uncleflo

profile picture

Some cool dude. Higher order of decision making. Absolute.

Registered since September 28th, 2017

Has a total of 4246 bookmarks.

Showing top Tags within 9 bookmarks

howto   information   development   guide   reference   administration   design   website   software   solution   service   product   online   business   uk   tool   company   linux   code   server   system   application   web   list   video   marine   create   data   experience   description   tutorial   explanation   technology   build   blog   article   learn   world   project   boat   download   windows   security   lookup   free   performance   javascript   technical   network   control   beautiful   support   london   tools   course   file   research   purchase   library   programming   image   youtube   example   php   construction   html   opensource   quality   install   community   computer   profile   feature   power   browser   music   platform   mobile   user   process   work   database   share   manage   hardware   professional   buy   industry   internet   dance   advice   installation   developer   3d   search   access   customer   camera   material   travel   test   standard   review   documentation   css   money   engineering   develop   webdesign   engine   device   photography   digital   api   speed   source   program   management   phone   discussion   question   event   client   story   simple   water   marketing   yacht   app   content   setup   package   fast   idea   interface   account   communication   cheap   compare   script   study   live   market   easy   google   resource   operation   startup   monitor   training  


Tag selected: procedure.

Clear all

Showing 9 results.

Looking up procedure tag. Showing 9 results. Clear

ITIL - Wikipedia

https://en.wikipedia.org/wiki/ITIL

Saved by uncleflo on December 17th, 2019.

ITIL, formerly[1] an acronym for Information Technology Infrastructure Library, is a set of detailed practices for IT service management (ITSM) that focuses on aligning IT services with the needs of business. ITIL describes processes, procedures, tasks, and checklists which are not organization-specific nor technology-specific, but can be applied by an organization toward strategy, delivering value, and maintaining a minimum level of competency. It allows the organization to establish a baseline from which it can plan, implement, and measure. It is used to demonstrate compliance and to measure improvement. There is no formal independent third party compliance assessment available for ITIL compliance in an organization. Certification in ITIL is only available to individuals. Since 2013, ITIL has been owned by AXELOS, a joint venture between Capita and the UK Cabinet Office.[2] AXELOS licenses organizations to use the ITIL intellectual property, accredits licensed examination institutes, and manages updates to the framework. Organizations that wish to implement ITIL internally do not require this license.

certification process framework compliant monitor infrastructure configuration improvement guidance it digital service busines procedure technology checklist strategy establish measure demonstrate compliance intellectual license organization good practice


How to Record Video of an App in Windows 10

https://www.laptopmag.com/articles/how-to-video-screen-capture-windows-10

Saved by uncleflo on February 23rd, 2019.

Did you know Windows 10 has a hidden screen recording utility? With it, you can record a video of your actions in just about any Windows app, whether it's you want to capture gameplay or create a tutorial for someone on using Microsoft Office. Here's how it works. The new video recording tool is part of the Xbox app that comes installed by default in Windows 10. It's really easy to use and although it isn't as feature rich as dedicated video and screen capture tools like Snagit or Camtasia, it is free and great for quick and dirty screen recording.

tutorial click desktop windows button screen recording complicated keyboard capture utility file easy pc procedure hidden camera window games description feature video administration course tool win10 app development teach teacher


NFS - which ports to open? - Storage - Discussions

https://discussions.citrix.com/topic/289912-nfs-which-ports-to-open/

Saved by uncleflo on December 23rd, 2018.

No problem connecting to NFS with firewalls disabled,but even with TCPView it's not obvious which ports require opening.
We've opened port 2049 for both UDP and TCP and all seems well, but there's a selection of ports mentioned across the web for NFS. So with XenServer just 2049? Sharing filesystems by NFS: Regardless of which choice is made for ID mapping you will need to adjust any firewall the system is using so that NFS clients can communicate with the server. You will need to ensure that the following ports are open before sharing any filesystem: UDP: 111, 1039, 1047, 1048 and 2049. TCP: 111, 1039, 1047, 1048 and 2049. See _this article_ Tobias

firewall helpful reply answer server accept client fix topic check procedure administration port suggestion solution open connect nfs require tcp map system article discussion administrator


How TF-IDF algorithm determines keyword importance - arbitrue Blog

https://www.arbitrue.com/blog/tf-idf-algorithm-for-keyword-importance/

Saved by uncleflo on December 23rd, 2018.

