Search Results - stack automation

Search alternatives:

  1. 61

    Aperture 3 portable genius by Anon, Josh

    Published 2012
    Table of Contents: “…Controlling Tethered ShootingCustomizing Keyboard Shortcuts; Using Aperture with Automator; Using Vaults and Backup; Using Aperture's Database Repair Tools; Index…”
    Full text (MFA users only)
    Electronic eBook
  2. 62

    Spring MVC Cookbook. by Bretet, Alex

    Published 2016
    Table of Contents: “…Choosing a strategy to expose JPA Entities -- Retrieving data from a third-party API with OAuth -- Chapter 7: Developing CRUD Operations and Validations -- Introduction -- Extending REST handlers to all HTTP methods -- Validating resources using bean validation support -- Internationalizing messages and contents for REST -- Validating client-side forms with HTML5 AngularJS -- Chapter 8: Communicating Through WebSockets and STOMP -- Introduction -- Streaming social events with STOMP over SockJS -- Using RabbitMQ as a multiprotocol message broker -- Stacking and consuming tasks with RabbitMQ and AMQP -- Securing messages with Spring Session and Redis -- Chapter 9: Testing and Troubleshooting -- Introduction -- Automating Database Migrations with FlyWay -- Unit testing with Mockito and Maven Surefire -- Integration testing with Cargo, Rest-assured, and Maven failsafe -- Injecting Spring Beans into integration tests -- Modern application Logging with Log4j2 -- Index.…”
    Full text (MFA users only)
    Electronic eBook
  3. 63

    Cloud Management and Security. by Abbadi, Imad M.

    Published 2014
    Table of Contents: “…10.4 Framework Domain Architecture10.5 Framework Software Agents; 10.6 Framework Workflow; 10.7 Threat Analysis; 10.8 Discussion and Future Directions; 10.9 Summary; 10.10 Exercises; References; 11 Insiders; 11.1 Introduction; 11.2 Insiders Definition; 11.3 Conceptual Models; 11.4 Summary; 11.5 Exercises; References; Part Three PRACTICAL EXAMPLES; 12 Real-Life Examples; 12.1 OpenStack; 12.2 Amazon Web Services; 12.3 Component Architecture; 12.4 Prototype; 12.5 Summary; Notes; References; 13 Case Study; 13.1 Scenario; 13.2 Home Healthcare Architecture in the Cloud.…”
    Full text (MFA users only)
    Electronic eBook
  4. 64

    Native Docker Clustering with Swarm. by Soppelsa, Fabrizio

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  5. 65

    Yii 1.1 application development cookbook : over 80 recipes to help you master using the Yii PHP framework by Makarov, Alexander

    Published 2011
    Table of Contents: “…Error handling, Debugging, and Logging -- Introduction -- Using different log routes -- Analyzing the Yii error stack trace -- Logging and using the context information -- Implementing your own smart 404 handler -- 10. …”
    Full text (MFA users only)
    Electronic eBook
  6. 66

    Learning CoreOS. by S, Kingston Smiler, Agrawal, Shantanu

    Published 2016
    Full text (MFA users only)
    Electronic eBook
  7. 67

    Pilot testing of membrane zero liquid discharge for drinking water systems by Brandhuber, Philip J.

    Published 2014
    Table of Contents: “…Cover -- Copyright -- Acknowledgments -- Abstract and Benefits -- Table of Contents -- List of Tables -- List of Figures -- List of Acronyms -- Executive Summary -- Chapter 1.0: Introduction and Background -- 1.1 Project Objectives -- 1.2 Project Approach -- 1.3 Introduction to Technologies Evaluated by this Project -- 1.3.1 Reverse Osmosis -- 1.3.2 Concentration Polarization and Scaling -- 1.3.3 Membrane Fouling by Scalants -- 1.3.4 Electrodialysis -- 1.3.5 Electrodialysis Metathesis -- Chapter 2.0: Pilot Test Technology Selection -- 2.1 Pilot Test Site Description and Water Quality -- 2.1.1 Treatment Plant Description -- 2.1.2 Test Site Water Quality -- 2.2 Initial Screening of Technologies -- 2.2.1 Initial Screening of Thermal-Based Technologies -- 2.2.2 Screening of Membrane-Based Technologies -- 2.2.3 Screening of Electric Potential-Based Technologies -- 2.2.4 Screening of Alternative Technologies -- 2.2.5 Technologies Selected for Additional Evaluation -- 2.3 Evaluation of Screened Technologies -- 2.3.1 Determination of Limiting Scalants at Brighton and La Junta -- 2.3.2 Brine Minimization Treatment Trains Using Screened Technologies -- 2.3.3 Performance Predictions for Brine Minimization Treatment Trains -- 2.3.4 Summary of Performance Predictions -- 2.4 Recommendations for Testing -- 2.5 Additional Evaluation of EDM Technology -- Chapter 3.0: La Junta Pilot Test -- 3.1 Description -- 3.1.1 Pilot Test Objectives -- 3.1.2 Pilot Plant Configuration -- 3.1.3 Modes of Operation -- 3.1.4 EDM Membrane Unit ('Stack') -- 3.2 Water Quality Sampling and Analyses -- 3.2.1 Sampling Locations -- 3.2.2 Onsite Analyses -- 3.2.3 Offsite Analyses -- 3.3 Methods for Determination of System Recovery -- 3.3.1 Flow Balance Estimate of Recovery -- 3.3.2 Theoretical Estimate of Recovery Based on Ion Transport -- 3.4 Methods for Evaluation of NF Performance.…”
    Full text (MFA users only)
    Electronic eBook
  8. 68

