Results for: “Computers”
|Joe Kissell||Take Control Books||ePub|
Whether youre entirely new to 1Password or upgrading to version 4 for OS X, youll have an easier time working with the software if you set it up correctly from the start and understand how its designed to function. In this chapter, I cover some preliminary configuration steps that are often ignored or misunderstood, make sure you know which components are supposed to do what and when, and then walk you through creating and using your first few Web logins, which for most people are 1Passwords most crucial feature.
The chapter closes with important advice about identifying your best approach to using 1Password logins and some notes about a few tasks that 1Password does not handle.
This chapter is mainly about the Mac and Windows versions of 1Password. I do talk about syncing 1Password with other devices (including mobile devices), but I leave further discussion of 1Password on iOS and Android to Use 1Password on the Go, later.
By now youve undoubtedly downloaded and installed 1Passwordand if not, this is a great time to do so. Visit this page on the AgileBits Web site to find links to purchase it on your platform(s) of choice. I do want to point out, however, that Mac users can purchase 1Password either directly from the AgileBits site or from the Mac App Store, and although the two versions are almost identical, there are two key factors that may influence your decision:See All Chapters
|Russell Bryant||O'Reilly Media||ePub|
I traveled a good deal all over the world, and I got along pretty good in all these foreign countries, for I have a theory that it’s their country and they got a right to run it like they want to.
Telephony is one of those areas of life where, whether at home or at work, people do not like surprises. When people use phones, anything outside of the norm is an expectation not met, and as someone who is probably in the business of supplying telephone systems, you will know that expectations going unmet can lead to untold misery in terms of the extra work, lost money, and other problems that are associated with customer dissatisfaction.
In addition to ensuring that the user experience is in keeping with what users expect, there is also the need to make your Asterisk feel “at home.” For example, if an outbound call is placed over an analog line (FXO), Asterisk will need to interpret the tones that it “hears” on the line (busy, ringing, etc.).
By default (and maybe as one might expect, since it was “born in the USA”), Asterisk is configured to work within North America. However, since Asterisk gets deployed in many places and (thankfully) people from all over the world make contributions to it, it is quite possible to tune Asterisk for correct operation just about anywhere you choose to deploy it.See All Chapters
|Jo Rhett||O'Reilly Media||ePub|
We will start this part with an overview of what MCollective does, how it works, and how it can be used to orchestrate change. We’ll discuss how MCollective differs from control systems that loop through each target, and how true parallel execution can benefit your environment.
Sounds a bit boring, huh? Take a moment and enjoy it, because from that point onward, you’re going to be operating live. It’s all hands-on from here.
You’ll perform a real installation of MCollective servers and clients in your environment. No demo system, no tiny configuration that doesn’t match to your needs. You’ll build a working MCollective installation and test it out for your exact needs. You’ll use the client program to make live but nonoperational calls that are specific and unique to your own servers.
I’ll cover network and infrastructure requirements for MCollective and how to confirm that each is configured properly. You’ll get in-depth instruction on common installation problems and learn to fix these and related issues on your own.See All Chapters
|Simon Monk||O'Reilly Media||ePub|
This project (Figure3-1) is probably the simplest of the projects in this book. It is very easy to make and there is no soldering to do, other than what you did in Chapter 1 to prepare your IOIO by adding sockets to it.
The temperature sensor itself is a small, 3-pin chip that just plugs into the sockets on the IOIO.
The controlling software takes a temperature reading every 10 seconds and logs it onto the SD card in your phone. It also displays the current temperature in degrees Centigrade or Fahrenheit. When you want to retrieve the data that has been collected, you can just use the USB storage feature of your phone to transfer the file onto your computer. The data is stored in a CSV format so that it can be imported into a spreadsheet.
Whats more, we are going to use a USB Bluetooth module attached to the USB port of the IOIO to communicate with your phone wirelessly.
If you dont want to use Bluetooth for this project, you can just plug the phone into the IOIO in the same way as the project in Chapter 1.See All Chapters
|Sanjay Mishra||O'Reilly Media||ePub|
|Glenn Fleishman||Take Control Books||ePub|
A frustrating part of Wi-Fi networking is that you cant control your air space. All too often, neighboring Wi-Fi networks and other emitters cause reception problems in areas that otherwise would have good reception. If your networks performance varies by time of day or even by the minute, the ideas in this chapter may help you identify the problem.
