Searched over 21.6 Million titles in 0.22 seconds
Please wait while the eBook Finder searches for your request. Searching through the full text of 2,850,000 books. Full Text searches may take up to 1 min.
Ghid privind realizarea paginilor web pentru administraţia publică centrală şi locală din România. Acest ghid se adresează administraţiei publice care utilizează IT&C în vederea interacţiunii atât între cetăţeni, mediile de afaceri şi administraţia publică, cât şi în raportul interinstituţional, cu scopul creşterii eficienţei şi operativităţii, a îmbunătăţirii accesibilităţii web la serviciile publice. În vederea garantării calităţii şi utilităţii site-urilor web ale autorităţilor şi instituţiilor publice din administraţia publică centrală şi locală, se recomandă o planificare meticuloasă a proiectării, realizării şi întreţinerii site-urilor înainte de demararea proiectului. Imaginea respectivelor autorităţi şi instituţii publice, precum şi cea a României depinde şi de calitatea site-urilor web proiectate. Mai multe formate: http://www.trybuyshop.com/product/ghid-web-design-pentru-administratia-publica/...
Ghid privind realizarea paginilor web pentru administraţia publică centrală şi locală din România.
The book will show how to validate Digital Signature in Adobe reader. It covers two methods of validating along with snapshots of screen and step by step guidance....
“SIGNATURE IS WHAT YOU GET PAID FOR.” –Pratik Kikani
Index Content Page No E-book Page No Introduction 5-5 6-6 Few Basics of Digital Signature 6-7 7-8 Methods of Validating Sign-Brief 8-9 9-10 Which Method Suitable 10-10 11-11 Method 1 with Snapshots 11-16 12-17 Method 2 with Snapshots 17-28 18-29 Document after Validating Sign 29-29 30-30 ...
Acest document a fost lansat iniţial ca un efort pentru a ajuta echipele Google, însă este la fel de util şi pentru webmasterii începători în domeniul optimizării pentru motoarele de căutare, şi care doresc să îmbunătăţească interacţiunea site-ului atât cu utilizatorii, cât şi cu motoarele de căutare. Deşi acest ghid nu vă va dezvălui niciun secret prin care site-ul dvs. să se claseze în mod automat primul pentru interogările de pe Google, respectarea celor mai bune practici prezentate mai jos va simplifica atât accesarea cu crawlere, cât şi indexarea conţinutului dvs. de motoarele de căutare....
Ghidul de iniţiere Google privind optimizarea pentru motoarele de căutare, Versiunea 1.1, 13 noiembrie 2008
Utilizarea calculatorului şi a serviciilor electronice – Ghid pentru funcţionarii publici Acest ghid se adresează funcţionarilor publici care utilizează calculatorul şi Internetul în activitatea lor. Scopul acestei lucrări este de a familiariza funcţionarii publici cu posibilităţile şi avantajele oferite de utilizarea calculatorului şi a internetului, inclusiv prin potenţialul guvernării electronice (e-Guvernare) pentru activitatea instituţiilor publice. Lucrarea porneşte de la prezentarea, în primul capitol, a câtorva concepte de bază legate de calculatoare şi Internet, cum ar fi tipurile de programe pentru calculator şi utilitatea lor, documentele şi organizarea lor, tipuri de reţele şi rolul Internetului ca reţea globala, serviciile disponibile prin Internet, respectiv câteva considerente legate de drepturile de autor şi utilizarea legală a programelor de calculator. Capitolul 2 descrie utilitatea calculatorului si aplicaţiilor pentru activitatea de birou, fiind structurat pe două componente: Internetul si aplicaţiile software. Capitolul 3 prezintă o serie de concepte, reguli şi sfaturi destinate unei utilizări cât ma...
Acest ghid se adresează funcţionarilor publici care utilizează calculatorul şi Internetul în activitatea lor. Scopul acestei lucrări este de a familiariza funcţionarii publici cu posibilităţile şi avantajele oferite de utilizarea calculatorului şi a internetului, inclusiv prin potenţialul guvernării electronice (e-Guvernare) pentru activitatea instituţiilor publice....
This paper investigates the DOD’s tactical logistical challenges and each service’s tactical lift requirements, especially with respect to the movement of supplies from forward supply hubs to forward forces. To address these challenges and requirements, the author suggests the use of remotely piloted aircraft (RPA) as a potential solution. Focusing on existing and quickly emerging technologies as well as the joint operating requirements, the author proposes RPA performance and design characteristics along with a concept of employment that increases tactical lift capabilities and meets all current service requirements....
