Mostrando 8,081 - 8,100 Resultados de 8,735 Para Buscar 'TPIY~', tiempo de consulta: 0.97s Limitar resultados
  1. 8081
    Publicado 2024
    Tabla de Contenidos: “…-- Summary -- Chapter 4: State Management Patterns and Their Implementations -- Technical requirements -- Diving into the world of MVX patterns -- Defining criteria for the state management pattern -- Embracing data binding with MVVM in Flutter -- Extracting data logic into the Model -- Emitting data via the Streams API -- Encapsulating state in CartState -- Implementing the MVVM and MVI patterns with flutter_bloc -- What is a cubit? …”
    Libro electrónico
  2. 8082
    Publicado 2018
    Tabla de Contenidos: “…Compiling and running chaincode -- Installing and instantiating chaincode -- Invoking chaincode -- Creating a chaincode -- The chaincode interface -- Setting up the chaincode file -- The Invoke method -- Access control -- ABAC -- Registering a user -- Enrolling a user -- Retrieving user identities and attributes in chaincode -- Implementing chaincode functions -- Defining chaincode assets -- Coding chaincode functions -- Creating an asset -- Reading and modifying an asset -- Main function -- Testing chaincode -- SHIM mocking -- Testing the Init method -- Testing the Invoke method -- Running tests -- Chaincode design topics -- Composite keys -- Range queries -- State queries and CouchDB -- Indexes -- ReadSet and WriteSet -- Multiversion concurrency control -- Logging output -- Configuration -- Logging API -- SHIM logging levels -- Stdout and stderr -- Additional SHIM API functions -- Summary -- Chapter 5: Exposing Network Assets and Transactions -- Building a complete application -- The nature of a Hyperledger Fabric application -- Application and transaction stages -- Application model and architecture -- Building the application -- Middleware - wrapping and driving the chaincode -- Installation of tools and dependencies -- Prerequisites for creating and running the middleware -- Installation of dependencies -- Creating and running the middleware -- Network configuration -- Endorsement policy -- User records -- Client registration and enrollment -- Creating a channel -- Joining a channel -- Installation of chaincode -- Instantiation of chaincode -- Invoking the chaincode -- Querying the chaincode -- Completing the loop - subscribing to blockchain events -- Putting it all together -- User application - exporting the service and API -- Applications -- User and session management -- Designing an API -- Creating and launching a service…”
    Libro electrónico
  3. 8083
    Publicado 2023
    Tabla de Contenidos: “…Accessing Shop Settings -- Change the Channel: Setting Up Sales Channels -- Chapter 8 Policy Academy: Setting Your Shop's Policies -- Fair Play: General Policy Tips -- Policy Wonk: Using Etsy's Policy Settings -- Returns &amp -- Exchanges -- Cancellations -- Privacy -- Viewing fixed policies -- Viewing your shop policies -- Hey, EU! …”
    Libro electrónico
  4. 8084
    Publicado 2024
    Tabla de Contenidos: “…Evaluating parallelism in software design - balancing performance and complexity -- Summary -- Questions -- Chapter 4: Java Concurrency Utilities and Testing in the Cloud Era -- Technical requirements -- Uploading your JAR file to AWS Lambda -- Introduction to Java concurrency tools - empowering cloud computing -- Real-world example - building a scalable application on AWS -- Taming the threads - conquering the cloud with the Executor framework -- The symphony of cloud integration and adaptation -- Real-world examples of thread pooling and task scheduling in cloud architectures -- Example 1 - keeping data fresh with scheduled tasks -- Example 2 - adapting to the cloud's dynamics -- Utilizing Java's concurrent collections in distributed systems and microservices architectures -- Navigating through data with ConcurrentHashMap -- Processing events with ConcurrentLinkedQueue -- Best practices for using Java's concurrent collections -- Advanced locking strategies for tackling cloud concurrency -- Revisiting lock mechanisms with a cloud perspective -- Advanced concurrency management for cloud workflows -- Sophisticated Java synchronizers for cloud applications -- Utilizing tools for diagnosing concurrency problems -- Thread dumps - the developer's snapshot -- Lock monitors - the guardians of synchronization -- The quest for clarity - advanced profiling techniques -- Weaving the web - integrating profiling tools into CI/CD pipelines -- Service mesh and APM - your cloud performance powerhouse -- Incorporating concurrency frameworks -- Mastering concurrency in cloud-based Java applications - testing and debugging tips -- Summary -- Questions -- Chapter 5: Mastering Concurrency Patterns in Cloud Computing -- Technical requirements -- Core patterns for robust cloud foundations -- The Leader-Follower pattern…”
    Libro electrónico
  5. 8085
    Publicado 2024
    Tabla de Contenidos: “…-- Reviewing predictions through shared folders -- Summary -- Chapter 5: IA Process and Work Queue Designs for HITL -- Technical requirements -- Single-Process, single-Work Queue designs -- Asynchronous (non-blocking) reviews -- Synchronous (blocking) reviews -- Multiple-Process, single-Work Queue designs -- Independent manual review logic -- Multiple-process, multiple-work queue designs -- Fully independent manual reviews -- Separating ML predictions and manual reviews into their own Processes and Work Queues -- Design comparison -- Design 1 - asynchronous reviews (one Process, one Work Queue) -- Design 2 - synchronous (polling) reviews (one Process, one Work Queue) -- Design 3 - independent HITL review logic (two Processes, one Work Queue) -- Design 4 - fully independent HITL reviews (two Processes, two Work Queues) -- Design 5 - full separation (three Processes, three Work Queues) -- Summary -- Chapter 6: Reusable IA Components -- Technical requirements -- IA session control -- Forcing HITL review -- Disabling HITL review -- Forcing review data recreation -- Example 1 - three IA Session Variables -- ML prediction kill switch -- Example 2 - kill switch -- ML model versioning -- Two different ways of calling web APIs -- Calling a web API using an Object when a new endpoint is provided -- Calling a web API using an Object when the vendor reuses an existing endpoint -- Example 3 - versioning ML endpoints manually -- Calling Web API Services -- New ML model evaluation -- Example 4 - new ML model evaluation Process template -- Reusable IA components review -- Summary…”
    Libro electrónico
  6. 8086
    por Mountjoy, Jon
    Publicado 2004
    Tabla de Contenidos: “…WebLogic: The Definitive Guide; Organization; Managing the WebLogic Environment; WebLogic Enterprise APIs; Online Documentation; Conventions Used in This Book; Using Code Examples; Comments and Questions; Acknowledgments; 1. …”
    Libro electrónico
  7. 8087
    por Ali, Maher
    Publicado 2009
    “…Apple's iPhone SDK has been updated and includes more than one thousand new APIs that developers will want to get their hands on. …”
    Libro electrónico
  8. 8088
    por DuBois, Paul, 1956-
    Publicado 2009
    Tabla de Contenidos:
    Libro electrónico
  9. 8089
    Publicado 2006
    Tabla de Contenidos: “…Front Cover; 3D Game Engine Design: A Practical Approach to Real-Time Computer Graphics; Copyright Page; Trademarks; About the Author; CONTENTS; Preface; Chapter 1 Introduction; 1.1 The Evolution of Graphics Hardware and Games; 1.2 The Evolution of This Book and Its Software; 1.3 A Summary of the Chapters; Chapter 2 The Graphics System; 2.1 The Foundation; 2.2 Transformations; 2.3 Cameras; 2.4 Culling and Clipping; 2.5 Rasterizing; 2.6 Vertex Attributes; 2.7 Issues of Software, Hardware, and APIs; 2.8 API Conventions; Chapter 3 Renderers; 3.1 Software Rendering; 3.2 Hardware Rendering…”
    Libro electrónico
  10. 8090
    Publicado 2017
