Mostrando 66,381 - 66,400 Resultados de 69,047 Para Buscar 'Réquista~', tiempo de consulta: 2.13s Limitar resultados
  1. 66381
    por Le Corbusier, 1887-1965
    Publicado 2005
    “…Puerta de hielo es una selección de artículos, escritos entre 1920-1925, que Le Corbusier publicó en la revista vanguardista L'Esprit Nouveau…”
    Libro
  2. 66382
    Publicado 2022
    “…Analizados los presupuestos de la responsabilidad, estudiaremos los requisitos para que la empresa pueda ser eximida de dicha responsabilidad o, lo que es lo mismo, los requisitos que deben de cumplir los programas de cumplimiento normativo para que produzcan efectos eximentes de la responsabilidad penal de la empresa. …”
    Datos de acceso al recurso electrónico
    Acceso a la plataforma Legalteca, busque el título una vez dentro.
    Libro
  3. 66383
    Publicado 2012
    Tabla de Contenidos: “…Function of integrated control of all local with management of requests 4.1.11. Function of total Interlock 4.2. Ventilation and air conditioning 4.2.1. …”
    Libro electrónico
  4. 66384
    Publicado 2022
    Tabla de Contenidos: “…-- 6.2 Error-Detection and-Correction Techniques -- 6.2.1 Parity Checks -- 6.2.2 Checksumming Methods -- 6.2.3 Cyclic Redundancy Check (CRC) -- 6.3 Multiple Access Links and Protocols -- 6.3.1 Channel Partitioning Protocols -- 6.3.2 Random Access Protocols -- 6.3.3 Taking-Turns Protocols -- 6.3.4 DOCSIS: The Link-Layer Protocol for Cable Internet Access -- 6.4 Switched Local Area Networks -- 6.4.1 Link-Layer Addressing and ARP -- 6.4.2 Ethernet -- 6.4.3 Link-Layer Switches -- 6.4.4 Virtual Local Area Networks (VLANs) -- 6.5 Link Virtualization: A Network as a Link Layer -- 6.5.1 Multiprotocol Label Switching (MPLS) -- 6.6 Data Center Networking -- 6.6.1 Data Center Architectures -- 6.6.2 Trends in Data Center Networking -- 6.7 Retrospective: A Day in the Life of a Web Page Request -- 6.7.1 Getting Started: DHCP, UDP, IP, and Ethernet -- 6.7.2 Still Getting Started: DNS and ARP -- 6.7.3 Still Getting Started: Intra-Domain Routing to the DNS Server -- 6.7.4 Web Client-Server Interaction: TCP and HTTP -- 6.8 Summary -- Homework Problems and Questions -- Wireshark Labs: 802.11 Ethernet -- Interview: Albert Greenberg -- Chapter 7: Wireless and Mobile Networks -- 7.1 Introduction -- 7.2 Wireless Links and Network Characteristics -- 7.2.1 CDMA -- 7.3 WiFi: 802.11 Wireless LANs -- 7.3.1 The 802.11 Wireless LAN Architecture -- 7.3.2 The 802.11 MAC Protocol…”
    Libro electrónico
  5. 66385
    por Agutter, Claire
    Publicado 2021
    Tabla de Contenidos: “…Process guide: Event management -- 6.1 Process purpose -- 6.2 SIAM considerations -- 6.3 Generic process information -- 6.3.1 Activities -- 6.3.2 Example roles -- 6.3.3 Example metrics -- 6.3.4 Example inputs and outputs -- 6.3.5 Event management outputs can include -- 7. Process guide: Request management -- 7.1 Process purpose -- 7.2 SIAM considerations -- 7.3 Generic process information -- 7.3.1 Activities -- 7.3.2 Example roles -- 7.3.3 Example metrics -- 7.3.4 Example inputs and outputs -- 8. …”
    Libro electrónico
  6. 66386
    por Al-Turjman, Fadi
    Publicado 2021