    Professional visual studio 2013 by Johnson, Bruce

    Published 2014
    Table of Contents: “…Ch. 50 Web Application Deployment -- Web Deployment -- Publishing a Web Application -- Copy Web Site -- Web Project Installers -- The Web Platform Installer -- Extending the Web Platform Installer -- Summary -- ch. 51 The Automation Model -- Visual Studio Extensibility Options -- The Visual Studio Automation Model -- An Overview of the Automation Model -- Solutions and Projects -- Windows and Documents -- Commands -- Debugger -- Events -- Summary -- ch. 52 Add-Ins -- Developing an Add-In -- The Add-In Wizard -- Project Structure -- Testing Your Add-In -- The .AddIn File -- The Connect Class -- Creating a Tool Window -- Accessing the Visual Studio Automation Model -- Handling Visual Studio Events -- Deploying Add-Ins -- Summary -- ch. 53 Managed Extensibility Framework (MEF) -- Getting Started with MEF -- Imports and Exports -- Contracts -- Catalogs -- Advanced MEF -- The Visual Studio Editor -- The Text Model Subsystem -- The Text View Subsystem.…”
    Full text (MFA users only)
    Electronic eBook
  9. 69

    Decision Intelligence for Dummies by Baker, Pamela

    Published 2022
    Table of Contents: “…Data visualization tools -- Option round-up -- Taking a Look at What Your Computing Stack Should Look Like Now -- Part 3 Establishing Reality Checks -- Chapter 8 Taking a Bow: Goodbye, Data Scientists - Hello, Data Strategists -- Making Changes in Organizational Roles -- Leveraging your current data scientist roles -- Realigning your existing data teams -- Looking at Emerging DI Jobs -- Hiring data strategists versus hiring decision strategists -- Onboarding mechanics and pot washers -- The Chief Data Officer's Fate -- Freeing Executives to Lead Again -- Chapter 9 Trusting AI and Tackling Scary Things -- Discovering the Truth about AI -- Thinking in AI -- Thinking in human -- Letting go of your ego -- Seeing Whether You Can Trust AI -- Finding out why AI is hard to test and harder to understand -- Hearing AI's confession -- Two AIs Walk into a Bar . . . -- Doing the right math but asking the wrong question -- Dealing with conflicting outputs -- Battling AIs -- Chapter 10 Meddling Data and Mindful Humans -- Engaging with Decision Theory -- Working with your gut instincts -- Looking at the role of the social sciences -- Examining the role of the managerial sciences -- The Role of Data Science in Decision Intelligence -- Fitting data science to decision intelligence -- Reimagining the rules -- Expanding the notion of a data source -- Where There's a Will, There's a Way -- Chapter 11 Decisions at Scale -- Plugging and Unplugging AI into Automation -- Dealing with Model Drifts and Bad Calls -- Reining in AutoML -- Seeing the Value of ModelOps -- Bracing for Impact -- Decide and dedicate -- Make decisions with a specific impact in mind -- Chapter 12 Metrics and Measures -- Living with Uncertainty -- Making the Decision -- Seeing How Much a Decision Is Worth -- Matching the Metrics to the Measure -- Leaning into KPIs -- Tapping into change data.…”
    Full text (MFA users only)
    Electronic eBook
  10. 70
  11. 71

    Penetration testing : a hands-on introduction to hacking by Weidman, Georgia

    Published 2014
    Table of Contents: “…Opening a Command Shell Listener / Peter Van Eeckhoutte -- Pushing a Command Shell Back to a Listener / Peter Van Eeckhoutte -- Automating Tasks with cron Jobs / Peter Van Eeckhoutte -- Summary / Peter Van Eeckhoutte -- 3. …”
    Full text (MFA users only)
    Electronic eBook
  12. 72

