Networking & Cloud Computing
azw3 |eng | 2016-10-27 | Author:Orhan Ergun [Ergun, Orhan]

BGP Add-Path With shadow RR or shadow sessions, there are secondary IBGP sessions between RR and PEs. But the same behavior can be achieved with BGP Add-Path without an extra ...
( Category: Networks, Protocols & APIs February 29,2020 )
epub |eng | 2017-08-23 | Author:Michael Rothman,Vincent Zimmer,Tim Lewis [Неизв.]

Loading and Unloading UEFI Drivers Two UEFI Shell commands are available to load and start UEFI drivers, Load and LoadPciRom. The UEFI Shell command that can be used to unload ...
( Category: Software Development February 29,2020 )
epub |eng | 2020-01-06 | Author:Todd Miller & Ryan Ripley [Todd Miller]

( Category: Enterprise Applications February 29,2020 )
epub |eng | | Author:Sergei Kurgalin & Sergei Borzunov

(c) // filling the array res[] in the order in which // iterations follow in a sequential loop #pragma omp parallel ordered for(int i=0;i<ceil(log2(N));i++) res[i]=func(1.0/(i+1)); (d) // writing the values ...
( Category: Software Development February 29,2020 )
epub |eng | 2018-11-29 | Author:Lim Mei Ying [Lim Mei Ying]

( Category: Enterprise Applications February 28,2020 )
epub |eng | 2015-02-27 | Author:Lena Wiese

fig 8.6. Compaction on disk 8.2.4 Compaction After some time, several flushes of memtables will have occurred and hence there will be quite a lot of data files stored on ...
( Category: Total Quality Management February 28,2020 )
epub |eng | 2019-07-07 | Author:Neal Davis [Davis, Neal]

There is no need to make any changes as all environment variables are encrypted by default with AWS Lambda Use encryption helpers that leverage AWS Key Management Service to store ...
( Category: Client-Server Systems February 28,2020 )
epub |eng | 2019-10-27 | Author:Sherri Davidoff [Sherri Davidoff]

( Category: Networks, Protocols & APIs February 28,2020 )
epub, pdf |eng | 2019-12-17 | Author:Grig Gheorghiu & Alfredo Deza & Kennedy Behrman & Noah Gift [Grig Gheorghiu]

( Category: Software Development February 28,2020 )
epub |eng | 2012-11-02 | Author:Dobkin, Daniel M.

We can use the tools introduced in section (2) above to understand in a semi-quantitative way what antenna configurations make sense. For example, in the portal configuration of Figure 6.21, ...
( Category: Circuits February 28,2020 )
epub |eng | | Author:Sébastien Ziegler

The initial UPRAAM model developed in Privacy Flag was including about 150 checks and controls, defined to assess the compliance with most applicable data protection obligations. However, this initial theoretical ...
( Category: Electronics February 28,2020 )
epub |eng | 2016-01-26 | Author:Scott Malcomson [Malcomson, Scott]

[T]he Administration will support removal, over time, under appropriate conditions, of judicial and legislative restrictions on all types of telecommunications companies: cable, telephone, utilities, television and satellite . … Our ...
( Category: Internet, Groupware, & Telecommunications February 28,2020 )
epub, pdf |eng | 2019-02-27 | Author:Abhik Chaudhuri

Ramaswami, A., Russell, A. G., Culligan, P. J., Sharma, K. R., & Kumar E. (2016). Meta-principles for developing smart, sustainable, and healthy cities. Science, 352(6288), 940–943. Robert, J., Kubler, S., ...
( Category: Networking & Cloud Computing February 28,2020 )
epub |eng | 2010-05-10 | Author:Goldstein, Emmanuel

Enough, Phiber, now tell me about the switch! OK, OK. The two most common GSM switches are the Ericsson AXE MSC, based on the AXE 10, and the Nortel DMS-MSC, ...
( Category: Hacking February 28,2020 )
epub |eng | | Author:Sweeney, Patrick J.

Choosing a Hand-held, Mobile, or Fixed-location Reader You can choose from three types of readers for your RFID network: hand-held, mobile, or fixed-location. Many criteria enter into this decision, including ...
( Category: Manufacturing February 28,2020 )