Design & Architecture
epub |eng | 2019-03-28 | Author:Mike Brown
No more than 20 application servers (or 200 customers) should be affected by hardware failure Currently, each physical server contains a single gigabyte network interface card. Peak network usage is ...
( Category:
Enterprise Applications
April 30,2019 )
epub, mobi |eng | 2008-12-16 | Author:Leonard Richardson & Sam Ruby [Leonard Richardson]
* * * [23] There will always be client-side code for translating the needs of the user into web service operations. The only exception is in a web browser, where ...
( Category:
Systems Analysis & Design
April 1,2019 )
epub |eng | | Author:Ibrahim (Abe) M. Elfadel & Duane S. Boning & Xin Li
( Category:
Microprocessor Design
March 31,2019 )
epub, pdf |eng | | Author:Wei Lu
// define which GraphNodes are connected AB = new ch6p2_Link(A, B); AC = new ch6p2_Link(A, C); BD = new ch6p2_Link(B, D); BE = new ch6p2_Link(B, E); EF = new ch6p2_Link(E, ...
( Category:
Beginner's Guides
April 14,2017 )
epub, pdf |eng | 2016-06-09 | Author:Cheryl A. Schmidt [Schmidt, Cheryl A.]
The most common components of a wireless network are wireless NICs, an access point, a wireless bridge, and a wireless router. Table 14.15 describes the purposes of these parts. TABLE ...
( Category:
CompTIA
March 1,2017 )
epub |eng | | Author:Changyi Gu
Each shell command that is invoked by the Make utility will be echoed onscreen. You can put an @ sign in front of that command to disable the auto-echo. The ...
( Category:
Robotics & Automation
July 27,2016 )
epub |eng | 2014-02-13 | Author:Null, Linda & Lobur, Julia
FIGURE 7.28 RAID-2, Bit Interleave Data Striping with a Hamming Code 7.9.4 RAID Level 3 Like RAID-2, RAID-3 stripes (interleaves) data one bit at a time across all of the ...
( Category:
Software Development
July 10,2016 )
epub |eng | | Author:Alexandros Drymonitis
Whichever way you choose to make your connections, make sure you connect the correct pins, as making a mistake in the circuit can lead to damage. A multimeter can become ...
( Category:
Machinery
January 12,2016 )
epub |eng | 2015-06-21 | Author:Scott Mueller [Mueller, Scott]
* * * BD also supports 3D video playback at 1080p full HD resolution on different types of devices, including HDTV, computers, and game systems. Figure 10.15 compares the track ...
( Category:
PCs
January 10,2016 )
epub |eng | 2009-01-14 | Author:Gousios, Georgios, Spinellis, Diomidis & Georgios Gousios [Diomidis Spinellis ]
3 × new Operation() for a rotating buffer 2 × new int[] for the expanding buffer in Operation 33 × new IllegalStateException() on exception paths Once an instance of the ...
( Category:
Software Development
October 12,2015 )
epub, mobi, pdf |eng | 2015-09-17 | Author:Owen Yamauchi
async function thrower(): Awaitable<void> { throw new Exception(); } async function main(): Awaitable<void> { // Does not throw $handle = thrower(); // Throws an Exception, the same object thrower() threw ...
( Category:
Hacking
September 22,2015 )
mobi |eng | 2009-02-08 | Author:Matthias Kalle Dalheimer; Matt Welsh
PAP and CHAP Some ISPs may require you to use a special authentication protocol, such as PAP (Password Authentication Protocol) or CHAP (Challenge Handshake Authentication Protocol) . These protocols rely ...
( Category:
Design & Architecture
June 11,2015 )
epub |eng | 2015-06-04 | Author:Paper, David
Figure 4.19 Output from ‘validate_regex’ Class Showing Valid and Invalid Last Names Continue by validating addresses (line 10) (Figure 4.20). 1 <?php 2 // File call_validate_regex.php 3 require_once 'validate_regex.php'; 4 ...
( Category:
Object-Oriented Design
June 9,2015 )
epub, azw3 |eng | 2014-09-10 | Author:Faroughi, Nikrouz
Simulation Result: As expected, the memory data lines indicated as data become high impedance (Z) when memory is not accessed. References 1. Flash Memory: An Overview, http://www.spansion.com/Support/TechnicalDocuments/Pages/TechnicalDocuments.aspx. 2. C. R. ...
( Category:
Computer Design
June 2,2015 )
epub, pdf |eng | 2005-06-01 | Author:Nisan, Noam & Shimon Schocken [Noam, Nisan, & Schocken, Shimon]
Figure 8.2 Subroutine calling. Elementary commands (like add) and high-level operations (like power) have the same look and feel in terms of argument handling and return values. Subroutines like power ...
( Category:
PCs
March 4,2015 )
Categories
Popular ebooks
Building Low Latency Applications with C++ by Sourav Ghosh(7237)Linux Device Driver Development Cookbook by Rodolfo Giometti(3935)
Embedded Programming with Modern C++ Cookbook by Igor Viarheichyk(3626)
Implementing Cellular IoT Solutions for Digital Transformation by Dennis McCain(3562)
Embedded Linux Development Using Yocto Project - Third Edition by Otavio Salvador & Daiane Angolini(3397)
TinyML Cookbook by Gian Marco Iodice(3329)
Simplifying 3D Printing with OpenSCAD by Colin Dow(2843)
TinyML Cookbook by Gian Marco Iodice & Ronan Naughton(2604)
Fusion 360 for Makers by Lydia Sloan Cline(2221)
Networking A Beginner's Guide by Bruce Hallberg(2210)
Hands-On Linux for Architects by Denis Salamanca(2053)
But How Do It Know? by J. Clark Scott(2032)
Computers For Seniors For Dummies by Nancy C. Muir(2003)
Raspberry Pi and MQTT Essentials by Dhairya Parikh(1953)
Arduino Project Handbook, Volume 2: 25 Simple Electronics Projects for Beginners by Geddes Mark(1951)
9781803246888-ENHANCING DEEP LEARNING WITH BAYESIAN INFERENCE by Unknown(1902)
Hack and HHVM by Owen Yamauchi(1884)
31 Days Before Your CompTIA A+ Exams (Shanette Luellen's Library) by Benjamin Patrick Conry(1862)
MicroPython Projects by Jacob Beningo(1739)
Hands-On Internet of Things with MQTT by Tim Pulver(1709)
