Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Information Technology 1,261
- Computer Science (Hardware & Networks) 1,254
- Engineering & Applied Sciences 420
- Computer Science 293
- Operating systems (Computers) 292
- Computer networks 279
- Programming 214
- Application software 182
- Development 173
- Computer security 168
- Security measures 163
- Examinations 162
- Linux 160
- Certification 153
- Computer input-output equipment 142
- Database management 137
- Electronic data processing personnel 124
- Management 120
- Computers 115
- Electrical & Computer Engineering 114
- Electronic data processing 112
- Embedded computer systems 111
- Microcomputers 111
- Microsoft Windows (Computer file) 111
- Data processing 110
- Hardware and Maker 107
- Artificial intelligence 104
- Design and construction 102
- Cloud computing 100
- Client/server computing 98
-
4961Publicado 2010Tabla de Contenidos: “…The requirements for physical mobility -- Wireless communication -- Mobility -- Portability -- Overview of IPv4 and IPv6 -- IPv4 -- IPv6 -- Mobile IP -- Goals of mobile IP -- Applicability -- Mobility support in IPv4 -- Mobility support in IPv6 -- Cellular IP -- The cellular IP access network -- Routing and paging cache -- TCP for mobility -- Indirect TCP -- Snooping TCP -- Mobile TCP -- Mobile databases -- Design issues -- Problems in mobile databases -- Commercially available systems -- The CODA file system-A case study -- Cache manager Venus -- Venus states -- Design criteria -- Summary -- Problems -- Multiple-choice questions -- Further reading -- Mobile Ad Hoc Networks -- MANET characteristics -- Classification of MANETs -- Technologies for ad hoc networks -- Routing in MANETs -- Traditional routing protocols -- Requirements for routing protocols -- Classification of routing protocols -- Proactive routing protocols-The DSDV protocol -- Example of DSDV operation -- Reactive routing protocols -- Dynamic source routing -- Route discovery in DSR -- Route maintenance in DSR -- Route cache in DSR -- Adaptive on-demand distance vector protocol -- Route discovery in AODV -- Route maintenance in AODV -- Comparison between DSR and AODV -- Summary -- Problems -- Multiple-choice questions -- Further reading -- Wireless Sensor Networks -- Applications of wireless sensor networks -- Differences from mobile ad hoc networks -- Design issues -- WSN architecture -- Sensor hardware components -- WSN communications architecture -- Routing protocols for WSN -- Data-centric protocols -- Flooding and gossiping -- Sensor protocols for information via negotiation -- Hierarchical protocols -- Low-energy adaptive clustering hierarchy -- PEGASIS -- TEEN and APTEEN -- Location-based protocols -- Case study -- The MICA mote -- TinyOS -- Development work in WSN -- Summary…”
Libro electrónico -
4962Publicado 2023Tabla de Contenidos: “…-- Mounting and unmounting filesystems -- How to unmount the filesystem -- Pseudo-filesystems -- Processes -- Kernel and system information -- CPU usage -- Summary -- Chapter 4: Processes and Process Control -- Executables versus processes -- Process termination and exit codes -- Exit codes -- Signals -- The kill command -- The process tree -- Process search and monitoring -- The ps command -- Process monitoring tools -- The /proc filesystem -- Summary -- Chapter 5: Hardware Discovery -- Discovering CPU model and features -- Feature discovery on different platforms -- The /proc/cpuinfo file -- Multi-processor systems -- High-level CPU discovery utilities -- Memory discovery -- Discovering PCI devices -- Discovering USB devices -- Discovering storage devices -- High-level discovery tools -- dmidecode -- lshw -- Summary…”
