Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Philosophy 3
- Security measures 2
- Technological innovations 2
- Alexander technique 1
- Application software 1
- Architecture 1
- Artaud, Antonin 1
- Automation 1
- BGP (Computer network protocol) 1
- C++ (Computer program language) 1
- Computer network architectures 1
- Computer networks 1
- Computer security 1
- Cooperating objects (Computer systems) 1
- Criticism and interpretation 1
- Development 1
- Eschatology, Jewish 1
- Estudio crítico 1
- French Literature 1
- Future life 1
- Health Policy 1
- Immortality 1
- JavaScript (Computer program language) 1
- Language Arts & Disciplines / Linguistics 1
- Language arts 1
- Languages & Literatures 1
- Local area networks (Computer networks) 1
- Medical policy 1
- Metafísica 1
- Mobile communication systems 1
-
1
-
2
-
3
-
4
-
5
-
6
-
7
-
8
-
9
-
10Publicado 2020Libro electrónico
-
11por Bronner, Leila LeahTabla de Contenidos: “…Early Post-Biblical Literature: Gateways to Heaven and Hell; 3. The Mishnah: Who Will Merit the World to Come?…”
Publicado 2011
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
12
-
13Publicado 2008“…Generalized transgression may lead to a theatre that belongs more to philosophy than to art itself…”
Libro electrónico -
14por Tuyen, Quang DaiTabla de Contenidos: “…Intro -- Acknowledgments -- Contents -- Abbreviations -- List of Figures -- List of Tables -- 1 Introduction-Jalan Nao -- Jalan Nao: A Personal Journey-Reflecting on My Experience with My Cham Community and Temples -- Exploring the Evolution of Issues in Living Heritage Conservation and Tourism Development: A Gateway -- Understanding Living Heritage: The Interplay Between Community, Culture, and Place -- The Basis Behind: Rationale -- The Role of the Researcher -- Organizing the Content: Navigating Through the Book's Framework -- References -- 2 The Cham Civilization and Its People-An Overview of Bhum Cham -- Introduction -- The Cham People and the Civilization of Champā -- Clarifying the Terminology: Understanding the Concept of Indigenous People in Different Contexts -- The Civilization of Champā -- Peoples and Languages of Champā -- Preserving the Legacy: Ancient Monuments of the Champā Civilization -- The Cham Community in Ninh Thuan Province -- The Geography of Ninh Thuan Province -- Champā in Ninh Thuan Province -- Cham Heritage in Ninh Thuan: Living Cultural Landscapes -- References -- 3 Cham Culture and Traditions: Understanding Their Worldview Through Custodianship and Philosophy -- Introduction -- Religion and Culture in Cham Society: A Deep-Rooted Connection -- Agricultural Management System in Traditional Cham Culture -- Management Systems in Relation to Religious Practices -- Philosophies and Traditions of the Cham Community -- Significance of Ahier and Awal Dualism in Representing Cham Unity -- Delve into the World of the Cham: Uncovering the Perception of Sacredness -- Understanding the Cham's Views on Dates, Timing, and Rituals -- Significance and Evolution of the Kate Festival -- Distinguishing Between Living and Dead Heritage Sites -- References -- 4 The Conservation of Cham Cultural Heritage in Vietnam -- Introduction…”
Publicado 2023
Libro electrónico -
15Publicado 2018Tabla de Contenidos: “…MQTT-SN architecture and topology -- Transparent and aggregating gateways -- Gateway advertisement and discovery -- Differences between MQTT and MQTT-SN -- Constrained Application Protocol -- CoAP architecture details -- CoAP Messaging Formats -- CoAP usage example -- Other protocols -- STOMP -- AMQP -- Protocol summary and comparison -- Summary -- Chapter 10: Cloud and Fog Topologies -- Cloud services model -- NaaS -- SaaS -- PaaS -- IaaS -- Public, private, and hybrid cloud -- Private cloud -- Public cloud -- Hybrid cloud -- The OpenStack cloud architecture -- Keystone - identity and service management -- Glance - image service -- Nova compute -- Swift - Object Storage -- Neutron - Networking services -- Cinder - Block Storage -- Horizon -- Heat - orchestration (optional) -- Ceilometer - telemetry (optional) -- Constraints of cloud architectures for IoT -- Latency effect -- Fog computing -- The Hadoop philosophy for Fog computing -- Fog Computing versus Edge Computing versus cloud computing -- OpenFog Reference Architecture -- Application services -- Application support -- Node management and software backplane -- Hardware virtualization -- OpenFog node security -- Network -- Accelerators -- Compute -- Storage -- Hardware platform infrastructure -- Protocol abstraction -- Sensors, actuators, and control systems -- Amazon Greengrass and Lambda -- Fog Topologies -- Summary -- Chapter 11: Data Analytics and Machine Learning in the Cloud and in the Fog -- Basic data analytics in IoT -- Top-level cloud pipeline -- Rules engines -- Ingestion - streaming, processing, and data lakes -- Complex event processing -- Lambda architecture -- Sector use cases -- Machine learning in IoT -- Machine learning models -- Classification -- Regression -- Random forest -- Bayesian models -- Convolutional Neural Networks -- First layer and filters…”
Libro electrónico -
16por Dooley, KevinTabla de Contenidos: “…Wireless; 4.8. Firewalls and Gateways; 4.9. Structured Cabling; 4.9.2. Vertical Cabling; 5. …”
