Data in the Enterprise
epub, mobi |eng | 2016-06-03 | Author:Benjamin Peters [Peters, Benjamin]

Figure 4.16 Inside an ASU: Machine Hall, State Institute of Computing Centers, unknown date. In the 1970s, several civilian factories received ASUs under direction of the OGAS team. Most of ...
( Category: History July 8,2016 )
azw3 |eng | 2016-01-24 | Author:Arwidmark, Johan & Nyström, Mikael [Arwidmark, Johan]

The VMs used in this chapter (the REFW10X64-001 VM is created in this chapter). Build a Windows 10 Reference Image 1. Copy the E:\MDTBuildLab\Boot\MDT Build Lab x86.iso on MDT01 to ...
( Category: Client-Server Systems March 31,2016 )
epub |eng | 2012-12-16 | Author:Richard Hundhausen [Richard Hundhausen]

( Category: Software Development March 19,2016 )
epub |eng | | Author:Sam Ruby & Dave Thomas & David Heinemeier Hansson

Iteration K1: Deploying with Phusion Passenger and MySQL So far, as we’ve been developing a Rails application on our local machine, we’ve probably been using WEBrick or Mongrel when we ...
( Category: Software Development February 10,2016 )
mobi |eng | 2015-12-13 | Author:Bill English

Chapter 6. Configuring search Relevance, precision, and recall Analytics processing Managing the search schema Search Navigation web parts Changing the display name or the URL of a search vertical Search ...
( Category: Client-Server Systems December 14,2015 )
epub, pdf |eng | 2015-08-06 | Author:Solis Tech [Tech, Solis]

Chapter 13: Concept of Free Access in Hacking It may come as a surprise but hackers also have their own set of ethics. There are 5 general principles or tenets ...
( Category: Electronic Data Interchange (EDI) November 28,2015 )
epub |eng | 2015-10-04 | Author:Langenhan, Daniel

After you click on Next, you can continue with the input window for the workflow parameters. The workflow is now scheduled, and you can look at it by clicking on ...
( Category: Client-Server Systems October 30,2015 )
epub |eng | 2012-11-11 | Author:Samara Lynn [Samara Lynn]

Next, you must specify the name of the destination computer. You can browse to locate it in Active Directory (see Figure 7-6). Figure 7-6. Specifying the destination server for live ...
( Category: Windows Administration June 14,2015 )
epub |eng | 2014-09-29 | Author:Michael Miller [Miller, Michael]

* * * To download and install the Gmail Offline app, you must be running the Chrome browser. Follow these steps: 1. From within the Chrome browser, go to the ...
( Category: Email Administration June 13,2015 )
mobi, epub |eng | 2007-11-28 | Author:Microsoft

Brian would respond to the meeting request for this new meeting just as he would one that didn't have a recurrence. He would create the appropriate meeting registration response object ...
( Category: Email Administration June 11,2015 )
epub |eng | 2015-05-28 | Author:Marschall, Matthias

There's more... The execute resource offers a way to pass environment variables to the command it executes. Change the my_cookbook default recipe: mma@laptop:~/chef-repo $ subl cookbooks/my_cookbook/recipes/default.rb execute 'print value of ...
( Category: Client-Server Systems June 1,2015 )
mobi |eng | 2011-01-11 | Author:Kurose, James F. & Keith W. Ross [Kurose, James F.]

b. Suppose a central node determines paths and VC numbers at connection setup. Suppose the same VC number is used on each link along the VC’s path. Describe how the ...
( Category: Networks March 4,2015 )
epub, mobi, pdf |eng | 2014-10-26 | Author:Kelly Goetsch

For more information on this topic, read The Art of Scalability by Martin L. Abbott and Michael T. Fisher (Addison-Wesley Professional). Technical Rules Convert synchronous to asynchronous In synchronous processing, ...
( Category: Electronic Data Interchange (EDI) October 27,2014 )
epub, mobi |eng | 2014-10-26 | Author:Cameron Banga & Josh Weinhold

Although it’s important to be clear and concise when describing what you want, leaving nothing up to programmer interpretation is important as well. Being as detailed as possible removes the ...
( Category: User Experience & Usability October 27,2014 )
mobi |eng | 2011-06-14 | Author:Aaron Margosis & Mark Russinovich

Table 7-2. Command-Line Options for Logging Option Description –l logfile Logs output to the specified logfile –m n Limits log file to n MB –p Appends to the file if ...
( Category: Client-Server Systems May 26,2014 )