Search Results - stack automation
Suggested Topics within your search.
Suggested Topics within your search.
- Development 14
- Application software 12
- Cloud computing 10
- Management 8
- Information technology 7
- Digital techniques 5
- Open source software 5
- Programming 5
- Security measures 4
- Web applications 4
- Automation 3
- Computer Security 3
- Computer networks 3
- Computer security 3
- Computer software 3
- Data processing 3
- Service-oriented architecture (Computer science) 3
- Software 3
- Web site development 3
- Automatic control 2
- Client/server computing 2
- Computer graphics 2
- Computer network resources 2
- Computers 2
- Database management 2
- Design and construction 2
- Embedded computer systems 2
- Finance 2
- Image processing 2
- Internet marketing 2
Search alternatives:
- stack »
- automation »
-
61
Aperture 3 portable genius
Published 2012Table of Contents: “…Controlling Tethered ShootingCustomizing Keyboard Shortcuts; Using Aperture with Automator; Using Vaults and Backup; Using Aperture's Database Repair Tools; Index…”
Full text (MFA users only)
Electronic eBook -
62
Spring MVC Cookbook.
Published 2016Table of Contents: “…Choosing a strategy to expose JPA Entities -- Retrieving data from a third-party API with OAuth -- Chapter 7: Developing CRUD Operations and Validations -- Introduction -- Extending REST handlers to all HTTP methods -- Validating resources using bean validation support -- Internationalizing messages and contents for REST -- Validating client-side forms with HTML5 AngularJS -- Chapter 8: Communicating Through WebSockets and STOMP -- Introduction -- Streaming social events with STOMP over SockJS -- Using RabbitMQ as a multiprotocol message broker -- Stacking and consuming tasks with RabbitMQ and AMQP -- Securing messages with Spring Session and Redis -- Chapter 9: Testing and Troubleshooting -- Introduction -- Automating Database Migrations with FlyWay -- Unit testing with Mockito and Maven Surefire -- Integration testing with Cargo, Rest-assured, and Maven failsafe -- Injecting Spring Beans into integration tests -- Modern application Logging with Log4j2 -- Index.…”
Full text (MFA users only)
Electronic eBook -
63
Cloud Management and Security.
Published 2014Table of Contents: “…10.4 Framework Domain Architecture10.5 Framework Software Agents; 10.6 Framework Workflow; 10.7 Threat Analysis; 10.8 Discussion and Future Directions; 10.9 Summary; 10.10 Exercises; References; 11 Insiders; 11.1 Introduction; 11.2 Insiders Definition; 11.3 Conceptual Models; 11.4 Summary; 11.5 Exercises; References; Part Three PRACTICAL EXAMPLES; 12 Real-Life Examples; 12.1 OpenStack; 12.2 Amazon Web Services; 12.3 Component Architecture; 12.4 Prototype; 12.5 Summary; Notes; References; 13 Case Study; 13.1 Scenario; 13.2 Home Healthcare Architecture in the Cloud.…”
Full text (MFA users only)
Electronic eBook -
64
-
65
Yii 1.1 application development cookbook : over 80 recipes to help you master using the Yii PHP framework
Published 2011Table of Contents: “…Error handling, Debugging, and Logging -- Introduction -- Using different log routes -- Analyzing the Yii error stack trace -- Logging and using the context information -- Implementing your own smart 404 handler -- 10. …”
Full text (MFA users only)
Electronic eBook -
66
-
67
Pilot testing of membrane zero liquid discharge for drinking water systems
Published 2014Table of Contents: “…Cover -- Copyright -- Acknowledgments -- Abstract and Benefits -- Table of Contents -- List of Tables -- List of Figures -- List of Acronyms -- Executive Summary -- Chapter 1.0: Introduction and Background -- 1.1 Project Objectives -- 1.2 Project Approach -- 1.3 Introduction to Technologies Evaluated by this Project -- 1.3.1 Reverse Osmosis -- 1.3.2 Concentration Polarization and Scaling -- 1.3.3 Membrane Fouling by Scalants -- 1.3.4 Electrodialysis -- 1.3.5 Electrodialysis Metathesis -- Chapter 2.0: Pilot Test Technology Selection -- 2.1 Pilot Test Site Description and Water Quality -- 2.1.1 Treatment Plant Description -- 2.1.2 Test Site Water Quality -- 2.2 Initial Screening of Technologies -- 2.2.1 Initial Screening of Thermal-Based Technologies -- 2.2.2 Screening of Membrane-Based Technologies -- 2.2.3 Screening of Electric Potential-Based Technologies -- 2.2.4 Screening of Alternative Technologies -- 2.2.5 Technologies Selected for Additional Evaluation -- 2.3 Evaluation of Screened Technologies -- 2.3.1 Determination of Limiting Scalants at Brighton and La Junta -- 2.3.2 Brine Minimization Treatment Trains Using Screened Technologies -- 2.3.3 Performance Predictions for Brine Minimization Treatment Trains -- 2.3.4 Summary of Performance Predictions -- 2.4 Recommendations for Testing -- 2.5 Additional Evaluation of EDM Technology -- Chapter 3.0: La Junta Pilot Test -- 3.1 Description -- 3.1.1 Pilot Test Objectives -- 3.1.2 Pilot Plant Configuration -- 3.1.3 Modes of Operation -- 3.1.4 EDM Membrane Unit ('Stack') -- 3.2 Water Quality Sampling and Analyses -- 3.2.1 Sampling Locations -- 3.2.2 Onsite Analyses -- 3.2.3 Offsite Analyses -- 3.3 Methods for Determination of System Recovery -- 3.3.1 Flow Balance Estimate of Recovery -- 3.3.2 Theoretical Estimate of Recovery Based on Ion Transport -- 3.4 Methods for Evaluation of NF Performance.…”