What you test for varies by band. Keep reading after the tests for some suggestions for how to fix found problems.
Here are ideas for solving some of the problems noted just previously.
If cordless phones are the culprit:
If a neighboring network is causing the problem:
Another way to reduce network overlap is to engage in unilateral or multilateral curtailment (you know, like the former Soviet Union and the United States). You can cut the amount of transmit power on many Wi-Fi gateways, which reduces the interference you cause. If your neighbor backs off a little, too, both sets of network improve. You know: the Prisoners Dilemma.
In 5 GHz, you can switch from channel 149 or higher to channel 48 or lower to drop power output by 95 percent in 5 GHz while remaining the same in 2.4 GHz. See Spectrum Trade-offs.See All Chapters
|Brett McLaughlin||O'Reilly Media||ePub|
PHP is ultimately just text that is taken by your web server and turned into a set of commands and information for your web browser. And because youre just working in text, theres not a lot you have to do to get going as a PHP programmer. You need to become familiar with PHP itself, and the best way to do that is to install PHP on your own computer as well as becoming familiar with how PHP runs on a remote web server.
Then, you need to run an actual script. Dont worry; its amazingly easy to write your first program in PHP. Not only that, youll run your script, upload it to your web server, and access your script with a web browserand thats all in the first two chapters!
Throughout the process, youll begin taking control. With PHP, you become an active participant in your web pages. PHP lets you listen carefully to your users and say something back. So get going; theres no reason to leave your users with passive HTML pages any longer.
One of the most difficult things to get a handle on when it comes to PHP programming doesnt have much to do with programming at all. Its figuring out just how PHP runs, how it interacts with your web browser and web server, and why its not possible to just double-click a PHP file on your hard drive and see the script in that file run.See All Chapters
|Don Libes||O'Reilly Media||ePub|
Expect is a program to control interactive applications. These applications interactively prompt and expect a user to enter keystrokes in response. By using Expect, you can write simple scripts to automate these interactions. And using automated interactive programs, you will be able to solve problems that you never would have even considered before.
Expect can save you hours of drudgery, and this book will start you on your way. This first chapter is an overview of Expect. I will describe some simple applications and present some short scripts. However, the explanations are not intended to be complete but rather to whet your appetite and give you a taste of the good things to come. In the following chapters, I will revisit all of the concepts mentioned in this chapter and cover them in more detail.
Assume a yes response to all questions asked by fsck; this should be used with extreme caution, as it is a free license to continue, even after severe problems are encountered.See All Chapters
|Hamid R. Arabnia, David de la Fuente Elena B. Kozerenko, Peter M. LaMonica Raymond A. Liuzzi, Todd Waskiewicz, George Jandieri, Ashu M. G. Solo, Ivan Nunes da Silva, Fernando G. Tinetti, and Fadi Thabtah||CSREA Press|
Int'l Conf. Artificial Intelligence | ICAI'13 |
Improved Multi-objective PSO for Semi-desirable Facility Location
Bing Qi1 , Fangyang Shen2 , Heping Liu3 and Terry House 4
1 Department of Computer Science, Methodist University, Fayetteville, NC, USA
2 Department of Computer Science and technology, New York city College of Technology, Brooklyn, NY, USA
3 Department of industrial Engineering, Auburn University, Auburn, NC, USA
4 Department of Computer Science, Methodist University, Fayetteville, NC, USA
Abstract— Evolutionary optimization algorithms have been used to solve multiple objective problems. However, most of these methods have focused on search a sufﬁcient Pareto front, and no efforts are made to explore the diverse Pareto optimal solutions corresponding to a Pareto front. Note that in semi-obnoxious facility location problems, diversifying
Pareto optimal solutions is important. The paper therefore suggests an improved multi-objective particle swarm optimization algorithm (MOPSO) to ﬁnd diversiﬁed Pareto optimal solutions in the parameter space for semi-obnoxious facility location problems while achieving a similar Pareto front in the objective space. The improvement of MOPSO is obtained by introducing a new mechanism based on distances among Pareto optimal solutions. Three semiobnoxious facility location problems from the literature are used to evaluate the performance of the improved MOPSO.See All Chapters
Technologi JavaServer Faces (JSF) zdefiniowano w dokumencie JSR 314. Kompletn specyfikacj tej technologii mona pobra ze strony internetowej http://jcp.org/aboutJava/communityprocess/final/jsr314/index.html.
