Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 452
- Application software 417
- Historia 237
- Java (Computer program language) 200
- Application program interfaces (Computer software) 185
- Tàpies, Antoni 161
- Engineering & Applied Sciences 150
- Historia y crítica 132
- Computer Science 128
- Cloud computing 121
- Web site development 121
- Computer programming 117
- Management 114
- Crítica e interpretación 112
- Programming 111
- Python (Computer program language) 107
- Health & Biological Sciences 104
- JavaScript (Computer program language) 99
- Communauté de Taizé 92
- Història 85
- Tapices 81
- Web applications 81
- Microsoft .NET Framework 76
- Design 75
- Computer networks 74
- Computer programs 74
- Data processing 73
- Mobile computing 73
- Android (Electronic resource) 71
- Computer software 70
-
8181por Hayashi, Kumiko, 1958-Tabla de Contenidos: “…Performance monitoring APIs -- 10.1 The performance status (Perfstat) API -- 10.1.1 Compiling and linking -- 10.1.2 Changing history of perfstat API -- 10.1.3 Subroutines -- 10.2 System Performance Measurement Interface -- 10.2.1 Compiling and linking -- 10.2.2 Terms and concepts for SPMI -- 10.2.3 Subroutines -- 10.2.4 Basic layout of SPMI program -- 10.2.5 SPMI examples -- 10.3 Performance Monitor API -- 10.3.1 Performance Monitor data access -- 10.3.2 Compiling and linking -- 10.3.3 Subroutines -- 10.3.4 PM API examples -- 10.3.5 PMAPI M:N pthreads support -- 10.4 Miscellaneous performance monitoring subroutines -- 10.4.1 Compiling and linking -- 10.4.2 Subroutines -- 10.4.3 Combined example -- Appendix A. …”
Publicado 2005
Libro electrónico -
8182por Krishnan, VinodTabla de Contenidos: “…-- Have a go hero - set some default values for other attributes -- Validation execution -- Some commonly used expressions -- Time for action - adding a script expression -- What just happened? -- Have a go hero - try more features of Groovy expressions -- Learning about APIs -- Generating an entity implementation class -- Java classes in entity objects -- Time for action - generating a Java API for DeptEO -- What just happened? …”
Publicado 2013
Libro electrónico -
8183Publicado 2024Tabla de Contenidos: “…-- 7.9 Blockchain IoT Use Cases -- 7.10 The Future of Botnets in the Internet of Things -- 7.10.1 Thingbots: Concept -- 7.10.2 Elements of Typical IRC Bot Attack -- 7.10.3 Malicious Use of Bots and Botnet -- References -- Chapter 8 A Practical Approach to Development of the Internet of Things -- 8.1 Python -- 8.1.1 Introduction to Python -- 8.1.2 Why Use Python in IoT? …”
Libro electrónico -
8184
-
8185por Segura Munguía, SantiagoTabla de Contenidos: “…Mediante prefijos -- C) Verbos -- Cambios fonéticos en latín -- Cambios fonéticos más frecuentes -- Cambios vocálicos -- Cambios consonánticos -- Abreviaturas tilizadas -- Lexicón -- A -- ăbăcus -- abbas -- abŏlěō -- Acădēmĭa -- ăcŏly̆thus -- aedēs -- aeqŭus -- Afrĭca -- ăgăpē -- ăgěr -- ăgō -- ălĭus -- ălō -- altěr -- ambactus -- ambrŏsĭa -- āmēn -- Amphicty̆ŏnes -- amphĭbŏlĭa -- ănăbaptismus -- ănăchōrēta -- ănăcŏlūthon -- Anacrěōn -- ănăgōgē -- ănăthēma -- angărĭa -- antinomĭa -- ăphŏrismus -- Aphrŏdīta -- ăpĭō -- ăpŏdictĭcus -- ăpŏlŏgus -- ăpostăsĭa -- ăpostŏlus -- ăpostrŏphe -- ăpŏthěōsis -- āra -- arbĭter -- arcěō…”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
8186Android smartphones for seniorsAndroid Smartphones For Seniors For DummiesPublicado 2022Tabla de Contenidos: “…Use Your Home Wi-Fi for Calls and Browsing -- Practice Safety When Using Public Connections -- Use a VPN to secure public Wi-Fi connections -- Beware of charging a phone from a public port -- Secure Your Power Cables -- Set Up Emergency Call and SOS -- Establishing SOS messaging -- Activating Emergency mode -- Managing Emergency mode -- Manage Home Screen App Shortcuts -- Make Folders of Apps -- Chapter 17 Android 12 and Beyond: The OS Evolution -- Find Helpful New Features in Android 12 -- Make purchasing faster with GPay -- Poke around in Android 12 -- Meet the Soothing Android 12 User Experience -- Be Ready for the Future -- Index -- EULA…”
Libro electrónico -
