Networking & Cloud Computing
epub |eng | 2019-11-28 | Author:Viktor Farcic [Viktor Farcic]

Figure 3-43: Prometheus' graph screen with container memory usage limited to prometheus-server and grouped by the pod label extracted from pod_name Now we can combine the two metrics and find ...
( Category: Tools March 22,2020 )
epub |eng | 2020-02-26 | Author:Steve Anson [Anson, Steve]

Object Access Whether you’re dealing with an insider threat or a remote attacker who has gained access to your systems, determining what data was accessed by an adversary is frequently ...
( Category: Network Security March 22,2020 )
epub, pdf |eng | 2015-12-23 | Author:Adrian Mouat

If using the syslog driver, we can use syslog functionality to automatically forward the logs, as shown in “Forwarding Logs with rsyslog”. We can just directly access the log files ...
( Category: Linux & UNIX Administration March 22,2020 )
epub |eng | 2014-09-19 | Author:Ronald E. Day [Day, Ronald E.]

5 The Document as the Subject: Androids “Homo documentator” must prepare himself to take command—with all his senses awake—over the robots of tomorrow. The value of the machine will be ...
( Category: General March 22,2020 )
epub |eng | 2019-09-25 | Author:John Savill

DNS is used for the Azure Storage namespace, which is why when talking about Azure Storage accounts and services, you will see the following format: http(s)://<account>.<service>.core.windows.net/<partition>/object Using Storage Accounts and ...
( Category: Cloud Computing March 22,2020 )
epub |eng | | Author:Soumia El Hani & Mohamad Essaaidi

2 A-Distance and the Importance Index 2.1 Workspace Location Problem In this project, we are interested in the determination of a workspace location. The problem consists of finding the optimal ...
( Category: Networking & Cloud Computing March 22,2020 )
epub |eng | 2015-10-05 | Author:GAVI, HAPPYSON

PCM measures air densities and temperature then stores them. As you drive it uses that stored information / data to decide fuel trim. This implies that during winter or rapid ...
( Category: Networks March 22,2020 )
epub, azw3 |eng | 2015-09-24 | Author:Hayden, Lance

* * * Behavioral Models for Security Culture Transformation Information security today is undergoing a series of experiments in behavioral engineering and cultural transformation, although we do not tend to ...
( Category: Information Theory March 22,2020 )
epub |eng | 2004-01-15 | Author:Milton Mueller [Mueller, Milton]

who was not privy to the behind-the-scenes negotiations that created it. It took the form of a nonbinding “statement of policy” rather than a rulemaking document, and it abandoned direct ...
( Category: E-Commerce March 22,2020 )
epub, pdf |eng | 2020-04-16 | Author:Maxim Jago [Maxim Jago]

( Category: Adobe Premiere March 22,2020 )
epub, pdf |eng | | Author:Nancy W. Gleason

Appendix A: General Education Models In most Chinese universities, each student enters the university with a major (which they selected when they took their college entrance examination) and their courses ...
( Category: General March 22,2020 )
epub |eng | 2018-07-19 | Author:Dustin Metzgar [Dustin Metzgar]

Alongside ASP.NET Core, Microsoft is building Entity Framework (EF) Core. EF Core is a .NET Core version of Entity Framework, which is a full ORM built by Microsoft for the ...
( Category: Software Development March 22,2020 )
epub, pdf |eng | | Author:Bernard Scott

5.2 Recent Views of the Cerebral Process Recent neuroimaging-based studies in the past decade have begun to reveal a considerably more nuanced picture of the cortical language process. For one, ...
( Category: Networks March 22,2020 )
epub |eng | | Author:Stephen Chin & Johan Vos & James Weaver

public class GameOfLifePublisherConsumer extends GraphicApp { final int WIDTH = 2500; final int HEIGHT = 2500; final int CELL_SIZE = 2; boolean currentGeneration[][]; int columns = WIDTH / CELL_SIZE; int ...
( Category: Cross-platform Development March 22,2020 )
epub |eng | 2016-04-28 | Author:Looney, Jonathan...

This regular expression is used to parse the IP address. We really don’t need to make a variable to hold this. The main reason we did that was just to ...
( Category: Linux & UNIX Administration March 22,2020 )