Mostrando 4,901 - 4,920 Resultados de 5,616 Para Buscar '"hardware"', tiempo de consulta: 0.13s Limitar resultados
  1. 4901
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedications -- Contributors -- Table of Contents -- Preface -- Part 1: Introducing Multiplayer Games -- Chapter 1: Getting Started with Multiplayer Game Development -- Technical requirements -- Pre-requisite knowledge -- Hardware requirements -- Software requirements -- Introducing multiplayer games -- Becoming a network programmer in video games -- Understanding multiplayer game categories -- First-person shooters -- Third-person shooters -- Real-time strategy -- Massively multiplayer online role-playing games -- Multi-user dungeons -- Multiplayer online battle arena -- Reviewing gameplay twists -- Asymmetrical gameplay -- Hide-and-seek gameplay -- Asynchronous gameplay -- Is multiplayer technology just for games? …”
    Libro electrónico
  2. 4902
    Publicado 2024
    “…Covers each type of 3D printing technology available today: stereo lithology, selective sintering, used deposition, and granular binding Provides information on the potential for the transformation of production and manufacturing, reuse and recycling, intellectual property design controls, and the commoditization of products Walks you through the process of creating a RepRap printer using open source designs, software, and hardware Offers strategies for improved success in 3D printing On your marks, get set, innovate!…”
    Libro electrónico
  3. 4903
    Publicado 2023
    Tabla de Contenidos: “…Deploying and using your own local registry -- Signing images with Cosign -- Improving security by using image content vulnerability scanners -- Summary -- Chapter 4: Running Docker Containers -- Technical requirements -- Understanding Docker software container objects -- Learning about using the command line to work with containers -- Limiting container access to host resources -- Network isolation -- Managing persistent data with containers -- Limiting access to host hardware resources -- Extending access to host resources -- Managing container behavior -- Container runtime maintenance tasks -- Pruning container objects -- Configuring container runtime logging -- Labs -- Reviewing container networking concepts -- Access to container services -- Exposing applications -- Limiting containers' resource usage -- Avoiding the use of root users inside containers -- Cleaning the container runtime -- Summary -- Chapter 5: Creating Multi-Container Applications -- Technical requirements -- Installing and using Docker Compose -- Introducing the Docker Compose file syntax -- YAML file definition keys -- Building and sharing multi-container applications -- Running and debugging multi-container applications -- Managing multiple environments with Docker Compose -- Labs -- Deploying a simple demo application -- Deploying another project using the same Compose YAML file -- Removing all projects -- Summary -- Part 2: Container Orchestration -- Chapter 6: Fundamentals of Container Orchestration -- Introducing the key concepts of orchestration -- Understanding stateless and stateful applications -- Stateful applications -- Stateless applications -- Exploring container orchestrators -- Kubernetes -- Docker Swarm -- Nomad -- Apache Mesos -- Cloud vendor-specific orchestration platforms -- Summary -- Chapter 7: Orchestrating with Swarm -- Technical requirements…”
    Libro electrónico
  4. 4904
    por Jellow, D. H. L. (h. c. ).
