Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 525
- Historia 396
- Development 246
- Management 243
- Economic conditions 206
- Social aspects 189
- Application software 167
- Història 167
- Data processing 161
- Politics and government 151
- Engineering & Applied Sciences 149
- Business & Economics 144
- Education 140
- Economic policy 134
- Economic aspects 127
- Economics 122
- Social conditions 121
- Emigration and immigration 117
- Leadership 113
- Computer networks 110
- Editing 107
- Motion pictures 107
- Research & information: general 107
- Energy 105
- Sustainable development 105
- Technology: general issues 105
- Employment 102
- Government policy 101
- Cloud computing 99
- Design 98
-
10841Publicado 2018Tabla de Contenidos: “…-- Installing additional required dependencies -- Modifying the webpack configuration to support SASS -- Updating the webpack vendor configuration -- Rebuilding the vendor bundle -- Adding application-wide layout elements -- Adding application-wide styles -- Styling the product list and product details components -- Fetching data before navigation -- Adding a page loading indicator -- Adding a transition on page change -- Extending the existing data model -- Dropping the existing database -- Adding new/updating existing entities -- Updating the DbContext class -- Creating a migration to reflect the model changes -- Updating the application's seed data -- Filtering on the server -- Updating controller actions to support filtering -- Testing our filtering logic -- Filtering on the client -- Installing additional dependencies -- Installing Font Awesome -- Installing additional npm packages -- Building an accordion component -- Defining the accordion template structure -- Defining the accordion behavior -- Styling the accordion component -- Building the filters component -- Scaffolding the filters component template -- Adding a brand filter…”
Libro electrónico -
10842Publicado 2021Tabla de Contenidos: “…-- Nailing the Value Proposition for Potential Acquirers -- Defining Transition Plans for Potential Buyers -- Crafting the Marketing Plan -- Identifying a Powerful Flow and Structure -- Acquisition Memorandum Template -- Cover Slide -- Disclosures -- Table of Contents -- Executive Summary -- Market Opportunity -- Solution -- Target Market -- Competition and Advantages -- Market Traction -- Financial Results and Projections -- Executive Team -- Technology Platform -- Marketing and Sales -- Business History -- Reason for the Sale -- Buyer Qualifications -- Directions for the LOI -- Chapter 6 Putting Your Finances in Order -- Understanding Financials -- The Importance of Key Metrics -- Burn Rate -- Hard Costs -- EBITDA -- Gross Revenues -- Gross Profit Margins -- Sales Units -- Customer Acquisition Costs -- Growth Rate -- Debt to Equity -- Why Growth and Operating Assumptions Are Critical -- Assumptions Are the Basis for All of Your Other Financials -- Credibility -- Earnouts -- Modeling Out a Powerful Five-Year Projection -- Anticipating Questions on Numbers -- Chapter 7 Understanding Your Valuation -- Variables Affecting Your Startup's Value -- Common Methods of Business Valuation -- Your Number -- Earnings Multiples -- The Comparables Approach -- Cost to Replicate -- Discounted Cash Flow Method -- Additional Valuation Methods -- How to Value Pre-revenue Startups -- The Berkus Method -- Venture Capital Method -- The Scorecard Method…”
Libro electrónico -
10843por Ritchie, Kyle J.Tabla de Contenidos: “…Understanding strategic sourcing -- Establishing ethics -- Exploring certifications and standards -- Chapter 14 Circular Materials, Products, and Packaging -- Redesigning Materials and Products: The Transition from Linear to Circular -- "Less bad" does not equal "good" -- Planning for material reincarnation -- How To Keep Materials In Use Forever -- Why things break -- From planned obsolescence to planned permanence -- Shipping Global versus Producing Local -- Building a regional economy: A shipping substitute -- You've got to be shipping me -- Permanent packaging -- Part 4 Redesigning the Future to be Circular -- Chapter 15 The Circular Economy of Food Production -- Examining the Two Ways of Producing Food -- Investigating the Hidden Costs of Agriculture -- Food waste: Expending money, time, and resources unnecessarily -- Environmental degeneration: Damaging the planet with increasing speed -- Permaculture to the Rescue -- Following nature's