Cloud Computing
mobi |eng | 2013-09-12 | Author:Hallberg, Bruce [Hallberg, Bruce]
Acquiring Backup Media and Technologies Once you have some idea of your backup needs, you can then proceed to acquire the necessary hardware and software to create and manage your ...
( Category:
LAN
April 3,2014 )
epub, mobi |eng | 2011-05-16 | Author:Pfister, Cuno [Cuno Pfister]
Chapter 11. Handling Sensor Requests Chapter 10 is an example of an HTTP server, but it doesn’t use any sensors or actuators. In this chapter, I’ll show how you can ...
( Category:
Single Board Computers
March 31,2014 )
epub |eng | 2014-03-27 | Author:Michael Manoochehri
What Is a Data Pipeline? At my local corner store, there is usually only one person working at any given time. This person runs the register, stocks items, and helps ...
( Category:
Storage & Retrieval
March 28,2014 )
epub |eng | 2013-08-04 | Author:Smith, Jennifer [Smith, Jennifer]
Figure 4-13: Cloning in perspective. Chapter 5: Using the Photoshop Pen Tool In This Chapter Selecting the Pen tool for the task Using a path as a selection Creating curved ...
( Category:
Adobe
March 26,2014 )
epub |eng | 2012-03-25 | Author:Dinkar Sitaram & Geetha Manjunath
• partition(key2) : Determine a data partition and return the reducer number The partition function is given the key with the number of reducers and returns the index of the ...
( Category:
Cloud Computing
March 26,2014 )
epub, pdf |eng | 2012-11-28 | Author:Preston Gralla [Preston Gralla]
Note Note: Many routers ship with a default channel of 6, so if you’re using that channel, you’re most likely to run into interference from nearby Wi-Fi networks. How you ...
( Category:
Microsoft Windows Registry
March 26,2014 )
epub |eng | 2011-03-25 | Author:Martin L. Abbott & Michael T. Fisher
* * * Rule 28 has an ugly and slightly misleading and controversial title meant to provoke thought and discussion. Of course it makes sense to have a team responsible ...
( Category:
Programming
March 26,2014 )
epub, mobi, pdf |eng | 2012-11-19 | Author:Matthew Metheny
Table 6.5 Key Process Activities—Step 3 Table 6.6 Key Process Activities—Step 4 Both NIST and the ISO/IEC processes address the ongoing communications and sharing of risk-related information with decision makers ...
( Category:
Cloud Computing
March 26,2014 )
epub |eng | 2013-04-28 | Author:Kirk Hausman & Susan L. Cook & Telmo Sampaio
When designing distributed applications, software architects have to take into account the needs for availability and scalability of the solution as a whole. Single points of failure must be avoided ...
( Category:
Microsoft OS Guides
March 26,2014 )
epub |eng | 2012-09-13 | Author:Jess Chadwick, Todd Snyder & Hrusikesh Panda [Jess Chadwick, Todd Snyder, and Hrusikesh Panda]
Donut Hole Caching Donut hole caching is the inverse of donut caching: while the donut caching technique caches the entire page, leaving out only a few small sections, donut hole ...
( Category:
NET
March 26,2014 )
epub, pdf |eng | 2011-10-23 | Author:Mitch Garnaat [Mitch Garnaat]
This will return a list of all of the available CloudWatch metrics. Each will be represented by a Metric object. The contents of this list will vary for each user, ...
( Category:
Cloud Computing
March 26,2014 )
mobi, pdf |eng | 2010-05-11 | Author:Glen Smith, Peter Ledbrook
static searchable = true ... } class Post { static searchable = true ... } When a domain class is marked searchable, the plugin indexes its primitive fields (strings, dates, ...
( Category:
Software Development
March 25,2014 )
mobi | | 2010-06-27 | Author:Charles Bell;Mats Kindahl;Lars Thalmann
Using ANALYZE TABLE The MySQL optimizer, like most traditional optimizers, uses statistical information about tables to perform its analysis of the optimal query execution plan. These statistics include information about ...
( Category:
Cloud Computing
March 25,2014 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9799)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7799)
Grails in Action by Glen Smith Peter Ledbrook(7711)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6732)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6728)
Running Windows Containers on AWS by Marcio Morales(6244)
Kotlin in Action by Dmitry Jemerov(5080)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5001)
Combating Crime on the Dark Web by Nearchos Nearchou(4587)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4506)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4431)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4259)
The Age of Surveillance Capitalism by Shoshana Zuboff(3968)
Python for Security and Networking - Third Edition by José Manuel Ortega(3831)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3521)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3498)
Learn Wireshark by Lisa Bock(3417)
Mastering Python for Networking and Security by José Manuel Ortega(3366)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3342)
Blockchain Basics by Daniel Drescher(3314)