1 INTRODUCTION . . . .1 Notes . . . . . 12 2 OPERATIONAL REQUIREMENTS . . . .15 Notes . . . . 26 3 TECHNOLOGY REVIEW/PROOF OF CONCEPT . . .27 Notes . . . .41 4 PROPOSED SOLUTION . . . . 45 Notes . . . . .51 5 SYNOPSIS OF CONCEPT OF EMPLOYMENT . . . .53 Notes . . . . 59 6 CONCLUSION . . . . .61...
This semi-technical summary of the X–15 program is directed toward the less publicized aspects of its achievements.
Buenas prácticas, conceptos, configuraciones y métodos a tener en cuenta en un proyecto de VoIP para evitar interrupciones en las comunicaciones.
Dirigido especialmente a técnicos e instaladores en IP PBX.
01. Introducción Visión general de las plataformas de VoIP en el mercado 02. Que es supervivencia? Conceptos y soluciones de supervivencia 03. Primeros pasos Ejemplo de proyecto. Diseño y planificación 04. 2 WAN Dos ISP (Internet Service Provider) 05. Router 2 WAN Configuración del router 06. IP PBX Local Red centralizada Vs multi centrales 07. Plan de numeración Planificación integral de las funciones de nuestra PBX 08. Redundancia Duplicidad en hardware 09. Comunicaciones Unificadas Web Service y Softphone 10. PBX Hibrida Centrales analógicas con enlace IP 11. Bypass FXS/FXO Conmutación de líneas 12. Líneas IP Registro de líneas IP en red 13. ARS | Selección automática de ruta Configuración de ruta alternativa 14. Telulares Red de celulares 15. Resguardo eléctrico Planificación de switch POE 16. Conclusión Uso de buenas practicas Links de interés Sitios recomendados Acerca del Autor...
The key to making big data initiatives a success lies within making the produced data more digestible and usable in decision making, rather than making it just ‘more,’ resulting in the creation of an environment wherein information is used to generate real impact. Put another way, the survival of Big Data is more about making the right data(not just higher volume) available to the right people (not just higher variety) at the right time (not just higher velocity)....
Although this SourceSafe tutorial can be used for anyone who is interested in SourceSafe, it is mainly for software developers. As you may have been using SourceSafe for a long time and know many features of VSS, I will try to make the table of the content easy to navigate so hopefully you can easily find the information that you are interested in....
In this SourceSafe How To series / tutorial, I will write some guides, How To and FAQs about SourceSafe and will also post resources I found on the internet. This series will cover some basic and intermediate topics of SourceSafe as well as some advanced topics....
Introduction _________________________________________________________ 4 What is VSS? ________________________________________________________ 5 Market position _______________________________________________________ 6 What can VSS do? ____________________________________________________ 7 History preserving _____________________________________________________________ 7 File Difference _________________________________________________________________ 8 Project/Folder Difference _______________________________________________________ 9 Easy Collaboration ____________________________________________________________ 10 Several Important Concepts ___________________________________________ 12 VSS Database/Repository _____________________________________________________ 12 Working Folder _______________________________________________________________ 12 Master Copy and Local Copy ___________________________________________________ 12 Basic operations ____________________________________________________ 13 Add _________________________________________________________________________ 13 Get _________________...
The Department of Defense (DOD) anticipates the realization of biomimetic bird and two-inch, insect-sized systems within the 2015–47 period. Although robot systems of one millimeter or smaller are not explicitly specified in current DOD and Air Force technology road maps, the technological aims towards this size can be clearly inferred from official documents. This research assesses the likelihood of, and barriers to, the realization of true microrobots and nanorobots (defined as submillimeter-sized robots of micro-meter and nanometer proportions, respectively) that can perform in military applications by 2035. This research finds that the realization of true microrobots for military applications by 2035 is unlikely, except for a single case of microrobots....
This paper explores the advances in automatic identification technology, specifically radio frequency identification, and seeks to exploit these capabilities for use in the Department of Defense (DOD) supply chain. Using technological trends, a thorough literature review, and the opinions of experts, the paper compares current technology to a 2035 requirements forecast to identify capability gaps. The end goal is logistics situational awareness, whereby the DOD has the ability to provide end-to-end visibility throughout its supply chain and can rapidly mobilize, deploy, sustain, and redeploy forces in support of national security objectives....