JavaServer Faces jest frameworkiem interfejsu uytkownika dziaajcym po stronie serwera i stworzonym z myl o aplikacjach internetowych na bazie Javy. Framework JSF umoliwia midzy innymi:
tworzenie stron internetowych przy uyciu zbioru komponentw interfejsu uytkownika wielokrotnego uytku, zgodnie ze wzorcem projektowym model-widok-kontroler (ang. Model-View-Controller MVC);
wizanie komponentw z modelem po stronie serwera (dziki temu jest moliwa dwukierunkowa migracja danych aplikacji i interfejsu uytkownika);
obsug nawigacji pomidzy stronami w odpowiedzi na zdarzenia interfejsu uytkownika i interakcje z modelem;
zarzdzanie stanem komponentw interfejsu uytkownika pomidzy daniami serwera;
udostpnianie prostego modelu kojarzenia zdarze generowanych przez klienta z kodem wykonywanym po stronie aplikacji;See All Chapters
|Jennifer Niederst Robbins||O'Reilly Media||ePub|
A Clean Slate (CSS Reset)
Image Replacement Techniques
Basic Responsive Web Design
This chapter is a grab bag of sorts. It starts with some techniques that are part of the web developer’s basic toolkit: clearing out browser styles with a CSS reset, using images in place of text (only when necessary!), and reducing the number of server requests with CSS sprites. It moves on to general approaches and special properties for styling forms and tables. Finally—and I’ve saved the best for last—you’ll get to use media queries to create a responsive site in step-by-step exercises.See All Chapters
|Jay Goldman||O'Reilly Media||ePub|
You should be able to look up any of the tags covered in
this chapter by adding them to the end of the Facebook Developers
Wiki URL. As an example, if you want more info on
|The EffectiveUI Team||Adobe Developer Library||ePub|
Weve already gone over the bulk of the POM file and its interaction with Ant. All thats left is to look at the dependencies:
Im not going to put the whole dependency list in here, but there
are a few points to hit. Notice how a dependency uses the same big
three identifiers that all projects need to define:
Table5.Scope in Maven
This is the default scope, and it is used if none is specified. Compile dependencies are available in all classpaths.
This is much like
|Alex Martelli||O'Reilly Media||ePub|
When a web browser (or any other web client) requests a page from a web server, the server may return either static or dynamic content. Serving dynamic content involves server-side web programs to generate and deliver content on the fly, often based on information stored in a database. The long-standing web-wide standard for server-side programming is known as CGI, which stands for Common Gateway Interface:
A web client (typically a browser) sends a structured request to a web server.
The server executes another program, passing the content of the request.
The server captures the standard output of the other program.
The server sends that output to the client as the response to the original request.
In other words, the servers role is that of a gateway between the client and the other program. The other program is called a CGI program, or CGI script.
|Graham Bath||Rocky Nook-IPS||ePub|
Appendix D: The Exam
As mentioned in chapter 1, the “Improving the Test Process” syllabus consists of two parts, each with its own exam. Section 1.7. provided a general overview of the Expert Level exam. This appendix provides more details about the exam, including the general rules that govern it and the coverage of learning objectives in the exam for each syllabus part.
Essay questions have been introduced to the ISTQB Certified Tester Expert Level certification exams for the first time. We have provided some tips that will help candidates prepare for this part of the exam.
D.1 General Exam Aspects
Each exam is made up of two components:
Multiple-choice question component
Essay question component
Multiple-choice question component
The duration of this component is 45 minutes.
This component addresses the learning objectives shown in table D–3.
Table D-1 Multiple-choice question component Multiple-choice question component
Some questions may be more difficult than others. To reflect this, K3 questions may be set at 1, 2, or 3 points and K4 questions may be set at 2 or 3 points, at the discretion of the author of the question. The number of points allocated to a question is shown on the exam paper.See All Chapters