There are many tools in the developer’s toolbox when it comes to automatic data extraction. A good example is TF-IDF algorithm (Term Frequency – Inverse Document Frequency) which helps the system understand the importance of keywords extracted using OCR. Here’s how TF-IDF can be used for invoice and receipt recognition. In this article we focus on other techniques in order to make this text file “understandable” to a computer. For this purpose, we must delve into the world of NLP or Natural Language Processing. We will focus mainly on how we can transform our file of raw text into a format that will easily be understandable by our algorithm. In a nutshell, TF-IDF is a technique for understanding how important a word is in a document which is often used as a weighting factor for numerous use cases. TF-IDF takes under consideration how frequent a word appears in a single document in relation to how frequent that word is in general. Search engines can use TF-IDF to determine which results are the most relevant for a search query.

bigram tf-idf toolbox categorical algorithm classify assign vocabulary document extraction words procedure frequency count extracted word numerical development technical analysis article blog consider language process exraction important explanation


Filming in London - Aerial filming

http://filmlondon.org.uk/filming_in_london/planning_your_shoot/get-permission-film/aerial-filming

Saved by uncleflo on December 20th, 2018.

There are various permissions and considerations in order to operate a drone for aerial filming in London. Drones may also be referred to as Unmanned Aerial Vehicles (UAV), Small Unmanned Aircraft (SUA) or Unmanned Aerial Systems (UAS). All commercial drone operators must be in possession of a CAA permission document. Any drone flight in an urban area or near large crowds of people, whether for private or commercial purposes, will require the same document. The CAA grants permission for multi-rotor and fixed-wing type, and will only grant permission for drones that do not exceed 20kg.Productions using drones for filming purposes must ensure they are familiar with aircraft legislation and procedures that relate to aerial filming in London. Due to the nature of the local airspace and the density of population there are some important restrictions on the operation of aircraft in and around the capital.

film london aerial drone caa permission production commercial restriction capital uk procedure local refer space air reference


Performance and Security of ECDSA

https://koclab.cs.ucsb.edu/teaching/ecc/project/2015Projects/Levy.pdf

Saved by uncleflo on July 10th, 2017.

Digital signatures are used world wide to verify the authenticity of messages and confirm that they have not been altered in transmission. The Digital Signature Algorithm (DSA) is a Digital Signature Standard for the Federal Information Processing Standard and uses public key cryptography. The Elliptic Curve Digital Signature Algorithm (ECDSA) is a version of DSA using elliptic curves. In this paper, I will introduce ECDSA and discuss its key generation, signing, and verifying procedures. Then, I will compare this algorithm to the RSA digital signature algorithm and discuss its various advantages and drawbacks. Finally, I will discuss the security of ECDSA and attacks that can break it.

digital signature information security performance speed secure review comparison hardware cryptography transmission curve mathematical federal procedure paper pdf academical


Web Services Description Language (WSDL) 1.1

http://www.w3.org/TR/wsdl

Saved by uncleflo on October 21st, 2016.

WSDL is an XML format for describing network services as a set of endpoints operating on messages containing either document-oriented or procedure-oriented information. The operations and messages are described abstractly, and then bound to a concrete network protocol and message format to define an endpoint. Related concrete endpoints are combined into abstract endpoints (services). WSDL is extensible to allow description of endpoints and their messages regardless of what message formats or network protocols are used to communicate, however, the only bindings described in this document describe how to use WSDL in conjunction with SOAP 1.1, HTTP GET/POST, and MIME.

xml standard document procedure information wsdl international development learn service endpoint description definition w3 consortium network protocol application administration explanation detail reference


Abortion rights around the world – interactive | Global development | The Guardian

http://www.theguardian.com/global-development/ng-interactive/2014/oct/01/-sp-abortion-rights-around-world-interactive

Saved by uncleflo on November 13th, 2014.

Continent-wide summaries and country-by-country breakdowns of abortion rights, including where the procedure is permitted and for what reasons - to save a woman’s life, to preserve her health, after rape or incest, for economic or social reasons or on request. Plus, discover the six states in the world that do not permit abortion under any circumstances

continent data relative abortion women country develop world health economic development compare information reference guide article right procedure guard life preserve state incest summary freedom


122R-02 Guide to Thermal Properties of Concrete and Masonry Systems - 122R_02.PDF

http://www.bpesol.com/bachphuong/media/images/book/122R_02.PDF

Saved by uncleflo on February 8th, 2014.

This guide reports data on the thermal properties of concrete and masonry constituents, masonry units, and systems of materials and products that form building components. This guide includes consideration of thermal mass of concrete and masonry, passive solar design, and procedures to limit condensation within assemblages.

guide masonry construction pdf system thermal property heat transfer solar design procedure howto assemble concrete report physics resistance energy conservation


No further bookmarks found.