Col Thompson, in his concentrated focus on China’s military space applications, examines PRC ground, space, counterspace, and space policy aspects. His principal findings: China has plans to construct a new launch site in the deep south; PRC telemetry, tracking and com-mand capacities are improving; China has the ability to conduct limited intelligence, surveillance and reconnaissance missions from space; the PRC is pursuing a counterspace capability most likely using satellite jammers and anti-satellites (possibly parasitic or nano-satellites). Col Thompson concludes that while China’s space program does not now constitute a global threat, the PRC is pursuing space capabilities that will increase its regional influence, and deny an adversary certain uses of space....
Apesar de haver uma literatura grande sobre o LaTeX, uma boa parte dos trabalhos disponíveis é relativamente antiga e não contém os avanços dos últimos anos. Em virtude disto, resolvemos escrever um texto sobre o LaTeX que, de uma forma simples e auto contida, apresente as opções mais recentes que estenderam e facilitaram o aprendizado e aplicação. No livro, além do básico sobre o LaTeX, acrescentaram-se tópicos sobre como elaborar apresentações, elaborar monografias, dissertações e teses, elaborar uma prova com gabarito, incluir arquivos multimídia, elaborar pôsteres para apresentação em congresso, usar recursos mais modernos para digitação de equações longas e sistemas de equações, elaborar bibliografias, incluir um índice remissivo, incluir sumário etc. A bibliografia do livro é constituída quase que exclusivamente de arquivos disponíveis na Internet e é feito um comentário sobre cada citação, além de permitir o acesso através de hiperligação ("hyperlink"). Ao longo do texto são citadas as referências que podem aprofundar os tópicos, caso o leitor sinta necessidade. No segundo semestre de 2013 foram feitos diversos ac...
1 Introdução -- Noções Básicas de LATEX 1.1 Origem: TeX (TEX) 1.2 Avanço: LaTeX (LATEX) 1.3 Exemplo mínimo de arquivo em LATEX 1.4 Resultado da compilação 1.5 Programas indicados 1.6 Gerando arquivo .pdf ou .dvi (compilação) 1.7 Distribuições de LATEX 1.8 Distribuição MiKTeX 1.9 Distribuição TeXLive 1.10 Editor para os arquivos .tex 1.11 Editor TeXworks 1.11.1 Configurações básicas 1.11.2 Algumas sugestões para o seu uso 1.12 Exemplo da interface do TeXworks 1.13 Editor Texmaker 1.14 Exemplo da interface do Texmaker 1.15 Arquivos auxiliares 2 LATEX Básico 2.1 Caracteres especiais 2.2 Estrutura dos arquivos em LATEX 2.3 Comandos básicos, ambientes, matemática 2.4 Classes de documentos 2.5 Parágrafos, espaços, separação de sílabas 2.6 Fontes e LuaTeX 2.7 Capítulos, seções, apêndice etc 2.8 Título, sumário, listas de tabelas e de figuras 2.9 Geometria da página, espaçamento entre linhas 2.10 Numeração e formatação das páginas, notas de rodapé 2.11 Principais pacotes 2.12 Símbolos matemáticos 2.13 Subscritos, sobrescritos, funções pré-de...
Florentin Smarandache's account on his visit to Atlanta to participate in the International Conference on Granular Computing, organized by the famous international association of electricity and electronics engineers, on behalf her official Institute of Electrical and Electronics Engineers, Inc., who write shorthand IEEE (American scholar in folklore)....
Merg cu maşina din Gallup, statul New Mexico, SUA, oraşul meu de reşedinţă, la Albuquerque, de unde voi lua avionul pentru Atlanta, capitala statului Georgia, pentru a participa la Conferinţa Internaţională de Calcul Granular (IEEE – GrC 2006), organizată de celebra asociaţie mondială a inginerilor din domeniile electricităţii şi electronicii, pe numele ei oficial Institute of Electrical and Electronics Engineers, Inc, care se scrie prescurtat IEEE (în folclorul savanţilor americani)....
Conferinţa internaţională de calcul granular . Un drum cu... teroare! .................................................. 6 . Ghidaj urban după hartă ............................................... 8 . Suprema onoare – sunt citat de Zadeh ....................... 12 . Asiaticii – 70 % din participanţi! ............................... 13 . În „bucătăria” calculului granular .............................. 14 . Cine-i mai inteligent: omul sau maşina? .................... 16 . În cel mai mare acvariu din lume ............................... 17 . În Atlanta, Pe aripile vântului ................................... 20 . Afacere sau for ştiinţific?! ......................................... 23 . Plimbare cu chinezi prin Atlanta ................................ 25 . Cambei! la restaurantul chinezesc ............................. 27 . Sponsorizarea salvatoare ............................................ 29 . „Exilat” la... clasa I! ................................................... 29 Manneken-Pis! Pregătiri de drum pentru Bruxelles ............................ 31 . Un „Boeing” scuturat! ...........................................