lead: Permaculture design principles -- Taking a look at permaculture management zones -- Chapter 16 Circularity for Design -- Redesigning Design -- Understanding circular design -- Designing out waste -- Keeping products and materials in use -- Regenerating natural systems -- Recognizing the Problems Designers Face -- We're being overtaken by trash -- We're running out of materials -- We're choking on carbon -- Creating a Framework for Circular Design -- Applying the ReSOLVE framework to buildings -- Layers of useful life -- Putting the pieces together -- Chapter 17 Circular Economy for Builders, Makers, and Manufacturers -- Assessing a Building's Lifecycle -- Defining construction and demolition debris -- Gauging the economic opportunities of C& -- D waste -- Measuring C& -- D waste impact -- Defining lifecycle impacts -- Identifying human health hazards and promoting transparency…”
Publicado 2021
Libro electrónico -
10844Publicado 2016Tabla de Contenidos: “…Reforming education and strengthening skill use and school-to-work transitions -- D. Improving health spending efficiency -- E. …”
Libro electrónico -
10845Publicado 2019Tabla de Contenidos: “…Seven Principles for Building Strong Self-Brand Connections -- Principle 1: Target One Motive -- Principle 2: Target Life Transitions for Powerful Self-Brand Connections -- Principle 3: Use the Brand to Bridge Self-Concept Conflicts -- Principle 4. …”
Libro electrónico -
10846Publicado 2016Tabla de Contenidos: “…-- References -- Look for state transitions in temporal data…”
Libro electrónico -
10847Publicado 2019Tabla de Contenidos: “…Chapter 4: Managing Change in Data Science -- Understanding Change Management in Data Science -- Approaching Change in Data Science -- Recognizing what to avoid when driving change in data science -- Using Data Science Techniques to Drive Successful Change -- Using digital engagement tools -- Applying social media analytics to identify stakeholder sentiment -- Capturing reference data in change projects -- Using data to select people for change roles -- Automating change metrics -- Getting Started -- Part 2: Making Strategic Choices for Your Data -- Chapter 5: Understanding the Past, Present, and Future of Data -- Sorting Out the Basics of Data -- Explaining traditional data versus big data -- Knowing the value of data -- Exploring Current Trends in Data -- Data monetization -- Responsible AI -- Cloud-based data architectures -- Computation and intelligence in the edge -- Digital twins -- Blockchain -- Conversational platforms -- Elaborating on Some Future Scenarios -- Standardization for data science productivity -- From data monetization scenarios to a data economy -- An explosion of human/machine hybrid systems -- Quantum computing will solve the unsolvable problems -- Chapter 6: Knowing Your Data -- Selecting Your Data -- Describing Data -- Exploring Data -- Assessing Data Quality -- Improving Data Quality -- Chapter 7: Considering the Ethical Aspects of Data Science -- Explaining AI Ethics -- Addressing trustworthy artificial intelligence -- Introducing Ethics by Design -- Chapter 8: Becoming Data-driven -- Understanding Why Data-Driven Is a Must -- Transitioning to a Data-Driven Model -- Securing management buy-in and assigning a chief data officer (CDO) -- Identifying the key business value aligned with the business maturity -- Developing a Data Strategy -- Caring for your data -- Democratizing the data -- Driving data standardization…”
Libro electrónico -
10848Publicado 2023Tabla de Contenidos: “…Impersonation -- Phishing -- Spear phishing -- CEO fraud -- Smishing -- Vishing -- Pharming -- Whaling: Going for the "big fish" -- Messing around with Other People's Stuff: Tampering -- Captured in Transit: Interception -- Man-in-the-middle attacks -- Taking What Isn't Theirs: Data Theft -- Personal data theft -- Business data theft -- Data exfiltration -- Compromised credentials -- Forced policy violations -- Cyberbombs That Sneak into Your Devices: Malware -- Viruses -- Worms -- Trojans -- Ransomware -- Scareware -- Spyware -- Cryptocurrency miners -- Adware -- Blended malware -- Zero-day malware -- Fake malware on computers -- Fake malware on mobile devices -- Fake security subscription renewal notifications -- Poisoned Web Service Attacks -- Network Infrastructure Poisoning -- Malvertising…”
Libro electrónico -