    Publicado 2023
    Tabla de Contenidos: “…Chapter 13: Summary of Azure VMware Solution, Roadmap, and Best Practices -- AVS overview -- AVS hardware and software specification -- AVS high-level architecture -- Use cases for AVS in an enterprise -- Network and connectivity topology for AVS -- Understanding networking requirements for AVS -- Networking scenarios for AVS with traffic inspection -- Planning for an AVS Deployment -- Subscription identification -- Resource group identification -- Azure region -- Region pairs in Azure -- AVS resource name -- Determining the number of nodes -- Host quota request for AVS -- Requesting a /22 address space for AVS management components -- Defining the AVS workload network segments -- Defining the virtual network gateway -- Managing an AVS environment -- Leveraging governance for AVS -- AVS roadmap -- Best practices for planning, deploying, and managing AVS -- Architectural design for AVS -- Summary -- Index -- Other Books You May Enjoy…”
    Libro electrónico
  5. 4905
    Publicado 2011
    Tabla de Contenidos: “…Intro -- Title -- Preface -- Organization -- Table of Contents -- Progress in Indoor UAV -- On the Way to a Real-Time On-Board Orthogonal SLAM for an Indoor UAV -- Introduction -- Introductive System Description -- SLAM Algorithm -- Indoor Navigation -- Experimental SLAM Results -- Conclusion -- References -- Quadrocopter Localization Using RTK-GPS and Vision-Based Trajectory Tracking -- Introduction -- Characteristics of the Flight Platform -- Sensors and Hardware Equipment -- Software -- Differential GPS -- Real Time Kinematic GPS -- Measurements -- Position Control and Trajectory Tracking -- Position Controller -- Trajectory Controller -- Conclusions and Future Research -- References -- Five-Axis Milling Simulation Based on B-rep Model -- Introduction -- Geometric Description of Ball-End Tool -- Tool Swept Volume Generation -- Swept Profiles of Cylinder Surface -- Swept Profiles of Hemisphere Surface -- Realization of Five-Axis Milling Simulation -- Determining and Solving Self-intersection -- Conclusions -- References -- Robotics Intelligence -- Exploration Strategies for Building Compact Maps in Unbounded Environments -- Introduction -- Related Work -- Greedy Exploration -- Compact Exploration Strategies -- Spiral Exploration -- Distance-Penalized Exploration -- Evaluation -- Experiment 1: Low Obstacle Density -- Experiment 2: High Obstacle Density -- Experiment 3: Elongated Obstacles -- Conclusions -- References -- The Basic Component of Computational Intelligence for KUKA KR C3 Robot -- Introduction -- Kinematics -- Workspace -- Example of Calculations -- Conclusions -- References -- An Experimental Comparison of Model-Free Control Methods in a Nonlinear Manipulator -- Introduction -- System Description -- Model-Free Control Strategies -- Proportional-Integral-Derivative -- Robust Tracking with Control Vector Constraints…”
    Libro electrónico
  6. 4906
    Publicado 2024
    Tabla de Contenidos: “…Milestone 2 - Incorporating the Common Voice 11 dataset -- Expanding language coverage -- Improving translation capabilities -- Milestone 3 - Setting up Whisper pipeline components -- Loading WhisperTokenizer -- Milestone 4 - Transforming raw speech data into Mel spectrogram features -- Combining to create a WhisperProcessor class -- Milestone 5 - Defining training parameters and hardware configurations -- Setting up the data collator -- Milestone 6 - Establishing standardized test sets and metrics for performance benchmarking -- Loading a pre-trained model checkpoint -- Defining training arguments -- Milestone 7 - Executing the training loops -- Milestone 8 - Evaluating performance across datasets -- Mitigating demographic biases -- Optimizing for content domains -- Managing user expectations -- Milestone 9 - Building