In this paper, I seek to demonstrate that the methods of using airpower to take the fight to the enemy and protect our ground forces during small wars need not involve the most advanced aircraft available. This “low-tech” approach does not suggest using lesser technology per se but proposes a different look for the types of aircraft that can perform a specific mission and for their manner of employment—that of protecting ground forces while combating the elusive insurgent. These same aircraft can prove invaluable in training an indigenous force to take the fight forward. By looking to relatively inexpensive, off-the-shelf aircraft, the Air Force can protect its ground-based charges and cement a relationship with embattled nations by helping them help themselves....
By the end of the Vietnam War, advances in technology allowed these FACs to control strikes against targets at night, in bad weather, and with improved precision. Laser-guided weapons systems, new computer navigation equipment, and advanced ground radars combined to provide an effective and lethal capability. If the Mosquitoes were an annoyance in Korea, the Wolves of Vietnam proved to be a deadly addition to the concept of FAC....
The author contends that urban terrain has become the preferred battlespace of US adversaries in the early twenty-first century. This environment poses unique challenges, especially to air and space warfare. The difficulty of sorting friendlies from enemy combatants, the latter intermingled with large numbers of noncombatants in very confined spaces, creates serious dilemmas for maneuver and aviation forces. Colonel Kemper believes that this mission, though well documented, has received neither the priority nor the resources necessary to ensure operational excellence and success on the modern battlefield. Thus, he not only inquires about whether we are training like we fight, but also seeks to determine what makes aviation urban operations so complicated and unique that they require stand-alone doctrine, tactics, techniques, and procedures....
This book also begins with that wondrous first Information Technology and then moves on to tales about the wonders of the written word—great stories, many of them likely new to most readers. In them, you‘ll find all the backgrounds, foregrounds, premises, conclusions, and surprises that make up the best and most valuable books. This book also begins with that wondrous first Information Technology and then moves on to tales about the wonders of the written word—great stories, many of them likely new to most readers. In them, you‘ll find all the backgrounds, foregrounds, premises, conclusions, and surprises that make up the best and most valuable books. At sixty-four, I bring another full lifetime lived both at that exact moment where my experiences could straddle working in print shops and in the current digital eBook era.. My degree in human-computer interfaces in 1973 led to my appointment as adjunct professor at Benedictine University, where I built the world‘s first electronic library in 1988. You could walk into that library, and the first thing you‘d see was the computer asking if there were any books you wanted. You se...
Way back in the fifteenth century a man named Johann Gutenberg invented the ?printing press. More than 400 years passed before Ottmar Mergenthaler found a way in the late 1880s to mechanize that historic invention. Then, less than a century later – in the 1980s – digital printing displaced Mergenthaler’s wondrous Linotypes....
1 THE ROLE OF DOCTRINE . . . . . . . . . . . . . 1 2 THE DOCTRINAL PROCESS: SOME SUGGESTED STEPS . . . . . . . . . . . . . . . . . . .5 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 3 CONCEPTS, DOCTRINES, PRINCIPLES . . . .19 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 4 SOME SEMINAL THINKERS ON TECHNOLOGY AND DOCTRINE . . . . . . . . . . . . . 25 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 5 WEAPONS AND DOCTRINE: A HISTORICAL INTRODUCTION . . . . . . . . . . . . . . . . . . . 55 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 6 INSIGHTS ON TECHNOLOGY AND DOCTRINE . . . . . . . . . . . . . . . . . . . . . . . .79 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 7 OF SABER CHARGES, ESCORT FIGHTERS, AND SPACECRAFT: THE SEARCH FOR DOCTRINE . . . . . . . . . . . . . . . . . . . . . . . .91 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . 106 8 LOOKING BACKWARD TO SEE AHEAD IN SPACE: REFLECTIONS ON THE NEED FOR SPACE DOCTRINE . . . . . . . . . . . . . . .109 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . 119 9 A MO...
Business of buying, selling, developing and monetizing Internet domain names. On the Internet, the Domain Name System (DNS) associates various sorts of information with so-called domain names; most importantly, it serves as the “phone book” for the Internet: it translates human-readable computer hostnames. Domaining is the business of buying, selling, developing and monetizing Internet domain names. Such domain name portfolios often include cleverly chosen and highly marketable generic domain names, or domains whose registrations had lapsed yet still retain reasonable traffic. There is sometimes no actual intent to use any of the domain names with the exception of generating advertising revenue through domain parking. ...
Business of buying, selling, developing and monetizing Internet domain names.