    Tabla de Contenidos: “…Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Preface -- About the Author -- List of Contributors -- Chapter 1 Cloud Computing and Business Intelligence in IoT-Enabled Smart and Healthy Cities -- 1.1 Introduction -- 1.1.1 Comparison to Other Surveys -- 1.1.2 Scope of the Paper and Its Contribution -- 1.2 Cloud Computing -- 1.2.1 Cloud Computing Characteristics -- 1.2.2 Cloud Computing Models -- 1.2.2.1 Infrastructure as a Service (IaaS) -- 1.2.2.2 Platform as a Service (PaaS) -- 1.2.2.3 Software as a Service (SaaS) -- 1.2.3 Cloud Deployment Model -- 1.2.3.1 Public Cloud -- 1.2.3.2 Private Cloud -- 1.2.3.3 Hybrid Cloud -- 1.2.3.4 Community Cloud -- 1.2.4 Restrictions and Opportunities of Cloud Computing -- 1.2.5 Cloud Computing Qualities -- 1.2.5.1 Storage over the Internet -- 1.2.5.2 Service over Internet -- 1.2.5.3 Application Used over Internet -- 1.2.5.4 Energy Efficiencies -- 1.3 Cloud Computing (CC) and Business Intelligence (BI) -- 1.3.1 Business Intelligence -- 1.3.2 Cloud-Based BI Model -- 1.3.3 Cloud Computing Role in Business Intelligence -- 1.3.4 Benefits and Difficulties of Cloud Computing in BI -- 1.3.5 Incorporating BI Software into the Cloud -- 1.4 Procedures in BI and the Cloud -- 1.4.1 Collection of Data -- 1.4.2 Effectiveness and Authenticity -- 1.4.3 Preparation of Data and Data Analysis -- 1.4.4 Data Surveys -- 1.5 Information Technology in the Cloud and BI -- 1.5.1 BI On-Request -- 1.5.2 Cloud Speed Up Development -- 1.5.3 Business Intelligence Prospects -- 1.6 Artificial Intelligence (AI) in Business Intelligence (BI) -- 1.6.1 Supervised Learning -- 1.6.2 Unsupervised Learning -- 1.6.3 Reinforcement Learning (Semi-Supervised) -- 1.7 The Application Of Cloud IoT in Battling COVID-19 -- 1.7.1 Main Application Area of Cloud IoT in the COVID-19 Pandemic -- 1.8 Security in BI…”
    Libro electrónico
  7. 66387
    Publicado 2003
    Tabla de Contenidos: “…Programming model -- 4.1 Overview -- 4.2 WebSphere Commerce Server framework -- 4.2.1 Servlet engine -- 4.2.2 Protocol Listeners -- 4.2.3 Adapter manager -- 4.2.4 Adapters -- 4.2.5 Web controller -- 4.2.6 Commands -- 4.2.7 Entity beans -- 4.2.8 Data beans -- 4.2.9 Data Bean Manager -- 4.2.10 JavaServer Page (JSP) templates -- 4.2.11 WebSphere Commerce &lt -- instance&gt -- .xml configuration file -- 4.3 Application flow of an HTTP request -- 4.4 Design patterns -- 4.4.1 Model-view-controller design pattern -- 4.4.2 Command design pattern -- 4.4.3 Display design pattern -- 4.5 Persistent object model -- 4.6 Access control -- 4.7 Customizing application assets -- 4.7.1 Asset types to customize and development tooling -- 4.7.2 Matching skills to customization needs -- 4.8 For more information -- Chapter 5. …”
    Libro electrónico
  8. 66388
    por Lovelace, Mary
    Publicado 2005
    Tabla de Contenidos: “…TotalStorage Productivity Center for Disk use -- 6.1 Performance Manager GUI -- 6.2 Exploiting Performance Manager -- 6.2.1 Performance Manager data collection -- 6.2.2 Using IBM Director Scheduler function -- 6.2.3 Reviewing Data collection task status -- 6.2.4 Managing Performance Manager Database -- 6.2.5 Performance Manager gauges -- 6.2.6 ESS thresholds -- 6.2.7 Data collection for SAN Volume Controller -- 6.2.8 SAN Volume Controller thresholds -- 6.3 Exploiting gauges -- 6.3.1 Before you begin -- 6.3.2 Creating gauges example -- 6.3.3 Zooming in on the specific time period -- 6.3.4 Modify gauge to view array level metrics -- 6.3.5 Modify gauge to review multiple metrics in same chart -- 6.4 Performance Manager command line interface -- 6.4.1 Performance