Networking & Cloud Computing
epub |eng | 2018-10-30 | Author:Rosemarie Withee & Ken Withee & Jennifer Reed

GOING BEHIND THE SCENES The cloud is just a fancy way of describing the act of accessing software and computer resources over the Internet. For example, when you create a ...
( Category: Software November 2,2018 )
epub |eng | 2018-01-24 | Author:Vipul Tankariya

Life cycle configuration use cases It is advisable to configure life cycle rules on objects where there is absolute clarity on the life cycle of the objects. The following are ...
( Category: Networking & Cloud Computing October 31,2018 )
epub |eng | 2018-03-23 | Author:Alexey Spizhevoy

import cv2 Load the text image: img = cv2.imread('../data/scenetext01.jpg') Load the pre-trained convolutional neural network and detect the text messages: det = cv2.text.TextDetectorCNN_create( "../data/textbox.prototxt", "../data/TextBoxes_icdar13.caffemodel") rects, probs = det.detect(img) Draw ...
( Category: Networking & Cloud Computing October 27,2018 )
epub |eng | | Author:Pierluigi Riti

With the secret created, we want to add our account to the administrative roles of the role-based access control (RBAC) . This gives us the right to manage the cluster. ...
( Category: Mobile Phones, Tablets & E-Readers October 26,2018 )
epub, pdf |eng | | Author:Eric Rosenberg

(5.1) More formally, for a positive integer s and , define (5.2) where I(z) ≡ 1 if z > 0 and I(z) ≡ 0 otherwise. Thus C(n, s) is the ...
( Category: Networking & Cloud Computing October 26,2018 )
epub |eng | 2018-05-24 | Author:Pradeeka Seneviratne

Settings for working with virtual pin V1 Tap the back icon on the toolbar to go to the canvas. You can use the same C++ project you built in the ...
( Category: Software October 26,2018 )
epub |eng | 2018-10-24 | Author:Stan Gibilisco

( Category: Networking & Cloud Computing October 26,2018 )
epub |eng | 2018-10-23 | Author:Allan G. Bluman

( Category: Engineering October 24,2018 )
epub |eng | 2018-06-19 | Author:Mohamed Waly

Figure 4.15: Point-to-Site configuration blade Click on Configure now, and the following fields will appear in the same blade: Address pool: The IP address range of your environment. Tunnel type: ...
( Category: Software October 24,2018 )
epub |eng | 2017-12-06 | Author:Bekim Dauti

Figure 5.30. Auditing in Windows Server 2016 References from Windows IT Pro Center Remote Server Administration Tools (https://docs.microsoft.com/en-us/windows-server/remote/remote-server-administration-tools) Get started with Remote Desktop Services in Windows Server 2016 (https://docs.microsoft.com/en-us/windows-server/remote/remote-desktop-services/rds-get-started) Remote ...
( Category: Software October 24,2018 )
epub, mobi |eng | 2018-08-18 | Author:Brian McCullough

12 RIP. MIX. BURN. The iPod, iTunes and Netflix At the turn of the century, Apple was not anywhere close to the technology behemoth it is today. In fact, Apple ...
( Category: Networking & Cloud Computing October 23,2018 )
epub |eng | | Author:Dov Dori

The OPD on the right of Fig. 14.4 demonstrates that a structural relation can exist also between two processes. As the OPL sentences in Fig. 14.4 demonstrate, the syntax of ...
( Category: Programming Languages October 23,2018 )
epub |eng | 2017-12-20 | Author:Pradeep Kumar Singh

Uploading an image to Swift We will try to upload an image to Swift. First, check the account details: $ openstack object store account show +------------+---------------------------------------+ | Field | Value ...
( Category: Networking & Cloud Computing October 23,2018 )
epub |eng | 2018-10-22 | Author:Michael W. Lucas

/etc/login.* You can control who may log into your system—and what resources those users may access—by using /etc/login.access and /etc/login.conf. See Chapter 9 for instructions. /etc/mail Most of the contents ...
( Category: Operating Systems October 23,2018 )
epub, pdf |eng | 2018-10-20 | Author:Robin Nixon

( Category: Web Development & Design October 21,2018 )