    Tabla de Contenidos: “…-- Practical parallelization with R -- Using C++ and Fortran to accelerate calculations -- Using an old-school approach with Fortran -- Using a modern approach with C++ -- Looking back at what we have achieved -- Other topics of interest to enhance performance -- Preallocating memory to avoid duplication -- Making R code a bit faster with byte code compilation -- Just-in-time (JIT) compilation of R code -- Using memoization or cache layers -- Improving our data and memory management -- Using specialized packages for performance -- Flexibility and power with cloud computing -- Specialized R distributions -- Summary -- Chapter 10: Adding Interactivity with Dashboards -- Required packages…”
    Libro electrónico
  11. 8091
    Publicado 2011
    Tabla de Contenidos: “…-- Isolated Storage -- Saving and Loading Data -- The IsolatedStorageFile Object -- XNA Game Studio Storage -- Recreating the Project on Xbox -- Devices and Containers -- Getting a Device -- Looking at the API -- Loading Loose Files from Your Project -- Summary -- 15 Gamer Services -- GamerServicesComponent -- Guide Class -- Trial Mode -- Now the Bad News -- Platform-Specific Guide Functionality -- Gamers and Profiles -- GameDefaults -- Presence -- Privileges…”
    Libro electrónico
  12. 8092
    Publicado 2022
    Tabla de Contenidos: “…Private Addressing -- Firewall Rules -- Cloud Router -- Cloud Armor -- Virtual Private Clouds -- VPC Subnets -- Shared VPC -- VPC Network Peering -- Hybrid-Cloud Networking -- Hybrid-Cloud Design Considerations -- Hybrid-Cloud Implementation Options -- Service-Centric Networking -- Private Service Connect for Google APIs…”
    Libro electrónico
  13. 8093
    Publicado 2022
    Tabla de Contenidos: “…Increment and Decrement Operators -- Working with Binary Arithmetic Operators -- Arithmetic Operators -- Numeric Promotion -- Assigning Values -- Assignment Operator -- Casting Values -- Compound Assignment Operators -- Return Value of Assignment Operators -- Comparing Values -- Equality Operators -- Relational Operators -- Logical Operators -- Conditional Operators -- Making Decisions with the Ternary Operator -- Summary -- Exam Essentials -- Review Questions -- Chapter 3 Making Decisions -- Creating Decision-Making Statements -- Statements and Blocks -- The if Statement -- The else Statement -- Shortening Code with Pattern Matching -- Applying switch Statements -- The switch Statement -- The switch Expression -- Writing while Loops -- The while Statement -- The do/while Statement -- Infinite Loops -- Constructing for Loops -- The for Loop -- The for-each Loop -- Controlling Flow with Branching -- Nested Loops -- Adding Optional Labels -- The break Statement -- The continue Statement -- The return Statement -- Unreachable Code -- Reviewing Branching -- Summary -- Exam Essentials -- Review Questions -- Chapter 4 Core APIs -- Creating and Manipulating Strings -- Concatenating -- Important String Methods -- Method Chaining -- Using the StringBuilder Class -- Mutability and Chaining -- Creating a StringBuilder -- Important StringBuilder Methods -- Understanding Equality -- Comparing equals() and == -- The String Pool -- Understanding Arrays -- Creating an Array of Primitives -- Creating an Array with Reference Variables -- Using an Array -- Sorting -- Searching -- Comparing -- Using Methods with Varargs -- Working with Multidimensional Arrays -- Calculating with Math APIs -- Finding the Minimum and Maximum -- Rounding Numbers -- Determining the Ceiling and Floor -- Calculating Exponents -- Generating Random Numbers -- Working with Dates and Times…”
    Libro electrónico
  14. 8094
    Publicado 2024
    Tabla de Contenidos:
    Libro electrónico
  15. 8095
    Publicado 2024
    Tabla de Contenidos: “…Encryption and key management -- Tokenization -- Hashing -- Data loss prevention (DLP) -- Data de-identification -- Masking -- Implementing Data Discovery -- Structured data -- Unstructured data -- Semi-structured data -- Data location -- Chapter 6 Domain 2: Cloud Data Security, Part 2 -- Planning and Implementing Data Classification -- Data classification policies -- Data mapping -- Data labeling -- Sensitive data -- Personally Identifiable Information (PII) -- Protected health information (PHI) -- Cardholder data -- Designing and Implementing Information Rights Management (IRM) -- Objectives -- Appropriate