applications that demonstrate customized speech recognition -- Summary -- Part 3: Real-world Applications and Use Cases -- Chapter 5: Applying Whisper in Various Contexts -- Technical requirements -- Exploring transcription services -- Understanding the role of Whisper in transcription services -- Setting up Whisper for transcription tasks -- Transcribing audio files with Whisper efficiently -- Integrating Whisper into voice assistants and chatbots -- Recognizing the potential of Whisper in voice assistants and chatbots -- Integrating Whisper into chatbot architectures -- Quantizing Whisper for chatbot efficiency and user experience -- Enhancing accessibility features with Whisper -- Identifying the need for Whisper in accessibility tools -- Building an interactive image-to-text application with Whisper -- Summary -- Chapter 6: Expanding Applications with Whisper -- Technical requirements -- Transcribing with precision -- Leveraging Whisper for multilingual transcription -- Indexing content for enhanced discoverability…”
    Libro electrónico
  7. 4907
    Publicado 2024
    Tabla de Contenidos: “…Most common vulnerabilities and threats in CI -- Inadequately secured industrial control systems (ICS) -- Common vulnerabilities in industrial control systems (ICS) -- Ransomware targeting CI -- Supply chain attacks on CI components -- Legacy systems and lack of security updates -- Physical security breaches -- Internet of Things (IoT) vulnerabilities -- Summary -- References -- Part 2: Dissecting Cyberattacks on CI -- Chapter 4: The Most Common Attacks Against CI -- DDoS attack -- Volumetric attacks -- Reflection and amplification attacks -- Resource depletion attacks -- Protocol-based attacks -- Application layer attacks -- Ransomware attack -- Infection -- Encryption -- Ransom note -- Ransom payment -- Data recovery -- No guarantee of data recovery -- Supply chain attack -- Scope of attack -- Attack vector -- Stealth and persistence -- Data exfiltration -- Software supply chain attacks -- Hardware supply chain attacks -- Impersonation and trust exploitation -- Mitigation challenges -- Notable examples -- APT -- Phishing -- The anatomy of a phishing attack -- Impersonation and trust exploitation -- Pretexting and urgency -- Mimicking authority figures -- Deception and lure -- Malicious links and attachments -- Why do phishing tactics persist? …”
    Libro electrónico
  8. 4908
    por Gouigoux, Jean-Philippe
    Publicado 2024
    Tabla de Contenidos: “…Digression on the digital transformation of companies -- Conway's law applied to application and systems -- Introducing the CIGREF diagram -- Process level -- Functional level -- Software layer -- Hardware layer -- Using the four-layer diagram -- What should we map? …”
    Libro electrónico
  9. 4909
    por Pestano Herrera, Jesús María
    Publicado 2018
    Tabla de Contenidos: “….) -- 7 PRINCIPIOS BÁSICOS DEL HARDWARE DE LOS (...) -- 7.1 PUERTOS Y PINES -- 7.2 PERIFÉRICOS INTERNOS -- 7.3 MÉTODO DE PROGRAMACIÓN -- PARTE III PROGRAMACIÓN DEL MICROCONTROLADOR (...) -- 8 PROGRAMACIÓN GPIO -- 8.1 PROGRAMACIÓN SYSCLK -- 8.1.1 PLL -- 9 PROGRAMACIÓN USART -- 9.1 EJEMPLO DE CONFIGURACIÓN PUERTO USART -- 9.2 EJEMPLO CON OTRO PUERTO USART -- 9.3 EJEMPLO REMAPEO DE PUERTO USART…”
    Libro electrónico
  10. 4910
    Publicado 2011
