Mostrando 3,881 - 3,900 Resultados de 5,617 Para Buscar '"hardware"', tiempo de consulta: 0.09s Limitar resultados
  1. 3881
    por Iniewski, Krzysztof
    Publicado 2008
    “…Additionally, it focuses on areas not widely covered in existing books: physical transport and switching, the process and technique of building networking hardware, and new technologies being deployed in the marketplace, such as Metro Wave Division Multiplexing (MWDM), Resilient Packet Rings (RPR), Optical Ethernet, and more. …”
    Libro electrónico
  2. 3882
    por Smith, Bud E.
    Publicado 2014
    “…It presents helpful tips on how to maximize energy savings as well as how to present information gradually to allow peers and stakeholders to absorb it.The book's comprehensive coverage includes various types of hardware and software, including the changes currently happening, underlying trends, products currently on the market, and what to expect -- or, in some cases, what organizations should ask for--from suppliers in the future.On the hardware side, the book considers tablet computers -- examining the iPad and Android-based tablets. …”
    Libro electrónico
  3. 3883
    Publicado 2013
    “…The availability of suitable hardware and software tools is condicio sine qua non for new methods testing. …”
    Libro electrónico
  4. 3884
    Publicado 2022
    “…Scalability-replicability of the FLEXITRANSTORE technology innovations integrates hardware-software solutions in all areas of the transmission system and the wholesale markets, promoting increased RES. …”
    Libro electrónico
  5. 3885
    Publicado 2016
    Tabla de Contenidos: “…Linux and OSS in a Forensic Context -- Advantages of Linux and OSS in Forensics Labs -- Disadvantages of Linux and OSS in Forensics Labs -- Linux Kernel and Storage Devices -- Kernel Device Detection -- Storage Devices in /dev -- Other Special Devices -- Linux Kernel and Filesystems -- Kernel Filesystem Support -- Mounting Filesystems in Linux -- Accessing Filesystems with Forensic Tools -- Linux Distributions and Shells -- Linux Distributions -- The Shell -- Command Execution -- Piping and Redirection -- Closing Thoughts -- Chapter 3: Forensic Image Formats -- Raw Images -- Traditional dd -- Forensic dd Variants -- Data Recovery Tools -- Forensic Formats -- EnCase EWF -- FTK SMART -- AFF -- SquashFS as a Forensic Evidence Container -- SquashFS Background -- SquashFS Forensic Evidence Containers -- Closing Thoughts -- Chapter 4: Planning and Preparation -- Maintain an Audit Trail -- Task Management -- Shell History -- Terminal Recorders -- Linux Auditing -- Organize Collected Evidence and Command Output -- Naming Conventions for Files and Directories -- Scalable Examination Directory Structure -- Save Command Output with Redirection -- Assess Acquisition Infrastructure Logistics -- Image Sizes and Disk Space Requirements -- File Compression -- Sparse Files -- Reported File and Image Sizes -- Moving and Copying Forensic Images -- Estimate Task Completion Times -- Performance and Bottlenecks -- Heat and Environmental Factors -- Establish Forensic Write-Blocking Protection -- Hardware Write Blockers -- Software Write Blockers -- Linux Forensic Boot CDs -- Media with Physical Read-Only Modes -- Closing Thoughts -- Chapter 5: Attaching Subject Media to an Acquisition Host -- Examine Subject PC Hardware -- Physical PC Examination and Disk Removal -- Subject PC Hardware Review -- Attach Subject Disk to an Acquisition Host -- View Acquisition Host Hardware…”
    Libro electrónico
  6. 3886
    Publicado 2010