10849Publicado 2015Tabla de Contenidos: “…5.2 Device Operation -- 5.3 Material Properties -- 5.4 Device and Material Scaling to the Nanometer Size -- 5.5 Multi-Bit Operation and 3D Integration -- 5.6 Applications -- 5.7 Future Outlook -- 5.8 Summary -- Acknowledgments -- References -- Chapter 6: Ferroelectric FET Memory -- 6.1 Introduction -- 6.2 Ferroelectric FET for Flash Memory Application -- 6.3 Ferroelectric FET for SRAM Application -- 6.4 System Consideration: SSD System with Fe-NAND Flash Memory -- 6.5 Perspectives and Summary -- References -- Chapter 7: Nano-Electro-Mechanical (NEM) Memory Devices -- 7.1 Introduction and Rationale for a Memory Based on NEM Switch -- 7.2 NEM Relay and Capacitor Memories -- 7.3 NEM-FET Memory -- 7.4 Carbon-based NEM Memories -- 7.5 Opportunities and Challenges for NEM Memories -- References -- Chapter 8: Redox-based Resistive Memory -- 8.1 Introduction -- 8.2 Physical Fundamentals of Redox Memories -- 8.3 Electrochemical Metallization Memory Cells -- 8.4 Valence Change Memory Cells -- 8.5 Performance -- 8.6 Summary -- References -- Chapter 9: Electronic Effect Resistive Switching Memories -- 9.1 Introduction -- 9.2 Charge Injection and Trapping -- 9.3 Mott Transition -- 9.4 Ferroelectric Resistive Switching -- 9.5 Perspectives -- 9.6 Summary -- References -- Chapter 10: Macromolecular Memory -- 10.1 Chapter Overview -- 10.2 Macromolecules -- 10.3 Elementary Physical Chemistry of Macromolecular Memory -- 10.4 Classes of Macromolecular Memory Materials and Their Performance -- 10.5 Perspectives -- 10.6 Summary -- Acknowledgments -- References -- Chapter 11: Molecular Transistors -- 11.1 Introduction -- 11.2 Experimental Approaches -- 11.3 Molecular Transistors -- 11.4 Molecular Design -- 11.5 Perspectives -- Acknowledgments -- References -- Chapter 12: Memory Select Devices -- 12.1 Introduction -- 12.2 Crossbar Array and Memory Select Devices…”
Libro electrónico -
10850Publicado 2023Tabla de Contenidos: “…-- Shared responsibility models -- The roles of different teams -- Buy-in from the executive -- The importance of executive buy-in -- How to secure executive buy-in -- Measuring the effect of the Security Champions program -- Technical aspects to check the effectiveness of the Security Champions program -- Strategic aspects to check the effectiveness of the Security Champions program -- Summary -- Part 6: Case Studies and Conclusion -- Chapter 15: Case Studies -- Case study 1 - FinTech Corporation -- Challenges faced before implementing DevSecOps -- Steps were taken to transition to DevSecOps -- Results and impact on the company's software development -- Lessons learned -- Case study 2 - Verma Enterprises -- Challenges faced by the organization in terms of security -- Implementation of DevSecOps practices and tools -- Results and benefits achieved -- Case study 3 - HealthPlus…”
Libro electrónico -
10851Publicado 2017Tabla de Contenidos: “…. -- See also -- Securing data in transit -- How to do it... -- Android -- iOS -- See also -- Securely using Android and iOS platform components -- How to do it... -- Securing third-party code and components -- How to do it... -- See also -- Employing reverse engineering protections -- How to do it... -- There's more... -- See also -- Chapter 10 : Securing Hardware -- Introduction -- Hardware best practices -- Uncommon screw types -- Antitamper and hardware protection mechanisms -- Side channel attack protections -- Exposed interfaces -- Encrypting communication data and TPM -- Chapter 11: Advanced IoT Exploitation and Security Automation -- Introduction -- Finding ROP gadgets -- Getting ready -- How to do it... -- See also -- Chaining web security vulnerabilities -- How to do it... -- Step 1 - identifying assets and entry points -- Step 2 - finding the weakest link -- Step 3 - reconnaissance -- Android application -- iOS application -- Web application -- Step 4 - identifying vulnerabilities -- Step 5 - Exploitation -- Chaining vulnerabilities -- See also -- Configuring continuous integration testing for firmware -- Getting ready -- How to do it... -- See also -- Configuring continuous integration testing for web applications -- Getting ready -- How to do it... -- See also -- Configuring continuous integration testing for mobile applications -- Getting ready -- How to do it... -- See also -- Index…”
Libro electrónico -