8187Publicado 2022Tabla de Contenidos: “…-- Documenting .NET libraries using DocFX -- Documenting a Web API using Swagger -- Use case - reusing code as a fast way to deliver good and safe software -- Summary -- Questions -- Further reading -- Chapter 13: Applying Service-Oriented Architectures with .NET -- Technical requirements -- Understanding the principles of the SOA approach -- SOAP web services -- SOAP specifications -- Difficulties associated with the standard -- REST web services -- Service type compatibility rules -- REST and native HTTP features -- Example of methods in the REST language -- The OpenAPI standard -- REST service authorization and authentication -- How does .NET 6 deal with SOA? …”
Libro electrónico -
8188Publicado 2017Tabla de Contenidos: “…6.2.2 - Real-Time Data Capturing in Manufacturing Field -- 6.3 - Real-time information enabled material handling strategy -- 6.4 - Overall architecture of optimization model for SMH -- 6.5 - IoT-enabled smart trolley -- 6.5.1 - Real-Time Information Capturing and Encapsulation -- 6.5.2 - Real-Time Information Exchange -- 6.5.3 - Workflow-Based Real-Time Guidance -- 6.6 - Two-stage combination optimization method for move tasks -- 6.6.1 - Real-Time Information Models of Move Tasks -- 6.6.2 - Preoptimization for Candidate Tasks Set -- 6.6.3 - AHP-Based Combination Optimization -- References -- Chapter 7 - Real-Time Key Production Performances Analysis Method -- 7.1 - Introduction -- 7.2 - Related works -- 7.2.1 - Real-Time Production Monitoring Technique -- 7.2.2 - Real-Time Production KPIs Analysis -- 7.2.3 - Real-Time Production Anomaly Analysis -- 7.2.4 - Research Gap -- 7.3 - Overall architecture of real-time production performance analysis model -- 7.3.1 - Configuration of Smart Sensors -- 7.3.2 - Critical Event-Based Information Extracting Process -- 7.3.3 - Real-Time Key Production Anomaly Analysis -- 7.4 - The event hierarchy of critical event -- 7.5 - HTCPN-based critical event analysis -- 7.5.1 - Basic Concepts of HTCPN -- 7.5.2 - HTCPN Model Construction -- 7.5.3 - Connection Between HTCPN and Manufacturing Resources -- 7.5.4 - Production Performance Extraction -- 7.6 - Real-time production anomaly diagnosis -- 7.6.1 - New Cases -- 7.6.2 - Historical Cases -- 7.6.3 - Decision Variables -- 7.6.4 - Tree Builder -- 7.6.5 - Anomaly Extraction and Causes Diagnosis -- References -- Chapter 8 - Real-Time Information-Driven Production Scheduling System -- 8.1 - Introduction -- 8.2 - Related works -- 8.2.1 - Agent Technology and Applications in Manufacturing Field -- 8.2.2 - Real-Time Production Scheduling…”
Libro electrónico -
8189Publicado 2023Tabla de Contenidos: “…Tracing and analyzing debug logs -- Real-time resolution using ChatGPT -- Debugging best practices and continuous improvement -- Summary -- 14 -- What You've Learned and What's Next -- A journey recapped -- The current landscape of generative AI -- Conjectures on generative AI's evolution -- The future of Salesforce development with generative AI -- Appendix A: Case Study -- Problem statement -- Assumptions -- Creating epics -- User stories -- Decomposing user stories -- Integrate Snowflake data with Salesforce account pages -- Display Snowflake information on Salesforce account pages -- Email functionality with Snowflake data -- Feedback mechanism for incorrect Snowflake information -- Integrate the Snowflake summary with Slack -- Providing reporting capabilities for the account and Snowflake information -- Compliance, security, and performance considerations -- User training and documentation -- Appendix B: A Deep Dive Into ChatGPT and User Stories -- Defining the process -- Sample user stories -- Requirements for user stories -- Index -- Other Books You May Enjoy -- _k8rm0fhhz2ea -- _xawt0n4enz72 -- _u4perea5435d -- _24dd1sp141ej -- _5llc259z0o2s -- _49k8v3yix0qq -- _prw104f50ez4 -- _kmiiy977wqaq -- _hnhfhv3mo3j1 -- _w7dxkr8nrdul -- _xyxm94aeqlbm -- _esok6g8djui1 -- _hn4v23h4s0dk -- _57w050msxawk -- _z8pcmfrbiry2 -- _46o0bkjfpehn -- _7ap5asnwo398 -- _7zcbyt2rmj8c -- _fc0satk9k3mn -- _sgqpe5s8ssmr -- _97z54wj6tc8u -- _u6wa4xch17mm -- _agxs3t9iecpv -- _mrsrmzpqtpx -- _d7f8ya60t4qh -- _mjz67uf1mm2q -- _t3jlpasccmx3 -- _l55ii0qz54e3 -- _iq9ve278gdrj -- _n43rkj6l6wra -- _5vmogh4dqw8w -- _yw7z06c8dyxm -- _4s8zsuf61cle -- _ciqpwlsh1287 -- _7fu2fh8cqitm -- _uqzgmo74pp9 -- _q2859qwjutpe -- _v8cym3r5ntej -- _4l9tnbyn5gen -- _o9kr5c68fw7a -- _fi1ypgi2xpl8 -- _7fo5yqqwuq3d -- _32fycl8z376u -- _iddrt8o5gve2 -- _bazb0q6ytq7y -- _1949k9g8e7jw…”