tools -- Planning and Implementing Data Retention, Deletion, and Archiving Policies -- Data retention policies -- Data deletion procedures and mechanisms -- Data archiving procedures and mechanisms -- Legal hold -- Designing and Implementing Auditability, Traceability, and Accountability of Data Events -- Defining event sources and requirements of identity attribution -- SaaS event sources -- PaaS event sources -- IaaS event sources -- Identity attribution -- Logging, storing, and analyzing data events -- Collection -- Verification -- Storage and analysis -- Chain of custody and nonrepudiation -- Chapter 7 Domain 3: Cloud Platform and Infrastructure Security, Part 1 -- Comprehending Cloud Infrastructure and Platform Components -- Physical environment -- Network and communications -- Compute -- VMs -- Containers -- Reservations, limits, and shares -- Virtualization -- Storage -- Volume storage -- Object storage -- Management plane -- Designing a Secure Data Center -- Logical design -- Physical design -- Location, location, location! …”
    Libro electrónico
  16. 8096
    Publicado 2023
    Tabla de Contenidos: “…Google Cloud Memorystore -- Google Cloud's big data services -- Google Cloud Pub/Sub -- Google Cloud BigQuery -- Google Cloud Dataflow -- Google Cloud Dataproc -- Google Cloud Looker -- Summary -- Practice questions -- Answers to the practice questions -- Further reading -- Chapter 10: Google Cloud AI Services -- Google Cloud Vertex AI -- Vertex AI datasets -- Dataset labeling -- Vertex AI Feature Store -- Workbench and notebooks -- Vertex AI custom models -- Vertex Explainable AI -- Vertex AI prediction -- Vertex AI Model Monitoring -- Vertex AI Pipelines -- Vertex AI TensorBoard and Metadata -- Vertex AI AutoML -- Google Cloud ML APIs -- Sight API -- Conversational API -- Google Cloud generative AI services -- Summary -- Practice questions -- Answers to the practice questions -- Further reading -- Chapter 11: Google Cloud Security Services -- Google Cloud IAM -- Google Cloud users and groups -- Google Cloud service accounts -- Google Cloud IAM roles -- Google Cloud endpoint security -- GCE VM security -- GCS security -- Google Cloud network security -- Google Cloud data security -- Data classification and data lineage -- Data encryption -- GCP DLP -- Google Cloud Monitoring and Logging -- Google Cloud Security Command Center (SCC) -- SCC asset discovery -- SCC scan findings -- SCC integration with Cloud DLP -- SHA -- The latest SCC features -- Summary -- Practice questions -- Answers to the practice questions -- Further reading -- Part 3: Mastering Azure Cloud Services -- Chapter 12: Microsoft Azure Cloud Foundation Services -- Azure cloud resource hierarchy -- Azure cloud compute -- Azure cloud VMs -- Azure cloud container services -- Azure serverless computing -- Azure cloud storage -- Object storage -- File storage -- Block storage -- Archive storage -- Azure cloud networking -- Azure Cloud Foundation service implementation -- Summary…”
    Libro electrónico
  17. 8097
    Publicado 2023
    Tabla de Contenidos: “…Designing a strategy for SIEM and SOAR -- Evaluating security workflows -- Security strategies for incident management and response -- Security workflows -- Evaluating a security operations strategy for the incident management life cycle -- Evaluating a security operations strategy for sharing technical threat intelligence -- Summary -- Chapter 4: Designing an Identity Security Strategy -- Zero Trust for identity and access management -- Designing a strategy for access to cloud resources -- Recommending an identity store -- Azure AD tenant synchronization with SCIM -- B2B -- B2C -- Recommending an authentication and authorization strategy -- Hybrid identity infrastructure -- Secure authorization methods -- Designing a strategy for CA -- Designing a strategy for role assignment and delegation -- Designing a security strategy for privileged role access -- Azure AD PIM -- Designing a security strategy for privileged activities -- Privileged access reviews -- Entitlement management (aka permission management) -- Cloud