Computers & Technology
epub |eng | 2010-08-05 | Author:Pilgrim, Mark [Mark Pilgrim]
Instructions for Windows, which I have not personally tested. The latest version of mkclean. Ready? OK. On the command line, run ffmpeg with no parameters and verify that it was ...
( Category:
Computers & Technology
April 6,2014 )
epub |eng | 2010-09-14 | Author:Parastatidis, Savas, Robinson, Ian, Webber, Jim [Jim Webber, Savas Parastatidis, and Ian Robinson]
GetFeedOfRecentEvents and GetFeed are static functions, both of which accept a NameValueCollection parameter and return a command. In the case of GetFeedCommand, this command is initialized with a ResourceId based ...
( Category:
Software Development
April 6,2014 )
epub |eng | 2010-04-01 | Author:Mangano, Sal [Sal Mangano]
If we use a constant function (uniform density), we get the surface area of the half sphere as expected (surface area of an entire sphere is 4 πr2). In[97]:= g2[{x_, ...
( Category:
Graphics & Multimedia
April 6,2014 )
epub |eng | 2011-07-12 | Author:Oualline, Steve [Steve Oualline]
Back in the dark ages BC (Before Computers), a magical device called a Teletype Model 33 existed. This amazing machine contained a shift register made out of a motor, with ...
( Category:
C Programming Language
April 6,2014 )
epub, mobi |eng | 2012-01-12 | Author:Borenstein, Greg [Greg Borenstein]
Figure 4-6. The red dot shows up immediately after the completion of calibration, and our sketch begins receiving joint data. Having been converted from real-world to projective coordinates, the joint ...
( Category:
C & C++ Windows Programming
April 6,2014 )
epub |eng | 2011-05-08 | Author:Tretola, Rich [Rich Tretola]
Figure 4-6. The Browse Gallery application Figure 4-7. The Browse Gallery application with a picture selected Microphone If your application requires the use of the device’s microphone, you will need ...
( Category:
Electronics
April 6,2014 )
epub, mobi |eng | 2009-12-14 | Author:Schmitt, Christopher [Christopher Schmitt]
( Category:
CSS Programming
April 6,2014 )
epub |eng | 2012-03-04 | Author:Schwartz, Baron, Tkachenko, Vadim, Zaitsev, Peter & Peter Zaitsev & Vadim Tkachenko [Baron Schwartz]
When Should You Use Flash? The most obvious use case for solid-state storage is any workload that has a lot of random I/O. Random I/O is usually caused by the ...
( Category:
Performance Optimization
April 6,2014 )
epub, pdf |eng | 2014-04-05 | Author:Matt Richardson
Analog Input As discussed in Chapter 3, a digital pin (input or output) represents information as either on or off. But there are plenty of inputs that could have a ...
( Category:
Mobile & Wireless
April 6,2014 )
epub |eng | 2011-09-12 | Author:Schmitt, Christopher, Simpson, Kyle & Kyle Simpson [Christopher Schmitt]
Discussion ARIA extends the accessibility of HTML. Assistive technologies can use ARIA landmark roles to identify and navigate to sections of content. These roles help provide a more reliable and ...
( Category:
JavaScript Programming
April 6,2014 )
epub |eng | 2011-12-18 | Author:Turnbull, Thomas, Palazzolo, Alan & Thomas Turnbull [Alan Palazzolo]
Figure 4-6. Changing the map display In the “Map” drop-down, select “Drupal user groups.” Click the “Apply (all displays)” button to save. Click the “Save” button on the top right ...
( Category:
Internet & Social Media
April 6,2014 )
epub, mobi |eng | 2011-07-24 | Author:Pepple, Ken [Ken Pepple]
API Nova features a pluggable architecture for API support. The current Nova incarnation supports: OpenStack API 1.0 (with preliminary OpenStack 1.1 API support) Amazon EC2 API Many customers will probably ...
( Category:
Networking & Cloud Computing
April 6,2014 )
epub |eng | 2012-02-06 | Author:Smirnova, Sveta [Sveta Smirnova]
interactive_timeout How much time to wait for activity from an interactive client before killing the connection, i.e., how long the server will wait to read the next command. The term ...
( Category:
MySQL
April 6,2014 )
epub, mobi |eng | 2014-03-05 | Author:Patrick Tucker
The End of Teaching It’s January 2012, the setting is the Ethiopian village of Wenchi, which sits on the rim of a volcanic crater lake some eleven thousand feet above ...
( Category:
Probability & Statistics
April 6,2014 )
epub |eng | 2011-09-19 | Author:Lehtinen, Rick, Gangemi, G. T., Sr. & G.T. Gangemi Sr. [Rick Lehtinen]
Authenticity Encryption is also very good at making sure that your information is authentic, that is, that is comes from who it says it does. Certain encryption techniques let you ...
( Category:
Computers & Technology
April 6,2014 )
Categories
Popular ebooks
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(16904)Deep Learning with Python by François Chollet(14616)
The Mikado Method by Ola Ellnestam Daniel Brolund(11877)
Hello! Python by Anthony Briggs(11791)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(11240)
Dependency Injection in .NET by Mark Seemann(11001)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10518)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(9832)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(9420)
Grails in Action by Glen Smith Peter Ledbrook(9165)
Hit Refresh by Satya Nadella(9038)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(8808)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(8594)
The Kubernetes Operator Framework Book by Michael Dame(8470)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(8309)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8290)
Robo-Advisor with Python by Aki Ranin(8245)
Practical Computer Architecture with Python and ARM by Alan Clements(8218)
Implementing Enterprise Observability for Success by Manisha Agrawal and Karun Krishnannair(8189)
Building Low Latency Applications with C++ by Sourav Ghosh(8091)