Cloud Computing
epub |eng | | Author:Mathew Salvaris, Danielle Dean & Wee Hyong Tok
The Convolution in Convolution Neural Networks To keep things simple when talking about convolution we will be talking about discrete convolution. Mathematically, convolution is the simple summation of the pointwise ...
( Category:
Intelligence & Semantics
May 20,2019 )
epub |eng | 2017-12-04 | Author:Jennifer Smith & Christopher Smith
In addition to printing, you can also export InDesign documents into several different kinds of file formats. In this chapter, you take a closer look at the preparations for delivering ...
( Category:
Adobe Photoshop
May 17,2019 )
epub |eng | 2019-03-29 | Author:Kresimir Juric
Scrum Of all the Agile methodologies, scrum is unique in the empirical control process. This uses the actual project progress assessment and doesn't use project performance forecasts or optimistic estimates. ...
( Category:
Enterprise Applications
May 12,2019 )
epub |eng | 2014-05-08 | Author:Scott Valentine
( Category:
Adobe Photoshop
May 8,2019 )
epub |eng | 2010-07-14 | Author:Nemeth, Evi & Snyder, Garth & Hein, Trent R. & Whaley, Ben [Nemeth, Evi]
generate for example.com a 1,024-bit ZSK pair that uses the RSA and SHA-1 algorithms and a corresponding 2,048-bit KSK pair.30 The outstanding issue of UDP packet size limits suggests that ...
( Category:
Linux & UNIX Administration
May 7,2019 )
epub |eng | 2019-03-29 | Author:Mustafa Toroman
Getting ready Before you start, open a web browser and go to the Azure portal at https://portal.azure.com. How to do it... In order to modify local network gateway settings, we ...
( Category:
Enterprise Applications
May 6,2019 )
epub |eng | 2019-03-29 | Author:Shivakumar Gopalakrishnan
kubectl delete -f guestbook-all-in-one.yaml Congratulations, you have completed the upgrade! Helm upgrade This section will explain how to perform upgrades using helm operators in a similar way: Run the following ...
( Category:
Enterprise Applications
May 6,2019 )
epub |eng | 2019-03-25 | Author:Ted Hunter
( Category:
Cloud Computing
May 5,2019 )
epub, pdf |eng | 2019-03-24 | Author:Chris Dotson
User Reports In a perfect world, all bugs and vulnerabilities would be discovered and fixed before users see them. Now that you’ve stopped laughing, you need to consider that you ...
( Category:
Cloud Computing
April 20,2019 )
epub, pdf |eng | 2019-04-30 | Author:Tiana Laurence
Click Submit. Congratulations! You’ve now documented the movement of your cow from one location to another on a platform that a third party can use to verify the location and ...
( Category:
Digital Currencies
April 18,2019 )
epub |eng | 2018-08-28 | Author:Simone Cirani,Gianluigi Ferrari,Marco Picone,Luca Veltri
4.4.2 Efficient Multiple Unicast Forwarding While the described algorithm implements an optimized flooding mechanism by avoiding loops through the introduction of Bloom filters, broadcasting with the ContikiMAC radio duty‐cycling protocol ...
( Category:
Mobile & Wireless
April 13,2019 )
epub, pdf |eng | 2015-12-21 | Author:Jonathan Baier [Baier, Jonathan]
Listing 3-13: http-pd-controller.yaml Let's also create an external service, so we can see it from outside the cluster: apiVersion: v1 kind: Service metadata: name: http-pd labels: name: http-pd spec: type: ...
( Category:
Tools
April 4,2019 )
epub |eng | 2018-08-12 | Author:John Arundel
In other words, labels exist to tag resources with information that’s meaningful to us, but they don’t mean anything to Kubernetes. For example, it’s common to label Pods with the ...
( Category:
Cloud Computing
March 23,2019 )
epub |eng | 2017-03-27 | Author:Rajiv Chopra
3.4 CREATING A VIRTUALIZED ARCHITECTURE During virtualization, software known as a Virtual Machine Monitor (VMM) or a Hypervisor is used. What is a Hypervisor? A hypervisor is an operating system ...
( Category:
Cloud Computing
March 15,2019 )
epub, azw3 |eng | 2019-01-29 | Author:Michael Hackett
( Category:
LAN
March 11,2019 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9794)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7796)
Grails in Action by Glen Smith Peter Ledbrook(7706)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6699)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6691)
Running Windows Containers on AWS by Marcio Morales(6213)
Kotlin in Action by Dmitry Jemerov(5077)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4987)
Combating Crime on the Dark Web by Nearchos Nearchou(4575)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4477)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4427)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4243)
The Age of Surveillance Capitalism by Shoshana Zuboff(3966)
Python for Security and Networking - Third Edition by José Manuel Ortega(3815)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3517)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3483)
Learn Wireshark by Lisa Bock(3393)
Mastering Python for Networking and Security by José Manuel Ortega(3364)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3339)
Blockchain Basics by Daniel Drescher(3309)