tenant administration -- Case study - designing a Zero Trust architecture -- Summary -- Part 3: Evaluating Governance, Risk, and Compliance (GRC) Technical Strategies and Security Operations Strategies -- Chapter 5: Designing a Regulatory Compliance Strategy -- Interpreting compliance requirements and translating them into specific technical capabilities -- Evaluating infrastructure compliance by using Microsoft Defender for Cloud -- Interpreting compliance scores and recommending actions to resolve issues or improve security -- Designing the implementation of Azure Policy -- Designing for data residency requirements -- Translating privacy requirements into requirements for security solutions -- Case study - designing for regulatory compliance -- Summary…”
    Libro electrónico
  18. 8098
    Publicado 2023
    Tabla de Contenidos: “…-- Prerequisites -- How to Find Tables Without Primary Keys -- How to Add Surrogate Primary Keys -- How to Set Up HA -- Setup HA (Create DB System) -- Enable HA (Existing DB System) -- Disable HA (Existing HA DB System) -- How to Use MDS HA -- Limitations -- Advanced Topics -- Summary…”
    Libro electrónico
  19. 8099
    por Korstanje, Joos
    Publicado 2021
    Tabla de Contenidos: “…Application of the MA Model -- Multistep Forecasting with Model Retraining -- Grid Search to Find the Best MA Order -- Key Takeaways -- Chapter 5: The ARMA Model -- The Idea Behind the ARMA Model -- The Mathematical Definition of the ARMA Model -- An Example: Predicting Sunspots Using ARMA -- Fitting an ARMA(1,1) Model -- More Model Evaluation KPIs -- Automated Hyperparameter Tuning -- Grid Search: Tuning for Predictive Performance -- Key Takeaways -- Chapter 6: The ARIMA Model -- ARIMA Model Definition -- Model Definition -- ARIMA on the CO2 Example -- Key Takeaways -- Chapter 7: The SARIMA Model -- Univariate Time Series Model Breakdown -- The SARIMA Model Definition -- Example: SARIMA on Walmart Sales -- Key Takeaways -- Part III: Multivariate Time Series Models -- Chapter 8: The SARIMAX Model -- Time Series Building Blocks -- Model Definition -- Supervised Models vs. …”
    Libro electrónico
  20. 8100
    Publicado 2017
    Tabla de Contenidos: “…Items required for this project -- Adafruit HUZZAH ESP8266 breakout -- USB FTDI connector -- WS2811 NeoPixels LED strip -- 5V and 3.3V (optional) power supply -- 1000μF capacitor -- Logic level shifting IC -- 400-600Ω resistor -- JST SM or JST PH connectors (optional) -- Getting the CheerLights code set up -- Set up the Arduino IDE -- Installing the NeoPixel library -- Testing the ESP8266 -- Connect the ESP8266 Huzzah to the USB FTDI connector (FT232RL) and your computer -- Switching the ESP8266&amp -- #160 -- Huzzah&amp -- #160 -- into deployment mode -- Deploying your code -- Connecting it all together -- Connecting the data pins -- Power the NeoPixels -- Power up the ESP8266 -- Programming the ESP8266 Huzzah for CheerLights -- Let's try a simple single-color display -- Let's try some interesting modifications -- Summary -- Chapter 4: Erase Parking Headaches with OpenCV and Raspberry Pi -- Introduction to smart parking systems -- Sensor devices for smart parking -- Presence sensor -- Ultrasonic sensor&amp -- #160 -- -- Camera -- Configure the camera -- Accessing our Raspberry Pi via SSH -- Machine vision systems -- Introduction to machine vision -- Testing the camera -- Installing OpenCV on the Raspberry Pi -- Detecting the vehicle plate number -- OpenALPR -- Integrating the library -- Programming the script for Python -- Cloud API -- PHP REST API script for OpenALPR -- Architecture of the parking system -- Logging spaces in a database -- Configuring a MySQL database server -- Installing MySQL -- Installing the MySQL driver for PHP -- Testing PHP and MySQL -- Installing phpMyAdmin for administrating databases -- Configuring the Apache server -- Entering the phpMyAdmin remote panel -- Integrating the Raspberry Pi and camera into the database -- Programming the script software -- Node Express app for openALPR -- Amazon Web Services IoT…”
    Libro electrónico