10852Publicado 2009Tabla de Contenidos: “…Flying Solo: Preparing the Project -- Flying Solo: Creating the Opening Text -- Animating the Opening Text -- Creating the Digital Countdown Clock -- Animating the Clock Using Title Clips in Sequence -- Synchronizing the Clock Clips with the Beep -- Flying Solo: Adding the Four Video Clips to the Timeline -- Applying a PiP Effect to Each of the Video Clips -- Reversing the PiP Effect -- Flying Solo: Adding a Soundtrack and a Voice-over -- Making Adjustments, Rendering, and Exporting -- 6 Hollywood Movie Looks: Using Preset Effects -- Flying Solo: Preparing the Project -- Applying the Air Brush Effect -- Applying the Old Film Effect -- Adding Some "Flash" to the Clip -- Flying Solo: Adding Some Period Music -- Flying Solo: Applying Some Camera Shake -- Making Adjustments, Rendering, and Exporting -- 7 Hollywood Movie Looks: Custom Building a Movie Look -- Flying Solo: Preparing the Project -- Creating a Cinematic '60s Movie Look -- Copying Effects and Settings from One Clip to Another -- Creating a Cinematic '70s Movie Look -- Creating the Home Projector Look -- Flying Solo: Adding Some Music -- Making Adjustments, Rendering, and Exporting -- 8 Hollywood Movie Time: The Passing of Time Effect -- Flying Solo: Preparing the Project -- Marking the Individual Scenes -- Removing Time (Frames) from the Clip -- Adding a Cross Dissolve Between Clips -- Adjusting the Transitions -- Adding Sound FX -- Flying Solo: Using Titles and Fades -- Adding the Music Track -- Making Adjustments, Rendering, and Exporting -- 9 Hollywood Movie Time: Fast Times -- Flying Solo: Preparing the Project -- Adding the Foreground Video Clips -- Flying Solo: Increasing the Speed of the Crowd -- Matching the Appearance of the Two Clips -- Flying Solo: Adding the Soundtrack -- Making Adjustments, Rendering, and Exporting -- 10 Hollywood Movie Time: The Power of the Force-Reversing Time…”
Libro electrónico -
10853Publicado 2023Tabla de Contenidos: “…-- Limitations in Bitcoin -- Altcoins -- Overview of blockchain use cases in the industry and government -- Financial services -- Healthcare -- Blockchain use cases led by government -- Ushering in the world of Ethereum -- Smart contract -- EVM -- Account -- Summary -- Chapter 2: Ethereum Architecture and Ecosystem -- Technical requirements -- Introducing the Eth1 Architecture -- Ethereum - the world computer -- Web 2.0, Web3, to the Metaverse -- DApps -- Diving deep into Eth1 -- Accounts -- Two types of accounts -- EOAs -- CAs -- Transactions and messages -- Smart contracts -- Ether and gas -- The EVM -- Addresses and wallets -- Examining mining in Eth 1.0 -- Mining and the consensus protocol -- Ethereum transactions and block structure -- Transaction validation and block verification -- Understanding scaling challenges in Ethereum -- The blockchain scalability trilemma -- Modular blockchain architecture -- Ethereum scaling solutions -- Introducing Beacon Chains and Eth2 -- PoS in Eth2 -- How the beacon chain works -- Benefits from the transition to PoS -- Merging Eth1 and Eth2 -- Merging Eth1 data into Eth2…”
Libro electrónico -
10854Publicado 2024Tabla de Contenidos: “…-- Identifying a Role -- Roles versus ClusterRoles -- Negative Roles -- Aggregated ClusterRoles -- RoleBindings and ClusterRoleBindings -- Combining ClusterRoles and RoleBindings -- Mapping enterprise identities to Kubernetes to authorize access to resources -- Implementing namespace multi-tenancy -- Kubernetes auditing -- Creating an audit policy -- Enabling auditing on a cluster -- Using audit2rbac to debug policies -- Summary -- Questions -- Answers -- Chapter 8: Managing Secrets -- Technical Requirements -- Getting Help -- Examining the difference between Secrets and Configuration Data -- Managing Secrets in an Enterprise -- Threats to Secrets at Rest -- Threats to Secrets in Transit -- Protecting Secrets in Your Applications -- Understanding Secrets Managers -- Storing Secrets as Secret Objects -- Sealed Secrets -- External Secrets Managers -- Using a Hybrid of External Secrets Management and Secret Objects -- Integrating Secrets into Your Deployments -- Volume Mounts -- Using Kubernetes Secrets -- Using Vault's Sidecar Injector -- Environment Variables -- Using Kubernetes Secrets -- Using the Vault Sidecar -- Using the Kubernetes Secrets API -- Using the Vault API -- Summary -- Questions -- Answers -- Chapter 9: Building Multitenant Clusters with vClusters -- Technical requirements -- Getting Help -- The Benefits and Challenges of Multitenancy -- Exploring the Benefits of Multitenancy -- The Challenges of Multitenant Kubernetes -- Using vClusters for Tenants -- Deploying vClusters -- Securely Accessing vClusters -- Accessing External Services from a vCluster -- Creating and Operating High-Availability vClusters -- Understanding vCluster High Availability -- Upgrading vClusters -- Building a Multitenant Cluster with Self Service -- Analyzing Requirements -- Designing the Multitenant Platform…”
