Narration, Voice Dubbing, and Subtitles -- Technical requirements -- Welcome to the Edit page -- Edit Index -- Sound Library -- Metadata -- Mixer -- Importance of subtitles and closed captions -- Legal requirements to add subtitles to your video -- Subtitling and SEO -- Lower thirds -- Subtitles versus closed captions -- Creating and working with subtitles -- Creating your own subtitles -- Adding a new subtitle clip -- Adding a new subtitle track -- Renaming a subtitle track -- Changing default subtitle settings -- Formatting our subtitles -- Exporting and importing subtitles -- Exporting subtitles to upload to YouTube or Vimeo -- Exporting subtitles in the File menu -- Exporting subtitles in the Subtitle track header -- Exporting subtitles on the Deliver page -- Importing subtitles into Resolve -- Positioning subtitle clips on the Timeline -- Welcome to the Fairlight page -- Index -- Meters -- ADR -- Creating a new audio track -- Patching, arming, and recording -- Patching tracks -- Arming tracks -- Recording audio -- Voice dubbing in Fairlight using ADR -- Creating a new Timeline using selected footage -- Adding scene cuts -- Scene Detect -- Ripple deleting clips on the Edit page -- Ripple-deleting clips on the Cut page -- Smooth Cut -- The ADR interface -- Summary -- Questions -- Further reading -- Chapter 5: Creating Additional Sound -- Technical requirements -- Enhancing the vocals -- Pitch -- Vocal Channel -- Dialogue Processor -- Importing audio effects plug-ins…”
    Libro electrónico
  14. 494
    por Hersent, Olivier
    Publicado 2012
    Tabla de Contenidos: “…13.2.1 ZigBee IP 213 -- 13.2.2 ZigBee SEP 2.0 Resources 214 -- 13.3 Function Sets and Device Types 217 -- 13.3.1 Base Function Set 218 -- 13.3.2 Group Enrollment 221 -- 13.3.3 Meter 223 -- 13.3.4 Pricing 223 -- 13.3.5 Demand Response and Load Control Function Set 224 -- 13.3.6 Distributed Energy Resources 227 -- 13.3.7 Plug-In Electric Vehicle 227 -- 13.3.8 Messaging 230 -- 13.3.9 Registration 231 -- 13.4 ZigBee SE 2.0 Security 232 -- 13.4.1 Certificates 232 -- 13.4.2 IP Level Security 232 -- 13.4.3 Application-Level Security 235 -- 14 The ETSI M2M Architecture 237 -- 14.1 Introduction to ETSI TC M2M 237 -- 14.2 System Architecture 238 -- 14.2.1 High-Level Architecture 238 -- 14.2.2 Reference Points 239 -- 14.2.3 Service Capabilities 240 -- 14.3 ETSI M2M SCL Resource Structure 242 -- 14.3.1 SCL Resources 244 -- 14.3.2 Application Resources 244 -- 14.3.3 Access Right Resources 248 -- 14.3.4 Container Resources 248 -- 14.3.5 Group Resources 250 -- 14.3.6 Subscription and Notification Channel Resources 251 -- 14.4 ETSI M2M Interactions Overview 252 -- 14.5 Security in the ETSI M2M Framework 252 -- 14.5.1 Key Management 252 -- 14.5.2 Access Lists 254 -- 14.6 Interworking with Machine Area Networks 255 -- 14.6.1 Mapping M2M Networks to ETSI M2M Resources 256 -- 14.6.2 Interworking with ZigBee 1.0 257 -- 14.6.3 Interworking with C.12 262 -- 14.6.4 Interworking with DLMS/COSEM 264 -- 14.7 Conclusion on ETSI M2M 266 -- Part V KEY APPLICATIONS OF THE INTERNET OF THINGS -- 15 The Smart Grid 271 -- 15.1 Introduction 271 -- 15.2 The Marginal Cost of Electricity: Base and Peak Production 272 -- 15.3 Managing Demand: The Next Challenge of Electricity Operators . . . and / Why M2M Will Become a Key Technology 273 -- 15.4 Demand Response for Transmission System Operators (TSO) 274 -- 15.4.1 Grid-Balancing Authorities: The TSOs 274 -- 15.4.2 Power Shedding: Who Pays What? …”