Full text (MFA users only)
Electronic eBook -
68
Professional visual studio 2013
Published 2014Table of Contents: “…Ch. 50 Web Application Deployment -- Web Deployment -- Publishing a Web Application -- Copy Web Site -- Web Project Installers -- The Web Platform Installer -- Extending the Web Platform Installer -- Summary -- ch. 51 The Automation Model -- Visual Studio Extensibility Options -- The Visual Studio Automation Model -- An Overview of the Automation Model -- Solutions and Projects -- Windows and Documents -- Commands -- Debugger -- Events -- Summary -- ch. 52 Add-Ins -- Developing an Add-In -- The Add-In Wizard -- Project Structure -- Testing Your Add-In -- The .AddIn File -- The Connect Class -- Creating a Tool Window -- Accessing the Visual Studio Automation Model -- Handling Visual Studio Events -- Deploying Add-Ins -- Summary -- ch. 53 Managed Extensibility Framework (MEF) -- Getting Started with MEF -- Imports and Exports -- Contracts -- Catalogs -- Advanced MEF -- The Visual Studio Editor -- The Text Model Subsystem -- The Text View Subsystem.…”
Full text (MFA users only)
Electronic eBook -
69
Decision Intelligence for Dummies
Published 2022Table of Contents: “…Data visualization tools -- Option round-up -- Taking a Look at What Your Computing Stack Should Look Like Now -- Part 3 Establishing Reality Checks -- Chapter 8 Taking a Bow: Goodbye, Data Scientists - Hello, Data Strategists -- Making Changes in Organizational Roles -- Leveraging your current data scientist roles -- Realigning your existing data teams -- Looking at Emerging DI Jobs -- Hiring data strategists versus hiring decision strategists -- Onboarding mechanics and pot washers -- The Chief Data Officer's Fate -- Freeing Executives to Lead Again -- Chapter 9 Trusting AI and Tackling Scary Things -- Discovering the Truth about AI -- Thinking in AI -- Thinking in human -- Letting go of your ego -- Seeing Whether You Can Trust AI -- Finding out why AI is hard to test and harder to understand -- Hearing AI's confession -- Two AIs Walk into a Bar . . . -- Doing the right math but asking the wrong question -- Dealing with conflicting outputs -- Battling AIs -- Chapter 10 Meddling Data and Mindful Humans -- Engaging with Decision Theory -- Working with your gut instincts -- Looking at the role of the social sciences -- Examining the role of the managerial sciences -- The Role of Data Science in Decision Intelligence -- Fitting data science to decision intelligence -- Reimagining the rules -- Expanding the notion of a data source -- Where There's a Will, There's a Way -- Chapter 11 Decisions at Scale -- Plugging and Unplugging AI into Automation -- Dealing with Model Drifts and Bad Calls -- Reining in AutoML -- Seeing the Value of ModelOps -- Bracing for Impact -- Decide and dedicate -- Make decisions with a specific impact in mind -- Chapter 12 Metrics and Measures -- Living with Uncertainty -- Making the Decision -- Seeing How Much a Decision Is Worth -- Matching the Metrics to the Measure -- Leaning into KPIs -- Tapping into change data.…”
Full text (MFA users only)
Electronic eBook -
70
Internet of things : approach and applicability in manufacturing
Published 2019Full text (MFA users only)
Electronic eBook -
71
Penetration testing : a hands-on introduction to hacking
Published 2014Table of Contents: “…Opening a Command Shell Listener / Peter Van Eeckhoutte -- Pushing a Command Shell Back to a Listener / Peter Van Eeckhoutte -- Automating Tasks with cron Jobs / Peter Van Eeckhoutte -- Summary / Peter Van Eeckhoutte -- 3. …”
Full text (MFA users only)
Electronic eBook -
72
Mastering VBA for Office 2010
Published 2010Table of Contents: “…-- A Brief Overview -- Planning Your Class -- Creating the Class Module -- Naming the Class -- Setting the Instancing Property -- Declaring Variables and Constants for the Class -- Adding Properties to the Class -- Adding Methods to the Class -- Using Your Class -- The Bottom Line -- ch. 17 Debugging Your Code and Handling Errors -- Principles of Debugging -- The Different Types of Errors -- Language Errors -- Compile Errors -- Runtime Errors -- Program Logic Errors -- VBA's Debugging Tools -- Break Mode -- The Step Over and Step Out Commands -- The Locals Window -- The Watch Window -- The Immediate Window -- The Call Stack Dialog Box -- Dealing with Infinite Loops -- Dealing with Runtime Errors -- When Should You Write an Error Handler? …”
Full text (MFA users only)
Electronic eBook -
73
Microsoft® business intelligence tools for Excel® analysts
Published 2014Full text (MFA users only)
Electronic eBook -
74
Architecture-Independent Programming for Wireless Sensor Networks : an Architecture-Independent Approach.