    Tabla de Contenidos: “…6.3 KMDF Driver Structure -- 6.4 Comparing KMDF and WDM Drivers -- 6.5 Device Objects and Driver Roles -- 6.6 KMDF Object Model -- 6.7 KMDF I/O Model -- Chapter 7 Plug and Play and Power Management -- 7.1 Plug and Play and Power Management Overview -- 7.2 Device Enumeration and Startup -- 7.3 WMI Request Handler -- 7.4 Synchronization Issues -- 7.5 Security -- Chapter 8 Kernel Mode Installation and Build -- 8.1 WDK Build Tools -- 8.2 Build Environment -- 8.3 Building a Project -- 8.4 Building Featured Toaster -- 8.5 Installing a KMDF Driver -- 8.6 Catalog Files and Digital Signature -- 8.7 Installing Featured Toaster -- 8.8 Testing a KMDF Driver -- 8.9 Debugging Macros and Routines -- 8.10 WDF Debugger Extension Commands -- 8.11 Using WPP Tracing with a KMDF Driver -- 8.12 Using WinDbg with Featured Toaster -- 8.13 Versioning and Dynamic Binding -- Chapter 9 Programming Drivers for the Kernel Mode Driver Framework -- 9.1 Differences Between KMDF and WDM Samples -- 9.2 Macros Used in KMDF Samples -- 9.3 KMDF Driver Structure and Concepts -- 9.4 A Minimal KMDF Driver: The Simple Toaster -- 9.5 Sample Software-Only Driver -- Chapter 10 Programming Plug and Play and Power Management -- 10.1 Registering Callbacks -- 10.2 Managing Power Policy -- 10.3 Callbacks for Power-Up and Power-Down -- 10.4 Callback for Wake Signal Support -- Chapter 11 Programming WMI Support -- 11.1 WMI Architecture -- 11.2 Registering as a WMI Data Provider -- 11.3 Handling WMI Requests -- 11.4 WMI Requirements for WDM Drivers -- 11.5 WMI Class Names and Base Classes -- 11.6 Firing WMI Events -- 11.7 Troubleshooting Specific WMI Problems -- 11.8 Techniques for Testing WMI Driver Support -- 11.9 WMI Event Tracing -- Chapter 12 Programming KMDF Hardware Driver -- 12.1 Support Device Interrupts -- 12.2 Handling Interrupts -- 12.3 Mapping Resources…”
    Libro electrónico
  11. 4911
    Publicado 2012
    Tabla de Contenidos: “…3.7 Using the mikroC Pro for PIC Simulator3.7.1 Setting a Break-Point; 3.8 Other mikroC Pro for PIC Features; 3.8.1 View Statistics; 3.8.2 View Assembly; 3.8.3 ASCII Chart; 3.8.4 USART Terminal; 3.8.5 Seven Segment Editor; 3.8.6 Help; 3.9 Summary; Exercises; 4 PIC Microcontroller Development Tools - Including Display Development Tools; 4.1 PIC Hardware Development Boards; 4.1.1 Super Bundle Development Kit; 4.1.2 PIC18 Explorer Board; 4.1.3 PIC18F4XK20 Starter Kit; 4.1.4 PICDEM 4; 4.1.5 PIC16F887 Development Kit; 4.1.6 FUTURLEC PIC18F4550 Development Board; 4.1.7 EasyPIC6 Development Board…”
    Libro electrónico
  12. 4912
    por Watts, David
    Publicado 2004
    Tabla de Contenidos: “…Planning -- 3.1 System hardware -- 3.1.1 Processors -- 3.1.2 Memory -- 3.1.3 PCI-X slot configuration -- 3.1.4 Broadcom Gigabit Ethernet controller -- 3.2 Cabling and connectivity -- 3.2.1 SMP Expansion connectivity -- 3.2.2 Remote Expansion Enclosure connectivity -- 3.2.3 Remote Supervisor Adapter connectivity -- 3.2.4 Serial connectivity…”
    Libro electrónico
  13. 4913
    por Rashvand, Habib F.
    Publicado 2012
    Tabla de Contenidos: “…List of Figures xi -- List of Tables xxi -- Preface xxiii -- Acknowledgements xxvii -- List of Abbreviations xxix -- 1 Distributed Sensors 1 -- 1.1 Primary Objectives 1 -- 1.1.1 User-Based Category 2 -- 1.1.2 Sector-Based Category 5 -- 1.1.3 Primary Objectives 5 -- 1.2 Historical Development 8 -- 1.2.1 Sensing 8 -- 1.2.2 Historical Sensor Generations 8 -- 1.3 Trends and Technology 10 -- 1.3.1 Market Development Trends 10 -- 1.3.2 Technological Developments 12 -- 1.4 Distributed Intelligence 15 -- 1.4.1 Innovation 16 -- 1.4.2 Dis-Invention 19 -- 1.4.3 Intelligent Agent 19 -- 1.4.4 Deployment Factor 20 -- 1.4.5 Overlay Network 21 -- 1.4.6 Deployment Algorithm 21 -- 1.5 Classifying Application Areas 25 -- 1.5.1 Domain-Based Classification 26 -- 1.5.2 Mobility-Based Classification 26 -- 1.5.3 Intelligence-Based Classification 27 -- 2 Smart Sensing Devices 31 -- 2.1 Specification and Classification 31 -- 2.2 Elementary Sensing Circuits and Devices 36 -- 2.2.1 Elementary Electrical Sensors 37 -- 2.2.2 Low Energy Integration 39 -- 2.3 Actuator Interface Structures 41 -- 2.4 Physical Phenomena Sensing Devices 45 -- 2.4.1 Optical Sensors 45 -- 2.4.2 Image Sensing 46 -- 2.5 Biological and Chemical Phenomena Sensing Devices 48 -- 2.6 Other Sensors and