Libro electrónico -
8190Publicado 2023Tabla de Contenidos: “…-- Chapter 1: Introducing DevSecOps -- Product development processes -- The Waterfall model -- The Agile methodology -- Understanding the shift from DevOps to DevSecOps -- The new processes within DevSecOps -- DevSecOps maturity levels -- Maturity level 1 -- Maturity level 2 -- Maturity level 3 -- Maturity level 4 -- KPIs -- DevSecOps - the people aspect -- Summary -- Think and act -- Part 2: DevSecOps Principles and Processes -- Chapter 2: DevSecOps Principles -- DevSecOps principles -- Unifying the CI/CD pipeline -- Fail fast -- Automation and innovation in DevSecOps -- Introducing compliance checks -- Empowering teams to make decisions -- Cross-skilling and educating teams and the cultural aspect approach -- Proper documentation -- Relevant checkpoints -- Building and managing secure Dev environments and toolchains -- Challenges within the DevSecOps pipeline that principles can resolve -- Continuous application changes -- The developer knowledge gap -- Lack of AppSec tool integration -- Summary -- Chapter 3: Understanding the Security Posture -- Understanding your security posture -- Regular meetings -- Managing pipelines -- Testing pipelines -- Tools involved in pipelines -- Why and what measures we take to secure the environment -- Building the vulnerabilities inventory -- Addressing vulnerabilities -- Parameters to define the security posture -- Discovering the third-party component -- Measuring the effectiveness of the technologies used -- Managing workflows -- What measures can we take to monitor an environment? …”
Libro electrónico -
8191Publicado 2013Tabla de Contenidos: “…Statutory Compliance -- Workforce Profile -- Typical Configurations and Customizations -- What to Watch Out For -- Conclusion -- Chapter 10: Enterprise Asset Management Analytics -- Description of the Business Process -- Business Benefits -- Key Stakeholders -- Cross-Functional Analysis -- Subject Areas -- Asset Failure Analysis -- Asset History -- Asset Maintenance Cost -- Asset Maintenance Work Orders -- Asset Meter Reading -- Asset Quality -- Inventory Aging -- Maintenance Material Usage -- Maintenance Resource Availability -- Maintenance Resource Usage -- MRO Inventory -- Common Configurations and What to Watch Out For -- Conclusion -- Chapter 11: Project Analytics -- Description of the Business Process -- Business Benefits -- Key Stakeholders -- Cross-Functional Analysis -- Procurement and Spend Analytics -- Financial Analytics -- Subject Areas -- Metrics and KPIs…”
Libro electrónico -
8192Publicado 2023Tabla de Contenidos: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Introducing OKRs -- Chapter 1 Achieving Goals with OKRs -- OKRs Are a Goal-Setting System -- Seeing the Value in Goal Setting -- Examining the Components of OKRs -- Defining an "objective" -- Writing a basic objective -- Defining a key result -- Writing key results -- Comparing OKRs to Other Goal-Setting Systems -- OKRs versus SMART goals -- OKRs versus KPIs -- OKRs versus 4DX -- OKRs versus BSC -- Chapter 2 The Benefits of OKRs -- Overcoming Common Organizational Challenges with OKRs -- Acknowledging the difficulty of executing strategy -- The two main causes of execution failure -- Measurement is crucial -- Recognizing the challenge of sustaining growth -- The slow drip of internal issues -- Opportunities! …”
Libro electrónico -
8193Publicado 2023Tabla de Contenidos: “…-- Tips for Creating a Product Roadmap -- Exploratory 360 Assessment -- Agile Functional Decomposition -- Relationship of Functional Decomposition to Agile -- Functional Decomposition Examples -- Project Charter -- Summary of Key Points -- Discussion Topics -- Notes -- Chapter 16 Agile Stakeholder Management and Agile Contracts -- What Is a Stakeholder? …”
Libro electrónico -
