Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 551
- Computer networks 496
- Cloud computing 484
- Application software 478
- Management 457
- Engineering & Applied Sciences 381
- Security measures 363
- Taxation 355
- Examinations 283
- Database management 281
- Computer security 268
- Data processing 248
- Economic conditions 245
- Computer Science 243
- Historia 241
- Operating systems (Computers) 240
- Law and legislation 239
- Computer programs 215
- Certification 201
- Computer software 184
- Information technology 175
- Politics and government 171
- Electronic data processing personnel 168
- Artificial intelligence 167
- Medicine 161
- History 158
- Technology: general issues 154
- Ecology 153
- Economic history 143
- Linux 140
-
7381Publicado 2023Tabla de Contenidos: “…Tool Demos -- EVA: a Tool for the Compositional Verification of AUTOSAR Models -- WASIM: A Word-level Abstract Symbolic Simulation Framework for Hardware Formal Verification -- Multiparty Session Typing in Java, Deductively -- PyLTA: A Verification Tool for Parameterized Distributed Algorithms -- FuzzBtor2: A Random Generator of Word-Level Model Checking Problems in Btor2 Format -- Eclipse ESCETTM: The Eclipse Supervisory Control Engineering Toolkit -- Combinatorial Optimization/Theorem Proving -- New Core-Guided and Hitting Set Algorithms for Multi-Objective Combinatorial Optimization -- Verified reductions for optimization -- Specifying and Verifying Higher-order Rust Iterators -- Extending a High-Performance Prover to Higher-Order Logic -- Tools (Regular Papers) -- The WhyRel Prototype for Relational Verification of Pointer Programs -- Bridging Hardware and Software Analysis with Btor2C: A Word-Level-Circuit-to-C Converter -- CoPTIC: Constraint Programming Translated Into C -- Acacia-Bonsai: A Modern Implementation of Downset-Based LTL Realizability -- Synthesis -- Computing Adequately Permissive Assumptions for Synthesis -- Verification-guided Programmatic Controller Synthesis -- Taming Large Bounds in Synthesis from Bounded-Liveness Specifications -- Lockstep Composition for Unbalanced Loops -- Synthesis of Distributed Agreement-Based Systems with Effciently Decidable Verification -- LTL Reactive Synthesis with a Few Hints -- Timed Automata Verification and Synthesis via Finite Automata Learning -- Graphs/Probabilistic Systems -- A Truly Symbolic Linear-Time Algorithm for SCC Decomposition -- Transforming quantified Boolean formulas using biclique covers -- Certificates for Probabilistic Pushdown Automata via Optimistic Value Iteration -- Probabilistic Program Verification via Inductive Synthesis of Inductive Invariants -- Runtime Monitoring/Program Analysis -- Industrial-Strength Controlled Concurrency Testing for C# Programs with Coyote -- Context-Sensitive Meta-Constraint Systems for Explainable Program Analysis -- Explainable Online Monitoring of Metric Temporal Logic -- 12th Competition on Software Verification — SV-COMP 2023 -- Competition on Software Verification and Witness Validation: SV-COMP 2023 -- Symbiotic-Witch 2: More Efficient Algorithm and Witness Refutation (Competition Contribution) -- 2LS: Arrays and Loop Unwinding (Competition Contribution) -- Bubaak: Runtime Monitoring of Program Verifiers (Competition Contribution) -- EBF 4.2: Black-Box Cooperative Verification for Concurrent Programs (Competition Contribution) -- Goblint: Autotuning Thread-Modular Abstract Interpretation (Competition Contribution) -- Java Ranger: Supporting String and Array Operations (Competition Contribution) -- Korn–Software Verification with Horn Clauses (Competition Contribution) -- Mopsa-C: Modular Domains and Relational Abstract Interpretation for C Programs (Competition Contribution) -- PIChecker: A POR and Interpolation based Verifier for Concurrent Programs (Competition Contribution) -- Ultimate Automizer and the CommuHash Normal Form (Competition Contribution) -- Ultimate Taipan and Race Detection in Ultimate (Competition Contribution) -- VeriAbsL: Scalable Verification by Abstraction and Strategy Prediction (Competition Contribution) -- VeriFuzz 1.4: Checking for (Non-)termination (Competition Contribution). …”
Libro electrónico -
7382Publicado 2012Tabla de Contenidos: “…General government total outlays1 in 2010 or latest year available; The budgetary planning horizon; Monitoring of public expenditure "output" has improved; Regional policy is popular, but output is hard to measure, although its cost is becoming easier to identify; Table 3. …”
Libro electrónico -
7383Publicado 2015Tabla de Contenidos: “…; Conclusions; Energy Case Studies; Smart Monitoring and Diagnostics Systems at Major Power Plants…”