Libro electrónico -
4963Publicado 2011Tabla de Contenidos: “…. -- E-paper, LED, OLED, and the strategic positioning of hardware vendors and publishers: what it means to libraries / Stephen Patton. -- From my library to our library: changing a culture in tough times / Robert Alan, Lisa German. -- The "Get It" department: Oregon State University's strategic realignment of collection services / Faye A. …”
Libro electrónico -
4964por Medina Serrano, SantiagoTabla de Contenidos: “…SQL Server 2014: soluciones prácticas de administración -- Página legal -- índice -- Introducción -- 1 Configuración e Instalación -- 1.1 Infraestructura -- 1.2 V ersiones de SQL Server -- 1.3 R equisitos de Hardware y Software -- 1.4 T ecnologías que incluye Microsoft -- 1.5 Cuentas de Servicio -- 1.6 Modos de Autenticación -- 1.7 Las Instancias -- 1.8 Instalar SQL Server 2014 en un controlador -- 1.9 E jercicio Práctico -- 1.10 E jercicio práctico -- 1.11 E jercicio Práctico -- 1.12 Ac tualizar de una edición anterior -- 1.13 E jercicio Práctico -- 1.14 E jercicio Práctico -- 1.15 E jercicio Práctico -- 1.16 Instalación de Microsoft -- 1.18 E jercicio Práctico -- 1.19 E jercicio Práctico -- 1.20 E jercicio Práctico: Acceder remotamente -- 1.21 SQL Server Management -- 2 Creación y Configuración de una -- 2.1 Infraestructura -- 2.2 B ases de datos de servicio -- 2.3 A rchivos y grupos de archivos -- 2.4 El registro -- 2.5 Cálculo del tamaño de una base de datos -- 2.6 As pectos a tener en cuenta en la creación -- 2.7 E jercicio Práctico -- 2.8 Creación de bases de datos -- 2.9 E jercicio Práctico -- 2.10 O pciones de configuración -- 2.11 Los Esquemas -- 2.12 E jercicio Práctico -- 2.13 La resolución -- 2.14 Instalar la base de ejemplo -- 2.15 Ad juntar la base de ejemplo NorthWind con -- 2.16 Las instantáneas -- 2.17 E jercicio Práctico -- 2.18 O btención de metadatos -- 2.19 E jercicio Práctico -- 2.20 E jercicio Práctico -- 2.21 E jercicio Práctico -- 2.22 Es tados de la base de datos -- 2.23 Modificación de una base de datos -- 2.24 Elimin ar una base de datos -- 2.25 E jercicio Práctico -- 2.26 E jercicio Práctico -- 2.27 E jercicio Práctico -- 3 Tablas -- 3.1 Infraestructura -- 3.2 Ti pos de datos -- 3.3 Ti pos de datos -- 3.4 Ti pos de datos personalizados -- 3.5 E jercicio Práctico -- 3.6 Columnas calculadas…”
Publicado 2015
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
4965por Utrillas Gómez, CésarTabla de Contenidos: “….) -- 8.1.2 CABLEADO Y CONFIGURACIÓN HARDWARE -- 8.1.3 TIPOS DE DATOS -- 8.1.4 PROGRAMACIÓN, TRANSFERENCIA Y USO -- 8.2 ENTRADAS ANALÓGICAS. …”
Publicado 2018
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
4966Publicado 2020Tabla de Contenidos: “…7 From syscall-level to hardware-level interactions…”
Libro electrónico -