Libro electrónico -
10855Publicado 2002Tabla de Contenidos: “…Restrictions on Hierarchical Queries -- Enhancements in Oracle Database 10g -- Getting Data from the Root Row -- Ignoring Cycles -- Identifying Cycles -- Identifying Leaf Nodes -- DECODE and CASE -- DECODE, NULLIF, NVL, and NVL2 -- DECODE -- NULLIF -- NVL and NVL2 -- The Case for CASE -- Searched CASE Expressions -- Simple CASE Expressions -- DECODE and CASE Examples -- Result Set Transformations -- Selective Function Execution -- Conditional Update -- Optional Update -- Selective Aggregation -- Checking for Existence -- Division by Zero Errors -- State Transitions -- Partitioning -- Partitioning Concepts -- Partitioning Tables -- Partitioning Indexes -- Partitioning Methods -- Range Partitioning -- Hash Partitioning -- Composite Range-Hash Partitioning -- List Partitioning -- Composite Range-List Partitioning -- Specifying Partitions -- Partition Pruning -- PL/SQL -- What Is PL/SQL? …”
Libro electrónico -
10856por Gustafson, J. M.Tabla de Contenidos: “…What just happened? -- Transitions -- Transforms -- Time for action - effects in action -- What just happened? …”
Publicado 2013
Libro electrónico -
10857Publicado 2020Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Getting Started with Chromebook -- Chapter 1 Choosing and Set ting Up Your Chromebook -- Checking Under the Hood of the Chromebook -- The software -- The hardware -- Choosing a Chromebook -- Setting Up Your Chromebook -- Turning on your device -- Selecting a language -- Connecting to the Internet -- Agreeing to the Terms of Service -- Logging In for the First Time -- Logging in using an existing Google Account -- Creating a new Google Account -- Using Chromebook as a guest -- Transitioning to a Chromebook from Mac, Linux, or Windows -- Where to Go Next -- Chapter 2 Working with the Chromebook Desktop -- Accessing the Chromebook Shelf -- Using the Launcher: Chromebook's Start Button -- Navigating the Launcher -- Organizing Launcher Icons -- Setting Up App Shortcuts -- Pinning app shortcuts to your shelf -- Removing app shortcuts from your shelf -- Getting the Scoop in the Status Area -- Taking Charge of Window Controls -- Multitasking with Multiple Windows -- Setting Up a Printer -- Direct connect printing -- Wi-Fi printing -- Cloud printing -- Chapter 3 Sur veying the Chrome Browser -- Navigating the Chrome Browser -- Sizing the Chrome window -- Working with tabs -- Using the Omnibox and the navigation buttons -- Saving your place with the bookmark bar -- Customizing and Controlling Chrome -- Managing bookmarks -- Managing your history and downloads -- Erasing your browsing history -- Going incognito -- Changing Search Engine Providers -- Using Other Browsers -- Chapter 4 Getting Your Hands on the Keyboard and Touchpad -- The Chromebook Keyboard at a Glance -- Using Shortcut Key Combinations -- Configuring Keyboard Settings…”
Libro electrónico -
10858Publicado 2019Tabla de Contenidos: “…Chapter 18 Conducting Post-Incident Reviews -- Going beyond Root Cause Analysis -- Stepping through an Incident -- Succeeding at Post-Incident Reviews -- Scheduling it immediately -- Including everyone -- Keeping it blameless -- Reviewing the timeline -- Asking tough questions -- Acknowledging hindsight bias -- Taking notes -- Making a plan -- Part 5 Tooling Your DevOps Practice -- Chapter 19 Adopting New Tools -- Integrating with Open Source Software -- Opening community innovation -- Licensing open source -- Deciding on open source -- Transitioning to New Languages -- Compiling and interpreting languages -- Parallelizing and multithreading -- Programming functionally -- Managing memory -- Choosing languages wisely -- Chapter 20 Managing Distributed Systems -- Working with Monoliths and Microservices -- Choosing a monolithic architecture first -- Evolving to microservices -- Designing Great APIs -- What's in an API -- Focusing on consistent design -- Containers: Much More than Virtual Machines -- Understanding containers and images -- Deploying microservices to containers -- Comparing orchestrators: Harmonize the hive -- Configuring containers -- Monitoring containers: Keeping them alive until you kill them -- Securing containers: These boxes need a lock -- Chapter 21 Migrating to the Cloud -- Automating DevOps in the Cloud -- Taking your DevOps culture to the cloud -- Learning through adoption -- Benefitting from cloud services -- Cumulus, Cirrus, and Steel: Types of Clouds -- Public cloud -- Private cloud -- Hybrid cloud -- Cloud as a Service -- Infrastructure as a Service -- Platform as a Service -- Software as a Service -- Choosing the Best Cloud Service Provider -- Amazon Web Services (AWS) -- Microsoft Azure -- Google Cloud Platform (GCP) -- Finding Tools and Services in the Cloud -- Part 6 The Part of Tens…”
Libro electrónico -
10859Publicado 2010Tabla de Contenidos: “…11 Working with Styles -- Using the Paragraph Styles or Character Styles Panel -- Changing the Basic Paragraph Style -- Creating Paragraph Styles -- Creating Character Styles -- Creating GREP Styles -- Creating Style Groups -- Loading and Importing Styles -- Applying and Overriding Styles -- Creating Nested Styles -- Creating Object Styles -- Creating Table and Cell Styles -- Using Quick Apply -- 12 Finalizing a Document -- Using Spell Check -- Using Custom Dictionaries -- Finding and Changing Fonts -- Using Find and Change -- Searching for Text -- Searching Using GREP -- Searching for Glyphs -- Searching for Objects -- Working with Hyphenation -- Keeping Lines Together -- Changing Justification Options -- Using the Story Editor -- Adding Footnotes -- Creating and Working with Notes -- Changing Case -- 13 Creating an Interactive Document -- Defining Hyperlink Destinations -- Creating Hyperlinks -- Converting and Stylizing Hyperlinks -- Using the Hyperlinks Panel -- Creating Cross-References -- Creating Bookmarks -- Adding Media -- Setting Media Options -- Adding Animation with Motion Presets -- Working with Animations -- Changing Animation Order -- Adding Page Transitions -- Using the Buttons Panel -- Creating Buttons -- Working with Events and Actions -- Working with Button States -- Setting Button Tab Order -- Creating Multi-State Objects -- Using the Preview Panel -- 14 Automating the Way You Work -- Creating a Library -- Using and Updating a Library -- Changing Library Item Information -- Searching and Sorting Libraries -- Creating and Using Snippets -- Creating Conditional Text -- Using and Running Scripts -- Using Data Merge -- Working with XML -- Exporting XML or IDML -- 15 Exporting a Document -- Exporting a Document -- Understanding Export File Formats -- Exporting as a Print PDF -- Setting PDF General Options…”
Libro electrónico -
10860Publicado 2011Tabla de Contenidos: “…-- Adding a Blend Behavior in Code -- Creating a New Blend Behavior -- Finding More Information -- Summary -- 12 Sketching User Experience -- Sketching as a Discovery Process -- Using Sketching and Wireframing Tools -- Other Kinds of Sketching -- Discovering SketchFlow -- Creating a New SketchFlow Application -- Checking the Panels -- Creating and Connecting Screens -- Building the UI -- Creating a Component Screen -- Using Sketch Controls -- Exploring the Sketch Controls -- Creating States and Transitions -- Building an Animation -- Deploying the SketchFlow Application -- Running the Prototype -- Giving Feedback -- Importing and Managing User Feedback -- Importing and Exporting -- Importing from Photoshop and Illustrator -- Importing from PowerPoint -- Exporting to Word -- Integrating and Collaborating -- Integrating into SharePoint -- Integrating into Team Foundation Server -- Summary -- 13 Creating Line-of-Business Applications -- Preparing the Server-Side -- Prerequisites -- Preparing the Server-Side Application -- Creating the Silverlight Client -- Bringing the Client and the Server Together -- Adding a Domain Service -- Inspecting the Domain Service Class -- Inspecting the Metadata -- Creating a New Server-Side Query -- Working with the Visual Designer -- Understanding the DomainDataSource -- Calling a Query with Parameter -- Sorting the Data -- Adding a Pager -- Refactoring the Application to MVVM -- Adding a View-model -- Adapting the XAML Markup -- Customizing the Columns -- Localizing the User Interface -- Adding a RelayCommand Class -- Executing the CRUD Operations in Code -- Displaying Messages from the View-model -- Deleting an Order -- Validating the Values…”
Libro electrónico