虫虫首页|资源下载|资源专辑|精品软件
登录|注册

leverage

  • Learn how to leverage a key Java technology used to access relational data from Java programs, in

    Learn how to leverage a key Java technology used to access relational data from Java programs, in an Oracle environment. Author Donald Bales begins by teaching you the mysteries of establishing database connections, and how to issue SQL queries and get results back. You ll move on to advanced topics such as streaming large objects, calling PL/procedures, and working with Oracle9i s object-oriented features, then finish with a look at transactions, concurrency management, and performance

    标签: Java technology relational leverage

    上传时间: 2017-08-01

    上传用户:xz85592677

  • this file is leverage algorithm written in matlab as m-file and tested in matlab.so anyone can ue th

    this file is leverage algorithm written in matlab as m-file and tested in matlab.so anyone can ue this algorithm and any bug can be reported

    标签: matlab algorithm leverage written

    上传时间: 2017-09-28

    上传用户:zhaoq123

  • This practical, roll-up-your-sleeves guide distills years of ingenious XML hacking into a complete s

    This practical, roll-up-your-sleeves guide distills years of ingenious XML hacking into a complete set of tips, tricks, and tools for web developers, system administrators, and programmers who want to leverage the untapped power of XML. If you want more than the average XML user--to explore and experiment, discover clever shortcuts, and show off just a little (and have fun in the process)--this invaluable book is a must-have.

    标签: roll-up-your-sleeves practical ingenious distills

    上传时间: 2015-10-31

    上传用户:lili123

  • With the successful implementation of XML Schema, developers are learning how to increase productivi

    With the successful implementation of XML Schema, developers are learning how to increase productivity, improve software reliability, minimize development time, and decrease time to market. This in-depth reference is an all-in-one resource designed to help developers leverage the power and potential of XML schemas by offering a complete roadmap to their creation, design, and use.

    标签: implementation successful developers productivi

    上传时间: 2013-12-07

    上传用户:gxrui1991

  • The world s bestselling computer security book--fully expanded and updated is one of the most succes

    The world s bestselling computer security book--fully expanded and updated is one of the most successful security books ever written. leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company to fight cyber-crime.

    标签: bestselling computer security expanded

    上传时间: 2017-05-13

    上传用户:thuyenvinh

  • As I write this foreword, I am collaborating with four leading user interface (UI) component vendo

    As I write this foreword, I am collaborating with four leading user interface (UI) component vendors on a presentation for the 2004 JavaOneSM conference. In our presentation, the vendors will show how they leverage JavaServerTM Faces technology in their products. While developing the presentation, I am learning some things about the work we’ve been doing on JavaServer Faces for the past three years. The vendors have their own set of concerns unique to adapting their product for JavaServer Faces, but they all voice one opinion loud and clear: they are very relieved to finally have a standard for web-based user interfaces.

    标签: collaborating component interface foreword

    上传时间: 2014-08-27

    上传用户:时代电子小智

  • What you always wanted to know about networking but were afraid to ask! * How networks and the In

    What you always wanted to know about networking but were afraid to ask! * How networks and the Internet work * How to build coherent, cost-effective network infrastructures * How to design networks for maximum reliability and availability * What you need to know about data center and application networking * How to secure networks against today?s threats and attacks * How to take advantage of the latest mobility technologies * How virtualizing networks can help businesses leverage their network investments even further * How to combine messaging, calendaring, telephony, audio, video, and web conferencing into a unified communications architecture

    标签: networking networks always afraid

    上传时间: 2013-12-25

    上传用户:fandeshun

  • CMOS MEMS_ A KEY TECHNOLOGY

    The mature CMOS fabrication processes are available in many IC foundries. It is cost-effective to leverage the existing CMOS fabrication technologies to implement MEMS devices. On the other hand, the MEMS devices could also add values to the IC industry as the Moore’s law reaching its limit. The CMOS MEMS could play a key role to bridge the gap between the CMOS and MEMS technologies. The CMOS MEMS also offers the advantage of monolithic integration of ICs and micro mechanical components. 

    标签: TECHNOLOGY CMOS MEMS KEY

    上传时间: 2020-06-05

    上传用户:shancjb