Fulltext results:
- art_of_concurrency_index
- l-[[Pair]]s [[Short]]est [[Path]] Amdahl's [[Law]], Amdahl's [[Law]], Amdahl's [[Law]] criticisms of, Amdahl's [[Law]] [[analysis]], [[identify]]ing possible [[concurrency]], Step 1
- systems_performance_methodologies
- ]. The next [[section]]s [[introduce]] [[Amdahl’s Law of Scalability]], the [[Universal]] [[Scalability]] [[Law]], and [[queueing]] [[theory]]. ===Amdahl’s Law of Scalability=== 2.6.3 [[Amdahl’s Law of Scalability]] [[Named]] after [[computer]] [[architect]] Ge
- cloud_native_transformation
- Behavior, Biases, and Managing Evolution Conway’s Law Cognitive Biases Why Biases Are Useful Biases,... he "right", Patterns, A Time for Design Conway's law and, Conway’s Law defined, What’s the Pattern? Architecture, Pattern Languages, and Design technolog... tanding and Using Cloud Native Patterns Conway's law and, Conway’s Law core concepts, How Patterns Wo
- quad9_dns
- s entirely subject to Swiss [[Information privacy law|privacy law]], and the Swiss government extends that protection of law to Quad9's users throughout the world, regardless... plicability of Swiss and European Data Protection Law |last=Steiger |first=Martin |date=2021-02-18 |web
- gplv3_license
- iable for infringement under applicable copyright law, except executing it on a computer or modifying a... use or other equivalent, as provided by copyright law. You may make, run and propagate covered works t... cting Users' Legal Rights From Anti-Circumvention Law. No covered work shall be deemed part of an effective technological measure under any applicable law fulfilling obligations under article 11 of the WI
- systems_performance_2nd_edition_by_brendan_gregg_index
- [Kubernetes]] Service]]), [[586]] [[Amdahl]]’s [[Law]] of [[Scalability]], 64–65 [[Analysis]] [[benc... 4–675 [[trace]]-[[cmd]] for, 736 [[Little]]’s [[Law]], 66 [[Live]] [[reporting]] in sar, 165 [[LLC]... [Methodologies]] [[modeling]], 62 [[Amdahl]]’s [[Law]] of [[Scalability]], 64–65 [[enterprise]] [[vs]... [theory]], 66–69 [[Universal]] [[Scalability]] [[Law]], 65–66 [[visual]] [[identification]], 62–64 [
- systems_performance_index
- [[Kubernetes]] Service]]), [[586]] * [[Amdahl’s Law]] of [[Scalability]], 64–65 * [[Analysis]] * [[... 5 * [[trace]]-[[cmd]] for, 736 * [[Little]]’s [[Law]], 66 * [[Live]] [[reporting]] in sar, 165 * [[... [[Methodologies]] [[modeling]], 62 * [[Amdahl’s Law]] of [[Scalability]], 64–65 * [[enterprise]] [[v... heory]], 66–69 * [[Universal]] [[Scalability]] [[Law]], 65–66 * [[visual]] [[identification]], 62–64
- chinese_character_cognates_in_korean_-_405-505
- [broom]] (帇)' [[component]] in '[[daughter]]-[[in-law]] ([[婦]])', 'pile (𠂤)', and 'stay ([[止]])', [[ori... democracy, popular [[sovereignty]] ③ [[civil]] [[law]], [[Civil]] [[Code]] [[Etymology]] [[Etymology... ]료 ① [[rule]], [[reign]], govern ② [[rule]] of [[law]] ③ medical treatment, cure ④ Meiji [[period]] [... ning]] '[[spring]]'. 454: 法 [[Meaning]] [[law]], [[rule]], statute, method, [[practice]] C J
- cybersecurity_glossary
- RA (Fair Credit Reporting Act) is a United States Law that regulates how consumer credit information is... ral sense, means "related to or used in courts of law" or "used for formal public debate or discussion.... nown as the Thompson-Liebermann Act) is a federal law that required U. graphical password or graphical ... are aware of but that is not in your possession. law of unintended consequences - The law of unintende
- practical_natural_language_processing_index
- [[industry]], [[Healthcare]], [[Finance]], and [[Law]] * [[Financial]] [[Phrase]][[Bank]], [[Financial... [[NLP]] in the [[Real World]], [[Finance]] and [[Law]]-[[Finance]] and [[Law]] * [[estimate]]d [[ML]] benefits, [[Finance]] and [[Law]] * [[NLP]] [[application]]s, [[NLP]] [[Applicati
- moore_s_law
- ==Moore's Law== "Many of today’s [[personal computers]] can perform [[billions]] of [[calculations]] i... is remarkable [[trend]] often is called [[Moore’s law]], named for [[Gordon Moore]], co-founder of [[In... lligent traffic intersections]] and more. Moore’s law and related observations apply especially to: * ... panies NVIDIA and Arm have indicated that Moore’s law no longer applies.25,26 Computer processing power
- filezilla_cli_command_line_interface
- tly or indirectly, into any country prohibited by law. f. use the [Software] in the operation of Nucle... ## LIABILITY TO THE MAXIMUM EXTENT PERMITTED BY LAW, AND PROVIDED THAT LIABILITY SHALL NOT BE EXCLUDE... USE THEREOF. TO THE MAXIMUM EXTENT PERMITTED BY LAW, OUR AGGREGATE LIABILITY AND THAT OF ITS AFFILIAT... TO THE MINIMUM AMOUNT STIPULATED BY A COMPULSORY LAW. ## Consumer rights If you act as a consumer un
- chinese_character_cognates_in_korean_-_203-304
- ning]] it is the '[[wife]]' or '[[daughter]]-[[in-law]]' who keeps [[house]] by [[managing]] [[househol... ' and '[[hand]] ([[寸]])', which also stands for [[law]], [[meaning]] 'govern' or '[[guard]]' by [[being... 察: [[け]][[ん]][[さ]][[つ]] ③ 檢察: 검찰 ① [[police]], [[law]] en[[force]]ment ② [[observe]], monitor, circums... ] stride (廴)', [[originally]] [[meaning]] 'make [[law]]', but later coming to [[mean]] '[[build]]'.
- outline_of_rights
- mative]] [[principle]]s, variously construed as [[law|legal]], [[society|social]], or [[morality|moral]... ons== * [[Natural and legal rights]] ** [[Natural law]] ** [[Positive law]] ** [[Social rights]] *** [[Social contract]] * [[Claim rights and liberty rights... >Unenumerated rights]] * [[wp>Equality before the law|Equal rights]] * [[wp>Fundamental rights]] * [[wp
- rfc_4949_internet_security_glossary_definitions_a
- e: adequate [[security]], [[risk]], "[[second]] [[law]]" under "[[Courtney]]'s [[law]]s".) ([[Fair Use]] [[Source]]: [[RFC 4949]) ---- * [[access]] 1a. ... ]d [[access]] to a [[system]]. (See: "[[third]] [[law]]" under "[[Courtney]]'s [[law]]s", [[manager]], [[operational]] [[security]], [[procedural]] [[securi