    Libro electrónico
  15. 495
    Publicado 2017
    “…A practical guide to help you undertand the ability of Apache jMeter to load and performance test various server types in a more efficient way. …”
    Libro electrónico
  16. 496
    Publicado 2022
    “…"Sustainable Networks in Smart Grid presents global challenges in smart metering with renewable energy resources, micro-grid design, communication technologies, big data, privacy and security in the smart grid. …”
    Libro electrónico
  17. 497
    Publicado 2020
    Tabla de Contenidos: “…PROPIEDAD BACKGROUND-ATTACHMENT -- PROPIEDAD BACKGROUND-CLIP -- PROPIEDAD BACKGROUND-IMAGE -- PROPIEDAD BACKGROUND-ORIGIN -- PROPIEDAD BACKGROUND-POSITION -- PROPIEDAD BACKGROUND-REPEAT -- PROPIEDAD BACKGROUND-SIZE -- PROPIEDAD CLIP-PATH -- I PROPIEDAD OBJECT-FIT -- PROPIEDAD OBJECT-POSITION -- IMÁGENES RECEPTIVAS Y ADAPTATIVAS -- ADAPTACIÓN DE IMÁGENES MEDIANTE PROPIEDADES CSS -- ADAPTACIÓN DE IMÁGENES MEDIANTE CONSULTAS DE MEDIOS -- SELECCIÓN DE IMÁGENES MEDIANTE IMG Y SRCSET -- SELECCIÓN DE IMÁGENES MEDIANTE PICTURE Y SOURCE -- VIDEOS RECEPTIVOS -- USABILIDAD Y ACCESIBILIDAD EN LOS ELEMENTOS MULTIMEDIA -- EN IMÁGENES -- EN AUDIO Y VÍDEO -- PRÁCTICA 4: ESTRUCTURA, TEXTOS E IMÁGENES DE "UNIVERSES" -- RECURSOS PARA HACER LA PRÁCTICA -- RESOLUCIÓN -- PRÁCTICA 5: BANNER DE "UNIVERSES" A PANTALLA COMPLETA -- RESOLUCIÓN -- 5- TABLAS -- ELEMENTOS DISPONIBLES EN HTML5 -- ELEMENTO CAPTION -- ELEMENTO TABLE -- ELEMENTO COLGROUP -- ELEMENTO THEAD -- ELEMENTO TBODY -- ELEMENTO TFOOT -- ELEMENTO TR -- ELEMENTO TH -- ELEMENTO TD -- ELEMENTOS DISPONIBLES EN CSS -- PROPIEDAD BORDER-COLLAPSE -- PROPIEDAD BORDER-SPACING -- PROPIEDAD CAPTION-SIDE -- PROPIEDAD EMPTY-CELLS -- PROPIEDAD TABLE-LAYOUT -- CREACIÓN DE TABLAS RESPONSIVE -- MEDIANTE BARRAS DE DESPLAZAMIENTO -- MEDIANTE CONSULTAS DE MEDIOS -- MEDIANTE OCULTACIÓN DE COLUMNAS A PETICIÓN DE USUARIO -- USABILIDAD Y ACCESIBILIDAD EN LAS TABLAS -- PRÁCTICA 6: PÁGINA "DÓNDE ESTAMOS" DE "UNIVERES" -- RECURSOS PARA HACER LA PRÁCTICA -- RESOLUCIÓN -- 6- FORMULARIOS -- TIPOS DE FORMULARIO -- FORMULARIOS DE CONTACTO -- FORMULARIOS DE SUSCRIPCIÓN -- FORMULARIOS DE ACCESO -- FORMULARIOS DE REGISTRO -- FORMULARIOS DE ENTRADA GENERAL -- ELEMENTOS DISPONIBLES EN HTML5 -- ELEMENTO FORM -- ELEMENTO BUTTON -- ELEMENTO DATALIST -- ELEMENTO FIELDSET -- ELEMENTO INPUT -- ELEMENTO LABEL -- ELEMENTO LEGEND -- ELEMENTO METER…”
    Libro electrónico
  18. 498
    Publicado 2021