Actuators 54 -- 3 Smart Sensing Architectures 59 -- 3.1 Smart Sensor Nodes 60 -- 3.1.1 Hardware 62 -- 3.1.2 Software 62 -- 3.2 Embedded Operating Systems 67 -- 3.3 Network Formation 70 -- 3.3.1 Node Placement 76 -- 3.4 Networking Protocols 77 -- 3.4.1 Location-Based Protocols 79 -- 3.4.2 Data-Centric Protocols 83 -- 3.4.3 Hierarchical Routing 86 -- 3.4.4 Mobility-Based Routing Protocols 90 -- 3.4.5 Other Routing Protocols 93 -- 3.5 Cross-Layer Optimisation 95 -- 3.6 Inference and Aggregation 99 -- 3.7 Case Study: Smart Camera Networks 103 -- 3.8 Case Study: Collaborative Beamforming 107 -- 4 Monitoring Well Being 115 -- 4.1 Measuring Health 116 -- 4.2 Managing Chronic Diseases 125 -- 4.3 Case Study: Smart Shirts 132 -- 4.4 Case Study: Geriatric Care 136.…”
    Libro electrónico
  14. 4914
    por Doll-Steinberg, Daniel
    Publicado 2023
    Tabla de Contenidos: “…Cover Page -- Title Page -- Copyright Page -- Contents -- Foreword -- Preface -- Tracking the Exponential -- A World Rebooting -- Introduction -- Where the World Is Now -- 2030: A New Future -- 1998: So Last Century -- Humans 2.0 -- Devices -- People Going Binary-Computers Going Quantum -- Part I Important Technologies You Cannot Ignore -- Chapter 1 Foundational Technologies -- Artificial Intelligence -- GPT -- Benefits of GPT -- Risks of GPT -- AI Foundation Models -- Other Key Players -- Quantum Computing -- Quantum Theory -- Quantum Computing -- Sources of Data -- Advanced Communications -- Wired -- Wireless -- Cellular -- Moving into the Future -- Satellite -- Key Takeaways -- Chapter 2 Enabling Technology -- Blockchain -- Blockchain Mechanisms -- Proof of Work -- Proof of Stake -- Proof of Assignment -- Mining -- Forking and 51 Percent Attacks -- The Future of the Blockchain -- Smart Contracts -- Decentralized Autonomous Organizations -- Tokenization -- Types of Tokens -- Functional Types and Uses of Tokens -- The Benefits of Tokenization -- Bitcoin and Cryptocurrency -- Structure -- Systemic Constraints -- User Constraints -- Other Cryptocurrencies -- The Future of the Cryptocurrency Industry -- Key Takeaways -- Chapter 3 Consumer-Facing Hardware Technologies -- Robotics -- Industrial Automation -- Additive Manufacturing (3D and 4D Printing) -- Internet of Things -- Virtual Reality and Augmented Reality -- Virtual Reality -- Augmented Reality -- Key Takeaways -- Chapter 4 Important Uses of Technologies You Cannot Ignore -- The Metaverse -- Energy -- Sourcing -- Solar -- Wind -- Geothermal -- Hydrogen Fuel Cells -- Nuclear Fission and Fusion -- Energy Storage -- Energy Transmission and Distribution -- Use of Frontier Technologies in the Up-Front Design and Planning of the Grid -- Use -- The Bioeconomy and Biodigital Convergence…”
    Libro electrónico
  15. 4915
    Publicado 2023
    Tabla de Contenidos: “…-- Different types of phishing attacks -- Statistics on the frequency of phishing attacks -- Challenges in detecting phishing emails -- Role of automated detection -- Augmenting existing techniques with natural language processing -- Introducing ELSER -- The role of ELSER in GenAI -- Introduction to the Enron email dataset (ham or spam) -- Seeing ELSER in action -- Hardware consideration -- Downloading the ELSER model in Elastic -- Setting up the index and ingestion pipeline -- Semantic search with ELSER -- Limitations of ELSER -- Summary -- Part 4: Innovative Integrations and Future Directions -- Chapter 9: Retrieval Augmented Generation with Elastic -- Preparing for RAG-enhanced search with ELSER and RRF -- Semantic search with ELSER -- A recap of essential considerations for RAG -- Integrating ELSER with RRF -- Language models and RAG -- In-depth case study-implementing a RAG-enhanced CookBot -- Dataset overview - an introduction to the Allrecipes.com dataset…”
    Libro electrónico
  16. 4916
    Publicado 2018