Manager CLI commands -- 6.4.2 Sample command outputs -- 6.5 Volume Performance Advisor (VPA) -- 6.5.1 VPA introduction -- 6.5.2 The provisioning challenge -- 6.5.3 Workload characterization and workload profiles -- 6.5.4 Workload profile values -- 6.5.5 How the Volume Performance Advisor makes decisions -- 6.5.6 Enabling the Trace Logging for Director GUI Interface -- 6.6 Getting started -- 6.6.1 Workload profiles -- 6.6.2 Using VPA with predefined Workload profile -- 6.6.3 Launching VPA tool -- 6.6.4 ESS User Validation -- 6.6.5 Configuring VPA settings for the ESS diskspace request -- 6.6.6 Choosing Workload Profile -- 6.6.7 Choosing candidate locations -- 6.6.8 Verify settings for VPA -- 6.6.9 Approve recommendations -- 6.6.10 VPA loopback after Implement Recommendations selected -- 6.7 Creating and managing Workload Profiles -- 6.7.1 Choosing Workload Profiles…”
    Libro electrónico
  9. 66389
    Publicado 2003
    Tabla de Contenidos: “…11.2.4 Parallel processing without block level data sharing -- 11.2.5 Program modifications for parallel processing -- 11.3 Restricting a PCB to one partition -- 11.3.1 Processing a partition sequentially -- 11.3.2 Requesting segments outside of the partition -- 11.3.3 Secondary index and logical relationship considerations -- 11.4 Handling unavailable partitions -- 11.4.1 Database PCB status code priming -- 11.5 Processing secondary indexes as databases -- 11.5.1 Secondary indexes with /SX fields -- 11.5.2 Secondary indexes with symbolic pointers -- 11.6 Handling test environments -- 11.6.1 DBRC registration -- 11.6.2 Testing with non-HALDB databases -- 11.7 Copying databases to different environments -- 11.7.1 The partition ID -- 11.7.2 Using image copies -- 11.7.3 Using unloads -- 11.7.4 Copying part of the data -- 11.7.5 Copying partition definitions -- 11.7.6 Timestamp recoveries to a copy -- 11.7.7 Planned enhancement for copying partition definitions -- Part 4 Administration -- Chapter 12. …”
    Libro electrónico
  10. 66390
    Publicado 2003
    Tabla de Contenidos: “…Batch application design with DFSMStvs -- 6.1 Application classification -- 6.1.1 DFSMStvs intolerant applications -- 6.1.2 DFSMStvs tolerant applications -- 6.1.3 DFSMStvs exploiting applications -- 6.2 Simple and advanced application models -- 6.3 Designing efficient transactional applications -- 6.3.1 Exclusive control of resources -- 6.3.2 Minimizing contention -- 6.3.3 Transactional isolation -- 6.4 Programming interfaces -- 6.4.1 High-level language considerations -- 6.4.2 Enhancements to the application programming interfaces -- 6.4.3 VSAM macros -- 6.4.4 Opening in DFSMStvs mode -- 6.4.5 Using commit and backout -- 6.4.6 Checking VSAM return codes -- 6.5 How you can avoid reapplying updates -- 6.5.1 Repositioning input files -- 6.5.2 Repositioning output files -- 6.5.3 Generalized subroutines -- 6.6 Other application considerations -- 6.6.1 Read integrity options -- 6.6.2 Applications using non-shared resources -- 6.6.3 Deleting data sets -- 6.6.4 Checkpoint/restart -- 6.6.5 Hiperbatch -- 6.7 Accessing records -- 6.7.1 Maximum record size -- 6.7.2 Browsing -- 6.7.3 Skip-sequential processing -- 6.7.4 Updating records -- 6.7.5 Deleting records -- 6.7.6 Adding records -- 6.8 VSAM restrictions -- 6.8.1 Defer processing -- 6.8.2 Load mode -- 6.8.3 Positioning -- 6.8.4 Locking -- 6.8.5 Sharing -- 6.8.6 SHAREOPTIONS -- 6.8.7 DEFINE parameters -- 6.8.8 Alternate indices -- 6.8.9 GETIX and PUTIX interfaces -- 6.8.10 VSAM exits -- 6.8.11 Request environment -- 6.9 Lock handling -- 6.9.1 Record locking for recoverable data sets -- 6.9.2 Types of locks -- 6.9.3 Lock duration -- 6.9.4 Lock granularity and ownership -- 6.9.5 Intra-unit of recovery lock contention -- 6.10 Deadlocks -- 6.10.1 Deadlock detection -- 6.10.2 Deadlock and time-out…”