Libro electrónico -
7384Publicado 2023Tabla de Contenidos: “…Configuring the Deployment Server -- Configuring serverclass -- Installing the universal forwarder -- Installation in Windows OS -- Installation in Linux OS -- Configuring forwarding -- Configuring deploymentclient -- Forwarder monitoring -- Summary -- Self-assessment -- Reviewing answers -- Chapter 5: Splunk Index Management -- Understanding Splunk indexes -- Understanding buckets -- Creating Splunk indexes -- Splunk Web -- CLI -- indexes.conf explained -- Backing up indexes -- Monitoring Splunk indexes -- Summary -- Self-assessment -- Reviewing answers -- Chapter 6: Splunk Configuration Files -- Understanding conf files -- File format and access -- Structure and syntax -- Config layering and inheritance -- Default stanzas and global settings -- Merging multiple conf files -- Understanding conf file precedence -- Search-time precedence -- Index-time precedence -- Troubleshooting conf files using the btool command -- Summary -- Self-assessment -- Reviewing answers -- Chapter 7: Exploring Distributed Search -- Understanding distributed search -- Search head and indexer clustering overview -- Search head clustering -- Indexer clustering -- Configuring distributed search -- The Splunk CLI -- Splunk Web -- Understanding knowledge bundles -- Knowledge bundle replication -- Summary -- Self-assessment -- Reviewing answers -- Part 2: Splunk Data Administration -- Chapter 8: Getting Data In -- Understanding Splunk data inputs -- Understanding metadata fields -- Source types -- Data indexing phases -- Input -- Parsing -- Indexing -- Splunk Web - Add Data feature -- Summary -- Self-assessment -- Reviewing answers -- Chapter 9: Configuring Splunk Data Inputs -- File and directory monitoring -- Handling network data input -- TCP and UDP input -- Discussing scripted inputs -- Understanding HEC input -- Configuring HEC -- Sending data to HEC…”
Libro electrónico -
7385
-
7386Publicado 2021Tabla de Contenidos: “…-- Introducing data streams -- Sources of data -- The value of real-time data in analytics -- Decoupling systems -- Challenges associated with distributed systems -- Transactions per second -- Scaling -- Latency -- Fault tolerance/high availability -- Overview of messaging concepts -- Overview of core messaging components -- Messaging concepts -- Examples of data streaming -- Application log processing -- Internet of Things -- Real-time recommendations -- Video streams -- Summary -- Further reading -- Chapter 2: Messaging and Data Streaming in AWS -- Amazon Kinesis Data Streams (KDS) -- Encryption, authentication, and authorization -- Producing and consuming records -- Data delivery guarantees -- Integration with other AWS services -- Monitoring -- Amazon Kinesis Data Firehose (KDF) -- Encryption, authentication, and authorization -- Monitoring -- Producers -- Delivery destinations -- Transformations -- Amazon Kinesis Data Analytics (KDA) -- Amazon KDA for SQL -- Amazon Kinesis Data Analytics for Apache Flink (KDA Flink) -- Amazon Kinesis Video Streams (KVS) -- Amazon Simple Queue Service (SQS) -- Amazon Simple Notification Service (SNS) -- Amazon SNS integrations with other AWS services -- Encryption at rest -- Amazon MQ for Apache ActiveMQ -- IoT Core -- Device software -- Control services -- Analytics services -- Amazon Managed Streaming for Apache Kafka (MSK) -- Apache Kafka -- Amazon MSK -- Amazon EventBridge -- Service comparison summary -- Summary -- Chapter 3: The SmartCity Bike-Sharing Service -- The mission for sustainable transportation -- SmartCity new mobile features -- SmartCity data pipeline -- SmartCity data lake…”
Libro electrónico -
7387Publicado 2021Tabla de Contenidos: “…Isolating critical workloads -- Hardening the default pod security policy -- Limiting pod access -- Creating network policies with Calico -- Monitoring runtime with Falco -- Ensuring cluster security and compliance -- Executing Kubernetes conformance tests -- Scanning cluster security configuration -- Executing the CIS Kubernetes benchmark -- Enabling audit logging -- Bonus security tips -- Deploying the security configurations -- Destroying the cluster -- Summary -- Further reading -- Chapter 7: Managing Storage and Stateful Applications -- Technical requirements -- Installing the required tools -- Implementation principles -- Understanding the challenges with stateful applications -- Tuning Kubernetes storage -- Understanding storage primitives in Kubernetes -- Choosing a persistent storage solution -- Deploying stateful applications -- Installing OpenEBS -- Deploying