4967Publicado 2017Tabla de Contenidos: “…-- HIDDEN PARTITIONS -- Hidden Partitions Under Windows® OS -- Creating a Hidden Partition Within a USB Zip Drive -- Uncovering Hidden Partitions -- DATA HIDING WITHIN MASTER FILE TABLE -- DATA HIDING IN DISK BAD BLOCKS -- DATA HIDING UNDER COMPUTER HARDWARE LEVEL -- Data Hiding Inside Host Protected Area -- How Does Host Protected Area Work? …”
Libro electrónico -
4968Publicado 2017“…Some experience with hardware and Embedded Systems is assumed, as is having done some previous work on GNU/Linux systems. …”
Libro electrónico -
4969Publicado 2018“…., Hadoop), and without expensive hardware (e.g., supercomputers). The core of every algorithm described in the book can be implemented in a few lines of code using just about any popular programming language (Python snippets are provided). …”
Libro electrónico -
4970Publicado 2018Tabla de Contenidos: “…Reed and Prince screwdriver -- Files -- Hacksaw -- Lineman pliers -- Torpedo level -- Crosscut saw -- Circular saw and blades -- Drill bits -- Matt knife -- Tape measure -- Reel tape measure -- Claw hammer -- Personal tools -- Personal tool belt -- Everyday basic tools for a grip's personal toolbox -- Power tools -- Useful items to also carry -- Recommended personal gear -- Clothing and items for location -- Personal electronic equipment (a must) -- 6 Filters and gels -- Fluorescent light filters -- Tungsten conversion filters -- Neutral density filters -- Daylight conversion filters -- 7 The rental house -- Day 1 -- 8 Techniques for mounting the camera -- Speed-Rail® tubing and fittings -- Power grip or super grip (mounting technique) -- Camera clamp -- Mini-slider SR-71 dolly (mounting technique) -- Slider -- Truss system -- 9 Cables, slings, and hardware -- Miniature cable -- Wire rope -- Wires -- Strands -- Core -- Spreader beams -- Sling types -- Dynafor MWX miniweigher -- Glossary of cables and slings -- Staging systems -- Ferrellels -- Steel deck -- 10 Lifts -- Condors and cherry-pickers -- Scissors lifts -- Suppliers -- Additional equipment -- 11 Cranes, jibs, arms, dollies, and heads -- Cranes and communication systems -- Spotting the post -- Motorized cranes -- 12 Cranes mounted on wheeled bases -- 13 Lenny arms -- 14 Cablecams -- General information -- Cable cam motion control system -- 15 Dollies -- Doorway dolly -- Western dolly -- Tube dolly -- Fisher #11 crab dolly -- Features -- Standard accessories -- Optional accessories -- Fisher #10 crab dolly -- Standard accessories -- Optional accessories -- Fisher #9 crab dolly -- Features -- Standard accessories -- Optional accessories -- Chapman Pedolly -- Chapman Peewee -- Chapman Super Peewee IV -- Chapman Hustler -- Chapman Hustler II -- Chapman Hustler III -- Chapman Hybrid…”
Libro electrónico -
4971Publicado 2011Tabla de Contenidos: “…Cover -- Table of Contents -- Introduction -- Part I: Planning for and Deploying SharePoint Server 2010 -- 1 Introducing SharePoint 2010 -- Understanding the Capabilities of SharePoint 2010 -- Using SharePoint for Collaboration and Document Management -- Outlining Improvements in SharePoint 2010 -- Securing SharePoint 2010 with New Security Enhancements -- Leveraging Metadata and Content Types -- Social Networking Tool Advances -- Working with Office Web Apps -- Creating Powerful and Flexible Workflows -- Developing Applications Using Visual Studio -- Leveraging Business Intelligence Tools in SharePoint 2010 -- Governing the SharePoint