Computers & Technology
epub |eng | 2013-02-24 | Author:Fabrice Papy

9.2.3.3. Semantics The semantic analysis provided data on conceptual and terminological concordance of our sample classification structures with authoritative sources in the field of education. Results were obtained through a ...
( Category: Computers & Technology February 17,2019 )
azw3 |eng | 2015-08-31 | Author:Bresnahan, Christine & Blum, Richard [Bresnahan, Christine]

Using Regular Expressions Many Linux programs employ regular expressions, which are tools for expressing patterns in text. Regular expressions are similar in principle to the wildcards that can be used ...
( Category: Operating Systems February 17,2019 )
epub |eng | 2014-05-13 | Author:Carl Laufer [Laufer, Carl]

While scanning the fast scanner will also create a table of active signals that it has found in the plugin window. It shows the time that they have been active ...
( Category: Networking & Cloud Computing February 16,2019 )
epub |eng | 2013-12-27 | Author:Shoemaker, Daniel Paul & Conklin, Wm. Arthur [Shoemaker, Daniel Paul]

Handling Configuration Parameters Configuration parameters can change the behavior of an application. Securing configuration parameters is an important issue when configuration can change programmatic behaviors. Managing the security of configuration ...
( Category: Programming February 16,2019 )
epub |nld | 0101-01-01 | Author:Games [Games]

Games | Cooper West 42 Although, as night fell, he could feel the chill of the desert starting to creep up on them. Art stood up when he was done ...
( Category: Arts & Photography February 16,2019 )
azw3 |eng | 2015-08-31 | Author:Kristin Briney [Briney, Kristin]

7.2.4 Destroying data Data security requires proper storage habits from the beginning to the end of the life of a dataset which, in practice, means destroying data after it is ...
( Category: Social Sciences February 16,2019 )
azw3 |eng | 2018-10-30 | Author:Edgeworth, Brad & Gooley, Jason & Rios, Ramiro Garza [Edgeworth, Brad]

Use-case-agnostic infrastructure: Capability to use NFVI as a platform on which to onboard multiple use cases. Open standards based, modular, and elastic: Being open and interoperable allows for onboarding any ...
( Category: Computers & Technology February 16,2019 )
epub |eng | 2019-01-23 | Author:Delip Rao

Input[0] nn_indices = self.index.get_nns_by_vector(vector, n) return [self.index_to_word[neighbor] for neighbor in nn_indices] def compute_and_print_analogy(self, word1, word2, word3): """Prints the solutions to analogies using word embeddings Analogies are word1 is to word2 ...
( Category: Databases & Big Data February 15,2019 )
epub |eng | 2017-03-23 | Author:Infragistics

Listing 27.9: providers using useValue Using Factory Functions for Services Factory pattern is commonly used to abstract the logic of creating an object depending upon certain values in the application, ...
( Category: Programming February 15,2019 )
azw3 |eng | 2013-04-29 | Author:Perahia, Eldad & Stacey, Robert [Perahia, Eldad]

8.5.2 EIFS Another mechanism used to protect against hidden nodes is the extended inter-frame space (EIFS). A station uses EIFS instead of DIFS to defer if a frame is detected ...
( Category: Engineering February 15,2019 )
azw3 |eng | 2014-10-23 | Author:Foster, Jeff [Foster, Jeff]

In the example shown in Figure 9.19, the subjects are close to the screen in filtered sunlight under a tree. The shadows of both the subjects and the tree above ...
( Category: Photography & Video February 15,2019 )
epub |eng | 2017-04-26 | Author:Asim Hussain & Asim Hussain

Template Driven Forms In this lecture we’ll be converting the model driven form we’ve been building so far in this section into a template driven form. Learning Objectives Know the ...
( Category: Computers & Technology February 15,2019 )
azw3 |eng | 2019-02-11 | Author:Rehan Zaidi [Zaidi, Rehan]

Consider the following example: function myFunction() { var mytext = "Mytext"; function showtext() { console.log(mytext); } showtext(); } Function myFunction declares a local variable mytext and a function showtext - ...
( Category: Computers & Technology February 15,2019 )
epub |eng | 2018-02-13 | Author:William Webb

The Major Players Cannot Be Wrong The manufacturers and operators are powerful companies. Collectively, they employ millions and account for about $960 billion of annual revenue—about 1.5 percent of the ...
( Category: Business & Money February 14,2019 )
epub |eng | 2015-02-14 | Author:Violet Blue [Blue, Violet]

SOCIAL MEDIA CHECKLIST Our relationship with social sharing—photos, videos, status updates, location check-ins, and more—changes as our lives evolve. The way we feel about sharing something one day may be ...
( Category: Safety & First Aid February 14,2019 )