Data in the Enterprise
epub, mobi |eng | 2016-06-03 | Author:Benjamin Peters [Peters, Benjamin]
Figure 4.16 Inside an ASU: Machine Hall, State Institute of Computing Centers, unknown date. In the 1970s, several civilian factories received ASUs under direction of the OGAS team. Most of ...
( Category:
History
July 8,2016 )
azw3 |eng | 2016-01-24 | Author:Arwidmark, Johan & Nyström, Mikael [Arwidmark, Johan]
The VMs used in this chapter (the REFW10X64-001 VM is created in this chapter). Build a Windows 10 Reference Image 1. Copy the E:\MDTBuildLab\Boot\MDT Build Lab x86.iso on MDT01 to ...
( Category:
Client-Server Systems
March 31,2016 )
epub |eng | 2012-12-16 | Author:Richard Hundhausen [Richard Hundhausen]
( Category:
Software Development
March 19,2016 )
epub |eng | | Author:Sam Ruby & Dave Thomas & David Heinemeier Hansson
Iteration K1: Deploying with Phusion Passenger and MySQL So far, as we’ve been developing a Rails application on our local machine, we’ve probably been using WEBrick or Mongrel when we ...
( Category:
Software Development
February 10,2016 )
mobi |eng | 2015-12-13 | Author:Bill English
Chapter 6. Configuring search Relevance, precision, and recall Analytics processing Managing the search schema Search Navigation web parts Changing the display name or the URL of a search vertical Search ...
( Category:
Client-Server Systems
December 14,2015 )
epub, pdf |eng | 2015-08-06 | Author:Solis Tech [Tech, Solis]
Chapter 13: Concept of Free Access in Hacking It may come as a surprise but hackers also have their own set of ethics. There are 5 general principles or tenets ...
( Category:
Electronic Data Interchange (EDI)
November 28,2015 )
epub |eng | 2015-10-04 | Author:Langenhan, Daniel
After you click on Next, you can continue with the input window for the workflow parameters. The workflow is now scheduled, and you can look at it by clicking on ...
( Category:
Client-Server Systems
October 30,2015 )
epub |eng | 2012-11-11 | Author:Samara Lynn [Samara Lynn]
Next, you must specify the name of the destination computer. You can browse to locate it in Active Directory (see Figure 7-6). Figure 7-6. Specifying the destination server for live ...
( Category:
Windows Administration
June 14,2015 )
epub |eng | 2014-09-29 | Author:Michael Miller [Miller, Michael]
* * * To download and install the Gmail Offline app, you must be running the Chrome browser. Follow these steps: 1. From within the Chrome browser, go to the ...
( Category:
Email Administration
June 13,2015 )
mobi, epub |eng | 2007-11-28 | Author:Microsoft
Brian would respond to the meeting request for this new meeting just as he would one that didn't have a recurrence. He would create the appropriate meeting registration response object ...
( Category:
Email Administration
June 11,2015 )
epub |eng | 2015-05-28 | Author:Marschall, Matthias
There's more... The execute resource offers a way to pass environment variables to the command it executes. Change the my_cookbook default recipe: mma@laptop:~/chef-repo $ subl cookbooks/my_cookbook/recipes/default.rb execute 'print value of ...
( Category:
Client-Server Systems
June 1,2015 )
mobi |eng | 2011-01-11 | Author:Kurose, James F. & Keith W. Ross [Kurose, James F.]
b. Suppose a central node determines paths and VC numbers at connection setup. Suppose the same VC number is used on each link along the VC’s path. Describe how the ...
( Category:
Networks
March 4,2015 )
epub, mobi, pdf |eng | 2014-10-26 | Author:Kelly Goetsch
For more information on this topic, read The Art of Scalability by Martin L. Abbott and Michael T. Fisher (Addison-Wesley Professional). Technical Rules Convert synchronous to asynchronous In synchronous processing, ...
( Category:
Electronic Data Interchange (EDI)
October 27,2014 )
epub, mobi |eng | 2014-10-26 | Author:Cameron Banga & Josh Weinhold
Although it’s important to be clear and concise when describing what you want, leaving nothing up to programmer interpretation is important as well. Being as detailed as possible removes the ...
( Category:
User Experience & Usability
October 27,2014 )
mobi |eng | 2011-06-14 | Author:Aaron Margosis & Mark Russinovich
Table 7-2. Command-Line Options for Logging Option Description –l logfile Logs output to the specified logfile –m n Limits log file to n MB –p Appends to the file if ...
( Category:
Client-Server Systems
May 26,2014 )
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9643)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7658)
Grails in Action by Glen Smith Peter Ledbrook(7572)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(5874)
Azure Containers Explained by Wesley Haakman & Richard Hooper(5836)
Running Windows Containers on AWS by Marcio Morales(5355)
Kotlin in Action by Dmitry Jemerov(4921)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4525)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4324)
Combating Crime on the Dark Web by Nearchos Nearchou(4085)
The Age of Surveillance Capitalism by Shoshana Zuboff(3797)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(3746)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(3606)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3411)
Python for Security and Networking - Third Edition by José Manuel Ortega(3325)
Mastering Python for Networking and Security by José Manuel Ortega(3228)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3227)
Blockchain Basics by Daniel Drescher(3189)
The Ultimate Docker Container Book by Schenker Gabriel N.;(2996)
TCP IP by Todd Lammle(2875)