Environment -- Summary -- Best Practices -- 2 Architecting a SharePoint 2010 Deployment -- Understanding the SharePoint Server Roles -- Understanding the Reasons for Deploying Multiple Farms -- Choosing the Right Hardware for SharePoint -- Determining Optimal Operating System Configuration -- Planning for Database and Additional Software -- Examining Real-World SharePoint 2010 Deployments -- Addressing Common Business Issues with SharePoint Features -- Deploying a Team Collaboration Solution with SharePoint -- Deploying a Corporate Intranet Solution with SharePoint -- Deploying a Customer Extranet Solution with SharePoint -- Summary -- Best Practices -- 3 Installing a Simple SharePoint Server 2010 Farm -- Examining SharePoint Installation Prerequisites -- Installing the SharePoint Server Operating System -- Installing SQL Server 2008 R2 -- Installing Microsoft SharePoint Server 2010 -- Summary -- Best Practices -- 4 Advanced SharePoint 2010 Installation and Scalability -- Creating an Installation Checklist -- Installing SharePoint 2010 Using PowerShell -- Understanding Scalability for SharePoint -- Scaling Logical SharePoint Components -- Summary -- Best Practices…”
Libro electrónico -
4972por Redmond, Tony, 1959-Tabla de Contenidos: “…Intro -- Coding Faster: Getting More Productive with Microsoft® Visual Studio® -- Table of Contents -- Dedication -- Foreword -- Introduction -- Who Should Read This Book -- Assumptions -- Organization of This Book -- Finding Your Best Starting Point in This Book -- Conventions and Features in This Book -- Keyboard Settings -- Summary Information -- Additional Information -- System Requirements -- Software Requirements -- Supported Architectures: -- Hardware Requirements -- Acknowledgments -- Errata & -- Book Support -- We Want to Hear from You -- Stay in Touch -- I. …”
Publicado 2013
Libro electrónico -
4973por Larson, BrianTabla de Contenidos: “…The Server Installation -- The Report Author Installation -- The Distributed Installation -- The Scale-Out Installation -- SharePoint Integrated Mode Installation -- Installation Requirements -- Hardware Requirements -- Software Requirements -- Other Installation Considerations -- Distributed Installation and Scale-Out Installation Considerations -- SharePoint Integrated Mode Considerations -- Database Server Considerations -- E-mail (SMTP) Server -- Encrypting Reporting Services Information -- Login Accounts -- Running the SQL Server Installation Program -- The Installation Process -- The SQL Server 2012 Installation -- Preliminaries -- The Feature Selection Page -- Instance Configuration Page -- Server Configuration Page -- The Reporting Services Configuration Page -- Completing the SQL Server Installation Wizard -- The Reporting Services Configuration Manager -- Server Status Page -- Service Account Page -- Web Service URL Page -- Report Server Database Page -- Report Manager URL Page -- E-mail Settings Page -- Execution Account Page -- Encryption Keys Page -- Scale-out Deployment Page -- Menu Bar -- Completing a Reporting Services SharePoint Integrated Mode Installation -- Creating a Reporting Services Service Application -- Making the Service Application Part of the Default Application Proxy Group -- Starting the Reporting Services Service Application -- Common Installation Issues -- Administrative Rights -- Server Components Not Shown on the Feature Selection Screen -- Installation Error 2755 -- Reporting Services and IIS on the Same Server -- The Repair Utility and Installation Log File -- Spending Some Time in Basic Training -- Part II: Report Authoring -- Chapter 3: DB 101: Database Basics -- Database Structure -- Getting Organized -- Tables, Rows, and Columns -- Primary Key -- Normalization -- Relations -- Cardinality of Relations…”