    Libro electrónico
  11. 66391
    Tabla de Contenidos: “…Reporting on your DFSMSrmm environment -- 8.1 Requesting DFSMSrmm resource information -- 8.1.1 Working with resource lists -- 8.1.2 Displaying information from DFSMSrmm -- 8.2 Reporting utilities -- 8.2.1 Security and audit reports -- 8.2.2 Inventory management reports -- 8.2.3 Inventory, movement, and scratch list reports -- 8.2.4 DFSMSrmm-supplied EXECs -- 8.3 DFSORT reporting -- 8.4 DFSMSrmm report generator -- 8.4.1 Setting up the report generator -- 8.4.2 The report type support -- 8.4.3 The reporting tool support -- 8.4.4 Report definition support -- 8.4.5 Using the report generator -- 8.4.6 Report generator messages -- 8.5 Sample reports -- Chapter 9. …”
    Libro electrónico
  12. 66392
    Publicado 2003
    Tabla de Contenidos: “…WebSphere Commerce Portal architecture -- 2.1 WebSphere Commerce Portal architecture -- 2.1.1 Commerce enabled portal integration approaches -- 2.1.2 XML-based commerce enabled portal solution outlook -- 2.1.3 WebSphere Commerce Portal runtime environment -- 2.1.4 WebSphere Commerce Portal component architecture -- 2.1.5 WebSphere Commerce Portal HTTP request flow -- 2.1.6 WebSphere Commerce Portal architecture of key features -- 2.2 WebSphere Commerce and WebSphere Portal architecture overview -- 2.2.1 WebSphere Commerce architecture -- 2.2.2 WebSphere Portal architecture -- 2.3 Mobile client access -- 2.3.1 Where to find more information -- 2.4 Authentication and single sign-on -- 2.5 Access control -- 2.6 Session management -- 2.7 Presentation services and page rendering -- Chapter 3. …”
    Libro electrónico
  13. 66393
    por Burns, Brendan
    Publicado 2020
    Tabla de Contenidos: “…3.1.2 Kubernetes mit dem Azure Kubernetes Service installieren -- 3.1.3 Kubernetes auf den Amazon Web Services installieren -- 3.1.4 Kubernetes mit minikube lokal installieren -- Tipp -- 3.2 Kubernetes in Docker ausführen -- 3.3 Kubernetes auf dem Raspberry Pi ausführen -- 3.4 Der Kubernetes-Client -- 3.4.1 Den Cluster-Status prüfen -- Tipp -- Tipp -- 3.4.2 Worker-Knoten in Kubernetes auflisten -- 3.5 Cluster-Komponenten -- 3.5.1 Kubernetes-Proxy -- 3.5.2 Kubernetes-DNS -- Tipp -- 3.5.3 Kubernetes-UI -- 3.6 Zusammenfassung -- 4 Häufige kubectl-Befehle -- 4.1 Namensräume -- 4.2 Kontexte -- 4.3 Objekte der Kubernetes-API anzeigen -- 4.4 Kubernetes-Objekte erstellen, aktualisieren und löschen -- Tipp -- 4.5 Objekte mit einem Label und Anmerkungen versehen -- 4.6 Debugging-Befehle -- Tipp -- 4.7 Autovervollständigen von Befehlen -- 4.8 Alternative Möglichkeiten zur Kommunikation mit Ihrem Cluster -- 4.9 Zusammenfassung -- 5 Pods -- Abb. 5-1 Ein Beispiel-Pod mit zwei Containern und einem gemeinsamen Dateisystem -- Tipp -- 5.1 Pods in Kubernetes -- 5.2 In Pods denken -- 5.3 Das Pod-Manifest -- Tipp -- 5.3.1 Einen Pod erstellen -- 5.3.2 Ein Pod-Manifest schreiben -- Listing 5-1 kuard-pod.yaml -- 5.4 Pods starten -- 5.4.1 Pods auflisten -- Tipp -- 5.4.2 