a stateful application on OpenEBS volumes -- Summary -- Further reading -- Chapter 8: Deploying Seamless and Reliable Applications -- Technical requirements -- Understanding the challenges with container images -- Exploring the components of container images -- Choosing the right container base image -- Reducing container image size -- Scanning container images for vulnerabilities -- Testing the download speed of a container image -- Applying container base images best practices -- Learning application deployment strategies -- Choosing the deployment model -- Monitoring deployments -- Using readiness and liveness container probes -- Scaling applications and achieving higher availability -- Summary -- Further reading -- Chapter 9: Monitoring, Logging, and Observability -- Technical requirements -- Understanding the challenges with Kubernetes observability -- Exploring the Kubernetes metrics -- Learning site reliability best practices -- Monitoring, metrics, and visualization…”
Libro electrónico -
7388Publicado 2002Tabla de Contenidos: “…Security administration -- 6.1 Administration of Cluster Security Services -- 6.1.1 Configuration files -- 6.1.2 Mechanism pluggable module configuration -- 6.1.3 The ctcasd daemon administration -- 6.1.4 The ctcasd daemon key files -- 6.1.5 Generate new keys -- 6.1.6 Changing the default key type for ctcasd -- 6.1.7 Removing entries from the trusted host list file -- 6.1.8 Verifying exchanged public host keys -- 6.2 Administration of Resource Monitoring and Control -- 6.2.1 Configuration files for Resource Monitoring and Control…”
Libro electrónico -
7389por Preston, MikeTabla de Contenidos: “…Troubleshooting Storage Capacity and Overcommitment -- Monitoring datastore usage -- Thin Provisioning -- Array thin provisioning -- Hypervisor (VMDK) thin provisioning -- Monitoring Thin Provisioning -- Snapshots -- Understanding vSphere Snapshots -- Monitoring snapshot disk usage…”
Publicado 2013
Libro electrónico -
7390por Rashvand, Habib F.Tabla de Contenidos: “…4.5 Case Study: Outpatient Care 141 -- 5 Clinical Applications 149 -- 5.1 Surgical Applications 150 -- 5.2 Dental Applications 161 -- 5.3 Scalp Applications 165 -- 5.4 Post-Operative Applications 171 -- 5.5 Emergency Case Studies 181 -- 6 Smart Home, Smart Office 189 -- 6.1 Application Requirements 190 -- 6.2 Energy and Resource Optimisation 198 -- 6.3 Smart Home Case Studies 203 -- 6.4 Smart Office Case Studies 212 -- 7 Public Safety Applications 221 -- 7.1 Monitoring Airborne Toxins 223 -- 7.2 Monitoring Forest Fires 228 -- 7.3 Monitoring Structural Health 233 -- 7.4 Monitoring Traffic 242 -- 7.5 Case Study: Sink Location 250 -- 7.6 Case Study: Congestion Avoidance 254 -- 7.7 Case Study: Target Tracking and Surveillance 257 -- 8 Geographical Applications 261 -- 8.1 Farming Industry 261 -- 8.2 Mining Industry 270 -- 8.3 Transportation 274 -- 8.4 Remote Sensing and Imaging 279 -- 8.5 Earth Resources Observation 282 -- 8.6 Underwater Sensing 287 -- Appendix A Further Details on Potential Devices and Systems 293 -- A.1 Accelerometers 293 -- A.2 Equipment 295 -- A.2.1 Tomography 296 -- A.2.2 Gadgets 300 -- A.3 Smart Sensors Devices 302 -- A.3.1 Mica2 and Mica2Dot 302 -- A.3.2 MicaZ 307 -- A.3.3 Telos and TMote Sky 308 -- A.3.4 Fleck3 and FleckNano 310 -- A.3.5 3Mate! …”
Publicado 2012
Libro electrónico -
7391Publicado 2023Tabla de Contenidos: “…-- Introducing distributed tracing -- Span -- Tracing - building blocks -- Reviewing context propagation -- In-process propagation -- Out-of-process propagation -- Ensuring consistency and structure -- Building application topology -- Resource attributes -- Performance analysis overview -- The baseline -- Investigating performance issues -- Summary -- Questions -- Further reading -- Chapter 2: Native Monitoring in .NET -- Technical requirements -- Building a sample application -- Log correlation -- On-demand logging with dotnet-monitor -- Monitoring with runtime counters -- Enabling auto-collection with OpenTelemetry -- Installing and configuring OpenTelemetry -- Exploring auto-generated telemetry -- Debugging -- Performance -- Summary -- Questions -- Chapter 3: The .NET Observability Ecosystem -- Technical requirements -- Configuring cloud storage -- Using instrumentations for popular libraries -- Instrumenting application -- Leveraging infrastructure -- Configuring secrets -- Configuring observability on Dapr -- Tracing -- Metrics -- Instrumenting serverless environments -- AWS Lambda -- Azure Functions -- Summary -- Questions -- Chapter 4: Low-Level Performance Analysis with Diagnostic Tools -- Technical requirements -- Investigating common performance problems -- Memory leaks -- Thread pool starvation -- Profiling -- Inefficient code -- Debugging locks -- Using diagnostics tools in production -- Continuous profiling -- The dotnet-monitor tool -- Summary -- Questions -- Part 2: Instrumenting .NET Applications…”