    Tabla de Contenidos: “…Solutions 130 Chapter 35: Opportunity Assessment Technique 131 Chapter 36: Customer Letter Technique 133 Chapter 37: Startup Canvas Technique 135 Breakout: The Biggest Risk 136 Discovery Planning Techniques 138 Chapter 38: Story Map Technique 139 Chapter 39: Customer Discovery Program Technique 141 Breakout: Defining Product/Market Fit 147 Chapter 40: Profile: Martina Lauchengco of Microsoft 148 Discovery Ideation Techniques 150 Chapter 41: Customer Interviews 151 Chapter 42: Concierge Test Technique 153 Chapter 43: The Power of Customer Misbehavior Technique 154 Breakout: The Power of Developer Misbehavior 156 Chapter 44: Hack Days 157 Discovery Prototyping Techniques 158 Chapter 45: Principles of Prototypes 160 Chapter 46: Feasibility Prototype Technique 161 Chapter 47: User Prototype Technique 163 Chapter 48: Live-Data Prototype Technique 165 Chapter 49: Hybrid Prototype Technique 167 Discovery Testing Techniques 168 Chapter 50: Testing Usability 169 Chapter 51: Testing Value 174 Chapter 52: Demand Testing Techniques 176 Breakout: Discovery Testing in Risk-Averse Companies 178 Chapter 53: Qualitative Value Testing Techniques 180 Chapter 54: Quantitative Value Testing Techniques 183 Breakout: The Role of Analytics 185 Breakout: Flying Blind 188 Chapter 55: Testing Feasibility 190 Breakout: Discovery for Hardware Products 192 Chapter 56: Testing Business Viability 193 Breakout: User Test vs. …”
    Libro electrónico
  17. 4917
    Publicado 2008
    Tabla de Contenidos: “…REFLEJOS POÉTICOS Y VOCES FEMENINAS EN HARDWARE DE JESSICA FREUDENTHAL -- TRANSPOSICIONES. …”
    Enlace del recurso
    Libro electrónico
  18. 4918
    Publicado 2021
    Tabla de Contenidos: “…3.1 Need for Automotive Secure Hardware -- 3.2 Different Types of HSMs -- 3.3 Root of Trust: Security Features Provided by Automotive HSM -- 3.3.1 Secure Boot -- 3.3.2 Secure In‐Vehicle Communication -- 3.3.3 Secure Host Flashing -- 3.3.4 Secure Debug Access -- 3.3.5 Secure Logging -- 3.4 Chapter Summary -- References -- Chapter 4 Need for Automated Security Solutions in the Automotive Software Development Lifecycle -- 4.1 Main Challenges in the Automotive Industry -- 4.2 Automated Security Solutions During the Product Development Phases -- 4.2.1 Static Code Analysis -- 4.2.2 Software Composition Analysis -- 4.2.3 Security Testing -- 4.2.4 Automation and Traceability During Software Development -- 4.3 Solutions During Operations and Maintenance Phases -- 4.3.1 Cybersecurity Monitoring, Vulnerability Management, Incident Response, and OTA Updates -- 4.4 Chapter Summary -- References -- Chapter 5 Static Code Analysis for Automotive Software -- 5.1 Introduction to MISRA and AUTOSAR Coding Guidelines -- 5.2 Problem Statement: MISRA and AUTOSAR Challenges -- 5.3 Solution: Workflow for Code Segmentation, Guideline Policies, and Deviation Management -- 5.3.1 Step 1: Segment the Codebase into Different Categories/Components Based on Risk -- 5.3.2 Step 2: Specify Guideline Policies (Set of Guidelines to Apply) Depending on Risk Categories -- 5.3.3 Step 3: Perform the Scan and Plan the Approach for Prioritization of Findings -- 5.3.4 Step 4: Prioritize Findings Based on the Risk Categories and Guideline Policies and Determine How to Handle Each Finding, e.g. …”
    Libro electrónico
  19. 4919
    Publicado 2018
    Tabla de Contenidos: “…Communication protocol -- 2.2. System hardware configuration -- 2.3. System software configuration -- 2.3.1. …”
    Libro electrónico
  20. 4920
    Publicado 2016
    Tabla de Contenidos: “…., safe failure fraction) -- (c) Predict the random hardware failures -- (d) Software (referred to as "program") -- (i) Requirements -- (ii) Software library modules -- (iii) Software design specification -- (iv) Code -- (v) Programming support tools…”
    Libro electrónico