    Tabla de Contenidos: “…Cover -- Contents -- Foreword -- Introduction -- Chapter 1 Introduction to Cisco Wide Area Application Services (WAAS) -- Understanding Application Performance Barriers -- Layer 4 Through Layer 7 -- Latency -- Bandwidth Inefficiencies -- Throughput Limitations -- Network Infrastructure -- Bandwidth Constraints -- Network Latency -- Loss and Congestion -- Introduction to Cisco WAAS -- WAN Optimization -- Data Redundancy Elimination -- Persistent LZ Compression -- Transport Flow Optimization -- Secure Sockets Layer (SSL) Optimization -- Application Acceleration -- Object and Metadata Caching -- Prepositioning -- Read-Ahead -- Write-Behind -- Multiplexing -- Other Features -- Branch Virtualization -- The WAAS Effect -- Summary -- Chapter 2 Cisco WAAS Architecture, Hardware, and Sizing -- Cisco WAAS Product Architecture -- Disk Encryption -- Central Management Subsystem -- Interface Manager -- Monitoring Facilities and Alarms -- Network Interception and Bypass Manager -- Application Traffic Policy Engine -- Virtual Blades -- Hardware Family -- Router-Integrated Network Modules -- NME-WAE Model 302 -- NME-WAE Model 502 -- NME-WAE Model 522 -- Appliances -- WAVE Model 274 -- WAVE Model 474 -- WAE Model 512 -- WAVE Model 574 -- WAE Model 612 -- WAE Model 674 -- WAE Model 7341 -- WAE Model 7371 -- Licensing -- Performance and Scalability Metrics -- Device Memory -- Disk Capacity -- Number of Optimized TCP Connections -- WAN Bandwidth and LAN Throughput -- Number of Peers and Fan-Out -- Number of Devices Managed -- Replication Acceleration -- Virtual Blades -- Summary -- Chapter 3 Planning, Discovery, and Analysis -- Planning Overview -- Planning Overview Checklist -- Requirements Collection and Analysis -- Site Information -- Site Types -- User Population -- Physical Environment -- Site Information Checklist -- Network Infrastructure -- WAN Topology…”
    Libro electrónico
  7. 3887
    Publicado 2002
    Tabla de Contenidos: “…Setting up iSeries Access for Web -- 2.1 iSeries server requirements -- 2.1.1 iSeries hardware requirements -- 2.1.2 Software requirements -- 2.1.3 Software considerations -- 2.2 Web browser requirements -- 2.3 Setup overview -- 2.4 Migration -- 2.5 Connecting to multiple iSeries servers -- 2.6 Setting up a secure iSeries connection -- Chapter 3. …”
    Libro electrónico
  8. 3888
    Publicado 2023
    Tabla de Contenidos: “…6.3.2.1 High-K Dielectric -- 6.3.2.2 Metal Gate -- 6.3.2.3 Multiple Gate -- 6.4 Role of High-K in CMOS Miniaturization -- 6.5 Current Mosfet Technologies -- 6.6 Conclusion -- References -- Chapter 7 Investigation of Diabetic Retinopathy Level Based on Convolution Neural Network Using Fundus Images -- 7.1 Introduction -- 7.2 The Proposed Methodology -- 7.3 Dataset Description and Feature Extraction -- 7.3.1 Depiction of Datasets -- 7.3.2 Preprocessing -- 7.3.3 Detection of Blood Vessels -- 7.3.4 Microaneurysm Detection -- 7.4 Results and Discussions -- 7.5 Conclusions -- References -- Chapter 8 Anti-Theft Technology of Museum Cultural Relics Using RFID Technology -- 8.1 Introduction -- 8.2 Literature Survey -- 8.3 Software Implementation -- 8.4 Components -- 8.4.1 Arduino UNO -- 8.4.2 EM18 Reader Module -- 8.4.3 RFID Tag -- 8.4.4 LCD Display -- 8.4.5 Sensors -- 8.4.5.1 Fire Sensor -- 8.4.5.2 IR Sensor -- 8.4.6 Relay -- 8.5 Working Principle -- 8.5.1 Working Principle -- 8.6 Results and Discussions -- 8.7 Conclusions -- References -- Chapter 9 Smart Irrigation System Using Machine Learning Techniques -- 9.1 Introduction -- 9.2 Hardware Module -- 9.2.1 Soil Moisture Sensor -- 9.2.2 LM35-Temperature Sensor -- 9.2.3 POT Resistor -- 9.2.4 BC-547 Transistor -- 9.2.5 Sounder -- 9.2.6 LCD 16x2 -- 9.2.7 Relay -- 9.2.8 Push Button -- 9.2.9 LED -- 9.2.10 Motor -- 9.3 Software Module -- 9.3.1 Proteus Tool -- 9.3.2 Arduino Based Prototyping -- 9.4 Machine Learning (Ml) Into Irrigation -- 9.5 Conclusion -- References -- Chapter 10 Design of Smart Wheelchair with Health Monitoring System -- 10.1 Introduction -- 10.2 Proposed Methodology -- 10.3 The Proposed System -- 10.4 Results and Discussions -- 10.5 Conclusions -- References -- Chapter 11 Design and Analysis of Anti-Poaching Alert System for Red Sandalwood Safety -- 11.1 Introduction…”
    Libro electrónico
  9. 3889
    por Blawat, Brenton J. W.