Publicado 2012
Libro electrónico -
4974Publicado 2005“…In 1978 IBM introduced the System/38 as part of its midrange platform hardware base. One of the many outstanding features of this system was the built-in Relational Database Management System (RDMS) support. …”
Libro electrónico -
4975por Jasperneite, JürgenTabla de Contenidos: “…Intro -- Preface -- Organisation -- Communication in Automation - KommA 2020 -- Conference Chairs -- Program Committee -- Organising Committee -- Organisation -- Image Processing in Automation - BVAu 2020 -- Conference Chair -- Program Committee -- Inhaltsverzeichnis -- Contributors -- Part I Communication in Automation -- A Remote Attack Tool Against Siemens S7-300 Controllers: A Practical Report -- 1 Introduction -- 2 Related Work -- 3 Experimental Set-up -- 3.1 The Physical Process to Be Controlled -- 3.2 Hardware Equipment -- 3.3 Attacker Model and Attack Surface -- 4 Attack Details, Implementation and Results -- 4.1 Reconnaissance Attack -- 4.2 Scanning the PLC In-depth -- 4.3 Authentication Bypass Attack -- 4.4 Replay Attacks -- 4.4.1 Set/Update the password of PLCs -- 4.4.2 Clear PLC's Memory Blocks -- 4.4.3 Start/Stop the PLC -- 4.5 Control Hijacking Attack -- 5 Possible Mitigation Solutions -- 6 Conclusion and Future Work -- References -- Konzept und Implementierung einer kommunikationsgetriebenen Verwaltungsschale auf effizienten Geräten in Industrie 4.0 Kommunikationssystemen -- 1 Einleitung -- 2 Industrieller Use Case -- 3 Stand der Technik -- 3.1 Time-sensitive Networking -- 3.2 OPC UA -- 4 Related Work -- 4.1 Administration Shell -- 4.2 OPC UA und TSN -- 5 Konzept und Implementierung -- 5.1 Konzept Communication Administration Shell -- 5.2 Implementierung der CAS und Datenservices für Produktionsgeräte -- 5.3 Integration in industriellen Use Case -- 6 Validierung -- 7 Fazit -- Literatur -- Device Management in Industrial IoT -- 1 Introduction -- 2 Aufgaben von und Anforderungen an IoT Gerätemanagement -- 2.1 Gruppe 1: Bereitstellung und Registrierung -- 2.2 Gruppe 2: Konfiguration und Steuerung -- 2.3 Gruppe 3: Aktualisierung und Wartung -- 2.4 Gruppe 4: Monitoring und Diagnose -- 2.5 Gruppe 5: Hilfsfunktionen…”
Publicado 2022
Libro electrónico -
4976por Stroustrup, BjarneTabla de Contenidos: “…-- 1.3 Funktionen -- 1.4 Typen, Variablen und Arithmetik -- 1.4.1 Rechenoperatoren -- 1.4.2 Initialisierung -- 1.5 Gültigkeitsbereich und Lebensdauer -- 1.6 Konstanten -- 1.7 Zeiger, Arrays und Referenzen -- 1.7.1 Der Null-Pointer -- 1.8 Bedingungen prüfen -- 1.9 Auf Hardware abbilden -- 1.9.1 Zuweisung -- 1.9.2 Initialisierung -- 1.10 Ratschläge -- Kapitel 2: Benutzerdefinierte Typen -- 2.1 Einführung -- 2.2 Strukturen -- 2.3 Klassen -- 2.4 Aufzählungen -- 2.5 Unions -- 2.6 Ratschläge -- Kapitel 3: Modularität -- 3.1 Einführung -- 3.2 Separates Kompilieren -- 3.2.1 Header-Dateien -- 3.2.2 Module -- 3.3 Namensräume -- 3.4 Funktionsargumente und Rückgabewerte -- 3.4.1 Argumentübergabe -- 3.4.2 Werterückgabe -- 3.4.3 Rückgabetyp ableiten -- 3.4.4 Suffix-Rückgabetyp -- 3.4.5 Strukturierte Bindung -- 3.5 Ratschläge -- Kapitel 4: Fehlerbehandlung -- 4.1 Einführung -- 4.2 Exceptions -- 4.3 Invarianten -- 4.4 Alternativen für die Fehlerbehandlung -- 4.5 Assertions -- 4.5.1 assert() -- 4.5.2 Statische Assertionen -- 4.5.3 noexcept -- 4.6 Ratschläge -- Kapitel 5: Klassen -- 5.1 Einführung -- 5.1.1 Klassen -- 5.2 Konkrete Typen -- 5.2.1 Ein arithmetischer Typ -- 5.2.2 Ein Container -- 5.2.3 Container initialisieren -- 5.3 Abstrakte Typen -- 5.4 Virtuelle Funktionen -- 5.5 Klassenhierarchien -- 5.5.1 Vorteile von Hierarchien -- 5.5.2 Die Navigation in einer Hierarchie -- 5.5.3 Ressourcenlecks vermeiden -- 5.6 Ratschläge -- Kapitel 6: Notwendige Operationen -- 6.1 Einführung -- 6.1.1 Notwendige Operationen -- 6.1.2 Konvertierungen -- 6.1.3 Member-Initialisierer -- 6.2 Kopieren und Verschieben -- 6.2.1 Container kopieren -- 6.2.2 Container verschieben…”
Publicado 2023
Libro electrónico -
4977por Kamthane, Ashok N.Tabla de Contenidos: “…Cover -- Contents -- Preface -- Acknowledgements -- About the Author -- Roadmap to the Syllabus -- Chapter 1: Introduction to Data Structures -- 1.1 Introduction -- 1.2 Data and Information -- 1.3 Overview of Data Structures -- 1.4 Types of Data Structures -- 1.5 Primitive and Non-primitive Data Structures and Operations -- 1.5.1 Primitive Data Structures -- 1.5.2 Non-primitive Data Structures -- 1.6 Binary and Decimal Integers -- 1.6.1 One's Complement -- 1.6.2 Two's Complement -- 1.6.3 Binary Coded Decimals -- 1.6.4 Integers -- 1.6.5 Real Numbers -- 1.6.6 Character String -- 1.7 Logical Information -- 1.8 Storage of Information -- 1.9 Hardware and Software -- 1.10 Concept of Data Types -- 1.11 Data Types in C -- 1.12 Abstract Data Types -- 1.13 Pointers -- 1.13.1 Computed Address -- 1.13.2 Pointer Addressing -- 1.14 Structures in C -- 1.15 Unions -- 1.16 Algorithms -- 1.16.1 Analysing Algorithm -- 1.16.2 Rate of Growth -- 1.16.3 Space Requirement -- 1.16.4 Time Requirement -- Summary -- Exercises -- Chapter 2: Data Structures: Arrays -- 2.1 Introduction -- 2.1.1 Array Declaration and Initialization -- 2.1.2 Array Terminology -- 2.2 Characterstics of Arrays -- 2.3 One-dimensional Arrays -- 2.4 Operation with Arrays -- 2.4.1 Deletion -- 2.4.2 Insertion -- 2.4.3 Searching -- 2.4.4 Merging -- 2.4.5 Sorting -- 2.5 Two-dimensional Arrays -- 2.5.1 Insert Operation with Two-dimensional Array -- 2.5.2 Delete Operation with Two-dimensional Array -- 2.6 Three-or Multi-dimensional Arrays -- 2.7 Strings -- 2.8 Array of Structures -- 2.9 Drawbacks of Linear Arrays -- 2.10 Sparse Matrices and Dense Matrices -- 2.10.1 Upper Triangular Matrices -- 2.10.2 Lower Triangular Matrices -- 2.11 Row-major Arrays -- 2.12 Column-major Arrays -- 2.13 Pointers and Arrays -- 2.14 Pointers and Two-dimensional Arrays -- 2.15 Array of Pointers -- 2.16 Pointers and Strings…”
Publicado 2011
Libro electrónico -
4978Publicado 2024Tabla de Contenidos: “…Training models on any hardware using PyTorch Lightning…”
Libro electrónico -