Libro electrónico -
7392Publicado 2024Tabla de Contenidos: “…-- Investigating Grafana -- Installing the Grafana agent -- Configuring Grafana data sources and data sinks -- Grafana dashboards -- Reports and alerts -- Alternative infrastructure monitoring tools -- Nagios -- New Relic -- AWS CloudTrail and CloudWatch -- Microsoft Azure Monitor -- Summary -- Index…”
Libro electrónico -
7393Publicado 2005Tabla de Contenidos: “…David Edmunds -- Race and region : Ohio, America's middle ground / James Oliver Horton -- Ohio and the world : the civil war era / Eric Foner -- Ohio 1903 : heartland of progressive reform / Kathryn Kish Sklar -- Ohio : problems and prospects, 1940s-1980s / James T. …”
Libro electrónico -
7394Publicado 2008Tabla de Contenidos: “…., Joaquín Sabina. {Qué bonito! / int., Rosario. Este mundo va / int., Miguel Bosé. …”
Disco musical -
7395por Organisation for Economic Co-operation and Development.Tabla de Contenidos: “…Ways forward to enhance the governance and performance of the economic regulator -- Monitor the evolving role and objectives of SUNASS -- Ensure adequate and predictable resourcing of SUNASS -- Continue to strengthen good regulatory practices at SUNASS -- Improve performance monitoring of WSS services provision by SUNASS -- References -- Notes -- Annexes -- Annex A. …”
Publicado 2021
Libro electrónico -
7396Publicado 2023Tabla de Contenidos: “…Performing data transformation tasks -- Creating a lake database -- Summary -- Chapter 7: Data Visualization with Power BI -- Technical requirements -- Introduction to the Power BI integration -- Creating a Power BI report -- Adding data sources to your Power BI report -- Connecting Power BI with your Azure Synapse workspace -- Authoring Power BI reports from Azure Synapse Studio -- Summary -- Chapter 8: Building Machine Learning Experiments -- Technical requirements -- Understanding the application of ML -- Introducing ML into your projects with AutoML -- Creating an Azure Machine Learning workspace -- Configuring the Azure Machine Learning integration -- Finding the best model with AutoML -- Exploring additional ML capabilities in Azure Synapse -- Using pre-trained models with Cognitive Services -- Finding patterns using KQL -- Training models with Apache Spark MLlib -- Building applications with SynapseML -- Summary -- Chapter 9: Exporting Data from Data Explorer Pools -- Technical requirements -- Understanding data export scenarios -- Exporting data with client tools -- Using server-side export to pull data -- Performing robust exports with server-side data push -- Exporting to cloud storage -- Exporting to SQL tables -- Exporting to external tables -- Configuring continuous data export -- Summary -- Part 3: Managing Azure Synapse Data Explorer -- Chapter 10: System Monitoring and Diagnostics -- Technical requirements -- Monitoring your environment -- Checking your Data Explorer pool capacity -- Monitoring query execution -- Reviewing object metadata and changes -- Setting up alerts -- Creating action groups -- Creating alert rules -- Summary -- Chapter 11: Tuning and Resource Management -- Technical requirements -- Implementing resource governance with workload groups -- Managing workload groups -- Classifying user requests…”
Libro electrónico -
7397Publicado 2024Tabla de Contenidos: “…Developing documentation for compliance -- Identifying regulatory requirements -- Structuring compliance documentation -- Best practices in developing compliance documentation -- Automating control assessment -- Benefits of automating control assessments -- Starting with a clear strategy -- Choosing the right tools and technologies -- Integration with existing systems -- Developing automated assessment processes -- Training and skills development -- Testing and validation -- Continuous improvement and adaptation -- Documenting the automation process -- Addressing challenges and risks -- Case studies and examples -- Summary -- Chapter 7: Assessment and Authorization -- Conducting security assessments -- Understanding the scope of security assessments -- Selecting assessment methods -- Developing an assessment plan -- Reporting and analysis -- Recommending improvements -- Follow-up and review -- The risk assessment and authorization process -- Understanding the risk assessment in the RMF context -- Conducting