    Publicado 2013
    Tabla de Contenidos: “…Using the basic CIM cmdletsCreating, verifying, and terminating new sessions; Top features you'll want to know about; New CIM instance and class cmdlets; Get-CimClass cmdlets; New-CimInstance cmdlets; Set-CimInstance cmdlet; Remove-CimInstance cmdlets; Get-CimAssociatedInstance cmdlet; Invoke-CimMethod cmdlet; Scenario 1 - using WMI in software deployment; Checking the operating system version; Checking disk space; Checking the hardware model number; Checking for running processes; Checking for running services; Viewing the installed software; Checking file version numbers…”
    Libro electrónico
  10. 3890
    Publicado 2022
    Tabla de Contenidos: “…PART I 0́3 THEORY AND CONCEPTSCHAPTER 1 0́3 The Internet of Things (IoT)1.1A New Design Paradigm: The Internet of Things1.2Introduction to the IoT Framework1.3Understanding the FULL Potential of the Internet of Things1.4Challenges of Implementing effective IoT Systems1.5Effective Implementation of IoT Systems: A step-by-step Process1.6Case studies of Successful IoT Applications1.7IoT of Tomorrow: Emerging Trends of the Internet of ThingsCHAPTER 2 0́3 Foundation Topics: Concepts2.1Terminologies & Fundamentals2.2Embedded Systems: Introduction2.3Embedded Systems: Hardware Considerations2.4Embedded Systems: Software Considerations2.5Embedded Systems: Peripherals2.6Online Resources: The Journey ContinuesPART II 0́3 HANDS-ON SYSTEM DEVELOPMENTCHAPTER 3 0́3 Foundation Topics: Programming & Coding3.1Programming Languages: C++3.2Programming Languages: Python3.3The Linux Operating SystemCHAPTER 4 0́3 Controller Boards IoT Systems (Arduino Systems)4.1The Arduino Boards4.2Arduino Peripherals4.3The Arduino Integrated Development Environment (Arduino IDE)4.4Hands-on Projects: Arduino Autonomous Systems4.5Hands-on Projects: Arduino-based IoT SystemsCHAPTER 5 0́3 Computer Boards IoT Systems (Raspberry Pi Systems)5.1The Raspberry Pi Boards5.2The Raspberry Pi Peripherals5.4Hands-on Projects: Raspberry Pi Autonomous Systems5.5Hands-on Projects: Raspberry Pi-based IoT Systems…”
    Libro electrónico
  11. 3891
    Publicado 2008
    Tabla de Contenidos: “…Installing and replacing hardware ; 31. Editing the registry ; 32. Command-line and automation tools -- VII. …”
    Libro electrónico
  12. 3892
    Publicado 2014
    Tabla de Contenidos: “…Retina display supportDisplay calibration and profiling; Calibration hardware; The calibration/profiling procedure; White point; Gamma; Luminance; The profiling process; Do you want good color or just OK color?…”
    Libro electrónico
  13. 3893
    Publicado 2022
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Dedication -- Contents -- Preface -- PART I Choose Change Before It Chooses You -- CHAPTER 1 How Change Changes Things-and What to Do About It: Making Friends with Change -- CHAPTER 2 Got Your Back: Lifeguard Lessons -- CHAPTER 3 The Change-Proof Model: Pause, Ask, Choose -- PART II Becoming Change Proof -- CHAPTER 4 The Power of Choice: Leveraging Your Relationship to Change and Stress -- CHAPTER 5 The Markers of Resilience -- CHAPTER 6 The Myth of Balance -- CHAPTER 7 Harmony -- CHAPTER 8 The Resilience Bank Account -- CHAPTER 9 Resilient Organizations -- CHAPTER 10 Left Brain Resilience -- PART III Change-Proof Hardware -- CHAPTER 11 Recovery Versus Burnout -- CHAPTER 12 Recover Before It's Too Late -- CHAPTER 13 Even Michael Jordan Paused -- CHAPTER 14 Outperforming Challenges -- CHAPTER 15 Get out of Your Head -- CHAPTER 16 Mindset Recalibration -- CHAPTER 17 Disputing Irrational Beliefs -- CHAPTER 18 A Little Failure Goes a Long Way -- PART IV Change-Proof Software -- CHAPTER 19 Happiness Doesn't Deliver Resilience -- CHAPTER 20 Are You Emotionally Agile? …”
    Libro electrónico
  14. 3894
    por Pfister, Cuno
    Publicado 2011
    Tabla de Contenidos: “…; Taking a REST; Communities; Other Hardware; The Sky Is the Limit; A/Test Server; B/.NET Classes Used in the Examples; C/Gsiot.Server Library; HTTP Server; Resources; Representations; Drivers for Sensors and Actuators; Multithreading; Index; About the Author; Colophon…”