    Mastering VBA for Office 2010 by Mansfield, Richard, 1945-

    Published 2010
    Table of Contents: “…-- A Brief Overview -- Planning Your Class -- Creating the Class Module -- Naming the Class -- Setting the Instancing Property -- Declaring Variables and Constants for the Class -- Adding Properties to the Class -- Adding Methods to the Class -- Using Your Class -- The Bottom Line -- ch. 17 Debugging Your Code and Handling Errors -- Principles of Debugging -- The Different Types of Errors -- Language Errors -- Compile Errors -- Runtime Errors -- Program Logic Errors -- VBA's Debugging Tools -- Break Mode -- The Step Over and Step Out Commands -- The Locals Window -- The Watch Window -- The Immediate Window -- The Call Stack Dialog Box -- Dealing with Infinite Loops -- Dealing with Runtime Errors -- When Should You Write an Error Handler? …”
    Full text (MFA users only)
    Electronic eBook
  13. 73
  14. 74
  15. 75

    Getting Started with Kubernetes - Second Edition. by Baier, Jonathan

    Published 2017
    Full text (MFA users only)
    Electronic eBook
  16. 76

    Wearable Android : Android wear & Google Fit app development by Mishra, Sanjay

    Published 2015
    Table of Contents: “…Java Platform: Language, JVM -- 3.5.3. Java memory: Heap, Stack, and native -- 3.5.4. Security Policy: Permissions -- 3.6. …”
    Full text (MFA users only)
    Electronic eBook
  17. 77

    Linux on IBM eserver zSeries and S/390 : application development

    Published 2002
    Table of Contents: “…Designing for concurrent access -- 15.1 UNIX processes -- 15.2 The pthreads library -- 15.2.1 Using threads -- 15.2.2 Creating threads -- 15.2.3 Thread termination -- 15.2.4 Thread attributes -- 15.2.5 Setting thread stack size -- 15.2.6 Synchronizing threads -- 15.2.7 Mutexes -- 15.2.8 Conditional variables -- 15.3 Controlling concurrent access -- 15.3.1 Locking using files -- 15.3.2 IPC semaphores -- 15.3.3 Pthread resources -- Chapter 16. …”
    Full text (MFA users only)
    Electronic eBook
  18. 78

    The archaeology and epigraphy of Indus writing by Wells, Bryan K.

    Published 2015
    Table of Contents: “…Right-adjacent collocations of short stacked stroke signs (shaded cells have a frequency gt -- 4). -- Figure 5.3. …”
    Full text (MFA users only)
    Electronic eBook
  19. 79

    Medical statistics from scratch : an introduction for health professionals by Bowers, David, 1938-

    Published 2020
    Table of Contents: “…Which variables to include? -- Automated variable selection methods -- Manual variable selection methods -- Adjustment and confounding -- Diagnostics -- checking the basic assumptions of the multiple linear regression model -- Analysis of variance -- 23. …”
    Full text (MFA users only)
    Electronic eBook
  20. 80

    Software engineering for embedded systems : methods, practical techniques, and applications

    Published 2013
    Table of Contents: “…-- Real-time aspects -- Summary and source code -- Introduction -- Collaborate with the hardware team -- Proactive collaboration -- Ambassadors -- Register design tools -- Co-development activities -- System integration -- Useful hardware design aspects -- Notification of hardware events -- Launching tasks in hardware -- Bit field alignment -- Fixed bit positions -- Block version number -- Debug hooks -- Supporting multiple versions of hardware -- Compile-time switches -- Build-time switches -- Run-time switches -- Self-adapting switches -- Difficult hardware interactions -- Atomic register access -- Mixed bit types in the same register -- Edge vs. level interrupts -- Testing and troubleshooting -- Temporary hooks -- Permanent hooks -- Conclusion -- Best practices -- Introduction -- Principles of high-quality programming -- What sets embedded apart from general programming -- Starting the embedded software project -- Hardware platform input -- Project files/organization -- Team programming guidelines -- Syntax standard -- Safety requirements in source code -- Variable structure -- Variable declarations -- Data types -- Definitions -- Foreground/background systems -- Real-time kernels -- RTOS (real-time operating system) -- Critical sections -- Task management -- Assigning task priorities -- Determining the size of a stack -- The idle task -- Priority levels -- The ready list -- Preemptive scheduling -- Scheduling points -- Round-robin scheduling -- Context switching -- Interrupt management -- Handling CPU interrupts -- Non-kernel-aware interrupt service routine (ISR) -- Processors with multiple interrupt priorities -- All interrupts vector to a common location -- Every interrupt vectors to a unique location -- The clock tick (or system tick) -- Wait lists -- Time management -- Resource management -- Resource management, disable/enable interrupts -- Resource management, semaphores -- Resource management, priority inversions -- Resource management, mutual-exclusion semaphores (mutex) -- Resource management, deadlocks (or deadly embrace) -- Synchronization -- Synchronization, semaphores -- Synchronization, credit tracking -- Bilateral rendez-vous -- Message passing -- Messages -- Message queues -- Flow control -- Clients and servers -- Memory management -- Summary -- Why does software reuse matter? …”
    Full text (MFA users only)
    Electronic eBook