the risk assessment -- Documenting and reporting risk assessment findings -- Risk mitigation strategy development -- System authorization process -- Continuous monitoring and authorization maintenance -- Preparing for security audits -- Understanding the purpose and importance of security audits -- Types of security audits -- Overview of common audit frameworks and standards -- Audit preparation strategies -- Conducting a pre-audit self-assessment -- Updating policies and procedures -- Enhancing security controls -- Data management and protection -- Stakeholder engagement and communication -- Logistics and operational readiness -- Post-audit activities -- Summary -- Part 3: Advanced Topics and Best Practices -- Chapter 8: Continuous Monitoring and Incident Response -- Implementing continuous monitoring -- Understanding continuous monitoring…”
Libro electrónico -
7398por Organization for Economic Cooperation and DevelopmentTabla de Contenidos: “…-- Making the most of global megatrends and transformations affecting the mining sector -- Ensuring a sustained improvement of people's well-being -- Materialising previous and current initiatives that aimed to translate mining wealth into greater well-being -- Links with Chile's National Mining Policy 2050 -- Supporting upcoming investments in the mining and energy sector and ensuring their linkages with the local economy -- Capitalising on the ongoing decentralisation process in Chile -- The Mining Strategy of Well-being for the Region of Antofagasta -- Building the mining strategy for the well-being of Antofagasta -- A participatory process to legitimise and ensure alignment with local needs -- A long-term vision that moves from past and current concerns towards a path for the future -- Mining Stragegy objectives helping to address Antofagasta's development priorities -- Materialising long-term objectives through strategic projects -- Links with other regional development strategies -- Governing, implementing and monitoring the Mining Strategy -- A governance mechanism to monitor progress and ensure sustainability in the long run -- Monitoring the strategy with hierarchical indicators -- Financing the tasks to meet the strategic objectives -- The role of municipal governments…”
Publicado 2023
Libro electrónico -
7399Publicado 2024Tabla de Contenidos: “…Utilizing parallel chains in LangChain for efficient multi-source information gathering -- Routing chains to answer questions effectively -- Summary -- Further reading -- Chapter 6: Advanced Debugging, Monitoring, and Retrieval with LangChain -- Technical requirements -- Debugging and monitoring LangChain -- Understanding tracing techniques -- Introducing LangSmith -- Leveraging LangChain agents -- What is an agent? …”
Libro electrónico -
7400Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Part 1: Planning and Implementing a Microsoft 365 Tenant -- Chapter 1: Planning and Implementing a Microsoft 365 Tenant -- Planning a tenant -- Selecting a tenant type -- Selecting a managed domain -- Creating a tenant -- Implementing and managing domains -- Acquiring a domain name -- Configuring a domain name -- Managing DNS records manually -- Configuring a default domain -- Configuring organizational settings -- Services -- Organization profile -- Summary -- Knowledge check -- Questions -- Answers -- Chapter 2: Monitoring Microsoft 365 Tenant Health -- Creating and managing service requests -- Creating an incident response plan -- Monitoring service health -- Monitoring application access -- Creating and managing access reviews -- Reviewing audit logs -- Reviewing the sign-ins report -- Sending activity log data to Azure Monitor -- Configuring and reviewing reports -- Azure AD logs and reports -- Azure Monitor and Log Analytics -- Reviewing usage metrics -- Microsoft 365 usage reports -- Viva Insights -- Adoption Score -- Summary -- Knowledge check -- Questions -- Answers -- Part 2: Planning and Managing User Identity and Roles -- Chapter 3: Planning Identity Synchronization -- Designing synchronization solutions -- Overview of Azure AD Connect -- Understanding Azure AD Connect with a single forest and single tenant -- Understanding Azure AD Connect with multi-forest scenarios -- Understanding Azure AD Connect with multi-tenant scenarios -- Identifying object source requirements -- Identifying required Azure AD Connect features -- Understanding the prerequisites for Azure AD Connect -- Azure AD -- On-premises Active Directory -- SQL Server -- Azure AD Connect Server hardware components -- Azure AD Connect server software components -- AD FS…”
Libro electrónico