    Tabla de Contenidos: “…Completing the Code -- Deploy and Execute -- Summary -- Chapter 10: Project 1: Building an LED Power Meter -- Overview -- Required Components -- Set Up the Hardware -- Write the Code -- Debug Output -- New Project -- Initialize GPIO -- Controlling the LEDs -- Code for the MCP3008 -- Deploy and Execute -- Summary -- Chapter 11: Project 2: Measuring Light -- Overview -- Required Components -- Set Up the Hardware -- Write the Code -- New Project -- Lighting Providers -- User Interface -- Controlling the LED -- Completing the Main Class -- Code for the MCP3008 -- Code for the PWM -- Deploy and Execute -- Summary -- Chapter 12: Project 3: Using Weather Sensors -- Overview -- Required Components -- Set Up the Hardware -- Write the Code -- New Project -- Add a C# Runtime Component Project -- BMP280 Class -- User Interface -- Add References -- Reading the Weather Data -- Deploy and Execute -- Summary -- Chapter 13: Project 4: Using MySQL to Store Data -- What Is MySQL? …”
    Libro electrónico
  19. 499
    Publicado 2017
    Tabla de Contenidos: “…Review of Shielded VMs and Host Guardian Service -- Deploying Shielded VMs -- Creating and Using Hyper-V Templates -- Hyper-V Integration Services and Supported Operating Systems -- Migrating Physical Servers and Virtual Machines to Hyper-V Virtual Machines -- Upgrading and Migrating from Previous Versions -- Stand-Alone Hosts -- Clusters -- The Bottom Line -- Chapter 6 Maintaining a Hyper-V Environment -- Patch Planning and Implementation -- Leveraging WSUS -- Patching Hyper-V Clusters -- Malware Configurations -- Backup Planning -- Defragmentation with Hyper-V -- Using Checkpoints -- Using Service Templates -- Performance Tuning and Monitoring with Hyper-V -- Resource Metering -- Monitoring -- The Bottom Line -- Chapter 7 Failover Clustering and Migration Technologies -- Failover Clustering Basics -- Understanding Quorum and Why It's Important -- Quorum Basics -- Modifying Cluster Vote Configuration -- Advanced Quorum Options and Forcing Quorums -- Geographically Distributed Clusters -- Why Use Clustering with Hyper-V? …”
    Libro electrónico
  20. 500
    Publicado 2017
    Tabla de Contenidos: “…Note continued: Creating a virtual machine -- Add or remove memory in running a VM -- Configure dynamic memory -- Configure Non-Uniform Memory Access (NUMA) support -- Configure smart paging -- Configure resource metering -- Manage Integration Services -- Create and configure Generation 1 and 2 VMs and determine appropriate usage scenarios -- Implement enhanced session mode -- Create Linux and FreeBSD VMs -- Install and configure Linux Integration Services (LIS) -- Install and configure FreeBSD Integration Services (BIS) -- Implement Secure Boot for Windows and Linux environments -- Move and convert VMs from previous versions of Hyper-V to Windows Server 2016 Hyper-V -- Export and import VMs -- Implement Discrete Device Assignment (DDA) -- Skill 3.3 Configure Hyper-V storage -- Create VHDs and VHDX files using Hyper-V Manager -- Create shared VHDX files -- Configure differencing disks -- Modify virtual hard disks -- Configure pass-through disks…”
    Libro electrónico