Published 2008Full text (MFA users only)
Electronic eBook -
75
Getting Started with Kubernetes - Second Edition.
Published 2017Full text (MFA users only)
Electronic eBook -
76
Wearable Android : Android wear & Google Fit app development
Published 2015Table of Contents: “…Java Platform: Language, JVM -- 3.5.3. Java memory: Heap, Stack, and native -- 3.5.4. Security Policy: Permissions -- 3.6. …”
Full text (MFA users only)
Electronic eBook -
77
Linux on IBM eserver zSeries and S/390 : application development
Published 2002Table of Contents: “…Designing for concurrent access -- 15.1 UNIX processes -- 15.2 The pthreads library -- 15.2.1 Using threads -- 15.2.2 Creating threads -- 15.2.3 Thread termination -- 15.2.4 Thread attributes -- 15.2.5 Setting thread stack size -- 15.2.6 Synchronizing threads -- 15.2.7 Mutexes -- 15.2.8 Conditional variables -- 15.3 Controlling concurrent access -- 15.3.1 Locking using files -- 15.3.2 IPC semaphores -- 15.3.3 Pthread resources -- Chapter 16. …”
Full text (MFA users only)
Electronic eBook -
78
The archaeology and epigraphy of Indus writing
Published 2015Table of Contents: “…Right-adjacent collocations of short stacked stroke signs (shaded cells have a frequency gt -- 4). -- Figure 5.3. …”
Full text (MFA users only)
Electronic eBook -
79
Medical statistics from scratch : an introduction for health professionals
Published 2020Table of Contents: “…Which variables to include? -- Automated variable selection methods -- Manual variable selection methods -- Adjustment and confounding -- Diagnostics -- checking the basic assumptions of the multiple linear regression model -- Analysis of variance -- 23. …”
Full text (MFA users only)
Electronic eBook -
80
Software engineering for embedded systems : methods, practical techniques, and applications
Published 2013Table of Contents: “…-- Real-time aspects -- Summary and source code -- Introduction -- Collaborate with the hardware team -- Proactive collaboration -- Ambassadors -- Register design tools -- Co-development activities -- System integration -- Useful hardware design aspects -- Notification of hardware events -- Launching tasks in hardware -- Bit field alignment -- Fixed bit positions -- Block version number -- Debug hooks -- Supporting multiple versions of hardware -- Compile-time switches -- Build-time switches -- Run-time switches -- Self-adapting switches -- Difficult hardware interactions -- Atomic register access -- Mixed bit types in the same register -- Edge vs. level interrupts -- Testing and troubleshooting -- Temporary hooks -- Permanent hooks -- Conclusion -- Best practices -- Introduction -- Principles of high-quality programming -- What sets embedded apart from general programming -- Starting the embedded software project -- Hardware platform input -- Project files/organization -- Team programming guidelines -- Syntax standard -- Safety requirements in source code -- Variable structure -- Variable declarations -- Data types -- Definitions -- Foreground/background systems -- Real-time kernels -- RTOS (real-time operating system) -- Critical sections -- Task management -- Assigning task priorities -- Determining the size of a stack -- The idle task -- Priority levels -- The ready list -- Preemptive scheduling -- Scheduling points -- Round-robin scheduling -- Context switching -- Interrupt management -- Handling CPU interrupts -- Non-kernel-aware interrupt service routine (ISR) -- Processors with multiple interrupt priorities -- All interrupts vector to a common location -- Every interrupt vectors to a unique location -- The clock tick (or system tick) -- Wait lists -- Time management -- Resource management -- Resource management, disable/enable interrupts -- Resource management, semaphores -- Resource management, priority inversions -- Resource management, mutual-exclusion semaphores (mutex) -- Resource management, deadlocks (or deadly embrace) -- Synchronization -- Synchronization, semaphores -- Synchronization, credit tracking -- Bilateral rendez-vous -- Message passing -- Messages -- Message queues -- Flow control -- Clients and servers -- Memory management -- Summary -- Why does software reuse matter? …”
Full text (MFA users only)
Electronic eBook