4979por Guerra Soto, MarioTabla de Contenidos: “….) -- 14 DIAGNÓSTICO DE AVERÍAS EN LA RED -- 14.1 ACOTAR EL PROBLEMA -- 14.1.1 INDICADORES LUMINOSOS -- 14.1.2 ERRORES HARDWARE Y ERRORES SOFTWARE -- 14.1.3 CONEXIÓN A SERVICIOS DE RED -- 14.1.4 PROBLEMAS CON EL CABLEADO -- 14.1.5 PROBLEMAS CON LAS CONEXIONES INALÁMBRICAS -- 14.2 PROCEDIMIENTO DE RESOLUCIÓN DE AVERÍAS 14.2.1 -- 14.2.1 IDENTIFICACIÓN DEL PROBLEMA -- 14.2.2 ESTABLECER UNA TEORÍA DE CAUSA PROBABLE -- 14.2.3 COMPROBAR LA TEORÍA PARA DETERMINAR LA CAUSA -- 14.2.4 ESTABLECER UN PLAN DE ACCIÓN PARA RESOLVER (...) -- 14.2.5 IMPLEMENTAR LA SOLUCIÓN O ESCALAR EN CASO NECESARIO -- 14.2.6 VERIFICAR EL FUNCIONAMIENTO COMPLETO (...) -- 15 MONITORIZACIÓN -- 15.1 INTRODUCCIÓN -- 15.2 SNMP -- 15.3 HERRAMIENTAS DE MONITORIZACIÓN -- 15.3.1 CAPTURADOR DE PAQUETES -- 15.3.2 ANALIZADOR DE PAQUETES -- 15.3.3 MONITORIZACIÓN DEL FLUJO DE PAQUETES -- 15.3.4 MONITOR DE INTERFAZ -- 15.3.5 MONITOR DE RENDIMIENTO -- 15.3.6 REGISTROS Y GESTIÓN DE REGISTROS -- 15.3.7 SIEM -- 16 HERRAMIENTAS DE RESOLUCIÓN DE INCIDENTES EN LA RED -- 16.1 INTRODUCCIÓN -- 16.2 HERRAMIENTAS HARDWARE -- 16.2.1 COMPROBADORES DE CABLE, TDR Y OTDR -- 16.2.2 CERTIFICADORES -- 16.2.3 MEDIDOR DE POTENCIA ÓPTICA -- 16.2.4 GRABADORA DE EVENTOS DE TENSIÓN/MONITOR DE TEMPERATURA -- 16.2.5 ANALIZADORES DE PROTOCOLO -- 16.2.6 BUTT SETS -- 16.2.8 HERRAMIENTAS DE PUNCH DOWN…”
Publicado 2016
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
4980Publicado 2023Tabla de Contenidos: “…2.6.1 IT Support -- 2.7 I4.0 in Functional Field -- 2.7.1 I4.0 Logistics -- 2.7.2 Resource Planning -- 2.7.3 Systems for Warehouse Management -- 2.7.4 Transportation Management Systems -- 2.7.5 Transportation Systems with Intelligence -- 2.7.6 Information Security -- 2.8 Existing Technology in I4.0 -- 2.8.1 Applications of I4.0 in Existing Industries -- 2.8.2 Additive Manufacturing (AM) -- 2.8.3 Intelligent Machines -- 2.8.4 Robots that are Self-Aware -- 2.8.5 Materials that are Smart -- 2.8.6 IoT -- 2.8.7 The Internet of Things in Industry (IIoT) -- 2.8.8 Sensors that are Smart -- 2.8.9 System Using a Smart Programmable Logic Controller (PLC) -- 2.8.10 Software -- 2.8.11 Augmented Reality (AR)/Virtual Reality (VR) -- 2.8.12 Gateway for the Internet of Things -- 2.8.13 Cloud -- 2.8.14 Applications of Additive Manufacturing in I4.0 -- 2.8.15 Artificial Intelligence (AI) -- 2.9 Applications in Current Industries -- 2.9.1 I4.0 in Logistics -- 2.9.2 I4.0 in Manufacturing Operation -- 2.10 Future Scope of Research -- 2.10.1 Theoretical Framework of I4.0 -- 2.11 Discussion and Implications -- 2.11.1 Hosting: Microsoft -- 2.11.2 Platform for the Internet of Things (IoT): Microsoft, GE, PTC, and Siemens -- 2.11.3 A Systematic Computational Analysis -- 2.11.4 Festo Proximity Sensor -- 2.11.5 Connectivity Hardware: HMS -- 2.11.6 IT Security: Claroty -- 2.11.7 Accenture Is a Systems Integrator -- 2.11.8 Additive Manufacturing: General Electric -- 2.11.9 Augmented and Virtual Reality: Upskill -- 2.11.10 ABB Collaborative Robots -- 2.11.11 Connected Vision System: Cognex -- 2.11.12 Drones/UAVs: PINC -- 2.11.13 Self-Driving in Vehicles: Clear Path Robotics -- 2.12 Conclusion -- References -- Chapter 3 Interaction of Internet of Things and Sensors for Machining -- 3.1 Introduction -- 3.2 Various Sensors Involved in Machining Process -- 3.2.1 Direct Method Sensors…”
Libro electrónico