8194Publicado 2024Tabla de Contenidos: “…Designing fast selection logic -- Selecting from a huge number of items -- Interoperability with .NET 8 -- Tip - creating a service in Linux -- Achieving security by design -- List of practices for achieving a safe architecture -- Authentication -- Sensitive data -- Web security -- Summary -- Questions -- Further reading -- Chapter 3: Managing Requirements -- Technical requirements -- Introducing Azure DevOps -- Managing system requirements in Azure DevOps -- Epic work items -- Feature work items -- Product Backlog items/User Story work items -- Azure DevOps repository -- Package feeds -- Test Plans -- Pipelines -- Usage -- Introducing GitHub projects -- Summary -- Questions -- Chapter 4: Best Practices in Coding C# 12 -- Technical requirements -- The simpler your code, the better a programmer you are -- Maintainability index -- Cyclomatic complexity -- Depth of inheritance -- Class coupling -- Number of lines of code -- Using a version control system -- Dealing with version control systems in teams -- Writing safe code in C# -- try-catch -- try-finally and using -- The IDisposable interface -- .NET 8 tips and tricks for coding -- Identifying well-written code -- Understanding and applying tools that can evaluate C# code -- Applying extension tools to analyze code -- Applying SonarAnalyzer -- Checking the final code after analysis -- Summary -- Questions -- Further reading -- Chapter 5: Implementing Code Reusability in C# 12 -- Technical requirements -- Understanding the principles of code reusability -- What code reuse is not -- What code reuse is -- Reusability in the development life cycle -- Using .NET 8 for code reuse -- Creating a reusable class library -- How does C# deal with code reuse? …”
Libro electrónico -
8195Publicado 2024Tabla de Contenidos: “…-- The ITIL model -- ITIL 3 -- ITIL 4 -- The waterfall model -- The iterative model -- The V-model -- The spiral model -- The big bang model -- The agile model -- The DevOps model -- Summary -- Questions -- Part 2: The Advantages of DevOps Release Management -- Chapter 4: What Problems Does DevOps Release Management Try to Solve? -- Exploring automated testing, deployment, and change management -- Automated testing -- Automating deployment -- Automating change management…”
Libro electrónico -
8196Publicado 2003Tabla de Contenidos: “…-- 1.6 What's new in the Sametime 3.1 APIs -- 1.6.1 Reverse proxy support -- 1.6.2 Multiplatform support in STLinks Toolkit -- 1.6.3 Status on login support -- 1.6.4 STLinks scalability upgrade -- 1.6.5 Fixed window size and place in chat dialogs -- 1.7 The structure of this redbook -- Chapter 2. …”
Libro electrónico -
8197por Lakner, GaryTabla de Contenidos: “…9.4.16 The outputStringInformation method -- 9.4.17 The outputAssociationInfo method -- 9.4.18 The deleteEIMDomain method -- 9.4.19 The startReport method -- 9.5 Java example: EIMAuthorities -- 9.5.1 The createEIMAuthoritiesHashMap method -- 9.5.2 Using the AccessContext class -- 9.5.3 Using the UserAccess class -- 9.6 Kerberizing an application -- 9.7 C EIM API -- 9.8 C Generic Security Service (GSS) API -- 9.9 EIM demo tool -- Part 4 Appendices -- Appendix A. …”
Publicado 2004
Libro electrónico -
8198
-
8199Publicado 2024“…Written around 1300, the Passional is the first major collection of legends in the German language and considered among the most significant and influential literary works of Middle High German spiritual epic poetry. Books I and II are now being published in an edition that documents the entire surviving literary record, the relationship to its sources, and the author's unique vocabulary das um 1300 entstandene ‘Passional’ ist die erste große Legendensammlung in deutscher Sprache und gilt als eines der dichterisch bedeutsamsten und wirkungsmächtigsten Werke der mittelhochdeutschen geistlichen Epik. …”
Libro electrónico -
8200Publicado 2024“…Written around 1300, the Passional is the first great collection of legends in the German language and considered among the most significant and influential literary works of Middle High German spiritual epic poetry. Books I and II are now being published in an edition that includes extensive documentation of the entire literary tradition, the relationship to its sources, and the author's unique vocabulary das um 1300 entstandene ‘Passional’ ist die erste große Legendensammlung in deutscher Sprache und gilt als eines der dichterisch bedeutsamsten und wirkmächtigsten Werke der mittelhochdeutschen geistlichen Epik. …”
Libro electrónico