    Libro electrónico
  15. 3895
    Publicado 2023
    Tabla de Contenidos: “…Partnerships -- 13 Why and how to engage beneficiaries as co-(social) entrepreneurs? Considering hardware, software, and orgware for citizen engagement -- 14 Civic leadership for a transformative social economy: A comparison of city leadership constellations in Italy and the UK -- 15 Public structural funds as a catalyst for social innovation: The experience of Portugal Social Innovation -- 16 Social procurement to promote social problem solving…”
    Libro electrónico
  16. 3896
    Publicado 2022
    Tabla de Contenidos: “…PDX and Software Bill of Materials ISO/IEC 5962L 2021 - Kate Stewart - 8. corporate Concerns: Audit, Valuation, and Deals - Toby Crick - 9. trademarks - Pamela Chestek - 10. patents and the Defensive Response - Malcolm Bain and P McCoy Smith - 11. pen Source Software in Standard Setting: The Role of Intellectual Property Right Regimes - Knut Blind, Mirko Böhm, and Nikolaus Thumm - 12. export Control - Michael Cheng and Mishi Choudhary - 13. pen Source Software and Security: Practices, Governance, History, and Perceptions - Charles-H Schulz - Part 2The Business of Open: Economics, Open Source Models, and Usage - 14. sustainability and Open Source - Cristian Parrino - 15. economics of Open Source - Mirko Böhm - 16. business and Revenue Models and Commercial Agreements - Amanda Brock - 17. ntitrust, Competition, and Open Source - Carlo Piana - 18. foundations and Other Organisations - Karen Sandler - 19. he Rise of the Open Source Program Offices (OSPO) - Nithya Ruff - 20. loud Native Development, Containers, and Open Source Licensing - Richard Fontana - 21. ublic Sector and Open Source - Iain G Mitchell KC - Part 3Everything Open - 22. lockchain and Open Source - Mark Radcliffe - 23. pen Hardware - Andrew Katz - 24. pen Everything - Andrew Katz - Appendix - Index…”
    Libro electrónico
  17. 3897
    Publicado 2012
    Tabla de Contenidos: “…Las empresas de software y hardware; 3.2.3. Las empresas proveedoras de servicios de Internet…”
    Libro electrónico
  18. 3898
    por Red Martinez, David Luis la
    Publicado 2001
    Tabla de Contenidos: “…SISTEMAS OPERATIVOS; Prólogo; Prefacio; Índice General; Parte I - Sistemas Operativos Convencionales; Capítulo 1 - Introducción; 1.1 Qué es un Sistema Operativo; 1.2 Historia de los Sistemas Operativos - Generaciones; 1.3 Conceptos de los Sistemas Operativos; 1.4 Estructura de los Sistemas Operativos; 1.5 Tendencias; 1.6 Hardware; 1.7 Software; 1.8 Memoria Fija; Capítulo 2 - Procesos y Administración del Procesador; 2.1 Introducción y Definiciones Sobre Procesos; 2.2 Estados de Procesos; 2.3 Procesamiento de Interrupciones; 2.4 El Núcleo del Sistema Operativo; 2.5 Planificación de Procesos…”
    Libro electrónico
  19. 3899
    por Ibrahim, Dogan
    Publicado 2014
    Tabla de Contenidos: “…Chapter 2 - PIC32 Microcontroller Series2.1 The PIC32MX360F512L Architecture; 2.2 Summary; 2.3 Exercises; Chapter 3 - C Programming for 32-Bit PIC Microcontrollers; 3.1 Structure of a Simple mikroC Pro for PIC32 Program; 3.2 Functions; 3.3 PIC32 Microcontroller Specific Features; 3.4 Summary; 3.5 Exercises; Chapter 4 - mikroC Pro for PIC32 Built-in Library Functions; 4.1 ADC Library; 4.2 LCD Library; 4.3 Software UART Library; 4.4 Hardware UART Library; 4.5 Sound Library; 4.6 ANSI C Library; 4.7 Miscellaneous Library; 4.8 Summary; 4.9 Exercises…”
    Libro electrónico
  20. 3900
    Publicado 2019
    Tabla de Contenidos: “…THE MBR/VBR BOOT PROCESS -- The Unified Extensible Firmware Interface -- Differences Between the Legacy BIOS and UEFI Boot Processes -- GUID Partition Table Specifics -- How UEFI Firmware Works -- Conclusion -- 15 CONTEMPORARY UEFI BOOTKITS -- Overview of Historical BIOS Threats -- All Hardware Has Firmware -- Ways to Infect the BIOS -- Understanding Rootkit Injection -- UEFI Rootkits in the Wild -- Conclusion -- 16 UEFI FIRMWARE VULNERABILITIES -- What Makes Firmware Vulnerable? …”
    Libro electrónico