Pod-Details -- 5.4.3 Einen Pod löschen -- 5.5 Auf Ihren Pod zugreifen -- 5.5.1 Port-Forwarding einsetzen -- 5.5.2 Mehr Informationen aus Logs erhalten -- Tipp -- 5.5.3 Befehle in Ihrem Container mit exec ausführen -- 5.5.4 Dateien von und auf Container kopieren -- 5.6 Health-Checks -- 5.6.1 Liveness-Probe -- Listing 5-2 kuard-pod-health.yaml -- Tipp -- 5.6.2 Readiness-Probe -- 5.6.3 Arten von Health-Checks -- 5.7 Ressourcen-Management -- 5.7.1 Ressourcen-Anforderungen: Minimal notwendige Ressourcen -- Listing 5-3 kuard-pod-resreq.yaml -- Tipp -- Details zu den Request-Grenzen -- Tipp…”
    Libro electrónico
  14. 66394
    por Henningsen, Peter
    Publicado 2004
    Tabla de Contenidos: “…-- 5.1.1 During application development -- 5.1.2 During application test -- 5.1.3 During application service -- 5.1.4 During application maintenance -- 5.1.5 Other uses -- 5.2 Some things to remember when using Application Monitor -- 5.3 Basic functionality -- 5.3.1 Analyzing an active job -- 5.3.2 Analyzing a specified job -- 5.3.3 Scheduling a deferred monitoring request -- 5.3.4 Analyzing historical data -- 5.3.5 Named sets: what they are and why they can help -- 5.4 Some available reports -- 5.4.1 Program reports -- 5.4.2 Delay Analysis reports -- 5.4.3 Data Set Analysis reports -- 5.4.4 CICS reports -- 5.4.5 DB2 reports -- 5.4.6 IMS reports -- 5.5 Things to remember when using Application Monitor -- Chapter 6. …”
    Libro electrónico
  15. 66395
    Publicado 2022
    Tabla de Contenidos: “…Cover -- Half-Title Page -- Series Page -- Title Page -- Copyright Page -- Dedication -- Contents -- Preface -- Acknowledgments -- 1 Post Pandemic: The New Advanced Society -- 1.1 Introduction -- 1.1.1 Themes -- 1.1.1.1 Theme: Areas of Management -- 1.1.1.2 Theme: Financial Institutions Cyber Crime -- 1.1.1.3 Theme: Economic Notion -- 1.1.1.4 Theme: Human Depression -- 1.1.1.5 Theme: Migrant Labor -- 1.1.1.6 Theme: Digital Transformation (DT) of Educational Institutions -- 1.1.1.7 School and College Closures -- 1.2 Conclusions -- References -- 2 Distributed Ledger Technology in the Construction Industry Using Corda -- 2.1 Introduction -- 2.2 Prerequisites -- 2.2.1 DLT vs Blockchain -- 2.3 Key Points of Corda -- 2.3.1 Some Salient Features of Corda -- 2.3.2 States -- 2.3.3 Contract -- 2.3.3.1 Create and Assign Task (CAT) Contract -- 2.3.3.2 Request for Cash (RT) Contract -- 2.3.3.3 Transfer of Cash (TT) Contract -- 2.3.3.4 Updation of the Task (UOT) Contract -- 2.3.4 Flows -- 2.3.4.1 Flow Associated With CAT Contract -- 2.3.4.2 Flow Associated With RT Contract -- 2.3.4.3 Flow Associated With TT Contract -- 2.3.4.4 Flow Associated With UOT Contract -- 2.4 Implementation -- 2.4.1 System Overview -- 2.4.2 Working Flowchart -- 2.4.3 Experimental Demonstration -- 2.5 Future Work -- 2.6 Conclusion -- References -- 3 Identity and Access Management for Internet of Things Cloud -- 3.1 Introduction -- 3.2 Internet of Things (IoT) Security -- 3.2.1 IoT Security Overview -- 3.2.2 IoT Security Requirements -- 3.2.3 Securing the IoT Infrastructure -- 3.3 IoT Cloud -- 3.3.1 Cloudification of IoT -- 3.3.2 Commercial IoT Clouds -- 3.3.3 IAM of IoT Clouds -- 3.4 IoT Cloud Related Developments -- 3.5 Proposed Method for IoT Cloud IAM -- 3.5.1 Distributed Ledger Approach for IoT Security -- 3.5.2 Blockchain for IoT Security Solution…”
    Libro electrónico
  16. 66396
    por Suresh, A.