Publicado 2002
Libro electrónico -
17Publicado 2021Tabla de Contenidos: “…The network is homogeneous -- CAP theorem and eventual consistency -- Sagas and compensating transactions -- Choreography-based sagas -- Orchestration-based sagas -- Making your system fault tolerant and available -- Calculating your system's availability -- Building fault-tolerant systems -- Redundancy -- Leader election -- Consensus -- Replication -- Master-slave replication -- Multi-master replication -- Queue-based load leveling -- Back pressure -- Detecting faults -- Sidecar design pattern -- Heartbeat mechanism -- Leaky bucket counter -- Minimizing the impact of faults -- Retrying the call -- Avoiding cascading failures -- Circuit breaker -- Bulkhead -- Geodes -- Integrating your system -- Pipes and filters pattern -- Competing consumers -- Transitioning from legacy systems -- Anti-corruption layer -- Strangler pattern -- Achieving performance at scale -- CQRS and event sourcing -- Command-query responsibility segregation -- Command-query separation -- Event sourcing -- Caching -- Updating caches -- Write-through approach -- Write-behind approach -- Cache-aside -- Deploying your system -- The sidecar pattern -- Deploying a service with tracing and a reverse proxy using Envoy -- Zero-downtime deployments -- Blue-green deployments -- Canary releases -- External configuration store -- Managing your APIs -- API gateways -- Summary -- Questions -- Further reading -- Chapter 5: Leveraging C++ Language Features -- Technical requirements -- Designing great APIs -- Leveraging RAII -- Specifying the interfaces of containers in C++ -- Using pointers in interfaces -- Specifying preconditions and postconditions -- Leveraging inline namespaces -- Leveraging std::optional -- Optional function parameters -- Optional function return values -- Optional class members -- Writing declarative code -- Showcasing a featured items gallery -- Introducing standard ranges…”
Libro electrónico -
18Publicado 2017Tabla de Contenidos: “…-- Service-Oriented Architectures -- 4-Tiers and microservices -- Deploying microservices -- Microservices with Seneca -- Serverless applications -- AWS Lambda -- Scaling with Claudia and API Gateway -- Installing claudia and deploying a service -- Containerized microservices -- Getting started with Docker -- Creating a Dockerfile -- Running containers -- Orchestrating Containers with Kubernetes -- Creating a basic Kubernetes cluster -- Declaring Pod deployments -- Summary -- Chapter 10: Testing Your Application -- Why testing is important -- Unit tests -- Functional tests -- Integration tests -- Native Node testing and debugging tools -- Writing to the console -- Formatting console output -- The util.format(format, [arg, arg...]) method -- The util.inspect(object, [options]) method -- The Node debugger -- The assert module -- Sandboxing -- Distinguishing between local scope and execution context -- Using compiled contexts -- Testing with Mocha, Chai, and Sinon -- Mocha -- Chai -- Sinon -- Spies…”
Libro electrónico -
19Publicado 2019Tabla de Contenidos: “…2.4.4 Z-BRE4K General Architecture Information Workflow -- 2.4.5 Z-BRE4K General Architecture Component Distribution -- 2.5 Conclusions -- References -- Chapter 3 - Reference Architecture for Factory Automation using Edge Computing and Blockchain Technologies -- 3.1 FAR-EDGE Project Background -- 3.2 FAR-EDGE Vision and Positioning -- 3.3 State of the Art in Reference Architectures -- 3.3.1 Generic Reference Architectures -- 3.3.2 RAMI 4.0 -- 3.3.3 IIRA -- 3.3.4 OpenFog RA -- 3.4 FAR-EDGE Reference Architecture -- 3.4.1 Functional Viewpoint -- 3.4.1.1 Automation domain -- 3.4.1.2 Analytics domain -- 3.4.1.3 Simulation domain -- 3.4.1.4 Crosscutting functions -- 3.4.2 Structural Viewpoint -- 3.4.2.1 Field Tier -- 3.4.2.2 Gateway Tier -- 3.4.2.3 Ledger Tier -- 3.4.2.4 Cloud Tier -- 3.5 Key Enabling Technologies for Decentralization -- 3.5.1 Blockchain Issues -- 3.5.2 Permissioned Blockchains -- 3.5.3 The FAR-EDGE Ledger Tier -- 3.5.4 Validation use Cases -- 3.6 Conclusions -- References -- Chapter 4 - IEC-61499 Distributed Automation for the Next Generation of Manufacturing Systems -- 4.1 Introduction -- 4.2 Transition towards the Digital Manufacturing Paradigm: A Need of the Market -- 4.3 Reasons for a New Engineering Paradigm in Automation -- 4.3.1 Distribution of Intelligence is Useless without Appropriate Orchestration Mechanisms -- 4.3.2 Defiance of Rigid Hierarchical Levels towards the Full Virtualization of the Automation Pyramid -- 4.4 IEC-61499 Approach to Cyber-Physical Systems -- 4.4.1 IEC-61499 runtime -- 4.4.2 Functional Interfaces -- 4.4.2.1 IEC-61499 interface -- 4.4.2.2 Wireless interface -- 4.4.2.3 Wrapping interface -- 4.4.2.4 Service-oriented interface -- 4.4.2.5 Fieldbus interface(s) -- 4.4.2.6 Local I/O interface -- 4.5 The "CPS-izer", a Transitional Path towards Full Adoption of IEC-61499 -- 4.6 Conclusions -- References…”
Libro electrónico -
20Publicado 2018Tabla de Contenidos: “…9.3.3 Policy Architecture 208 -- 9.3.4 CES Security Mechanisms 209 -- 9.3.5 Realm Gateway 210 -- 9.3.6 RGW Security Mechanisms 211 -- 9.3.6.1 Name Server Classification and Allocation Model 212 -- 9.3.6.2 Preventing DNS Abuse 212 -- 9.3.6.3 Bot?]…”
Libro electrónico