    Publicado 2023
    Tabla de Contenidos: “…7.1.2 Management of Conflict in Agile RM Framework -- 7.1.2.1 A Holistic View of Technology -- 7.1.3 Ratings and Context Information -- 7.1.4 Dynamic Traffic Steering -- 7.1.4.1 Reduced-Overhead Interference Mitigation -- 7.1.5 Reducing Overhead Interference Mitigation -- 7.1.5.1 RIM and 5G NR -- 7.1.5.2 Contributions and Differences -- 7.1.6 High-Level 5NR - RIM Framework -- 7.1.7 OS RIM-RS -- 7.1.7.1 OS RIM-RS -- 7.1.8 Radio-Access Network -- 7.1.9 Improve RAN Coverage -- 7.1.9.1 Improving RAN Coverage Can Take Many Forms -- 7.1.10 Related Work -- 7.1.11 Conclusion -- References -- Chapter 8 Interference Techniques Based on Deep Learning in Wireless Networks -- 8.1 Introduction -- 8.2 Literature Review -- 8.3 Suppression Techniques -- 8.3.1 Deep Learning Based Approach -- 8.3.2 Adjacent Channel Interference (ACI) -- 8.3.3 Co-Channel Interference -- 8.3.4 Self-Interference -- 8.3.5 Homogeneous Technology Interference -- 8.3.6 Heterogeneous Technology Interference -- 8.4 Classification of Interference Suppression Techniques -- 8.5 A Blind Approach of Interference Cancellation Using Neural Networks -- 8.6 Interference Estimation -- 8.6.1 Feature Extraction -- 8.6.2 Channel Usage Ratio -- 8.7 Machine Learning Model-Decision Tree -- 8.8 Lookup Table -- 8.9 Conclusion -- References -- Chapter 9 Implementing SDN Process-Based MRMC Wireless Networks -- 9.1 Multi-Radio Multi Channel Network in Wireless Network -- 9.1.1 The Concept of QoS inWN -- 9.2 QoS Challenges in MRMC Based Wireless Networks -- 9.2.1 Bandwidth Limitation -- 9.2.2 Removal of Redundancy -- 9.2.3 Energy and Delay Trade-Off -- 9.2.4 Buffer Size Limitation -- 9.3 Opportunistic Routing -- 9.4 The Need for Software-Defined Network in WSN for Enhancing QoS -- 9.4.1 QoS Management -- 9.5 ILP Problem Design -- 9.5.1 Network Model -- 9.5.2 Interference Model -- 9.5.3 VL Request Design…”
    Libro electrónico
  17. 66397
    Publicado 2005
    “…"La 1a edición castellana ha servido de referencia permanente (Madrid, Revista de Occidente, 1925) a la presente edición de Biblioteca Nueva" (p. 129)…”
    Acceso restringido con credenciales, usuarios UPSA
    Libro electrónico
  18. 66398
    Publicado 2005
    “…"La 1a edición castellana ha servido de referencia permanente (Madrid, Revista de Occidente, 1925) a la presente edición de Biblioteca Nueva" (p. 129)…”
    Acceso restringido con credenciales, usuarios UPSA
    Libro electrónico
  19. 66399
    Publicado 2017
    “…Revista digital gratuita en formato blog de temática archivística y/o documental y de carácter divulgativo, que nace de un proyecto voluntario y altruista. …”
    Clic para acceder. Acceso abierto
    Seriada digital
  20. 66400
    Publicado 2009
    “…Este CD contiene la colección completa de números publicados de la revista Encuentro Islamo-Cristiano, editados por el Centro Darek-Nyumba entre 1972 y 2008.…”
    CDROM